The Community for Technology Leaders
Computer and Computational Sciences, International Multi-Symposiums on (2006)
Hangzhou, Zhejiang, China
June 20, 2006 to June 24, 2006
ISBN: 0-7695-2581-4
TABLE OF CONTENTS
Introduction
Symposium of Networks and Network Security (NSNS'06) - I

A Bio-inspired Multidimensional Network Security Model (Abstract)

Daxin Liu , Harbin Engineering University, China
Huiqiang Wang , Harbin Engineering University, China
Xueyao Li , Harbin Engineering University, China
Ruijuan Zheng , Harbin Engineering University, China
pp. 3-7

Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, China
Haifeng Qian , Shanghai Jiao Tong University, China
Licheng Wang , Shanghai Jiao Tong University, China
Feng Cao , Shanghai Jiao Tong University, China
pp. 8-12

An Improvement of an Identity-Based Key Issuing Protocol (Abstract)

Licheng Wang , Shanghai Jiao Tong University, China
Zhenfu Cao , Shanghai Jiao Tong University, China
Feng Cao , Shanghai Jiao Tong University, China
pp. 13-18

The Real-time Judging System of Figure Skating Based-on WLAN (Abstract)

Jibao Lai , Harbin Engineering University, China
Jun Yao , Harbin Engineering University, China
Jijuan Wu , Harbin Engineering University, China
Long Liu , Harbin Engineering University, China
pp. 19-24

Research of Mobile IPv6 Application Based On Diameter Protocol (Abstract)

Yanheng Liu , Jilin University, China
Xuegang Yu , Jilin University, China
Xiaodong Li , Jilin University, China
Da Wei , Jilin University, China
pp. 25-29

A Novel Quantitative Analysis Method for Network Survivability (Abstract)

Guosheng Zhao , Harbin Engineering University, China
Huiqiang Wang , Harbine Engineering University, China
Jian Wang , Harbin Engineering University, China
pp. 30-33

Secure Byzantine Fault Tolerant LDAP System (Abstract)

Yueting Zhuang , Zhejiang University, China
Xiuqun Wang , Zhejiang University, China
Honglun Hou , Zhejiang University, China
pp. 34-39

Designated Verifier Proxy Signature Scheme from Bilinear Pairings (Abstract)

Rongxing Lu , Shanghai Jiao Tong University, China
Zhenfu Cao , Shanghai Jiao Tong University, China
Xiaolei Dong , Shanghai Jiao Tong University, China
Renwang Su , Zhejiang Gongshang University, China
pp. 40-47

A Proxy-Protected Signature Scheme Based on Finite Automaton (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, China
Feng Cao , Shanghai Jiao Tong University, China
pp. 48-55

A Novel Model for Detecting Application Layer DDoS Attacks (Abstract)

Yi Xie , Sun Yat-Sen University, China
Shun-Zheng Yu , Sun Yat-Sen University, China
pp. 56-63

Resource Efficient Hardware Design for RSA (Abstract)

Shuhua Wu , Information Engineering University, China
Yuefei Zhu , Information Engineering University, China
Qiong Pu , Information Engineering University, China
pp. 64-68

A Secure Hierarchical Fragile Watermarking Method with Tamper Localization (Abstract)

Yan Zhu , Peking University, China
Xianhai Zhang , Harbin Engineering University, China
Yongtian Yang , Harbin Engineering University, China
pp. 69-74

MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy (Abstract)

Shaobin Cai , Harbin Engineering University, China
Wenbin Yao , Harbin Engineering University, China
Nianmin Yao , Harbin Engineering University, China
Guochang Gu , Harbin Engineering University, China
pp. 75-80

An Efficient ID-Based Multi-proxy Multi-Signature Scheme (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, China
Sheng Guo , Shanghai Jiao Tong University, China
Rongxing Lu , Shanghai Jiao Tong University, China
pp. 81-88

Group Oriented Deniable Authentication Protocol (Abstract)

Rongxing Lu , Shanghai Jiao Tong University, China
Renwang Su , Zhejiang Gongshang University, China
Zhenfu Cao , Shanghai Jiao Tong University, China
Xiaolei Dong , Shanghai Jiao Tong University, China
pp. 89-92

A Security Grid Portal Using PKI and Online Proxy Certificate Repository (Abstract)

Xiaodong Shen , Zhejiang University of Technology, China
Tim Chen , Zhejiang University of Technology, China
Deren Chen , Zhejiang University, China
Jie Jiang , Zhejiang University, China
pp. 93-96

ERAS - an Emergency Response Algorithm for Survivability of Critical Services (Abstract)

Huiqiang Wang , Harbine Engineering University, China
Jian Wang , Harbin Engineering University, China
Guosheng Zhao , Harbin Normal University, China
pp. 97-100

