The Final Program is available [PDF File Download].

The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)

 

The 8th IEEE International Conference on Embedded Software and Systems (IEEE ICESS-11)

 

The 6th International Conference on Frontier of Computer Science and Technology (FCST-11)

 

Conferences, Symposiums and Workshops

 

ADVANCED PROGRAM

 

16 – 18 November 2011

Changsha, Hunan Province, China

 

Copyright © Trusted Computing Institute, Central South University, China


 

 

TABLE OF CONTENTS

 

 

 

Advanced Program at a Glance

Page 1-3

Welcome Messages

Page 4-9

Keynote Speeches

Page 10-19

Panel (CCF YOCSEF Changsha Forum)

Page 20

Technical Sessions and Papers in IEEE TrustCom-11

Page 21-31

Technical Sessions and Papers in IEEE ICESS-11

Page 32-35

Technical Sessions and Papers in FCST-11

Page 36-42

Organizing and Program Committees

Page 43-74

Introduction to Central South University (CSU)

Page 75

Introduction to School of Information Science and Engineering of CSU

Page 76

Introduction to School of Software of CSU

Page 77

Conference Venue

Page 78-79

 

 

 

 


ADVANCED PROGRAM of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 AT A GLANCE

 

November 15 (Tuesday)

14:00-20:00

On-Site Registration (In fact, it opens everyday at the registration desk in the lobby)

 

November 16 (Wednesday)

8:30-10:45

8:30-9:20

Keynote for WNM-11, Dr. Geyong Min

(4F Baisha Hall)

8:30-9:20

Keynote for UbiSafe, Dr. Yang Xiang

(4F Juzhou Hall)

ISSR 2011

Session C01

(4F Aiwan Hall)

SPIoT 2011

Session D01

(4F Shaoshan Hall)

SQC 2011

Session G01

(13F Xinwen Hall)

TSCloud 2011

Session H01

(13F Huanxing Hall)

IWCSEI 2011

Session K01

(13F Yuanzhuo Hall)

 

 

 

9:20-10:10

Keynote for TrustID-11, Dr. Valtteri Niemi

(4F Baisha Hall)

9:20-10:45

ACS 2011

Session E01

(4F Juzhou Hall)

10:45-11:00

Coffee/Tea Break

11:00-13:00

TrustID-11

Session F01

4F Baisha Hall

UbiSafe 2011

Session B01

(4F Juzhou Hall)

WNM-11

Session M01

(4F Aiwan Hall)

SPIoT 2011

Session D02

(4F Shaoshan Hall)

ESA-11

Session J01

(13F Xinwen Hall)

MWNS-11

Session N01

(13F Huanxing Hall)

 WPRIC-11

Session O01

&AIPNGN-11

Session P01

 (13F Yuanzhuo Hall)

 

 

 

13:00-14:30

Lunch at Wu Hua Restaurant at 3rd Floor

14:30-15:00

Opening Ceremony (Xiangjiang Hall at 4th Floor)

15:00-16:00

Keynote 1: Access Control in Distributed Systems: Merging Theory with Practice, Professor Ivan Stojmenovic (Xiangjiang Hall at 4th Floor)

16:00-17:00

Keynote 2: Power Management in Embedded Systems: Clusters of Satellites as a Case Study, Professor Daniel Mossé (Xiangjiang Hall at 4th Floor)

17:00-17:15

Coffee/Tea Break

17:15-18:15

Keynote 3: TRUSTIE: Design of a Trustworthy Software Production Environment, Professor Huaimin Wang (Xiangjiang Hall at 4th Floor)

18:00-20:00

Dinner at Wu Hua Restaurant at 3rd Floor


 

 

 

November 17 (Thursday)

8:30-9:30

Keynote 4: Fault Detection in Cloud Computing Systems, Professor Yi Pan (Xiangjiang Hall at 4th Floor)

9:30-10:30

Keynote 5: Jacket Matrix and Its Applications to Signal Processing, Prof. Moon Ho Lee (Xiangjiang Hall at 4th Floor)

 

10:30-10:45

Coffee/Tea Break

10:45-11:45

Keynote 6: Intelligence in Cyber-Physical-Social Spaces, Professor Zhaohui Wu (Xiangjiang Hall at 4th Floor)

13:00-14:30

Lunch at Wu Hua Restaurant at 3rd Floor

14:30-16:45

Panel

Higher Education in China and Abroad-I

(4F Baisha Hall)

TrustCom-11

Session A01

(4F Juzhou Hall)

TrustCom-11

Session A02

(4F Aiwan Hall)

TrustCom-11

Session A03

(4F Shaoshan Hall)

ICESS-11

Session I01

13F Xinwen Hall

ICESS-11

Session I02

13F Huanxing Hall

FCST-11

Session L01

(13F Yuanzhuo Hall)

FCST-11

Session L02

(21F Business Hall)

FCST-11

Session L03

(8F 803)

 

16:45-17:00

Coffee/Tea Break

17:00-19:00

Panel

Higher Education in China and Abroad-II

(4F Baisha Hall)

TrustCom-11

Session A04

(4F Juzhou Hall)

TrustCom-11

Session A05

(4F Aiwan Hall)

TrustCom-11

Session A06

(4F Shaoshan Hall)

ICESS-11

Session I03

13F Xinwen Hall

ICESS-11

Session I04

13F Huanxing Hall

FCST-11

Session L04

(13F Yuanzhuo Hall)

FCST-11

Session L05

(21F Business Hall)

FCST-11

Session L06

(8F 803)

 

19:00-21:00

Banquet at Wu Hua Restaurant at 3rd Floor

 

 

November 18 (Friday)

8:30-10:45

 

TrustCom-11

Session A07

(4F Juzhou Hall)

TrustCom-11

Session A08

(4F Aiwan Hall)

TrustCom-11

Session A09

(4F Shaoshan Hall)

FCST-11

Session L07

(13F Xinwen Hall)

FCST-11

Session L08

13F Huanxing Hall

 

 

 

 

10:45-11:00

Coffee/Tea Break

11:00-13:00

 

TrustCom-11

Session A10

(4F Juzhou Hall)

TrustCom-11 Session A11

(4F Aiwan Hall)

FCST-11

Session L09

(4F Shaoshan Hall)

ICESS-11

Session I05

(13F Xinwen Hall)

ICESS-11

Session I06

(13F Huanxing Hall)

 

 

 

 

13:00-14:30

Lunch at Wu Hua Restaurant at 3rd Floor

14:30-19:00

Tour on Your Own

 

 

 

 

 

 


 

Welcome Message from IEEE TrustCom 2011 Conference Chairs

 

 

As Conference Chairs and on behalf of the organizing committee of “The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)”, we would like to welcome you to attend the conference, and to enjoy the wonderful sightseeing in Changsha and nearby cities in China.

 

TrustCom has become a premier conference in the trust, security and privacy areas. This year the conference received a large number of submissions and many symposiums/workshops. We would like to thank all the organizing committee members and program committee members for their hard work.

 

We would like to thank Workshop Chairs, Dr. Yixin Jiang, Dr. John Fiore, and Dr. Zheng Yan, who organized 7 symposiums and workshops for the conference. We would like to thank Ms. Jin Zheng and Ms. Guihua Duan, who managed the finances of the conference and many other details such as hotel and tour reservation. We would like to express our gratitude to Dr. Scott Fowler, Dr. Felix Gomez Marmol, Dr. Jianliang Gao, Dr. Jose Maria Alcaraz Calero, Dr. Jemal H. Abawajy, and Dr. Chin-Feng Lee, who served as Publicity Chairs. We are indebted to Steering Chairs, Prof. Guojun Wang and Prof. Laurence T. Yang, and all the steering committee members. We would like to thank our keynote speakers for sharing their visions and insights with us. We thank all our authors who contributed their papers to the conference. We would also like to thank the organizations that supported the conference, including IEEE and IEEE Computer Society, National Natural Science Foundation of China, and Central South University.

 

We hope you will find the conference a technically enriching and culturally rewarding experience. Thank you very much for attending the conference. We wish you will find that the conference is fruitful, and your stay in Changsha is most enjoyable.

 

 

General Chairs

Yi Mu, University of Wollongong, Australia

Gregorio Martinez, University of Murcia, Spain

Geyong Min, University of Bradford, UK

 

Organizing Chairs

Zhigang Chen, Central South University, China

Ming Xu, National University of Defense Technology, China

Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA

 

 


 

Welcome Message from IEEE TrustCom 2011 Program Chairs

 

 

On behalf of the program committee of “The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), we would like to welcome you to the conference! The conference will be held in Changsha, Hunan Province, China, November 16-18, 2011. Changsha is a famous historical and cultural city with a variety of attractions. In particular, Changsha is very close to Chairman Mao’s former residence, which is within one-hour driving.

 

The conference aims to bring together researchers and practitioners from around the world who are working on trusted computing and communications, with a focus on trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks. With the goal of providing a forum to present and discuss emerging ideas and trends in this highly challenging research field, the conference will feature keynote speeches, technical presentations, panel discussions, symposiums and workshops.

 

We are delighted that the conference continues to attract high-quality submissions from a diverse and international group of researchers and practitioners. This year, we received 471 submissions for the conference including symposiums and workshops. All papers received at least three reviews from the program committee members. Based on these reviews, we selected 126 papers for presentation at the conference (giving an acceptance rate of 26.8%). A total of 20 technical sessions, organized in 3 parallel tracks, form the core of the technical program. This year, we will select 2 best paper awards for the conference.

 

It would have been impossible to organize the conference without the hard work and dedication of many people. In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and thank the program committee members for all their contributions during the paper reviewing and selection process.

 

We hope that the conference will provide a very good opportunity for you to learn from each other.  Enjoy the conference!

 

Program Chairs

Huaimin Wang, National University of Defense Technology, China

Stephen R. Tate, University of North Carolina at Greensboro, USA

Yang Xiang, Deakin University, Australia

 

 


 

Welcome Message from IEEE ICESS 2011 Conference Chairs

 

 

As Conference Chairs and on behalf of the organizing committee of “The 8th IEEE International Conference on Embedded Software and Systems (IEEE ICESS-11)”, we would like to welcome you to attend the conference and to enjoy the wonderful sightseeing in Changsha and nearby cities in China.

 

ICESS has become an important conference in the embedded software and systems area. This year the conference received a large number of submissions. We would like to thank all the organizing committee members and program committee members for their hard work.

 

We would like to thank Workshop Chairs, Dr. Qingxu Deng, Dr. Aniruddha Gokhale, and Dr. Shangping Ren, who organized one symposium and one workshop for the conference. We would like to thank Ms. Jin Zheng and Ms. Guihua Duan, who managed the finances of the conference and many other details such as hotel and tour reservation. We would like to express our gratitude to Dr. Avinash Srinivasan, Dr. Luigi Palopoli, Dr. Xiaorui (Ray) Wang, Dr. Feng Xia, Dr. Zhigang Gao, and Dr. Xingang Liu, who did a great job as Publicity Chairs. We are indebted to Steering Chairs, Prof. Laurence T. Yang and Prof. Zhaohui Wu, and all of the steering committee members. We would like to thank our keynote speakers for the sharing of their visions and insights with us. We thank all our authors who made contributions to the conference. We would also like to thank the organizations that supported the conference, including IEEE and IEEE Computer Society, National Natural Science Foundation of China, and Central South University.

 

We hope you will find the conference a technically enriching and culturally rewarding experience. Thank you very much for attending the conference. We wish that you will find the conference being fruitful, and your stay in Changsha is most enjoyable.

 

 

General Chairs

Guojun Wang, Central South University, China

Giorgio Buttazzo, Scuola Superiore Sant'Anna of Pisa, Italy

Tei-Wei Kuo, National Taiwan University, Taiwan

 

Organizing Chairs

Zhigang Chen, Central South University, China

Ming Xu, National University of Defense Technology, China

Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA

 

 


 

Welcome Message from IEEE ICESS-11 Program Chairs

 

 

On behalf of the program committee of “The 8th IEEE International Conference on Embedded Software and Systems (ICESS-11)”, we would like to welcome all of you to join the conference. ICESS this year is held in Changsha, China, November 16-18, 2011. Changsha is a famous historical and cultural city with a variety of attractions. The conference aims at providing a forum for scientists, engineers and researchers to discuss and exchange novel ideas, results, experiences and work-in-progress on all aspects of embedded software and systems. ICESS 2011 is co-located with the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) and the 6th International Conference on Frontier of Computer Science and Technology (FCST-11). It will feature keynote speeches along with the co-located conferences, technical presentations, and workshops.

 

This year, we received 185 submissions for the conference including workshops. All papers received at least three reviews from the program committee members. Based on these reviews, we selected 52 papers for presentation at the conference (31 regular conference papers, 6 short conference papers, and 15 workshop papers), giving an acceptance rate of 28.1%. A total of 10 technical sessions, organized in 2 parallel tracks, form the core of the technical program. This year, we will select 2 best paper awards for the conference.

 

It would be impossible to organize the conference without the hard work and dedication of many people. In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and thank the program committee members for all their contributions during the paper review and selection process.

 

We hope all of you enjoy the conference and find that it will be a very good opportunity to learn from each other and that your attendance will be most enjoyable and fruitful.

 

Program Chairs

Jian-Jia Chen, Karlsruhe Institute of Technology (KIT), Germany

Marco Di Natale, Scuola Superiore Sant'Anna of Pisa, Italy

Zonghua Gu, Zhejiang University, China

 


 

Welcome Message from FCST 2011 Conference Chairs

 

 

As Conference Chairs and on behalf of the organizing committee of “The 6th International Conference on Frontier of Computer Science and Technology (FCST-11)”, we would like to welcome you to the conference, and encourage you to enjoy the wonderful sightseeing in Changsha and nearby cities in China.

 

FCST has become an important conference in the scope of advances in all aspects of computer science and technology. For the first time, the conference has been technically co-sponsored by IEEE and IEEE Computer Society. This year the conference received a large number of submissions. We would like to thank all the organizing committee members and program committee members for their hard work.

 

We would like to thank Workshop Chairs, Dr. Ching-Hsien (Robert) Hsu, Dr. Jong Hyuk Park, and Dr. Weisong Shi, who have organized 4 symposiums/workshops for the conference. We would also like to thank Ms. Jin Zheng and Ms. Guihua Duan, who managed the finances of the conference and many other details such as hotel and tour reservations. We would like to express our gratitude to Dr. Carlos Becker Westphall, Dr. Yinfeng Wang, Dr. Yizhi Ren, and Prof. Gregorio Martinez, who served as Publicity Chairs. We are indebted to the Steering Chairs, Prof. Minyi Guo and Prof. Hai Jin, and all the steering committee members. We would like to thank our keynote speakers for sharing their visions and insights with us, and all our authors who contributed their papers to the conference, and the organizations that supported the conference, including IEEE and IEEE Computer Society, National Natural Science Foundation of China, and Central South University.

 

We hope you will find the conference a technically enriching and culturally rewarding experience. Thank you very much for attending.

 

 

General Chairs

Guojun Wang, Central South University, China

Chengzheng Sun, Nanyang Technological University, Singapore

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

 

Organizing Chairs

Zhigang Chen, Central South University, China

Ming Xu, National University of Defense Technology, China

Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA

 

 


 

Welcome Message from FCST 2011 Program Chairs

 

 

On behalf of the program committee of “The 6th International Conference on Frontier of Computer Science and Technology (FCST-11), technically co-sponsored by IEEE and IEEE Computer Society, we would like to welcome you to join the conference! The conference will be held in Changsha, Hunan Province, China, November 16-18, 2011. Changsha is a famous historical and cultural city with a variety of attractions. In particular, Changsha is very close to Chairman Mao’s former residence within one-hour driving.

 

The conference aims to bring together computer scientists, applied mathematicians, engineers in a range of disciplines, and researchers to present, discuss, and exchange ideas, results, work in progress, and experiences in the area of advanced computing for problems in science, engineering, and inter-disciplinary applications. It will feature keynote speeches, technical presentations, panel discussions, symposiums, and workshops.

 

We are delighted that the conference continues to attract high-quality submissions from a diverse and international group of researchers and practitioners. This year, we received 260 papers for the conference including symposiums/workshops. All papers received at least three reviews from the program committee members. We finally selected 75 papers for presentation in the conference (giving an acceptance rate of 28.8%). A total of 12 technical sessions, organized in 3 parallel tracks, form the core of the technical program. This year, we will select 2 best paper awards for the conference.

 

It would be impossible to organize the conference without the hard work and dedication of many people. In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and thank the program committee members for all their contributions during the paper reviewing and selection process.

 

We hope all of you find that the conference will provide a very good opportunity for you to learn from each other and that your attendance will be most enjoyable and fruitful.

