1. EUC 2008 Program
EUC 2008
The 5th IEEE/IFIP International Conference on Embedded and
Ubiquitous Computing
17-20 December 2008
Shanghai, China
Sponsored by
Shanghai Jiao Tong University
Shanghai Computer Society
IEEE Computer Society
Supported by
National Natural Science Foundation of China
Shanghai Pudong New Area Association for Computer
Foundation of Science & Tech. Development of Shanghai Pudong New Area
2. EUC 2008
The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
17-20 December 2008, Shanghai, China
Contents
EUC 2008 Conference Schedule at a Glance
Organization
Technical Program Committee
The Map of EUC 2008 Conference Place
Access Guide to Conference Place
Reception and Pujiang Cruise
Banquet
Lunch
EUC 2008 Advanced Technical Program
Tour guide
3. EUC 2008 Conference Schedule at a Glance
Wednesday, 17 December 2008 - EUC workshops
Room Function Function Function
Function Room 1&2
Time Room 3 Room 7 Room 4&5
UUWSN-08 TRUST-08
9:00-9:10
EUV-08 Welcome speech NCUS-08 Opening and
9:10-10:30 UUWSN-08 Session 1 Keynote speech
10:30-11:00 Coffee Break
UUWSN-08 TRUST-08
11:00-12:30 EUV-08 NCUS-08
Keynote Speech Session 1
12:30-13:30 Lunch
13:30-14:00
NCUS-08
14:00-15:00
UUWSN-08 TRUST-08
15:00-15:10 ESO-08 Coffee Break
Session 2 Session 2
15:10-15:30
15:30-16:00 Coffee Break Tutorial 1 Coffee Break
16:00-16:30 Coffee Break
TRUST-08
16:30-16:50 UWMN-08 Coffee Break
SECUBIQ-08 Session 3 (Panel)
16:50-17:30
Tutorial 2
17:30-18:00
18:30-20:00 Supper in Yayuefang Restaurant (100m away from the conference place)
Thursday, 18 December 2008 - EUC 2008 main conference and TSP-08
Room Function Function Function
Grand Ballroom
Time Room 4&5 Room 7 Room 1&2
EUC-08 Opening
8:30-9:00
Ceremony
Keynote Speech I
9:00-10:00
(Yaoxue Zhang)
TSP-08 Opening
10:00-10:30 Coffee Break
Ceremony
TSP-08
10:30-11:30 EUC-08 EUC-08
Keynote Speech
Session 1A Session 1B
11:30-12:10 TSP-08 Session 1
4. 12:10-12:30
Lunch
12:30-13:30 Lunch
Keynote Speech II
13:30-14:30
(Tarek Abdelzaher)
14:30-14:50 Coffee Break
Coffee Break
14:50-15:00 TSP-08
15:00-16:10 Session 2
EUC-08 EUC-08
16:10-16:20 Coffee Break
Session 2A Session 2B
16:20-16:40
TSP-08 Session 3
16:40-17:50
18:00-19:00 Take bus from hotel to the dock
19:00-21:00 Reception and Pujiang Cruise
Friday, 19 December 2008 - EUC 2008 main conference and TSP-08
Room Function Function Function
Grand Ballroom
Time Room 4&5 Room 7 Room 1&2
Keynote Speech III
9:00-10:00
(Xiaodong Zhang)
10:00-10:30 Coffee Break
EUC-08 EUC-08 TSP-08
10:30-12:10
Session 3A Session 3B Session 4
12:10-13:30 Lunch
EUC-08 EUC-08 TSP-08
13:30-15:10
Session 4A Session 4B Session 5
15:10-15:30 Coffee Break
EUC-08 EUC-08 TSP-08
15:30-17:10
Session 5A Session 5B Session 6
17:10-18:30 Rest in the hotel
18:30-21:30 Banquet in the hotel
Saturday, 20 December 2008 - EUC 2008 main conference and TSP-08
Room
Function room 4&5 Function Room 7 Function room 1&2
Time
8:30-10:10 EUC-08 Session 6A EUC-08 Session 6B TSP-08 Session 7
10:10-10:30 Coffee Break
10:30-12:10 EUC-08 Session 7A EUC-08 Session 7B TSP-08 Session 8
6. Organization
General Chair Minyi Guo, Shanghai Jiao Tong Univ., China
Program Chair Cheng-Zhong Xu, Wayne State Univ., USA
Program Vice-Chairs
Embedded Systems Soft- Jihong Kim, Seoul National Univ., Korea
ware and Optimization
Embedded Systems and Zonghua Gu, Hong Kong Univ. of Science and
Hard-ware/software
Technology, Hong Kong
Co-Design
Cyber-Physical Systems Oleg Sokolsky, Univ. of Pennsylvania, USA
Real-time Systems Albert M. K. Cheng, Univ. of Houston, USA
Power Aware Computing Gang Quan, Univ. of South Carolina, USA
Network Protocols Sherali Zeadally, Univ. of the District of Columbia, USA
Wireless Networks Ivan Stojmenovic, Univ. of Ottawa, Canada
Sensor Networks Loren Schwiebert, Wayne State Univ., USA
Context Aware Mobile Jiannong Cao, Hong Kong Polytechnic Univ., HK
Computing
Agent and Distributed Wentong Cai, Nanyang Technological Univ., Singapore
Computing
Middleware and P2P Chung-Ta King, National Tsing Hua Univ., Taiwan
Multimedia and Data Xiaobo Zhou, Univ. of Colorado, USA
Management
Security and Fault Makoto Takizawa, Tokyo Denki Univ., Japan
Tolerance
Workshop Chairs Zhijun Wang, Hong Kong Polytechnic Univ., Hong Kong
Dakai Zhu, Univ. of Texas at San Antonio, USA
Publicity Chairs Ben A. Abderazek, Univ. of Aizu, Japan
Wenbin Jiang, Huazhong Univ. of Science and
Technology, China
Publication Chair
Yu Hua, Huazhong Univ. of Science and Technology,
China
Local Arrangement Chairs Feilong Tang, Shanghai Jiao Tong Univ., China
Minqi Zhang, Shanghai Computer Society, China
Jingyu Zhou, Shanghai Jiao Tong Univ., China
Yao Shen, Shanghai Jiao Tong Univ., China
7. Yanqin Yang, East China Normal Univ., China
Technical Program Committee
Jemal Abbawajy Deakin University, Australia
Kemal Akkaya Southern Illinois University, USA
Stefan Andrei Lamar University, USA
David Atienza Complutense University of Madrid, Spain
Neil Audsley University of York, UK
Hakan Aydin George Mason University, USA
Iain Bate University of York, UK
Paolo Bellavista Università di Bologna, Italy
Lim Hock Beng National University of Singapore, Singapore
Miodrag Bolic University of Ottawa, Canada
Azzedine Boukerche University of Ottawa, Canada
Stephen Bush GE Research, USA
Jian Cao Shanghai Jiaotong University, China
Jean Carle University of Lille, France
Eduardo Cerqueira University of Coimbra, Portugal
Chaitali Chakrabarti Arizona State University, USA
Samarjit Chakraborty National University of Singapore, Singapore
Alvin T.S. Chan Hong Kong Polytechnic University, Hong Kong
Rong-Guey Chang National Chung-Cheng University, Taiwan
Han-Chieh Chao National Ilan University, Taiwan
Hsi-Lu Chao National Chiao-Tung University, Taiwan
Ling Teck Chaw University of Malaya, Malaysia
Guihai Chen Nanjing University, China
Hongyang Chen University of Tokyo, Japan
Albert K. Cheng University of Houston, USA
Reynold Cheng Hong-Kong Polytechnic University, Hong Kong
Naveen Chilamkurti LaTrobe University, Australia
8. Pai Chou University of California at Irvine, USA
Sung Woo Chung Korea University, Korea
Yeh-Ching Chung National Tsing-Hua University, Taiwan
Stephen Cranefield University of Otago, New Zealand
Saumitra Das Purdue University, USA
Qianni Deng Shanghai Jiaotong University, China
Qingxu Deng Northeastern University, China
Murat Demirbas University of Buffalo, USA
Ming Dong Wayne State University, USA
Junzhao Du Xidian University, China
Hala Elaarag Stetson University, USA
Said Elnaffar United Arab Emirates University, UAE
Sebastian Fischmeister University of Waterloo, Canada
Eric Fleury INRIA-INSA Lyon, France
Scott Fowler Aston University, UK
Song Fu University of New Mexico Technology, USA
Satoshi Fujita Hiroshima University, Japan
Aniruddha Gokhale Vanderbilt University, USA
Lin Guan Loughborough University, UK
Song Guo University of Aizu, Japan
Hani Hagras University of Essex, UK
Jérôme Härri Universität Karlsruhe, Germany
Mohamed Hefeeda Simon Fraser University, Canada
Seongsoo Hong Seoul National University, Korea
Hung-Chang Hsiao National Cheng Kung University, Taiwan
Pao-Ann Hsiung National Chung Cheng University, Taiwan
Ching-Hsien Hsu Chung Hua University, Taiwan
Kien A. Hua University of Central Florida, USA
Ray Hunt University of Canterbury, New Zealand
Jacek Ilow Dalhousie University, Canada
Jadwiga Indulska University of Queensland, Australia
Tohru Ishihara Kyushu University, Japan
Russ Joseph Northwestern University, USA
Jehn-Ruey Jiang National Central University, Taiwan
Beihong Jin Institute of Software, CAS, China
Soon Ju Kang Kyung Book National University, Korea
9. Jung Guk Kim Hankuk University of Foreign Studies, Korea
Young-Jin Kim Sun Moon University, Korea
Polychronis Koutsakis McMaster University, Canada
László Kovács Hungarian Academy of Science, Hungary
T. John Koo Shantou University, China
Srdjan Krco Ericsson, Dublin, Ireland
Mohan Kumar University of Texas at Arlington, USA
Tei-Wei Kuo National Taiwan University, Taiwan
Bjorn Landfeldt University of Sydney, Australia
Peter Langendoerfer IHP-Microelectronics, Germany
Julia Lawall University of Copenhagen, Demark
Jaejin Lee Seoul National University, Korea
Chang-Gun Lee Seoul National University, Korea
Jenq-Kuen Lee National Tsing-Hua University, Taiwan
Victor Lee Hong Kong City University, Hong Kong
Wang-Chien Lee The Pennsylvania State University, USA
Wonjun Lee Korea University, Korea
Hong-Va Leong Hong Kong Polytechnic University, Hong Kong
Clement Leung Victoria University, Australia
