The Community for Technology Leaders
Network and Parallel Computing Workshops, IFIP International Conference on (2007)
Dalian, China
Sept. 18, 2007 to Sept. 21, 2007
ISBN: 0-7695-2943-7
TABLE OF CONTENTS
Introduction
International Workshop on Frontier of Data-Driven Engineering (FDDE 2007)

The Info-plosion Project (Abstract)

Masaru Kitsuregawa , University of Tokyo
pp. 3-6

Keyword Search on Relational Databases (Abstract)

Yi Luo , University of New South Wales, Australia
Wei Wang , University of New South Wales, Australia
Xuemin Lin , University of New South Wales, Australia
pp. 7-10

Innovating Database Technology for Advanced Applications (Abstract)

Guoren Wang , Northeastern University, Shenyang, 110004 P.R.China
Xiaochun Yang , Northeastern University, Shenyang, 110004 P.R.China
Daling Wang , Northeastern University, Shenyang, 110004 P.R.China
Ge Yu , Northeastern University, Shenyang, 110004 P.R.China
Derong Shen , Northeastern University, Shenyang, 110004 P.R.China
pp. 13-17

Stream Data Management Based on Integration of a Stream Processing Engine and Databases (Abstract)

Yousuke Watanabe , Japan Science and Technology Agency
Hiroyuki Kitagawa , University of Tsukuba
pp. 18-22

Querying Graph-Structured Data (Abstract)

Jiefeng Cheng , The Chinese University of Hong Kong, Hong Kong, China
Jeffrey Xu Yu , The Chinese University of Hong Kong, Hong Kong, China
pp. 23-27

Content-based Search using Term Aggregation and Classification over Hybrid Peer-to-Peer Systems (Abstract)

Aoying Zhou , Fudan University, China
Rong Zhang , Fudan University, China
Quang Hieu Vu , National University of Singapore, Singapore
Weining Qian , East China Normal University, China
pp. 28-35

Web and Mobile Data Management (Abstract)

Wei Liu , Renmin University of China
Xiaofeng Meng , Renmin University of China
pp. 36-40

Collaborative Legal Information Sharing on P2P Network (Abstract)

Yanchun Zhang , Victoria University, Melbourne, Australia
Jingyuan Zhang , Victoria University, Melbourne, Australia
Hao Shi , Victoria University, Melbourne, Australia
Xin Wang , Victoria University, Melbourne, Australia
pp. 41-47

Data Quality - The Key Success Factor for Data Driven Engineering (Abstract)

Maria Orlowska , University of Queensland
Shazia Sadiq , University of Queensland
Xiaofang Zhou , University of Queensland
pp. 48-56
International Workshop on Network and System Security (NSS 2007)

A Reliable SLA-based Admission Controller for MPLS Networks (Abstract)

Mostofa Akbar , University of Victoria, Canada
Jian Pu , University of Victoria, Canada
Gholamali C. Shoja , University of Victoria, Canada
Kin F. Li , University of Victoria, Canada
Eric Manning , University of Victoria, Canada
pp. 57-64

A Conceptual Framework for a SIM-based Electronic Transaction Authentication System (Abstract)

Syed Mahfuzul Aziz , University of South Australia
Manzur Ashraf , University of South Australia
M. Lutful Kabir , University of Dhaka
pp. 65-71

Further Cryptanalysis of a CRT-RSA Algorithm at CCS 2003 (Abstract)

Daxing Li , Shandong University, China
Baodong Qin , Shandong University, China
Ming Li , Shandong University, China
Fanyu Kong , Shandong University, China
pp. 72-76

A Conceptual Incentive Mechanism of P2P File Sharing Systems Based on Game Theory (Abstract)

Hong Pei-lin , University of Science and Technology of China,Hefei, China
Lu Han-cheng , University of Science and Technology of China,Hefei, China
Xue Kai-ping , University of Science and Technology of China,Hefei, China
Wang Qi , University of Science and Technology of China,Hefei, China
Hu Ming-xiu , University of Science and Technology of China,Hefei, China
pp. 77-82

A Request-Driven Role Mapping for Secure Interoperation in Multi-Domain Environment (Abstract)

Zhuo Tang , Huazhong University of Science and Technology
Ruixuan Li , Huazhong University of Science and Technology
Zhengding Lu , Huazhong University of Science and Technology
pp. 83-90

A New Intrusion Detection Method Based on Artificial Immune System (Abstract)

Shaomin ZHANG , North China Electric Power University
Baoyi WANG , North China Electric Power University
pp. 91-98

A User-centric Federated Single Sign-on System (Abstract)

Ernest Foo , Queensland University of Technology, Brisbane, Australia
Suriadi Suriadi , Queensland University of Technology, Brisbane, Australia
Audun Josang , Queensland University of Technology, Brisbane, Australia
pp. 99-106

A Secure Ring Signcryption Scheme for Private and Anonymous Communication (Abstract)

Guoyin Zhang , Harbin Engineering University, Harbin 150001, China
Chunguang Ma , Harbin Engineering University, Harbin 150001, China
Lingling Wang , Harbin Engineering University, Harbin 150001, China
pp. 107-111

Constructing Role-Based Access Control and Delegation Based on Hierarchical IBS (Abstract)

Daxing Li , Shandong University, Jinan China
Bai Xi , Jilin University
Qiang Li , Jilin University
Jin Wang , Shandong University, Jinan China
pp. 112-118

DoS Evading Mechanism upon Service Hopping (Abstract)

Leyi Shi , China University of Petroleum
Chunfu Jia , Nankai University
Shuwang Lu , Nankai University
pp. 119-122

An Identity-Based Encryption Scheme for Broadcasting (Abstract)

Geng Yang , Nanjing University of Posts & Telecommunications
Chunming Rong , University of Stavanger, Norway
Jiangtao Wang , Nanjing University of Posts & Telecommunications
Hongbing Cheng , Nanjing University of Posts & Telecommunications
pp. 123-126

Anomaly Intrusion Detection Methods for Peer-to-Peer System (Abstract)

Daxin Tian , Jilin University
Bin Li , Jilin University
Yanheng Liu , Jilin University
pp. 127-130