 

Program Chairs

Jianer Chen, Texas A&M University, USA

Kouichi Sakurai, Kyushu University, Japan

Cho-Li Wang, University of Hong Kong, Hong Kong

 

 

 


 

The 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11

Keynote: Access Control in Distributed Systems:

Merging Theory with Practice*

Speaker: Prof. Ivan Stojmenovic, University of Ottawa, Canada

Chair: Prof. Weijia Jia, City University of Hong Kong, Hong Kong

15:00-16:00, November 16, 2011 (Wednesday), Xiangjiang Hall at 4th Floor

 

About the keynote speaker

 

Ivan Stojmenovic received his Ph.D. degree in mathematics. He held regular and visiting positions in Serbia, Japan, USA, Canada, France, Mexico, Spain, UK (as Chair in Applied Computing at the University of Birmingham), Hong Kong, Brazil, Taiwan, and China, and is Full Professor at the University of Ottawa, Canada and Adjunct Professor at the University of Novi Sad, Serbia. He published over 250 different papers, and edited seven books on wireless, ad hoc, sensor and actuator networks and applied algorithms with Wiley. He is editor of over dozen journals, editor-in-chief of IEEE Transactions on Parallel and Distributed Systems (from January 2010), and founder and editor-in-chief of three journals (MVLSC, IJPEDS and AHSWN). Stojmenovic is one of about 300 computer science researchers with h-index at least 40 and has >10000 citations. He received three best paper awards and the Fast Breaking Paper for October 2003, by Thomson ISI ESI. He is recipient of the Royal Society Research Merit Award, UK. He is elected to IEEE Fellow status (Communications Society, class 2008), and is IEEE CS Distinguished Visitor 2010-12. He received Excellence in Research Award of the University of Ottawa 2009. Stojmenovic chaired and/or organized >60 workshops and conferences, and served in >200 program committees. He was program co-chair at IEEE PIMRC 2008, IEEE AINA-07, IEEE MASS-04&07, EUC-05&08-10, AdHocNow08, IFIP WSAN08, WONS-05, MSN-05&06, ISPA-05&07, founded workshop series at IEEE MASS, ICDCS, DCOSS, WoWMoM, ACM MobiHoc, IEEE/ACM CPSCom, FCST, MSN, and is/was Workshop Chair at IEEE INFOCOM 2011, IEEE MASS-09, ACM MobiHoc-07&08.

Summary:

Access control ensures that only authorized users have access to data and services. This problem becomes challenging in distributed systems, where coordination of activities by a central authority might not be possible or could be resource demanding. Attribute Based Encryption (ABE) is a recent cryptographic primitive which is being used for access control. We address some contemporary access control problems in distributed systems such as mobile ad hoc networks, vehicular networks, smart grids and cloud computing. Each of these applications has different constraints and requirements. We show how ABE and different variants of it can be tailored to suit the specific needs of the above applications.

*Extended Abstract is available.

 


 



The 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11

Keynote: Power Management in Embedded Systems: Clusters of Satellites as a Case Study

Speaker: Prof. Daniel Mossé, University of Pittsburgh, USA

Chair: Dr. Zili Shao, The Hong Kong Polytechnic University, Hong Kong

16:00-17:00, November 16, 2011 (Wednesday), Xiangjiang Hall at 4th Floor

 

About the keynote speaker

Daniel Mossé is Professor and Chair of the Computer Science Department at the University of Pittsburgh, USA. The current major thrusts of his research are realtime and embedded systems, power management issues, and networks (wireless and security), bridging the gap between the operating systems and networking research fields. He has published approximately 200 papers worldwide in these topics. Typically funded by NSF and DARPA, his projects combine theoretical results and actual implementations. He received a BS in Mathematics from the University of Brasilia in 1986, and MS and PhD degrees in Computer Science from the University of Maryland in 1990 and 1993, respectively. Dr. Mossé received the Provost's Innovation in Education Grant/Award in 2007 for redesigning the Introductory Programming course for non-majors. He received the Tina and David Bellet Teaching Excellence Award in 2006 (One of two among over 500 faculty members in the School of Arts and Sciences). Dr. Mossé has served on PCs and as PC chair for most major IEEE and ACMsponsored realtime conferences. In 2011, he is co-chair of the International Green Computing Conference and General Co-Chair for the International conference on Embedded and Real-Time Computing Systems.

Summary:

Embedded systems have gone from being microcontroller-based, small-footprint and single-application systems to modern multi-tasked distributed systems, wirelessly networked, managing multiples devices, and with more resources. Still, many of these systems are deployed in harsh environments and out-of-reach locations, which makes wireless deployment an attractive if not the only option. Therefore, changing batteries would be time and resource consuming. In this talk, we explore techniques for saving power/energy in modern embedded systems, from the perspective of multiple devices in a single embedded platform composed of a cluster of such platforms. As a case study, we use a coallition of small satellites that will be deployed in the near future as part of the F6 DARPA program; as a fractionated spacecraft, satellites coordinate actions in a cluster, but require high levels of power management due to the very nature of the environment where they are deployed. The cluster is heterogeneous and allows for a rich platform for power saving techniques.

 


 

The 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11

Keynote: TRUSTIE: Design of a Trustworthy Software Production Environment*

Speaker: Prof. Huaimin Wang, National University of Defense Technology, China

Chair: Dr. Yi Mu, University of Wollongong, Australia

17:15-18:15, November 16, 2011 (Wednesday), Xiangjiang Hall at 4th Floor

 

       About the keynote speaker

Huaimin Wang received his Ph.D. in computer science from National University of Defense Technology (NUDT). He is a Chang Jiang Scholars Program Professor of Ministry of Education, Distinct Young Scholar of NSFC, assembly member of Department of Information Science of NSFC and Fellow of CCF. As the Vice Dean of School of Computer Science and Technology of NUDT, he has worked as the director of several grand research projects, including “Internet-based Virtual Computing Environment (iVCE)” (funded by 973 Program), “Trustworthy Software Production Tools and Integration Environment” (funded by 863 Program), and “Research on Trustworthy Software Technology” (funded by NSFC). He has published more than 100 research papers on international conferences and journals of related research field and has been awarded National Awards for Science and Technology in 2003. His current research interests include distributed system and middleware, Internet computing, trustworthy computing and software engineering.

Summary:

Internet fundamentally changes the model of software development, the demands of software quality, and the process of software resource sharing. Internet-based environment for trustworthy software production is recognized as a key topic of software engineering in both academic and software industry. In this paper, the concepts and models of trustworthy software are introduced which dominate the design of Trustie environment. Trustie provides trustworthy software components sharing by an evolving software repository, and provides collaborative software development in a customizable development platform powered by a software production line framework. Finally the layered practices of research and application based on Trustie preliminarily demonstrate the effectiveness as well as the promising future of this environment.

*Extended Abstract is available.

 


 

The 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11

Keynote: Fault Detection in Cloud Computing Systems

Speaker: Prof. Yi Pan, Georgia State University, USA

Chair: Prof. Cho-Li Wang, The University of Hong Kong, Hong Kong

8:30-9:30, November 17, 2011 (Thursday), Xiangjiang Hall at 4th Floor

 

About the keynote speaker

 

Yi Pan is the chair and a professor in the Department of Computer Science and a professor in the Department of Computer Information Systems at Georgia State University. Dr. Pan received his B.Eng. and M.Eng. degrees in computer engineering from Tsinghua University, China, in 1982 and 1984, respectively, and his Ph.D. degree in computer science from the University of Pittsburgh, USA, in 1991. He is also a guest professor of many universities including Tsinghua University and Beijing University. Dr. Pan's research interests include parallel and distributed computing, optical networks, wireless networks, and bioinformatics. Dr. Pan has published more than 100 journal papers with 40 papers published in various IEEE journals. In addition, he has published over 100 papers in refereed conferences (including IPDPS, ICPP, ICDCS, INFOCOM, and GLOBECOM). He has also co-authored/co-edited 34 books (including proceedings) and contributed several book chapters. His pioneer work on computing using reconfigurable optical buses has inspired extensive subsequent work by many researchers, and his research results have been cited by more than 100 researchers worldwide in books, theses, journal and conference papers. He is a co-inventor of three U.S. patents (pending) and 5 provisional patents, and has received many awards from agencies such as NSF, AFOSR, JSPS, IISF and Mellon Foundation. His recent research has been supported by NSF, NIH, NSFC, AFOSR, AFRL, JSPS, IISF and the states of Georgia and Ohio. He has served as a reviewer/panelist for many research foundations/agencies such as the U.S. National Science Foundation, the Natural Sciences and Engineering Research Council of Canada, the Australian Research Council, and the Hong Kong Research Grants Council. Dr. Pan has served as an editor-in-chief or editorial board member for 15 journals including 5 IEEE Transactions and a guest editor for 10 special issues for 9 journals including 2 IEEE Transactions. He has organized several international conferences and workshops and has also served as a program committee member for several major international conferences such as INFOCOM, GLOBECOM, ICC, IPDPS, and ICPP. Dr. Pan has delivered over many keynote speeches at international conferences. Dr. Pan is an IEEE Distinguished Speaker (2000-2002), a Yamacraw Distinguished Speaker (2002), a Shell Oil Colloquium Speaker (2002), and a senior member of IEEE. He is listed in Men of Achievement, Who's Who in Midwest, Who's Who in America, Who's Who in American Education, Who's Who in Computational Science and Engineering, and Who's Who of Asian Americans.

Summary:

Cloud computing is an increasingly important solution for providing services deployed in dynamically scalable cloud networks. In cloud-based networks, services may be virtualized with details abstracted and hidden. Here, some servers are active and available, others busy or heavily loaded, and still others offline for various reasons. Therefore, in order to provide an effective control scheme and parameter guidance for service conditions and cloud resources, failure detection is essential to meet user service expectations. Effective failure detection is a fundamental factor in addressing possible performance bottlenecks in providing virtual service. It is imperative to design and implement an acceptable failure detector (FD) for cloud-based networks. Most existing FD schemes used in traditional networks do not automatically adjust their detection service parameters for dynamic network conditions. Given that cloud-based networks are dynamic and unexpected, we explore FD properties with relation to actual and automatic fault-tolerant cloud-based network systems, so as to find a general non-manual analytical method to self-tune corresponding parameters to satisfy various user requirements. Based on this general self-tuning method, we will report a dynamic and automatic Self-tuning Failure Detector schemes and discuss possible improvements over existing FD schemes. In this talk, we will also report experimental results which are carried out to compare Quality of Service (QoS) metrics of several adaptive FDs. We will show that our newly designed FD scheme has good performance and can automatically adjust corresponding parameters to satisfy different user requirements. Such a self-tuning FD scheme can be significantly beneficial in dynamic cloud-based environments since it does not involve any human intervention and are fully automatic.

 

 

 


 



The 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11

Keynote: Jacket Matrix and Its Applications to Signal Processing*

Speaker: Prof. Moon Ho Lee, Chonbuk National University, Korea

Chair: Dr. Peter Mueller, IBM Zurich Research Laboratory, Switzerland

9:30-10:30, November 17, 2011 (Thursday), Xiangjiang Hall at 4th Floor

 

       About the tutorial speaker

 

Moon Ho Lee is a professor and former chair of the Department of Electronics Engineering in Chonbuk National University, Korea. He received the Ph.D. degree from Chonnam National University, Korea in 1984, and from the University of Tokyo, Japan in 1990, both Electrical Engineering, He was in University of Minnesota, U.S.A, from 1985 to 1986 as a postdoctor. He was conferred an honorary doctorate from the Bulgaria Academy of Sciences in 2010. Dr. Lee has made significant original contributions in the areas of mobile communication code design, channel coding, and multidimensional source and channel coding. He has authored 34 books, 135 SCI papers in international journals, and 240 papers in domestic journals, and delivered 350 papers at international conferences. Dr. Lee is a member of the National Academy of Engineering in Korea and the National Academy of Mathematical Sciences in India, and a Foreign Fellow of the Bulgaria Academy of Sciences. He is the inventor of Jacket Matrix and it in Wikipedia was cited over 45,559 times.

Summary:

This tutorial is organized as follows: First, the Pauli matrices and their properties are introduced. Second, a mathematical definition for the block Jacket matrices is presented. Then, the block Jacket matrices with size 2x2 are investigated. Following resultants of the 2x2 block Jacket matrices, a general approach for any size block Jacket matrix is investigated in detail. Then, several special cases are investigated. After that, we extend the fast construction approach for the block Jacket matrices to higher dimension case. Especially, a brief description on 3-D block Jacket matrices is presented. To decompose high order factorable block Jacket matrices, a fast block inverse Jacket transform is proposed. The proposed decomposition algorithm is very helpful in encoding, sequence signal processing, and information processing. Finally, properties of the block Jacket matrices are discussed.

*Extended Abstract is available.

 


 



The 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11

Keynote: Intelligence in Cyber-Physical-Social Spaces

Speaker: Prof. Zhaohui Wu, Zhejiang University, China

Chair: Prof. Tei-Wei Kuo, National Taiwan University, Taiwan

10:45-11:45, November 17, 2011 (Thursday), Xiangjiang Hall at 4th Floor

 

       About the keynote speaker

Zhaohui Wu is a Professor of the College of Computer Science and Technology at Zhejiang University, China. He is a Vice-President of Zhejiang University and the Director of the Institute of Computer System and Architecture. He received the Ph.D. degree from Zhejiang University in 1993. From 1991 to 1993, he was with the German Research Center for Artificial Intelligence (DFKI) as a joint Ph.D. student. He was a visiting professor of the University of Arizona. He is a member of the IT Expert Committee for the National 863 program, a senior member of the IEEE, a standing council member of China Computer Federation. His research interests include intelligent system, semantic grid, and ubiquitous embedded systems. Prof. Wu has authored 4 books and more than 100 refereed papers. He is on the editorial boards of several journals, and has served as PC member for various international conferences.

Summary:

Physical things and the human society have formed into the world we live in. With the advent of ubiquitous sensing, future social networks are becoming cyber-physical, combining measured elements of the physical world. The convergence of computational and physical processes as well as human's social behaviors exhibits a variety of complicated characteristics, which leads to a lot of challenges. This talk will explore the intelligence issues in Cyber-Physical-Social Systems. Trends and challenges will be reviewed, and potential applications will be discussed. We will also give a brief introduction of our group's work attempting to address these challenges.

 

 

 


 



The Third International Symposium on UbiSafe Computing (UbiSafe 2011)

Keynote: Defending Against Large-scale and Coordinated Attacks in the Ubiquitous Environments*

Speaker: Dr. Yang Xiang, Deakin University, Australia

Chair: Dr. Nick Savage, University of Portsmouth, UK

8:30-9:20, November 16, 2011 (Wednesday), 4F Juzhou Hall

       About the keynote speaker

Dr. Yang Xiang is currently with School of Information Technology, Deakin University, Australia. He received his PhD in Computer Science from Deakin University. His research interests include network and system security, distributed systems, and wireless systems. In particular, he is currently leading in a research group developing active defense systems against large-scale distributed network attacks and new Internet security countermeasures. Dr. Xiang has published more than 100 research papers in international journals and conferences, most of them are IEEE/ACM journals/conferences, such as IEEE Transactions on Parallel and Distributed Systems, IEEE Journal on Selected Areas in Communications, and IEEE Transactions on Forensics and Information Security. Dr. Xiang is the co-founder of the International Conference on Network and System Security (NSS). He has served as Program Chair for about 10 international conferences such as ICA3PP 11, IEEE TrustCom 11, IEEE/IFIP EUC 11, IEEE HPCC 10/09, IEEE ICPADS 08, and NSS 10/09/08/07. He has been PC member for about 50 international conferences such as IEEE ICC, IEEE GLOBECOM, SECRYPT, Malware, and IEEE ICPADS. He has served as the guest editor for ACM Transactions on Autonomous and Adaptive Systems, Computer Communications (Elsevier), Future Generation Computer Systems (Elsevier), Journal of Network and Computer Applications (Elsevier), and Concurrency and Computation: Practice and Experience (Wiley). He is on the editorial board of Journal of Network and Computer Applications (Elsevier).

Summary:

Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. Through decades of development, we have seen the tremendous trend of moving desktop or laptop computers to invisible computers that are sensible and networked locally and globally. We are fast moving towards a cyber integrated world with innovative applications of embedded cyber physical objects and systems. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognised the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. It is revealed that there has been a shift in trend in cybercrime that organised cybercriminal activities are on the rise and with large-scale profit-driven incentives. The cybercriminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cybercrime's intent through network traffic classification to enable the early warning of potential attacks; and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modelling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.

*Extended Abstract is available.


 



The Second International Workshop on Wireless Networks and Multimedia (WNM 2011)

Keynote: Quality-of-Service and Traffic Scheduling of Wireless Multimedia Applications

Prof. Geyong Min, University of Bradford, UK

Chair: Prof. Tei-Wei Kuo, National Taiwan University, Taiwan

8:30-9:20, November 16, 2011 (Wednesday), 4F Baisha Hall

       About the keynote speaker

 

Dr. Geyong Min is a Reader in Computer Networking in the Department of Computing at the University of Bradford, UK. He received the PhD degree in Computing Science from the University of Glasgow, UK, and the BSc degree in Computer Science from Huazhong University of Science and Technology, China. He joined the University of Bradford, UK, as a Lecturer in 2002, was promoted to a Senior Lecturer in 2005 and became a Reader in 2007. His research interests include Next Generation Internet, Wireless Communications, Multimedia Systems, Information Security, Ubiquitous Computing, Modelling and Performance Engineering.

His recent research has been supported by UK EPSRC, Royal Society, Royal Academy of Engineering, and European FP, and industrial partners including Motorola Ltd, Lucent Technologies, IBM, INMARSAT, and InforSense Ltd. He has published over 200 research papers in prestigious international journals, including IEEE Transactions on Communications, IEEE Transactions on Wireless Communications, IEEE Transactions on Computers, IEEE Transactions on Multimedia, IEEE Transactions on Parallel and Distributed Systems, and IEEE Network, and in reputable international conferences, such as ICDCS and IPDPS. He was the recipient of the Best Paper Awards from IEEE AINA’2007, ICAC’2008, IEEE CSE’2009 and TrustCom’2010.

