SlideShare une entreprise Scribd logo
1  sur  60
Télécharger pour lire hors ligne
EUC 2008 Program
EUC 2008
The 5th IEEE/IFIP International Conference on Embedded and
Ubiquitous Computing
17-20 December 2008
Shanghai, China




Sponsored by
  Shanghai Jiao Tong University

  Shanghai Computer Society

  IEEE Computer Society


Supported by

  National Natural Science Foundation of China

  Shanghai Pudong New Area Association for Computer

  Foundation of Science & Tech. Development of Shanghai Pudong New Area
EUC 2008
The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
17-20 December 2008, Shanghai, China



                             Contents

  EUC 2008 Conference Schedule at a Glance

  Organization

  Technical Program Committee

  The Map of EUC 2008 Conference Place

  Access Guide to Conference Place

  Reception and Pujiang Cruise

  Banquet

  Lunch

  EUC 2008 Advanced Technical Program

  Tour guide
EUC 2008 Conference Schedule at a Glance

      Wednesday, 17 December 2008 - EUC workshops

         Room        Function                                  Function            Function
                                    Function Room 1&2
      Time           Room 3                                    Room 7             Room 4&5
                                        UUWSN-08                                  TRUST-08
    9:00-9:10
                     EUV-08           Welcome speech           NCUS-08          Opening and
    9:10-10:30                      UUWSN-08 Session 1                         Keynote speech

 10:30-11:00                                      Coffee Break
                                        UUWSN-08                                  TRUST-08
 11:00-12:30         EUV-08                                    NCUS-08
                                      Keynote Speech                               Session 1
 12:30-13:30                                          Lunch
 13:30-14:00
                                                               NCUS-08
 14:00-15:00
                                        UUWSN-08                                  TRUST-08
 15:00-15:10         ESO-08                                   Coffee Break
                                         Session 2                                 Session 2
 15:10-15:30
 15:30-16:00                           Coffee Break            Tutorial 1        Coffee Break
 16:00-16:30       Coffee Break
                                                                                  TRUST-08
 16:30-16:50                            UWMN-08               Coffee Break
                   SECUBIQ-08                                                 Session 3 (Panel)
 16:50-17:30
                                                               Tutorial 2
 17:30-18:00
 18:30-20:00         Supper in Yayuefang Restaurant (100m away from the conference place)


      Thursday, 18 December 2008 - EUC 2008 main conference and TSP-08

       Room                            Function           Function              Function
                 Grand Ballroom
     Time                              Room 4&5               Room 7           Room 1&2
                 EUC-08 Opening
 8:30-9:00
                    Ceremony
                 Keynote Speech I
9:00-10:00
                 (Yaoxue Zhang)
                                                                             TSP-08 Opening
10:00-10:30       Coffee Break
                                                                               Ceremony
                                                                                TSP-08
10:30-11:30                             EUC-08                EUC-08
                                                                             Keynote Speech
                                      Session 1A          Session 1B
11:30-12:10                                                                  TSP-08 Session 1
12:10-12:30
                                                   Lunch
12:30-13:30                                                                  Lunch
              Keynote Speech II
13:30-14:30
              (Tarek Abdelzaher)
14:30-14:50                                                                    Coffee Break
                                               Coffee Break
14:50-15:00                                                                       TSP-08
15:00-16:10                                                                      Session 2
                                        EUC-08              EUC-08
16:10-16:20                                                                    Coffee Break
                                      Session 2A           Session 2B
16:20-16:40
                                                                             TSP-08 Session 3
16:40-17:50
18:00-19:00                          Take bus from hotel to the dock
19:00-21:00                          Reception and Pujiang Cruise


   Friday, 19 December 2008 - EUC 2008 main conference and TSP-08

     Room                              Function             Function             Function
                Grand Ballroom
   Time                               Room 4&5              Room 7              Room 1&2
               Keynote Speech III
 9:00-10:00
               (Xiaodong Zhang)
10:00-10:30                                   Coffee Break
                                        EUC-08              EUC-08                TSP-08
10:30-12:10
                                      Session 3A           Session 3B            Session 4
12:10-13:30                                        Lunch
                                        EUC-08              EUC-08                TSP-08
13:30-15:10
                                      Session 4A           Session 4B            Session 5
15:10-15:30                                                Coffee Break
                                        EUC-08              EUC-08                TSP-08
15:30-17:10
                                      Session 5A           Session 5B            Session 6
17:10-18:30                                            Rest in the hotel
18:30-21:30                                           Banquet in the hotel


   Saturday, 20 December 2008 - EUC 2008 main conference and TSP-08

     Room
                Function room 4&5          Function Room 7              Function room 1&2
   Time
 8:30-10:10      EUC-08 Session 6A        EUC-08 Session 6B               TSP-08 Session 7
10:10-10:30                                   Coffee Break
10:30-12:10      EUC-08 Session 7A        EUC-08 Session 7B               TSP-08 Session 8
12:10-13:30                             Lunch
13:30-15:10   EUC-08 Session 8A   EUC-08 Session 8B   TSP-08 Session 9
15:10-15:30                          Coffee Break
15:30-16:50   EUC-08 Session 9A   EUC-08 Session 9B
Organization

General Chair                    Minyi Guo, Shanghai Jiao Tong Univ., China
Program Chair                    Cheng-Zhong Xu, Wayne State Univ., USA
Program Vice-Chairs
     Embedded Systems Soft-      Jihong Kim, Seoul National Univ., Korea
     ware and Optimization
     Embedded Systems and        Zonghua Gu, Hong Kong Univ. of Science and
     Hard-ware/software
                                 Technology, Hong Kong
     Co-Design
     Cyber-Physical Systems      Oleg Sokolsky, Univ. of Pennsylvania, USA
     Real-time Systems           Albert M. K. Cheng, Univ. of Houston, USA
     Power Aware Computing       Gang Quan, Univ. of South Carolina, USA
     Network Protocols           Sherali Zeadally, Univ. of the District of Columbia, USA
     Wireless Networks           Ivan Stojmenovic, Univ. of Ottawa, Canada
     Sensor Networks             Loren Schwiebert, Wayne State Univ., USA
     Context Aware Mobile        Jiannong Cao, Hong Kong Polytechnic Univ., HK
     Computing
     Agent and Distributed       Wentong Cai, Nanyang Technological Univ., Singapore
     Computing
     Middleware and P2P          Chung-Ta King, National Tsing Hua Univ., Taiwan
     Multimedia and      Data    Xiaobo Zhou, Univ. of Colorado, USA
     Management
     Security   and      Fault   Makoto Takizawa, Tokyo Denki Univ., Japan
     Tolerance
Workshop Chairs                  Zhijun Wang, Hong Kong Polytechnic Univ., Hong Kong
                                 Dakai Zhu, Univ. of Texas at San Antonio, USA
Publicity Chairs                 Ben A. Abderazek, Univ. of Aizu, Japan
                                 Wenbin Jiang, Huazhong Univ. of Science and

                                 Technology, China

Publication Chair
                                 Yu Hua, Huazhong Univ. of Science and Technology,

                                 China

Local Arrangement Chairs         Feilong Tang, Shanghai Jiao Tong Univ., China
                                 Minqi Zhang, Shanghai Computer Society, China
                                 Jingyu Zhou, Shanghai Jiao Tong Univ., China
                                 Yao Shen, Shanghai Jiao Tong Univ., China
Yanqin Yang, East China Normal Univ., China




Technical Program Committee



Jemal Abbawajy         Deakin University, Australia
Kemal Akkaya           Southern Illinois University, USA
Stefan Andrei          Lamar University, USA
David Atienza          Complutense University of Madrid, Spain
Neil Audsley           University of York, UK
Hakan Aydin            George Mason University, USA
Iain Bate              University of York, UK
Paolo Bellavista       Università di Bologna, Italy
Lim Hock Beng          National University of Singapore, Singapore
Miodrag Bolic          University of Ottawa, Canada
Azzedine Boukerche     University of Ottawa, Canada
Stephen Bush           GE Research, USA
Jian Cao               Shanghai Jiaotong University, China
Jean Carle             University of Lille, France
Eduardo Cerqueira      University of Coimbra, Portugal
Chaitali Chakrabarti   Arizona State University, USA
Samarjit Chakraborty   National University of Singapore, Singapore
Alvin T.S. Chan        Hong Kong Polytechnic University, Hong Kong
Rong-Guey Chang        National Chung-Cheng University, Taiwan
Han-Chieh Chao         National Ilan University, Taiwan
Hsi-Lu Chao            National Chiao-Tung University, Taiwan
Ling Teck Chaw         University of Malaya, Malaysia
Guihai Chen            Nanjing University, China
Hongyang Chen          University of Tokyo, Japan
Albert K. Cheng        University of Houston, USA
Reynold Cheng          Hong-Kong Polytechnic University, Hong Kong
Naveen Chilamkurti     LaTrobe University, Australia
Pai Chou                 University of California at Irvine, USA
Sung Woo Chung           Korea University, Korea
Yeh-Ching Chung          National Tsing-Hua University, Taiwan
Stephen Cranefield       University of Otago, New Zealand
Saumitra Das             Purdue University, USA
Qianni Deng              Shanghai Jiaotong University, China
Qingxu Deng              Northeastern University, China
Murat Demirbas           University of Buffalo, USA
Ming Dong                Wayne State University, USA
Junzhao Du               Xidian University, China
Hala Elaarag             Stetson University, USA
Said Elnaffar            United Arab Emirates University, UAE
Sebastian Fischmeister   University of Waterloo, Canada
Eric Fleury              INRIA-INSA Lyon, France
Scott Fowler             Aston University, UK
Song Fu                  University of New Mexico Technology, USA
Satoshi Fujita           Hiroshima   University, Japan
Aniruddha Gokhale        Vanderbilt University, USA
Lin Guan                 Loughborough University, UK
Song Guo                 University of Aizu, Japan
Hani Hagras              University of Essex, UK
Jérôme Härri             Universität Karlsruhe, Germany
Mohamed Hefeeda          Simon Fraser University, Canada
Seongsoo Hong            Seoul National University, Korea
Hung-Chang Hsiao         National Cheng Kung University, Taiwan
Pao-Ann Hsiung           National Chung Cheng University, Taiwan
Ching-Hsien Hsu          Chung Hua University, Taiwan
Kien A. Hua              University of Central Florida, USA
Ray Hunt                 University of Canterbury, New Zealand
Jacek Ilow               Dalhousie University, Canada
Jadwiga Indulska         University of Queensland, Australia
Tohru Ishihara           Kyushu University, Japan
Russ Joseph              Northwestern University, USA
Jehn-Ruey Jiang          National Central University, Taiwan
Beihong Jin              Institute of Software, CAS, China
Soon Ju Kang             Kyung Book National University, Korea
Jung Guk Kim            Hankuk University of Foreign Studies, Korea
Young-Jin Kim           Sun Moon University, Korea
Polychronis Koutsakis   McMaster University, Canada
László Kovács           Hungarian Academy of Science, Hungary
T. John Koo             Shantou University, China
Srdjan Krco             Ericsson, Dublin, Ireland
Mohan Kumar             University of Texas at Arlington, USA
Tei-Wei Kuo             National Taiwan University, Taiwan
Bjorn Landfeldt         University of Sydney, Australia
Peter Langendoerfer     IHP-Microelectronics, Germany
Julia Lawall            University of Copenhagen, Demark
Jaejin Lee              Seoul National University, Korea
Chang-Gun Lee           Seoul National University, Korea
Jenq-Kuen Lee           National Tsing-Hua University, Taiwan
Victor Lee              Hong Kong City University, Hong Kong
Wang-Chien Lee          The Pennsylvania State University, USA
Wonjun Lee              Korea University, Korea
Hong-Va Leong           Hong Kong Polytechnic University, Hong Kong
Clement Leung           Victoria University, Australia
Kuan-Ching Li           Providence University, Taiwan
Xiang-Yang Li           Illinois Institute of Technology, USA
Zhu Li                  Motorola Labs, USA
Qilian Liang            University of Texas at Arlington, USA
Weifa Liang             Australian National University, Australia
Sung-Soo Lim            Kookmin University, Korea
Teck Meng Lim           StarHub Ltd, Singapore
Justin Lipman           Intel, China
Annie Liu               SUNY, Stony Brook, USA
Hai Liu                 University of Ottawa, Canada
Jane Liu                Academia Sinica, Taiwan
Steve Liu               Texas A&M University, USA
Xue Liu                 McGill University, Canada
Yunhao Liu              Hong Kong University of Science and Technology, Hong
                        Kong
Brian Logan             University of Nottingham, UK
Malcolm Low             Nanyang Technological University, Singapore
Luis Loyola             DoCoMo Euro Laboratories, Germany
Zongwei Luo             The University of Hong Kong, Hong Kong
Huadong Ma              Beijing University of Posts & Telecommunications, China
Rupak Majumdar          University of California at Los Angeles, USA
Kami Makki              University of Toledo, USA
Gregorio Martinez       University of Mercia, Spain
Jaime Lloret Mauri      University of Valencia, Spain
Xiaofeng Meng           Renmin University of China, China
Chunyan Miao            Nanyang Technological University, Singapore
Kazuhiro Minami         University of Illinois at Urbana-Champaign, USA
Vincent John Mooney     Georgia Institute of Technology, USA
Farid Nait-Abdesselam   University of Sciences and Technologies of Lille, France
Joseph K. Ng            Hong Kong Baptist University, Hong Kong
Alex Nicolau            University of California at Irvine, USA
Ertan Ozturk            Zonguldak Karaelmas University, Turkey
Christian Poellabauer   University of Notre Dame, USA
Raj Rajkumar            Carnegie Mellon University, USA
Binoy Ravindran         Virginia Tech, USA
John Regehr             University of Utah, USA
Shangping Ren           Illinois Institute of Technology, USA
Ayad Salhieh            Jordan University of Science and Technology, Jordan
Shivakumar Sastry       University of Akron, USA
Sahra Sedigh            University of Missouri - Rolla, USA
Sudhanshu K. Semwal     University of Colorado at Colorado Springs, USA
Lui Sha                 University of Illinois at Urbana-Champaign, USA
Li Shang                Queen's University, Canada
Zili Shao               Hong Kong Polytechnic University, Hong Kong
Haiying Shen            University of Arkansas, USA
Michael Sheng           University of Adelaide, Australia
Weisong Shi             Wayne State University, USA
Yuanchun Shi            Tsinghua University, China
Daniel Shih             National Taiwan University, Taiwan
Timothy Shih            Tamkang University, Taiwan
Dongkun Shin            SungKyunKwan University, Korea
Sang Son                University of Virginia, USA
Jack Stankovic          University of Virginia, USA
Robert James Steele   University of Technology, Sydney, Australia
Limin Sun             Chinese Academy of Sciences, China
Niranjan Suri         Institute of Human and Machine Cognition, USA
Yasuyuki Tahara       National Institute of Informatics, Japan
David Tanier          Monash University, Australia
Xueyan Tang           Nanyang Technological University, Singapore
Xianping Tao          Nanjing University, China
Yong Meng Teo         National University of Singapore, Singapore
Georgios K.           University of Birmingham, UK
Theodoropoulos
Lothar Thiele         ETH Zurich, Switzerland
CY Tsui               Hong Kong University of Science and Technology, HK
Hiroyuki Tomiyama     Nagoya University, Japan
Fabris Valois         INSA, Lyon, France
Nalini                University of California at Irvine, USA
Venkatasubramanian
Jan Vitek             Purdue University, USA
Andy Wang             Florida State University, USA
Cho-Li Wang           University of Hong Kong, Hong Kong
Shige Wang            General Motors, USA
Tzone-I Wang          National Cheng Kung University, Taiwan
Xiaorui Wang          University of Tennessee, USA
Jianbin Wei           Yahoo, USA
Weigang Wu            Sun Yat-Sen University, China
Bin Xiao              Hong Kong Polytec University, Hong Kong
Nong Xiao             National University of Defense Technology, China
Guoliang Xing         City University of Hong Kong, Hong Kong
Lizhen Xu             Southeast University, China
Jianliang Xu          Hong Kong Baptist Univ., Hong Kong
Ming Xu               National University of Defense and Technology, China
Yun Yang              Swinburne University of Technology, Australia
Hiroyuki Yomo         Aalborg University, Denmark
Chuck Yoo             Korea University, Korea
Moustafa Youssef      University of Maryland College Park, USA
Bo Yu                 Wayne State University, USA
Zhiwen Yu             Kyoto University, Japan
Qing-An Zeng           University of Cincinnati, USA
Daqing Zhang           National Institute of Telecommunications, France
Liqiang Zhang          Indian University South Bend, USA
Wei Zhang              Southern Illinois University, USA
Wensheng Zhang         Iowa State University, USA
Lin Zhong              Rice University, USA
Xiliang Zhong          Microsoft, USA
Wanlei Zhou            Deakin University, Australia
Dakai Zhu              University of Texas, San Antonio, USA
Yongxin Zhu            Shanghai Jiao Tong University, China




Additional Reviewers

Sourav Bhowmick        Nanyang Technological University, Singapore
Manoranjan Dash        Nanyang Technological University, Singapore
Yuhong Feng            Hong Kong Polytechnic University, Hong Kong
Jiayu Gong             Wayne State University, USA
Jia Rao                Wayne State University, USA
Aixin Sun              Nanyang Technological University, Singapore
Muzhou Xiong           Nanyang Technological University, Singapore
General Chair




                       Prof. Minyi Guo

Department of Computer Science and Engineering, Shanghai Jiao Tong University,
China

Professor Minyi Guo received his Ph.D. degree in computer science from University
of Tsukuba, Japan. Before 2000, Dr. Guo had been a research scientist of NEC Corp.,
Japan. He is now a full professor at the Department of Computer Software, The
University of Aizu, Japan, from 2000 to 2005. During this period, he was also a
visiting professor of Georgia State University, USA, Hong Kong Polytechnic
University, University of Hong Kong, National Sun Yet-sen University in Taiwan,
China, University of Waterloo, Canada and University of New South Wales, Australia.
He is also a professor of Shanghai Jiao Tong University and Nanjing University,
China.
  Dr. Guo has published more than 120 research papers in international journals and
conferences. Dr. Guo has served as general chair, program committee or organizing
committee chair for many international conferences. He is the founder of International
Conference on Parallel and Distributed Processing and Applications (ISPA), and
International Conference on Embedded and Ubiquitous Computing (EUC). He is the
editor-in-chief of the Journal of Embedded Systems. He is also in editorial board of
Journal of Pervasive Computing and Communications, International Journal of High
Performance Computing and Networking, Journal of Embedded Computing, Journal
of Parallel and Distributed Scientific and Engineering Computing, and International
Journal of Computer and Applications.
  Dr. Guo's research interests include parallel and distributed processing,
parallelizing compilers, Pervasive Computing, Embedded Software Optimization,
molecular computing and software engineering. He is a member of the ACM, IEEE,
IEEE Computer Society, and IEICE.
Program Chair




                       Prof. Cheng-Zhong Xu

Department of Electrical and Computer Engineering, Wayne State University, USA



Cheng-Zhong Xu is a professor in the Department of Electrical and Computer
Engineering of Wayne State University.      He is also the director of the Center for
Networked Computing Systems at WSU. His research interest includes networked
computing systems and applications, in particular scalable and secure Internet
services and architecture, scheduling and resource management in distributed, parallel,
and embedded systems, and autonomic systems management for highly reliable
computing. He has published more than 140 peer-reviewed scientific papers in
archival journals and conferences in these areas. He is the author of quot;Scalable and
Secure Internet Services and Architecturequot; (Chapman & Hall/CRC Press, 2005) and
the leading co-author of quot;Load Balancing in Parallel Computers: Theory and Practicequot;
(Kluwer Academic, 1996). Dr. Xu serves on the editorial boards of IEEE Transactions
on Parallel and Distributed Systems, J. of Parallel and Distributed Computing, J. of
Parallel, Emergent, and Distributed Systems, J. of Computers and Applications, and J.
of High Performance Computing and Networking. He has also guest edited special
issues for several other journals on network services and security in distributed
systems. He has served a number of international conferences and workshops in
various capacities as program chair, general chair, and plenary speaker.    He was a
recipient of “President's Award for Excellence in Teaching” of WSU in 2002 and
“Career Development Chair Award” in 2003. Dr. Xu received the BS and MS degrees
from Nanjing University in 1986 and 1989, respectively, and the Ph.D. degree from
the University of Hong Kong in 1993. He is a senior member of IEEE.
Keynote Speaker




                          Prof. Yaoxue Zhang
Department of Higher Education, Ministry of Education, China


   The Challenges and Opportunities in Transparent
                                  Computing


Abstract: In this talk, we present some new research results about our Transparent
Computing which is a new computing paradigm for service sharing. Rapid
development in computer networks let people easily share the hardware and software
resources, however, because the slow progress in Operating system technologies and
few changes in computer architectures in several decades, it is still not easy to share
services from different software and hardware platforms for users.
  Transparent Computing paradigm separates the storages and executions of software
programs and data including what of operating systems in different computers
connecting with communication networks. In this paradigm, data and programs are
stored in the storage servers and they are executed in either clients or execution
servers according to the required services, respectively.        We propose a new
mechanism called Meta OS to manage this separation.       This mechanism extends the
Neumann architecture special-temporally, so that a sequentially virtual computing can
be effectively obtained and the individual service sharing can be easily performed
underlying different Operating System platforms.
  We will introduce the idea, the mechanism and algorithms of proposed Meta OS for
the separation of the programs and data including what of Operating Systems.
Moreover, we also present some examples about the applications of this computing
paradigm.
 
