The Community for Technology Leaders
Advanced Information Networking and Applications Workshops, International Conference on (2007)
Niagara Falls, Ontario, Canada
May 21, 2007 to May 23, 2007
ISBN: 0-7695-2847-3
TABLE OF CONTENTS
Introduction
Session 1: Intelligent Networking

Assessment of a Mobile Agent Based Routing Protocol for Mobile Ad-hoc Networks (Abstract)

Peter Graham , University of Manitoba, Canada
Lei Liang , University of Manitoba, Canada
pp. 1-5

Sentient Networks: A New Dimension in Network Capability (Abstract)

R.R. Rao , University of California San Diego, USA
B.S. Manoj , University of California San Diego, USA
R. Hegde , University of California San Diego, USA
B.D. Rao , University of California San Diego, USA
pp. 6-11

A Cell-Based Approach for Evolutionary Component Repositories for Intelligent Service Robots (Abstract)

In-Young Ko , Information and Communications University, Korea
Hyung-Min Koo , Information and Communications University, Korea
pp. 12-17
Session 2: Secrecy and Security

Rank Theorems for Forward Secrecy in Group Key Management Protocols (Abstract)

Sofiene Tahar , Concordia University, Canada
Amjad Gawanmeh , Concordia University, Canada
pp. 18-23

A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications (Abstract)

Peter Schachte , National ICT Australia
Vanessa Teague , The University of Melbourne, Australia
Amy Beth Corman , National ICT Australia
pp. 24-29

Service Provider Implementation of SIP Regarding Security (Abstract)

Holger Zuleger , Arcor AG&Co, Germany
Vesselin Tzvetkov , Arcor AG&Co, Germany
pp. 30-35
Session 3: Wireless Sensor Networks

Effective Caching in Wireless Sensor Network (Abstract)

Sajid Hussain , Acadia University, Canada
Md Ashiqur Rahman , Acadia University, Canada
pp. 43-47

A Location Mechanism with Mobile Reference Nodes in Wireless Sensor Networks (Abstract)

Kuo-Feng Huang , TamKang University, Taiwan
Ying-Hong Wang , TamKang University, Taiwan
Ting-Wei Chang , TamKang University, Taiwan
Chien-Min Lee , TamKang University, Taiwan
Chih-Peng Hsu , TamKang University, Taiwan
pp. 48-55

Efficient Battery Management for Sensor Lifetime (Abstract)

Malka N. Halgamuge , Student Member, IEEE; The University of Melbourne, Australia
pp. 56-61

Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor Model (Abstract)

Naohiro Hayashibara , Tokyo Denki University, Japan
Makoto Takizawa , Tokyo Denki University, Japan
Keiji Ozaki , Tokyo Denki University, Japan
pp. 62-67
Session 4: Network Mechanisms

Multi-Agent Coordination Mechanism Based on Indirect Interaction (Abstract)

Satoshi Kurihara , Osaka Univ., Japan
Kensuke Fukuda , National Institute of Informatics, Japan
Shinya Sato , NTT Network Innovation Labs.
Toshiharu Sugawara , NTT Communication Science Labs, Japan
pp. 68-72

Self-Healing in Distributed Network Environments (Abstract)

Andreas Rott , University of Paderborn, Germany
pp. 73-78

On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers (Abstract)

Vassilis Tsaoussidis , Democritus University of Thrace, Greece
Ageliki Tsioliaridou , Democritus University of Thrace, Greece
Christos V. Samaras , Democritus University of Thrace, Greece
pp. 79-84

Detecting Stepping-Stone with Chaff Perturbations (Abstract)

Han-Ching Wu , University of Houston, USA
Shou-Hsuan Stephen Huang , University of Houston, USA
pp. 85-90
Session 5: Grid, Clustering and P2P Computing

Ontology Based Grid Information Interoperation (Abstract)

Li Qi , Huazhong University of Science and Technology, China
Ling Chen , Huazhong University of Science and Technology, China
Chengwei Wang , Huazhong University of Science and Technology, China
Hai Jin , Huazhong University of Science and Technology, China
Shengli Li , Huazhong University of Science and Technology, China
Sheng Di , Huazhong University of Science and Technology, China
pp. 91-96

A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor Networks (Abstract)

Ping-Fang Fu , Tamkang University, Taiwan
Chin-Yung Yu , Tamkang University, Taiwan
Ying-Hong Wang , Tamkang University, Taiwan
pp. 97-102

An Update Propagation Strategy for Delay Reduction and Node Failure Tolerance in Peer-to-Peer Networks (Abstract)

Takahiro Hara , Osaka Univ., Japan
Toshiki Watanabe , Osaka Univ., Japan
Shojiro Nishio , Osaka Univ., Japan
Yuki Kido , Osaka Univ., Japan
pp. 103-108
Session 6: Network Security

Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings (Abstract)

Chen Yang , Xidian University, China
Furong Wang , Huazhong University of Sci. & Tech., China
Xinmei Wang , Xidian University, China
pp. 109-112

BER Analysis of a GMSK System Using Decision Feedback (Abstract)

Changhua Zhu , Xidian University, China
Jiandong Li , Xidian University, China
Xiandeng He , Xidian University, China
Changxing Pei , Xidian University, China
pp. 113-118

An Improved Approach to Secure Authentication and Signing (Abstract)

David Argles , University of Southampton, UK
Robert John Walters , University of Southampton, UK
Alex Pease , University of Southampton, UK
pp. 119-123
Session 7: Routing and Multicasting

Cross Layer Routing for Reliable Connections in IP over WDM Networks (Abstract)

Kuo-Wei Peng , Lunghwa University of Science and Technology, Taiwan
I-Hsuan Peng , National Central University, Taiwan
Yen-Wen Chen , National Central University, Taiwan
pp. 130-135

New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem (Abstract)

Chao Peng , Japan Advanced Institute of Science and Technology, Japan
Yasuo Tan , Japan Advanced Institute of Science and Technology, Japan
Laurence T. Yang , St. Francis Xavier University, Canada
pp. 136-141

A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation (Abstract)

Teruyuki Hasegawa , KDDI R&D Laboratories Inc., Japan
Shigehiro Ano , KDDI R&D Laboratories Inc., Japan
Atsushi Tagami , KDDI R&D Laboratories Inc., Japan
Masafumi Watari , KDDI R&D Laboratories Inc., Japan
pp. 142-147
Session 8: Network Applications and Video Streaming

Implementation and Field Experiments of a Remote Medical-Care Supporting System (Abstract)

Akio Koyama , Yamagata University, Japan
Takuya Numajiri , Yamagata University, Japan
Satoshi Sasaki , Yamagata University, Japan
Leonard Barolli , Fukuoka Institute of Technology, Japan
Junpei Arai , Yamagata College of Industry and Technology, Japan
pp. 148-153

Performance Evaluation of a New Teleconference System by High Definition Omni-Directional Video Transmission (Abstract)

Koji Hashimoto , Iwate Prefectural University, Japan
Yosuke Sato , Iwate Prefectural University, Japan
Yuya Maita , Iwate Prefectural University, Japan
Yoshitaka Shibata , Iwate Prefectural University, Japan
pp. 154-159

Adaptive Video Streaming over P2P Multi-Hop Path (Abstract)

Jianwei Niu , Beijing University of Aeronautics and Astronautics, China
Jinfeng Zhang , Beijing University of Aeronautics and Astronautics, China
Rui He , Beijing University of Aeronautics and Astronautics, China
Jian Ma , Nokia Research Center Beijing, China
pp. 160-165

Common-Cause Failure Analysis for Dynamic Hierarchical Systems (Abstract)

Liudong Xing , University of Massachusetts Dartmouth, USA
Akhilesh Shrestha , University of Massachusetts Dartmouth, USA
pp. 166-171
Session 9: Network Traffic Analysis

Quasi-Orthogonal Time Division Multiplexing and Its Applications under Rayleigh Fading Channels (Abstract)

Enchang Sun , Xidian University, China
Bin Tian , Xidian University, China
Kechu Yi , Xidian University, China
Yongchao Wang , Xidian University, China
pp. 172-176

Assessment of Code Quality through Classification of Unit Tests in VeriNeC (Abstract)

Ulrich Ultes-Nitsche , University of Fribourg, Switzerland
Dominik Jungo , University of Fribourg, Switzerland
David Buchmann , University of Fribourg, Switzerland
pp. 177-182

Specification Synthesis for Monitoring and Analysis of MANET Protocols (Abstract)

Johnny Wong , Iowa State University, USA
Wensheng Zhang , Iowa State University, USA
Xia Wang , Iowa State University, USA
Natalia Stakhanova , Iowa State University, USA
Samik Basu , Iowa State University, USA
pp. 183-187
Session 10: Detection and Presence Control

A Traffic Classification Algorithm for Intrusion Detection (Abstract)

Michael Rusinowitch , LORIA/INRIA-Lorraine, France
Adel Bouhoula , SUP'COM, Tunisia
Tarek Abbes , ISECS, France
pp. 188-193

A New Approach to Early Detection of an Unknown Worm (Abstract)

Takashi Katoh , Iwate Prefectural University, Japan
Yuuki Yamada , Iwate Prefectural University, Japan
Bhed Bahadur Bista , Iwate Prefectural University, Japan
Toyoo Takata , Iwate Prefectural University, Japan
pp. 194-198

Conditional Random Fields for Intrusion Detection (Abstract)

Baikunth Nath , Senior Member IEEE; National ICT Australia, University of Melbourne, Australia
Kotagiri Ramamohanarao , National ICT Australia, University of Melbourne, Australia
Kapil Kumar Gupta , National ICT Australia, University of Melbourne, Australia
pp. 203-208
Session 11: Protocols

WiMP-SCTP: Multi-Path Transmission Using Stream Control Transmission Protocol (SCTP) in Wireless Networks (Abstract)

Ching-Hsien Tsai , National Cheng Kung University, Taiwan
Chung-Ming Huang , National Cheng Kung University, Taiwan
pp. 209-214

Sizing Router Buffers for Large-Scale TCP/IP Networks (Abstract)

Go Hasegawa , Osaka University, Japan
Hiroyuki Hisamatsu , Osaka Electro-Communication University, Japan
Masayuki Murata , Osaka University, Japan
pp. 215-219

Recovery Protocols for Replicated Databases--A Survey (Abstract)

Francesc D. Munoz-Escoi , Instituto Tecnologico de Informatica, Spain
Luis H. Garcia-Munoz , Instituto Tecnologico de Informatica, Spain
Hendrik Decker , Instituto Tecnologico de Informatica, Spain
J. Enrique Armendariz-Inigo , Instituto Tecnologico de Informatica, Spain
pp. 220-227

Self-Similar Property for TCP Traffic under the Bottleneck Restrainment (Abstract)

Toshinori Sueyoshi , Kumamoto University, Japan
Takuo Nakashima , Kyushu Tokai University, Japan
pp. 228-233
Session 12: Network Architectures and Algorithms

Sharing Software Components Using a Service-Oriented, Distributed and Secure Infrastructure (Abstract)

Michael Schuenck , Federal University of Paraiba, Brazil
Gledson Elias , Federal University of Paraiba, Brazil
Joao Paulo F. de Oliveira , Federal University of Paraiba, Brazil
pp. 234-239

A New Mutable Nonlinear Transformation Algorithm for S-box (Abstract)

Atsushi Watanabe , Hirosaki University, Japan
Hiroshi Haruki , Hirosaki University, Japan
Yoshiei Hasegawa , Micronics Japan Co., Japan
Tomoyuki Nagase , Hirosaki University, Japan
Yoshio Yoshioka , Hirosaki University, Japan
Takeshi Saito , Hirosaki University, Japan
Shun Shimotomai , Hirosaki University, Japan
pp. 246-251

A Computational Approach to TSP Performance Prediction Using Data Mining (Abstract)

Dolores Rexachs , University Autonoma of Barcelona, Spain
Emilio Luque , University Autonoma of Barcelona, Spain
Paula Cecilia Fritzsche , University Autonoma of Barcelona, Spain
pp. 252-259
Session 1: Information Retrieval I

Evaluation of Open-Domain Question Answering Systems within a Time Constraint (Abstract)

Fernando Llopis , University of Alicante, Spain
Elisa Noguera , University of Alicante, Spain
Alberto Escapa , University of Alicante, Spain
Antonio Ferrandez , University of Alicante, Spain
pp. 260-265

Towards Answering How do I Questions Using Classification (Abstract)

Michal Cutler , Binghamton University
Kelvin Wu , Binghamton University
Lei Yu , Binghamton University
pp. 266-271

Arabic Sign Language Recognition an Image-Based Approach (Abstract)

M. Deriche , King Fahd University of Petroleum and Minerals, Saudi Arabia
S.I. Quadri , King Fahd University of Petroleum and Minerals, Saudi Arabia
M. Mohandes , King Fahd University of Petroleum and Minerals, Saudi Arabia
pp. 272-276
Session 2: Information Retrieval II

Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris Image (Abstract)

Lingge Sui , Chuangchun Finance College
Zhen Liu , Nagasaki Institute of Applied Science, Japan
Xiaodong Zhu , Ministry of Education, China
Yuanning Liu , JiLin University, China
pp. 277-282

Examining the Feasibility of Metasearch Based on Results of Human Judgements on Thai Queries (Abstract)

Shisanu Tongchim , National Institute of Information and Communications Technology, Thailand
Virach Sornlertlamvanich , National Institute of Information and Communications Technology, Thailand
Hitoshi Isahara , National Institute of Information and Communications Technology, Thailand
pp. 283-288

WaveQ: Combining Wavelet Analysis and Clustering for Effective Image Retrieval (Abstract)

Reda Alhajj , University of Calgary, Canada; Global University, Lebanon
Dany Gebara , University of Calgary, Canada
pp. 289-294
Session 3: Information Retrieval III

Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy (Abstract)

Xiaodan Zhang , Drexel University, USA
Xiaohua Hu , Drexel University, USA
Xuheng Xu , Drexel University, USA
pp. 295-300

A New Method of Cluster-Based Topic Language Model for Genomic IR (Abstract)

Jian Wen , National University of Defence Technology, China
Zhoujun Li , Beihang University, China
Lijuan Zhang , National University of Defence Technology, China
Xiaohua Hu , Drexel University, USA
Huowang Chen , National University of Defence Technology, China
pp. 301-306

Mining Visual Knowledge for Multi-Lingual Image Retrieval (Abstract)

Masashi Inoue , National Institute of Informatics, Japan
pp. 307-312
Session 4: Data Mining I

Filtering Spam Using Kolmogorov Complexity Estimates (Abstract)

L.M. Spracklin , University of Ottawa, Canada
L.V. Saxton , University of Regina, Canada
pp. 321-328

A Semi-Automatic Framework for Mining ERP Patterns (Abstract)

Dejing Dou , University of Oregon, USA
Don Tucker , University of Oregon, USA
Robert Frank , University of Oregon, USA
Jiawei Rong , University of Oregon, USA
Gwen Frishkoff , University of Pittsburgh, USA
Allen Malony , University of Oregon, USA
pp. 329-334

Effectiveness of Multi-Perspective Representation Scheme on Support Vector Machines (Abstract)

Jia Zeng , University of Calgary, Canada
Reda Alhajj , University of Calgary, Canada; Global University, Lebanon
pp. 335-340

An Investigation of Chip-Level Hardware Support for Web Mining (Abstract)

Darshika G. Perera , University of Victoria, Canada
Kin Fun Li , University of Victoria, Canada
pp. 341-348
Session 5: Information Extraction

Learning Relations and Information Extraction Rules for Protein Annotation (Abstract)

Jee-Hyub Kim , University of Geneva, Switzerland
Melanie Hilario , University of Geneva, Switzerland
pp. 349-354

ClusTex: Information Extraction from HTML Pages (Abstract)

Fatima Ashraf , University of Calgary, Canada
Reda Alhajj , University of Calgary, Canada; Global University, Lebanon
pp. 355-360

Extracting Significant Phrases from Text (Abstract)

Yuan J. Lui , University of Oxford, UK
Ani Calinescu , University of Oxford, UK
Richard Brent , Australian National University, Australia
pp. 361-366
Session 6: Data Mining II

