2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing

2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 20...
3 downloads 2 Views 183KB Size
2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 2010)

Xi’an, Shaanxi, China 26-29 October 2010

IEEE Catalog Number: ISBN:

CFP1075H-PRT 978-1-4244-9043-1

2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing

UIC-ATC 2010 Table of Contents Message from ATC/UIC 2010 General/Program Chairs ............................................................xiii Message from the ATC/UIC 2010 Workshop Chairs....................................................................xiv Message from ATC 2010/UIC 2010 Demo Chairs...........................................................................xvi Preface of PerMedia 2010............................................................................................................................xvii Organizing Committee of PerMedia 2010........................................................................................xviii Preface of UMCC 2010 ....................................................................................................................................xix Organizing Committee of UMCC 2010...................................................................................................xx Preface of USST 2010.......................................................................................................................................xxi Organizing Committee of USST 2010..................................................................................................xxiii Preface of SSDU 2010....................................................................................................................................xxiv Organizing Committee of SSDU 2010 ..................................................................................................xxv Preface of IWDTN 2010...............................................................................................................................xxvii Organizing Committee of IWDTN 2010.............................................................................................xxix Preface of MobiCPS 2010.............................................................................................................................xxx Organizing Committee of MobiCPS 2010 ........................................................................................xxxii Preface of HiCEC 2010 ...............................................................................................................................xxxiii Organizing Committee of HiCEC 2010.............................................................................................xxxiv Preface of MENS 2010..................................................................................................................................xxxv Organizing Committee of MENS 2010 .............................................................................................xxxvii Preface of SoTrust 2010.............................................................................................................................xxxix Organizing Committee of SoTrust 2010................................................................................................xl Preface of ANSR 2010.......................................................................................................................................xli Organizing Committee of ANSR 2010..................................................................................................xliii Reviewers...............................................................................................................................................................xlv

International Workshop on Pervasive Media (PerMedia 2010) Pervasive Social Computing: Augmenting Five Facets of Human Intelligence ............................................................1 Jiehan Zhou, Junzhao Sun, Kumaripaba Athukorala, and Dinesh Wijekoon Toward a Smart Home Environment for Elder People Based on Situation Analysis ....................................................7 Xing Zhang, Haipeng Wang, and Zhiwen Yu Providing Real-Time Guarantees to Smart Car ............................................................................................................13 Jie Sun, Yongping Zhang, and Jianbo Fan MSOrgm©: Emergent Techniques for Kinetic Artifact ...............................................................................................18 Scottie Chih-Chieh Huang and Shen-Guan Shih A Comparison of Programming Skills by Genders of Hungarian Grammar School Students ........................................................................................................................................................................24 Gabor Kiss

International Workshop on Ubiquitous Multimedia Computing and Communication (UMCC 2010) An Improved Multi-Scale Retinex Algorithm for Vehicle Shadow Elimination Based on Variational Kimmel .................................................................................................................................................31 Qi-sheng Wu, Xiang-long Luo, Han Li, and Pan-zhi Liu Reliability Analysis of a Multiview Multi-description Video Streaming System ........................................................35 Ivan Lee QoS Control Framework for Ubiquitous Multimedia Computing ...............................................................................40 K.L. Eddie Law and Sunny So A Walkthrough System with Improved Map Projection Panoramas from Omni Directional Images ........................................................................................................................................................45 Chao Liu, Susumu Shibusawa, and Tatsuhiro Yonekura Toward a Programming Model for Safer Pervasive Spaces .........................................................................................52 Chao Chen and Sumi Helal Multilevel Image Thresholding Selection Based on the Firefly Algorithm .................................................................58 Ming-Huwi Horng and Ting-Wei Jiang A Study of Video Coding by Reusing Compressive Sensing Measurements ..............................................................64 Zhenglin Wang and Ivan Lee