An Efficient Elliptic Curves Scalar Multiplication for Wireless Network (Abstract)

Huanguo Zhang , Wuhan University, Wuhan 430079, China
Bangju Wang , Wuhan University, Wuhan 430079, China
Yuhua Wang , Wuhan University, Wuhan 430079, China
pp. 131-134

Pitch modification based on syllable units for voice morphing system (Abstract)

Zhen Yang , Nanjing University of Posts and Telecomm.
Yinqiu Gao , Nanjing University of Posts and Telecomm.
pp. 135-139

A Cross-Authentication Model for Heterogeneous Domains in Active Networks (Abstract)

Qiong Chen , Xiamen University
Shui Yu , Deakin University, VIC
Zhongwen Li , Xiamen University
pp. 140-143

Security Enhancement of a Remote User Authentication Scheme Using Bilinear Pairings and ECC (Abstract)

Duc-Liem Vo , Information and Communications University, Korea
Kwangjo Kim , Information and Communications University, Korea
pp. 144-147

Bus-based Anonymous Multicast in Peer-to-Peer Overlay (Abstract)

Jian Wang , Shanghai Jiaotong University
Ruimin Shen , Shanghai Jiaotong University
Changyong Niu , Shanghai Jiaotong University
pp. 148-151

Integrated Site Security for Grid; an initiative to cover security beyond the Grid (Abstract)

Bruno Hoeft , Forschungszentrum Karlsruhe
Ursula Epting , Forschungszentrum Karlsruhe
pp. 152-155

Key Feature and Rule-based Intrusion Detection for Wireless Sensor Networks (Abstract)

Haiguang Chen , Shanghai Normal University
Chuanshan Gao , Fudan University
Huafeng Wu , Fudan University
Xi Zhou , Fudan University
pp. 164-168

Inference of One-Way Queuing Delay Distribution Using Packet-Pair Probes without Clock Synchronization (Abstract)

Gu Wei-Xuan , Sun Yat-Sen Univ., P. R. China
Yu Shun-Zheng , Sun Yat-Sen Univ., P. R. China
pp. 169-175

An Innovative Analyser for Email Classification Based on Grey List Analysis (Abstract)

Wanlei Zhou , Deakin University, Melbourne, Australia.
Md Rafiqul Islam , Deakin University, Melbourne, Australia.
pp. 176-182

On the Effectiveness of Flexible Deterministic Packet Marking for DDoS Defense (Abstract)

Yang Xiang , Central Queensland University
Wanlei Zhou , Deakin University
Zhongwen Li , Xiamen University, China
pp. 183-190

An Efficient Contributory Group Rekeying Scheme based on Hash Functions for MANETs (Abstract)

Srinivas Sampalli , Dalhousie University, Halifax, Canada
Depeng Li , Dalhousie University, Halifax, Canada
pp. 191-198

Collaborative Computational Chemical Grid Based on CGSP (Abstract)

Xuelin Shi , Beijing University of Chemical Technology, Beijing, 100029, P.R.China
Ying Zhao , Beijing University of Chemical Technology, Beijing, 100029, P.R.China
pp. 199-202

Password-based Dynamic Group Key Agreement (Abstract)

Chunbo Ma , Shanghai Jiao Tong University, Shanghai, 200030, P. R. China
Jianhua Li , Shanghai Jiao Tong University, Shanghai, 200030, P. R. China
Jun Ao , Xidian University, Xi'an, Shanxi, 710071, P. R. China
pp. 203-208

A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks (Abstract)

Chen Wei , BeiHang University
Gao Xiaopeng , BeiHang University
pp. 209-214

Issue of Event Sequence in time of Distributed Intrusion Detection System (Abstract)

Cao Tianjie , China University of Mining & Technology, Xuzhou
Huang Hao , Nanjing University, Nanjing
Lin Guoyuan , Nanjing University, Nanjing
pp. 215-222

An Identity-Based Security Architecture for Wireless Mesh Networks (Abstract)

Guangsong Li , Zhengzhou Information Science and Technology Institute
pp. 223-226

An Efficient and Universal Security Architecture of Implementing IPSec in Broadband Router (Abstract)

Jianzu Yang , Information Engineering University, China
Xiaozhuo Gu , National Digital Switching System Engineering & Technological R&D Center
Jing Yu , Information Engineering University, China
Julong Lan , Information Engineering University, China
pp. 227-231

A Reliable Approach of Establishing Trust for Wireless Sensor Networks (Abstract)

Guangjie Han , Chonnam National University, Gwangju, 500-757, Korea
Wontaek Lim , Chonnam National University, Gwangju, 500-757, Korea
Deokjai Choi , Chonnam National University, Gwangju, 500-757, Korea
pp. 232-237

Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology (Abstract)

Zhiyong Zhang , Xidian University, Xi' an 710071, China
Qingqi Pei , China Electronic Equipment & Systems Engineering Corporation
Jianfeng Ma , China Electronic Equipment & Systems Engineering Corporation
Lin Yang , China Electronic Equipment & Systems Engineering Corporation
pp. 238-243

Specification and Runtime Enforcement of Security Policies (Abstract)

Ying Jin , Jilin University
Xiaojuan Zheng , Northeast Normal University
Jing Zhang , Jilin University
pp. 244-249

Intrusion Detection System by Integrating PCNN and Online Robust SVM (Abstract)

Hengjie Li , Gansu Lianhe University
Jiankun Wang , Lanzhou University of Technology
pp. 250-254

A Semiring Privacy Protect Model (Abstract)

Zhang Wenzheng , National Laboratory for Modern Communications Chengdu, China
Yang Bo , University Guangzhou,China
Zhang Mingwu , University Guangzhou,China
pp. 255-262
International Workshop on Information and Storage Management for Ubiquitous Computing (ISMUC 2007)

An Energy Efficient Design of Multi-resolution Storage for Ubiquitous Data Management (Abstract)

Zhaohui Wu , Zhejiang University
Jianhua Yang , Zhejiang University
Siliang Tang , Zhejiang University
pp. 263-268

