The Community for Technology Leaders
2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) (2005)
Taipei, Taiwan
Mar. 25, 2005 to Mar. 30, 2005
ISSN: 1550-445X
ISBN: 0-7695-2249-1
TABLE OF CONTENTS

Reviewers (PDF)

pp. xxii,xxiii
Introduction

Organizing Committee (PDF)

pp. xviii-xxi

Reviewers (PDF)

pp. xxii-xxiii
Session A01: Multimedia Communication and Synchronization

A Multimedia Oriented Component Model (Abstract)

Philippe Roose , LIUPPA-IUT
Marc Dalmau , LIUPPA-IUT
Franck Luthon , LIUPPA-IUT
Emmanuel Bouix , LIUPPA-IUT
pp. 3-8

Design of a Hierarchical Group to Realize a Scalable Group (Abstract)

Tomoya Enokido , Tokyo Denki University
Yasutaka Nishimura , Tokyo Denki University
Makoto Takizawa , Tokyo Denki University
pp. 9-14

A Novel Sliding Weighted Fair Queueing Scheme for Multimedia Transmission (Abstract)

Jia-Cheng Zhhuang , National Dong Hwa University
Yun-Sheng Yen , National Dong Hwa University
Han-Chieh Chao , National Dong Hwa University
Weimin Chen , National Dong Hwa University
pp. 15-20
Session A02: Multi-Agent Systems

Multi-Agent Based Network Management Task Decomposition and Scheduling (Abstract)

Junzhou Luo , Southeast University
Bo Liu , Southeast University
Wei Li , Southeast University
pp. 41-46

A Proposal of Multi-Agent System Development Framework for Cooperative Problem Solving and Its Experimental Evaluation (Abstract)

Hidekazu Tsuji , Tokai University
Jun Sawamoto , Mitsubishi Electric Corporation
Dilmurat Tilwaldi , Tokyo Denki University
Hisao Koizumi , Tokyo Denki University
pp. 47-52

A Model of Multi-Agent System Based on Immune Evolution (Abstract)

Guangzhu Chen , Sichuan University and China University of Mining and Technology
Zhishu Li , Sichuan University
Daohua Yuan , Sichuan University
null Nimazhashi , Sichuan University
pp. 53-58

Using a Learning Mechanism in Matchmaking Process of Agents? Negotiation in Multi-Agent Systems (Abstract)

Emad Farazmand , Azad University
Caro Lucas , University of Tehran
Afsaneh Shokoufi , University of Tehran
Farzad Habibipour , Azad University
pp. 59-64
Session A03: Ad Hoc Network I

Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments (Abstract)

Yumin Wang , Xidian University
Zhenjie Huang , Xidian University and Zhangzhou Teachers College
Dan Chen , Xidian University
pp. 67-71

A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad Hoc Networks (Abstract)

S. C. Chen , Feng Chia University
P. J. Lin , Feng Chia University
C. R. Dow , Feng Chia University
J. H. Lin , Feng Chia University
S. F. Hwang , Feng Chia University
pp. 72-77

Evaluation of Inter-Vehicle Ad Hoc Communication Protocol (Abstract)

Takaaki Umedu , Osaka University
Teruo Higashino , Osaka University
Jun Tsukamoto , Osaka University
Masahi Saito , Osaka University
pp. 78-83

Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks (Abstract)

Bing-Hong Liu , National Tsing Hua University
Ming-Jer Tsai , National Tsing Hua University
Wei-Chei Ko , National Tsing Hua University
pp. 90-95
Session A04: Real-Time Systems and Tracking

Incremental Design of a State Machine Specification for Mobile and Real-Time Systems (Abstract)

Goichi Itabashi , Tohoku University and Scientia Corporation
Takuo Sugamma , Tohoku University
Kaoru Takahashi , Sendai National College of Technology
Norio Shiratori , Tohoku University
Yasushi Kato , Sendai National College of Technology
pp. 99-104

Real-Time Multiple Tracking Using a Combined Technique (Abstract)

Chia-Tong Tang , Tamkang University
Hui-Huang Hsu , Tamkang University
Yi-Chun Liao , Tamkang University
Timothy K. Shih , Tamkang University
pp. 111-116

Fast Pattern Detection in Stream Data (Abstract)

Alan Chang , National Tsing Hua University
Chang-Yeng Cheng , National Tsing Hua University
Simon Sheu , National Tsing Hua University
pp. 125-130
Session A05: Semantic Based Information Retrieval

Multi-Modal Information Retrieval with a Semantic View Mechanism (Abstract)

Yueting Zhuang , Zhejiang University
Qing Li , City University of Hong Kong
Jun Yang , Carnegie Mellon University
pp. 133-138

