By Topic

Frontier of Computer Science and Technology, 2006. FCST '06. Japan-China Joint Workshop on

Date 17-18 Nov. 2006

Filter Results

Displaying Results 1 - 25 of 33
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology - Cover

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB)  
    Freely Available from IEEE
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology-Title

    Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology-Copyright

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology - TOC

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • AR-TCP: Actively Replicated TCP Connections for Cluster of Workstations

    Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    In this paper, we propose a novel scheme, called actively replicated TCP (AR-TCP), which transparently improves the service and data availability of cluster systems at TCP connection level. In this scheme, TCP connections are replicated and synchronized among all workstations of a cluster and can failover to healthy parts during failures. Moreover, request messages resulting in data exchange are delivered by the workstations atomically to guarantee data consistency. Read-only request messages are extracted and executed on only one of the replicas to improve the performance of simultaneous access. As an application, we build a fully replicated MySQL cluster based on our proposed scheme. The experimental results of the prototype implementation show that the cluster has small performance penalty on communication, high simultaneous read-only query performance and a small performance penalty on update operations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SADLBoIB: Self-Adaptive Dynamic Load Balance over InfiniBand

    Page(s): 11 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    InfiniBand, as a new industry standard of advanced interconnection architecture for high-performance computing and data-center applications, provides superior performance, QoS, and management features compared with other classic high-speed interconnections, e.g., Myrinet, GigE and etc. However, how to design and implement a load balancing strategy in an InfiniBand connected system which can make full use of the features of InfiniBand has not been deeply explored yet. This paper presents the self-adaptive dynamic load balance over InfiniBand (SADLBoIB), a load balancing system which efficiently utilizes RDMA-operation and one-side communication capabilities provided by InfiniBand to dramatically reduce load-balance messages overhead and improve the system reliabilities with a new self-management mechanism. Besides, the multi-level design model of SADLBoIB provides more configurability and customization than normal load-balance systems. Performance evaluation shows that compared with traditional load balancing implementation, SADLBoIB can shorten the communication times at least by half through the one-side communication provided by RDMA operation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Low Power Virtual Machine forWireless Sensor Network Motes

    Page(s): 18 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (113 KB) |  | HTML iconHTML  

    Virtual Machines (VMs) have been proposed as an efficient programming model for Wireless Sensor Network (WSN) devices. However, the processing overhead required for VM execution has a significant impact on the power consumption and battery lifetime of these devices. This paper analyses the sources of power consumption in the Mate VM for WSNs. The paper proposes a generalised processor architecture allowing for hardware acceleration of VM execution. The paper proposes a number of hardware accelerators for Mate VMexecution and assesses their effectiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Modeling the Restoration Probability of Active Restoration-Based Optical Networks with Correlation Among Backup Routes

    Page(s): 23 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    Active restoration (AR) is a novel lightpath restoration scheme proposed to guarantee a certain degree of survivability in WDM optical networks with a reasonable tradeoff between capacity requirement and restoration time. An analytical model has been proposed to analyze the restoration probability behavior of a connection request in optical networks employing AR based on the assumption that all the backup routes of the connection are independent. In a real AR-based optical network, however, the backup routes of a connection are likely to be correlated since they may share some common links along their routes. Therefore, an analytical approach was proposed to model the restoration probability of the connection by considering all the possible correlation between any two of its successive backup routes. Although the proposed approach achieves better approximation to the restoration probability, it overestimates the restoration probability of the connection when its non-successive backup routes are being correlated. However, considering all the possible correlations among backup routes is computationally intractable. In this paper, we conduct a comprehensive performance analysis for AR-based optical networks. In particular, we propose a novel analytical framework for modelling the restoration probability of a connection when the possible correlations among any three successive backup routes are fully incorporated View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I/O Scheduling in Huge Object-based Storage System

    Page(s): 39 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4415 KB) |  | HTML iconHTML  

