Computer Science - 2003 Baldine, I., Rouskas, G. N., Perros, H. G., & Stevenson, D. (2003). Multicast and QoS in the Jumpstart Architecture for WDM Burst-Switched Networks. Optical Networks, 4(6), 68–80. Rouskas, G. N. (2003). Routing and Wavelength Assignment in Optical WDM Networks. In J. Proakis (Ed.), Wiley Encyclopedia of Telecommunications. https://doi.org/10.1002/0471219282.eot205 Xu, L. S., Perros, H. G., Rouskas, G. N., Cicekli, I., Cicekli, N. K., & Gelenbe, E. (2003). Performance modeling of an edge optical burst switching node. Proceedings of the 17th International Symposium on Computer and Information Sciences, 377–381. Xu, L. S., Perios, H. G., Rouskas, G. N., Charzinski, J., Lehnert, R., & TranGia, P. (2003). Performance analysis of an edge optical burst switching node with a large number of wavelengths. In Providing Quality of Service in Heterogeneous Environments, Vols 5a and 5b: Vol. 5A-B (pp. 891–900). Rouskas, G. N., Jackson, L. E., Charzinski, J., Lehnert, R., & TranGia, P. (2003). Optimal granularity of MPLS tunnels. In Providing Quality of Service in Heterogeneous Environments, Vols 5a and 5b: Vol. 5A-B (pp. 1–10). Dutta, R., Huang, S., Rouskas, G. N., Somani, A. K., & Zhang, Z. (2003). On optimal traffic grooming in elemental network topologies. In Opticomm 2003: Optical Networking and Communications (Vol. 5285, pp. 13–24). https://doi.org/10.1117/12.533162 Xu, L. S., Perros, H. G., Rouskas, G. N., & IEEE. (2003). A queueing network model of an edge optical burst switching node. In Ieee Infocom 2003: the Conference on Computer Communications, Vols 1-3, Proceedings (pp. 2019–2029). Grabmeier, J., & Weispfenning, V. (2003). Computer Algebra Handbook (J. Grabmeier, E. Kaltofen, & V. Weispfenning, Eds.). Heidelberg, Germany: Springer Verlag. Erdogmus, H., & Williams, L. (2003). The Economics of Software Development by Pair Programmers. The Engineering Economist, 48(4), 283–319. https://doi.org/10.1080/00137910309408770 Shen, X., Zhong, Y., & Ding, C. (2003). Regression-Based Multi-Model Prediction of Data Reuse Signature. Proceedings of the Fourth Annual Symposium of the Los Alamos Computer Science Institute, 243–251. Sante Fe, New Mexico, USA: Alamos Computer Science Institute. Shen, X., Zhong, Y., & Ding, C. (2003). Predicting Hierarchical Phases in Program Data Behavior (Technical Report No. TR824). Computer Science Dept., University of Rochester. Shen, X., Zhong, Y., & Ding, C. (2003). Adaptive Data Partitioning using Probability Distribution (Technical Report No. TR823). Computer Science Dept., University of Rochester. Boutell, M., Shen, X., Luo, J., & Brown, C. (2003). Multi-label Semantic Scene Classification (Technical Report No. TR813). Dept. of Computer Science, University of Rochester. Yolum, P., & Singh, M. P. (2003). Achieving Trust via Service Graphs. Proceedings of the 6th International Workshop on Trust, Privacy, Deception, and Fraud in Agent Societies (Trust). Melbourne. Maximilien, E. M., & Singh, M. P. (2003). Agent-Based Architecture for Autonomic Web Service Selection. Proceedings of the 1st International Workshop on Web Services and Agent-Based Engineering (WSABE), 1–10. Melbourne: AAMAS. Maximilien, E. M., & Singh, M. P. (2003). An Ontology for Web Service Ratings and Reputations. Proceedings of the 1st International Workshop on Ontologies and Agent Systems (OAS)., 73, 25–30. Melbourne: CEUR. Yolum, P., & Singh, M. P. (2003). Emergent Personalized Communities in Referral Networks. Proceedings of the IJCAI Workshop on Intelligent Techniques for Web Personalization. Presented at the Proceedings of the IJCAI Workshop on Intelligent Techniques for Web Personalization (ITWP'03), Acapuolo, Mexico. Kaltofen, E. (2003). FoxBox and other blackbox systems. In J. Grabmeier, E. Kaltofen, & V. Weispfenning (Eds.), Computer Algebra Handbook (pp. 383–385). Heidelberg, Germany: Springer Verlag. Corless, M., Kaltofen, E., & Watt, S. M. (2003). Hybrid methods. In J. Grabmeier, E. Kaltofen, & V. Weispfenning (Eds.), Computer Algebra Handbook (pp. 112–125). Heidelberg, Germany: Springer Verlag. Kaltofen, E., & Saunders, B. D. (2003). Linear systems. In J. Grabmeier, E. Kaltofen, & V. Weispfenning (Eds.), Computer algebra handbook: foundations, applications, systems (pp. 36–38). Heidelberg, Germany: Springer Verlag. Kaltofen, E. (2003). Absolute factorization of polynomials. In J. Grabmeier, E. Kaltofen, & V. Weispfenning (Eds.), Computer Algebra Handbook (p. 26). Heidelberg, Germany: Springer Verlag. Kaltofen, E., & Weispfenning, V. (2003). Computer algebra - impact on research. In J. Grabmeier, E. Kaltofen, & V. Weispfenning (Eds.), Computer Algebra Handbook (pp. 4–6). Heidelberg, Germany: Springer Verlag. Falcone, R., Barber, S., Korba, L., & Singh, M. (Eds.). (2003). Trust, Reputation, and Security: Theories and Practice. https://doi.org/10.1007/3-540-36609-1 Battestilli, T., & Perros, H. (2003). An introduction to optical burst switching. IEEE Communications Magazine, 41(8), S10–S15. https://doi.org/10.1109/mcom.2003.1222715 Kaltofen, E. (2003). Polynomial factorization. Proceedings of the 2003 international symposium on Symbolic and algebraic computation - ISSAC '03. Presented at the the 2003 international symposium. https://doi.org/10.1145/860854.860857 Kaltofen, E., & May, J. (2003). On approximate irreducibility of polynomials in several variables. Proceedings of the 2003 international symposium on Symbolic and algebraic computation - ISSAC '03. Presented at the the 2003 international symposium. https://doi.org/10.1145/860854.860893 Ρ-Queries:: enabling querying for semantic associations on the semantic web. (2003). Proceedings of the twelfth international conference on World Wide Web - WWW '03. https://doi.org/10.1145/775152.775249 Matsuda, N., & VanLehn, K. (2003). Modeling hinting strategies for geometry theorem proving. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2702, 373–377. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-8344255630&partnerID=MN8TOARS Agent communication languages: Rethinking the principles. (2003). Computer. https://doi.org/10.1109/2.735849 Udupi, Y. B., Yolum, P., & Singh, M. P. (2003). Trustworthy service caching: Cooperative search in P2P information systems. Lecture Notes in Computer Science, 3030, 32–44. https://doi.org/10.1007/978-3-540-25943-5_3 Singh, M. P. (2003). Trustworthy service composition: Challenges and research questions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2631, pp. 39–52). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-7044270651&partnerID=MN8TOARS Singh, M. P. (2003). The future of agent communication. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2650, 318–322. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144467458&partnerID=MN8TOARS Yu, B., & Singh, M. P. (2003). Searching Social Networks. Proceedings of the Interantional Conference on Autonomous Agents, 2, 65–72. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142305174&partnerID=MN8TOARS Falcone, R., Barber, S., Korba, L., & Singh, M. (2003). Preface. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2631). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84945527959&partnerID=MN8TOARS Singh, M. P. (2003). Peer-to-peer computing for information systems. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2530, 15–20. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144433600&partnerID=MN8TOARS Xing, J., & Singh, M. P. (2003). Engineering Commitment-Based Multiagent Systems: A Temporal Logic Approach. Proceedings of the International Conference on Autonomous Agents, 2, 891–898. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142292521&partnerID=MN8TOARS Yolum, P., & Singh, M. P. (2003). Emergent Properties of Referral Systems. Proceedings of the Interantional Conference on Autonomous Agents, 2, 592–599. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142293029&partnerID=MN8TOARS Yolum, P., & Singh, M. P. (2003). Dynamic communities in referral networks. Web Intelligence and Agent Systems, 1(2), 105–116. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-2942625505&partnerID=MN8TOARS Singh, M. P. (2003). Distributed Enactment of Multiagent Workflows: Temporal Logic for Web Service Composition. Proceedings of the Interantional Conference on Autonomous Agents, 2, 907–914. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142268242&partnerID=MN8TOARS Yu, B., & Singh, M. P. (2003). Detecting Deception in Reputation Management. Proceedings of the Interantional Conference on Autonomous Agents, 2, 73–80. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142293052&partnerID=MN8TOARS Yolum, P., & Singh, M. P. (2003). Ladders of Success: An Empirical Approach to Trust. Proceedings of the Interantional Conference on Autonomous Agents, 2, 1168–1169. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142280376&partnerID=MN8TOARS Yu, B., & Singh, M. P. (2003). Incentive mechanisms for peer-to-peer systems. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2872, 77–88. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144440546&partnerID=MN8TOARS Wan, F., & Singh, M. P. (2003). Commitments and Causality for Multiagent Design. Proceedings of the Interantional Conference on Autonomous Agents, 2, 749–756. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1142280922&partnerID=MN8TOARS Singh, M. P. (2003). Agent communication languages: Rethinking the principles. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2650, 37–50. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144466430&partnerID=MN8TOARS A community-based approach for selecting service providers. (2003). ICWS'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WEB SERVICES. Retrieved from https://publons.com/publon/21294494/ Yolum, P., & Singh, M. P. (2003). An agent-based approach for trustworthy service location. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2530, 45–56. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144447427&partnerID=MN8TOARS Sreenath, R. M., & Singh, M. P. (2003). A Community-Based Approach for Selecting Service Providers. Proceedings of the International Conference on Web Services, 177–183. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-1642355971&partnerID=MN8TOARS Doyle, J., & McGeachie, M. (2003). Exercising qualitative control in autonomous adaptive survivable systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2614, pp. 158–170). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-35248852939&partnerID=MN8TOARS Stallmann, M. F., Brglez, F., & Li, X. Y. (2003). SATbed User Documentation. Retrieved from https://people.engr.ncsu.edu/mfms/Publications/2003-SATbed-home-guide.pdf Brglez, F., Stallmann, M. F., & Li, X. Y. (2003). SATbed: A Configurable Environment for Reliable Performance Experiments with SAT Instance Classes and Algorithms. Proc. 6th Int. Conf. on Theory and Applications of Satisfiability Testing, 5–8. Li, X. Y., Stallmann, M. F., & Brglez, F. (2003). QingTing: a fast SAT solver using local search and efficient unit propagation. Sixth International Conference on Theory and Applications of Satisfiability Testing, 1. Li, X. Y., Stallmann, M. F., & Brglez, F. (2003). A local search SAT solver using an effective switching strategy and an efficient unit propagation. International Conference on Theory and Applications of Satisfiability Testing, 53–68. Doyle, J., & McGeachie, M. (2003). Exercising Qualitative Control in Autonomous Adaptive Survivable Systems. Self-Adaptive Software: Applications, pp. 158–170. https://doi.org/10.1007/3-540-36554-0_12 Long, W. J., Doyle, J., Burke, G., & Szolovits, P. (2003). Detection of intrusion across multiple sensors. In P. K. Willett & T. Kirubarajan (Eds.), System Diagnosis and Prognosis: Security and Condition Monitoring Issues III (Vol. 5107, pp. 141–149). https://doi.org/10.1117/12.488478 Gehringer, E. F. (2003). A database and search engine for sharing fine-grained course materials over the Web. Proceedings of the 2003 ASEE Annual Conference and Exposition. Presented at the 2003 ASEE Annual Conference and Exposition, Nashville, TN. Gehringer, E. F. (2003). Is pair programming an effective way to learn computer architecture? Proceedings of the 2003 ASEE Annual Conference and Exposition. Presented at the 2003 ASEE Annual Conference and Exposition, Nashville, TN. Gehringer, E. F. (2003). Electronic peer review builds resources for teaching computer architecture. Proceedings of the 2003 ASEE Annual Conference and Exposition. Presented at the 2003 ASEE Annual Conference and Exposition, Nashville, TN. Gehringer, E. F. (2003). Why aren't course-management systems penetrating faster? Proceedings of the 2003 ASEE Annual Conference and Exposition. Presented at the 2003 ASEE Annual Conference and Exposition, Nashville, TN. Gehringer, E. F. (2003). Building resources for teaching computer architecture through electronic peer review. Proceedings of the 2003 workshop on Computer architecture education Held in conjunction with the 30th International Symposium on Computer Architecture - WCAE '03. Presented at the the 2003 workshop. https://doi.org/10.1145/1275521.1275534 Gehringer, E. F. (2003). A pair-programming experiment in a non-programming course. Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '03. Presented at the Companion of the 18th annual ACM SIGPLAN conference. https://doi.org/10.1145/949344.949397 New GA approaches for pipe support optimization. (2003). Proceedings of the Structures Congress and Exposition, 61–62. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-22344433506&partnerID=MN8TOARS Asynchronous genetic algorithms for heterogeneous networks using coarse-grained dataflow. (2003). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2723, pp. 730–741). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-35248893482&partnerID=MN8TOARS Computer algebra handbook foundations, applications, systems. (2003). https://doi.org/10.1007/978-3-540-72122-2_20 Weeks, T. W., Piner, E. L., Gehrke, T., & Linthicum, K. J. (2003). Gallium nitride materials and methods. Washington, DC: U.S. Patent and Trademark Office. Weeks, T. W., Piner, E. L., Borges, R. M., & Linthicum, K. J. (2003). Gallium nitride material devices and methods including backside vias. Washington, DC: U.S. Patent and Trademark Office. Anantaraman, A., Seth, K., Patil, K., Rotenberg, E., & F. Mueller, F. (2003). Virtual Simple Architecture (VISA): Exceeding the complexity limit in safe real-time systems. Computers and their applications :|bproceedings of the ISCA 16th International Conference, Seattle, Washington, USA, March 28-30, 2001, 350–361. Cary, NC: ISCA. Seth, K., Anantaraman, A., Mueller, F., & Rotenberg, E. (2003). FAST: Frequency-aware static timing analysis. RTSS 2003: 24TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, pp. 40–51. https://doi.org/10.1109/real.2003.1253252 Dutta, R., Huang, S., & Rouskas, G. (2003). Traffic grooming in path, star and tree networks: complexity, bounds, and algorithms. Proceedings of the ACM Sigmetrics, International Conference on Measurement and Modeling of Computer Systems, 298–299. https://doi.org/10.1145/781027.781066 Dutta, R., Huang, S., & Rouskas, G. (2003). On optimal traffic grooming in elemental network topologies. Proceedings of Opticomm 2003, 5285. Corteel, S., & Savage, C. (2003). Anti-lecture hall compositions. Discrete Mathematics, 263(1-3), 275–280. https://doi.org/10.1016/S0012-365X(02)00768-9 Mallya, A. U., & Huhns, M. N. (2003). Commitments among agents. IEEE INTERNET COMPUTING, Vol. 7, pp. 90–93. https://doi.org/10.1109/MIC.2003.1215666 Shah, H. S., Joshi, N. R., Sureka, A., & Wurman, P. R. (2003). Mining eBay: Bidding strategies and shill detection. In WEBKDD 2002: Mining Web data for discovering usage patterns and profiles: 4th international workshop, Edmonton, Canada, July 23, 2002: Revised papers (Vol. 2703, pp. 17–34). Berlin; New York: Springer. Ben Hamza, A., & Krim, H. (2003). Geodesic object representation and recognition. In B. Hamza & H. Krim (Eds.), Discrete geometry for computer imagery: 11th International Conference, DGCI 2003, Naples, Italy, November 19-21, 2003 (Vol. 2886, pp. 378–387). https://doi.org/10.1007/978-3-540-39966-7_36 Nair, R. D., Scroggs, J. S., & Semazzi, F. H. M. (2003). A forward-trajectory global semi-Lagrangian transport scheme. JOURNAL OF COMPUTATIONAL PHYSICS, 190(1), 275–294. https://doi.org/10.1016/S0021-9991(03)00274-2 Mallya, A. U., Yolum, P., & Singh, M. P. (2003). Resolving commitments among autonomous agents. Lecture Notes in Computer Science, 2922, 166–182. https://doi.org/10.1007/978-3-540-24608-4_10 Chopra, A., & Singh, M. P. (2003). Nonmonotonic commitment machines. Lecture Notes in Computer Science, 2922, 183–200. https://doi.org/10.1007/978-3-540-24608-4_11 Singh, M. P. (2003). The future of agent communication. Lecture Notes in Computer Science, 2650, 318–322. https://doi.org/10.1007/978-3-540-44972-0_18 Singh, M. P. (2003). Peer-to-peer computing for information systems. Lecture Notes in Computer Science, 2530, 15–20. https://doi.org/10.1007/3-540-45074-2_2 Riedl, M. O., & Young, R. M. (2003). Character-focused narrative generation for execution in virtual worlds. In M. O. Riedl & R. M. Young (Eds.), Virtual storytelling: Using virtual reality techniques for storytelling: Second International Conference, ICVS 2003, Toulouse, France, November 20-21, 2003: proceedings (Vol. 2897, pp. 47–56). Berlin; New York: Springer. Yolum, P., & Singh, M. P. (2003). An agent-based approach for trustworthy service location. Lecture Notes in Computer Science, 2530, 45–56. https://doi.org/10.1007/3-540-45074-2_5 Singh, M. P. (2003). Agent communication languages: Rethinking the principles. In Communication in multiagent systems: Agent communication languages and conversation policies (Vol. 2650, pp. 37–50). https://doi.org/10.1007/978-3-540-44972-0_2 Zhao, S. N., Xiong, X. Y., Yao, G. Z., & Fu, Z. (2003). A computational model as neurodecoder based on synchronous oscillation in the visual cortex. Neural Computation, 15(10), 2399–2418. Rhee, I., & Welch, J. L. (2003). The impact of timing knowledge on the session problem. SIAM JOURNAL ON COMPUTING, 32(4), 1007–1039. https://doi.org/10.1137/S009753979936094X Jackson, L. E., & Rouskas, G. N. (2003). Optimal quantization of periodic task requests on multiple identical processors. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 14(8), 795–806. https://doi.org/10.1109/TPDS.2003.1225058 Hochberg, R. A., & Stallmann, M. F. (2003). Optimal one-page tree embeddings in linear time. INFORMATION PROCESSING LETTERS, 87(2), 59–66. https://doi.org/10.1016/S0020-0190(03)00261-8 Xin, Y. F., Rouskas, G., & Perros, H. G. (2003). On the physical and logical topology design of large-scale optical networks. Journal of Lightwave Technology, 21(4), 904–915. https://doi.org/10.1109/JLT.2002.810075 Ben Hamza, A., & Krim, H. (2003). Image registration and segmentation by maximizing the Jensen-Renyi divergence. In M. F. A. Rangarajan & J. Zerubia (Eds.), Energy minimization methods in computer vision and pattern recognition (Vol. 2683, pp. 147–163). https://doi.org/10.1007/978-3-540-45063-4_10 Martin, J., Nilsson, A., & Rhee, I. (2003). Delay-based congestion avoidance for TCP. IEEE-ACM TRANSACTIONS ON NETWORKING, 11(3), 356–369. https://doi.org/10.1109/TNET.2003.813038 Baugh, J. W., & Kumar, S. V. (2003). Asynchronous genetic algorithms for heterogenous networks using course-grained dataflow. In Genetic and evolutionary computation--GECCO 2003: Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003: Proceedings (Vol. 2723, pp. 730–741). https://doi.org/10.1007/3-540-45105-6_88 Branting, L. K. (2003). A reduction-graph model of precedent in legal analysis. Artificial Intelligence (New York, N.Y. : 1970), 150(02-Jan), 59–95. Anton, A. I., Earp, J. B., & Carter, R. A. (2003, November 1). Precluding incongruous behavior by aligning software requirements with security and privacy policies. INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 45, pp. 967–977. https://doi.org/10.1016/S0950-5849(03)00095-8 Zaim, A. H., Baldine, I., Cassada, M., Rouskas, G., Perros, H. G., & Stevenson, D. (2003). Jumpstart just-in-time signaling protocol: a formal description using extended finite state machines. Optical Engineering, 42(2), 568–585. https://doi.org/10.1117/1.1533795 Singh, M. P. (2003). Trustworthy service composition: Challenges and research questions. Lecture Notes in Computer Science, 2631, 39–52. https://doi.org/10.1007/3-540-36609-1_5 Benoit, A., Brenner, L., Fernandes, P., Plateau, B., & Stewart, W. J. (2003). The PEPS software tool. In W. H. S. P. Kemper (Ed.), Computer performance evaluation: Modelling techniques and tools: 13th international conference, TOOLS 2003, Urbana, IL, USA, September 2-5, 2003 (Vol. 2794, pp. 98–115). https://doi.org/10.1007/978-3-540-45232-4_7 Liu, G., Healey, C. G., & Enns, J. T. (2003). Target detection and localization in visual search: A dual systems perspective. Perception & Psychophysics, 65(5), 678–694. https://doi.org/10.3758/bf03194806 Nagappan, N., Williams, L., Wiebe, E., Miller, C., Balik, S., Ferzli, M., & Petlick, J. (2003). Pair learning: With an eye toward future success. In Extreme programming and agile methods: XP/Agile Universe 2003: Third XP Agile Universe Conference, New Orleans, LA, USA, August 10-13, 2003 (Vol. 2753, pp. 185–198). https://doi.org/10.1007/978-3-540-45122-8_21 Rouskas, G. N. (2003). Optical layer multicast: Rationale, building blocks, and challenges. IEEE NETWORK, 17(1), 60–65. https://doi.org/10.1109/MNET.2003.1174179 Kaltofen, E., & Lee, E. S. (2003). Early termination in sparse interpolation algorithms. JOURNAL OF SYMBOLIC COMPUTATION, Vol. 36, pp. 365–400. https://doi.org/10.1016/S0747-7171(03)00088-9 Li, Y. J., Ning, P., Wang, X. S., & Jajodia, S. (2003). Discovering calendar-based temporal association rules. DATA & KNOWLEDGE ENGINEERING, 44(2), 193–218. https://doi.org/10.1016/S0169-023X(02)00135-0 Vouk, M. A., & Rivers, A. T. (2003). Construction of reliable software in resource-constrained environments. In W. R. Blischke & D. N. P. Murthy (Eds.), Case studies in reliability and maintenance (Wiley series in probability and statistics). https://doi.org/10.1002/0471393002.ch9 Giesbrecht, M., Kaltofen, E., & Lee, W. S. (2003). Algorithms for computing sparsest shifts of polynomials in power, Chebyshev, and Pochhammer bases. JOURNAL OF SYMBOLIC COMPUTATION, Vol. 36, pp. 401–424. https://doi.org/10.1016/S0747-7171(03)00087-7 Doyle, J., & McGeachie, M. (2003). Exercising qualitative control in autonomous adaptive survivable systems. In P. R. R. Laddaga & H. Shrobe (Eds.), Self-adaptive software: Applications: Second International Workshop, IWSAS 2001, Balatonfu?red, Hungary, May 17-19, 2001: Revised papers (Vol. 2614, pp. 158–170). Berlin; New York: Springer. Vetter, J. S., & Mueller, F. (2003, September). Communication characteristics of large-scale scientific applications for contemporary cluster architectures. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 63, pp. 853–865. https://doi.org/10.1016/S0743-7315(03)00104-7 Yu, B., Venkatraman, M., & Singh, M. P. (2003). An adaptive social network for information access: Theoretical and experimental results. Applied Artificial Intelligence, 17(1), 21–38. https://doi.org/10.1080/08839510390169738 Benazza-Benyahia, A., Pesquet, J. C., & Krim, H. (2003). A nonlinear diffusion-based three-band filter bank. IEEE SIGNAL PROCESSING LETTERS, 10(12), 360–363. https://doi.org/10.1109/LSP.2003.818864 Savage, C. D., Shields, I., & West, D. B. (2003). On the existence of Hamiltonian paths in the cover graph of M(n). DISCRETE MATHEMATICS, 262(1-3), 241–252. https://doi.org/10.1016/S0012-365X(02)00503-4 Shah, A., & Chirkova, R. (2003). Improving query performance using materialized XML views: A learning-based approach. In Conceptual modeling for novel application domains: ER 2003 workshops ECOMO, IWCMQ, AOIS, and XSDM, Chicago, IL, USA, October 13, 2003: proceedings / Manfred Jeusfeld; Oscar Pastor (eds.). New York: Springer-Verlag, 2003. (Lecture notes in computer science ; 2814). (Vol. 2814, pp. 297–310). https://doi.org/10.1007/978-3-540-39597-3_30 He, Y., Hamza, A. B., & Krim, H. (2003). A generalized divergence measure for robust image registration. IEEE Transactions on Signal Processing, 51(5), 1211–1220. https://doi.org/10.1109/TSP.2003.810305 Anton, A. I. (2003). Successful software projects need requirements planning. IEEE SOFTWARE, Vol. 20, pp. 44-+. https://doi.org/10.1109/MS.2003.1196319 Chu, M. T., & Plemmons, R. J. (2003). Real-valued, low rank, circulant approximation. SIAM JOURNAL ON MATRIX ANALYSIS AND APPLICATIONS, 24(3), 645–659. https://doi.org/10.1137/S0895479801383166 Finkel, A., Iyer, S. P., & Sutre, G. (2003). Well-abstracted transition systems: application to FIFO automata. INFORMATION AND COMPUTATION, 181(1), 1–31. https://doi.org/10.1016/S0890-5401(02)00027-5 Zhang, J., Zhang, X., Krim, H., & Walter, G. G. (2003). Object representation and recognition in shape spaces. PATTERN RECOGNITION, 36(5), 1143–1154. https://doi.org/10.1016/S0031-3203(02)00226-1 Curry, A. C., Shih, A. J., Kong, J., Scattergood, R. O., & McSpadden, S. B. (2003). Grinding temperature measurements in magnesia-partially-stabilized zirconia using infrared spectrometry. JOURNAL OF THE AMERICAN CERAMIC SOCIETY, 86(2), 333–341. https://doi.org/10.1111/j.1151-2916.2003.tb00019.x Anton, A. I., & Potts, C. (2003, February). Functional paleontology: The evolution of user-visible system services. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol. 29, pp. 151–166. https://doi.org/10.1109/TSE.2003.1178053 Kosara, R., Healey, C. G., Interrante, V., Laidlaw, D. H., & Ware, C. (2003). User studies: Why, how, and when? IEEE COMPUTER GRAPHICS AND APPLICATIONS, Vol. 23, pp. 20–25. https://doi.org/10.1109/MCG.2003.1210860 Chu, M. T., Funderlic, R. E., & Plemmons, R. J. (2003). Structured low rank approximation. LINEAR ALGEBRA AND ITS APPLICATIONS, 366, 157–172. https://doi.org/10.1016/S0024-3795(02)00505-0 Karacali, B., & Krim, H. (2003). Fast minimization of structural risk by nearest neighbor rule. IEEE TRANSACTIONS ON NEURAL NETWORKS, 14(1), 127–137. https://doi.org/10.1109/TNN.2002.804315 Chandler, R. E., Meyer, C. D., & Rose, N. J. (2003). Eudoxus meets Cayley. AMERICAN MATHEMATICAL MONTHLY, 110(10), 912–927. https://doi.org/10.2307/3647962 Zaim, A. H., Perros, H. G., & Rouskas, G. N. (2003). Computing call-blocking probabilities in leo satellite constellations. IEEE Transactions on Vehicular Technology, 52(3), 622–636. https://doi.org/10.1109/TVT.2003.811219 Xu, L. S., Perros, H. G., & Rouskas, G. N. (2003, January). Access protocols for optical burst-switched ring networks. INFORMATION SCIENCES, Vol. 149, pp. 75–81. https://doi.org/10.1016/S0020-0255(02)00247-5 Xu, L. S., Perros, H. G., & Rouskas, G. N. (2003). A simulation study of optical burst switching and access protocols for WDM ring networks. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 41(2), 143–160. https://doi.org/10.1016/s1389-1286(02)00371-7 Williams, L. (2003). The XP programmer: The few-minutes programmer. IEEE SOFTWARE, Vol. 20, pp. 16–20. https://doi.org/10.1109/MS.2003.1196315