+ All Categories
Home > Documents > 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen...

2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen...

Date post: 21-Feb-2021
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
14
19th International Conference on Advanced Information Outworking and ftpptications 2005 Volume 2 (INA, USW, WAMIS, and IPv6 papers) 28-30 March 2005 • Taipei, Taiwan Edited by Timothy K. Shih, Tamkang University, Taiwan Yoshitaka Shibata, Iwate Prefectural University, Japan Sponsored by IEEE Computer Society Technical Committee on Distributed Processing (TCDP) Tamkang University, Taiwan In cooperation with Asian Office of Aerospace Research and Development (AOARD) U.S. Army Asian Research Office IEEE' COMPUTER SOCIETY •IEEE Los Alamitos, California Washington Brussels Tokyo
Transcript
Page 1: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

19th International Conference onAdvanced Information Outworking and ftpptications

2005

Volume 2 (INA, USW, WAMIS, and IPv6 papers)

28-30 March 2005 • Taipei, Taiwan

Edited by

Timothy K. Shih, Tamkang University, Taiwan

Yoshitaka Shibata, Iwate Prefectural University, Japan

Sponsored by

IEEE Computer Society Technical Committee on Distributed Processing (TCDP)

Tamkang University, Taiwan

In cooperation with

Asian Office of Aerospace Research and Development (AOARD)

U.S. Army Asian Research Office

IEEE'

COMPUTERSOCIETY

•IEEELos Alamitos, California

Washington • Brussels • Tokyo

Page 2: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

ZOOS

Contents — Volume 2Message from the INA Co-Chairs xviiiINA Organizing Committee xixINA Reviewers xxiiMessage from the USW Chairs xxivUSW Organizing Committee xxvWAMIS Preface xxviiWAMIS Organizing Committee

IPv6 PrefaceIPv6 Organizing Committee xxxi

The First International Workshop onInformation Networking and Applications (INA'05)

Technical Presentation 1

Session 101: Ad Hoc and Mobile Networks

Designing Secure Wireless Mobile Ad Hoc Networks 5V. Balakrishnan and V. Varadharajan

Effect of Mobility on the Critical Transmitting Range for Connectivity in WirelessAd Hoc Networks 9

G. Zhang, J. Li, Y. Chen, and J. Liu

Cost-Efficient QoS Routing Protocol for Mobile Ad Hoc Networks 13W. Zhang, J. Li, andX. Wang

Signal Strength-Based Routing Protocol for Mobile Ad Hoc Networks 17S.-Y. Wang, J.-Y. Liu, C.C. Huang, M.-Y. Kao, and Y.-H. Li

Page 3: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Synchronous and Multiplexed Time Slots and Radio Blocks Allocation forMobile Packet Data Networks 21

C.-N. Tsai, K.-W. Ke, and H.-T. Wu

CRMA: A Novel Multiple Access Protocol for Power Efficient Wireless LAN 25H. Hong, J.-D. Li, and M. Sheng

Session 102: Multicasting and Broadcasting

An Analysis of Relationship between Video Contents and Subjective Video Qualityfor Internet Broadcasting 31

Y. Kato, A. Honda, and K. Hakozaki

Fault Tolerant Routing and Broadcasting in de Bruijn Networks , 35N. Nguyen, N. Vo, and S. Lee

A Switched Ethernet Protocol for Hard Real-Time Embedded System Applications 41A. Yiming and T. Eisaka

The Advanced International Case Study Using High Speed Internet 45K. Nakagawa and K. Okamura

Session 103: Wireless Communication

Hybrid CIP/M&M for Micro-mobility Management under the Multilayer Wireless Network 51Y.-H. Wang, H.-M. Huang, andH.-Y. Li

An Algorithm of Dynamic Resource Reservation for Multimedia Wireless Communication 55Y.-H. Wang, K.-J. Tseng, and Y. Hsieh

IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives 60T.-J. Tsai and J.-W. Chen

MCDA: An Efficient Multi-channel MAC Protocol for 802.11 Wireless LAN withDirectional Antenna 64

C.-Y. Chang, H.-C. Sun, and C.-C. Hsieh

A New Wireless Networking System for Rescue Activities in Disasters -System Overview and Evaluation of Wireless Node 68

M. Kamegawa, M. Kawamoto, T. Shigeyasu, M. Urakami, and H. Matsuno

Session 104: Image Compression and Coding Methods

A Lossless Medical Image Compression Scheme Using Modified S-tree Structure 75C.-S. Chan and C.-C. Chang