Kuan-Ching Li Providence University, Taiwan
Xiang-Yang Li Illinois Institute of Technology, USA
Zhu Li Motorola Labs, USA
Qilian Liang University of Texas at Arlington, USA
Weifa Liang Australian National University, Australia
Sung-Soo Lim Kookmin University, Korea
Teck Meng Lim StarHub Ltd, Singapore
Justin Lipman Intel, China
Annie Liu SUNY, Stony Brook, USA
Hai Liu University of Ottawa, Canada
Jane Liu Academia Sinica, Taiwan
Steve Liu Texas A&M University, USA
Xue Liu McGill University, Canada
Yunhao Liu Hong Kong University of Science and Technology, Hong
Kong
Brian Logan University of Nottingham, UK
Malcolm Low Nanyang Technological University, Singapore
10. Luis Loyola DoCoMo Euro Laboratories, Germany
Zongwei Luo The University of Hong Kong, Hong Kong
Huadong Ma Beijing University of Posts & Telecommunications, China
Rupak Majumdar University of California at Los Angeles, USA
Kami Makki University of Toledo, USA
Gregorio Martinez University of Mercia, Spain
Jaime Lloret Mauri University of Valencia, Spain
Xiaofeng Meng Renmin University of China, China
Chunyan Miao Nanyang Technological University, Singapore
Kazuhiro Minami University of Illinois at Urbana-Champaign, USA
Vincent John Mooney Georgia Institute of Technology, USA
Farid Nait-Abdesselam University of Sciences and Technologies of Lille, France
Joseph K. Ng Hong Kong Baptist University, Hong Kong
Alex Nicolau University of California at Irvine, USA
Ertan Ozturk Zonguldak Karaelmas University, Turkey
Christian Poellabauer University of Notre Dame, USA
Raj Rajkumar Carnegie Mellon University, USA
Binoy Ravindran Virginia Tech, USA
John Regehr University of Utah, USA
Shangping Ren Illinois Institute of Technology, USA
Ayad Salhieh Jordan University of Science and Technology, Jordan
Shivakumar Sastry University of Akron, USA
Sahra Sedigh University of Missouri - Rolla, USA
Sudhanshu K. Semwal University of Colorado at Colorado Springs, USA
Lui Sha University of Illinois at Urbana-Champaign, USA
Li Shang Queen's University, Canada
Zili Shao Hong Kong Polytechnic University, Hong Kong
Haiying Shen University of Arkansas, USA
Michael Sheng University of Adelaide, Australia
Weisong Shi Wayne State University, USA
Yuanchun Shi Tsinghua University, China
Daniel Shih National Taiwan University, Taiwan
Timothy Shih Tamkang University, Taiwan
Dongkun Shin SungKyunKwan University, Korea
Sang Son University of Virginia, USA
Jack Stankovic University of Virginia, USA
11. Robert James Steele University of Technology, Sydney, Australia
Limin Sun Chinese Academy of Sciences, China
Niranjan Suri Institute of Human and Machine Cognition, USA
Yasuyuki Tahara National Institute of Informatics, Japan
David Tanier Monash University, Australia
Xueyan Tang Nanyang Technological University, Singapore
Xianping Tao Nanjing University, China
Yong Meng Teo National University of Singapore, Singapore
Georgios K. University of Birmingham, UK
Theodoropoulos
Lothar Thiele ETH Zurich, Switzerland
CY Tsui Hong Kong University of Science and Technology, HK
Hiroyuki Tomiyama Nagoya University, Japan
Fabris Valois INSA, Lyon, France
Nalini University of California at Irvine, USA
Venkatasubramanian
Jan Vitek Purdue University, USA
Andy Wang Florida State University, USA
Cho-Li Wang University of Hong Kong, Hong Kong
Shige Wang General Motors, USA
Tzone-I Wang National Cheng Kung University, Taiwan
Xiaorui Wang University of Tennessee, USA
Jianbin Wei Yahoo, USA
Weigang Wu Sun Yat-Sen University, China
Bin Xiao Hong Kong Polytec University, Hong Kong
Nong Xiao National University of Defense Technology, China
Guoliang Xing City University of Hong Kong, Hong Kong
Lizhen Xu Southeast University, China
Jianliang Xu Hong Kong Baptist Univ., Hong Kong
Ming Xu National University of Defense and Technology, China
Yun Yang Swinburne University of Technology, Australia
Hiroyuki Yomo Aalborg University, Denmark
Chuck Yoo Korea University, Korea
Moustafa Youssef University of Maryland College Park, USA
Bo Yu Wayne State University, USA
Zhiwen Yu Kyoto University, Japan
12. Qing-An Zeng University of Cincinnati, USA
Daqing Zhang National Institute of Telecommunications, France
Liqiang Zhang Indian University South Bend, USA
Wei Zhang Southern Illinois University, USA
Wensheng Zhang Iowa State University, USA
Lin Zhong Rice University, USA
Xiliang Zhong Microsoft, USA
Wanlei Zhou Deakin University, Australia
Dakai Zhu University of Texas, San Antonio, USA
Yongxin Zhu Shanghai Jiao Tong University, China
Additional Reviewers
Sourav Bhowmick Nanyang Technological University, Singapore
Manoranjan Dash Nanyang Technological University, Singapore
Yuhong Feng Hong Kong Polytechnic University, Hong Kong
Jiayu Gong Wayne State University, USA
Jia Rao Wayne State University, USA
Aixin Sun Nanyang Technological University, Singapore
Muzhou Xiong Nanyang Technological University, Singapore
13. General Chair
Prof. Minyi Guo
Department of Computer Science and Engineering, Shanghai Jiao Tong University,
China
Professor Minyi Guo received his Ph.D. degree in computer science from University
of Tsukuba, Japan. Before 2000, Dr. Guo had been a research scientist of NEC Corp.,
Japan. He is now a full professor at the Department of Computer Software, The
University of Aizu, Japan, from 2000 to 2005. During this period, he was also a
visiting professor of Georgia State University, USA, Hong Kong Polytechnic
University, University of Hong Kong, National Sun Yet-sen University in Taiwan,
China, University of Waterloo, Canada and University of New South Wales, Australia.
He is also a professor of Shanghai Jiao Tong University and Nanjing University,
China.
Dr. Guo has published more than 120 research papers in international journals and
conferences. Dr. Guo has served as general chair, program committee or organizing
committee chair for many international conferences. He is the founder of International
Conference on Parallel and Distributed Processing and Applications (ISPA), and
International Conference on Embedded and Ubiquitous Computing (EUC). He is the
editor-in-chief of the Journal of Embedded Systems. He is also in editorial board of
Journal of Pervasive Computing and Communications, International Journal of High
Performance Computing and Networking, Journal of Embedded Computing, Journal
of Parallel and Distributed Scientific and Engineering Computing, and International
Journal of Computer and Applications.
Dr. Guo's research interests include parallel and distributed processing,
parallelizing compilers, Pervasive Computing, Embedded Software Optimization,
molecular computing and software engineering. He is a member of the ACM, IEEE,
IEEE Computer Society, and IEICE.
14. Program Chair
Prof. Cheng-Zhong Xu
Department of Electrical and Computer Engineering, Wayne State University, USA
Cheng-Zhong Xu is a professor in the Department of Electrical and Computer
Engineering of Wayne State University. He is also the director of the Center for
Networked Computing Systems at WSU. His research interest includes networked
computing systems and applications, in particular scalable and secure Internet
services and architecture, scheduling and resource management in distributed, parallel,
and embedded systems, and autonomic systems management for highly reliable
computing. He has published more than 140 peer-reviewed scientific papers in
archival journals and conferences in these areas. He is the author of quot;Scalable and
Secure Internet Services and Architecturequot; (Chapman & Hall/CRC Press, 2005) and
the leading co-author of quot;Load Balancing in Parallel Computers: Theory and Practicequot;
(Kluwer Academic, 1996). Dr. Xu serves on the editorial boards of IEEE Transactions
on Parallel and Distributed Systems, J. of Parallel and Distributed Computing, J. of
Parallel, Emergent, and Distributed Systems, J. of Computers and Applications, and J.
of High Performance Computing and Networking. He has also guest edited special
issues for several other journals on network services and security in distributed
systems. He has served a number of international conferences and workshops in
various capacities as program chair, general chair, and plenary speaker. He was a
recipient of “President's Award for Excellence in Teaching” of WSU in 2002 and
“Career Development Chair Award” in 2003. Dr. Xu received the BS and MS degrees
from Nanjing University in 1986 and 1989, respectively, and the Ph.D. degree from
the University of Hong Kong in 1993. He is a senior member of IEEE.