Linguistic Interpretation of Human Motion Based on Mental Image Directed Semantic Theory (Abstract)

Seio Oda , Fukuoka Institute of Technology
Masao Yokota , Fukuoka Institute of Technology
Daisuke Hironaka , Fukuoka Institute of Technology
Mikio Amano , Fukuoka Institute of Technology
Genci Capi , Fukuoka Institute of Technology
pp. 139-144

OWL-Based Approach for Semantic Interoperability (Abstract)

Djamal Benslimane , University of Lyon 1
Seksun Suwanmanee , University of Lyon 1
Philippe Thiran , Eindhoven University of Technology
pp. 145-150

Applying Word Sense Disambiguation to Question Answering System for e-Learning (Abstract)

Jason C. Hung , Northern Taiwan Institute of Science and Technology
George Yee , National Research Council - Canada
Che-Yu Yang , Tamkang University
Mao-Shuen Chiu , Tamkang University
Ching-Sheng Wang , AIetheia University
pp. 157-162
Session A06: Peer-to-Peer and Real-Time Communications

Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks (Abstract)

Makoto Takizawa , Tokyo Denki University
Tomoya Enokido , Tokyo Denki University
Kenichi Watanabe , Tokyo Denki University
Kane Kim , University of California at Irvine
pp. 165-170

A Multiplatform P2P System: Its Implementation and Applications (Abstract)

Nobuhiro Nakamura , Fukuoka Institute of Technology
Leonard Barolli , Fukuoka Institute of Technology
Jianhua Ma , Hosei University
Souichirou Takahama , Fukuoka Institute of Technology
Kaoru Sugita , Fukuoka Institute of Technology
pp. 171-176

Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design (Abstract)

Hai Jin , Huazhong University of Science and Technology
Wei Ren , Zhongnan University of Economics and Law and Huazhong University of Science and Technology
pp. 177-182

Application of Policing Mechanisms for Broadband Networks: Issues and Difficulties (Abstract)

Takahide Gouda , Fukuoka Institute of Technology
Giuseppe De Marco , Fukuoka Institute of Technology
Akio Koyama , Yamagata University
Kaoru Sugita , Fukuoka Institute of Technology
Leonard Barolli , Fukuoka Institute of Technology
Arjan Durresi , Louisiana State University
pp. 183-188
Session A07: e-Learning and SCORM

An Ontology-Based e-Learning System for Network Security (Abstract)

Goichi Itabashi , Tohoku University
Eriko Negishi , Sendai National College of Technology
Tomomi Abiko , Sendai National College of Technology
Kaoru Takahashi , Sendai National College of Technology
Yasushi Kato , Sendai National College of Technology
Yoshihito Takahashi , Sendai National College of Technology
Norio Shiratori , Tohoku University
pp. 197-202

Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning (Abstract)

Hsuan-Che Yang , Tamkang University
Wen-Chih Chang , Tamkang University
Chun-Chia Wang , Northern Taiwan Institute of Science and Technology
George Yee , National Research Council Canada
H. W. Lin , Tamkang University
Timothy K. Shih , Tamkang University
pp. 203-208

An Object Based Authoring Tool for Creating SCORM Compliant Course (Abstract)

Yi-Lin Liu , National Chiao Tung University
Jun-Ming Su , National Chiao Tung University
Shian-Shyong Tseng , National Chiao Tung University
Jui-Feng Weng , National Chiao Tung University
Yi-Ta Tsai , National Chiao Tung University
Kuan-Ting Chen , National Chiao Tung University
pp. 209-214

Constructing Knowledge Bases for e-Learning Using Protege 2000 and Web Services (Abstract)

Larbi Esmahi , Athabasca University
Fuhua Lin , Athabasca University
Chunsheng Yang , National Research Council Canada
Mike Hogeboom , Athabasca University
pp. 215-220

On the Distributed Management of SCORM-Compliant Course Contents (Abstract)

Chu-Hung Lin , National Sun Yat-sen University
Sheng-Tun Li , National Cheng Kung University
pp. 221-226
Session A08: Collaborative Environment and Virtual Space

Virtual Traditional Japanese Crafting System Using JGNII in Collaborative Work Environment (Abstract)

Tomoyuki Ishida , Iwate Prefectural University
Akihiro Miyakawa , Iwate Prefectural University and Information Policy Division of Nanao-city
Yoshitaka Shibata , Iwate Prefectural University
pp. 229-234

Experimental Result of Feature Extraction Method for Digital Traditional Japanese Crafting System (Abstract)

Yoshitaka Shibata , Iwate Prefectural University
Leonard Barolli , Fukuoka Institute of Technology
Akihiro Miyakawa , Iwate Prefectural University and The Planning Section, Nanao, Ishikawa Prefecture
Tomoyuki Ishida , Iwate Prefectural University
Kaoru Sugita , Fukuoka Institute of Technology
pp. 235-240

An Interactive Virtual Space Presentation System Considering Users Background (Abstract)

Toshitada Ishii , Iwate Prefectural University
Yoshitaka Shibata , Iwate Prefectural University
pp. 241-246

mPATH: An Interactive Visualization Framework for Behavior History (Abstract)

Hideyuki Tokuda , Keio University
Jin Nakazawa , Keio University
Masaki Ito , Keio University
pp. 247-252

Telemedicine with Digital Video Transport System in Asia-Pacific Area (Abstract)

Byung-In Moon , Ewha Womans Mokdong Hospital
Young-Woo Kim , National Cancer Center
Chul-Hee Kang , Korea University
Koji Okamura , Kyushu University
Haruyuki Tatsumi , Sapporo Medical University
Shuji Shimizu , Kyushu University
Joon-Soo Hahm , Hanyang University Medical College
Ho-Seong Han , Seoul National University Bundang Hospital
Naoki Nakashima , Kyushu University
Hiroshi Mizushima , National Cancer Center
Sung-Kwan Youm , Korea University
Yong-Jin Park , Hanyang University
Jae-Hwa Lee , Korea Advanced Research Network
pp. 253-257
Session A09: Multicast Protocols and Admission Controls

An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation Constraints (Abstract)

Kun Zhang , Nanjing University of Science & Technology
Heng Wang , Nanjing University of Science & Technology
Feng-Yu Liu , Nanjing University of Science & Technology
pp. 261-266

Hamming Distance and Hop Count Based Classification for Multicast Network Topology Inference (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Hui Tian , Japan Advanced Institute of Science and Technology
pp. 267-272

Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control (Abstract)

Bo Rong , Universite du Quebec
Ahmed K. Elhakeem , Concordia University
Michel Kadoch , Universite du Quebec
Maria Bennani , Universite du Quebec
pp. 273-278

Logical Key Tree Based Secure Multicast Protocol with Copyright Protection (Abstract)

Ho-Ling Hsu , National Tsing-Hua University
Jeng-Long Chiang , National Tsing-Hua University
Wen-Tsuen Chen , National Tsing-Hua University
pp. 279-284
Session A10: Grid Computing

On Architecture for SLA-Aware Workflows in Grid Environments (Abstract)

Odej Kao , University of Paderborn
Dang Minh Quan , University of Paderborn
pp. 287-292

S-WFMS: A Service-Based Workflow Management System in Grid Environment (Abstract)

Hongbing Liang , Hangzhou University of Electronic Science and Technology
Mingkui Yang , Zhejiang University
Bin Xu , Zhejiang University
pp. 293-297

Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications (Abstract)

Yi-Chun Hsiung , Tunghai University
Chao-Tung Yang , Tunghai University
Heng-Chuan Kan , National Center for High-performance Computing
pp. 298-303

Integrating Grid with Intrusion Detection (Abstract)

Ming-Chang Li , Tung-Hai University
Fang-Yie Leu , Tung-Hai University
Chao-Tung Yang , Tung-Hai University
Jia-Chun Lin , Tung-Hai University
Po-Chi Shih , Tung-Hai University
pp. 304-309

A Single-Computer Grid Gateway Using Virtual Machines (Abstract)

Brian Coghlan , Trinity College Dublin
Geoff Quigley , Trinity College Dublin
Stephen Childs , Trinity College Dublin
David O'Callaghan , Trinity College Dublin
John Walsh , Trinity College Dublin
pp. 310-315
Session A11: Sensor Network

A Probabilistic Signal-Strength-Based Evaluation Methodology for Sensor Network Deployment (Abstract)

Chun-Yu Lin , Industrial Technology Research Institute
Fang-Jing Wu , National Chiao-Tung University
Yu-Chee Tseng , National Chiao-Tung University
Sheng-Po Kuo , National Chiao-Tung University
pp. 319-324

Optimal Energy-Efficient Routing for Wireless Sensor Networks (Abstract)

Hsu-Chen Cheng , National Taiwan University
Chih-Wei Shiou , National Taiwan University
Frank Yeong-Sung Lin , National Taiwan University
Yean-Fu Wen , National Taiwan University
pp. 325-330

Aggregate Sum Retrieval in Sensor Network by Distributed Prefix Sum Data Cube (Abstract)

Man Hon Wong , Chinese University of Hong Kong
Lok Hang Lee , Chinese University of Hong Kong
pp. 331-336