Detecting and Restoring System of Tampered Image Based on Discrete WaveletTransformation and Block Truncation Coding 79

C.-L Wang, R.-H. Hwang, T.-S. Chen, and H.-Y. Lee

A DCT-Domain System for Hiding Fractal Compressed Images 83C.-C. Chang, C.-L Chiang, andJ.-Y. Hsiao

Page 4: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

A Feature-Based Scalable Codec for Image Compression 87L-C. Kuo and S.-J. Wang

A New Look at Coding and Decoding Algorithm for SFC-OFDM System 91W. Fu and W. Kou

Low Complexity Multiple Description Coding Method for Wireless Video 95Y. Wang and C. Wu

Technical Presentation 2

Session 105: Collaborative and Web-Based Learning

Cooperative Learning and Web Applications: A Case Study 101N. Sala

An Intelligent Semantic Agent for e-Learning Message Communication 105Y.-H. Wang, W.-N. Wang, and Y.-H. Yen

WEB-Based Environment for Programming and Distance Learning 109D. Vazhenin, A. Vazhenin, and Y.-H. Wang

An Adaptive Communication System for User's Resource Environment 113K. Hashimoto and Y. Shibata

A Web-Based Remote Experiment System with Individualized Assessment of Learners 117H. Mitsui

Session 106: Security and Authentication

Efficient Secret Sharing with Access Structures in a Hierarchy 123C.-H. Lin and W. Lee

Dynamic Key Generations for Secret Sharing in Access Structures 127C.-H. Lin, W. Lee, andC.-S. Chen

Estimations on the Security Aspect of Brand's Electronic Cash Scheme 131C. Cheng, J. Yunus, and K. Seman

Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing 135C.-H. Lin andH.-H. Lin

A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures 139Y.-P. Lai and C.-C. Chang

Integration of Security Parameters in the Service Level Specification to ImproveQoS Management of Secure Distributed Multimedia Services 145

5. Duflos, V. Gay, B. Kervella, and E. Horlait

Page 5: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Technical Presentation 3

Session 107: Network Security

A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe ErrorandM Safe Error Attacks 151

C.-C. Lu, S.-Y. Tseng, and S.-K. Huang

Genetic Algorithm to Improve SVM Based Network Intrusion Detection System 155D. Kim, H.-N. Nguyen, andJ. Park

Apply Data Mining to Defense-in-Depth Network Security System 159N.-F. Huang, C.-N. Kao, H.-W. Hun, G.-Y. Jai, and C.-L. Lin

Designing an Enhanced PC Cluster System for Scalable Network Services 163Y.-H. Chang and J. Chen

Improved Genetic Algorithm to Solve Preplanned Backup Path on WDM Networks 167Y.-F. Wang and C.-H. Chen

Session 108: Mobile Agent and Ontology

Mobile Intelligent Agent Technologies to Support VoIP Seamless Mobility 177C.-H. Lin, J.-S. Yang, and K.-C. Wu

A Behavioral Model Based on Meme and Qualia for Multi-agent Social Behavior 181Y. Mizuno, S. Kato, A. Mutoh, and H. Itoh

Reliability Estimation of Mobile Agent Systems Using the Monte Carlo Approach 185M. Daoud and Q. Mahmoud

An Agent-Based Approach to Composite Mobile Web Services 189W. Zahreddine and Q. Mahmoud

A Distributed Ontology Framework in the Semantic Grid Environment 193A. Flahive, W. Rahayu, D. Taniar, and B. Apduhan

Technical Presentation 4

Session 109: Parallel Programming and Architecture

Heterogeneous Distributed Parallel Programming for Coordination in Software Development 199C.-C. Chiang

Low-Power Way-Predicting Cache Using Valid-bit Pre-decision for Parallel Architectures 203H.-C. Chen and J.-S. Chiang

An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster Environments 207C.-T. Yang, K.-W. Cheng, and K.-C. Li

On Construction of a Visualization Toolkit for MPI Parallel Programs in Cluster Environments 211K.-C. Li, H.-C. Chang, C.-T. Yang, L Sato, C.-Y. Yang, Y.-Y. Wu, M.-Y. Pel,H.-K. Liao, M.-C. Hsieh, andC.-W. Tsai

Page 6: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Implementation of Visuel MPI Parallel Program Performance Analysis Tool forCluster Environments 215

