the 15th international conference on algorithms and...
Post on 07-Aug-2020
4 Views
Preview:
TRANSCRIPT
1
The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)
FINAL PROGRAM
18 – 20 November 2015 Zhangjiajie, Hunan Province, China
Copyright © Trusted Computing Institute, Central South University, China
http://trust.csu.edu.cn
2
Introduction to Central South University
Central South University (CSU) is a comprehensive and national key university under the direct
administration of the Ministry of Education in China. CSU is among the first group of top universities in
China admitted into “Project 211”, which is a project of building national key universities and colleges for
the 21st century, and “Project 985”, which is a joint constructive project of building world-class
universities co-sponsored by the Chinese central government and the local governments, and “Project
2011”, which is targeted for promoting the capability and capacity of cooperative creativity in top
universities in China. Mr. Zhang Yaoxue, a member of the Chinese Academy of Engineering, and the
inventor of Transparent Computing (TC), is the President of CSU.
Approved by the State Council, CSU was established on April 29, 2000, by merging three separate
universities, including Hunan Medical University (HMU), Changsha Railway University (CRU), and
Central South University of Technology (CSUT). CSU covers an area of around 5,117 mu (341 hectares).
CSU boasts a high-quality group of faculty, comprising of many famous scholars and experts with great
influence both at home and abroad. Among them, there are 2 members of the Chinese Academy of
Sciences, 15 academicians who are members of Chinese Academy of Engineering, 9 are members of the
Discipline Assessment Group of the Academic Degrees Committee of the State Council, 23 scientific and
technological experts have been recognized at a national level for their outstanding achievements, 545
experts have been awarded special subsidies from the Government, more than 1000 are doctorate
supervisors and 33 are Special-term Professors funded by the Changjiang Scholar Program. In addition,
CSU has appointed a number of well-known Chinese and international scholars as honorary professors,
visiting professors, or adjunct professors.
CSU covers 12 fields of study, including engineering, science, medicine, management, literature, law,
economics, philosophy, education, history, agriculture, and art, and offers military science as well. It
consists of 30 colleges offering 92 programs for bachelors’ degrees, and a graduate school comprising of a
number of national key disciplines, including 6 at f irst-level (ranking 8th in China), 12 at second-level and
one in development. 91 first-level disciplines are authorized to confer masters and doctoral degrees. 191
programs are offered for doctoral degrees, 307 programs for masters’ degrees and 19 programs for
professional masters’ degrees. CSU also has 42 post-doctoral exchange centers, ranking 9th among
Chinese universities and colleges.
At present, more than 55,000 full-time students are studying at CSU, including 20,000 graduate students
and 800 foreign students, from 31 provinces and municipalities of the mainland China, as well as 80
countries and regions of the rest of the world. CSU is a leading and top ranking Chinese university in the
following aspects: one of the universities first starting an eight-year medical program ( M.D.), the first
university running a pilot class for training innovation-oriented senior engineering talents, the first civilian
university offering master degree in military command and technique for officers, boasting five national
talents training and teaching bases, six national centers for experimental teaching, 57 national exemplary
courses, six bilingual national exemplary courses, six “excellent teachers” and eight teaching teams highly
recognized by the state, 15 National Top 100 Doctoral Dissertations produced by its graduates since 2000.
CSU also possesses three national first-class affiliated hospitals equipped with state-of-the-art medical
facilities.
http://www.csu.edu.cn/
3
Introduction to Jishou University
Jishou University (JSU) is a public university in the western part of Hunan Province and the only
comprehensive university in the border area of Hunan, Hubei, Chongqing and Guizhou provinces.
Founded in September 1958, the University is composed of two campuses in Jishou and Zhangjiajie cities,
with the main campus in Jishou City, the capital city of Xiangxi Autonomous Prefecture.
In 2003, the university was entitled the right to confer master’s degrees. In October 2006, the university
successfully passed the undergraduate education evaluation on regular institutions of higher learning
organized by the Ministry of Education with a comment of “Excellent”. The year of 2012 saw the
university rank among “universities of capacity construction project in mid-west”. At the same year, the
university was approved to carry out “Ph. D program catering for special demands of our country”.
The university covers an area of 1.29 million square meters with the total building area of 600,000 square
meters. Presently, the university has been equipped with various teaching and scientific researching
instruments and equipments with a total value of over RMB 170 million as well as a book and literature
collection of over 2.3million volumes. The university currently has over 1000 full-time teachers, of which
86% are provided with doctor’s or master’s degree.
At present, there are 70 undergraduate majors offered by the university, among which 3 are national
characteristic majors, 8 are provincial characteristic majors.8 are provincial key majors. The university is
now operating 1 Ph.D program catering for special demands of our county,14 first-grade disciplines for
master’ a degree, 1 professional master degree program and 1characteristic, advanced and key discipline,
covering 11 main disciplines. In addition, there are 14 provincial and ministerial level key research bases,1
national experimental teaching demonstration center,5 provincial practice teaching demonstration centers.
The students of various types total over 30,000, of which over 18,000 are full-time undergraduate students,
over 800 are graduate students. The number of undergraduates in the independent college is almost 8,000,
and that of adult diploma education students is over 7,000.
Over half a century, the university adheres to the educational philosophy of “Populace University”, regards
it as its own duty to serve for the regional economic and social development, fulfills irreplaceable
educational function in the west of Hunan and in the border area of Hunan, Hubei, Chongqing and
Guizhou provinces, forming distinguished schooling-running characteristics and being widely approved by
all sectors of the society.
http://www.jsu.edu.cn/
4
Introduction to Central South University (CSU) Cover
Page 02
Introduction to Jishou University (JSU) Cover
Page 03
Final Program at a Glance Page 01
Quick Guide to Rooms for Keynote / Technical
Sessions Page 03
Welcome Messages Page 04
Keynote Speeches Page 13
Panel Discussions Page 17
Technical Sessions and Papers Page 19
Organizing and Program Committees Page 35
Introduction to School of Information Science and
Engineering, Central South University Page 48
Introduction to School of Software and Service
Outsourcing of Jishou University Page 49
Conference Venue Cover
Page 4
Sponsors, Organizers, and Publishers Cover
Page 5
TABLE OF CONTENTS
1
FINAL PROGRAM OF ICA3PP 2015 AT A GLANCE
Important: ICA3PP 2015 attendees are also welcome to attend all keynote sessions/technical sessions/panel discussions of the co-located IEEE PRDC 2015 conference.
November 17 (Tuesday)
15:00-20:00 On-Site Registration
18:00-20:00 Reception @ Zhangjiajie International Hotel
November 18 (Wednesday)
On-Site Registration from 8:00 to 18:00
08:30-09:00 Opening Ceremony (Room 0)
09:00-09:45 Keynote 1: Prof. Wanlei Zhou, Senior Member of IEEE, Alfred Deakin Professor, Deakin University, Australia; Identifying Propagation Sources and Modeling Propagation
Dynamics in Networks (Room 0)
09:45-10:15 Coffee/Tea Break
10:15-12:30 T9A(Room0) T7A (Room3) DependSys-A(Room4) T6A(Room5) T5A(Room6) T4A(Room7) T3A(Room8) T1A(Room9)
12:30-14:00 Lunch @ Zhangjiajie International Hotel
14:00-16:00 T9B(Room0) T7B (Room3) DependSys-B(Room4) T6B(Room5) T5B(Room6) T4B(Room7) T3B(Room8) T1B(Room9)
16:00-16:15 Coffee/Tea Break
16:15-18:15 T9C(Room0) T7C (Room3) DependSys-C(Room4) T6C(Room5) T5C(Room6) T4C(Room7) T3C(Room8) T1C(Room9)
19:00-21:00 Dinner @ Zhangjiajie International Hotel
2
November 19 (Thursday)
On-Site Registration from 8:00 to 18:00
08:30-09:15 Keynote 2: Prof. Jiannong Cao, Fellow of IEEE, Head and Professor at The Hong Kong Polytechnic University, Hong Kong; Design of Dis tributed Algorithms for
Engineering Applications of WSNs (Room 0)
09:15-11:15 Panel 2
(Room 0)
Panel 1
(Room 1) T7D(R3)
DependSys-D
(R4) T6D(R5) T5D(R6) T4D(R7) T8A(R8) T2A(R9)
11:15-11:30 Coffee/Tea Break
11:30-12:30 TrustData-A
(R0) TSP-A(R3) TSP-B(R4) TSP-C(R5) NOPE-A(R6) NOPE-B(R7) SCS-A(R8) SPPCN-A(R9)
12:30-14:00 Lunch @ Zhangjiajie International Hotel
14:00-16:00 T9D(R0) T3D(R3) DependSys-E
(R4) T7E(R5) T5E(R6) T4E(R7) T8B(R8) T2B(R9)
16:00-16:15 Coffee/Tea Break
16:15-18:15 T9E(R0) T3E(R3) T9F(R4) T7F(R5) T9G(R6) T9H(R7) T1D+T8C
(R8) SPPCN-B(R9)
19:00-21:00 Banquet @ Zhangjiajie International Hotel
November 20 (Friday)
On-Site Registration from 8:00 to 12:00
08:30-09:15 Keynote 3: Prof. John C.S . Lui, Fellow of ACM, Fellow of IEEE, The Chinese University of Hong Kong, Hong Kong; The Shapley Value: Its Use and Implications on
Internet Economics (Room 0, shared with PRDC 2015)
09:15-10:00 Keynote 4: Prof. Hai Jin, Senior Member of IEEE, Professor at Huazhong University of Science and Technology, China; In-Memory Computing: New Architecture for Big
Data Processing (Room 0)
10:00-10:30 Coffee/Tea Break
10:30-12:30 TrustData-B(Room 0) TSP-D(Room 3) (NOPE-C)+(T4F)
(Room4)
12:30-14:00 Lunch @ Zhangjiajie International Hotel, Closing of the Conference
3
Quick Guide to Rooms for Keynote/Technical/Panel Sessions
Room Number Room Name Floor
Room 0 Grand Hall
(多功能厅) 2
Room 1 Guoyan Hall
(国宴厅) 2
Room 2 Xiangjiang Hall
(湘江厅) 2
Room 3 Lishui Hall
(澧水厅) 2
Room 4 Zijiang Hall
(资江厅) 2
Room 5 Yuanjiang Hall
(沅江厅) 2
Room 6 Business Center
(商务中心) 2
Room 7 Tianmen Shan
(天门山) 2
Room 8 Yangjiajie
(杨家界) 2
Room 9 Shi Li Hua Lang
(十里画廊) 2
4
Welcome Messages from ICA3PP 2015 General Chairs
Welcome to the 15th International Conference on Algorithms and Architectures for Parallel Processing
(ICA3PP 2015), which is organized by Central South University, Hunan University, National University of
Defense Technology, and Jishou University.
It is our great pleasure to organize the ICA3PP 2015 conference in Zhangjiajie, China on 18-20 November
2015. On behalf of the organizing committee of the conference, we would like to express to all partic ipants
who will attend the conference, our cordial welcome and great gratitude.
ICA3PP 2015 is the 15th event in the series of conferences started in 1995 that is devoted to algorithms
and architectures for parallel processing. ICA3PP is now recognized as the main regular event in the world
that covers many dimensions of parallel algorithms and architectures, encompassing fundamental
theoretical approaches, practical experimental projects, and commercial components and systems. The
conference provides a forum for academics and practitioners from countries around the world to exchange
ideas for improving the efficiency, performance, reliability, security and interoperability of computing
systems and applications.
ICA3PP 2015 has attracted high-quality research papers which highlight the foundational work that strives
to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and
investigations that identify weaknesses in existing parallel processing technology.
ICA3PP 2015 consists of the main conference and six international symposia and workshops. Many
individuals have contributed to the success of the conference. We would like to express our special
appreciation to Prof. Yang Xiang, Prof. Andrzej Goscinski and Prof. Yi Pan, the Steering Committee Chairs,
for giving us the opportunity to host this prestigious conference and for their guidance on the conference
organization. Special thanks to the Program Chairs, Prof. Albert Zomaya, Prof. Gregorio Martinez and Prof.
Kenli Li, for their outstanding work on the technical program. Thanks also to the Workshop Chairs, Dr.
Mianxiong Dong, Dr. Ryan K. L. Ko and Dr. Md. Zakirul Alam Bhuiya, for their excellent work in
organizing attractive symposia and workshops. Thanks also to Publicity Chairs, Prof. Carlos Becker
Westphall, Dr. Yulei Wu, Prof. Christian Callegari, Prof. Kuan-Ching Li and Prof. James J. (Jong Hyuk)
Park, for the great job in publicizing this event for wide. We would like to give our thanks to all the
members of the Organizing Committee and Program Committee members and External Reviewers for their
efforts and support. We would also like to give our thanks to Keynote Speakers, Prof. John C.S. Lui, Prof.
Jiannong Cao, Prof. Wanlei Zhou and Prof. Hai J in, for offering insightful and enlightening talks. Last but
not least, we would like to thank all the authors who submitted their papers to the conference, and we hope
that you will be able to attend this wonderful event!
General Chairs
Guojun Wang, Central South University, China
Peter Mueller, IBM Zurich Research, Switzerland
Qingping Zhou, Jishou University, China
5
Welcome Messages from ICA3PP 2015 Program Chairs
On behalf of the Program Committee of the 15th International Conference on Algorithms and
Architectures for Parallel Processing (ICA3PP 2015), we would like to welcome you to join the conference
in Zhangjiajie, China on 18-20 November, 2015.
The ICA3PP 2015 conference aims at bringing together researchers and practitioners in the world from
both academia and industry who are working on algorithms and architectures for parallel processing. The
conference will feature keynote speeches, panel discussions, technical presentations, symposiums and
workshops, where the technical presentations from both the research community and industry will cover
various aspects including fundamental theoretical approaches, practical experimental projects, and
commercial components and systems. ICA3PP 2015 is the next event in a series of highly successful
international conferences on algorithms and architectures for parallel processing, previously held as
ICA3PP-14 (Dalian, China, August 2014), ICA3PP-13 (Vietri sul Mare, Italy, December 2013),
ICA3PP-12 (Fukuoka, Japan, September 2012), ICA3PP-11 (Melbourne, Australia, October 2011),
ICA3PP-10 (Busan, Korea, May 2010), ICA3PP-09 (Taipei, Taiwan, June 2009), ICA3PP-08 (Cyprus,
June 2008), ICA3PP-07 (Hangzhou, China, June 2007), ICA3PP-05 (Melbourne, Australia, October
2005), ICA3PP-02 (Beijing, China, October 2002), ICA3PP-00 (Hong Kong, China, December 2000),
ICA3PP-97 (Melbourne, Australia, December 1997), ICA3PP-96 (Singapore, June 1996), and ICA3PP-95
(Brisbane, Australia, April 1995).
The ICA3PP 2015 conference collected research papers on the related research issues from all around the
world. This year we received 602 submissions for the main conference. All submissions received at least
three reviews from a high-quality review process. According to the review results, 219 papers are selected
for oral presentation at the conference, giving an acceptance rate of 36.4%.
We would like to offer our gratitude to Prof. Yang Xiang and Prof. Andrzej Goscinski from Deakin
University, Australia, and Prof. Yi Pan from Georgia State University, USA, the Steering Committee Chairs.
Our thanks also to the General Chairs, Prof. Guojun Wang from Central South University, China, Dr. Peter
Mueller from IBM Zurich Research, Switzerland, and Prof. Qingping Zhou from Jishou University, China,
for their great support and good suggestions to make the success of the final program. Special thanks to the
Workshop Chairs, Dr. Mianxiong Dong from Muroran Institute of Technology, Japan, and Dr. Ryan K. L.
Ko from the University of Waikato, New Zealand, and Dr. Md. Zakirul Alam Bhuiyan from Temple
University, USA. In particular, we would like to give our thanks to all researchers and practitioners who
submitted their manuscripts, and to the Program Committee and the external reviewers that contributed
their valuable time and expertise to provide professional reviews working under a very tight schedule.
