Euc Program

60
EUC 2008 Program EUC 2008 The 5 th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008 Shanghai, China Sponsored by Shanghai Jiao Tong University Shanghai Computer Society IEEE Computer Society Supported by National Natural Science Foundation of China Shanghai Pudong New Area Association for Computer Foundation of Science & Tech. Development of Shanghai Pudong New Area

description

 

Transcript of Euc Program

Page 1: Euc Program

EUC 2008 Program

EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and

Ubiquitous Computing

17-20 December 2008 Shanghai, China

Sponsored by

Shanghai Jiao Tong University

Shanghai Computer Society

IEEE Computer Society

Supported by

National Natural Science Foundation of China

Shanghai Pudong New Area Association for Computer

Foundation of Science & Tech. Development of Shanghai Pudong New Area

Page 2: Euc Program

EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008, Shanghai, China

Contents

EUC 2008 Conference Schedule at a Glance

Organization

Technical Program Committee

The Map of EUC 2008 Conference Place

Access Guide to Conference Place

Reception and Pujiang Cruise

Banquet

Lunch

EUC 2008 Advanced Technical Program

Tour guide

Page 3: Euc Program

Wednesday, 17 December 2008 - EUC workshops

  Room

Time

Function

Room 3 Function Room 1&2

Function Room 7

Function

Room 4&5

9:00-9:10 EUV-08

UUWSN-08

Welcome speech NCUS-08 TRUST-08

Opening and Keynote speech 9:10-10:30 UUWSN-08 Session 1

10:30-11:00 Coffee Break

11:00-12:30 EUV-08 UUWSN-08

Keynote Speech NCUS-08 TRUST-08

Session 1

12:30-13:30 Lunch 13:30-14:00

ESO-08

NCUS-08

14:00-15:00 UUWSN-08

Session 2 TRUST-08 Session 2

15:00-15:10 Coffee Break

15:10-15:30

Tutorial 1 15:30-16:00 Coffee Break Coffee Break 16:00-16:30 Coffee Break

UWMN-08  TRUST-08 Session 3 (Panel)

16:30-16:50 SECUBIQ-08

Coffee Break

16:50-17:30 Tutorial 2

17:30-18:00 18:30-20:00 Supper in Yayuefang Restaurant (100m away from the conference place)

Thursday, 18 December 2008 - EUC 2008 main conference and TSP-08

Room

Time Grand Ballroom

Function

Room 4&5

Function

Room 7

Function

Room 1&2

8:30-9:00 EUC-08 Opening

Ceremony

9:00-10:00 Keynote Speech I

(Yaoxue Zhang)

10:00-10:30 Coffee Break TSP-08 Opening

Ceremony

10:30-11:30 EUC-08

Session 1A

EUC-08

Session 1B

TSP-08 Keynote Speech

11:30-12:10 TSP-08 Session 1

EUC 2008 Conference Schedule at a Glance

Page 4: Euc Program

12:10-12:30 Lunch

12:30-13:30 Lunch

13:30-14:30 Keynote Speech II

(Tarek Abdelzaher)

14:30-14:50 Coffee Break

Coffee Break

14:50-15:00 TSP-08

Session 2 15:00-16:10 EUC-08

Session 2A

EUC-08

Session 2B 16:10-16:20 Coffee Break

16:20-16:40 TSP-08 Session 3

16:40-17:50

18:00-19:00 Take bus from hotel to the dock

19:00-21:00 Reception and Pujiang Cruise

Friday, 19 December 2008 - EUC 2008 main conference and TSP-08

Room

Time Grand Ballroom

Function

Room 4&5

Function

Room 7

Function

Room 1&2

9:00-10:00 Keynote Speech III

(Xiaodong Zhang)

10:00-10:30 Coffee Break

10:30-12:10 EUC-08

Session 3A

EUC-08

Session 3B

TSP-08

Session 4

12:10-13:30 Lunch

13:30-15:10 EUC-08

Session 4A

EUC-08

Session 4B

TSP-08

Session 5

15:10-15:30 Coffee Break

15:30-17:10 EUC-08

Session 5A

EUC-08

Session 5B

TSP-08

Session 6

17:10-18:30 Rest in the hotel

18:30-21:30 Banquet in the hotel

Saturday, 20 December 2008 - EUC 2008 main conference and TSP-08

Room

Time Function room 4&5 Function Room 7 Function room 1&2

8:30-10:10 EUC-08 Session 6A EUC-08 Session 6B TSP-08 Session 7

10:10-10:30 Coffee Break

10:30-12:10 EUC-08 Session 7A EUC-08 Session 7B TSP-08 Session 8

Page 5: Euc Program

12:10-13:30 Lunch

13:30-15:10 EUC-08 Session 8A EUC-08 Session 8B TSP-08 Session 9

15:10-15:30 Coffee Break

15:30-16:50 EUC-08 Session 9A EUC-08 Session 9B

Page 6: Euc Program

General Chair Minyi Guo, Shanghai Jiao Tong Univ., China Program Chair Cheng-Zhong Xu, Wayne State Univ., USA Program Vice-Chairs

Embedded Systems Soft- ware and Optimization

Jihong Kim, Seoul National Univ., Korea

Embedded Systems and Hard-ware/software Co-Design

Zonghua Gu, Hong Kong Univ. of Science and Technology, Hong Kong

Cyber-Physical Systems Oleg Sokolsky, Univ. of Pennsylvania, USA Real-time Systems Albert M. K. Cheng, Univ. of Houston, USA Power Aware Computing Gang Quan, Univ. of South Carolina, USA Network Protocols Sherali Zeadally, Univ. of the District of Columbia, USAWireless Networks Ivan Stojmenovic, Univ. of Ottawa, Canada Sensor Networks Loren Schwiebert, Wayne State Univ., USA Context Aware Mobile Computing

Jiannong Cao, Hong Kong Polytechnic Univ., HK

Agent and Distributed Computing

Wentong Cai, Nanyang Technological Univ., Singapore

Middleware and P2P Chung-Ta King, National Tsing Hua Univ., Taiwan Multimedia and Data Management

Xiaobo Zhou, Univ. of Colorado, USA

Security and Fault Tolerance

Makoto Takizawa, Tokyo Denki Univ., Japan

Workshop Chairs Zhijun Wang, Hong Kong Polytechnic Univ., Hong Kong

Dakai Zhu, Univ. of Texas at San Antonio, USA Publicity Chairs Ben A. Abderazek, Univ. of Aizu, Japan Wenbin Jiang, Huazhong Univ. of Science and

Technology, China

Publication Chair Yu Hua, Huazhong Univ. of Science and Technology,

China

Local Arrangement Chairs Feilong Tang, Shanghai Jiao Tong Univ., China Minqi Zhang, Shanghai Computer Society, China Jingyu Zhou, Shanghai Jiao Tong Univ., China Yao Shen, Shanghai Jiao Tong Univ., China

Organization

Page 7: Euc Program

Yanqin Yang, East China Normal Univ., China

Jemal Abbawajy Deakin University, Australia Kemal Akkaya Southern Illinois University, USA Stefan Andrei Lamar University, USA David Atienza Complutense University of Madrid, Spain Neil Audsley University of York, UK Hakan Aydin George Mason University, USA Iain Bate University of York, UK Paolo Bellavista Università di Bologna, Italy Lim Hock Beng National University of Singapore, Singapore Miodrag Bolic University of Ottawa, Canada Azzedine Boukerche University of Ottawa, Canada Stephen Bush GE Research, USA Jian Cao Shanghai Jiaotong University, China Jean Carle University of Lille, France Eduardo Cerqueira University of Coimbra, Portugal Chaitali Chakrabarti Arizona State University, USA Samarjit Chakraborty National University of Singapore, Singapore Alvin T.S. Chan Hong Kong Polytechnic University, Hong Kong Rong-Guey Chang National Chung-Cheng University, Taiwan Han-Chieh Chao National Ilan University, Taiwan Hsi-Lu Chao National Chiao-Tung University, Taiwan Ling Teck Chaw University of Malaya, Malaysia Guihai Chen Nanjing University, China Hongyang Chen University of Tokyo, Japan Albert K. Cheng University of Houston, USA Reynold Cheng Hong-Kong Polytechnic University, Hong Kong Naveen Chilamkurti LaTrobe University, Australia

Technical Program Committee

Page 8: Euc Program

Pai Chou University of California at Irvine, USA Sung Woo Chung Korea University, Korea Yeh-Ching Chung National Tsing-Hua University, Taiwan Stephen Cranefield University of Otago, New Zealand Saumitra Das Purdue University, USA Qianni Deng Shanghai Jiaotong University, China Qingxu Deng Northeastern University, China Murat Demirbas University of Buffalo, USA Ming Dong Wayne State University, USA Junzhao Du Xidian University, China Hala Elaarag Stetson University, USA Said Elnaffar United Arab Emirates University, UAE Sebastian Fischmeister University of Waterloo, Canada Eric Fleury INRIA-INSA Lyon, France Scott Fowler Aston University, UK Song Fu University of New Mexico Technology, USA Satoshi Fujita Hiroshima University, Japan Aniruddha Gokhale Vanderbilt University, USA Lin Guan Loughborough University, UK Song Guo University of Aizu, Japan Hani Hagras University of Essex, UK Jérôme Härri Universität Karlsruhe, Germany Mohamed Hefeeda Simon Fraser University, Canada Seongsoo Hong Seoul National University, Korea Hung-Chang Hsiao National Cheng Kung University, Taiwan Pao-Ann Hsiung National Chung Cheng University, Taiwan Ching-Hsien Hsu Chung Hua University, Taiwan Kien A. Hua University of Central Florida, USA Ray Hunt University of Canterbury, New Zealand Jacek Ilow Dalhousie University, Canada Jadwiga Indulska University of Queensland, Australia Tohru Ishihara Kyushu University, Japan Russ Joseph Northwestern University, USA Jehn-Ruey Jiang National Central University, Taiwan Beihong Jin Institute of Software, CAS, China Soon Ju Kang Kyung Book National University, Korea