An Algorithm of Topology Discovery in Large Multi-Subnet Physical Network (Abstract)

Kaihua Xu , 1Institute of Digital Space Technology, China
Jiwei Cao , Central China Normal University, China
Shaohua Tao , Central China Normal University, China
Yuhua Liu , Central China Normal University, China
pp. 101-104

An Identification System Combined with Fingerprint and Cryptography (Abstract)

Hao Li , Ocean University of China, China
Peishun Liu , Ocean University of China, China
pp. 105-108

Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, China
Shengbao Wang , Shanghai Jiao Tong University, China
Haiyong Bao , Shanghai Jiao Tong University, China
pp. 109-112

Cryptanalysis of Chang-Lin-Lam?s ID-based Multisignature Scheme (Abstract)

Haifeng Qian , Shanghai Jiao Tong University, China
Zhenfu Cao , Shanghai Jiao Tong University, China
Sheng Guo , Shanghai Jiao Tong University, China
Licheng Wang , Shanghai Jiao Tong University, China
pp. 113-116

Cryptanalysis on a Proxy Multi-Signature Scheme (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, China
Feng Cao , Shanghai Jiao Tong University, China
pp. 117-120

An Agent-Oriented Network Worm Defense System based on Optimized Path (Abstract)

Ye Guo , Zhejiang University, China
Miaoliang Zhu , Zhejiang University, China
pp. 121-128
Symposium of Networks and Network Security (NSNS'06) - II

Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux (Abstract)

Hongfeng Zhu , zhfzpku@sina.com
Tianhua Liu , liutianhua@sina.com
Chuansheng Zhou , jasoncs@126.com
Guiran Chang , chang@neu.edu.cn
pp. 129-134

Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings (Abstract)

Miaomiao Zhang , Shanghai Jiao Tong University, China
Jianhua Li , Shanghai Jiao Tong University, China
Gongliang Chen , Shanghai Jiao Tong University, China
pp. 135-141

Worm Intrusion Alarm Modeling Based on Network Traffic Character (Abstract)

Lu Guang , Zhejiang University, China
Yu Fei , Graduate School of Chinese Academy of Sciences, China
Miaoliang Zhu , Zhejiang University, China
Guangxue Yue , Hunan University, China
pp. 142-147

Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, China
Zhenchuan Chai , Shanghai Jiao Tong University, China
Yuan Zhou , Shanghai Jiao Tong University, China
pp. 148-154

Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning (Abstract)

Mingzeng Hu , Harbin Institute of Technology, China
Hongli Zhang , Harbin Institute of Technology, China
Hui He , Harbin Institute of Technology, China
pp. 155-159

A New Method of TOE Architecture Based on the ML403 Development Board in Linux (Abstract)

Guiran Chang , Northeastern University, China
Chuansheng Zhou , Northeastern University, China
Tianhua Liu , Northeastern University, China
Hongfeng Zhu , Northeastern University, China
pp. 160-166

A Structured P2P System with Match Path and Probability Balance Tree (Abstract)

G. X. Wu , Southeast University, China
L. B. Xu , Southeast University, China
F. Q. You , Southeast University, China
pp. 167-174

An Integer Wavelet Based Multiple Logo-watermarking Scheme (Abstract)

Decai Huang , Zhejiang University of Technology, China
Duanyang Liu , Zhejiang University of Technology, China
Yuan Yuan , Zhejiang University of Technology, China
pp. 175-179

Efficient Split Scheduling Scheme for Traffic Balancing on Multi-Link Networks (Abstract)

Chenggui Zhao , South China University of Technology, China
Yong Qin , South China University of Technology, China
pp. 180-185

Adaptive Prefix Query (APQ) For Route Table Finding In Overnet (Abstract)

Chang-jia Chen , Beijing Jiaotong University, China
Yong-xiang Zhao , Beijing Jiaotong University, China
pp. 186-191

An Innovation Three Color Marker in DiffServ Networks (Abstract)

Shaohua Yu , Huazhong University of Science and Technology, China
Junrui Hao , Huazhong University of Science and Technology, China
pp. 192-198

State-of-Art Techniques for Object Caching over the Internet (Abstract)

Wenyu Qu , The University of Tokyo, Japan
Takashi Nanya , The University of Tokyo, Japan
Bo Jiang , Dalian Maritime University, China
Keqiu Li , Dalian Maritime University, China
pp. 199-206

A Computer Immune System: LAN Immune System Model based on Host (LISMH) (Abstract)

Ruijuan Zheng , Harbin Engineering Univesity, China
Huiqiang Wang , Harbin Engineering University, China
pp. 207-211
Symposium of Algorithms, Numerical Methods, Simulations, Computations (SANSC'06)

