Euc Program
-
Upload
l-lahvey -
Category
Technology
-
view
2.577 -
download
0
description
Transcript of Euc Program
EUC 2008 Program
EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and
Ubiquitous Computing
17-20 December 2008 Shanghai, China
Sponsored by
Shanghai Jiao Tong University
Shanghai Computer Society
IEEE Computer Society
Supported by
National Natural Science Foundation of China
Shanghai Pudong New Area Association for Computer
Foundation of Science & Tech. Development of Shanghai Pudong New Area
EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008, Shanghai, China
Contents
EUC 2008 Conference Schedule at a Glance
Organization
Technical Program Committee
The Map of EUC 2008 Conference Place
Access Guide to Conference Place
Reception and Pujiang Cruise
Banquet
Lunch
EUC 2008 Advanced Technical Program
Tour guide
Wednesday, 17 December 2008 - EUC workshops
Room
Time
Function
Room 3 Function Room 1&2
Function Room 7
Function
Room 4&5
9:00-9:10 EUV-08
UUWSN-08
Welcome speech NCUS-08 TRUST-08
Opening and Keynote speech 9:10-10:30 UUWSN-08 Session 1
10:30-11:00 Coffee Break
11:00-12:30 EUV-08 UUWSN-08
Keynote Speech NCUS-08 TRUST-08
Session 1
12:30-13:30 Lunch 13:30-14:00
ESO-08
NCUS-08
14:00-15:00 UUWSN-08
Session 2 TRUST-08 Session 2
15:00-15:10 Coffee Break
15:10-15:30
Tutorial 1 15:30-16:00 Coffee Break Coffee Break 16:00-16:30 Coffee Break
UWMN-08 TRUST-08 Session 3 (Panel)
16:30-16:50 SECUBIQ-08
Coffee Break
16:50-17:30 Tutorial 2
17:30-18:00 18:30-20:00 Supper in Yayuefang Restaurant (100m away from the conference place)
Thursday, 18 December 2008 - EUC 2008 main conference and TSP-08
Room
Time Grand Ballroom
Function
Room 4&5
Function
Room 7
Function
Room 1&2
8:30-9:00 EUC-08 Opening
Ceremony
9:00-10:00 Keynote Speech I
(Yaoxue Zhang)
10:00-10:30 Coffee Break TSP-08 Opening
Ceremony
10:30-11:30 EUC-08
Session 1A
EUC-08
Session 1B
TSP-08 Keynote Speech
11:30-12:10 TSP-08 Session 1
EUC 2008 Conference Schedule at a Glance
12:10-12:30 Lunch
12:30-13:30 Lunch
13:30-14:30 Keynote Speech II
(Tarek Abdelzaher)
14:30-14:50 Coffee Break
Coffee Break
14:50-15:00 TSP-08
Session 2 15:00-16:10 EUC-08
Session 2A
EUC-08
Session 2B 16:10-16:20 Coffee Break
16:20-16:40 TSP-08 Session 3
16:40-17:50
18:00-19:00 Take bus from hotel to the dock
19:00-21:00 Reception and Pujiang Cruise
Friday, 19 December 2008 - EUC 2008 main conference and TSP-08
Room
Time Grand Ballroom
Function
Room 4&5
Function
Room 7
Function
Room 1&2
9:00-10:00 Keynote Speech III
(Xiaodong Zhang)
10:00-10:30 Coffee Break
10:30-12:10 EUC-08
Session 3A
EUC-08
Session 3B
TSP-08
Session 4
12:10-13:30 Lunch
13:30-15:10 EUC-08
Session 4A
EUC-08
Session 4B
TSP-08
Session 5
15:10-15:30 Coffee Break
15:30-17:10 EUC-08
Session 5A
EUC-08
Session 5B
TSP-08
Session 6
17:10-18:30 Rest in the hotel
18:30-21:30 Banquet in the hotel
Saturday, 20 December 2008 - EUC 2008 main conference and TSP-08
Room
Time Function room 4&5 Function Room 7 Function room 1&2
8:30-10:10 EUC-08 Session 6A EUC-08 Session 6B TSP-08 Session 7
10:10-10:30 Coffee Break
10:30-12:10 EUC-08 Session 7A EUC-08 Session 7B TSP-08 Session 8
12:10-13:30 Lunch
13:30-15:10 EUC-08 Session 8A EUC-08 Session 8B TSP-08 Session 9
15:10-15:30 Coffee Break
15:30-16:50 EUC-08 Session 9A EUC-08 Session 9B
General Chair Minyi Guo, Shanghai Jiao Tong Univ., China Program Chair Cheng-Zhong Xu, Wayne State Univ., USA Program Vice-Chairs
Embedded Systems Soft- ware and Optimization
Jihong Kim, Seoul National Univ., Korea
Embedded Systems and Hard-ware/software Co-Design
Zonghua Gu, Hong Kong Univ. of Science and Technology, Hong Kong
Cyber-Physical Systems Oleg Sokolsky, Univ. of Pennsylvania, USA Real-time Systems Albert M. K. Cheng, Univ. of Houston, USA Power Aware Computing Gang Quan, Univ. of South Carolina, USA Network Protocols Sherali Zeadally, Univ. of the District of Columbia, USAWireless Networks Ivan Stojmenovic, Univ. of Ottawa, Canada Sensor Networks Loren Schwiebert, Wayne State Univ., USA Context Aware Mobile Computing
Jiannong Cao, Hong Kong Polytechnic Univ., HK
Agent and Distributed Computing
Wentong Cai, Nanyang Technological Univ., Singapore
Middleware and P2P Chung-Ta King, National Tsing Hua Univ., Taiwan Multimedia and Data Management
Xiaobo Zhou, Univ. of Colorado, USA
Security and Fault Tolerance
Makoto Takizawa, Tokyo Denki Univ., Japan
Workshop Chairs Zhijun Wang, Hong Kong Polytechnic Univ., Hong Kong
Dakai Zhu, Univ. of Texas at San Antonio, USA Publicity Chairs Ben A. Abderazek, Univ. of Aizu, Japan Wenbin Jiang, Huazhong Univ. of Science and
Technology, China
Publication Chair Yu Hua, Huazhong Univ. of Science and Technology,
China
Local Arrangement Chairs Feilong Tang, Shanghai Jiao Tong Univ., China Minqi Zhang, Shanghai Computer Society, China Jingyu Zhou, Shanghai Jiao Tong Univ., China Yao Shen, Shanghai Jiao Tong Univ., China
Organization
Yanqin Yang, East China Normal Univ., China
Jemal Abbawajy Deakin University, Australia Kemal Akkaya Southern Illinois University, USA Stefan Andrei Lamar University, USA David Atienza Complutense University of Madrid, Spain Neil Audsley University of York, UK Hakan Aydin George Mason University, USA Iain Bate University of York, UK Paolo Bellavista Università di Bologna, Italy Lim Hock Beng National University of Singapore, Singapore Miodrag Bolic University of Ottawa, Canada Azzedine Boukerche University of Ottawa, Canada Stephen Bush GE Research, USA Jian Cao Shanghai Jiaotong University, China Jean Carle University of Lille, France Eduardo Cerqueira University of Coimbra, Portugal Chaitali Chakrabarti Arizona State University, USA Samarjit Chakraborty National University of Singapore, Singapore Alvin T.S. Chan Hong Kong Polytechnic University, Hong Kong Rong-Guey Chang National Chung-Cheng University, Taiwan Han-Chieh Chao National Ilan University, Taiwan Hsi-Lu Chao National Chiao-Tung University, Taiwan Ling Teck Chaw University of Malaya, Malaysia Guihai Chen Nanjing University, China Hongyang Chen University of Tokyo, Japan Albert K. Cheng University of Houston, USA Reynold Cheng Hong-Kong Polytechnic University, Hong Kong Naveen Chilamkurti LaTrobe University, Australia
Technical Program Committee
Pai Chou University of California at Irvine, USA Sung Woo Chung Korea University, Korea Yeh-Ching Chung National Tsing-Hua University, Taiwan Stephen Cranefield University of Otago, New Zealand Saumitra Das Purdue University, USA Qianni Deng Shanghai Jiaotong University, China Qingxu Deng Northeastern University, China Murat Demirbas University of Buffalo, USA Ming Dong Wayne State University, USA Junzhao Du Xidian University, China Hala Elaarag Stetson University, USA Said Elnaffar United Arab Emirates University, UAE Sebastian Fischmeister University of Waterloo, Canada Eric Fleury INRIA-INSA Lyon, France Scott Fowler Aston University, UK Song Fu University of New Mexico Technology, USA Satoshi Fujita Hiroshima University, Japan Aniruddha Gokhale Vanderbilt University, USA Lin Guan Loughborough University, UK Song Guo University of Aizu, Japan Hani Hagras University of Essex, UK Jérôme Härri Universität Karlsruhe, Germany Mohamed Hefeeda Simon Fraser University, Canada Seongsoo Hong Seoul National University, Korea Hung-Chang Hsiao National Cheng Kung University, Taiwan Pao-Ann Hsiung National Chung Cheng University, Taiwan Ching-Hsien Hsu Chung Hua University, Taiwan Kien A. Hua University of Central Florida, USA Ray Hunt University of Canterbury, New Zealand Jacek Ilow Dalhousie University, Canada Jadwiga Indulska University of Queensland, Australia Tohru Ishihara Kyushu University, Japan Russ Joseph Northwestern University, USA Jehn-Ruey Jiang National Central University, Taiwan Beihong Jin Institute of Software, CAS, China Soon Ju Kang Kyung Book National University, Korea
Jung Guk Kim Hankuk University of Foreign Studies, Korea Young-Jin Kim Sun Moon University, Korea Polychronis Koutsakis McMaster University, Canada László Kovács Hungarian Academy of Science, Hungary T. John Koo Shantou University, China Srdjan Krco Ericsson, Dublin, Ireland Mohan Kumar University of Texas at Arlington, USA Tei-Wei Kuo National Taiwan University, Taiwan Bjorn Landfeldt University of Sydney, Australia Peter Langendoerfer IHP-Microelectronics, Germany Julia Lawall University of Copenhagen, Demark Jaejin Lee Seoul National University, Korea Chang-Gun Lee Seoul National University, Korea Jenq-Kuen Lee National Tsing-Hua University, Taiwan Victor Lee Hong Kong City University, Hong Kong Wang-Chien Lee The Pennsylvania State University, USA Wonjun Lee Korea University, Korea Hong-Va Leong Hong Kong Polytechnic University, Hong Kong Clement Leung Victoria University, Australia Kuan-Ching Li Providence University, Taiwan Xiang-Yang Li Illinois Institute of Technology, USA Zhu Li Motorola Labs, USA Qilian Liang University of Texas at Arlington, USA Weifa Liang Australian National University, Australia Sung-Soo Lim Kookmin University, Korea Teck Meng Lim StarHub Ltd, Singapore Justin Lipman Intel, China Annie Liu SUNY, Stony Brook, USA Hai Liu University of Ottawa, Canada Jane Liu Academia Sinica, Taiwan Steve Liu Texas A&M University, USA Xue Liu McGill University, Canada Yunhao Liu Hong Kong University of Science and Technology, Hong