Hybrid Clustering of Large Text Data (Abstract)

Jacob Kogan , UMBC, USA
pp. 367-372

Reduction in Dimensions and Clustering Using Risk and Return Model (Abstract)

Sayed W. Qaiyumi , University of London, UK
Daniel Stamate , University of London, UK
pp. 373-378

Using Web Directories for Similarity Measurement in Personal Name Disambiguation (Abstract)

Jun Adachi , National Institute of Informatics, Japan
Tomonari Masada , National Institute of Informatics, Japan
Quang Minh Vu , The University of Tokyo, Japan
Atsuhiro Takasu , National Institute of Informatics, Japan
pp. 379-384

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation (Abstract)

Tsuyoshi Takagi , Future University-Hakodate, Japan
Kouichi Sakurai , Kyushu University, Japan
Feng Bao , Institute for Infocomm Research, Singapore
Jianying Zhou , Institute for Infocomm Research, Singapore
Chunhua Su , Kyushu University, Japan
pp. 385-391

A Parallel Mining Algorithm for Closed Sequential Patterns (Abstract)

Sixue Bai , Nanchang Univ., China
Tian Zhu , Nanchang Univ., China
pp. 392-395
Session 1: Cryptographic Algorithms

Fast and Efficient Implementation of AES via Instruction Set Extensions (Abstract)

A.J. Elbirt , Member, IEEE; University of Massachusetts Lowell, USA
pp. 396-403

Efficient Conjunctive Keyword-Searchable Encryption (Abstract)

Tsuyoshi Takagi , Future University-Hakodate, Japan
Eun-Kyung Ryu , Future University-Hakodate, Japan
pp. 409-414
Session 2: Distributed Access Control and Firewalls

Advanced Packet Filter Placement Strategies for Carrier-Grade IP-Networks (Abstract)

Birger Todtmann , University of Duisburg-Essen, Germany
Erwin P. Rathgeb , University of Duisburg-Essen, Germany
pp. 415-423

Obligations for Role Based Access Control (Abstract)

Gansen Zhao , University of Kent, UK
David Chadwick , University of Kent, UK
Sassa Otenko , University of Kent, UK
pp. 424-431

Effective Storage Security in Incompletely Trusted Environment (Abstract)

Won-Chol Kim , University of Stavanger, Norway
Chunming Rong , University of Stavanger, Norway
pp. 432-437
Session 3: Wireless Ad Hoc and Sensor Network Security

An Efficient Scheme for User Authentication in Wireless Sensor Networks (Abstract)

Haixia Xu , Chinese Academy of Sciences, China
Bao Li , Chinese Academy of Sciences, China
Canming Jiang , Chinese Academy of Sciences, China
pp. 438-442

Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust (Abstract)

Sameer Pai , Cornell University, USA
Tanya Roosta , University of California, Berkeley, USA
Shankar Sastry , University of California, Berkeley, USA
Stephen Wicker , Cornell University, USA
pp. 443-450

Detecting Anomaly Node Behavior in Wireless Sensor Networks (Abstract)

Qinghua Wang , Mid Sweden University, Sweden
Tingting Zhang , Mid Sweden University, Sweden
pp. 451-456

Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks (Abstract)

Hung-Min Sun , National Tsing Hua University, Taiwan
Chien-Ming Chen , National Tsing Hua University, Taiwan
Shih-Pu Hsu , National Tsing Hua University, Taiwan
pp. 457-462
Session 4: Network Security Issues and Protocols

Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules (Abstract)

Vandana Gunupudi , University of North Texas, USA
Stephen R. Tate , University of North Texas, USA
pp. 463-469

Information Security Threats and Access Control Practices in Norwegian Businesses (Abstract)

Tormod Kalberg Sivertsen , Norwegian Defence Research Establishment (FFI), Norway
Chungming Rong , University of Stavanger (UiS); University of Oslo, Norway
Janne Merete Hagen , Gjovik University College, Norway
pp. 470-476

Context-Aware Security Policy for the Service Discovery (Abstract)

Laurent Gomez , SAP Labs, France
Slim Trabelsi , Institut Eurecom, France
Yves Roudier , Institut Eurecom, France
pp. 477-482

Adapting the UCON_ABC Usage Control Policies on CORBASec Infrastructure (Abstract)

Marcelo Shinji Higashiyama , Pontifical Catholic University of Parana, Brazil
Joni da Silva Fraga , Pontifical Catholic University of Parana, Brazil
Rafael R. Obelheiro , Pontifical Catholic University of Parana, Brazil
Lau Cheuk Lung , Pontifical Catholic University of Parana, Brazil
pp. 483-488
Session 5: Authorization Schemes

Enforcing Fine-Grained Authorization Policies for Java Mobile Agents (Abstract)

Giovanni Russello , Imperial College London, UK
Naranker Dulay , Imperial College London, UK
Changyu Dong , Imperial College London, UK
pp. 489-496

A Decentralized Authorization Architecture (Abstract)

Tage Stabell-Kulo , University of Tromso, Norway
Simone Lupetti , University of Tromso, Norway
Feike W. Dillema , University of Tromso, Norway
pp. 497-504

Conflict Detection and Resolution in Context-Aware Authorization (Abstract)

Amirreza Masoumzadeh , Sharif University of Technology, Iran
Rasool Jalili , Sharif University of Technology, Iran
Morteza Amini , Sharif University of Technology, Iran
pp. 505-511
Session 6: Authentication and Access Control

Authenticated Broadcast Encryption Scheme (Abstract)