Page 9: Euc Program

Jung Guk Kim Hankuk University of Foreign Studies, Korea Young-Jin Kim Sun Moon University, Korea Polychronis Koutsakis McMaster University, Canada László Kovács Hungarian Academy of Science, Hungary T. John Koo Shantou University, China Srdjan Krco Ericsson, Dublin, Ireland Mohan Kumar University of Texas at Arlington, USA Tei-Wei Kuo National Taiwan University, Taiwan Bjorn Landfeldt University of Sydney, Australia Peter Langendoerfer IHP-Microelectronics, Germany Julia Lawall University of Copenhagen, Demark Jaejin Lee Seoul National University, Korea Chang-Gun Lee Seoul National University, Korea Jenq-Kuen Lee National Tsing-Hua University, Taiwan Victor Lee Hong Kong City University, Hong Kong Wang-Chien Lee The Pennsylvania State University, USA Wonjun Lee Korea University, Korea Hong-Va Leong Hong Kong Polytechnic University, Hong Kong Clement Leung Victoria University, Australia Kuan-Ching Li Providence University, Taiwan Xiang-Yang Li Illinois Institute of Technology, USA Zhu Li Motorola Labs, USA Qilian Liang University of Texas at Arlington, USA Weifa Liang Australian National University, Australia Sung-Soo Lim Kookmin University, Korea Teck Meng Lim StarHub Ltd, Singapore Justin Lipman Intel, China Annie Liu SUNY, Stony Brook, USA Hai Liu University of Ottawa, Canada Jane Liu Academia Sinica, Taiwan Steve Liu Texas A&M University, USA Xue Liu McGill University, Canada Yunhao Liu Hong Kong University of Science and Technology, Hong

Kong Brian Logan University of Nottingham, UK Malcolm Low Nanyang Technological University, Singapore

Page 10: Euc Program

Luis Loyola DoCoMo Euro Laboratories, Germany Zongwei Luo The University of Hong Kong, Hong Kong Huadong Ma Beijing University of Posts & Telecommunications, China Rupak Majumdar University of California at Los Angeles, USA Kami Makki University of Toledo, USA Gregorio Martinez University of Mercia, Spain Jaime Lloret Mauri University of Valencia, Spain Xiaofeng Meng Renmin University of China, China Chunyan Miao Nanyang Technological University, Singapore Kazuhiro Minami University of Illinois at Urbana-Champaign, USA Vincent John Mooney Georgia Institute of Technology, USA Farid Nait-Abdesselam University of Sciences and Technologies of Lille, France Joseph K. Ng Hong Kong Baptist University, Hong Kong Alex Nicolau University of California at Irvine, USA Ertan Ozturk Zonguldak Karaelmas University, Turkey Christian Poellabauer University of Notre Dame, USA Raj Rajkumar Carnegie Mellon University, USA Binoy Ravindran Virginia Tech, USA John Regehr University of Utah, USA Shangping Ren Illinois Institute of Technology, USA Ayad Salhieh Jordan University of Science and Technology, Jordan Shivakumar Sastry University of Akron, USA Sahra Sedigh University of Missouri - Rolla, USA Sudhanshu K. Semwal University of Colorado at Colorado Springs, USA Lui Sha University of Illinois at Urbana-Champaign, USA Li Shang Queen's University, Canada Zili Shao Hong Kong Polytechnic University, Hong Kong Haiying Shen University of Arkansas, USA Michael Sheng University of Adelaide, Australia Weisong Shi Wayne State University, USA Yuanchun Shi Tsinghua University, China Daniel Shih National Taiwan University, Taiwan Timothy Shih Tamkang University, Taiwan Dongkun Shin SungKyunKwan University, Korea Sang Son University of Virginia, USA Jack Stankovic University of Virginia, USA

Page 11: Euc Program

Robert James Steele University of Technology, Sydney, Australia Limin Sun Chinese Academy of Sciences, China Niranjan Suri Institute of Human and Machine Cognition, USA Yasuyuki Tahara National Institute of Informatics, Japan David Tanier Monash University, Australia Xueyan Tang Nanyang Technological University, Singapore Xianping Tao Nanjing University, China Yong Meng Teo National University of Singapore, Singapore Georgios K. Theodoropoulos

University of Birmingham, UK

Lothar Thiele ETH Zurich, Switzerland CY Tsui Hong Kong University of Science and Technology, HK Hiroyuki Tomiyama Nagoya University, Japan Fabris Valois INSA, Lyon, France Nalini Venkatasubramanian

University of California at Irvine, USA

Jan Vitek Purdue University, USA Andy Wang Florida State University, USA Cho-Li Wang University of Hong Kong, Hong Kong Shige Wang General Motors, USA Tzone-I Wang National Cheng Kung University, Taiwan Xiaorui Wang University of Tennessee, USA Jianbin Wei Yahoo, USA Weigang Wu Sun Yat-Sen University, China Bin Xiao Hong Kong Polytec University, Hong Kong Nong Xiao National University of Defense Technology, China Guoliang Xing City University of Hong Kong, Hong Kong Lizhen Xu Southeast University, China Jianliang Xu Hong Kong Baptist Univ., Hong Kong Ming Xu National University of Defense and Technology, China Yun Yang Swinburne University of Technology, Australia Hiroyuki Yomo Aalborg University, Denmark Chuck Yoo Korea University, Korea Moustafa Youssef University of Maryland College Park, USA Bo Yu Wayne State University, USA Zhiwen Yu Kyoto University, Japan

Page 12: Euc Program

Qing-An Zeng University of Cincinnati, USA Daqing Zhang National Institute of Telecommunications, France Liqiang Zhang Indian University South Bend, USA Wei Zhang Southern Illinois University, USA Wensheng Zhang Iowa State University, USA Lin Zhong Rice University, USA Xiliang Zhong Microsoft, USA Wanlei Zhou Deakin University, Australia Dakai Zhu University of Texas, San Antonio, USA Yongxin Zhu Shanghai Jiao Tong University, China

Sourav Bhowmick Nanyang Technological University, Singapore Manoranjan Dash Nanyang Technological University, Singapore Yuhong Feng Hong Kong Polytechnic University, Hong Kong Jiayu Gong Wayne State University, USA Jia Rao Wayne State University, USA Aixin Sun Nanyang Technological University, Singapore Muzhou Xiong Nanyang Technological University, Singapore

Additional Reviewers

Page 13: Euc Program

General Chair

Prof. Minyi Guo

Department of Computer Science and Engineering, Shanghai Jiao Tong University, China

Professor Minyi Guo received his Ph.D. degree in computer science from University of Tsukuba, Japan. Before 2000, Dr. Guo had been a research scientist of NEC Corp., Japan. He is now a full professor at the Department of Computer Software, The University of Aizu, Japan, from 2000 to 2005. During this period, he was also a visiting professor of Georgia State University, USA, Hong Kong Polytechnic University, University of Hong Kong, National Sun Yet-sen University in Taiwan, China, University of Waterloo, Canada and University of New South Wales, Australia. He is also a professor of Shanghai Jiao Tong University and Nanjing University, China.

Dr. Guo has published more than 120 research papers in international journals and conferences. Dr. Guo has served as general chair, program committee or organizing committee chair for many international conferences. He is the founder of International Conference on Parallel and Distributed Processing and Applications (ISPA), and International Conference on Embedded and Ubiquitous Computing (EUC). He is the editor-in-chief of the Journal of Embedded Systems. He is also in editorial board of Journal of Pervasive Computing and Communications, International Journal of High Performance Computing and Networking, Journal of Embedded Computing, Journal of Parallel and Distributed Scientific and Engineering Computing, and International Journal of Computer and Applications.

Dr. Guo's research interests include parallel and distributed processing, parallelizing compilers, Pervasive Computing, Embedded Software Optimization, molecular computing and software engineering. He is a member of the ACM, IEEE, IEEE Computer Society, and IEICE.

Page 14: Euc Program

Program Chair

Prof. Cheng-Zhong Xu

Department of Electrical and Computer Engineering, Wayne State University, USA

Cheng-Zhong Xu is a professor in the Department of Electrical and Computer Engineering of Wayne State University. He is also the director of the Center for Networked Computing Systems at WSU. His research interest includes networked computing systems and applications, in particular scalable and secure Internet services and architecture, scheduling and resource management in distributed, parallel, and embedded systems, and autonomic systems management for highly reliable computing. He has published more than 140 peer-reviewed scientific papers in archival journals and conferences in these areas. He is the author of "Scalable and Secure Internet Services and Architecture" (Chapman & Hall/CRC Press, 2005) and the leading co-author of "Load Balancing in Parallel Computers: Theory and Practice" (Kluwer Academic, 1996). Dr. Xu serves on the editorial boards of IEEE Transactions on Parallel and Distributed Systems, J. of Parallel and Distributed Computing, J. of Parallel, Emergent, and Distributed Systems, J. of Computers and Applications, and J. of High Performance Computing and Networking. He has also guest edited special issues for several other journals on network services and security in distributed systems. He has served a number of international conferences and workshops in various capacities as program chair, general chair, and plenary speaker. He was a recipient of “President's Award for Excellence in Teaching” of WSU in 2002 and “Career Development Chair Award” in 2003. Dr. Xu received the BS and MS degrees from Nanjing University in 1986 and 1989, respectively, and the Ph.D. degree from the University of Hong Kong in 1993. He is a senior member of IEEE.

Page 15: Euc Program

Keynote Speaker

Prof. Yaoxue Zhang Department of Higher Education, Ministry of Education, China

The Challenges and Opportunities in Transparent

Computing

Abstract: In this talk, we present some new research results about our Transparent Computing which is a new computing paradigm for service sharing. Rapid development in computer networks let people easily share the hardware and software resources, however, because the slow progress in Operating system technologies and few changes in computer architectures in several decades, it is still not easy to share services from different software and hardware platforms for users.

Transparent Computing paradigm separates the storages and executions of software programs and data including what of operating systems in different computers connecting with communication networks. In this paradigm, data and programs are stored in the storage servers and they are executed in either clients or execution servers according to the required services, respectively. We propose a new mechanism called Meta OS to manage this separation. This mechanism extends the Neumann architecture special-temporally, so that a sequentially virtual computing can be effectively obtained and the individual service sharing can be easily performed underlying different Operating System platforms.

