Euc Program

3,762 views

Published on

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,762
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
11
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Euc Program

  1. 1. EUC 2008 Program EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008 Shanghai, China Sponsored by Shanghai Jiao Tong University Shanghai Computer Society IEEE Computer Society Supported by National Natural Science Foundation of China Shanghai Pudong New Area Association for Computer Foundation of Science & Tech. Development of Shanghai Pudong New Area
  2. 2. EUC 2008 The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 17-20 December 2008, Shanghai, China Contents EUC 2008 Conference Schedule at a Glance Organization Technical Program Committee The Map of EUC 2008 Conference Place Access Guide to Conference Place Reception and Pujiang Cruise Banquet Lunch EUC 2008 Advanced Technical Program Tour guide
  3. 3. EUC 2008 Conference Schedule at a Glance Wednesday, 17 December 2008 - EUC workshops   Room Function Function Function Function Room 1&2 Time Room 3 Room 7 Room 4&5 UUWSN-08 TRUST-08 9:00-9:10 EUV-08 Welcome speech NCUS-08 Opening and 9:10-10:30 UUWSN-08 Session 1 Keynote speech 10:30-11:00 Coffee Break UUWSN-08 TRUST-08 11:00-12:30 EUV-08 NCUS-08 Keynote Speech Session 1 12:30-13:30 Lunch 13:30-14:00 NCUS-08 14:00-15:00 UUWSN-08 TRUST-08 15:00-15:10 ESO-08 Coffee Break Session 2 Session 2 15:10-15:30 15:30-16:00 Coffee Break Tutorial 1 Coffee Break 16:00-16:30 Coffee Break TRUST-08 16:30-16:50 UWMN-08  Coffee Break SECUBIQ-08 Session 3 (Panel) 16:50-17:30 Tutorial 2 17:30-18:00 18:30-20:00 Supper in Yayuefang Restaurant (100m away from the conference place) Thursday, 18 December 2008 - EUC 2008 main conference and TSP-08 Room Function Function Function Grand Ballroom Time Room 4&5 Room 7 Room 1&2 EUC-08 Opening 8:30-9:00 Ceremony Keynote Speech I 9:00-10:00 (Yaoxue Zhang) TSP-08 Opening 10:00-10:30 Coffee Break Ceremony TSP-08 10:30-11:30 EUC-08 EUC-08 Keynote Speech Session 1A Session 1B 11:30-12:10 TSP-08 Session 1
  4. 4. 12:10-12:30 Lunch 12:30-13:30 Lunch Keynote Speech II 13:30-14:30 (Tarek Abdelzaher) 14:30-14:50 Coffee Break Coffee Break 14:50-15:00 TSP-08 15:00-16:10 Session 2 EUC-08 EUC-08 16:10-16:20 Coffee Break Session 2A Session 2B 16:20-16:40 TSP-08 Session 3 16:40-17:50 18:00-19:00 Take bus from hotel to the dock 19:00-21:00 Reception and Pujiang Cruise Friday, 19 December 2008 - EUC 2008 main conference and TSP-08 Room Function Function Function Grand Ballroom Time Room 4&5 Room 7 Room 1&2 Keynote Speech III 9:00-10:00 (Xiaodong Zhang) 10:00-10:30 Coffee Break EUC-08 EUC-08 TSP-08 10:30-12:10 Session 3A Session 3B Session 4 12:10-13:30 Lunch EUC-08 EUC-08 TSP-08 13:30-15:10 Session 4A Session 4B Session 5 15:10-15:30 Coffee Break EUC-08 EUC-08 TSP-08 15:30-17:10 Session 5A Session 5B Session 6 17:10-18:30 Rest in the hotel 18:30-21:30 Banquet in the hotel Saturday, 20 December 2008 - EUC 2008 main conference and TSP-08 Room Function room 4&5 Function Room 7 Function room 1&2 Time 8:30-10:10 EUC-08 Session 6A EUC-08 Session 6B TSP-08 Session 7 10:10-10:30 Coffee Break 10:30-12:10 EUC-08 Session 7A EUC-08 Session 7B TSP-08 Session 8
  5. 5. 12:10-13:30 Lunch 13:30-15:10 EUC-08 Session 8A EUC-08 Session 8B TSP-08 Session 9 15:10-15:30 Coffee Break 15:30-16:50 EUC-08 Session 9A EUC-08 Session 9B
  6. 6. Organization General Chair Minyi Guo, Shanghai Jiao Tong Univ., China Program Chair Cheng-Zhong Xu, Wayne State Univ., USA Program Vice-Chairs Embedded Systems Soft- Jihong Kim, Seoul National Univ., Korea ware and Optimization Embedded Systems and Zonghua Gu, Hong Kong Univ. of Science and Hard-ware/software Technology, Hong Kong Co-Design Cyber-Physical Systems Oleg Sokolsky, Univ. of Pennsylvania, USA Real-time Systems Albert M. K. Cheng, Univ. of Houston, USA Power Aware Computing Gang Quan, Univ. of South Carolina, USA Network Protocols Sherali Zeadally, Univ. of the District of Columbia, USA Wireless Networks Ivan Stojmenovic, Univ. of Ottawa, Canada Sensor Networks Loren Schwiebert, Wayne State Univ., USA Context Aware Mobile Jiannong Cao, Hong Kong Polytechnic Univ., HK Computing Agent and Distributed Wentong Cai, Nanyang Technological Univ., Singapore Computing Middleware and P2P Chung-Ta King, National Tsing Hua Univ., Taiwan Multimedia and Data Xiaobo Zhou, Univ. of Colorado, USA Management Security and Fault Makoto Takizawa, Tokyo Denki Univ., Japan Tolerance Workshop Chairs Zhijun Wang, Hong Kong Polytechnic Univ., Hong Kong Dakai Zhu, Univ. of Texas at San Antonio, USA Publicity Chairs Ben A. Abderazek, Univ. of Aizu, Japan Wenbin Jiang, Huazhong Univ. of Science and Technology, China Publication Chair Yu Hua, Huazhong Univ. of Science and Technology, China Local Arrangement Chairs Feilong Tang, Shanghai Jiao Tong Univ., China Minqi Zhang, Shanghai Computer Society, China Jingyu Zhou, Shanghai Jiao Tong Univ., China Yao Shen, Shanghai Jiao Tong Univ., China
  7. 7. Yanqin Yang, East China Normal Univ., China Technical Program Committee Jemal Abbawajy Deakin University, Australia Kemal Akkaya Southern Illinois University, USA Stefan Andrei Lamar University, USA David Atienza Complutense University of Madrid, Spain Neil Audsley University of York, UK Hakan Aydin George Mason University, USA Iain Bate University of York, UK Paolo Bellavista Università di Bologna, Italy Lim Hock Beng National University of Singapore, Singapore Miodrag Bolic University of Ottawa, Canada Azzedine Boukerche University of Ottawa, Canada Stephen Bush GE Research, USA Jian Cao Shanghai Jiaotong University, China Jean Carle University of Lille, France Eduardo Cerqueira University of Coimbra, Portugal Chaitali Chakrabarti Arizona State University, USA Samarjit Chakraborty National University of Singapore, Singapore Alvin T.S. Chan Hong Kong Polytechnic University, Hong Kong Rong-Guey Chang National Chung-Cheng University, Taiwan Han-Chieh Chao National Ilan University, Taiwan Hsi-Lu Chao National Chiao-Tung University, Taiwan Ling Teck Chaw University of Malaya, Malaysia Guihai Chen Nanjing University, China Hongyang Chen University of Tokyo, Japan Albert K. Cheng University of Houston, USA Reynold Cheng Hong-Kong Polytechnic University, Hong Kong Naveen Chilamkurti LaTrobe University, Australia
  8. 8. Pai Chou University of California at Irvine, USA Sung Woo Chung Korea University, Korea Yeh-Ching Chung National Tsing-Hua University, Taiwan Stephen Cranefield University of Otago, New Zealand Saumitra Das Purdue University, USA Qianni Deng Shanghai Jiaotong University, China Qingxu Deng Northeastern University, China Murat Demirbas University of Buffalo, USA Ming Dong Wayne State University, USA Junzhao Du Xidian University, China Hala Elaarag Stetson University, USA Said Elnaffar United Arab Emirates University, UAE Sebastian Fischmeister University of Waterloo, Canada Eric Fleury INRIA-INSA Lyon, France Scott Fowler Aston University, UK Song Fu University of New Mexico Technology, USA Satoshi Fujita Hiroshima University, Japan Aniruddha Gokhale Vanderbilt University, USA Lin Guan Loughborough University, UK Song Guo University of Aizu, Japan Hani Hagras University of Essex, UK Jérôme Härri Universität Karlsruhe, Germany Mohamed Hefeeda Simon Fraser University, Canada Seongsoo Hong Seoul National University, Korea Hung-Chang Hsiao National Cheng Kung University, Taiwan Pao-Ann Hsiung National Chung Cheng University, Taiwan Ching-Hsien Hsu Chung Hua University, Taiwan Kien A. Hua University of Central Florida, USA Ray Hunt University of Canterbury, New Zealand Jacek Ilow Dalhousie University, Canada Jadwiga Indulska University of Queensland, Australia Tohru Ishihara Kyushu University, Japan Russ Joseph Northwestern University, USA Jehn-Ruey Jiang National Central University, Taiwan Beihong Jin Institute of Software, CAS, China Soon Ju Kang Kyung Book National University, Korea
