DEXA 2007 Poland Pictures

NBiS Program

Monday, 3 September 2007

Session 1A: Sensor and Ad-Hoc Networks
9:00 - 11:00
Chair: Makoto Takizawa, Tokyo Denki University

A Simple Statistical Methodology for Testing Ad hoc Networks
Makoto Ikeda, Giuseppe De Marco, and Leonard Barolli

Sensor-Actuator Communication Protocols in Wireless Networks
Kiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, and Makoto Takizawa

The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks
Consolee Mbarushimana, Ali Shahrabi, and Hadi Larijani

Battery and Power Aware Routing in Mobile Ad Hoc Networks
Fumiaki Sato and Sumito Iijima

Wireless Balloon Network for Disaster Information System
Yoshitaka Shibata, Yosuke Sato, Kazuya Sakakibara, and Kazuo Takahata

Wireless Networks as an Infrastructure for Mission-Critical Business Applications
Krzysztof Gierłowski and Krzysztof Nowicki

Session 1B: Network Security
9:00 - 11:00
Chair: Giuseppe De Marco, Toyota Technological Institute

The DecoyPort: Redirecting Hackers to Honeypots
Iksu Kim and Myungho Kim

Network security improvement with isolation implementation based on ISO-17799 standard
Yeu-Pong Lai and Jui-Heng Tai

Positive and Negative Authorizations to Access Protected Web Resources
Sylvia Encheva and Sharil Tumin

An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
Taeshik Shon and Wook Choi

An Automatic Meta-revised mechanism for Anti-malicious Injection
Jin-Cherng Lin, Jan-Min Chen, and Hsing-Kuo Wong

SKEMON: A Simple Certificate-less Method for Key Exchange by using Mobile Network
Chizuro Sakamoto, Giuseppe De Marco, Rihito Yaegashi, Masaru Tadauchi, and Leonard Barolli

11:00 - 11:30 Coffee Break

11:30 - 12:30 keynote

12:30 - 14:00 Lunch

Session 2A: Secure System Applications
14:00 -15:30
Chair: Leonard Barolli, Fukuoka Institute of Technology

A Secure Authentication Scheme for A Public Terminal Before A Transaction
Chin-Ling Chen, Yu-Yi Chen, and Jinn-Ke Jan

Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study
Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, and Toyoo Takata

A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept
Yung-Tsung Hou, Chia-Mei Chen, and Bingchiang Jeng

Multigroup Rekeying for a Wireless Network
Kuang-Hui Chi, Ji-Han Jiang, and Yu-Ching Hsu

Session 2B: Web Technologies and Middleware Systems
14:00 -15:30
Chair: Minoru Uehara, Toyo University

Rich Internet Architectures for Browser-based Multiplayer Real-time Games - Design and Implementation Issues of virtual-kicker.com
Matthias Häsel

Distribution of Lecture Concepts and Relations in Digital Contents
Po Jen Chuang, Chu-Sing Yang, and Ming-Chao Chiang

Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment
Yuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, and Peng Lv

Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks
Walter Colitti, Kris Steenhaut, Ann Nowé, and Jan Lemeire

15:30 -16:00 Coffee Break

Session 3A: Distributed Systems and Applications
16:00 - 17:30
Chair: Fatos Xhafa, Polytechnic University of Catalonia

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables
Nuno Lopes and Carlos Baquero

Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks
Kai Han, Binoy Ravindran, and E. Douglas Jensen

COMICS: A Global Constraint Manager for Interactive Component Database Systems
Ludmila Himmelspach, Mehmet Kolac, Krasimir Kutsarov, Alexander Chernin, Christopher Popfinger, and Stefan Conrad

Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users
Valbona Barolli, Heihachiro Fukuda, Leonard Barolli, and Makoto Takizawa

Session 3B: Scheduling
16:00 - 17:30
Chair: Tomoya Enokido, Risho University

Role-based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow
Tomoya Enokido, Valbona Barolli, and Makoto Takizawa

A Probabilistic Multi-Agent Scheduler Implemented in JXTA
André Trudel, Elhadi Shakshuki, and Yiqing Xu

Scheduling Real-Time Requests in On-Demand Broadcast Environments
Kwok-Wa Lam and Sheung-Lun Hung

A Fair Replica Placement for Parallel Download on Cluster Grid
Chih-Ming Wang, Chu-Sing Yang, and Ming-Chao Chiang

Tuesday, 4 September 2007

Session 4A: Network Analysis
9:00 - 11:00
Chair: Fumiaki Sato, Toho University

Querying Similarity in Metric Social Networks
Jan Sedmidubský, Stanislav Bartoň, Vlastislav Dohnal, and Pavel Zezula

Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs
Aamir Siddique, Abdalla M. Hanashi, Irfan Awan, and Mike Woodward

A Token Bucket Model with Assured Forwarding for Web Traffic
Salvador Alcaraz, Katja Gilly, Carlos Juiz, and Ramon Puigjaner

An Analytical Approach to the Efficient Real-time Events/Services Handling in Converged Network Environment
Natalia Kryvinska, Peter Zinterhof, and Do van Thanh

Command Transition Probability Analysis on Mobile Internet Command Sequences
Toshihiko Yamakami

A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks
Young-Duk Kim, Yeon-Mo Yang, and Dong-Ha Lee

Session 4B: P2P Systems and Applications
9:00 - 11:00
Chair: Yoshitaka Shibata, Iwate Prefectural University

Empirical Study of Design Pattern Usage in Peer-to-Peer Systems
Markus Aleksy, Martin Schader, Christian Seifried, and Makoto Takizawa

Improvement of JXTA protocols for supporting reliable distributed applications in P2P systems
Fatos Xhafa, Raul Fernandez, Thanasis Daradoumis, Leonard Barolli, and Santi Caballé

A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications
Oliver Haase, Alfred Toth, and Jürgen Wäsch

Semantic Query Routing in SenPeer, a P2P Data Management System
David Faye, Gilles Nachouki, and Patrick Valduriez

Jamjuree Cluster: A Peer-to-Peer Cluster Computing System
Kasame Tritrakan, Pakit Kanchana, and Veera Muangsin

Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System using Trace Elements
Nobuyoshi Sato, Minoru Uehara, Koichiro Shimomura, Hirobumi Yamamoto, and Kenichi Kamijo

11:00 - 11:30 Coffee Break

11:30 -12:30 Keynote

12:30 -14:00 Lunch

Session 5A: Pervasive and Ubiquitous Systems
14:00 - 15:30
Chair: Markus Aleksy, University of Mannheim

Integrated Biomedical System for Ubiquitous Health Monitoring
Arjan Durresi, Arben Merkoci, Mimoza Durresi, and Leonard Barolli

Tree Graph Views for a Distributed Pervasive Environment
Tuyêt Trâm Dang Ngoc and Nicolas Travers

A Distributed Resource Furnishing to Offload Resource-constrained Devices in Cyber Foraging toward Pervasive Computing
MinHwan Ok, Ja-Won Seo, and Myong-soon Park

Trust Model for Mobile Devices in Ubiquitous Environment
Zhefan Jiang and Sangwook Kim

Session 5B: Network Applications and Protocols
14:00 - 15:30
Chair: Leonard Barolli, Fukuoka Institute of Technology

PoQBA: A new Path Admission Control for Diffserv Networks
Enrique Pena, Miguel Rios, Christian Oberli, and Vladimir Marianov

An Adaptive Call Admission Control Approach for Multimedia 3G Network
Waqas Ahmad, Irfan Awan, and Makoto Takizawa

Spatial Correlation Code based Data Aggregation Scheme for Maximizing Network Lifetime
Sangbin Lee, Younghwan Jung, Woojin Park, and Sunshin An

A Mesh-Based QoS Aware Multicast Routing Protocol
Dayin Promkotwong and Ohm Sornil

15:30 -16:00 Coffee Break

Session 6A: Embedded Systems
16:00 -17:30
Chair: Tomoya Enokido, Risho University

Virtual Large-Scale Disk System for PC-Room
Erianto Chai, Minoru Uehara, Hideki Mori, and Nobuyoshi Sato

Application of Default Logic in an Intelligent Tutoring System
Sylvia Encheva and Sharil Tumin

Consolidating with Media Streaming Server and Network Storage Card
YongJu Lee, SongWoo Sok, HagYoung Kim, MyungJoon Kim, and CheolHoon Lee

Design of the Tile-Based Embedded Multimedia Processor -TEMP-
Shinya Toji, Minoru Uehara, and Hideki Mori

Session 6B: Fuzzy Systems and their Applications
16:00 -17:30
Chair: Irfan Awan, University of Bradford

A Fuzzy-based Speed-aware Handoff System for Wireless Cellular Networks
Leonard Barolli, Arjan Durresi, Fatos Xhafa, and Akio Koyama

WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value
Jung-Hyun Kim and Kwang-Seok Hong

A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids
Kun-Ming Yu, Zhi-Jie Luo, Chih-Hsun Chou, Cheng-Kwan Chen, and Jiayi Zhou