15. Keynote Speaker
Prof. Yaoxue Zhang
Department of Higher Education, Ministry of Education, China
The Challenges and Opportunities in Transparent
Computing
Abstract: In this talk, we present some new research results about our Transparent
Computing which is a new computing paradigm for service sharing. Rapid
development in computer networks let people easily share the hardware and software
resources, however, because the slow progress in Operating system technologies and
few changes in computer architectures in several decades, it is still not easy to share
services from different software and hardware platforms for users.
Transparent Computing paradigm separates the storages and executions of software
programs and data including what of operating systems in different computers
connecting with communication networks. In this paradigm, data and programs are
stored in the storage servers and they are executed in either clients or execution
servers according to the required services, respectively. We propose a new
mechanism called Meta OS to manage this separation. This mechanism extends the
Neumann architecture special-temporally, so that a sequentially virtual computing can
be effectively obtained and the individual service sharing can be easily performed
underlying different Operating System platforms.
We will introduce the idea, the mechanism and algorithms of proposed Meta OS for
16. the separation of the programs and data including what of Operating Systems.
Moreover, we also present some examples about the applications of this computing
paradigm.
Biography
Prof. Zhang Yaoxue was born in Li County, Hunan province, China, in 1956. He
graduated from Northwest Institute of Telecommunication Engineering, China,
obtained his Ph.D degree in computer networking from Tohoku University, Japan in
1989. One year later, he joined Department of Computer Science, Tsinghua University,
China.
He was a visiting professor of Massachusetts Institute of Technology (MIT) and
University of Aizu, in 1995 and 1998, respectively. He served as the President of
China Central Radio & TV University from Nov. 2001 to Jun. 2006. Currently, Prof.
Zhang is a fellow of the Chinese Academy of Engineering, a professor in computer
science and technology in Tsinghua University, and the Director General for Higher
Education of Ministry of Education, China. He is also a member of the Expert
Committee on Military Computer and Software Technology of PLA General
Armament Department, of the Advisory Committee on State Informatization, and of
Technical Committee on Ubiquitous/Pervasive Computing of China Computer
Federation. Additionally, he serves as an editorial board member of 4 international
journals: International Journal of Wireless and Mobile Computing, Journal of
Autonomic and Trusted Computing, Chinese Journal of Electronics and Chinese
Journal of Computer.
Prof. Zhang's major research areas include computer networking, operating systems,
and ubiquitous/pervasive computing. He has led many national and international
research, international collaboration and industrialization projects. Because of his
distinguished contributions, Prof. Zhang has won the National Award for Scientific
and Technological Progress (2nd class) twice in 1998 and 2001, and National Award
for Technological Invention (2nd class) in 2004, as well as 5 provincial or ministerial
awards. He is a winner of the Prize of HLHL (Hong Kong) Foundation for Scientific
and Technological Progress in 2005. He has filed 16 Chinese patents and 3 American
patents as the first inventor, of which 13 have been granted. Accordingly, he won the
Top Patent Award of China in 2006. Prof. Zhang has published over 170 technical
papers in international journals and conferences, as well as 8 monographs and
textbooks. He received the IEEE Best Paper Award in the 21st IEEE AINA
International Conference in 2007.
17. Recently, Prof. Zhang's research mainly focuses on Transparent Computing and
Active Services. Transparent Computing is a computing paradigm to solve the
problem of how to access different operating systems and applications on one
terminal platform through networks, and how to run an operating system and
applications on different terminal platforms. Active Services is a new approach to
evolve current programs and services according to user requirements to provide
personalized and comprehensive network services.
18. Keynote Speaker
Prof. Xiaodong Zhang
Department of Computer Science and Engineering, The Ohio State University, USA
Research issues and Challenges to Advance System
Software for Multicore Processors and Data-intensive
Applications
Abstract: Compared with rapid technology advancements in multicore processors and
rapid changes from computing-intensive to highly data-intensive applications,
operating systems have been evolved very slowly for several decades. Application
users are facing to two major challenges in today's computing environment. On the
top level of the system hierarchy, private and shared caches are equipped for many
cores to access concurrently, inevitably causing access conflicts to degrade execution
performance. On the bottom level, the performance bottleneck of quot;memory wallquot;
has been shifted to quot;disk wallquot; that is a serious bottleneck for many data-intensive
applications. Since processor caches and disk storage are not in the major scope of
operating system management, and their increasingly complex operations are not
transparent to application users, the above mentioned performance issues have not
been effectively addressed at any level of computer systems.
We have made a continuous effort to enhance operating systems with two
objectives: (1) to well utilize rich but complex resources of multicore processors and
(2) to access disk data as fast as possible. At the multicore processor level, we are
developing new resource allocation management to improve the effective caching
19. capacity per core and/or per thread, and to minimize congestion in off-chip memory
accesses by coordinating memory bandwidth sharing. At the storage level, we
enable operating systems to effectively exploit quot;sequential localityquot; -- for the same
amount of data, sequential accesses are several orders of magnitude faster than
random accesses in disks. In this talk, related research issues and challenges will be
overviewed, and preliminary results will be presented.
Biography
Xiaodong Zhang is the Robert M. Critchfield Professor in Engineering, and Chairman
of the Department of Computer Science and Engineering at the Ohio State University.
His research interests cover a wide spectrum in the areas of high performance and
distributed systems. Several technical innovations and research results from his team
have been adopted or being developed in commercial products and open source
systems with direct impact to some key computing operations, including the
permutation memory interleaving technique first in the Sun MicroSystems'
UltraSPARC IIIi processor and then in the Sun's dual-core Gemini Processor, the
token thrashing protection mechanism and the Clock-Pro page replacement algorithm
for memory management in the Linux Kernel and NetBSD.
Xiaodong Zhang was the Director of Advanced Computational Research Program
at the National Science Foundation, 2001-2004. He is the associate Editor-in-Chief of
IEEE Transactions on Parallel and Distributed Systems, and is also serving on the
Editorial Boards of IEEE Transactions on Computers, IEEE Micro, and Journal of
Parallel and Distributed Computing.
He received his Ph.D. in Computer Science from University of Colorado at
Boulder.
20. Keynote Speaker
Associate Prof. Tarek Abdelzaher
Department of Computer Science, University of Illinois at Urbana Champaign, USA
Research Challenges in Distributed
Cyber-Physical Systems
Abstract: Moore's law, automation considerations, and the pervasive need for timely
information lead to a next generation of distributed systems that are open, highly
interconnected, and deeply embedded in the physical world. Such systems, called
cyber-physical, were recently named the first research priority in networking and
information technology in the US by the nation's presidential council of advisors on
science and technology. They offer new research challenges that stem from openness,
scale, and tight coupling between computation, communication, and distributed
interaction with both physical and social contexts. Growing challenges span a large
spectrum ranging from new models of computation for systems that live in physical
and social spaces, to the enforcement of reliable, predictable, and timely end-to-end
behavior in the face of high interactive complexity, increased uncertainty and
imperfect implementation. This talk discusses the top challenges in cyber-physical
systems and conjectures on research directions of increasing interest in this realm.
Biography
Tarek Abdelzaher received his B.Sc. and M.Sc. degrees in Electrical and Computer
21. Engineering from Ain Shams University, Cairo, Egypt, in 1990 and 1994 respectively.
He received his Ph.D. from the University of Michigan in 1999 on Quality of Service
Adaptation in Real-Time Systems. He has been an Assistant Professor at the
University of Virginia, where he founded the Software Predictability Group until
2005. He is currently an Associate Professor at the Department of Computer Science,
the University of Illinois at Urbana Champaign. He has authored/coauthored more
than 100 refereed publications in real-time computing, distributed systems, sensor
networks, and control. He is Editor-in-Chief of the Journal of Real-Time Systems, an
Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions
on Parallel and Distributed Systems, the ACM Transaction on Sensor Networks, and
the Ad Hoc Networks Journal, as well as Editor of ACM SIGBED Review. He was
Program Chair of RTAS 2004 and RTSS 2006, and General Chair of RTAS 2005,
IPSN 2007, RTSS 2007, DCoSS 2008 and Sensys 2008. Abdelzaher's research
interests lie broadly in understanding and controlling the temporal properties of
software systems in the face of increasing complexity, distribution, and degree of
embedding in an external physical environment. Tarek Abdelzaher is a member of
IEEE and ACM.
22. The Map of EUC 2008 Conference Place
EUC 2008 conference place: Courtyard by Marriott Shanghai-Pudong
Address of conference place: 838 Dong Fang Road, Pudong District, Shanghai, China
Access Guide to EUC 2008 Conference Place
There are two airports in Shanghai, Pudong International Airport(PVG) and
Hongqiao International Airport
(SHA) and there are two railway stations in Shanghai,
,
Shanghai Railway Station and Shanghai South Railway Station. Our hotel is at the
crossing of Dong Fang Road and Wei Fang Road. The usual traffic direction is
followed.
1. From Shanghai Pudong International Airport(PVG)
Taxi only
23. A20 (Outside Circle) --- turn right onto Luo Shan Road --- turn left onto Hua
Mu Road --- turn right onto Dong Fang Road --- turn left onto Wei Fang
Road. It takes about 40 minutes to the hotel. Estimated taxi fare: 120 RMB
(one way, if traffic condition is fine)
Maglev Train and Subway Line No.2
Take Maglev Train from Pudong International Airport to Longyang Road
Subway Station, and then take Subway Line No.2 to the Shiji (Century)
Avenue Station. From here, go to the conference hotel on foot, which takes
around 5 minutes. Totally about 60 RMB for Subway line No.2 and
economy Maglev Train, 110 RMB for Subway line No.2 and VIP Maglev
Train.
Airport bus Line No.3 and Subway Line No.2
Take Airport bus Line No.3 from Pudong International Airport to Longyang
Road Subway Station, then take Subway Line No.2 to the Shiji (Century)
Avenue Station. From here, go to the conference place on foot, which takes
around 5 minutes. Totally about 25 RMB is needed.