  9. 9. Jung Guk Kim Hankuk University of Foreign Studies, Korea Young-Jin Kim Sun Moon University, Korea Polychronis Koutsakis McMaster University, Canada László Kovács Hungarian Academy of Science, Hungary T. John Koo Shantou University, China Srdjan Krco Ericsson, Dublin, Ireland Mohan Kumar University of Texas at Arlington, USA Tei-Wei Kuo National Taiwan University, Taiwan Bjorn Landfeldt University of Sydney, Australia Peter Langendoerfer IHP-Microelectronics, Germany Julia Lawall University of Copenhagen, Demark Jaejin Lee Seoul National University, Korea Chang-Gun Lee Seoul National University, Korea Jenq-Kuen Lee National Tsing-Hua University, Taiwan Victor Lee Hong Kong City University, Hong Kong Wang-Chien Lee The Pennsylvania State University, USA Wonjun Lee Korea University, Korea Hong-Va Leong Hong Kong Polytechnic University, Hong Kong Clement Leung Victoria University, Australia Kuan-Ching Li Providence University, Taiwan Xiang-Yang Li Illinois Institute of Technology, USA Zhu Li Motorola Labs, USA Qilian Liang University of Texas at Arlington, USA Weifa Liang Australian National University, Australia Sung-Soo Lim Kookmin University, Korea Teck Meng Lim StarHub Ltd, Singapore Justin Lipman Intel, China Annie Liu SUNY, Stony Brook, USA Hai Liu University of Ottawa, Canada Jane Liu Academia Sinica, Taiwan Steve Liu Texas A&M University, USA Xue Liu McGill University, Canada Yunhao Liu Hong Kong University of Science and Technology, Hong Kong Brian Logan University of Nottingham, UK Malcolm Low Nanyang Technological University, Singapore
  10. 10. Luis Loyola DoCoMo Euro Laboratories, Germany Zongwei Luo The University of Hong Kong, Hong Kong Huadong Ma Beijing University of Posts & Telecommunications, China Rupak Majumdar University of California at Los Angeles, USA Kami Makki University of Toledo, USA Gregorio Martinez University of Mercia, Spain Jaime Lloret Mauri University of Valencia, Spain Xiaofeng Meng Renmin University of China, China Chunyan Miao Nanyang Technological University, Singapore Kazuhiro Minami University of Illinois at Urbana-Champaign, USA Vincent John Mooney Georgia Institute of Technology, USA Farid Nait-Abdesselam University of Sciences and Technologies of Lille, France Joseph K. Ng Hong Kong Baptist University, Hong Kong Alex Nicolau University of California at Irvine, USA Ertan Ozturk Zonguldak Karaelmas University, Turkey Christian Poellabauer University of Notre Dame, USA Raj Rajkumar Carnegie Mellon University, USA Binoy Ravindran Virginia Tech, USA John Regehr University of Utah, USA Shangping Ren Illinois Institute of Technology, USA Ayad Salhieh Jordan University of Science and Technology, Jordan Shivakumar Sastry University of Akron, USA Sahra Sedigh University of Missouri - Rolla, USA Sudhanshu K. Semwal University of Colorado at Colorado Springs, USA Lui Sha University of Illinois at Urbana-Champaign, USA Li Shang Queen's University, Canada Zili Shao Hong Kong Polytechnic University, Hong Kong Haiying Shen University of Arkansas, USA Michael Sheng University of Adelaide, Australia Weisong Shi Wayne State University, USA Yuanchun Shi Tsinghua University, China Daniel Shih National Taiwan University, Taiwan Timothy Shih Tamkang University, Taiwan Dongkun Shin SungKyunKwan University, Korea Sang Son University of Virginia, USA Jack Stankovic University of Virginia, USA
  11. 11. Robert James Steele University of Technology, Sydney, Australia Limin Sun Chinese Academy of Sciences, China Niranjan Suri Institute of Human and Machine Cognition, USA Yasuyuki Tahara National Institute of Informatics, Japan David Tanier Monash University, Australia Xueyan Tang Nanyang Technological University, Singapore Xianping Tao Nanjing University, China Yong Meng Teo National University of Singapore, Singapore Georgios K. University of Birmingham, UK Theodoropoulos Lothar Thiele ETH Zurich, Switzerland CY Tsui Hong Kong University of Science and Technology, HK Hiroyuki Tomiyama Nagoya University, Japan Fabris Valois INSA, Lyon, France Nalini University of California at Irvine, USA Venkatasubramanian Jan Vitek Purdue University, USA Andy Wang Florida State University, USA Cho-Li Wang University of Hong Kong, Hong Kong Shige Wang General Motors, USA Tzone-I Wang National Cheng Kung University, Taiwan Xiaorui Wang University of Tennessee, USA Jianbin Wei Yahoo, USA Weigang Wu Sun Yat-Sen University, China Bin Xiao Hong Kong Polytec University, Hong Kong Nong Xiao National University of Defense Technology, China Guoliang Xing City University of Hong Kong, Hong Kong Lizhen Xu Southeast University, China Jianliang Xu Hong Kong Baptist Univ., Hong Kong Ming Xu National University of Defense and Technology, China Yun Yang Swinburne University of Technology, Australia Hiroyuki Yomo Aalborg University, Denmark Chuck Yoo Korea University, Korea Moustafa Youssef University of Maryland College Park, USA Bo Yu Wayne State University, USA Zhiwen Yu Kyoto University, Japan
  12. 12. Qing-An Zeng University of Cincinnati, USA Daqing Zhang National Institute of Telecommunications, France Liqiang Zhang Indian University South Bend, USA Wei Zhang Southern Illinois University, USA Wensheng Zhang Iowa State University, USA Lin Zhong Rice University, USA Xiliang Zhong Microsoft, USA Wanlei Zhou Deakin University, Australia Dakai Zhu University of Texas, San Antonio, USA Yongxin Zhu Shanghai Jiao Tong University, China Additional Reviewers Sourav Bhowmick Nanyang Technological University, Singapore Manoranjan Dash Nanyang Technological University, Singapore Yuhong Feng Hong Kong Polytechnic University, Hong Kong Jiayu Gong Wayne State University, USA Jia Rao Wayne State University, USA Aixin Sun Nanyang Technological University, Singapore Muzhou Xiong Nanyang Technological University, Singapore
  13. 13. General Chair Prof. Minyi Guo Department of Computer Science and Engineering, Shanghai Jiao Tong University, China Professor Minyi Guo received his Ph.D. degree in computer science from University of Tsukuba, Japan. Before 2000, Dr. Guo had been a research scientist of NEC Corp., Japan. He is now a full professor at the Department of Computer Software, The University of Aizu, Japan, from 2000 to 2005. During this period, he was also a visiting professor of Georgia State University, USA, Hong Kong Polytechnic University, University of Hong Kong, National Sun Yet-sen University in Taiwan, China, University of Waterloo, Canada and University of New South Wales, Australia. He is also a professor of Shanghai Jiao Tong University and Nanjing University, China. Dr. Guo has published more than 120 research papers in international journals and conferences. Dr. Guo has served as general chair, program committee or organizing committee chair for many international conferences. He is the founder of International Conference on Parallel and Distributed Processing and Applications (ISPA), and International Conference on Embedded and Ubiquitous Computing (EUC). He is the editor-in-chief of the Journal of Embedded Systems. He is also in editorial board of Journal of Pervasive Computing and Communications, International Journal of High Performance Computing and Networking, Journal of Embedded Computing, Journal of Parallel and Distributed Scientific and Engineering Computing, and International Journal of Computer and Applications. Dr. Guo's research interests include parallel and distributed processing, parallelizing compilers, Pervasive Computing, Embedded Software Optimization, molecular computing and software engineering. He is a member of the ACM, IEEE, IEEE Computer Society, and IEICE.
  14. 14. Program Chair Prof. Cheng-Zhong Xu Department of Electrical and Computer Engineering, Wayne State University, USA Cheng-Zhong Xu is a professor in the Department of Electrical and Computer Engineering of Wayne State University. He is also the director of the Center for Networked Computing Systems at WSU. His research interest includes networked computing systems and applications, in particular scalable and secure Internet services and architecture, scheduling and resource management in distributed, parallel, and embedded systems, and autonomic systems management for highly reliable computing. He has published more than 140 peer-reviewed scientific papers in archival journals and conferences in these areas. He is the author of quot;Scalable and Secure Internet Services and Architecturequot; (Chapman & Hall/CRC Press, 2005) and the leading co-author of quot;Load Balancing in Parallel Computers: Theory and Practicequot; (Kluwer Academic, 1996). Dr. Xu serves on the editorial boards of IEEE Transactions on Parallel and Distributed Systems, J. of Parallel and Distributed Computing, J. of Parallel, Emergent, and Distributed Systems, J. of Computers and Applications, and J. of High Performance Computing and Networking. He has also guest edited special issues for several other journals on network services and security in distributed systems. He has served a number of international conferences and workshops in various capacities as program chair, general chair, and plenary speaker. He was a recipient of “President's Award for Excellence in Teaching” of WSU in 2002 and “Career Development Chair Award” in 2003. Dr. Xu received the BS and MS degrees from Nanjing University in 1986 and 1989, respectively, and the Ph.D. degree from the University of Hong Kong in 1993. He is a senior member of IEEE.
