2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology

27-28 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 40
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vii
    Request permission for reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Message from Workshop Chairs

    Publication Year: 2008, Page(s): viii
    Request permission for reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization Committee

    Publication Year: 2008, Page(s): ix
    Request permission for reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks

    Publication Year: 2008, Page(s):3 - 9
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    Nowadays, security is considered as one of the most critical parameter for the acceptance of any wireless networking technology. Nevertheless, security in wireless mesh network (WMN) is still in its infancy as little attention has been rendered to this topic by the research community. So far the security issue in wireless mesh networking has rarely been addressed. As entire security of the network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Practical Convex Hulls Protocol

    Publication Year: 2008, Page(s):10 - 16
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Secure multi-party computation has been a hot research topic of cryptograhy for about two decades, and the convex hulls problem is a special case of it. However, the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need. In this paper, we summarize and discuss the convex hulls problem, and then we prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol

    Publication Year: 2008, Page(s):17 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Convex hulls problem is a special case of privacy-preserving geometry problem in the inquiry of secure multi-party computation. In the past, only in two-dimensional space privacy-preserving convex hulls have been investigated, and there is little focus in the three-dimensional space. However, three-dimensional privacy-preserving convex hulls can be applied in many fields, such as researching and e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Spectrum Allocation MAC Protocol Based on Cognitive Radio for QoS Support

    Publication Year: 2008, Page(s):24 - 29
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    To address inefficiency of the spectrum utilization and the limited available spectrum band, cognitive radio has emerged as a significant solution. In this paper, we propose a novel MAC protocol in multi-channel wireless networks by using dynamic spectrum allocation (DSA) based on cognitive radio for QoS support. According to the user request, variable spectrum is allocated for quality of service ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy Efficient Weight-Clustering Algorithm in Wireless Sensor Networks

    Publication Year: 2008, Page(s):30 - 35
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In recent years, the wireless sensor networks (WSN) attracts increasing attention due to its bright application prospect in both military and civil fields. However, for the WSN is extremely energy limited, the traditional network routing protocols are not suitable to it. Energy conservation becomes a crucial problem in WSN routing protocol. Cluster-based routing protocols such as LEACH conserve en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking and Repairing Damaged Databases Using Before Image Table

    Publication Year: 2008, Page(s):36 - 41
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Graph Based Risk Assessment Model for Network Information System

    Publication Year: 2008, Page(s):42 - 48
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    The risk assessment for network information system has experienced a stage from rule-based questionnaire investigation to model-based assessment. Many graph-based models have been proposed and applied to risk assessment. Attack Graph is widely used one. But attack graphs grow exponentially with the size of the network. In this paper, we propose a comprehensive framework for network vulnerabilities... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Workflow Management System Model and Its Scheduling Algorithm

    Publication Year: 2008, Page(s):51 - 58
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Workflow management system model and workflow task scheduling algorithm are the critical research areas in combination of workflow and grid techniques. On the basis of active network, a distributed, scalable workflow management system model which can adapt to dynamic changes of grid resource is presented. Workflow tasks are partitioned according to the characteristic of workflow structure, and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary Testing of Unstructured Programs Using a Testability Transformation Approach

    Publication Year: 2008, Page(s):59 - 66
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Evolutionary testing is an effective technique for automatically generating good quality test data. However, under the Node-Orient criterion, the technique is hindered by the presence of unstructured control flow within loops, this is because the control dependence is effectively ignored by the fitness function. In this paper a method of testability transformation is proposed in order to circumven... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MP-Templates Operating Toolkit in Movie-Based Programming

    Publication Year: 2008, Page(s):67 - 74
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    The movie-based representation of algorithms and programs is in showing their features as a sequence of animation frames. Accordingly, any animation frame should visualize/animate a corresponding stage of a program/algorithm execution. Each movie-program frame (MP-frame) shows highlighted elements of parameterized data structures defining operations on them and reflecting algorithm logic. Each ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of General User Interface for Automatic Web Service Composition

    Publication Year: 2008, Page(s):75 - 78
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Automatic Web service composition (AWSC) was proposed to compose new services. Paik et al. (2007) proposed logical and physical Web service composition and ontologies for this. A useful composer needs a Web interface for general users. So a general user interface is designed and implemented in this thesis. This user interface generates some HTML form based on these ontology and additional HTN onto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial Data Compression Techniques for GML

    Publication Year: 2008, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    The Geography Markup Language (GML) has been introduced to standardize the representation of geographical data in Extensible Markup Language (XML), which makes the exchanging and sharing of geographical information easier. As GML becomes the geospatial language of the Web, the compression of GML files becomes a new challenge to the compression research field. That is because, GML documents tend to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy Efficient, Low Cost, Hybrid Storage System Based on Utility

    Publication Year: 2008, Page(s):87 - 95
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    To get large disk-like characteristics and offset the significant power demands of hard disk drives, we propose a fully functional hybrid archive system (called Pseudodisk) composed of an array of disks and a tape library. To get an energy conservation, low cost archive system, Pseudodisk uses data value model and utility function to guild data management. Two novel algorithms are proposed for dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy

    Publication Year: 2008, Page(s):96 - 102
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Traditional cold backup technology can not fight against data loss between two consecutive backups which usually has a time span of 24 hours. Hot backup technology, such as snapshot decreases the amount of potential data loss, but still cannot completely prevent data loss. More recently, a new technology called continuous data protection (CDP) is emerging to provide more powerful data protection. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study and Optimize the Process of Batch Small Files Replication

    Publication Year: 2008, Page(s):103 - 111
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    I/O performance is always the traditional criterion for the evaluation of storage system. Many researches have been being carried on how to improve the storage system performance, mainly focusing on the storage architecture and I/O optimization for the storage devices. In many application systems, the phenomenon of replicating batch small files between two locations widely exists and always repres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Duplicate-Aware Data Replication

    Publication Year: 2008, Page(s):112 - 117
    Cited by:  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    In this paper, we employ the data de-duplication technology to detect the duplicate data in the process of data replication. By avoiding duplicate data, data replication reduces the quantity of data transmission, and save the replication I/O bandwidth. In additional, the data consistency has been guaranteed in the same time. The work is a part of our project which is to build a wide-area disaster ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Hybrid system for Large-Scale Chinese Text Classification Problem

    Publication Year: 2008, Page(s):121 - 124
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Most of the Chinese text classification systems are all based on the technology of bag of words (BW) which is a valid probability tool for text representation and can provide a better semantic architecture. But the weakness in classification accuracy is still unconquerable. Support vector machine (SVM) has become a popular classification tool and can be applied in the scheme, but the main disadvan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Implementing an Intelligent Web Search

    Publication Year: 2008, Page(s):125 - 130
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    The retrieval efficiency of the presently used search tools cannot be significantly improved: A "bag of words" interpretation causes loosing semantics of texts. The functional approach to present English texts in the memory of computers makes it possible to keep semantic relations between words. These relations can be taken into account when indexing documents and when performing searching. Utiliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.