Kong Brian Logan University of Nottingham, UK Malcolm Low Nanyang Technological University, Singapore
Luis Loyola DoCoMo Euro Laboratories, Germany Zongwei Luo The University of Hong Kong, Hong Kong Huadong Ma Beijing University of Posts & Telecommunications, China Rupak Majumdar University of California at Los Angeles, USA Kami Makki University of Toledo, USA Gregorio Martinez University of Mercia, Spain Jaime Lloret Mauri University of Valencia, Spain Xiaofeng Meng Renmin University of China, China Chunyan Miao Nanyang Technological University, Singapore Kazuhiro Minami University of Illinois at Urbana-Champaign, USA Vincent John Mooney Georgia Institute of Technology, USA Farid Nait-Abdesselam University of Sciences and Technologies of Lille, France Joseph K. Ng Hong Kong Baptist University, Hong Kong Alex Nicolau University of California at Irvine, USA Ertan Ozturk Zonguldak Karaelmas University, Turkey Christian Poellabauer University of Notre Dame, USA Raj Rajkumar Carnegie Mellon University, USA Binoy Ravindran Virginia Tech, USA John Regehr University of Utah, USA Shangping Ren Illinois Institute of Technology, USA Ayad Salhieh Jordan University of Science and Technology, Jordan Shivakumar Sastry University of Akron, USA Sahra Sedigh University of Missouri - Rolla, USA Sudhanshu K. Semwal University of Colorado at Colorado Springs, USA Lui Sha University of Illinois at Urbana-Champaign, USA Li Shang Queen's University, Canada Zili Shao Hong Kong Polytechnic University, Hong Kong Haiying Shen University of Arkansas, USA Michael Sheng University of Adelaide, Australia Weisong Shi Wayne State University, USA Yuanchun Shi Tsinghua University, China Daniel Shih National Taiwan University, Taiwan Timothy Shih Tamkang University, Taiwan Dongkun Shin SungKyunKwan University, Korea Sang Son University of Virginia, USA Jack Stankovic University of Virginia, USA
Robert James Steele University of Technology, Sydney, Australia Limin Sun Chinese Academy of Sciences, China Niranjan Suri Institute of Human and Machine Cognition, USA Yasuyuki Tahara National Institute of Informatics, Japan David Tanier Monash University, Australia Xueyan Tang Nanyang Technological University, Singapore Xianping Tao Nanjing University, China Yong Meng Teo National University of Singapore, Singapore Georgios K. Theodoropoulos
University of Birmingham, UK
Lothar Thiele ETH Zurich, Switzerland CY Tsui Hong Kong University of Science and Technology, HK Hiroyuki Tomiyama Nagoya University, Japan Fabris Valois INSA, Lyon, France Nalini Venkatasubramanian
University of California at Irvine, USA
Jan Vitek Purdue University, USA Andy Wang Florida State University, USA Cho-Li Wang University of Hong Kong, Hong Kong Shige Wang General Motors, USA Tzone-I Wang National Cheng Kung University, Taiwan Xiaorui Wang University of Tennessee, USA Jianbin Wei Yahoo, USA Weigang Wu Sun Yat-Sen University, China Bin Xiao Hong Kong Polytec University, Hong Kong Nong Xiao National University of Defense Technology, China Guoliang Xing City University of Hong Kong, Hong Kong Lizhen Xu Southeast University, China Jianliang Xu Hong Kong Baptist Univ., Hong Kong Ming Xu National University of Defense and Technology, China Yun Yang Swinburne University of Technology, Australia Hiroyuki Yomo Aalborg University, Denmark Chuck Yoo Korea University, Korea Moustafa Youssef University of Maryland College Park, USA Bo Yu Wayne State University, USA Zhiwen Yu Kyoto University, Japan
Qing-An Zeng University of Cincinnati, USA Daqing Zhang National Institute of Telecommunications, France Liqiang Zhang Indian University South Bend, USA Wei Zhang Southern Illinois University, USA Wensheng Zhang Iowa State University, USA Lin Zhong Rice University, USA Xiliang Zhong Microsoft, USA Wanlei Zhou Deakin University, Australia Dakai Zhu University of Texas, San Antonio, USA Yongxin Zhu Shanghai Jiao Tong University, China
Sourav Bhowmick Nanyang Technological University, Singapore Manoranjan Dash Nanyang Technological University, Singapore Yuhong Feng Hong Kong Polytechnic University, Hong Kong Jiayu Gong Wayne State University, USA Jia Rao Wayne State University, USA Aixin Sun Nanyang Technological University, Singapore Muzhou Xiong Nanyang Technological University, Singapore
Additional Reviewers
General Chair
Prof. Minyi Guo
Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Professor Minyi Guo received his Ph.D. degree in computer science from University of Tsukuba, Japan. Before 2000, Dr. Guo had been a research scientist of NEC Corp., Japan. He is now a full professor at the Department of Computer Software, The University of Aizu, Japan, from 2000 to 2005. During this period, he was also a visiting professor of Georgia State University, USA, Hong Kong Polytechnic University, University of Hong Kong, National Sun Yet-sen University in Taiwan, China, University of Waterloo, Canada and University of New South Wales, Australia. He is also a professor of Shanghai Jiao Tong University and Nanjing University, China.
Dr. Guo has published more than 120 research papers in international journals and conferences. Dr. Guo has served as general chair, program committee or organizing committee chair for many international conferences. He is the founder of International Conference on Parallel and Distributed Processing and Applications (ISPA), and International Conference on Embedded and Ubiquitous Computing (EUC). He is the editor-in-chief of the Journal of Embedded Systems. He is also in editorial board of Journal of Pervasive Computing and Communications, International Journal of High Performance Computing and Networking, Journal of Embedded Computing, Journal of Parallel and Distributed Scientific and Engineering Computing, and International Journal of Computer and Applications.
Dr. Guo's research interests include parallel and distributed processing, parallelizing compilers, Pervasive Computing, Embedded Software Optimization, molecular computing and software engineering. He is a member of the ACM, IEEE, IEEE Computer Society, and IEICE.
Program Chair
Prof. Cheng-Zhong Xu
Department of Electrical and Computer Engineering, Wayne State University, USA
Cheng-Zhong Xu is a professor in the Department of Electrical and Computer Engineering of Wayne State University. He is also the director of the Center for Networked Computing Systems at WSU. His research interest includes networked computing systems and applications, in particular scalable and secure Internet services and architecture, scheduling and resource management in distributed, parallel, and embedded systems, and autonomic systems management for highly reliable computing. He has published more than 140 peer-reviewed scientific papers in archival journals and conferences in these areas. He is the author of "Scalable and Secure Internet Services and Architecture" (Chapman & Hall/CRC Press, 2005) and the leading co-author of "Load Balancing in Parallel Computers: Theory and Practice" (Kluwer Academic, 1996). Dr. Xu serves on the editorial boards of IEEE Transactions on Parallel and Distributed Systems, J. of Parallel and Distributed Computing, J. of Parallel, Emergent, and Distributed Systems, J. of Computers and Applications, and J. of High Performance Computing and Networking. He has also guest edited special issues for several other journals on network services and security in distributed systems. He has served a number of international conferences and workshops in various capacities as program chair, general chair, and plenary speaker. He was a recipient of “President's Award for Excellence in Teaching” of WSU in 2002 and “Career Development Chair Award” in 2003. Dr. Xu received the BS and MS degrees from Nanjing University in 1986 and 1989, respectively, and the Ph.D. degree from the University of Hong Kong in 1993. He is a senior member of IEEE.
Keynote Speaker
Prof. Yaoxue Zhang Department of Higher Education, Ministry of Education, China
The Challenges and Opportunities in Transparent
Computing
Abstract: In this talk, we present some new research results about our Transparent Computing which is a new computing paradigm for service sharing. Rapid development in computer networks let people easily share the hardware and software resources, however, because the slow progress in Operating system technologies and few changes in computer architectures in several decades, it is still not easy to share services from different software and hardware platforms for users.
Transparent Computing paradigm separates the storages and executions of software programs and data including what of operating systems in different computers connecting with communication networks. In this paradigm, data and programs are stored in the storage servers and they are executed in either clients or execution servers according to the required services, respectively. We propose a new mechanism called Meta OS to manage this separation. This mechanism extends the Neumann architecture special-temporally, so that a sequentially virtual computing can be effectively obtained and the individual service sharing can be easily performed underlying different Operating System platforms.