Biography
Prof. Zhang Yaoxue was born in Li County, Hunan province, China, in 1956. He
graduated from Northwest Institute of Telecommunication Engineering, China,
obtained his Ph.D degree in computer networking from Tohoku University, Japan in
1989. One year later, he joined Department of Computer Science, Tsinghua University,
China.
He was a visiting professor of Massachusetts Institute of Technology (MIT) and
University of Aizu, in 1995 and 1998, respectively. He served as the President of
China Central Radio & TV University from Nov. 2001 to Jun. 2006. Currently, Prof.
Zhang is a fellow of the Chinese Academy of Engineering, a professor in computer
science and technology in Tsinghua University, and the Director General for Higher
Education of Ministry of Education, China. He is also a member of the Expert
Committee on Military Computer and Software Technology of PLA General
Armament Department, of the Advisory Committee on State Informatization, and of
Technical Committee on Ubiquitous/Pervasive Computing of China Computer
Federation. Additionally, he serves as an editorial board member of 4 international
journals: International Journal of Wireless and Mobile Computing, Journal of
Autonomic and Trusted Computing, Chinese Journal of Electronics and Chinese
Journal of Computer.
    Prof. Zhang's major research areas include computer networking, operating systems,
and ubiquitous/pervasive computing. He has led many national and international
research, international collaboration and industrialization projects. Because of his
distinguished contributions, Prof. Zhang has won the National Award for Scientific
and Technological Progress (2nd class) twice in 1998 and 2001, and National Award
for Technological Invention (2nd class) in 2004, as well as 5 provincial or ministerial
awards. He is a winner of the Prize of HLHL (Hong Kong) Foundation for Scientific
and Technological Progress in 2005. He has filed 16 Chinese patents and 3 American
patents as the first inventor, of which 13 have been granted. Accordingly, he won the
Top Patent Award of China in 2006. Prof. Zhang has published over 170 technical
papers in international journals and conferences, as well as 8 monographs and
textbooks. He received the IEEE Best Paper Award in the 21st IEEE AINA
International Conference in 2007.
Recently, Prof. Zhang's research mainly focuses on Transparent Computing and
Active Services. Transparent Computing is a computing paradigm to solve the
problem of how to access different operating systems and applications on one
terminal platform through networks, and how to run an operating system and
applications on different terminal platforms. Active Services is a new approach to
evolve current programs and services according to user requirements to provide
personalized and comprehensive network services.
Keynote Speaker




                     Prof. Xiaodong Zhang
Department of Computer Science and Engineering, The Ohio State University, USA


  Research issues and Challenges to Advance System
Software for Multicore Processors and Data-intensive
                                  Applications


Abstract: Compared with rapid technology advancements in multicore processors and
rapid changes from computing-intensive to highly data-intensive applications,
operating systems have been evolved very slowly for several decades. Application
users are facing to two major challenges in today's computing environment. On the
top level of the system hierarchy, private and shared caches are equipped for many
cores to access concurrently, inevitably causing access conflicts to degrade execution
performance.    On the bottom level, the performance bottleneck of quot;memory wallquot;
has been shifted to quot;disk wallquot; that is a serious bottleneck for many data-intensive
applications. Since processor caches and disk storage are not in the major scope of
operating system management, and their increasingly complex operations are not
transparent to application users, the above mentioned performance issues have not
been effectively addressed at any level of computer systems.
  We have made a continuous effort to enhance operating systems with two
objectives: (1) to well utilize rich but complex resources of multicore processors and
(2) to access disk data as fast as possible.   At the multicore processor level, we are
developing new resource allocation management to improve the effective caching
capacity per core and/or per thread, and to minimize congestion in off-chip memory
accesses by coordinating memory bandwidth sharing.         At the storage level, we
enable operating systems to effectively exploit quot;sequential localityquot; -- for the same
amount of data, sequential accesses are several orders of magnitude faster than
random accesses in disks. In this talk, related research issues and challenges will be
overviewed, and preliminary results will be presented.
 
Biography
Xiaodong Zhang is the Robert M. Critchfield Professor in Engineering, and Chairman
of the Department of Computer Science and Engineering at the Ohio State University.
    His research interests cover a wide spectrum in the areas of high performance and
distributed systems. Several technical innovations and research results from his team
have been adopted or being developed in commercial products and open source
systems with direct impact to some key computing operations, including the
permutation memory interleaving technique first in the Sun MicroSystems'
UltraSPARC IIIi processor and then in the Sun's dual-core Gemini Processor, the
token thrashing protection mechanism and the Clock-Pro page replacement algorithm
for memory management in the Linux Kernel and NetBSD.
    Xiaodong Zhang was the Director of Advanced Computational Research Program
at the National Science Foundation, 2001-2004. He is the associate Editor-in-Chief of
IEEE Transactions on Parallel and Distributed Systems, and is also serving on the
Editorial Boards of IEEE Transactions on Computers, IEEE Micro, and Journal of
Parallel and Distributed Computing.
    He received his Ph.D. in Computer Science from University of Colorado at
Boulder.
 
Keynote Speaker




                       Associate Prof. Tarek Abdelzaher
Department of Computer Science, University of Illinois at Urbana Champaign, USA


               Research Challenges in Distributed
                        Cyber-Physical Systems


Abstract: Moore's law, automation considerations, and the pervasive need for timely
information lead to a next generation of distributed systems that are open, highly
interconnected, and deeply embedded in the physical world. Such systems, called
cyber-physical, were recently named the first research priority in networking and
information technology in the US by the nation's presidential council of advisors on
science and technology. They offer new research challenges that stem from openness,
scale, and tight coupling between computation, communication, and distributed
interaction with both physical and social contexts. Growing challenges span a large
spectrum ranging from new models of computation for systems that live in physical
and social spaces, to the enforcement of reliable, predictable, and timely end-to-end
behavior in the face of high interactive complexity, increased uncertainty and
imperfect implementation. This talk discusses the top challenges in cyber-physical
systems and conjectures on research directions of increasing interest in this realm.


Biography
Tarek Abdelzaher received his B.Sc. and M.Sc. degrees in Electrical and Computer
Engineering from Ain Shams University, Cairo, Egypt, in 1990 and 1994 respectively.
He received his Ph.D. from the University of Michigan in 1999 on Quality of Service
Adaptation in Real-Time Systems. He has been an Assistant Professor at the
University of Virginia, where he founded the Software Predictability Group until
2005. He is currently an Associate Professor at the Department of Computer Science,
the University of Illinois at Urbana Champaign. He has authored/coauthored more
than 100 refereed publications in real-time computing, distributed systems, sensor
networks, and control. He is Editor-in-Chief of the Journal of Real-Time Systems, an
Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions
on Parallel and Distributed Systems, the ACM Transaction on Sensor Networks, and
the Ad Hoc Networks Journal, as well as Editor of ACM SIGBED Review. He was
Program Chair of RTAS 2004 and RTSS 2006, and General Chair of RTAS 2005,
IPSN 2007, RTSS 2007, DCoSS 2008 and Sensys 2008. Abdelzaher's research
interests lie broadly in understanding and controlling the temporal properties of
software systems in the face of increasing complexity, distribution, and degree of
embedding in an external physical environment. Tarek Abdelzaher is a member of
IEEE and ACM.
The Map of EUC 2008 Conference Place

EUC 2008 conference place: Courtyard by Marriott Shanghai-Pudong
Address of conference place: 838 Dong Fang Road, Pudong District, Shanghai, China




Access Guide to EUC 2008 Conference Place

     There are two airports in Shanghai, Pudong International Airport(PVG) and
Hongqiao International Airport
                             (SHA) and there are two railway stations in Shanghai,
                                  ,
Shanghai Railway Station and Shanghai South Railway Station. Our hotel is at the
crossing of Dong Fang Road and Wei Fang Road. The usual traffic direction is
followed.
1.    From Shanghai Pudong International Airport(PVG)
          Taxi only
A20 (Outside Circle) --- turn right onto Luo Shan Road --- turn left onto Hua
         Mu Road --- turn right onto Dong Fang Road --- turn left onto Wei Fang
         Road. It takes about 40 minutes to the hotel. Estimated taxi fare: 120 RMB
         (one way, if traffic condition is fine)
         Maglev Train and Subway Line No.2
         Take Maglev Train from Pudong International Airport to Longyang Road
         Subway Station, and then take Subway Line No.2 to the Shiji (Century)
         Avenue Station. From here, go to the conference hotel on foot, which takes
         around 5 minutes. Totally about 60 RMB for Subway line No.2 and
         economy Maglev Train, 110 RMB for Subway line No.2 and VIP Maglev
         Train.
         Airport bus Line No.3 and Subway Line No.2
         Take Airport bus Line No.3 from Pudong International Airport to Longyang
         Road Subway Station, then take Subway Line No.2 to the Shiji (Century)
         Avenue Station. From here, go to the conference place on foot, which takes
         around 5 minutes. Totally about 25 RMB is needed.
         Airport bus Line No.5 and Taxi
         Take Airport bus Line No.5 from Pudong International Airport to Oriental
         hospital, then take a taxi to the hotel. Totally about 35 RMB is needed.
2.   From Hongqiao International Airport(SHA)
         Taxi only
         Yan An Road Elevated High Way --- to Yan An East Road Tunnel --- to Shi
         Ji Da Dao (Century Blvd) --- turn right onto Dong Fang Road --- turn left
         onto Wei Fang Road. It takes about 30 minutes to the hotel. Estimated taxi
         fare: 70 RMB (one way,if traffic condition is fine)
         Bus No. 925A and Subway Line 2
         Take Bus No. 925A from Hongqiao International Airport to People's Square,
         and then take Subway Line No.2 to the Shiji (Century) Avenue Station.
         From here, go to the conference hotel on foot, which takes around 5 minutes.
         Totally about 8 RMB is needed.
3.   From Shanghai Railway Station or Shanghai South Railway Station
         Subway Line No.1 and No.2
         Take Subway Line No.1 from either Railway Station to People's Square
         Station, and then interchanges to Subway Line No.2 to the Shiji (Century)
         Avenue Station. From here, go to the conference hotel on foot, which takes
         around 5 minutes. Totally about 5~7 RMB is needed.
Location of Conference Rooms
Reception and Pujiang Cruise

We will hold a Pujiang cruise to welcome the EUC 2008 attendee from all over the
world. Pujiang cruise is the classical aquatic travel program, it’s not only because that
the Huangpu River is the mother river of Shanghai, and the representative and
reduction of Shanghai, but also the two sides of the river gather the famous sights of
Shanghai city, such as the Eastern pearl broadcasts the television tower, Bund's Wan
Guo reads extensively the group. Boarding on the boat, with delicious buffet, you can
feel the honorable position and the long history of the bund; also you can step on the
top deck, listen to the pulse and rhythm of Pudong times. You will understand quot;the
scene of dazzling fireworks and lanterns lively districtquot; ideal condition.




Reception time: 19:00 ~21:00 on Dec.18, 2008
Reception place: Pujiang Cruise ship



Banquet

Banquet time: 18:30~21:30 on Dec.19, 2008
Banquet place: Grand Ballroom at Courtyard by Marriott Shanghai-Pudong




Lunch

Lunch place: Spices Café at Courtyard by Marriott Shanghai-Pudong
Tour guide

The Bund
quot;The Bundquot; is a long, storied road in Shanghai. The
Bund has been considered a historic symbol of
Shanghai for over one hundred years. It is a source of
great pride to the Shanghai people, as it shows the
world Shanghai's culture and its capability to
synchronize and meld its local culture with civilizations
abroad.

The Bund faces Shanghai's mother river, the Huangpu River. Behind the Bund are old
buildings representing architectural styles from different countries. The unique
geography around the Bund and that geography's effect on the economy of Shanghai
and China throughout the past one hundred years fills the Bund with cultural
connotation and undertones. The river, the long bank, the green belt and the different
architectural styles of the buildings on the Bund is the most quot;Shanghai-likequot; sight in
Shanghai. In the morning, the Bund is a popular place for jogging and workouts. It is
a charming sight for tourists in the daytime and it becomes lovers' lane at night!


Chenyi Square
At the end of the 10-mile Nanjing Road is Chenyi Square,
dominated by a sculpture of Chenyi-the first Shanghai mayor
of the People's Republic of China. The sculpture is made of
bronze and stands 5.6 meters high with a red granite underlay
3.5 meters high. Every weekend, a grand quot;Square Concertquot; is
held in front of the sculpture.

To the south of the sculpture is a popular fountain. Many
colored lamps are set under the water of the fountain, and
these lamps are turned on at night. The beautiful colored water streams created by the
lamps are a great sight to see in Chenyi Square at night.


Sightseeing Tunnel
The Bund's Tunnel stretches from the end of Nanjing
Road on the Puxi side to the Oriental Pearl TV Tower on
the Lujiazui side - a total length of 646.70 meters. This
tunnel was finished at the end of 2000; it was the first pedestrian tunnel built in China.
Tourists may enter the tunnel through an elevator at the entrance on either side. It
takes about two to five minutes to walk the length of the tunnel. Many high-tech
displays are featured inside. All kinds of designs, ads, panoramic displays and
background music about people, history, culture and technology are displayed
throughout the tunnel, making your visit there both interesting and thrilling.


Xujiahui

Xujiahui is one of the most prosperous business centers,
with many famous mansions and shopping centers.

The history of the district dates back to Ming Dynasty. A
famous scientist Xu Guangqi, the Secretary of the Grand
Council, had been buried here. Some of his descendants
had multiplied and lived here, so it was first named
quot;Xujia Villagequot; and then gradually developed into town.
The name quot;Xujiahuiquot; was from the fact that Xu Guangqi built a cottage at the joint of
the two rivers of Zhaojiabang and Lihongjing. In March 1957, Changshu and Xuhui
districts were amalgamated into the new Xuhui District.


Lujiazui Financial Center

The Lujiazui Financial Center is located in the
Pudong district of Shanghai. The famous
buildings in this area include:
   The Oriental Pearl TV Tower, which is
surrounded by the Yangpu Bridge in the
northeast and the Nanpu Bridge in the southwest,
creating a picture of 'twin dragons playing with
pearls'. The tower with 468 meters high (1,536
feet) is the world's third tallest TV and radio
tower surpassed in height only by towers in
Toronto, Canada and Moscow, Russia.
   Shanghai International Conference Center, which is located to the northwest of
Oriental Pearl TV Tower, along Riverside Boulevard, opposite to the Bund. The
conference center covers an area of 45 thousand square meters, with modern
conference halls, two multi-functional halls (around 4300 square meters), one
international conference hall of press center (around 2500 square meters) and two
conference halls that can hold 200 people.
 EUC Main Conference 
                                                                     
                                                Thursday, 18 December, 2008 
                                                               
  Opening Remark                                                         08:30  –  09:00am,  Grand  Ballroom
  
  Keynote Speech I: The Challenges and Opportunities in Transparent Computing 
  Yaoxue Zhang (Tsinghua University)                       09:00  –  10:00am,  Grand  Ballroom
  
  Coffee Break (10:00 – 10:30am)                    

  
  EUC‐1A: Hardware/Software Co‐Design I                       10:30  –  12:10pm,  Function  Room  4&5
  Session Chair: Meikang Qiu, University of New Orleans, USA 

  A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for 
  Time Critical Applications 
    Archana Kalyansundar, Rita Chattopadhyay
    Siemens Corporate Technology India, India


  Advanced Optimization and Design Issues of a 32‐Bit Embedded  Processor Based on Produced 
  Order Queue Computation Model
    Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda
    Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan


  A Low‐Cost Embedded Controller for Complex Control Systems
    Zhe Peng, Longhua Ma, Feng Xia
    State Key Lab of Industrial Control Technology, Zhejiang University, China


  Single Instruction Dual‐Execution Model Processor Architecture 
    Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda
    Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan

  
  EUC‐1B: Sensor Networks I                                                         10:30 – 12:10pm, Function Room 7
  Session Chair: Jinde Chen, Saitama University, Japan 

  Analysis of Data Delivery Delay in Acoustic Sensor Networks 
    Chao Wang ,Yan Sun, Huadong Ma
    Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and
    Telecommunications, China 
  A Collaboration‐based Storage Management Scheme in Multimedia Sensor Networks
 Yunpei Yan1, Guihai Chen1, Sajal Das2
 1State   Key Laboratory for Novel Software Technology, Nanjing University, China
 2Department     of Computer Science and Engineering, University of Texas at Arlington, USA


  An Integrated Deployment Tool for ZigBee‐Based Wireless Sensor Networks
 Yu-Kai Huang1, Pi-Cheng Hsiu1, Wei-Ni Chu1, Kuan-Chang Hung1, Ai-Chun Pang1, Tei-Wei Kuo1, Min
 Di2, Hua-Wei Fang2
 1Department     of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National
 Taiwan University, Taiwan
 2Networks     and Multimedia Institute, Institute for Information Industry, Taiwan


  Cooperative Node Localization for Mobile Sensor Networks 
 Hongyang Chen1, Marcelo H. T. Martins1, Pei Huang2, Hing Cheung So3, Kaoru Sezaki1
 1University   of Tokyo, Japan
 2Michigan   State University, USA
 3City   University of Hong Kong, Hong Kong
  
 Lunch ( 12:10 – 13:30pm)                                                    

  
  Keynote Speech II: Research Challenges in Distributed Cyber‐Physical Systems 
  Tarek Abdelzaher (University of Illinois at Urbana       13:30  –  14:30pm,  Grand  Ballroom
  Champaign)             
  
  Coffee Break (14:30 – 15:00pm)                       

  
  EUC‐2A: Real‐time and Cyber‐Physical Systems               15:00  –  16:40pm,  Function  Room  4&5
  Session Chair: Hui Guo, University of New South Wales, New Zealand

  A Systematic Framework for Structured Object‐Oriented Security Requirements Analysis in 
  Embedded Systems 
 Sojan Markose, Xiaoqing (Frank) Liu, Bruce McMillin
 Computer Science Department, Missouri University of Science and Technology, USA


  Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors 
 Shinpei Kato, Nobuyuki Yamasaki
 Department of Information and Computer Science, Keio University, Japan


  Robust Feedback Control Scheduling in Distributed Embedded Real‐Time Systems
 Bing Du1, Chun Ruan2
 1School   of Electrical and Information Engineering, The University of Sydney, Australia
 2School   of Computing and Mathematics, University of Western Sydney, Australia
  RT‐P2P: A Scalable Real‐Time Peer‐to‐Peer System with Probabilistic Timing Assurances 
 Fei Huang1, Binoy Ravindran1, E. D. Jensen2
 1Department     of Electrical & Computer Engineering, Virginia Tech, USA
 2The   MITRE Corporation, USA