Moreover, we are very grateful to our keynote speakers who have kindly accepted our invitation to give
insightful and prospective talks.
Finally, we sincerely hope that the conference will provide a very good opportunity for you to learn from
each other. Enjoy the conference, both technically and socially!
Program Chairs
Albert Zomaya, University of Sydney, Australia
Gregorio Martinez, University of Murcia, Spain
Kenli Li, Hunan University, China
6
Welcome Messages from ICA3PP 2015 Workshop Chairs
Welcome to the 15th International Conference on Algorithms and Architectures for Parallel Processing
(ICA3PP 2015) in Zhangjiajie, China on 18-20 November 2015. The program of this year consists of 6
symposiums/workshops that cover a wide range of research topics on parallel processing technology:
(1) The Sixth International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)
(2) The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP
2015)
(3) The Third International Workshop on Network Optimization and Performance Evaluation (NOPE
2015)
(4) The Second International Symposium on Sensor-Cloud Systems (SCS 2015)
(5) The Second International Workshop on Security and Privacy Protection in Computer and Network
Systems (SPPCN 2015)
(6) The First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and
Applications
(DependSys 2015)
The aim of these symposiums/workshops is to provide a forum to bring together practitioners and
researchers from academia and industry for discussion and presentations on the current research and future
directions related to parallel processing technology. The themes and topics of these
symposiums/workshops are a valuable complement to the overall scope of ICA3PP 2015 and give
additional values and interests. We hope that all of the selected papers will have a good impact on future
research in the respective field.
The ICA3PP 2015 workshops collected research papers on the related research issues from all around the
world. This year we received 205 submissions for all workshops. All submissions received at least three
reviews from a high-quality review process. According to the review results, 77 papers are selected for oral
presentation at the conference, giving an acceptance rate of 37.6%.
We offer our sincere gratitude to the workshop organizers for their hard work on designing the call for
papers, assembling the program committee, managing the peer-review process for the selection of papers,
and planning the workshop program. We are grateful to the workshop program committees, external
reviewers, session chairs, contributing authors, and attendees. Our special thanks to the Organizing
Committees of ICA3PP 2015 for their strong support, and especially to the Program Chairs, Prof. Albert
Zomaya, Prof. Gregorio Martinez and Prof. Kenli Li, for their guidance.
Finally, we hope that you will find the symposiums and workshops interesting and stimulating, and also
enjoy the ICA3PP 2015 conference and the fantastic city of Zhangjiajie, China.
Workshop Chairs
Mianxiong Dong, Muroran Institute of Technology, Japan
Ryan K. L. Ko, The University of Waikato, New Zealand
Md. Zakirul Alam Bhuiyan, Temple University, USA
7
Welcome Messages from TrustData 2015 Program Chairs
On behalf of the Program Committee of the 6th International Workshop on Trust, Security and Privacy for
Big Data (TrustData 2015), we would like to welcome you to join the conference in Zhangjiajie, China.
TrustData 2015 aims at bringing together people from both academia and industry to present their most
recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in
order to identify emerging research topics and define the future of Big Data.
TrustData 2015 is the next event in a series of highly successful international workshop on Trust, Security
and Privacy for Big Data (TrustData), previously held as TrustData-14 (Dalian, China, March 2012),
TrustData-13 (Zhangjiajie, China, November, 2013).
This international workshop collected research papers on the above research issues from all around the
world. Each paper was reviewed by at least three experts in the field. We feel very proud of the big number
of participation, and it has been difficult to collect the best papers from all the received, but at the end we
have defined an amazing conference that we hope, we can enjoy during the following days.
We would like to offer our gratitude to the General Chairs, Dr. Qin Liu and Dr. Muhammad Bashir
Abdullahi for their excellent support and invaluable suggestions to make the success of the final program.
In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and
thank the Program Committee members and the additional reviews for their tremendous efforts and timely
reviews.
We hope all of you enjoy TrustData 2015 and find that it will be a very good opportunity to learn from
each other and that your attendance will be most enjoyable and fruitful. Program Chairs
Keqin Li, State University of New York at New Paltz, USA
Avinash Srinivasan, Temple University, USA
8
Welcome Messages from TSP 2015 Program Chairs
On behalf of the Program Committee of the 5th International Symposium on Trust, Security and Privacy
for Emerging Applications (TSP 2015), we would like to welcome you to join the conference in
Zhangjiajie, China.
The symposium focuses on trust, security, and privacy issues in social networks, cloud computing,
Internet of Things (IoT), wireless sensor networks, and other networking environments or system
applications; and provides a forum for them to present and discuss emerging ideas and trends in this highly
challenging research area. The aim of this symposium is to provide a leading edge forum to foster
interaction between researchers and developers with the trust, security, and privacy issues, and to give
attendees an opportunity to network with experts in this area.
Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, TSP-09 in Macau
SAR, China, during October 12-14, 2009, TSP-10 in Bradford, UK, during June 29-July 1, 2010, and
TSP-13 in Zhangjiajie, China, during November 13-15, 2013, the Fifth International Symposium on Trust,
Security and Privacy for Emerging Applications (TSP-15) will be held in Zhangjiajie, China, during
November 18-20, 2015, in conjunction with the 15th International Conference on Algorithms and
Architectures for Parallel Processing (ICA3PP 2015).
The symposium collected research papers on the above research issues from all around the world. Each
paper was reviewed by at least two experts in the field. We have defined an amazing symposium that we
hope, we can enjoy during the conference days.
We would like to thank all researchers and practitioners who submitted their manuscripts, and thank the
Program Committee members and the additional reviewers for their tremendous efforts and timely reviews.
We hope all of you enjoy TSP 2015 and find that it will be a very good opportunity to learn from each
other and that your attendance will be most enjoyable and fruitful.
Program Chairs
Imad Jawhar, United Arab Emirates University, UAE
Deqing Zou, Huazhong University of Science of Technology, China
9
Welcome Messages from NOPE 2015 Program Chairs
Welcome to the 2015 International Workshop on Network Optimization and Performance Evaluation
(NOPE 2015) held in Zhangjiajie, China during November 18-20, 2015!
Network optimization and performance evaluation is a topic that attains a lot of attention in
network/Internet and distributed systems. Due to the recent advances in the Internet based applications as
well as WLANs, wireless home networks, and wireless sensor networks, wireless mesh networks, cloud
computing, we are witnessing a variety of new technologies. However, these systems and networks are
becoming very large and complex, and consuming large energy at the same time. System optimization and
performance evaluation remains to be resolved before these systems become a commodity.
On behalf of the organizing committee, we would like to take this opportunity to express our gratitude to
all reviewers who have been working hard to finish reviews on time. Thanks to the Publicity Chairs for
their efforts and support. Thanks also to all authors for your great support and contribution to the event. We
would like to give our special thanks to the organizing committee, colleagues and friends who have been
working behind-the-scenes. Without their unfailing cooperation, hard work and dedication, this event
would not be successfully organized.
We are grateful to all of you for participating in NOPE 2015, and we would like to encourage you to
explore the beautiful sight of Zhangjiajie during your stay and enjoy the conference.
Program Chair
Gaocai Wang, Guangxi University, China
10
Welcome Messages from SCS 2015 Program Chairs
As the Program Chairs and on behalf of the Organizing Committee of the 2nd International Symposium on
Sensor-Cloud Systems (SCS 2015), we would like to express our cordial welcome and gratitude for all
participants that attend the symposium in Zhangjiajie, China, 18-20 November, 2015. This famous city is
the location of China’s first forest park (The Zhangjiajie National Forest Park) and a World Natural
Heritage site (Wulingyuan Scenic Area).
The aim of SCS 2015 is to bring together researchers and practitioners working on sensor-cloud systems
area to present and discuss emerging ideas and trends in this highly challenging research field. It has
attracted some high quality research papers which highlight the foundational work that strives to push
beyond limits of existing technologies, including experimental efforts, innovative systems, and
investigations that identify weaknesses in the existing technology services.
SCS 2015 is sponsored by National Natural Science Foundation of China, Springer, School of Information
Science and Engineering at Central South University, School of Software at Central South University,
organized by Central South University, Hunan University, National University of Defense Technology, and
Jishou University. SCS 2015 is in conjunction with the 15th International Conference Algorithms and
Architectures for Parallel Processing (ICA3PP 2015), which highlight the latest research trends in various
aspects of computer science and technology.
Many individuals have contributed to the success of this international symposium. We would like to
express our special appreciation to the General Chairs of main conference, Prof. Guojun Wang, Prof. Peter
Mueller and Prof. Qingping Zhou for giving us this opportunity to hold this symposium and for their
guidance on the organization. Thanks also to the General Chairs of this symposium, Prof. Jie Li and Prof.
Dongqing Xie, for their excellent work in organizing the symposium. We would like to give our thanks to
all the members of the Organizing Committee and Program Committee for their efforts and support.
Finally, we are grateful to the authors for submitting their fine work to SCS 2015 and all the participants
for their attendance. Hope you enjoy the conference as well as beautiful Zhangjiajie!
Program Chairs
Xiaofei Xing, Guangzhou University, China
Md. Zakirul Alam Bhuiyan, Central South University, China, and Temple University, USA
11
Welcome Messages from SPPCN 2015 Program Chairs
On behalf of the Program Committee of the 2nd International Workshop on Security and Privacy
Protection in Computer and Network Systems (SPPCN 2015), we would like to welcome you to join the
workshop in Zhangjiajie, China.
The workshop focuses on security and privacy protection in computer and network systems, such as
authentication, access control, availability, integrity, privacy, confidentiality, dependability and
sustainability issues of computer and network systems. The aim of the workshop is to provide a leading
edge forum to foster interaction between researchers and developers with the security and privacy
protection in computer and network systems, and to give attendees an opportunity to network with experts
in this area.
SPPCN 2015 is the next event in a series of highly successful international conferences on security and
privacy protection in computer and network systems, previously held as SPPCN-15 (Dalian, China,
December 2015). The workshop collected research papers on the above research issues from all around the
world. Each paper was reviewed by at least two experts in the field.
We would like to offer our gratitude to the General Chair, Prof. Jian Weng, for their excellent support to
make the success of the final program. In particular, we would like to thank all researchers and
practitioners who submitted their manuscripts, and thank the Program Committee members and the
additional reviews for their tremendous efforts and timely reviews.
We hope all of you enjoy SPPCN 2015 and find that it will be a very good opportunity to learn from each
other and that your attendance will be most enjoyable and fruitful.
Program Chairs
Mianxiong Dong, Muroran Institute of Technology, Japan
Hua Guo, Beihang University, China
Tieming Cheng, Zhejiang University of Technology, China
Kaimin Wei, Jinan University, China
12
Welcome Messages from DependSys 2015 Program Chairs
As the Program Chairs and on behalf of the Organizing Committee of the First International Symposium
on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys2015), we would
like to express our cordial welcome and gratitude to all the participants attending the international
symposium in Zhangjiajie, China during18-20 November, 2015. This famous city is the location of China’s
first forest park (The Zhangjiajie National Forest Park) and a World Natural Heritage site (Wulingyuan
Scenic Area).
DependSys 2015 is a timely event that targets bringing together new ideas, techniques, and solutions for
dependability and its issues in sensor, cloud, and big data systems and applications. As we are deep into the
Information Age, we witness the explosive growth of data available on the Internet. Human beings are
producing quintillion bytes of data every day, which come from sensors, individual archives, social
networks, Internet of Things, enterprises and Internet in all scales and formats. One of the most
challenging issues we face is to achieve the designed system performance to an expected level, i.e., how to
effectively provide dependability in sensor, cloud and big data systems. These systems need to typically
run continuously, which often tend to become inert, brittle, and vulnerable after a while.
This international symposium collected research papers on the above research issues from all around the
world. Though it is the first event of DependSys, we received a large number of submissions in response to
the call for papers. We had a large program body and each paper was reviewed by at least three experts in
the field. After detailed discussions among the Program Chairs and General Chairs, a set of quality papers
was finally accepted. We feel very proud of the big number of participations, and it has been difficult to
collect the best papers from all the received submissions, but at the end we have defined an amazing
symposium that we hope, we can enjoy during the following days.
Many individuals have contributed to the success of this high caliber international symposium. We would
like to express our special appreciation to the Steering Chairs, Prof. Jie Wu and Prof. Guojun Wang for
giving us this opportunity to hold this symposium and for their guidance on the symposium organization.
In particular, we would like to give our thanks to the Symposium Chairs, Prof. Mohammed Atiquzzaman,
Prof. Sheikh Iqbal Ahamed, and Dr. Md Zakirul Alam Bhuiyan for their excellent support and invaluable
suggestions to make the final program a success. Thanks to all the Program Committee members and the
additional reviewers for their tremendous efforts and timely reviews.
We hope all of you would enjoy DependSys 2015 and find that it will be a very good opportunity to learn
from each other and that your attendance will be most enjoyable and fruitful.
Program Chairs
Latifur Khan, The University of Texas at Dallas, USA
Joarder Kamruzzaman, Federation University and Monash University, Australia
Al-Sakib Khan Pathan, Islamic University in Madinah, Kingdom of Saudi Arabia
13
The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)
Keynote 1: Identifying Propagation Sources and Modeling
Propagation Dynamics in Networks
Speaker: Prof. Wanlei Zhou, Senior Member of IEEE, Alfred Deakin Professor, Deakin University, Australia
Chair: Dr. Peter Mueller, IBM Zurich Research, Switzerland 09:00-09:45, November 18, 2015 (Wednesday)
About the Keynote Speaker
Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the
highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and
Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international
conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.
Summary:
It has long been a significant but difficult problem to identify propagation sources and model
propagation dynamics based on limited knowledge of network structures and the varying states of network nodes. Real cases of identifying propagation sources and modeling propagation dynamics include finding the spreader of malware and propagation process in computer networks, and locating the sources of rumours and propagation dynamics of rumours and truths in online social networks. This talk reviews the state-of-the art in source identification techniques, and discusses the pros and cons of current methods in this field. In order to gain a quantitative understanding of current methods, we provide a series of experiments and comparisons based on various environment settings. We then present our work in modelling the propagation of scanning worms, online social network worms, as well as rumours and truths in online social networks.
14
The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)
Keynote 2: Design of Distributed Algorithms for Engineering Applications of WSNs
Speaker: Prof. Jiannong Cao, Fellow of IEEE, Head and Professor at The Hong Kong Polytechnic
University, Hong Kong Chair: Prof. Weijia Jia, Shanghai Jiao Tong University, China
08:30-09:15, November 19, 2015 (Thursday)
About the Keynote Speaker Jiannong Cao is currently a chair professor and head of the Department of Computing at Hong Kong Polytechnic University, Hung Hom, Hong Kong. His research interests include parallel and distributed computing, computer networks, mobile and pervasive computing, fault tolerance, and middleware. He has co-authored 3 books, co-edited 9 books, and published over 300 papers in major international journals and conference proceedings. He is a fellow of IEEE, a senior member of China Computer Federation, and a member of ACM. He was the Chair of the Technical Committee on Distributed Computing of IEEE Computer Society from 2012 - 2014. Dr. Cao
has served as an associate editor and a member of the editorial boards of many international journals, including ACM Transactions on Sensor Networks, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Networks, Pervasive and Mobile Computing Journal, and Peer-to-Peer Networking and Applications. He has also served as a chair and member of organizing / program committees for many international conferences, including PERCOM, INFOCOM, ICDCS, IPDPS, ICPP, RTSS, DSN, ICNP, SRDS, MASS, PRDC, ICC, GLOBECOM, and WCNC. Dr. Cao received the BSc degree in computer science from Nanjing University, Nanjing, China, and the MSc and the Ph.D degrees in computer science from Washington State University, Pullman, WA, USA.