Airport bus Line No.5 and Taxi
Take Airport bus Line No.5 from Pudong International Airport to Oriental
hospital, then take a taxi to the hotel. Totally about 35 RMB is needed.
2. From Hongqiao International Airport(SHA)
Taxi only
Yan An Road Elevated High Way --- to Yan An East Road Tunnel --- to Shi
Ji Da Dao (Century Blvd) --- turn right onto Dong Fang Road --- turn left
onto Wei Fang Road. It takes about 30 minutes to the hotel. Estimated taxi
fare: 70 RMB (one way,if traffic condition is fine)
Bus No. 925A and Subway Line 2
Take Bus No. 925A from Hongqiao International Airport to People's Square,
and then take Subway Line No.2 to the Shiji (Century) Avenue Station.
From here, go to the conference hotel on foot, which takes around 5 minutes.
Totally about 8 RMB is needed.
3. From Shanghai Railway Station or Shanghai South Railway Station
Subway Line No.1 and No.2
Take Subway Line No.1 from either Railway Station to People's Square
Station, and then interchanges to Subway Line No.2 to the Shiji (Century)
Avenue Station. From here, go to the conference hotel on foot, which takes
around 5 minutes. Totally about 5~7 RMB is needed.
25. Reception and Pujiang Cruise
We will hold a Pujiang cruise to welcome the EUC 2008 attendee from all over the
world. Pujiang cruise is the classical aquatic travel program, it’s not only because that
the Huangpu River is the mother river of Shanghai, and the representative and
reduction of Shanghai, but also the two sides of the river gather the famous sights of
Shanghai city, such as the Eastern pearl broadcasts the television tower, Bund's Wan
Guo reads extensively the group. Boarding on the boat, with delicious buffet, you can
feel the honorable position and the long history of the bund; also you can step on the
top deck, listen to the pulse and rhythm of Pudong times. You will understand quot;the
scene of dazzling fireworks and lanterns lively districtquot; ideal condition.
Reception time: 19:00 ~21:00 on Dec.18, 2008
Reception place: Pujiang Cruise ship
Banquet
Banquet time: 18:30~21:30 on Dec.19, 2008
Banquet place: Grand Ballroom at Courtyard by Marriott Shanghai-Pudong
Lunch
Lunch place: Spices Café at Courtyard by Marriott Shanghai-Pudong
26. Tour guide
The Bund
quot;The Bundquot; is a long, storied road in Shanghai. The
Bund has been considered a historic symbol of
Shanghai for over one hundred years. It is a source of
great pride to the Shanghai people, as it shows the
world Shanghai's culture and its capability to
synchronize and meld its local culture with civilizations
abroad.
The Bund faces Shanghai's mother river, the Huangpu River. Behind the Bund are old
buildings representing architectural styles from different countries. The unique
geography around the Bund and that geography's effect on the economy of Shanghai
and China throughout the past one hundred years fills the Bund with cultural
connotation and undertones. The river, the long bank, the green belt and the different
architectural styles of the buildings on the Bund is the most quot;Shanghai-likequot; sight in
Shanghai. In the morning, the Bund is a popular place for jogging and workouts. It is
a charming sight for tourists in the daytime and it becomes lovers' lane at night!
Chenyi Square
At the end of the 10-mile Nanjing Road is Chenyi Square,
dominated by a sculpture of Chenyi-the first Shanghai mayor
of the People's Republic of China. The sculpture is made of
bronze and stands 5.6 meters high with a red granite underlay
3.5 meters high. Every weekend, a grand quot;Square Concertquot; is
held in front of the sculpture.
To the south of the sculpture is a popular fountain. Many
colored lamps are set under the water of the fountain, and
these lamps are turned on at night. The beautiful colored water streams created by the
lamps are a great sight to see in Chenyi Square at night.
Sightseeing Tunnel
The Bund's Tunnel stretches from the end of Nanjing
Road on the Puxi side to the Oriental Pearl TV Tower on
the Lujiazui side - a total length of 646.70 meters. This
27. tunnel was finished at the end of 2000; it was the first pedestrian tunnel built in China.
Tourists may enter the tunnel through an elevator at the entrance on either side. It
takes about two to five minutes to walk the length of the tunnel. Many high-tech
displays are featured inside. All kinds of designs, ads, panoramic displays and
background music about people, history, culture and technology are displayed
throughout the tunnel, making your visit there both interesting and thrilling.
Xujiahui
Xujiahui is one of the most prosperous business centers,
with many famous mansions and shopping centers.
The history of the district dates back to Ming Dynasty. A
famous scientist Xu Guangqi, the Secretary of the Grand
Council, had been buried here. Some of his descendants
had multiplied and lived here, so it was first named
quot;Xujia Villagequot; and then gradually developed into town.
The name quot;Xujiahuiquot; was from the fact that Xu Guangqi built a cottage at the joint of
the two rivers of Zhaojiabang and Lihongjing. In March 1957, Changshu and Xuhui
districts were amalgamated into the new Xuhui District.
Lujiazui Financial Center
The Lujiazui Financial Center is located in the
Pudong district of Shanghai. The famous
buildings in this area include:
The Oriental Pearl TV Tower, which is
surrounded by the Yangpu Bridge in the
northeast and the Nanpu Bridge in the southwest,
creating a picture of 'twin dragons playing with
pearls'. The tower with 468 meters high (1,536
feet) is the world's third tallest TV and radio
tower surpassed in height only by towers in
Toronto, Canada and Moscow, Russia.
Shanghai International Conference Center, which is located to the northwest of
Oriental Pearl TV Tower, along Riverside Boulevard, opposite to the Bund. The
conference center covers an area of 45 thousand square meters, with modern
conference halls, two multi-functional halls (around 4300 square meters), one
international conference hall of press center (around 2500 square meters) and two
conference halls that can hold 200 people.
28. EUC Main Conference
Thursday, 18 December, 2008
Opening Remark 08:30 – 09:00am, Grand Ballroom
Keynote Speech I: The Challenges and Opportunities in Transparent Computing
Yaoxue Zhang (Tsinghua University) 09:00 – 10:00am, Grand Ballroom
Coffee Break (10:00 – 10:30am)
EUC‐1A: Hardware/Software Co‐Design I 10:30 – 12:10pm, Function Room 4&5
Session Chair: Meikang Qiu, University of New Orleans, USA
A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for
Time Critical Applications
Archana Kalyansundar, Rita Chattopadhyay
Siemens Corporate Technology India, India
Advanced Optimization and Design Issues of a 32‐Bit Embedded Processor Based on Produced
Order Queue Computation Model
Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda
Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan
A Low‐Cost Embedded Controller for Complex Control Systems
Zhe Peng, Longhua Ma, Feng Xia
State Key Lab of Industrial Control Technology, Zhejiang University, China
Single Instruction Dual‐Execution Model Processor Architecture
Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda
Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan
EUC‐1B: Sensor Networks I 10:30 – 12:10pm, Function Room 7
Session Chair: Jinde Chen, Saitama University, Japan
Analysis of Data Delivery Delay in Acoustic Sensor Networks
Chao Wang ,Yan Sun, Huadong Ma
Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and
Telecommunications, China
29. A Collaboration‐based Storage Management Scheme in Multimedia Sensor Networks
Yunpei Yan1, Guihai Chen1, Sajal Das2
1State Key Laboratory for Novel Software Technology, Nanjing University, China
2Department of Computer Science and Engineering, University of Texas at Arlington, USA
An Integrated Deployment Tool for ZigBee‐Based Wireless Sensor Networks
Yu-Kai Huang1, Pi-Cheng Hsiu1, Wei-Ni Chu1, Kuan-Chang Hung1, Ai-Chun Pang1, Tei-Wei Kuo1, Min
Di2, Hua-Wei Fang2
1Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National
Taiwan University, Taiwan
2Networks and Multimedia Institute, Institute for Information Industry, Taiwan
Cooperative Node Localization for Mobile Sensor Networks
Hongyang Chen1, Marcelo H. T. Martins1, Pei Huang2, Hing Cheung So3, Kaoru Sezaki1
1University of Tokyo, Japan
2Michigan State University, USA