  EUC‐2B: Multimedia and Data Management I                                   15:00  –  16:40pm,  Function  Room  7
  Session Chair: Huan Li, Beihang University, China   

  UMDD: User Model Driven Software Development 
 Xiaochun Wang1,2, Yuanchun Shi1
 1Department     of Computer Science and Technology, Tsinghua University, China
 2GGV   Sub-station, Postdoctoral Workstation of Zhongguancun Haidian Garden, China


  A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test 
 Ashraf Armoush, Falk Salewski, Stefan Kowalewski
 Embedded Software Laboratory, RWTH Aachen University, Germany


  Data Management for Context‐Aware Computing
 Wenwei Xue1, Hungkeng Pung1, Wenlong Ng1, Tao Gu2
 1School    of Computing, National University of Singapore, Singapore
 2Institute   for Infocomm Research, Singapore


  Efficient Data Scheduling for Multi‐item Queries in On‐Demand Broadcast 
 Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin
 School of Computer Science, Fudan University, China
  
         
         
         
         
         
         
         
         
         
         
                                    Friday, 19 December, 2008 
  
  Keynote Speech III: Research Issues and Challenges to Advance System Software 
  Xiaodong Zhang (Ohio State University)                   09:00  –  10:00am,  Grand  Ballroom
  
  Coffee Break (10:00 – 10:30am)                

  
  EUC‐3A: Embedded SW Optimization I                             10:30  –  12:10pm,  Function  Room  4&5
  Session Chair: Tarek Abdelzaher, University of Illinois at Urbana, USA 

  An Improved EMD Embedding Scheme Based on Secret Image Difference 
 Chin-Chen Chang1, Chin-Feng Lee2, Yi-Ren Wang3
 1Department   of Information Engineering and Computer Science Management, Feng Chia University, Taiwan
 2Department   of Information Management, Chaoyang University of Technology, Taiwan
 3Department   of Computer Science and Information Engineering, National Chung Cheng University, Taiwan


  A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
 Lei Sun, Tatsuo Nakajima
 Department of Computer Science, Waseda University, Japan


  SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems
 Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima
 Department of Computer Science, Waseda University, Japan


  Optimizing the Embedded Caching and Prefetching Software on a Network‐Attached Storage 
  System 
 Shih-Hao Hung1,2, Chien-Cheng Wu1, Chia-Heng Tu2
 1Graduate   Institute of Networking and Multimedia;
 2Department   of Computer Science and Information Engineering
 National Taiwan University, Taiwan

  
  EUC‐3B: Wireless Networks I                                              10:30  –  12:10pm,  Function  Room  7
  Session Chair: Hongyang Chen, University of Tokyo, Japan   

  Fuzzy Self‐Clustering for Wireless Sensor Networks 
 Yahya M. Tashtoush, Mohammed A. Okour
 The Department of Computer Science, Jordan University of Science and Technology, Jordan


  Secure Authentication in Wireless Sensor Networks Using RF Fingerprints
 D. A. Knox, T. Kunz
 Department of Systems and Computer Engineering, Carleton University, Canada
  Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc 
  Networks
 Romeo Said, Yves Mahéo
 Valoria, Université Européenne de Bretagne, France


  A Scenario‐based Directional Communication Performance in Wireless Ad hoc Networks
 Murad Khalid1, In-ho Ra2, Young-hoon Joo2, Ravi Sankar1
 1Department   of Electrical Engineering, University of South Florida, USA
 2School   of Electronic and Information Engineering, Kunsan National University, Korea
  
 Lunch (12:10 – 13:30pm)                                        

  
  EUC‐4A: Network Protocols I                                                13:30  –  15:10pm,  Function  Room  4&5
  Session Chair: Jun Yang, University of Pittsburgh, USA 

  Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application 
 Dejia Shi1, Weijin Jiang1,2, 3, Danping Xu3
 1School   of Computer and Electronic Engineering, Hunan University of Commerce, China
 2School   of Computer, Wuhan University of Technology, China
 3The   College of Information Engineering, Xiangtan University, China


  Countering DDoS and XDoS Attacks against Web Services 
 Xinfeng Ye
 Department of Computer Science, Auckland University, New Zealand


  Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2‐D Mesh Network on Chip
 Xiao Canwen, Zhang Minxuan, Dou Yong, Zhao Zhitong
 School of Computer Science, National University of Defense Technology, China


  A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks
 Ze Li, Haiying Shen
 Department of Computer Science and Computer Engineering, University of Arkansas, USA

  
  EUC‐4B: Power‐aware Computing                                   13:30  –  15:10pm,  Function  Room  7
  Session Chair: Jingling Xue, University of New South Wales, Australia 

  Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment 
 Meikang Qiu1, Jiande Wu1, Jingtong Hu2, Yi He2, Edwin H.-M. Sha2
 1Department   of Electrical Engineering, University of New Orleans, USA
 2Department   of Computer Science, University of Texas at Dallas, USA 
  A Low Power Error Detection Technique for Floating‐Point Units in Embedded Applications
 Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi
 Dependable System Laboratory, Sharif University of Technology, Iran


  A Generalized Framework for System‐Wide Energy Savings in Hard Real‐Time Embedded 
  Systems
 Gang Zeng1, Hiroyuki Tomiyama11, Hiroaki Takada1, Tohru Ishihara2
 1Graduate   School of Information Science, Nagoya University, Japan
 2System   LSI Research Center, Kyushu University, Japan


  Application Specific Low Power ALU Design 
 Yu Zhou, Hui Guo
 School of Computer Science & Engineering, University of New South Wales, Australia
  
 Coffee Break (15:10 – 15:30pm)                               

  
  EUC‐5A: Hardware/Software Co‐Design II                        15:30  –  17:10pm,  Function  Room  4&5
  Session Chair: Wei Zhang, Southern Illinois University , USA   

  Hardware Support for Efficient Sparse Matrix Vector Multiplication 
 Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue
 School of Computer Science and Engineering, University of New South Wales, Australia


  Accelerating Montgomery Modulo Multiplication for Redundant Radix‐64k Number System on 
  the FPGA Using Dual‐Port Block RAMs
 Koji Shigemoto, Kensuke Kawakami, Koji Nakano
 Department of Information Engineering, Hiroshima University, Japan


  A State‐Based Predictive Approach for Leakage Reduction of Functional Units
 Linfeng Pan1, Minyi Guo1, Yanqin Yang1,2, Meng Wang2, Zili Shao2
 1Department   of Computer Science and Engineering, Shanghai Jiao Tong University, China
 2Department   of Computing, Hong Kong Polytechnic University, Hong Kong
 3Department   of Computer Science and technology, East China Normal University, China


  Automatic Integration of Non‐Bus Hardware IP into SoC‐Platforms for Use by Software 
 Robert Guenzel
 Department of Integrated Circuit Design(E.I.S.), Technical University of Braunschweig, Germany

  
  EUC‐5B: Context‐aware Computing                                 15:30  –  17:10pm,  Function  Room  7
  Session Chair: Beihong Jin, Chinese Academy of Sciences, China   

  A Probabilistic Approach to Consistency Checking for Pervasive Context 
 Yu Huang1,2, Xiang Ma2, Xianping Tao1,2, Jiannong Cao3, Jian Lu1,2
 1State     Key Laboratory for Novel Software Technology, Nanjing University, China
 2Department      of Computer Science and Technology, Nanjing University, China
 3Department      of Computing, Hong Kong Polytechnic University, Hong Kong


  Human Universality in Ubiquitous Computing: Maslow, Where Are You? 
 Sebastien Duval1, Christian Hoareau2, Hiromichi Hashizume3
 1National    Institute of Informatics, Japan
 2The   Graduate University for Advanced Studies, Japan
 3National    Institute of Informatics, Japan


  Learning in Small and Large Ubiquitous Computing Environments 
 Jorge Barbosa1, Rodrigo Hahn1, Débora N. F Barbosa2, Cl´udio F R. Geyer3
                                           .                   .
 1PIPCA/Unisinos,      São Leopoldo – RS – Brazil
 2UniLasalle,    Canoas – RS – Brazil
 3UFRGS,       Porto Alegre – RS – Brazil


  Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous 
  Computing 
 Jingde Cheng
 Department of Information and Computer Sciences, Saitama University, Japan
  
         
         
         
         
         
         
         
         
         
                                      Saturday, 20 December, 2008 
  
  EUC‐6A: Sensor Networks II                                  08:30  –  10:10am,  Function  Room  4&5
  Session Chair: Haiying Shen, University of Arkansas, USA   

  Adaptive Buffer Management for Efficient Code Dissemination in Multi‐Application Wireless 
  Sensor Networks 
 Weijia Li1, Yu Du1, Youtao Zhang1, Bruce Childers1, Ping Zhou2, Jun Yang2
 1Computer     Science Department, University of Pittsburgh, USA
 2Electric   and Computer Engineering Department, University of Pittsburgh, USA


  Quorum‐Based Energy Saving MAC Protocol Design for Wireless Sensor Networks
 Chih-Min Chao, Yi-Wei Lee
 Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan


  An Energy‐Efficient Waiting Caching Algorithm in Wireless Sensor Networks
 Junfeng Xu, Keqiu Li, YanMing Shen, Jian Liu
 Department of Computer Science and Engineering, Dalian University of Technology, China


  A Grid‐Based Distributed Multi‐Hop Routing Protocol for Wireless Sensor Networks 
 Wenjun Liu1, Yue Sun1, Jiguo Yu2, Baoxiang Cao2
 1City   College, Wenzhou University, China
 2School     of Computer Science, Qufu Normal University, China
  

  EUC‐6B: Multi‐Agent Systems                                                 08:30  –  10:10am,  Function  Room  7
  Session Chair: Xinfeng Ye, Auckland University, New Zealand 

  Dynamic Substitutability Analysis of Web Service Composition via Extended π‐Calculus 
 Jin-dian Su1, Shan-shan Yu2, He-qing Guo1
 1College    of Computer Science and Engineering, South China University of Technology, China
 2School     of Information and Technology, Computer Science Department, Sun Yat-sen University, China


  Efficient Self‐Healing Key Distribution with Limited Group Membership for 
  Communication‐Constrained Networks
 Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang
 School of Computer Science, Fudan University, China


  An Empirical Study on Interoperability between Service Discovery Protocols 
 Beihong Jin, Zhi Zang, Liang Zhang
 Institute of Software, Chinese Academy of Sciences, China


  A Reasonable Approach for Defining Load Index in Parallel Computing 
 Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng
 Computer Science and Engineering Department, Shanghai Jiao Tong University, China
Coffee Break (10:10 – 10:30am)                                 

  
  EUC‐7A: Middleware and Peer‐to‐Peer                        10:30  –  12:10pm,  Function  Room  4&5
  Session Chair: Xiaobo Zhou, University of Colorado, USA   

  Load Balancing in Peer‐to‐Peer Networks Based on Sampling System States 
 Hung-Chang Hsiao, I-Ta Lin, Hao Liao
 Department of Computer Science and Information Engineering, National Cheng-Kung University, Taiwan


  The Effect of Routing‐Load Dispersion on Congestion Control in Structured P2P Networks 
 Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu
 Department of Computer Science, Nankai University, China


  AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication 
 Liang Zhang1, Beihong Jin1, Jiannong Cao2
 1Technology    Center of Software Engineering, Institute of Software, China
 2Department    of Computing, The Hong Kong Polytechnic University, Hong Kong


  A Self‐configuring Personal Agent Platform for Pervasive Computing
 Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu
 Department of Computing, Hong Kong Polytechnic University, Hong Kong

  
  EUC‐7B: Embedded Software Optimization II                                    10:30  –  12:10pm,  Function  Room  7
  Session Chair: Tei‐Wei Kuo, National Taiwan University 

  A Light Lock Management Mechanism for Optimizing Real‐Time and Non‐Real‐Time 
  Performance in Embedded Linux 
 Maobing Dai1, Toshihiro Matsui2, Yutaka Ishikawa3
 1Graduate    School of Information Science and Technology, The University of Tokyo, Japan
 2National   Institute of Advanced Industrial Science and Technology, Japan
 3Yutaka   Ishikawa Graduate School of Information Science and Technology, The University of Tokyo, Japan 


  Design and Optimization of a Java Ahead‐of‐Time Compiler for Embedded Systems
 Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae
 School of Electrical Engineering and Computer Science, Seoul National University, Korea


  Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller
 Chantana Phongpensri, K. Sripanomwan
 Department of Computing, Faculty of Science, Silpakorn University, Thailand
  Control‐Flow Checking Using Branch Instructions 
 Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali
 Dependable System Laboratory, Sharif University of Technology, Iran
  
 Lunch (12:10 – 13:30pm)                                      

  
  EUC‐8A: Wireless Networks II                                          13:30  –  15:10pm,  Function  Room  4&5
  Session Chair: Guihai Chen, Nanjing University, China   

  RADAR: Rate‐Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi‐Rate 
  Wireless Networks 
 Liqiang Zhang1, Yu-Jen Cheng1, Xiaobo Zhou2
 1Department   of Computer & Information Sciences, Indiana University South Bend, USA
 2Department   of Computer Science, University of Colorado at Colorado Springs, USA


  A Hybrid Anti‐Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory 
  Consumption 
 Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu
 School of Microelectronics, Shanghai Jiao Tong University, China


  Rule‐Based WiFi Localization Methods 
 Qiuxia Chen1, Dik-Lun Lee1, Wang-Chien Lee2
 1Computer   Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong
 2Computer   Science and Engineering, The Pennsylvania State University, University Park, USA


  Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks 
 Yuanyuan Zhang1, Dawu Gu1,2, Bart Preneel2
 1Department   of Computer Science and Engineering, Shanghai Jiao Tong University, China
 2ESAT-COSIC,     Katholieke Universiteit Leuven (KUL), Belgium

  
  EUC‐8B: Real‐Time and Cyber‐Physical Systems II                   13:30 – 15:10pm, Function Room 7
  Session Chair: Wenbin Jiang, Huazhong University of Science and Technology, China   

  Performance Comparison of Techniques on Static Path Analysis of WCET
 Mingsong Lv1, Zonghua Gu2, Nan Guan1, Qingxu Deng1, Ge Yu1
 1Northeastern   University, China
 2Hong   Kong University of Science and Technology, Hong Kong


  Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway 
 Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato
 Department of Information Systems Design, Doshisha University, Japan
  TRAcME: Temporal Activity Recognition Using Mobile Phone Data 
 Driss Choujaa, Naranker Dulay
 Department of Computing, Imperial College London, UK


  Adaptive Drowsy Cache Control for Java Applications 
 Sun Yu, Wei Zhang
 Department of Electrical and Computer Engineering, Southern Illinois University, USA
  
 Coffee Break (15:10 – 15:30pm)                              

  
  EUC‐9A: Network Protocols II                             15:30  –  16:50pm,  Function  Room  4&5
  Session Chair: Hung‐Chang Hsiao, National Cheng‐Kung University, Taiwan   

  Evaluating the Effect of Inter Process Communication Efficiency on High Performance 
  Distributed Scientific Computing 
 Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi
 Computer Engineering Department, Iran University of Science & Technology, Iran


  Hierarchical Cluster‐Based Irregular Topology Customization for Networks‐on‐Chip
 Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng
 Department of Electronic Engineering, Tsinghua University, China


  Design and Analysis of a Stable Queue Control Scheme for the Internet
 Naixue Xiong1,2, Laurence T. Yang3, Yaoxue Zhang4, Yuezhi Zhou4, Yingshu Li2
 1Department   of Computer Science, Wuhan University of Science and Engineering, China
 2Computer   Science, Georgia State University, USA
 3Department   of Computer Science, St. Francis Xavier University, Canada
 4Department   of Computer Science & Technology, Tsinghua University, China

  
  EUC‐9B: Multimedia and Data Management II                                   15:30  –  16:50pm,  Function  Room  7
  Session Chair: Meilin Liu, Wright State University, USA   

  Lossless Data Hiding Based on Histogram Modification for Image Authentication
 Chin-Chen Chang1,2, Wei-Liang Tai2, Kuo-Nan Chen2
 1Department   of Information Engineering and Computer Science, Feng Chia University, Taiwan
 2Department   of Computer Science and Information Engineering, National Chung Cheng University, Taiwan



  A New Proxy Scheme for Large‐Scale P2P VoD System 
 Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao
 School of Computer Science and Technology, Huazhong University of Science and Technology, China
  A Signature‐based Grid Index Design for RFID Main‐Memory Databases
Rong-Jhang Liao1, Pei-Lun Suei1, Yung-Feng Lu1, Tei-Wei Kuo1,2, Chun-Sho Lee3
1Department    of Computer Science and Information Engineering, National Taiwan University, Taiwan
2Graduate   Institute of Networking and Multimedia, National Taiwan University, Taiwan
3Innovative   DigiTech-Enabled Application & Services Institute, Institute for Information Industry, Taiwan
      
      
      
      
      
      
      
      
      
      
 EUC Workshops 
                                                                    
                        st
                 The 1  IEEE/IFIP International Workshop on End‐User Virtualization (EUV’08) 
                                                                   Wednesday,  17  December,  2008
    

  Session 1                          Chair: Xiaofei Liao                         09:00  –  10:30am,  Function  Room  3

  A Framework to Evaluate and Predict Performances in Virtual Machines Environment 
    Deshi Ye, Qinming He, Hua Chen, Jianhua Che
    College of Computer Science, Zhejiang University, China 

  Performance Measuring and Comparing of Virtual Machine Monitors 
      Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang
    College of Computer Science, Zhejiang University, China 

  An Optimized COW Block Device Driver in VMM for Fast, On‐Demand Software Deployment 
      Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang
    School of Computer, National University of Defense Technology, China 

  Analysis and Enhancement for Interactive‐Oriented Virtual Machine Scheduling 
      Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng
      Microprocessor Research and Development Center, Peking University, China

   
   Coffee Break (10:30 – 11:00am)                               
    

  Session 2                          Chair: Xiaofei Liao                     11:00  –  12:30pm,  Function  Room  3

  DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture 
      Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao
      School of Computer, National University of Defense Technology, China


  A Novel Virtual Grid Experiment Method in MedImGrid 
      Ran Zheng, Xiaofei Liao, Hai Jin
      Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and
      Technology, Huazhong University of Science and Technology, China

  VirtualCluster: Customizing the Cluster Environment through Virtual Machines 
      Kang Chen, Jun Xin, Weimin Zheng
      Department of Computer Science and Technology, Tsinghua University, China
  Session 2 (Continued)  Chair: Xiaofei Liao                                      11:00  –  12:30pm,  Function  Room  3

  Allocating Resource in Grid Workflow Based on State Prediction 
  Jiong Yu1,2, Guo-Zhong Tian1,3, Ling Cheng1,3
  1School   of Information Science and Engineering, Xinjiang University, China
  2School   of Computer Science and Technology, Beijing Institute of Technology, China
  3Department    of Computer Engineering, Xinjiang Polytechnic College, China

  Cooperative Problem Solving Process Based on MAS_NP Model 
  Yan-bin Peng1, Bei-shui Liao2, Ji Gao3, Jun Hu4, Cun-hao Wang3, Jie-Qing Ai3, Hang Guo3
  1School   of Information and Electronic Engineering, Zhejiang University of Science and Technology, China
  2Center   for the Study of Language and Cognition, Zhejiang University, China
  3College   of Computer Science, Zhejiang University, China
  4College   of Computer Science, Hunan University, China

        
        
        The 3rd IEEE/IFIP International Workshop on Embedded Software Optimization (ESO’08) 
                                                                   Wednesday, 17 December, 2008

    

  Session 1                            Chair:  Meikang  Qiu                       13:30  –  16:00pm,  Function  Room  3

  UCaS: A Schedulability Analysis Tool for AADL Models 
      Shenglin Gui1, Lei Luo1, Qian Liu2, Fulei Guo2, Shaopeng Lu2
      1School   of Computer Science and Engineering, University of Electronic Science and Technology of China
      2Research     & Development Center, Coretek Systems, China