We will introduce the idea, the mechanism and algorithms of proposed Meta OS for
the separation of the programs and data including what of Operating Systems. Moreover, we also present some examples about the applications of this computing paradigm. Biography
Prof. Zhang Yaoxue was born in Li County, Hunan province, China, in 1956. He graduated from Northwest Institute of Telecommunication Engineering, China, obtained his Ph.D degree in computer networking from Tohoku University, Japan in 1989. One year later, he joined Department of Computer Science, Tsinghua University, China. He was a visiting professor of Massachusetts Institute of Technology (MIT) and University of Aizu, in 1995 and 1998, respectively. He served as the President of China Central Radio & TV University from Nov. 2001 to Jun. 2006. Currently, Prof. Zhang is a fellow of the Chinese Academy of Engineering, a professor in computer science and technology in Tsinghua University, and the Director General for Higher Education of Ministry of Education, China. He is also a member of the Expert Committee on Military Computer and Software Technology of PLA General Armament Department, of the Advisory Committee on State Informatization, and of Technical Committee on Ubiquitous/Pervasive Computing of China Computer Federation. Additionally, he serves as an editorial board member of 4 international journals: International Journal of Wireless and Mobile Computing, Journal of Autonomic and Trusted Computing, Chinese Journal of Electronics and Chinese Journal of Computer.
Prof. Zhang's major research areas include computer networking, operating systems, and ubiquitous/pervasive computing. He has led many national and international research, international collaboration and industrialization projects. Because of his distinguished contributions, Prof. Zhang has won the National Award for Scientific and Technological Progress (2nd class) twice in 1998 and 2001, and National Award for Technological Invention (2nd class) in 2004, as well as 5 provincial or ministerial awards. He is a winner of the Prize of HLHL (Hong Kong) Foundation for Scientific and Technological Progress in 2005. He has filed 16 Chinese patents and 3 American patents as the first inventor, of which 13 have been granted. Accordingly, he won the Top Patent Award of China in 2006. Prof. Zhang has published over 170 technical papers in international journals and conferences, as well as 8 monographs and textbooks. He received the IEEE Best Paper Award in the 21st IEEE AINA International Conference in 2007.
Recently, Prof. Zhang's research mainly focuses on Transparent Computing and Active Services. Transparent Computing is a computing paradigm to solve the problem of how to access different operating systems and applications on one terminal platform through networks, and how to run an operating system and applications on different terminal platforms. Active Services is a new approach to evolve current programs and services according to user requirements to provide personalized and comprehensive network services.
Keynote Speaker
Prof. Xiaodong Zhang Department of Computer Science and Engineering, The Ohio State University, USA
Research issues and Challenges to Advance System
Software for Multicore Processors and Data-intensive
Applications
Abstract: Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of "memory wall" has been shifted to "disk wall" that is a serious bottleneck for many data-intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems.
We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching
capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit "sequential locality" -- for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented. Biography
Xiaodong Zhang is the Robert M. Critchfield Professor in Engineering, and Chairman of the Department of Computer Science and Engineering at the Ohio State University.
His research interests cover a wide spectrum in the areas of high performance and distributed systems. Several technical innovations and research results from his team have been adopted or being developed in commercial products and open source systems with direct impact to some key computing operations, including the permutation memory interleaving technique first in the Sun MicroSystems' UltraSPARC IIIi processor and then in the Sun's dual-core Gemini Processor, the token thrashing protection mechanism and the Clock-Pro page replacement algorithm for memory management in the Linux Kernel and NetBSD.
Xiaodong Zhang was the Director of Advanced Computational Research Program at the National Science Foundation, 2001-2004. He is the associate Editor-in-Chief of IEEE Transactions on Parallel and Distributed Systems, and is also serving on the Editorial Boards of IEEE Transactions on Computers, IEEE Micro, and Journal of Parallel and Distributed Computing.
He received his Ph.D. in Computer Science from University of Colorado at Boulder.
Keynote Speaker
Associate Prof. Tarek Abdelzaher
Department of Computer Science, University of Illinois at Urbana Champaign, USA
Research Challenges in Distributed
Cyber-Physical Systems
Abstract: Moore's law, automation considerations, and the pervasive need for timely information lead to a next generation of distributed systems that are open, highly interconnected, and deeply embedded in the physical world. Such systems, called cyber-physical, were recently named the first research priority in networking and information technology in the US by the nation's presidential council of advisors on science and technology. They offer new research challenges that stem from openness, scale, and tight coupling between computation, communication, and distributed interaction with both physical and social contexts. Growing challenges span a large spectrum ranging from new models of computation for systems that live in physical and social spaces, to the enforcement of reliable, predictable, and timely end-to-end behavior in the face of high interactive complexity, increased uncertainty and imperfect implementation. This talk discusses the top challenges in cyber-physical systems and conjectures on research directions of increasing interest in this realm.
Biography
Tarek Abdelzaher received his B.Sc. and M.Sc. degrees in Electrical and Computer
Engineering from Ain Shams University, Cairo, Egypt, in 1990 and 1994 respectively. He received his Ph.D. from the University of Michigan in 1999 on Quality of Service Adaptation in Real-Time Systems. He has been an Assistant Professor at the University of Virginia, where he founded the Software Predictability Group until 2005. He is currently an Associate Professor at the Department of Computer Science, the University of Illinois at Urbana Champaign. He has authored/coauthored more than 100 refereed publications in real-time computing, distributed systems, sensor networks, and control. He is Editor-in-Chief of the Journal of Real-Time Systems, an Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, the ACM Transaction on Sensor Networks, and the Ad Hoc Networks Journal, as well as Editor of ACM SIGBED Review. He was Program Chair of RTAS 2004 and RTSS 2006, and General Chair of RTAS 2005, IPSN 2007, RTSS 2007, DCoSS 2008 and Sensys 2008. Abdelzaher's research interests lie broadly in understanding and controlling the temporal properties of software systems in the face of increasing complexity, distribution, and degree of embedding in an external physical environment. Tarek Abdelzaher is a member of IEEE and ACM.
EUC 2008 conference place: Courtyard by Marriott Shanghai-Pudong Address of conference place: 838 Dong Fang Road, Pudong District, Shanghai, China
There are two airports in Shanghai, Pudong International Airport(PVG) and Hongqiao International Airport(SHA), and there are two railway stations in Shanghai, Shanghai Railway Station and Shanghai South Railway Station. Our hotel is at the crossing of Dong Fang Road and Wei Fang Road. The usual traffic direction is followed. 1. From Shanghai Pudong International Airport(PVG)
Taxi only
The Map of EUC 2008 Conference Place
Access Guide to EUC 2008 Conference Place
A20 (Outside Circle) --- turn right onto Luo Shan Road --- turn left onto Hua Mu Road --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 40 minutes to the hotel. Estimated taxi fare: 120 RMB (one way, if traffic condition is fine)
Maglev Train and Subway Line No.2 Take Maglev Train from Pudong International Airport to Longyang Road Subway Station, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 60 RMB for Subway line No.2 and economy Maglev Train, 110 RMB for Subway line No.2 and VIP Maglev Train.
Airport bus Line No.3 and Subway Line No.2 Take Airport bus Line No.3 from Pudong International Airport to Longyang Road Subway Station, then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference place on foot, which takes around 5 minutes. Totally about 25 RMB is needed.
Airport bus Line No.5 and Taxi Take Airport bus Line No.5 from Pudong International Airport to Oriental hospital, then take a taxi to the hotel. Totally about 35 RMB is needed.
2. From Hongqiao International Airport(SHA) Taxi only
Yan An Road Elevated High Way --- to Yan An East Road Tunnel --- to Shi Ji Da Dao (Century Blvd) --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 30 minutes to the hotel. Estimated taxi fare: 70 RMB (one way,if traffic condition is fine)
Bus No. 925A and Subway Line 2 Take Bus No. 925A from Hongqiao International Airport to People's Square, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 8 RMB is needed.
3. From Shanghai Railway Station or Shanghai South Railway Station Subway Line No.1 and No.2
Take Subway Line No.1 from either Railway Station to People's Square Station, and then interchanges to Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 5~7 RMB is needed.
Location of Conference Rooms
We will hold a Pujiang cruise to welcome the EUC 2008 attendee from all over the world. Pujiang cruise is the classical aquatic travel program, it’s not only because that the Huangpu River is the mother river of Shanghai, and the representative and reduction of Shanghai, but also the two sides of the river gather the famous sights of Shanghai city, such as the Eastern pearl broadcasts the television tower, Bund's Wan Guo reads extensively the group. Boarding on the boat, with delicious buffet, you can feel the honorable position and the long history of the bund; also you can step on the top deck, listen to the pulse and rhythm of Pudong times. You will understand "the scene of dazzling fireworks and lanterns lively district" ideal condition.
Reception time: 19:00 ~21:00 on Dec.18, 2008 Reception place: Pujiang Cruise ship
Banquet time: 18:30~21:30 on Dec.19, 2008 Banquet place: Grand Ballroom at Courtyard by Marriott Shanghai-Pudong
Lunch place: Spices Café at Courtyard by Marriott Shanghai-Pudong
Reception and Pujiang Cruise
Banquet
Lunch
The Bund "The Bund" is a long, storied road in Shanghai. The Bund has been considered a historic symbol of Shanghai for over one hundred years. It is a source of great pride to the Shanghai people, as it shows the world Shanghai's culture and its capability to synchronize and meld its local culture with civilizations abroad. The Bund faces Shanghai's mother river, the Huangpu River. Behind the Bund are old buildings representing architectural styles from different countries. The unique geography around the Bund and that geography's effect on the economy of Shanghai and China throughout the past one hundred years fills the Bund with cultural connotation and undertones. The river, the long bank, the green belt and the different architectural styles of the buildings on the Bund is the most "Shanghai-like" sight in Shanghai. In the morning, the Bund is a popular place for jogging and workouts. It is a charming sight for tourists in the daytime and it becomes lovers' lane at night!
Chenyi Square At the end of the 10-mile Nanjing Road is Chenyi Square, dominated by a sculpture of Chenyi-the first Shanghai mayor of the People's Republic of China. The sculpture is made of bronze and stands 5.6 meters high with a red granite underlay 3.5 meters high. Every weekend, a grand "Square Concert" is held in front of the sculpture.
