The Community for Technology Leaders
Parallel and Distributed Computing Applications and Technologies, International Conference on (2005)
Dalian, China
Dec. 5, 2005 to Dec. 8, 2005
ISBN: 0-7695-2405-2
TABLE OF CONTENTS

Preface (PDF)

pp. xxv
Cover
Keynote Speeches

An Agile Programming Model for Grid End Users (Abstract)

Chengchun Shu , Chinese Academy of Sciences, Beijing, China
Haozhi Liu , Chinese Academy of Sciences, Beijing, China
Zhiwei Xu , Chinese Academy of Sciences, Beijing, China
Haiyan Yu , Chinese Academy of Sciences, Beijing, China
pp. 3-7
Session 1B1: Interconnection Networks

Rearrangeability of the Tandem Cascade of Banyan-type Networks (Abstract)

Shuo-Yen Robert Li , Chinese University of Hong Kong
Xuesong Tan , Chinese University of Hong Kong
Yuxiu Shen , Chinese University of Hong Kong
pp. 11-15

ReCord: A Distributed Hash Table with Recursive Structure (Abstract)

Jianyang Zeng , Nanyang Technological University, Singapore
Wen-Jing Hsu , Nanyang Technological University, Singapore
pp. 16-20

The Topological Properties and Network Embedding of RP(k) (Abstract)

Fangai Liu , Shandong Normal University, Jinan, China
Liancheng Xu , Shandong Normal University, Jinan, China
pp. 21-25

Theory on Switch Preservation under 2-stage Interconnection (Abstract)

Shuo-Yen Robert Li , Chinese University of Hong Kong
Xuesong Tan , Chinese University of Hong Kong
pp. 26-30

A Reconfigurable Optical Interconnect System for DSAG (Abstract)

FAN Jian-Ping , Institute of Computing Technology, the Chinese Academy of Sciences, Beijing
LI Lei , Graduate School of the Chinese Academy of Sciences, Beijing
CHEN Ming-Yu , Institute of Computing Technology, the Chinese Academy of Sciences, Beijing
CAO Zheng , Graduate School of the Chinese Academy of Sciences, Beijing
pp. 31-34
Session 1B2: Parallelization Techniques

Loop Parallelisation for the Jikes RVM (Abstract)

Chris Kirkham , University of Manchester, UK
Jisheng Zhao , University of Manchester, UK
Ian Rogers , University of Manchester, UK
Ian Watson , University of Manchester, UK
pp. 35-39

Eliminating Inter-Thread Interference in Register File for SMT Processors (Abstract)

Hua Yang , Harbin Institute of Technology, Harbin, China
Xiaozong Yang , Harbin Institute of Technology, Harbin, China
Gang Cui , Harbin Institute of Technology, Harbin, China
pp. 40-45

Two-Path Limited Speculation Method for Static/Dynamic Optimization in Multithreaded Systems (Abstract)

Kanemitsu Ootsu , Utsunomiya University, Japan
Takashi Yokota , Utsunomiya University, Japan
Takanobu Baba , Utsunomiya University, Japan
Moriyuki Saito , Utsunomiya University, Japan
Fumihito Furukawa , Utsunomiya University, Japan
pp. 46-50

A New Way to High Performance NFS for Clusters (Abstract)

Rongfeng Tang , Chinese Academy of Sciences, China
Jin Xiong , Chinese Academy of Sciences, China
Dan Meng , Chinese Academy of Sciences, China
Jie Ma , Chinese Academy of Sciences, China
pp. 51-55

A Hybrid Parallel Loop Scheduling Scheme on Heterogeneous PC Clusters (Abstract)

Chao-Tung Yang , Tunghai University, Taiwan
Wen-Chung Shih , National Chiao Tung University, Taiwan
Ping-I Chen , Tunghai University, Taiwan
Shian-Shyong Tseng , Asia University, Taiwan
pp. 56-58

Table-Driven Code Optimizer (Abstract)

Se-Man Oh , Dongguk University
Sung-Lim Yun , Dongguk University
pp. 59-64
Session 1B3: Wireless Networks and Mobile Computing - 1

A Voronoi-Trajectory Based Hybrid Routing (VTBR) Algorithm for Wireless Ad Hoc Networks with Obstacles (Abstract)

Qu Yan , Dalian University of Technology, China
Chi Zhongxian , Dalian University of Technology, China
Wu Di , Dalian University of Technology, China
pp. 65-69

An Efficient Distributed Broadcasting Algorithm forWireless Ad Hoc Networks (Abstract)

Wanming Chu , University of Aizu, Japan
Shietung Peng , Hosei University, Japan
Yamin Li , Hosei University, Japan
pp. 75-79

A Ring Removal Movement-Based Mobility Location Update Scheme (Abstract)

Yaqin YANG , Central China Normal University, Wuhan
Jiwei CAO , Central China Normal University, Wuhan
Jincai YANG , Central China Normal University, Wuhan
pp. 80-84

Monte Carlo Simulation of LEACH Protocol for Wireless Sensor Networks (Abstract)

Ying Wang , Dalian Maritime University, China
Mudi Xiong , Dalian Maritime University, China
pp. 85-88
Session 1B4: Grid Computing Systems - I

A Scalable Security Architecture for Grid (Abstract)

Jiangang Shen , Dept. of Computer Science Nanjing University of Posts and Telecommunications, China
Quan Zhou , Dept. of Computer Science Nanjing University of Posts and Telecommunications, China
Geng Yang , Dept. of Computer Science Nanjing University of Posts and Telecommunications, China
Chunming Rong , Dept. of Electrical and Computer Engineering Nanjing University of Posts and Telecommunications, China
pp. 89-93

Design and Implementation of Grid Monitoring System Based on GMA (Abstract)

Meirong Chen , University of Electronic Science and Technology of China,Chengdu Sichuan
Jianwei Liao , University of Electronic Science and Technology of China,Chengdu Sichuan
Hongbin Cai , University of Electronic Science and Technology of China,Chengdu Sichuan
Pandeng Jiang , University of Electronic Science and Technology of China,Chengdu Sichuan
pp. 94-96

A Resource Price-adjusting Mechanism for Supply and Demand Balance in Grid Computing (Abstract)

Lulai Yuan , Tongji University, Shanghai, China
Guosun Zeng , Tongji University, Shanghai, China
Xiongwei Mao , Tongji University, Shanghai, China
pp. 97-99

Heterogeneous Resource Selection with Portfolio Optimization in Grid Economy (Abstract)

Chanle Wu , Wuhan University, China
Huyin Zhang , Wuhan University, China
Yu Hua , Wuhan University, China
Libing Wu , Wuhan University, China
pp. 100-102

WGMDS: A WSRF-Compliant Information Service on Wireless Grids (Abstract)

Chuanshan Gao , Fudan University, China
Changlai Huang , Fudan University, China
Ming Li , Fudan University, China
Jianghu Yang , Fudan University, China
pp. 103-105

A Novel Security Model Based on Virtual Organization for Grid (Abstract)

Geng YANG , Nanjing University of Posts & Telecommunications
Quan ZHOU , Nanjing University of Posts & Telecommunications
Jiangang SHEN , Nanjing University of Posts & Telecommunications
Xiuying WU , Nanjing University of Posts & Telecommunications
pp. 106-109
Session 1B5: Security, Reliability, and Fault-Tolerance - I

A Simple Process Calculus for the analysis of Security Protocols (Abstract)

Yuxi Fu , Shanghai Jiao Tong University, Shanghai
Yonggen Gu , Shanghai Jiao Tong University, Shanghai
Guoqiang Li , Japan Advanced Institute of Science and Technology, Japan
pp. 110-114

D-S Evidence Theory and its Data Fusion Application in Intrusion Detection (Abstract)

Zhe Zhang , Hebei University, Baoding, China
Junfeng Tian , Hebei University, Baoding, China
Ruizhong Du , Hebei University, Baoding, China
Weidong Zhao , Hebei University, Baoding, China
pp. 115-119

Efficient Traitor Tracing Scheme Based On NTRU (Abstract)

YANG Bo , China Agricultural University
LV Xixiang , Xidian University, Xian, China
Changxing Pei , Xidian University, Xian, China
pp. 120-124

A Study of Intrusion Signature Based on Honeypot (Abstract)

Ren-ling LI , The Library of Hebei medical university, Shijiazhuang, China
Jian-ling WANG , Hebei University, Baoding, China
Jun-feng TIAN , Hebei University, Baoding, China
Xiao-hui YANG , Hebei University, Baoding, China
pp. 125-129

The Architecture of the Large-scale Distributed Intrusion Detection System (Abstract)

Jun Li , Lenovo Security Technologies, China
Yixian Yang , Beijing University of Posts and Telecommunications, China
Yonggang Chu , Lenovo Security Technologies, China
pp. 130-133
Session 1C1: Network Architectures

Active Probe of Available Bandwidth: Analysis and Improvement (Abstract)

Yunhui Yi , Xidian University, China
Changxing Pei , Xidian University, China
Changhua Zhu , Xidian University, China
Dongxiao Quan , Xidian University, China
pp. 134-138

CISOQ: A Practical High-Performance Packet Switch Architecture for the Support of Multicast Traffic (Abstract)

Xiaobei Li , Air Force Engineering University, Shanxi, China
Binqiang Wang , National Digital Switching System Engineering and Technological Center, Zhengzhou, China
Jing Qu , National Digital Switching System Engineering and Technological Center, Zhengzhou, China
Ximing Hu , National Digital Switching System Engineering and Technological Center, Zhengzhou, China
pp. 139-143

Overlay Multicasting over Multihomed Proxie (Abstract)

Weinong Wang , Shanghai Jiao Tong University, China
Ruijun Yang , Shanghai Jiao Tong University, China
Xiao Chen , Shanghai Jiao Tong University, China
Qi Xia , Shanghai Jiao Tong University, China
pp. 144-148

Research on New Types of Network Architecture (Abstract)

Yan Wang , UESTC, Chengdu, China
Jiazhi Zeng , UESTC, Chengdu, China
Mengqin Xia , UESTC, Chengdu, China
Fasheng Yi , UESTC, Chengdu, China
pp. 149-153

Study on Network Topology Visualization Algorithm and Implement Based on A Algorithm (Abstract)

Changhua Zhu , Xidian Univ., Xian , China
Wei Yuan , Xidian Univ., Xian , China
Yun-hui Yi , Xidian Univ., Xian , China
Nan Chen , Xidian Univ., Xian , China
Haiyun Xiao , Xidian Univ., Xian , China
Changxing Pei , Xidian Univ., Xian , China
pp. 154-157
Session 1C2: Communication and Multimedia Systems

Construction of a Prototype of a Volume Communications Environment (Abstract)

Masahiro Watanabe , Center for Information Science, Japan Advanced Institute Science and Technologym, Japan
Motoi Okuda , Japan Advanced Institute Science and Technology and Fujitsu Limited
Teruo Matsuzawa , Center for Information Science, Japan Advanced Institute Science and Technology
pp. 158-162

VoD Service Model and Performance Evaluation on the China?s High Performance Broadband Information Network (3Tnet) (Abstract)

Feng Lin , Fudan University, Shanghai, China
Xin Wang , Fudan University, Shanghai, China
Xiangyang Xue , Fudan University, Shanghai, China
pp. 163-167

Detecting BGP Misconfiguration for BGP/MPLS VPNs (Abstract)

Guowen Teng , Jilin Normal University, China
Haiying Liang , Jilin Normal University, China
Hongjun Wang , Northeastern University, Shenyang
Yuan Gao , Northeastern University, Shenyang
pp. 168-170

A New Tunnel Scheme for Multimedia Communications Traversing NAT/Firewall in NGN (Abstract)

Zhiping Xie , Wuhan University, Wuhan Hubei, China
Gengsheng Zheng , Wuhan University, Wuhan Hubei, China
Bo Wang , Wuhan University, Wuhan Hubei, China
Guiming He , Wuhan University, Wuhan Hubei, China
pp. 171-173

Study of Channel Characteristics of Power Line Communications Networks (Abstract)

Zhai Mingyue , North China Electric Power University (Beijing)
Bi Haiying , North China Electric Power University (Beijing)
Liu Chunying , North China Electric Power University (Beijing)
pp. 174-176

The maximal rates of more general complex orthogonal designs (Abstract)

Haibin Kan , Fudan University, Shanghai, China
Hong Shen , Japan Advanced Institute of Science and Technology Tatsunokuchi, Ishikawa
pp. 177-180
Session 1C3: Wireless Networks and Mobile Computing - II

Research on Multi-constrained QoS Routing Scheme Using Mean Field Annealing (Abstract)

Lianggui Liu , Nanjing University of Posts and Telecommunications, China
Guangzeng Feng , Nanjing University of Posts and Telecommunications, China
pp. 181-185

Data Dissemination Model for Location-Based Services (Abstract)

KwangJin Park , Korea University, Seoul
Ki-Sik Kong , Korea University, Seoul
MoonBae Song , Korea University, Seoul
pp. 186-190

A Cluster-Based Energy-Efficient Scheme for Sensor Networks (Abstract)

Fan Zhang , Huazhong University, Wuhan, China
Lai Tu , Huazhong University, Wuhan, China
Benxiong Huang , Huazhong University, Wuhan, China
Jian Zhang , Huazhong University, Wuhan, China
pp. 191-195

RandomWalk Routing for Wireless Sensor Networks (Abstract)

Hui Tian , Japan Advanced Institute of Science and Technology
Hong Shen , Japan Advanced Institute of Science and Technology
Teruo Matsuzawa , Japan Advanced Institute of Science and Technology
pp. 196-200

Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks (Abstract)

Ruijun Yang , Network Information Center, Shanghai Jiaotong University
Xinli Huang , Dept. of Computer Science and Engineering, Shanghai Jiaotong University
Qunhua Pan , Dept. of Computer Science and Engineering, Shanghai Jiaotong University
Minglu Li , Dept. of Computer Science and Engineering, Shanghai Jiaotong University
Qi Xia , Network Information Center, Shanghai Jiaotong University
Weinong Wang , Network Information Center, Shanghai Jiaotong University
pp. 201-204
Session 1C4: Optical Networks

Dynamic Shared Path Protection Algorithm in WDM Mesh Networks under Service Level Agreement Constraints (Abstract)

Lemin Li , UESTC, Chengdu, China
Rongxi He , Dalian Maritime University, China
Bin Lin , Dalian Maritime University, China
Chen Gu , Dalian Maritime University, Dalian, China
pp. 205-209

A Unified Framing Protocol for Hybrid Data Transport (Abstract)

Zhanqi XU , Xidian University, Xian, China
Changxin PEI , Xidian University, Xian, China
Chunting WANG , Xidian University, Xian, China
Aijun WEN , Xidian University, Xian, China
pp. 210-214

On-Line Routing in WDM-TDM Switched Optical Mesh Networks (Abstract)

Arun Vishwanath , Australian National University
Weifa Liang , Australian National University
pp. 215-219

Wavelength Assignment for Parallel FFT Communication Pattern on Linear Arrays by Lattice Embedding (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Yawen Chen , Japan Advanced Institute of Science and Technology
pp. 220-224

Splitter Placement Problem on Directed Fiber Trees (Abstract)

Bao-Hua Zhao , University of Science and Technology of China, Hefei, Anhui, China
Tian Hu , University of Science and Technology of China, Hefei, Anhui, China
pp. 225-228
Session 1C5: Security, Reliability, and Fault-Tolerance - II

On the Effectiveness of multi-similarity for early detection of worms (Abstract)

Hongli Zhang , Harbin Institute of Technology, China
Mingzeng Hu , Harbin Institute of Technology, China
Hui He , Harbin Institute of Technology, China
Zhenjiang Tang , Harbin Institute of Technology, China
pp. 229-233

Intrusion Detection Based on An Improved ART2 Neural Network (Abstract)

Chi Zhongxian , Dalian University of Technology, Dalian,China
Dai Ji , Dalian University of Technology, Dalian,China
Wu Di , Dalian University of Technology, Dalian,China
pp. 234-238

Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Liu-Sheng Huang , University of Science and Technology of China
Ming-Jun Xiao , University of Science and Technology of China
Yong-Long Luo , University of Science and Technology of China
pp. 239-243

Computing the Reliability for Clustered Ad Hoc Networks (Abstract)

Wu Di , Dalian University of Technology,China
Chi Zhongxian , Dalian University of Technology,China
Li x Li Qing , Dalian University of Technology,China
pp. 244-246

A Disaster Recovery System Model in an E-government System (Abstract)

Zengxin Li , Security Engineering and Technology Research Center, Beijing, Xidian University
Zhen Cai , Security Engineering and Technology Research Center, Beijing, Xidian University
Lihua Zhou , Computer Network and Information Security of the Ministry of Education,Xidian University
Kun Wang , Computer Network and Information Security of the Ministry of Education,Xidian University
pp. 247-250
Session 2A1: Security, Reliability, and Fault-Tolerance - III

Trusted Computing-Based Security Architecture For 4G Mobile Networks (Abstract)

Weichi Yu , Southwest Jiaotong University, Chengdu, Sichuan, China
Xiaohu Tang , Southwest Jiaotong University, Chengdu, Sichuan, China
Dake He , Southwest Jiaotong University, Chengdu, Sichuan, China
Yu Zheng , Southwest Jiaotong University, Chengdu, Sichuan, China
pp. 251-255

Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic (Abstract)

Yue Fu , Hebei University, Baoding, China
Jun-feng Tian , Hebei University, Baoding, China
Ying Xu , Hebei University, Baoding, China
Jian-ling Wang , Hebei University, Baoding, China
pp. 256-258

A New Approach to Automatically Detect Worms (Abstract)

Fang Bin-Xing , Harbin Institute of Technology, China
Wang Ping , Harbin Institute of Technology, China
Yun Xiao-Chun , Harbin Institute of Technology, China
pp. 259-263

Optimization of Intrusion Detection through Fast Hybrid Feature Selection (Abstract)

Jong Sou Park , Hankuk Aviation University
Khaja Mohammad Shazzad , Hankuk Aviation University
pp. 264-267

An Efficient Keys Agreement for Multi-party?s Communication (Abstract)

Zhang Peng , Zhejiang University Hangzhou, China
Li Xin , Zhejiang University Hangzhou, China
Ma Xuying , Zhejiang University Hangzhou, China
Ye Chengqing , Zhejiang University Hangzhou, China
pp. 267-269

Worm Detection in Large Scale Network by Traffic (Abstract)

Yi Xin , Harbin Institute of Technology..Harbin, China
Bin-Xing Fang , Harbin Institute of Technology..Harbin, China
Hai-Yong Chen , Harbin Institute of Technology..Harbin, China
Xiao-Chun Yun , Harbin Institute of Technology..Harbin, China
pp. 270-273
Session 2A2: Wireless Networks and Mobile Computing - III

Adaptive Carrier Sensing and Packet Sending - An Alternative to Boost the Performance in Directional Communications (Abstract)

T. Hunziker , Keihanna Science City, Kyoto, Japan
K. Nakano , Hiroshima University, Japan
Jacir L. Bordim , University of Brasilia, Brazil
pp. 274-279

An Efficient Key Management Scheme for Secure Sensor Networks (Abstract)

TU HuiJuan , WuHan University, China
Wen Song , WuHan University, China
DU RuiYing , WuHan University, China
pp. 279-283