    Huge object-based storage system (HOSS), using objects which possess their own attributes and methods as storage interface, absorbs the advantages of both blocks and files interface. HOSS adopts the interaction among clients, metadata servers and object-based storage device, which has decreased the overload of servers in large measure. After the interactions' flows concerned with I/O operations among the three components described in detail the design and implementation of parallel I/O scheduling is described and discussed. With the buffer, the results show that it enhances the whole system performance efficiently. The performance is better when it's compared with the Lustre system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage Active Service: Model, Method and Practice

    Page(s): 46 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (686 KB) |  | HTML iconHTML  

    For storage system, data service only passively responds to data consumer's requests. With the increasing requirements of mass data storage and the development of the hardware technology of computer architecture, storage active service becomes a crucial research topic. How to utilize the computation power on the future storage device to provide high performance computation and data access has been a hot and challenging task. Storage object is a fundamental unit that comprises not only data but also attributes. Storage object has been proposed in the past, but its definition should be extended. The goals of the storage active service project are to combine and distill previous work into a simple and usable model, design a storage active service mechanism as an understandable extension to object, and most importantly build a working system - a system that augments conventional structured and unstructured data management with data, attributes and trigger as an integral part of the storage object. This paper provides numerous motivating practices for storage active service and lays out preliminary plans for the forecast mechanism based on psychology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Stream Splicing for Web Proxy Cache Optimization

    Page(s): 54 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    Redundant data copies in Web proxy cache applications result in poor performance. This paper analyzes the data stream movement of Squid, which is a widely used web proxy cache program. Data stream splicing optimization to Squid includes three models: splicing client and server socket, splicing local file cache and client socket, splicing server socket and local file cache. All these splicing operations are implemented in Linux kernel module and corresponding system call interfaces are provided for applications to use. Data stream splicing not only eliminates data copies between user space and kernel space, but also eliminates the translations of user virtual address to physical address. Experiments prove that data stream splicing can reduce mean response time and data transfer overheads, and improve the throughput of proxy servers remarkably most of the time View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SRC-based Cache Coherence Protocol in Chip Multiprocessor

    Page(s): 60 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    How to improve the scalability of snooping protocol and reduce the memory access latency of directory-based protocol are critical problems for performance optimization of multiprocessor systems. In this paper, we present an SRC (sharing relation cache)-based protocol for chip multiprocessor architecture, in which protocol SRC is used to cache recently appeared sharing relations in case reuse in the near future. A two-phase write scheme is introduced to allow SRC-based protocol applicable not only in in-order network but also out-order network topology. By making full use of the temporal locality of sharing relations among processors, SRC-based protocol can heavily reduce the message traffic in CMP cache coherence protocols compared with snooping protocol. At the same time, SRC-based protocol has better memory access latency than directory-based protocol View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New VPN Solution Based on Asymmetrical SSL Tunnels

    Page(s): 71 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (431 KB) |  | HTML iconHTML  

    Conventional SSL tunnel of SSL-based virtual private network is symmetric, in which the data must be encrypted at one end and decrypted at the other end, or contrariwise for the reverse direction. Because all data flows of VPN are relayed by VPN server via SSL tunnels, those symmetric SSL tunnels cause a lot of computational load concentrated in VPN server, and make it the bottleneck of VPN. This paper proposes a cheap solution to eliminate that bottleneck for larger scale SSL VPNs: The VPN based on asymmetric SSL tunnels (AST). It is coupled with two algorithms: IP packet engrafting and UDP diffusing. In this solution, portion of computational load is distributed to disengaged internal application servers. Experiment shows that the overall throughput of VPN can be greatly improved by adopting AST solution View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Based Immunization Against Computer Virus

    Page(s): 79 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    Different from immunization strategy of single-chipped computer, this paper proposes the network-based immune system which takes the entire network as integrated one by the advantage of collaboration of the network. To grasp the main factors that effect the virus' spreading, the paper first constructs a discrete model for the virus. Based on the model, the paper presents two immune strategies: immune on the nodes with larger degree and immune around the infected nodes. Also different from the other papers about the immunization, this paper presents not only the immune strategies, but also theoretical analysis. Just by those theoretical analysis, the paper proposes algorithms for source tracing immunization and successive immunization which can assure to clean all the virus in a subnet. The paper also carried on simulation tests for the immune strategies which confirm our algorithms and also get some useful conclusions for the real immune activities View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis And Classification of IPSec Security Policy Conflicts