  A GA‐based Systematic Message Scheduling Method for Time‐Triggered CAN 
      Shan Ding, Zhiqiang Xie, Xiaona Yin
      College of Information Science and Engineering, Northeastern University, China

  Reducing Context Switch Overhead with Compiler‐Assisted Threading 
      Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö
      Department of Computer Systems, Tampere University of Technology, Finland

  Research and Design of Shared Resources Competition Solution among Hardware‐Software 
  Tasks based on Unified Scheduling 
      Bing Guo1, Yan Shen2, Lei Zhang1, Xiang Zhou1
      1School   of Computer Science & Engineering, SiChuan University, China
      2University   of Electronic Science & Technology of China


  A Tiny Processing System for Education and Small Embedded Systems on the FPGAs 
      Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito
      Department of Information Engineering, Hiroshima University, Japan


  Object Placement for Fully Associative Cache 
      Chun-Chieh Lin, Chuen-Liang Chen
      Department of Computer Science and Information Engineering, National Taiwan University, Taiwan

  Evaluation  of  Partitioning  Methods  for  Stream  Applications  on  a  Heterogeneous  Multi‐core 
  Processor Simulator 
      Kai Zheng, Yongxin Zhu, Jun Xu
      School of Microelectronics, Shanghai Jiao Tong University, China

   
   Coffee Break (16:00 – 16:30pm)                                  
    
             
             
               The 4th IEEE/IFIP International Symposium on Security for Ubiquitous Computing 
                                                   (SECUBIQ’08) 
                                                                         Wednesday, 17 December, 2008

    

  Session 1                              Chair:  Deqing  Zou                       16:30  –  17:30pm,  Function  Room  3

  Simple Certificateless Signature with Smart Cards 
      Kazumasa Omote1, Atsuko Miyaji1, Kazuhiko Kato2
      1School   of Information Science, Japan Advanced Institute of Science and Technology (JAIST), Japan
      2Department    of Computer Science, Graduate School of ISE, University of Tsukuba, Japan


  Efficient ID‐based Threshold Ring Signature scheme 
      Jiang Han, Xu QiuLiang, Chen Guohua
      School of Computer Science and Technology, Shan Dong University, China

  (In)Security of Efficient Tree‐Based Group Key Agreement Using Bilinear Map 
      Raphael C.-W Phan1, Bok-Min Goi2
                  .
      1Electronic   & Electrical Engineering, Loughborough University, UK
      2Centre   for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of
      Engineering, Multimedia University, Malaysia

   
             
             
         The 2nd IEEE/IFIP International Workshop on Ubiquitous Underwater Sensor Network 
                                              (UUWSN’08) 
                                                                 Wednesday,  17  December,  2008
                                        
  Welcome speech                                                            09:00  –  09:10am,  Function  Room  1&2
   

  Session 1: Applications       Chair:  Dongwon  Jeong 09:10  –  10:30am,  Function  Room  1&2

  Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater 
  Speech Communication 
     Hyung-jun Ju, Se-young Kim, Jung-woo Han, Ki-man Kim, Seok-yeb Kang
     Department of Radio Communication Engineering, Korea Maritime University, Korea

  Research on the Encrypted Data Access Control of Multi‐purpose Asynchronous WSN 
     Qian Sun, Shanqing Guo, Qiuliang Xu
     College of Computer Science and Technology, Shandong University, China

  ELM‐MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC 
  Protocol 
     Phil-Jung Yun, Changhwa Kim, Sangkyung Kim
     Department of Computer Science & Engineering, Kangnung National University, Korea

  Omnet++ Based Simulation for Underwater Environment 
     Soo Young Shin, Soo Hyun Park
     School of Business Information Technology, Kookmin University, Korea

  
    Coffee Break (10:30 – 11:00am) 
    
    Keynote Speech: Revolution for the Water World: Underwater Wireless Networked Sensing 
    Jun‐Hong  Cui,  Department  of  Computer  Science  &  11:00  –  12:30pm,  Function  Room  1&2
    Engineering, University of Connecticut, USA 
    
    Lunch (12:30 – 13:30pm) 
    
    Session 2: Protocols/Systems 
 
    Chair: Young‐Sik Jeong                                14:00  –  15:30pm,  Function  Room  1&2
    Point‐to‐Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless 
  Sensor Networks 
     Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park
     Department of Electrical Engineering, Kangnung National University, Korea

  Energy‐Efficient Routing Protocol in Underwater Acoustic Sensor Networks 
     Heungwoo Nam, Sunshin An
     Department of Electronics Engineering, Korea University, Korea
Session 2: Protocols/Systems (Continued) 
 
        Chair: Young‐Sik Jeong                                               14:00  –  15:30pm,  Function  Room  1&2

  Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks 
        Trong Hung Nguyen, Soo Young Shin, Soo Hyun Park
        Graduate School of Business Information Technology, Kookmin University, Korea


  Scalable Uniformly‐Distributed Clustering Mechanism for Sensor Networks 
        Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim
        Department of Computer Science & Engineering, Kangnung National University, Korea

     
     Coffee Break (15:30 – 16:00pm)                             
      
              
              
              The IEEE/IFIP International Workshop on Ubiquitous Wireless Multihop Networking 
                                                  (UWMN’08) 
                                                                    Wednesday,  17  December,  2008
                                          

  Session 1                                          Chair:  Song  Guo 16:00  –  17:30pm,  Function  Room  1&2


  On‐Demand Deployment Algorithm for a Hybrid Sensor Network 
     Liang-Cheng Shiu1, Chao-Yang Lee2, Tian-Wen Song3,4, Chu-Sing Yang2
     1Department   of Information Technology, National Pingtung Institute of Commerce, Taiwan
     2Department   of Electrical Engineering, National Cheng Kung University, Taiwan
     3Department   of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan
     4Department   of Applied Internet Science, Hsing Kuo University, Taiwan

  An Improved Design of the Ubiquitous Learning System Based on Sensor Networks 
     Mianxiong Dong1, Gongwei Zhang2, Kaoru Ota1,3, Song Guo1, Minyi Guo1,2
     1School   of Computer Science and Engineering, The University of Aizu, Japan
     2Department   of Computer Science and Engineering, Shanghai Jiao Tong University, China
     3Department   of Computer Science, Oklahoma State University, USA


  A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols 
     Jiangwei Zhou, Boqin Feng, Gangqiang Wei
     The School of Electronic and Information Engineering, Xi’an Jiaotong University, China


  Route Stability in Wireless Mesh Access Networks 
     Usman Ashraf, Slim Abdellatif, Guy Juanole
     University of Toulouse, France

  A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network 
     Hao Xu, Dejun Mu
     Institute of Controls and Networks, School of Automation, Northwestern Polytechnical University, China

            
            
  The 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems (NCUS’08)
                                                             Wednesday,  17  December,  2008
                                           

  Session 1                                         Chair:  Jeffrey  Fan               09:00  –  10:30am,  Function  Room  7

  A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks 
     Tian-Wen Song1,2, Chu-Sing Yang3
     1Department    of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan
     2Department    of Applied Internet Science, Hsing Kuo University, Taiwan
     3Department    of Electrical Engineering, National Cheng Kung University, Taiwan

  CayleyChord: A Novel P2P Overlay Network 
     Wenjun Xiao1, Mingxin He1,2, Wenhong Wei1
     1Department    of Computer Science, South China University of Technology, China
     2Department    of Computer Science, Jinan University, China


  Improving BitTorrent Network's Performance via Deploying Helpers   
     Ke Xu1, Yahui Yang2, Tao Chen1
     1Department    of Computer Science and Technology, Tsinghua University, China
     2School   of Software and Microelectronics, Peking University, China

  Adaptive Load Balancing for Lookups in Heterogeneous DHT 
     Zhi Chen, Guowei Huang, JingDong Xu, Yang Yang
     Department of Computer Science, Nankai University, China

  The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM 
  Networks   
     Simone Cintra Chagas1, Eber Huanca Cayo2, Koji Nakano3, Jacir Luiz Bordim4
     1School   of Electrical Engineering , Faculty of Technology, University of Brasília, Brazil
     2School   of Mechanic Engineering, Faculty of Technology, University of Brasília , Brazil
     3Department    of Information Engineering, School of Engineering, Hiroshima University , Japan
     4Department    of Computer Science , Campus Universitario - Asa Norte, University of Brasília, Brazil

  
     Coffee Break (10:30 – 11:00am)                                    
   

  Session 2                                             Chair:  Huan  Li               11:00  –  12:30pm,  Function  Room  7


  The Analysis and Simulation of a Hybrid Video Broadcast Architecture 
     He Lei, Ma Xiangjie, Zhang Weili, Guo Yunfer, Ma Hailong
     China National Digital Switching System Engineering and Technology Research Center (NDSC)
  Session 2 (Continued)                             Chair:  Huan  Li           11:00  –  12:30pm,  Function  Room  7

  On the Impact of DoS Attacks on Secure Service Discovery 
  Slim Trabelsi1, Guillaume Urvoy-Keller2, Yves Roudier2
  1SAP   Labs France, France; 2Institute Eurecom, France


  MAC Layer Misbehavior on Ad Hoc Networks 
  Nicole R. Nagel1, Ruzbeh Shokranian1, Jacir L. Bordim1, K. Nakano2
  1Department    of Computer Science, University of Brasilia, Brazil
  2Department    of Information Engineering, School of Engineering, Hiroshima University, Japan

  CSON‐D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous 
  Networking 
  Dineshbalu Balakrishnan1, Amiya Nayak1, Pulak Dhar2
  1School    of Information Technology and Engineering, University of Ottawa, Canada; 2Cistech Limited, Ottawa, Canada

  Communications via Systems‐on‐Chips Clustering in Large‐Scaled Sensor Networks 
  Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar
  Department of Electrical and Computer Engineering, Florida International University, USA



  Lunch (12:30 – 13:30pm)                                         
   

  Session 3                                   Chair:  Koji  Nakano             13:30  –  15:00pm,  Function  Room  7

  Discovery Architecture for the Tracing of Products in the EPCglobal Network 
  Gyeongtaek Lee, Jonghun Shin, Daewon Park, Hyukchul Kwon
  Department of Computer Science & Engineering, Pusan National University, Korea


  A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment 
  Qi Liu, Nigel Linge
  Informatics Research Institute, University of Salford, UK


  Analysis of Web Service Substitutability Based on Typed Pi‐Calculus 
  Su Jin-dian1, Yu Shan-shan2, Guo He-qing1
  1College   of Computer Science and Engineering, South China University of Technology, China
  2School    of Information and Technology, Computer Science Department, Sun Yat-sen University, China

          
          
          
  Session 3 (Continued)                       Chair:  Koji  Nakano          16:00  –  17:30pm,  Function  Room  4&5


  An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks 
  Yu Huang1,2, Bo Liu2, Xianping Tao1,2, Jiannong Cao3, Beihong Jin4
  1State    Key Laboratory for Novel Software Technology, Nanjing University, China
  2Department     of Computer Science and Technology, Nanjing University, China
  3Internet   and Mobile Computing Lab, Department of Computing, Hong Kong Polytechnic University, China
  4Technology     Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China


  A Context Management System for Supporting Context‐Aware Applications 
  Eunhoe Kim, Jaeyoung Choi
  School of Computing, Soongsil University, Korea

   
  Tutorial: Multi‐core Supported Security Systems for Embedded and Ubiquitous Applications 

   Wanlei Zhou and Yang Xiang                                                  15:10  –  18:00pm,  Function  Room  7
         
         The 3rd IEEE/IFIP International Workshop on Trustworthiness, Reliability and services in 
                                   Ubiquitous and Sensor neTworks (TRUST’08) 
                                                                     Wednesday,  17  December,  2008
                                
        Opening and Keynote Speech: Data Mining for Malicious Code Detection and Security Applications 
      Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, USA 

      Chair: Stephen S. Yau, Co‐chair, TRUST 2008, and Arizona State University, USA 
                                                            09:00  –  10:30am,  Function  Room  4&5
      
      Coffee Break (10:30 – 11:00am) 
                                
        Session 1: Data Mining, Security and Trust Computing 
 
        Chair: Jia Zhang, Iowa State University, USA                               11:00  –  12:30pm,  Function  Room  4&5

  Mean‐Variance Model for International Portfolio Selection 
        Qiming Pan, Xiaoxia Huang
        School of Economics and Management, University of Science and Technology, China

  Attacks on Improved Key Distribution Protocols with Perfect Reparability 
        Raphael C.-W Phan1, Bok-Min Goi2
                    .
        1Electronic    & Electrical Engineering, Loughborough University, UK
        2Centre     for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of
        Engineering, Multimedia University, Malaysia


  Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation 
        Omar Hasan1, Jean-Marc Pierson2, Lionel Brunie1
        1Institut   National des Sciences Appliquées de Lyon, France; 2Institut de Recherche en Informatique de Toulouse, France


  A Trusted Third Party Based Secure Authentication Scheme of E‐Commerce 
        Longjun Zhang, Zou Tao
        Department of Communication Engineering, Engineering College of Armed Police Force, China

     
        Lunch (12:30 – 13:30pm)                                       
      
        Session 2: Trust, Service Computing and Management 
 
        Chair: Jen‐Marc Pierson, IRIT, France                                      14:00  –  15:30pm,  Function  Room  4&5

  Probabilistic Trust Management in Pervasive Computing 
        Mieso K. Deno, Tao Sun
        Department of Computing and Information Science, University of Guelph, Canada
Session 2: Trust, Service Computing and Management (Continued) 
 
     Chair: Jen‐Marc Pierson, IRIT, France                                14:00  –  15:30pm,  Function  Room  4&5

  Discovering the Most Trusted Agents without Central Control 
     Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki
     Polish-Japanese Institute of Information Technology, Poland

  A Mobile Agent‐Supported Web Services Testing Platform 
     Jia Zhang, Di Xu
     Department of Computer Science, Northern Illinois University, USA


  Large‐Scale USN Middleware Based on Context‐Aware 
     Won-Hee Han1, Sung-Won Kim1, Sun-Mi Park1, Chang-Wu Lee1, Jong-hyuk Park2, Young-Sik Jeong1
     1Department   of Computer Engineering, Wonkwang University, Korea
     2Department   of Computer Science and Engineering, Kyungnam University, Korea

      
      Coffee Break (15:30 – 16:00pm) 
                                
     Session 3: Panel: Grand Challenges in Ubiquitous and Sensor Networks 
  Chair: Stephen S. Yau, Arizona State University, 
                                                     16:00  –  17:30pm,  Function  Room  4&5
  USA   
  Panelists:
         Jungde Cheng, Saitama University, Japan
         Bhavani Thuraisingham, University of Texas at Dallas, USA
         Min-You Wu, Shanghai Jiao Tong University, China
           
       The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive 
                                          Applications (TSP’08) 
                                                                  Thursday,  18  December,  2008
                                         
   Opening Ceremony                                       10:00  –  10:30am,  Function  Room  1&2
   Chair: Guojun Wang, Central South University, China 
   
   Keynote Speech:    Building Trustworthy Semantic Webs 
   Bhavani Thuraisingham, The University of Texas at Dallas, USA 
   Chair:  Wenbin  Luo,  St.  Mary's  University,  San  10:30 – 11:30am, Function Room 1&2
   Antonio, Texas, USA 
                            
     Session 1: Secure Schemes and Metrics 
  Chair: Sancheng Peng, City University of Hong 
                                                       11:30  –  12:30pm,  Function  Room  1&2
  Kong 
  Voting‐Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc 
  Networks 
     Sancheng Peng1,2, Weijia Jia1,3, Guojun Wang1
     1School   of Information Science and Engineering, Central South University, China
     2School   of Computer and Communication, Hunan University of Technology, China
     3Department    of Computer Science, City University of Hong Kong, Hong Kong


  Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless 
  Sensor Networks 
     YaHui Li1, DingYong2, JianFeng Ma1
     1Ministry   of Education Key, Laboratory of Computer Networks and Information Security, Xidian University, China
     2School   of Mathematics and Computational Science, Guilin University of Electronic Technology, China

  A Sanitizing Signature Scheme with Indexing 
     Atsushi Koide1, Raylin Tso2, Eiji Okamotov1
     1University   of Tsukuba, Japan; 2National Chengchi University, Taiwan


  Error Detection Schemes for CED in Block Ciphers 
     Ewa Idzikowska, Krzysztof Bucholc
     Poznaʼn University of Technology, Poland

                                                                    
     Lunch (12:30 – 13:30pm)                                        
   
Session 2: Trust Management and Privacy Protection I 
 
     Chair: Wenbin Luo, St. Mary’s University                                14:50  –  16:10pm,  Function  Room  1&2

  An Impact‐Oriented Metric for Interference to Network Routing 
     Song Huang, Lie-Gen Liu
     South China University of Technology, China

  User‐Directed Privacy Protection in the Ubiquitous Environment 
     JaeHun Lee, JinKyu Park, SangWook Kim
     Kyungpook National University, Korea


  Provably Secure Trusted Access Protocol for WLAN Mesh Networks 
     Zhuo Ma1, Jianfeng Ma2, Yulong Shen2
     1School   of Computer Science, Xidian University, China
     2Key   Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, China

  Towards Trustworthy and Secure Kiosk Computing for Mobile Users 
     Dong Zhou, Hiroshi Inamura
     DoCoMo USA Labs, USA

  Automatic Generation and Enforcement of Security Contract for Pervasive Application 
     Ying Jin, Zepeng Li, Da Wei, Lei Liu
     College of Computer Science and Technology, Jilin University

  Exponential Hashing in Finite Fields 
     Wenbin Luo1, Gregory Heileman2
     1Engineering   Department, St. Mary’s University, USA
     2Department    of Electrical & Computer Engineering, University of New Mexico, USA

  Research of a Multi‐dimension Measurement Trusting Model Based on Markov Chain 
     Hongyan Mao, Yixiang Chen
     Software Engineering Institute of East China Normal University, China

                                                                   
     Coffee Break (16:10 – 16:20pm)                                       
                                                                          




                                                                          
Session 3: Trust Management and Privacy Protection II 
 
        Chair: Jarrod Trevathan, James Cook University                            16:20  –  17:50pm,  Function  Room  1&2

  Defending against the Propagation of Active Worms 
        Xiang Fan1, Yang Xiang1,2
        1School    of Management and Information Systems, Central Queensland University, Australia
        2Centre    for Intelligent and Networked Systems, Central Queensland University, Australia

  Convertible Undeniable Partially Blind Signature from Bilinear Pairings 
        Atsushi Koide1, Raylin Tso2, Eiji Okamoto1
        1University   of Tsukuba, Japan
        2National   Chengchi University, Taiwan


  Analyzing Privacy Designs of Mobile Social Networking Applications 
        Guanling Chen, Faruq Rahman
        Department of Computer Science, University of Massachusetts Lowell, USA

  Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access 
  Technology 
        Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang
        National Digital Switching System Engineering & Technology Research Center, China

  Privacy Engine for Context‐Aware Enterprise Application Services 
        Marion Blount1, John Davis2, Maria Ebling1, William Jerome1, Barry Leiba1, Xuan Liu1, Archan Misra1
        1IBM   T J Watson Research Center; 2Ling Fling, Inc., USA

  The Trustworthiness Based on Hash Chain in Wireless Sensor Network 
        Xiong Peng1,2, Zhang Wei1
        1Department    of Computer Science and Technology, East China Normal University, China
        2Department    of Computer Science and Technology, Nanchang Hangkong University, China

  Trust Similarity Measure in Trust Model for P2P Networks 
        Yizhi Ren1,2, Mingchu Li1, Cheng Guo1, Yongrui Cui1, Kouichi Sakurai2
        1School    of Software, Dalian University of Technology, China
        2Department    of Computer Science and Communication Engineering, Kyushu University, Japan

     
                
                
                
                
                
                
                
                
       The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive 
                                          Applications (TSP’08) 
                                                                      Friday,  19  December,  2008
   