  15. 15. Keynote Speaker Prof. Yaoxue Zhang Department of Higher Education, Ministry of Education, China The Challenges and Opportunities in Transparent Computing Abstract: In this talk, we present some new research results about our Transparent Computing which is a new computing paradigm for service sharing. Rapid development in computer networks let people easily share the hardware and software resources, however, because the slow progress in Operating system technologies and few changes in computer architectures in several decades, it is still not easy to share services from different software and hardware platforms for users. Transparent Computing paradigm separates the storages and executions of software programs and data including what of operating systems in different computers connecting with communication networks. In this paradigm, data and programs are stored in the storage servers and they are executed in either clients or execution servers according to the required services, respectively. We propose a new mechanism called Meta OS to manage this separation. This mechanism extends the Neumann architecture special-temporally, so that a sequentially virtual computing can be effectively obtained and the individual service sharing can be easily performed underlying different Operating System platforms. We will introduce the idea, the mechanism and algorithms of proposed Meta OS for
  16. 16. the separation of the programs and data including what of Operating Systems. Moreover, we also present some examples about the applications of this computing paradigm.   Biography Prof. Zhang Yaoxue was born in Li County, Hunan province, China, in 1956. He graduated from Northwest Institute of Telecommunication Engineering, China, obtained his Ph.D degree in computer networking from Tohoku University, Japan in 1989. One year later, he joined Department of Computer Science, Tsinghua University, China. He was a visiting professor of Massachusetts Institute of Technology (MIT) and University of Aizu, in 1995 and 1998, respectively. He served as the President of China Central Radio & TV University from Nov. 2001 to Jun. 2006. Currently, Prof. Zhang is a fellow of the Chinese Academy of Engineering, a professor in computer science and technology in Tsinghua University, and the Director General for Higher Education of Ministry of Education, China. He is also a member of the Expert Committee on Military Computer and Software Technology of PLA General Armament Department, of the Advisory Committee on State Informatization, and of Technical Committee on Ubiquitous/Pervasive Computing of China Computer Federation. Additionally, he serves as an editorial board member of 4 international journals: International Journal of Wireless and Mobile Computing, Journal of Autonomic and Trusted Computing, Chinese Journal of Electronics and Chinese Journal of Computer. Prof. Zhang's major research areas include computer networking, operating systems, and ubiquitous/pervasive computing. He has led many national and international research, international collaboration and industrialization projects. Because of his distinguished contributions, Prof. Zhang has won the National Award for Scientific and Technological Progress (2nd class) twice in 1998 and 2001, and National Award for Technological Invention (2nd class) in 2004, as well as 5 provincial or ministerial awards. He is a winner of the Prize of HLHL (Hong Kong) Foundation for Scientific and Technological Progress in 2005. He has filed 16 Chinese patents and 3 American patents as the first inventor, of which 13 have been granted. Accordingly, he won the Top Patent Award of China in 2006. Prof. Zhang has published over 170 technical papers in international journals and conferences, as well as 8 monographs and textbooks. He received the IEEE Best Paper Award in the 21st IEEE AINA International Conference in 2007.
  17. 17. Recently, Prof. Zhang's research mainly focuses on Transparent Computing and Active Services. Transparent Computing is a computing paradigm to solve the problem of how to access different operating systems and applications on one terminal platform through networks, and how to run an operating system and applications on different terminal platforms. Active Services is a new approach to evolve current programs and services according to user requirements to provide personalized and comprehensive network services.
  18. 18. Keynote Speaker Prof. Xiaodong Zhang Department of Computer Science and Engineering, The Ohio State University, USA Research issues and Challenges to Advance System Software for Multicore Processors and Data-intensive Applications Abstract: Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of quot;memory wallquot; has been shifted to quot;disk wallquot; that is a serious bottleneck for many data-intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems. We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching
  19. 19. capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit quot;sequential localityquot; -- for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.   Biography Xiaodong Zhang is the Robert M. Critchfield Professor in Engineering, and Chairman of the Department of Computer Science and Engineering at the Ohio State University. His research interests cover a wide spectrum in the areas of high performance and distributed systems. Several technical innovations and research results from his team have been adopted or being developed in commercial products and open source systems with direct impact to some key computing operations, including the permutation memory interleaving technique first in the Sun MicroSystems' UltraSPARC IIIi processor and then in the Sun's dual-core Gemini Processor, the token thrashing protection mechanism and the Clock-Pro page replacement algorithm for memory management in the Linux Kernel and NetBSD. Xiaodong Zhang was the Director of Advanced Computational Research Program at the National Science Foundation, 2001-2004. He is the associate Editor-in-Chief of IEEE Transactions on Parallel and Distributed Systems, and is also serving on the Editorial Boards of IEEE Transactions on Computers, IEEE Micro, and Journal of Parallel and Distributed Computing. He received his Ph.D. in Computer Science from University of Colorado at Boulder.  
  20. 20. Keynote Speaker Associate Prof. Tarek Abdelzaher Department of Computer Science, University of Illinois at Urbana Champaign, USA Research Challenges in Distributed Cyber-Physical Systems Abstract: Moore's law, automation considerations, and the pervasive need for timely information lead to a next generation of distributed systems that are open, highly interconnected, and deeply embedded in the physical world. Such systems, called cyber-physical, were recently named the first research priority in networking and information technology in the US by the nation's presidential council of advisors on science and technology. They offer new research challenges that stem from openness, scale, and tight coupling between computation, communication, and distributed interaction with both physical and social contexts. Growing challenges span a large spectrum ranging from new models of computation for systems that live in physical and social spaces, to the enforcement of reliable, predictable, and timely end-to-end behavior in the face of high interactive complexity, increased uncertainty and imperfect implementation. This talk discusses the top challenges in cyber-physical systems and conjectures on research directions of increasing interest in this realm. Biography Tarek Abdelzaher received his B.Sc. and M.Sc. degrees in Electrical and Computer
  21. 21. Engineering from Ain Shams University, Cairo, Egypt, in 1990 and 1994 respectively. He received his Ph.D. from the University of Michigan in 1999 on Quality of Service Adaptation in Real-Time Systems. He has been an Assistant Professor at the University of Virginia, where he founded the Software Predictability Group until 2005. He is currently an Associate Professor at the Department of Computer Science, the University of Illinois at Urbana Champaign. He has authored/coauthored more than 100 refereed publications in real-time computing, distributed systems, sensor networks, and control. He is Editor-in-Chief of the Journal of Real-Time Systems, an Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, the ACM Transaction on Sensor Networks, and the Ad Hoc Networks Journal, as well as Editor of ACM SIGBED Review. He was Program Chair of RTAS 2004 and RTSS 2006, and General Chair of RTAS 2005, IPSN 2007, RTSS 2007, DCoSS 2008 and Sensys 2008. Abdelzaher's research interests lie broadly in understanding and controlling the temporal properties of software systems in the face of increasing complexity, distribution, and degree of embedding in an external physical environment. Tarek Abdelzaher is a member of IEEE and ACM.
  22. 22. The Map of EUC 2008 Conference Place EUC 2008 conference place: Courtyard by Marriott Shanghai-Pudong Address of conference place: 838 Dong Fang Road, Pudong District, Shanghai, China Access Guide to EUC 2008 Conference Place There are two airports in Shanghai, Pudong International Airport(PVG) and Hongqiao International Airport (SHA) and there are two railway stations in Shanghai, , Shanghai Railway Station and Shanghai South Railway Station. Our hotel is at the crossing of Dong Fang Road and Wei Fang Road. The usual traffic direction is followed. 1. From Shanghai Pudong International Airport(PVG) Taxi only
  23. 23. A20 (Outside Circle) --- turn right onto Luo Shan Road --- turn left onto Hua Mu Road --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 40 minutes to the hotel. Estimated taxi fare: 120 RMB (one way, if traffic condition is fine) Maglev Train and Subway Line No.2 Take Maglev Train from Pudong International Airport to Longyang Road Subway Station, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 60 RMB for Subway line No.2 and economy Maglev Train, 110 RMB for Subway line No.2 and VIP Maglev Train. Airport bus Line No.3 and Subway Line No.2 Take Airport bus Line No.3 from Pudong International Airport to Longyang Road Subway Station, then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference place on foot, which takes around 5 minutes. Totally about 25 RMB is needed. Airport bus Line No.5 and Taxi Take Airport bus Line No.5 from Pudong International Airport to Oriental hospital, then take a taxi to the hotel. Totally about 35 RMB is needed. 2. From Hongqiao International Airport(SHA) Taxi only Yan An Road Elevated High Way --- to Yan An East Road Tunnel --- to Shi Ji Da Dao (Century Blvd) --- turn right onto Dong Fang Road --- turn left onto Wei Fang Road. It takes about 30 minutes to the hotel. Estimated taxi fare: 70 RMB (one way,if traffic condition is fine) Bus No. 925A and Subway Line 2 Take Bus No. 925A from Hongqiao International Airport to People's Square, and then take Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 8 RMB is needed. 3. From Shanghai Railway Station or Shanghai South Railway Station Subway Line No.1 and No.2 Take Subway Line No.1 from either Railway Station to People's Square Station, and then interchanges to Subway Line No.2 to the Shiji (Century) Avenue Station. From here, go to the conference hotel on foot, which takes around 5 minutes. Totally about 5~7 RMB is needed.