Parameters Optimization and Simulation of Transducer Based on Finite Element Method in Electrical Capacitance Tomography System (Abstract)

Deyun Chen , Harbin University of Science and Technology, China
Mouzun Li , Harbin University of Science and Technology, China
pp. 212-216

Diversity Guaranteed Ant Colony Algorithm Based on Immune Strategy (Abstract)

Ling Chen , Yangzhou University, China
Jing Guo , Yangzhou University, China
Yixin Chen , Washington University in St. Louis, USA
Ling Qin , Nanjing University of Aeronautics and Astronautics, China
Jianli Luo , Wenzhou University, China
pp. 217-223

A Novel FCM?s Initial Parameters Acquisition Method (Abstract)

Leiting Chen , UESTC, China
Ping Kuang , UESTC, China
Peisu Xiang , Southwest University for Nationality, China
pp. 224-229

A Dynamic Stochastic Heuristical Algorithm for Flexible Workload Management * (Abstract)

Qingxin Zhu , University of Electronic Science and Technology of China, China
Yong Liao , University of Electronic Science and Technology of China, China
Xudong Chen , University of Electronic Science and Technology of China, China
Ping Kuang , University of Electronic Science and Technology of China, China
pp. 230-236

Distance Ratio Fractal for Complex Mapping z\leftarrow z^a (Abstract)

Xizhe Zhang , Jilin University, China
Tianyang Lv , Jilin University, China
Zhengxuan Wang , Jilin University, China
Shaobin Huang , Harbin Engineering University, China
pp. 237-243

Constructions of Euclidean Geometry LDPC Codes and Performance Analysis in MIMO-OFDM System (Abstract)

Lei Shen , Zhejiang University, China
Fangni Chen , Zhejiang University, China
Shiju Li , Zhejiang University, China
pp. 244-248

A New Computing Model for C-Like Hardware Description Languages (Abstract)

Jimin Wang , Zhejiang University, China
Kang Sun , Zhejiang University, China
Lingdi Ping , Zhejiang University, China
Jiebing Wang , Zhejiang University, China
pp. 249-256

Research of Transmission and Control of Real-time MPEG-4VideoStreaming for Multi-channel Over Wireless QoS Mechanism (Abstract)

Jianghua Li , Harbin Engineering University, China
Longwen Li , Harbin Engineering University, China
pp. 257-261

Application of Optimal Search Theory in the Detection of Water Pollution Accident Source (Abstract)

Ying Liu , Southwest Jiaotong University, China
Qingxin Zhu , University of Electronic Science and Technology, China
Fan Zhang , Southwest Jiaotong University, China
Dan Liu , Southwest Jiaotong University, China
pp. 262-265

Emission Image Reconstruction Based on Incremental Optimization Transfer Algorithm (Abstract)

Jun Yu , Huazhong University of Science and Technology, China
Jianhua Yan , Huazhong University of Science and Technology, China
pp. 266-269

Complex Data Flow Matching Algorithm Based on TDG (Abstract)

Guangshun Li , Harbin Engineering University, China
Donghai Li , Harbin Engineering University, China
Guangsheng Ma , Qufu Normal University, China
pp. 270-273

Sharing Methods of Multi-objective Functions Based on TED (Abstract)

Guangsheng Ma , Harbin Engineering University, China
Junhua Wu , Harbin Engineering University, China
Guangshun Li , Qufu Normal University, China
pp. 274-278

Mesh Generation from 3D Scattered Data in ACL Surgical Navigation System (Abstract)

Xuemei Huang , Shandong University of Technology, China
Wenqiang Zhang , Fudan University, China
pp. 279-282

Combining Couvreur?s Algorithm with Bitstate-Hashing for Emptiness Check (Abstract)

Yige Li , Shanghai Jiao Tong University, China
Kanglin Xie , Shanghai Jiao Tong University, China
Tao Hao , Shanghai Jiao Tong University, China
pp. 283-286

A New Multiple Classifiers Combination Algorithm (Abstract)

Jianpei Zhang , Harbin Engineering University, China
Lili Cheng , Harbin Engineering University, China
Jun Ma , Harbin Engineering University, China
pp. 287-291
Symposium of Optimization, Artificial Intelligence,and Neural Networks (OAIN'06)

Mean-Variance-Skewness-Kurtosis-based Portfolio Optimization (Abstract)

Shouyang Wang , Chinese Academy of Sciences, China
Kin Keung Lai , City University of Hong Kong, China
Lean Yu , Chinese Academy of Sciences, China
pp. 292-297

Optimized Design of Interconnected Bus on Chip for Low Power (Abstract)