     Session 4: Encryption and Decryption I 
  Chair: Chien‐Pen Chuang, National Taiwan 
                                                                               10:30  –  12:10pm,  Function  Room  1&2
  Normal University 
  Distance Bounding Protocol for Multiple RFID Tag Authentication 
     Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu
     Department of Information Systems and Operations Management, University of Florida, USA

  Encryption and Decryption with Space Transformation for Bi‐directional Association 
     Chien-Pen Chuang1, Tin-Ying Huang2, Li-Chi Yeh3
     1Department    of Applied Electronic, Technology, National Taiwan, Normal University Taipei, Taiwan
     2Department    of Mechatronic, Technology, National Taiwan, Normal University Taipei, Taiwan
     3Department    of Industrial, Education, National Taiwan, Normal University Taipei, Taiwan


  Cryptanalysis of Li et al.’s Identity‐Based Threshold Signcryption Scheme 
     S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
     Theoretical Computer Science Laboratory, Indian Institute of Technology Madras, India

  Online Signature Verification Algorithm Using Hill‐Climbing Method 
     Daigo Muramatsu
     Department of Electrical and Mechanical Engineering, Seikei University, Japan

  Converters for Designing Applied Cryptographic Protocols 
     Zhao Huawei1, Qin Jing2, Fang Zhifeng3
     1School   of Computer and Information Engineering, Shandong University of Finance, China
     2School   of Mathematics and System Sciences, Shandong University, China
     3Information   Science and Technology, Shandong Institute of Political Science and Law, China

  A Novel Self‐Renewal Hash Chain and Its Implementation 
     Haojun Zhang1, Xiaoxue Li2, Rui Ren1
     1Henan    University of Technology, China; 2Agricultural Bank of China, China

  
     Lunch (12:10 – 13:30pm)                                        
                                          




                                          
Session 5: Encryption and Decryption II 
  Chair: Feilong Tang, Shanghai Jiao Tong 
                                                                         13:30  –  15:10pm,  Function  Room  1&2
  University, China 
  Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database 
  Tae Youn Won, Ji Young Chun, Dong Hoon Lee
  Graduate School of Information Management and Security, Korea University, Korea

  Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal 
  Framework 
  Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li

  Towards Successive Privacy Protection in Sensor Networks 
  Baokang Zhao1,2, Dan Wang2, Zili Shao2, Jiannong Cao2, Keith C.C. Chan2, Jinshu Su1, Yanqin Yang3
  1School   of Computer Science, National University of Defense Technology, China
  2Department   of Computing, Hong Kong Polytechnic University, China
  3Department   of Computer Science and Engineering, Shanghai Jiao Tong University, China

  Markov Model‐Based Handwritten Signature Verification 
  Alan McCabe, Jarrod Trevathan
  School of Mathematics, Physics and Information Technology, James Cook University, Australia

  An Efficient RFID Authentication Protocol for Low‐Cost Tags 
  Yanfei Liu
  Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and
  Telecommunications, China

  Trustworthy Semantic Web Technologies for Secure Knowledge Management 
  Bhavani Thuraisingham, Pranav Parikh
  Department of Computer Science, The University of Texas at Dallas Richardson, USA

   
  Coffee Break (15:10 – 15:30pm)                              
   




   
Euc Program
Euc Program
Euc Program
Euc Program

Contenu connexe

Similaire à Euc Program

Bell schedule 2011 2012
Bell schedule 2011 2012Bell schedule 2011 2012
Bell schedule 2011 2012
tech315
 
Symposium
SymposiumSymposium
Symposium
kxtan2
 
Symposium
SymposiumSymposium
Symposium
kxtan2
 
Nov 2009 Apache Asia Road Show Schedule 20091123
Nov 2009 Apache Asia Road Show Schedule 20091123Nov 2009 Apache Asia Road Show Schedule 20091123
Nov 2009 Apache Asia Road Show Schedule 20091123
OpenSourceCamp
 
2015 rccgna young adult & singles ministry schedule
2015 rccgna   young adult & singles ministry schedule2015 rccgna   young adult & singles ministry schedule
2015 rccgna young adult & singles ministry schedule
Jay Gene
 
Friday Night Live Rehearsal Report #1.pdf
Friday Night Live Rehearsal Report #1.pdfFriday Night Live Rehearsal Report #1.pdf
Friday Night Live Rehearsal Report #1.pdf
ssusera06209
 

Similaire à Euc Program (20)

Retreat Agenda
Retreat AgendaRetreat Agenda
Retreat Agenda
 
Sched
SchedSched
Sched
 
Bell schedule 2011 2012
Bell schedule 2011 2012Bell schedule 2011 2012
Bell schedule 2011 2012
 
Symposium
SymposiumSymposium
Symposium
 
Symposium
SymposiumSymposium
Symposium
 
Agenda asomm
Agenda asommAgenda asomm
Agenda asomm
 
Agenda Asomm
Agenda AsommAgenda Asomm
Agenda Asomm
 
Nov 2009 Apache Asia Road Show Schedule 20091123
Nov 2009 Apache Asia Road Show Schedule 20091123Nov 2009 Apache Asia Road Show Schedule 20091123
Nov 2009 Apache Asia Road Show Schedule 20091123
 
Portland State 110411 Final
Portland State 110411 FinalPortland State 110411 Final
Portland State 110411 Final
 
5.hor analisis2012 1
5.hor analisis2012 15.hor analisis2012 1
5.hor analisis2012 1
 
5.hor analisis2012 1
5.hor analisis2012 15.hor analisis2012 1
5.hor analisis2012 1
 
Horarios de Analisis de Sistemas 2012-1
Horarios de Analisis de Sistemas 2012-1Horarios de Analisis de Sistemas 2012-1
Horarios de Analisis de Sistemas 2012-1
 
2015 rccgna young adult & singles ministry schedule
2015 rccgna   young adult & singles ministry schedule2015 rccgna   young adult & singles ministry schedule
2015 rccgna young adult & singles ministry schedule
 
Schedule 1
Schedule 1Schedule 1
Schedule 1
 
Friday Night Live Rehearsal Report #1.pdf
Friday Night Live Rehearsal Report #1.pdfFriday Night Live Rehearsal Report #1.pdf
Friday Night Live Rehearsal Report #1.pdf
 
6.hor produccion2012 1
6.hor produccion2012 16.hor produccion2012 1
6.hor produccion2012 1
 
6.hor produccion2012 1
6.hor produccion2012 16.hor produccion2012 1
6.hor produccion2012 1
 
Oration 2012 schedule
Oration 2012 scheduleOration 2012 schedule
Oration 2012 schedule
 
7th GO-GN Seminar, Delft 2018
7th GO-GN Seminar, Delft 20187th GO-GN Seminar, Delft 2018
7th GO-GN Seminar, Delft 2018
 
Schedule puns 2020 (1)
Schedule puns 2020 (1)Schedule puns 2020 (1)
Schedule puns 2020 (1)
 