Summary:
As technology advances, applications of wireless sensor networks (WSNs) have been extended from traditional habitat monitoring, air pollution monitoring, etc., to more domain-specific engineering areas such as structural health monitoring (SHM) and volcano tomography. However, how to implement the sophisticated models and algorithms of these engineering applications within a resource-limited WSN becomes the main roadblock. This task is difficult because these
algorithms are not only computationally intensive, but also involve data-level collaboration of multiple sensors. Data-level collaboration refers to that data collected from different sensors are tightly coupled in the computation process.In this presentation, using some typical engineering applications such as SHM, smart grid and volcanic tomography, I will discuss the issues and techniques of designing distributed, light-weight version of these engineering computation algorithms. The distributed algorithms should be able to optimize some pre-defined performance criteria (e.g. communication cost and time-to-completion) under severe resource constraints and various uncertainties in the system. I will describe frameworks for decomposing some typical sophisticated and centralized signal processing algorithms and computation tasks within a large scale WSN with guaranteed accuracy and optimized performance. Research in this direction will
provide the foundation for extending the capability of WSNs to more engineering application domains.
15
The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)
Keynote 3: The Shapley Value: Its Use and Implications on Internet Economics
Speaker: Prof. John C.S. Lui, Fellow of ACM, Fellow of IEEE, The Chinese University of Hong Kong, Hong Kong
Chair: Prof. Dong Xiang, Tsinghua University, China 08:30-09:15, November 20, 2015 (Friday)
About the Keynote Speaker John C.S. Lui is currently the Choh-Ming Li Chair Professor at the Chinese University of Hong Kong. He is a fellow of ACM, fellow of IEEE
and the senior research fellow of the Croucher Foundation. His research interests are in network science, Internet, network/system security, network economics and performance evaluation theory.
Summary:
Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize its profit. Peering agreements based on local views and bilateral settlements, while expedient, encourage selfish routing strategies and discriminatory interconnections. From a more global perspective, such settlements reduce aggregate profits, limit the stability of routes, and discourage potentially useful peering/connectivity arrangements, thereby unnecessarily balkanizing the Internet. We show that
if the distribution of profits is enforced at a global level, then there exist profit -sharing mechanisms derived from the coalition games concept of Shapley value and its extensions that will encourage these selfish ISPs who seek to maximize their own profits to converge to a Nash equilibrium. We show that these profit sharing schemes exhibit several fairness properties that support the argument that this distribution of profits is desirable. In addition, at the Nash equilibrium point, the routing and connecting/peering strategies maximize aggregate network profits, encourage ISP connectivity so as to limit balkanization.
16
The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)
Keynote 4: In-Memory Computing: New Architecture for Big Data Processing
Speaker: Prof. Hai Jin, Senior Member of IEEE, Professor at Huazhong University of Science and Technology, China
Chair: Prof. Lei Shu, Guangdong University of Petrochemical University, China 09:15-10:00, November 20, 2015 (Friday)
About the Keynote Speaker Hai Jin is a Cheung Kung Scholars Chair Professor of computer science and engineering at Huazhong University of Science and Technology
(HUST) in China. Jin received his PhD in computer engineering from HUST in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security.Jin is
a senior member of the IEEE and a member of the ACM. He has co-authored 15 books and published over 600 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer -to-peer computing, network storage, and network security.
Summary:
With emerging of big data, the processing speed for the data is one of the key issues for big data technology. One of the efficient ways to handle the velocity of data is putting all the data in the memory. But traditional memory, DRAM, consumes a large amount of energy and cost to build a large memory system. In recent years, lots of non-volatile memory devices, such as phase change memory (PCM), are studied to be part of memory. We call it the storage class memory (SCM). Combing traditional memory and SCM together to build a large hybrid memory space is becoming one of the energy-efficient ways to extend the traditional in-memory computing system into a new level, to handle large quality of data in real time. In this talk, we will discuss this new in-memory computing system from different aspects and some challenges in this new system. We
will also report some ongoing effort in China to build this hybrid memory-based in-memory computing system, and some latest advances in this area.
17
Panel 1: Open Dependability Issues in Cloud and Big Data Systems
09:15-11:15, November 19, 2015 (Thursday), Room 1
Computer systems (e.g., digital sensors, networks, and smart devices) are now available anytime,
anywhere, by different means, and are distributed unobtrusively throughout everyday environments in
which physical objects/artifacts embedded with invisible computers are sensible and networked locally and
globally. The rapid development of the computer systems with their extensive use is leading to the creation
of huge collections of data, and coins the term Big Data. Big Data is characterized by the integration of a
signif icant amount of data, of varying modalities or types, at a pace that cannot be handled by traditional
data management systems. Since huge amounts of data in unstructured and semi-structured forms are being
generated from various sources, new systems, frameworks and methodologies are being designed and
developed for data management and data analytics. Although tremendous efforts are being given to these
big systems, there is no doubt that they must be “dependable.”
In the last few years, cloud computing has grown from being a promising business concept to one of the
fastest growing segments of the IT industry. Cloud computing enables computing systems/resources to be
provided as IT services in a pay-as-you-go fashion. The services can be achieved with high efficiency and
effectiveness only if the systems are ‘dependable.’ Among various circumstances, dependability can be
affected by the open environment with very limited user-side control in Cloud. As a result, “dependability”
is going to be one of most concerned issues for Cloud computing. It is also a great challenge for Big Data
together with Cloud. Future systems need to close the dependability gap in face of challenges in different
circumstances. The emphasis will be on differing properties of such services, e.g., continuity, effective
performance, real-time responsiveness, ability to overcome data fault/corruption/anomaly, ability to avoid
failures, prevention of deliberate privacy intrusions, reliability/availability/adaptability/security/safety, and
so on. While information society, commercial and scientific companies, and industries share the need for
massive throughput, “dependability” of service becomes a big concern.
The aim of this panel discussion is to discuss various aspects and open ideas, explore key open issues, and
investigate technology enablers to motivate future research of dependability in Big Data and Cloud
computing.
Panelists:
Prof. Takashi Nanya, Canon, Japan
Prof. Jemal Abawajy, Deakin University, Australia
Prof. Weijia Jia, Shanghai Jiao Tong University, China
Prof. Yennun Huang, Academia Sinica, Taiwan
A/Prof. Jinjun Chen, University of Technology, Sydney, Australia
Chairs:
Prof. Guojun Wang, Central South University, China
Prof. Tatsuhiro Tsuchiya, Osaka University, Japan
Dr. Md Zakirul Alam Bhuiyan, Temple University, USA
18
Panel 2: Training Innovative Talents with Cooperation of Industry, Academics
and Research, 09:15-11:15, November 19, 2015 (Thursday), Room 0
"Transformation and Innovation" is one of the main themes of social developments in China. In May 2015,
the State Council announced the "Made in China 2025" concept, which indicates that information industry
and traditional manufacturing industry will be deeply integrated to make breakthroughs in some key fields ;
new model and new format will be derived. Nowadays, the opportunities for entrepreneurship and
innovation are being open to most people other than only a few individuals. The industry, university,
research and application interaction with cooperation of industry, academics and research communities is
becoming an important form of the development of science and technology innovation. Participation and
collaboration of multiple innovation subjects is one of the important factors that lead to the success of
innovation. In this background, higher education in China emphasizes students' spirit of innovation and
practical abilities, and it is committed to train innovative talents of science and technology. Due to the
traditional education model which emphasizes examination-oriented education, there is a sharp lack of
high-quality talents who meet the requirements of the scientific frontier and high-level industrial
innovation. The situation becomes more serious in the fields of top-notch science and technology. With the
continuously increasing requirements of the economic and social developments on the innovative talents
and the continuous deepening of the education reform, some key issues including the integration of
educational resources, the optimization of training mode, and other deep-rooted contradictions are
becoming more serious. Therefore, it is urgent to resolve contradictions, exploit new methodologies,
innovate new technologies, and promote the cooperation of science, technology and education, so as to
build a new system of training high-level and innovative talents. The forum invites distinguished
professors from well-known universities in China and overseas, and elites officials from enterprises and
governments, to discuss these problems together. We are looking forward to the participation of more
experts, scholars and personages of various fields. Let us brainstorm for better thoughts and feasible
solutions.
Panelists:
Prof. Zhiying Wang, National University of Defense Technology, China
Prof. Dafang Zhang, Hunan University, China
Prof. Keqiu Li, Dalian University of Technology, China
Prof. Yang Xiang, Deakin University, Australia
Prof. Lei Shu, Guangdong University of Petrochemical University, China
Chairs:
Prof. Guojun Wang, Central South University, China
Prof. Kenli Li, Hunan University, China
Prof. Jianquan Ouyang, Xiangtan University, China
19
A. SESSIONS AND PAPERS IN ICA3PP 2015
The 15th International Conference on Algorithms and Architectures for Parallel Processing
( ICA3PP 2015)
Track 1: Parallel and Distributed Architectures Session T1A: 10:15-12:30, November 18 (Wednesday), Room 9
Chair: Wenying Yang, Foshan University, China Parallelizing Block Cryptography Algorithms on Speculative Multicores
Yaobin Wang, Hong An, Zhiqin Liu, Lei Zhang, and Qingfeng Wang
Performance Characterization and Optimization for Intel Xeon Phi Coprocessor Cheng Zhang, Li Liu, Ruizhe Li, and Guangwen Yang
EH-Code: An Extended MDS Code to Improve Single Write Performance of Disk Arrays for Correcting Triple Disk
Failures
Yanbing Jiang, Chentao Wu, Jie Li, and Minyi Guo
A Distributed Location-based Service Discovery Protocol for Vehicular Ad-Hoc Networks Chang Liu, Juan Luo, and Qiu Pan
Unified Virtual Memory Support for Deep CNN Accelerator on SoC FPGA
Tao Xiao, Yuran Qiao, Junzhong Shen, Qianming Yang, and Mei Wen
DaSS: Dynamic Time Slice Scheduler for Virtual Machine Monitor
Ruhui Ma, Jian Li, Liwei Lin, and Haibing Guan
Session T1B: 14:00-16:00, November 18 (Wednesday), Room 9
Chair: Wenjuan Tang, Central South University, China Memory-Aware NoC Application Mapping Based on Adaptive Genetic Algorithm
Yizhuo Wang, Zhibiao Zhang, Lifu Huang, and Weixing Ji
A Study on Non-Volatile 3D Stacked Memory for Big Data Applications
Cheng Qian, Libo Huang, Peng Xie, Nong Xiao, and Zhiying Wang Parallel Implementation of Dense Optical Flow Computation on Many -Core Processor
Wenjie Chen, Jin Yu, Weihua Zhang, Linhua Jiang, Guanhua Zhang, and Zhilei Chai
A Power-Conserving Online Scheduling Scheme for Video Streaming Services
Yunyun Jiang, Tian Xiao, Jidong Zhai, Ying Zhao, and Wenguang Chen
Prevent Deadlock and Remove Blocking for Self-Timed Systems Edwin H.-M. Sha, Weiwen Jiang, Qingfeng Zhuge, Xianzhang Chen, and Lei Yang
Session T1C: 16:15-18:15, November 18 (Wednesday), Room 9
Chair: Zhuzhong Qian, Nanjing University, China Improving the Memory Efficiency of In-memory MapReduce based HPC Systems
Cheng Pei, Xuanhua Shi, and Hai Jin
DBFS: Dual Best-First Search Mapping Algorithm for Shared-Cache Multicore Processors Thomas Canhao Xu and Ville Leppanen
HVCRouter: Energy Efficient Network-on-Chip Router with Heterogeneous Virtual Channels
Ji Wu, Xiangke Liao, Dezun Dong, Li Wang, and Cunlu Li
Availability and Network-aware MapReduce Task Scheduling over the Internet
Bing Tang, Qi Xie, Haiwu He, and Gilles Fedak OptRS: An Optimized Algorithm Based on CRS Codes in Big Data Storage Systems
Chao Yin, Jianzong Wang, Haitao Lv, Zongmin Cui, Lianglun Cheng,Qin Zhan, and Tongfang Li
Session T1D: 16:15-18:15, November 19 (Thursday), Room 8
Chair: Qin Liu, Hunan University, China Quantum Computer Simulation on Multi-GPU Incorporating Data Locality
Pei Zhang, Jiabin Yuan, and Xiangwen Lu Query Execution Optimization Based on Incremental Update in Database Distributed Middleware
Wei Ye, Mei Wang, and Jiajin Le
*Optimizing the Deployment of Virtual Machine Image Replicas in Cloud Storage Clusters
20
Cong Xu, Jiahai Yang, Jianping Weng, Ye Wang and Hui Yu
*Hardware Support for Message-passing in Chip Multi-Processors
Yanhua Li, Youhui Zhang, Cihang Jiang and Weimin Zheng
Track 2:Software Systems and Programming Models Session T2A: 09:15-11:15, November 19 (Thursday), Room 9
Chair: Phillip M. Dickens, University of Maine, Orono, Maine FT-Offload: A Scalable Fault-Tolerance Programing Model on MIC Cluster
Cheng Chen, Yunfei Du, Zhen Xu, and Canqun Yang
MC-RAIS: Multi-Chunk Redundant Array of Independent SSDs with Improved Performance
Suzhen Wuz, Weijian Yangz, Bo Maoy , and Yanping Linz An Energy Efficient Storage System for Astronomical Observation Data on Dome A
Zichao Yuan, Ce Yu, Jizhou Sun, Jian Xiao, Jianmei Wang, Zhaohui Shang, and Yi Hu
Parallel Aware Hybrid Solid-State Storage
