International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003) -- Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases -- Ontology Translation on the Semantic Web -- Compound Term Composition Algebra: The Semantics -- Dynamic Pattern Mining: An Incremental Data Clustering Approach -- International …
Design of IP Networks with End-To-End Performance Guarantees -- Design of IP Virtual Private Networks under End-To-End QoS Constraints -- Design of Protected Working Capacity Envelopes Based on p-Cycles: An Alternative Framework for Survivable Automated Lightpath Provisioning -- Network Traffic Engineering with Varied Levels of Protection in the Next Generation Internet -- Balancing Traffic Flo…
Keynote Addresses -- Rethinking Computer Architecture Research -- Event Servers for Crisis Management -- DIET: Building Problem Solving Environments for the Grid -- The Future Evolution of High-Performance Microprocessors -- Low Power Robust Computing -- Networks and Games -- Plenary Session - Best Papers -- An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks -- A No…
Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware) -- An Implementation of, and Attacks on, Zero-Knowledge Watermarking -- On the Possibility of Non-invertible Watermarking Schemes -- Reversing Global and Local Geometrical Distortions in Image Watermarking -- On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems -- Fixed-Distortion…
Enhancing Knowledge and Skill Chains in Manufacturing and Engineering -- Enhancing Knowledge and Skill Chains in Manufacturing and Engineering -- Generic Infrastructure Requirements and Components -- Engineering Information Infrastructure for Product Lifecycle Managment -- Architecting an Ubiquitous & Model Driven Information Infrastructure -- Service Modeling for Service Engineering -- The Ext…
Cellular Networks: Where Are the Mobile Users? -- Distributed Data Structures: A Survey -- On Designing Truthful Mechanisms for Online Scheduling -- On Private Computation in Incomplete Networks -- Traffic Grooming on the Path -- Range Augmentation Problems in Static Ad-Hoc Wireless Networks -- On the Approximability of the L(h,k)-Labelling Problem on Bipartite Graphs (Extended Abstract) -- A T…
Channel Coding -- Error-Control Codes -- Check Digits for Error Detection -- Source Codes -- Statistical Methods -- Dictionary Methods -- Image Compression -- Secure Codes -- Basic Concepts -- Monoalphabetic Substitution Ciphers -- Transposition Ciphers -- Polyalphabetic Substitution Ciphers -- Stream Ciphers -- Block Ciphers -- Public-Key Cryptography -- Data Hiding -- Data Hiding in Images --…
Motivation and Introduction -- Quality of Human-Machine Interaction over the Phone -- Assessment and Evaluation Methods -- Speech Recognition Performance over the Phone -- Quality of Synthesized Speech over the Phone -- Quality of Spoken Dialogue Systems -- Final Conclusions and Outlook.Quality of Telephone-Based Spoken Dialogue Systems is a systematic overview of assessment, evaluation, and pr…
Channel Codes -- Direct-Sequence Systems -- Frequency-Hopping Systems -- Code Synchronization -- Fading of Wireless Communications -- Code-Division Multiple Access -- Detection of Spread-Spectrum Signals.Originally adopted in military networks as a means of ensuring secure communication when confronted with the threats of jamming and interception, spread-spectrum systems are now the core of com…
Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces --…