By Topic

2006 Japan-China Joint Workshop on Frontier of Computer Science and Technology

17-18 Nov. 2006

Filter Results

Displaying Results 1 - 25 of 33
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Japan-China Joint Workshop on Frontier of Computer Science and Technology - TOC

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • AR-TCP: Actively Replicated TCP Connections for Cluster of Workstations

    Publication Year: 2006, Page(s):3 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    In this paper, we propose a novel scheme, called actively replicated TCP (AR-TCP), which transparently improves the service and data availability of cluster systems at TCP connection level. In this scheme, TCP connections are replicated and synchronized among all workstations of a cluster and can failover to healthy parts during failures. Moreover, request messages resulting in data exchange are d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SADLBoIB: Self-Adaptive Dynamic Load Balance over InfiniBand

    Publication Year: 2006, Page(s):11 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    InfiniBand, as a new industry standard of advanced interconnection architecture for high-performance computing and data-center applications, provides superior performance, QoS, and management features compared with other classic high-speed interconnections, e.g., Myrinet, GigE and etc. However, how to design and implement a load balancing strategy in an InfiniBand connected system which can make f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Low Power Virtual Machine forWireless Sensor Network Motes

    Publication Year: 2006, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    Virtual Machines (VMs) have been proposed as an efficient programming model for Wireless Sensor Network (WSN) devices. However, the processing overhead required for VM execution has a significant impact on the power consumption and battery lifetime of these devices. This paper analyses the sources of power consumption in the Mate VM for WSNs. The paper proposes a generalised processor architecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Modeling the Restoration Probability of Active Restoration-Based Optical Networks with Correlation Among Backup Routes

    Publication Year: 2006, Page(s):23 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Active restoration (AR) is a novel lightpath restoration scheme proposed to guarantee a certain degree of survivability in WDM optical networks with a reasonable tradeoff between capacity requirement and restoration time. An analytical model has been proposed to analyze the restoration probability behavior of a connection request in optical networks employing AR based on the assumption that all th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I/O Scheduling in Huge Object-based Storage System

    Publication Year: 2006, Page(s):39 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4415 KB) | HTML iconHTML

    Huge object-based storage system (HOSS), using objects which possess their own attributes and methods as storage interface, absorbs the advantages of both blocks and files interface. HOSS adopts the interaction among clients, metadata servers and object-based storage device, which has decreased the overload of servers in large measure. After the interactions' flows concerned with I/O operations am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage Active Service: Model, Method and Practice

    Publication Year: 2006, Page(s):46 - 53
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    For storage system, data service only passively responds to data consumer's requests. With the increasing requirements of mass data storage and the development of the hardware technology of computer architecture, storage active service becomes a crucial research topic. How to utilize the computation power on the future storage device to provide high performance computation and data access has been... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Stream Splicing for Web Proxy Cache Optimization

    Publication Year: 2006, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Redundant data copies in Web proxy cache applications result in poor performance. This paper analyzes the data stream movement of Squid, which is a widely used web proxy cache program. Data stream splicing optimization to Squid includes three models: splicing client and server socket, splicing local file cache and client socket, splicing server socket and local file cache. All these splicing opera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SRC-based Cache Coherence Protocol in Chip Multiprocessor

    Publication Year: 2006, Page(s):60 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    How to improve the scalability of snooping protocol and reduce the memory access latency of directory-based protocol are critical problems for performance optimization of multiprocessor systems. In this paper, we present an SRC (sharing relation cache)-based protocol for chip multiprocessor architecture, in which protocol SRC is used to cache recently appeared sharing relations in case reuse in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New VPN Solution Based on Asymmetrical SSL Tunnels

    Publication Year: 2006, Page(s):71 - 78
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    Conventional SSL tunnel of SSL-based virtual private network is symmetric, in which the data must be encrypted at one end and decrypted at the other end, or contrariwise for the reverse direction. Because all data flows of VPN are relayed by VPN server via SSL tunnels, those symmetric SSL tunnels cause a lot of computational load concentrated in VPN server, and make it the bottleneck of VPN. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Based Immunization Against Computer Virus