Dan He, Fang Wang, Dan Feng, Jingning Liu, Yunxiang Wu, Ying He, and Yang Hu
Automatic Optimization of Software Transactional Memory through Linear Regression and Decision Tree Yang Xiao, Zhen Li, Ehsan Atoofian, and Ali Jannesari
A Data-centric Tool to Improve the Performance of Multithreaded Program on NUMA
Dan Zeng, Liang Zhu, Xiaofei Liao, and Hai Jin
Session T2B: 14:00-16:00, November 19 (Thursday), Room 9
Chair: Sancheng Peng, Zhaoqing University, China A Light-weight Hot Data Identi cation Scheme via Grouping-based LRU Lists
Biaobiao Shen, Yongkun Li, Yinlong Xu, and Yubiao Pan
iPLAR: Towards Interactive Programming with Parallel Linear Algebra in R
Zhaokang Wang, Shiqing Fan, Rong Gu, Chunfeng Yuan, and Yihua Huang
Enhancing I/O Scheduler Performance by Exploiting Internal Parallelism of SSDs
Jiayang Guo, Yimin Huz, and Bo Mao A Performance and Scalability Analysis of the MPI Based Tools Utilized in a Large Ice Sheet Model
Executing in a Multicore Environment
Phillip Dickens
*Kernel Mechanisms for Turning a 3D MMOG From Single to Multi-Server Architecture
Mei-Ling Chinag, Ching-Chung Tseng, Yen-Chu Chang, Shu-Chun Chao and Han Wang *Top-k Keyword Search with Recursive Semantics in Relational Databases
Dingjia Liu and Guohua Liu
Track 3: Distributed and Network-based Computing Session T3A: 10:15-12:30, November 18 (Wednesday), Room 8
Chair: Xiaoyu Zhu, Central South University, China Coding-based Cooperative Caching in Data Broadcast Environments
Houling Ji, Victor C.S. Lee, Chi-Yin Chow, Kai Liu, and Guoqing Wu
Usage History-directed Power Management for Smartphones Xianfeng Li, Wen Wen, and Xigui Wang
Application Streaming: A Mobile Application Distribution Method
Wang Yang, Lei Jia, and Guojun Wang
A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust -Based Access Control
Bin Zhao, Jingsha He, Xinggang Xuan, Yixuan Zhang, and Na Huang QoE based Spectrum Allocation Optimization using Bees Algorithm in Cognitive Radio Networks
Wenjuan Lu, Zizhong Quan, Quan Liu, Duzhong Zhang, and Wenjun Xu
Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms
Jiangtao Zhang, Shi Chen, Hejiao Huang, Xuan Wang, and Dingzhu Du
Session T3B: 14:00-16:00, November 18 (Wednesday), Room 8
Chair: Wei Zhou, Hunan Agricultural University, China A Service Industry Perspective on Software Defined Radio Access Networks
Casimer DeCusatis and Ioannis Papapanagiotou
An Approach to Rapid Worker Discovery in Software Crowdsourcing
Feiya Song, Haopeng Chen, and Ying Fu
STWM: A Solution to Self-adaptive Task-worker Matching in Software Crowdsourcing
21
Ying Fu, Haopeng Chen, and Feiya Song
GroupDRM: Group-based Dynamic Resource Management Model in Wireless Network
Zhipeng Tan, Jie Cui, Dan Feng, and Wei Zhou ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications
Jiaqi Liu, Guojun Wang, Deng Li, and Hui Liu
Session T3C: 16:15-18:15, November 18 (Wednesday), Room 8
Chair: Qian Li, Xi’an Jiao Tong University, China Energy Efficient Sleep Scheduling for Wireless Sensor Networks
Paul Chiedozie Uzoh, Jilong Li, Zhenbo Cao, Jinbae Kim, Aamir Nadeem, and Kijun Han QoS Prediction in Dynamic Web Services with Asymmetric Correlation
Qi Xie, Bing Tang, Zibin Zheng, and Mengtian Cui
A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data
Huigui Rong, Liang Gong, Zheng Qin, Yupeng Hu, and Chunhua Hu
A General Methodology to Design Deadlock-free Routing Algorithms for Mesh Networks Zhigang Yu, Xinyu Wang, Kele Shen, and Haikuo Liu
Completion Time-aware Flow Scheduling in Heterogenous Networks
Shiming He, Kun Xie, and Dafang Zhang
Towards VM Power Metering: A Decision Tree Method and Evaluations
Chonglin Gu, Shuai Shi, Pengzhou Shi, Hejiao Huang, and Xiaohua Jia
Session T3D: 14:00-16:00, November 19 (Thursday), Room 3
Chair: Kai Liu, Chongqing University, China A Dynamic State Estimation of Power System Harmonics using Distributed Related Kalman Filter
Wei Sun, Chanjuan Zhao, Jianping Wang, Chenghui Zhu, Daoming Mu, Liangfeng Chen, Jie Li, and Qiyue Li
An Efficient Cluster-based Data Sharing Algorithm for Bidirectional Road Scenario in Vehicular Ad-hoc Networks
Junhua Wang, Kai Liu, Edwin H.M. Sha, Victor C.S. Lee, and Sang H.Son A Distributed Joint Cooperative Routing and Channel Assignment in Multi-radio Wireless Mesh Network
Hong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, and Shiming He
Improved Approximating Algorithms for Computing Energy Constrained Minimum Cost Steiner Trees
Nianchen Zou and Longkun Guo
A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud Congyang Chen, Jianxun Liu, Yiping Wen, Jinjun Chen, and Dong Zhou
A Metadata Management Strategy Based on Event-classification in Intelligent Transportation System
Session T3E: 16:15-18:15, November 19 (Thursday), Room 3
Chair: Sivadon Chaisiri, The University of Waikato, New Zealand *Communication-aware Virtual Machine Migration in Cloud Data Centers
Wenxin Li, Heng Qi, Keqiu Li, Xiaoyi Tao and Xinhua Ji
*An adaptive hybrid ARQ method for coexistence of ZigBee and WiFi
Quan Liu, Xiaorui Li, Zizhong Quan, Duzhong Zhang, Wenjun Xu
*Detecting Spammers using Review Graph
Zhixiang He, Chonglin Gu, Shi Chen, Hejiao Huang and Xiaohua Jia *A Service Industry Perspective on Software Defined Radio Access Networks
Casimer Decusatis and Ioannis Papapanagiotou
*Area Coverage estimation Model for Directional Sensor Networks
Zhimin Liu, Weijia Jia, Guojun Wang
*A Sprouting Graph based Approach to Analyzing Timed Workflow Processes with Shared Resources Yanhua Du, Ruyue Li and Benyuan Yang
Track 4 : Big Data and its Applications Session T4A: 10:15-12:30, November 18 (Wednesday), Room 7
Chair: Yang Wei, Nankai University, China PAHDFS: Preference-Aware HDFS for Hybrid Storage
Wei Zhou, Dan Feng, Zhipeng Tan, Yingfei Zheng
Urban Traffic Congestion Prediction Using Floating Car Trajectory Data
Qiuyuan Yang, Jinzhong Wang, Ximeng Song, Xiangjie Kong, Zhenzhen Xu, and Benshi Zhang A Metadata Cooperative Caching Architecture Based on SSD and DRAM for File Systems
Zhisheng Huo, Limin Xiao, Qiaoling Zhong, Shupan Li, Ang Li, Li Ruan, Shouxin Wang, and Lihong Fu
22
Parallel Training GBRT Based on KMeans Histogram Approximation for Big Data
Rong Gu, Lei Jin, Yongwei Wu, Jingying Qu, Tao Wang, Xiaojun Wang, Chunfeng Yuan, and Yihua Huang
DBSCAN-M: An Intelligent Clustering Algorithm based on Mutual Reinforcement Yin Li, Chuyuan Guo, Ronghua Shi, Xiaoqun Liu, and Yan Mei
An Effective Method for Gender Classification with Convolutional Neural Networks
Hao Zhang, Qing Zhu and Xiaoqi Jia
Session T4B: 14:00-16:00, November 18 (Wednesday), Room 7
Chair: Wenying Yang, Foshan University, China AQUAdex: A Highly Efficient Indexing and Retrieving Method for Astronomical Big Data of Time Series Images
Zhi Hong, Ce Yu, Ruolei Xia, Jian Xiao, Jie Wang, Jizhou Sun, and Chenzhou Cui
SAKMA: Specialized FPGA-based Accelerator Architecture for Data-Intensive K-Means Algorithms
Fahui Jia, Chao Wang, Xi Li, and Xuehai Zhou
HDCat: Effectively Identifying Hot Data in Large-scale I/O Streams with Enhanced Temporal Locality
Jiahao Chen, Yuhui Deng, and Zhan Huang LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data
Debin Jia, Zhengwei Liu, Xiaoyan Gu, Bo Li, Jingzi Gu, Weiping Wang, and Dan Meng
Enhancing Parallel Data Loading for Large Scale Scientific Database
Hui Li, Hongyuan Li, Mei Chen, Zhenyu Dai, Ming Zhu,and Menglin Huang
Session T4C: 16:15-18:15, November 18 (Wednesday), Room 7
Chair: Yinglong Dai, Central South University, China A MapReduce Reinforced Distributed Sequential Pattern Mining Algorithm
Xiao Yu, Jin Liu, Xiao Liu, Chuanxiang Ma,and Bin Li
SHDC: A Fast Documents Classification Method Based on Simhash
Liang Gu, Peng Yang,and Yongqiang Dong
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU Fei Peng, Yin Zhu, and Min Long
Feature Selection Method Based on Feature’s Classification Bias and Performance
Jun Wang, Jinmao Wei, and Lu Zhang
Enriching Document Representation with the Deviations of Word Co-occurrence Frequencies
Yang Wei, Jinmao Wei, and Zhenglu Yang
Session T4D: 09:15-11:15, November 19 (Thursday), Room 7
Chair: Rob Cameron, Simon Fraser University, Canada Big Data Analytics and Visualization with Spatio-Temporal Correlations for Traffic Accidents
Xiaoliang Fan, Baoqin He, Cheng Wang, Jonathan Li, Ming Cheng, Huaqiang Huang1,and Xiao Liu
A Novel APP Recommendation Method Based on SVD and Social Influence
Qiudang Wang, Xiao Liu, Shasha Zhang, Yuanchun Jiang, Fei Du, Yading Yue, Yu Liang SHB+-Tree: A Segmentation Hybrid Index Structure for Temporal Data
Mei Wang, Meng Xiao
Fusion-Cache: A Refactored Content-Aware Host-Side SSD Cache
Xian Chen, Wenzhi Chen,and Zhongyong Lu
A Novel Storing and Accessing Method of Traffic Incident Video Based on Spatial-temporal Analysis Yaying Zhang, Yinyin Zhu
Session T4E: 14:00-16:00, November 19 (Thursday), Room 7
Chair: Yuanfang Chen, Institut Mines-Telecom, Telecom SudParis, France Arbitrary-length Jacket-Haar Transforms
Guibo Liu, Geli Lv, Dayong Luo, Ying Guo, and Moonho Lee
Circulant Euler-Jacket Transform and Its Applications Based on Fast Algorithm Yang Zhang, Geli Lv, Guibo Liu, and Ying Guo
*A Locality Constrained Self-Representation Approach for Unsupervised Feature Selection
Cuihua Wang, Shuyi Ma, Chao Bi, Hui Sun, Yugen Yi
*Package Balancing K-means Algorithm for Physical Distribution
Yinglong Dai, Wang Yang and Guojun Wang *U-Search: Usage-based Search with Collective Intelligence
Pengfei Yin, Guojun Wang and Wenjun Jiang
*A Collaborative Filtering Recommendation Method based on TagIEA Expert Degree Model
Weimin Li, Bin Wang, Jianbo Zou and Jinfang Sheng
23
Session T4F: 10:30-12:30, November 20 (Friday), Room 4
Chair: Gaocai Wang, Guangxi University, China Tradeoff between the Price of Distributing a Database and Its Collusion Resistance Based
On Concatenated Codes Thach V. Bui, Thuc D. Nguyen, Noboru Sonehara, and Isao Echizen
Track 5 : Parallel and Distributed Algorithms Session T5A: 10:15-12:30, November 18 (Wednesday), Room 6
Chair: Wei Zhou, Hunan Agricultural University, China Deadline-oriented Task Scheduling for MapReduce Environments
Minghao Hu, Changjian Wang, Pengfei You, Zhen Huang, and Yuxing Peng
Bitwise Data Parallelism with LLVM: The ICgrep Case Study Robert D. Cameron, Nigel Medforth, Dan Lin, Dale Denis, and William N. Sumner
Parallel Bloom Filter on Xeon Phi Many-Core Processors
Sheng Ni, Rentong Guo, Xiaofei Liao, and Hai Jin
A List Scheduling Algorithm for DAG-Based Parallel Computing Models
Hao Fu, Ce Yu, Jizhou Sun, Mengmeng Wang, and Jun Du Parallel Computing Method for HRV Time-domain Based on GPU
Jie Wang, Weihao Chen, and Gang Hou
Accelerated Steiner Tree Problem Solving on GPU with CUD
Christian Mathieu and Matthias Klusch
Session T5B: 14:00-16:00, November 18 (Wednesday), Room 6
Chair: Feng Wang, Central South University, China Self-Timed Periodic Scheduling of Data-Dependent Tasks in Embedded Streaming Applications
Xuan Khanh Do, Amira Dkhil, and Stéphane Louise
A Novel Concurrent Generalized Deadlock Detection Algorithm in Distributed Systems
Wei Lu1, Yong Yang, Liqiang Wang, Weiwei Xing, and Xiaoping Che
BiTEM: A Two-Tier Energy Efficient Resource Management Framework for Real-Time Tasks in Clusters Wei Huang, Jin Shi, Zhen Wang, Zhuzhong Qian
Multitask Oriented GPU Resource Sharing and Virtualization in Cloud Environment
Xingfang Zhao, Yujie Zhang, Bing Su
Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration
Huanle Xu, Ronghai Yang, Zhibo Yang, and Wing Cheong Lau
Session T5C: 16:15-18:15, November 18 (Wednesday), Room 6
Chair: Lei Zhou, Central South University, China A Dynamic Extension and Data Migration Method Based on PVFS
Xiaoyu Zhang, Jie Tang, Heng Gao, and Gangshan Wu
Fast 3-Point Correlation Function Approximation on GPU
Chao Sun, Mujin Yang, Ce Yu, and Jizhou Sun Efficient Scheduling with Intensive In-Memory File Accesses Considering Bandwidth Constraint on Memory Bus
Lin Wu, Qingfeng Zhuge, Edwin H.-M Sha, and Zhilong Sun
GPU-Accelerated Algorithm for Fast Computation of Biomolecular Isotopic Envelopes
Jingpeng Wang, Jie Huang, Kaijie Xiao, and Zhixin Tian
Cost-efficient and Scalable Multicast Tree in Software Defined Networking Shanshan Zhou, Hua Wang, Shanwen Yi, and Fangjin Zhu
Session T5D: 09:15-11:15, November 19 (Thursday), Room 6
Chair: Deng Li, Central South University, China Parallel Data Regeneration Based on Multiple Trees with Network Coding in Distributed Storage System
Pengfei You, Zhen Huang, Changjian Wang, Minghao Hu, and Yuxing Peng
Maximize Throughput Scheduling and Cost-Fairness Optimization for Multiple DAGs with Deadline Constraint Wei Wang, Qingbo Wu, Yusong Tan, and Fuhui Wu
Unified Multi-Constraint and Multi-Objective Workflow Scheduling for Cloud System
Fuhui Wu, Qingbo Wu, Yusong Tan, and Wei Wang
24
Bi-objective Optimization Genetic Algorithm of the Energy Consumption and Reliability for Workflow Applications in
Heterogeneous Computing Systems
Longxin Zhang, Kenli Li, and Keqin Li PE-TLD: Parallel Extended Tracking-Learning-Detection for Multi-target Tracking
Chenggang Zhou, Qiankun Dong, Wenjing Ma, Guoping Long, Tao Li
Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy
Wenyin Yang, Guojun Wang, and Md Zakirul Alam Bhuiyan
Session T5E: 14:00-16:00, November 19 (Thursday), Room 6
Chair: Xiaoyu Zhu, Central South University, China Improving Performance of Floating Point Division on GPU and MIC
Kun Huang, Yifeng Chen
UniDegree: A GPU-based Graph Representation for SSSP
Changyou Zhang, Feng Wang,Kun Huang, Zhiyou Liu,and Yifeng Chen
MTTF-aware Reliability Task Scheduling for Heterogeneous Multicore System Huaguo Liang, Yangyang Dai, Maoxiang Yi, Dawen Xu,and Zhengfeng Huang
One-to-One Disjoint Path Covers on Mesh
Manyi Du, Jianxi Fan, Yuejuan Han, and Cheng-Kuan Lin
*Para-Join: An Efficient Parallel Method for String Similarity Join
Cairong Yan and Jian Wang *Communication-Aware Task Scheduling Algorithm for Heterogeneous Computing
Tehui Huang, Tao Li, Qiankun Dong, Kezhao Zhao, Wenjing Ma and Yulu Yang
Track 6: Applications of Parallel and Distributed Computing Session T6A: 10:15-12:30, November 18 (Wednesday), Room 5
Chair: Feng Wang, Central South University, China On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks
Wenbin Hu, Liping Yan, Huan Wang, and Bo Du Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System
Weihao Liang, Hong An, Feng Li, and Yichao Cheng
Stencil Computations on HPC-oriented ARMv8 64-bit Multi-Core Processor
Chunjiang Li, Yushan Dong, and Kuan Li
A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, and Shanwen Yi
A Streaming Execution Method for Multi-Services in Mobile Cloud Computing
Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, and Yongbing Tang
Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud
Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, and Jianhang Huang
Session T6B: 14:00-16:00, November 18 (Wednesday), Room 5