  24. 24. Location of Conference Rooms
  25. 25. Reception and Pujiang Cruise We will hold a Pujiang cruise to welcome the EUC 2008 attendee from all over the world. Pujiang cruise is the classical aquatic travel program, it’s not only because that the Huangpu River is the mother river of Shanghai, and the representative and reduction of Shanghai, but also the two sides of the river gather the famous sights of Shanghai city, such as the Eastern pearl broadcasts the television tower, Bund's Wan Guo reads extensively the group. Boarding on the boat, with delicious buffet, you can feel the honorable position and the long history of the bund; also you can step on the top deck, listen to the pulse and rhythm of Pudong times. You will understand quot;the scene of dazzling fireworks and lanterns lively districtquot; ideal condition. Reception time: 19:00 ~21:00 on Dec.18, 2008 Reception place: Pujiang Cruise ship Banquet Banquet time: 18:30~21:30 on Dec.19, 2008 Banquet place: Grand Ballroom at Courtyard by Marriott Shanghai-Pudong Lunch Lunch place: Spices Café at Courtyard by Marriott Shanghai-Pudong
  26. 26. Tour guide The Bund quot;The Bundquot; is a long, storied road in Shanghai. The Bund has been considered a historic symbol of Shanghai for over one hundred years. It is a source of great pride to the Shanghai people, as it shows the world Shanghai's culture and its capability to synchronize and meld its local culture with civilizations abroad. The Bund faces Shanghai's mother river, the Huangpu River. Behind the Bund are old buildings representing architectural styles from different countries. The unique geography around the Bund and that geography's effect on the economy of Shanghai and China throughout the past one hundred years fills the Bund with cultural connotation and undertones. The river, the long bank, the green belt and the different architectural styles of the buildings on the Bund is the most quot;Shanghai-likequot; sight in Shanghai. In the morning, the Bund is a popular place for jogging and workouts. It is a charming sight for tourists in the daytime and it becomes lovers' lane at night! Chenyi Square At the end of the 10-mile Nanjing Road is Chenyi Square, dominated by a sculpture of Chenyi-the first Shanghai mayor of the People's Republic of China. The sculpture is made of bronze and stands 5.6 meters high with a red granite underlay 3.5 meters high. Every weekend, a grand quot;Square Concertquot; is held in front of the sculpture. To the south of the sculpture is a popular fountain. Many colored lamps are set under the water of the fountain, and these lamps are turned on at night. The beautiful colored water streams created by the lamps are a great sight to see in Chenyi Square at night. Sightseeing Tunnel The Bund's Tunnel stretches from the end of Nanjing Road on the Puxi side to the Oriental Pearl TV Tower on the Lujiazui side - a total length of 646.70 meters. This
  27. 27. tunnel was finished at the end of 2000; it was the first pedestrian tunnel built in China. Tourists may enter the tunnel through an elevator at the entrance on either side. It takes about two to five minutes to walk the length of the tunnel. Many high-tech displays are featured inside. All kinds of designs, ads, panoramic displays and background music about people, history, culture and technology are displayed throughout the tunnel, making your visit there both interesting and thrilling. Xujiahui Xujiahui is one of the most prosperous business centers, with many famous mansions and shopping centers. The history of the district dates back to Ming Dynasty. A famous scientist Xu Guangqi, the Secretary of the Grand Council, had been buried here. Some of his descendants had multiplied and lived here, so it was first named quot;Xujia Villagequot; and then gradually developed into town. The name quot;Xujiahuiquot; was from the fact that Xu Guangqi built a cottage at the joint of the two rivers of Zhaojiabang and Lihongjing. In March 1957, Changshu and Xuhui districts were amalgamated into the new Xuhui District. Lujiazui Financial Center The Lujiazui Financial Center is located in the Pudong district of Shanghai. The famous buildings in this area include: The Oriental Pearl TV Tower, which is surrounded by the Yangpu Bridge in the northeast and the Nanpu Bridge in the southwest, creating a picture of 'twin dragons playing with pearls'. The tower with 468 meters high (1,536 feet) is the world's third tallest TV and radio tower surpassed in height only by towers in Toronto, Canada and Moscow, Russia. Shanghai International Conference Center, which is located to the northwest of Oriental Pearl TV Tower, along Riverside Boulevard, opposite to the Bund. The conference center covers an area of 45 thousand square meters, with modern conference halls, two multi-functional halls (around 4300 square meters), one international conference hall of press center (around 2500 square meters) and two conference halls that can hold 200 people.
  28. 28.  EUC Main Conference        Thursday, 18 December, 2008      Opening Remark    08:30  –  09:00am,  Grand  Ballroom      Keynote Speech I: The Challenges and Opportunities in Transparent Computing    Yaoxue Zhang (Tsinghua University)    09:00  –  10:00am,  Grand  Ballroom    Coffee Break (10:00 – 10:30am)         EUC‐1A: Hardware/Software Co‐Design I  10:30  –  12:10pm,  Function  Room  4&5   Session Chair: Meikang Qiu, University of New Orleans, USA    A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for  Time Critical Applications  Archana Kalyansundar, Rita Chattopadhyay Siemens Corporate Technology India, India   Advanced Optimization and Design Issues of a 32‐Bit Embedded  Processor Based on Produced  Order Queue Computation Model Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan   A Low‐Cost Embedded Controller for Complex Control Systems Zhe Peng, Longhua Ma, Feng Xia State Key Lab of Industrial Control Technology, Zhejiang University, China   Single Instruction Dual‐Execution Model Processor Architecture  Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda Adaptive System Laboratory, School of Computer Science and Engineering, University of Aizu, Japan      EUC‐1B: Sensor Networks I  10:30 – 12:10pm, Function Room 7   Session Chair: Jinde Chen, Saitama University, Japan    Analysis of Data Delivery Delay in Acoustic Sensor Networks  Chao Wang ,Yan Sun, Huadong Ma Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, China 
  29. 29.   A Collaboration‐based Storage Management Scheme in Multimedia Sensor Networks Yunpei Yan1, Guihai Chen1, Sajal Das2 1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Engineering, University of Texas at Arlington, USA   An Integrated Deployment Tool for ZigBee‐Based Wireless Sensor Networks Yu-Kai Huang1, Pi-Cheng Hsiu1, Wei-Ni Chu1, Kuan-Chang Hung1, Ai-Chun Pang1, Tei-Wei Kuo1, Min Di2, Hua-Wei Fang2 1Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 2Networks and Multimedia Institute, Institute for Information Industry, Taiwan   Cooperative Node Localization for Mobile Sensor Networks  Hongyang Chen1, Marcelo H. T. Martins1, Pei Huang2, Hing Cheung So3, Kaoru Sezaki1 1University of Tokyo, Japan 2Michigan State University, USA 3City University of Hong Kong, Hong Kong    Lunch ( 12:10 – 13:30pm)         Keynote Speech II: Research Challenges in Distributed Cyber‐Physical Systems    Tarek Abdelzaher (University of Illinois at Urbana  13:30  –  14:30pm,  Grand  Ballroom Champaign)       Coffee Break (14:30 – 15:00pm)         EUC‐2A: Real‐time and Cyber‐Physical Systems 15:00  –  16:40pm,  Function  Room  4&5   Session Chair: Hui Guo, University of New South Wales, New Zealand   A Systematic Framework for Structured Object‐Oriented Security Requirements Analysis in  Embedded Systems  Sojan Markose, Xiaoqing (Frank) Liu, Bruce McMillin Computer Science Department, Missouri University of Science and Technology, USA   Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors  Shinpei Kato, Nobuyuki Yamasaki Department of Information and Computer Science, Keio University, Japan   Robust Feedback Control Scheduling in Distributed Embedded Real‐Time Systems Bing Du1, Chun Ruan2 1School of Electrical and Information Engineering, The University of Sydney, Australia 2School of Computing and Mathematics, University of Western Sydney, Australia
  30. 30.   RT‐P2P: A Scalable Real‐Time Peer‐to‐Peer System with Probabilistic Timing Assurances  Fei Huang1, Binoy Ravindran1, E. D. Jensen2 1Department of Electrical & Computer Engineering, Virginia Tech, USA 2The MITRE Corporation, USA   EUC‐2B: Multimedia and Data Management I  15:00  –  16:40pm,  Function  Room  7   Session Chair: Huan Li, Beihang University, China      UMDD: User Model Driven Software Development  Xiaochun Wang1,2, Yuanchun Shi1 1Department of Computer Science and Technology, Tsinghua University, China 2GGV Sub-station, Postdoctoral Workstation of Zhongguancun Haidian Garden, China   A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test  Ashraf Armoush, Falk Salewski, Stefan Kowalewski Embedded Software Laboratory, RWTH Aachen University, Germany   Data Management for Context‐Aware Computing Wenwei Xue1, Hungkeng Pung1, Wenlong Ng1, Tao Gu2 1School of Computing, National University of Singapore, Singapore 2Institute for Infocomm Research, Singapore   Efficient Data Scheduling for Multi‐item Queries in On‐Demand Broadcast  Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin School of Computer Science, Fudan University, China                       
  31. 31.   Friday, 19 December, 2008       Keynote Speech III: Research Issues and Challenges to Advance System Software    Xiaodong Zhang (Ohio State University)    09:00  –  10:00am,  Grand  Ballroom    Coffee Break (10:00 – 10:30am)         EUC‐3A: Embedded SW Optimization I  10:30  –  12:10pm,  Function  Room  4&5   Session Chair: Tarek Abdelzaher, University of Illinois at Urbana, USA    An Improved EMD Embedding Scheme Based on Secret Image Difference  Chin-Chen Chang1, Chin-Feng Lee2, Yi-Ren Wang3 1Department of Information Engineering and Computer Science Management, Feng Chia University, Taiwan 2Department of Information Management, Chaoyang University of Technology, Taiwan 3Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan   A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems Lei Sun, Tatsuo Nakajima Department of Computer Science, Waseda University, Japan   SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima Department of Computer Science, Waseda University, Japan   Optimizing the Embedded Caching and Prefetching Software on a Network‐Attached Storage  System  Shih-Hao Hung1,2, Chien-Cheng Wu1, Chia-Heng Tu2 1Graduate Institute of Networking and Multimedia; 2Department of Computer Science and Information Engineering National Taiwan University, Taiwan      EUC‐3B: Wireless Networks I  10:30  –  12:10pm,  Function  Room  7   Session Chair: Hongyang Chen, University of Tokyo, Japan      Fuzzy Self‐Clustering for Wireless Sensor Networks  Yahya M. Tashtoush, Mohammed A. Okour The Department of Computer Science, Jordan University of Science and Technology, Jordan   Secure Authentication in Wireless Sensor Networks Using RF Fingerprints D. A. Knox, T. Kunz Department of Systems and Computer Engineering, Carleton University, Canada
  32. 32.   Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc  Networks Romeo Said, Yves Mahéo Valoria, Université Européenne de Bretagne, France   A Scenario‐based Directional Communication Performance in Wireless Ad hoc Networks Murad Khalid1, In-ho Ra2, Young-hoon Joo2, Ravi Sankar1 1Department of Electrical Engineering, University of South Florida, USA 2School of Electronic and Information Engineering, Kunsan National University, Korea    Lunch (12:10 – 13:30pm)         EUC‐4A: Network Protocols I  13:30  –  15:10pm,  Function  Room  4&5   Session Chair: Jun Yang, University of Pittsburgh, USA    Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application  Dejia Shi1, Weijin Jiang1,2, 3, Danping Xu3 1School of Computer and Electronic Engineering, Hunan University of Commerce, China 2School of Computer, Wuhan University of Technology, China 3The College of Information Engineering, Xiangtan University, China   Countering DDoS and XDoS Attacks against Web Services  Xinfeng Ye Department of Computer Science, Auckland University, New Zealand   Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2‐D Mesh Network on Chip Xiao Canwen, Zhang Minxuan, Dou Yong, Zhao Zhitong School of Computer Science, National University of Defense Technology, China   A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks Ze Li, Haiying Shen Department of Computer Science and Computer Engineering, University of Arkansas, USA      EUC‐4B: Power‐aware Computing  13:30  –  15:10pm,  Function  Room  7   Session Chair: Jingling Xue, University of New South Wales, Australia    Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment  Meikang Qiu1, Jiande Wu1, Jingtong Hu2, Yi He2, Edwin H.-M. Sha2 1Department of Electrical Engineering, University of New Orleans, USA 2Department of Computer Science, University of Texas at Dallas, USA 
  33. 33.   A Low Power Error Detection Technique for Floating‐Point Units in Embedded Applications Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi Dependable System Laboratory, Sharif University of Technology, Iran   A Generalized Framework for System‐Wide Energy Savings in Hard Real‐Time Embedded  Systems Gang Zeng1, Hiroyuki Tomiyama11, Hiroaki Takada1, Tohru Ishihara2 1Graduate School of Information Science, Nagoya University, Japan 2System LSI Research Center, Kyushu University, Japan   Application Specific Low Power ALU Design  Yu Zhou, Hui Guo School of Computer Science & Engineering, University of New South Wales, Australia    Coffee Break (15:10 – 15:30pm)         EUC‐5A: Hardware/Software Co‐Design II  15:30  –  17:10pm,  Function  Room  4&5   Session Chair: Wei Zhang, Southern Illinois University , USA      Hardware Support for Efficient Sparse Matrix Vector Multiplication  Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue School of Computer Science and Engineering, University of New South Wales, Australia   Accelerating Montgomery Modulo Multiplication for Redundant Radix‐64k Number System on  the FPGA Using Dual‐Port Block RAMs Koji Shigemoto, Kensuke Kawakami, Koji Nakano Department of Information Engineering, Hiroshima University, Japan   A State‐Based Predictive Approach for Leakage Reduction of Functional Units Linfeng Pan1, Minyi Guo1, Yanqin Yang1,2, Meng Wang2, Zili Shao2 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2Department of Computing, Hong Kong Polytechnic University, Hong Kong 3Department of Computer Science and technology, East China Normal University, China   Automatic Integration of Non‐Bus Hardware IP into SoC‐Platforms for Use by Software  Robert Guenzel Department of Integrated Circuit Design(E.I.S.), Technical University of Braunschweig, Germany   
  34. 34.   EUC‐5B: Context‐aware Computing  15:30  –  17:10pm,  Function  Room  7   Session Chair: Beihong Jin, Chinese Academy of Sciences, China      A Probabilistic Approach to Consistency Checking for Pervasive Context  Yu Huang1,2, Xiang Ma2, Xianping Tao1,2, Jiannong Cao3, Jian Lu1,2 1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Department of Computing, Hong Kong Polytechnic University, Hong Kong   Human Universality in Ubiquitous Computing: Maslow, Where Are You?  Sebastien Duval1, Christian Hoareau2, Hiromichi Hashizume3 1National Institute of Informatics, Japan 2The Graduate University for Advanced Studies, Japan 3National Institute of Informatics, Japan   Learning in Small and Large Ubiquitous Computing Environments  Jorge Barbosa1, Rodrigo Hahn1, Débora N. F Barbosa2, Cl´udio F R. Geyer3 . . 1PIPCA/Unisinos, São Leopoldo – RS – Brazil 2UniLasalle, Canoas – RS – Brazil 3UFRGS, Porto Alegre – RS – Brazil   Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous  Computing  Jingde Cheng Department of Information and Computer Sciences, Saitama University, Japan                     
  35. 35.   Saturday, 20 December, 2008       EUC‐6A: Sensor Networks II  08:30  –  10:10am,  Function  Room  4&5   Session Chair: Haiying Shen, University of Arkansas, USA      Adaptive Buffer Management for Efficient Code Dissemination in Multi‐Application Wireless  Sensor Networks  Weijia Li1, Yu Du1, Youtao Zhang1, Bruce Childers1, Ping Zhou2, Jun Yang2 1Computer Science Department, University of Pittsburgh, USA 2Electric and Computer Engineering Department, University of Pittsburgh, USA   Quorum‐Based Energy Saving MAC Protocol Design for Wireless Sensor Networks Chih-Min Chao, Yi-Wei Lee Department of Computer Science and Engineering, National Taiwan Ocean University, Taiwan   An Energy‐Efficient Waiting Caching Algorithm in Wireless Sensor Networks Junfeng Xu, Keqiu Li, YanMing Shen, Jian Liu Department of Computer Science and Engineering, Dalian University of Technology, China   A Grid‐Based Distributed Multi‐Hop Routing Protocol for Wireless Sensor Networks  Wenjun Liu1, Yue Sun1, Jiguo Yu2, Baoxiang Cao2 1City College, Wenzhou University, China 2School of Computer Science, Qufu Normal University, China      EUC‐6B: Multi‐Agent Systems  08:30  –  10:10am,  Function  Room  7   Session Chair: Xinfeng Ye, Auckland University, New Zealand    Dynamic Substitutability Analysis of Web Service Composition via Extended π‐Calculus  Jin-dian Su1, Shan-shan Yu2, He-qing Guo1 1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China   Efficient Self‐Healing Key Distribution with Limited Group Membership for  Communication‐Constrained Networks Ting Yuan, Jianqing Ma, Yiping Zhong, Shiyong Zhang School of Computer Science, Fudan University, China   An Empirical Study on Interoperability between Service Discovery Protocols  Beihong Jin, Zhi Zang, Liang Zhang Institute of Software, Chinese Academy of Sciences, China   A Reasonable Approach for Defining Load Index in Parallel Computing  Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng Computer Science and Engineering Department, Shanghai Jiao Tong University, China
  36. 36. Coffee Break (10:10 – 10:30am)         EUC‐7A: Middleware and Peer‐to‐Peer  10:30  –  12:10pm,  Function  Room  4&5   Session Chair: Xiaobo Zhou, University of Colorado, USA      Load Balancing in Peer‐to‐Peer Networks Based on Sampling System States  Hung-Chang Hsiao, I-Ta Lin, Hao Liao Department of Computer Science and Information Engineering, National Cheng-Kung University, Taiwan   The Effect of Routing‐Load Dispersion on Congestion Control in Structured P2P Networks  Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu Department of Computer Science, Nankai University, China   AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication  Liang Zhang1, Beihong Jin1, Jiannong Cao2 1Technology Center of Software Engineering, Institute of Software, China 2Department of Computing, The Hong Kong Polytechnic University, Hong Kong   A Self‐configuring Personal Agent Platform for Pervasive Computing Yuhong Feng, Jiannong Cao, Ivan Chuen Ho Lau, Xuan Liu Department of Computing, Hong Kong Polytechnic University, Hong Kong      EUC‐7B: Embedded Software Optimization II  10:30  –  12:10pm,  Function  Room  7   Session Chair: Tei‐Wei Kuo, National Taiwan University    A Light Lock Management Mechanism for Optimizing Real‐Time and Non‐Real‐Time  Performance in Embedded Linux  Maobing Dai1, Toshihiro Matsui2, Yutaka Ishikawa3 1Graduate School of Information Science and Technology, The University of Tokyo, Japan 2National Institute of Advanced Industrial Science and Technology, Japan 3Yutaka Ishikawa Graduate School of Information Science and Technology, The University of Tokyo, Japan    Design and Optimization of a Java Ahead‐of‐Time Compiler for Embedded Systems Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae School of Electrical Engineering and Computer Science, Seoul National University, Korea   Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller Chantana Phongpensri, K. Sripanomwan Department of Computing, Faculty of Science, Silpakorn University, Thailand