We will introduce the idea, the mechanism and algorithms of proposed Meta OS for

Page 16: Euc Program

the separation of the programs and data including what of Operating Systems. Moreover, we also present some examples about the applications of this computing paradigm.  Biography

Prof. Zhang Yaoxue was born in Li County, Hunan province, China, in 1956. He graduated from Northwest Institute of Telecommunication Engineering, China, obtained his Ph.D degree in computer networking from Tohoku University, Japan in 1989. One year later, he joined Department of Computer Science, Tsinghua University, China. He was a visiting professor of Massachusetts Institute of Technology (MIT) and University of Aizu, in 1995 and 1998, respectively. He served as the President of China Central Radio & TV University from Nov. 2001 to Jun. 2006. Currently, Prof. Zhang is a fellow of the Chinese Academy of Engineering, a professor in computer science and technology in Tsinghua University, and the Director General for Higher Education of Ministry of Education, China. He is also a member of the Expert Committee on Military Computer and Software Technology of PLA General Armament Department, of the Advisory Committee on State Informatization, and of Technical Committee on Ubiquitous/Pervasive Computing of China Computer Federation. Additionally, he serves as an editorial board member of 4 international journals: International Journal of Wireless and Mobile Computing, Journal of Autonomic and Trusted Computing, Chinese Journal of Electronics and Chinese Journal of Computer.

Prof. Zhang's major research areas include computer networking, operating systems, and ubiquitous/pervasive computing. He has led many national and international research, international collaboration and industrialization projects. Because of his distinguished contributions, Prof. Zhang has won the National Award for Scientific and Technological Progress (2nd class) twice in 1998 and 2001, and National Award for Technological Invention (2nd class) in 2004, as well as 5 provincial or ministerial awards. He is a winner of the Prize of HLHL (Hong Kong) Foundation for Scientific and Technological Progress in 2005. He has filed 16 Chinese patents and 3 American patents as the first inventor, of which 13 have been granted. Accordingly, he won the Top Patent Award of China in 2006. Prof. Zhang has published over 170 technical papers in international journals and conferences, as well as 8 monographs and textbooks. He received the IEEE Best Paper Award in the 21st IEEE AINA International Conference in 2007.

Page 17: Euc Program

Recently, Prof. Zhang's research mainly focuses on Transparent Computing and Active Services. Transparent Computing is a computing paradigm to solve the problem of how to access different operating systems and applications on one terminal platform through networks, and how to run an operating system and applications on different terminal platforms. Active Services is a new approach to evolve current programs and services according to user requirements to provide personalized and comprehensive network services.

Page 18: Euc Program

Keynote Speaker

Prof. Xiaodong Zhang Department of Computer Science and Engineering, The Ohio State University, USA

Research issues and Challenges to Advance System

Software for Multicore Processors and Data-intensive

Applications

Abstract: Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of "memory wall" has been shifted to "disk wall" that is a serious bottleneck for many data-intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems.

We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching

Page 19: Euc Program

capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit "sequential locality" -- for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.  Biography

Xiaodong Zhang is the Robert M. Critchfield Professor in Engineering, and Chairman of the Department of Computer Science and Engineering at the Ohio State University.

His research interests cover a wide spectrum in the areas of high performance and distributed systems. Several technical innovations and research results from his team have been adopted or being developed in commercial products and open source systems with direct impact to some key computing operations, including the permutation memory interleaving technique first in the Sun MicroSystems' UltraSPARC IIIi processor and then in the Sun's dual-core Gemini Processor, the token thrashing protection mechanism and the Clock-Pro page replacement algorithm for memory management in the Linux Kernel and NetBSD.

Xiaodong Zhang was the Director of Advanced Computational Research Program at the National Science Foundation, 2001-2004. He is the associate Editor-in-Chief of IEEE Transactions on Parallel and Distributed Systems, and is also serving on the Editorial Boards of IEEE Transactions on Computers, IEEE Micro, and Journal of Parallel and Distributed Computing.

He received his Ph.D. in Computer Science from University of Colorado at Boulder.  

Page 20: Euc Program

Keynote Speaker

Associate Prof. Tarek Abdelzaher

Department of Computer Science, University of Illinois at Urbana Champaign, USA

Research Challenges in Distributed

Cyber-Physical Systems

Abstract: Moore's law, automation considerations, and the pervasive need for timely information lead to a next generation of distributed systems that are open, highly interconnected, and deeply embedded in the physical world. Such systems, called cyber-physical, were recently named the first research priority in networking and information technology in the US by the nation's presidential council of advisors on science and technology. They offer new research challenges that stem from openness, scale, and tight coupling between computation, communication, and distributed interaction with both physical and social contexts. Growing challenges span a large spectrum ranging from new models of computation for systems that live in physical and social spaces, to the enforcement of reliable, predictable, and timely end-to-end behavior in the face of high interactive complexity, increased uncertainty and imperfect implementation. This talk discusses the top challenges in cyber-physical systems and conjectures on research directions of increasing interest in this realm.

Biography

Tarek Abdelzaher received his B.Sc. and M.Sc. degrees in Electrical and Computer

Page 21: Euc Program

Engineering from Ain Shams University, Cairo, Egypt, in 1990 and 1994 respectively. He received his Ph.D. from the University of Michigan in 1999 on Quality of Service Adaptation in Real-Time Systems. He has been an Assistant Professor at the University of Virginia, where he founded the Software Predictability Group until 2005. He is currently an Associate Professor at the Department of Computer Science, the University of Illinois at Urbana Champaign. He has authored/coauthored more than 100 refereed publications in real-time computing, distributed systems, sensor networks, and control. He is Editor-in-Chief of the Journal of Real-Time Systems, an Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, the ACM Transaction on Sensor Networks, and the Ad Hoc Networks Journal, as well as Editor of ACM SIGBED Review. He was Program Chair of RTAS 2004 and RTSS 2006, and General Chair of RTAS 2005, IPSN 2007, RTSS 2007, DCoSS 2008 and Sensys 2008. Abdelzaher's research interests lie broadly in understanding and controlling the temporal properties of software systems in the face of increasing complexity, distribution, and degree of embedding in an external physical environment. Tarek Abdelzaher is a member of IEEE and ACM.

Page 22: Euc Program

EUC 2008 conference place: Courtyard by Marriott Shanghai-Pudong Address of conference place: 838 Dong Fang Road, Pudong District, Shanghai, China

There are two airports in Shanghai, Pudong International Airport(PVG) and Hongqiao International Airport(SHA), and there are two railway stations in Shanghai, Shanghai Railway Station and Shanghai South Railway Station. Our hotel is at the crossing of Dong Fang Road and Wei Fang Road. The usual traffic direction is followed. 1. From Shanghai Pudong International Airport(PVG)

Taxi only

The Map of EUC 2008 Conference Place

Access Guide to EUC 2008 Conference Place

Page 23: Euc Program

A20 (Outside Circle) --- turn right onto Luo Shan Road --- turn left onto Hua Mu Road --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 40 minutes to the hotel. Estimated taxi fare: 120 RMB (one way, if traffic condition is fine)

Maglev Train and Subway Line No.2 Take Maglev Train from Pudong International Airport to Longyang Road Subway Station, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 60 RMB for Subway line No.2 and economy Maglev Train, 110 RMB for Subway line No.2 and VIP Maglev Train.

Airport bus Line No.3 and Subway Line No.2 Take Airport bus Line No.3 from Pudong International Airport to Longyang Road Subway Station, then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference place on foot, which takes around 5 minutes. Totally about 25 RMB is needed.

Airport bus Line No.5 and Taxi Take Airport bus Line No.5 from Pudong International Airport to Oriental hospital, then take a taxi to the hotel. Totally about 35 RMB is needed.

2. From Hongqiao International Airport(SHA) Taxi only

Yan An Road Elevated High Way --- to Yan An East Road Tunnel --- to Shi Ji Da Dao (Century Blvd) --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 30 minutes to the hotel. Estimated taxi fare: 70 RMB (one way,if traffic condition is fine)

Bus No. 925A and Subway Line 2 Take Bus No. 925A from Hongqiao International Airport to People's Square, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 8 RMB is needed.

3. From Shanghai Railway Station or Shanghai South Railway Station Subway Line No.1 and No.2

Take Subway Line No.1 from either Railway Station to People's Square Station, and then interchanges to Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 5~7 RMB is needed.

Page 24: Euc Program

Location of Conference Rooms

Page 25: Euc Program

We will hold a Pujiang cruise to welcome the EUC 2008 attendee from all over the world. Pujiang cruise is the classical aquatic travel program, it’s not only because that the Huangpu River is the mother river of Shanghai, and the representative and reduction of Shanghai, but also the two sides of the river gather the famous sights of Shanghai city, such as the Eastern pearl broadcasts the television tower, Bund's Wan Guo reads extensively the group. Boarding on the boat, with delicious buffet, you can feel the honorable position and the long history of the bund; also you can step on the top deck, listen to the pulse and rhythm of Pudong times. You will understand "the scene of dazzling fireworks and lanterns lively district" ideal condition.

Reception time: 19:00 ~21:00 on Dec.18, 2008 Reception place: Pujiang Cruise ship

Banquet time: 18:30~21:30 on Dec.19, 2008 Banquet place: Grand Ballroom at Courtyard by Marriott Shanghai-Pudong

Lunch place: Spices Café at Courtyard by Marriott Shanghai-Pudong

Reception and Pujiang Cruise

Banquet

Lunch

Page 26: Euc Program

The Bund "The Bund" is a long, storied road in Shanghai. The Bund has been considered a historic symbol of Shanghai for over one hundred years. It is a source of great pride to the Shanghai people, as it shows the world Shanghai's culture and its capability to synchronize and meld its local culture with civilizations abroad. The Bund faces Shanghai's mother river, the Huangpu River. Behind the Bund are old buildings representing architectural styles from different countries. The unique geography around the Bund and that geography's effect on the economy of Shanghai and China throughout the past one hundred years fills the Bund with cultural connotation and undertones. The river, the long bank, the green belt and the different architectural styles of the buildings on the Bund is the most "Shanghai-like" sight in Shanghai. In the morning, the Bund is a popular place for jogging and workouts. It is a charming sight for tourists in the daytime and it becomes lovers' lane at night!

Chenyi Square At the end of the 10-mile Nanjing Road is Chenyi Square, dominated by a sculpture of Chenyi-the first Shanghai mayor of the People's Republic of China. The sculpture is made of bronze and stands 5.6 meters high with a red granite underlay 3.5 meters high. Every weekend, a grand "Square Concert" is held in front of the sculpture.

To the south of the sculpture is a popular fountain. Many colored lamps are set under the water of the fountain, and these lamps are turned on at night. The beautiful colored water streams created by the lamps are a great sight to see in Chenyi Square at night.

Sightseeing Tunnel The Bund's Tunnel stretches from the end of Nanjing Road on the Puxi side to the Oriental Pearl TV Tower on the Lujiazui side - a total length of 646.70 meters. This

Tour guide

Page 27: Euc Program

tunnel was finished at the end of 2000; it was the first pedestrian tunnel built in China. Tourists may enter the tunnel through an elevator at the entrance on either side. It takes about two to five minutes to walk the length of the tunnel. Many high-tech displays are featured inside. All kinds of designs, ads, panoramic displays and background music about people, history, culture and technology are displayed throughout the tunnel, making your visit there both interesting and thrilling.