Chik How Tan , Gjovik University College, Norway
Joseph Chee Ming Teo , Nanyang Technological University, Singapore
Jens-Are Amundsen , Gjovik University College, Norway
pp. 512-518

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems (Abstract)

Patrick Traynor , Pennsylvania State University, USA
Sunam Ryu , Pennsylvania State University, USA
Kevin Butler , Pennsylvania State University, USA
Patrick McDaniel , Pennsylvania State University, USA
pp. 519-524

A Certified Email Protocol Using Key Chains (Abstract)

S. Mauw , University of Luxembourg, Luxembourg
M. Torabi Dashti , CWI, The Netherlands
J. Cederquist , SQIG-IT and IST, TULisbon, Portugal
pp. 525-530
Session 7: Key Management

Heuristics for Improving Cryptographic Key Assignment in a Hierarchy (Abstract)

Selim G. Akl , Queen's University, Canada
Anne V.D.M. Kayem , Queen's University, Canada
Patrick Martin , Queen's University, Canada
pp. 531-536

An Identity-Based Key Management Framework for Personal Networks (Abstract)

Khaled Masmoudi , Institut National des Telecommunications, France
Hossam Afifi , Institut National des Telecommunications, France
pp. 537-543

Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients (Abstract)

Ford Long Wong , University of Cambridge, UK
Hoon Wei Lim , University of London, UK
pp. 544-550

A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies (Abstract)

H. Ragab Hassen , Compiegne University of Technology, France
H. Bettahar , Compiegne University of Technology, France
A. Bouabdallah , Compiegne University of Technology, France
pp. 551-556
Session 8: Distributed Intrusion Detection and Protection Systems

Detecting Coordinated Distributed Multiple Attacks (Abstract)

S. Mukkamala , New Mexico Tech, USA
R.B. Basnet , New Mexico Tech, USA
K. Yendrapalli , New Mexico Tech, USA
A.H. Sung , New Mexico Tech, USA
pp. 557-562

Intrusion Detection for Encrypted Web Accesses (Abstract)

Akira Yamada , KDDI R&D Laboratories Inc., Japan
Yutaka Miyake , KDDI R&D Laboratories Inc., Japan
Keisuke Takemori , KDDI R&D Laboratories Inc., Japan
Ahren Studer , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
pp. 569-576

Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets (Abstract)

Saewoong Bahk , Seoul National University, Korea
Byungseung Kim , Seoul National University, Korea
pp. 577-582
Session 9: Software Security

HTTPS Hacking Protection (Abstract)

Thawatchai Chomsiri , Mahasarakham University, Thailand
pp. 590-594

Towards an Aspect Oriented Approach for the Security Hardening of Code (Abstract)

Azzam Mourad , Concordia University, Canada
Mourad Debbabi , Concordia University, Canada
Marc-Andre Laverdiere , Concordia University, Canada
pp. 595-600
Session 10: PKI and Digital Signatures

An Online/Offline Signature Scheme Based on the Strong RSA Assumption (Abstract)

Ping Yu , University of North Texas, USA
Stephen R. Tate , University of North Texas, USA
pp. 601-606

Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences (Abstract)

Saikat Chakrabarti , University of Kentucky, USA
Santosh Chandrasekhar , University of Kentucky, USA
Mukesh Singhal , University of Kentucky, USA
Kenneth L. Calvert , University of Kentucky, USA
pp. 607-613

A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture (Abstract)

Michal Prochazka , Masaryk University, Czech Republic
Ludek Matyska , Masaryk University, Czech Republic
Daniel Kouril , Masaryk University, Czech Republic
pp. 614-619
Session 11: Privacy and Trust

Privacy Rights Management for Privacy Compliance Systems (Abstract)

Ronggong Song , National Research Council of Canada, Canada
George Yee , National Research Council of Canada, Canada
Larry Korba , National Research Council of Canada, Canada
pp. 620-625

The All-or-Nothing Anti-Theft Policy--Theft Protection for Pervasive Computing (Abstract)

Jakob Illeborg Pagter , The Alexandra Institute Ltd., Denmark
Michael Ostergaard Pedersen , University of Aarhus, Denmark
pp. 626-631

On the Contribution of Preamble to Information Hiding in Mimicry Attacks (Abstract)

H. Gunes Kayacik , Dalhousie University, Canada
A. Nur Zincir-Heywood , Dalhousie University, Canada
pp. 632-638
Session 1: Bioinformatics and Life Science Computing I

Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks (Abstract)

Nawar Malhis , University of British Columbia, Canada
Kelvin Xi Zhang , University of British Columbia, Canada
BF Francis Ouellette , University of British Columbia, Canada
pp. 639-644

A Spatial Indexing Approach for Protein Structure Modeling (Abstract)

Wendy Osborn , University of Lethbridge, Canada
pp. 645-650

Dealing with Some Conceptual Data Model Requirements for Biological Domains (Abstract)

Fabio Porto , Ecole Polytechnique Federal de Lausanne (EPFL), Switzerland
Philippe Picouet , Ecole Nationale Superieure des Telecommunications de Bretagne (ENSTB), France
Sergio Lifschitz , Pontificia Universidade Catolica do Rio de Janeiro, Brazil
Jose Antonio Fernandes de Macedo , Ecole Polytechnique Federal de Lausanne (EPFL), Switzerland
pp. 651-656
Session 2: Bioinformatics and Life Science Computing II

A Greedy Correlation-Incorporated SVM-Based Algorithm for Gene Selection (Abstract)