Dr. Min is an Editorial Board member of 9 international journals and serves as the Guest Editor for 18 international journals. He has chaired/co-chaired 30 international conferences /workshops and served as the committee member of 150 professional conferences/workshops. He was awarded the Outstanding Leadership Awards from IEEE International conferences CIT’2010, ScalCom’2010, ICESS’2010, ScalCom’2009, HPCC’2008 and one Outstanding Service Award from ISPA’2006.

Summary:

Differentiated Quality-of-Service (QoS) is an important requirement of wireless multimedia networks. The hybrid scheduling mechanism that integrates the fundamental traffic scheduling schemes in a hierarchical manner is a promising strategy for QoS differentiation of multimedia applications. However, the interdependent relationship among multiple traffic flows significantly increases the complexity and poses more challenges for modelling the hybrid scheduling mechanism. Many measurement studies have convincingly demonstrated that the realistic multimedia traffic exhibits noticeable self-similar nature (i.e., scale-invariant burstiness and large-lag correlation).

In this talk, we will report the heterogeneous traffic models for multimedia communication networks, and then present the analytical performance models of the hybrid scheduling schemes in the presence of multi-class self-similar traffic. The accuracy of the analytical models is validated through extensive comparison between the analytical results and those obtained from simulation experiments of the actual system subject to the real-world multimedia applications. To illustrate its applications, the analytical model is adopted as an efficient tool to study the issues of resource management and call admission control in the hybrid scheduling system subject to specific QoS constraints. Finally, we will present the emerging issues and future directions of analytical modelling of multimedia communication networks.


 



The 2011 International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (TrustID 2011)

Keynote: Privacy, Identity and Trust in Context-Aware Mobile Services*

Speaker: Dr. Valtteri Niemi, Nokia Fellow, Finland

Chair: Dr. Zheng Yan, Aalto University, Finland / Xidian University, China

9:20-10:10, November 16, 2011 (Wednesday), 4F Baisha Hall

 

       About the keynote speaker

 

Valtteri Niemi received a PhD degree in Mathematics from the University of Turku, Finland in 1989. After serving in various positions in Univ of Turku, he was an Associate Professor in Mathematics at the University of Vaasa, Finland, during 1993-97. He joined Nokia Research Center (NRC), Helsinki, Finland, in 1997. He has contributed in several roles for Nokia research in wireless security area, including cryptological aspects. In 2008, he moved to the new NRC laboratory in Lausanne, Switzerland, where his main focus was on privacy-enhancing technologies. He was nominated as a Nokia Fellow in January 2009. Starting from beginning of 2011, Valtteri is leading the Security and Networking Protocols team in the Radio Systems laboratory of NRC (in Helsinki). He participated 3GPP SA3 (security) standardization group from its beginning and during 2003-2009 he was the chairman of the group. Before 3GPP, Dr. Niemi took part in ETSI SMG 10 for GSM security specification work. He has published around 50 scientific articles and he is a co-author of four books and more than 20 patents.

Summary:

Mobile services are increasingly utilizing context information, e.g. user location. There is an intriguing interplay between privacy, identity, security and trust in this domain. In the talk, technologies are presented that can help in managing this interplay. Several technologies have also been tested in trials carried out recently by Nokia Research Center in Lausanne, Switzerland. We take a look at some key results obtained from these trials. Examples of used technologies are pseudonym management for location privacy purposes, usage control for protection of privacy-sensitive context data and secure multiparty computations for minimizing the amount of needed information exchange.

*Extended Abstract is available.

 


 



Panel (CCF YOCSEF Changsha Forum): Higher Education in China and Abroad

2:30pm-6:30pm, November 17, 2011 (Thursday), Wu Hua Hotel, Changsha, China*

 

“Wen Wei Po” in Hong Kong published an article in headline entitled “Which students are at higher level, from Tsinghua University or from Harvard University?” The first sentence in the article is “Chen-Ning Franklin Yang: The average level of students from Tsinghua University is higher.” The next sentence is “Fujia Yang: The creativity of students from Harvard University is higher.” In the article entitled “On the Differences of Higher Education in China and Abroad”, Fujia Yang said, there would be a starting point on how to compare the higher education in China and abroad, and he also pointed out that we need to evaluate whether the education can be beneficial to the cultivation of innovative talents. There are notable differences between education in China and abroad. For instance, different countries have different enrolment criteria. In China, a single examination will define a student’s destiny, while many foreign countries may take various approaches for the selection of candidates. There is no strict knock-out format in Chinese higher education. The inner structure of high school, educational strategy and school-running orientation in China and abroad are different. In addition, the cultivation of postgraduates, the source of teachers and the cultivation environment are all different in China and abroad. For example, Andrew Wiles who proved Fermat’s Last Theorem didn’t publish any paper and hadn’t attended any conferences in nine years!

How to light the fire of the youth in their brain to light the whole country, and how to inspire young talents full of dream, creativity and invention continuously emerging? How to bring forth new ideas to our higher education? This forum will invite distinguished professors and professionals with many years of experience from famous universities in China and abroad to offer talks and discuss the problems with all of you. We hope it will give you inspiration to your teaching and research.

 

Panelists:

 

Prof. Yi Pan, Georgia State University, USA

Prof. Wanlei Zhou, Deakin University, Australia

Prof. Jiannong Cao, Hong Kong Polytechnic University, Hong Kong

Prof. Minyi Guo, Shanghai Jiao Tong University, China

Prof. Baowen Xu, Nanjing University, China

Prof. Renfa Li, Hunan University, China

 

Chairs:

 

Prof. Guojun Wang, Central South University, China

Prof. Kenli Li, Central South University, China

 

Secretary:

Dr. Deng Li, Central South University, China

 

*The spoken language of this panel is in Chinese.


A. SESSIONS AND PAPERS IN TrustCom-11

The 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011)

 

Session A01: Attack and Defense, 14:30-16:45, November 17 (Thursday), 4F Juzhou Hall

Chair: Jianming Fu, Wuhan University, China (jmfu@whu.edu.cn)

        A Cooperative Mechanism to Defense Against Distributed Denial of Service Attacks

           Hakem Beitollahi, Geert Deconinck

        Estimates of Success Rates of Denial-of-Service Attacks  

Teodor Sommestad, Hannes Holm, Mathias Ekstedt

Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets  

Lin Liu

Launching Return-Oriented Programming Attacks Against Randomized Relocatable Executables      

Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha

A Privacy-Preserving Defense Mechanism Against Request Forgery Attacks        

Ben S. Y. Fung, Patrick P. C. Lee

A Survey on Latest Botnet Attacks and Defenses     

Lei Zhang, Shui Yu, Di Wu, Paul Watters

Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks using Reputation Systems coupled with Clustering Techniques        

Z. Bankovic, J. M. Moya, J. C. Vallejo, D. Fraga, P. Malagón

 

Session A02: Trust & Cloud Computing, 14:30-16:45, November 17 (Thursday), 4F Aiwan Hall

Chair: Dr. Zheng Yan, Aalto University, Finland / Xidian University, China (zhengyan.pz@gmail.com)

    Trusted Block as a Service: Towards Sensitive Applications on the Cloud    

Jianan Hao, Wentong Cai

Privacy-Preserved Access Control for Cloud Computing   

Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan

DACC: Distributed Access Control In Clouds 

Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic

Secure Virtual Layer Management of the Clouds       

Imad Abbadi, Muntaha Alawneh, Andrew Martin

Trust Ticket Deployment: A Notion of a Data Owner’s Trust in Cloud Computing       

Mahbub Ahmed, Yang Xiang

Establishing Trust in Hybrid Cloud Computing Environments    

Jemal Abawajy

Towards Scalable, Fine-grained, Intrusion Tolerant Data Protection Models for Healthcare Cloud    

Lingfeng Chen, Boan B. Hoang

 

Session A03: Detection Scheme, 14:30-16:45, November 17 (Thursday), 4F Shaoshan Hall

Chair: Christian Callegari, The University of Pisa, Italy (christian.callegari@iet.unipi.it)

     A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection

Mark Heydenrych, Elize Ehlers

A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad hoc Networks 

Ji Guo, Alan Marshall, Bosheng Zhou

LoongChecker: Practical Summary-based Semi-simulation to Detect Vulnerability in Binary Code    

Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang

DENNC: A Wireless Malicious Detection Approach based on Network Coding    

Hong Song, Xiao Xiao, Weiping Wang, Luming Yang

Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution         

Chi-Man Pun, Xiao-Chen Yuan, Philip C. L. Chen

Forecasting the Distribution of Network Traffic for Anomaly Detection       

Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe

Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs   

Silvio Cesare, Yang Xiang

A Method for Detecting Unknown Malicious Executables 

Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel

 

Session A04: Privacy, 17:00-19:00, November 17 (Thursday), 4F Juzhou Hall

Chair: Patrick P. C. Lee, The Chinese University of Hong Kong, Hong Kong (pclee@cse.cuhk.edu.hk)

Privacy Crisis due to Crisis Response on the Web    

Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen

A Privacy-friendly RFID Protocol using Reusable Anonymous Tickets        

Mahdi Asadpour, Mohammad Torabi Dashti

Learning Whom to Trust in a Privacy-Friendly Way 

Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, and Max Mühlhäuser

Semantics-Enhanced Privacy Recommendation for Social Networking Sites  

Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala

Towards a Holistic Privacy Engineering Approach for Smart Grid Systems  

Hervais Simo Fhom, Kpatcha M. Bayarou

Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses     

Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira

Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems       

Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang

 

Session A05: Trust Model, 17:00-19:00, November 17 (Thursday), 4F Aiwan Hall

Chair: Fuwen Liu, Brandenburg Technical University of Cottbus, Germany (lfw@Informatik.tu-Cottbus.DE)

A Trust Prediction Model for Service Web       

Wanita Sherchan, Surya Nepal, Athman Bouguettaya

IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation  

Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang

A Research Model for Human-Computer Trust Interaction         

Zheng Yan, Raimo Kandola, Peng Zhang

Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks

Sancheng Peng, Guojun Wang

A Hybrid Trust Model for Authorisation Using Trusted Platforms     

Aarthi Krishna, Vijay Varadharajan

A Model for A Testbed For Evaluating Reputation Systems       

Partheeban Chandrasekaran, Babak Esfandiari

SMEF: An Entropy-based Security Framework for Cloud-oriented Service Mashup      

Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang

 

Session A06: Trust Evaluation, 17:00-19:00, November 17 (Thursday), 4F Shaoshan Hall

Chair: Vallipuram Muthukkumarasamy, Griffith University Gold Coast Campus, Australia (v.muthu@griffith.edu.au)

A Reputation Mechanism for Virtual Reality--Five-Sense Oriented Feedback Provision and Subjectivity Alignment  

Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat Thalmann

SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks     

Wenjun Jiang, Guojun Wang

Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing   

Fu Jianming,Liu Xinwen, Cheng Binling

Case-Based Trust Evaluation from Provenance Information        

Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu

A Framework for Reputation Bootstrapping based on Reputation Utility and Game Theories

Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu

Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration

Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai

Towards Context-aware Service-oriented Semantic Reputation Framework   

Rehab Alnemr, Maxim Schnjakin, Christoph Meinel

 

Session A07: Authentication, 8:30-10:45, November 18 (Friday), 4F Juzhou Hall

Chair: Quan Bai, Auckland University of Technologies, New Zealand (quan.bai@aut.ac.nz)

A Private and Scalable Authentication for RFID Systems Using Reasonable Storage       

Xiaolin Cao, Maire O'Neill

SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk    

Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma

An EAP Framework for Unified Authentication in Wireless Networks

Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy

Inter-Chip Authentication through I/O Character

Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu

A Simple Balanced Password-Authenticated Key Agreement Protocol

Fuwen Liu, Hartmut Koenig

Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks   

Tassos Dimitriou, Ahmad Sabouri

Mutual Authentication Protocol for Networked RFID Systems  

Harinda Fernando, Jemal Abawajy

       

Session A08: Trust Architecture and Framework, 8:30-10:45, November 18 (Friday), 4F Aiwan Hall

Chair: Ruixuan Li, Huazhong University of Science and Technology, China (rxli@hust.edu.cn)

A DRTM-based Method for Trusted Network Connection        

Wei Feng, Yu Qin, Ai-Min Yu, Dengguo Feng

Biometric Enabled Portable Trusted Computing Platform  

Julian Jang, Hon Hwang, Surya Nepal

Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis     

Andre Seffrin, Sorin A. Huss

A New Security Architecture for BitTorrent    

Firas Bader, Andra Radoveneanu, Hani Ragab Hassen

An Access Control Framework for the Web of Data 

Owen Sacco, Alexandre Passant, Stefan Decker

Trust ME: a Trust Decision Framework for Mobile Environments      

Gonzalo Huerta-Canepa, Dongman Lee, Seon Yeong Han

A Logical Framework of Proof-Carrying Survivability        

Yanjun Zuo, Suhas Lande

CNSSA: A Comprehensive Network Security Situation Awareness System 

Rongrong Xi, Shuyuan Jin, Xiaochun Yun, Yongzheng Zhang

 

Session A09: Key and Secret Management, 8:30-10:45, November 18 (Friday), 4F Shaoshan Hall

Chair: Valtteri Niemi, Nokia Fellow (valtteri.niemi@nokia.com)

A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support      

Daniel Granlund, Christer Ahlund

Secret Sharing Scheme with Fairness        

Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu

Distributed Private-Key Generation Scheme with Self-Certified Identity      

Yongming Xie, Guojun Wang

A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks

Qian Sun, Min Wu

Biometric Identification Using User Interactions with Virtual Worlds  

Ahmed Al-Khazzar, Nick Savage

Repeated Differential Properties of the AES-128 and AES-256 Key Schedules      

Jianyong Huang, Willy Susilo, Jennifer Seberry

Lightweight Hidden Services 

Andriy Panchenko, Otto Spaniol, Andre Egners, Thomas Engel

Security Issues in NoSQL Databases       

Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov

 

Session A10: Trust & Networks, 11:00-13:00, November 18 (Friday), 4F Juzhou Hall

Chair: Timo Kiravuo, Aalto University, Finland (timo.kiravuo@aalto.fi)

A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks

Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau

Trust-Based Approaches to Solve Routing Issues in Ad-hoc Wireless Networks: A Survey    

Jesus M. Gonzalez, Mohd Anwar, and James B. D. Joshi

Highly Efficient Distance-based Anomaly Detection Through Univariate with PCA in Wireless Sensor Networks   

Miao Xie, Song Han, Biming Tian

RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks  

Junjie Xiong, Edith C.-H. Ngai, Yangfan Zhou, Michael R. Lyu

A Quantitative Approach to Triaging in Mobile Forensics 

Fabio Marturana, Rosamaria Bertè, Gianluigi Me, Simone Tacconi

Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks 

Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan

Cross-Platform Application Sharing Mechanism       

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes

TVLAN: Trusted and Virtualised Local Area Networks     

Udaya Tupakula, Vijay Varadharajan

 

Session A11: Trust & Application, 11:00-13:00, November 18 (Friday), 4F Aiwan Hall

Chair: Surya Nepal, CSIRO ICT Centre, Australia (Surya.Nepal@csiro.au)

A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems   

Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Lin

Intelligent Assistant for Context-Aware Policies       

Helen Balinsky, Neil Moore, Steven Simske

Publicly Posted Composite Documents in Variably Ordered Workflows       

Helen Balinsky, Liqun Chen, Steven Simske

Design Comparison to Identify Malicious Hardware in External Intellectual Property    

Trey Reece, William Robinson, Daniel Limbrick

Unwanted Traffic Control via Global Trust Management   

Zheng Yan, Raimo Kantola, Yue Shen

A Secure Multicoupon Solution for Multi-Merchant Scenarios   

Andreu Pere Isern-Deyà, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà

Efficiently Achieving Full Three-Way Non-repudiation in Consumer-level eCommerce and M-Commerce Transactions

Stephen W. Neville, Michael Horie

Exploring and Enhancing the Performance of Parallel IDS on Multi-Core Processors       

Haiyang Jiang, Jianhua Yang, Gaogang Xie


B. SESSIONS AND PAPERS IN UbiSafe-11

The Third International Symposium on UbiSafe Computing (UbiSafe 2011)

 

Session B01: UbiSafe Computing, 11:00-13:00, November 16 (Wednesday), 4F Juzhou Hall

Chair: A. B. M. Shawkat Ali, CQUniversity, Australia (S.Ali@cqu.edu.au)

A Model for Automating Persistent Identity Clone in Online Social Network

Bhume Bhumiratana

Dependable Context-sensitive Services in Cyber Physical Systems      

Kaiyu Wan, Vangalur Alagar

Statistical Fault Localization via Semi-Dynamic Program Slicing 

Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin

Decreasing SoC Test Power Dissipation and Test Data Volume based on Test Pattern Recombination      

Chunlei Mei, Maoxiang Yi, Zhifei Shen

Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service       

Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur

An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-based MANETs

Fatemeh Barani, Mahdi Abadi

An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation using Weighted Anthology  

Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari

A Trusted Integrity Measurement Architecture for Securing Enterprise Network  

Tong Liu, Prathima Agrawal


C. SESSIONS AND PAPERS IN ISSR-11

The Third International Workshop on Security in e-Science and e-Research (ISSR 2011)

 

Session C01: Security in e-Science and e-Research, 8:30-10:45, November 16 (Wednesday), 4F Aiwan Hall

Chair: Fang Huang, Central South University, China (hfang@mail.csu.edu.cn)

Design and Implementation of Single Sign On System with Cluster CAS for Public Service Platform of Science and Technology Evaluation   

Fang Huang, Caixia Wang, Jun Long

A Framework for the Assessment of the Trustworthiness of Digital Records over Time 

Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård

eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems    

Mei Liu, Ge Fu, Jiwu Jing

Enhancing Flexibility of TCG’s TNC through Layered Property Attestation

Aimin Yu, Shijun Zhao

Monitoring Insiders Activities in Cloud Computing using Rule Based Learning      

Md Tanzim Khorshed, A B M Shawkat Ali, Saleh Wasimi

Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments      

Ryan K. L. Ko, Peter Jagadpramana, Bu Sung Lee


D. SESSIONS AND PAPERS IN SPIoT-11

The 2011 International Workshop on Security and Privacy in Internet of Things (SPIoT 2011)

 

 

Session D01: Security, Signature and Detection, 8:30-10:45, November 16 (Wednesday), 4F Shaoshan Hall

Chair: Chi Man Pun, University of Macau, Macau S.A.R., China (CMPun@umac.mo)

Remedying the Hummingbird Cryptographic Algorithm     

Xinxin Fan, Guang Gong, Honggang Hu

A RFID-based Context-Aware Service Model  

Jinfang Sheng, Wen Zou, Liu Yang, Bin Wang

Defining and Analyzing Insiders and their Threats in Organizations     

Muntaha Alawneh, Imad Abbadi

Adaptive Client-Side LUT-Based Digital Watermarking     

Chi-Man Pun, Jing-Jing Jiang, Philip C. L. Chen

Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability       

Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang

Session D02: Privacy and Authentication, 11:00-13:00, November 16 (Wednesday), 4F Shaoshan Hall

Chair: Weirong Liu, Central South University, China (weirong_liu@126.com)

Protection Profile of Personal Information Security System

Hyun-Jung Lee, Dongho Won

Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service  

Chi-Won Song, Sungmin Park, Dong-Wook Kim, Sooyong Kang

Home Service Communities and Authentication        

Warodom WERAPUN, Julien FASSON, Beatrice PAILLASSA

Key Privacy in McEliece Public Key Cryptosystem

Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang

Integrity Protection for Automated Teller Machines 

Ronald Petrlic


E. SESSIONS AND PAPERS IN ACS-11

The 2011 International Workshop on Anonymity and Communication Systems (ACS 2011)

 

 

Session E01: Anonymity and Communication Systems, 9:20-10:45, November 16 (Wednesday), 4F Juzhou Hall

Chair: Giampaolo Bella, Universita di Catania, Italy (giamp@dmi.unict.it)

Group Formation with Neighbor Similarity Trust in P2P E-Commerce

Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi

STrust: A Trust Model for Social Networks    

Surya Nepal, Wanita Sherchan, Cecile Paris

Attack Victor Analysis and Privacy-Preserving Social Network Data Publishing    

Mohd Izuan Hafez Ninggal, Jemal Abawajy


F. SESSIONS AND PAPERS IN TrustID-11

The 2011 International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (TrustID 2011)

 

 

Session F01: Trust and Identity, 11:00-13:00, November 16 (Wednesday), 4F Baisha Hall

Chair: Raimo Kantola, Aalto University, Finland (raimo.kantola@tkk.fi)

Theoretical Issues in the Study of Trust in Human-Computer Interaction     

Zheng Yan, Raimo Kantola, Peng Zhang

Implementation of a Reputation System for Pervasive Social Networking     

Yu Chen, Zheng Yan, Valtteri Niemi

Design and Evaluation of an Architecture for Ubiquitous User Authentication based on Identity Management Systems

Marc Barisch

Building up Trusted Identity Management in Mobile Heterogeneous Environment

Peng Zhang, Hanlin Sun, Zheng Yan

Internet Users' Security and Privacy While They Interact with Amazon       

Giampaolo Bella, Lizzie Coles-Kemp

 (SHORT) A New Multivariate Hash Function with HAIFA Construction  

Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang

(SHORT) The Role of Trust in Social Life        

Dong Yan, Wang Qi

(SHORT) Reputation based Collaboration among Ethernet Switches    

Timo Kiravuo


G. SESSIONS AND PAPERS IN SQC-11

The 2011 International Workshop on Security and Quantum Communications (SQC 2011)

 

 

Session G01: Security and Quantum Communications, 8:30-10:45, November 16 (Wednesday), 13F Xinwen Hall

Chair: Ying Guo, Central South University, China (yingguo@mail.csu.edu.cn)

Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2      

Xunru Yin, Wenping Ma

Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem         Ronghua Shi, Qian Su, Ying Guo, Moon Ho Lee

Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation      

Ronghua Shi, Jingjing Shi, Ying Guo, Moon Ho Lee

Quantum Distributed Ballot Scheme Based on Entanglement Swapping        

Xiaoping Lou, Zhigang Chen

Phishing Email Feature Selection Approach      

Isredza Rahmi A. Hamid, Jemal Abawajy


H. SESSIONS AND PAPERS IN TSCloud-11

The 2011 International Workshop on Trust and Security in Cloud Computing (TSCloud 2011)

 

 

Session H01: Trust and Security in Cloud Computing, 8:30-10:45, November 16 (Wednesday), 13F Huanxing Hall

Chair: Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore (ryan.ko@hp.com)

Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning  

Yujing Liu, Wei Peng, Jinshu Su

User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment       

Adeela Waqar, Asad Raza, Haider Abbas

Towards a Trust Management System for Cloud Computing      

Sheikh Mahbub Habib, Sebastian Ries, Max Mühlhäuser

Migration to Cloud as Real Option: Investment Decision under Uncertainty         

Chew-Yean Yam, Adrian Baldwin, Christos Ioanndis, Simon Shiu


 

I. Sessions and Papers in ICESS-11

The 2011 International Conference on Embedded Software and Systems (ICESS-11)

 

Session I01: Real-Time Systems and Scheduling I, 14:30-16:45, November 17 (Thursday), 13F Xinwen Hall

Chair: Baoxian Zhao, George Mason University, USA (bzhao@masonlive.gmu.edu)

Release Offset Bounds for Response Time Analysis of P-FRP

    Chaitanya Belwal, Albert Cheng, Walid Taha

Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time Systems

    Ekain Azketa, Juan Pedro Uribe, Marga Marcos, Luis Almeida, Jose Javier Gutierrez

Feasibility Interval for the Transactional Event Handlers of P-FRP

    Chaitanya Belwal, Albert Cheng

Offline Validation of Real-Time Application Constraints Considering the Adaptation Rules

    Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, François Terrier

Efficient Elastic Resource Management for Dynamic Embedded Systems

    Ricardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luis Almeida, Raj Rajkumar

Real-Time Scheduling for Phase Change Main Memory Systems

    Miao Zhou, Santiago Bock, Alexandre Ferreira, Bruce Childers, Rami Melhem, Daniel Mosse

(SHORT) SPARTS: Simulator for Power Aware and Real-Time Systems

    Borislav Nikolic, Muhammad Ali Awan, Stefan M. Petters

 

Session I02: Embedded Architectures, 14:30-16:45, November 17 (Thursday), 13F Huanxing Hall

Chair: Stefan Schaeckeler, Cisco Systems, Inc., USA (sschaeck@cisco.com)

A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks

    Ankita Arora, Sri Parameswaran, Roshan Ragel, Darshana Jayasinghe

hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs

    Guangjun Xie, Guangzhi Xu, Gang Wang, Xiaoguang Liu, Rui Cao, Yan Gao

Learning-Directed Dynamic Voltage and Frequency Scaling for Computation Time Prediction

    Ming-Feng Chang, Wen-Yew Liang

DSBS: Distributed and Scalable Barrier Synchronization in Many-Core Network-on-Chips

    Xiaowen Chen, Shuming Chen

Minimizing Schedule Length Via Cooperative Register Allocation and Loop Scheduling for Embedded Systems

    Yazhi Huang, Qingan Li, Chun Jason Xue

(SHORT) Optimal Data Placement for Memory Architectures with Scratch-Pad Memories

    Yibo Guo, Qingfeng Zhuge, Jingtong Hu, Edwin H.-M. Sha

 

Session I03: Real-Time Systems and Scheduling II, 17:00-19:00, November 17 (Thursday), 13F Xinwen Hall

Chair: Yulei Wu, Chinese Academy of Sciences, China (yulei.frank.wu@gmail.com)

On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets

    Owen Kelly, Hakan Aydin, Baoxian Zhao

A Sufficient Schedulability Test for Real-Time Software Transactional Memory

    Chaitanya Belwal, Albert Cheng

Response Time Analysis of COTS-Based Multicores Considering the Contention on the Shared Memory Bus

    Dakshina Dasari, Björn Andersson, Vincent Nelis, Stefan Petters, Arvind Easwaran, Jinkyu Lee

Efficient Implementation of Thermal-Aware Schedulers on a Quad-Core Processor

    Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu, Meikang Qiu

Thermal-Aware Scheduling of Critical Applications Using Job Migration and Power-Gating on Multi-Core Chips

    Buyoung Yun, Kang G. Shin, Shige Wang

Schedulability Analysis of Transactions in Software Transactional Memory Using Timed Automata

    Chaitanya Belwal, Albert Cheng

 

Session I04: Formal Methods and Analysis Tools, 17:00-19:00, November 17 (Thursday), 13F Huanxing Hall

Chair: Shui Yu, Deakin University, Australia (shui.yu@deakin.edu.au)

Visualization of Computational Processes of Procedural Abstraction Optimization Passes

    Stefan Schaeckeler, Nityananda Jayadevaprakash

Tool Support for Automated Traceability of Test/Code Artifacts in Embedded Software Systems

Christian Wiederseiner, Vahid Garousi, Michael Smith

Automatic Model Building and Verification of Embedded Software with UPPAAL

    Xiaoli Gong, Qingcheng Li, Jie Ma, Jin Zhang

A Precise Memory Model for Operating System Code Verification

    Geng Chen, Lei Luo, Lijie Wang

(SHORT) A Distributed Real-Time Operating System with Location-Transparent System Calls for Task Management and Inter-Task Synchronization

    Takahiro Chiba, Yuichi Itami, Myungryun Yoo, Takanori Yokoyama

(SHORT) Parallel Data Cube Construction Based on an Extendible Multidimensional Array

    Dong Jin, Tatsuo Tsuji

 

Session I05: Safe and Reliable Systems, 11:00-13:00, November 18 (Friday), 13F Xinwen Hall

Chair: Hongjun Dai, Shandong University, China (dahogn@sdu.edu.cn)

Safety Verification of Non-Linear, Planar Proportional Control with Differential Inclusions

    Hallstein Asheim Hansen

Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts

    Huseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, Rolf Johansson

FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors

    Risat Mahmud Pathan, Jan Jonsson

A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical Applications

    Sara Tucci-Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse, Sebastien Gerard

Verification-Based Multi-Backup Firmware Architecture, an Assurance of Trusted Boot-up Process for Embedded Systems

    Hongfei Yin, Hongjun Dai, Zhiping Jia

(SHORT) UML-Based Analysis of Power Consumption for Real-Time Embedded Systems

    Matthias Hagner, Adina Aniculaesei, Ursula Goltz

 

Session I06: Embedded Applications and WSNs, 11:00-13:00, November 18 (Friday), 13F Huanxing Hall

Chair: Sancheng Peng, Central South University, China (psc346@gmail.com)

Efficient Java Native Interface for Android Based Mobile Devices

    Yann-Hang Lee, Preetham Chandrian, Bo Li

Resource Management for Robotic Applications

    Yi-Zong Ou, Edward T.-H. Chu, Wenwei Lu, Jane W. S. Liu, Ta-Chih Hung, Jwu-Sheng Hu

Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs

    Shaohua Liang, Md. Zakirul Alam Bhuiyan, Guojun Wang

A Distributed and Shortest-Path-Based Algorithm for Maximum Cover Sets Problem in Wireless Sensor Networks

    Feng Zeng, Lan Yao, Zhigang Chen

Visual Navigation System with Real-Time Image Processing for Patrol Service Robot

    Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori

(SHORT) An Efficient Stereoscopic Game Conversion System for Embedded Platform

    Hao Liu, Wei Guo, Chao Lu, Jizeng Wei

 

 

 


J. Sessions and Papers in ESA-11

The 2011 International Symposium on Advanced Topics on Embedded Systems and Applications (ESA-11)

 

Session J01: Advanced Topics on Embedded Systems and Applications, 11:00-13:00, November 16 (Wednesday), 13F Xinwen Hall

Chair: Vangalur Alagar, Concordia University, Canada (alagar@cse.concordia.ca)

Autonomous Parameter and Schedule Configuration for TDMA-based Communication Protocols such as FlexRay

    Patrick Heinrich, Markus Koeniger, Bernd Niehoff, Dirk Eilers, Rudi Knorr

Comparative Analysis of Power Consumption in the Implementation of Arithmetic Algorithm

    Alexandre Wagner C. Faria, Leandro P. de Aguiar, Daniel D. Lara, Antonio A. F. Loureiro

Extending EAST-ADL2 to Support Aspectual Requirement Specification and Analysis for Automotive Software

    Xiaojian Liu, Zhixue Wang

An Advanced and Effective Literature Search Algorithm Based on Analytic Hierarchy Process

    Qiong Wang, Cong Liu, Zhiying Wang

Detection DoS Attack on FPGA Using Fuzzy Association Rules

    Taner Tuncer, Yetkin Tatar

Multicast Trusted Routing with QoS Multi-Constraints in Wireless Ad Hoc Networks

    Hui Xia, Zhiping Jia, Lei Ju, Youqin Zhu

A Software Fault-tolerant Method Based on Exception Handling in RT/E System

    Zhou Lu, Kailong Zhang, Xingshe Zhou

 

 


K. Sessions and Papers in IWCSEI-11

The 2011 International Workshop on Computer System Education and Innovation (IWCSEI 2011)

 

Session K01: Computer System Education and Innovation, 8:30-10:45, November 16 (Wednesday), 13F Yuanzhuo Hall

Chair: Minghui Wu, Zhejiang University City College, China (minghui.wu@gmail.com)

Using Project-Based Learning and Collaborative Learning in Software Engineering

    Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, Lixia Zhang

Study of Experiment Structure in the Computer Networks Course Using PBL Methodology

    Li Cheng, Cong Wang

The Effective Second Classroom on Embedded System Education

    Yinbo Xie, Chengcheng Guo, Jianfeng Yang

The Practice Teaching Reform of Modern Communication Technologies Course for Non-communication Majors

    Zhenzhou Tang, Chang Li, Chunrong Zhang, Xiaoqiu Shi

Reform and Practice of Training Engineering Professionals in 2C+E Computer Science

    Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li

Study and Practice on Teaching Team Construction of Computer Specialty in Private Undergraduate Universities and Colleges

    Chaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai

Course Improvements to "the Principle of Computer Organization" Based on the Goal of Disciplinary Education

    Qifan Yang, Jianping Cai, Jianzhong Wu, Meimei Huo

Teaching Method Practicing on Embedded Software Engineering Curriculum

    Yikui Zhang, Yunfen Tian, Liwei Zhu, Haoxiang Zuo


L. SESSIONS AND PAPERS IN FCST-11

The 6th International Conference on Frontier of Computer Science and Technology (FCST-11)

 

Session L01: Parallel and Distributed Computing, 14:30-16:45, November 17 (Thursday), 13F Yuanzhuo Hall

Chair: Nick Savage, University of Portsmouth, UK (Nick.Savage@port.ac.uk)

         Optimal Tracking Agent: A New Framework for Multi-Agent Reinforcement Learning

           Weihua Cao, Gang Chen, Xin Chen, Min Wu        

        A Global Scheduling Algorithm Based on Dynamic Critical Path

  Xing Gu, Qun Yang, De-Chang Pi, He-yang Ke

        Power Optimization for GPU Programs Based on Software Prefetching

        Yisong Lin, Tao Tang, Guibin Wang

         I/O Scheduling by Using Multi-network Interfaces of Virtualization System

Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, and Pingpeng Yuan

         The Research of Levenberg-Marquardt Algorithm for Curve Fittings on Multiple GPUs        

Lingjie Zhang, Ying Zhao, Kaixi Hou   

         Object-Level Data Model for Keyword Search Over Relational Databases   

Jun Zhang, Renjun Shao

         Efficient GPGPU-Based Parallel Packet Classification      

Che-Lun Hung, Hsiao-Hsi Wang, Shih-Wei Guo, Kuan-Ching Li, Yaw-Ling Lin

Session L02: Pervasive, Grid, P2P and Cloud Computing, 14:30-16:45, November 17 (Thursday), 21F Business Hall

Chair: Zhe Tang, Central South University, China (tz@mail.csu.edu.cn)

         Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless Networks        

Jun Peng, Huiyuan Xian, Xiaoyong Zhang, Zheqin Li     

         An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications   

Wei Liu, Feiyan Shi, Wei Du       

         Abnormal Process Instances Identification Method in Healthcare Environment    

Bingning Han, Lihong Jiang, Hongming Cai

         A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming        

Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, Zhong Ren  

         Towards User Intent Based Searching    

Haibo Yu, Tsunenori Mine, Makoto Amamiya        

An Efficient Load Balancing Multi-Core Frequent Patterns Mining Algorithm     

Kun-Ming Yu, Shu-Hao Wu

Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids      

Tian-Liang Huang, Ting-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li, Ching-Hsien Hsu, Hsi-Ya Chang

 

Session L03: Network and Internet Computing, 14:30-16:45, November 17 (Thursday), 8F 803

Chair: Raimo Kantola, Aalto University, Finland (raimo.kantola@tkk.fi)

Power Control Game Algorithm Based on Combination Pricing Function    

Sheng Liu, Hongdan Liu, Zhenguo Gao

A Block Gathering Based on Mobile Web Page Segmentation Algorithm     

Libing Wu, Yalin Ke, Yanxiang He, Nan Liu

A Two-Layered Replica Management Method        

Chuncong Xu, Xiaomeng Huang, Guangwen Yang, Yang Zhou

An Email Server Optimized for Storage Issues         

Yi Li, Mingzhe Zhang, Jiaqi Gu

Improving the Adaptiveness of FAST TCP Based on the Stability with Time-delay     

Kefei Wang, Heying Zhang, Lihong Peng, Baohua Fan

Achieving High Throughput in High-Radix Switch  

Ming Fang, Songqiao Chen, Kefei Wang

 

Session L04: Computer Vision and Image Processing, 17:00-19:00, November 17 (Thursday), 13F Yuanzhuo Hall

Chair: Lei Wang, Central South University, China (wanglei@mail.csu.edu.cn)

        Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from Real Image

Xiaohua Zhang, Yuto Yoshida, Ning Xie

Modeling Trees with Rugged Surfaces

Atsushi Mizoguchi, Kazunori Miyata

A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection     

Emmanuel Kondela, Dongjun Huang

An Efficient Method of Tracking across Multiple Cameras       

Muhammad Hassan, Ahsen Mehmood, Muhammad Faisal Khan

Nose Surgery Simulation by Volumetric Laplacian Deformation

Jinshun Li, Yanyu Hu, Shenghui Liao

Fusing Audio-Words with Visual Features for Pornographic Video Detection      

Yizhi Liu, Xiangdong Wang, Yongdong Zhang, Sheng Tang

Text Line Based Corretion of Distorted Document Images        

Sanding Luo, Xiaomin Fang, Cong Zhao, Yisha Luo

 

Session L05: Pattern Recognition and Artificial Intelligence, 17:00-19:00, November 17 (Thursday), 21F Business Hall

Chair: Jiazhi Xia, Central South University, China (xiajiazhi@gmail.com)

        Overlapping One-Class SVMs for Utterance Verification in Speech Recognition  

Cuiqin Hou, Yibin Hou, Zhangqin Huang, Qian Liu

Chinese Traffic Police Gesture Recognition in Complex Scene

Fan Guo, Zixing Cai, Jin Tang

Preference-Based Top-K Influential Nodes Mining in Social Networks       

Yunlong Zhang, Jingyu Zhou, Jia Cheng

A Weighted Cluster Ensemble Algorithm Based on Graph

Xiao-ping Fan, Yue-shan Xie, Zhi-fang Liao, Xiao-qing Li, and Li-min Liu

The Hot Keyphrase Extraction Based on TF*PDF 

Yan Gao, Jin Liu, Peixun Ma

A Decision Making Ontology Building Process for Analytical Requirements Elicitation         

Fahmi Bargui, Hanene Ben-Abdallah, Jamel Feki

Clustering Algorithm for High Dimensional Data Stream over Sliding Windows

Weiguo Liu, Jia Ouyang

 

Session L06: System Software and Software Engineering, 17:00-19:00, November 17 (Thursday), 8F 803

Chair: Haibo Yu, Shanghai Jiao Tong University, China (haibo_yu@sjtu.edu.cn)

        Capability as Requirement Metaphor    

Jiang Cao, Xinjun Mao, Huining Yan, Yushi Huang, Huaiming Wang, Xicheng Lu

Variable Precision Rough Set-Based Fault Diagnosis for Web Services         

Chengying Mao

A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata 

Jianhua Li, Songqiao Chen, Lin Jian, Hongyu Zhang

Towards a Behavior-Based Restructure Approach for Service Composition         

Zaiwen Feng, Keqing He, Rong Peng, Buqing Cao

Design Pattern for Self-Organization Multi-Agent Systems Based on Policy        

Yi Guo, Xinjun Mao, Cuiyun Hu

Plug-In Based Integrated Development Platform for Industrial Control System-P-IDP4ICS   

Bin Wang, Dan Yin, Tai-Wen Wu, Jin-Fang Sheng

 

Session L07: Security, Reliability and Trustworthy Computing, 8:30-10:45, November 18 (Friday), 13F Xinwen Hall

Chair: Honggang Hu, University of Science and Technology of China, China (hghu2005@gmail.com)

        A Certificate Based Dynamic Access Control Strategy for Service Composition   

Guisheng Fan, Huiqun Yu, Liqiong Chen

Cloud Shredder: Removing the Laptop On-Road Data Disclosure Threat in the Cloud Computing Era     

Nan Zhang, Jiwu Jing, Peng Liu

Towards Detecting Thread Deadlock in Java Programs with JVM Introspection  

Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen

VerFAT: A Transparent and Efficient Multi-Versioning Mechanism for FAT File System    

Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, Jiangchun Ren

A Property-Based Attestation Scheme with the Variable Privacy       

Yu Qin, Dexian Chang, Shijun Zhao, and Qianying Zhang

       

Session L08: Wireless Sensor Networks and Mobile Computing, 8:30-10:45, November 18 (Friday), 13F Huanxing Hall

Chair: Wang Yang, Central South University, China (xxyangwang@gmail.com)

Multi-Relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks

Jun Peng, Junbo Li, Shuo Li, Jing Li

An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks    

Zhongke Zhang, Yun Wang

A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad hoc Networks        

Muhammad Bilal, Pauline Chan

A Novel Energy-Efficient Routing Algorithm in Multi-Sink Wireless Sensor Networks

Zhiwu Huang, Yuan Cheng, Weirong Liu

A Method for Searching the Centroid of a 3D Cluster Based on RSSI

Chen Weike, Shou Heng, Li Wenfeng

         Routing With Virtual Region Coordinates in Wireless Sensor Networks       

Zheng Ma, Weijia Jia, Guojun Wang

Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks

Jin Zheng, Xinlin Xu, Guojun Wang

 

Session L09: Theoretical Computer Science, Algorithm and Bio-informatics, 11:00-13:00, November 18 (Friday), 4F Shaoshan Hall

Chair: Fangfang Zhou, Central South University, China (zff@mail.csu.edu.cn)

        Phase-Wise Clustering of Time Series Gene Expression Data     

Poonam Goyal, Navneet Goyal, Rohan Sunil Karwa, Matthew John

A Formal Approach for Modeling Interactive Visual Interfaces 

Emanuele Covino, Giovanni Pani

A Quasi Physical Method for the Equal Sphere Packing Problem       

Wenqi Huang, Liang Yu

A Refined and Heuristic Algorithm for LD TagSNPs Selection  

Hailin Chen, Zuping Zhang, Jing Xia

Improved Partial Parallel Decision Feedback Multiuser Detectors for Multiuser-MIMO System   

Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Wenyue Zhang

 


M. Sessions and Papers in WNM-11

The Second International Workshop on Wireless Networks and Multimedia (WNM-11)

Session M01: Wireless Networks and Multimedia, 11:00-13:00, November 16 (Wednesday), 4F Aiwan Hall

Chair: Yulei Wu, Chinese Academy of Sciences, China (yulei.frank.wu@gmail.com)

 A Data Simulator for ZigBee-base Wireless Sensor Network System  

Kun-Yung Lu

Energy aware routing protocols for Wireless Sensor Networks using discrete transmission energies

Karlocai Balazs, Bojarszky Andras, Levendovszky Janos

Performance Design and Analysis of Handoff in Hierarchical Wireless Networks 

Z. Zabanoot, G. Min

A Biased Modified Binary Query Tree Protocol for RFID Tag Collision Resolution     

Xinqing Yan, Yan Xu, Bin Li

Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks      

Fei Shi, Dongxu Jin, Weijie Liu, JooSeok Song

Energy-Efficiency Media Independent handover Mechanism    

Dongxu Jin, Fei Shi, JooSeok Song

The Four Corners Dv-Hop localization Algorithm for Wireless Sensor Network  

Yinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao

 


 

N. Sessions and Papers in MWNS-11

The Second International Workshop on Mobile and Wireless Network Security (MWNS-11)

Session N01: Mobile and Wireless Network Security, 11:00-13:00, November 16 (Wednesday), 13F Huanxing Hall

Chair: Yang Xiang, Deakin University, Australia (yang.xiang@deakin.edu.au)

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process       

Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

Chaotic hash function based on Tandem-DM construction        

Li Gao, Xiaomin Wang, Wenfang Zhang

Implementation & Performance Evaluation of an Adaptive Routing Algorithm in MANETs   

Annapurna P Patil, Rajani Kanth K, Apoorva Yadhava, Rakshith H P, Joseph Tom

Session key generation for a group call and device for security control         

Younchan Jung, Enrique Festijo

o. Sessions and Papers in WPRIC-11

The Second International Workshop on Pattern Recognition & Intelligence Computing (WPRIC -11)

Session O01: Pattern Recognition & Intelligence Computing, 11:00-13:00, November 16 (Wednesday), 13F Yuanzhuo Hall

Chair: Geyong Min, University of Bradford, UK (g.min@bradford.ac.uk)

Identification of masses in digital mammogram using an optimal set of features    

Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, Jianzhong Wang

Automated Inspection using X-ray Imaging    

Wenfei Chen, Zuohua Miao, Delie Ming

Semantic Web Service Automatic Composition based on Service Parameter Relationship Graph      

Jianhua Li, Songqiao Chen, Yongjun Li, Qian Zhang

 


P. Sessions and Papers in AIPNGN-11

 

The 2011 International Workshop on All-IP Next Generation Networks (AIPNGN 2011)

Session P01: All-IP Next Generation Networks, 11:00-13:00, November 16 (Wednesday), 13F Yuanzhuo Hall

Chair: Geyong Min, University of Bradford, UK (g.min@bradford.ac.uk)

Exploit TIVs to Find Faster Paths

Yanhua Zhang, Chunhong Zhang, Gang Wang

Context Awareness for Self-adaptiveness in Smart Terminals     

Zhen Chen, Chunhong Zhang, Yang Ji

Simulation Tools Enabling Research in Convergence of Fixed and Mobile Networks      

Andreas Bontozoglou, Kun Yang, Ken Guild

Performance Modelling and Analysis of Dynamic Class-Based Call Admission Control Algorithm using Fuzzy Logic for Heterogeneous Wireless Networks

Sha Sha, Rosemary Halliwell

 

 


 

      TrustCom-11 Organizing and Program Committees

 

 

Honorary Chair

Lijian Tao, Vice President of Central South University, China

 

Steering Chairs

Guojun Wang, Central South University, China

Laurence T. Yang, St. Francis Xavier University, Canada

 

General Chairs

Yi Mu, University of Wollongong, Australia

Gregorio Martinez, University of Murcia, Spain

Geyong Min, University of Bradford, UK

 

Program Chairs

Huaimin Wang, National University of Defense Technology, China

Stephen R. Tate, University of North Carolina at Greensboro, USA

Yang Xiang, Deakin University, Australia

 

Program Vice Chairs

Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China

Indrajit Ray, Colorado State University, USA

Liqun Chen, HP Labs in Bristol, UK

Guilin Wang, University of Wollongong, Australia

Hua Wang, The University of Southern Queensland, Australia

Christoph Sorge, University of Paderborn, Germany

 

Workshop Chairs

Yixin Jiang, Tsinghua University, China

John Fiore, Temple University, USA

Zheng Yan, Aalto University, Finland/Xidian University, China

 

Organizing Chairs

Zhigang Chen, Central South University, China

Ming Xu, National University of Defense Technology, China

Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA

 

Publicity Chairs

Scott Fowler, Linkoping University, Sweden

Felix Gomez Marmol, NEC Laboratories Europe, Germany

Jianliang Gao, University of Ulster, UK

Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK

Jemal H. Abawajy, Deakin University, Australia

Chin-Feng Lee, Chaoyang University of technology, Taiwan

 

Publication Chairs

Fang Qi, Central South University, China

Congxu Zhu, Central South University, China

 

Finance Chairs

Jin Zheng, Central South University, China

Guihua Duan, Central South University, China

 

Steering Committee (in alphabetical order)

 Jiannong Cao, Hong Kong Polytechnic University, Hong Kong

Hsiao-Hwa Chen, National Cheng Kung University, Taiwan

Minyi Guo, Shanghai Jiao Tong University, China

Weijia Jia, City University of Hong Kong, Hong Kong

Jie Li, University of Tsukuba, Japan

Jianhua Ma, Hosei University, Japan

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain

Indrakshi Ray, Colorado State University, USA

Kouichi Sakurai, Kyushu University, Japan

Srinivas Sampalli, Dalhousie University, Canada

Ivan Stojmenovic, University of Ottawa, Canada

Bhavani Thuraisingham, The University of Texas at Dallas, USA

Jie Wu, Temple University, USA

Wanlei Zhou, Deakin University, Australia

 

 

Program Committee (in alphabetical order)

 

Trust Track

Chairs:

Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China

Indrajit Ray, Colorado State University, USA

 

TPC members:

Habtamu Abie, Norwegian Computing Center, Norway

Gail Joon Ahn, Arizona State University, USA

Emmanuelle Anceaume, IRISA, France

Sudip Chakraborty, Valdosta State University, USA

Jin-Hee Cho, U.S. Army Research Laboratory, USA

Jen-Wen Ding, National Kaohsiung University of Applied Sciences, Taiwan

Rinku Dewri, University of Denver, USA

Elena Ferrari, University of Insubria, Italy

Paolo Giorgini, University of Trento, Italy

Song Han, Curtin University, Australia

Atsushi Inoie, Kanagawa Institute of Technology, Japan

N. Jaisankar, VIT University, India

Young-Sik Jeong, WonKwang University, Korea

Hai Jiang, Arkansas State University, USA

Mumtaz A. Kamala, University of Bradford, UK

Yeong-Deog Kim, Woosong University, Korea

Hanno Langweg, NISlab Norwegian Information Security Laboratory, Norway

Juan Li, North Dakota State University, USA

Ruixuan Li, Huazhong University of Science and Technology, P. R. China

Xin Li, Japan Advanced Institute of Science and Technology, Japan

Jianxun Liu, Hunan University of Science and Technology, P. R. China

Sanjay Madria, Missouri University of Science and Technology, USA

Adnan Noor Mian, National University of Computer and Emerging Science (NU-FAST), Lahore, Pakistan

Mohamed Moustafa, Akhbar El Yom Academy, Egypt

Indrakshi Ray, Colorado State University, USA

Kenji Saito, Keio University, Japan

Jean-Marc Seigneur, University of Geneva, Switzerland

Wenchang Shi, Renmin University of China, P. R. China

Lingyu Wang, Concordia University, Canada

Duminda Wijesekera, George Mason University, USA

Jinhua Xiong, Institute of Computing Technology, Chinese Academy of Sciences, P. R. China

Sugang Xu, NICT, Japan

Yafei Yang, Qualcomm, USA

Muneer Bani Yassein, Jordan University of Science and Technology, Jordan

Nicola Zannone, Eindhoven University of Technology, The Netherlands

Yong Zhang, Liaoning Normal University, P. R. China

 

Security Track

Chairs:

Liqun Chen, HP Labs in Bristol, UK

Guilin Wang, University of Wollongong, Australia

 

TPC members:

Jemal Abawajy, Deakin University, Australia

Shawkat Ali, Central Queensland University, Australia

Saad Bani-Mohammad, Al al-Bayt University, Jordan

Carlo Blundo, University of Salerno, Italy

Ioannis Broustis, Alcatel-Lucent, USA

Christian Callegari, University of Pisa, Italy

Barbara Carminati, University of Insubria, Italy

David Chadwick, University of Kent, UK

Kefei Chen, Shanghai Jiao Tong University, China

Yingying Chen, Stevens Institute of Technology, USA

Yu Chen, State University of New York, USA

Zhen Chen, Tsinghua University, China

Xiaowen Chu, Hong Kong Baptist University, Hong Kong

Jason Crampton, Royal Holloway, University of London, UK

Robert Deng, Singapore Management University, Singapore

Zhiguo Ding, Newcastle University, UK

Xiaolei Dong, Shanghai Jiao Tong University, P. R. China

El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia

Jianming Fu, Wuhan University, P. R. China

David Galindo, University of Luxembourg, Luxembourg

Wei Gao, Ludong University, China

Jamie Graves, Edinburgh Napier University, UK

Mohamed Hamdi, University of Carthage, Tunisia

Matthew P. W. Henricksen, Institute for Infocomm Research, Singapore

Thorsten Holz, Technical University Vienna, Austria

Qiong Huang, South China Agricultural University, China

Xinyi Huang, I2R, Singapore

Sokratis K. Katsikas, University of Piraeus, Greece

Dong Seong Kim, Duke University, USA

Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan

Sanjeev Kumar, University of Texas - Pan American, USA

Ruggero Donida Labati, University of Milan, Italy

Chris Leckie, The University of Melbourne, Australia

Joseph K. Liu, Institute for Infocomm Research, Singapore

Yali (Tracy) Liu, AT&T labs, Inc., USA

Bin Lu, West Chester University of Pennsylvania, USA

Gianluigi Me, University of Rome "Tor Vergata", Italy

Abdallah Mhamed, TELECOM SudParis, France

Chris Mitchell, RHUL, UK

Is-Haka Mkwawa, University of Plymouth, UK

Prashant Pillai, University of Bradford, UK

Sihan Qing, Chinese Academy of Sciences, China

Kim-Kwang Raymond Choo, University of South Australia and Australian National University, Australia