PushFS: A Smart Push File Service Model for Ubiquitous Storage (Abstract)

Meijun Tao , Zhejiang University
Jianhua Yang , Zhejiang University
Zhaohui Wu , Zhejiang University
pp. 269-274

Semantic and Context-based Information Management in SCUDWare Middleware for Ubiquitous Computing (Abstract)

Qing Wu , Hangzhou Dianzi University
Jianhua Yang , Zhejiang University
Ying Li , Zhejiang University
pp. 275-281

A Context Quality Model for Ubiquitous Applications (Abstract)

Zhaohui Wu , Zhejiang University
Siliang Tang , Zhejiang University
Jianhua Yang , Zhejiang University
pp. 282-287

Sharing Software Resources with Floating License In Grid Environment (Abstract)

Wei FU , N.U.D.T. Changsha, P.R. China
Nong XIAO , N.U.D.T. Changsha, P.R. China
Xicheng LU , N.U.D.T. Changsha, P.R. China
pp. 288-294

Anti-Phishing by Smart Mobile Device (Abstract)

Yi Wang , Fudan University
Lixing Wang , Fudan University
Ye Cao , Fudan University
Jiping Zhou , Fudan University
Weili Han , Fudan University
pp. 295-302
International Workshop on Advanced Topics in Network Computing, Technology, and Applications (ATNCTA 2007)

A New Chaos Encryption Algorithm Based on Parameter Randomly Changing (Abstract)

Xiao-jun Tong , Harbin Institute of Technology
Ming-gen Cui , Harbin Institute of Technology
pp. 303-307

A Novel Approach of Available Bandwidth Estimation for Heterogeneous Networks (Abstract)

Hao Huang , Central China Normal University
Kaihua Xu , Central China Normal University
Yuhua Liu , Central China Normal University
pp. 314-318

Parallel analysis for lightweight network incident detection using nonlinear adaptive systems (Abstract)

Ruo Ando , National Institute of Information and Communication Technology, Japan
Yoshiyasu Takefuji , National Institute of Information and Communication Technology, Japan
pp. 319-325

A Highly Reliable Access Control Model for Ad Hoc Networks (Abstract)

Tea Sang Yun , WIZ Information Technology Company, Seoul, Korea
Insoo Cho , WIZ Information Technology Company, Seoul, Korea
Jung Ah Kim , WIZ Information Technology Company, Seoul, Korea
Man Ju Lee , WIZ Information Technology Company, Seoul, Korea
pp. 326-331

Research and Design of an Attribute-managed Storage-cluster Based on TCP/IP Network (Abstract)

Qiang Cao , WNLO, HUST, Wuhan, China
Xu Li , WNLO, HUST, Wuhan, China
QinQi Wei , WNLO, HUST, Wuhan, China
ChangSheng Xie , WNLO, HUST, Wuhan, China
pp. 332-336

Real-time Performance Analysis for Wireless Sensor Networks (Abstract)

Huagang Xiong , Beijing University of Aeronautics and Astronautics
Qiang Zhou , Beijing University of Aeronautics and Astronautics
Hengqing Lin , China State Shipbuilding Corporation
pp. 337-342

Topology Control for Wireless Sensor Networks (Abstract)

Cai Wandong , Northwestern Polytechnical University, Xi'an
Liu Gang , Northwestern Polytechnical University, Xi'an
Zhao Tao , Northwestern Polytechnical University, Xi'an
pp. 343-348

Middleware for Wireless Sensor Networks: A Comparative Analysis (Abstract)

Wassim Masri , IRIT-Paul Sabatier University, France
Zoubir Mammeri , IRIT-Paul Sabatier University, France
pp. 349-356

An Adaptive Key Selection Scheme in Wireless Sensor Networks (Abstract)

Guorui Li , Beijing University of Technology
Yingfang Fu , Beijing University of Technology
Jingsha He , Beijing University of Technology
pp. 357-361

An Access Control Scheme in Wireless Sensor Networks (Abstract)

SHEN Yu-long , Infor-mation Security Xidian University
MA Jian-feng , Infor-mation Security Xidian University
PEI Qing-qi , Infor-mation Security Xidian University
pp. 362-367

Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration (Abstract)

Mustafa Hasan , AJOU University, Suwon, S. Korea
Kyungsuk Lhee , AJOU University, Suwon, S. Korea
Rabia Riaz , AJOU University, Suwon, S. Korea
H. Farooq Ahmed , Communication Technologies, Sendai, Japan
Ali Hammad Akbar , AJOU University, Suwon, S. Korea
Ki-Hyung Kim , AJOU University, Suwon, S. Korea
Ayesha Naureen , NUST, Rawalpindi, Pakistan
Attiya Akram , NUST, Rawalpindi, Pakistan
pp. 368-373

An Efficient Sensor Observation Data Registration based on Asynchronous Service Middleware (Abstract)

Zeqiang Chen , Mapping and Remote Sensing Wuhan University
Zhong Zheng , Mapping and Remote Sensing Wuhan University
Nengcheng Chen , Mapping and Remote Sensing Wuhan University
pp. 374-379

A GA Retransmission Model for Energy-Efficient Reliable Delivery in Wireless Sensor Networks (Abstract)

Zhu Jian , Northeastern University
Sun Pei-gang , Northeastern University
Cheng Dawei , Northeastern University
Zhu Siyuan , Northeastern University
Zhang Xi-yuan , Northeastern University
Zhao Hai , Northeastern University
pp. 380-385

An Analytical Model for Link Evaluation of Wireless Sensor Networks (Abstract)

Sun Pei-gang , Northeastern University, Shenyang
Zhang Xi-yuan , Northeastern University, Shenyang
Xu Jiu-qiang , Northeastern University, Shenyang
Zhu Jian , Northeastern University, Shenyang
Cheng Da-wei , Northeastern University, Shenyang
Zhao Hai , Northeastern University, Shenyang
pp. 386-391

A Link Evaluation Model Based on Gauss Distribution for Wireless Sensor Networks (Abstract)