Xujiahui Xujiahui is one of the most prosperous business centers, with many famous mansions and shopping centers. The history of the district dates back to Ming Dynasty. A famous scientist Xu Guangqi, the Secretary of the Grand Council, had been buried here. Some of his descendants had multiplied and lived here, so it was first named "Xujia Village" and then gradually developed into town. The name "Xujiahui" was from the fact that Xu Guangqi built a cottage at the joint of the two rivers of Zhaojiabang and Lihongjing. In March 1957, Changshu and Xuhui districts were amalgamated into the new Xuhui District.

Lujiazui Financial Center The Lujiazui Financial Center is located in the Pudong district of Shanghai. The famous buildings in this area include:

The Oriental Pearl TV Tower, which is surrounded by the Yangpu Bridge in the northeast and the Nanpu Bridge in the southwest, creating a picture of 'twin dragons playing with pearls'. The tower with 468 meters high (1,536 feet) is the world's third tallest TV and radio tower surpassed in height only by towers in Toronto, Canada and Moscow, Russia.

Shanghai International Conference Center, which is located to the northwest of Oriental Pearl TV Tower, along Riverside Boulevard, opposite to the Bund. The conference center covers an area of 45 thousand square meters, with modern conference halls, two multi-functional halls (around 4300 square meters), one international conference hall of press center (around 2500 square meters) and two conference halls that can hold 200 people.

Page 28: Euc Program

 EUC Main Conference 

   

  Thursday, 18 December, 2008     Opening Remark    08:30  –  09:00am,  Grand  Ballroom    Keynote Speech I: The Challenges and Opportunities in Transparent Computing  Yaoxue Zhang (Tsinghua University)    09:00  –  10:00am,  Grand  Ballroom    Coffee Break (10:00 – 10:30am)   

   EUC‐1A: Hardware/Software Co‐Design I  10:30  –  12:10pm,  Function  Room  4&5 Session Chair: Meikang Qiu, University of New Orleans, USA   A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications 

Archana Kalyansundar, Rita Chattopadhyay

Siemens Corporate Technology India, India  Advanced Optimization and Design Issues of a 32‐Bit Embedded  Processor Based on Produced Order Queue Computation Model

Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda

Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan  A Low‐Cost Embedded Controller for Complex Control Systems Zhe Peng, Longhua Ma, Feng Xia

State Key Lab of Industrial Control Technology, Zhejiang University, China  Single Instruction Dual‐Execution Model Processor Architecture  Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda

Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan

   EUC‐1B: Sensor Networks I  10:30 – 12:10pm, Function Room 7 Session Chair: Jinde Chen, Saitama University, Japan   Analysis of Data Delivery Delay in Acoustic Sensor Networks  Chao Wang ,Yan Sun, Huadong Ma

Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, China 

Page 29: Euc Program

 A Collaboration‐based Storage Management Scheme in Multimedia Sensor Networks Yunpei Yan1, Guihai Chen1, Sajal Das2

1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Engineering, University of Texas at Arlington, USA

 An Integrated Deployment Tool for ZigBee‐Based Wireless Sensor Networks Yu-Kai Huang1, Pi-Cheng Hsiu1, Wei-Ni Chu1, Kuan-Chang Hung1, Ai-Chun Pang1, Tei-Wei Kuo1, Min

Di2, Hua-Wei Fang2

1Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 2Networks and Multimedia Institute, Institute for Information Industry, Taiwan

 Cooperative Node Localization for Mobile Sensor Networks  Hongyang Chen1, Marcelo H. T. Martins1, Pei Huang2, Hing Cheung So3, Kaoru Sezaki1

1University of Tokyo, Japan 2Michigan State University, USA 3City University of Hong Kong, Hong Kong    

Lunch ( 12:10 – 13:30pm)   

   Keynote Speech II: Research Challenges in Distributed Cyber‐Physical Systems  Tarek Abdelzaher  (University of  Illinois at Urbana Champaign)   

13:30  –  14:30pm,  Grand  Ballroom

    Coffee Break (14:30 – 15:00pm)   

   EUC‐2A: Real‐time and Cyber‐Physical Systems 15:00  –  16:40pm,  Function  Room  4&5 Session Chair: Hui Guo, University of New South Wales, New Zealand

 A Systematic Framework for Structured Object‐Oriented Security Requirements Analysis in Embedded Systems 

Sojan Markose, Xiaoqing (Frank) Liu, Bruce McMillin

Computer Science Department, Missouri University of Science and Technology, USA  Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors  Shinpei Kato, Nobuyuki Yamasaki

Department of Information and Computer Science, Keio University, Japan  Robust Feedback Control Scheduling in Distributed Embedded Real‐Time Systems

Bing Du1, Chun Ruan2

1School of Electrical and Information Engineering, The University of Sydney, Australia 2School of Computing and Mathematics, University of Western Sydney, Australia

Page 30: Euc Program

 RT‐P2P: A Scalable Real‐Time Peer‐to‐Peer System with Probabilistic Timing Assurances 

Fei Huang1, Binoy Ravindran1, E. D. Jensen2

1Department of Electrical & Computer Engineering, Virginia Tech, USA 2The MITRE Corporation, USA

 EUC‐2B: Multimedia and Data Management I  15:00  –  16:40pm,  Function  Room  7 Session Chair: Huan Li, Beihang University, China     UMDD: User Model Driven Software Development  Xiaochun Wang1,2, Yuanchun Shi1

1Department of Computer Science and Technology, Tsinghua University, China 2GGV Sub-station, Postdoctoral Workstation of Zhongguancun Haidian Garden, China

 A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test  Ashraf Armoush, Falk Salewski, Stefan Kowalewski

Embedded Software Laboratory, RWTH Aachen University, Germany  Data Management for Context‐Aware Computing

Wenwei Xue1, Hungkeng Pung1, Wenlong Ng1, Tao Gu2

1School of Computing, National University of Singapore, Singapore 2Institute for Infocomm Research, Singapore

 Efficient Data Scheduling for Multi‐item Queries in On‐Demand Broadcast 

Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin

School of Computer Science, Fudan University, China    

 

 

 

 

 

 

 

 

 

 

Page 31: Euc Program

  Friday, 19 December, 2008     Keynote Speech III: Research Issues and Challenges to Advance System Software  Xiaodong Zhang (Ohio State University)    09:00  –  10:00am,  Grand  Ballroom    Coffee Break (10:00 – 10:30am)   

   EUC‐3A: Embedded SW Optimization I  10:30  –  12:10pm,  Function  Room  4&5 Session Chair: Tarek Abdelzaher, University of Illinois at Urbana, USA   An Improved EMD Embedding Scheme Based on Secret Image Difference  Chin-Chen Chang1, Chin-Feng Lee2, Yi-Ren Wang3

1Department of Information Engineering and Computer Science Management, Feng Chia University, Taiwan 2Department of Information Management, Chaoyang University of Technology, Taiwan 3Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan

 A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems Lei Sun, Tatsuo Nakajima

Department of Computer Science, Waseda University, Japan  SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima

Department of Computer Science, Waseda University, Japan  Optimizing the Embedded Caching and Prefetching Software on a Network‐Attached Storage System 

Shih-Hao Hung1,2, Chien-Cheng Wu1, Chia-Heng Tu2

1Graduate Institute of Networking and Multimedia; 2Department of Computer Science and Information Engineering National Taiwan University, Taiwan

   EUC‐3B: Wireless Networks I  10:30  –  12:10pm,  Function  Room  7 Session Chair: Hongyang Chen, University of Tokyo, Japan     Fuzzy Self‐Clustering for Wireless Sensor Networks  Yahya M. Tashtoush, Mohammed A. Okour

The Department of Computer Science, Jordan University of Science and Technology, Jordan  Secure Authentication in Wireless Sensor Networks Using RF Fingerprints D. A. Knox, T. Kunz

Department of Systems and Computer Engineering, Carleton University, Canada

Page 32: Euc Program

 Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc Networks

Romeo Said, Yves Mahéo

Valoria, Université Européenne de Bretagne, France  A Scenario‐based Directional Communication Performance in Wireless Ad hoc Networks

Murad Khalid1, In-ho Ra2, Young-hoon Joo2, Ravi Sankar1

1Department of Electrical Engineering, University of South Florida, USA 2School of Electronic and Information Engineering, Kunsan National University, Korea     Lunch (12:10 – 13:30pm)   

   EUC‐4A: Network Protocols I  13:30  –  15:10pm,  Function  Room  4&5 Session Chair: Jun Yang, University of Pittsburgh, USA   Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application  Dejia Shi1, Weijin Jiang1,2, 3, Danping Xu3

1School of Computer and Electronic Engineering, Hunan University of Commerce, China 2School of Computer, Wuhan University of Technology, China 3The College of Information Engineering, Xiangtan University, China

 Countering DDoS and XDoS Attacks against Web Services  Xinfeng Ye

Department of Computer Science, Auckland University, New Zealand  Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2‐D Mesh Network on Chip Xiao Canwen, Zhang Minxuan, Dou Yong, Zhao Zhitong

School of Computer Science, National University of Defense Technology, China  A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks Ze Li, Haiying Shen

Department of Computer Science and Computer Engineering, University of Arkansas, USA

   EUC‐4B: Power‐aware Computing  13:30  –  15:10pm,  Function  Room  7 Session Chair: Jingling Xue, University of New South Wales, Australia   Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment  Meikang Qiu1, Jiande Wu1, Jingtong Hu2, Yi He2, Edwin H.-M. Sha2

1Department of Electrical Engineering, University of New Orleans, USA 2Department of Computer Science, University of Texas at Dallas, USA 

Page 33: Euc Program

 A Low Power Error Detection Technique for Floating‐Point Units in Embedded Applications Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi

Dependable System Laboratory, Sharif University of Technology, Iran  A Generalized Framework for System‐Wide Energy Savings in Hard Real‐Time Embedded Systems

Gang Zeng1, Hiroyuki Tomiyama11, Hiroaki Takada1, Tohru Ishihara2

1Graduate School of Information Science, Nagoya University, Japan 2System LSI Research Center, Kyushu University, Japan

 Application Specific Low Power ALU Design  Yu Zhou, Hui Guo

School of Computer Science & Engineering, University of New South Wales, Australia     Coffee Break (15:10 – 15:30pm)   