3City University of Hong Kong, Hong Kong
Lunch ( 12:10 – 13:30pm)
Keynote Speech II: Research Challenges in Distributed Cyber‐Physical Systems
Tarek Abdelzaher (University of Illinois at Urbana 13:30 – 14:30pm, Grand Ballroom
Champaign)
Coffee Break (14:30 – 15:00pm)
EUC‐2A: Real‐time and Cyber‐Physical Systems 15:00 – 16:40pm, Function Room 4&5
Session Chair: Hui Guo, University of New South Wales, New Zealand
A Systematic Framework for Structured Object‐Oriented Security Requirements Analysis in
Embedded Systems
Sojan Markose, Xiaoqing (Frank) Liu, Bruce McMillin
Computer Science Department, Missouri University of Science and Technology, USA
Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors
Shinpei Kato, Nobuyuki Yamasaki
Department of Information and Computer Science, Keio University, Japan
Robust Feedback Control Scheduling in Distributed Embedded Real‐Time Systems
Bing Du1, Chun Ruan2
1School of Electrical and Information Engineering, The University of Sydney, Australia
2School of Computing and Mathematics, University of Western Sydney, Australia
30. RT‐P2P: A Scalable Real‐Time Peer‐to‐Peer System with Probabilistic Timing Assurances
Fei Huang1, Binoy Ravindran1, E. D. Jensen2
1Department of Electrical & Computer Engineering, Virginia Tech, USA
2The MITRE Corporation, USA
EUC‐2B: Multimedia and Data Management I 15:00 – 16:40pm, Function Room 7
Session Chair: Huan Li, Beihang University, China
UMDD: User Model Driven Software Development
Xiaochun Wang1,2, Yuanchun Shi1
1Department of Computer Science and Technology, Tsinghua University, China
2GGV Sub-station, Postdoctoral Workstation of Zhongguancun Haidian Garden, China
A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test
Ashraf Armoush, Falk Salewski, Stefan Kowalewski
Embedded Software Laboratory, RWTH Aachen University, Germany
Data Management for Context‐Aware Computing
Wenwei Xue1, Hungkeng Pung1, Wenlong Ng1, Tao Gu2
1School of Computing, National University of Singapore, Singapore
2Institute for Infocomm Research, Singapore
Efficient Data Scheduling for Multi‐item Queries in On‐Demand Broadcast
Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin
School of Computer Science, Fudan University, China
31. Friday, 19 December, 2008
Keynote Speech III: Research Issues and Challenges to Advance System Software
Xiaodong Zhang (Ohio State University) 09:00 – 10:00am, Grand Ballroom
Coffee Break (10:00 – 10:30am)
EUC‐3A: Embedded SW Optimization I 10:30 – 12:10pm, Function Room 4&5
Session Chair: Tarek Abdelzaher, University of Illinois at Urbana, USA
An Improved EMD Embedding Scheme Based on Secret Image Difference
Chin-Chen Chang1, Chin-Feng Lee2, Yi-Ren Wang3
1Department of Information Engineering and Computer Science Management, Feng Chia University, Taiwan
2Department of Information Management, Chaoyang University of Technology, Taiwan
3Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
Lei Sun, Tatsuo Nakajima
Department of Computer Science, Waseda University, Japan
SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems
Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima
Department of Computer Science, Waseda University, Japan
Optimizing the Embedded Caching and Prefetching Software on a Network‐Attached Storage
System
Shih-Hao Hung1,2, Chien-Cheng Wu1, Chia-Heng Tu2
1Graduate Institute of Networking and Multimedia;
2Department of Computer Science and Information Engineering
National Taiwan University, Taiwan
EUC‐3B: Wireless Networks I 10:30 – 12:10pm, Function Room 7
Session Chair: Hongyang Chen, University of Tokyo, Japan
Fuzzy Self‐Clustering for Wireless Sensor Networks
Yahya M. Tashtoush, Mohammed A. Okour
The Department of Computer Science, Jordan University of Science and Technology, Jordan
Secure Authentication in Wireless Sensor Networks Using RF Fingerprints
D. A. Knox, T. Kunz
Department of Systems and Computer Engineering, Carleton University, Canada
32. Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc
Networks
Romeo Said, Yves Mahéo
Valoria, Université Européenne de Bretagne, France
A Scenario‐based Directional Communication Performance in Wireless Ad hoc Networks
Murad Khalid1, In-ho Ra2, Young-hoon Joo2, Ravi Sankar1
1Department of Electrical Engineering, University of South Florida, USA
2School of Electronic and Information Engineering, Kunsan National University, Korea
Lunch (12:10 – 13:30pm)
EUC‐4A: Network Protocols I 13:30 – 15:10pm, Function Room 4&5
Session Chair: Jun Yang, University of Pittsburgh, USA
Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application
Dejia Shi1, Weijin Jiang1,2, 3, Danping Xu3
1School of Computer and Electronic Engineering, Hunan University of Commerce, China
2School of Computer, Wuhan University of Technology, China
3The College of Information Engineering, Xiangtan University, China
Countering DDoS and XDoS Attacks against Web Services
Xinfeng Ye
Department of Computer Science, Auckland University, New Zealand
Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2‐D Mesh Network on Chip
Xiao Canwen, Zhang Minxuan, Dou Yong, Zhao Zhitong
School of Computer Science, National University of Defense Technology, China
A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks
Ze Li, Haiying Shen
Department of Computer Science and Computer Engineering, University of Arkansas, USA
EUC‐4B: Power‐aware Computing 13:30 – 15:10pm, Function Room 7
Session Chair: Jingling Xue, University of New South Wales, Australia
Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment
Meikang Qiu1, Jiande Wu1, Jingtong Hu2, Yi He2, Edwin H.-M. Sha2
1Department of Electrical Engineering, University of New Orleans, USA
2Department of Computer Science, University of Texas at Dallas, USA
33. A Low Power Error Detection Technique for Floating‐Point Units in Embedded Applications
Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi
Dependable System Laboratory, Sharif University of Technology, Iran
A Generalized Framework for System‐Wide Energy Savings in Hard Real‐Time Embedded
Systems
Gang Zeng1, Hiroyuki Tomiyama11, Hiroaki Takada1, Tohru Ishihara2
1Graduate School of Information Science, Nagoya University, Japan
2System LSI Research Center, Kyushu University, Japan
Application Specific Low Power ALU Design
Yu Zhou, Hui Guo
School of Computer Science & Engineering, University of New South Wales, Australia
Coffee Break (15:10 – 15:30pm)
EUC‐5A: Hardware/Software Co‐Design II 15:30 – 17:10pm, Function Room 4&5
Session Chair: Wei Zhang, Southern Illinois University , USA
Hardware Support for Efficient Sparse Matrix Vector Multiplication
Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue
School of Computer Science and Engineering, University of New South Wales, Australia
Accelerating Montgomery Modulo Multiplication for Redundant Radix‐64k Number System on
the FPGA Using Dual‐Port Block RAMs
Koji Shigemoto, Kensuke Kawakami, Koji Nakano
Department of Information Engineering, Hiroshima University, Japan
A State‐Based Predictive Approach for Leakage Reduction of Functional Units
Linfeng Pan1, Minyi Guo1, Yanqin Yang1,2, Meng Wang2, Zili Shao2
1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
2Department of Computing, Hong Kong Polytechnic University, Hong Kong
3Department of Computer Science and technology, East China Normal University, China
Automatic Integration of Non‐Bus Hardware IP into SoC‐Platforms for Use by Software
Robert Guenzel
Department of Integrated Circuit Design(E.I.S.), Technical University of Braunschweig, Germany
34. EUC‐5B: Context‐aware Computing 15:30 – 17:10pm, Function Room 7
Session Chair: Beihong Jin, Chinese Academy of Sciences, China
A Probabilistic Approach to Consistency Checking for Pervasive Context
Yu Huang1,2, Xiang Ma2, Xianping Tao1,2, Jiannong Cao3, Jian Lu1,2
1State Key Laboratory for Novel Software Technology, Nanjing University, China
2Department of Computer Science and Technology, Nanjing University, China
3Department of Computing, Hong Kong Polytechnic University, Hong Kong
Human Universality in Ubiquitous Computing: Maslow, Where Are You?
Sebastien Duval1, Christian Hoareau2, Hiromichi Hashizume3
1National Institute of Informatics, Japan
2The Graduate University for Advanced Studies, Japan
3National Institute of Informatics, Japan
Learning in Small and Large Ubiquitous Computing Environments
Jorge Barbosa1, Rodrigo Hahn1, Débora N. F Barbosa2, Cl´udio F R. Geyer3
. .