Guangsheng Ma , Harbin Engineering University, China
Gang Feng , Harbin Engineering University, China
Donghai Li , Harbin Engineering University, China
pp. 298-302

Application of SCE-UA to Optimize the Management Model of Groundwater Resources in Deep Aquifers of the Yangtze Delta (Abstract)

Jichun Wu , Nanjing University, China
Jianfeng Wu , Nanjing University, China
Xiaobin Zhu , Nanjing University, China
pp. 303-308

A Vertical Handover Decision Algorithm Based on Fuzzy Control Theory (Abstract)

Zhao Du , Shanghai Jiao Tong University, China
Ling Tie , Shanghai Jiao Tong University, China
Hongwei Liao , Shanghai Jiao Tong University, China
pp. 309-313

Collaborative Planning in Supply Chains by Lagrangian Relaxation (Abstract)

Lanshun Nie , Harbin Institute of Technology, China
Xiaofei Xu , Harbin Institute of Technology, China
Dechen Zhan , Harbin Institute of Technology, China
pp. 314-321

Problem-Solving in Multi-Agent Systems: A Novel Generalized Particle Model (Abstract)

Liangjun Huang , East China University of Sci. and Tech., China
Yuming Dong , Qingdao Technological University, China
Qing Shuai , Huazhong University of Sci. and Tech., China
Dianxun Shuai , East China University of Sci. and Tech., China
pp. 322-329

An Execution Prototype of Mobile Agent-Based Peer-to-Peer Systems (Abstract)

Masaru Kitsuregawa , University of Tokyo, Japan
Wenyu Qu , University of Tokyo, Japan
Hong Shen , Japan Advanced Institute of Science and Technology, Japn
Keqiu Li , Dalian Maritime University, China
pp. 330-338

Fault Diagnosis of AUV Based on Bayesian Networks (Abstract)

Rubo Zhang , Harbin Engineering University, China
Changting Shi , Harbin Engineering University, China
Ge Yang , Harbin Engineering University, China
pp. 339-343

A Lower Bound for the Chaotic Control Parameter of Wang- Smith?s CSA (Abstract)

Kai Tian , Harbin Engineering University, China
Liying Zheng , Harbin Engineering University, China
pp. 344-346

Dynamic Analysis and Application of QANN (Abstract)

Rigui Zhou , Nanjing University of Aeronautics and Astronautics, China
Nan Jiang , Nanjing University of Aeronautics and Astronautics, China
Liang Zhou , Nanjing University of Aeronautics and Astronautics, China
Qiulin Ding , Nanjing University of Aeronautics and Astronautics, China
pp. 347-351

An Optimal Non-adaptive Search Plan for 3D Models Retrieval (Abstract)

Bo Peng , UESTC, China
Qingxin Zhu , UESTC, China
pp. 352-355

Underwater Image Segmentation with Maximum Entropy based on Particle Swarm Optimization (PSO) (Abstract)

Rubo Zhang , Harbin Engineering University, China
Jing Liu , Harbin Engineering University, China
pp. 360-636
Symposium of Software and Software Engineering (SSSE'06)

An Ontology-Based Approach for Domain Requirements Elicitation and Analysis (Abstract)

Yuquin Lee , Fudan University, China
Wenyun Zhao , Fudan University, China
pp. 364-371

Windows DNA-based Study on the Integrated Application of Manufacturing Information System (Abstract)

Xilan Feng , Zhengzhou Institute of Aeronautics, China
Jinfa Shi , Zhengzhou Institute of Aeronautics, China
Xuewen Zong , Xi'an Jiatong University, China
Zhiquiang Jiang , Zhengzhou Institute of Aeronautics, China
pp. 372-377

Uniform Service Description With Semantics for Search and Composition (Abstract)

Kaiyun Chen , Harbin Engineering University, China
Xiaoquin Xie , Harbin Engineering University, China
pp. 387-390

Research on CMMI-based Software Process Metrics (Abstract)

Yuan Zhang , Shandong University of Finance, China
Yunjiao Xue , Fudan University, China
Desheng Li , Shandong University of Finance, China
Ruzhi Xu , Fudan University, China
Peiyao Nie , Shandong University of Finance, China
pp. 391-397

A Component Management System for Mass Customization (Abstract)

Jinxiang Dong , Zhejiang University, China
Yiyuan Li , Zhejiang University, China
Jianwei Yin , Zhejiang University, China
pp. 398-404

AUV Modeling and Analysis using a Colored Object-Oriented Petri Net (Abstract)

Zhuo Wang , Harbin Engineering University, China
Qun Liu , Harbin Engineering University, China
Xiaoning Feng , Harbin Engineering University, China
pp. 405-409