International Workshop on Ubiquitous Service Systems and Technologies (USST 2010) Water Quality Monitoring with Ubiquitous Computing ..............................................................................................70 Yo-Ping Huang, Change-Tse Chou, Jung-Shian Jau, and Frode Eika Sandnes A Mobile Agent-Based Software Intelligence Framework in Ubiquitous Environment .............................................76 Yue-Shan Chang and Chih-Tien Fan Sweep Coverage Mechanism for Wireless Sensor Networks with Approximate Patrol Times ............................................................................................................................................................................82 Hung-Chi Chu, Wei-Kai Wang, and Yong-Hsun Lai Personal Smart Spaces as a Basis for Identifying Users in Pervasive Systems ............................................................88 Elizabeth Papadopoulou, Sarah Gallacher, Nick K. Taylor, and M. Howard Williams

Performance on Adaptive Path Selection Scheme for Cooperative Communication Networks .......................................................................................................................................................................94 Yung-Fa Huang, Cing-Chia Lai, Ling-Cheng Hsu, and Tan-Hsu Tan

International Symposium on Service, Security and Data Management Technologies in Ubi-com (SSDU 2010) Session 1: Applications and Services Ubiquitous Community Care Using Sensor Network and Mobile Agent Technology ................................................99 Chuan-Jun Su and Bo-Jung Chen A Macro-observation Approach of Intelligence Video Surveillance for Real-Time Unusual Event Detection ............................................................................................................................................105 Du-Ming Tsai and Wei-Yao Chiu Research on Pervasive Computing Security ...............................................................................................................111 Long Zhao Hua, Jia Zhen, and Li Tao

Session 2: Security and Privacy An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices .......................................................................................................................................................................116 Tien-Ho Chen, Yen-Chiu Chen, and Wei-Kuan Shih Visual Scoping of Private Information Displayed on Shared Tabletop Surfaces .......................................................121 Simen Hagen and Frode Eika Sandnes Improved Identity Based Online/Offline Signature Scheme ......................................................................................126 Yang Ming and Yumin Wang A Method of Privacy Preserving in Mobile Wireless Environments .........................................................................132 YaHui Li, YaDi Zhang, and WenSheng Niu

Session 3: Algorithms and Protocols A New Image Registration Method Using Intensity Difference Data on Overlapped Image ..........................................................................................................................................................................138 Shu-Kai S. Fan and Yu-Chiang Chuang Adaptive Wireless Mesh Networks Routing Protocols ..............................................................................................142 Saaidal R. Azzuhri, Marius Portmann, and Wee Lum Tan Media Access Control Protocol Based on Hybrid Antennas in Ad Hoc Networks ....................................................148 Yanrong Ding, Xiaodong Wang, Hu Shen, and Pengyu Guo A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks .............................................................................................................154 Cai Fu, Jihang Ye, Li Zhang, Yunhe Zhang, and Han LanSheng Dynamic Adaptive Self-Configurable Network Processor .........................................................................................160 A. Satheesh, D. Kumar, and S. Krishnaveni

International Workshop on Delay/Disruption Tolerant Networking (IWDTN 2010) Session 1: Network Architecture Models An Adaptive Cross-Layer Mechanism of Multi-channel Multi-interface Wireless Networks for Real-Time Video Streaming .................................................................................................................165 Jian Liu, Fangmin Li, Fei Dou, Xu He, Zhigang Luo, and Hong Xiong An Trace Based Vehicular Mobility Model for Simulation of Vehicular Delay Tolerant Networks .....................................................................................................................................................................171 Yang Wei-dong, Liu Ji-zhao, and Zhou Xin-yun A Link Quality Prediction Mechanism for WSNs Based on Time Series Model ......................................................175 Linlan Liu, Youlei Fan, Jian Shu, and Kun Yu Message Publish/Subscribe Scheme Based on Opportunistic Networks ...................................................................180 Jianwei Niu, Feifei Wu, Da Huo, and Kai Hu