1PIPCA/Unisinos, São Leopoldo – RS – Brazil
2UniLasalle, Canoas – RS – Brazil
3UFRGS, Porto Alegre – RS – Brazil
Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous
Computing
Jingde Cheng
Department of Information and Computer Sciences, Saitama University, Japan
35. Saturday, 20 December, 2008
EUC‐6A: Sensor Networks II 08:30 – 10:10am, Function Room 4&5
Session Chair: Haiying Shen, University of Arkansas, USA
Adaptive Buffer Management for Efficient Code Dissemination in Multi‐Application Wireless
Sensor Networks
Weijia Li1, Yu Du1, Youtao Zhang1, Bruce Childers1, Ping Zhou2, Jun Yang2
1Computer Science Department, University of Pittsburgh, USA
2Electric and Computer Engineering Department, University of Pittsburgh, USA
Quorum‐Based Energy Saving MAC Protocol Design for Wireless Sensor Networks
Chih-Min Chao, Yi-Wei Lee
Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan
An Energy‐Efficient Waiting Caching Algorithm in Wireless Sensor Networks
Junfeng Xu, Keqiu Li, YanMing Shen, Jian Liu
Department of Computer Science and Engineering, Dalian University of Technology, China
A Grid‐Based Distributed Multi‐Hop Routing Protocol for Wireless Sensor Networks
Wenjun Liu1, Yue Sun1, Jiguo Yu2, Baoxiang Cao2
1City College, Wenzhou University, China
2School of Computer Science, Qufu Normal University, China
EUC‐6B: Multi‐Agent Systems 08:30 – 10:10am, Function Room 7
Session Chair: Xinfeng Ye, Auckland University, New Zealand
Dynamic Substitutability Analysis of Web Service Composition via Extended π‐Calculus
Jin-dian Su1, Shan-shan Yu2, He-qing Guo1
1College of Computer Science and Engineering, South China University of Technology, China
2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China
Efficient Self‐Healing Key Distribution with Limited Group Membership for
Communication‐Constrained Networks
Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang
School of Computer Science, Fudan University, China
An Empirical Study on Interoperability between Service Discovery Protocols
Beihong Jin, Zhi Zang, Liang Zhang
Institute of Software, Chinese Academy of Sciences, China
A Reasonable Approach for Defining Load Index in Parallel Computing
Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng
Computer Science and Engineering Department, Shanghai Jiao Tong University, China
36. Coffee Break (10:10 – 10:30am)
EUC‐7A: Middleware and Peer‐to‐Peer 10:30 – 12:10pm, Function Room 4&5
Session Chair: Xiaobo Zhou, University of Colorado, USA
Load Balancing in Peer‐to‐Peer Networks Based on Sampling System States
Hung-Chang Hsiao, I-Ta Lin, Hao Liao
Department of Computer Science and Information Engineering, National Cheng-Kung University, Taiwan
The Effect of Routing‐Load Dispersion on Congestion Control in Structured P2P Networks
Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu
Department of Computer Science, Nankai University, China
AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication
Liang Zhang1, Beihong Jin1, Jiannong Cao2
1Technology Center of Software Engineering, Institute of Software, China
2Department of Computing, The Hong Kong Polytechnic University, Hong Kong
A Self‐configuring Personal Agent Platform for Pervasive Computing
Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu
Department of Computing, Hong Kong Polytechnic University, Hong Kong
EUC‐7B: Embedded Software Optimization II 10:30 – 12:10pm, Function Room 7
Session Chair: Tei‐Wei Kuo, National Taiwan University
A Light Lock Management Mechanism for Optimizing Real‐Time and Non‐Real‐Time
Performance in Embedded Linux
Maobing Dai1, Toshihiro Matsui2, Yutaka Ishikawa3
1Graduate School of Information Science and Technology, The University of Tokyo, Japan
2National Institute of Advanced Industrial Science and Technology, Japan
3Yutaka Ishikawa Graduate School of Information Science and Technology, The University of Tokyo, Japan
Design and Optimization of a Java Ahead‐of‐Time Compiler for Embedded Systems
Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae
School of Electrical Engineering and Computer Science, Seoul National University, Korea
Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller
Chantana Phongpensri, K. Sripanomwan
Department of Computing, Faculty of Science, Silpakorn University, Thailand
37. Control‐Flow Checking Using Branch Instructions
Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali
Dependable System Laboratory, Sharif University of Technology, Iran
Lunch (12:10 – 13:30pm)
EUC‐8A: Wireless Networks II 13:30 – 15:10pm, Function Room 4&5
Session Chair: Guihai Chen, Nanjing University, China
RADAR: Rate‐Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi‐Rate
Wireless Networks
Liqiang Zhang1, Yu-Jen Cheng1, Xiaobo Zhou2
1Department of Computer & Information Sciences, Indiana University South Bend, USA
2Department of Computer Science, University of Colorado at Colorado Springs, USA
A Hybrid Anti‐Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory
Consumption
Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu
School of Microelectronics, Shanghai Jiao Tong University, China
Rule‐Based WiFi Localization Methods
Qiuxia Chen1, Dik-Lun Lee1, Wang-Chien Lee2
1Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong
2Computer Science and Engineering, The Pennsylvania State University, University Park, USA
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks
Yuanyuan Zhang1, Dawu Gu1,2, Bart Preneel2
1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
2ESAT-COSIC, Katholieke Universiteit Leuven (KUL), Belgium
EUC‐8B: Real‐Time and Cyber‐Physical Systems II 13:30 – 15:10pm, Function Room 7
Session Chair: Wenbin Jiang, Huazhong University of Science and Technology, China
Performance Comparison of Techniques on Static Path Analysis of WCET
Mingsong Lv1, Zonghua Gu2, Nan Guan1, Qingxu Deng1, Ge Yu1
1Northeastern University, China
2Hong Kong University of Science and Technology, Hong Kong
Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway
Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato
Department of Information Systems Design, Doshisha University, Japan
38. TRAcME: Temporal Activity Recognition Using Mobile Phone Data
Driss Choujaa, Naranker Dulay
Department of Computing, Imperial College London, UK
Adaptive Drowsy Cache Control for Java Applications
Sun Yu, Wei Zhang
Department of Electrical and Computer Engineering, Southern Illinois University, USA
Coffee Break (15:10 – 15:30pm)
EUC‐9A: Network Protocols II 15:30 – 16:50pm, Function Room 4&5
Session Chair: Hung‐Chang Hsiao, National Cheng‐Kung University, Taiwan
Evaluating the Effect of Inter Process Communication Efficiency on High Performance
Distributed Scientific Computing
Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi
Computer Engineering Department, Iran University of Science & Technology, Iran
Hierarchical Cluster‐Based Irregular Topology Customization for Networks‐on‐Chip
Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng
Department of Electronic Engineering, Tsinghua University, China
Design and Analysis of a Stable Queue Control Scheme for the Internet
Naixue Xiong1,2, Laurence T. Yang3, Yaoxue Zhang4, Yuezhi Zhou4, Yingshu Li2
1Department of Computer Science, Wuhan University of Science and Engineering, China
2Computer Science, Georgia State University, USA
3Department of Computer Science, St. Francis Xavier University, Canada
4Department of Computer Science & Technology, Tsinghua University, China
EUC‐9B: Multimedia and Data Management II 15:30 – 16:50pm, Function Room 7
Session Chair: Meilin Liu, Wright State University, USA
Lossless Data Hiding Based on Histogram Modification for Image Authentication
Chin-Chen Chang1,2, Wei-Liang Tai2, Kuo-Nan Chen2
1Department of Information Engineering and Computer Science, Feng Chia University, Taiwan
2Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
A New Proxy Scheme for Large‐Scale P2P VoD System
Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao
School of Computer Science and Technology, Huazhong University of Science and Technology, China
39. A Signature‐based Grid Index Design for RFID Main‐Memory Databases
Rong-Jhang Liao1, Pei-Lun Suei1, Yung-Feng Lu1, Tei-Wei Kuo1,2, Chun-Sho Lee3
1Department of Computer Science and Information Engineering, National Taiwan University, Taiwan
2Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan
3Innovative DigiTech-Enabled Application & Services Institute, Institute for Information Industry, Taiwan
40. EUC Workshops
st
The 1 IEEE/IFIP International Workshop on End‐User Virtualization (EUV’08)
Wednesday, 17 December, 2008
Session 1 Chair: Xiaofei Liao 09:00 – 10:30am, Function Room 3
A Framework to Evaluate and Predict Performances in Virtual Machines Environment
Deshi Ye, Qinming He, Hua Chen, Jianhua Che
College of Computer Science, Zhejiang University, China
Performance Measuring and Comparing of Virtual Machine Monitors
Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang
College of Computer Science, Zhejiang University, China
An Optimized COW Block Device Driver in VMM for Fast, On‐Demand Software Deployment
Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang
School of Computer, National University of Defense Technology, China
Analysis and Enhancement for Interactive‐Oriented Virtual Machine Scheduling
Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng
Microprocessor Research and Development Center, Peking University, China
Coffee Break (10:30 – 11:00am)
Session 2 Chair: Xiaofei Liao 11:00 – 12:30pm, Function Room 3
DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture
Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao
School of Computer, National University of Defense Technology, China
A Novel Virtual Grid Experiment Method in MedImGrid
Ran Zheng, Xiaofei Liao, Hai Jin
Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and
Technology, Huazhong University of Science and Technology, China
VirtualCluster: Customizing the Cluster Environment through Virtual Machines
Kang Chen, Jun Xin, Weimin Zheng
Department of Computer Science and Technology, Tsinghua University, China
41. Session 2 (Continued) Chair: Xiaofei Liao 11:00 – 12:30pm, Function Room 3
Allocating Resource in Grid Workflow Based on State Prediction
Jiong Yu1,2, Guo-Zhong Tian1,3, Ling Cheng1,3
1School of Information Science and Engineering, Xinjiang University, China
2School of Computer Science and Technology, Beijing Institute of Technology, China
3Department of Computer Engineering, Xinjiang Polytechnic College, China
Cooperative Problem Solving Process Based on MAS_NP Model
Yan-bin Peng1, Bei-shui Liao2, Ji Gao3, Jun Hu4, Cun-hao Wang3, Jie-Qing Ai3, Hang Guo3
1School of Information and Electronic Engineering, Zhejiang University of Science and Technology, China
2Center for the Study of Language and Cognition, Zhejiang University, China
3College of Computer Science, Zhejiang University, China
4College of Computer Science, Hunan University, China
42. The 3rd IEEE/IFIP International Workshop on Embedded Software Optimization (ESO’08)
Wednesday, 17 December, 2008
Session 1 Chair: Meikang Qiu 13:30 – 16:00pm, Function Room 3
UCaS: A Schedulability Analysis Tool for AADL Models
Shenglin Gui1, Lei Luo1, Qian Liu2, Fulei Guo2, Shaopeng Lu2
1School of Computer Science and Engineering, University of Electronic Science and Technology of China
2Research & Development Center, Coretek Systems, China
A GA‐based Systematic Message Scheduling Method for Time‐Triggered CAN
Shan Ding, Zhiqiang Xie, Xiaona Yin
College of Information Science and Engineering, Northeastern University, China
Reducing Context Switch Overhead with Compiler‐Assisted Threading
Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö
Department of Computer Systems, Tampere University of Technology, Finland
Research and Design of Shared Resources Competition Solution among Hardware‐Software
Tasks based on Unified Scheduling
Bing Guo1, Yan Shen2, Lei Zhang1, Xiang Zhou1
1School of Computer Science & Engineering, SiChuan University, China
2University of Electronic Science & Technology of China
A Tiny Processing System for Education and Small Embedded Systems on the FPGAs
Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito
Department of Information Engineering, Hiroshima University, Japan
Object Placement for Fully Associative Cache
Chun-Chieh Lin, Chuen-Liang Chen
Department of Computer Science and Information Engineering, National Taiwan University, Taiwan
Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi‐core
Processor Simulator
Kai Zheng, Yongxin Zhu, Jun Xu
School of Microelectronics, Shanghai Jiao Tong University, China
Coffee Break (16:00 – 16:30pm)
43. The 4th IEEE/IFIP International Symposium on Security for Ubiquitous Computing
(SECUBIQ’08)
Wednesday, 17 December, 2008
Session 1 Chair: Deqing Zou 16:30 – 17:30pm, Function Room 3
Simple Certificateless Signature with Smart Cards
Kazumasa Omote1, Atsuko Miyaji1, Kazuhiko Kato2
1School of Information Science, Japan Advanced Institute of Science and Technology (JAIST), Japan
2Department of Computer Science, Graduate School of ISE, University of Tsukuba, Japan
Efficient ID‐based Threshold Ring Signature scheme
Jiang Han, Xu QiuLiang, Chen Guohua
School of Computer Science and Technology, Shan Dong University, China
(In)Security of Efficient Tree‐Based Group Key Agreement Using Bilinear Map
Raphael C.-W Phan1, Bok-Min Goi2
.