Zhu Jian , Northeastern University, Shenyang
Zhang Xi-yuan , Northeastern University, Shenyang
Zhao Hai , Northeastern University, Shenyang
Xu Jiu-qiang , Northeastern University, Shenyang
Zhu Si-yuan , Northeastern University, Shenyang
Sun Pei-gang , Northeastern University, Shenyang
pp. 392-397

Fair Energy Consumption Protocol with Two Base Stations for Wireless Sensor Networks (Abstract)

Deokjai Choi , Chonnam National University, Korea
Bao Nguyen Nguyen , Chonnam National University, Korea
pp. 398-403

Ecologically Inspired Distributed Search in Unstructured Peer-to-Peer Networks (Abstract)

Li Sa , Jimei University, Xiamen, P.R.China
Yongsheng Ding , Donghua University, Shanghai, P.R.China
pp. 404-407

Preliminary Research on Grid-based Remote Sensing Image distributed Processing (Abstract)

Shengyang Li , Chinese Academy of Sciences, Beijing, 100080, China
Aijun Zhang , Beijing University of Chemical Technology
Jiakui Tang , Peking University
pp. 408-412

Characterizing PPStream across Internet (Abstract)

Changjia Chen , Beijing Jiaotong University
Chunxi Li , Beijing Jiaotong University
Jinkang Jia , Beijing Jiaotong University
pp. 413-418

A Differentiated Service Based Incentive Mechanism in P2P File-sharing Systems (Abstract)

Qiubo Huang , University, Shanghai, China
Chuanshan Gao , University, Shanghai, China
Shaoyin Huang , University, Shanghai, China
pp. 419-424

Parallel Cache Model Based on Grid Memory (Abstract)

Lichun Na , Shanghai LIXIN University of Commerce
Qingkui Chen , University of Shanghai for Science and Technology
pp. 425-430

Dynamic Power Management based on Wavelet Neural Network in Wireless Sensor Networks (Abstract)

Yan Shen , University of Electronic Science and Technology of China
Bing Guo , Sichuan University, 86-28-610065 Chengdu
pp. 431-436

Connection Pattern-Based P2P Application Identification Characteristic (Abstract)

Zhang Yan , TianJin University of Technology,Tianjin 300191,China
WU GongYi , TianJin University of Technology,Tianjin 300191,China
Wang JinSong , TianJin University of Technology,Tianjin 300191,China
Wu Qing , TianJin University of Technology,Tianjin 300191,China
pp. 437-441

High Bandwidth Anomalies in Cluster and Grid Data Transfer (Abstract)

Carlo Barrios-Hernandez , LIG IMAG Laboratory Mescal Team, Montbonnot-St Martin, France
Michel RIVEILL , UNSA Laboratory Rainbow Team, Sophia Antipolis, France
Yves DENNEULIN , LIG IMAG Laboratory Mescal Team, Montbonnot-St Martin, France
pp. 442-448

Processing Optimization for Injection Plastic Molding on Mold Design Grid (Abstract)

Cui Zhendong , Dalian University of Technology, Dalian 116023, China
Li Zhijie , Dalian University
Wang Xicheng , Dalian University of Technology, Dalian 116023, China
pp. 449-454

Research on Traffic Information Service Grid Based on GT4 (Abstract)

Lijun Liu , Shenyang University of Technology
Wei Jia , Shenyang University of Technology
Cuihua Tian , Shenyang University of Technology
Guiran Chang , Northeastern University, Shenyang
Xiaoxing Gao , Northeastern University, Shenyang, China
Xiaoxing Gao , Northeastern University, Shenyang
Hongsheng Wang , Shenyang University of Technology
Chuan Zhu , Northeastern University, Shenyang
Cuihua Tian , Northeastern University, Shenyang
pp. 455-460

Research on Grid Resource Discovery Mechanism Based on Mobile Agent (Abstract)

Jiang Bo , Dalian Maritime University
Tian Miao , Dalian Maritime University
pp. 461-464

Research of the Apriority Policy-based Multi-hop BFS Search Algorithm in P2P Network (Abstract)

Zhe Chen , Beijing University of Posts and Telecommunications, BUPT
Shize Guo , Beijing University of Posts and Telecommunications, BUPT
Yixian Yang , Beijing University of Posts and Telecommunications, BUPT
Kangfeng Zheng , Beijing University of Posts and Telecommunications, BUPT
pp. 471-476

On the Line Card Collection Model for Bandwidth Utilization and Latency Measurement in High-speed IP Networks (Abstract)

TANG hong , Chongqing University of Post and Telecommunications, Chongqing 400065, China
ZHANG yi , Chongqing University of Post and Telecommunications, Chongqing 400065, China
YIN jianru , Chongqing University of Post and Telecommunications, Chongqing 400065, China
pp. 477-484

Detecting and Blocking Malicious Traffic Caused by IRC Protocol Based Botnets (Abstract)

Zixiang Zhao , Dalian Maritime University, Dalian
Zhenhua Chi , Dalian Maritime University, Dalian
pp. 485-489

A Non-repudiable Protocol for Secure Messaging (Abstract)

Xiaotao He , Guangdong University of Technology
Xiang Xu , Guangdong University of Technology
Jie Ling , Guangdong University of Technology
Lu Liang , Guangdong University of Technology
Yuyi Ou , Guangdong University of Technology
Hao Wang , Guangdong University of Technology
pp. 490-494

Research on Information Retrieval Based on Keywords Relationship and Past Retrieval Records in P2P Networks (Abstract)

Yue Gong , Dalian University of Technology
Xianfu Meng , Dalian University of Technology
pp. 495-501

Study on the e-learning grid construction for higher special education (Abstract)

Zhuang Shu-fan , Changchun University, Changchun, 130022, China
Sun Yu , Changchun University, Changchun, 130022, China
Li Chun-lian , Jilin University, Changchun 130012, China
pp. 502-505

A Resource Trade Model Based on Trust Evaluation for Grid Computing (Abstract)

Guosun Zeng , Tongji University, Shanghai
Lulai Yuan , Tongji University, Shanghai, China
Zongjian He , Tongji University, Shanghai
pp. 506-510

Network Traffic Prediction Algorithm and its Practical Application in real network (Abstract)