    Publication Year: 2006, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    Different from immunization strategy of single-chipped computer, this paper proposes the network-based immune system which takes the entire network as integrated one by the advantage of collaboration of the network. To grasp the main factors that effect the virus' spreading, the paper first constructs a discrete model for the virus. Based on the model, the paper presents two immune strategies: imm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis And Classification of IPSec Security Policy Conflicts

    Publication Year: 2006, Page(s):83 - 88
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    IPSec has been proposed to provide integrity, confidentiality and authentication of data communications over IP networks. However, the complex semantics of IPSec policies results in potential conflicts, such as shielding conflict, redundancy conflict and overlapping conflict, et al. The conflict should be identified and detected to avoid Internet security threat. However, there has no research on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Directed Graph-Based Authentication Protocol Model and Its Security Analysis

    Publication Year: 2006, Page(s):89 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    The formal description of authentication protocol and its security analysis is one of the important issues in the protocol analysis. In order to solve the problem in the formal description of cryptographic protocol, a method based on directed graph is presented to formally depict the authentication protocol specification. Meanwhile, a converse-searching algorithm based on directed graph is also pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Analysis and Retrieval of Sports Video

    Publication Year: 2006, Page(s):97 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    For bridging the semantic gap, specific-domain approaches are employed in our system, a fully automatic and computationally efficient framework for the indexing, browsing and retrieval of sports video is proposed. A hierarchical organizing model based-on MPEG-7 is introduced to effectively represent high-level and low-level information in sports video. The model's attributes have been instantiated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Back-Seat Driver": Spatial Sound for Vehicular Way-Finding and Situation Awareness

    Publication Year: 2006, Page(s):109 - 115
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    We are exploring IDSS (intelligent driver support systems), especially including way-finding presented via spatial audio. ("Way-finding" refers to giving a driver directions, as via car navigation ["car-nabi"] GPS/GIS systems.) We have developed a networked driving simulator as a virtual-reality based interface (control/display system) featuring integration with the c Sha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parking Simulation and Guidance in a Model Environment

    Publication Year: 2006, Page(s):116 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    This work is dedicated to a parking simulation and guidance environment based on remote controlled car models operated over digitally encoded surfaces and monitored by a computer system that provides virtual views and guidance. The tangible part of the environment consist of physical car models that can be touched, moved by hand and steered by wireless modules. A controlling computer system can re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Picture Language Translator

    Publication Year: 2006, Page(s):121 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    Picture languages are on attractive basis for communication. However, it is difficult to represent and understand accurate meaning in such languages. So, we are developing an approach where pictures with captions are allocated on positions of a 2D structure and special translators generate corresponding sentences in natural languages. These positions have pre-defined meaning and represent a multim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Concurrency Control for Mobile Real-Time Transactions in Data Broadcast Environments

    Publication Year: 2006, Page(s):131 - 138
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    In a wireless data broadcast environment, there is a limited upstream bandwidth from mobile clients to the fixed database server. Traditional concurrency protocols are unsuitable in such an asymmetric communication environment. In this paper, we introduce a concurrency control protocol which integrates optimistic concurrency control and timestamp ordering. A mobile read-only transaction is weak co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Semantic Search Model Based on Hybrid Fuzzy Description Logic

    Publication Year: 2006, Page(s):139 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    We propose an improved semantic search model through integrating inference and information retrieval (IR) based on hybrid fuzzy description logic (DL) and implement it in security domain. A type-2 fuzzy DL is described and employed in the semantic search model. The proposed model is a hybrid one which combines type-1 fuzzy DL and type-2 fuzzy DL. It cannot only search the resources according to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lowering the Barrier of Query Language Skills within Mobile and Web User Interface Environments

    Publication Year: 2006, Page(s):147 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    Many research efforts aim to provide access to database systems (through the World Wide Web). At the human end, few users have database query language skills. Most users of the Web are highly skilled at referring to tabular data. A natural inclination exists among the users for object-by-object traction to find information. Similarly, in another context, users of geographic maps tend to locate obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.