1Electronic & Electrical Engineering, Loughborough University, UK
2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of
Engineering, Multimedia University, Malaysia
44. The 2nd IEEE/IFIP International Workshop on Ubiquitous Underwater Sensor Network
(UUWSN’08)
Wednesday, 17 December, 2008
Welcome speech 09:00 – 09:10am, Function Room 1&2
Session 1: Applications Chair: Dongwon Jeong 09:10 – 10:30am, Function Room 1&2
Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater
Speech Communication
Hyung-jun Ju, Se-young Kim, Jung-woo Han, Ki-man Kim, Seok-yeb Kang
Department of Radio Communication Engineering, Korea Maritime University, Korea
Research on the Encrypted Data Access Control of Multi‐purpose Asynchronous WSN
Qian Sun, Shanqing Guo, Qiuliang Xu
College of Computer Science and Technology, Shandong University, China
ELM‐MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC
Protocol
Phil-Jung Yun, Changhwa Kim, Sangkyung Kim
Department of Computer Science & Engineering, Kangnung National University, Korea
Omnet++ Based Simulation for Underwater Environment
Soo Young Shin, Soo Hyun Park
School of Business Information Technology, Kookmin University, Korea
Coffee Break (10:30 – 11:00am)
Keynote Speech: Revolution for the Water World: Underwater Wireless Networked Sensing
Jun‐Hong Cui, Department of Computer Science & 11:00 – 12:30pm, Function Room 1&2
Engineering, University of Connecticut, USA
Lunch (12:30 – 13:30pm)
Session 2: Protocols/Systems
Chair: Young‐Sik Jeong 14:00 – 15:30pm, Function Room 1&2
Point‐to‐Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless
Sensor Networks
Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park
Department of Electrical Engineering, Kangnung National University, Korea
Energy‐Efficient Routing Protocol in Underwater Acoustic Sensor Networks
Heungwoo Nam, Sunshin An
Department of Electronics Engineering, Korea University, Korea
45. Session 2: Protocols/Systems (Continued)
Chair: Young‐Sik Jeong 14:00 – 15:30pm, Function Room 1&2
Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks
Trong Hung Nguyen, Soo Young Shin, Soo Hyun Park
Graduate School of Business Information Technology, Kookmin University, Korea
Scalable Uniformly‐Distributed Clustering Mechanism for Sensor Networks
Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim
Department of Computer Science & Engineering, Kangnung National University, Korea
Coffee Break (15:30 – 16:00pm)
46. The IEEE/IFIP International Workshop on Ubiquitous Wireless Multihop Networking
(UWMN’08)
Wednesday, 17 December, 2008
Session 1 Chair: Song Guo 16:00 – 17:30pm, Function Room 1&2
On‐Demand Deployment Algorithm for a Hybrid Sensor Network
Liang-Cheng Shiu1, Chao-Yang Lee2, Tian-Wen Song3,4, Chu-Sing Yang2
1Department of Information Technology, National Pingtung Institute of Commerce, Taiwan
2Department of Electrical Engineering, National Cheng Kung University, Taiwan
3Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan
4Department of Applied Internet Science, Hsing Kuo University, Taiwan
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks
Mianxiong Dong1, Gongwei Zhang2, Kaoru Ota1,3, Song Guo1, Minyi Guo1,2
1School of Computer Science and Engineering, The University of Aizu, Japan
2Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
3Department of Computer Science, Oklahoma State University, USA
A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols
Jiangwei Zhou, Boqin Feng, Gangqiang Wei
The School of Electronic and Information Engineering, Xi’an Jiaotong University, China
Route Stability in Wireless Mesh Access Networks
Usman Ashraf, Slim Abdellatif, Guy Juanole
University of Toulouse, France
A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network
Hao Xu, Dejun Mu
Institute of Controls and Networks, School of Automation, Northwestern Polytechnical University, China
47. The 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems (NCUS’08)
Wednesday, 17 December, 2008
Session 1 Chair: Jeffrey Fan 09:00 – 10:30am, Function Room 7
A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks
Tian-Wen Song1,2, Chu-Sing Yang3
1Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan
2Department of Applied Internet Science, Hsing Kuo University, Taiwan
3Department of Electrical Engineering, National Cheng Kung University, Taiwan
CayleyChord: A Novel P2P Overlay Network
Wenjun Xiao1, Mingxin He1,2, Wenhong Wei1
1Department of Computer Science, South China University of Technology, China
2Department of Computer Science, Jinan University, China
Improving BitTorrent Network's Performance via Deploying Helpers
Ke Xu1, Yahui Yang2, Tao Chen1
1Department of Computer Science and Technology, Tsinghua University, China
2School of Software and Microelectronics, Peking University, China
Adaptive Load Balancing for Lookups in Heterogeneous DHT
Zhi Chen, Guowei Huang, JingDong Xu, Yang Yang
Department of Computer Science, Nankai University, China
The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM
Networks
Simone Cintra Chagas1, Eber Huanca Cayo2, Koji Nakano3, Jacir Luiz Bordim4
1School of Electrical Engineering , Faculty of Technology, University of Brasília, Brazil
2School of Mechanic Engineering, Faculty of Technology, University of Brasília , Brazil
3Department of Information Engineering, School of Engineering, Hiroshima University , Japan
4Department of Computer Science , Campus Universitario - Asa Norte, University of Brasília, Brazil
Coffee Break (10:30 – 11:00am)
Session 2 Chair: Huan Li 11:00 – 12:30pm, Function Room 7
The Analysis and Simulation of a Hybrid Video Broadcast Architecture
He Lei, Ma Xiangjie, Zhang Weili, Guo Yunfer, Ma Hailong
China National Digital Switching System Engineering and Technology Research Center (NDSC)
48. Session 2 (Continued) Chair: Huan Li 11:00 – 12:30pm, Function Room 7
On the Impact of DoS Attacks on Secure Service Discovery
Slim Trabelsi1, Guillaume Urvoy-Keller2, Yves Roudier2
1SAP Labs France, France; 2Institute Eurecom, France
MAC Layer Misbehavior on Ad Hoc Networks
Nicole R. Nagel1, Ruzbeh Shokranian1, Jacir L. Bordim1, K. Nakano2
1Department of Computer Science, University of Brasilia, Brazil
2Department of Information Engineering, School of Engineering, Hiroshima University, Japan
CSON‐D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous
Networking
Dineshbalu Balakrishnan1, Amiya Nayak1, Pulak Dhar2
1School of Information Technology and Engineering, University of Ottawa, Canada; 2Cistech Limited, Ottawa, Canada
Communications via Systems‐on‐Chips Clustering in Large‐Scaled Sensor Networks
Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar
Department of Electrical and Computer Engineering, Florida International University, USA
Lunch (12:30 – 13:30pm)
Session 3 Chair: Koji Nakano 13:30 – 15:00pm, Function Room 7
Discovery Architecture for the Tracing of Products in the EPCglobal Network
Gyeongtaek Lee, Jonghun Shin, Daewon Park, Hyukchul Kwon
Department of Computer Science & Engineering, Pusan National University, Korea
A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment
Qi Liu, Nigel Linge
Informatics Research Institute, University of Salford, UK
Analysis of Web Service Substitutability Based on Typed Pi‐Calculus
Su Jin-dian1, Yu Shan-shan2, Guo He-qing1
1College of Computer Science and Engineering, South China University of Technology, China
2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China
49. Session 3 (Continued) Chair: Koji Nakano 16:00 – 17:30pm, Function Room 4&5
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks
Yu Huang1,2, Bo Liu2, Xianping Tao1,2, Jiannong Cao3, Beihong Jin4
1State Key Laboratory for Novel Software Technology, Nanjing University, China
2Department of Computer Science and Technology, Nanjing University, China
3Internet and Mobile Computing Lab, Department of Computing, Hong Kong Polytechnic University, China
4Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China
A Context Management System for Supporting Context‐Aware Applications
Eunhoe Kim, Jaeyoung Choi
School of Computing, Soongsil University, Korea
Tutorial: Multi‐core Supported Security Systems for Embedded and Ubiquitous Applications
Wanlei Zhou and Yang Xiang 15:10 – 18:00pm, Function Room 7
50. The 3rd IEEE/IFIP International Workshop on Trustworthiness, Reliability and services in
Ubiquitous and Sensor neTworks (TRUST’08)
Wednesday, 17 December, 2008
Opening and Keynote Speech: Data Mining for Malicious Code Detection and Security Applications
Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, USA
Chair: Stephen S. Yau, Co‐chair, TRUST 2008, and Arizona State University, USA
09:00 – 10:30am, Function Room 4&5
Coffee Break (10:30 – 11:00am)
Session 1: Data Mining, Security and Trust Computing
Chair: Jia Zhang, Iowa State University, USA 11:00 – 12:30pm, Function Room 4&5
Mean‐Variance Model for International Portfolio Selection
Qiming Pan, Xiaoxia Huang
School of Economics and Management, University of Science and Technology, China
Attacks on Improved Key Distribution Protocols with Perfect Reparability
Raphael C.-W Phan1, Bok-Min Goi2
.