Tong Li , UAcademy of Armored Forced Engineering, Beijing, China
Jun Lv , Academy of Armored Forced Engineering, Beijing, China
Xing Li , China Education and Research Network, Tsinghua University
pp. 512-517

Analysis on Routing Convergence in Optical Network (Abstract)

Ning ZHANG , Beijing Union University, Beijing 100101, China
Aibo LIU , University of Posts and Telecommunications, Beijing 100876, China
Hong BAO , Beijing Union University, Beijing 100101, China
pp. 518-523

A delay critical value in TCP Fluid Control (Abstract)

Hong-yong Yang , Ludong University, YanTai, 264025, P R China
Qun-san Xu , Ludong University, YanTai, 264025, P R China
Hong-yong Yang , Northeastern University, ShenYang, 110006, P R China
pp. 524-528

Collision Avoidance Multiple Access inWireless Sensor Networks (Abstract)

Timo Korhonen , Helsinki University of Technology, Finland
Dong Wang , Peking University
Jianwei Wang , Peking University
Yuping Zhao , Peking University
pp. 529-534

A Novel Algorithm of Channel Resource Allocation in IEEE 802.11 WLAN (Abstract)

Zhai Congcong , Chongqing University of Post And Telecommunications, Chongqing
Sun Shixin , UEST of China, Sichuan, Chengdu
Liu Yanbing , UEST of China, Sichuan, Chengdu
pp. 535-542
International Workshop on Performance Analysis, Modelling and Architecture (PAMA 2007)

Modeling and Performance Analysis of Self-Similar Traffic Based on FBM (Abstract)

Xianhai Tan , Southwest Jiaotong University
Weidong Jin , Southwest Jiaotong University
Yuanhui Huang , Southwest Jiaotong University
pp. 543-548

Modeling and Performance Analysis of LFSN (Abstract)

Weidong Jin , Southwest Jiaotong University
Ying Hu , Southwest Jiaotong University
Xianhai Tan , Southwest Jiaotong University
pp. 549-554

The Architecture of Mobile Virtual Environment (Abstract)

Yuebin Bai , Beihang University, Beijing 100083, China
Depei Qian , Beihang University, Beijing 100083, China
Jihong Ma , Handan Polytechnic College , Handan 056000,China
Yanwen Ju , Beihang University, Beijing 100083, China
Peng , Beihang University, Beijing 100083, China
pp. 555-560

Performance Study of Cryptographic Storage Area Network (Abstract)

JunJie Zhao , JiangSu University, JiangSu, P.R.China
Wei Zhong , JiangSu University, JiangSu, P.R.China
Tao Cai , JiangSu University, JiangSu, P.R.China
Shiguang Ju , JiangSu University, JiangSu, P.R.China
pp. 561-565

Design and Implementation of a Manageable IPv6 Wireless Multicast Platform (Abstract)

ZHOU Xiao-wei , Dalian Maritime University, Dalian
LI Zhi-huai , Dalian Maritime University, Dalian
HUANG Zhi-teng , Dalian Maritime University, Dalian
pp. 566-571

Design and Evaluation of Large Scale Loosely Coupled Cluster-based Distributed Systems (Abstract)

Makoto Yoshida , Okayama University of Science Okayama, Japan
Kenji Sakamoto , Okayama University of Science Okayama, Japan
pp. 572-577

Two methods to enhance the master thread's performance in SMT Chip (Abstract)

Ma Pengyong , National University of Defense Technology
Hu Xiao , National University of Defense Technology
Chen Shuming , National University of Defense Technology
pp. 578-583

A Service Selection Model with Multiple QoS Constraints on the MMKP (Abstract)

Xingzhi Feng , National University of Defense Technology
Hefeng Cao , General Headquarter of the China People's Armed Police Forces
Quanyuan Wu , National University of Defense Technology
Yang Sun , General Headquarter of the China People's Armed Police Forces
Zhiwei Zhang , Research Department of China Airforce Command College
pp. 584-589

Research and Implementation on Event Notification Service of ForCES Routers (Abstract)

Ligang Dong , Zhejiang Gongshang University
Weiming Wang , Zhejiang Gongshang University
Wengping Zhang , Zhejiang Gongshang University
pp. 590-595

Jdib: Java Applications Interface to Unshackle the Communication Capabilities of InfiniBand Networks (Abstract)

Wan Huang , Chinese Academy of Sciences
Jizhong Han , Chinese Academy of Sciences
Hongwei Zhang , Chinese Academy of Sciences
Lisheng Zhang , Chinese Academy of Sciences
Jin He , Chinese Academy of Sciences
pp. 596-601

A Performance Study of Java Communication Stacks over InfiniBand and Giga-bit Ethernet (Abstract)

Jin He , Chinese Academy of Sciences
Jizhong Han , Chinese Academy of Sciences
Hongwei Zhang , Chinese Academy of Sciences
Wan Huang , Chinese Academy of Sciences
Lisheng Zhang , Chinese Academy of Sciences
pp. 602-607

Network Traffic Emulation for IDS Evaluation (Abstract)

Xiong Wu , Southeast University, Nanjing, Jiangsu, China
Jian Gong , Southeast University, Nanjing, Jiangsu, China
Wei Ding , Southeast University, Nanjing, Jiangsu, China
Wang Yang , Southeast University, Nanjing, Jiangsu, China
pp. 608-612

Modeling and Verification of Web Services Composition based on CPN (Abstract)

Hui Kang , Jilin University
Xiuli Yang , Jilin University
Sinmiao Yuan , Jilin University
pp. 613-617

The Research of a New Web Server Cluster Architecture Supporting QoS (Abstract)

DaiJie Cheng , Chongqing University, Chongqing
ShuangQing Li , Chongqing University, Chongqing
Wu Yang , Chongqing University, Chongqing
pp. 618-623

Modeling and Performance Evaluation of Hybrid Storage I/O in Data Grid (Abstract)

Haitao Li , Dalian Maritime University
Zhaobin Liu , Dalian Maritime University
pp. 624-629