Nodes Localization through Data Fusion in Sensor Network (Abstract)

Ogst Chen , National Chung Cheng University
Ren C. Luo , National Chung Cheng University
L. C. Tu , National Chung Cheng University
pp. 337-342

Geometric Broadcast Protocol for Sensor and Actor Networks (Abstract)

Arjan Durresi , Louisiana State University
Vamsi Paruchuri , Louisiana State University
pp. 343-348
Session A12: Agent and Distributed Systems I

A Hierarchical Dynamic Monitoring Mechanism for Mobile Agent Location (Abstract)

Tsang-Ching Hu , Tamkang University
Ying-Hong Wang , Tamkang University
Cheng-Horng Liao , Tamkang University
Huan-Chao Keh , Tamkang University
pp. 351-356

PICC: A Secure Mobile Agent Framework Based on Garbled Circuit (Abstract)

Zunping Cheng , Fudan University
Dilin Mao , Fudan University
Chuanshan Gao , Fudan University
Min Yang , Fudan University
Shao-yin Huang , Fudan University
Zhi Wang , Fudan University
pp. 357-362

An Agent-Based Middleware for Communication Service on Ad Hoc Network (Abstract)

Tetsuo Kinoshita , Tohoku University
Daisuke Hasegawa , Tohoku University
Gen Kitagata , Tohoku University
Norio Shiratori , Tohoku University
Yu Matsushima , Tohoku University
pp. 363-367

Design and Implementation of Transactional Agents for Manipulating Distributed Objects (Abstract)

Makoto Takizawa , Tokyo Denki University
Tomoya Enokido , Tokyo Denki University
Youhei Tanaka , Tokyo Denki University
pp. 368-373

An Agent Architecture for e-Services Privacy Policy Compliance (Abstract)

George Yee , National Research Council Canada
Larry Korba , National Research Council Canada
pp. 374-379
Session A13: Security and Authentication Protocols

A Scheme for Authentication and Authorization in a Grid Application (Abstract)

HanBing Yao , Huazhong University of Science and Technology
HePing Hu , Huazhong University of Science and Technology
pp. 383-387

An Efficient ID-Based Deniable Authentication Protocol from Pairings (Abstract)

Rui Xue , Chinese Academy of Sciences
Tianjie Cao , Chinese Academy of Sciences and China University of Mining and Technology
Dongdai Lin , Chinese Academy of Sciences
pp. 388-391

Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption (Abstract)

Chung-Ming Huang , National Cheng Kung University
Jian-Wei Li , National Cheng Kung University
pp. 392-397

Reducing Security Overhead for Mobile Networks (Abstract)

Willy Susilo , University of Wollongong
Yi Mu , University of Wollongong
Fangguo Zhang , Sun Yat-Sen University
pp. 398-403
Session A14: Ad Hoc Network II

Interest-Based Lookup Protocols for Mobile Ad Hoc Networks (Abstract)

Jang-Ping Sheu , National Central University
Yi-Chung Chen , National Central University
pp. 407-413

A Power Saving MAC Protocol by Increasing Spatial Reuse for IEEE 802.11 Ad Hoc WLANs (Abstract)

Kuei-Ping Shih , Tamkang University
Chien-Min Chou , Tamkang University
Chih-Yung Chang , Tamkang University
Szu-Min Chen , Tamkang University
pp. 420-425

A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks (Abstract)

Costas Constantinou , University of Birmingham
Marta Z. Kwiatkowska , University of Birmingham
Zhenyu Liu , University of Birmingham
pp. 426-431

Performance Analysis of Radio Resource Allocation for Multimedia Traffic in Cellular Networks (Abstract)

Jean-Lien C. Wu , National Taiwan University of Science and Technology
Wei-Yeh Chen , Northern Taiwan Institute of Science and Technology
pp. 432-437
Session A15: Routing Algorithms

Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server Environments (Abstract)

Wai Chen , Telcordia Technologies
Marcus Pang , Telcordia Technologies
Shengwei Cai , Toyota InfoTechnology Center, U.S.A., Inc.
Onur Altintas , Toyota InfoTechnology Center, U.S.A., Inc.
Yibei Ling , Telcordia Technologies
Chung-Min Chen , Telcordia Technologies
Yoshihisa Suwa , Toyota InfoTechnology Center, U.S.A., Inc.
pp. 441-446

Interoperability of MANET and 4G RAN Routing in Terms of Energy Conservation (Abstract)

Harri Paloheimo , Nokia Research Center
Antti Ylä--Jääski , Helsinki University of Technology
pp. 447-452

Zone-Based Routing Algorithm for Congestion Control over the Internet (Abstract)