The Extension of the Unit Testing Tool Junit for Special Testings (Abstract)

Zhaolin Yin , China University of Mining and Technology, China
Liangliang Kong , China University of Mining and Technology, China
pp. 410-415

Embedded Software Standardization and Re-engineering in Practice (Abstract)

Weiquin Tong , Shanghai University, China
Xiaoli Zhi , Shanghai University, China
pp. 416-419

A Configuration Management Supporting System Based on CMMI (Abstract)

Aihua Ren , Beihang University, China
Fei Wang , Beihang University, China
pp. 420-423

Primary Research on Internetware Reliability Technology (Abstract)

Lijie Li , Harbin Engineering University, China
Ping Wang , Harbin Engineering University, China
Changsong Sun , Harbin Engineering University, China
pp. 424-428

Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network (Abstract)

Jianfei Qian , Zhejian University, China
Fangzhong Qi , Zhejiang University, China
Hua Chen , Zhejiang University, China
Qinming He , Zhejiang University, China
pp. 429-432

A Description Model to Support Knowledge Management (Abstract)

Xiong Xie , Dalian Maritime University, China
Weishi Zhang , Dalian Maritime University, China
Lei Xu , Dalian Maritime University, China
pp. 433-436

Development of a Sheet Metal Part Stock Layout System Based on OPENCASCADE Platform (Abstract)

Yang Yanli , Shenzhen University, China
Du Jiang , Xi'an Institute of Technology, China
Cao Yan , Xi'an Institute of Technology, China
Yang Lina , Xi'an University of Science and Technology, China
Zhao Rujia , Xi'an Jiatong University, China
Zhang Dawei , Xi'an Jiatong University, China
Bai Yu , Xi'an Institute of Technology, China
pp. 437-441
Symposium of Internet Computing and Language Semantics, etc. (ICLS'06)

Semantic Approach for e-learning System (Abstract)

Wenying Guo , Zhejiang University, China
Deren Chen , Zhejiang Gongshang University, China
pp. 442-446

Reverse Engineering XML (Abstract)

Gu Ning , Fudan University, China
Shi Baile , Fudan University, China
Yang Weidong , Fudan University, China
pp. 447-454

New Generation of E-Learning Technologies (Abstract)

Dan Yu , Wuhan University, China
Weiping Zhang , Wuhan University, China
Xinmeng Chen , Wuhan University, China
pp. 455-459

Optimal Selection of Web Services with End-to-End Constraints (Abstract)

Yu Dai , Northeastern University, China
Bin Zhang , Northeastern University, China
Jun Na , Northeastern University, China
Yan Gao , Northeastern University, China
Lei Yang , Northeastern University, China
Qiang Gong , Northeastern University, China
pp. 460-467

A Study of Chinese Web Characteristics and Their Implications on Web Search (Abstract)

Weibin Liao , Traffic Scientific Research Institute of Public Security, China
Kin Fun Li , University of Victoria, Canada
Louis Yu , University of Victoria, Canada
pp. 468-474

Using Categorization to Further Enhance the Utilization of Semantic Web in UDDI (Abstract)

Weiqin Tong , Shanghai University, China
Xiaojie Dong , Shanghai University, China
Jin Feng , Beihang University, China
pp. 475-479

Dynamic Behavior Specification of Web Component Based on Logic Programming (Abstract)

Yukui Fei , Shandong Agricultural University, China
pp. 480-482

A SVR-based Fuzzy System (Abstract)

Tongsen Hu , Zhejiang University of Technology, China
Xianzhong Tian , Zhejiang University of Technology, China
pp. 483-487
Symposium of Database Management and Information Systems (DMIS'06)

Extending Tree Automata to Obtain Consistent Query Answer from Inconsistent XML Document (Abstract)

Zijing Tan , Fudan University, China
Baile Shi , Fudan University, China
Wei Wang , Fudan University, China
pp. 488-495

A New Position Updating Algorithm for Moving Objects (Abstract)

Shengsheng Wang , Jilin University, China
Zhengxuan Wang , Jilin University, China
Xinying Wang , Jilin University, China
Xizhe Zhang , Jilin University, China
Tianyang Lv , Jilin University, China
pp. 496-503

Indexing of Constrained Moving Objects for Current and Near Future Positions in GIS (Abstract)

Dongru Zhou , Wuhan University, China
Wei Guo , Shanghai Jiao Tong University, China
Jing Guo , Wuhan University, China
pp. 504-509

A Privacy Policy of P3P Based on Relational Database (Abstract)

Chao Yang , Hunan University, China
Guangxue Yue , Hunan University, China
Bin Jiang , Hunan University, China
Fei Yu , Provincial Key Laboratory of Computer Information Processing Technology, China
Da-fung Zhang , Hunan University, China
pp. 510-515

