CGL Meeting Agenda

Wednesday, May 6th, 1998


Location:
DC 1304
Time:
1:30
Chairperson:
Celine Latulipe

1. Adoption of the Agenda - additions or deletions

2. Coffee Hour

Epicurean this week:
Richard Bartels 
Epicurean next week:
 

3. Next meeting

Date:
Wednesday, May 13th, 1998
Location:
DC 1304
Time:
1:30
Chairperson:
Marryat Ma
Presenter:
Eric Hall

4. Forthcoming

Chairpeople:
  1. Nathan Litke (May 20th)
  2. Stephen Mann (May 27th)
  3. Micheal McCool (June 3rd)
Presenters:
  1. Kirk Haller (May 20th)
  2. Rob Kroeger (May 27th)
  3. Celine Latulipe (June 3rd)

5. Technical Presentations

Tech Presenter:
Patrick Gilhuly
Title: Video Compression Techniques
 
Abstract: A discussion of video compression methods leading up to MPEG
 

6. General Discussion Items

7. Action List

8. Directors' Meeting

9. Seminars

Friday, May 8, 1998
          Master's Essay Presentation
          ``Verifying functional properties of specifications using PVS''
          Jianhan Guo, CS Graduate Student, University of Waterloo
          10:30 - 11:30 a.m.; DC1331

Monday, May 11, 1998
          Ph.D. Oral Defence
          ``Fairness in Electronic Commerce''
          N. Asokan, CS Graduate Student, Univ. of Waterloo
          (Supervisors: J.P.Black/M.Waidner)
          (Thesis on display in MC5090 27 Mar - 11 May 1998)
          9:00 a.m.; DC1331

          Computer Science Seminar
          ``The Distributed Virtual Communication Machine''
          Marcel Rosu, Georgia Institute of Technology
          10:30; DC1304

     Tuesday, May 12, 1998
          Computer Science Seminar
          ``FARA - A Framework for Dynamic Resource Allocation
          for Adaptive Real-Time Applications''
          Daniela Rosu, Georgia Institute of Technology
          10:30; DC1302

SYSTEMS SEMINAR

                    -Tuesday, May 12, 1998

Dr.  Michael  Waidner,  IBM  Zurich  Lab, will speak on
Asymmetric and Anonymous Fingerprinting''.

TIME:                1:30-2:30 p.m.

ROOM:                DC 1302

ABSTRACT

Fingerprinting   is   one  type  of  measures  for  the
copyright  protection  of  digital  data.  The merchant
sells a slightly different `copy' to each buyer so that
he   can  later  identify  the  original  buyer  of  an
illegally redistributed copy.

All  previous  fingerprinting  schemes are symmetric in
the  following  sense:  Both the buyer and the merchant
know  the  fingerprinted copy.  Thus, when the merchant
finds  this  copy  somewhere, there is no proof that it
was  the  buyer who put it there, and not the merchant.
We  introduce  and  construct asymmetric fingerprinting
schemes,  where  only the buyer knows the fingerprinted
copy  and  the merchant, upon finding it somewhere, can
find out and prove to third parties whose copy it was.

We  also  mention  combinations  of fingerprinting with
anonymity.

10. Communal Custodial Duties