Zixue Cheng , University of Aizu
Senro Saito , University of Aizu
Ashraf Uddin Ahmed , University of Aizu
pp. 453-458

An Ear-Decomposition Based Approach for Survivable Routing in WDM Networks (Abstract)

SingLing Lee , National Chung Cheng University
Jung-Chun Liu , National Chung Cheng University
YuChing Chen , National Chung Cheng University
pp. 459-464

Load Balance Based Network Bandwidth Allocation for Delay Sensitive Services (Abstract)

Yan Shi , Xidian University
Zhiliang Qiu , Xidian University
Min Sheng , Xidian University
Zengji Liu , Xidian University
pp. 465-470
Session A16: Admission Control

A CAC Scheme for Multimedia Applications Based on Fuzzy Logic (Abstract)

Kaoru Sugita , Fukuoka Institute of Technology
Akio Koyama , Yamagata University
Mimoza Durresi , Franklin University
Leonard Barolli , Fukuoka Institute of Technology
Arjan Durresi , Louisiana State University
pp. 473-478

Physical Rate Based Admission Control for HCCA in IEEE 802.11e WLANs (Abstract)

Deyun Gao , Nanyang Technological University
Jianfei Cai , Nanyang Technological University
Liren Zhang , Nanyang Technological University
pp. 479-483

QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN (Abstract)

Weidong Kou , Xidian University
Changhua Zhu , Xidian University
Changxing Pei , Xidian University
Jiandong Li , Xidian University
pp. 484-487

Robust Video Communication Based on Source Modeling and Network Congestion Control (Abstract)

Chengke Wu , Xidian University
Jechang Jeong , Hanyang University
Song Xiao , Xidian University
pp. 488-491
Session A17: Web-Based Systems

User-Centric Adaptation of Structured Web Documents for Small Devices (Abstract)

Wai Yip Lum , University of Hong Kong
Francis C. M. Lau , University of Hong Kong
pp. 507-512

Web-Based Energy-Efficient Cache Invalidation in Wireless Mobile Environment (Abstract)

Y.-W. Ting , National Cheng Kung University
Y.-K. Chang , National Cheng Kung University
M.-H. Hong , National Cheng Kung University
pp. 519-524
Session A18: Mobile Systems and Applications

Fragmented Patching: New VOD Technique That Supports Client Mobility (Abstract)

Katsuhiko Sato , Japan Radio Co., Ltd. and University of Electro-Communication
Tetsuya Miki , University of Electro-Communication
Michiaki Katsumoto , National Institute of Information and Communication Technology
pp. 527-532

A Low-Complexity Iterative Detector for COFDM in Mobile Channels (Abstract)

Kuan-Fu Huang , National Taipei University of Technology
Shu-Ming Tseng , National Taipei University of Technology
Teng-Chuan Lin , National Taipei University of Technology
pp. 533-537

On Building a Data Broadcasting System for Mobile Databases (Abstract)

David Taniar , Monash University
Bala Srinivasan , Monash University
Agustinus Borgy Waluyo , Monash University
Gabriel Goh , Monash University
pp. 538-543

Automatic Decomposition of Java Program for Implementation on Mobile Terminals (Abstract)

Shigeharu Urata , Osaka University
Teruo Higashino , Osaka University
Takaaki Umedu , Osaka University
Akio Nakata , Osaka University
pp. 544-549
Session A19: Cellular Network and CDMA

Providing Location Services within a Radio Cellular Network Using Ellipse Propagation Model (Abstract)

Junyang Zhou , Hong Kong Baptist University
Joseph Kee-Yin Ng , Hong Kong Baptist University
Kenneth Man-Kin Chu , Hong Kong Baptist University
pp. 559-564

EM Vector Channel Estimation and V-BLAST/PIC Detection for Multiuser Long-Code MIMO CDMA in Multipath Rayleigh Fading Channels (Abstract)

Yuan-Ching Tseng , National Taipei University of Technology
Hung-Chieh Yu , National Taipei University of Technology
Shu-Ming Tseng , National Taipei University of Technology
Kuen-Cherng Lin , China Institute of Technology
Chi-Lung Chang , National Taipei University of Technology
pp. 565-569

A Signal-to-Interference Ratio Based Downlink Scheduling Scheme for WCDMA Mobile Communication System (Abstract)

Jen-Shun Yang , Industrial Technology Research Institute
Ray-Guang Cheng , National Taiwan University of Science and Technology
Chien-Chao Tseng , National Chiao Tung University
pp. 570-575

Performance Analysis on Location Tracking in PCS Networks (Abstract)

Shien-Da Chang , Tamkang University
Po-Jen Chuang , Tamkang University
pp. 576-582
Session A20: Encryption and Privacy