   EUC‐5A: Hardware/Software Co‐Design II  15:30  –  17:10pm,  Function  Room  4&5 Session Chair: Wei Zhang, Southern Illinois University , USA     Hardware Support for Efficient Sparse Matrix Vector Multiplication  Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue

School of Computer Science and Engineering, University of New South Wales, Australia  Accelerating Montgomery Modulo Multiplication for Redundant Radix‐64k Number System on the FPGA Using Dual‐Port Block RAMs

Koji Shigemoto, Kensuke Kawakami, Koji Nakano

Department of Information Engineering, Hiroshima University, Japan  A State‐Based Predictive Approach for Leakage Reduction of Functional Units

Linfeng Pan1, Minyi Guo1, Yanqin Yang1,2, Meng Wang2, Zili Shao2

1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2Department of Computing, Hong Kong Polytechnic University, Hong Kong 3Department of Computer Science and technology, East China Normal University, China

 Automatic Integration of Non‐Bus Hardware IP into SoC‐Platforms for Use by Software 

Robert Guenzel

Department of Integrated Circuit Design(E.I.S.), Technical University of Braunschweig, Germany

  

Page 34: Euc Program

 EUC‐5B: Context‐aware Computing  15:30  –  17:10pm,  Function  Room  7 Session Chair: Beihong Jin, Chinese Academy of Sciences, China     A Probabilistic Approach to Consistency Checking for Pervasive Context  Yu Huang1,2, Xiang Ma2, Xianping Tao1,2, Jiannong Cao3, Jian Lu1,2

1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Department of Computing, Hong Kong Polytechnic University, Hong Kong

 Human Universality in Ubiquitous Computing: Maslow, Where Are You?  Sebastien Duval1, Christian Hoareau2, Hiromichi Hashizume3

1National Institute of Informatics, Japan 2The Graduate University for Advanced Studies, Japan 3National Institute of Informatics, Japan

  Learning in Small and Large Ubiquitous Computing Environments 

Jorge Barbosa1, Rodrigo Hahn1, Débora N. F. Barbosa2, Cl´udio F. R. Geyer3

1PIPCA/Unisinos, São Leopoldo – RS – Brazil 2UniLasalle, Canoas – RS – Brazil 3UFRGS, Porto Alegre – RS – Brazil

 Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing 

Jingde Cheng

Department of Information and Computer Sciences, Saitama University, Japan    

 

 

 

 

 

 

 

 

 

Page 35: Euc Program

  Saturday, 20 December, 2008     EUC‐6A: Sensor Networks II  08:30  –  10:10am,  Function  Room  4&5 Session Chair: Haiying Shen, University of Arkansas, USA     Adaptive Buffer Management for Efficient Code Dissemination in Multi‐Application Wireless Sensor Networks 

Weijia Li1, Yu Du1, Youtao Zhang1, Bruce Childers1, Ping Zhou2, Jun Yang2

1Computer Science Department, University of Pittsburgh, USA 2Electric and Computer Engineering Department, University of Pittsburgh, USA

 Quorum‐Based Energy Saving MAC Protocol Design for Wireless Sensor Networks Chih-Min Chao, Yi-Wei Lee

Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan  An Energy‐Efficient Waiting Caching Algorithm in Wireless Sensor Networks Junfeng Xu, Keqiu Li, YanMing Shen, Jian Liu

Department of Computer Science and Engineering, Dalian University of Technology, China  A Grid‐Based Distributed Multi‐Hop Routing Protocol for Wireless Sensor Networks  Wenjun Liu1, Yue Sun1, Jiguo Yu2, Baoxiang Cao2

1City College, Wenzhou University, China 2School of Computer Science, Qufu Normal University, China    

 EUC‐6B: Multi‐Agent Systems  08:30  –  10:10am,  Function  Room  7 Session Chair: Xinfeng Ye, Auckland University, New Zealand   Dynamic Substitutability Analysis of Web Service Composition via Extended π‐Calculus  Jin-dian Su1, Shan-shan Yu2, He-qing Guo1

1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China

 Efficient Self‐Healing Key Distribution with Limited Group Membership for Communication‐Constrained Networks

Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang

School of Computer Science, Fudan University, China  An Empirical Study on Interoperability between Service Discovery Protocols  Beihong Jin, Zhi Zang, Liang Zhang

Institute of Software, Chinese Academy of Sciences, China  A Reasonable Approach for Defining Load Index in Parallel Computing  Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng

Computer Science and Engineering Department, Shanghai Jiao Tong University, China

Page 36: Euc Program

Coffee Break (10:10 – 10:30am)   

   EUC‐7A: Middleware and Peer‐to‐Peer  10:30  –  12:10pm,  Function  Room  4&5 Session Chair: Xiaobo Zhou, University of Colorado, USA      Load Balancing in Peer‐to‐Peer Networks Based on Sampling System States  Hung-Chang Hsiao, I-Ta Lin, Hao Liao

Department of Computer Science and Information Engineering, National Cheng-Kung University, Taiwan  The Effect of Routing‐Load Dispersion on Congestion Control in Structured P2P Networks  Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu

Department of Computer Science, Nankai University, China  AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication  Liang Zhang1, Beihong Jin1, Jiannong Cao2

1Technology Center of Software Engineering, Institute of Software, China 2Department of Computing, The Hong Kong Polytechnic University, Hong Kong

 A Self‐configuring Personal Agent Platform for Pervasive Computing Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu

Department of Computing, Hong Kong Polytechnic University, Hong Kong

   EUC‐7B: Embedded Software Optimization II  10:30  –  12:10pm,  Function  Room  7 Session Chair: Tei‐Wei Kuo, National Taiwan University   A Light Lock Management Mechanism for Optimizing Real‐Time and Non‐Real‐Time Performance in Embedded Linux 

Maobing Dai1, Toshihiro Matsui2, Yutaka Ishikawa3

1Graduate School of Information Science and Technology, The University of Tokyo, Japan 2National Institute of Advanced Industrial Science and Technology, Japan 3Yutaka Ishikawa Graduate School of Information Science and Technology, The University of Tokyo, Japan 

 Design and Optimization of a Java Ahead‐of‐Time Compiler for Embedded Systems Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae

School of Electrical Engineering and Computer Science, Seoul National University, Korea  Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller Chantana Phongpensri, K. Sripanomwan

Department of Computing, Faculty of Science, Silpakorn University, Thailand

Page 37: Euc Program

 Control‐Flow Checking Using Branch Instructions  Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali

Dependable System Laboratory, Sharif University of Technology, Iran     Lunch (12:10 – 13:30pm)   

   EUC‐8A: Wireless Networks II  13:30  –  15:10pm,  Function  Room  4&5 Session Chair: Guihai Chen, Nanjing University, China     RADAR: Rate‐Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi‐Rate Wireless Networks 

Liqiang Zhang1, Yu-Jen Cheng1, Xiaobo Zhou2

1Department of Computer & Information Sciences, Indiana University South Bend, USA 2Department of Computer Science, University of Colorado at Colorado Springs, USA

 A Hybrid Anti‐Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption 

Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu

School of Microelectronics, Shanghai Jiao Tong University, China  Rule‐Based WiFi Localization Methods  Qiuxia Chen1, Dik-Lun Lee1, Wang-Chien Lee2

1Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong 2Computer Science and Engineering, The Pennsylvania State University, University Park, USA

 Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks 

Yuanyuan Zhang1, Dawu Gu1,2, Bart Preneel2

1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2ESAT-COSIC, Katholieke Universiteit Leuven (KUL), Belgium

   EUC‐8B: Real‐Time and Cyber‐Physical Systems II  13:30 – 15:10pm, Function Room 7 Session Chair: Wenbin Jiang, Huazhong University of Science and Technology, China     Performance Comparison of Techniques on Static Path Analysis of WCET Mingsong Lv1, Zonghua Gu2, Nan Guan1, Qingxu Deng1, Ge Yu1

1Northeastern University, China 2Hong Kong University of Science and Technology, Hong Kong

  Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway  Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato

Department of Information Systems Design, Doshisha University, Japan

Page 38: Euc Program

 TRAcME: Temporal Activity Recognition Using Mobile Phone Data  Driss Choujaa, Naranker Dulay

Department of Computing, Imperial College London, UK  Adaptive Drowsy Cache Control for Java Applications 

Sun Yu, Wei Zhang

Department of Electrical and Computer Engineering, Southern Illinois University, USA     Coffee Break (15:10 – 15:30pm)   

   EUC‐9A: Network Protocols II  15:30  –  16:50pm,  Function  Room  4&5 Session Chair: Hung‐Chang Hsiao, National Cheng‐Kung University, Taiwan     Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing 

Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi

Computer Engineering Department, Iran University of Science & Technology, Iran  Hierarchical Cluster‐Based Irregular Topology Customization for Networks‐on‐Chip Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng

Department of Electronic Engineering, Tsinghua University, China  Design and Analysis of a Stable Queue Control Scheme for the Internet Naixue Xiong1,2, Laurence T. Yang3, Yaoxue Zhang4, Yuezhi Zhou4, Yingshu Li2

1Department of Computer Science, Wuhan University of Science and Engineering, China 2Computer Science, Georgia State University, USA 3Department of Computer Science, St. Francis Xavier University, Canada 4Department of Computer Science & Technology, Tsinghua University, China

   EUC‐9B: Multimedia and Data Management II  15:30  –  16:50pm,  Function  Room  7 Session Chair: Meilin Liu, Wright State University, USA      Lossless Data Hiding Based on Histogram Modification for Image Authentication Chin-Chen Chang1,2, Wei-Liang Tai2, Kuo-Nan Chen2

1Department of Information Engineering and Computer Science, Feng Chia University, Taiwan 2Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan

 A New Proxy Scheme for Large‐Scale P2P VoD System  Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao

School of Computer Science and Technology, Huazhong University of Science and Technology, China

Page 39: Euc Program

 A Signature‐based Grid Index Design for RFID Main‐Memory Databases Rong-Jhang Liao1, Pei-Lun Suei1, Yung-Feng Lu1, Tei-Wei Kuo1,2, Chun-Sho Lee3

1Department of Computer Science and Information Engineering, National Taiwan University, Taiwan 2Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 3Innovative DigiTech-Enabled Application & Services Institute, Institute for Information Industry, Taiwan

 

 

 

 

 

 

 

 

 

 

Page 40: Euc Program

 EUC Workshops 

   