Generating Incremental ETL Processes Automatically (Abstract)

Xufeng Zhang , Fudan University, China
Wei Wang , Fudan University, China
Baile Shi , Fudan University, China
Yahui Feng , Fudan University, China
Weiwei Sun , Fundan University, China
pp. 516-521

Appling Association Rule to Web Prediction (Abstract)

Shen Guo , South China University of Technology, China
Zhili Zhang , Xuchang University, China
Deyu Qi , South China University of Technology, China
Fugang Li , South China University of Technology, China
Lei Shi , Beijing Institute of Technology, China
pp. 522-527

Mapping Relational Schemas to XML DTDs with Constraints (Abstract)

Teng Lv , Xinjiang University, China
Ping Yan , Xinjiang University, China
pp. 528-533

Analysis on the Drawbacks of the Commonly Used Measures of the Significance of Attributes in Decision-Table & A New Measure (Abstract)

Lingli Wang , Zhejiang University of Technology, China
Decai Huang , Zhejiang University of Technology, China
pp. 534-539

Spatio-temporal Pattern Query Processing based on Effective Trajectory Splitting Models in Moving Object Database (Abstract)

Jianzhong Li , Harbin Institute of Technology, China
Wenjie Zhang , Harbin Institute of Technology, China
Wei Zhang , Harbin Institute of Technology, China
pp. 540-547

A Rapid Development Environment for Synthesizing Guideline-Based Decision Support Systems (Abstract)

Yu-Chuan Li , Taipei Medical University, Taiwan
Chiehfen Chen , Taipei Municpal Wanfang Hospital, Taiwan
Shin-Yuan Chang , National Chengchi University, Taiwan
Kung Chen , National Chengchi University, Taiwan
Chung-Hsin Chen , National Chengchi University, Taiwan
pp. 548-554

Querying about the Near Future Positions of Moving Objects (Abstract)

Wei Guo , Shanghai Jiao Tong University, China
Jing Guo , Wuhan University, China
Dongru Zhou , Wuhan University, China
pp. 555-559

A Robust Hierarchical Clustering Algorithm and its Application in 3D Model Retrieval (Abstract)

Xizhe Zhang , Jilin University, China
Tianyang Lv , Harbin Engineering University, China
Zheng-xuan Wang , Jilin University, China
Shaobin Huang , Harbin Engineering University, China
pp. 560-567

Research on Methodology of Fuzzy Retrieve Based on Soft Computing (Abstract)

Bin Shen , Zhejiang University, China
Min Yao , Zhejiang University, China
Yangu Zhang , Wenzhou University, China
pp. 568-571

Particle Swarm Algorithm for Minimal Attribute Reduction of Decision Data Tables (Abstract)

Jianhua Dai , Zhejiang University, China
Hongying Gu , Zhejiang University, China
Weidong Chen , Zhejiang University, China
Yunhe Pan , Zhejiang University, China
pp. 572-575

The Research and Application of the Web Maps Issuing Technology (Abstract)

Lifan Fei , Wuhan University, China
Tao Wu , Wuhan University, China
pp. 576-581
Symposium of Wireless, Mobile, and Sensor Technology (WMST'06)

A Data Fusion Approach for Power Saving in Wireless Sensor Networks (Abstract)

Qun Liu , Harbin Engineering University, China
Bing Liang , Harbin Engineering University, China
pp. 582-586

A Viable Localization Scheme for Dynamic Wireless Sensor Networks (Abstract)

Qiusheng He , Fudan University, China
Peng Han , Fudan University, China
Xun Chen , Fudan University, China
Shiliang Tu , Fudan University, China
pp. 587-593

Implementation of P2P Computing in Design of MANET Routing Protocol (Abstract)

Zupeng Li , Airforce Engineering University, China
Peiyang Yao , Airforce Engineering University, China
Xiaochuan Yin , Airforce Engineering University, China
Jinnan Huang , Lenovo Corporate Research & Development, China
pp. 594-602

Implementing a SIP-based Device Communication Middleware for OSGi Framework with Extension to Wireless Networks (Abstract)

Weiguo Zhu , Northeastern University, China
Matthew Y. Ma , IPVALUE Management, Inc., USA
Chuan Zhu , Northeastern University, China
Jingbo Zhu , 5Northeastern University, China
Guiran Chang , Northeastern University, China
pp. 603-310

A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network (Abstract)

Daxin Tian , Jilin University, China
Yanheng Liu , Jilin University, China
Bin Li , Jilin University, China
pp. 611-615

Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks (Abstract)