Session 2: MAC Routing and Congestion Control Protocols RANC: Opportunistic Multi-path Routing Protocol in WSNs Using Reality-Aware Network Coding .........................................................................................................................................................185 Jia Liu, Junzhao Du, Jie Zhang, Xiaojun Li, and Hui Liu Epidemic-Based Controlled Flooding and Adaptive Multicast for Delay Tolerant Networks .....................................................................................................................................................................191 Zhigang Jin, Jia Wang, Sainan Zhang, and Yantai Shu BiBUBBLE: Social-Based Forwarding in Pocket Switched Networks .....................................................................195 Tong Hu, Feng Hong, Xiqing Zhang, and Zhongwen Guo Energy-Efficient Clustering Rumor Routing Protocol for Wireless Sensor Networks ..............................................200 Zhong-hua Wang, Kai Chen, Mei Lin, and Min Yu

Session 3: Practical Applications Asymptotic Stability Criterion for the Networked Control Systems Based on Time-Delay System ...............................................................................................................................................206 Xi-min Zhang and Ya-di Zhang Hierarchical Probabilistic Network-Based System for Traffic Accident Detection at Intersections ............................................................................................................................................................211 Ju-Won Hwang, Young-Seol Lee, and Sung-Bae Cho

International Workshop on Mobile Cyber-Physical Systems (MobiCPS 2010) Session 1: Networking and Architectures Seamless Mobility Support for Adaptive Applications in Heterogeneous Wireless Networks .....................................................................................................................................................................217 Jiannong Cao, Weigang Wu, and Xuan Liu Heterogeneous Multi-layer Wireless Networking for Mobile CPS ............................................................................223 Jia Shen, Fei Xu, Xiangyou Lu, and Huafei Li

R-CA: A Routing-Based Dynamic Channel Assignment Algorithm in Wireless Mesh Networks .....................................................................................................................................................................228 Weifeng Sun, Rong Cong, Feng Xia, Xiao Chen, and Zhenquan Qin An ECG-Based Signal Key Establishment Protocol in Body Area Networks ...........................................................233 Lin Yao, Bing Liu, Kai Yao, Guowei Wu, and Jia Wang Design and Implementation of a Wireless Sensor Network for Smart Homes ..........................................................239 Ming Xu, Longhua Ma, Feng Xia, Tengkai Yuan, Jixin Qian, and Meng Shao

Session 2: Technologies and Applications A Mobile Context Sharing System Using Activity and Emotion Recognition with Bayesian Networks .............................................................................................................................................244 Keunhyun Oh, Han-Saem Park, and Sung-Bae Cho Net-in-Net: Interaction Modeling for Smart Community Cyber-Physical System ....................................................250 Longhua Ma, Jun Yao, Ming Xu, Tengkai Yuan, and Meng Shao DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative Game .......................................................................................................................................256 Guowei Wu, Jiankang Ren, Feng Xia, Lin Yao, and Zichuan Xu TouchInteract: An Interaction Technique with Large Displays Using Touchscreen-Phone ....................................................................................................................................................262 Hanqing Ruan, Yi Qian, Yong Zhang, and Min Zhou Haptic u-Table: A Believable Feedback System with a Quasi-tangible Tabletop Interface ......................................................................................................................................................................266 YoungTae Roh, Jun Lee, Jee-In Kim, YoungSeok Ahn, HyungSeok Kim, and MinGyu Lim

International Symposium on High Confidence Embedded Computing (HiCEC 2010) Session 1: Testing and Measurement for Embedded Software Testing of Component-Based Software: A Metamorphic Testing Methodology .......................................................272 Xiao-li Lu, Yun-wei Dong, and Chao Luo Experiments on Test Case Reuse of Test Coverage Criteria ......................................................................................277 Yunwei Dong, Yuying Wang, M.F. Lau, and Si-yu Lin A Measurement of Software Trustworthiness Based on Approximation Algorithms ................................................282 Jie Zhou and Hong Zhu