Sanguthevar Rajasekaran , University of Connecticut, USA
Mingjun Song , University of Connecticut, USA
pp. 657-661

Investigation of Relationships among Excavate Taxa Using a New Quartet-Based Phylogenetic Analysis Method (Abstract)

Pinghao Wang , University of Sydney, Australia
Monther Tarawneh , University of Sydney, Australia
Albert Zomaya , University of Sydney, Australia
Bing Bing Zhou , University of Sydney, Australia
pp. 662-667

Markov Models to Classify M. tuberculosis Spoligotypes (Abstract)

Christophe Sola , Institute Pasteur de Guadeloupe, France
Georges Valetudie , Universite Antilles-Guyane, France
Jacky Desachy , Universite Antilles-Guyane, France
pp. 668-671
Session 3: Bioinformatics and Life Science Computing III

A Graph Based Approach to Discover Conserved Regions in DNA and Protein Sequences (Abstract)

Santan Challa , University of Manitoba, Canada
Parimala Thulasiraman , University of Manitoba, Canada
pp. 672-677

Attractive Feature Reduction Approach for Colon Data Classification (Abstract)

Reda Alhajj , University of Calgary, Canada; Global University, Lebanon
Mohammed Al-Shalalfa , University of Calgary, Canada
pp. 678-683

Biological Sequence Clustering and Classification with a Hybrid Method and Dynamic Programming (Abstract)

Chengcui Zhang , University of Alabama at Birmingham, USA
Wei-Bang Chen , University of Alabama at Birmingham, USA
Xin Chen , University of Alabama at Birmingham, USA
pp. 684-689

Biological Systems Analysis Using Inductive Logic Programming (Abstract)

Yoshitaka Yamamoto , Graduate University for Advanced Studies, Japan
Katsumi Inoue , National Institute of Informatics, Japan; Graduate University for Advanced Studies, Japan
Andrei Doncescu , Laboratory of Analysis and Architecture of Systems, CNRS, France
pp. 690-695
Session 4: Bioinformatics and Life Science Computing IV

Database-Driven Grid Computing with GridBASE (Abstract)

Hans De Sterck , University of Waterloo, Canada
Chen Zhang , University of Waterloo, Canada
Aleks Papo , University of Waterloo, Canada
pp. 696-701

Parallel Contour Matching and 3D Partial Retrieval in Bio-Image Database (Abstract)

Saeid Belkasim , Georgia State University, USA
Yi Pan , Georgia State University, USA
Yong Li , Georgia State University, USA
Xiujuan Chen , Georgia State University, USA
pp. 702-706

Computational Methods for Analysis of Cryptic Recombination in the Performance of Genomic Recombination Detection Software (Abstract)

Jamal Alhiyafi , Wayne State University, USA
Felicitas S. Gonzales , Wayne State University, USA
Melphine Harriott , Wayne State University, USA
Deborah Jurczyszyn , Wayne State University, USA
Raquel P. Ritchie , Wayne State University, USA
Jeffrey L. Ram , Wayne State University, USA
Cavitha Sebesan , Wayne State University, USA
Shiyong Lu , Wayne State University, USA
pp. 707-712

A Grid System for the Ingestion of Biological Data into a Relational DBMS (Abstract)

Maria Mirto , University of Salento, Italy
Sandro Fiore , University of Salento, Italy
Giovanni Aloisio , University of Salento, Italy
Massimo Cafaro , University of Salento, Italy
pp. 713-718
Session 5: Bioinformatics and Life Science Computing V

A Circular Hamming Distance, Circular Gumbel Distribution, RNA Relics and Primitive Genome (Abstract)

Andres Moreira , University J. Fourier, France
Jacques Demongeot , University J. Fourier, France
pp. 719-726

Kinetic Analysis of Ligand-Receptor Complex Formation with the Aid of Computer Simulation (Abstract)

Ryuzo Azuma , RIKEN Genomic Sciences Center, Japan
Hiroshi Kobayashi , Chiba University, Japan
Akihiko Konagaya , RIKEN Genomic Sciences Center, Japan; Tokyo Institute of Technology, Japan
pp. 727-732

Application of Double Clustering to Gene Expression Data for Class Prediction (Abstract)

Mohammed Al-Shalalfa , University of Calgary, Canada
Reda Alhajj , University of Calgary, Canada; Global University, Lebanon
pp. 733-738

Efficiency of Hybrid Normalization of Microarray Gene Expression: A Simulation Study (Abstract)

Mehdi Pirooznia , University of Southern Mississippi, USA
Youping Deng , University of Southern Mississippi, USA
pp. 739-744

Crick's Hypothesis Revisited: The Existence of a Universal Coding Frame (Abstract)

Ryan A. Rossi , Coastal Carolina University, USA
Jean-Louis Lassez , Coastal Carolina University, USA
Axel E. Bernal , University of Pennsylvania, USA
pp. 745-751
Session 1: Software Environments and Simulations

Sim-PowerCMP: A Detailed Simulator for Energy Consumption Analysis in Future Embedded CMP Architectures (Abstract)

Juan L. Aragon , Departamento de Ingenieria y Tecnologia de Computadores, Spain
Manuel E. Acacio , Departamento de Ingenieria y Tecnologia de Computadores, Spain
Antonio Flores , Departamento de Ingenieria y Tecnologia de Computadores, Spain
pp. 752-757

An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalar (Abstract)