  The 1st IEEE/IFIP International Workshop on End‐User Virtualization (EUV’08)     Wednesday,  17  December,  2008

   

  Session 1                  Chair: Xiaofei Liao 09:00  –  10:30am,  Function  Room  3

  A Framework to Evaluate and Predict Performances in Virtual Machines Environment  Deshi Ye, Qinming He, Hua Chen, Jianhua Che

 College of Computer Science, Zhejiang University, China 

  Performance Measuring and Comparing of Virtual Machine Monitors  Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang

 College of Computer Science, Zhejiang University, China 

  An Optimized COW Block Device Driver in VMM for Fast, On‐Demand Software Deployment  Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang

 School of Computer, National University of Defense Technology, China 

  Analysis and Enhancement for Interactive‐Oriented Virtual Machine Scheduling  Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng

Microprocessor Research and Development Center, Peking University, China

 

Coffee Break (10:30 – 11:00am)      

  Session 2                  Chair: Xiaofei Liao 11:00  –  12:30pm,  Function  Room  3

  DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture  Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao

School of Computer, National University of Defense Technology, China

  A Novel Virtual Grid Experiment Method in MedImGrid  Ran Zheng, Xiaofei Liao, Hai Jin

Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, China

  VirtualCluster: Customizing the Cluster Environment through Virtual Machines  Kang Chen, Jun Xin, Weimin Zheng

Department of Computer Science and Technology, Tsinghua University, China

Page 41: Euc Program

  Session 2 (Continued)  Chair: Xiaofei Liao 11:00  –  12:30pm,  Function  Room  3

  Allocating Resource in Grid Workflow Based on State Prediction  Jiong Yu1,2, Guo-Zhong Tian1,3, Ling Cheng1,3

1School of Information Science and Engineering, Xinjiang University, China 2School of Computer Science and Technology, Beijing Institute of Technology, China 3Department of Computer Engineering, Xinjiang Polytechnic College, China

  Cooperative Problem Solving Process Based on MAS_NP Model  Yan-bin Peng1, Bei-shui Liao2, Ji Gao3, Jun Hu4, Cun-hao Wang3, Jie-Qing Ai3, Hang Guo3

1School of Information and Electronic Engineering, Zhejiang University of Science and Technology, China 2Center for the Study of Language and Cognition, Zhejiang University, China 3College of Computer Science, Zhejiang University, China 4College of Computer Science, Hunan University, China

 

 

Page 42: Euc Program

  The 3rd IEEE/IFIP International Workshop on Embedded Software Optimization (ESO’08)   Wednesday, 17 December, 2008

   

  Session 1                  Chair:  Meikang  Qiu 13:30  –  16:00pm,  Function  Room  3

  UCaS: A Schedulability Analysis Tool for AADL Models  Shenglin Gui1, Lei Luo1, Qian Liu2, Fulei Guo2, Shaopeng Lu2

1School of Computer Science and Engineering, University of Electronic Science and Technology of China 2Research & Development Center, Coretek Systems, China

  A GA‐based Systematic Message Scheduling Method for Time‐Triggered CAN  Shan Ding, Zhiqiang Xie, Xiaona Yin

College of Information Science and Engineering, Northeastern University, China

  Reducing Context Switch Overhead with Compiler‐Assisted Threading  Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö

Department of Computer Systems, Tampere University of Technology, Finland

 Research and Design of Shared Resources Competition Solution among Hardware‐Software Tasks based on Unified Scheduling 

Bing Guo1, Yan Shen2, Lei Zhang1, Xiang Zhou1

1School of Computer Science & Engineering, SiChuan University, China 2University of Electronic Science & Technology of China

  A Tiny Processing System for Education and Small Embedded Systems on the FPGAs  Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito

Department of Information Engineering, Hiroshima University, Japan

  Object Placement for Fully Associative Cache  Chun-Chieh Lin, Chuen-Liang Chen

Department of Computer Science and Information Engineering, National Taiwan University, Taiwan

 Evaluation  of  Partitioning Methods  for  Stream  Applications  on  a  Heterogeneous Multi‐core Processor Simulator 

Kai Zheng, Yongxin Zhu, Jun Xu

School of Microelectronics, Shanghai Jiao Tong University, China

 

Coffee Break (16:00 – 16:30pm)      

 

 

Page 43: Euc Program

  The 4th IEEE/IFIP International Symposium on Security for Ubiquitous Computing (SECUBIQ’08) 

  Wednesday, 17 December, 2008

   

  Session 1                  Chair:  Deqing  Zou 16:30  –  17:30pm,  Function  Room  3

  Simple Certificateless Signature with Smart Cards  Kazumasa Omote1, Atsuko Miyaji1, Kazuhiko Kato2

1School of Information Science, Japan Advanced Institute of Science and Technology (JAIST), Japan 2Department of Computer Science, Graduate School of ISE, University of Tsukuba, Japan

  Efficient ID‐based Threshold Ring Signature scheme  Jiang Han, Xu QiuLiang, Chen Guohua

School of Computer Science and Technology, Shan Dong University, China

  (In)Security of Efficient Tree‐Based Group Key Agreement Using Bilinear Map  Raphael C.-W. Phan1, Bok-Min Goi2

1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia

 

 

 

Page 44: Euc Program

  The 2nd IEEE/IFIP International Workshop on Ubiquitous Underwater Sensor Network (UUWSN’08) 

    Wednesday,  17  December,  2008

    Welcome speech  09:00  –  09:10am,  Function  Room  1&2   

  Session 1: Applications       Chair:  Dongwon  Jeong 09:10  –  10:30am,  Function  Room  1&2

 Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech Communication 

Hyung-jun Ju, Se-young Kim, Jung-woo Han, Ki-man Kim, Seok-yeb Kang

Department of Radio Communication Engineering, Korea Maritime University, Korea

  Research on the Encrypted Data Access Control of Multi‐purpose Asynchronous WSN  Qian Sun, Shanqing Guo, Qiuliang Xu

College of Computer Science and Technology, Shandong University, China

 ELM‐MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol 

Phil-Jung Yun, Changhwa Kim, Sangkyung Kim

Department of Computer Science & Engineering, Kangnung National University, Korea

  Omnet++ Based Simulation for Underwater Environment  Soo Young Shin, Soo Hyun Park

School of Business Information Technology, Kookmin University, Korea

 

Coffee Break (10:30 – 11:00am)     Keynote Speech: Revolution for the Water World: Underwater Wireless Networked Sensing   Jun‐Hong  Cui,  Department  of  Computer  Science & Engineering, University of Connecticut, USA 

11:00  –  12:30pm,  Function  Room  1&2

    Lunch (12:30 – 13:30pm)    

 Session 2: Protocols/Systems 

Chair: Young‐Sik Jeong  14:00  –  15:30pm,  Function  Room  1&2

 Point‐to‐Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks 

Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park

Department of Electrical Engineering, Kangnung National University, Korea

  Energy‐Efficient Routing Protocol in Underwater Acoustic Sensor Networks  Heungwoo Nam, Sunshin An

Department of Electronics Engineering, Korea University, Korea

Page 45: Euc Program

 Session 2: Protocols/Systems (Continued) 

Chair: Young‐Sik Jeong  14:00  –  15:30pm,  Function  Room  1&2

  Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks  Trong Hung Nguyen, Soo Young Shin, Soo Hyun Park

Graduate School of Business Information Technology, Kookmin University, Korea

  Scalable Uniformly‐Distributed Clustering Mechanism for Sensor Networks  Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim

Department of Computer Science & Engineering, Kangnung National University, Korea

 

Coffee Break (15:30 – 16:00pm)      

 

 

Page 46: Euc Program

  The IEEE/IFIP International Workshop on Ubiquitous Wireless Multihop Networking (UWMN’08) 

    Wednesday,  17  December,  2008

   

  Session 1  Chair:  Song  Guo 16:00  –  17:30pm,  Function  Room  1&2

  On‐Demand Deployment Algorithm for a Hybrid Sensor Network  Liang-Cheng Shiu1, Chao-Yang Lee2, Tian-Wen Song3,4, Chu-Sing Yang2

1Department of Information Technology, National Pingtung Institute of Commerce, Taiwan 2Department of Electrical Engineering, National Cheng Kung University, Taiwan 3Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 4Department of Applied Internet Science, Hsing Kuo University, Taiwan

  An Improved Design of the Ubiquitous Learning System Based on Sensor Networks  Mianxiong Dong1, Gongwei Zhang2, Kaoru Ota1,3, Song Guo1, Minyi Guo1,2

1School of Computer Science and Engineering, The University of Aizu, Japan 2Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 3Department of Computer Science, Oklahoma State University, USA

  A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols  Jiangwei Zhou, Boqin Feng, Gangqiang Wei

The School of Electronic and Information Engineering, Xi’an Jiaotong University, China

  Route Stability in Wireless Mesh Access Networks  Usman Ashraf, Slim Abdellatif, Guy Juanole

University of Toulouse, France

  A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network  Hao Xu, Dejun Mu

Institute of Controls and Networks, School of Automation, Northwestern Polytechnical University, China

 

 

Page 47: Euc Program

  The 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems (NCUS’08)    Wednesday,  17  December,  2008

   

  Session 1  Chair:  Jeffrey  Fan 09:00  –  10:30am,  Function  Room  7

  A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks  Tian-Wen Song1,2, Chu-Sing Yang3

1Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 2Department of Applied Internet Science, Hsing Kuo University, Taiwan 3Department of Electrical Engineering, National Cheng Kung University, Taiwan

  CayleyChord: A Novel P2P Overlay Network  Wenjun Xiao1, Mingxin He1,2, Wenhong Wei1

1Department of Computer Science, South China University of Technology, China 2Department of Computer Science, Jinan University, China

  Improving BitTorrent Network's Performance via Deploying Helpers    Ke Xu1, Yahui Yang2, Tao Chen1

1Department of Computer Science and Technology, Tsinghua University, China 2School of Software and Microelectronics, Peking University, China

  Adaptive Load Balancing for Lookups in Heterogeneous DHT  Zhi Chen, Guowei Huang, JingDong Xu, Yang Yang

Department of Computer Science, Nankai University, China

 The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks   

Simone Cintra Chagas1, Eber Huanca Cayo2, Koji Nakano3, Jacir Luiz Bordim4

1School of Electrical Engineering , Faculty of Technology, University of Brasília, Brazil 2School of Mechanic Engineering, Faculty of Technology, University of Brasília , Brazil 3Department of Information Engineering, School of Engineering, Hiroshima University , Japan 4Department of Computer Science , Campus Universitario - Asa Norte, University of Brasília, Brazil