Session 2: Component-Based Development for Embedded Software An Integrated PLC Smart Home System in Pervasive Computing ............................................................................288 Yunwei Dong, Bo Zhang, and Kang Dong Trustworthiness Expectation of Real-Time Web Services .........................................................................................292 Xinxing Wu and Yixiang Chen Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems ........................................................................................................................................299 Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, and Hong Mei

Formal Definitions for Trust in Trusted Computing ..................................................................................................305 Xinmao Gai, Yong Li, Yasha Chen, and Changxiang Shen

The 2nd International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2010) Assurance Networks: Concepts, Technologies, and Case Studies .............................................................................311 Yoshiaki Kakuda

Session 1: Special Session on Assurance Networks Sensitivity Analysis of Random Port Hopping ...........................................................................................................316 Kousaburou Hari and Tadashi Dohi Autonomous Community Construction Technology for Timely Transmitting Emergency Information ..............................................................................................................................................322 Fan Wei, Md. Emadadul Haque, Yukihiro Fukunaga, Takehiro Gouda, Xiaodong Lu, and Kinji Mori File Diffusion Control on Super-Seed Mode Over BitTorrent-Like P2P Networks ..................................................328 Yuki Kuwabara, Junichi Funasaka, and Kenji Ishida An Extended Micro Loop Routing for Adapting to Energy Consumption ................................................................334 Mario Takeuchi, Eitaro Kohno, Tomoyuki Ohta, and Yoshiaki Kakuda Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor Networks ..............................................................................................................340 Eitaro Kohno, Tomoya Okazaki, Mario Takeuchi, Tomoyuki Ohta, Yoshiaki Kakuda, and Masaki Aida Architecture-Oriented Assurance Technology in Microgrid ......................................................................................346 Tianhu Ma, Peng Li, Yanbo Wang, and Yongdong Tan

Session 2: Multidisciplinary Models for Autonomous Networks and Systems Application of Deterministic Annealing EM Algorithm to Markovian Arrival Process Parameter Estimation ..................................................................................................................................................352 Hiroyuki Okamura, Hidenari Kishikawa, and Tadashi Dohi Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks .................................................358 Xinxin Fan, Mingchu Li, Yizhi Ren, and Jianhua Ma On Alternation and Information Sharing among Cooperating Autonomous Management Agents ...................................................................................................................................................364 Siri Fagernes and Alva L. Couch Autonomic Fault Identification for Ubiquitous Self Healing Systems .......................................................................370 Junaid Ahsenali Chaudhry and Muhammad Imran An SVM Based Automatic Segmentation Method for Brain Magnetic Resonance Image Series ...............................................................................................................................................................375 Bofeng Zhang, Wenhao Zhu, Hui Zhu, Anping Song, and Wu Zhang Verification of a Sub-ontology Update Mechanism for the Semantic Grid ...............................................................380 Toshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori, Wenny Rahayu, and David Taniar

Session 3: Empirical Studies of Multidisciplinary Approaches A Framework of Organic Streams: Integrating Dynamically Diversified Contents into Ubiquitous Personal Study ..................................................................................................................................386 Hong Chen, Xiaokang Zhou, Haifeng Man, Yan Wu, Ashraf Uddin Ahmed, and Qun Jin Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods ................................................................................................392 Bingfeng Xu, Zhiqiu Huang, and Ou Wei Monitoring Spatially Referenced Entities in Wireless Sensor Networks ...................................................................398 Farhana Jabeen and Alvaro A.A. Fernandes An Idle-Time Eliminating Channel Transmission Scheme in EPON System ............................................................404 Jianhua Shen, Hongmei Guo, and Zhengkun Mi Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation ............................................................................................................................................................410 Sheikh Mahbub Habib, Sebastian Ries, and Max Mühlhäuser