Design and Analysis of High Speed WLAN Systems with Adaptive Margin Technology (Abstract)

Xiaohui Li , Xidian University, China
Weidong Kou , Xidian University, China
Kechu Yi , Xidian University, China
Changxing Pei , Xidian University, China
Naian Liu , Xidian University, China
pp. 284-287

An Efficient Topology Maintenance Algorithm Based on Shortest Path Tree for Wireless Sensor Networks (Abstract)

Yilin Chang , Xidian University, China
Xin Zhang , Xidian University, China
Zhong Shen , Xidian University, China
Can Cui , Xidian University, China
pp. 288-292

Delay Character of a Novel Architecture for IEEE 802.16 Systems (Abstract)

Bo Yang , Xidian University, China
Xiaohui Li , Xidian University, China
Naian Liu , Xidian University, China
Changxing Pei , Xidian University, China
pp. 293-296
Session 2A3: Ubiquitous Computing Systems

Developing context-aware applications in ubiquitous computing environments (Abstract)

Jie Sun , Zhejiang University, China
ZhaoHui Wu , Zhejiang University, China
pp. 297-301

Reconfigurable Computing in Ubiquitous Computers: A Roadmap (Abstract)

Lu Yan , TUCS, Lemminkaisenkatu 14, Turku, Finland
Zheng Liang , TUCS, Lemminkaisenkatu 14, Turku, Finland
pp. 302-305

Design of a Security Management Middleware in Ubiquitous Computing Environments (Abstract)

Soongju Kang , Dept. of Electrical Engineering, Kyungpook National University, Korea
Sangok Kim , Department of Computer Science, Kyungpook National University, Korea
Sangwook Kim , Department of Computer Science, Kyungpook National University, Korea
Kanghee x Kanghee Lee , Department of Computer Science, Kyungpook National University, Korea
Hyunchul Bae , Department of Computer Science, Kyungpook National University, Korea
Zhefan Jiang , Department of Computer Science, Kyungpook National University, Korea
pp. 306-308

An adaptable software architecture based on mobile components in pervasive computing (Abstract)

Yong Zhang , CIT Lab of Shanghai Jiaotong University, Shanghai
Songqiao Han , CIT Lab of Shanghai Jiaotong University, Shanghai
Change Fan , CIT Lab of Shanghai Jiaotong University, Shanghai
Shensheng Zhang , CIT Lab of Shanghai Jiaotong University, Shanghai
pp. 309-311

On-chip Debug for an Asynchronous Java Accelerator (Abstract)

Juha Plosila , Dept. of Information Technology, University of Turku, Finland
Lu Yan , Dept. of Computer Science, Abo Akademi University
Zheng Liang , Dept. of Computer Science, Abo Akademi University
Kaisa Sere , Dept. of Computer Science, Abo Akademi University
pp. 312-315

Design of Virtual Personal Computing Environment for Ubiquitous Computing (Abstract)

Faqiong Jiang , Graduate School of the Chinese Academy of Sciences Beijing, China
Xiaoli Su , Graduate School of the Chinese Academy of Sciences Beijing, China
Hongzhou Shi , Institute of Computing Technology, Chinese Academy of Sciences, China
Zhenmin Zhu , Institute of Computing Technology, Chinese Academy of Sciences, China
Jintao Li , Institute of Computing Technology, Chinese Academy of Sciences, China
pp. 316-319
Session 2A4: Internet Computing and Web Technology - II

Web Media Service based on Streaming Player supporting ubiquitous environment (Abstract)

Zhefan Jiang , Kyungpook National University, South Korea
Sangok Kim , Kyungpook National University, South Korea
Kanghee Lee , Kyungpook National University, South Korea
Sangwook Kim , Kyungpook National University, South Korea
pp. 320-322

Design and Implementation of A Script Language Based On-Demand Service Framework (Abstract)

Chuan He , Tsinghua University, Beijing
ZhenChun Huang , Tsinghua University, Beijing
pp. 323-327

Integration and Share of Spatial Data Based on Web Service (Abstract)

Minglu Li , Shanghai Jiao Tong University,China
Xiang Ma, , Shanghai Jiao Tong University,China
Qunhua Pan , Shanghai Jiao Tong University,China
pp. 328-332

Ontology-Based 3d Body Scanning Data Sharing System (Abstract)

Zhang Xin , Xian University of Engineering Science and Technology
Zhu Xinjuan , Xian University of Engineering Science and Technology
pp. 333-335

Optimal Selection of Web Services for Composition Based on Interface-Matching and Weighted Multistage Graph (Abstract)

Yan Gao , Northeastern University, China
Yu Dai , Northeastern University, China
Lei Yang , Northeastern University, China
Jun Na , Northeastern University, China
Bin Zhang , Northeastern University, China
Qiang Gong , Northeastern University, China
pp. 336-338

Research on Improved Role Hierarchy Model in Extended Organization PKI Networks (Abstract)

Baoyi Wang , North China Electric Power University, Baoding, China
Shaomin Zhang , Xidian University, China
pp. 339-342
Session 2A5: Simulation and Performance Evaluation - I

Performance Comparison between VOPP and MPI (Abstract)

Z. Huang , Department of Computer Science, University of Otago, Dunedin, New Zealand
P. Werstein , Department of Computer Science, University of Otago, Dunedin, New Zealand
M. Purvis , Department of Information Science, University of Otago, Dunedin, New Zealand
pp. 343-347

Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2 (Abstract)

Jiubin Ju , JiLin University, China
Hongzi Zhu , JiLin University, China
Qiang Li , JiLin University, China
Meng Zhang , JiLin University, China
pp. 348-352

Research on the Performance Analysis of the Concurrent System (Abstract)

Jin Guo , Southwest Jiaotong University, Chengdu,China
Mingyuan Liu , Southwest Jiaotong University, Chengdu,China
Lifang Liu , Southwest Jiaotong University, Chengdu,China
pp. 353-355

Component based performance prediction for network processor based system (Abstract)

Hong Xiao , South China University of Technology, Guangzhou, China
Ling Zhang , South China University of Technology, Guangzhou, China
Di Wu , South China University of Technology, Guangzhou, China
pp. 356-358

Simulation-Based Optimization Strategy for Liquid Fueled Multi-stage Space Launch Vehicle (Abstract)

He Linshu , School of Astronautics, Beihang University, Beijing
Saqlain Akhtar , School of Astronautics, Beihang University, Beijing
pp. 359-365
Session 2B1: Security, Reliability, and Fault-Tolerance - IV

Wrapping Client-Server Application to Web Services for Internet Computing (Abstract)

Feng Chen , De Montfort University, Leicester, UK
Chunyan Guo , Dalian University of Technology, China
He Guo , Dalian University of Technology, China
Hongji Yang , De Montfort University, Leicester, UK
pp. 366-370

A New Algorithm to Solve Synchronous Consensus for Dependent Failures (Abstract)

Min Song , Old Dominion University
Jun Wang , Old Dominion University
pp. 371-375

An Efficient Asynchronous Proactive RSA Scheme (Abstract)

Ruishan Zhang , Shanghai Jiaotong University, China
Kefei Chen , Shanghai Jiaotong University, China
pp. 376-380

An Efficient Group Key Management Scheme: Link Tree Protocol (Abstract)

Bai Yingcai , Shanghai Jiaotong University, China
Ma Fanyuan , Shanghai Jiaotong University, China
Zhang Jun , Shanghai Jiaotong University, China
Gu Dawu , Shanghai Jiaotong University, China
pp. 381-385

Fast Two Phrases PPM for IP Traceback (Abstract)

Liang Hu , JiLin University, China
Jiubin Ju , JiLin University, China
Qiang Li , JiLin University, China
Qinyuan Feng , JiLin University, China
pp. 386-389
Session 2B2: Grid Computing Systems - II

Workflow-based Remote-Sensing Image Processing Application in ImageGrid (Abstract)

Ran Zheng , Huazhong University of Science and Technology, Wuhan,China
Hai Jin , Huazhong University of Science and Technology, Wuhan,China
Ying Li , Huazhong University of Science and Technology, Wuhan,China
Qin Zhang , Huazhong University of Science and Technology, Wuhan,China
pp. 390-394

JSChord: A Peer-to-Peer System to Achieve Max Throughput (Abstract)

Yifeng Shao , Shanghai Jiao Tong University
Feng Hong , Shanghai Jiao Tong University
Minglu Li , Shanghai Jiao Tong University
pp. 395-399

An Adaptive Advance Reservation Mechanism for Grid Computing (Abstract)

Jianqun Cui , Central China Normal University, Wuhan
Chanle Wu , School of Computer, Wuhan University, Wuhan, China
Jianbing Xing , National Engineering Research Center of Multimedia Software, Wuhan, China
Libing Wu , National Engineering Research Center of Multimedia Software, Wuhan, China
pp. 400-403

Dynamic Role and Context-Based Access Control for Grid Applications (Abstract)

Heping Hu , Huazhong University of Science and Technology, Wuhan , China
Hanbing Yao , Huazhong University of Science and Technology, Wuhan , China
Baohua Huang , Huazhong University of Science and Technology, Wuhan , China
Ruixuan Li , Huazhong University of Science and Technology, Wuhan , China
pp. 404-406

Integrating Agent and Web Service into Grid Service Workflow System (Abstract)

Zhengli Zhai , University of Science and Technology Beijing, China
Wencai Guo , University of Science and Technology Beijing, China
Yang Yang , University of Science and Technology Beijing, China
Zhimin Tian , University of Science and Technology Beijing, China
pp. 407-410
Session 2B3: Software Technology and Programming Language

Role Based Platform Independent Web Application Modeling (Abstract)

Chengwan He , Wuhan Institute of Chemical Technology, China
Wenjie Tu , Wuhan Institute of Chemical Technology, China
Keqing He , Wuhan University, China
pp. 411-415