K.-C. Li, H.-C. Chang, C.-T. Yang, L-J. Chang, H.-Y. Cheng, andL-T. Lee

Dynamic Load Balance in Parallel Merge Sorting over Homogeneous Clusters 219A. De Giusti, M. Naiouf, F. Chichizola, and L. De Giusti

Technical Presentation 5

Session 110: Multimedia Transmission and Coding

A Call Admission Control Algorithm for Long-Lived and Short-Lived Streaming Media 225Y. -J. Lo and Z Tsai

Throughput Driven, Highly Available Streaming Stored Playback Video Service overa Peer-to-Peer Network 229

K. Kalapriya and S. Nandy

Scalefactor Based Bit Shift FGS Audio Coding : 235F.-C. Chen and T.-M. Chiu

A Dual Pyramid Watermarking for JPEG-2000 239Y.-C. Fan and H.-W. Tsao

Session 111: Authentication Scheme

A Remote Authentication Scheme Preserving User Anonymity 245H.-Y. Chien and C.-H. Chen

An Improved Low Computation Cost User Authentication Scheme for Mobile Communication 249C.-Y. Lee, C.-H. Lin, and C.-C. Chang

An Image Authentication Scheme Considering Privacy - A First Step towardsSurveillance Camera Authentication 253

N. Kawaguchi, S. Veda, N. Obata, H. Shigeno, and K.-l. Okada

An Efficient Multi-server Password Authenticated Key Agreement Scheme UsingSmart Cards with Access Control 257

C.-C. Chang andJ.-Y. Kuo

Authenticated Encryption Schemes with Message Linkage for Threshold Signatures 261C.-H. Huang, C.-Y. Lee, C.-H. Lin, C.-C. Chang, and K.-L. Chen

An Improved Scheme for Unilateral Asymmetric Smart Card Authentication 265L Dang, W. Kou, and Y. Xiao

Technical Presentation 6

Session 112: Web-Based Systems

A Web-Based Bookmark Tool with Ontological Approach for Knowledge Sharingof Special Interest Groups 271

D. Yang, W. Lee, and C.-Y. Tsai

Page 7: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Location-Based-Service Roaming Based on Web Services 277C.-T. WuandH.Mei

Performance Comparison of a Web Cache Simulation Framework 281L Cardenas, J. Gil, J. Domenech, J. Sahuquillo, and A. Pont

Privacy Preserving Web-Based Questionnaire 285J. Nakazato, K. Fujimoto, and H. Kikuchi

Using the ACM Technique to Refine Protein Spots in 2DGE Images 289J. Chen, T.-S. Chen, T.-H. Tsai, H.-F. Tsai, M. Hsieh, and S.-S. Tang

Session 113: Peer-to-Peer and Communication Networks

Using Peer-to-Peer Communication to Improve the Performance of DistributedComputing on the Internet 295

K. Tritrakan and V. Muangsin

Apply Incremental Classification for a P2P MOD System 299T.-C. Wang, T.-H. Chang, T.-H. Chen, and P. Wang

Support for Efficiently Processing Complex Queries over a P2P Substrate 303P. Furtado

MixCast: A New Group Communication Model in Large-Scale Network 307Y. Lin, B. Wang, and Z. Wang

An Interoperability Design Model: Lessons Learned in Computer Communication Standardization 311T. Yamakami

Periodic Contention-Free Multiple Access for Power Line Communication Networks 315Y.-J. Lin, H. Latchman, J. Liu, and R. Newman

Session 114: Performance Analysis and Optimization

Performance Issues of Grid Computing Based on Different Architecture ClusterComputing Platforms 321

H.-C. Chang, K.-C. Li, Y.-L Lin, C.-T. Yang, H.-H. Wang, and L-T. Lee

Optimizing the Access Performance and Data Freshness of Distributed CacheObjects Considering User Access Pattern 325

R. Samarasinghe, Y. Yasutake, and T. Yoshida

Improving TCP Performance during Soft Vertical Handoff 329H. Huang and J. Cai

A High-Performance Computational Resource Broker for Grid Computing Environments 333C.-T. Yang, P.-C. Shih, and K.-C. Li

Improving End-to-End Performance by Active Queue Management 337C.-F. Ku, S.-J. Chen, J.-M. Ho, andR.-I. Chang

An Efficient Dynamic Power Management Policy on Sensor Network 341R. Luo, L Tu, and O. Chen

Page 8: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Session 115: Bandwidth Allocation and Physical Layer

A DDRR-Based Scheduler to Achieve Proportional Delay Differentiation in Terabit Network 347C.-C. Wu, H.-M. Wu, C.-L. Liu, and W. Lin

