By Topic

2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2007)

Date 1-3 Nov. 2007

Filter Results

Displaying Results 1 - 25 of 30
  • 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (203 KB)
    Freely Available from IEEE
  • 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology - Table of contents

    Publication Year: 2007, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2007, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop Organization

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Designing Piecewise QoS Routing Protocol in Large-Scale MANETs

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    We design Piecewise QoS Routing (PQR) protocol in large-scale Mobile Ad-hoc NETworks (MANETs) considering bandwidth and delay constraints. We use super nodes to periodically maintain k-hops neighborhood information. The proposed protocol can quickly find a local routing path from a super node to its next super node which satisfies QoS requirements. A whole QoS routing path can thus be built and ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation to Optimize the UMP System Focusing on Network Transmission Speed

    Publication Year: 2007, Page(s):7 - 12
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    With the great progress of technologies, computers are embedded into everywhere to make our daily life convenient, efficient and comfortable. Ubiquitous society became so real for us with this fast development. However, how to integrate distributed resources existed among heterogeneous devices to build pervasive applications that can constantly adapt to the highly dynamic computing environment is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Propagation and Aggregation in Wireless Sensor Networks

    Publication Year: 2007, Page(s):13 - 20
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    In a multi-hop wireless sensor networks (WSNs), these sensor nodes cooperate each other to form a network without using any infrastructure, which has a wide application due to their easy of deployment. But the security of WSNs is still an issue. Traditionally cryptographic mechanisms such as authentication and encryption only address part of the problem of security in WSNs. Recently, the use of re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Architecture of Grid-Based Simulation Platform

    Publication Year: 2007, Page(s):21 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    This paper proposes a Grid-based Distributed Simulation Platform (GDSP). It is designed to break the limitation of legacy simulation supporting platform and to meet new requirements from large-scale, distributed, and complicated systems. Simulation services are encapsulated by using web services technology, and they are basic elements of GDSP. With grid technology, GDSP enables users to share, acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Metadata Equipotent Subtree Partition Policy for Mass Storage System

    Publication Year: 2007, Page(s):29 - 34
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Metadata plays an important role in mass storage system. How to distribute and balance the metadata of the metadata server cluster determines the overall performance of a cluster. Two popular metadata distribution policies are the dynamic subtree policy and hashing policy, while the dynamic subtree partition is vulnerable to the imbalance workload and hashing partition has a random distribution wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Prototype for Active Service System

    Publication Year: 2007, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Active services is a promising technology and notion in relieving user from burdensome search for meaningful information, which is a problem becoming more serious for the information explosion on Internet and increasingly popular usage of wireless networks terminals. This paper presents a smart prototype for active service system which has a novel index tree-trace map model centralized, wireless n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High Availability Storage System Based on Two-Level Metadata Management

    Publication Year: 2007, Page(s):41 - 48
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Generally storage devices only administrate the mapping of logical data space to local physical space while unknowing other information related to data objects. Network or metadata service failure will disable the system, although the data is still on devices intact and correct. Utilizing the redundant computing ability of storage devices, the object interface makes it possible to assist the MDS f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic Access Allocation of Disk Files for Energy-Efficient Server Systems

    Publication Year: 2007, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    Reducing energy consumption is an important issue for data centers. Among the various components of a data center, storage is one of the biggest energy consumers. Previous studies have shown that the average idle period for a server disk in a data center is very small compared to the time taken to spin down and spin up. This significantly limits the effectiveness of disk power management schemes. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study: Performance Evaluation of a DRAM-Based Solid State Disk

    Publication Year: 2007, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    The speed gap between processors and hard disk drives (HDDs) has been spreading at a faster speed than the gap between processors and main memory devices. The most adopted methods for reducing this speed gap are caching and widening the datapath (such as striping a file into multiple disks). Solid state disks (SSDs) are data storage devices that look like (ordinary) magnetic hard disk drives to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Policy Database System for Protecting Possession Sensitive Attributes in Automated Trust Negotiation