Yongxin Zhu , Shanghai Jiao Tong University, China
Weiwei Chen , Shanghai Jiao Tong University, China
Mingliang Lin , Shanghai Jiao Tong University, China
Weng-Fai Wong , National University of Singapore, Singapore
Rongrong Zhong , Shanghai Jiao Tong University, China
pp. 758-763

Synthetic Trace-Driven Simulation of Cache Memory (Abstract)

Aris Efthymiou , University of Edinburgh, UK
Rahman Hassan , Institute for System Level Integration, UK
Nigel Topham , University of Edinburgh, UK
Antony Harris , ARM Ltd., UK
pp. 764-771
Session 2: Scheduling Algorithms

A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems (Abstract)

Qingxu Deng , Northeastern University, China
Nan Guan , Northeastern University, China
Ge Yu , Northeastern University, China
Mingsong Lv , Northeastern University, China
pp. 772-777

Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems (Abstract)

Xiao Qin , New Mexico Institute of Mining and Technology, USA
Kiranmai Bellam , New Mexico Institute of Mining and Technology, USA
Wei Luo , HuaZhong University of Science and Technology, China
pp. 778-783

A Flexible Scheduling Framework for Deeply Embedded Systems (Abstract)

Jorg Nolte , Brandenburg University of Technology, Germany
Karsten Walther , Brandenburg University of Technology, Germany
pp. 784-791
Session 3: Architecture Design and Synthesis

Exploring Functional Unit Design Space of VLIW Processors for Optimizing Both Performance and Energy Consumption (Abstract)

Laurence T. Yang , St. Francis Xavier University, Canada
Wei Zhang , Southern Illinois University Carbondale, USA
Abhishek Pillai , Southern Illinois University Carbondale, USA
pp. 792-797

An Area-Efficient Approach to Improving Register File Reliability against Transient Errors (Abstract)

Laurence T. Yang , St. Francis Xavier University, Canada
Mallik Kandala , Southern Illinois University Carbondale, USA
Wei Zhang , Southern Illinois University Carbondale, USA
pp. 798-803

Hardware-Software Cosynthesis of Multiprocessor Embedded Architectures (Abstract)

Gul N. Khan , Ryerson University, Canada
Usman Ahmed , Ryerson University, Canada
pp. 804-810

Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach (Abstract)

Wei Zhang , Southern Illinois University Carbondale, USA
Dimitrios Kagaris , Southern Illinois University Carbondale, USA
Abhishek Pillai , Southern Illinois University Carbondale, USA
pp. 811-815
Session 4: Embedded Applications

Embedded Intelligent Intrusion Detection: A Behavior-Based Approach (Abstract)

Richard A. Peters , Vanderbilt University School of Engineering, USA
Adrian P. Lauf , Vanderbilt University School of Engineering, USA
William H. Robinson , Vanderbilt University School of Engineering, USA
pp. 816-821

High-Flexibility Rekeying Processor for Key Management in Secure Multicast (Abstract)

Ralf Laue , Technische Universitat Darmstadt, Germany
Sorin A. Huss , Technische Universitat Darmstadt, Germany
Abdulhadi Shoufan , Technische Universitat Darmstadt, Germany
pp. 822-829

A Soft-Core for Pattern Recognition (Abstract)

V. Rodellar , Universidad Politecnica de Madrid, Spain
A. Alvarez-Marquina , Universidad Politecnica de Madrid, Spain
E. Martinez de Icaya , Universidad Politecnica de Madrid, Spain
P. Gomez-Vilda , Universidad Politecnica de Madrid, Spain
C. Gonzalez-Concejero , Universidad Politecnica de Madrid, Spain
pp. 830-834

Fault Tolerance in Small World Cellular Neural Networks for Image Processing (Abstract)

Minoru Uehara , Toyo University, Japan
Katsuyoshi Matsumoto , Toyo University, Japan
Hideki Mori , Toyo University, Japan
pp. 835-839

An Improved RAIM Scheme for Processing Multiple Outliers in GNSS (Abstract)

Wei Guo , Shanghai Jiao Tong University, China
Junjie Ni , Shanghai Jiao Tong University, China
Yongxin Zhu , Shanghai Jiao Tong University, China
pp. 840-845
Session 1: Network Technologies

Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks (Abstract)

Shih-Hao Chang , Liverpool John Moores University, UK
M. Merabti , Liverpool John Moores University, UK
H.M. Mokhtar , Liverpool John Moores University, UK
pp. 846-851

Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks (Abstract)

Rubem Pereira , Liverpool John Moores University, UK
Sudath Indrasinghe , Liverpool John Moores University, UK
John Haggerty , Liverpool John Moores University, UK
pp. 852-857

Scalable Automaton Matching for High-Speed Deep Content Inspection (Abstract)

Kuo-Kun Tseng , National Chiao Tung University, Taiwan
Chen-Chou Hung , National Chiao Tung University, Taiwan
Ying-Dar Lin , National Chiao Tung University, Taiwan
Yuan-Cheng Lai , National Taiwan University, Taiwan
pp. 858-863
Session 2: Network Technologies

Mobile Event Monitoring Protocol for Wireless Sensor Networks (Abstract)

M. Merabti , Liverpool John Moores University, UK
F. Bouhafs , Liverpool John Moores University, UK
H. Mokhtar , Liverpool John Moores University, UK
pp. 864-869

MAC Address Translation for Enabling Scalable Virtual Private LAN Services (Abstract)

Po-Yen Lin , National Yang Ming University, Taiwan
Chia-Tai Chan , National Yang Ming University, Taiwan
Pi-Chung Wang , National Chung Hsing University, Taiwan
pp. 870-875