An Algorithm for Discovering Physical Topology in Single Subnet IP Networks 351Y. Li, C. Pei, C. Zhu, andJ. Li

Evaluation and Analysis of the Sliding-Window Parallel Packet Switch 355C.-L Liu, W. Lin, and C.-C. Wu

3D-V0Q Switch Design and Evaluation 359D.-J. Tsaur, X.-Y. Lu, C.-C. Wu, and W. Lin

On-Demand Routing for Bluetooth Scatternets Subject to Device Mobility 363C.-H. Yang and J.-W. Ruan

Progressive Multilayer Reconfiguration for Software DSM Systems inNon-dedicated Clusters 367

J.-B. Chang, T.-Y. Liang, andC.-K. Shieh

Technical Presentation 7

Session 116: Virtual World Communication and Video Object Detection

A New Scheduling Algorithm: Jumping Virtual Clock 373L-C. Hwang, S.-Y. Wang, S. Hsu, and Y.-H. Huang

A Message Interchange Protocol Based on Routing Information Protocol in aVirtual World 377

J.-F. Chen, W.-C. Lin, H.-S. Bai, and S.-Y. Dai

Vision Based Adaptive Traffic Signal Control System Development 385L. Deng, N. Tang, D.-L Lee, C. Wang, andM. Lu

Multiple License Plate Detection for Complex Background 389C.-T. Hsieh, Y.-S. Juan, and K.-M. Hung

Session 117: Cryptographic and Security

A Technical Comparison of IPSec and SSL 395A. Alshamsi and T. Saito

An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions 399C.-H. Lin, W. Lee, and Y.-K. Ho

A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms 403L Ping and L. Yaping

Development of Security Scanner with High Portability and Usability 407M. Yoshimoto, B. Bista, and T. Takata

Delegation Depth Control in Trust-Management System 411F. Hong, X. Zhu, andS. Wang

Page 9: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Session 118: Grid and Distributed Computing

Automation of Grid Service Code Generation with AndroMDA for GT3 417S. Mizuta and R. Huang

Decision Tree Construction for Data Mining on Grid Computing Environments 421C.-T. Yang, S.-T. Tsai, and K.-C. Li

Theoretical Consideration of Adaptive Fault Tolerance Architecture for OpenDistributed Object-Oriented Computing 425

R. Lanka, K. Oda, and T. Yoshida

Distribution of Data and Remote Invocation of Programs 429T. Muldner, Z. Luo, and E. Shakshuki

Combining Applications and Databases Integration Approaches in a CommonDistributed Genomic Platform 433

P.-E. Gros, J. Herisson, N. Ferey, and R. Gherbi

A Practical Modelling Notation for Secure Distributed Computation 439Y.-J. Lee and P. Henderson

Session 119: Information Networking and Applications I

A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework 445P.-Y. Ting

A TCP-Physical Cross-Layer Congestion Control Mechanism for the MultirateWCDMA System Using Explicit Rate Change Notification 449

L-C. Wang and C.-H. Lee

Symbol Error Probability for Rectangular M-QAM OFDM Transmission overRayleigh Fading Channels 453

R. Yen and H.-Y. Liu

An Approximation Solution for the 2-Median Problem on Two-Dimensional Meshes 457S. Tse and F. Lau

Two New Approaches for Orphan Detection 461M. Jahanshahi, K. Mostafavi, M. Kordafshari, M. Gholipour, and A. Haghighat

Session 120: Information Networking and Applications II

A Parallel Tabu Search Approach Based on Genetic Crossover Operation 467Y. He, Y. Qiu, G. Liu, and K. Lei

Sparse Equation Systems in Heterogeneous Clusters of Computers 471F. Tinetti, W. Aroztegui, and A. Quijano

A Memory-Efficient Huffman Decoding Algorithm 475P.-C. Wang, Y.-R. Yang, C.-L Lee, and H.-Y. Chang

Fast Calculation Algorithm of the Undetected Errors Probability of CRC Codes 480R.-D. Lin and W.-S. Chen

Page 10: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Service-Oriented Workflow Model 484Y. Jin, Z. Wu, S. Deng, and Z. Yu

Session 121: Information Networking and Applications III

Resequencing Schemes for Selective-Repeat ARQ and Their Performance 491T. Shikama and T. Mizuno

A Method of Inverse Filter Design Based on Cepstrum Measure 495C.-Y. Gu, H.-F. Yi, K.-C. Yi, andL.-J. Jin