An Efficient Decryption Method for RSA Cryptosystem (Abstract)

Chia-Yao Chen , National Chiao Tung University
Yi-Shiung Yeh , National Chiao Tung University
Feng-Fu Su , TamKang University
Ren-Junn Hwang , TamKang University
pp. 585-590

ID-Based Ring Authenticated Encryption (Abstract)

Rui Xue , Chinese Academy of Sciences
Tianjie Cao , Chinese Academy of Sciences and China University of Mining and Technology
Dongdai Lin , Chinese Academy of Sciences
pp. 591-596

Key Agreement Protocol Based on Weil Pairing (Abstract)

Sheng-Hua Shiau , Tamkang University
Ming-Fuu Lin , Tamkang University
Ren-Junn Hwang , Tamkang University
pp. 597-602

Privacy-Enhanced Internet Storage (Abstract)

Willy Sisilo , University of Wollongong
Yi Mu , University of Wollongong
Fangguo Zhang , Sun Yat-Sen University
pp. 603-608

Convertible Undeniable Partially Blind Signatures (Abstract)

Zhenjie Huang , Xidian University and Zhangzhou Teachers College
Zhixiong Chen , Xidian University
Yumin Wang , Xidian University
pp. 609-614
Session A21: Search Engine and Information Retrieval

Fast Similarity Search in String Databases (Abstract)

Simon Sheu , National Tsing Hua University
Webber Huang , National Tsing Hua University
Alan Chang , National Tsing Hua University
pp. 617-622

Research of the Chinese Meta-search Engine Model Based on Intelligent Agent (Abstract)

Bo-qin Feng , Xi?an Jiaotong University
Hao-ming Wang , Xi?an Jiaotong University
pp. 623-628

Ad Hoc Image Retrieval Using Hierarchical Semantic-Based Index (Abstract)

Bo Yang , Pennsylvania State University
Ali R. Hurson , Pennsylvania State University
pp. 629-634

The Evaluations of FTF-IDF Scoring for Fresh Information Retrieval (Abstract)

Minoru Uehara , Toyo University
Yoshifumi Sakai , Tohoku University
Nobuyoshi Sato , Toyo University
pp. 635-640

A Fast URL Lookup Engine for Content-Aware Multi-Gigabit Switches (Abstract)

Li-Wen Huang , National Tsing Hua University
Rong-Tai Liu , BroadWeb Corporation
Ying-Tsun Chen , National Tsing Hua University
Nen-Fu Huang , National Tsing Hua University and BroadWeb Corporation
Chih-Ho Chen , National Tsing Hua University
pp. 641-646
Session A22: Distributed Systems

Distributed Branch-and-Bound Scheme for Solving the Winner Determination Problem in Combinatorial Auctions (Abstract)

Masaya Mito , Hiroshima University
Satoshi Fujita , Hiroshima University
Shigeaki Tagashira , Hiroshima University
Chen Qiao , Hiroshima University
pp. 661-666
Session A23: Agent and Distributed Systems II

Adaptive Power Management for Mobile Agent-Based Information Retrieval (Abstract)

Yu Jiao , Pennsylvania State University
Ali R. Hurson , Pennsylvania State University
pp. 675-680

Agent-Based Knowledge Acquisition in Network Management Domain (Abstract)

Toru Abe , Tohoku University
Hideaki Hatori , Tohoku University
Tetsuo Kinoshita , Tohoku University
Sameera Abar , Tohoku University
pp. 687-692

On Design of Agent Home Scheme for Prefetching Strategy in DSM Systems (Abstract)

Kuan-Ching Li , Providence University
Hsiao-Hsi Wang , Providence University
Ssu-Hsuan Lu , Providence University
Chun-Chieh Yang , Providence University
pp. 693-698
Session A24: Security, Cryptographic, and Watermarking

Secure OLSR (Abstract)

Cai Fu , Huazhong University of Science & Technology
Fan Hong , Huazhong University of Science & Technology
Liang Hong , Huazhong University of Science & Technology
pp. 713-718

An Improved RSA-Based Access Control Scheme for Hierarchical Groups (Abstract)

Jiali Cao , Sun Yat-sen University
Zheng-an Yao , Sun Yat-sen University
pp. 719-723

An AES S-Box to Increase Complexity and Cryptographic Analysis (Abstract)

Xinmei Wang , Xidian University
Baodian Wei , Sun Yat-sen University
Jingmei Liu , Xidian University
Xiangguo Cheng , Xidian University
pp. 724-728

ART2-Based Genetic Watermarking (Abstract)