To the south of the sculpture is a popular fountain. Many colored lamps are set under the water of the fountain, and these lamps are turned on at night. The beautiful colored water streams created by the lamps are a great sight to see in Chenyi Square at night.
Sightseeing Tunnel The Bund's Tunnel stretches from the end of Nanjing Road on the Puxi side to the Oriental Pearl TV Tower on the Lujiazui side - a total length of 646.70 meters. This
Tour guide
tunnel was finished at the end of 2000; it was the first pedestrian tunnel built in China. Tourists may enter the tunnel through an elevator at the entrance on either side. It takes about two to five minutes to walk the length of the tunnel. Many high-tech displays are featured inside. All kinds of designs, ads, panoramic displays and background music about people, history, culture and technology are displayed throughout the tunnel, making your visit there both interesting and thrilling.
Xujiahui Xujiahui is one of the most prosperous business centers, with many famous mansions and shopping centers. The history of the district dates back to Ming Dynasty. A famous scientist Xu Guangqi, the Secretary of the Grand Council, had been buried here. Some of his descendants had multiplied and lived here, so it was first named "Xujia Village" and then gradually developed into town. The name "Xujiahui" was from the fact that Xu Guangqi built a cottage at the joint of the two rivers of Zhaojiabang and Lihongjing. In March 1957, Changshu and Xuhui districts were amalgamated into the new Xuhui District.
Lujiazui Financial Center The Lujiazui Financial Center is located in the Pudong district of Shanghai. The famous buildings in this area include:
The Oriental Pearl TV Tower, which is surrounded by the Yangpu Bridge in the northeast and the Nanpu Bridge in the southwest, creating a picture of 'twin dragons playing with pearls'. The tower with 468 meters high (1,536 feet) is the world's third tallest TV and radio tower surpassed in height only by towers in Toronto, Canada and Moscow, Russia.
Shanghai International Conference Center, which is located to the northwest of Oriental Pearl TV Tower, along Riverside Boulevard, opposite to the Bund. The conference center covers an area of 45 thousand square meters, with modern conference halls, two multi-functional halls (around 4300 square meters), one international conference hall of press center (around 2500 square meters) and two conference halls that can hold 200 people.
EUC Main Conference
Thursday, 18 December, 2008 Opening Remark 08:30 – 09:00am, Grand Ballroom Keynote Speech I: The Challenges and Opportunities in Transparent Computing Yaoxue Zhang (Tsinghua University) 09:00 – 10:00am, Grand Ballroom Coffee Break (10:00 – 10:30am)
EUC‐1A: Hardware/Software Co‐Design I 10:30 – 12:10pm, Function Room 4&5 Session Chair: Meikang Qiu, University of New Orleans, USA A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications
Archana Kalyansundar, Rita Chattopadhyay
Siemens Corporate Technology India, India Advanced Optimization and Design Issues of a 32‐Bit Embedded Processor Based on Produced Order Queue Computation Model
Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda
Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan A Low‐Cost Embedded Controller for Complex Control Systems Zhe Peng, Longhua Ma, Feng Xia
State Key Lab of Industrial Control Technology, Zhejiang University, China Single Instruction Dual‐Execution Model Processor Architecture Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda
Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan
EUC‐1B: Sensor Networks I 10:30 – 12:10pm, Function Room 7 Session Chair: Jinde Chen, Saitama University, Japan Analysis of Data Delivery Delay in Acoustic Sensor Networks Chao Wang ,Yan Sun, Huadong Ma
Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, China
A Collaboration‐based Storage Management Scheme in Multimedia Sensor Networks Yunpei Yan1, Guihai Chen1, Sajal Das2
1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Engineering, University of Texas at Arlington, USA
An Integrated Deployment Tool for ZigBee‐Based Wireless Sensor Networks Yu-Kai Huang1, Pi-Cheng Hsiu1, Wei-Ni Chu1, Kuan-Chang Hung1, Ai-Chun Pang1, Tei-Wei Kuo1, Min
Di2, Hua-Wei Fang2
1Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 2Networks and Multimedia Institute, Institute for Information Industry, Taiwan
Cooperative Node Localization for Mobile Sensor Networks Hongyang Chen1, Marcelo H. T. Martins1, Pei Huang2, Hing Cheung So3, Kaoru Sezaki1
1University of Tokyo, Japan 2Michigan State University, USA 3City University of Hong Kong, Hong Kong
Lunch ( 12:10 – 13:30pm)
Keynote Speech II: Research Challenges in Distributed Cyber‐Physical Systems Tarek Abdelzaher (University of Illinois at Urbana Champaign)
13:30 – 14:30pm, Grand Ballroom
Coffee Break (14:30 – 15:00pm)
EUC‐2A: Real‐time and Cyber‐Physical Systems 15:00 – 16:40pm, Function Room 4&5 Session Chair: Hui Guo, University of New South Wales, New Zealand
A Systematic Framework for Structured Object‐Oriented Security Requirements Analysis in Embedded Systems
Sojan Markose, Xiaoqing (Frank) Liu, Bruce McMillin
Computer Science Department, Missouri University of Science and Technology, USA Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors Shinpei Kato, Nobuyuki Yamasaki
Department of Information and Computer Science, Keio University, Japan Robust Feedback Control Scheduling in Distributed Embedded Real‐Time Systems
Bing Du1, Chun Ruan2
1School of Electrical and Information Engineering, The University of Sydney, Australia 2School of Computing and Mathematics, University of Western Sydney, Australia
RT‐P2P: A Scalable Real‐Time Peer‐to‐Peer System with Probabilistic Timing Assurances
Fei Huang1, Binoy Ravindran1, E. D. Jensen2
1Department of Electrical & Computer Engineering, Virginia Tech, USA 2The MITRE Corporation, USA
EUC‐2B: Multimedia and Data Management I 15:00 – 16:40pm, Function Room 7 Session Chair: Huan Li, Beihang University, China UMDD: User Model Driven Software Development Xiaochun Wang1,2, Yuanchun Shi1
1Department of Computer Science and Technology, Tsinghua University, China 2GGV Sub-station, Postdoctoral Workstation of Zhongguancun Haidian Garden, China
A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test Ashraf Armoush, Falk Salewski, Stefan Kowalewski
Embedded Software Laboratory, RWTH Aachen University, Germany Data Management for Context‐Aware Computing
Wenwei Xue1, Hungkeng Pung1, Wenlong Ng1, Tao Gu2
1School of Computing, National University of Singapore, Singapore 2Institute for Infocomm Research, Singapore
Efficient Data Scheduling for Multi‐item Queries in On‐Demand Broadcast
Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin
School of Computer Science, Fudan University, China
Friday, 19 December, 2008 Keynote Speech III: Research Issues and Challenges to Advance System Software Xiaodong Zhang (Ohio State University) 09:00 – 10:00am, Grand Ballroom Coffee Break (10:00 – 10:30am)
EUC‐3A: Embedded SW Optimization I 10:30 – 12:10pm, Function Room 4&5 Session Chair: Tarek Abdelzaher, University of Illinois at Urbana, USA An Improved EMD Embedding Scheme Based on Secret Image Difference Chin-Chen Chang1, Chin-Feng Lee2, Yi-Ren Wang3
1Department of Information Engineering and Computer Science Management, Feng Chia University, Taiwan 2Department of Information Management, Chaoyang University of Technology, Taiwan 3Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems Lei Sun, Tatsuo Nakajima
Department of Computer Science, Waseda University, Japan SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima
Department of Computer Science, Waseda University, Japan Optimizing the Embedded Caching and Prefetching Software on a Network‐Attached Storage System
Shih-Hao Hung1,2, Chien-Cheng Wu1, Chia-Heng Tu2
1Graduate Institute of Networking and Multimedia; 2Department of Computer Science and Information Engineering National Taiwan University, Taiwan
EUC‐3B: Wireless Networks I 10:30 – 12:10pm, Function Room 7 Session Chair: Hongyang Chen, University of Tokyo, Japan Fuzzy Self‐Clustering for Wireless Sensor Networks Yahya M. Tashtoush, Mohammed A. Okour
The Department of Computer Science, Jordan University of Science and Technology, Jordan Secure Authentication in Wireless Sensor Networks Using RF Fingerprints D. A. Knox, T. Kunz
Department of Systems and Computer Engineering, Carleton University, Canada
Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc Networks
Romeo Said, Yves Mahéo
Valoria, Université Européenne de Bretagne, France A Scenario‐based Directional Communication Performance in Wireless Ad hoc Networks
Murad Khalid1, In-ho Ra2, Young-hoon Joo2, Ravi Sankar1
1Department of Electrical Engineering, University of South Florida, USA 2School of Electronic and Information Engineering, Kunsan National University, Korea Lunch (12:10 – 13:30pm)
EUC‐4A: Network Protocols I 13:30 – 15:10pm, Function Room 4&5 Session Chair: Jun Yang, University of Pittsburgh, USA Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application Dejia Shi1, Weijin Jiang1,2, 3, Danping Xu3
1School of Computer and Electronic Engineering, Hunan University of Commerce, China 2School of Computer, Wuhan University of Technology, China 3The College of Information Engineering, Xiangtan University, China
Countering DDoS and XDoS Attacks against Web Services Xinfeng Ye
Department of Computer Science, Auckland University, New Zealand Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2‐D Mesh Network on Chip Xiao Canwen, Zhang Minxuan, Dou Yong, Zhao Zhitong
School of Computer Science, National University of Defense Technology, China A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks Ze Li, Haiying Shen
Department of Computer Science and Computer Engineering, University of Arkansas, USA
EUC‐4B: Power‐aware Computing 13:30 – 15:10pm, Function Room 7 Session Chair: Jingling Xue, University of New South Wales, Australia Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment Meikang Qiu1, Jiande Wu1, Jingtong Hu2, Yi He2, Edwin H.-M. Sha2