    Page(s): 83 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    IPSec has been proposed to provide integrity, confidentiality and authentication of data communications over IP networks. However, the complex semantics of IPSec policies results in potential conflicts, such as shielding conflict, redundancy conflict and overlapping conflict, et al. The conflict should be identified and detected to avoid Internet security threat. However, there has no research on identifying and defining IPSec security policy conflict formally and comprehensively. So it is necessary to give a depth analysis on policy conflict. Therefore, the paper presents a generic model that represents IPSec security policy semantics. Based on it, we classify and define conflicts formally that may exist in a single IPSec device or in some tunnels between different IPSec devices. That the conflict analysis is comprehensive is proved also. The research provides theoretical foundation for policy conflict detection and prevention in IPSec policy configuration View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Directed Graph-Based Authentication Protocol Model and Its Security Analysis

    Page(s): 89 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB) |  | HTML iconHTML  

    The formal description of authentication protocol and its security analysis is one of the important issues in the protocol analysis. In order to solve the problem in the formal description of cryptographic protocol, a method based on directed graph is presented to formally depict the authentication protocol specification. Meanwhile, a converse-searching algorithm based on directed graph is also presented to construct the protocol messages. When this method is used to analyze WOO-LAM authentication, a new flow and its attacking trace have been founded View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Analysis and Retrieval of Sports Video

    Page(s): 97 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (786 KB) |  | HTML iconHTML  

    For bridging the semantic gap, specific-domain approaches are employed in our system, a fully automatic and computationally efficient framework for the indexing, browsing and retrieval of sports video is proposed. A hierarchical organizing model based-on MPEG-7 is introduced to effectively represent high-level and low-level information in sports video. The model's attributes have been instantiated through a series of multi-modal processing approaches for soccer video. To effectively retrieve highlight clip of sport video, adaptive abstraction is designed based on the excitement time curve, and an XML-based query scheme for semantic search and retrieval is proposed based on the hierarchical model. We develop a robust detection algorithm to automatically locate the field region of sports video based on low-level color features. An effective mid-level shot classification algorithm is proposed based on spatial features and the coarseness of human figures. For retrieval, XQuery, a XML query language, is employed in the proposed querying framework. The proposed framework employs visual, audio, and cinematic features, and can be scalable to different preferences and requirements. Its efficiency, effectiveness, and the robustness of the proposed framework are demonstrated over our extensive experiments View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Back-Seat Driver": Spatial Sound for Vehicular Way-Finding and Situation Awareness

    Page(s): 109 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    We are exploring IDSS (intelligent driver support systems), especially including way-finding presented via spatial audio. ("Way-finding" refers to giving a driver directions, as via car navigation ["car-nabi"] GPS/GIS systems.) We have developed a networked driving simulator as a virtual-reality based interface (control/display system) featuring integration with the c Shai re rotary motion platform for azimuth-display, stereographic display for 3D graphics, and spatial audio (sound spatialization) way-finding cues. A design for a guidance system coupled with a GPS system is described, using dynamically selected HRTFs (head-related transfer functions) to directionalize arbitrary audio signals. The system is intended to provide a capability for way-finding as an audio compass or homing beacon. "Back-seat driver" is a slang expression for a passenger (often stereotypically a mother-in-law) who offers driving advice while en route. Besides this colloquialism, we also interpret the phrase literally: we have developed a double-driver (long ladder) fire-truck simulation with a "tiller" (rear steering), which can be driven via an integrated pair of our driving simulator stations. We have incorporated navigation cues into the emergency vehicle simulator, and are are working to deploy such a system in a real vehicle View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parking Simulation and Guidance in a Model Environment