Dernier

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Euc Program

  • 1. EUC 2008 Program EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008 Shanghai, China Sponsored by Shanghai Jiao Tong University Shanghai Computer Society IEEE Computer Society Supported by National Natural Science Foundation of China Shanghai Pudong New Area Association for Computer Foundation of Science & Tech. Development of Shanghai Pudong New Area
  • 2. EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008, Shanghai, China Contents EUC 2008 Conference Schedule at a Glance Organization Technical Program Committee The Map of EUC 2008 Conference Place Access Guide to Conference Place Reception and Pujiang Cruise Banquet Lunch EUC 2008 Advanced Technical Program Tour guide
  • 3. EUC 2008 Conference Schedule at a Glance Wednesday, 17 December 2008 - EUC workshops   Room Function Function Function Function Room 1&2 Time Room 3 Room 7 Room 4&5 UUWSN-08 TRUST-08 9:00-9:10 EUV-08 Welcome speech NCUS-08 Opening and 9:10-10:30 UUWSN-08 Session 1 Keynote speech 10:30-11:00 Coffee Break UUWSN-08 TRUST-08 11:00-12:30 EUV-08 NCUS-08 Keynote Speech Session 1 12:30-13:30 Lunch 13:30-14:00 NCUS-08 14:00-15:00 UUWSN-08 TRUST-08 15:00-15:10 ESO-08 Coffee Break Session 2 Session 2 15:10-15:30 15:30-16:00 Coffee Break Tutorial 1 Coffee Break 16:00-16:30 Coffee Break TRUST-08 16:30-16:50 UWMN-08  Coffee Break SECUBIQ-08 Session 3 (Panel) 16:50-17:30 Tutorial 2 17:30-18:00 18:30-20:00 Supper in Yayuefang Restaurant (100m away from the conference place) Thursday, 18 December 2008 - EUC 2008 main conference and TSP-08 Room Function Function Function Grand Ballroom Time Room 4&5 Room 7 Room 1&2 EUC-08 Opening 8:30-9:00 Ceremony Keynote Speech I 9:00-10:00 (Yaoxue Zhang) TSP-08 Opening 10:00-10:30 Coffee Break Ceremony TSP-08 10:30-11:30 EUC-08 EUC-08 Keynote Speech Session 1A Session 1B 11:30-12:10 TSP-08 Session 1
  • 4. 12:10-12:30 Lunch 12:30-13:30 Lunch Keynote Speech II 13:30-14:30 (Tarek Abdelzaher) 14:30-14:50 Coffee Break Coffee Break 14:50-15:00 TSP-08 15:00-16:10 Session 2 EUC-08 EUC-08 16:10-16:20 Coffee Break Session 2A Session 2B 16:20-16:40 TSP-08 Session 3 16:40-17:50 18:00-19:00 Take bus from hotel to the dock 19:00-21:00 Reception and Pujiang Cruise Friday, 19 December 2008 - EUC 2008 main conference and TSP-08 Room Function Function Function Grand Ballroom Time Room 4&5 Room 7 Room 1&2 Keynote Speech III 9:00-10:00 (Xiaodong Zhang) 10:00-10:30 Coffee Break EUC-08 EUC-08 TSP-08 10:30-12:10 Session 3A Session 3B Session 4 12:10-13:30 Lunch EUC-08 EUC-08 TSP-08 13:30-15:10 Session 4A Session 4B Session 5 15:10-15:30 Coffee Break EUC-08 EUC-08 TSP-08 15:30-17:10 Session 5A Session 5B Session 6 17:10-18:30 Rest in the hotel 18:30-21:30 Banquet in the hotel Saturday, 20 December 2008 - EUC 2008 main conference and TSP-08 Room Function room 4&5 Function Room 7 Function room 1&2 Time 8:30-10:10 EUC-08 Session 6A EUC-08 Session 6B TSP-08 Session 7 10:10-10:30 Coffee Break 10:30-12:10 EUC-08 Session 7A EUC-08 Session 7B TSP-08 Session 8
  • 5. 12:10-13:30 Lunch 13:30-15:10 EUC-08 Session 8A EUC-08 Session 8B TSP-08 Session 9 15:10-15:30 Coffee Break 15:30-16:50 EUC-08 Session 9A EUC-08 Session 9B
  • 6. Organization General Chair Minyi Guo, Shanghai Jiao Tong Univ., China Program Chair Cheng-Zhong Xu, Wayne State Univ., USA Program Vice-Chairs Embedded Systems Soft- Jihong Kim, Seoul National Univ., Korea ware and Optimization Embedded Systems and Zonghua Gu, Hong Kong Univ. of Science and Hard-ware/software Technology, Hong Kong Co-Design Cyber-Physical Systems Oleg Sokolsky, Univ. of Pennsylvania, USA Real-time Systems Albert M. K. Cheng, Univ. of Houston, USA Power Aware Computing Gang Quan, Univ. of South Carolina, USA Network Protocols Sherali Zeadally, Univ. of the District of Columbia, USA Wireless Networks Ivan Stojmenovic, Univ. of Ottawa, Canada Sensor Networks Loren Schwiebert, Wayne State Univ., USA Context Aware Mobile Jiannong Cao, Hong Kong Polytechnic Univ., HK Computing Agent and Distributed Wentong Cai, Nanyang Technological Univ., Singapore Computing Middleware and P2P Chung-Ta King, National Tsing Hua Univ., Taiwan Multimedia and Data Xiaobo Zhou, Univ. of Colorado, USA Management Security and Fault Makoto Takizawa, Tokyo Denki Univ., Japan Tolerance Workshop Chairs Zhijun Wang, Hong Kong Polytechnic Univ., Hong Kong Dakai Zhu, Univ. of Texas at San Antonio, USA Publicity Chairs Ben A. Abderazek, Univ. of Aizu, Japan Wenbin Jiang, Huazhong Univ. of Science and Technology, China Publication Chair Yu Hua, Huazhong Univ. of Science and Technology, China Local Arrangement Chairs Feilong Tang, Shanghai Jiao Tong Univ., China Minqi Zhang, Shanghai Computer Society, China Jingyu Zhou, Shanghai Jiao Tong Univ., China Yao Shen, Shanghai Jiao Tong Univ., China
  • 7. Yanqin Yang, East China Normal Univ., China Technical Program Committee Jemal Abbawajy Deakin University, Australia Kemal Akkaya Southern Illinois University, USA Stefan Andrei Lamar University, USA David Atienza Complutense University of Madrid, Spain Neil Audsley University of York, UK Hakan Aydin George Mason University, USA Iain Bate University of York, UK Paolo Bellavista Università di Bologna, Italy Lim Hock Beng National University of Singapore, Singapore Miodrag Bolic University of Ottawa, Canada Azzedine Boukerche University of Ottawa, Canada Stephen Bush GE Research, USA Jian Cao Shanghai Jiaotong University, China Jean Carle University of Lille, France Eduardo Cerqueira University of Coimbra, Portugal Chaitali Chakrabarti Arizona State University, USA Samarjit Chakraborty National University of Singapore, Singapore Alvin T.S. Chan Hong Kong Polytechnic University, Hong Kong Rong-Guey Chang National Chung-Cheng University, Taiwan Han-Chieh Chao National Ilan University, Taiwan Hsi-Lu Chao National Chiao-Tung University, Taiwan Ling Teck Chaw University of Malaya, Malaysia Guihai Chen Nanjing University, China Hongyang Chen University of Tokyo, Japan Albert K. Cheng University of Houston, USA Reynold Cheng Hong-Kong Polytechnic University, Hong Kong Naveen Chilamkurti LaTrobe University, Australia
  • 8. Pai Chou University of California at Irvine, USA Sung Woo Chung Korea University, Korea Yeh-Ching Chung National Tsing-Hua University, Taiwan Stephen Cranefield University of Otago, New Zealand Saumitra Das Purdue University, USA Qianni Deng Shanghai Jiaotong University, China Qingxu Deng Northeastern University, China Murat Demirbas University of Buffalo, USA Ming Dong Wayne State University, USA Junzhao Du Xidian University, China Hala Elaarag Stetson University, USA Said Elnaffar United Arab Emirates University, UAE Sebastian Fischmeister University of Waterloo, Canada Eric Fleury INRIA-INSA Lyon, France Scott Fowler Aston University, UK Song Fu University of New Mexico Technology, USA Satoshi Fujita Hiroshima University, Japan Aniruddha Gokhale Vanderbilt University, USA Lin Guan Loughborough University, UK Song Guo University of Aizu, Japan Hani Hagras University of Essex, UK Jérôme Härri Universität Karlsruhe, Germany Mohamed Hefeeda Simon Fraser University, Canada Seongsoo Hong Seoul National University, Korea Hung-Chang Hsiao National Cheng Kung University, Taiwan Pao-Ann Hsiung National Chung Cheng University, Taiwan Ching-Hsien Hsu Chung Hua University, Taiwan Kien A. Hua University of Central Florida, USA Ray Hunt University of Canterbury, New Zealand Jacek Ilow Dalhousie University, Canada Jadwiga Indulska University of Queensland, Australia Tohru Ishihara Kyushu University, Japan Russ Joseph Northwestern University, USA Jehn-Ruey Jiang National Central University, Taiwan Beihong Jin Institute of Software, CAS, China Soon Ju Kang Kyung Book National University, Korea
  • 9. Jung Guk Kim Hankuk University of Foreign Studies, Korea Young-Jin Kim Sun Moon University, Korea Polychronis Koutsakis McMaster University, Canada László Kovács Hungarian Academy of Science, Hungary T. John Koo Shantou University, China Srdjan Krco Ericsson, Dublin, Ireland Mohan Kumar University of Texas at Arlington, USA Tei-Wei Kuo National Taiwan University, Taiwan Bjorn Landfeldt University of Sydney, Australia Peter Langendoerfer IHP-Microelectronics, Germany Julia Lawall University of Copenhagen, Demark Jaejin Lee Seoul National University, Korea Chang-Gun Lee Seoul National University, Korea Jenq-Kuen Lee National Tsing-Hua University, Taiwan Victor Lee Hong Kong City University, Hong Kong Wang-Chien Lee The Pennsylvania State University, USA Wonjun Lee Korea University, Korea Hong-Va Leong Hong Kong Polytechnic University, Hong Kong Clement Leung Victoria University, Australia Kuan-Ching Li Providence University, Taiwan Xiang-Yang Li Illinois Institute of Technology, USA Zhu Li Motorola Labs, USA Qilian Liang University of Texas at Arlington, USA Weifa Liang Australian National University, Australia Sung-Soo Lim Kookmin University, Korea Teck Meng Lim StarHub Ltd, Singapore Justin Lipman Intel, China Annie Liu SUNY, Stony Brook, USA Hai Liu University of Ottawa, Canada Jane Liu Academia Sinica, Taiwan Steve Liu Texas A&M University, USA Xue Liu McGill University, Canada Yunhao Liu Hong Kong University of Science and Technology, Hong Kong Brian Logan University of Nottingham, UK Malcolm Low Nanyang Technological University, Singapore
  • 10. Luis Loyola DoCoMo Euro Laboratories, Germany Zongwei Luo The University of Hong Kong, Hong Kong Huadong Ma Beijing University of Posts & Telecommunications, China Rupak Majumdar University of California at Los Angeles, USA Kami Makki University of Toledo, USA Gregorio Martinez University of Mercia, Spain Jaime Lloret Mauri University of Valencia, Spain Xiaofeng Meng Renmin University of China, China Chunyan Miao Nanyang Technological University, Singapore Kazuhiro Minami University of Illinois at Urbana-Champaign, USA Vincent John Mooney Georgia Institute of Technology, USA Farid Nait-Abdesselam University of Sciences and Technologies of Lille, France Joseph K. Ng Hong Kong Baptist University, Hong Kong Alex Nicolau University of California at Irvine, USA Ertan Ozturk Zonguldak Karaelmas University, Turkey Christian Poellabauer University of Notre Dame, USA Raj Rajkumar Carnegie Mellon University, USA Binoy Ravindran Virginia Tech, USA John Regehr University of Utah, USA Shangping Ren Illinois Institute of Technology, USA Ayad Salhieh Jordan University of Science and Technology, Jordan Shivakumar Sastry University of Akron, USA Sahra Sedigh University of Missouri - Rolla, USA Sudhanshu K. Semwal University of Colorado at Colorado Springs, USA Lui Sha University of Illinois at Urbana-Champaign, USA Li Shang Queen's University, Canada Zili Shao Hong Kong Polytechnic University, Hong Kong Haiying Shen University of Arkansas, USA Michael Sheng University of Adelaide, Australia Weisong Shi Wayne State University, USA Yuanchun Shi Tsinghua University, China Daniel Shih National Taiwan University, Taiwan Timothy Shih Tamkang University, Taiwan Dongkun Shin SungKyunKwan University, Korea Sang Son University of Virginia, USA Jack Stankovic University of Virginia, USA
  • 11. Robert James Steele University of Technology, Sydney, Australia Limin Sun Chinese Academy of Sciences, China Niranjan Suri Institute of Human and Machine Cognition, USA Yasuyuki Tahara National Institute of Informatics, Japan David Tanier Monash University, Australia Xueyan Tang Nanyang Technological University, Singapore Xianping Tao Nanjing University, China Yong Meng Teo National University of Singapore, Singapore Georgios K. University of Birmingham, UK Theodoropoulos Lothar Thiele ETH Zurich, Switzerland CY Tsui Hong Kong University of Science and Technology, HK Hiroyuki Tomiyama Nagoya University, Japan Fabris Valois INSA, Lyon, France Nalini University of California at Irvine, USA Venkatasubramanian Jan Vitek Purdue University, USA Andy Wang Florida State University, USA Cho-Li Wang University of Hong Kong, Hong Kong Shige Wang General Motors, USA Tzone-I Wang National Cheng Kung University, Taiwan Xiaorui Wang University of Tennessee, USA Jianbin Wei Yahoo, USA Weigang Wu Sun Yat-Sen University, China Bin Xiao Hong Kong Polytec University, Hong Kong Nong Xiao National University of Defense Technology, China Guoliang Xing City University of Hong Kong, Hong Kong Lizhen Xu Southeast University, China Jianliang Xu Hong Kong Baptist Univ., Hong Kong Ming Xu National University of Defense and Technology, China Yun Yang Swinburne University of Technology, Australia Hiroyuki Yomo Aalborg University, Denmark Chuck Yoo Korea University, Korea Moustafa Youssef University of Maryland College Park, USA Bo Yu Wayne State University, USA Zhiwen Yu Kyoto University, Japan
  • 12. Qing-An Zeng University of Cincinnati, USA Daqing Zhang National Institute of Telecommunications, France Liqiang Zhang Indian University South Bend, USA Wei Zhang Southern Illinois University, USA Wensheng Zhang Iowa State University, USA Lin Zhong Rice University, USA Xiliang Zhong Microsoft, USA Wanlei Zhou Deakin University, Australia Dakai Zhu University of Texas, San Antonio, USA Yongxin Zhu Shanghai Jiao Tong University, China Additional Reviewers Sourav Bhowmick Nanyang Technological University, Singapore Manoranjan Dash Nanyang Technological University, Singapore Yuhong Feng Hong Kong Polytechnic University, Hong Kong Jiayu Gong Wayne State University, USA Jia Rao Wayne State University, USA Aixin Sun Nanyang Technological University, Singapore Muzhou Xiong Nanyang Technological University, Singapore
  • 13. General Chair Prof. Minyi Guo Department of Computer Science and Engineering, Shanghai Jiao Tong University, China Professor Minyi Guo received his Ph.D. degree in computer science from University of Tsukuba, Japan. Before 2000, Dr. Guo had been a research scientist of NEC Corp., Japan. He is now a full professor at the Department of Computer Software, The University of Aizu, Japan, from 2000 to 2005. During this period, he was also a visiting professor of Georgia State University, USA, Hong Kong Polytechnic University, University of Hong Kong, National Sun Yet-sen University in Taiwan, China, University of Waterloo, Canada and University of New South Wales, Australia. He is also a professor of Shanghai Jiao Tong University and Nanjing University, China. Dr. Guo has published more than 120 research papers in international journals and conferences. Dr. Guo has served as general chair, program committee or organizing committee chair for many international conferences. He is the founder of International Conference on Parallel and Distributed Processing and Applications (ISPA), and International Conference on Embedded and Ubiquitous Computing (EUC). He is the editor-in-chief of the Journal of Embedded Systems. He is also in editorial board of Journal of Pervasive Computing and Communications, International Journal of High Performance Computing and Networking, Journal of Embedded Computing, Journal of Parallel and Distributed Scientific and Engineering Computing, and International Journal of Computer and Applications. Dr. Guo's research interests include parallel and distributed processing, parallelizing compilers, Pervasive Computing, Embedded Software Optimization, molecular computing and software engineering. He is a member of the ACM, IEEE, IEEE Computer Society, and IEICE.
  • 14. Program Chair Prof. Cheng-Zhong Xu Department of Electrical and Computer Engineering, Wayne State University, USA Cheng-Zhong Xu is a professor in the Department of Electrical and Computer Engineering of Wayne State University. He is also the director of the Center for Networked Computing Systems at WSU. His research interest includes networked computing systems and applications, in particular scalable and secure Internet services and architecture, scheduling and resource management in distributed, parallel, and embedded systems, and autonomic systems management for highly reliable computing. He has published more than 140 peer-reviewed scientific papers in archival journals and conferences in these areas. He is the author of quot;Scalable and Secure Internet Services and Architecturequot; (Chapman & Hall/CRC Press, 2005) and the leading co-author of quot;Load Balancing in Parallel Computers: Theory and Practicequot; (Kluwer Academic, 1996). Dr. Xu serves on the editorial boards of IEEE Transactions on Parallel and Distributed Systems, J. of Parallel and Distributed Computing, J. of Parallel, Emergent, and Distributed Systems, J. of Computers and Applications, and J. of High Performance Computing and Networking. He has also guest edited special issues for several other journals on network services and security in distributed systems. He has served a number of international conferences and workshops in various capacities as program chair, general chair, and plenary speaker. He was a recipient of “President's Award for Excellence in Teaching” of WSU in 2002 and “Career Development Chair Award” in 2003. Dr. Xu received the BS and MS degrees from Nanjing University in 1986 and 1989, respectively, and the Ph.D. degree from the University of Hong Kong in 1993. He is a senior member of IEEE.
  • 15. Keynote Speaker Prof. Yaoxue Zhang Department of Higher Education, Ministry of Education, China The Challenges and Opportunities in Transparent Computing Abstract: In this talk, we present some new research results about our Transparent Computing which is a new computing paradigm for service sharing. Rapid development in computer networks let people easily share the hardware and software resources, however, because the slow progress in Operating system technologies and few changes in computer architectures in several decades, it is still not easy to share services from different software and hardware platforms for users. Transparent Computing paradigm separates the storages and executions of software programs and data including what of operating systems in different computers connecting with communication networks. In this paradigm, data and programs are stored in the storage servers and they are executed in either clients or execution servers according to the required services, respectively. We propose a new mechanism called Meta OS to manage this separation. This mechanism extends the Neumann architecture special-temporally, so that a sequentially virtual computing can be effectively obtained and the individual service sharing can be easily performed underlying different Operating System platforms. We will introduce the idea, the mechanism and algorithms of proposed Meta OS for
  • 16. the separation of the programs and data including what of Operating Systems. Moreover, we also present some examples about the applications of this computing paradigm.   Biography Prof. Zhang Yaoxue was born in Li County, Hunan province, China, in 1956. He graduated from Northwest Institute of Telecommunication Engineering, China, obtained his Ph.D degree in computer networking from Tohoku University, Japan in 1989. One year later, he joined Department of Computer Science, Tsinghua University, China. He was a visiting professor of Massachusetts Institute of Technology (MIT) and University of Aizu, in 1995 and 1998, respectively. He served as the President of China Central Radio & TV University from Nov. 2001 to Jun. 2006. Currently, Prof. Zhang is a fellow of the Chinese Academy of Engineering, a professor in computer science and technology in Tsinghua University, and the Director General for Higher Education of Ministry of Education, China. He is also a member of the Expert Committee on Military Computer and Software Technology of PLA General Armament Department, of the Advisory Committee on State Informatization, and of Technical Committee on Ubiquitous/Pervasive Computing of China Computer Federation. Additionally, he serves as an editorial board member of 4 international journals: International Journal of Wireless and Mobile Computing, Journal of Autonomic and Trusted Computing, Chinese Journal of Electronics and Chinese Journal of Computer. Prof. Zhang's major research areas include computer networking, operating systems, and ubiquitous/pervasive computing. He has led many national and international research, international collaboration and industrialization projects. Because of his distinguished contributions, Prof. Zhang has won the National Award for Scientific and Technological Progress (2nd class) twice in 1998 and 2001, and National Award for Technological Invention (2nd class) in 2004, as well as 5 provincial or ministerial awards. He is a winner of the Prize of HLHL (Hong Kong) Foundation for Scientific and Technological Progress in 2005. He has filed 16 Chinese patents and 3 American patents as the first inventor, of which 13 have been granted. Accordingly, he won the Top Patent Award of China in 2006. Prof. Zhang has published over 170 technical papers in international journals and conferences, as well as 8 monographs and textbooks. He received the IEEE Best Paper Award in the 21st IEEE AINA International Conference in 2007.
  • 17. Recently, Prof. Zhang's research mainly focuses on Transparent Computing and Active Services. Transparent Computing is a computing paradigm to solve the problem of how to access different operating systems and applications on one terminal platform through networks, and how to run an operating system and applications on different terminal platforms. Active Services is a new approach to evolve current programs and services according to user requirements to provide personalized and comprehensive network services.
  • 18. Keynote Speaker Prof. Xiaodong Zhang Department of Computer Science and Engineering, The Ohio State University, USA Research issues and Challenges to Advance System Software for Multicore Processors and Data-intensive Applications Abstract: Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of quot;memory wallquot; has been shifted to quot;disk wallquot; that is a serious bottleneck for many data-intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems. We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching
  • 19. capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit quot;sequential localityquot; -- for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.   Biography Xiaodong Zhang is the Robert M. Critchfield Professor in Engineering, and Chairman of the Department of Computer Science and Engineering at the Ohio State University. His research interests cover a wide spectrum in the areas of high performance and distributed systems. Several technical innovations and research results from his team have been adopted or being developed in commercial products and open source systems with direct impact to some key computing operations, including the permutation memory interleaving technique first in the Sun MicroSystems' UltraSPARC IIIi processor and then in the Sun's dual-core Gemini Processor, the token thrashing protection mechanism and the Clock-Pro page replacement algorithm for memory management in the Linux Kernel and NetBSD. Xiaodong Zhang was the Director of Advanced Computational Research Program at the National Science Foundation, 2001-2004. He is the associate Editor-in-Chief of IEEE Transactions on Parallel and Distributed Systems, and is also serving on the Editorial Boards of IEEE Transactions on Computers, IEEE Micro, and Journal of Parallel and Distributed Computing. He received his Ph.D. in Computer Science from University of Colorado at Boulder.  
  • 20. Keynote Speaker Associate Prof. Tarek Abdelzaher Department of Computer Science, University of Illinois at Urbana Champaign, USA Research Challenges in Distributed Cyber-Physical Systems Abstract: Moore's law, automation considerations, and the pervasive need for timely information lead to a next generation of distributed systems that are open, highly interconnected, and deeply embedded in the physical world. Such systems, called cyber-physical, were recently named the first research priority in networking and information technology in the US by the nation's presidential council of advisors on science and technology. They offer new research challenges that stem from openness, scale, and tight coupling between computation, communication, and distributed interaction with both physical and social contexts. Growing challenges span a large spectrum ranging from new models of computation for systems that live in physical and social spaces, to the enforcement of reliable, predictable, and timely end-to-end behavior in the face of high interactive complexity, increased uncertainty and imperfect implementation. This talk discusses the top challenges in cyber-physical systems and conjectures on research directions of increasing interest in this realm. Biography Tarek Abdelzaher received his B.Sc. and M.Sc. degrees in Electrical and Computer
  • 21. Engineering from Ain Shams University, Cairo, Egypt, in 1990 and 1994 respectively. He received his Ph.D. from the University of Michigan in 1999 on Quality of Service Adaptation in Real-Time Systems. He has been an Assistant Professor at the University of Virginia, where he founded the Software Predictability Group until 2005. He is currently an Associate Professor at the Department of Computer Science, the University of Illinois at Urbana Champaign. He has authored/coauthored more than 100 refereed publications in real-time computing, distributed systems, sensor networks, and control. He is Editor-in-Chief of the Journal of Real-Time Systems, an Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, the ACM Transaction on Sensor Networks, and the Ad Hoc Networks Journal, as well as Editor of ACM SIGBED Review. He was Program Chair of RTAS 2004 and RTSS 2006, and General Chair of RTAS 2005, IPSN 2007, RTSS 2007, DCoSS 2008 and Sensys 2008. Abdelzaher's research interests lie broadly in understanding and controlling the temporal properties of software systems in the face of increasing complexity, distribution, and degree of embedding in an external physical environment. Tarek Abdelzaher is a member of IEEE and ACM.