Yueh-Hong Chen , National Chiao-Tung University
Koun-Tem Sun , National University of Tainan
Ying-Lan Chang , National University of Tainan
pp. 729-734
Session A25: Caching Algorithms and Scheduling

Impact of Document Types on the Performance of Caching Algorithms in WWW Proxies: A Trace Driven Simulation Study (Abstract)

Rachid El Abdouni Khayari , University of The Armed Forces
Michael Best , University of The Armed Forces
Axel Lehmann , University of The Armed Forces
pp. 737-742

Single Stream Image and Stream Network Prefetch in Streaming Media Proxy Caching (Abstract)

Kaiqin Fan , Huazhong University of Science and Technology
Chao Xie , Huazhong University of Science and Technology
Yunfa Li , Huazhong University of Science and Technology
Rong Hu , Huazhong University of Science and Technology
Hai Jin , Huazhong University of Science and Technology
pp. 743-748

An Improved Preemption Policy for Higher User Satisfaction (Abstract)

Joarder Kamruzzaman , Monash University
Iftekhar Ahmad , Monash University
Srinivas Aswathanarayaniah , Monash University
pp. 749-754

Concurrency Control Using Role Ordering (RO) Scheduler (Abstract)

Makoto Takizawa , Tokyo Denki University
Tomoya Enokido , Tokyo Denki University
pp. 755-760
Session A26: Wireless Networks

An Enhanced User-Dependent Perfect-Scheduling Multiple Access Protocol for Wireless Packet Network (Abstract)

Lei Zhou , Xidian University
Jing Liu , Xidian University
Guanghui Zhang , Xidian University
Jiandong Li , Xidian University
pp. 769-774

Fast Mode Decision for H.264/AVC Based on Macroblock Correlation (Abstract)

Hong Zhu , Xidian University
Yong Fang , Xidian University
Cheng-ke Wu , Xidian University
Yang-li Wang , Xidian University
pp. 775-780

Performance of Concatenated FEC under Fading Channel in Wireless-MAN OFDM System (Abstract)

Shuenn Gi Lee , Industrial Technology Research Institute
pp. 781-785

Group Partition and Restoration Strategies for Survivable WDM Networks (Abstract)

Chen-Shie Ho , National Taiwan University
Sy-Yen Kuo , National Taiwan University
Shih-Yi Yuan , Feng Chia University
pp. 786-791

Fast and Scalable Multi-TCAM Classification Engine for Wide Policy Table Lookup (Abstract)

Kwei-Bor Chen , National Tsing-Hua University and Ming-Hsin University of Science and Technology
Nen-Fu Huang , National Tsing-Hua University
Whai-En Chen , National Chiao-Tung University
pp. 792-797
Session A27: Traffic Analysis and Protocols

R-M/TCP: Protocol for Reliable Multi-Path Transport over the Internet (Abstract)

Toru Osuga , University of Tokyo
Hitoshi Aida , University of Tokyo
Kultida Rojviboonchai , University of Tokyo
pp. 801-806

Improving the Ramping up Behavior of TCP Slow Start (Abstract)

Hui-Tang Lin , National Cheng Kung University
Wen-Shyang Hwang , National Cheng Kung University
Ce-Kuen Shieh , National Cheng Kung University
Rung-Shiang Cheng , National Cheng Kung University
pp. 807-812

Conditional Drop Probability of RED Mechanism with UDP and TCP Traffic (Abstract)

Yung-Chung Wang , National Taipei University of Technology
pp. 813-820

Traffic Aggregation Based SIP over MPLS Network Architecture (Abstract)

Jacques Lebeau , Universite du Quebec
Ahmed K. Elhakeem , Concordia University
Bo Rong , Universite du Quebec
Michel Kadoch , Universite du Quebec
Maria Bennani , Universite du Quebec
pp. 827-832
Session A28: Parallel Systems

An Analysis on Adaptive Parallel Downloading Method (Abstract)

Junichi Funasaka , Hiroshima City University
pp. 835-840

A Constraint-Based Performance Comparison of Hypercube and Star Multicomputers with Failures (Abstract)

M. Rezazad , IPM School of Computer Science
H. Sarbazi-azad , Sharif University of Technology
pp. 841-846

2-State Alternator for Uniform Rings with Arbitrary Size (Abstract)

Tzong-Jye Liu , Feng Chia University
Chia-Lin Lee , Feng Chia University
pp. 847-852

Lattice-Based Precedence of Moderate Lock Modes on Objects (Abstract)

Tomoya Enokido , Tokyo Denki University
Yosuke Sugiyama , Tokyo Denki University
Makoto Takizawa , Tokyo Denki University
pp. 853-858

Design and Implementation of a Server-Aided PKI Service (SaPKI) (Abstract)