 

Coffee Break (10:30 – 11:00am)   

   

  Session 2  Chair:  Huan  Li 11:00  –  12:30pm,  Function  Room  7

  The Analysis and Simulation of a Hybrid Video Broadcast Architecture  He Lei, Ma Xiangjie, Zhang Weili, Guo Yunfer, Ma Hailong

China National Digital Switching System Engineering and Technology Research Center (NDSC)

Page 48: Euc Program

  Session 2 (Continued)  Chair:  Huan  Li 11:00  –  12:30pm,  Function  Room  7

  On the Impact of DoS Attacks on Secure Service Discovery  Slim Trabelsi1, Guillaume Urvoy-Keller2, Yves Roudier2

1SAP Labs France, France; 2Institute Eurecom, France

  MAC Layer Misbehavior on Ad Hoc Networks  Nicole R. Nagel1, Ruzbeh Shokranian1, Jacir L. Bordim1, K. Nakano2

1Department of Computer Science, University of Brasilia, Brazil 2Department of Information Engineering, School of Engineering, Hiroshima University, Japan

 CSON‐D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking 

Dineshbalu Balakrishnan1, Amiya Nayak1, Pulak Dhar2

1School of Information Technology and Engineering, University of Ottawa, Canada; 2Cistech Limited, Ottawa, Canada

  Communications via Systems‐on‐Chips Clustering in Large‐Scaled Sensor Networks  Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar

Department of Electrical and Computer Engineering, Florida International University, USA

Lunch (12:30 – 13:30pm)   

   

  Session 3  Chair:  Koji  Nakano 13:30  –  15:00pm,  Function  Room  7

  Discovery Architecture for the Tracing of Products in the EPCglobal Network  Gyeongtaek Lee, Jonghun Shin, Daewon Park, Hyukchul Kwon

Department of Computer Science & Engineering, Pusan National University, Korea

  A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment  Qi Liu, Nigel Linge

Informatics Research Institute, University of Salford, UK

  Analysis of Web Service Substitutability Based on Typed Pi‐Calculus  Su Jin-dian1, Yu Shan-shan2, Guo He-qing1

1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China

 

 

 

Page 49: Euc Program

  Session 3 (Continued)  Chair:  Koji  Nakano 16:00  –  17:30pm,  Function  Room  4&5

  An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks  Yu Huang1,2, Bo Liu2, Xianping Tao1,2, Jiannong Cao3, Beihong Jin4

1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Internet and Mobile Computing Lab, Department of Computing, Hong Kong Polytechnic University, China 4Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China

  A Context Management System for Supporting Context‐Aware Applications  Eunhoe Kim, Jaeyoung Choi

School of Computing, Soongsil University, Korea

    Tutorial: Multi‐core Supported Security Systems for Embedded and Ubiquitous Applications 

 Wanlei Zhou and Yang Xiang  15:10  –  18:00pm,  Function  Room  7 

Page 50: Euc Program

  The 3rd IEEE/IFIP International Workshop on Trustworthiness, Reliability and services in Ubiquitous and Sensor neTworks (TRUST’08) 

    Wednesday,  17  December,  2008

    Opening and Keynote Speech: Data Mining for Malicious Code Detection and Security Applications 

 Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, USA 

  Chair: Stephen S. Yau, Co‐chair, TRUST 2008, and Arizona State University, USA     09:00  –  10:30am,  Function  Room  4&5    Coffee Break (10:30 – 11:00am)    

 Session 1: Data Mining, Security and Trust Computing 

Chair: Jia Zhang, Iowa State University, USA  11:00  –  12:30pm,  Function  Room  4&5

  Mean‐Variance Model for International Portfolio Selection  Qiming Pan, Xiaoxia Huang

School of Economics and Management, University of Science and Technology, China

  Attacks on Improved Key Distribution Protocols with Perfect Reparability  Raphael C.-W. Phan1, Bok-Min Goi2

1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia

  Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation  Omar Hasan1, Jean-Marc Pierson2, Lionel Brunie1

1Institut National des Sciences Appliquées de Lyon, France; 2Institut de Recherche en Informatique de Toulouse, France

  A Trusted Third Party Based Secure Authentication Scheme of E‐Commerce  Longjun Zhang, Zou Tao

Department of Communication Engineering, Engineering College of Armed Police Force, China

 

Lunch (12:30 – 13:30pm)   

   

 Session 2: Trust, Service Computing and Management 

Chair: Jen‐Marc Pierson, IRIT, France  14:00  –  15:30pm,  Function  Room  4&5

  Probabilistic Trust Management in Pervasive Computing  Mieso K. Deno, Tao Sun

Department of Computing and Information Science, University of Guelph, Canada

Page 51: Euc Program

 Session 2: Trust, Service Computing and Management (Continued) 

Chair: Jen‐Marc Pierson, IRIT, France    14:00  –  15:30pm,  Function  Room  4&5

  Discovering the Most Trusted Agents without Central Control  Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki

Polish-Japanese Institute of Information Technology, Poland

  A Mobile Agent‐Supported Web Services Testing Platform  Jia Zhang, Di Xu

Department of Computer Science, Northern Illinois University, USA

  Large‐Scale USN Middleware Based on Context‐Aware  Won-Hee Han1, Sung-Won Kim1, Sun-Mi Park1, Chang-Wu Lee1, Jong-hyuk Park2, Young-Sik Jeong1

1Department of Computer Engineering, Wonkwang University, Korea 2Department of Computer Science and Engineering, Kyungnam University, Korea

    Coffee Break (15:30 – 16:00pm)    

 Session 3: Panel: Grand Challenges in Ubiquitous and Sensor Networks 

Chair: Stephen S. Yau, Arizona State University, USA   

16:00  –  17:30pm,  Function  Room  4&5

Panelists: Jungde Cheng, Saitama University, Japan Bhavani Thuraisingham, University of Texas at Dallas, USA Min-You Wu, Shanghai Jiao Tong University, China

 

Page 52: Euc Program

  The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP’08) 

    Thursday,  18  December,  2008

    Opening Ceremony    10:00  –  10:30am,  Function  Room  1&2 Chair: Guojun Wang, Central South University, China     Keynote Speech:    Building Trustworthy Semantic Webs  Bhavani Thuraisingham, The University of Texas at Dallas, USA 

Chair:  Wenbin  Luo,  St.  Mary's  University,  San Antonio, Texas, USA 

10:30 – 11:30am, Function Room 1&2

   

 Session 1: Secure Schemes and Metrics 

Chair: Sancheng Peng, City University of Hong Kong 

11:30  –  12:30pm,  Function  Room  1&2

 Voting‐Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks 

Sancheng Peng1,2, Weijia Jia1,3, Guojun Wang1

1School of Information Science and Engineering, Central South University, China 2School of Computer and Communication, Hunan University of Technology, China 3Department of Computer Science, City University of Hong Kong, Hong Kong

 Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks 

YaHui Li1, DingYong2, JianFeng Ma1

1Ministry of Education Key, Laboratory of Computer Networks and Information Security, Xidian University, China 2School of Mathematics and Computational Science, Guilin University of Electronic Technology, China

  A Sanitizing Signature Scheme with Indexing  Atsushi Koide1, Raylin Tso2, Eiji Okamotov1

1University of Tsukuba, Japan; 2National Chengchi University, Taiwan

  Error Detection Schemes for CED in Block Ciphers  Ewa Idzikowska, Krzysztof Bucholc

Poznaʼn University of Technology, Poland

     

Lunch (12:30 – 13:30pm)   

   

Page 53: Euc Program

 Session 2: Trust Management and Privacy Protection I 

Chair: Wenbin Luo, St. Mary’s University  14:50  –  16:10pm,  Function  Room  1&2

  An Impact‐Oriented Metric for Interference to Network Routing  Song Huang, Lie-Gen Liu

South China University of Technology, China

  User‐Directed Privacy Protection in the Ubiquitous Environment  JaeHun Lee, JinKyu Park, SangWook Kim

Kyungpook National University, Korea

  Provably Secure Trusted Access Protocol for WLAN Mesh Networks  Zhuo Ma1, Jianfeng Ma2, Yulong Shen2

1School of Computer Science, Xidian University, China 2Key Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, China

  Towards Trustworthy and Secure Kiosk Computing for Mobile Users  Dong Zhou, Hiroshi Inamura

DoCoMo USA Labs, USA

  Automatic Generation and Enforcement of Security Contract for Pervasive Application  Ying Jin, Zepeng Li, Da Wei, Lei Liu

College of Computer Science and Technology, Jilin University

  Exponential Hashing in Finite Fields  Wenbin Luo1, Gregory Heileman2

1Engineering Department, St. Mary’s University, USA 2Department of Electrical & Computer Engineering, University of New Mexico, USA

  Research of a Multi‐dimension Measurement Trusting Model Based on Markov Chain  Hongyan Mao, Yixiang Chen

Software Engineering Institute of East China Normal University, China

      Coffee Break (16:10 – 16:20pm)        

     

Page 54: Euc Program

 Session 3: Trust Management and Privacy Protection II 

Chair: Jarrod Trevathan, James Cook University  16:20  –  17:50pm,  Function  Room  1&2

  Defending against the Propagation of Active Worms  Xiang Fan1, Yang Xiang1,2

1School of Management and Information Systems, Central Queensland University, Australia 2Centre for Intelligent and Networked Systems, Central Queensland University, Australia

  Convertible Undeniable Partially Blind Signature from Bilinear Pairings  Atsushi Koide1, Raylin Tso2, Eiji Okamoto1

1University of Tsukuba, Japan 2National Chengchi University, Taiwan

  Analyzing Privacy Designs of Mobile Social Networking Applications  Guanling Chen, Faruq Rahman

Department of Computer Science, University of Massachusetts Lowell, USA

 Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology 

Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang

National Digital Switching System Engineering & Technology Research Center, China

  Privacy Engine for Context‐Aware Enterprise Application Services  Marion Blount1, John Davis2, Maria Ebling1, William Jerome1, Barry Leiba1, Xuan Liu1, Archan Misra1

1IBM T J Watson Research Center; 2Ling Fling, Inc., USA

  The Trustworthiness Based on Hash Chain in Wireless Sensor Network  Xiong Peng1,2, Zhang Wei1

1Department of Computer Science and Technology, East China Normal University, China 2Department of Computer Science and Technology, Nanchang Hangkong University, China