Mark Ryan, University of Birmingham, UK

Jian Ren, Michigan State University East Lansing, USA

Kui Ren, Illinois Institute of Technology, USA

Imed Romdhani, Edinburgh Napier University, UK

Ahmad-Reza Sadeghi, Technical University Darmstadt and Fraunhofer SIT, Germany

Khaled Salah, Khalifa University, UAE

Stefaan Seys, Katholieke Universiteit Leuven Belgium

Qingni Shen, Peking University, China

Eunjee Song, Baylor University, USA

Miguel Soriano, Universitat Politècnica de Catalunya, Spain

Masakazu Soshi, Hiroshima City University, Japan

Avinash Srinivasan, Bloomsburg University, USA

Dimitrios Stratogiannis, National Technical University of Athens, Greece

Kevin Su, Microsoft Corporation, USA

Chang-Ai Sun, University of Science and Technology Beijing, P. R. China

Willy Susilo, University of Wollongong, Australia

Qiang Tang, University of Twente, The Netherlands

Juan E. Tapiador, University of York, UK

Georgios I. Tsiropoulos, National Technical University of Athens, Greece

Gaocai Wang, Hunan University, P. R. China

Yan Wang, Macquarie University, Australia

Hejun Wu, Sun Yat-Sen University, P. R. China

Yongdong Wu, Institute for Infocomm Research, Singapore

Bin Xiao, Hong Kong Polytechnic University, Hong Kong

Kaiqi Xiong, North Carolina State University, USA

Rui Xue, Chinese Academy of Sciences, China

Toshihiro Yamauchi, Okayama University, Japan

Chung-Huang Yang, National Kaohsiung Normal University, Taiwan

Qiang Ye, University of Prince Edward Island, Canada

Richard Yu, Carleton University, Canada

Xinwen Zhang, Huawei Research Center, USA

Yunlei Zhao, Fudan University, China

Cliff Zou, University of Central Florida, USA

 

Privacy Track

Chairs:

Hua Wang, The University of Southern Queensland, Australia

Christoph Sorge, University of Paderborn, Germany

 

TPC members:

Ron Addie, University of Southern Queensland, Australia

Dhiah el Diehn I. Abou-Tair, German-Jordanian University, Jordan

Sheikh Iqbal Ahamed, Marquette University, USA

Rajiv Bagai, Wichita State University, USA

Marc Barisch, University of Stuttgart, Germany

Salima Benbernou, Universite Paris Descartes, France

Peter Bertok, RMIT University, Australia

Jens-Matthias Bohli, NEC Laboratories Europe, Germany

Chun Ruan, University of Western Sydney, Australia

Erik Buchmann, Karlsruhe Institute of Technology, Germany

Emiliano de Cristofaro, University of California at Irvine, USA

Ernesto Damiani, University of Milan, Italy

Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalonia

Junzhao Du, Xidian University, P. R. China

Benjamin Fabian, Humboldt-Universit?t, zu Berlin, Germany

Simone Fischer-Hübner, Karlstad University, Sweden

Hidehito Gomi, Yahoo! Japan Research, Japan

Song Guo, The University of Aizu, Japan

Julio C. Hernandez-Castro, Portsmouth University, UK

Robert C. H. Hsu, Chung Hua University, Taiwan

Luigi Lo Iacono, European University of Applied Sciences (EUFH), Germany

Md Enamul Kabir, Melbourne University, Australia

Georgios Kambourakis, University of the Aegean, Greece

Constantinos Lambrinoudakis, University of Piraeus, Greece

Gang Li, Institute of Computing Technology, Chinese Academy of Sciences, P. R. China

Mario Lischka, NEC Laboratories Europe, Germany

Peng Liu, Hangzhou Dianzi University, P. R. China

Traian Marius Truta, Northern Kentucky University, USA

Syed Naqvi, CETIC, Belgium

Andreas Pashalidis, Katholieke Universiteit Leuven, Belgium

Ronald Petrlic, University of Paderborn, Germany

Kai Rannenberg, Goethe University Frankfurt, Germany

Nicolas Sklavos, Technological Educational Institute of Patras, Greece

Lili Sun, University of Southern Queensland, Australia

Xiaoxun Sun, Australian Council for Educational Research, Australia

Xiaohui Tao, University of Southern Queensland, Australia

Osman Ugus, Hamburg University of Applied Sciences, Germany

Marten J. van Sinderen, University of Twente, The Netherlands

Luis Javier García Villalba, Universidad Complutense de Madrid (UCM), Spain

Melanie Volkamer, Center for Advanced Security Research Darmstadt, Germany

Haodong Wang, Cleveland State University, USA

Weigang Wu, Sun Yat-Sen University, P. R. China

Yanjiang Yang, Institute for Infocomm Research, Singapore

Wei Yu, Towson University, USA

Ji Zhang, University of Southern Queensland, Australia

Nan Zhang, George Washington University, USA

Xukai Zou, Indiana University Purdue University Indianapolis, USA

 

Secretariats

Pin Liu, Central South University, China

Yongming Xie, Central South University, China

 

Webmasters

Qian Li, Central South University, China

Xiaofei Xing, Central South University, China


UbiSafe-11 Organizing and Program Committees

 

 

General Chairs

Hsiao-Hwa Chen, National Cheng Kung University, Taiwan

Zhigang Chen, Central South University, China

Athanasios V. Vasilakos, National Technical University of Athens, Greece

 

Program Chairs

Hamid Sharif, University of Nebraska-Lincoln, USA

Guojun Wang, Central South University, China

Xiaolin (Andy) Li, University of Florida, USA

 

Program Committee (In alphabetical order)

Li Bai, Temple University, USA

Mehrdad Dianati, University of Suurey, UK

Antonio Mana Gomez, University of Malaga, Spain

Jinhua Guo, University of Michigan at Dearborn, USA

Atsuo Hazeyama, Tokyo Gakugei University, Japan

Michael Hempel, University of Nebraska-Lincoln, USA

Andreas Hochgatterer, AIT Austrian Institute of Technology GmbH, Austria

Michel Hurfin, Irisa, INRIA, France

Tomoo Inoue, University of Tsukuba, Japan

Aravind Kailas, University of North Carolina Charlotte, USA

Satoshi Kurihara, Osaka University, Japan

Jiang (Leo) Li, Howard University, USA

Maofu Liu, Wuhan University of Science and Techonology, China

Xi Liu, Carnegie Mellon University, USA

Shichuan Ma, Qualcomm, USA

Jorge Martinez-Bauset, Universidad Politecnica de Valencia, Spain

Homayoun Nikookar, Delft University of Technology, Holland

Thomas Noel, University of Strasbourg, France

Masayuki Okamoto, TOSHIBA Corporation, Japan

Wenjiang Pei, Southeast University, China

Dongming Peng, University of Nebraska-Lincoln, USA

Rubem Pereira, Liverpool John Moores University, UK

Ali Shahrabi, Glasgow Caledonian University, UK

Kuei-Ping Shih, Tamkang University, Taiwan

Mohammed Houssaini Sqalli, KFUPM, Saudi Arabia

Evi Syukur, Monash University, Australia

Kenichi Takahashi, Tottori University, Japan

Johnson Thomas, Oklahoma State University, USA

Honggang Wang, University of Massachusetts Dartmouth, USA

Wei Wang, South Dakota State University, USA

Yufeng Wang, Nanjing University of Posts and Telecommunications, China

Liudong Xing, University of Massachusetts Dartmouth, USA

Zhiyong Xu, Suffolk University, USA

Jon (Jong-Hoon) Youn, University of Nebraska at Omaha, USA

Sijing Zhang, University of Bedfordshire, UK

Sheng Zhong, SUNY Buffalo, USA

Xukai Zou, Indiana University-Purdue University, USA

 

Publicity Chairs

Gregorio Martinez, University of Murcia, Spain

 Lei Shu, Osaka University, Japan

Xiaolong Jin, Institute of Computing Technology, Chinese Academy of Sciences, China

Shui Yu, Deakin University, Australia

 

Steering Committee

Vipin Chaudhary, University at Buffalo, SUNY, USA

Jingde Cheng, Saitama University, Japan

Yuanshun Dai, University of Tennessee, USA

Thomas Grill, Johannes Kepler Univ. Linz, Austria

Runhe Huang, Hosei University, Japan

Ismail Khalil, Johannes Kepler Univ. Linz, Austria

Qun Jin, Waseda University, Japan

Xiaolin (Andy) Li, University of Florida, USA

Jianhua Ma, Hosei University, Japan

Laurence T. Yang, St. Francis Xavier University, Canada

Qiangfu Zhao, The University of Aizu, Japan

 


ISSR-11 Organizing and Program Committees

 

 

Steering Chairs

Richard Sinnott, University of Melbourne, Australia

Wei Jie, University of West London, UK

 

Program Chairs

Kouichi Sakurai, Kyushu University, Japan

Guojun Wang, Central South University, China

Lizhe Wang, Indiana University, USA 

 

Program Committee (In alphabetical order)

Junaid Arshad, University of Leeds, UK

Bruce Beckles, University of Cambridge, UK

Dan Chen, China Geoscience University, China

Ming Chen, University of Tennessee Knoxville, USA

Guihua Duan, Central South University, China

Cheng Fu, Nanyang Technological University, Singapore

Atsushi Fujioka, NTT Lab., Japan

Ying Guo, Central South University, China

Samee U. Khan, NDSU, USA

Peter Komisarczuk, University of West London, UK

Zhou Lei, Shanghai University, China

Nasser Matoorian, University of West London, UK

Kazuhiro Minami, National Institute of Informatics, Japan

Masayuki Numao, UEC, Japan

Choon-Sik Park, Seoul Women's University, Korea

Fang Qi, Central South University, China

Rajiv Ranjan, UNSW, Australia

Yizhi Ren, Hangzhou Dianzi University, China

Jie Tao, University of Karlsruhe, Germany

Bin Wang, Central South University, China

Xiaobo Yang, University of Birmingham, UK

Fangming Zhao, Computer Architecture & Security Systems Laboratory, Toshiba, Japan

Congxu Zhu, Central South University, China

 

Publicity Chairs

Rajiv Ranjan, UNSW, Australia

Chunhua Su, Institute for Infocomm Research (I2R), Singapore

Fang Qi, Central South University, China

 


SPIoT-11 Organizing and Program Committees

 

 

Program Chairs

Indrakshi Ray, Colorado State University, USA

John Fiore, Temple University, USA

Weirong Liu, Central South University, China

 

PC Members (In alphabetical order)

Afrand Agah, WCU, USA

Rui L. Aguiar, University of Aveiro, Portugal

Ali Ahmed, University of Manchester, UK

Mehran Asadi, West Chester University, USA

Raouf Boutaba, University of Waterloo, Canada

Pino Caballero-Gil, University of La Laguna, Spain

Jingde Cheng, Saitama University, Japan

Garth V. Crosby, Southern Illinois University Carbondale, USA

Jayasree Dattagupta, Indian Sattistical Institute, India

Guihua Duan, Central South University, China

Yong Guan, Iowa State University, USA

Yao Guo, Peking University, China

Ying Guo, Central South University, China

Marko Hassinen, University of Kuopio, Finland

Jingsha He, Beijing University of Technology, China

Vasil Hnatyshin, Rowan University, USA

Jose L. Marzo, University of Girona, Spain

Chris McDonald, The University of Western Australia, Australia

Mirka Miller, The University of Newcastle, Australia

Jelena Misic, Ryerson University, Canada

Fang Qi, Central South University, China

Altair Olivo Santin, Pontifical Catholic University of Paraná (PUCPR), Brazil

Eike Ritter, University of Birmingham, UK

Gang Tan, Lehigh University, USA

Sven Wohlgemuth, National Institute of Informatics, Japan

Bin Wang, Central South University, China

Qin Xin, Universite catholique de Louvain, Belgium

Congxu Zhu, Central South University, China

 

Publicity Chairs

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Mianxiong Dong, The University of Aizu, Japan


ACS-11 Organizing and Program Committees

 

 

Program Chairs

Bart Preneel, Katholieke Universiteit Leuven, Belgium

Jianhua Ma, Hosei University, Japan

Guihua Duan, Central South University, China

 

PC Members (In alphabetical order)

Cataldo Basile, Politecnico di Torino, Italy

Frederic Cuppens, Telecom Bretagne, France

Ying Guo, Central South University, China

Biduyt Gupta, Southern Illinois University, USA

Hsiang-Cheh Huang, National University of Kaohsiung, Taiwan

Mike Jones, University of Manchester, UK

Youssef Iraqi, Khalifa University of Science, Technology, and Research, The United Arab Emirat

Kami Makki, Lamar University, USA

Wissam Mallouli, Montimage, French

Juan Pedro Munoz-Gea, Technical University of Cartagena, Spain

Mohammad S. Obaidat, Monmouth University, USA

Chung-Ming Ou, Kainan University, Taiwan

Christos Papadopoulos, Colorado State University, USA

Slobodan Petrovic, Gjovik University College, Norway

Fang Qi, Central South University, China

Peter Y. A. Ryan, University of Luxembourg, Luxembourg

Ahmad-Reza Sadeghi, Technical University Darmstadt and Fraunhofer SIT, Germany

Jean-Marc Seigneur, University of Geneva, Switzerland

Bin Wang, Central South University, China

Zhengping Wu, University of Bridgeport, USA

Congxu Zhu, Central South University, China

 

Publicity Chairs

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Mianxiong Dong, The University of Aizu, Japan


TrustID-11 Organizing and Program Committees

 

 

Program Chairs

Zheng Yan, Aalto University, Finland/XiDian University, China

Raimo Kantola, Aalto University, Finland

Peng Zhang, Xi’an University of Post and Telecommunications, China

 

PC Members (In alphabetical order)

Pierre Abi-Char, American University of Technology, Lebanon

Yu Chen, EPFL, Switzerland

Alvin Chin, Nokia Research Center, China

Piotr Cofta, British Telecom, UK

Ioanna Dionysiou, University of Nicosia, Cyprus

Yan Dong, Renmin University of China, China

Weili Han, Fudan University, China

Silke Holtmanns, Nokia Research Center, Finland

Yu Hua, Huazhong University of Science and Technology, China

Gabriele Lenzini, University of Luxembourg, Luxembourg

Abdallah Mahamed, Institut TELECOM, France

Yuexin Peng, Beijing University of Post and Telecommunications, China

Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy

Lei Shu, Osaka University, Japan

Qinghua Wang, Aalto University, Finland

Junze Wang, Huazhong Univers ity of Science and Technology, China

Yan Wang, Macquarie University, Australia

Andrew G. West, University of Pennsylvania, USA

Yafei Yang, Qualcomm, USA

Dajiang Zhang, Nokia, China

Yan Zhang, Simula Research Laboratory, Norway


SQC-11 Organizing and Program Committees

 

 

General Chairs

Ronghua Shi, Central South University, China

Guihua Zeng, Shanghai Jiao Tong University, China

 

Program Chairs

Moon Ho Lee, Chonbuk National University, Korea

Ying Guo, Central South University, China

 

PC Members (In alphabetical order)

Wenshan Cui, Qingdao Agricultural Univeristy, China

Guangqiang He, Shanghai Jiao Tong University, China

Xueqin Jiang, Donghua University, China

Moon-Ho Lee, Chonbuk National University, Korea

Yuan Li, Shanghai Dianji University, China

Wenping Ma, Xidian University, China

Dongsun Park, Chonbuk National University, Korea

Jun Peng, Central South University, China

Wei Song, Liaodong University, China

Xiang-Gen Xia, University of Delware, USA

Yang Xiao, Beijing Jiao Tong University, China

Nanrun Zhou, Nanchang University, China

 

Publicity Chair

Neal N. Xiong, Georgia State University, USA


TSCloud-11 Organizing and Program Committees

 

 

Program Chairs

Ryan K. L. Ko, HP Labs, Singapore

Markus Kirchberg, HP Labs, Singapore

 

PC Members (In alphabetical order)

Stephane Bressan, National University of Singapore, Singapore

Roy H Campbell, University of Illinois, USA

Liqun Chen, HP Labs Bristol, UK

Raymond Choo, University of South Australia, Australian National University, Australia