Jun-Hui Lee , Wonkwang University, Korea
Yeong-Jee Chung , Wonkwang University, Korea
Jae-Young Choi , Wonkwang University, Korea
pp. 616-621

Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network (Abstract)

Yeong-Jee Chung , Wonkwang University, Korea
Do-Seong Kim , Wonkwang University, Korea
pp. 622-626

Coordination Mechanism in Wireless Sensor and Actor Networks (Abstract)

Haidong Yuan , Beijing University of Posts and Telecommunications, China
Hongyu Liao , Beijing University of Posts and Telecommunications, China
Huadong Ma , Beijing University of Posts and Telecommunications, China
pp. 627-634

WITS: A Wireless Sensor Network for Intelligent Transportation System (Abstract)

Zhanglong Chen , Fudan University, China
Wenjie Chen , Fudan University, China
Lifeng Chen , Fudan University, China
Shiliang Tu , Fudan University, China
pp. 635-641

Markov-Based Analytical Model for TCP Unfairness over Wireless Mesh Networks (Abstract)

WeiFeng Sun , University of Science and Technology, China
ShouBao Yang , University of Science and Technology, China
Lei Zhang , University of Science and Technology, China
DaPeng Wang , University of Science and Technology, China
pp. 642-648

The Architecture and Interlayer Adaptation of Ad Hoc & Sensor Networks (Abstract)

Guochang Gu , Harbin Engineering University, China
Song Han , Harbin Engineering Univesity, China
pp. 649-653

Power-Efficient Routing Mechanism in Sensor Networks based on Node-Density (Abstract)

Wei Shi , Zhejiang University, China
Shanping Li , Zhejiang University, China
Qing Gao , Zhejiang University, China
pp. 654-656

A Brief Review on Application of Mobile Computing in Construction (Abstract)

Wei Peng , Zhejiang University, China
Xiuzi Ye , Zhejiang University, China
Wanhong Zou , Zhejiang University, China
Zhiyang Chen , Zhejiang University of Technology, China
pp. 657-661

An Improved Route Repair Approach of Wireless Sensor Networks (Abstract)

Kaihua Xu , Central China Normal University, China
Yuhua Liu , Central China Normal University, China
Haiyan Zhu , Central China Normal University, China
Wei Teng , Central China Normal University, China
pp. 662-665

Research of Sentence-Level Intelligent Input Method Based on Symbian OS (Abstract)

Jianguo Sun , Harbin Engineering University, China
Xuan Wang , Harbin Institute of Technology, China
Bingquan Liu , Harbin Institute of Technology, China
pp. 666-670
Symposium of Data Mining and Computations in Statistics (DMC'06)

Performance Optimization of Checkpointing Schemes with Task Duplication (Abstract)

Zhongwen Li , Xiamen University, China
Hong Chen , Xiamen University, China
Yang Xiang , Deakin University, Australia
pp. 671-677

Historical Temporal Difference Learning: Some Initial Results (Abstract)

Zengqi Sun , Tsinghua University
Diao Dongcui , Shandong University of Technology
Hengshuai Yao , Tsinghua University
pp. 678-685

Bayesian Image Segmentation and the Data Preprocessing Method using Fuzzy C-mean Clustering (Abstract)

Hong Zheng , Wuhan University, China
Li Pan , Wuhan University, China
pp. 686-691

On The Even-Out Effect of Probabilistic Sampling (Abstract)

Changjia Chen , Beijing Jiaotong University, China
Ziqian Liu , Beijing Jiaotong University, China
pp. 692-698

A Genetic Algorithm with Dual-Structure Code and Adaptive Strategy for Link Enhancement Problem (Abstract)

Kaihua Xu , Central China Normal University, China
Yuhua Liu , Central China Normal University, China
Haiyan Zhu , Central China Normal Universtiy, China
Wei Teng , Central China Normal University, China
pp. 699-705

A Dynamic Capacity Assignment Approach for EJB Instance Pools (Abstract)

Jin-yuan You , Shanghai Jiaotong University, China
Jian-hua Li , Shanghai Jiaotong University, China
Bao-wen Zhang , Shanghai Jiaotong University, China
pp. 706-710

Identification of GPI-(like)-Anchored Proteins by Using SVM (Abstract)

Wei Cao , The University of Tokyo, Japan
Kentaro Shimizu , The University of Tokyo, Japan
pp. 711-715

Self-Organizing Data Clustering Based on Quantum Entanglement Model (Abstract)

Yuming Dong , Qingdao Technological University, China
Liangjun Huang , East China University of Sci. and Tech., China
Qing Shuai , Huazhong University of Sci. and Tech., China
Yuzhe Liu , East China University of Sci. and Tech., China
Dianxun Shuai , East China University of Sci. and Tech., China
pp. 716-723