Chocolat/SMV: A Translator from CafeOBJ into SMV (Abstract)

Kazuhiro Ogata , NEC Software Hokuriku, Ltd.
Kokichi Futatsugi , School of Information Science, JAIST, Japan
Masahiro Nakano , School of Information Science, JAIST, Japan
Masaki Nakamura , School of Information Science, JAIST, Japan
pp. 416-420

Formal Description and Complexity Analysis of Routing in Mobile Ad Hoc System (Abstract)

Linpeng Huang , Shanghai Jiao Tong University
Jinkui Xie , Shanghai Jiao Tong University
pp. 421-423

Coalgebraic Component Specification and Verification in RSL (Abstract)

Sun Meng , National University of Singapore
Zhang Naixiao , Peking University
Bernhard K. Aichernig , United Nations University
pp. 424-426

Software Component Model for Network Processor Based System (Abstract)

Hong Xiao , South China University of Technology, Guangdong
Di Wu , South China University of Technology, Guangdong
Ling Zhang , South China University of Technology, Guangdong
pp. 427-429

A Segment-based Approach of Defending Against Buffer Overflow Attacks (Abstract)

Ji-yan Zheng , Beijing Institute of Technology, China
Yu-an Tan , Beijing Institute of Technology, China
Yuan-da Cao , Beijing Institute of Technology, China
pp. 430-433
Session 2B4: Agent Technology - I

An OO-based Design Model of Software Agent (Abstract)

Yao SHU , National University of Defense Technology, China
Jianxing LI , National University of Defense Technology, China
Xinjun MAO , National University of Defense Technology, China
pp. 434-440

A Novel Peer-to-Peer Intrusion Detection System (Abstract)

Kun Xiao , Software School,Fudan University, Shanghai, China
Ji Zheng , Software School,Fudan University, Shanghai, China
Xiangyang Xue , Dept. of Computer Science and Engineering, Fudan University, Shanghai, China
Xin Wang , Dept. of Computer Science and Engineering, Fudan University, Shanghai, China
pp. 441-445

A Survey of Mobile Agent-Based Fault-Tolerant Technology (Abstract)

Xavier Defago , Japan Advanced Institute of Science and Technology
Hong Shen , Japan Advanced Institute of Science and Technology
Wenyu Qu , Japan Advanced Institute of Science and Technology
pp. 446-450

Agent-Oriented Early Requirement Analysis of Distributed Simulation Environment of Fluid Flow (Abstract)

Zuobin CHEN , National University of Defense Technology, China
Jianxing LI , National University of Defense Technology, China
Zhichang QI , National University of Defense Technology, China
pp. 451-455

Research of Multi-Agent System Model and Learning Method (Abstract)

Yan Han , Dept. of Electronic and Information Engineering, North University of China
Yong-mei Zhang , Dept. of Computer Science and Technology, North University of China
pp. 456-460
Session 2B5: Simulation and Performance Evaluation - II

How the Enterprise Choosing Strategic Action: Modeling, Algorithm and Simulation (Abstract)

Wang Guangmin , Wuhan University, Hubei, China
Chen Yalin , Wuhan University, Hubei, China
Wang Xianjia , Wuhan University, Hubei, China
pp. 461-465

An Asynchronous Event Relation Model for Monitoring Distributed System (Abstract)

Ming Chen , China University of Petroleum
Benting Wan , China University of Petroleum
pp. 466-470

A Distributed Architecture for Network Performance Measurement and Evaluation System (Abstract)

Zhang Hongli , Harbin Institute of Technology, China
Fang Binxing , Harbin Institute of Technology, China
Sun Hongjie , Harbin Institute of Technology, China
pp. 471-475

A Study of Parallel Prefetching Algorithms Using Trace-Driven Simulation (Abstract)

Dingqing Hu , Huazhong University of Science and Technology,Wuhan,China
Changsheng Xie , Huazhong University of Science and Technology,Wuhan,China
CaiBin CaiBin , Huazhong University of Science and Technology,Wuhan,China
pp. 476-478

Performance Evaluation of SLIM and DRBL Diskless PC Clusters on Fedora Core 3 (Abstract)

Chao-Tung Yang , Tunghai University, Taiwan
Ya-Ling Chen , Tunghai University, Taiwan
Ping-I Chen , Tunghai University, Taiwan
pp. 479-482
Session 2C1: Security, Reliability, and Fault-Tolerance - V

An Efficient Protocol for the Problem of Secure Two-party Vector Dominance (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Yingpeng Sang , Japan Advanced Institute of Science and Technology
Zonghua Zhang , Japan Advanced Institute of Science and Technology
pp. 488-492

A Brief Comparative Study on Analytical Models of Computer System Dependability and Security (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Yingpeng Sang , Japan Advanced Institute of Science and Technology
Xavier Defago , Japan Advanced Institute of Science and Technology
Zonghua Zhang , Japan Advanced Institute of Science and Technology
pp. 493-497

Fault-Tolerance Schemes for Hierarchical Mesh Networks (Abstract)

Jason Zurawski , Montclair State University, NJ
Dajin Wang , Montclair State University, NJ
pp. 498-502

Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme (Abstract)

Fanyuan Ma , Shanghai Jiao Tong University, Shanghai, China
Ruijun Yang , Shanghai Jiao Tong University, Shanghai, China
Yin Li , Shanghai Jiao Tong University, Shanghai, China
Xinli Huang , Shanghai Jiao Tong University, Shanghai, China
pp. 503-506
Session 2C2: Grid Computing Systems - III

JSGrid: An Environment for Heterogenous Cluster Computing (Abstract)

Kazuhiro Takeda , Kagoshima University, Japan
Christopher J. Ashley , Kagoshima University, Japan
Shigeru Nakayama , Kagoshima University, Japan
Satoshi Ono , Kagoshima University, Japan
pp. 507-512

A Scheduling Method for Divisible Workload Problem in Grid Environments (Abstract)

Said Elnaffar , College of IT, UAE University
Ho Tu Bao , Japan Advance Institute of Science and Technology, Japan
Takuya Katayama , Japan Advance Institute of Science and Technology, Japan
Nguyen The Loc , Japan Advance Institute of Science and Technology, Japan
pp. 513-517

Design and Implementation of TIGER Grid: an Integrated Metropolitan-Scale Grid Environment (Abstract)

Wen-Chung Chiang , Hsiuping Institute of Technology, Taiwan
Kuan-Ching Li , Providence University, Taiwan
Po-Chi Shih , Tunghai University, Taiwan
Chao-Tung Yang , Tunghai University, Taiwan
pp. 518-520

A Run-Time Scheduling Policy for Dependent Tasks in Grid Computing Systems (Abstract)

Yanxiang He , Wuhan University, Wuhan, Hubei
Weidong Wen , Wuhan University, Wuhan, Hubei
Haowen Liu , Wuhan University, Wuhan, Hubei
Hui Jin , Wuhan University, Wuhan, Hubei
pp. 521-523

Integration Patterns of Grid Security Service (Abstract)

Xuefeng Lv , Department of PLA
Jingwei Zhong , University of Defense Technology, China
Xiangli Qu , University of Defense Technology, China
Xuejun Yang , University of Defense Technology, China
pp. 524-528

MAS organization: design, enforcement and instantiation (Abstract)

Xie Ke-fan , Wuhan university of technology, Hubei,China
Ye Chun , Wuhan university of technology, Hubei,China
Wang Xian-jia , Wuhan university of technology, Hubei,China,
Chen Ya-lin , Wuhan university of technology, Hubei,China,
pp. 529-532
Session 2C3: Internet Computing and Web Technology - I

Incentives for Participating in a Hybrid Peer-to-Peer System (Abstract)

Guangzhong Sun , University of Science and Technology of China, Hefei, Anhui
Junmin Wu , University of Science and Technology of China, Hefei, Anhui
Guoliang Chen , University of Science and Technology of China, Hefei, Anhui
pp. 533-536

Development of an Internet Home Automation System using Java and Dynamic DNS Service (Abstract)

Lihua ZHOU , Multimedia Technology Institute, Xidian, University, Xian, China
Junding SUN , Multimedia Technology Institute, Xidian, University, Xian, China
Ximin ZHANG , Minstry of Education Key Lab of Computer and Information Security,Xidian Univ.
pp. 537-539

Remote Monitoring of Air-Quality over Internet (Abstract)

Ma Ruifang , Xian Jiaotong University, China
Wang Huiran , Xian University Of Engineering Science and Technology, China
pp. 540-542

Using Semantic Web Technologies to Specify Constraints of RBAC (Abstract)

Dong Yabo , Zhejiang University
Zhu Miaoliang , Zhejiang University
Wu Di , Zhejiang University
Lin Jian , Zhejiang University
pp. 543-545

Verifying Web Services Composition: A Transformation-Based Approach (Abstract)

QingPing Tan , National University of Defense Technology Changsha, Hunan, China
Feng Liu , National University of Defense Technology Changsha, Hunan, China
YanPing Yang , National University of Defense Technology Changsha, Hunan, China
Yong Xiao , National University of Defense Technology Changsha, Hunan, China
JinShan Yu , National University of Defense Technology Changsha, Hunan, China
pp. 546-548

A Case of Application-level Multicast for Real-time Video Delivery over Internet (Abstract)

Guiming He , Electric Engineering School, Wuhan University Wuhan
Zhensheng Liu , Computer School Wuhan University, China
pp. 549-552
Session 2C4: Agent Technology - II

A Study of Distributed Parallel Processing for Queen Ant Strategy in Ant Colony Optimization (Abstract)

Shigeru Nakayama , Kagoshima University, Japan
Toshiya Ito , Kagoshima University, Japan
Ichiro Iimura , University of Kumamoto
Koji Hamaguchi , Software Vision Co., Ltd., Japan
pp. 553-557