A New Design for Efficient t-out-n Oblivious Transfer Scheme 499H.-F. Huang and C.-C. Chang

A Tree-Structured Persistence Server for Data Management of Collaborative Applications 503C.-M. Wang, H.-M. Chen, G.-C. Lee, 5.-7". Wang, andS.-F. Hong

Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR 507C.-W. Jeon, l.-G. Kim, and J.-Y. Choi

A Hierarchical and Multi-model Based Algorithm for Lead Detection and NewsProgram Narrative Parsing 511

J.-H. Kuo, J.-B. Kuo, H.-W. Chen, and J.-L Wu

The First International Workshop onUbiquitous Smart Worlds (USW'05)

Technical Presentation 1

Session U01: Smart Molecular Networks and Ubiquitous Media

Molecular Metal Wires and Molecular Switches 519S.-M. Peng

Advanced Ubiquitous Media for Creative Cyberspace 520J.-F. Wang

Technical Presentation 2

Session U02: Smart Object and Information Processing

A Study of Information Services Based on Personal Belongings 523N. Shimizu, R. Yagiu, and M. Saito

Smart Retrieval and Sharing of Information Resources Based on Contexts ofUser-Information Relationships 529

W.-K. Wing, F. Lau, and C.-L Wang

Modeling the Query Intention with Goals 535C.-H. Lee and A. Liu

Page 11: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Human Readable Genetic Rules for Scene Boundary Detection 541M. Parmar and M. Angelides

Design Smart NNTrees Based on the /?4-Rule 547Q. Zhao

Minimizing Memory Utilization of Task Sets in SmartOSEK 552W. Chen, Z. Wu, andX. Wang

Session U03: Smart Environment and System

Reconfigurable Context-Sensitive Bio-Bridge Middleware for Smart Bio-laboratories 561W.-K. For, X. Bao, W.-S. Gan, and S.-K. Ng

A Personalized Ubiquitous Education Support Environment by Comparing LearningInstructional Requirement with Learner's Behavior 567

Z. Cheng, S. Sun, M. Kansen, T. Huang, and A. He

Smart Hyperspaces and Project Ubikids 574J. Ma, B. Apduhan, and L. Yang

The Non-specific Intelligent Guided-View System Based on RFID Technology 580H.-P. Chao

Pseudo-surface Based Network Camera Smart Control 586A. He, Z. Cheng, T. Huang, and Y. Zhao

Adaptive Policy Trigger Mechanism for OBSS 591D. Feng, L. Zeng, F. Wang, L Qin, and Q. Liu

Technical Presentation 3

Session U04: Smart Networking and Protocol

Sensor Inter-vehicle Communication for Safer Highways 599M. Durresi, A. Durresi, and L. Barolli

An Architecture of Network Imprinting for Personal but Wide Area Applications 605T. Yokoyama, K. lida, and S. Yamaguchi

Identity Location Decoupling in Pervasive Computing Networks 6105. Herborn, R. Boreli, and A. Seneviratne

Improvement to the Anticollision Protocol Specification for 900MHz Class 0Radio Frequency Identification Tag 616

M. Nanjundaiah and V. Chaudhary

Grouping Proof for RFID Tags 621J. Saito and K. Sakurai

A Scalable Group Communication Protocol with Global Clock 625S. Kawanami, T. Nishimura, T. Enokido, and M. Takizawa

Page 12: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Session U05: Smart Service Sociality and Privacy

Using Privacy Policies to Protect Privacy in UBICOMP 633G. Yee

A Framework of Social Interaction Support for Ubiquitous Learning 639G. Zhang, Q. Jin, and M. Lin

A Scheme for Testing Privacy State in Pervasive Sensor Networks 644Y. Sang and H. Shen

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for PreservingPrivacy and Authenticity in the Ubiquitous World 649

X. Huang, W. Susilo, Y. Mu, and F. Zhang

Trends and Issues for Security of Home-Network Based on Power Line Communication 655R. Nishi, H. Morioka, and K. Sakurai

Personal Firewall for Pocket PC 2003: Design & Implementation 661W. Susilo, R. Ang, C. McDonald, and J. Huang

The 2005 International Workshop onWeb and Mobile Information Systems (WAMIS'05)

Technical Presentation 4

Session W01: Web and Mobile Information Systems I

The Categorisation of Hidden Web Databases through Concept Specificity and Coverage 671Y.-L Hedley, M. Younas, and A. James