Chair: Zheng Ma, Hunan University, China Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac
Ventricle
Qiang Lan, Namit Gaur, Johannes Langguth, and Xing Cai
Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core Architectures Yizhuo Wang, Weixing Ji, Xu Chen, and Sensen Hu
Refactoring for Separation of Concurrent Concerns
Yang Zhang, Dongwen Zhang, Weixing Ji, and Yizhuo Wang
Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph
Zhenchun Huang and Guoqing Li Resource-Efficient Vibration Data Collection in Cyber-Physical Systems
Md Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, and Xiangyong Liu
Session T6C: 16:15-18:15, November 18 (Wednesday), Room 5
Chair: Wenbin Jiang, Huazhong University of Science and Technology, China A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System
Wenbin Jiang, Zhiwei Lu, Hai Jin, and Ye Chi DFIS: A Scalable Distributed Fingerprint Identification System
Yunxiang Zhao, Wanxin Zhang, Dongsheng Li, and Zhen Huang
25
Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm Optimization
Runshui Zhu, Hua Wang, Yanqing Gao, Shanwen Yi, and Fangjin Zhu
Pre-Stack Kirchhoff Time Migration on Hadoop and Spark Chen Yang, Jie Tang, Heng Gao, and Gangshan Wu
A Cyber Physical System with GPU for CNC Applications
Jen-Chieh Chang, Ting-Hsuan Chien, and Rong-Guey Chang
NCPSO: A Solution of the Controller Placement Problem in Software Defined Networks
Session T6D: 09:15-11:15, November 19 (Thursday), Room 5
Chair: Yinglong Dai, Central South University, China Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector Machines
Jiangang Wu, Chang Feng, Peihuan Gao, and Shizhong Liao
Real-time Deconvolution with GPU and Spark for Big Imaging Data Analysis
Lianyu Cao, Penghui Juan, and Yinghua Zhang Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters
Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, and Jianlei Zhang
MrBayes for Phylogenetic Inference Using Protein Data on A GPU Cluster
Shuai Pang, Rebecca J. Stones, Ming-ming Ren, Gang Wang, and Xiaoguang Liu
Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOP Shijin Yuan, Yiwen Qian, and Bin Mu
*Energy-aware Task Consolidation For Cloud Computing Data Center
Ya Chen and Yonghua Xiong
Track 7: Service Dependability and Security in Distributed and Parallel Systems Session T7A: 10:15-12:30, November 18 (Wednesday), Room 3
Chair: Chi Lin, Dalian University of Technology, China A Programming Framework for Implementing FaultTolerant Mechanism in IoT Applications
Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S.L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo
VCLT: An Accurate Trajectory Tracking Attack based on Crowdsourcing in VANETs
Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang Wu Yu, and Guowei Wu
A Novel Search Engine-Based Method for Discovering Command and Control Server
Xiaojun Guo, Guang Cheng,Wubin Pan, Truong Dinhtu, and Yixin Liang Leveraging Behavior Diversity to Detect Spammers in Online Social Networks
Jian Cao, Qiang Fu, Qiang Li, and Dong Guo
A Proactive Fault Tolerance Scheme for Large Scale Storage Systems
Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, and Zhongwei Li
When Software Defined Networks Meet Fault Tolerance: A Survey Jue Chen, Jinbang Chen, Fei Xu, Min Yin, and Wei Zhang
Session T7B: 14:00-16:00, November 18 (Wednesday), Room 3
Chair: Wenjun Jiang, Hunan University, China A Novel Signature Generation Approach for Polymorphic Worms
Jie Wang, and Xiaoxian He
Scalable Access Policy for Attribute Based Encryption in Cloud Storage Jing Wang, Chuanhe Huang, and Jinhai Wang
Minimizing Resource Expenditure while Maximizing Destructiveness for Node Capture Attacks
Chi Lin, Guowei Wu, Xiaochen Lai, and Tie Qiu
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection
Shaobo Zhang, Qin Liu, and Guojun Wang Exploring Efficient and Robust Virtual Machine Introspection Techniques
Chonghua Wang, Xiaochun Yun, Zhiyu Hao, Lei Cui, Yandong Han, and Qingxin Zou
CRVad: Confidential Reasoning and Verification towards Secure Routing in Ad Hoc Networks
Teng Li, Jianfeng Ma, and Cong Sun
Session T7C: 16:15-18:15, November 18 (Wednesday), Room 3
Chair: Wenjun Jiang, Hunan University, China NMHP: A Privacy Preserving Profile Matching Protocol in Multi-Hop Proximity Mobile Social Networks
Entao Luo, Qin Liu, and Guojun Wang
26
A New Data Replication Scheme for PVFS2
Nianyuan Bao, Jie Tang, Xiaoyu Zhang, and Gangshan Wu
Efficient Private Matching Scheme for Friend Information Exchange Fang Qi, and Wenbo Wang
A Real-time Android Malware Detection System Based on Network Traffic Analysis
Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, and Lei Zhang
Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships
Houwu Chen, and Jiwu Shu Adopting Multi-Mode Access Control for Secure Data Sharing in Cloud
Chunhua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, and Hao Jin
Session T7D: 09:15-11:15, November 19 (Thursday), Room 3
Chair: Lei Zhou, Central South University, China A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud
Zheng Yan, Wenxiu Ding, and Haiqi Zhu HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems
Xuhui Liu, Qin Liu, Tao Peng, and Jie Wu
Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications
Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, and Peng Liu
Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA Sheng Huo, Dafang Zhang, and Yanbiao Li
A Robust and Efficient Detection Model of DDoS Attack for Cloud Services
Jian Zhang, Ya-Wei Zhang, Jian-Biao He, and Ou Jin
Secure Bisimulation for Interactive Systems
Guanjun Liu, and Changjun Jiang
Session T7E: 14:00-16:00, November 19 (Thursday), Room 5
Chair: Wenjuan Tang, Central South University, China Privacy Preserving for Network Coding in Smart Grid
Shiming He, Weini Zeng, and Kun Xie
Verifiable Dynamic Fuzzy Search over Encrypted Data in Cloud Computing
Xiaoyu Zhu, Qin Liu, and Guojun Wang A Secure and Fine-grained Query Results Verification Scheme for Private Search over Encrypted Cloud Data
Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, and Huigui Rong
PEM4RFID: Privacy Enhancement Model for RFID Systems
Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, and Zhiyong Feng
Improved WOW Adaptive Image Steganography Method Xin Liao, Guoyong Chen, Qi Li, and Jun Liu
CloudS: A Multi-Cloud Storage System with Multi-Level Security
Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, and Xiaoguang Liu
Session T7F: 16:15-18:15, November 19 (Thursday), Room 5
Chair: Xiangyong Liu, Central South University, China Crossing – A Highly Available Quorum Protocol for Arbitrary Planar Topologies
Robert Schadek and Oliver Theel
Fast Bridge Fault Test Generation Based on Critical Area
Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki
Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel System
Yuan Yao, Pan He, Zhihao Zheng, Chun Tan, and Yue Yuan Addressing NoC Reliability through an Efficient Fibonaccibased Crosstalk Avoidance Codec Design
Zahra Shirmohammadi, and Seyed Ghassem Miremadi
An Agent-based Framework for Simulating and Analysing Attacks on Cyber Physical Systems
Sridhar Adepu, Aditya Mathur1, Jagadeesh Gunda, and Sasa Djokic
*Thwarting Android App Repackaging by Executable Code Fragmentation Ruxia Fan, Dingyi Fang and Zhanyong Tang
Track 8: Internet of Things and Cyber-Physical-Social Computing Session T8A: 09:15-11:15, November 19 (Thursday), Room 8
Chair: Wenjie Chen, East China Normal University, China
27
NRLoc: Neighbor Relative RSS-Based Indoor Localization System
Xuefeng Sha, Kai Lin, Wenjian Wang, and Jiming Luo
Social Attributes based Cooperative Caching in Ad Hoc Networks Zhiwei Yang, Weigang Wu, and Zhenghao Zhu
Entropy-Based Social Influence Evaluation in Mobile Social Networks
Sancheng Peng1, Jian Li1, and Aimin Yang
An Energy Efficient Multi-hop Charging Scheme with Mobile Charger for Wireless Rechargeable Sensor Network
Shuo Li, Jian He, Xiaoyong Zhang, and Jun Peng Distributed Compressive Sensing Based Data Gathering in Energy Harvesting Sensor Network
Weirong Liu, Gaorong Qin, Fu Jiang, Kaiyang Liu, and Zhengfa Zhu
Feedback Mechanism Based Dynamic Fingerprint Indoor Localization Algorithm in Wireless Sensor Networks
Yu Liu, Juan Luo, Qian Yang, and Jinyu Hu
Session T8B: 14:00-16:00, November 19 (Thursday), Room 8
Chair: Pengfei Yin, Jishou University, China A GPU Based Fast Community Detection Implementation for Social Network
Guo Li, Dafang Zhang, Kun Xie, Tanlong Huang, and Yanbiao Li
An Efficient Privacy-Preserving Compressive Data Gathering Scheme in WSNs
Kun Xie, Xueping Ning, Xin Wang, Jigang Wen, Xiaoxiao Liu, Shiming He, and Daqiang Zhang
A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing Zuoting Ning, Dafang Zhang, and Kun Xie
An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery
Changming Liu, Cai Fu, Deliang Xu, Lin Sun, and Lansheng Han
MN-ALG: A Data Delivery Algorithm for Large Scale Wireless Electronic Shelf Label System
Yingzhuang Chen, Qifei Zhang, Chaofan Tu, Yuchang Zhang, Fan Bai,Yinchao Xue, and Sheng Zhang The Optimization and Improvement of MapReduce in Web Data Mining
Changqing Yin, Shichao Zhang, Shukun Liu, Shangwei Song, Guangyu Gao, and Xiyuan Zhou
Session T8C: 16:15-18:15, November 19 (Thursday), Room 8
Chair: Qin Liu, Hunan University, China An Intimacy-based Algorithm for Social Network Community Detection
Yi Zheng, Dafang Zhang, and Kun Xie A Method for Detection of Anomaly Node in IOT
Zhenguo Chen, Liqin Tian, and Chuang Lin
Track 9:Performance Modeling and Evaluation Session T9A: 10:15-12:30, November 18 (Wednesday), Room 0
Chair: Lin Gu, Huazhong University of Science and Technology, China An Efficient Algorithm for a Generalized LCS Problem
Daxin Zhu,Yingjie Wu, and Xiaodong Wang On Exploring a Quantum Particle Swarm Optimization Method for Urban Traffic Light Scheduling
Wenbin Hu, Huan Wang, Liping Yan, and Bo Du
Identifying Repeated Interleavings to Improve the Efficiency of Concurrency Bug Detection
Zhendong Wu, Kai Lu, and Xiaoping Wang
Global Reliability Evaluation for Cloud Storage Systems with Proactive Fault Tolerance Jing Li, Mingze Li, Gang Wang, Xiaoguang Liu, Zhongwei Li, and Huijun Tang
Performance Evaluation and Optimization of Wi-Fi Display on Android
Xianfeng Li, and Baobao Jin
A Novel Scheduling Algorithm for File Fetch in Transparent Computing
Kehua Guo, Yayuan Tang, and Jiacheng Gu
Session T9B: 14:00-16:00, November 18 (Wednesday), Room 0
Chair: Abbas E. Kiasari, The University of Manchester, United Kingdom Performance Evaluation of HPGMG on Tianhe-2: Early Experience
Yulong Ao, Yiqun Liu, Chao Yang, Fangfang Liu, Peng Zhang, Yutong Lu, and Yunfei Du
Joint Power and Reduced Spectral Leakage-based Resource Allocation for D2D Communications in 5G
Mithun Mukherjee, Lei Shu, Yan Zhang, Zhangbing Zhou, and Kun Wang4 Performance Analysis for Job Scheduling in Hierarchical HPC Systems: A Coloured Petri Nets Method
Zhijia Li, Li Jiao, and Xiang Hu
28
An Optimization Strategy of Energy Consumption for Data Transmission Based on Optimal Stopping Theory in Mobile
Networks
Ying Peng, Nao Wang, and Gaocai Wang Exploration of the Relationship between Just-in-Time Compilation Policy and Number of Cores
Mingkai Huang, Xianhua Liu, Tingyu Zhang, and Xu Cheng
CSAP: a Performance Predictor for Climate Simulation Applications on Intel CPUs
Ruizhe Li, Li Liu, Cheng Zhang, and Guangwen Yang
Session T9C: 16:15-18:15, November 18 (Wednesday), Room 0
Chair: Deze Zeng, China University of Geosciences, China On Routing Algorithms for the DPillar Data Centre Networks
Abbas Eslami Kiasari, Javier Navaridas, and Iain A. Stewart
MR-COF: A Genetic MapReduce Configuration Optimization Framework
Chao Liu, Deze Zeng, Hong Yao, Chengyu Hu, Xuesong Yan, and Yuanyuan Fan
Analysis of Repair Cost in Distributed Storage Systems with Fault -Tolerant Coding Strategies Yanbo Lu, Jie Hao, Xin-Ji Liu, and Shu-Tao Xia
Design Efficient In-Database Video Storage Approach by Learning from Performance Evaluation of BLOB
Hui Li, Mei Chen, Zhenyu Dai, Ming Zhu, and Menglin Huang
Skyline Query on Anti-Correlated Distributions: From the Perspective of Spatial Index
Jinchao Zhang, Dong Zhang, Bo Yu1, Bo Li, Weiping Wang, and Dan Meng PNSICC: A Novel Parallel Network Security Inspection Mechanism based on Cloud Computing
Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, and Guangwei Wang
Session T9D: 14:00-16:00, November 19 (Thursday), Room 0
Chair: Shuhong Chen, Hunan Institute of Engineering, China Simulation Platform for X-ray Computed Tomography based on Low-power Systems
Estefania Serrano, Javier Garcia Blas, Alberto Verza, and Jesus Carretero STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets
Yu-E Sun, He Huang, Miaomiao Tian, Zehao Sun, Wei Yang, Hansong Guo, and Liusheng Huang
Reality Mining with Mobile Data: Understanding the Impact of Network Structure on Propagation Dynamics
Yuanfang Chen, Noel Crespi, Lei Shu, and Gyu Myoung Lee
Reducing Journaling Overhead with Hybrid Buffer Cache Zhiyong Zhang, Lei Ju, and Zhiping Jia
A Green Scheduler for Cloud Data Centers Using Renewable Energy
Chonglin Gu, Chunyan Liu, Chen Shi, Zhixiang He, Hejiao Huang, and Xiaohua Jia
Fine-Grained Fault-Tolerant Adaptive Routing for Networks-on-Chip
Junxiu Liu, Jim Harkin, Liam Maguire, Yuhua Li, Lei Wan, and Yuling Luo
Session T9E: 16:15-18:15, November 19 (Thursday), Room 0
Chair: Entao Luo, Central South University, China On the Optimal Provider Selection for Repair in Distributed Storage System with Network Coding
Chengjin Jia, Jin Wang, Yanqin Zhu, Xin Wang, Kejie Lu, Xiumin Wang, and Zhengqing Wen
Local State Reusing for Efficient Model Checking of Multithreaded Programs
Junrui Zhou, Hong An, Yunyun Wang, and Junshi Chen Intelligent Road Congestion Prediction Employing Queueing Based Model
Lianghao Gao, Chengfang Ma, Lei Liu, Xinjing Wei
Evaluation and Analysis of Three Typical Resource Allocation Algorithms in Virtual Router Platform
Xianming Gao, Baosheng Wang, Xiaozhe Zhang, and Shicong Ma
Beyond Data Parallelism: Identifying Parallel Tasks in Sequential Programs Zhen Li, Bo Zhao, Ali Jannesari, and Felix Wolf
Fast Data-Dependence Profiling by Skipping Repeatedly Executed Memory Operations
Zhen Li, Michael Beaumont, Ali Jannesari, and Felix Wolf
Session T9F: 16:15-18:15, November 19 (Thursday), Room 4
Chair: Shaobo Zhang, Central South University, China P-index: An Efficient Searchable M etadata Indexing Scheme based on Data Provenance in Cold Storage
Jinjun Liu, Dan Feng, Yu Hua, Bin Peng, Pengfei Zuo, and Yuanyuan Sun
Performance Optimization and Evaluation of Space Management in Cloud Storage Systems
Guangping Xu, Huan Li, Qunfang Mao,Sheng Lin, and Hua Zhang
Performance Prediction for Concurrent Workloads in Distributed Database Systems
29
Hui Li, Xiaohuan Hou, Mei Chen, Zhenyu Dai, Ming Zhu, and Menglin Huang
An Energy-Aware File Relocation Strategy Based on File-Access Frequency and Correlations