  37. 37.   Control‐Flow Checking Using Branch Instructions  Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali Dependable System Laboratory, Sharif University of Technology, Iran    Lunch (12:10 – 13:30pm)         EUC‐8A: Wireless Networks II  13:30  –  15:10pm,  Function  Room  4&5   Session Chair: Guihai Chen, Nanjing University, China      RADAR: Rate‐Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi‐Rate  Wireless Networks  Liqiang Zhang1, Yu-Jen Cheng1, Xiaobo Zhou2 1Department of Computer & Information Sciences, Indiana University South Bend, USA 2Department of Computer Science, University of Colorado at Colorado Springs, USA   A Hybrid Anti‐Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory  Consumption  Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu School of Microelectronics, Shanghai Jiao Tong University, China   Rule‐Based WiFi Localization Methods  Qiuxia Chen1, Dik-Lun Lee1, Wang-Chien Lee2 1Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong 2Computer Science and Engineering, The Pennsylvania State University, University Park, USA   Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks  Yuanyuan Zhang1, Dawu Gu1,2, Bart Preneel2 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 2ESAT-COSIC, Katholieke Universiteit Leuven (KUL), Belgium      EUC‐8B: Real‐Time and Cyber‐Physical Systems II  13:30 – 15:10pm, Function Room 7   Session Chair: Wenbin Jiang, Huazhong University of Science and Technology, China      Performance Comparison of Techniques on Static Path Analysis of WCET Mingsong Lv1, Zonghua Gu2, Nan Guan1, Qingxu Deng1, Ge Yu1 1Northeastern University, China 2Hong Kong University of Science and Technology, Hong Kong   Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway  Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato Department of Information Systems Design, Doshisha University, Japan
  38. 38.   TRAcME: Temporal Activity Recognition Using Mobile Phone Data  Driss Choujaa, Naranker Dulay Department of Computing, Imperial College London, UK   Adaptive Drowsy Cache Control for Java Applications  Sun Yu, Wei Zhang Department of Electrical and Computer Engineering, Southern Illinois University, USA    Coffee Break (15:10 – 15:30pm)         EUC‐9A: Network Protocols II  15:30  –  16:50pm,  Function  Room  4&5   Session Chair: Hung‐Chang Hsiao, National Cheng‐Kung University, Taiwan      Evaluating the Effect of Inter Process Communication Efficiency on High Performance  Distributed Scientific Computing  Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi Computer Engineering Department, Iran University of Science & Technology, Iran   Hierarchical Cluster‐Based Irregular Topology Customization for Networks‐on‐Chip Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng Department of Electronic Engineering, Tsinghua University, China   Design and Analysis of a Stable Queue Control Scheme for the Internet Naixue Xiong1,2, Laurence T. Yang3, Yaoxue Zhang4, Yuezhi Zhou4, Yingshu Li2 1Department of Computer Science, Wuhan University of Science and Engineering, China 2Computer Science, Georgia State University, USA 3Department of Computer Science, St. Francis Xavier University, Canada 4Department of Computer Science & Technology, Tsinghua University, China      EUC‐9B: Multimedia and Data Management II  15:30  –  16:50pm,  Function  Room  7   Session Chair: Meilin Liu, Wright State University, USA      Lossless Data Hiding Based on Histogram Modification for Image Authentication Chin-Chen Chang1,2, Wei-Liang Tai2, Kuo-Nan Chen2 1Department of Information Engineering and Computer Science, Feng Chia University, Taiwan 2Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan   A New Proxy Scheme for Large‐Scale P2P VoD System  Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao School of Computer Science and Technology, Huazhong University of Science and Technology, China
  39. 39.   A Signature‐based Grid Index Design for RFID Main‐Memory Databases Rong-Jhang Liao1, Pei-Lun Suei1, Yung-Feng Lu1, Tei-Wei Kuo1,2, Chun-Sho Lee3 1Department of Computer Science and Information Engineering, National Taiwan University, Taiwan 2Graduate Institute of Networking and Multimedia, National Taiwan University, Taiwan 3Innovative DigiTech-Enabled Application & Services Institute, Institute for Information Industry, Taiwan                    
  40. 40.  EUC Workshops      st   The 1  IEEE/IFIP International Workshop on End‐User Virtualization (EUV’08)      Wednesday,  17  December,  2008      Session 1                  Chair: Xiaofei Liao 09:00  –  10:30am,  Function  Room  3   A Framework to Evaluate and Predict Performances in Virtual Machines Environment    Deshi Ye, Qinming He, Hua Chen, Jianhua Che   College of Computer Science, Zhejiang University, China    Performance Measuring and Comparing of Virtual Machine Monitors  Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang   College of Computer Science, Zhejiang University, China    An Optimized COW Block Device Driver in VMM for Fast, On‐Demand Software Deployment  Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang   School of Computer, National University of Defense Technology, China    Analysis and Enhancement for Interactive‐Oriented Virtual Machine Scheduling  Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng Microprocessor Research and Development Center, Peking University, China   Coffee Break (10:30 – 11:00am)         Session 2                  Chair: Xiaofei Liao 11:00  –  12:30pm,  Function  Room  3   DBTIM: An Advanced Hardware Assisted Full Virtualization Architecture  Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao School of Computer, National University of Defense Technology, China   A Novel Virtual Grid Experiment Method in MedImGrid  Ran Zheng, Xiaofei Liao, Hai Jin Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, China   VirtualCluster: Customizing the Cluster Environment through Virtual Machines  Kang Chen, Jun Xin, Weimin Zheng Department of Computer Science and Technology, Tsinghua University, China
  41. 41.   Session 2 (Continued)  Chair: Xiaofei Liao 11:00  –  12:30pm,  Function  Room  3   Allocating Resource in Grid Workflow Based on State Prediction  Jiong Yu1,2, Guo-Zhong Tian1,3, Ling Cheng1,3 1School of Information Science and Engineering, Xinjiang University, China 2School of Computer Science and Technology, Beijing Institute of Technology, China 3Department of Computer Engineering, Xinjiang Polytechnic College, China   Cooperative Problem Solving Process Based on MAS_NP Model  Yan-bin Peng1, Bei-shui Liao2, Ji Gao3, Jun Hu4, Cun-hao Wang3, Jie-Qing Ai3, Hang Guo3 1School of Information and Electronic Engineering, Zhejiang University of Science and Technology, China 2Center for the Study of Language and Cognition, Zhejiang University, China 3College of Computer Science, Zhejiang University, China 4College of Computer Science, Hunan University, China    
  42. 42.   The 3rd IEEE/IFIP International Workshop on Embedded Software Optimization (ESO’08)    Wednesday, 17 December, 2008      Session 1                  Chair:  Meikang  Qiu 13:30  –  16:00pm,  Function  Room  3   UCaS: A Schedulability Analysis Tool for AADL Models  Shenglin Gui1, Lei Luo1, Qian Liu2, Fulei Guo2, Shaopeng Lu2 1School of Computer Science and Engineering, University of Electronic Science and Technology of China 2Research & Development Center, Coretek Systems, China   A GA‐based Systematic Message Scheduling Method for Time‐Triggered CAN  Shan Ding, Zhiqiang Xie, Xiaona Yin College of Information Science and Engineering, Northeastern University, China   Reducing Context Switch Overhead with Compiler‐Assisted Threading  Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö Department of Computer Systems, Tampere University of Technology, Finland Research and Design of Shared Resources Competition Solution among Hardware‐Software    Tasks based on Unified Scheduling  Bing Guo1, Yan Shen2, Lei Zhang1, Xiang Zhou1 1School of Computer Science & Engineering, SiChuan University, China 2University of Electronic Science & Technology of China   A Tiny Processing System for Education and Small Embedded Systems on the FPGAs  Koji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito Department of Information Engineering, Hiroshima University, Japan   Object Placement for Fully Associative Cache  Chun-Chieh Lin, Chuen-Liang Chen Department of Computer Science and Information Engineering, National Taiwan University, Taiwan Evaluation  of  Partitioning  Methods  for  Stream  Applications  on  a  Heterogeneous  Multi‐core    Processor Simulator  Kai Zheng, Yongxin Zhu, Jun Xu School of Microelectronics, Shanghai Jiao Tong University, China   Coffee Break (16:00 – 16:30pm)          
  43. 43.   The 4th IEEE/IFIP International Symposium on Security for Ubiquitous Computing  (SECUBIQ’08)    Wednesday, 17 December, 2008      Session 1                  Chair:  Deqing  Zou 16:30  –  17:30pm,  Function  Room  3   Simple Certificateless Signature with Smart Cards  Kazumasa Omote1, Atsuko Miyaji1, Kazuhiko Kato2 1School of Information Science, Japan Advanced Institute of Science and Technology (JAIST), Japan 2Department of Computer Science, Graduate School of ISE, University of Tsukuba, Japan   Efficient ID‐based Threshold Ring Signature scheme  Jiang Han, Xu QiuLiang, Chen Guohua School of Computer Science and Technology, Shan Dong University, China   (In)Security of Efficient Tree‐Based Group Key Agreement Using Bilinear Map  Raphael C.-W Phan1, Bok-Min Goi2 . 1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia      