Dash Debabrata, ArcSight Inc, Switzerland

Elena Ferrari, University of Insubria, Italy

Patrick C. K. Hung, UOIT, Canada

Terence Hung, Institute of High Performance Computing, A*STAR, Singapore

Yixin Jiang, Tsinghua University, China

Markus Kirchberg, HP Labs Singapore, Singapore

Ryan K. L. Ko, HP Labs Singapore, Singapore

Dirk Kuhlmann, HP Labs Bristol, UK

Bu Sung Lee, HP Labs Singapore, Nanyang Technological University, Singapore

Patrick P. C. Lee, City University of Hong Kong, Hong Kong

Sebastian Link, Victoria University of Wellington, New Zealand

John C. S. Lui, City University of Hong Kong, Hong Kong

Chunyan Miao, Nanyang Technological University, Singapore

Miranda Mowbray, HP Labs Bristol, UK

Siani Pearson, HP Labs Bristol, UK

Graeme Proudler, HP Labs Bristol, UK

Tomas Sander, HP Labs Princeton, USA

Anurag Singla, ArcSight Inc, USA

Said Tabet, EMC, USA

Tan Kian Lee, National University of Singapore, Singapore

Joseph Teo Chee Ming, Institute for Infocomm Research, A*STAR, Singapore

Bhavani M Thuraisingham, University of Texas, Dallas, USA

Guojun Wang, Central South University, China

Claire Vishik, Intel Corporation, USA

Peng Zhang, Xi’an University of Posts and Telecommunications, China

Jie Zhang, Nanyang Technological University, Singapore         


ICESS-11 Organizing and Program Committees

 

 

Honorary Chair

Lijian Tao, Vice President of Central South University, China

 

Steering Chairs

Laurence T. Yang, St. Francis Xavier University, Canada

Zhaohui Wu, Zhejiang University, China

 

Steering Committee

Yann-Hang Lee, Arizona State University, USA

Xiangke Liao, National University of Defence Technology, China

Edwin Sha, University of Texas at Dallas, USA

Zili Shao, Hong Kong Polytechnic University, Hong Kong

Xingshe Zhou, Northwestern Polytechnical University, China

 

General Chairs

Guojun Wang, Central South University, China

Giorgio Buttazzo, Scuola Superiore Sant'Anna of Pisa, Italy

Tei-Wei Kuo, National Taiwan University, Taiwan

 

Program Chairs

Jian-Jia Chen, Karlsruhe Institute of Technology (KIT), Germany

Marco Di Natale, Scuola Superiore Sant'Anna of Pisa, Italy

Zonghua Gu, Zhejiang University, China

 

Program Vice Chairs

Rodolfo Pellizzoni, University of Waterloo, Canada

Hui Wu, The University of New South Wales, Australia

Dakai Zhu, University of Texas at San Antonio, USA

Yongxin Zhu, Shanghai Jiao Tong University, China

Keqiu Li, Dalian University of Technology, China

Salvatore Vitabile, University of Palermo, Italy

 

Program Committee (in alphabetical order)

(1) Systems, Models and Algorithms Track

Chairs:

Rodolfo Pellizzoni, University of Waterloo, Canada

Hui Wu, The University of New South Wales, Australia

 

TPC members:

Luca Abeni, University of Trento, Italy

Luis Almeida, University of Porto, Portugal

Bjorn Andersson, CISTER-ISEP, Portugal

Hakan Aydin, George Mason University, USA

Ted Baker, Florida State University, USA

Vandy Berten, University of Brussels, Belgium

Ho Jung Cha, Yonsei University, Korea

Samarjit Chakraborty, TU Munich, Germany

Yuan-Hao Chang, National Taipei University of Technology, Taiwan

Yiran Chen, University of Pittsburgh, USA

Jing Chen, National Cheng Kung University, Taiwan

Tommaso Cucinotta, Scuola Superiore S. Anna, Italy

Tulio Facchinetti, University of Pavia, Italy

Sebastian Fischmeister, University of Waterloo, Canada

Chris Gill, Washington University, USA

Sathish Gopalakrishnan, University of British Columbia, Canada

Hui Guo, The University of New South Wales, Australia

Pablo Ibanez, Universidad de Zaragoza, Spain

Kyoung-Don (KD) Kang, State University of New York Binghamton, US

Shinpei Kato, Carnegie Mellon University, USA

Daeyoung Kim, KAIST, Korea

Luciano Lavagno, Politecnico di Torino, Italy

Jian Li, Shanghai Jiao Tong University, China

Ying Lu, University of Nebraska-Lincoln, USA

Alberto Macii, Politecnico di Torino, Italy

Juan Miguel Mart-nez, Universidad Politecnica de Valencia, Spain

Daniel Mosse, University of Pittsburgh, USA

Tatuso Nakajima, Waseda University, Japan

Nicolas Navet, LORIA, France

Thomas Nolte, Malardalen University, Sweden

John O'Donnell, University of Glasgow, UK

Luigi Palopoli, University of Trento, Italy

Christian Poellabauer, University of Notre Dame, USA

Thomas Rauber, University of Bayreuth, Germany

Shangping Ren, Illinois Institute of Technology, USA

Julio Sahuquillo, Universidad Politecnica de Valencia, Spain

Bernhard Scholz, The University of Sydney, Australia

Frank Singhoff, Brest University, France

Frank Slomka, Universitat Ulm, Germany

Oleg Sokolsky, University of Pennsylvania, USA

Alexandros Stamatakis, Technische Universitat Munchen, Germany

Lothar Thiele, ETH Zurich, Switzerland

Qixin Wang, Hong Kong Polytechnic University, Hong Kong

Shengquan Wang, University of Michigan - Dearborn, USA

Wang Yi, Uppsala University, Sweden

Wei Zhang, Virginia Commonwealth University, USA

 

(2) Design Methodology and Tools Track

Chairs:

Dakai Zhu, University of Texas at San Antonio, USA

Yongxin Zhu, Shanghai Jiao Tong University, China

 

TPC members:

Neven Abougazala, Intel, USA

Stefan Andrei, Lamar University, USA

Alessio Bechini, University of Pisa, Italy

Rajendra Boppana, University of Texas at San Antonio, USA

Alexander Dean, North Carolina State University, USA

Qingxu Deng, Northeastern University, China

Robert van Engelen, Florida State University, USA

Nathan Fisher, Wayne State University, USA

Tom Forest, General Motors, USA

Yuzhuo Fu, Shanghai Jiao Tong University, China

George A. Gravvanis, Democritus University of Thrace, Greece

Rajiv Gupta, University of California, Riverside, USA

Seongsoo Hong, Seoul National University, Korea

Pao-Ann Hsiung, National Chung Cheng University, Taiwan

Miaoqing Huang, University of Arkansas, USA

Yo-Ping Huang, National Taipei University of Technology, Taiwan

Shih-Hao Hung, National Taiwan University, Taiwan

Jiang Jiang, Shanghai Jiao Tong University, China

Lei Ju, Shandong University, China

Seon Wook Kim, Korea University, Korea

Mingsong Lv, Northeastern University, China

Linwei Niu, Claflin University, USA

Zebo Peng, Linkoping University, Sweden

Gang Quan, Florida International University, USA

Walid Taha, Rice University, USA

Francois Terrier, CEA, France

Hiroyuki Tomiyama, Ritsumeikan University, Japan

Ali S. Tosun, University of Texas at San Antonio, USA

Sara Tucci, CEA, France

Shige Wang, General Motors, USA

Weng-Fai Wong, National University of Singapore, Singapore

Yifan Wu, Hangzhou Dianzi University, China

Ningyi Xu, Microsoft Research Asia, China

Jiang Xu, Hong Kiong University of Science and Technology, Hong Kong

Jason Xue, City University of Hong Kong, China

Chia-Lin Yang, National Taiwan University, Taiwan

Haibo Zeng, General Motors, USA

 

(3) Embedded Applications and Interdisciplinary Topics Track

Chairs:

Keqiu Li, Dalian University of Technology, China

Salvatore Vitabile, University of Palermo, Italy

 

TPC members:

Ben Abdallah Abderazek, University of Aizu, Japan

Tamim Asfour, Karlsruhe Institute of Technology, Germany

Jan Beutel, ETH, Zurich

Sek Chai, SRI International, USA

Li-Pin Chang, National Chiao-Tung University, Taiwan

Albert M. K. Cheng, University of Houston, USA

Masoud Daneshtalab, University of Turku, Finland

Abhijit Davare, Intel, USA

Luca Fanucci, University of Pisa, Italy

Gerhard Fohler, TU Kaiserslautern, Germany

Antonio Gentile, University of Palermo, Italy

Luis Gomes, Universidade Nova Lisboa, Portugal

Houcine Hassan, University Politiecnica de Valencia

Kazuki Joe, Nara Woman's University, Japan

Eugene John, University of Texas at San Antonio, USA

Jihong Kim, Seoul National University, Korea

Michihiro Koibuchi, National Institute of Informatics, Japan

Chin-Fu Kuo, National Univ. of Kaohsiung

Yu-Kwong Kwok, University of Hong Kong, Hong Kong

Yann-Hang Lee, Arizona State University, USA

William W.-Y. Liang, National Taipei University of Technology, Taiwan

Yunhuai Liu, Chinese Academy of Sciences, China

Doug Maskell, Nanyang Technological University, Singapore

Ian McLoughlin, Nanyang Technological University, Singapore

Alexander Metzner, Regensburg University, Germany

Jogesh Muppala, Hong Kong University of Science and Technology, China

Stefan Petters, ISEP, Portugal

William H. Robinson, Vanderbilt University, USA

Gudula Runger, TU Chemnitz, Germany

Dimitrios Serpanos, University of Patras, Greece

Muhammad Shafique, Karlsruhe Institute of Technology, Germany

Zili Shao, Hong Kong Polytechnic University, China

Shiao-Li Tsao, National Chiao Tung University, Taiwan

Tullio Vardanega, University of Pavia, Italy

Gerald Wang, National Instruments, USA

Kailong Zhang, Northwestern Polytechnical University, China

Qi Zhu, Intel, USA

 

 

Workshop Chairs

Qingxu Deng, Northeast University, China

Aniruddha Gokhale, Vanderbilt University, USA

Shangping Ren, Illinois Institute of Technology

 

Organizing Chairs

Zhigang Chen, Central South University, China

Ming Xu, National University of Defense Technology, China

Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA

 

Organizing Committee

Zhaohui Dai, Central South University, China

Ming Fu, Changsha University of Science and Technology, China

Zhigang Hu, Central South University, China

Changyun Li, Hunan University of Technology, China

Fei Li, Central South University, China

Kenli Li, Hunan University, China

Hong Liu, Hunan Normal University, China

Jianxun Liu, Hunan University of Science and Technology, China

Renren Liu, Xiangtan University, China

Xinjun Mao, National University of Defense Technology, China

Ronghua Shi, Central South University, China

Jianxin Wang, Central South University, China

Beiji Zou, Central South University, China

 

Publicity Chairs

Avinash Srinivasan, Bloomsburg University, USA

Luigi Palopoli, University of Trento, Italy

Xiaorui (Ray) Wang, University of Tennessee, USA

Feng Xia, Dalian University of Technology, China

Zhigang Gao, Hangzhou Dianzi University, China

Xingang Liu, Yosei University, Korea

 

Publication Chairs

Zhe Tang, Central South University, China

Weirong Liu, Central South University, China

 

Finance Chairs

Jin Zheng, Central South University, China

Guihua Duan, Central South University, China

 

Secretariats

Li Li, Central South University, China

Shuhong Chen, Central South University, China

 

Webmasters

Zhengli Xiong, Central South University, China

Xiaofei Xing, Central South University, China

 


 

ESA-11 Organizing and Program Committees

 

 

General Chairs

Geyong Min, University of Bradford, UK

Zhe Tang, Central South University, China

 

Program Chairs

Laurence T. Yang, St. Francis Xavier University, Canada

Guojun Wang, Central South University, China

 

Program Committee (in alphabetical order)

Stefan Andrei, Lamar University, USA

Rong-Guey Chang, National Chung-Cheng University, Taiwan

Ya-Shu Chen, National Taiwan Univ. of Science and Technology, Taiwan

Juan Chen, National University of Defense Technology, China

Albert Cheng, University of Houston, USA

Guojing Cong, IBM Watson Research Center, USA

Hongjun Dai, Shandong University, China

Yoginder S. Dandass, Mississippi State University, USA

Sebastian Fischmeister, University of Waterloo, Canada

Narayan Ganesan, University of Delaware, USA

Antonio Gentile, University of Palermo, Italy

Luis Gomes, Universidade Nova de Lisboa, Portugal

Rajiv Gupta, University of California, USA

Takuji Hieda, Ritsumeikan University, Japan

Seongsoo Hong, Seoul National University, Korea

Pao-Ann Hsiung, National Chung Cheng University, Taiwan

Wei Hu, Wuhan University of Science and Technology, China

Zhiping Jia, Shandong University, China

Kyoung-Don (KD) Kang, State University of New York Binghamton, USA

Chin-Fu Kuo, National Univ. of Kaohsiung, Taiwan

Jian Li, Shanghai Jiao Tong University, China

Jian Lin, University of Houston - Clear Lake, USA

Wenyu Liu, Huazhong University of Science and Technology, China

Jogesh Muppala, Hong Kong University of Science and Tech, Hong Kong

Tatuso Nakajima, Waseda University, Japan

Thomas Nolte, Malardalen University, Sweden

Gilles Pokam, Intel, USA

Yong Qi, Xi'an Jiao Tong University, China

Zhengwei Qi, Shanghai Jiao Tong University, China

Gang Quan, Florida International University, USA

Jim Ras, University of Houston, USA

Ching-Lung Su, National Yunlin University of Science and Technology, Taiwan

Yuqing Sun, Shandong University, China

Ali S. Tosun, University of Texas at San Antonio, USA

Lorenzo Verdoscia, ICAR National Research Council, Italy

Salvatore Vitabile, University of Palermo, Italy

Shengquan Wang, University of Michigan - Dearborn, USA

Qixin Wang, Hong Kong Polytechnic University, Hong Kong

Hongxing Wei, Beihang University, China

Gang Wu, Shanghai Jiao Tong University, China

Jun Wu, National Pingtung Institute of Commerce, Taiwan

Weigang Wu, Sun Yat-Sen University, China

Junfeng Xu, Dalian University of Technology, China

Jiang Xu, Hong Kong University of Science and Technology, Hong Kong

Jason Xue, City University of Hong Kong, Hong Kong

Jianfeng Yang, Wuhan University, China

Jiong Zhang, Beihang University, China

Qing Zhang, Australian E-Health Research Centre, Australia

Ting Zhang, Iowa State University, USA

Youtao Zhang, University of Pittsburgh, USA

Nenggang Zheng, Zhejiang University, China

Yongxin Zhu, Shanghai Jiao Tong University, China

 

Publicity Chairs

Lan Wang, University of Huddersfield, UK

Hamid Mehrvar, Ciena Corp./University of Ottawa, Canada

Feilong Tang, Shanghai Jiao Tong University, China

Jianguo Yao, McGill University and Ecole Polytechnique de Montreal, Canada

 

 

 

 


 

IWCSEI-11 Organizing and Program Committees

 

 

General Chairs

Jiamin He, Ningbo University, China

Minghui Wu, Zhejiang University City College, China

 

Program Chair

Tianzhou Chen, Zhejiang University, China

 

Program Committee Members (in alphabetical order)

Yajun Ha, National University of Singapore, Singapore

Tongsen Hu, Zhejiang University of Technology, China

Weihua Hu, Hangzhou Dianzi University, China

Yan Luo, University of Massachusetts Lowell, USA

Youtian Qu, Zhejiang University of Media and Communications, China

Weihua Sheng, Oklahoma State University, USA

Hui Yan, Zhejiang University, China

Jianfeng Yang, Wuhan University, China

 

 


 

FCST-11 Organizing and Program Committees

 

 

Honorary Chair

Lijian Tao, Vice President of Central South University, China

 

Steering Chairs

Minyi Guo, Shanghai Jiao Tong University, China

Hai Jin, Huazhong University of Science & Technology, China

 

General Chairs

Guojun Wang, Central South University, China

Chengzheng Sun, Nanyang Technological University, Singapore

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

 

Program Chairs

Jianer Chen, Texas A&M University, USA

Kouichi Sakurai, Kyushu University, Japan

Cho-Li Wang, University of Hong Kong, Hong Kong

 

Program Committees (in alphabetical order)

 

(1) Parallel and Distributed Computing Track

Chairs:

Rajendra V. Boppana, UT San Antonio, USA

Jan-Jan Wu, Academia Sinica, Taiwan

 

TPC members:

Emre Brookes, University of Texas Health Science Center at San Antonio, USA

Guey-Yun Chang, National Central University, Taiwan

Suresh Chalasani, University of Wisconsin-Parkside, USA

Wei-Ho Chung, Academia Sinica, Taiwan

Qianping Gu, Simon Fraser University, Canada

Haiwu He, INRIA/Hohai University, France

Hung-Chang Hsiao, National Cheng Kung University, Taiwan

David Hutchinson, Carleton University and Pteran Computing Inc., Canada

Kuo-Chan Huang, National Taichung University, Taiwan

Kuan-Chou Lai, National Taichung University, Taiwan

Chia-Han Lee, Academia Sinica, Taiwan

Xiaolin (Andy) Li, University of Florida, US

Pangfeng Liu, National Taiwan University, Taiwan

Animesh Pathak, INRIA, France

Sushil K. Prasad, Georgia State University, USA

Leonel Sousa, TU Lisbon, Portugal

Ashok Srinivasan, Florida State University, USA

Parimala Thulasiraman, University of Manitoba, Canada

Ramesh K. Tirumale, Boeing, USA

Chien-Min Wang, Academia Sinica, Taiwan

Wei-Jen Wang, National Central University, Taiwan

Huashan Yu, Peking University, China

 