Real Time Scheduling for Audio and Video Streams (Abstract)

Ella Pereira , Edge Hill University, UK
Rubem Pereira , Liverpool John Moores University, UK
pp. 876-881
Session 3: Network Technologies

A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET (Abstract)

Tarag Fahad , Liverpool John Moores University, UK
Robert Askwith , Liverpool John Moores University, UK
Madjid Merabti , Liverpool John Moores University, UK
Djamel Djenouri , CERIST, Algeria
pp. 882-887

A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service Performance (Abstract)

Lin-Yi Peng , National Taiwan Normal University, Taiwan
Tsung-Mao Chen , National Taiwan Normal University, Taiwan
Kenvi Wang , John Moors University, Liverpool, UK
Szu-Yu Chen , National Taiwan Normal University, Taiwan
pp. 894-899

Multi-Purpose Models for QoS Monitoring (Abstract)

Viktor Leijon , Lulea University of Technology, Sweden
Stefan Wallin , Lulea University of Technology, Sweden
pp. 900-905
Session 4: Network Applications

Buffer Management for Multimedia QoS Control over HSDPA Downlink (Abstract)

Suleiman Y. Yerima , University of Glamorgan, UK
Khalid Al-Begain , University of Glamorgan, UK
pp. 912-917

Planning and Design of TWAREN: Advanced National Research and Education Network in Taiwan (Abstract)

Te-Lung Liu , The National Center for High-Performance Computing, Taiwan
C. Eugene Yeh , The National Center for High-Performance Computing, Taiwan
pp. 918-922

A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality (Abstract)

M. Merabti , Liverpool John Moores University, UK
A. Taleb-Bendiab , Liverpool John Moores University, UK
E.C.L. Watts , Liverpool John Moores University, UK
pp. 923-928

Bridging the Gap between Networked Appliances and Virtual Worlds (Abstract)

D. Llewellyn-Jones , Liverpool John Moores University, UK
M. Merabti , Liverpool John Moores University, UK
A. El Rhalibi , Liverpool John Moores University, UK
P. Fergus , Liverpool John Moores University, UK
pp. 935-940
Session 1: Service-oriented Architectures in Embedded Systems

Making Embedded Software Development More Efficient with SOA (Abstract)

Peter Schramm , University of Dortmund, Germany
Martin Krogmann , Infineon Technologies AG, Germany
Daniel Barisic , Infineon Technologies AG, Germany
Guido Stromberg , Infineon Technologies AG, Germany
pp. 941-946

Service-Oriented Device Communications Using the Devices Profile for Web services (Abstract)

Antoine Mensch , Schneider Electric
Francois Jammes , Schneider Electric
Harm Smit , Schneider Electric
pp. 947-955

Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services (Abstract)

Frank Golatowski , University of Rostock, Germany
Hendrik Bohn , University of Rostock, Germany
Andreas Bobek , University of Rostock, Germany
Elmar Zeeb , University of Rostock, Germany
pp. 956-963

Bilateral Service Mapping Approaches between the Different Service Oriented Architectures Web Services and UPnP (Abstract)

Brigitte Oesterdiekhoff , incony AG, Germany
Hendrik Bohn , University of Rostock, Germany
Chris Loeser , C-LAB Germany
Markus Zajac , incony AG, Germany
pp. 964-969
Session 2: Key Services in Service-oriented Architectures

Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture (Abstract)

Matthias Grawinkel , University of Paderborn, Germany
Michael Ditze , University of Paderborn, Germany
pp. 970-976

Architecture and Models for Self-Adaptability of Transport Protocols (Abstract)

Christophe Chassot , LAAS-CNRS, France
Francois Armando , LAAS-CNRS, France
Nicolas Van Wambeke , LAAS-CNRS, France
Ernesto Exposito , LAAS-CNRS, France
pp. 977-982

Convergent Online Charging for Context-Aware Mobile Services (Abstract)

Jurgen Tacken , Orga Systems GmbH, Germany
Stephan Flake , Orga Systems GmbH, Germany
Frank Bormann , Orga Systems GmbH, Germany
pp. 983-988

Comparative Evaluation of Converged Service-Oriented Architectures (Abstract)

Yolande Berbers , Katholieke Universiteit Leuven, Belgium
Davy Preuveneers , Katholieke Universiteit Leuven, Belgium
Julien Pauty , Katholieke Universiteit Leuven, Belgium
Dimitri Van Landuyt , Katholieke Universiteit Leuven, Belgium
Wouter Joosen , Katholieke Universiteit Leuven, Belgium
pp. 989-994
Session 3: Service Management & Service Mediation

Conceptual Framework for a Comprehensive Service Management Middleware (Abstract)

Patrick Martin , Queen's University, Canada
Farhana Zulkernine , Queen's University, Canada
pp. 995-1000

An Analysis of Web Services Mediation Architecture and Pattern in Synapse (Abstract)

Elizabeth Chang , Curtin University of Technology, Australia
Chen Wu , Curtin University of Technology, Australia
pp. 1001-1006

An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change Management (Abstract)

Youwei Xu , Wuhan University, China
Ruliang Xiao , Wuhan University, China
Yang Xu , Wuhan University, China
Lina Fang , Wuhan University, China
Yan Yang , Wuhan University, China
Xinguo Deng , Wuhan University, China
Ling Li , Wuhan University, China
Shengqun Tang , Wuhan University, China
pp. 1007-1014
Author Index

Author Index (PDF)

pp. 1015
86 ms
(Ver 3.1 (10032016))