  Trust Similarity Measure in Trust Model for P2P Networks  Yizhi Ren1,2, Mingchu Li1, Cheng Guo1, Yongrui Cui1, Kouichi Sakurai2

1School of Software, Dalian University of Technology, China 2Department of Computer Science and Communication Engineering, Kyushu University, Japan

 

 

 

 

 

 

 

 

 

Page 55: Euc Program

  The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP’08) 

    Friday,  19  December,  2008

   

 Session 4: Encryption and Decryption I 

Chair: Chien‐Pen Chuang, National Taiwan Normal University 

10:30  –  12:10pm,  Function  Room  1&2

  Distance Bounding Protocol for Multiple RFID Tag Authentication  Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu

Department of Information Systems and Operations Management, University of Florida, USA

  Encryption and Decryption with Space Transformation for Bi‐directional Association  Chien-Pen Chuang1, Tin-Ying Huang2, Li-Chi Yeh3

1Department of Applied Electronic, Technology, National Taiwan, Normal University Taipei, Taiwan 2Department of Mechatronic, Technology, National Taiwan, Normal University Taipei, Taiwan 3Department of Industrial, Education, National Taiwan, Normal University Taipei, Taiwan

  Cryptanalysis of Li et al.’s Identity‐Based Threshold Signcryption Scheme  S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan

Theoretical Computer Science Laboratory, Indian Institute of Technology Madras, India

  Online Signature Verification Algorithm Using Hill‐Climbing Method  Daigo Muramatsu

Department of Electrical and Mechanical Engineering, Seikei University, Japan

  Converters for Designing Applied Cryptographic Protocols  Zhao Huawei1, Qin Jing2, Fang Zhifeng3

1School of Computer and Information Engineering, Shandong University of Finance, China 2School of Mathematics and System Sciences, Shandong University, China 3Information Science and Technology, Shandong Institute of Political Science and Law, China

  A Novel Self‐Renewal Hash Chain and Its Implementation  Haojun Zhang1, Xiaoxue Li2, Rui Ren1

1Henan University of Technology, China; 2Agricultural Bank of China, China

 

Lunch (12:10 – 13:30pm)      

   

Page 56: Euc Program

 Session 5: Encryption and Decryption II 

Chair: Feilong Tang, Shanghai Jiao Tong University, China 

13:30  –  15:10pm,  Function  Room  1&2

  Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database  Tae Youn Won, Ji Young Chun, Dong Hoon Lee

Graduate School of Information Management and Security, Korea University, Korea

 Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework 

Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li

  Towards Successive Privacy Protection in Sensor Networks  Baokang Zhao1,2, Dan Wang2, Zili Shao2, Jiannong Cao2, Keith C.C. Chan2, Jinshu Su1, Yanqin Yang3

1School of Computer Science, National University of Defense Technology, China 2Department of Computing, Hong Kong Polytechnic University, China 3Department of Computer Science and Engineering, Shanghai Jiao Tong University, China

  Markov Model‐Based Handwritten Signature Verification  Alan McCabe, Jarrod Trevathan

School of Mathematics, Physics and Information Technology, James Cook University, Australia

  An Efficient RFID Authentication Protocol for Low‐Cost Tags  Yanfei Liu

Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China

  Trustworthy Semantic Web Technologies for Secure Knowledge Management  Bhavani Thuraisingham, Pranav Parikh

Department of Computer Science, The University of Texas at Dallas Richardson, USA

    Coffee Break (15:10 – 15:30pm)      

   

Page 57: Euc Program

 Session 6: Key Management 

Chair: Huawei Zhao, Shangdong University of Finance, China 

15:30  –  17:10pm,  Function  Room  1&2

  An Improved Password‐Based Authenticated Key Agreement Scheme for Pervasive Applications Maw-Jinn Tsaur1, Wei-Chi Ku2, Hao-Rung Chung3

1Graduate Institute of Applied Science and Engineering, Fu Jen Catholic University, Taiwan 2Department of Computer and Information Science, National Taichung University, Taiwan 3Department of Computer Science and Information Engineering, Fu Jen Catholic University, Taiwan

  Efficient Client‐to‐Client Password Authenticated Key Exchange  Yanjiang Yang, Feng Bao, Robert H. Deng

Institute for Infocomm Research, Singapore

 A Self‐Healing and Mutual‐Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks 

Biming Tian, Song Han, Tharam S. Dillon

Digital Ecosystems and Business Intelligence Institute, Curtin University of Technology, Australia

  Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks  Li Ping, Wu Jia-ying, Xue Jing-ming

College of Computer and Telecommunications, Changsha University of Science and Technology, China

  A Key Management Scheme for Cluster Based Wireless Sensor Networks  Reza Azarderakhsh, Arash Reyhani-Masoleh, Zine-Eddine Abid

Department of Electrical and Computer Engineering, The University of Western Ontario, Canada

  Key Management for Wireless Sensor Networks Using Trusted Neighbors  Xue Yuan1, Helmut Jürgensen1, Reza Azarderakhsh2, Arash Reyhani-Masoleh2

1Department of Computer Science, The University of Western Ontario, Canada 2Department of Electrical and Computer Engineering, The University of Western Ontario, Canada

  An Improved Key Management Scheme for WEP  Zhang Longjun, Zou Tao

Department of Communication Engineering, Engineering College of Armed Police Force, China

 

 

 

 

 

 

 

 

 

Page 58: Euc Program

  The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP’08) 

    Saturday,  20  December,  2008

   

 Session 7: Access Control and Anonymity 

Chair: Xuan Liu, IBM T.J. Watson Research Center  8:30  –  10:10am,  Function  Room  1&2

  Property Verification for Generic Access Control Models  Vincent C. Hu1, D. Richard Kuhn1, Tao Xie2

1National Institute of Standards and Technology, USA; 2North Carolina State University, USA

  ALHACF: An Anonymity‐Level Selected Hierarchical Anonymous Communication Framework  Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang

School of Computer Science, National University of Defense Technology, China

 Pool‐Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real‐Time Condition 

Minh-Triet Tran1, Thanh-Trung Nguyen1, Isao Echizen2

1University of Science, Vietnam; 2National Institute of Informatics, Japan

 Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy 

Yue Zhang, James B.D. Joshi

University of Pittsburgh, USA

  Identity Privacy Protection by Delayed Transmission in Pocket Switched Networks  Xiaofeng Lu1, Pan Hui2, Pietro Lio2, Zhang Xiong1

1College of Computer Science, Beijing University of Aeronautics and Astronautics, China 2Computer Laboratory, University of Cambridge, UK

  A Domain‐Oriented Approach for Access Control in Pervasive Environments  Jun Li1, Bruce Christianson2

1Security & Privacy, Enterprise Risk Service, UK 2School of Computer Science, University of Hertfordshire, UK

 Using Context Quality Indicators for Improving Context‐Based Access Control in Pervasive Environments 

José Bringel Filho, Hervé Martin

Laboratory of Informatics of Grenoble, Grenoble University, France     Coffee Break (10:10 – 10:30am)         

Page 59: Euc Program

 Session 8: Security and Privacy in Wireless Networks 

Chair: Guanling Chen, University of Massachusetts Lowell, USA 

10:30  –  12:10pm,  Function  Room  1&2

  Trusted Spanning Tree for Delay Tolerant MANETs  A. Piyatumrong1, P. Bouvry1, F. Guinand2, K. Lavangnananda3

1Universit´e du Luxembourg, FSTC - CSC, Luxembourg 2Le Havre University, France 3King Mongkut’s University of Technology Thonburi, School of Information Technology, Thailand

  Scalable and Secure Routing for Large‐Scale Sensor Networks  Feilong Tang1,2, Minyi Guo1,2, Minglu Li1, Zhijun Wang3, Zixue Cheng2

1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2School of Computer Science and Engineering, The University of Aizu, Japan 3Department of Computing, Hong Kong Polytechnic University, Hong Kong

  Securing Wireless Sensor Networks Using Cluster Reformations  Gicheol Wang1, Deokjai Choi2, Daewook Kang2

1Research Center for Ubiquitous Information Appliances, Chonnam Nat’l University, Korea 2Division of Electronics and Computer, Chonnam Nat’l University, Korea

  Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network  Meng Ge1, Kwok-Yan Lam1, Jianbin Li2, Siu-Leung Chung3

1Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, China 2State Administration of Taxation, China 3The Open University of Hong Kong, Hong Kong

  HybridS: A Scheme for Secure Distributed Data Storage in WSNs  Wei Ren1,2, Yi Ren3, Hui Zhang4

1Department of Computer Science, Zhongnan University of Economics and Law, China 2Department of Electrical Computer Engineering, Illinois Institute of Technology, USA 3Department of Information and Communication Technology, University of Agder (UIA), Norway 4Deptartment of Electronics, Politecnico di Torino, Italy

  SARC: A Street‐Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment  Hyuncheol Kim, Jungha Paik, Bumhan Lee, Donghoon Lee

Center for Information Security Technology, Korea University, Seoul, Korea

 

Lunch (12:10 – 13:30pm)   

     

     

Page 60: Euc Program

 

Session 9: Secure Services and Security Analysis 

Chair: Zhenyu Wang, National Digital Switching System Engineering & Technology Research Center, China 

13:30  –  15:10pm,  Function  Room  1&2

  A Context Based Dynamic Access Control Model for Web Service  Chaowang Shang, Zongkai Yang, Qingtang Liu, Chengling Zhao

Research Center for Education Information on Technology, Central China Normal University, China

  Secure and Verifiable P2P Card Games  Chun-Chao Yeh

Department of Computer Science, National Taiwan Ocean University, Taiwan

  Implementation and Evaluation of SIP‐Based Secure VoIP Communication System  JoongMan Kim, SeokUng Yoon, HyunCheol Jeong, YooJae Won

IT Infrastructure Protection Division, Applied Security Technology Team, Korea Information Security Agency, Korea

  Securing Decentralized Workflows in Ambient Environments  Nicolai Kuntze, Julian Schütte

Fraunhofer Institute for Secure Information Technology (SIT), Germany

  An Application of Interval Analysis in Software Static Analysis    Yawen Wang, Yunzhan Gong, Junliang Chen, Qing Xiao, Zhaohong Yang

State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China

  A Qualitative Risk Analysis for the GPRS Technology  Christos Xenakis1, Danae Apostolopoulou2, Angeliki Panou1, Ioannis Stavrakakis2

1Department of Technology Education and Digital Systems, University of Piraeus, Greece 2Department of Informatics and Telecommunications, University of Athens, Greece