1Electronic & Electrical Engineering, Loughborough University, UK
2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of
Engineering, Multimedia University, Malaysia
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
Omar Hasan1, Jean-Marc Pierson2, Lionel Brunie1
1Institut National des Sciences Appliquées de Lyon, France; 2Institut de Recherche en Informatique de Toulouse, France
A Trusted Third Party Based Secure Authentication Scheme of E‐Commerce
Longjun Zhang, Zou Tao
Department of Communication Engineering, Engineering College of Armed Police Force, China
Lunch (12:30 – 13:30pm)
Session 2: Trust, Service Computing and Management
Chair: Jen‐Marc Pierson, IRIT, France 14:00 – 15:30pm, Function Room 4&5
Probabilistic Trust Management in Pervasive Computing
Mieso K. Deno, Tao Sun
Department of Computing and Information Science, University of Guelph, Canada
51. Session 2: Trust, Service Computing and Management (Continued)
Chair: Jen‐Marc Pierson, IRIT, France 14:00 – 15:30pm, Function Room 4&5
Discovering the Most Trusted Agents without Central Control
Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki
Polish-Japanese Institute of Information Technology, Poland
A Mobile Agent‐Supported Web Services Testing Platform
Jia Zhang, Di Xu
Department of Computer Science, Northern Illinois University, USA
Large‐Scale USN Middleware Based on Context‐Aware
Won-Hee Han1, Sung-Won Kim1, Sun-Mi Park1, Chang-Wu Lee1, Jong-hyuk Park2, Young-Sik Jeong1
1Department of Computer Engineering, Wonkwang University, Korea
2Department of Computer Science and Engineering, Kyungnam University, Korea
Coffee Break (15:30 – 16:00pm)
Session 3: Panel: Grand Challenges in Ubiquitous and Sensor Networks
Chair: Stephen S. Yau, Arizona State University,
16:00 – 17:30pm, Function Room 4&5
USA
Panelists:
Jungde Cheng, Saitama University, Japan
Bhavani Thuraisingham, University of Texas at Dallas, USA
Min-You Wu, Shanghai Jiao Tong University, China
52. The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive
Applications (TSP’08)
Thursday, 18 December, 2008
Opening Ceremony 10:00 – 10:30am, Function Room 1&2
Chair: Guojun Wang, Central South University, China
Keynote Speech: Building Trustworthy Semantic Webs
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Chair: Wenbin Luo, St. Mary's University, San 10:30 – 11:30am, Function Room 1&2
Antonio, Texas, USA
Session 1: Secure Schemes and Metrics
Chair: Sancheng Peng, City University of Hong
11:30 – 12:30pm, Function Room 1&2
Kong
Voting‐Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc
Networks
Sancheng Peng1,2, Weijia Jia1,3, Guojun Wang1
1School of Information Science and Engineering, Central South University, China
2School of Computer and Communication, Hunan University of Technology, China
3Department of Computer Science, City University of Hong Kong, Hong Kong
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless
Sensor Networks
YaHui Li1, DingYong2, JianFeng Ma1
1Ministry of Education Key, Laboratory of Computer Networks and Information Security, Xidian University, China
2School of Mathematics and Computational Science, Guilin University of Electronic Technology, China
A Sanitizing Signature Scheme with Indexing
Atsushi Koide1, Raylin Tso2, Eiji Okamotov1
1University of Tsukuba, Japan; 2National Chengchi University, Taiwan
Error Detection Schemes for CED in Block Ciphers
Ewa Idzikowska, Krzysztof Bucholc
Poznaʼn University of Technology, Poland
Lunch (12:30 – 13:30pm)
53. Session 2: Trust Management and Privacy Protection I
Chair: Wenbin Luo, St. Mary’s University 14:50 – 16:10pm, Function Room 1&2
An Impact‐Oriented Metric for Interference to Network Routing
Song Huang, Lie-Gen Liu
South China University of Technology, China
User‐Directed Privacy Protection in the Ubiquitous Environment
JaeHun Lee, JinKyu Park, SangWook Kim
Kyungpook National University, Korea
Provably Secure Trusted Access Protocol for WLAN Mesh Networks
Zhuo Ma1, Jianfeng Ma2, Yulong Shen2
1School of Computer Science, Xidian University, China
2Key Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, China
Towards Trustworthy and Secure Kiosk Computing for Mobile Users
Dong Zhou, Hiroshi Inamura
DoCoMo USA Labs, USA
Automatic Generation and Enforcement of Security Contract for Pervasive Application
Ying Jin, Zepeng Li, Da Wei, Lei Liu
College of Computer Science and Technology, Jilin University
Exponential Hashing in Finite Fields
Wenbin Luo1, Gregory Heileman2
1Engineering Department, St. Mary’s University, USA
2Department of Electrical & Computer Engineering, University of New Mexico, USA
Research of a Multi‐dimension Measurement Trusting Model Based on Markov Chain
Hongyan Mao, Yixiang Chen
Software Engineering Institute of East China Normal University, China
Coffee Break (16:10 – 16:20pm)
54. Session 3: Trust Management and Privacy Protection II
Chair: Jarrod Trevathan, James Cook University 16:20 – 17:50pm, Function Room 1&2
Defending against the Propagation of Active Worms
Xiang Fan1, Yang Xiang1,2
1School of Management and Information Systems, Central Queensland University, Australia
2Centre for Intelligent and Networked Systems, Central Queensland University, Australia
Convertible Undeniable Partially Blind Signature from Bilinear Pairings
Atsushi Koide1, Raylin Tso2, Eiji Okamoto1
1University of Tsukuba, Japan
2National Chengchi University, Taiwan
Analyzing Privacy Designs of Mobile Social Networking Applications
Guanling Chen, Faruq Rahman
Department of Computer Science, University of Massachusetts Lowell, USA
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access
Technology
Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang
National Digital Switching System Engineering & Technology Research Center, China
Privacy Engine for Context‐Aware Enterprise Application Services
Marion Blount1, John Davis2, Maria Ebling1, William Jerome1, Barry Leiba1, Xuan Liu1, Archan Misra1
1IBM T J Watson Research Center; 2Ling Fling, Inc., USA
The Trustworthiness Based on Hash Chain in Wireless Sensor Network
Xiong Peng1,2, Zhang Wei1
1Department of Computer Science and Technology, East China Normal University, China
2Department of Computer Science and Technology, Nanchang Hangkong University, China
Trust Similarity Measure in Trust Model for P2P Networks
Yizhi Ren1,2, Mingchu Li1, Cheng Guo1, Yongrui Cui1, Kouichi Sakurai2
1School of Software, Dalian University of Technology, China
2Department of Computer Science and Communication Engineering, Kyushu University, Japan
55. The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive
Applications (TSP’08)
Friday, 19 December, 2008
Session 4: Encryption and Decryption I
Chair: Chien‐Pen Chuang, National Taiwan
10:30 – 12:10pm, Function Room 1&2
Normal University
Distance Bounding Protocol for Multiple RFID Tag Authentication
Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu
Department of Information Systems and Operations Management, University of Florida, USA
Encryption and Decryption with Space Transformation for Bi‐directional Association
Chien-Pen Chuang1, Tin-Ying Huang2, Li-Chi Yeh3
1Department of Applied Electronic, Technology, National Taiwan, Normal University Taipei, Taiwan
2Department of Mechatronic, Technology, National Taiwan, Normal University Taipei, Taiwan
3Department of Industrial, Education, National Taiwan, Normal University Taipei, Taiwan
Cryptanalysis of Li et al.’s Identity‐Based Threshold Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Theoretical Computer Science Laboratory, Indian Institute of Technology Madras, India
Online Signature Verification Algorithm Using Hill‐Climbing Method
Daigo Muramatsu
Department of Electrical and Mechanical Engineering, Seikei University, Japan
Converters for Designing Applied Cryptographic Protocols
Zhao Huawei1, Qin Jing2, Fang Zhifeng3
1School of Computer and Information Engineering, Shandong University of Finance, China
2School of Mathematics and System Sciences, Shandong University, China
3Information Science and Technology, Shandong Institute of Political Science and Law, China
A Novel Self‐Renewal Hash Chain and Its Implementation
Haojun Zhang1, Xiaoxue Li2, Rui Ren1
1Henan University of Technology, China; 2Agricultural Bank of China, China
Lunch (12:10 – 13:30pm)
56. Session 5: Encryption and Decryption II
Chair: Feilong Tang, Shanghai Jiao Tong
13:30 – 15:10pm, Function Room 1&2
University, China
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database
Tae Youn Won, Ji Young Chun, Dong Hoon Lee
Graduate School of Information Management and Security, Korea University, Korea
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal
Framework
Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li
Towards Successive Privacy Protection in Sensor Networks
Baokang Zhao1,2, Dan Wang2, Zili Shao2, Jiannong Cao2, Keith C.C. Chan2, Jinshu Su1, Yanqin Yang3
1School of Computer Science, National University of Defense Technology, China
2Department of Computing, Hong Kong Polytechnic University, China
3Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Markov Model‐Based Handwritten Signature Verification
Alan McCabe, Jarrod Trevathan
School of Mathematics, Physics and Information Technology, James Cook University, Australia
An Efficient RFID Authentication Protocol for Low‐Cost Tags
Yanfei Liu
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and
Telecommunications, China
Trustworthy Semantic Web Technologies for Secure Knowledge Management
Bhavani Thuraisingham, Pranav Parikh
Department of Computer Science, The University of Texas at Dallas Richardson, USA
Coffee Break (15:10 – 15:30pm)