 

(2) Pervasive, Grid, P2P and Cloud Computing Track

Chairs:

Kenichi Takahashi, Tottori University, Japan

Chuan Wu, University of Hong Kong, Hong Kong

 

TPC members:

Hsi-Ya Chang, National Center for High-Performance Computing, Taiwan

Yoshiaki Hori, Kyushu University, Japan

Chunming Hu, Beihang University, China

Xinyi Huang, Institute for Infocomm Research (I2R), Singapore

Masaki Ito, Tottori University, Japan

Jinlei Jiang, Tsinghua University, China

Fangming Liu, Huazhong University of Science and Technology, China

Xuezheng Liu, Google Inc., NYC, USA

Xiao Liu, Swinburne University of Technology, Australia

Tsunenori Mine, Kyushu University, Japan

Yizhi Ren, Hangzhou Dianzi University, China

Yanming Shen, Dalian University of Technology, China

Chunhua Su, Institute for Infocomm Research (I2R), Singapore

Zhou Su, Waseda University, Japan

Yoshifumi Ueshige, Nagasaki University, Japan

Di Wu, Sun Yat-Sen University, China

Yufeng Wang, Nanjing University of Posts and Telecommunications, China

Haibo Yu, Shanghai Jiao Tong University, China

Yongbing Zhang, University of Tsukuba, Japan

 

 

(3) Embedded Computing and Systems Track

Chairs:

Meikang Qiu, University of Kentucky, USA

Zhe Tang, Central South University, China

 

TPC members:

Mladen Berekovic, TU Braunschweig, Germany

Holger Blume, University of Hannover, Germany

Bernhard Egger, Seoul National University, Korea

Carlo Galuzzi, TU Delft, The Netherlands

Hongliang Gao, Microprocessor Development Group, Intel, Hillsboro, USA

Fei Hu, University of Alabama, USA

Yu Liang, Central State University, USA

Johan Lilius, Abo Akademi University, Finland

Maurizio Palesi, Kore University, Italy

Gang Quan, Florida International University, USA

Yiyu Shi, Missouri University of Science and Technology, USA

Chung-Ching Shen, University of Maryland, USA

Javier Castillo Villar, Univ. Rey Juan Carlos, Madrid, Spain

Wei Wu, Circuit and System Research Group, Intel, Hillsboro, USA

Kun-Ming Yu, Chung Hua University, Taiwan

Ziliang Zong, Texas State University, USA

Qingguo Zhou, Lanzhou University, China

 

 

(4) Database and Data Management Track

Chairs:

Feilong Tang, Shanghai Jiao Tong University, China

Zuping Zhang, Central South University, China

 

TPC members:

Muhammad Aamir Cheema, The University of New South Wales, Australia

Bin Cui, Peking University, China

Navneet Goyal, BITS Pilani, INDIA

Yanhui Gu, University of Tokyo, Japan

Yo-Ping Huang, National Taipei University of Technology, Taiwan

Carson K. Leung, The University of Manitoba, Canada

Huakang Li, Shanghai Jiao Tong University, China

Xiang Lian, The Hong Kong University of Science and Technology, Hong Kong

Zhengwei Qi, Shanghai Jiao Tong University, China

Zhuzhong Qian, Nanjing University, China

Hongzhi Wang, Harbin Institute of Technology, China

Yongkun Wang, University of Tokyo, Japan

Yanqin Yang, East China Normal University, China

Zhenglu Yang, University of Tokyo, Japan

Shui Yu, Deakin University, Australia

Ge Yu, Northeastern University, China

Jun Zhang, Dalian Maritime University, China

Xingjun Zhang, Xian Jiao Tong University, China

Yanchun Zhang, Victoria University, Australia

Yin Wenjie Zhang, The University of New South Wales, Australia

Ying Zhang, New South Wale University, Australia

Bin Zhou, University of Maryland, USA

Jingyu Zhou, Shanghai Jiao Tong University, China

 

 

(5) Bio-informatics, Bio-inspired Computing and Bio-inspired Networking Track

Chairs:

Jianxin Wang, Central South University, China

Michele Nogueira, Federal University of Parana, Brazil

 

TPC members:

Ajith Abraham, Norwegian University of Science and Technology, Norway

Alex Arenas, Universidad Rovira i Virgili, Tarragona, Spain

Pruet Boonma, Chiang Mai University, Thailand

Eleonora Borgia, IIT-CNR, Italy

Juan Cui, University of Georgia, USA

Aravind Kailas, The University of North Carolina at Charlotte, USA

Albert Y. S. Lam, University of California, Berkeley, USA

Wei Pang, University of Aberdeen, UK

Andreas Riener, Johannes Kepler University Linz, Austria

Sabu M. Thampi, Indian Institute of Information Technology and Management Kerala (IIITMK), India

Dinesh C. Verma, IBM TJ Watson Research Center, USA

Chunguo Wu, Jilin University, China

Zu-Guo Yu, Xiangtan University, China

Fa Zhang, Institute of Computing Technology, Chinese Academy of Sciences, China

Daming Zhu, Shandong University, China

 

 

(6) Network and Internet Computing Track

Chairs:

Jinjun Chen, Swinburne University of Technology, Australia

Kai Zheng, IBM China Research Lab, China

 

TPC members:

Der-Jiunn Deng, National Changhua University of Education, Taiwan

Wanchun Dou, Nanjing University, China

Yi Ge, IBM Research - China, China

Jivesh Govil, Cisco Systems Inc., USA

Chengchen Hu, Xi'an Jiao Tong University, China

Chung-Ming Huang, National Cheng Kung University, Taiwan

Sy-Yen Kuo, National Taiwan University, Taiwan

Dan Li, Tsinghua University, China

Weijiang Liu, Dalian Maritime University, China

Xiangfeng Luo, Shanghai University, China

Suraj Pandey, CSIRO ICT Center, Sydney, Australia

Rajiv Ranjan, University of New South Wales, Australia

Kaijun Ren, National University of Defense Technology, China

Ioannis Sourdis, Chalmers University of Technology, Sweden

Wei Tan, IBM T. J. Watson Research Center, USA

Lizhe Wang, Indiana University, USA

Zhijun Wang, Hong Kong Polytechnic University, China

Wang Yang, Central South University, China

Yang Yu, Sun Yat-Sen University, China

Chuanlin Zhang, Jilan University, China

 

 

(7) Computer Vision and Image Processing Track

Chairs:

Gang Pan, Zhejiang University, China

Xingang Liu, Yonsei University, Korea

 

TPC members:

Jian Cheng, Institute of Automation, CAS, China

Duy Dinh LE, National Institute of Informatics, Japan

Tao Hong, Beihang University, China

Rui Huang, Huazhong Univ. of Sci. & Tech., China

Muhammad Khurram Khan, King Saud University, Kingdom of Saudi Arabia

Ajay Kumar, The Hong Kong Polytechnic University, Hong Kong

Hamid Laga, Institut Telecom / Telecom Lille1, France

Huiyong Li, University of Electronic Science and Technology of China, China

Ronghua Liang, Zhejiang University of Technology, China

Liang Lin, Sun Yat-Sen University, China

Huquan Lu, Dalian University of Technology, China

Zhenyao Mo, Google, USA

Seungchul Ryu, Yonsei University, South Korea

Milos Stojmenovic, Singidunum University, Serbia

Hiroki Takahashi, The University of Electro-Communications, Japan

Ming Tang, Chinese Academy of Sciences, China

Yuki Uranishi, Nara Institute of Science and Technology, Japan

Youxiang Wang, Research Institute, ChinaUnicom, China

Yueming Wang, Zhejiang University, China

Ning Xie, Tokyo Institute of Technology, Japan

Ruigang Yang, University of Kentucky, USA

Xiaohua Zhang, Hiroshima Institute of Technology, Japan

Nenggan Zheng, Zhejiang University, China

Liang Zhou, Technical University of Munich, Germany

 

 

(8) Wireless Sensor Networks and Mobile Computing Track

Chairs:

Xiaodong Wang, National University of Defense Technology, China

Georgios Kambourakis, University of the Aegean, Greece

 

TPC members:

Yu Chen, State University of New York Binghamton, USA

Han-Chieh Chao, National Ilan University, Taiwan

Dimitris Geneiatakis, Columbia University, USA

Imad Jawhar, University of UAE, UAE

Elisavet Konstantinou, University of the Aegean, Greece

Igor Kotenko, St. Petersburg Institute SPIIRAS, Russia

Costas Lambrinoudakis, University of Piraeus, Greece

Loukas Lazos, University of Arizona, USA

Ping Li, Changsha University of Science & Technology, China

Chiu-Kuo Liang, Chung Hua University, Taiwan

Shaohe Lv, National University of Defense Technology, China

Bo Liu, National University of Defense Technology, China

Rafa Marin Lopez, University of Murcia, Spain

Fabio Martinelli, IIT-CNR, Italy

Amiya Nayak, University of Ottawa, Canada

Rodrigo Roman, University of Malaga, Spain

Kun Xie, Hunan University, China

Zenghua Zhao, Tianjin University, China

 

 

(9) Reliability, Fault Tolerance and Distributed Transaction Processing Track

Chairs:

Christian Callegari, University of Pisa, Italy

Neal N. Xiong, Georgia State University, USA

 

TPC members:

Gennaro Boggia, Politecnico di Bari, Italy

Antonio Cianfrani, University of Rome Sapienza, Italy

Hamza Dahmouni, INPT Rabat, Morocco

Alessandro D'Alconzo, FTW, Austria

Francesco Gringoli, University of Brescia, Italy

Pedro Casas Hernandez, LAAS-CNRS, France

Nuno Neves, University of Lisbon, Portugal

Elias P. Duarte Jr., Federal University of Parana, Brazil

Teresa Pepe, University of Pisa, Italy

Marcin Pietrzyk, Orange Labs, France

Vincenzo Piuri, University of Milan, Italy

Felix Strohmeier, Salzburg Research, Austria

Sandrine Vaton, Telecom Bretagne, France

 

 

(10) Security and Trustworthy Computing Track

Chairs:

Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan

Ilsun You, Korean Bible University, Korea

 

TPC members:

HyoBeom Ahn, Kongju National University, Korea

Emmanuelle Anceaume, CNRS/IRISA, France

Steve Barker, King's College London, UK

Masashi Eto, NICT, Japan

Fumiharu Etoh, Fujitsu Kyushu Network Technologies, Japan

Kazuhide Fukushima, KDDI R&D Laboratories Inc., Japan

Ravi Jhawar, Universita' degli Studi di Milano, Italy

Hyung-Jin Lim, Financial Security Agency, Korea

Byoungcheon Lee, Joongbu University, Korea

Hiroshi Mineno, Shizuoka University, Japan

Takashi Nishide, Kyushu University, Japan

Kazumasa Omote, Japan Advanced Institute of Science and Technology, Japan

Wook Shin, KDDI R&D Laboratories Inc., Japan

Nicolas Sklavos, Technological Educational Institute of Patras, Greece

Chul Sur, Kyushu University, Japan

Masakazu Soshi, Hiroshima City University, Japan

Chunhua Su, Institute for Infocomm Research (I2R), Singapore

Osman Ugus, Hochschule fur Angewandte Wissenschaften Hamburg, Germany

Duminda Wijesekera, George Mason University, USA

Chung-Huang Yang, National Kaohsiung Normal University, Taiwan

Baokang Zhao, National University of Defense Technology, China

 

 

(11) Pattern Recognition and Artificial Intelligence Track

Chairs:

El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA

Shiguo Lian, Orange Labs Beijing, China

 

TPC members:

Mohammad A. Abido, King Fahd University of Petroleum and Minerals, Saudi Arabia

Zubair Ahmed Baig, King Fahd University of Petroleum & Minerals, KSA

Wanyu Deng, Xi’an Institute of Post and Telecommunications, China

Tao Gao, Electronic Information Products Supervision and Inspection Institute of Hebei Province, China

Haibo He, The University of Rhode Island, USA

Tarek Helmy, King Fahd University of Petroleum and Minerals, Saudi Arabia

Tzung-Pei Hong, National University of Kaohsiung, Taiwan

Dimitris Kanellopoulos, University of Patras, Greece

Dimitrios Koukopoulos, University of Ioannina, Greece

Haojie Li, Dalian University of Technology, China

Teng Li, Chinese Academy of Sciences, China

Ke Liao, Chinese Academy of Sciences, China

Guangjie Liu, Nanjing University of Science and Technology, China

Cheng-Lin Liu, Institute of Automation of CAS, China

Zhongxuan Liu, Chinese Academy of Sciences, China

Sabri Mahmoud, King Fahd University of Petroleum and Minerals, Saudi Arabia

Chuan Qin, University of Shanghai for Science and Technology, China

Sheng Tang, Chinese Academy of Sciences, China

Kun Tao, Orange Labs Beijing, China

Xiaofeng Tong, Intel Research, China

Chaokun Wang, Tsinghua University, China

Jinwei Wang, Nanjing University of Information Science and Technology, China

Wei Wang, University of Luxembourg, Luxembourg

Beiwei Zhang, Nanjing University of Finance & Economics, China

Qiang Zhang, Dalian University, China

 

 

(12) Theoretical Computer Science Track

Chairs:

Hubert Chan, University of Hong Kong, Hong Kong

Mohamed Hamdi, Communication Networks and Security Research Lab., Tunisia

 

TPC members:

Habtamu Abie, Norwegian Computing Centre, Norway

Yang Cui, Huawei Technologies, China

Soufiene Djahel, ENSIIE Evry, France

Yacine Djemaiel, University of Carthage, Tunisia

Hristo Djidjev, Los Alamos National Lab., USA

Rudolf Fleischer, Fudan University, China

Chien-Chung Huang, Humboldt-Universitat zu Berlin, Germany

Samia Jones, Texas A&M University, Qatar

Tai-Hoon Kim, University of Hannam, Korea

Andrzej Lingas, Lund University, Sweden

Javier Lopez, Univesity of Malaga, Spain

Anil Maheshwari, Carleton University, Canada

Fabio Martinelli, National Research Council, Italy

Farid Nait-Abdesselam, University of Paris Descartes, France

Ofer Neiman, Princeton University, USA

Konstantinos Panagiotou, Max Planck Institute for Informatics, Germany

Rajiv Raman, DIMAP, University of Warwick, Coventry, UK

Slim Rekhis, University of Carthage, Tunisia

Riadh Robbana, University of Carthage, Tunisia

Mugizi Robert Rwebangira, Howard University, Washington, DC, USA

Hossein Sarrafzadeh, Faculty of Creative Industries and Business, New Zealand

Reijo Savola, VTT, Finland

Pascal Schweitzer, The Australian National University, Australia

Nabil Tabbane, University of Carthage, Tunisia

Jan Vahrenhold, TU Dortmund, Germany

Yi Wu, IBM Almaden Research, USA

Christos Zaroliagis, University of Patras, Greece

 

 

(13) System Software and Software Engineering Track

Chairs:

Toshihiro Yamauchi, Okayama University, Japan

Dongjun Huang, Central South University, China

 

TPC members:

Hirotake Abe, Osaka University, Japan

Doo-Hwan Bae, KAIST, Korea

Luiz Fernando Capretz, University of Western Ontario, Canada

Kenji Kono, Keio University, Japan

Yi Lu, University of New South Wales, Australia

Takanori Matsuzaki, Kinki University, Japan

Kohta NAKASHIMA, Fujitsu Laboratories Ltd., Japan

Yusuke Nonaka, Hitachi Ltd., Japan

Yoichi Omori, Kyushu University, Japan

Masahito Shiba, Ryukoku University, Japan

Luca Spalazzi, Università Politecnica delle Marche, Italy

Nobuya Watanabe, Okayama University, Japan

 

 

(14) Computer Graphics and Human-Computer Interaction Track

Chairs:

Beiji Zou, Central South University, China

Wenbin Jiang, Huazhong University of Science and Technology, China

 

TPC members:

Shu Chen, Xiangtan University, China

Zigang Fu, Hunan Agricultural University, China

Yu Hua, Huazhong University of Science and Technology, China

Takayuki Itoh, Ochanomizu University, Japan

Zhiyang Li, Dalian University of Technology, China

Li Liu, Shandong University, China

Ligang Liu, Zhejiang University, China

Xiangbin Liu, Hunan Normal University, China

Tim Marsh, National University of Singapore, Singapore

Kazunori Miyata, Japan Advanced Institute of Science and Technology, Japan

Alexei Sourin, Nanyang Technological University, Singapore

Wenbing Tao, Huazhong University of Science and Technology, China

Guangtao Xue, Shanghai Jiao Tong University, China

Baoliu Ye, Nanjing University, China

Jingyuan Zhang, The University of Alabama Tuscaloosa, USA

 

 

(15) Emerging Topics Outside the Box Track

Chairs:

Raphael C.-W. Phan, Loughborough University, UK

Zhen Jiang, West Chester University of Pennsylvania, USA

 

TPC members:

Jean-Philippe Aumasson, Nagravision, Switzerland

Susmit Bagchi, Gyeongsang National University, South Korea

Shu-Ching Chen, Florida International University, USA

Markus Jakobsson, PayPal, USA