How to build bargaining agents in the e-commerce modeling and analysis (Abstract)

Wang Xianjia , Wuhan University, Hubei, China
Chen Yalin , Wuhan University, Hubei, China
Ye Chun , Wuhan University, Hubei, China
Zhu Wenqi , Research Department, Tencent Inc., Guandong, China
pp. 558-562

Multi-agent-oriented Modeling for Intelligence Reconnaissance System (Abstract)

Xiaobin Liu , Academy of Armored Force Engineering, Beijing, China
Xiong Li , Academy of Armored Force Engineering, Beijing, China
Na Hao , Academy of Armored Force Engineering, Beijing, China
pp. 563-565

describer:Service-Oriented Multiagent Architecture for Mobile Environment (Abstract)

Zhiqiang Liu , Shanghai Jiaotong University, China
Huanye Sheng , Shanghai Jiaotong University, China
Dong Wang , Shanghai Jiaotong University, China
pp. 566-568

A Layered Resource Management Model in P2P System (Abstract)

Wang Dan , Beijing University of Technology,China
Zhao Rongjuan , Beijing University of Technology,China
pp. 569-572
Session 2C5: Tools and Environments for Software Development

Collaborative MPEG-4 Contents Authoring, Presentation and Interaction in a Mobile Environment (Abstract)

SongLu Li , Kyungpook National University
SunKyung Kim , Daegu University, Korea
SangWook Kim , Kyungpook National University,
pp. 573-577

A systems programming language for wireless networked embedded systems (Abstract)

Xiaohua Luo , Zhejiang University Hangzhou,China
Kougen Zheng , Zhejiang University Hangzhou,China
Yunhe Pan , Zhejiang University, Hangzhou, China
Zhaohui Wu , Zhejiang University Hangzhou,China
pp. 578-582

A Message-based Software Architecture Style for Distributed Application (Abstract)

Jiankun Wu , Dalian University of Technology, China
Guozhen Tan , Dalian University of Technology, China
Chengxu Li , Dalian University of Technology, China
Hongzhuo Zhao , Dalian University of Technology, China
Xinpeng Li , Dalian University of Technology, China
pp. 583-585

An ECA Rules Based Middleware Architecture for Wireless Sensor Networks (Abstract)

Chongqing Zhang , Shanghai Jiao Tong University, Shanghai
Qunhua Pan , Shanghai Jiao Tong University, Shanghai
Minglu Li , Shanghai Jiao Tong University, Shanghai
pp. 586-588

Design and Implementation of a Distributed Simulation System of 3D Sights (Abstract)

Du jin-lian , Beijing Polytechnic University, Beijing china
Tian chun-shang , Beijing Polytechnic University, Beijing china
pp. 589-593

Simulating Large-Scale Traffic Aggregation in an Automatic Switched Optical Network (Abstract)

Xin Wang , Computer Science and Engineering, Fudan University, Shanghai
Hua Wang , Software School, Fudan University, Shanghai
Xiangyang Xue , Computer Science and Engineering, Fudan University, Shanghai
pp. 594-597
Session 3A1: Parallel and Distributed Algorithms - I

Multi-Session Partitioning for Parallel Timing Optimization (Abstract)

Jiyoun Kim , University of Michigan, Ann Arbor
Jose Neves , IBM Microelectronics, New Jersey
Marios Papaefthymiou , University of Michigan, Ann Arbor
pp. 598-602

An O(1) Time Parallel Algorithm for the Dominance Counting and 3D Block-Based Medial Axis Transform on AROB (Abstract)

Yuh-Rau Wang , St. John?s and St. Mary?s University of Technology, Taipei, Taiwan.
Shi-Jinn Horng , National Taiwan University of Science and Technology, Taipei, Taiwan.
Tzong-Wann Kao , Northern Taiwan Institute of Science and Technology, Taipei, Taiwan
Shih-Ying Lin , Lan Yang Institute of Technology, I-Lan, Taiwan.
pp. 603-609

Optimal Routing in a Small-World Network (Abstract)

Wen-Jing Hsu , Nanyang Technological University
Jianyang Zeng , Nanyang Technological University
pp. 610-614

A Distributed Self-Stabilizing Algorithm for Finding a Connected Dominating Set in a Graph (Abstract)

Arobinda Gupta , Indian Institute of Technology, Kharagpur, India
Ankur Jain , Indian Institute of Technology, Kharagpur, India
pp. 615-619

Efficiency of Local Genetic Algorithm in Parallel Processing (Abstract)

Shigeru NAKAYAMA , Kagoshima University, Japan
PENG Gang , Oita National College of Technology Maki, Oita City, Japan
Takeshi NAKATSURU , Prefectural University of Kumamoto, Tsukide, Kumamoto, Japan
Ichiro IIMURA , Prefectural University of Kumamoto, Tsukide, Kumamoto, Japan
pp. 620-623

Some New Parallel Fast Fourier Transform Algorithms (Abstract)

Zhong Cui-xiang , South China University of Technology Jiangxi Normal University Guangzhou
Han Guo-qiang , South China University of Technology Jiangxi Normal University Guangzhou
Huang Ming-he , Jiangxi Normal University, China
pp. 624-628
Session 3A2: Wireless Networks and Mobile Computing - IV

GLB-DMECR: Geographic Location-Based Decentralized Minimum Energy Consumption Routing in Wireless Sensor Networks (Abstract)

Huifeng Hou , Institute of Information Science and Technology, Zhengzhou, China
Xiangwen Liu , Institute of Information Science and Technology, Zhengzhou, China
Hanying Hu , Institute of Information Science and Technology, Zhengzhou, China
Hongyi Yu , Institute of Information Science and Technology, Zhengzhou, China
pp. 629-633

Energy Adaptive Cluster-Head Selection for Wireless Sensor Networks (Abstract)

LIANG Ying , Graduate School of the Chinese Academy of Sciences, Beijing, China
YU Haibin , Institute of Automation, Chinese Academy of Sciences, Shenyang, China
pp. 634-638

Comparative Analysis of Scheduling Algorithms in Ad Hoc Mobile Networking (Abstract)

Heng Xu , Fudan University, China
C.K. Toh , University of London Queen Mary
Xin Wang , Fudan University, China
pp. 639-643

Research of TCP Vegas Congestion Control Algorithm in Ad Hoc Networks (Abstract)

ZHAO Zhigang , Northeastern University, Shenyang, China
WANG Guangxing , Northeastern University, Shenyang, China
GONG Changqing , Shenyang Institute of Aeronautical Engineering, Shenyang, China
pp. 644-648

Coverage and Energy Efficient Information Gathering Protocol in Wireless Sensor Networks (Abstract)

Jinya Yang , Zhengzhou Information Science and Techonology Institute, Zhengzhou,China
Hanying Hu , Zhengzhou Information Science and Techonology Institute, Zhengzhou,China
Hongyi Yu , Zhengzhou Information Science and Techonology Institute, Zhengzhou,China
Huifeng Hou , Zhengzhou Information Science and Techonology Institute, Zhengzhou,China
Xiangwen Liu, , Zhengzhou Information Science and Techonology Institute, Zhengzhou,China
pp. 649-654
Session 3A3: Resource and Task Scheduling - I

LRC-RED: A Self-tuning Robust and Adaptive AQM Scheme (Abstract)

Yanxiang He , Software Engineering, Computer School, Wuhan University
Naixue Xiong , Software Engineering, Computer School, Wuhan University
Yan Yang , Wuhan university of science and technology, China
Xavier Defago , PRESTO, Japan Science and Technology Agency (JST)
pp. 655-659

Approximating Spanning Trees with Inner Nodes Cost (Abstract)

Shijun Tian , Fudan University, China
Haitao Wang , Fudan University, China
Rudolf Fleischer , Fudan University, China
Qi Ge , Fudan University, China
Jian Li , Fudan University, China
pp. 660-664

A Recursion Nearness Based Method for Characterizing IP Address (Abstract)

Wei Ren , Hong Kong University of Science and Technology, Kowloon, Hong Kong
Hai Jin , University of Science and Technology, Wuhan,China
pp. 665-669

Mapping Resources for Network Emulation with Heuristic and Genetic Algorithms (Abstract)

Kaiping Xiao , Xian Jiaotong University, Xian, Shaanxi, China
Yanping Li , Xian Jiaotong University, Xian, Shaanxi, China
Huali Cui , Xian Jiaotong University, Xian, Shaanxi, China
Yi Liu , Xian Jiaotong University, Xian, Shaanxi, China
pp. 670-674

Accurate DCA Algorithm for TCP Congestion Avoidance (Abstract)

Yan Wang , University of Electronic Science and Technology of China
Fasheng Yi , University of Electronic Science and Technology of China
Jiazhi Zeng , University of Electronic Science and Technology of China
Mengqin Xia , University of Electronic Science and Technology of China
pp. 675-678
Session 3A4: Image Processing and Computer Graphics - I

AVS Generic Audio Coding (Abstract)

Hu Ruimin , Wuhan University, China
Chen Shuixian , Wuhan University, China
Ai Haojun , Wuhan University, China
Xiong Naixue , Wuhan University, China
pp. 679-683

New Ray-Space Interpolation Method For Free Viewpoint Video System (Abstract)

Liang-zhong FAN , Graduate School of Chinese Academy of Sciences,China
Rang-ding WANG , Ningbo University, Ningbo, China
Gang-yi JIANG , Graduate School of Chinese Academy of Sciences, China
Mei YU , Graduate School of Chinese Academy of Sciences,China
Yong-deak KIM , Ajou University, Suwon, Korea
pp. 684-688

A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform (Abstract)

HyungJun Kim , Hansei University, Korea
KeunDuck Byun , Korea University, Seoul, Korea
Sangjin Lee , Korea University, Seoul, Korea
pp. 689-693