Performance Analysis Mobility Management in Heterogeneous Wireless Networks 677/. Awan, Y. Li, and D. Kouvatsos

The Design of a Secure and Pervasive Multimodal Web System 683S. Chang

Improving Query Answering in Peer-to-Peer Data Searching 689A. Al-Namiy and F. Majeed

Preserving Composition in XML Object Relational Storage 695E. Pardede, J. Rahayu, and D. Taniar

ISWIVE: An Integrated Semantic Web Interactive Visualization Environment 701l.-X. Chen, C.-L Fan, PH. Lo, L.-C. Kuo, and C.-Z. Yang

Session W02: Web and Mobile Information Systems II

Semantic Web Technologies for Context-Aware Museum Tour Guide Applications 709S.-C. Chou, W.-T. Hsieh, F. Gandon, and N. Sadeh

Page 13: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

Extending UDDI with Recommendations: An Association Analysis Approach 715A. Powles and S. Krishnaswamy

Fuzzy Matchmaking for Web Services 721K.-M. Chao, M. Younas, C.-C. Lo, and T.-H. Tan

Web-Page Adaptation Framework for PC & Mobile Device Collaboration 727H. Chua, S. Scott, Y. Choi, and P. Blanchfield

Extracting Social Knowledge in the Intelligent Conversational Channel for Agent Communication 733S. Mustapha

Agent-Mediated e-Commerce System 739E. Shakshuki and S. Abu-Draz

Session W03: Web and Mobile Information Systems III

iHITS: Extending HITS for Personal Interests Profiling 747Z Zhuang

Developing Innovative Web Information Systems through the Use of Web DataExtraction Technology 752

Y. NorAdnan, P. Goh, and W. Chan

A 2-Dimensional Evolution Model of Value-Added Mobile Internet Services 758T. Yamakami

Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems 762V. Tseng and K. Lin

Agent Frameworks inFCVW 768E. Shakshuki, I. Tomek, and O. Prabhu

An Architecture for Automated QoS Resolution in Wireless Systems 774B. Bordbar and R. Anane

The 2005 International Workshop onIPv6 Technology and Deployment (IPv6'05)

Technical Presentation 4

Session P01: IPv6 Technology and Deployment I

Deploying Secure Cryptographic Services in Multi-domain IPv6 Networks 785G. Lopez-Milldn, F. Garcia Clemente, M. Gil Perez, G. Martinez Perez,and A. Gomez Skarmeta

Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 Environment 790Y.-W. Chen and J.-M. Shih

An IPv6 Enabled Packet Engine Design for Home/SOHO Routers 796M. Liu, C.-H. Hsu, S.-H. Kuo, and H.-C. Tsai

Page 14: 2005An Efficient Dynamic Power Management Policy on Sensor Network 341 R. Luo, L Tu, and O. Chen Session 115: Bandwidth Allocation and Physical Layer A DDRR-Based Scheduler to Achieve

No Administration Protocol (NAP) for IPv6 Router Auto-Configuration 801G. Chelius, E. Fleury, and L Toutain

Global Connectivity for Mobile IPv6-Based Ad Hoc Networks 807C.-Y. Wang, C.-Y. Li, R.-H. Hwang, and Y.-S. Chen

Tunneling IPv6 through NAT with Teredo Mechanism 813S.-M. Huang, Q. Wu, and Y.-B. Lin

Development of IPv6-IPv4 Translation Mechanisms for SIP-Based VoIP Applications 819W.-E. Chen, C.-Y. Su, and J.-H. Weng

Session P02: IPv6 Technology and Deployment II

Design of an IPv6 SOHO Router Based on Embedded Linux System 827J.-M. Hsu, C.-F. Hsu, and C.-M. Huang

Design, Implementation and Evaluation of Routing Protocols for IPv6 Anycast Communication 833S. Doi, S. Ata, H. Kitamura, and M. Murata

Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM 8395. Matsunaga, S. Ata, H. Kitamura, and M. Murata

The Development of Global IPv6 Products: An Exploration 845S.-F. Tseng, H.-C. Lee, T.-C. Kung, S.-L Chou, andJ.-Y. Chen

Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios 851R. Marin Lopez, G. Martinez Perez, and A. Gomez Skarmeta

A Dual (IP4/IPv6) "Durable Storage" Commercial Service 856E. Jacob, J. Jose Unzilla, V. Higuero, P. Saiz, M. Aguado, and C. Pinedo

Author Index 863


Recommended