1Department of Electrical Engineering, University of New Orleans, USA 2Department of Computer Science, University of Texas at Dallas, USA
A Low Power Error Detection Technique for Floating‐Point Units in Embedded Applications Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi
Dependable System Laboratory, Sharif University of Technology, Iran A Generalized Framework for System‐Wide Energy Savings in Hard Real‐Time Embedded Systems
Gang Zeng1, Hiroyuki Tomiyama11, Hiroaki Takada1, Tohru Ishihara2
1Graduate School of Information Science, Nagoya University, Japan 2System LSI Research Center, Kyushu University, Japan
Application Specific Low Power ALU Design Yu Zhou, Hui Guo
School of Computer Science & Engineering, University of New South Wales, Australia Coffee Break (15:10 – 15:30pm)
EUC‐5A: Hardware/Software Co‐Design II 15:30 – 17:10pm, Function Room 4&5 Session Chair: Wei Zhang, Southern Illinois University , USA Hardware Support for Efficient Sparse Matrix Vector Multiplication Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue
School of Computer Science and Engineering, University of New South Wales, Australia Accelerating Montgomery Modulo Multiplication for Redundant Radix‐64k Number System on the FPGA Using Dual‐Port Block RAMs
Koji Shigemoto, Kensuke Kawakami, Koji Nakano
Department of Information Engineering, Hiroshima University, Japan A State‐Based Predictive Approach for Leakage Reduction of Functional Units
Linfeng Pan1, Minyi Guo1, Yanqin Yang1,2, Meng Wang2, Zili Shao2
1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2Department of Computing, Hong Kong Polytechnic University, Hong Kong 3Department of Computer Science and technology, East China Normal University, China
Automatic Integration of Non‐Bus Hardware IP into SoC‐Platforms for Use by Software
Robert Guenzel
Department of Integrated Circuit Design(E.I.S.), Technical University of Braunschweig, Germany
EUC‐5B: Context‐aware Computing 15:30 – 17:10pm, Function Room 7 Session Chair: Beihong Jin, Chinese Academy of Sciences, China A Probabilistic Approach to Consistency Checking for Pervasive Context Yu Huang1,2, Xiang Ma2, Xianping Tao1,2, Jiannong Cao3, Jian Lu1,2
1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Department of Computing, Hong Kong Polytechnic University, Hong Kong
Human Universality in Ubiquitous Computing: Maslow, Where Are You? Sebastien Duval1, Christian Hoareau2, Hiromichi Hashizume3
1National Institute of Informatics, Japan 2The Graduate University for Advanced Studies, Japan 3National Institute of Informatics, Japan
Learning in Small and Large Ubiquitous Computing Environments
Jorge Barbosa1, Rodrigo Hahn1, Débora N. F. Barbosa2, Cl´udio F. R. Geyer3
1PIPCA/Unisinos, São Leopoldo – RS – Brazil 2UniLasalle, Canoas – RS – Brazil 3UFRGS, Porto Alegre – RS – Brazil
Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing
Jingde Cheng
Department of Information and Computer Sciences, Saitama University, Japan
Saturday, 20 December, 2008 EUC‐6A: Sensor Networks II 08:30 – 10:10am, Function Room 4&5 Session Chair: Haiying Shen, University of Arkansas, USA Adaptive Buffer Management for Efficient Code Dissemination in Multi‐Application Wireless Sensor Networks
Weijia Li1, Yu Du1, Youtao Zhang1, Bruce Childers1, Ping Zhou2, Jun Yang2
1Computer Science Department, University of Pittsburgh, USA 2Electric and Computer Engineering Department, University of Pittsburgh, USA
Quorum‐Based Energy Saving MAC Protocol Design for Wireless Sensor Networks Chih-Min Chao, Yi-Wei Lee
Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan An Energy‐Efficient Waiting Caching Algorithm in Wireless Sensor Networks Junfeng Xu, Keqiu Li, YanMing Shen, Jian Liu
Department of Computer Science and Engineering, Dalian University of Technology, China A Grid‐Based Distributed Multi‐Hop Routing Protocol for Wireless Sensor Networks Wenjun Liu1, Yue Sun1, Jiguo Yu2, Baoxiang Cao2
1City College, Wenzhou University, China 2School of Computer Science, Qufu Normal University, China
EUC‐6B: Multi‐Agent Systems 08:30 – 10:10am, Function Room 7 Session Chair: Xinfeng Ye, Auckland University, New Zealand Dynamic Substitutability Analysis of Web Service Composition via Extended π‐Calculus Jin-dian Su1, Shan-shan Yu2, He-qing Guo1
1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China
Efficient Self‐Healing Key Distribution with Limited Group Membership for Communication‐Constrained Networks
Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang
School of Computer Science, Fudan University, China An Empirical Study on Interoperability between Service Discovery Protocols Beihong Jin, Zhi Zang, Liang Zhang
Institute of Software, Chinese Academy of Sciences, China A Reasonable Approach for Defining Load Index in Parallel Computing Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng
Computer Science and Engineering Department, Shanghai Jiao Tong University, China
Coffee Break (10:10 – 10:30am)
EUC‐7A: Middleware and Peer‐to‐Peer 10:30 – 12:10pm, Function Room 4&5 Session Chair: Xiaobo Zhou, University of Colorado, USA Load Balancing in Peer‐to‐Peer Networks Based on Sampling System States Hung-Chang Hsiao, I-Ta Lin, Hao Liao
Department of Computer Science and Information Engineering, National Cheng-Kung University, Taiwan The Effect of Routing‐Load Dispersion on Congestion Control in Structured P2P Networks Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu
Department of Computer Science, Nankai University, China AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication Liang Zhang1, Beihong Jin1, Jiannong Cao2
1Technology Center of Software Engineering, Institute of Software, China 2Department of Computing, The Hong Kong Polytechnic University, Hong Kong
A Self‐configuring Personal Agent Platform for Pervasive Computing Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu
Department of Computing, Hong Kong Polytechnic University, Hong Kong
EUC‐7B: Embedded Software Optimization II 10:30 – 12:10pm, Function Room 7 Session Chair: Tei‐Wei Kuo, National Taiwan University A Light Lock Management Mechanism for Optimizing Real‐Time and Non‐Real‐Time Performance in Embedded Linux
Maobing Dai1, Toshihiro Matsui2, Yutaka Ishikawa3
1Graduate School of Information Science and Technology, The University of Tokyo, Japan 2National Institute of Advanced Industrial Science and Technology, Japan 3Yutaka Ishikawa Graduate School of Information Science and Technology, The University of Tokyo, Japan
Design and Optimization of a Java Ahead‐of‐Time Compiler for Embedded Systems Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae
School of Electrical Engineering and Computer Science, Seoul National University, Korea Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller Chantana Phongpensri, K. Sripanomwan
Department of Computing, Faculty of Science, Silpakorn University, Thailand
Control‐Flow Checking Using Branch Instructions Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali
Dependable System Laboratory, Sharif University of Technology, Iran Lunch (12:10 – 13:30pm)
EUC‐8A: Wireless Networks II 13:30 – 15:10pm, Function Room 4&5 Session Chair: Guihai Chen, Nanjing University, China RADAR: Rate‐Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi‐Rate Wireless Networks
Liqiang Zhang1, Yu-Jen Cheng1, Xiaobo Zhou2
1Department of Computer & Information Sciences, Indiana University South Bend, USA 2Department of Computer Science, University of Colorado at Colorado Springs, USA
A Hybrid Anti‐Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption
Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu
School of Microelectronics, Shanghai Jiao Tong University, China Rule‐Based WiFi Localization Methods Qiuxia Chen1, Dik-Lun Lee1, Wang-Chien Lee2
1Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong 2Computer Science and Engineering, The Pennsylvania State University, University Park, USA
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks
Yuanyuan Zhang1, Dawu Gu1,2, Bart Preneel2
1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2ESAT-COSIC, Katholieke Universiteit Leuven (KUL), Belgium
EUC‐8B: Real‐Time and Cyber‐Physical Systems II 13:30 – 15:10pm, Function Room 7 Session Chair: Wenbin Jiang, Huazhong University of Science and Technology, China Performance Comparison of Techniques on Static Path Analysis of WCET Mingsong Lv1, Zonghua Gu2, Nan Guan1, Qingxu Deng1, Ge Yu1
1Northeastern University, China 2Hong Kong University of Science and Technology, Hong Kong
Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato
Department of Information Systems Design, Doshisha University, Japan
TRAcME: Temporal Activity Recognition Using Mobile Phone Data Driss Choujaa, Naranker Dulay
Department of Computing, Imperial College London, UK Adaptive Drowsy Cache Control for Java Applications
Sun Yu, Wei Zhang
Department of Electrical and Computer Engineering, Southern Illinois University, USA Coffee Break (15:10 – 15:30pm)
EUC‐9A: Network Protocols II 15:30 – 16:50pm, Function Room 4&5 Session Chair: Hung‐Chang Hsiao, National Cheng‐Kung University, Taiwan Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing
Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi
Computer Engineering Department, Iran University of Science & Technology, Iran Hierarchical Cluster‐Based Irregular Topology Customization for Networks‐on‐Chip Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng
Department of Electronic Engineering, Tsinghua University, China Design and Analysis of a Stable Queue Control Scheme for the Internet Naixue Xiong1,2, Laurence T. Yang3, Yaoxue Zhang4, Yuezhi Zhou4, Yingshu Li2
1Department of Computer Science, Wuhan University of Science and Engineering, China 2Computer Science, Georgia State University, USA 3Department of Computer Science, St. Francis Xavier University, Canada 4Department of Computer Science & Technology, Tsinghua University, China
EUC‐9B: Multimedia and Data Management II 15:30 – 16:50pm, Function Room 7 Session Chair: Meilin Liu, Wright State University, USA Lossless Data Hiding Based on Histogram Modification for Image Authentication Chin-Chen Chang1,2, Wei-Liang Tai2, Kuo-Nan Chen2