A Novel Stochastic Generalized Cellular Automata For Self-Organizing Data Clustering (Abstract)

Liangjun Huang , East China University of Sci. and Tech., China
Yuzhe Liu , East China University of Sci. and Tech., China
Yuming Dong , Qingdao Technological University, China
Dianxun Shuai , East China University of Sci. and Tech., China
Qing Shuai , Huazhong University of Sci. and Tech., China
pp. 724-730

A Novel Mining Approach for Schemas in XML Documents (Abstract)

Daxin Liu , Harbin Engineering University, China
Wei Sun , Harbin Engineering University, China
Tong Wang , Harbin Engineering University, China
pp. 731-734

An Improved Cascade SVM Training Algorithm with Crossed Feedbacks (Abstract)

Jing Yang , Harbin Engineering University, China
pp. 735-738

Temporal Association Rules in Mining Method (Abstract)

Haifeng Yuan , Helongjiang Institute of Science and Technology, China
Hui Ning , Harbin Engineering University, China
Shugang Chen , Harbin Engineering University, China
pp. 739-742

Weighted Ordinal Support Vector Clustering (Abstract)

Yongshun Wu , Peking University, China
Guangli Liu , China Agricultural University, China
Lu Yang , China Agricultural University, China
pp. 743-745

A Privacy-Preserving Mining Algorithm of Association Rules in Distributed Databases (Abstract)

Xiufeng Piao , Harbin Engineering University, China
Jie Liu , Harbin Engineering University, China
Shaobin Huang , Harbin Engineering University, China
pp. 746-750
Symposium of Computer System, Structure, and Architecture (CSSA'06)

Design of A Novel Asynchronous Reconfigurable Architecture for Cryptographic Applications (Abstract)

Kang Sun , Zhejiang University, China
Jimin Wang , Zhejiang University, China
Xuezeng Pan , Zhejiang University, China
Jiebing Wang , Zhejiang University, China
pp. 751-757

Design of Smart Phone-Oriented Embedded Real-time Operating System (Abstract)

Guochang Gu , Harbin Engineering University, China
Jigang Wang , Harbin Engineering University, China
Shibo Xie , Harbin Engineering University, China
Lifeng Xu , Central Academy of ZTE Corporation, China
pp. 758-763

System Prototyping Based on SystemC Transaction-Level Modeling (Abstract)

Liang Liang , Fudan University, China
Cheng-Lian Peng , Fudan University, China
Bo Zhou , Fudan University, China
Xue-Gong Zhou , Fudan University, China
pp. 764-770

Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux (Abstract)

Luyuan Chen , Harbin Engineering University, China
Guoyin Zhang , Harbin Engineering University, China
Aihong Yao , Harbin Engineering University, China
pp. 771-775

An Advanced Timing Characterization Method Considering Global False Path (Abstract)

Xiaoxiao Liu , Harbin Engineering University, China
Guangsheng Ma , Harbin Engineering University, China
Qiang Sun , Harbin Engineering University, China
pp. 776-779

Knowledge and Process Based Decision Support in Business Intelligence System (Abstract)

Hong Peng , South China University of Technology, China
Luan Ou , South China University of Technology, China
pp. 780-786

Verification Environment for a SCMP Architecture (Abstract)

Nianmin Yao , Harbin Engineering University, China
Jun Ni , Harbin Engineering University, China
Shaobin Cai , Harbin Engineering University, China
Wenbin Yao , Harbin Engineering University, China
pp. 787-791
Symposium of Computations and Simulations in Mechanical Engineering (CSME'06)

CGNS Data Format Used for A 2D/3D Finite Volume Unstructured Grid Flow Solver (Abstract)

Guo-dong Lei , Harbin Engineering University, China
Minggang Zhu , Harbin Engineering University, China
Wenping Zhang , Harbin Engineering University, China
Pingjian Ming , Harbin Engineering University, China
Gong-min Liu , Harbin Engineering University, China
pp. 792-799

A Cellular Automaton Technique for the Modeling of Solidification Microstructure in Multi-Component Alloys (Abstract)

Daming Li , Peking University, China
Pingwen Zhang , Peking University, China
Ruo Li , Peking University, China
pp. 800-806

Numerical Simulation for the Transport Phenomena in Melting Processes of Blade-Like Castings Using a Continuum Model (Abstract)

Jingjie Guo , Harbin Institute of Technology, China
Yunfeng Bai , Harbin Institute of Technology, China
Daming Xu , Harbin Institute of Technology, China
Hengzhi Fu , Harbin Institute of Technology, China
Weisheng Bi , Harbin Institute of Technology, China
pp. 807-814
Author Index

Author Index (PDF)

pp. 822-825
97 ms
(Ver )