New Multiple Description Layered Coding Method For Video Communication (Abstract)

Gangyi Jiang , Peking University, China
Rangding Wang , Ningbo University, Ningbo, China
Mei Yu , Peking University, China
Xien Ye , Ningbo University, Ningbo, China
Fangming Xiao , Ningbo University, Ningbo, China
pp. 694-697
Session 3A5: Network Routing - I

A QoS Multicast Routing Algorithm Based on Shrinking-chaotic-mutation Evolutionary Algorithm in IP/DWDM Optical Internet (Abstract)

Min Huang , Northeastern University, Shenyang, China
Xingwei Wang , Northeastern University, Shenyang, China
Pengcheng Liu , Northeastern University, Shenyang, China
pp. 698-702

A Distributed Entropy-Based QoS Multicast Routing Optimization Algorithm for MANET (Abstract)

Chao Gui , Hubei University of Economics, Wuhan,China
Baolin Sun , Wuhan University of Science and Engineering, Wuhan,China
pp. 703-707

A Strategy for Routing Messages Between Elements in a Hypercube with Faulty Links (Abstract)

Dinko Gichev , Burgas Free University, San Stefano, Bulgaria
pp. 708-710

An On-line Integrated Routing Algorithm in IP/MPLS over WDM Networks (Abstract)

Yang Su , Communications and Information Engineering ,Xi?an Univ. of Science and Technology, China
Zengji Liu , National Key Lab. of Integrated Service Networks, Xidian Univ., Xi?an, China
Zhanqi Xu , National Key Lab. of Integrated Service Networks, Xidian Univ., Xi?an, China
pp. 711-713

A New Routing Method to Tolerate both Convex and Concave (Abstract)

Huaxi Gu , State Key Laboratory of ISN, Xidian University, Xi?an, China
Guochang Kang , State Key Laboratory of ISN, Xidian University, Xi?an, China
Hong Shen , Japan Advanced Institute of Science and Technology (JAIST), Japan
Zengji Liu , State Key Laboratory of ISN, Xidian University, Xi?an, China
pp. 714-719
Session 4A1: Network Routing - II

A Dual-Channel Routing Scheme in Ad Hoc Networks (Abstract)

Junsuo Sun , Northeastern University, Shenyang, China
Qinghui Wang , Shenyang Institute of Chemical Technology, China
Guangxing Wang , Northeastern University, Shenyang, China
pp. 720-722

A Hybrid Intelligent QoS Multicast Routing Algorithm in NGI (Abstract)

Junwei Wang , Northeastern University at Qinhuangdao, Qinhuangdao,China
Xingwei Wang , Northeastern University, Shenyang, China
Min Huang , Northeastern University, Shenyang, China
pp. 723-727

Research of Multicast Server Selection Based on Ant Algorithm (Abstract)

Liansheng Tan , Central China Normal University Wuhan,China
Kaihua Xu , Central China Normal University, Wuhan
Jiwei Cao , Central China Normal University Wuhan,China
Yuhua Liu , Central China Normal University Wuhan,China
pp. 728-732

Aggregation Tree Routing Algorithm for Dynamic Topology in Large Scale Networks (Abstract)

Hengwei Yao , Dalian University of Techology, China
Ningning Han , Dalian University of Techology, China
Dong Li , Dalian University of Techology, China
Guozhen Tan , Dalian University of Techology, China
Yi Liu , Dalian University of Techology, China
pp. 733-735

Solving the Vehicle Routing Problem with Stochastic Demands and Customers (Abstract)

Wang Hui , Dalian Maritime University, China
ZhuLi Ying , Dalian Maritime University, China
FuCe FuCe , Dalian Maritime University, China
pp. 736-739
Session 4A2: Parallel and Distributed Algorithms - II

Encoding a Binary Search Tree in Constant Time on BSR (Abstract)

Kazuo Ushijiam , Kyushu Sangyo University, Japan
Kai Cheng , Kyushu Sangyo University, Japan
Limin Xiang , Kyushu Sangyo University, Japan
pp. 740-744

Parallel Downloading Algorithm for Large-volume File Distribution (Abstract)

Zhenghu Gong , National University of Defense Technology
Haitao Chen , National University of Defense Technology
Zunguo Huang , National University of Defense Technology
pp. 745-749

Localized Algorithm for Coverage in Wireless Sensor Networks (Abstract)

Hongli Xu , University of Science and Technology of China
Liusheng Huang , University of Science and Technology of China
Yingyu Wan , University of Science and Technology of China
Kezhong Lu , University of Science and Technology of China
pp. 750-754

Spatial Gossip on the Percolation Model (Abstract)

Qi Xia , Shanghai Jiaotong University, Shanghai, China
Weinong Wang , Shanghai Jiaotong University, Shanghai, China
Ruijun Yang , Shanghai Jiaotong University, Shanghai, China
pp. 755-758

An Agent-Based Deadlock Detection/Resolution Algorithm for the AND Model (Abstract)

Feng Jin , Lenovo Corporate Research and Development, China
Xin Cheng , Harbin Institute of Technology, China
Xiaozong Yang , Harbin Institute of Technology, China
pp. 759-761

Ubicast: An Enhanced Application-Level Multicast Protocol (Abstract)

Wei-ning Kong , Computer Science and Engineering, Southeast University, China
Zi Chu , Information Integration, Ministry of Education Southeast University, China
Yin-yin Yang , Information Integration, Ministry of Education Southeast University, China
Hao Tu , Information Integration, Ministry of Education Southeast University, China
pp. 762-767
Session 4A3: Applications - I

Towards Efficient and Scalable Searches for Mass-Market, Decentralized File-Sharing Applications (Abstract)

Xinli Huang , Shanghai Jiao Tong University, Shanghai, China
Fanyuan Ma , Shanghai Jiao Tong University, Shanghai, China
Fei Liu , Shanghai Jiao Tong University, Shanghai, China
Yin Li , Shanghai Jiao Tong University, Shanghai, China
pp. 768-772

Evaluation of Network Interface Controller on DIMMnet-2 Prototype Board (Abstract)

Hideharu Amano , Keio University, Japan
Akira Kitamura , Keio University, Japan
Yasuo Miyabe , Keio University, Japan
Tomotaka Miyashiro , Keio University, Japan
Noboru Tanabe , Corporate Research and Development Center, Toshiba, Japan
Tetsu Izawa , Keio University, Japan
Tomohiro Otsuka , Keio University, Japan
Yoshihiro Hamada , Tokyo University of Agriculture and Technology, Japan
Konosuke Watanabe , Keio University, Japan
Hironori Nakajo , Tokyo University of Agriculture and Technology, Japan
pp. 778-780

AMS Based Reconstruction Algorithm with Two-dimensional Threshold for IP Traceback (Abstract)

Changhua Zhu , Xidian Univ., Xian , China
Changxing Pei , Xidian Univ., Xian , China
Yan Li , Xidian Univ., Xian , China
Xueqin Yang , Xidian Univ., Xian , China
pp. 781-783

Development of the real-time visualization system on network (Abstract)

Hiroyuki Matsumoto , JAIST, Japan
Hiroshi Oiwa , JAIST, Japan
Teruo Matsuzawa , JAIST, Japan
Yoshinobu Asano , Central Japan Railway Company
pp. 784-786

Structural Analysis Based on Baseline in Printed Mathematical Expressions (Abstract)

Xuedong Tian , Hebei University, Baoding Hebei, China
Haoxin Fan , Hebei University, Baoding Hebei, China
pp. 787-790
Session 4A4: P2P Systems

Ontology-Based Clustering and Routing in Peer-to-Peer Networks (Abstract)

Juan Li , University of British Columbia
Son Vuong , University of British Columbia
pp. 791-795

A P2P Based Personal Digital Library for Community (Abstract)

Yanfei XU , Fudan University, China
pp. 796-800

A Novel Incentive Mechanism for P2P Systems (Abstract)

Lu Xianliang , UESTC, Chengdu, China
Hou Mengshu , UESTC, Chengdu, China
Wang Tao , UESTC, Chengdu, China
pp. 801-803

Research on Collaborative Service Solution in Ubiquitous Learning Environment (Abstract)

Qun Jin , Waseda University, Japan
Guozhen Zhang , Waseda University, Japan
pp. 804-806

An Improved P2P Model Based on Chord (Abstract)

Yu Dan , Wuhan University, Wuhan, Hubei, China
Chang YunLei , Wuhan University, Wuhan, Hubei, China
Chen XinMeng , Wuhan University, Wuhan, Hubei, China
pp. 807-811
Session 4A5: Image Processing and Computer Graphics - II

Audio Watermarking Algorithm Based on Wavelet Packet and Psychoacoustic Model (Abstract)

Li Qian , Ningbo University, ningbo, china
Xu Da-Wen , Ningbo University, ningbo, china
Wang Rang-Ding , Ningbo University, ningbo, china
pp. 812-814

An improved Basic-Unit Layer Rate-Control Scheme on H.264 (Abstract)

Yu Shengsheng , Huazhong Univ. of Sci. and Tech.,Wuhan,China
Zhou Jingli , Huazhong Univ. of Sci. and Tech.,Wuhan,China
Su Shuguang , Huazhong Univ. of Sci. and Tech.,Wuhan,China
pp. 815-819

Performance Study of Nonrigid Registration Algorithm for Investigating Lung Disease on Clusters (Abstract)

Yuya Tanaka , Osaka University, Japan
Kenichi Hagihara , Osaka University, Japan
Hiroko Kitaoka , Graduate School of Medicine, Osaka University, Japan
Fumihiko Ino , Osaka University, Japan
pp. 820-825

A New Adaptive Multistage Median Filter (Abstract)

ZHAO Xiang-mo , Changan University, Xi?an, China
Wang Guo-qiang , Changan University, Xi?an, China
SONG Huan-sheng , Changan University, Xi?an, China
pp. 826-828

