International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003) -- Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases -- Ontology Translation on the Semantic Web -- Compound Term Composition Algebra: The Semantics -- Dynamic Pattern Mining: An Incremental Data Clustering Approach -- International …
Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware) -- An Implementation of, and Attacks on, Zero-Knowledge Watermarking -- On the Possibility of Non-invertible Watermarking Schemes -- Reversing Global and Local Geometrical Distortions in Image Watermarking -- On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems -- Fixed-Distortion…
Cellular Networks: Where Are the Mobile Users? -- Distributed Data Structures: A Survey -- On Designing Truthful Mechanisms for Online Scheduling -- On Private Computation in Incomplete Networks -- Traffic Grooming on the Path -- Range Augmentation Problems in Static Ad-Hoc Wireless Networks -- On the Approximability of the L(h,k)-Labelling Problem on Bipartite Graphs (Extended Abstract) -- A T…
Channel Coding -- Error-Control Codes -- Check Digits for Error Detection -- Source Codes -- Statistical Methods -- Dictionary Methods -- Image Compression -- Secure Codes -- Basic Concepts -- Monoalphabetic Substitution Ciphers -- Transposition Ciphers -- Polyalphabetic Substitution Ciphers -- Stream Ciphers -- Block Ciphers -- Public-Key Cryptography -- Data Hiding -- Data Hiding in Images --…
Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces --…
Invited Talk -- Privacy Enhanced Technologies: Methods – Markets – Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Rat…
Fundamentals of Scheduling -- Is Scheduling a Solved Problem? -- Formulations, Relaxations, Approximations, and Gaps in the World of Scheduling -- Order Scheduling Models: An Overview -- Multi-criteria Scheduling -- Scheduling in Software Development Using Multiobjective Evolutionary Algorithms -- Scheduling Unit Execution Time Tasks on Two Parallel Machines with the Criteria of Makespan and To…
From Swarm Intelligence to Swarm Robotics -- Swarm Robotics: From Sources of Inspiration to Domains of Application -- Communication, Diversity and Learning: Cornerstones of Swarm Behavior -- The SWARM-BOTS Project -- Pheromone Robotics and the Logic of Virtual Pheromones -- Distributed Localization and Mapping with a Robotic Swarm -- The I-SWARM Project: Intelligent Small World Autonomous Robot…
Invited Speakers -- Performance Engineering and Stochastic Modelling -- Implicit Representations and Algorithms for the Logic and Stochastic Analysis of Discrete–State Systems -- PiDuce: A Process Calculus with Native XML Datatypes -- Life After BPEL? -- EPEW -- On Moments of Discrete Phase-Type Distributions -- Zero-Automatic Queues -- A Unified Approach to the Moments Based Distribution Est…
Towards Global Collaborative Computing: Opportunities and Challenges of Peer to Peer Networks and Applications -- Session 1: Grid Service and Grid Security -- Session 2: Grid Middleware and Applications -- Session 3: Knowledge Grid and Semantic Grid -- Session 4: Resource Management -- Session 5: P2P Computing and Automatic Computing -- Session 6: Performance Evaluation and Modeling -- Session …