1Department of Information Engineering and Computer Science, Feng Chia University, Taiwan 2Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
A New Proxy Scheme for Large‐Scale P2P VoD System Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao
School of Computer Science and Technology, Huazhong University of Science and Technology, China
A Signature‐based Grid Index Design for RFID Main‐Memory Databases Rong-Jhang Liao1, Pei-Lun Suei1, Yung-Feng Lu1, Tei-Wei Kuo1,2, Chun-Sho Lee3
1Department of Computer Science and Information Engineering, National Taiwan University, Taiwan 2Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 3Innovative DigiTech-Enabled Application & Services Institute, Institute for Information Industry, Taiwan
EUC Workshops
The 1st IEEE/IFIP International Workshop on End‐User Virtualization (EUV’08) Wednesday, 17 December, 2008
Session 1 Chair: Xiaofei Liao 09:00 – 10:30am, Function Room 3
A Framework to Evaluate and Predict Performances in Virtual Machines Environment Deshi Ye, Qinming He, Hua Chen, Jianhua Che
College of Computer Science, Zhejiang University, China
Performance Measuring and Comparing of Virtual Machine Monitors Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang
College of Computer Science, Zhejiang University, China
An Optimized COW Block Device Driver in VMM for Fast, On‐Demand Software Deployment Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang
School of Computer, National University of Defense Technology, China
Analysis and Enhancement for Interactive‐Oriented Virtual Machine Scheduling Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng
Microprocessor Research and Development Center, Peking University, China
Coffee Break (10:30 – 11:00am)
Session 2 Chair: Xiaofei Liao 11:00 – 12:30pm, Function Room 3
DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao
School of Computer, National University of Defense Technology, China
A Novel Virtual Grid Experiment Method in MedImGrid Ran Zheng, Xiaofei Liao, Hai Jin
Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, China
VirtualCluster: Customizing the Cluster Environment through Virtual Machines Kang Chen, Jun Xin, Weimin Zheng
Department of Computer Science and Technology, Tsinghua University, China
Session 2 (Continued) Chair: Xiaofei Liao 11:00 – 12:30pm, Function Room 3
Allocating Resource in Grid Workflow Based on State Prediction Jiong Yu1,2, Guo-Zhong Tian1,3, Ling Cheng1,3
1School of Information Science and Engineering, Xinjiang University, China 2School of Computer Science and Technology, Beijing Institute of Technology, China 3Department of Computer Engineering, Xinjiang Polytechnic College, China
Cooperative Problem Solving Process Based on MAS_NP Model Yan-bin Peng1, Bei-shui Liao2, Ji Gao3, Jun Hu4, Cun-hao Wang3, Jie-Qing Ai3, Hang Guo3
1School of Information and Electronic Engineering, Zhejiang University of Science and Technology, China 2Center for the Study of Language and Cognition, Zhejiang University, China 3College of Computer Science, Zhejiang University, China 4College of Computer Science, Hunan University, China
The 3rd IEEE/IFIP International Workshop on Embedded Software Optimization (ESO’08) Wednesday, 17 December, 2008
Session 1 Chair: Meikang Qiu 13:30 – 16:00pm, Function Room 3
UCaS: A Schedulability Analysis Tool for AADL Models Shenglin Gui1, Lei Luo1, Qian Liu2, Fulei Guo2, Shaopeng Lu2
1School of Computer Science and Engineering, University of Electronic Science and Technology of China 2Research & Development Center, Coretek Systems, China
A GA‐based Systematic Message Scheduling Method for Time‐Triggered CAN Shan Ding, Zhiqiang Xie, Xiaona Yin
College of Information Science and Engineering, Northeastern University, China
Reducing Context Switch Overhead with Compiler‐Assisted Threading Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö
Department of Computer Systems, Tampere University of Technology, Finland
Research and Design of Shared Resources Competition Solution among Hardware‐Software Tasks based on Unified Scheduling
Bing Guo1, Yan Shen2, Lei Zhang1, Xiang Zhou1
1School of Computer Science & Engineering, SiChuan University, China 2University of Electronic Science & Technology of China
A Tiny Processing System for Education and Small Embedded Systems on the FPGAs Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito
Department of Information Engineering, Hiroshima University, Japan
Object Placement for Fully Associative Cache Chun-Chieh Lin, Chuen-Liang Chen
Department of Computer Science and Information Engineering, National Taiwan University, Taiwan
Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi‐core Processor Simulator
Kai Zheng, Yongxin Zhu, Jun Xu
School of Microelectronics, Shanghai Jiao Tong University, China
Coffee Break (16:00 – 16:30pm)
The 4th IEEE/IFIP International Symposium on Security for Ubiquitous Computing (SECUBIQ’08)
Wednesday, 17 December, 2008
Session 1 Chair: Deqing Zou 16:30 – 17:30pm, Function Room 3
Simple Certificateless Signature with Smart Cards Kazumasa Omote1, Atsuko Miyaji1, Kazuhiko Kato2
1School of Information Science, Japan Advanced Institute of Science and Technology (JAIST), Japan 2Department of Computer Science, Graduate School of ISE, University of Tsukuba, Japan
Efficient ID‐based Threshold Ring Signature scheme Jiang Han, Xu QiuLiang, Chen Guohua
School of Computer Science and Technology, Shan Dong University, China
(In)Security of Efficient Tree‐Based Group Key Agreement Using Bilinear Map Raphael C.-W. Phan1, Bok-Min Goi2
1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia
The 2nd IEEE/IFIP International Workshop on Ubiquitous Underwater Sensor Network (UUWSN’08)
Wednesday, 17 December, 2008
Welcome speech 09:00 – 09:10am, Function Room 1&2
Session 1: Applications Chair: Dongwon Jeong 09:10 – 10:30am, Function Room 1&2
Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech Communication
Hyung-jun Ju, Se-young Kim, Jung-woo Han, Ki-man Kim, Seok-yeb Kang
Department of Radio Communication Engineering, Korea Maritime University, Korea
Research on the Encrypted Data Access Control of Multi‐purpose Asynchronous WSN Qian Sun, Shanqing Guo, Qiuliang Xu
College of Computer Science and Technology, Shandong University, China
ELM‐MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC Protocol
Phil-Jung Yun, Changhwa Kim, Sangkyung Kim
Department of Computer Science & Engineering, Kangnung National University, Korea
Omnet++ Based Simulation for Underwater Environment Soo Young Shin, Soo Hyun Park
School of Business Information Technology, Kookmin University, Korea
Coffee Break (10:30 – 11:00am) Keynote Speech: Revolution for the Water World: Underwater Wireless Networked Sensing Jun‐Hong Cui, Department of Computer Science & Engineering, University of Connecticut, USA
11:00 – 12:30pm, Function Room 1&2
Lunch (12:30 – 13:30pm)
Session 2: Protocols/Systems
Chair: Young‐Sik Jeong 14:00 – 15:30pm, Function Room 1&2
Point‐to‐Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor Networks
Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park
Department of Electrical Engineering, Kangnung National University, Korea
Energy‐Efficient Routing Protocol in Underwater Acoustic Sensor Networks Heungwoo Nam, Sunshin An
Department of Electronics Engineering, Korea University, Korea
Session 2: Protocols/Systems (Continued)
Chair: Young‐Sik Jeong 14:00 – 15:30pm, Function Room 1&2
Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks Trong Hung Nguyen, Soo Young Shin, Soo Hyun Park
Graduate School of Business Information Technology, Kookmin University, Korea
Scalable Uniformly‐Distributed Clustering Mechanism for Sensor Networks Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim
Department of Computer Science & Engineering, Kangnung National University, Korea
Coffee Break (15:30 – 16:00pm)
The IEEE/IFIP International Workshop on Ubiquitous Wireless Multihop Networking (UWMN’08)
Wednesday, 17 December, 2008
Session 1 Chair: Song Guo 16:00 – 17:30pm, Function Room 1&2
On‐Demand Deployment Algorithm for a Hybrid Sensor Network Liang-Cheng Shiu1, Chao-Yang Lee2, Tian-Wen Song3,4, Chu-Sing Yang2
1Department of Information Technology, National Pingtung Institute of Commerce, Taiwan 2Department of Electrical Engineering, National Cheng Kung University, Taiwan 3Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 4Department of Applied Internet Science, Hsing Kuo University, Taiwan
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks Mianxiong Dong1, Gongwei Zhang2, Kaoru Ota1,3, Song Guo1, Minyi Guo1,2
1School of Computer Science and Engineering, The University of Aizu, Japan 2Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 3Department of Computer Science, Oklahoma State University, USA
A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols Jiangwei Zhou, Boqin Feng, Gangqiang Wei
The School of Electronic and Information Engineering, Xi’an Jiaotong University, China
Route Stability in Wireless Mesh Access Networks Usman Ashraf, Slim Abdellatif, Guy Juanole
University of Toulouse, France
A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network Hao Xu, Dejun Mu
Institute of Controls and Networks, School of Automation, Northwestern Polytechnical University, China
The 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems (NCUS’08) Wednesday, 17 December, 2008
Session 1 Chair: Jeffrey Fan 09:00 – 10:30am, Function Room 7
A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks Tian-Wen Song1,2, Chu-Sing Yang3
1Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 2Department of Applied Internet Science, Hsing Kuo University, Taiwan 3Department of Electrical Engineering, National Cheng Kung University, Taiwan
CayleyChord: A Novel P2P Overlay Network Wenjun Xiao1, Mingxin He1,2, Wenhong Wei1
1Department of Computer Science, South China University of Technology, China 2Department of Computer Science, Jinan University, China
Improving BitTorrent Network's Performance via Deploying Helpers Ke Xu1, Yahui Yang2, Tao Chen1
1Department of Computer Science and Technology, Tsinghua University, China 2School of Software and Microelectronics, Peking University, China