    Publication Year: 2007, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Automated trust negotiation is an iterative process that establishes trust gradually between strangers wishing to share resources or conduct business transactions, by requesting and disclosing digital credentials. Protection of sensitive information in automated trust negotiation has been drawn much attention all over the world. Recently, policy database has been proposed as a means to protect pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Security Risk Evaluation for Information Systems

    Publication Year: 2007, Page(s):67 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    Quantitative security risk evaluation of information systems is increasingly drawing more and more attention. This paper extends the attack tree model, and proposes a new quantitative risk evaluation method .While the risk value of the leaf node (atomic attack) is quantified, the multi- attribute utility theory is adopted. All algorithms are presented for each steps of this new evaluation method. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptable Scheduling Framework for Window-Based Real-Time Constraints

    Publication Year: 2007, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    This paper analyses the relationships of two types of window-based real-time constraint, the sliding and fixed window constraint. First, based on the definition of "strict harder", the paper gives out the computing system of window constraints. These analyses of the constraints are useful for designing the scheduling algorithms. Thereby, a scheduling framework that is capable of adapting to the ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research about Containment the Radial Error Propagation in Self-Servowriting in Hard Disk

    Publication Year: 2007, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    The process of self-servowriting and the problem that is critical to self-servowriting are discussed in the thesis. The errors coming from the last track can be inherited to next track when the R/W head writes servo information in self-servowriting process. This prevents servo information from being propagated to all tracks on the disk. This paper proposed a new method for error containment based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Outward-Appearance Patent-Image Retrieval Approach Based on the Contour-Description Matrix

    Publication Year: 2007, Page(s):86 - 89
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Since there are mass of images in the outward-appearance patent-image database, a retrieval approach developed for this database is greatly demanded. The shape information of the patent image is the key feature for a patent image. Therefore, we present an outward-appearance patent images retrieval approach based on contour-description matrix. This matrix represents the 2D shape feature and shows t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executing Query over Encrypted Character Strings in Databases

    Publication Year: 2007, Page(s):90 - 97
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    A query scheme which conducts fast LIKE query and range query over the encrypted character strings in databases is proposed in this paper. Firstly, a characteristics matrix is created for every character string in a sensitive attribute of a table to describe the characteristics of the character string. The characteristics matrix is also extended to describe the characteristics of a Chinese charact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High-Level Query Interface for Web User's Access to Data Resources

    Publication Year: 2007, Page(s):98 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1810 KB) | HTML iconHTML

    Most information systems depend on a database management system (DBMS) to organize information. Access to such an information system is based on use of a database query language on the part of the user. This poses user skill level problem. For example, for medical staff at a hospital, users can not spare time to learn a database query language. As a result medical staff tend to depend on specialis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User Oriented Query Interface for Web-Based Geographic Information Systems

    Publication Year: 2007, Page(s):106 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    A geographic information system is often used to find objects of users' interest. It presents the users with an interface. Typically, a user interface presents a language for communication. We propose a prototype of a high level interface based on simplified relational algebra. A prototype system has been proposed. It is based on the notion of a query-by-object (QBO) approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SDBIA: A Novel Approach to Improve the Reading Performance of Large Objects for Object-Based Storage Device

    Publication Year: 2007, Page(s):114 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Ext2 file system is optimized for the management of small files, however, the performance of managing large files is not perfect. The Object-based Storage Device of HOSS[1] (Huge Object-Based Storage System, HOSS) adopts ext2 as the underlying file system, so the performance of managing large objects is limited. Two strategies to improve the reading performance of large objects in OSDs are propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Quasi-Human Algorithm for the Strongly Heterogeneous Container Loading Problem

    Publication Year: 2007, Page(s):119 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    This paper presents a new quasi-human heuristic for the three-dimensional container loading problem. The emphasis is on strongly heterogeneous load, which generally finds lower volume utilization than homogeneous or weakly heterogeneous load. The algorithm defines a conception of caving degree to judge how close a corner-occupied packing box is to the boxes already packed in the container. In the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.