Gabor Filterbank and Its Application in the Fingerprint Texture Analysis (Abstract)

Xuedong Zhang , Anshan University of Science and Technology
Yang Xu , Anshan University of Science and Technology
pp. 829-831

Iris Image Denoising Algorithm Based on Phase Preserving (Abstract)

Wang Jian-ming , Tianjin Polytechnic University, Tianjin, China
Ding Run-tao , Tianjin Polytechnic University, Tianjin, China
pp. 832-835
Session 4B1: Image Processing and Computer Graphics - III

A Novel High Gray Scale Data Driver for Passive Matrix OLED Displays (Abstract)

Sun-Bo Woo , Hanyang University, China
Kae-Dal Kwack , Hanyang University, China
Tae-Whan Kim , Hanyang University, China
Hong-Jae Shin , Hanyang University, China
Seung-Jun Shin , Hanyang University, China
pp. 836-839

AnchorClu: An Anchorperson Shot Detection Method Based on Clustering (Abstract)

Song-Yang LAO , National University of Defense Technology, Changsha, China
Xi-Dao LUAN , National University of Defense Technology, Changsha, China
Jun WEN , National University of Defense Technology, Changsha, China
Ling-Da WU , National University of Defense Technology, Changsha, China
Yu-Xiang XIE , National University of Defense Technology, Changsha, China
pp. 840-844

An Approach to Image Retrieval Based on Concept Lattices and Rough Set Theory (Abstract)

Ming Li , Lanzhou University of Technology, Lanzhou,China
Tong Wang , Lanzhou University of Technology, Lanzhou,China
pp. 845-849

Number and Letter Character Recognition of Vehicle License Plate Based on Edge Hausdorff Distance (Abstract)

TANG Shuang-tong , Liaoning Normal University,Dalian , China
LI Wen-ju , Liaoning Normal University,Dalian , China
pp. 850-852

Residual Texture Based Fast Block-Size Selection for Inter-Frame Coding in H.264/AVC (Abstract)

Yong Zeng , Southwest Jiaotong University, Chengdu, China
Zhengning Wang , Southwest Jiaotong University, Chengdu, China
Qiang Peng , Southwest Jiaotong University, Chengdu, China
pp. 853-855

Stereo Correspondence Using Color Based on Competitive-cooperative Neural Networks (Abstract)

Masahiro Yokomichi , University of Miyazaki, Miyazaki, Japan
Michio Kono , University of Miyazaki, Miyazaki, Japan
Xijun Hua , Jiangsu University, Zhenjiang, China
pp. 856-860
Session 4B2: Applications - II

Design and Implementation of a WBEM Disk Array Provider (Abstract)

Xue-lan Zhang , Beijing Institute of Technology. China
Guo-min Lin , Beijing Institute of Technology. China
Yu-an Tan , Beijing Institute of Technology. China
Hong Deng , Beijing Institute of Technology. China
pp. 861-865

Symmetry and Autobisimulation (Abstract)

Jianmin Jiang , University, Chongqing, China
Jinzhao Wu , Universitat Mannheim, Mannheim, Germany
pp. 866-870

Authentication with controlled anonymity in P2P systems (Abstract)

Adam Wierzbicki , Polish-Japanese Institute of Information Technology Warsaw, Poland
Zbigniew Kotulski , Polish Academy of Sciences Institute of Fundamental Technological Research Warsaw, Poland
Aneta Zwierko , Warsaw University of Technology, Institute of Telecommunication, Poland
pp. 871-875

A Kind of Negotiation Policy for Resource Allocation in Distributed Manufacturing Environment (Abstract)

YIN Chaowan , Chinese Academy of Sciences, Shenyang, China
LV Cixing , Chinese Academy of Sciences, Shenyang, China
ZHU Yunlong , Chinese Academy of Sciences, Shenyang, China
pp. 876-879

A Model for NP-based Application Design (Abstract)

Shan Zheng , Information Engineering University, Zhengzhou Henan China
Xie Kang-min , Information Engineering University, Zhengzhou Henan China
Zhao Rong-cai , Information Engineering University, Zhengzhou Henan China
pp. 880-883

A New Algorithm for Partner Selection in Virtual Enterprise (Abstract)

Shujuan Li , Xi'an University of Technology, Xi'an , China
Wenxing Zhu , Fuzhou University, Fuzhou, China
Zhibin Zeng , Xi'an University of Technology, Xi'an , China
Yan Li , Xi'an University of Technology, Xi'an , China
pp. 884-886

A Distributed and Cooperative Target Localization Algorithm in Wireless Sensor Networks (Abstract)

Xing-yu Pi , Institute of Information Science and Technology, Zhengzhou, China
Hong-yi Yu , Institute of Information Science and Technology, Zhengzhou, China
pp. 887-889

A New Network Management Framework Design and Application Realization (Abstract)

XU Guang-hui , Institute of Command Automation PLAUST, Nanjing, China
LI Jing-hua , Institute of Command Automation PLAUST, Nanjing, China
pp. 890-894
Session 4B3: Database Applications and Data Mining

Event Driven RFID Reader for Warehouse Management (Abstract)

Zou Peng , Software College of Shanghai Jiao Tong University, Intel China Software Center
Yang Dayu , Software College of Shanghai Jiao Tong University, Intel China Software Center
pp. 895-899

ARV-based Array Grouping and Data Distribution in OpenMP/JIAJIA (Abstract)

Zeng Lifang , National Laboratory for Parallel and Distributed Processing, China
Huangchun Huangchun , National Laboratory for Parallel and Distributed Processing, China
Yang Xuejun , National Laboratory for Parallel and Distributed Processing, China
pp. 900-903

Attribute value reduction in variable precision rough set (Abstract)

Nian Fu-zhong , Lanzhou Univ. of Tech, Lanzhou ,China
Li Ming , Lanzhou Univ. of Tech, Lanzhou ,China
pp. 904-906

A Window-based Algorithm for Skyline Queries (Abstract)

LIU Guo-hua , YanShan University of China
YU Jing , YanShan University of China
LIU Xin , YanShan University of China
pp. 907-909

Quantitative Association Rules Mining Methods with Privacy-preserving (Abstract)

CHEN Zi-Yang , Yanshan University, Qinhuangdao, China
LIU Guo-Hua , Yanshan University, Qinhuangdao, China
pp. 910-912

A Novel Text Classification Algorithm Based on Na?ve Bayes and KL-Divergence (Abstract)

Shaomin ZHANG , Xidian University, Xi?an, China
Baoyi WANG , North China Electric Power University, China
pp. 913-915

Web Document Classification Based on Extended Rough set (Abstract)

Heping Hu , Huazhong University of Science and technology,Wuhan,Hubei, China
Gaoxiang Yi , Huazhong University of Science and technology,Wuhan,Hubei, China
Zhengding Lu , Huazhong University of Science and technology,Wuhan,Hubei, China
pp. 916-919
Session 4B4: Intelligent Computing and Neural Networks

Genetic Algorithms for Solving Linear Bilevel Programming (Abstract)

Wan Zhong-Ping , Wuhan University, Wuhan, China
Chen Ya-Lin , Wuhan University, Wuhan, China
Wang Guang-Min , Wuhan University, Wuhan, China
Wang Xian-Jia , Wuhan University, Wuhan, China
pp. 920-924

A Genetic Algorithm Optimized New Structured Neural Network for Multistage Decision-Making Problem (Abstract)

Yan GAO , Northeastern University, China
Yu DAI , Northeastern University, China
Lei YANG , Northeastern University, China
Bin ZHANG , Northeastern University, China
pp. 925-929

Intelligent Compaction Control Based on Fuzzy Neural Network (Abstract)

FAN Yindi , Shaanxi College of Communication Technology, Xi'an, China
LIU Zongyi , Xi'an Institute of Surveying and Mapping, Xi'an
LIN Guangfeng , Changan University, Xi'an China
JU Yongfeng , Changan University, Xi'an China
pp. 930-934

A Novel Genetic Algorithm for HP Model Protein Folding (Abstract)

Jiaxing Cheng , Anhui University, Ministry of Education,China
TingTing Zheng , Anhui University, Ministry of Education,China
Jie Song , Anhui University, Ministry of Education,China
Junjun mao , Anhui University, Ministry of Education,China
pp. 935-937

An Improved Genetic Algorithm For Multi-Objective Optimization (Abstract)

Guiming He , Wuhan University, Wuhan, China
Fu Lin , Wuhan University, Wuhan, China
pp. 938-940

A Coevolutionary Model Based on Dynamic Combination of Genetic Algorithm and Ant Colony Algorithm (Abstract)

Ming Chen , China University of Petroleum,Beijing,China
Qiang Lu , China University of Petroleum,Beijing,China
pp. 941-944
Session 4B5: Parallel and Distributed Algorithms - III

Digital Modulation Identification Based on Software Radio Platform (Abstract)

Jian Chen , Xidian University, China
Jiandong Li , National Key Lab of ISN, Xidian University,
Yonghong Kuo , School of Commuication Engineering, Xidian University, China
Chao Li , School of Commuication Engineering, Xidian University, China
Fenglin Fu , School of Commuication Engineering, Xidian University, China
pp. 945-949

Parallel Algorithm for Computing Reversal Distance (Abstract)

Yi-Fei She , University of Science and Technology of China
Guo-Liang Chen , University of Science and Technology of China
pp. 950-953

Solving Very Large Traveling Salesman Problems by SOM Parallelization on Cluster Architectures (Abstract)

Erich Schikuta , University of Vienna, Austria
Hannes Schabauer , University of Vienna, Austria
Thomas Weishaupl , University of Vienna, Austria
pp. 954-958

Network Optimized by K-L Transform for Digital Modulation Identification (Abstract)