Adaptive Load Balancing for Lookups in Heterogeneous DHT Zhi Chen, Guowei Huang, JingDong Xu, Yang Yang
Department of Computer Science, Nankai University, China
The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM Networks
Simone Cintra Chagas1, Eber Huanca Cayo2, Koji Nakano3, Jacir Luiz Bordim4
1School of Electrical Engineering , Faculty of Technology, University of Brasília, Brazil 2School of Mechanic Engineering, Faculty of Technology, University of Brasília , Brazil 3Department of Information Engineering, School of Engineering, Hiroshima University , Japan 4Department of Computer Science , Campus Universitario - Asa Norte, University of Brasília, Brazil
Coffee Break (10:30 – 11:00am)
Session 2 Chair: Huan Li 11:00 – 12:30pm, Function Room 7
The Analysis and Simulation of a Hybrid Video Broadcast Architecture He Lei, Ma Xiangjie, Zhang Weili, Guo Yunfer, Ma Hailong
China National Digital Switching System Engineering and Technology Research Center (NDSC)
Session 2 (Continued) Chair: Huan Li 11:00 – 12:30pm, Function Room 7
On the Impact of DoS Attacks on Secure Service Discovery Slim Trabelsi1, Guillaume Urvoy-Keller2, Yves Roudier2
1SAP Labs France, France; 2Institute Eurecom, France
MAC Layer Misbehavior on Ad Hoc Networks Nicole R. Nagel1, Ruzbeh Shokranian1, Jacir L. Bordim1, K. Nakano2
1Department of Computer Science, University of Brasilia, Brazil 2Department of Information Engineering, School of Engineering, Hiroshima University, Japan
CSON‐D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking
Dineshbalu Balakrishnan1, Amiya Nayak1, Pulak Dhar2
1School of Information Technology and Engineering, University of Ottawa, Canada; 2Cistech Limited, Ottawa, Canada
Communications via Systems‐on‐Chips Clustering in Large‐Scaled Sensor Networks Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar
Department of Electrical and Computer Engineering, Florida International University, USA
Lunch (12:30 – 13:30pm)
Session 3 Chair: Koji Nakano 13:30 – 15:00pm, Function Room 7
Discovery Architecture for the Tracing of Products in the EPCglobal Network Gyeongtaek Lee, Jonghun Shin, Daewon Park, Hyukchul Kwon
Department of Computer Science & Engineering, Pusan National University, Korea
A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment Qi Liu, Nigel Linge
Informatics Research Institute, University of Salford, UK
Analysis of Web Service Substitutability Based on Typed Pi‐Calculus Su Jin-dian1, Yu Shan-shan2, Guo He-qing1
1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China
Session 3 (Continued) Chair: Koji Nakano 16:00 – 17:30pm, Function Room 4&5
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks Yu Huang1,2, Bo Liu2, Xianping Tao1,2, Jiannong Cao3, Beihong Jin4
1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Internet and Mobile Computing Lab, Department of Computing, Hong Kong Polytechnic University, China 4Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China
A Context Management System for Supporting Context‐Aware Applications Eunhoe Kim, Jaeyoung Choi
School of Computing, Soongsil University, Korea
Tutorial: Multi‐core Supported Security Systems for Embedded and Ubiquitous Applications
Wanlei Zhou and Yang Xiang 15:10 – 18:00pm, Function Room 7
The 3rd IEEE/IFIP International Workshop on Trustworthiness, Reliability and services in Ubiquitous and Sensor neTworks (TRUST’08)
Wednesday, 17 December, 2008
Opening and Keynote Speech: Data Mining for Malicious Code Detection and Security Applications
Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, USA
Chair: Stephen S. Yau, Co‐chair, TRUST 2008, and Arizona State University, USA 09:00 – 10:30am, Function Room 4&5 Coffee Break (10:30 – 11:00am)
Session 1: Data Mining, Security and Trust Computing
Chair: Jia Zhang, Iowa State University, USA 11:00 – 12:30pm, Function Room 4&5
Mean‐Variance Model for International Portfolio Selection Qiming Pan, Xiaoxia Huang
School of Economics and Management, University of Science and Technology, China
Attacks on Improved Key Distribution Protocols with Perfect Reparability Raphael C.-W. Phan1, Bok-Min Goi2
1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation Omar Hasan1, Jean-Marc Pierson2, Lionel Brunie1
1Institut National des Sciences Appliquées de Lyon, France; 2Institut de Recherche en Informatique de Toulouse, France
A Trusted Third Party Based Secure Authentication Scheme of E‐Commerce Longjun Zhang, Zou Tao
Department of Communication Engineering, Engineering College of Armed Police Force, China
Lunch (12:30 – 13:30pm)
Session 2: Trust, Service Computing and Management
Chair: Jen‐Marc Pierson, IRIT, France 14:00 – 15:30pm, Function Room 4&5
Probabilistic Trust Management in Pervasive Computing Mieso K. Deno, Tao Sun
Department of Computing and Information Science, University of Guelph, Canada
Session 2: Trust, Service Computing and Management (Continued)
Chair: Jen‐Marc Pierson, IRIT, France 14:00 – 15:30pm, Function Room 4&5
Discovering the Most Trusted Agents without Central Control Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki
Polish-Japanese Institute of Information Technology, Poland
A Mobile Agent‐Supported Web Services Testing Platform Jia Zhang, Di Xu
Department of Computer Science, Northern Illinois University, USA
Large‐Scale USN Middleware Based on Context‐Aware Won-Hee Han1, Sung-Won Kim1, Sun-Mi Park1, Chang-Wu Lee1, Jong-hyuk Park2, Young-Sik Jeong1
1Department of Computer Engineering, Wonkwang University, Korea 2Department of Computer Science and Engineering, Kyungnam University, Korea
Coffee Break (15:30 – 16:00pm)
Session 3: Panel: Grand Challenges in Ubiquitous and Sensor Networks
Chair: Stephen S. Yau, Arizona State University, USA
16:00 – 17:30pm, Function Room 4&5
Panelists: Jungde Cheng, Saitama University, Japan Bhavani Thuraisingham, University of Texas at Dallas, USA Min-You Wu, Shanghai Jiao Tong University, China
The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP’08)
Thursday, 18 December, 2008
Opening Ceremony 10:00 – 10:30am, Function Room 1&2 Chair: Guojun Wang, Central South University, China Keynote Speech: Building Trustworthy Semantic Webs Bhavani Thuraisingham, The University of Texas at Dallas, USA
Chair: Wenbin Luo, St. Mary's University, San Antonio, Texas, USA
10:30 – 11:30am, Function Room 1&2
Session 1: Secure Schemes and Metrics
Chair: Sancheng Peng, City University of Hong Kong
11:30 – 12:30pm, Function Room 1&2
Voting‐Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks
Sancheng Peng1,2, Weijia Jia1,3, Guojun Wang1
1School of Information Science and Engineering, Central South University, China 2School of Computer and Communication, Hunan University of Technology, China 3Department of Computer Science, City University of Hong Kong, Hong Kong
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks
YaHui Li1, DingYong2, JianFeng Ma1
1Ministry of Education Key, Laboratory of Computer Networks and Information Security, Xidian University, China 2School of Mathematics and Computational Science, Guilin University of Electronic Technology, China
A Sanitizing Signature Scheme with Indexing Atsushi Koide1, Raylin Tso2, Eiji Okamotov1
1University of Tsukuba, Japan; 2National Chengchi University, Taiwan
Error Detection Schemes for CED in Block Ciphers Ewa Idzikowska, Krzysztof Bucholc
Poznaʼn University of Technology, Poland
Lunch (12:30 – 13:30pm)
Session 2: Trust Management and Privacy Protection I
Chair: Wenbin Luo, St. Mary’s University 14:50 – 16:10pm, Function Room 1&2
An Impact‐Oriented Metric for Interference to Network Routing Song Huang, Lie-Gen Liu
South China University of Technology, China
User‐Directed Privacy Protection in the Ubiquitous Environment JaeHun Lee, JinKyu Park, SangWook Kim
Kyungpook National University, Korea
Provably Secure Trusted Access Protocol for WLAN Mesh Networks Zhuo Ma1, Jianfeng Ma2, Yulong Shen2
1School of Computer Science, Xidian University, China 2Key Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, China
Towards Trustworthy and Secure Kiosk Computing for Mobile Users Dong Zhou, Hiroshi Inamura
DoCoMo USA Labs, USA
Automatic Generation and Enforcement of Security Contract for Pervasive Application Ying Jin, Zepeng Li, Da Wei, Lei Liu
College of Computer Science and Technology, Jilin University
Exponential Hashing in Finite Fields Wenbin Luo1, Gregory Heileman2
1Engineering Department, St. Mary’s University, USA 2Department of Electrical & Computer Engineering, University of New Mexico, USA
Research of a Multi‐dimension Measurement Trusting Model Based on Markov Chain Hongyan Mao, Yixiang Chen
Software Engineering Institute of East China Normal University, China
Coffee Break (16:10 – 16:20pm)
Session 3: Trust Management and Privacy Protection II
Chair: Jarrod Trevathan, James Cook University 16:20 – 17:50pm, Function Room 1&2
Defending against the Propagation of Active Worms Xiang Fan1, Yang Xiang1,2
1School of Management and Information Systems, Central Queensland University, Australia 2Centre for Intelligent and Networked Systems, Central Queensland University, Australia
Convertible Undeniable Partially Blind Signature from Bilinear Pairings Atsushi Koide1, Raylin Tso2, Eiji Okamoto1
1University of Tsukuba, Japan 2National Chengchi University, Taiwan
Analyzing Privacy Designs of Mobile Social Networking Applications Guanling Chen, Faruq Rahman
Department of Computer Science, University of Massachusetts Lowell, USA
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology
Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang
National Digital Switching System Engineering & Technology Research Center, China
Privacy Engine for Context‐Aware Enterprise Application Services Marion Blount1, John Davis2, Maria Ebling1, William Jerome1, Barry Leiba1, Xuan Liu1, Archan Misra1
1IBM T J Watson Research Center; 2Ling Fling, Inc., USA
The Trustworthiness Based on Hash Chain in Wireless Sensor Network Xiong Peng1,2, Zhang Wei1
1Department of Computer Science and Technology, East China Normal University, China 2Department of Computer Science and Technology, Nanchang Hangkong University, China