  44. 44.   The 2nd IEEE/IFIP International Workshop on Ubiquitous Underwater Sensor Network  (UUWSN’08)      Wednesday,  17  December,  2008     Welcome speech  09:00  –  09:10am,  Function  Room  1&2      Session 1: Applications       Chair:  Dongwon  Jeong 09:10  –  10:30am,  Function  Room  1&2 Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater    Speech Communication  Hyung-jun Ju, Se-young Kim, Jung-woo Han, Ki-man Kim, Seok-yeb Kang Department of Radio Communication Engineering, Korea Maritime University, Korea   Research on the Encrypted Data Access Control of Multi‐purpose Asynchronous WSN  Qian Sun, Shanqing Guo, Qiuliang Xu College of Computer Science and Technology, Shandong University, China ELM‐MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC    Protocol  Phil-Jung Yun, Changhwa Kim, Sangkyung Kim Department of Computer Science & Engineering, Kangnung National University, Korea   Omnet++ Based Simulation for Underwater Environment  Soo Young Shin, Soo Hyun Park School of Business Information Technology, Kookmin University, Korea   Coffee Break (10:30 – 11:00am)     Keynote Speech: Revolution for the Water World: Underwater Wireless Networked Sensing    Jun‐Hong  Cui,  Department  of  Computer  Science  &  11:00  –  12:30pm,  Function  Room  1&2 Engineering, University of Connecticut, USA     Lunch (12:30 – 13:30pm)     Session 2: Protocols/Systems    Chair: Young‐Sik Jeong  14:00  –  15:30pm,  Function  Room  1&2 Point‐to‐Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless    Sensor Networks  Moo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park Department of Electrical Engineering, Kangnung National University, Korea   Energy‐Efficient Routing Protocol in Underwater Acoustic Sensor Networks  Heungwoo Nam, Sunshin An Department of Electronics Engineering, Korea University, Korea
  45. 45. Session 2: Protocols/Systems (Continued)    Chair: Young‐Sik Jeong  14:00  –  15:30pm,  Function  Room  1&2   Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor Networks  Trong Hung Nguyen, Soo Young Shin, Soo Hyun Park Graduate School of Business Information Technology, Kookmin University, Korea   Scalable Uniformly‐Distributed Clustering Mechanism for Sensor Networks  Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim Department of Computer Science & Engineering, Kangnung National University, Korea   Coffee Break (15:30 – 16:00pm)          
  46. 46.   The IEEE/IFIP International Workshop on Ubiquitous Wireless Multihop Networking  (UWMN’08)      Wednesday,  17  December,  2008       Session 1  Chair:  Song  Guo 16:00  –  17:30pm,  Function  Room  1&2   On‐Demand Deployment Algorithm for a Hybrid Sensor Network  Liang-Cheng Shiu1, Chao-Yang Lee2, Tian-Wen Song3,4, Chu-Sing Yang2 1Department of Information Technology, National Pingtung Institute of Commerce, Taiwan 2Department of Electrical Engineering, National Cheng Kung University, Taiwan 3Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 4Department of Applied Internet Science, Hsing Kuo University, Taiwan   An Improved Design of the Ubiquitous Learning System Based on Sensor Networks  Mianxiong Dong1, Gongwei Zhang2, Kaoru Ota1,3, Song Guo1, Minyi Guo1,2 1School of Computer Science and Engineering, The University of Aizu, Japan 2Department of Computer Science and Engineering, Shanghai Jiao Tong University, China 3Department of Computer Science, Oklahoma State University, USA   A New Random Mobile Model for Analysis of Ad Hoc Networks Routing Protocols  Jiangwei Zhou, Boqin Feng, Gangqiang Wei The School of Electronic and Information Engineering, Xi’an Jiaotong University, China   Route Stability in Wireless Mesh Access Networks  Usman Ashraf, Slim Abdellatif, Guy Juanole University of Toulouse, France   A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network  Hao Xu, Dejun Mu Institute of Controls and Networks, School of Automation, Northwestern Polytechnical University, China    
  47. 47.   The 4th IEEE/IFIP International Symposium on Network Centric Ubiquitous Systems (NCUS’08)     Wednesday,  17  December,  2008       Session 1  Chair:  Jeffrey  Fan 09:00  –  10:30am,  Function  Room  7   A Connectivity Improving Mechanism for ZigBee Wireless Sensor Networks  Tian-Wen Song1,2, Chu-Sing Yang3 1Department of Computer Science and Engineering, National Sun Yat-Sen University, Taiwan 2Department of Applied Internet Science, Hsing Kuo University, Taiwan 3Department of Electrical Engineering, National Cheng Kung University, Taiwan   CayleyChord: A Novel P2P Overlay Network  Wenjun Xiao1, Mingxin He1,2, Wenhong Wei1 1Department of Computer Science, South China University of Technology, China 2Department of Computer Science, Jinan University, China   Improving BitTorrent Network's Performance via Deploying Helpers    Ke Xu1, Yahui Yang2, Tao Chen1 1Department of Computer Science and Technology, Tsinghua University, China 2School of Software and Microelectronics, Peking University, China   Adaptive Load Balancing for Lookups in Heterogeneous DHT  Zhi Chen, Guowei Huang, JingDong Xu, Yang Yang Department of Computer Science, Nankai University, China The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM    Networks    Simone Cintra Chagas1, Eber Huanca Cayo2, Koji Nakano3, Jacir Luiz Bordim4 1School of Electrical Engineering , Faculty of Technology, University of Brasília, Brazil 2School of Mechanic Engineering, Faculty of Technology, University of Brasília , Brazil 3Department of Information Engineering, School of Engineering, Hiroshima University , Japan 4Department of Computer Science , Campus Universitario - Asa Norte, University of Brasília, Brazil   Coffee Break (10:30 – 11:00am)         Session 2  Chair:  Huan  Li 11:00  –  12:30pm,  Function  Room  7   The Analysis and Simulation of a Hybrid Video Broadcast Architecture  He Lei, Ma Xiangjie, Zhang Weili, Guo Yunfer, Ma Hailong China National Digital Switching System Engineering and Technology Research Center (NDSC)
  48. 48.   Session 2 (Continued)  Chair:  Huan  Li 11:00  –  12:30pm,  Function  Room  7   On the Impact of DoS Attacks on Secure Service Discovery  Slim Trabelsi1, Guillaume Urvoy-Keller2, Yves Roudier2 1SAP Labs France, France; 2Institute Eurecom, France   MAC Layer Misbehavior on Ad Hoc Networks  Nicole R. Nagel1, Ruzbeh Shokranian1, Jacir L. Bordim1, K. Nakano2 1Department of Computer Science, University of Brasilia, Brazil 2Department of Information Engineering, School of Engineering, Hiroshima University, Japan CSON‐D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous    Networking  Dineshbalu Balakrishnan1, Amiya Nayak1, Pulak Dhar2 1School of Information Technology and Engineering, University of Ottawa, Canada; 2Cistech Limited, Ottawa, Canada   Communications via Systems‐on‐Chips Clustering in Large‐Scaled Sensor Networks  Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar Department of Electrical and Computer Engineering, Florida International University, USA Lunch (12:30 – 13:30pm)         Session 3  Chair:  Koji  Nakano 13:30  –  15:00pm,  Function  Room  7   Discovery Architecture for the Tracing of Products in the EPCglobal Network  Gyeongtaek Lee, Jonghun Shin, Daewon Park, Hyukchul Kwon Department of Computer Science & Engineering, Pusan National University, Korea   A Novel Platform for Context Maintenance and Discovery in a Ubiquitous Environment  Qi Liu, Nigel Linge Informatics Research Institute, University of Salford, UK   Analysis of Web Service Substitutability Based on Typed Pi‐Calculus  Su Jin-dian1, Yu Shan-shan2, Guo He-qing1 1College of Computer Science and Engineering, South China University of Technology, China 2School of Information and Technology, Computer Science Department, Sun Yat-sen University, China      
  49. 49.   Session 3 (Continued)  Chair:  Koji  Nakano 16:00  –  17:30pm,  Function  Room  4&5   An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks  Yu Huang1,2, Bo Liu2, Xianping Tao1,2, Jiannong Cao3, Beihong Jin4 1State Key Laboratory for Novel Software Technology, Nanjing University, China 2Department of Computer Science and Technology, Nanjing University, China 3Internet and Mobile Computing Lab, Department of Computing, Hong Kong Polytechnic University, China 4Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China   A Context Management System for Supporting Context‐Aware Applications  Eunhoe Kim, Jaeyoung Choi School of Computing, Soongsil University, Korea    Tutorial: Multi‐core Supported Security Systems for Embedded and Ubiquitous Applications    Wanlei Zhou and Yang Xiang  15:10  –  18:00pm,  Function  Room  7  
  50. 50.   The 3rd IEEE/IFIP International Workshop on Trustworthiness, Reliability and services in  Ubiquitous and Sensor neTworks (TRUST’08)      Wednesday,  17  December,  2008     Opening and Keynote Speech: Data Mining for Malicious Code Detection and Security Applications    Bhavani Thuraisingham, Cyber Security Research Center, University of Texas at Dallas, USA    Chair: Stephen S. Yau, Co‐chair, TRUST 2008, and Arizona State University, USA     09:00  –  10:30am,  Function  Room  4&5    Coffee Break (10:30 – 11:00am)      Session 1: Data Mining, Security and Trust Computing    Chair: Jia Zhang, Iowa State University, USA  11:00  –  12:30pm,  Function  Room  4&5   Mean‐Variance Model for International Portfolio Selection  Qiming Pan, Xiaoxia Huang School of Economics and Management, University of Science and Technology, China   Attacks on Improved Key Distribution Protocols with Perfect Reparability  Raphael C.-W Phan1, Bok-Min Goi2 . 1Electronic & Electrical Engineering, Loughborough University, UK 2Centre for Multimedia Security and Signal Processing, Cryptography & Information Security Research Group, Faculty of Engineering, Multimedia University, Malaysia   Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation  Omar Hasan1, Jean-Marc Pierson2, Lionel Brunie1 1Institut National des Sciences Appliquées de Lyon, France; 2Institut de Recherche en Informatique de Toulouse, France   A Trusted Third Party Based Secure Authentication Scheme of E‐Commerce  Longjun Zhang, Zou Tao Department of Communication Engineering, Engineering College of Armed Police Force, China   Lunch (12:30 – 13:30pm)       Session 2: Trust, Service Computing and Management    Chair: Jen‐Marc Pierson, IRIT, France  14:00  –  15:30pm,  Function  Room  4&5   Probabilistic Trust Management in Pervasive Computing  Mieso K. Deno, Tao Sun Department of Computing and Information Science, University of Guelph, Canada