Yonghong Kuo , School of Communication Engineering, Xidian University
Xiaohua Tan , School of Communication Engineering, Xidian University
Jian Chen , School of Communication Engineering, Xidian University
pp. 959-961

Prediction of Chaotic Time Series Using LS-SVM with Automatic Parameter Selection (Abstract)

Xiaodong Wang , Zhejiang Normal University, Jinhua
Xiushan Cai , Zhejiang Normal University, Jinhua
Haoran Zhang , Zhejiang Normal University, Jinhua
Changjiang Zhang , Zhejiang Normal University, Jinhua
Jinshan Wang , Zhejiang Normal University, Jinhua
Jin Wang , Zhejiang Normal University, Jinhua
pp. 962-965
Session 4C1: Parallel and Distributed Algorithms - IV

Scalable Parallel Quadrilateral Mesh Generation Coupled with Mesh Partitioning (Abstract)

Jianjun Chen , Zhejiang University, Hangzhou, Zhejiang, China
Yao Zheng , Zhejiang University, Hangzhou, Zhejiang, China
Xia Ning , Zhejiang University, Hangzhou, Zhejiang, China
pp. 966-970

An Efficient Multiple-Precision Division Algorithm (Abstract)

Liusheng Huang , University of Science and Technology of China
Hong Shen , Japan Advanced Institute of Science and Technology
Yonglong Luo , Anhui Normal University, Wuhu, Anhui
Hong Zhong , University of Science and Technology of China
pp. 971-974

A High-Throughput Fibre Channel Data Communication Service (Abstract)

Yu-an Tan , Beijing Institute of Technology, China
Li-gu Zhu , University of Science and Technology, China
Yuan-da Cao , Beijing Institute of Technology, China
Jing Jin , Beijing Institute of Technology, China
pp. 975-978

Solution to Multi-objective Fuzzy Optimization Dynamic Programming with Uncertain Information (Abstract)

Keqiu Li , Graduate School of Information Science Japan Advanced Institute of Science and Technology
Hong Shen , Graduate School of Information Science Japan Advanced Institute of Science and Technology
Zhongxian Chi , Dalian University of Technology Dalian, China
Yingwei Jin , Graduate School of Information Science Japan Advanced Institute of Science and Technology
pp. 979-984

A New Solution to Non-structural System Group Decision-making Problems (Abstract)

Hong Shen , Graduate School of Information Science Japan Advanced Institute of Science and Technology
Yingwei Jin , Dalian University of Technology Dalian, China
Keqiu Li , Graduate School of Information Science Japan Advanced Institute of Science and Technology
Zhongxian Chi , Dalian University of Technology Dalian, Dalian, China
pp. 985-988

Fluid-structure Interaction Within 3-layered Aortic Arch Model under Pulsatile Blood Flow (Abstract)

Teruo Matsuzawa , Japan Advanced Institute of Science and Technology
Masahiro Watanabe , Japan Advanced Institute of Science and Technology
Feng Gao , Japan Advanced Institute of Science and Technology
pp. 989-992
Session 4C2: Computer Mathematics

The Calculational Method for Spectrogram and Variance-Length Curve of Yarn Based on Multiresolution Analysis (Abstract)

Ma Jun , University of Science and Engineering, Wuhan, China
N. A. Korobov , University, Ivanovo, Russia
pp. 993-996

Constructing SVK_Lattices from Cyclic Bases (Abstract)

Weichi Yu , School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 6China
Dake He , Research Center for Secure Application in Network and Communications Southwest Jiaotong University, Chengdu, China
Yu Zheng , School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 6China
pp. 997-1001

Hamiltonian-like Properties of k-Ary n-Cubes (Abstract)

Kelun Wang , Mathematics Department, Dalian Maritime University, Dalian , CHINA
Deqiang Wang , Dalian Maritime University, Dalian, CHINA
Mingyang Pan , Dalian Maritime University, Dalian, CHINA
Tong An , Mathematics Department, Tianjin University of Finance and Economics, CHINA
Shuyan Qu , Mathematics Department, Dalian Maritime University, Dalian , CHINA
pp. 1002-1007

Embedding Paths of Different Lengths into Crossed Cubes (Abstract)

Xiaola Lin , City University of Hong Kong, Kowloon
Xiaohua Jia , City University of Hong Kong, Kowloon
Jianxi Fan , City University of Hong Kong, Kowloon
pp. 1008-1012

The Eigen-Problem In The Completely Max-Algebra (Abstract)

Dai zhi yong , Wuhan University of Science and Engineering , Wuhan, China
Ma Jun , Wuhan University of Science and Engineering , Wuhan, China
Gao Yan , Wuhan University of Science and Engineering , Wuhan, China
pp. 1013-1016
Session 4C3: Knowledge Based Systems

Research on Application of Development Method of Knowledge Base in the Integrated System for ICAD (Abstract)

Qiuyu Zhang , University of Technology,Lanzhou,China
Pengshou Xie , University of Technology,Lanzhou,China
Yongping Kang , University of Technology,Lanzhou,China
pp. 1017-1020

A DL-based Approach for Product Knowledge Reasoning (Abstract)

Shanping Li , AI. Institute, Zhejiang University, Hangzhou China
Xiangjun Fu , Shanghai Jiaotong University, Shanghai China
NizamuddinChanna NizamuddinChanna , AI. Institute, Zhejiang University, Hangzhou China
pp. 1021-1023

Towards a Knowledge-Based System of Distributed Configuration (Abstract)

Shanping Li , AI. Institute, Zhejiang University, Hangzhou China
Xiangjun Fu , Shanghai Jiaotong University, Shanghai China
pp. 1024-1026

The Research on Decision Approach of Data Dependence in Dynamic Workflow System (Abstract)

Shaomin ZHANG , North China Electric Power University, Baoding, China
Baoyi WANG , North China Electric Power University, Baoding, China
pp. 1027-1029

Decision Tree?s Pruning Algorithm Based on Deficient Data Sets (Abstract)

CHI Zhong-xian , Dalian University of Technology, Dalian, China
WANG Da-gong , School of Software,Beijing University of Aeronautics, China
ZHANG Yong , Dalian University of Technology, Dalian, China
pp. 1030-1032

Knowledge Discovery and Ontology-based services on the Grid (a survey report) (Abstract)

R.B. Mishra , Department of Computer Engineering ,IT,BHU,Varanasi,India
Sunil Kr.Pandey , Department of Computer Science,SMS,Varanasi,India
pp. 1033-1038
Session 4C4: Image Processing and Computer Graphics - IV

Perceptually Optimized Error-Resilient H.264 Video Streaming System over the Best-Effort Internet (Abstract)

QUAN Zi-Yi , Bejing University of Posts and Telecommunications, China
LIAO Ning , Bejing University of Posts and Telecommunications, China
MEN Ai-Dong , Bejing University of Posts and Telecommunications, China
pp. 1039-1043

An Automatic and Robust Algorithm for Segmentation of Three-dimensional Medical Images (Abstract)

Huichuan Duan , Shandong Normal University, China
Haibo Zhang , Japan Advanced Institute of Science and Technology
Hong Shen , Japan Advanced Institute of Science and Technology
pp. 1044-1048

An Image Hiding Method Based on Correlation Analysis and Image Fusion (Abstract)

Li Yao , Huazhong University of Science and Technology, Wuhan,China
Liu Bin , Huazhong University of Science and Technology, Wuhan,China
Li Zhitang , Huazhong University of Science and Technology, Wuhan,China
pp. 1049-1051

An Invariant Feature Representation for shape Retrieval (Abstract)

Han ShuiHua , Xiamen University, CHINA
Yang ShuangYuan , Xiamen University, CHINA
pp. 1052-1054

A New Approach of the Vehicle License Plate Location (Abstract)

XU Hong-ke , Changan University, Xi'an, China
JIAO Jia-hua , Changan University, Xi'an, China
YU Fu-hua , Changan University, Xi'an, China
SONG Huan-sheng , Changan University, Xi'an, China
pp. 1055-1057

Toward Blind Logo Watermarking in JPEG-Compressed Images (Abstract)

Qing Gong , Japan Advanced Institute of Science and Technology
Hong Shen , Japan Advanced Institute of Science and Technology
pp. 1058-1062
Session 4C5: Resource and Task Scheduling - II

Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems (Abstract)

Mingzeng x Mingzeng Hu , Harbin Institute of Technology, China
Hongli Zhang , Harbin Institute of Technology, China
Weizhe Zhang , Harbin Institute of Technology, China
pp. 1063-1067

Security-Driven Scheduling Algorithms Based on EigenTrust in Grid (Abstract)

Kenli Li , Hunan University, Changsha, China
Xiaoling Liu , Hunan University, Changsha, China
Ying Wang , Hunan University, Changsha, China
Yan He , Hunan University, Changsha, China
pp. 1068-1072

Gracefully Degrading Battery-Aware Static Multiprocessor Schedules Based on Symmetric Task Fusion (Abstract)

Frode Eika Sandnes , Oslo University College, Norway
Oliver Sinnen , University of Auckland, New Zealand
Yo-Ping Huang , Tatung University, Taiwan
pp. 1073-1077

Using Dataflow Information to Improve Inter-Workflow Instance Concurrency (Abstract)

Paul Lu , University of Alberta, Canada
Yang Wang , University of Alberta, Canada
pp. 1078-1082

A Post-Scheduling Optimization Algorithm of Distributed Real-Time Tasks (Abstract)

FANG Ming , Harbin Engineering University, Harbin, China
LIANG Hong-tao , Wuhan Digital Engineering Institute, Wuhan, China
YUAN You-guang , Wuhan Digital Engineering Institute, Wuhan, China
pp. 1083-1086
Author Index

Author Index (PDF)

pp. 1087
94 ms
(Ver 3.1 (10032016))