  • 22. The Map of EUC 2008 Conference Place EUC 2008 conference place: Courtyard by Marriott Shanghai-Pudong Address of conference place: 838 Dong Fang Road, Pudong District, Shanghai, China Access Guide to EUC 2008 Conference Place There are two airports in Shanghai, Pudong International Airport(PVG) and Hongqiao International Airport (SHA) and there are two railway stations in Shanghai, , Shanghai Railway Station and Shanghai South Railway Station. Our hotel is at the crossing of Dong Fang Road and Wei Fang Road. The usual traffic direction is followed. 1. From Shanghai Pudong International Airport(PVG) Taxi only
  • 23. A20 (Outside Circle) --- turn right onto Luo Shan Road --- turn left onto Hua Mu Road --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 40 minutes to the hotel. Estimated taxi fare: 120 RMB (one way, if traffic condition is fine) Maglev Train and Subway Line No.2 Take Maglev Train from Pudong International Airport to Longyang Road Subway Station, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 60 RMB for Subway line No.2 and economy Maglev Train, 110 RMB for Subway line No.2 and VIP Maglev Train. Airport bus Line No.3 and Subway Line No.2 Take Airport bus Line No.3 from Pudong International Airport to Longyang Road Subway Station, then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference place on foot, which takes around 5 minutes. Totally about 25 RMB is needed. Airport bus Line No.5 and Taxi Take Airport bus Line No.5 from Pudong International Airport to Oriental hospital, then take a taxi to the hotel. Totally about 35 RMB is needed. 2. From Hongqiao International Airport(SHA) Taxi only Yan An Road Elevated High Way --- to Yan An East Road Tunnel --- to Shi Ji Da Dao (Century Blvd) --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 30 minutes to the hotel. Estimated taxi fare: 70 RMB (one way,if traffic condition is fine) Bus No. 925A and Subway Line 2 Take Bus No. 925A from Hongqiao International Airport to People's Square, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 8 RMB is needed. 3. From Shanghai Railway Station or Shanghai South Railway Station Subway Line No.1 and No.2 Take Subway Line No.1 from either Railway Station to People's Square Station, and then interchanges to Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 5~7 RMB is needed.
  • 25. Reception and Pujiang Cruise We will hold a Pujiang cruise to welcome the EUC 2008 attendee from all over the world. Pujiang cruise is the classical aquatic travel program, it’s not only because that the Huangpu River is the mother river of Shanghai, and the representative and reduction of Shanghai, but also the two sides of the river gather the famous sights of Shanghai city, such as the Eastern pearl broadcasts the television tower, Bund's Wan Guo reads extensively the group. Boarding on the boat, with delicious buffet, you can feel the honorable position and the long history of the bund; also you can step on the top deck, listen to the pulse and rhythm of Pudong times. You will understand quot;the scene of dazzling fireworks and lanterns lively districtquot; ideal condition. Reception time: 19:00 ~21:00 on Dec.18, 2008 Reception place: Pujiang Cruise ship Banquet Banquet time: 18:30~21:30 on Dec.19, 2008 Banquet place: Grand Ballroom at Courtyard by Marriott Shanghai-Pudong Lunch Lunch place: Spices Café at Courtyard by Marriott Shanghai-Pudong
  • 26. Tour guide The Bund quot;The Bundquot; is a long, storied road in Shanghai. The Bund has been considered a historic symbol of Shanghai for over one hundred years. It is a source of great pride to the Shanghai people, as it shows the world Shanghai's culture and its capability to synchronize and meld its local culture with civilizations abroad. The Bund faces Shanghai's mother river, the Huangpu River. Behind the Bund are old buildings representing architectural styles from different countries. The unique geography around the Bund and that geography's effect on the economy of Shanghai and China throughout the past one hundred years fills the Bund with cultural connotation and undertones. The river, the long bank, the green belt and the different architectural styles of the buildings on the Bund is the most quot;Shanghai-likequot; sight in Shanghai. In the morning, the Bund is a popular place for jogging and workouts. It is a charming sight for tourists in the daytime and it becomes lovers' lane at night! Chenyi Square At the end of the 10-mile Nanjing Road is Chenyi Square, dominated by a sculpture of Chenyi-the first Shanghai mayor of the People's Republic of China. The sculpture is made of bronze and stands 5.6 meters high with a red granite underlay 3.5 meters high. Every weekend, a grand quot;Square Concertquot; is held in front of the sculpture. To the south of the sculpture is a popular fountain. Many colored lamps are set under the water of the fountain, and these lamps are turned on at night. The beautiful colored water streams created by the lamps are a great sight to see in Chenyi Square at night. Sightseeing Tunnel The Bund's Tunnel stretches from the end of Nanjing Road on the Puxi side to the Oriental Pearl TV Tower on the Lujiazui side - a total length of 646.70 meters. This
  • 27. tunnel was finished at the end of 2000; it was the first pedestrian tunnel built in China. Tourists may enter the tunnel through an elevator at the entrance on either side. It takes about two to five minutes to walk the length of the tunnel. Many high-tech displays are featured inside. All kinds of designs, ads, panoramic displays and background music about people, history, culture and technology are displayed throughout the tunnel, making your visit there both interesting and thrilling. Xujiahui Xujiahui is one of the most prosperous business centers, with many famous mansions and shopping centers. The history of the district dates back to Ming Dynasty. A famous scientist Xu Guangqi, the Secretary of the Grand Council, had been buried here. Some of his descendants had multiplied and lived here, so it was first named quot;Xujia Villagequot; and then gradually developed into town. The name quot;Xujiahuiquot; was from the fact that Xu Guangqi built a cottage at the joint of the two rivers of Zhaojiabang and Lihongjing. In March 1957, Changshu and Xuhui districts were amalgamated into the new Xuhui District. Lujiazui Financial Center The Lujiazui Financial Center is located in the Pudong district of Shanghai. The famous buildings in this area include: The Oriental Pearl TV Tower, which is surrounded by the Yangpu Bridge in the northeast and the Nanpu Bridge in the southwest, creating a picture of 'twin dragons playing with pearls'. The tower with 468 meters high (1,536 feet) is the world's third tallest TV and radio tower surpassed in height only by towers in Toronto, Canada and Moscow, Russia. Shanghai International Conference Center, which is located to the northwest of Oriental Pearl TV Tower, along Riverside Boulevard, opposite to the Bund. The conference center covers an area of 45 thousand square meters, with modern conference halls, two multi-functional halls (around 4300 square meters), one international conference hall of press center (around 2500 square meters) and two conference halls that can hold 200 people.
  • 28.  EUC Main Conference        Thursday, 18 December, 2008      Opening Remark    08:30  –  09:00am,  Grand  Ballroom      Keynote Speech I: The Challenges and Opportunities in Transparent Computing    Yaoxue Zhang (Tsinghua University)    09:00  –  10:00am,  Grand  Ballroom    Coffee Break (10:00 – 10:30am)         EUC‐1A: Hardware/Software Co‐Design I  10:30  –  12:10pm,  Function  Room  4&5   Session Chair: Meikang Qiu, University of New Orleans, USA    A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for  Time Critical Applications  Archana Kalyansundar, Rita Chattopadhyay Siemens Corporate Technology India, India   Advanced Optimization and Design Issues of a 32‐Bit Embedded  Processor Based on Produced  Order Queue Computation Model Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan   A Low‐Cost Embedded Controller for Complex Control Systems Zhe Peng, Longhua Ma, Feng Xia State Key Lab of Industrial Control Technology, Zhejiang University, China   Single Instruction Dual‐Execution Model Processor Architecture  Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan      EUC‐1B: Sensor Networks I  10:30 – 12:10pm, Function Room 7   Session Chair: Jinde Chen, Saitama University, Japan    Analysis of Data Delivery Delay in Acoustic Sensor Networks  Chao Wang ,Yan Sun, Huadong Ma Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, China 
  • 29.   A Collaboration‐based Storage Management Scheme in Multimedia Sensor Networks Yunpei Yan1, Guihai Chen1, Sajal Das2 1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Engineering, University of Texas at Arlington, USA   An Integrated Deployment Tool for ZigBee‐Based Wireless Sensor Networks Yu-Kai Huang1, Pi-Cheng Hsiu1, Wei-Ni Chu1, Kuan-Chang Hung1, Ai-Chun Pang1, Tei-Wei Kuo1, Min Di2, Hua-Wei Fang2 1Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 2Networks and Multimedia Institute, Institute for Information Industry, Taiwan   Cooperative Node Localization for Mobile Sensor Networks  Hongyang Chen1, Marcelo H. T. Martins1, Pei Huang2, Hing Cheung So3, Kaoru Sezaki1 1University of Tokyo, Japan 2Michigan State University, USA 3City University of Hong Kong, Hong Kong    Lunch ( 12:10 – 13:30pm)         Keynote Speech II: Research Challenges in Distributed Cyber‐Physical Systems    Tarek Abdelzaher (University of Illinois at Urbana  13:30  –  14:30pm,  Grand  Ballroom Champaign)       Coffee Break (14:30 – 15:00pm)         EUC‐2A: Real‐time and Cyber‐Physical Systems 15:00  –  16:40pm,  Function  Room  4&5   Session Chair: Hui Guo, University of New South Wales, New Zealand   A Systematic Framework for Structured Object‐Oriented Security Requirements Analysis in  Embedded Systems  Sojan Markose, Xiaoqing (Frank) Liu, Bruce McMillin Computer Science Department, Missouri University of Science and Technology, USA   Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors  Shinpei Kato, Nobuyuki Yamasaki Department of Information and Computer Science, Keio University, Japan   Robust Feedback Control Scheduling in Distributed Embedded Real‐Time Systems Bing Du1, Chun Ruan2 1School of Electrical and Information Engineering, The University of Sydney, Australia 2School of Computing and Mathematics, University of Western Sydney, Australia
  • 30.   RT‐P2P: A Scalable Real‐Time Peer‐to‐Peer System with Probabilistic Timing Assurances  Fei Huang1, Binoy Ravindran1, E. D. Jensen2 1Department of Electrical & Computer Engineering, Virginia Tech, USA 2The MITRE Corporation, USA   EUC‐2B: Multimedia and Data Management I  15:00  –  16:40pm,  Function  Room  7   Session Chair: Huan Li, Beihang University, China      UMDD: User Model Driven Software Development  Xiaochun Wang1,2, Yuanchun Shi1 1Department of Computer Science and Technology, Tsinghua University, China 2GGV Sub-station, Postdoctoral Workstation of Zhongguancun Haidian Garden, China   A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test  Ashraf Armoush, Falk Salewski, Stefan Kowalewski Embedded Software Laboratory, RWTH Aachen University, Germany   Data Management for Context‐Aware Computing Wenwei Xue1, Hungkeng Pung1, Wenlong Ng1, Tao Gu2 1School of Computing, National University of Singapore, Singapore 2Institute for Infocomm Research, Singapore   Efficient Data Scheduling for Multi‐item Queries in On‐Demand Broadcast  Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin School of Computer Science, Fudan University, China                       
  • 31.   Friday, 19 December, 2008       Keynote Speech III: Research Issues and Challenges to Advance System Software    Xiaodong Zhang (Ohio State University)    09:00  –  10:00am,  Grand  Ballroom    Coffee Break (10:00 – 10:30am)         EUC‐3A: Embedded SW Optimization I  10:30  –  12:10pm,  Function  Room  4&5   Session Chair: Tarek Abdelzaher, University of Illinois at Urbana, USA    An Improved EMD Embedding Scheme Based on Secret Image Difference  Chin-Chen Chang1, Chin-Feng Lee2, Yi-Ren Wang3 1Department of Information Engineering and Computer Science Management, Feng Chia University, Taiwan 2Department of Information Management, Chaoyang University of Technology, Taiwan 3Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan   A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems Lei Sun, Tatsuo Nakajima Department of Computer Science, Waseda University, Japan   SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima Department of Computer Science, Waseda University, Japan   Optimizing the Embedded Caching and Prefetching Software on a Network‐Attached Storage  System  Shih-Hao Hung1,2, Chien-Cheng Wu1, Chia-Heng Tu2 1Graduate Institute of Networking and Multimedia; 2Department of Computer Science and Information Engineering National Taiwan University, Taiwan      EUC‐3B: Wireless Networks I  10:30  –  12:10pm,  Function  Room  7   Session Chair: Hongyang Chen, University of Tokyo, Japan      Fuzzy Self‐Clustering for Wireless Sensor Networks  Yahya M. Tashtoush, Mohammed A. Okour The Department of Computer Science, Jordan University of Science and Technology, Jordan   Secure Authentication in Wireless Sensor Networks Using RF Fingerprints D. A. Knox, T. Kunz Department of Systems and Computer Engineering, Carleton University, Canada
  • 32.   Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc  Networks Romeo Said, Yves Mahéo Valoria, Université Européenne de Bretagne, France   A Scenario‐based Directional Communication Performance in Wireless Ad hoc Networks Murad Khalid1, In-ho Ra2, Young-hoon Joo2, Ravi Sankar1 1Department of Electrical Engineering, University of South Florida, USA 2School of Electronic and Information Engineering, Kunsan National University, Korea    Lunch (12:10 – 13:30pm)         EUC‐4A: Network Protocols I  13:30  –  15:10pm,  Function  Room  4&5   Session Chair: Jun Yang, University of Pittsburgh, USA    Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application  Dejia Shi1, Weijin Jiang1,2, 3, Danping Xu3 1School of Computer and Electronic Engineering, Hunan University of Commerce, China 2School of Computer, Wuhan University of Technology, China 3The College of Information Engineering, Xiangtan University, China   Countering DDoS and XDoS Attacks against Web Services  Xinfeng Ye Department of Computer Science, Auckland University, New Zealand   Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2‐D Mesh Network on Chip Xiao Canwen, Zhang Minxuan, Dou Yong, Zhao Zhitong School of Computer Science, National University of Defense Technology, China   A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks Ze Li, Haiying Shen Department of Computer Science and Computer Engineering, University of Arkansas, USA      EUC‐4B: Power‐aware Computing  13:30  –  15:10pm,  Function  Room  7   Session Chair: Jingling Xue, University of New South Wales, Australia    Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment  Meikang Qiu1, Jiande Wu1, Jingtong Hu2, Yi He2, Edwin H.-M. Sha2 1Department of Electrical Engineering, University of New Orleans, USA 2Department of Computer Science, University of Texas at Dallas, USA 
  • 33.   A Low Power Error Detection Technique for Floating‐Point Units in Embedded Applications Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi Dependable System Laboratory, Sharif University of Technology, Iran   A Generalized Framework for System‐Wide Energy Savings in Hard Real‐Time Embedded  Systems Gang Zeng1, Hiroyuki Tomiyama11, Hiroaki Takada1, Tohru Ishihara2 1Graduate School of Information Science, Nagoya University, Japan 2System LSI Research Center, Kyushu University, Japan   Application Specific Low Power ALU Design  Yu Zhou, Hui Guo School of Computer Science & Engineering, University of New South Wales, Australia    Coffee Break (15:10 – 15:30pm)         EUC‐5A: Hardware/Software Co‐Design II  15:30  –  17:10pm,  Function  Room  4&5   Session Chair: Wei Zhang, Southern Illinois University , USA      Hardware Support for Efficient Sparse Matrix Vector Multiplication  Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue School of Computer Science and Engineering, University of New South Wales, Australia   Accelerating Montgomery Modulo Multiplication for Redundant Radix‐64k Number System on  the FPGA Using Dual‐Port Block RAMs Koji Shigemoto, Kensuke Kawakami, Koji Nakano Department of Information Engineering, Hiroshima University, Japan   A State‐Based Predictive Approach for Leakage Reduction of Functional Units Linfeng Pan1, Minyi Guo1, Yanqin Yang1,2, Meng Wang2, Zili Shao2 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2Department of Computing, Hong Kong Polytechnic University, Hong Kong 3Department of Computer Science and technology, East China Normal University, China   Automatic Integration of Non‐Bus Hardware IP into SoC‐Platforms for Use by Software  Robert Guenzel Department of Integrated Circuit Design(E.I.S.), Technical University of Braunschweig, Germany   
  • 34.   EUC‐5B: Context‐aware Computing  15:30  –  17:10pm,  Function  Room  7   Session Chair: Beihong Jin, Chinese Academy of Sciences, China      A Probabilistic Approach to Consistency Checking for Pervasive Context  Yu Huang1,2, Xiang Ma2, Xianping Tao1,2, Jiannong Cao3, Jian Lu1,2 1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Department of Computing, Hong Kong Polytechnic University, Hong Kong   Human Universality in Ubiquitous Computing: Maslow, Where Are You?  Sebastien Duval1, Christian Hoareau2, Hiromichi Hashizume3 1National Institute of Informatics, Japan 2The Graduate University for Advanced Studies, Japan 3National Institute of Informatics, Japan   Learning in Small and Large Ubiquitous Computing Environments  Jorge Barbosa1, Rodrigo Hahn1, Débora N. F Barbosa2, Cl´udio F R. Geyer3 . . 1PIPCA/Unisinos, São Leopoldo – RS – Brazil 2UniLasalle, Canoas – RS – Brazil 3UFRGS, Porto Alegre – RS – Brazil   Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous  Computing  Jingde Cheng Department of Information and Computer Sciences, Saitama University, Japan                     
  • 35.   Saturday, 20 December, 2008       EUC‐6A: Sensor Networks II  08:30  –  10:10am,  Function  Room  4&5   Session Chair: Haiying Shen, University of Arkansas, USA      Adaptive Buffer Management for Efficient Code Dissemination in Multi‐Application Wireless  Sensor Networks  Weijia Li1, Yu Du1, Youtao Zhang1, Bruce Childers1, Ping Zhou2, Jun Yang2 1Computer Science Department, University of Pittsburgh, USA 2Electric and Computer Engineering Department, University of Pittsburgh, USA   Quorum‐Based Energy Saving MAC Protocol Design for Wireless Sensor Networks Chih-Min Chao, Yi-Wei Lee Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan   An Energy‐Efficient Waiting Caching Algorithm in Wireless Sensor Networks Junfeng Xu, Keqiu Li, YanMing Shen, Jian Liu Department of Computer Science and Engineering, Dalian University of Technology, China   A Grid‐Based Distributed Multi‐Hop Routing Protocol for Wireless Sensor Networks  Wenjun Liu1, Yue Sun1, Jiguo Yu2, Baoxiang Cao2 1City College, Wenzhou University, China 2School of Computer Science, Qufu Normal University, China      EUC‐6B: Multi‐Agent Systems  08:30  –  10:10am,  Function  Room  7   Session Chair: Xinfeng Ye, Auckland University, New Zealand    Dynamic Substitutability Analysis of Web Service Composition via Extended π‐Calculus  Jin-dian Su1, Shan-shan Yu2, He-qing Guo1 1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China   Efficient Self‐Healing Key Distribution with Limited Group Membership for  Communication‐Constrained Networks Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang School of Computer Science, Fudan University, China   An Empirical Study on Interoperability between Service Discovery Protocols  Beihong Jin, Zhi Zang, Liang Zhang Institute of Software, Chinese Academy of Sciences, China   A Reasonable Approach for Defining Load Index in Parallel Computing  Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng Computer Science and Engineering Department, Shanghai Jiao Tong University, China
  • 36. Coffee Break (10:10 – 10:30am)         EUC‐7A: Middleware and Peer‐to‐Peer  10:30  –  12:10pm,  Function  Room  4&5   Session Chair: Xiaobo Zhou, University of Colorado, USA      Load Balancing in Peer‐to‐Peer Networks Based on Sampling System States  Hung-Chang Hsiao, I-Ta Lin, Hao Liao Department of Computer Science and Information Engineering, National Cheng-Kung University, Taiwan   The Effect of Routing‐Load Dispersion on Congestion Control in Structured P2P Networks  Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu Department of Computer Science, Nankai University, China   AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication  Liang Zhang1, Beihong Jin1, Jiannong Cao2 1Technology Center of Software Engineering, Institute of Software, China 2Department of Computing, The Hong Kong Polytechnic University, Hong Kong   A Self‐configuring Personal Agent Platform for Pervasive Computing Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu Department of Computing, Hong Kong Polytechnic University, Hong Kong      EUC‐7B: Embedded Software Optimization II  10:30  –  12:10pm,  Function  Room  7   Session Chair: Tei‐Wei Kuo, National Taiwan University    A Light Lock Management Mechanism for Optimizing Real‐Time and Non‐Real‐Time  Performance in Embedded Linux  Maobing Dai1, Toshihiro Matsui2, Yutaka Ishikawa3 1Graduate School of Information Science and Technology, The University of Tokyo, Japan 2National Institute of Advanced Industrial Science and Technology, Japan 3Yutaka Ishikawa Graduate School of Information Science and Technology, The University of Tokyo, Japan    Design and Optimization of a Java Ahead‐of‐Time Compiler for Embedded Systems Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae School of Electrical Engineering and Computer Science, Seoul National University, Korea   Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller Chantana Phongpensri, K. Sripanomwan Department of Computing, Faculty of Science, Silpakorn University, Thailand
  • 37.   Control‐Flow Checking Using Branch Instructions  Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali Dependable System Laboratory, Sharif University of Technology, Iran    Lunch (12:10 – 13:30pm)         EUC‐8A: Wireless Networks II  13:30  –  15:10pm,  Function  Room  4&5   Session Chair: Guihai Chen, Nanjing University, China      RADAR: Rate‐Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi‐Rate  Wireless Networks  Liqiang Zhang1, Yu-Jen Cheng1, Xiaobo Zhou2 1Department of Computer & Information Sciences, Indiana University South Bend, USA 2Department of Computer Science, University of Colorado at Colorado Springs, USA   A Hybrid Anti‐Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory  Consumption  Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu School of Microelectronics, Shanghai Jiao Tong University, China   Rule‐Based WiFi Localization Methods  Qiuxia Chen1, Dik-Lun Lee1, Wang-Chien Lee2 1Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong 2Computer Science and Engineering, The Pennsylvania State University, University Park, USA   Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks  Yuanyuan Zhang1, Dawu Gu1,2, Bart Preneel2 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2ESAT-COSIC, Katholieke Universiteit Leuven (KUL), Belgium      EUC‐8B: Real‐Time and Cyber‐Physical Systems II  13:30 – 15:10pm, Function Room 7   Session Chair: Wenbin Jiang, Huazhong University of Science and Technology, China      Performance Comparison of Techniques on Static Path Analysis of WCET Mingsong Lv1, Zonghua Gu2, Nan Guan1, Qingxu Deng1, Ge Yu1 1Northeastern University, China 2Hong Kong University of Science and Technology, Hong Kong   Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway  Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato Department of Information Systems Design, Doshisha University, Japan