The 2010 International Workshop on Software Trustworthiness (SoTrust 2010) Session 1: Classification and Assurance A Flexible Multi-Source Web Service’s QoS Acquisition Framework and Implementation ....................................................................................................................................................416 Junfeng Zhao, Lingshuang Shao, Zhiwen Cheng, and Bing Xie Towards Trustworthy Composite Service Through Business Process Model Verification .................................................................................................................................................................422 Wenjia Huai, Xudong Liu, and Hailong Sun Formal Analysis of Behavioural Equivalence for Trustworthy and Composite Web Services .......................................................................................................................................................................428 Yongwang Zhao, Chunyang Hu, Min Liu, and Dianfu Ma DS Theory-Based Software Trustworthiness Classification Assessment ..................................................................434 Ben Wang, Xingshe Zhou, Gang Yang, and Yalei Yang

Session 2: Techniques and Applications Static Detection of Unsafe Use of Variables in Java Program ...................................................................................439 Xiaoquan Wu and Jun Wei Mining Frequent Development Patterns of roles in Open Source Software ..............................................................444 Lin Yuan, Huaimin Wang, Gang Yin, Dianxi Shi, Xiang Li, and Bixin Liu Checking Compliance to Coding Standards for x86 Executables ..............................................................................449 Ziying Dai, Xiaoguang Mao, Dianlin Wang, Donghong Liu, and Jie Zhang User-Centered Trust Model Visibility of Trust Technologies ....................................................................................456 Hao Jiang, Yang Li, and Yongjun Xu

Collocated Workshops on Autonomic Networks and Services, Network Evolution and Routing Innovation (ANSR 2010) MiniMASC: A Framework for Diverse Autonomic Adaptations of Web Service Compositions ..............................................................................................................................................................460 Qinghua Lu and Vladimir Tosic PCR-a Position-and-Connectivity-Based Routing Protocol for VANETs .................................................................469 Lin Lei, Xiao Xiaoqiang, Xu Ming, and Wei Liqi

ATC Demo and Exhibition Session MiniMASC+MiniZinc: An Autonomic Business-Driven Decision Making Middleware for Adaptation of Web Service Compositions ............................................................................................................474 Qinghua Lu and Vladimir Tosic Exploration on Integrated Development Environment of Trusted Data Processing Oriented Software Product Line for WEB Application ..............................................................................................478 Hongwen Huang, Xinyu Zhang, Li Zheng, and Shulan Zhao An Indoor Location-Based Social Network for Managing Office Resource and Connecting People ...............................................................................................................................................481 Hao Wang, Lijun Zhu, and Alvin Chin

UIC Demo and Exhibition Session Drive Smartly as a Taxi Driver ...................................................................................................................................484 Yu Zheng, Jing Yuan, Wenlei Xie, Xing Xie, and Guangzhong Sun HouseGenie: Universal Monitor and Controller of Networked Devices on Touchscreen Phone in Smart Home .................................................................................................................................................487 Yue Suo, Chenjun Wu, Yongqiang Qin, Chun Yu, Yu Zhong, and Yuanchun Shi A-CUBE: A Tangible Tabletop Application to Support Safe and Independent Chemistry Experiments ..............................................................................................................................................490 Akifumi Sokan and Kaori Fujinami Fall Detecting and Alarming Based on Mobile Phone ...............................................................................................494 Zhongtang Zhao, Yiqiang Chen, Junfa Liu, and Zhongtang Zhao Taxi-Viewer: Around the Corner Taxis Are! .............................................................................................................498 Ke Hu, Zhangguang He, and Yang Yue Directional Wi-Fi Based Indoor Location System for Emergency ............................................................................501 Mi Zhao, Hua Yang, Junfa Liu, Yiqiang Chen, and Jingye Zhou Speech and Auditory Interfaces for Ubiquitous, Immersive and Personalized Applications ................................................................................................................................................................503 Lei Xie, Wenhuai Zhao, Xiangzeng Zhou, Xiaohai Tian, Bingfeng Li, Naicai Sun, Yali Zhao, and Yanning Zhang GeeAir: Waving in the Air to Control Home Appliances ..........................................................................................506 Jiahui Wu, Gang Pan, Shijian Li, Zhaohui Wu, and Daqing Zhang

Author Index ......................................................................................................................................................509

Suggest Documents