Liang Cai , Zhejiang University
Chun Chen , Zhejiang University
Xiaohu Yang , Zhejiang University
pp. 859-864
Session A29: e-Commerce and e-Entertainment on Grid Computing

Market-Oriented Multiple Resource Scheduling in Grid Computing Environments (Abstract)

Von-Wun Soo , National Tsing Hua University
Paul Hsueh-Mtn Chang , National Tsing Hua University
Chia-Hung Chien , National Tsing Hua University
pp. 867-872

Scalable Collision Detection for Massively Multiplayer Online Games (Abstract)

Graham Morgan , University of Newcastle
Kier Storey , University of Newcastle
pp. 873-878

Grid Services Mediation (Abstract)

P. J. Lovett , Coventry University
R. Anane , Coventry University
S. Y. Yan , Coventry University
K-M. Chao , Coventry University
A. N. Godwin , Coventry University
M. Younas , Coventry University
pp. 879-884

Characterizing Ad Hoc B2B Applications Using Ontologies and Complex Systems (Abstract)

Rosa Gil , Universitat Pompeu Fabra
Jaime Delgado , Universitat Pompeu Fabra
Zi? Choukair , (Institut de Recherche en Informatique de Toulouse
pp. 885-892

Correctness Proof Obligation for CoCTelS Telecom Services Composition Model (Abstract)

Zi? Choukair , Institut de Recherche en Informatique de Toulouse
pp. 893-900
Session A30: Information Networks and Applications I

CAM-Based Huffman Decoding Made Power Efficient (Abstract)

Hung-Yi Chang , I-Shou University
Chun-Liang Lee , Chunghwa Telecom Co., Ltd.
Yuan-Rung Yang , Chunghwa Telecom Co., Ltd.
Pi-Chung Wang , Chunghwa Telecom Co., Ltd.
pp. 909-914

Designing a Space-Oriented System for Ubiquitous Outdoor Kid?s Safety Care (Abstract)

Katsuhiro Takata , Hosei University
Jianhua Ma , Hosei University
Yusuke Shina , Hosei University
Bernady O. Apduhan , Kyushu Sangyo University
pp. 915-920

Fault-Tolerant Group Membership Protocols Using Physical Robot Messengers (Abstract)

Takuya Katayama , Japan Advanced Institute of Science and Technology
Xavier Défago , Japan Advanced Institute of Science and Technology and PRESTO, Japan Science and Technology Agency
Rami Yared , Japan Advanced Institute of Science and Technology
pp. 921-926

Relational Database Operations Modeling with UML (Abstract)

Indrakshi Ray , Colorado State University
Shuxin Yin , Colorado State University
pp. 927-932
Session A31: Information Networks and Applications II

A RS-SISO Algorithm for Serially Concatenated Continuous Phase Modulation (Abstract)

Lijun Jin , Xidian University
Jiandong Li , Xidian University
Jinhua Sun , Xidian University
pp. 941-946

A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization (Abstract)

Min-Hui Lin , Providence University
Wei-Liang Tai , National Chung Cheng University
Chin-Chen Chang , National Chung Cheng University
pp. 947-952

Vulnerability Profile for Linux (Abstract)

Ratsameetip Wita , Chulalongkorn University
Yunyong Teng-Amnuay , Chulalongkorn University
pp. 953-958
Session A32: Information Networks and Applications III

Integration of Specification-Based and CR-Based Approaches for GUI Testing (Abstract)

Hung-Hsing Chao , National Taipei University of Technology
Tung-Hung Tsai , National Taipei University of Technology
Woei-Kae Chen , National Taipei University of Technology
pp. 967-972

An Identity-Based Signature and Its Threshold Version (Abstract)

Xinmei Wang , Xidian University
Xiangguo Cheng , Xidian University
Jingmei Liu , Xidian University
pp. 973-977
Session A33: Information Networks and Applications IV

HSM: A Fast Packet Classification Algorithm (Abstract)

Bo Xu , Tsinghua University
Jun Li , Tsinghua University
Dongyi Jiang , Juniper Networks, Inc.
pp. 987-992

Java Application?s Packet Eavesdropper for Content Delivery Network (Abstract)

Tzu-Chi Huang , National Cheng Kung University
Ce-Kuen Shieh , National Cheng Kung University
Yu-Ben Miao , National Cheng Kung University
pp. 993-998

Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area Networks (Abstract)

Megumi Isogai , Okayama University
Nobuo Funabiki , Okayama University
Toru Nakanishi , Okayama University
Teruo Higashino , Osaka University
pp. 999-1004
Author Index

Author Index (PDF)

pp. 1017-1021
82 ms
(Ver )