An Immune Algorithm Based Node Scheduling Scheme of Minimum Power Consumption and No Collision for Wireless Sensor Networks (Abstract)

Zhongxian Chi , Dalian University of Technology, Dalian, China
Weilian Xue , Dalian University of Technology, Dalian, China
pp. 630-635

IIPS-ICC: An Intelligent IP-Surveillance Platform Using Interactive Camera-handoff Control (Abstract)

Chia-Ching Yang , National Cheng Kung University, Tainan, Taiwan, R.O.C.
Chung-Ming Huang , National Cheng Kung University, Tainan, Taiwan, R.O.C.
Chung-Wei Lin , National Cheng Kung University, Tainan, Taiwan, R.O.C.
pp. 636-641

Implementing Atomic Section by Using Hybrid Concurrent Control (Abstract)

Lei Zhao , University of Science & Technology of China, Hefei, 230027, China
Yu Zhang , University of Science & Technology of China, Hefei, 230027, China
pp. 642-647

A New Approach for Multi-device User Interface Design (Abstract)

Jiancheng Wan , Shandong University, China
Lei Lu , Shandong University, China
Xudong Lu , Shandong University, China
pp. 648-656
International Workshop on Frontier of Parallel and Distributed System (FPDS 2007)

MSF: A Session-Oriented Adaptive Load Balancing Algorithm (Abstract)

Yijiao Chen , National University of Defense Technology
Xicheng Lu , National University of Defense Technology
Zhigang Sun , National University of Defense Technology
pp. 657-663

Scheduling the Asynchronous Fixed-Priority tasks with Preemption Threshold (Abstract)

XiaoChuan He , National University of Defense Technology
Yan Jia , National University of Defense Technology
pp. 664-669

Optimizing Power-Aware Routing using Zone Routing Protocol in MANET (Abstract)

Kyoung-Ja Kim , Sejong University
Hyun-Woo Koo , Dongguk University
pp. 670-675

QoS Multicast Routing Algorithm Based on QGA (Abstract)

CHEN Niansheng , Wuhan University of Technology
KE Zongwu , Wuhan University of Technology
LI Layuan , Wuhan University of Technology
pp. 683-688

Decision Tree Algorithm based on Sampling (Abstract)

Song Xudong , Dalian Jiaotong University Computer Basis
Cheng Xiaolan , Dalian Jiaotong University Computer Basis
pp. 689-694

Adaptive Packet Dropping: An Algorithm for Fair Bandwidth Sharing (Abstract)

Jiahai Yang , Network Research Center of Tsinghua University
Changqing An , Network Research Center of Tsinghua University
Shijing Kong , Network Research Center of Tsinghua University
pp. 695-700

A Web Page Segmentation Algorithm Based on Iterated Dividing and Shrinking (Abstract)

Luo Junzhou , Southeast University, Nanjing, 210096, China
Mao Bo , Southeast University, Nanjing, 210096, China
Cao Jiuxin , Southeast University, Nanjing, 210096, China
pp. 701-705

On Some Results of Regular Digraphs as Coset Graphs and Their Applications (Abstract)

Wenhong Wei , South China University of Technology, Guangzhou, China
Weidong Chen , South China University of Technology, Guangzhou, China
Wenjun Xiao , South China University of Technology, Guangzhou, China
Mingxin He , South China University of Technology, Guangzhou, China
pp. 706-709

A Rapid Algorithm to Find Replacement Services for K-Shortest Path Problem with QoS Constraints (Abstract)

Jianqiang Hu , Tsinghua University, China
Xingzhi Feng , National University of Defense Technology
Zhiwei Zhang , China Airforce Command College
Quanyuan Wu , National University of Defense Technology
pp. 710-715

Similarity Measurement of Web Sessions by Sequence Alignment (Abstract)

Yansheng Lu , Huazhong University of Science and Technology
Chaofeng Li , South-Central University for Nationalities
pp. 716-720

Handheld Device Oriented Adaptation Disposal for Web Access (Abstract)

Tieshuai Li , Tsinghua University, Beijing 100084, P.R.China
Xin Shuai , Tsinghua University, Beijing 100084, P.R.China
Aimin Liang , Tsinghua University, Beijing 100084, P.R.China
Liu Baolin , Tsinghua University, Beijing 100084, P.R.China
pp. 721-726

TLDFS: A Distributed File System based on the Layered Structure (Abstract)

Lei Wang , Beijing University of Aeronautics and Astronautics
Chen Yang , Beijing University of Aeronautics and Astronautics
pp. 727-732

MBF: a Real Matrix Bloom Filter Representation Method on Dynamic Set (Abstract)

Yafei Dai , Peking University, China
Mingzhong Xiao , Peking University, China
Jiacong Wang , Peking University, China
pp. 733-736

Management Location Service - to Auto-Configure Network Nodes with Domain Managers (Abstract)

GAO Tianhan , Northeastern University, Shenyang, P.R.China
GUO Nan , Northeastern University, Shenyang, P.R.China
pp. 737-742

A Constrained Maximum Frequent Itemsets Incremental Mining Algorithm (Abstract)

Han Wang , Yanshan University
Lingfu Kong , Yanshan University Qinhuangdao, China
pp. 743-747

Allocating Tasks in Multi-core Processor based Parallel System (Abstract)

Depei Qian , Beihang University, BeiJing 100083, China
Yi Liu , Beihang University, BeiJing 100083, China
Xin Zhang , Xi'an Jiaotong University, Xi'an 710049, China
He Li , Xi'an Jiaotong University, Xi'an 710049, China
pp. 748-753

Distributed collaborating system design via electronic institutional calculus (Abstract)

Guoyong Cai , Zhejiang University
Junyan Qian , Zhejiang University
Lingzhong Zhao , Zhejiang University
Ji Gao , Zhejiang University
pp. 754-761

Gingko: correlating causal paths in distributed systems (Abstract)

Yi Jin , Chinese Academy of Sciences
Yu Wen , Chinese Academy of Sciences
Jianfeng Zhan , Chinese Academy of Sciences
Zhihong Zhang , Chinese Academy of Sciences
Hui Wang , Chinese Academy of Sciences
Dan Meng , Chinese Academy of Sciences
Lei Wang , Chinese Academy of Sciences
pp. 762-767