Cheng Hu, and Yuhui Deng Projective Synchronization for Complex Dynamical Networks of Non-delayed and Delayed Coupling with Different
Scale Factors via Impulsive Control
Yuxiu Li, and Guoliang Cai
Elastic Database Replication in the Cloud
Xianxia Zou, Jiuhui Pan, Wei Du, and Shuhong Chen
Session T9G: 16:15-18:15, November 19 (Thursday), Room 6
Chair: Qiang Zhang, Central South University, China A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs
Subir Halder, and Amrita Ghosal
Traffic Replay in Virtual Network Based on IP-Mapping
Lun Li, Zhiyu Hao, Yongzheng Zhang, Zhenquan Ding, and Haiqiang Fei Optimizing the Overheads for Uncoordinated Proactive Checkpointing
Lei Zhu, Jianhua Gu, and Zhennao Cai
Tunneling-based Multi-Path Routing Mechanism in Packet-Switched Non-Geostationary Satellite Networks
Guyu Hu, Zhaofeng Wu, Fenglin Jin, Bowei Yang, Yu Song, and Yinjin Fu
Cost-effective Scheduling Analysis through Discrete Event Simulation for Distributed Systems Siti Fajar Jalal, Masnida Hussin, Abdullah Muhammed, and Rohaya Latip
Energy Consumption Prediction based on Time-Series Models for CPU-Intensive Activities in the Cloud
Juan Li, Xiao Liu, Zhou Zhao, and Jin Liu
HYPAD: Hyper-Graph-Driven Approach for Parallel Data Warehouse Design
Ahcene Boukorca, Ladjel Bellatreche, and Soumia Benkrid
Session T9H: 16:15-18:15, November 19 (Thursday), Room 7
Chair: Gaocai Wang, Guangxi University, China Efficient Space Management and Wear Leveling for PCM -Based Storage Systems
Zhangling Wu, Peiquan Jin, and Lihua Yue
An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution
Fatimah Adamu-Fika, and Arshad Jhumka An Efficient Dynamic Programming Algorithm for SEQ-IC-SEQ-EC-LCS Problem
Daxin Zhu, Lei Wang,Yingjie Wu, and Xiaodong Wang
A Hybrid QoS Evaluation Tool Based on the Cloud Computing Platform
Yanjun Shu, Yan Zhao, Hongwei Liu, Decheng Zuo, and Xiaozong Yang
*Data or Index: A Trade-Off in Mobile Delay Tolerant Networks Hong Yao, Han Zhang, Jie Wu, Huanyang Zheng, Changkai Zhang and Deze Zeng
*Evaluation and Comparison of Ten Data Race Detection Techniques
Zhen Yu, Zhen Yang, Xiaohong Su and Peijun Ma
*An Energy-Aware Cooperative Content Distributed Strategy Based on MST in Mobile Environment
Nao Wang, Tianxiao Xie and Gaocai Wang
30
B. SESSIONS AND PAPERS IN TrustData 2015
The 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)
Session TrustData-A: 11:30-12:30, November 19 (Thursday), Room 0
Chair: Qin Liu, Hunan University, China An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network
Zheng Ma, Jin Zheng, Weijia Jia, and Guojun Wang
Nth-order Multifunction Filter Employing Current Differencing Transconductance Amplifiers
Meili Cao, Haizhen He, Rongming Luo, and Lei Wen
An Improved Method for Reversible Data Hiding in Encrypted Image
Yuling Liu, and Zuhong Liu
Session TrustData-B: 10:30-12:30, November 20 (Friday), Room 0
Chair: Qin Liu, Hunan University, China Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks
Hongyun Xu, Jun Yang, Yong Zhang, Mengzhen Xu, and Jiayi Gan
A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups
Peixin Chen, Xiaofeng Wang, and Jinshu Su
STRATUS: Towards Returning Data Control to Cloud Users
Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie,
Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, and Geoffrey Holmes
VSEP: A Distributed Algorithm for Graph Edge Partitioning
Yu Zhang, Yanbing Liu, Jing Yu, Ping Liu, and Li Guo
Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture
Qun Liao, Shuangshuang Jiang, Qiaoxiang Hei, Tao Li, and Yulu Yang
An Output-oriented Approach of Test Data Generation Based on Genetic Algorithm
Weixiang Zhang, Bo Wei, and Huisen Du
C. SESSIONS AND PAPERS IN TSP 2015
The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP
2015)
Session TSP-A: 11:30-12:30, November 19 (Thursday), Room 3
Chair: Wenjun Jiang, Hunan University, China An Efficient Pre-filter to Accelerate Regular Expression Matching
Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, and Jinshu Su
A Hybrid Optimization Approach for Anonymizing Transactional Data Li-e Wang, and Xianxian Li
Program Obfuscator for Privacy-carrying Unidirectional One-hop Re-encryption
Mingwu Zhang, Biwen Chen, and Hua Shen
Session TSP-B: 11:30-12:30, November 19 (Thursday), Room 4
31
Chair: Binji Mo, Central South University, China Predicting Severity of Software Vulnerability Based on Grey System Theory
Jinkun Geng, Daren Ye, and Ping Luo
Characterization of Android Applications with Root Exploit by Using Static Feature Analysis Huikang Hao, Zhoujun Li, Yueying He, and Jinxin Ma
LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in
Proximity
Yufeng Wang, Xiaohong Chen, Qun Jin, and Jianhua Ma
Session TSP-C: 11:30-12:30, November 19 (Thursday), Room 5
Chair: Lei Jia, Central South University, China Context-aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration
Luyan Nie, Chuanzhi Xie, Yujun Yin, and Xin Li
Continuous User Identity Verification for Trusted Operators in Control Rooms
Enrico Schiavone, Andrea Ceccarelli, and Andrea Bondavalli
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model Leyou Zhang, Zhuanning Wang, and Qing Wu
Session TSP-D: 10:30-12:30, November 20 (Friday), Room 3
Chair: Subir Halder, B. C. Roy Engineering College, Durgapur, India Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical
Machines
Qingxin Xia, Yuqing Lan, and Limin Xiao Towards Mechanised Semantics of HPC: the BSP with Subgroup Synchronisation Case
Jean Fortin, and Frederic Gava
Cloud Computing Threats and Provider Security Assessment
Huiming Yu, Ken Williams, and Xiaohong Yuan
Collaborative Multiparty Association Rules Mining with Threshold Homomorphic Encryption Marcin Gorawski, Zacheusz Siedlecki, and Anna Gorawska
An Illegal Indirect Access Prevention Method in Transparent Computing System
Wenjuan Tang, Yang Xu, Guojun Wang, and Yaoxue Zhang
EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks
Hongling Xiao, Hong Song, and Weiping Wang
D. SESSIONS AND PAPERS IN NOPE 2015
The 3rd International Workshop on Network Optimization and Performance Evaluation (NOPE
2015)
Session NOPE-A: 11:30-12:30, November 19 (Thursday), Room 6
Chair: Gaocai Wang, Guangxi University, China Energy Saving Mechanism Analysis Based on Dynamic Resource Scaling for Cloud Computing
Xiaojie Zhang, Nao Wang, Xin Zheng, Caocai Wang, and Dongmei Bin
An Optimal Rate Adaptive Video Streaming Scheme to Improve QoE of Dash
Xiaolong Gong, Gaocai Wang, and Nao Wang
Community-Based Energy-Aware Routing Protocol in Mobile Social Networks
Dongmei Bin, Ying Peng, and Gaocai Wang
Session NOPE-B: 11:30-12:30, November 19 (Thursday), Room 7
Chair: Shan Peng, Central South University, China Research of CMABC Algorithm in Intrusion Detection
Ming Liu, Xiaoling Yang, Fanling Huang, and Yanming Fu
32
A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems Zheng Xu, and Buyang Cao
Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks With Selfish Sensors
Guiyun Liu, Jing Yao, Hongbin Chen, Han Zhang, and Dong Tang
Session NOPE-C: 10:30-12:30, November 20 (Friday), Room 4
Chair: Gaocai Wang, Guangxi University, China File Creation Optimization for Metadata-intensive Application in File Systems
Limin Xiao, Qiaoling Zhong, Zhisheng Hu, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang, and Zheqi Lu
A Sharing-Memory Based Ring Framework Shicong Ma, Baosheng Wang, Xianming Gao, and Xiaozhe Zhang
Streaming Computing Technology for Android Applications: Design Model & Case Study
Binji Mo, Yang Xu, and Guojun Wang
An Energy-efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network
Lifang Liu, Xiaogang Qi, Gengzhong Zheng, and Mande Xie
TDD TDD-Based Massive MIMO Systems: Overview and Development
Ronghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, and Yunxiang Jiang
E. SESSIONS AND PAPERS IN SCS 2015
The 2nd International Symposium on Sensor-Cloud Systems (SCS 2015)
Session SCS-A: 11:30-12:30, November 19 (Thursday), Room 8
Chair: Xiaofei Xing, Guangzhou University, China A Hierarchical Shared Key Algorithm in Wireless Sensor Networks
Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, and Yangjie Cao
Evaluation Model of the Cloud Systems Based on Queuing Petri Net
Yangjie Cao, Huimin Lu, Xiaodong Shi, and Pengsong Duan
MTCPP: Multi-Targets K-Coverage Preservation Protocol in Wireless Sensor Networks Liu Yang
F. SESSIONS AND PAPERS IN SPPCN 2015
The 2nd International Workshop on Security and Privacy Protection in Computer and Network
Systems (SPPCN 2015)
Session SPPCN-A: 11:30-12:30, November 19 (Thursday), Room 9
Chair: Zheng Ma, Hunan University, China Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments
Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, and Song-Jhih Chen Privacy Preserving Personalization in Probabilistic Search
Rajeswary Ravi and Greeshma N Gopal
33
A Security-Critical Task Management Method for Distributed Real-Time Systems
Yang Yu, Qi Dong, Zhipeng Luo, Hao Chen, Jun Deng, and Wei Guan
Session SPPCN-B: 16:15-18:15, November 19 (Thursday), Room 9
Chair: Xiaofei Xing, Guangzhou University, China Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme
Roshni Kadeparambil Raphel, Muhammed Ilyas H, and Janu R Panicker
Energy E cient Encryption Scheme for Network-coded Mobile Ad Hoc Networks
Deepa S Nair and Muhammed Ilyas H
A Model of Dynamic Malware Analysis Based on VMI
Chengye Li, Yangyue Xiang, and Jiangyong Shi
Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffc
Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, and Hongbo Han
Andriod Malware Network Behavior Analysis at HTTP Protocol Packet Level
Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, and Hongbo Han
G. SESSIONS AND PAPERS IN DependSys 2015
The 1st International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and
Applications (DependSys 2015)
Session DependSys-A: 10:15-12:30, November 18 (Wednesday), Room 4
Chair: Changji Wang, Yunnan University, China Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks
Changji Wang, and Jing Liu
Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks Zhen Peng, Tian Wang, Md Zakirul Alam Bhuiyan, Xiaoqiang Wu, and Guojun Wang
A Web-based Resource Management Platform for Transparent Computing
Dacheng Wang, Hong Song, Yun Xu, Wenhao Zhang, and Jianxin Wang
Architecture and Scheduling Method of Cloud Video Surveillance System based on IoT
Xia Wei, Wen-Xiang Li, Cong Ran, Chun-Chun Pi, Ya-Jie Ma, and Yu-Xia Sheng HiTrans: An FPGA-based Gateway Design and Implementation in HPC Environments
Wei Shi, Gaofeng Lv, Zhigang Sun, and Zhenghu Gong
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Jin B. Hong, Chun-Jen Chung, Dijiang Huang, and Dong Seong Kim
Session DependSys-B: 14:00-16:00, November 18 (Wednesday), Room 4
Chair: Xiangdong Li, Central South University, China Removing Key Escrow from the LW-HIBE Scheme
Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, and Ilsun You
FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific Data
Hui Li, Nengjun Qiu, Mei Chen, Hongyuan Li, Zhenyu Dai, Ming Zhu, and Menglin Huang
An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data Centers Sheng Xu, Binzhang Fu, Mingyu Chen, and Lixin Zhang
Reliability-aware Distributed Computing Scheduling Policy
Jemal Abawajy, and Mohammad Mehedi Hassan
An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage
Peixin Chen, Xiaofeng Wang, and Jinshu Su A Predictive Data Reliability Method for Wireless Sensor Network Applications
Adil Amjad Sheikh, Ahmed Lbath, Ehsan Ullah Warriach, and Emad Felemban
Session DependSys-C: 16:15-18:15, November 18 (Wednesday), Room 4
34
Chair: Bo Wang, Central South University, China A Cycle-time-analysis Model for Byzantine Fault Tolerance
Liu Chen, and Wei Zhou
Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application Adrian Johannes, Priyadarsi Nanda, and Xiangjian He
Weight-Based Batch Rekeying Scheme for Dynamic Multi-Privileged Group Communications
Wei Zhou, Yang Xu, Lijuan Yang, and Guojun Wang
Application-Assisted Dynamic Attestation for JVM -Based Cloud
Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Tie Hong, and Yiming Li New Escrow-Free Scheme for Hierarchical Identity-Based Encryption
Fang Qi, Xin Tang, and Quanyun Wei
Neural Networks in Petrol Station Objects Calibration
Marcin Gorawski, Miros law Skrzewski, Michal Gorawski, and Anna Gorawska
Session DependSys-D: 09:15-11:15, November 19 (Thursday), Room 4
Chair: Min Guo, Central South University, China A Dependable, Scalable, Distributed, Virtual Data Structure
Silvia Grampone, Witold Litwin, and Thomas Schwarz
Effect of Bias Temperature Instability on Soft Error Rate
Zhen Wang, and Jianhui Jiang
Security Modeling and Analysis of a SDN based Web Service Taehoon Eom, Jin B. Hong, Jong Sou Park, and Dong Seong Kim
Single Anchor Node based Localization in Mobile Underwater Wireless Sensor Networks
Anjana P Das, and Sabu M Thampi
A Novel Bug Report Extraction Approach
Tao Lin, Jianhua Gao, Xue Fu, and Yan Lin ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive Data
Xin Zhou, Hui Li, Xiao Zhang, Shan Wang, Yanyu Ma, Keyan Liu, Ming Zhu, and Menglin Huang
Session DependSys-E: 14:00-16:00, November 19 (Thursday), Room 4
Chair: Jian Luo, Central South University, China A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor Networks
Zhihai Wang, and Weidong Chen Unknown Bit Stream Protocol Message Discovery with Zero Knowledge
Fengli Zhang, Junjiao Zhang, and Hongchuan Zhou
Distributed Authentication in the Cloud Computing Environment
Yanzhu Liu, Zhi Li, and Yuxia Sun
Influential Nuisance Factors on a Decision of Sufficient Testing Mahnaz Malekzadeh, and Iain Bate
Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem
Jun Xu, and Yong Tang
Acceleration of CFD Engineering Software on GPU and MIC
Yang Liu, and Liang Deng Dealing with Reliable Event-based Communications by Means of Layered Multicast
Christian Esposito, Aniello Castiglione, and Francesco Palmieri
35
ICA3PP 2015 Organizing and Program Committees
General Chairs Guojun Wang, Central South Univers ity, China
Peter Mueller, IBM Zurich Research, Switzerland
Qingping Zhou, Jishou University, China
Program Chairs
Albert Zomaya, University of Sydney, Australia
Gregorio Martinez, University of Murcia, Spain
Kenli Li, Hunan University, China
Steering Chairs
Andrzej Goscinski, Deakin University, Australia
Yi Pan, Georgia State University, USA
Yang Xiang, Deakin University, Australia
Workshop Chairs Mianxiong Dong, Muroran Institute of Technology, Japan
Ryan K. L. Ko, The University of Waikato, New Zealand
Md. Zakirul Alam Bhuiyan, Central South University, China
Publicity Chairs Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Yulei Wu, The University of Exeter, UK
Christian Callegari, University of Pisa, Italy
Kuan-Ching Li, Providence University, Taiwan
James J. (Jong Hyuk) Park, SeoulTech, Korea