    Page(s): 116 - 120
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (600 KB) |  | HTML iconHTML  

    This work is dedicated to a parking simulation and guidance environment based on remote controlled car models operated over digitally encoded surfaces and monitored by a computer system that provides virtual views and guidance. The tangible part of the environment consist of physical car models that can be touched, moved by hand and steered by wireless modules. A controlling computer system can remotely sense model car positions and orientations through the Cluster Pattern Interface (CLUSPIreg), embedded into the flooring of the model environment. Based on that the controlling computer maintains a virtual reality representation of the model environment and uses it for producing additional views and for providing guidance to users. The tangible parking simulation and guidance model environment has the potential to augment traditional classroom learning and to bridge the gap between driving theory and practice. Potential application areas could be driving schools, events for increasing driving safety awareness and others View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Picture Language Translator

    Page(s): 121 - 130
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (559 KB) |  | HTML iconHTML  

    Picture languages are on attractive basis for communication. However, it is difficult to represent and understand accurate meaning in such languages. So, we are developing an approach where pictures with captions are allocated on positions of a 2D structure and special translators generate corresponding sentences in natural languages. These positions have pre-defined meaning and represent a multimedia hieroglyph. The hieroglyph is a complex picture (a multimedia sentence) including more simple pictures (multimedia words). In this approach the "hieroglyphic writing" is reduced to selecting appropriate multimedia words through special interface panels without necessity to use keyboards. As a result, the users can send and receive multimedia messages, though they have never used a computer before. In this paper, methods and implementation techniques for translating multimedia hieroglyphs into English are explained View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Concurrency Control for Mobile Real-Time Transactions in Data Broadcast Environments

    Page(s): 131 - 138
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    In a wireless data broadcast environment, there is a limited upstream bandwidth from mobile clients to the fixed database server. Traditional concurrency protocols are unsuitable in such an asymmetric communication environment. In this paper, we introduce a concurrency control protocol which integrates optimistic concurrency control and timestamp ordering. A mobile read-only transaction is weak consistent and the serialization graph consisting of all update transactions and a mobile read-only transaction is acyclic. By using this protocol, mobile read-only transactions can execute autonomously and mobile update transactions can detect data conflicts earlier. Extensive simulation experiments are conducted and the result shows that compared with existing concurrency control protocols, more mobile real-time transactions can commit before their deadline expire View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Semantic Search Model Based on Hybrid Fuzzy Description Logic

    Page(s): 139 - 146
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (244 KB) |  | HTML iconHTML  

    We propose an improved semantic search model through integrating inference and information retrieval (IR) based on hybrid fuzzy description logic (DL) and implement it in security domain. A type-2 fuzzy DL is described and employed in the semantic search model. The proposed model is a hybrid one which combines type-1 fuzzy DL and type-2 fuzzy DL. It cannot only search the resources according to the trust degree rules based on type-2 fuzzy DL, but also locate the exact resource using IR based on type-1 fuzzy DL. The complete model provides trust degree management to extend the search capabilities. In addition, we build a security ontology based on role-based access control (RBAC) policy. A semantic search system, Onto-SSSE, is implemented based on the basic model. The system can perform queries based on ontology reasoning. The experimental results show that the new system performs better than exiting schemes View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lowering the Barrier of Query Language Skills within Mobile and Web User Interface Environments

    Page(s): 147 - 156
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (166 KB) |  | HTML iconHTML  

    Many research efforts aim to provide access to database systems (through the World Wide Web). At the human end, few users have database query language skills. Most users of the Web are highly skilled at referring to tabular data. A natural inclination exists among the users for object-by-object traction to find information. Similarly, in another context, users of geographic maps tend to locate objects and path by following an item-wise (a step-wise) approach. We propose a similar approach for web information systems users. The proposed interface introduces simplicity and avoids communication ambiguities. It provides an interface between the user and the SQL query language. We compare the proposed approach with alternative approaches. The study presents an example case for a high level interface for Web information systems users View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.