QoS of Timeout-based self-Tuned Failure Detectors in iSCSI (Abstract)

Gang Liu , Huazhong University of Science and Technology, Wuhan, China
Guang Yang , Huazhong University of Science and Technology, Wuhan, China
JinLi Zhou , Huazhong University of Science and Technology, Wuhan, China
pp. 768-773

Design and Realization of CGI in Embedded Dynamic Web Technology (Abstract)

HUANG Jia-xi , Wuhan University of Technology, Wuhan 430063, China
CHEN Tian-huang , Wuhan University of Technology, Wuhan 430063, China
pp. 774-777

Building IPsec VPN in IPv6 Based on Openswan (Abstract)

GAO Wen-mei , Dalian Maritime University
LIU Lian , Dalian Maritime University
pp. 784-787

Opinion Mining in e-Learning System (Abstract)

Zhihao Yang , University of Technology, Dalian, P.R.China
Hongfei Lin , University of Technology, Dalian, P.R.China
Dan Song , University of Technology, Dalian, P.R.China
pp. 788-792

Exception Handling Policies for Composite Web Services and their Formal Description (Abstract)

Qin Lu , Dalian Maritime University
Xiuguo Zhang , Dalian Maritime University
Bo Su , Dalian Polytechnic University
Weishi Zhang , Dalian Maritime University
pp. 793-798

Research of Cluster Parallel Computing Model Based on Mobile Agent (Abstract)

Jiang Bo , Dalian MaritimeUniversity
Liu Meijing , Dalian Maritime University
pp. 799-802

Improved Algorithm and Simulation of the Provision Refrigerating Unit (Abstract)

HE Zhi-bin , Dalian Maritime University, Dalian 116026, China
SUN Yu-qing , Dalian Maritime University, Dalian 116026, China
GAN Hui-bing , Dalian Maritime University, Dalian 116026, China
ZHANG Jun-dong , Dalian Maritime University, Dalian 116026, China
ZENG Hong , Dalian Maritime University, Dalian 116026, China
pp. 803-808

Cryanalysis on a Nonrepudiable Threshold Proxy Signature Scheme with Known Signers (Abstract)

Zuowen Tan , Jiangxi University
Wang Jian , Xiangtan University
Hongguang Xiao , Xiangtan University, China
pp. 809-812

Experimental Views on Neighbor Selection in BitTorrent (Abstract)

Chanle Wu , Wuhan University, Wuhan
Litang Yang , Wuhan University, Wuhan
Yingchun Lei , Wuhan University, Wuhan
Qi Jiang , Wuhan University, Wuhan
pp. 813-818

Bandwidth Allocation Mechanism of ForCES Transport Mapping Layer Based on TCP/IP (Abstract)

Bin Zhuge , Zhejiang GongShang University
Weiming Wang , Zhejiang GongShang University
Jianqun Chen , Zhejiang GongShang University
pp. 819-823

Distributed Scheduling Strategies for Processing Multiple Divisible Loads with Unknown Network Resources (Abstract)

He Li , University of Science and Technology of China
Yinlong Xu , University of Science and Technology of China
Guangzhong Sun , University of Science and Technology of China
pp. 824-829

An optimal algorithm to fetch DHT routable (Abstract)

Yong-xiang Zhao , Beijing Jiaotong University, Beijing 100044, P.R.China
Chang-jia Chen , Beijing Jiaotong University, Beijing 100044, P.R.China
pp. 830-835

An Abstract Owner Resource Management Model Based on Auction Mechanism (Abstract)

Hong TANG , Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China
Yanbing LIU , Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China
Yi JIAN , Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China
pp. 836-840

A Log Analysis Audit Model Based on Optimized Clustering Algorithm (Abstract)

Hui Yu , Northwestern Polytechnic University
Xingjian Shi , Northwestern Polytechnic University
pp. 841-848
International Workshop on Intelligent Computing and Image Processing (ICIP 2007)

An Agent-based Policy Aware Framework for Web Services Security (Abstract)

BIN LI , Nanjing University, China
TONG-SHENG CHE , Yangzhou University, China
LIANG LI , Yangzhou University, China
JIAN-XIN LI , Yangzhou University, China
pp. 849-854

An Efficient Fine-grained Parallel Genetic Algorithm Based on GPU-Accelerated (Abstract)

RONG-SHENG HE , Dalian University of Technology, DaLian, 116024, China
ZHONG-XIAN CHI , Dalian University of Technology, DaLian, 116024, China
JIAN-MING LI , Dalian University of Technology, DaLian, 116024, China
XIAO-JING WANG , Dongbei University of Finance & Economics, DaLian, 116024, China
pp. 855-862

A Self-Evolutionary Method for Service Emergence in Pervasive Computing Environments (Abstract)

Hongbin Sun , Donghua University, China
Yongsheng Ding , Donghua University, China
pp. 863-868

A New Video Compression Method for Surveillance Network (Abstract)

Fu Xianping , Dalian Maritime University, China
Liang Dequn , Dalian Maritime University, China
pp. 869-872

A Digital Signature Schemes Without Using One-way Hash and Message Redundancy and Its Application on Key Agreement (Abstract)

Hua Zhang , University of Posts and Telecommunications, China
Zheng Yuan , Beijing Electronic Science and Technology Institute Beijing, P. R.China
Qiao-yan Wen , University of Posts and Telecommunications, China
pp. 873-878

Adaptation Method for Level of Detail (LOD) of 3D contents (Abstract)

Yongik Yoon , Sookmyung Women's University, Republic of KOREA
Hakran Kim , Sookmyung Women's University, Republic of KOREA
Hwajin Park , Sookmyung Women's University, Republic of KOREA
pp. 879-884

Feature-based Self-synchronous Audio Watermarking Technology (Abstract)

Ren Shuhong , Dalian Maritime University
Jiang Bo , Dalian Maritime University
pp. 891-896

Immune-Inspired Collaborative Filtering Technology for Rating-Based Recommendation System (Abstract)