Publication Chairs Jin Zheng, Central South University, China
Wenjun Jiang, Hunan University, China
Finance Chairs Pin Liu, Central South University, China
Wang Yang, Central South University, China
Local Arrangement Chairs Fang Qi, Central South University, China
Qin Liu, Hunan University, China
Hongzhi Xu, Jishou University, China
Program Committee (in alphabetical order)
1. Parallel and Distributed Architectures Track
Chairs:
Stefano Giordano, Italian National Interuniversity Consortium for Telecommunications, Italy
Xiaofei Liao, Huazhong University of Science and Technology, China
Haikun Liu, Nanyang Technological University, Singapore
TPC members:
Marco Aldinucci, Universita' degli Studi di Torino, Italy
Yungang Bao, Chinese Academy of Sciences, China
Hui Chen, Auburn University, USA
36
Vladimir Getov, University of Westminster, UK
Jie Jia, Northeastern University, China
Yusen Li, Nanyang Technological University, Singapore
Zengxiang Li, Agency for Science, Technology and Research, Singapore
Xue Liu, Northeastern University, China
Yongchao Liu, Georgia Institute of Technology, USA
Salvatore Orlando, Universita Ca' Foscari Venezia, Italy
Nicola Tonellotto, ISTI-CNR, Italy
Zeke Wang, Nanyang Technological University, Singapore
Quanqing Xu, Agency for Science, Technology and Research (A*STAR), Singapore
Ramin Yahyapour, Uni Goettingen, Germany
Jidong Zhai, Tsinghua University, China
Jianlong Zhong, GraphSQL Inc, USA
Andrei Tchernykh, CICESE Research Center, Ensenada, Baja California, Mexico
2. Software Systems and Programming Track
Chairs:
Xinjun Mao, National University of Defense Technology, China
Sanaa Sharafeddine, Lebanese American University, Beirut, Lebanon
TPC members:
Surendra Byna, Lawrence Berkeley National Lab, USA
Yue-Shan Chang, National Taipei University, Taiwan
Massimo Coppola, ISTI-CNR, Italy
Marco Danelutto, University of Pisa, Italy
Jose Daniel Garcia, University Carlos III of Madrid, Spain
Peter Kilpatrick, Queen's University Belfast, UK
Soo-Kyun Kim, PaiChai University, Korea
Rajeev Raje, Indiana University-Purdue University Indianapolis, USA
Salvatore Ruggieri, University of Pisa, Italy
Subhash Saini, NASA, USA
Peter Strazdins, The Australian National University, Australia
Domenico Talia, University of Calabria, Italy
Hiroyuki Tomiyama, Ritsumeikan University, Japan
Canqun Yang, National University of Defense Technology, China
Daniel Andresen, Kansas State University, USA
Sven-Bodo Scholz, Heriot Watt University, UK
Salvatore Venticinque, Second University of Naples, Italy
3. Distributed and Network-based Computing Track
Chairs:
Casimer DeCusatis, Marist College, US
Qi Wang, University of the West of Scotland, United Kingdom
TPC members:
Justin Baijian, Purdue University, USA
Aparicio Carranza, City University of New York, USA
Tzung-Shi Chen, National University of Tainan, Taiwan
Ciprian Dobre, University Politehnica of Bucharest, Romania
Longxiang Gao, Deakin University, Australia
Ansgar Gerlicher, Stuttgart Media University, Germany
Harald Gjermundrod, University of Nicosia, Cyprus
Christos Grecos, Independent Imaging Consultant, United Kingdom
Jia Hu, Liverpool Hope University, United Kingdom
Baback Izadi, State University of New York at New Paltz, USA
Morihiro Kuga, Kumamoto University, Japan
Mikolaj Leszczuk, AGH University of Science and Technology, Poland
Paul Lu, University of Alberta, Canada
Chunbo Luo, University of the West of Scotland, United Kingdom
37
Ioannis Papapanagiotou, Purdue University, USA
Michael Hobbs, Deakin University, Australia
Cosimo Anglano, Università del Piemonte Orientale, Italy
Md. ObaidurRahman, Dhaka University of Engineering & Technology, Bangladesh
Aniello Castiglione, University of Salerno, Italy
Shuhong Chen, Hunan Institute of Engineering, China
4. Big Data and its Applications Track
Chairs:
Jose M. Alcaraz Calero, University of the West of Scotland, United Kingdom
Shui Yu, Deakin University, Australia
TPC members:
Alba Amato, Second University of Naples, Italy
Tania Cerquitelli, Politecnico di Torino, Italy
Zizhong (Jeffrey) Chen, University of California at Riverside, USA
Alfredo Cuzzocrea, University of Calabria, Italy
Saptarshi Debroy, University of Missouri-Columbia, USA
Yacine Djemaiel, Communication networks and Security, Res. Lab, Tunisia
Shadi Ibrahim, INRIA, France
Hongwei Li, UESTC, China
William Liu, Auckland University of Technology, New Zealand
Xiao Liu, East China Normal University, China
Karampelas Panagiotis, Hellenic Air Force Academy, Greece
Florin Pop, University Politehnica of Bucharest, Romania
Genoveva Vargas Solar, CNRS-LIG-LAFMIA, France
Chen Wang, CSIRO ICT Centre, Australia
Chao-Tung Yang, Tunghai University, Taiwan
Peng Zhang, Stony Brook University, USA
Ling Zhen, Southeast University, China
Roger Zimmermann, National University of Singapore, Singapore
Francesco Palmieri, University of Salerno, Italy
Rajiv Ranjan, CSIRO, Canberra, Australia
Felix Cuadrado, Queen Mary University of London, UK
Nilimesh Halder, The University of Western Australia, Australia
Kuan-Chou Lai, National Taichung University of Education, Taiwan
Jaafar GABER, UTBM, France
Eunok Paek, Hanyang University, Korea
You-ChiunWang, National Sun Yat-sen University, Taiwan
KeGu, Changsha University of Technology, China
5. Parallel and Distributed Algorithms Track
Chairs:
Dimitris A. Pados, The State University of New York at Buffalo, US
Baoliu Ye, Nanjing University, China
TPC members:
George Bosilca, University of Tennessee, USA
Massimo Cafaro, University of Salento, Italy
Stefania Colonnese, Stefania Colonnese, Universita degli Studi di Roma La Sapienza, Italy
Raphael Couturier, University of Franche Comte, France
Gregoire Danoy, University of Luxembourg, Luxembourg
Franco Frattolillo, Universita del Sannio, Italy
Che-Rung Lee, National Tsing Hua University, Taiwan
Laurent Lefevre, Inria, ENS-Lyon, University of Lyon, France
Amit Majumdar, San Diego Supercomputer Center, USA
Susumu Matsumae, Saga University, Japan
George N. Karystinos, Technical University of Crete, Greece
Dana Petcu, West University of Timisoara, Romania
38
Francoise Sailhan, CNAM, France
Uwe Tangen, Ruhr-Universitaet Bochum, Germany
Wei Xue, Tsinghua University, China
Kalyan S. Perumalla, Oak Ridge National Laboratory, USA
Morris Riedel, University of Iceland, Germany
Gianluigi Folino, ICAR-CNR, Italy
Joanna Kolodziej, Cracow University of Technology, Poland
Luc Bougé, ENS Rennes, France
Hirotaka Ono, Kyushu University, Japan
Tansel Ozyer, TOBB Economics and Technology University, Turkey
Daniel Grosu, Wayne State University, USA
Tian Wang, Huaqiao University, China
Sancheng Peng, Zhaoqing University, China
Fang Qi, Central South University, China
Zhe Tang, Central South University, China
Jin Zheng, Central South University, China
6. Applications of Parallel and Distributed Computing Track
Chairs:
Yu Chen, Binghamton University, State University of New York, US
Michal Wozniak, Wroclaw University of Technology, Poland
TPC members:
Jose Alfredo F. Costa, Universidade Federal do Rio Grande do Norte, Brasil
Robert Burduk, Wroclaw University of Technology, Poland
Boguslaw Cyganek, AGH University of Science and Technology, Poland
Paolo Gasti, New York Institute of Technology, USA
Manuel Grana, University of the Basque Country, Spain
Houcine Hassan, Univ. Politecnica de Valencia, Spain
Alvaro Herrero, Universidad de Burgos, Spain
Jin Kocsis, University of Akron, USA
Esmond Ng, Lawrence Berkeley National Lab, USA
Dragan Simic, University of Novi Sad, Serbia
Ching-Lung Su, National Yunlin University of Science and Technology, Taiwan
Tomoaki Tsumura, Nagoya Institute of Technology, Japan
Krzysztof Walkowiak, Wroclaw University if Technology, Poland
Zi-Ang (John) Zhang, Binghamton University-SUNY, USA
Yunhui Zheng, IBM Research, USA
Hsi-Ya Chang, National Center for High-performance Computing, Taiwan
Chun-Yu Lin, HTC Corp., Taiwan
Nikzad Babaii Rizvandi, The University of Sydney, Australia
7. Service Dependability and Security in Distributed and Parallel Systems Track
Chairs:
Antonio Ruiz Martinez, University of Murcia, Spain
Jun Zhang, Deakin University, Australia
TPC members:
Jorge Bernal Bernabe, University of Murcia, Spain
Roberto Di Pietro, Universita di Roma Tre, Italy
Massimo Ficco, Second University of Naples(SUN), Italy
Yonggang Huang, Beijing Institute of Technology, China
Georgios Kambourakis, University of the Aegean, Greece
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Liang Luo, Southwest University, China
Barbara Masucci, Universita di Salerno, Italy
Juan M. Marin, University of Murcia, Spain
Sabu M. Thampi, Indian Institute of Information Technology and Management - Kerala (IIITM-K), India
Fernando Pereniguez-Garcia, Catholic University of Murcia, Spain
39
Yongli Ren, RMIT University, Australia
Yu Wang, Deakin University, Australia
Sheng Wen, Deakin University, Australia
Mazdak Zamani, Universiti Teknologi Malaysia, Malaysia
Susan K. Donohue, University of Virginia, USA
Oana Boncalo, University Politehnica Timisoara, Romania
KP Lam, University of Keele, UK
George Loukas, University of Greenwich, UK
Ugo Fiore, Federico II University, Italy
Christian Esposito, The UNiversity of Salerno, Italy
Arcangelo Castiglione, University of Salerno, Italy
Edward Jung, Kennesaw State University, USA
Md. ZakirulAlamBhuiyan, Central South University, China
Xiaofei Xing, Guangzhou Univers ity, China
Qin Liu, Hunan University, China
Wenjun Jiang, Hunan University, China
Gaocai Wang, Guangxi University, China
Kaimin Wei, Jinan University, China
8. Web Services and Internet Computing Track
Chairs:
Huansheng Ning, University of Science and Technology Beijing, China
Daqiang Zhang, Tongji University, China
TPC members:
Jing Chen, National Cheng Kung University, Taiwan
Eugen Dedu, University of Franche-Comte, France
Sotirios G. Ziavras, NJIT, USA
Luis Javier Garcia Villalba, Universidad Complutense de Madrid (UCM), Spain
Jaime Lloret, Universidad Politecnica de Valencia, Spain
Wei Lu, Keene University, USA
Stefano Marrone, Second University of Naples, Italy
Alejandro Masrur, Chemnitz University of Technology, Germany
Seungmin (Charlie) Rho, Sungkyul University, Korea
Giandomenico Spezzano, ICAR-CNR, Italy
Jiafu Wan, South China University of Technology, China
Yunsheng Wang, Kettering University, USA
Martine Wedlake, IBM, USA
Chung Wei-Ho, Research Center for Information Technology Innovation in Academia Sinica, Taiwan
Xingquan (Hill) Zhu, Florida Atlantic University, USA
Nikos Dimitriou, National Center for Scientific Research "Demokritos", Greece
Choi Jaeho, CBNU, Chonju, Korea
Shi-Jinn Horng, National Taiwan University of Science & Technology, Taiwan
9. Performance Modeling and Evaluation Track
Chairs:
Deze Zeng, China University of Geosciences, China
Bofeng Zhang, Shanghai University, China
TPC members:
Ladjel Bellatreche, ENSMA, France
Xiaoju Dong, Shanghai Jiao Tong University, China
Christian Engelman, Oak Ridge National Lab, USA
Javier Garcia Blas, University Carlos III, Spain
Mauro Iacono, Second University of Naples, Italy
Zhiyang Li, Dalian Maritime University, China
Tomas Margalef, Universitat Autonoma de Barcelona, Spain
Francesco Moscato, Second University of Naples, Italy
Heng Qi, Dalian University of Technology, China
40
Bing Shi, Wuhan University of Technology, China
Magdalena Szmajduch, Cracow University of Technology, Poland
Qian Wang, Wuhan University, China
Zhibo Wang, Wuhan Univers ity, China
Weigang Wu, Sun Yat-sen University, China
David E. Singh, University Carlos III of Madrid, Spain
Edmund Lai, Massey University, New Zealand
Robert J. Latham, Argonne National Laboratory, USA
Zafeirios Papazachos, Queen's University of Belfast, UK
Novella Bartolini, Sapienza University of Rome, Italy
Takeshi Nanri, Kyushu University, Japan
Mais Nijim, Texas A&M University - Kingsville, USA
Salvador Petit, Universitat Politècnica de València, Spain
Daisuke Takahashi, University of Tsukuba, Japan
Cathryn Peoples, Ulster University, Northern Ireland, UK
Hamid Sarbazi-Azad, Sharif University of Technology and IPM, Iran
Md. Abdur Razzaque, University of Dhaka, Bangladesh
Angelo Brayner, University of Fortaleza, Brazil
Sushil Prasad, Georgia State University, USA
Danilo Ardagna, Politecnico di Milano, Italy
Sun-Yuan Hsieh, National Cheng Kung University, Taiwan
Li Chaoliang, Hunan University of Commerce, China
YongmingXie, Hunan Normal University, China
Guojun Wang, Central South University, China
Secretariats Zhe Tang, Central South University, China
Feng Wang, Central South University, China
Webmaster Xiangdong Lee, Central South University, China
41
TrustData 2015 Organizing and Program Committees
Steering Co-Chairs Guojun Wang, Central South University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
General Chairs Qin Liu, Hunan University, China
Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria
Program Chairs
Dr. Keqin Li, State University of New York at New Paltz, USA
Dr. Avinash Srinivasan, Temple University, USA
Publicity Chairs Shui Yu, Deakin University, Australia
Weirong Liu, Central South University, China
Program Committee (in alphabetical order) Andrei Tchernykh, CICESE Research Center, Mexico
Baoliu Ye, Nanjing University, China
Bimal Roy, Indian Statistical Institute, India
Chang-Ai Sun, University of Science and Technology, China
Chao Song, University of Electronic Science and Technology of China, China
Christian Callegari, The University of Pisa, Italy
Chunhua Su, Japan Advanced Institute of Science and Technology, Japan
Franco Chiaraluce, Polytechnical University of Marche (UVPM), Italy
Hai Jiang, Arkansas State University, United States
Horacio Gonzalez-Velez, National College of Ireland, Ireland
Imed Romdhani, Edinburgh Npier University, United Kingdom
Jianguo Yao, Shanghai Jiao Tong University, China
Joon S. Park, Syracuse University, United States
Kevin Chan, US Army Research Laboratory, United States
Lizhe Wang, Rochester Institute of Technology, United States
Masakazu Soshi, Hiroshima City University, Japan
Maurizio Atzori, University of Cagliari, Italy
Mehdi Kargahi, University of Tehran, Iran
Mingzhong Wang, Beijing Institute of Technology, China
Muneer Bani Yassein, Jordan University of Science and Technology, Jordan
Rajendra V. Boppana, UT San Antonio, USA
Robert C. H. Hsu, Chung Hua University, China
Ryan Ko, University of Waikato, New Zealand
Sherali Zeadally, University of the District of Columbia, United States
Tai-Hoon Kim, Sungshin W. University, South Korea
Toshihiro Yamauchi, Okayama University, Japan
Xin Liao, Hunan University, China
Yongdong Wu, Institute for Infocomm Research, Singapore
Young-Sik Jeong, Dongguk University, South Korea
Yu Hua, Huazhong University of Science and Technology, China
Yunsheng Wang, Kettering University, United States
Webmaster
Shan Peng, Central South University, China
42
TSP 2015 Organizing and Program Committees
Program Chairs
Imad Jawhar, United Arab Emirates University, UAE