  • 38.   TRAcME: Temporal Activity Recognition Using Mobile Phone Data  Driss Choujaa, Naranker Dulay Department of Computing, Imperial College London, UK   Adaptive Drowsy Cache Control for Java Applications  Sun Yu, Wei Zhang Department of Electrical and Computer Engineering, Southern Illinois University, USA    Coffee Break (15:10 – 15:30pm)         EUC‐9A: Network Protocols II  15:30  –  16:50pm,  Function  Room  4&5   Session Chair: Hung‐Chang Hsiao, National Cheng‐Kung University, Taiwan      Evaluating the Effect of Inter Process Communication Efficiency on High Performance  Distributed Scientific Computing  Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi Computer Engineering Department, Iran University of Science & Technology, Iran   Hierarchical Cluster‐Based Irregular Topology Customization for Networks‐on‐Chip Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng Department of Electronic Engineering, Tsinghua University, China   Design and Analysis of a Stable Queue Control Scheme for the Internet Naixue Xiong1,2, Laurence T. Yang3, Yaoxue Zhang4, Yuezhi Zhou4, Yingshu Li2 1Department of Computer Science, Wuhan University of Science and Engineering, China 2Computer Science, Georgia State University, USA 3Department of Computer Science, St. Francis Xavier University, Canada 4Department of Computer Science & Technology, Tsinghua University, China      EUC‐9B: Multimedia and Data Management II  15:30  –  16:50pm,  Function  Room  7   Session Chair: Meilin Liu, Wright State University, USA      Lossless Data Hiding Based on Histogram Modification for Image Authentication Chin-Chen Chang1,2, Wei-Liang Tai2, Kuo-Nan Chen2 1Department of Information Engineering and Computer Science, Feng Chia University, Taiwan 2Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan   A New Proxy Scheme for Large‐Scale P2P VoD System  Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao School of Computer Science and Technology, Huazhong University of Science and Technology, China
  • 39.   A Signature‐based Grid Index Design for RFID Main‐Memory Databases Rong-Jhang Liao1, Pei-Lun Suei1, Yung-Feng Lu1, Tei-Wei Kuo1,2, Chun-Sho Lee3 1Department of Computer Science and Information Engineering, National Taiwan University, Taiwan 2Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 3Innovative DigiTech-Enabled Application & Services Institute, Institute for Information Industry, Taiwan                    
  • 40.  EUC Workshops      st   The 1  IEEE/IFIP International Workshop on End‐User Virtualization (EUV’08)      Wednesday,  17  December,  2008      Session 1                  Chair: Xiaofei Liao 09:00  –  10:30am,  Function  Room  3   A Framework to Evaluate and Predict Performances in Virtual Machines Environment    Deshi Ye, Qinming He, Hua Chen, Jianhua Che   College of Computer Science, Zhejiang University, China    Performance Measuring and Comparing of Virtual Machine Monitors  Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang   College of Computer Science, Zhejiang University, China    An Optimized COW Block Device Driver in VMM for Fast, On‐Demand Software Deployment  Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang   School of Computer, National University of Defense Technology, China    Analysis and Enhancement for Interactive‐Oriented Virtual Machine Scheduling  Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng Microprocessor Research and Development Center, Peking University, China   Coffee Break (10:30 – 11:00am)         Session 2                  Chair: Xiaofei Liao 11:00  –  12:30pm,  Function  Room  3   DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture  Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao School of Computer, National University of Defense Technology, China   A Novel Virtual Grid Experiment Method in MedImGrid  Ran Zheng, Xiaofei Liao, Hai Jin Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, China   VirtualCluster: Customizing the Cluster Environment through Virtual Machines  Kang Chen, Jun Xin, Weimin Zheng Department of Computer Science and Technology, Tsinghua University, China
  • 41.   Session 2 (Continued)  Chair: Xiaofei Liao 11:00  –  12:30pm,  Function  Room  3   Allocating Resource in Grid Workflow Based on State Prediction  Jiong Yu1,2, Guo-Zhong Tian1,3, Ling Cheng1,3 1School of Information Science and Engineering, Xinjiang University, China 2School of Computer Science and Technology, Beijing Institute of Technology, China 3Department of Computer Engineering, Xinjiang Polytechnic College, China   Cooperative Problem Solving Process Based on MAS_NP Model  Yan-bin Peng1, Bei-shui Liao2, Ji Gao3, Jun Hu4, Cun-hao Wang3, Jie-Qing Ai3, Hang Guo3 1School of Information and Electronic Engineering, Zhejiang University of Science and Technology, China 2Center for the Study of Language and Cognition, Zhejiang University, China 3College of Computer Science, Zhejiang University, China 4College of Computer Science, Hunan University, China    
  • 42.   The 3rd IEEE/IFIP International Workshop on Embedded Software Optimization (ESO’08)    Wednesday, 17 December, 2008      Session 1                  Chair:  Meikang  Qiu 13:30  –  16:00pm,  Function  Room  3   UCaS: A Schedulability Analysis Tool for AADL Models  Shenglin Gui1, Lei Luo1, Qian Liu2, Fulei Guo2, Shaopeng Lu2 1School of Computer Science and Engineering, University of Electronic Science and Technology of China 2Research & Development Center, Coretek Systems, China   A GA‐based Systematic Message Scheduling Method for Time‐Triggered CAN  Shan Ding, Zhiqiang Xie, Xiaona Yin College of Information Science and Engineering, Northeastern University, China   Reducing Context Switch Overhead with Compiler‐Assisted Threading  Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö Department of Computer Systems, Tampere University of Technology, Finland Research and Design of Shared Resources Competition Solution among Hardware‐Software    Tasks based on Unified Scheduling  Bing Guo1, Yan Shen2, Lei Zhang1, Xiang Zhou1 1School of Computer Science & Engineering, SiChuan University, China 2University of Electronic Science & Technology of China   A Tiny Processing System for Education and Small Embedded Systems on the FPGAs  Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito Department of Information Engineering, Hiroshima University, Japan   Object Placement for Fully Associative Cache  Chun-Chieh Lin, Chuen-Liang Chen Department of Computer Science and Information Engineering, National Taiwan University, Taiwan Evaluation  of  Partitioning  Methods  for  Stream  Applications  on  a  Heterogeneous  Multi‐core    Processor Simulator  Kai Zheng, Yongxin Zhu, Jun Xu School of Microelectronics, Shanghai Jiao Tong University, China   Coffee Break (16:00 – 16:30pm)          
  • 43.   The 4th IEEE/IFIP International Symposium on Security for Ubiquitous Computing  (SECUBIQ’08)    Wednesday, 17 December, 2008      Session 1                  Chair:  Deqing  Zou 16:30  –  17:30pm,  Function  Room  3   Simple Certificateless Signature with Smart Cards  Kazumasa Omote1, Atsuko Miyaji1, Kazuhiko Kato2 1School of Information Science, Japan Advanced Institute of Science and Technology (JAIST), Japan 2Department of Computer Science, Graduate School of ISE, University of Tsukuba, Japan   Efficient ID‐based Threshold Ring Signature scheme  Jiang Han, Xu QiuLiang, Chen Guohua School of Computer Science and Technology, Shan Dong University, China   (In)Security of Efficient Tree‐Based Group Key Agreement Using Bilinear Map  Raphael C.-W Phan1, Bok-Min Goi2 . 1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia      
  • 44.   The 2nd IEEE/IFIP International Workshop on Ubiquitous Underwater Sensor Network  (UUWSN’08)      Wednesday,  17  December,  2008     Welcome speech  09:00  –  09:10am,  Function  Room  1&2      Session 1: Applications       Chair:  Dongwon  Jeong 09:10  –  10:30am,  Function  Room  1&2 Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater    Speech Communication  Hyung-jun Ju, Se-young Kim, Jung-woo Han, Ki-man Kim, Seok-yeb Kang Department of Radio Communication Engineering, Korea Maritime University, Korea   Research on the Encrypted Data Access Control of Multi‐purpose Asynchronous WSN  Qian Sun, Shanqing Guo, Qiuliang Xu College of Computer Science and Technology, Shandong University, China ELM‐MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC    Protocol  Phil-Jung Yun, Changhwa Kim, Sangkyung Kim Department of Computer Science & Engineering, Kangnung National University, Korea   Omnet++ Based Simulation for Underwater Environment  Soo Young Shin, Soo Hyun Park School of Business Information Technology, Kookmin University, Korea   Coffee Break (10:30 – 11:00am)     Keynote Speech: Revolution for the Water World: Underwater Wireless Networked Sensing    Jun‐Hong  Cui,  Department  of  Computer  Science  &  11:00  –  12:30pm,  Function  Room  1&2 Engineering, University of Connecticut, USA     Lunch (12:30 – 13:30pm)     Session 2: Protocols/Systems    Chair: Young‐Sik Jeong  14:00  –  15:30pm,  Function  Room  1&2 Point‐to‐Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless    Sensor Networks  Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park Department of Electrical Engineering, Kangnung National University, Korea   Energy‐Efficient Routing Protocol in Underwater Acoustic Sensor Networks  Heungwoo Nam, Sunshin An Department of Electronics Engineering, Korea University, Korea
  • 45. Session 2: Protocols/Systems (Continued)    Chair: Young‐Sik Jeong  14:00  –  15:30pm,  Function  Room  1&2   Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks  Trong Hung Nguyen, Soo Young Shin, Soo Hyun Park Graduate School of Business Information Technology, Kookmin University, Korea   Scalable Uniformly‐Distributed Clustering Mechanism for Sensor Networks  Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim Department of Computer Science & Engineering, Kangnung National University, Korea   Coffee Break (15:30 – 16:00pm)          
  • 46.   The IEEE/IFIP International Workshop on Ubiquitous Wireless Multihop Networking  (UWMN’08)      Wednesday,  17  December,  2008       Session 1  Chair:  Song  Guo 16:00  –  17:30pm,  Function  Room  1&2   On‐Demand Deployment Algorithm for a Hybrid Sensor Network  Liang-Cheng Shiu1, Chao-Yang Lee2, Tian-Wen Song3,4, Chu-Sing Yang2 1Department of Information Technology, National Pingtung Institute of Commerce, Taiwan 2Department of Electrical Engineering, National Cheng Kung University, Taiwan 3Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 4Department of Applied Internet Science, Hsing Kuo University, Taiwan   An Improved Design of the Ubiquitous Learning System Based on Sensor Networks  Mianxiong Dong1, Gongwei Zhang2, Kaoru Ota1,3, Song Guo1, Minyi Guo1,2 1School of Computer Science and Engineering, The University of Aizu, Japan 2Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 3Department of Computer Science, Oklahoma State University, USA   A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols  Jiangwei Zhou, Boqin Feng, Gangqiang Wei The School of Electronic and Information Engineering, Xi’an Jiaotong University, China   Route Stability in Wireless Mesh Access Networks  Usman Ashraf, Slim Abdellatif, Guy Juanole University of Toulouse, France   A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network  Hao Xu, Dejun Mu Institute of Controls and Networks, School of Automation, Northwestern Polytechnical University, China    
  • 47.   The 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems (NCUS’08)     Wednesday,  17  December,  2008       Session 1  Chair:  Jeffrey  Fan 09:00  –  10:30am,  Function  Room  7   A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks  Tian-Wen Song1,2, Chu-Sing Yang3 1Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 2Department of Applied Internet Science, Hsing Kuo University, Taiwan 3Department of Electrical Engineering, National Cheng Kung University, Taiwan   CayleyChord: A Novel P2P Overlay Network  Wenjun Xiao1, Mingxin He1,2, Wenhong Wei1 1Department of Computer Science, South China University of Technology, China 2Department of Computer Science, Jinan University, China   Improving BitTorrent Network's Performance via Deploying Helpers    Ke Xu1, Yahui Yang2, Tao Chen1 1Department of Computer Science and Technology, Tsinghua University, China 2School of Software and Microelectronics, Peking University, China   Adaptive Load Balancing for Lookups in Heterogeneous DHT  Zhi Chen, Guowei Huang, JingDong Xu, Yang Yang Department of Computer Science, Nankai University, China The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM    Networks    Simone Cintra Chagas1, Eber Huanca Cayo2, Koji Nakano3, Jacir Luiz Bordim4 1School of Electrical Engineering , Faculty of Technology, University of Brasília, Brazil 2School of Mechanic Engineering, Faculty of Technology, University of Brasília , Brazil 3Department of Information Engineering, School of Engineering, Hiroshima University , Japan 4Department of Computer Science , Campus Universitario - Asa Norte, University of Brasília, Brazil   Coffee Break (10:30 – 11:00am)         Session 2  Chair:  Huan  Li 11:00  –  12:30pm,  Function  Room  7   The Analysis and Simulation of a Hybrid Video Broadcast Architecture  He Lei, Ma Xiangjie, Zhang Weili, Guo Yunfer, Ma Hailong China National Digital Switching System Engineering and Technology Research Center (NDSC)
  • 48.   Session 2 (Continued)  Chair:  Huan  Li 11:00  –  12:30pm,  Function  Room  7   On the Impact of DoS Attacks on Secure Service Discovery  Slim Trabelsi1, Guillaume Urvoy-Keller2, Yves Roudier2 1SAP Labs France, France; 2Institute Eurecom, France   MAC Layer Misbehavior on Ad Hoc Networks  Nicole R. Nagel1, Ruzbeh Shokranian1, Jacir L. Bordim1, K. Nakano2 1Department of Computer Science, University of Brasilia, Brazil 2Department of Information Engineering, School of Engineering, Hiroshima University, Japan CSON‐D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous    Networking  Dineshbalu Balakrishnan1, Amiya Nayak1, Pulak Dhar2 1School of Information Technology and Engineering, University of Ottawa, Canada; 2Cistech Limited, Ottawa, Canada   Communications via Systems‐on‐Chips Clustering in Large‐Scaled Sensor Networks  Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar Department of Electrical and Computer Engineering, Florida International University, USA Lunch (12:30 – 13:30pm)         Session 3  Chair:  Koji  Nakano 13:30  –  15:00pm,  Function  Room  7   Discovery Architecture for the Tracing of Products in the EPCglobal Network  Gyeongtaek Lee, Jonghun Shin, Daewon Park, Hyukchul Kwon Department of Computer Science & Engineering, Pusan National University, Korea   A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment  Qi Liu, Nigel Linge Informatics Research Institute, University of Salford, UK   Analysis of Web Service Substitutability Based on Typed Pi‐Calculus  Su Jin-dian1, Yu Shan-shan2, Guo He-qing1 1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China      
  • 49.   Session 3 (Continued)  Chair:  Koji  Nakano 16:00  –  17:30pm,  Function  Room  4&5   An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks  Yu Huang1,2, Bo Liu2, Xianping Tao1,2, Jiannong Cao3, Beihong Jin4 1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Internet and Mobile Computing Lab, Department of Computing, Hong Kong Polytechnic University, China 4Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China   A Context Management System for Supporting Context‐Aware Applications  Eunhoe Kim, Jaeyoung Choi School of Computing, Soongsil University, Korea    Tutorial: Multi‐core Supported Security Systems for Embedded and Ubiquitous Applications    Wanlei Zhou and Yang Xiang  15:10  –  18:00pm,  Function  Room  7  
  • 50.   The 3rd IEEE/IFIP International Workshop on Trustworthiness, Reliability and services in  Ubiquitous and Sensor neTworks (TRUST’08)      Wednesday,  17  December,  2008     Opening and Keynote Speech: Data Mining for Malicious Code Detection and Security Applications    Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, USA    Chair: Stephen S. Yau, Co‐chair, TRUST 2008, and Arizona State University, USA     09:00  –  10:30am,  Function  Room  4&5    Coffee Break (10:30 – 11:00am)      Session 1: Data Mining, Security and Trust Computing    Chair: Jia Zhang, Iowa State University, USA  11:00  –  12:30pm,  Function  Room  4&5   Mean‐Variance Model for International Portfolio Selection  Qiming Pan, Xiaoxia Huang School of Economics and Management, University of Science and Technology, China   Attacks on Improved Key Distribution Protocols with Perfect Reparability  Raphael C.-W Phan1, Bok-Min Goi2 . 1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia   Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation  Omar Hasan1, Jean-Marc Pierson2, Lionel Brunie1 1Institut National des Sciences Appliquées de Lyon, France; 2Institut de Recherche en Informatique de Toulouse, France   A Trusted Third Party Based Secure Authentication Scheme of E‐Commerce  Longjun Zhang, Zou Tao Department of Communication Engineering, Engineering College of Armed Police Force, China   Lunch (12:30 – 13:30pm)       Session 2: Trust, Service Computing and Management    Chair: Jen‐Marc Pierson, IRIT, France  14:00  –  15:30pm,  Function  Room  4&5   Probabilistic Trust Management in Pervasive Computing  Mieso K. Deno, Tao Sun Department of Computing and Information Science, University of Guelph, Canada
  • 51. Session 2: Trust, Service Computing and Management (Continued)    Chair: Jen‐Marc Pierson, IRIT, France    14:00  –  15:30pm,  Function  Room  4&5   Discovering the Most Trusted Agents without Central Control  Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki Polish-Japanese Institute of Information Technology, Poland   A Mobile Agent‐Supported Web Services Testing Platform  Jia Zhang, Di Xu Department of Computer Science, Northern Illinois University, USA   Large‐Scale USN Middleware Based on Context‐Aware  Won-Hee Han1, Sung-Won Kim1, Sun-Mi Park1, Chang-Wu Lee1, Jong-hyuk Park2, Young-Sik Jeong1 1Department of Computer Engineering, Wonkwang University, Korea 2Department of Computer Science and Engineering, Kyungnam University, Korea    Coffee Break (15:30 – 16:00pm)      Session 3: Panel: Grand Challenges in Ubiquitous and Sensor Networks    Chair: Stephen S. Yau, Arizona State University,  16:00  –  17:30pm,  Function  Room  4&5 USA    Panelists: Jungde Cheng, Saitama University, Japan Bhavani Thuraisingham, University of Texas at Dallas, USA Min-You Wu, Shanghai Jiao Tong University, China  
  • 52.   The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive  Applications (TSP’08)      Thursday,  18  December,  2008     Opening Ceremony    10:00  –  10:30am,  Function  Room  1&2   Chair: Guojun Wang, Central South University, China     Keynote Speech:    Building Trustworthy Semantic Webs    Bhavani Thuraisingham, The University of Texas at Dallas, USA  Chair:  Wenbin  Luo,  St.  Mary's  University,  San  10:30 – 11:30am, Function Room 1&2 Antonio, Texas, USA      Session 1: Secure Schemes and Metrics    Chair: Sancheng Peng, City University of Hong  11:30  –  12:30pm,  Function  Room  1&2 Kong  Voting‐Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc    Networks  Sancheng Peng1,2, Weijia Jia1,3, Guojun Wang1 1School of Information Science and Engineering, Central South University, China 2School of Computer and Communication, Hunan University of Technology, China 3Department of Computer Science, City University of Hong Kong, Hong Kong Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless    Sensor Networks  YaHui Li1, DingYong2, JianFeng Ma1 1Ministry of Education Key, Laboratory of Computer Networks and Information Security, Xidian University, China 2School of Mathematics and Computational Science, Guilin University of Electronic Technology, China   A Sanitizing Signature Scheme with Indexing  Atsushi Koide1, Raylin Tso2, Eiji Okamotov1 1University of Tsukuba, Japan; 2National Chengchi University, Taiwan   Error Detection Schemes for CED in Block Ciphers  Ewa Idzikowska, Krzysztof Bucholc Poznaʼn University of Technology, Poland      Lunch (12:30 – 13:30pm)      
  • 53. Session 2: Trust Management and Privacy Protection I    Chair: Wenbin Luo, St. Mary’s University  14:50  –  16:10pm,  Function  Room  1&2   An Impact‐Oriented Metric for Interference to Network Routing  Song Huang, Lie-Gen Liu South China University of Technology, China   User‐Directed Privacy Protection in the Ubiquitous Environment  JaeHun Lee, JinKyu Park, SangWook Kim Kyungpook National University, Korea   Provably Secure Trusted Access Protocol for WLAN Mesh Networks  Zhuo Ma1, Jianfeng Ma2, Yulong Shen2 1School of Computer Science, Xidian University, China 2Key Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, China   Towards Trustworthy and Secure Kiosk Computing for Mobile Users  Dong Zhou, Hiroshi Inamura DoCoMo USA Labs, USA   Automatic Generation and Enforcement of Security Contract for Pervasive Application  Ying Jin, Zepeng Li, Da Wei, Lei Liu College of Computer Science and Technology, Jilin University   Exponential Hashing in Finite Fields  Wenbin Luo1, Gregory Heileman2 1Engineering Department, St. Mary’s University, USA 2Department of Electrical & Computer Engineering, University of New Mexico, USA   Research of a Multi‐dimension Measurement Trusting Model Based on Markov Chain  Hongyan Mao, Yixiang Chen Software Engineering Institute of East China Normal University, China      Coffee Break (16:10 – 16:20pm)             
  • 54. Session 3: Trust Management and Privacy Protection II    Chair: Jarrod Trevathan, James Cook University  16:20  –  17:50pm,  Function  Room  1&2   Defending against the Propagation of Active Worms  Xiang Fan1, Yang Xiang1,2 1School of Management and Information Systems, Central Queensland University, Australia 2Centre for Intelligent and Networked Systems, Central Queensland University, Australia   Convertible Undeniable Partially Blind Signature from Bilinear Pairings  Atsushi Koide1, Raylin Tso2, Eiji Okamoto1 1University of Tsukuba, Japan 2National Chengchi University, Taiwan   Analyzing Privacy Designs of Mobile Social Networking Applications  Guanling Chen, Faruq Rahman Department of Computer Science, University of Massachusetts Lowell, USA Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access    Technology  Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang National Digital Switching System Engineering & Technology Research Center, China   Privacy Engine for Context‐Aware Enterprise Application Services  Marion Blount1, John Davis2, Maria Ebling1, William Jerome1, Barry Leiba1, Xuan Liu1, Archan Misra1 1IBM T J Watson Research Center; 2Ling Fling, Inc., USA   The Trustworthiness Based on Hash Chain in Wireless Sensor Network  Xiong Peng1,2, Zhang Wei1 1Department of Computer Science and Technology, East China Normal University, China 2Department of Computer Science and Technology, Nanchang Hangkong University, China   Trust Similarity Measure in Trust Model for P2P Networks  Yizhi Ren1,2, Mingchu Li1, Cheng Guo1, Yongrui Cui1, Kouichi Sakurai2 1School of Software, Dalian University of Technology, China 2Department of Computer Science and Communication Engineering, Kyushu University, Japan                  
  • 55.   The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive  Applications (TSP’08)      Friday,  19  December,  2008    Session 4: Encryption and Decryption I    Chair: Chien‐Pen Chuang, National Taiwan  10:30  –  12:10pm,  Function  Room  1&2 Normal University    Distance Bounding Protocol for Multiple RFID Tag Authentication  Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu Department of Information Systems and Operations Management, University of Florida, USA   Encryption and Decryption with Space Transformation for Bi‐directional Association  Chien-Pen Chuang1, Tin-Ying Huang2, Li-Chi Yeh3 1Department of Applied Electronic, Technology, National Taiwan, Normal University Taipei, Taiwan 2Department of Mechatronic, Technology, National Taiwan, Normal University Taipei, Taiwan 3Department of Industrial, Education, National Taiwan, Normal University Taipei, Taiwan   Cryptanalysis of Li et al.’s Identity‐Based Threshold Signcryption Scheme  S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Theoretical Computer Science Laboratory, Indian Institute of Technology Madras, India   Online Signature Verification Algorithm Using Hill‐Climbing Method  Daigo Muramatsu Department of Electrical and Mechanical Engineering, Seikei University, Japan   Converters for Designing Applied Cryptographic Protocols  Zhao Huawei1, Qin Jing2, Fang Zhifeng3 1School of Computer and Information Engineering, Shandong University of Finance, China 2School of Mathematics and System Sciences, Shandong University, China 3Information Science and Technology, Shandong Institute of Political Science and Law, China   A Novel Self‐Renewal Hash Chain and Its Implementation  Haojun Zhang1, Xiaoxue Li2, Rui Ren1 1Henan University of Technology, China; 2Agricultural Bank of China, China   Lunch (12:10 – 13:30pm)           
  • 56. Session 5: Encryption and Decryption II    Chair: Feilong Tang, Shanghai Jiao Tong  13:30  –  15:10pm,  Function  Room  1&2 University, China    Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database  Tae Youn Won, Ji Young Chun, Dong Hoon Lee Graduate School of Information Management and Security, Korea University, Korea Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal    Framework  Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li   Towards Successive Privacy Protection in Sensor Networks  Baokang Zhao1,2, Dan Wang2, Zili Shao2, Jiannong Cao2, Keith C.C. Chan2, Jinshu Su1, Yanqin Yang3 1School of Computer Science, National University of Defense Technology, China 2Department of Computing, Hong Kong Polytechnic University, China 3Department of Computer Science and Engineering, Shanghai Jiao Tong University, China   Markov Model‐Based Handwritten Signature Verification  Alan McCabe, Jarrod Trevathan School of Mathematics, Physics and Information Technology, James Cook University, Australia   An Efficient RFID Authentication Protocol for Low‐Cost Tags  Yanfei Liu Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China   Trustworthy Semantic Web Technologies for Secure Knowledge Management  Bhavani Thuraisingham, Pranav Parikh Department of Computer Science, The University of Texas at Dallas Richardson, USA    Coffee Break (15:10 – 15:30pm)