LI Quan-zhong , Shandong Agricultural University , Taian
YUE Xun , Shandong Agricultural University , Taian
pp. 897-902

Applying IoC and AOP to the Architecture of Reflective Middleware (Abstract)

Jiang Bo , Dalian Maritime University, China
Ke Ju , Dalian Maritime University, China
pp. 903-908

Transmission Theory of the Risk Neural Network (Abstract)

Kecheng Wang , North China Electric Power University
Cunbin Li , North China Electric Power University
pp. 909-914

A QoS Model of Next Generation Network based on MPLS (Abstract)

Na Lin , Shenyang Institute of Aeronautical Engineering
Hongman Qi , Shenyang Institute of Aeronautical Engineering
pp. 915-919

An Improved Kademlia Protocol In a VoIP System (Abstract)

Cuiyun Fu , Zhongshan University, Guangzhou, China
Huiyou Chang , Zhongshan University, Guangzhou, China
Xiao Wu , Zhongshan University, Guangzhou, China
pp. 920-928
International Workshop on Data Management and Information System (DMIS 2007)

A Flexible Schema Method to Model the Web Data (Abstract)

Zhiqiang Zhang , Harbin Engineering University
Qi Guo , Tsinghua University
pp. 929-936

An Algorithm of Similarity Mining in Time Series Data on the Basis of Grey Markov Scgm(1,1) Model (Abstract)

Qingjing Gao , Xi'an University of Technology
Guoqiang Xiong , Xi'an University of Technology
pp. 937-940

The Task Distribution and Scheduling of The Parallel Delivery System for Massive Databases (Abstract)

Xu Zhanbo , Changchun University of Science and Technology, Changchun
Zhao Xin , Changchun University of Science and Technology, Changchun
Gong Yue , Changchun University of Science and Technology, Changchun
Wang Yuzhuo , Changchun University of Science and Technology, Changchun
Ge Shan , Changchun University of Science and Technology, Changchun
Fu Huixia , Changchun University of Science and Technology, Changchun
pp. 941-946

Dynamic Variable Ordering Based Concurrent Search for Distributed CSPs (Abstract)

Jigui SUN , Jilin University, Changchun, China
Jian GAO , Jilin University, Changchun, China
Chunhui LIU , Jilin University, Changchun, China
pp. 947-952

Information Extraction incorporating Paragraph Feature and Hidden Markov Model (Abstract)

Tang Huanling , Dalian Maritime University
Liu Na , Dalian Maritime University
Lu Mingyu , Dalian Maritime University
pp. 953-956

Ontology Based Sharing and Services in E-Learning Repository (Abstract)

Guo Wei , Xi'an Polytechnic University, Xi'an Shannxi 710048, China
Zhu Xin-juan , Xi'an Polytechnic University, Xi'an Shannxi 710048, China
Li Xian-Feng , Xi'an Polytechnic University, Xi'an Shannxi 710048, China
pp. 957-962

RISC3202: A Software Configuration Dual-Issue/Dual-Core Microprocessor (Abstract)

Qingdong YAO , Hangzhou Dianzi University
Jianwu Zhang , Hangzhou Dianzi University
Bin Wang , Hangzhou Dianzi University
Yingbiao YAO , Hangzhou Dianzi University
pp. 963-968

Research on Software Component Adaptation Based on Semantic Specification (Abstract)

Weishi Zhang , Dalian Maritime University, Dalian
Xiong Xie , Dalian Maritime University, Dalian
pp. 969-974

A Correctness Criterion for Transaction Management in Loosely Coupled System (Abstract)

Ximing Li , South China University of Agriculture, Guang Zhou Guang Dong
Jianqing Xi , South China University of Technology, Guang
Yubin Guo , South China University of Technology, Guang
Deyou Tang , South China University of Technology, Guang
pp. 975-982

A Modeling of Software Architecture Reliability (Abstract)

Weiru Chen , Shenyang Institute of Chemical Technology
Jun Wang , Shenyang Institute of Chemical Technology
Jun Liu , Shenyang Institute of Chemical Technology
pp. 983-986

A CCS based Model for Describing and Verifying the Behavior of Web Service (Abstract)

Weishi Zhang , Dalian Maritime University, Dalian
Zhiying Cao , Dalian Maritime University, Dalian
Li Bao , Dalian Maritime University, Dalian
pp. 987-994

The Research on the Usage of Business Process Mining in the Implementation of BPR (Abstract)

Chen Yan , Dalian Maritime University, Dalian
XIE Yi-wu , Dalian Maritime University
LI Xiao-wan , Dalian Maritime University
pp. 995-1000

Research on Store XML Data in Relational Database Based on XML Schema (Abstract)

XIE Yi-wu , Dalian Maritime University, Dalian
WANG Chen-yang , Dalian Maritime University, Dalian
CHEN Yan , Dalian Maritime University, Dalian
CAO Zhi-ying , Dalian Maritime University, Dalian
pp. 1001-1005

Ontology-BasedWeb Data Integration Architecture Modeling and Implementation (Abstract)

Wei-li ZHANG , Dalian Maritime University
Guan-yu LI , Dalian Maritime University
Huan-zhong GENG , Dalian Maritime University
pp. 1006-1009

Ontology-Based Query System Design and Implementation (Abstract)

Sha-sha DAI , Dalian Maritime University
Guan-yu LI , Dalian Maritime University
Sui-ming YU , Dalian Maritime University
pp. 1010-1015

Research and realization of personalized search engine based on Ontology (Abstract)

Li Guan-yu , Dalian University of Technology
Li Yong , Dalian Maritime University, P.R.China
pp. 1016-1020

A Co-training Approach based TEF-WA technique (Abstract)

Lu Mingyu , Dalian Maritime University
Tang Huanling , Dalian Maritime University
Liu Na , Dalian Maritime University
pp. 1021-1026

The XML-based Information Extraction on Data-intensive Page (Abstract)

Yanheng Li , Dalian Maritime University, Liaoning Dalian, P.R.China
pp. 1027-1030
Author Index

Author Index (PDF)

pp. 1031
80 ms
(Ver )