Trust Similarity Measure in Trust Model for P2P Networks Yizhi Ren1,2, Mingchu Li1, Cheng Guo1, Yongrui Cui1, Kouichi Sakurai2
1School of Software, Dalian University of Technology, China 2Department of Computer Science and Communication Engineering, Kyushu University, Japan
The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP’08)
Friday, 19 December, 2008
Session 4: Encryption and Decryption I
Chair: Chien‐Pen Chuang, National Taiwan Normal University
10:30 – 12:10pm, Function Room 1&2
Distance Bounding Protocol for Multiple RFID Tag Authentication Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu
Department of Information Systems and Operations Management, University of Florida, USA
Encryption and Decryption with Space Transformation for Bi‐directional Association Chien-Pen Chuang1, Tin-Ying Huang2, Li-Chi Yeh3
1Department of Applied Electronic, Technology, National Taiwan, Normal University Taipei, Taiwan 2Department of Mechatronic, Technology, National Taiwan, Normal University Taipei, Taiwan 3Department of Industrial, Education, National Taiwan, Normal University Taipei, Taiwan
Cryptanalysis of Li et al.’s Identity‐Based Threshold Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Theoretical Computer Science Laboratory, Indian Institute of Technology Madras, India
Online Signature Verification Algorithm Using Hill‐Climbing Method Daigo Muramatsu
Department of Electrical and Mechanical Engineering, Seikei University, Japan
Converters for Designing Applied Cryptographic Protocols Zhao Huawei1, Qin Jing2, Fang Zhifeng3
1School of Computer and Information Engineering, Shandong University of Finance, China 2School of Mathematics and System Sciences, Shandong University, China 3Information Science and Technology, Shandong Institute of Political Science and Law, China
A Novel Self‐Renewal Hash Chain and Its Implementation Haojun Zhang1, Xiaoxue Li2, Rui Ren1
1Henan University of Technology, China; 2Agricultural Bank of China, China
Lunch (12:10 – 13:30pm)
Session 5: Encryption and Decryption II
Chair: Feilong Tang, Shanghai Jiao Tong University, China
13:30 – 15:10pm, Function Room 1&2
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database Tae Youn Won, Ji Young Chun, Dong Hoon Lee
Graduate School of Information Management and Security, Korea University, Korea
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework
Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li
Towards Successive Privacy Protection in Sensor Networks Baokang Zhao1,2, Dan Wang2, Zili Shao2, Jiannong Cao2, Keith C.C. Chan2, Jinshu Su1, Yanqin Yang3
1School of Computer Science, National University of Defense Technology, China 2Department of Computing, Hong Kong Polytechnic University, China 3Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Markov Model‐Based Handwritten Signature Verification Alan McCabe, Jarrod Trevathan
School of Mathematics, Physics and Information Technology, James Cook University, Australia
An Efficient RFID Authentication Protocol for Low‐Cost Tags Yanfei Liu
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China
Trustworthy Semantic Web Technologies for Secure Knowledge Management Bhavani Thuraisingham, Pranav Parikh
Department of Computer Science, The University of Texas at Dallas Richardson, USA
Coffee Break (15:10 – 15:30pm)
Session 6: Key Management
Chair: Huawei Zhao, Shangdong University of Finance, China
15:30 – 17:10pm, Function Room 1&2
An Improved Password‐Based Authenticated Key Agreement Scheme for Pervasive Applications Maw-Jinn Tsaur1, Wei-Chi Ku2, Hao-Rung Chung3
1Graduate Institute of Applied Science and Engineering, Fu Jen Catholic University, Taiwan 2Department of Computer and Information Science, National Taichung University, Taiwan 3Department of Computer Science and Information Engineering, Fu Jen Catholic University, Taiwan
Efficient Client‐to‐Client Password Authenticated Key Exchange Yanjiang Yang, Feng Bao, Robert H. Deng
Institute for Infocomm Research, Singapore
A Self‐Healing and Mutual‐Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks
Biming Tian, Song Han, Tharam S. Dillon
Digital Ecosystems and Business Intelligence Institute, Curtin University of Technology, Australia
Research on Pairwise Key Establishment for Cluster Heads in Sensor Networks Li Ping, Wu Jia-ying, Xue Jing-ming
College of Computer and Telecommunications, Changsha University of Science and Technology, China
A Key Management Scheme for Cluster Based Wireless Sensor Networks Reza Azarderakhsh, Arash Reyhani-Masoleh, Zine-Eddine Abid
Department of Electrical and Computer Engineering, The University of Western Ontario, Canada
Key Management for Wireless Sensor Networks Using Trusted Neighbors Xue Yuan1, Helmut Jürgensen1, Reza Azarderakhsh2, Arash Reyhani-Masoleh2
1Department of Computer Science, The University of Western Ontario, Canada 2Department of Electrical and Computer Engineering, The University of Western Ontario, Canada
An Improved Key Management Scheme for WEP Zhang Longjun, Zou Tao
Department of Communication Engineering, Engineering College of Armed Police Force, China
The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP’08)
Saturday, 20 December, 2008
Session 7: Access Control and Anonymity
Chair: Xuan Liu, IBM T.J. Watson Research Center 8:30 – 10:10am, Function Room 1&2
Property Verification for Generic Access Control Models Vincent C. Hu1, D. Richard Kuhn1, Tao Xie2
1National Institute of Standards and Technology, USA; 2North Carolina State University, USA
ALHACF: An Anonymity‐Level Selected Hierarchical Anonymous Communication Framework Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang
School of Computer Science, National University of Defense Technology, China
Pool‐Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real‐Time Condition
Minh-Triet Tran1, Thanh-Trung Nguyen1, Isao Echizen2
1University of Science, Vietnam; 2National Institute of Informatics, Japan
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy
Yue Zhang, James B.D. Joshi
University of Pittsburgh, USA
Identity Privacy Protection by Delayed Transmission in Pocket Switched Networks Xiaofeng Lu1, Pan Hui2, Pietro Lio2, Zhang Xiong1
1College of Computer Science, Beijing University of Aeronautics and Astronautics, China 2Computer Laboratory, University of Cambridge, UK
A Domain‐Oriented Approach for Access Control in Pervasive Environments Jun Li1, Bruce Christianson2
1Security & Privacy, Enterprise Risk Service, UK 2School of Computer Science, University of Hertfordshire, UK
Using Context Quality Indicators for Improving Context‐Based Access Control in Pervasive Environments
José Bringel Filho, Hervé Martin
Laboratory of Informatics of Grenoble, Grenoble University, France Coffee Break (10:10 – 10:30am)
Session 8: Security and Privacy in Wireless Networks
Chair: Guanling Chen, University of Massachusetts Lowell, USA
10:30 – 12:10pm, Function Room 1&2
Trusted Spanning Tree for Delay Tolerant MANETs A. Piyatumrong1, P. Bouvry1, F. Guinand2, K. Lavangnananda3
1Universit´e du Luxembourg, FSTC - CSC, Luxembourg 2Le Havre University, France 3King Mongkut’s University of Technology Thonburi, School of Information Technology, Thailand
Scalable and Secure Routing for Large‐Scale Sensor Networks Feilong Tang1,2, Minyi Guo1,2, Minglu Li1, Zhijun Wang3, Zixue Cheng2
1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2School of Computer Science and Engineering, The University of Aizu, Japan 3Department of Computing, Hong Kong Polytechnic University, Hong Kong
Securing Wireless Sensor Networks Using Cluster Reformations Gicheol Wang1, Deokjai Choi2, Daewook Kang2
1Research Center for Ubiquitous Information Appliances, Chonnam Nat’l University, Korea 2Division of Electronics and Computer, Chonnam Nat’l University, Korea
Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network Meng Ge1, Kwok-Yan Lam1, Jianbin Li2, Siu-Leung Chung3
1Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, China 2State Administration of Taxation, China 3The Open University of Hong Kong, Hong Kong
HybridS: A Scheme for Secure Distributed Data Storage in WSNs Wei Ren1,2, Yi Ren3, Hui Zhang4
1Department of Computer Science, Zhongnan University of Economics and Law, China 2Department of Electrical Computer Engineering, Illinois Institute of Technology, USA 3Department of Information and Communication Technology, University of Agder (UIA), Norway 4Deptartment of Electronics, Politecnico di Torino, Italy
SARC: A Street‐Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment Hyuncheol Kim, Jungha Paik, Bumhan Lee, Donghoon Lee
Center for Information Security Technology, Korea University, Seoul, Korea
Lunch (12:10 – 13:30pm)
Session 9: Secure Services and Security Analysis
Chair: Zhenyu Wang, National Digital Switching System Engineering & Technology Research Center, China
13:30 – 15:10pm, Function Room 1&2
A Context Based Dynamic Access Control Model for Web Service Chaowang Shang, Zongkai Yang, Qingtang Liu, Chengling Zhao
Research Center for Education Information on Technology, Central China Normal University, China
Secure and Verifiable P2P Card Games Chun-Chao Yeh
Department of Computer Science, National Taiwan Ocean University, Taiwan
Implementation and Evaluation of SIP‐Based Secure VoIP Communication System JoongMan Kim, SeokUng Yoon, HyunCheol Jeong, YooJae Won
IT Infrastructure Protection Division, Applied Security Technology Team, Korea Information Security Agency, Korea
Securing Decentralized Workflows in Ambient Environments Nicolai Kuntze, Julian Schütte
Fraunhofer Institute for Secure Information Technology (SIT), Germany
An Application of Interval Analysis in Software Static Analysis Yawen Wang, Yunzhan Gong, Junliang Chen, Qing Xiao, Zhaohong Yang
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China
A Qualitative Risk Analysis for the GPRS Technology Christos Xenakis1, Danae Apostolopoulou2, Angeliki Panou1, Ioannis Stavrakakis2
1Department of Technology Education and Digital Systems, University of Piraeus, Greece 2Department of Informatics and Telecommunications, University of Athens, Greece