  51. 51. Session 2: Trust, Service Computing and Management (Continued)    Chair: Jen‐Marc Pierson, IRIT, France    14:00  –  15:30pm,  Function  Room  4&5   Discovering the Most Trusted Agents without Central Control  Tomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki Polish-Japanese Institute of Information Technology, Poland   A Mobile Agent‐Supported Web Services Testing Platform  Jia Zhang, Di Xu Department of Computer Science, Northern Illinois University, USA   Large‐Scale USN Middleware Based on Context‐Aware  Won-Hee Han1, Sung-Won Kim1, Sun-Mi Park1, Chang-Wu Lee1, Jong-hyuk Park2, Young-Sik Jeong1 1Department of Computer Engineering, Wonkwang University, Korea 2Department of Computer Science and Engineering, Kyungnam University, Korea    Coffee Break (15:30 – 16:00pm)      Session 3: Panel: Grand Challenges in Ubiquitous and Sensor Networks    Chair: Stephen S. Yau, Arizona State University,  16:00  –  17:30pm,  Function  Room  4&5 USA    Panelists: Jungde Cheng, Saitama University, Japan Bhavani Thuraisingham, University of Texas at Dallas, USA Min-You Wu, Shanghai Jiao Tong University, China  
  52. 52.   The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive  Applications (TSP’08)      Thursday,  18  December,  2008     Opening Ceremony    10:00  –  10:30am,  Function  Room  1&2   Chair: Guojun Wang, Central South University, China     Keynote Speech:    Building Trustworthy Semantic Webs    Bhavani Thuraisingham, The University of Texas at Dallas, USA  Chair:  Wenbin  Luo,  St.  Mary's  University,  San  10:30 – 11:30am, Function Room 1&2 Antonio, Texas, USA      Session 1: Secure Schemes and Metrics    Chair: Sancheng Peng, City University of Hong  11:30  –  12:30pm,  Function  Room  1&2 Kong  Voting‐Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc    Networks  Sancheng Peng1,2, Weijia Jia1,3, Guojun Wang1 1School of Information Science and Engineering, Central South University, China 2School of Computer and Communication, Hunan University of Technology, China 3Department of Computer Science, City University of Hong Kong, Hong Kong Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless    Sensor Networks  YaHui Li1, DingYong2, JianFeng Ma1 1Ministry of Education Key, Laboratory of Computer Networks and Information Security, Xidian University, China 2School of Mathematics and Computational Science, Guilin University of Electronic Technology, China   A Sanitizing Signature Scheme with Indexing  Atsushi Koide1, Raylin Tso2, Eiji Okamotov1 1University of Tsukuba, Japan; 2National Chengchi University, Taiwan   Error Detection Schemes for CED in Block Ciphers  Ewa Idzikowska, Krzysztof Bucholc Poznaʼn University of Technology, Poland      Lunch (12:30 – 13:30pm)      
  53. 53. Session 2: Trust Management and Privacy Protection I    Chair: Wenbin Luo, St. Mary’s University  14:50  –  16:10pm,  Function  Room  1&2   An Impact‐Oriented Metric for Interference to Network Routing  Song Huang, Lie-Gen Liu South China University of Technology, China   User‐Directed Privacy Protection in the Ubiquitous Environment  JaeHun Lee, JinKyu Park, SangWook Kim Kyungpook National University, Korea   Provably Secure Trusted Access Protocol for WLAN Mesh Networks  Zhuo Ma1, Jianfeng Ma2, Yulong Shen2 1School of Computer Science, Xidian University, China 2Key Laboratory of Computer Networks and Information Security(Ministry of Education), Xidian University, China   Towards Trustworthy and Secure Kiosk Computing for Mobile Users  Dong Zhou, Hiroshi Inamura DoCoMo USA Labs, USA   Automatic Generation and Enforcement of Security Contract for Pervasive Application  Ying Jin, Zepeng Li, Da Wei, Lei Liu College of Computer Science and Technology, Jilin University   Exponential Hashing in Finite Fields  Wenbin Luo1, Gregory Heileman2 1Engineering Department, St. Mary’s University, USA 2Department of Electrical & Computer Engineering, University of New Mexico, USA   Research of a Multi‐dimension Measurement Trusting Model Based on Markov Chain  Hongyan Mao, Yixiang Chen Software Engineering Institute of East China Normal University, China      Coffee Break (16:10 – 16:20pm)             
  54. 54. Session 3: Trust Management and Privacy Protection II    Chair: Jarrod Trevathan, James Cook University  16:20  –  17:50pm,  Function  Room  1&2   Defending against the Propagation of Active Worms  Xiang Fan1, Yang Xiang1,2 1School of Management and Information Systems, Central Queensland University, Australia 2Centre for Intelligent and Networked Systems, Central Queensland University, Australia   Convertible Undeniable Partially Blind Signature from Bilinear Pairings  Atsushi Koide1, Raylin Tso2, Eiji Okamoto1 1University of Tsukuba, Japan 2National Chengchi University, Taiwan   Analyzing Privacy Designs of Mobile Social Networking Applications  Guanling Chen, Faruq Rahman Department of Computer Science, University of Massachusetts Lowell, USA Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access    Technology  Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang National Digital Switching System Engineering & Technology Research Center, China   Privacy Engine for Context‐Aware Enterprise Application Services  Marion Blount1, John Davis2, Maria Ebling1, William Jerome1, Barry Leiba1, Xuan Liu1, Archan Misra1 1IBM T J Watson Research Center; 2Ling Fling, Inc., USA   The Trustworthiness Based on Hash Chain in Wireless Sensor Network  Xiong Peng1,2, Zhang Wei1 1Department of Computer Science and Technology, East China Normal University, China 2Department of Computer Science and Technology, Nanchang Hangkong University, China   Trust Similarity Measure in Trust Model for P2P Networks  Yizhi Ren1,2, Mingchu Li1, Cheng Guo1, Yongrui Cui1, Kouichi Sakurai2 1School of Software, Dalian University of Technology, China 2Department of Computer Science and Communication Engineering, Kyushu University, Japan                  
  55. 55.   The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive  Applications (TSP’08)      Friday,  19  December,  2008    Session 4: Encryption and Decryption I    Chair: Chien‐Pen Chuang, National Taiwan  10:30  –  12:10pm,  Function  Room  1&2 Normal University    Distance Bounding Protocol for Multiple RFID Tag Authentication  Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu Department of Information Systems and Operations Management, University of Florida, USA   Encryption and Decryption with Space Transformation for Bi‐directional Association  Chien-Pen Chuang1, Tin-Ying Huang2, Li-Chi Yeh3 1Department of Applied Electronic, Technology, National Taiwan, Normal University Taipei, Taiwan 2Department of Mechatronic, Technology, National Taiwan, Normal University Taipei, Taiwan 3Department of Industrial, Education, National Taiwan, Normal University Taipei, Taiwan   Cryptanalysis of Li et al.’s Identity‐Based Threshold Signcryption Scheme  S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Theoretical Computer Science Laboratory, Indian Institute of Technology Madras, India   Online Signature Verification Algorithm Using Hill‐Climbing Method  Daigo Muramatsu Department of Electrical and Mechanical Engineering, Seikei University, Japan   Converters for Designing Applied Cryptographic Protocols  Zhao Huawei1, Qin Jing2, Fang Zhifeng3 1School of Computer and Information Engineering, Shandong University of Finance, China 2School of Mathematics and System Sciences, Shandong University, China 3Information Science and Technology, Shandong Institute of Political Science and Law, China   A Novel Self‐Renewal Hash Chain and Its Implementation  Haojun Zhang1, Xiaoxue Li2, Rui Ren1 1Henan University of Technology, China; 2Agricultural Bank of China, China   Lunch (12:10 – 13:30pm)           
  56. 56. Session 5: Encryption and Decryption II    Chair: Feilong Tang, Shanghai Jiao Tong  13:30  –  15:10pm,  Function  Room  1&2 University, China    Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database  Tae Youn Won, Ji Young Chun, Dong Hoon Lee Graduate School of Information Management and Security, Korea University, Korea Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal    Framework  Pedro Peris-Lopez, Tong-Lee Lim, Tieyan Li   Towards Successive Privacy Protection in Sensor Networks  Baokang Zhao1,2, Dan Wang2, Zili Shao2, Jiannong Cao2, Keith C.C. Chan2, Jinshu Su1, Yanqin Yang3 1School of Computer Science, National University of Defense Technology, China 2Department of Computing, Hong Kong Polytechnic University, China 3Department of Computer Science and Engineering, Shanghai Jiao Tong University, China   Markov Model‐Based Handwritten Signature Verification  Alan McCabe, Jarrod Trevathan School of Mathematics, Physics and Information Technology, James Cook University, Australia   An Efficient RFID Authentication Protocol for Low‐Cost Tags  Yanfei Liu Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China   Trustworthy Semantic Web Technologies for Secure Knowledge Management  Bhavani Thuraisingham, Pranav Parikh Department of Computer Science, The University of Texas at Dallas Richardson, USA    Coffee Break (15:10 – 15:30pm)         

×