Deqing Zou, Huazhong University of Science of Technology
Program Committee Members (In alphabetical order)
Chao Song, University of Electronic Science and Technology, China
David Zheng, Frostburg State University,USA
Feng Li, Indiana University-Purdue University Indianapolis, USA
Haitao Lang, Beijing University of Chemical Technology, China
Huan Zhou, China Three Gorges University, China
Mingjun Xiao, University of Science and Technology of China, China
Mingwu Zhang, Hubei University of Technology, China
Shuhui Yang, Purdue University Calumet, USA
Xiaojun Hei, Huazhong University of Science and Technology, China
Xin Li, Nanjing University of Aeronautics and Astronautics, China
Xuanxia Yao, University of Science and Technology Beijing, China
Yaxiong Zhao, Google Inc., USA
YingDai, LinkedIn Corporation, United States
Yunsheng Wang, Kettering University, USA
Youwen Zhu, Nanjing University of Aeronautics and Astronautics, China
Yongming Xie, Changsha Medical University, China
Steering Committee
Wenjun Jiang, Hunan University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada
Guojun Wang, Central South University, China
Minyi Guo, Shanghai Jiao Tong University, China
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Yang Xiang, Deakin University, Australia
Kun Yang, University of Essex, UK
Wanlei Zhou, Deakin University, Australia
Web Chair
Shan Peng, Central South University, China
43
NOPE 2015 Organizing and Program Committees
Steering Committee Chairs
Wei Li, Texas Southern University, USA
Taoshen Li, Guangxi University, China
Program Chair
Gaocai Wang, Guangxi University, China
Program Committee Members
Dieter Fiems, Ghent University, Belgium
Shuqiang Huang, Jinan University, China
Juan F.Perez, Imperial College London, UK
Haoqian Wang, Tsinghua University, China
Yitian Peng, Southeast University, China
Hongbin Chen, Guilin University of Electronic Technology, China
Jin Ye, Guangxi University, China
Junbin Liang, Hong Kong Polytechnic University, Hong Kong
Xianfeng Liu, Hunan Normal University, China
Hao Zhang, Central South University, China
Chuyuan Wei, Beijing University of Civil Engineering and Architecture, China
Hongyun Xu, South China University of Technology, China
Zhefu Shi, University of Missouri, USA
Songfeng Lu, Huazhong University of Science & Technology, China
Yihui Deng, Jinan University, China
Lei Zhang, Beijing University of Civil Engineering and Architecture, China
Xiaoheng Deng, Central South University, China
Mingxing Luo, Southwest Jiaotong University, China
Bin Sun, Beijing University of Posts and Telecommunications, China
Zhiwei Wang, Nanjing University of Posts and Telecommunications,China
Yousheng Zhou,Chongqing University of Posts and Telecommunications,China
Daofeng Li, Guangxi University, China
44
SCS 2015 Organizing and Program Committees
Steering Chairs
Jie Li, Tsukuba University, Japan
Dongqing Xie, Guangzhou University, China
Program Chairs
Xiaofei Xing, Guangzhou University, China
Md. Zakirul Alam Bhuiyan, Central South University, China, Temple University, USA
Program Committee Members (In alphabetical order)
Marco Aiello, University of Groningen, Netherlands
David Chadwick, University of Kent, UK
Aparicio Carranza, City University of New York, USA
Mooi Choo Chuah, Lehigh University, USA
Yueming Deng, Hunan Normal University, China
Christos Grecos, Independent Imaging Consultant, UK
Dritan Kaleshi, University of Bristol, UK
Donghyun Kim, North Carolina Central University, USA
Santosh Kumar, University of Memphis, USA
Muthoni Masinde, University of Nairobi, Kenya
Satyjayant Mishra, New Mexico State University, USA
Nam Nguyen, Towson University, USA
Jean-Marc Seigneur, University of Geneva, Switzerland
Hamid Sharif, University of Nebraska, USA
Sheng Wen, Deakin University, Australia
Publicity Chairs
Zeyu Sun, Xi'an Jiaotong University, China
Yongming Xie, Hunan Normal University, China
45
SPPCN 2015 Organizing and Program Committees
General Chair Jian Weng, Jinan University, China
Program Chairs
Mianxiong Dong, Muroran Institute of Technology, Japan
Hua Guo, Beihang University, China
Tieming Chen, Zhejiang University of Technology, China
Kaimin Wei, Jinan University, China
Program Committee (in alphabetical order) Fuchun Guo, University of Wollongong, Austrilia
Jianguang Han, Nanjing University of Finance and Economics, Nanjing, China
Debiao He, Wuhan University, China
Xinyi Huang, Fujian Normal University, China
Xuanya Li, Chinese Academy of Sciences, China
Fengyong Li, Shanghai University of Electric Power, China
Changlu Lin, Fujian Normal University, China,
Chang Xu, Beijing Institute of Technology, China
Tao Xu, University of Jinan, China
Yanjiang Yang, I2R, Singapore
Yang Tian, Beihang University, China
Shengbao Wang, Hangzhou Normal University, China
Wei Wu, Fujian Normal University, China,
Xiyong Zhang, Information Engineering University, China
Lei Zhao, Wuhan University, China
46
DependSys 2015 Organizing and Program Committees
Steering Committee Chairs
Jie Wu, Temple University, USA
Guojun Wang, Central South University, China
General Co-Chairs
Mohammed Atiquzzaman, University of Oklahoma, USA
Sheikh Iqbal Ahamed, Marquette University, USA,
Md Zakirul Alam Bhuiyan, Central South University, China, and Temple University, USA
Program Co-Chairs
Latifur Khan, The University of Texas at Dallas, USA
Joarder Kamruzzaman, Federation University and Monash University, Australia
Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia
Program Committee Members (in alphabetical order)
A. B. M Shawkat Ali, The University of Fiji, Fiji
A. B. M. Alim Al Islam, Bangladesh University of Engineering and Technology, Bangladesh
A. Sohel Ferdous, University of Western Australia, Australia
A.K.M. Najmul Islam, University of Turku, Finland
Abdul Azim Mohammad, Gyeongsang National University, South Korea
Abdur Rouf Mohammad, Dhaka University of Engineering & Technology, Bangladesh
Afrand Agah, West Chester University of Pennsylvania, USA
Andreas Pashalidis, Katholieke Universiteit Leuven - iMinds, Belgium
Asaduzzaman, Chittagong University of Engineering & Technology, Bangladesh
C. Chiu Tan, Temple University, USA
Changyu Dong, University of Strathclyde, Scotland
Dana Petcu, West University of Timisoara, Romania
Daqiang Zhang, Tongji University, China
Farzana Rahman, James Madison University, USA
Hugo Miranda, University of Lisbon, Portugal
Jaydip Sen, National Institute of Science & Technology, India
Jianfeng Yang, Wuhan University, China
Jinkyu Jeong, Sungkyunkwan University, South Korea
Kaoru Ota, Muroran Institute of Technology, Japan
Karampelas Panagiotis, Hellenic Air Force Academy, Greece
Lien-Wu Chen, Feng Chia University, Taiwan
Liu Jialin, Texas Tech University, USA
M. M. A. Hashem, Khulna University of Engineering and Technology, Bangladesh
M. Thampi Sabu, Indian Institute of Information Technology and Management, India
Mahbub Habib Sheikh, CASED/TU Darmstadt, Germany
Mahmuda Naznin, Bangladesh University of Engineering and Technology, Bangladesh
Mamoun Alazab, Australian National University, Australia
Manuel Mazzara, Innopolis University, Russia
Md. Abdur Razzaque, University of Dhaka, Bangladesh
Md. Arafatur Rahman, University Malaysia Pahang, Malaysia
Mohammad Asad Rehman Chaudhry, University of Toronto, Canada
Md. Obaidur Rahman, Dhaka University of Engineering & Technology, Bangladesh
Md. Rafiul Hassan, King Fahd University of Petroleum and Minerals, Saudi Arabia
Md. Saiful Azad, American International University, Bangladesh
Mehran Asadi, Lincoln University of Pennsylvania, USA
Mohamad Badra, Zayed University, UAE
47
Mohamed Guerroumi, University of Sciences and Technology Houari Boumediene, Algeria
Mohammad Asadul Hoque, East Tennessee State University, USA
Mohammad Mehedi Hassan, King Saud University, KSA
Mohammad Shahriar Rahman, University of Asia Pacific, Bangladesh
Mohammed Shamsul Alam, International Islamic University Chittagong, Bangladesh
Morshed Chowdhury, Deakin University, Australia
Muhammad Mostafa Monowar, King AbdulAziz University, Saudi Arabia
N. Musau Felix, Kenyatta University, Kenya
Phan Cong, Vinh Nguyen Tat Thanh University, Vietnam
Qin Liu, Hunan University, China
Ragib Hasan, University of Alabama at Birmingham, USA
Raza Hasan, Middle East College, Oman
Reaz Ahmed, University of Waterloo, Canada
Risat Mahmud Pathan, Chalmers University of Technology, Sweden
S. M. Kamruzzaman, King Saud University, KSA
Salvatore Distefano, Politecnico di Milano, Italy
Shan Lin, Stony Brook University, USA
Shao Jie Tang, University of Texas at Dallas, USA
Sheng Wen, Deakin University, Australia
Shigeng Zhang, Central South University, China
Sk Md Mizanur Rahman, King Saud University, KSA
Subrota Mondal Hong Kong University of Science and Technology, Hong Kong
Syed Imran Ali, Middle East College, Oman
Tanveer Ahsan, International Islamic University Chittagong, Bangladesh
Tanzima Hashem, Bangladesh University of Engineering and Technology, Bangladesh
Tao li, The Hong Kong Polytechnic University, Hong Kong
Tarem Ahmed, BRAC University, Bangladesh
Tian Wang, Huaqiao University, China
Tzung-Shi Chen, National University of Tainan, Taiwan
Vaskar Raychoudhury, Indian Institute of Technology Roorkee, India
Wahid Khan, University of Saskatchewan, Canada
Weigang Li, University of Brasilia, Brazil
Weigang Wu, Sun Yat-sen University, China
William Liu, Auckland University of Technology, New Zealand
Xiaofei Xing, Guangzhou University, China
Xuefeng Liu, The Hong Kong Polytechnic University, Hong Kong
Xuyun Zhang, University of Melbourne, Australia
Yacine Djemaiel, Communication networks and Security, Res. Lab, Tunisia
Yifan Zhang, Binghamton University, USA
Yu Wang, Deakin University, Australia
Publication Co-Chairs
Jin Zheng, Central South University, China
Wenjun Jiang, Hunan University, China
Local Arrangement Co-Chairs
Fang Qi, Central South University, China
Qin Liu, Hunan University, China
Hongzhi Xu, Jishou University, China
Finance Co-Chairs
Pin Liu, Central South University, China
Wang Yang, Central South University, China
Web Chair Min Guo, Central South University, China
48
Introduction to School of Information Science and Engineering of Central
South University
School of Information Science and Engineering (SISE) of Central South University was merged in June
2002 from School of Information Science and Engineering of the former Central South University of
Technology, School of Information Engineering of the former Changsha Railway University, and
Computer Center of the former Hunan Medical University.
Mr. Wang Yijun is the SISE Branch Party Secretary of the CSU Committee, and Mr. Zou Beiji is the Dean
of the School. At present, the School has around 300 staff and 4000 full-time undergraduate students and
2000 graduate students. The School is the largest one in terms of the total number of staff and students at
Central South University.
The disciplines and specialties of the School cover a wide range of subjects including Control Science and
Engineering, Computer Science and Technology, Electrical Engineering, Information and Communication
Engineering, Electronic Science and Technology, Systems Science, and Transportation Information
Engineering and Control. Currently, the School has 2 First-Level Disciplines and 9 Second-Level
Disciplines which have been authorized to grant doctorate degrees, as well as 2 National Key Disciplines,
3 Hunan Provincial Key Disciplines, 2 Postdoctorate Centers, and 3 Provincial Research and Development
Centers.
At present, the School stands in the front end of the privileged disciplines in the world. It is committed to
serving our society through the joint efforts of its staff and students. We are striving to build a group of
information disciplines to be recognized as a first-level training base in China and an advanced training
base in the world as well.
Quick Links:
SISE of Central South University: http://sise.csu.edu.cn/
Trusted Computing Institute of Central South University: http://trust.csu.edu.cn/
49
Introduction to School of Software and Service Outsourcing of Jishou
University
School of Software and Service Outsourcing of Jishou University is a public full-time second-class
undergraduate college in accordance with exemplary software service outsourcing college model, located
in the beautiful tourist city---Zhangjiajie. With excellent faculty, advanced practice teaching platform,
first-class learning environment for software and information technology outsourcing and other high-tech
industries, the school has created senior software quality talents with solid basic knowledge of software
engineering, excellent software development technique, skilled experienced software engineering practices,
and software engineering comprehensive quality.
The school adheres to the development idea of "emphasizing engineering education, highlighting the
application-oriented institute". It has established the talent cultivation positioning of "training the senior
software engineers within the industry, facing the country, and serving the world". Through
school-enterprise cooperation, Sino-foreign cooperation, the combination of
government-industry-study-research, the school has high academic, rich engineering experienced, stable
professional teachers, including 8 professors, 15 PhD, 35 senior software engineers, and project managers.
The school has the dominant course laboratory jointly built by central and local government, the
appropriated fund laboratory through the program of the central government supporting the development
of the local university, Hunan province training base for service outsourcing talents, joint school-enterprise
training center for software engineering, the training base for software engineering college students
designated by the Ministry of Education, and other high-level modern practice teaching platform, the
laboratory owns 1340 sets of equipment, with a total value of about RMB18 million.
Quick Link:
School of Software and Service Outsourcing of Jishou University: http://rjxy.jsu.edu.cn/
Map of Conference Venue
Zhangjiajie International Hotel, Zhangjiajie, China - A Quasi Five-Star Hotel
(张家界国际大酒店)
Address: 145 Sanjiao Ping, Zhangjiajie, Hunan, China
http://www.zjjihotel.com/
Public Transportation
(1) From Zhangjiajie Hehua Airport (also called Dayong Airport, IATA code: DYG) to Zhangjiajie International
Hotel: Take a taxi (around RMB40); or first take a bus #4 (get off at BIANMAO station), then take a bus #2 (get off
at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.
张家界荷花国际机场到张家界国际大酒店:大约 8 公里,乘坐 4 路公交车到边贸,再转乘 2 路公交车到三角
坪,再步行 600 米到酒店,或乘坐的士(约 40 元);返程类似。
(2) From Zhangjiajie Railway Station to Zhangjiajie International Hotel: Take a taxi (around RMB35-40); or take a
bus #6 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.
张家界火车站到张家界国际大酒店:大约 10 公里,乘坐 6 路公交车到三角坪,再步行 600 米到酒店,或乘
坐的士(约 35-40 元);返程类似。
ICA3PP 2015 Sponsors and Organizers
top related