30
Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Lecture Notes in Computer Science 7861Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board

David HutchisonLancaster University, UK

Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA

Josef KittlerUniversity of Surrey, Guildford, UK

Jon M. KleinbergCornell University, Ithaca, NY, USA

Alfred KobsaUniversity of California, Irvine, CA, USA

Friedemann MatternETH Zurich, Switzerland

John C. MitchellStanford University, CA, USA

Moni NaorWeizmann Institute of Science, Rehovot, Israel

Oscar NierstraszUniversity of Bern, Switzerland

C. Pandu RanganIndian Institute of Technology, Madras, India

Bernhard SteffenTU Dortmund University, Germany

Madhu SudanMicrosoft Research, Cambridge, MA, USA

Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA

Doug TygarUniversity of California, Berkeley, CA, USA

Gerhard WeikumMax Planck Institute for Informatics, Saarbruecken, Germany

Page 2: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

James J. (Jong Hyuk) ParkHamid R. Arabnia Cheonshik KimWeisong Shi Joon-Min Gil (Eds.)

Grid andPervasive Computing8th International Conference, GPC 2013and Colocated WorkshopsSeoul, Korea, May 9-11, 2013Proceedings

13

Page 3: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Volume Editors

James J. (Jong Hyuk) ParkSeoul University of Science and Technology, Seoul, KoreaE-mail: [email protected]

Hamid R. ArabniaUniversity of Georgia, Athens, USAE-mail: [email protected]

Cheonshik KimSejong University, Seoul, KoreaE-mail: [email protected]

Weisong ShiWayne State University, Detroit, MI, USAE-mail: [email protected]

Joon-Min GilCatholic University of Daegu, Gyeongsan-si, Gyeongbuk, KoreaE-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349ISBN 978-3-642-38026-6 e-ISBN 978-3-642-38027-3DOI 10.1007/978-3-642-38027-3Springer Heidelberg Dordrecht London New York

Library of Congress Control Number: 2013936008

CR Subject Classification (1998): F.2, C.1, C.2, C.3, C.5, H.5, H.3, D.4,K.6.5, K.4, B.2, B.8, C.4

LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues

© Springer-Verlag Berlin Heidelberg 2013This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Page 4: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Preface

Welcome to the 8th International Conference on Grid and Pervasive Computing(GPC 2013), held in Seoul, Korea, during May 9–11, 2013. GPC-13 was the mostcomprehensive conference focused on the various aspects of grid and pervasivecomputing. GPC 2006, GPC 2007, GPC 2008, GPC 2009, GPC 2010, and GPC2011 took place in Taichung (Taiwan), Paris (France), Kunming (China), Geneva(Switzerland), Hualien (Taiwan), and Oulu (Finland), respectively, and GPC2012 in Hong Kong, China.

The papers included in the proceedings cover the following topics: cloud,cluster and grid computing; grid and cloud computing economy and businessmodels; security and privacy in grid, pervasive and cloud computing; embed-ded and pervasive computing; social network and services; machine to machinecommunications; service-oriented computing, mobile, peer-to-peer and pervasivecomputing. Accepted and presented papers highlight the new trends and chal-lenges of grid and pervasive computing. The presenters showed how new researchcould lead to novel and innovative applications. GPC 2013 provided an oppor-tunity for academic and industry professionals to discuss the latest issues andprogress in the area of GPC. In addition, the conference published high-qualitypapers that are closely related to the various theories and practical applicationsin GPC. Furthermore, we expect that the conference and its publications willbe a trigger for further related research and technology improvements in thisimportant subject.

For GPC 2013, we received many papers submission from more than 12 coun-tries. Out of these, after a rigorous peer-review process, we accepted 65 papers ofhigh quality for the GPC 2013 proceedings, published by Springer. All submittedpapers underwent blind reviews by at least two reviewers from the Technical Pro-gram Committee, comprising leading researchers from around the globe. Withouttheir hard work, achieving such high-quality proceedings would not have beenpossible. We take this opportunity to thank them for their great support andcooperation. We thank the organizers of the International Workshop on Ubiq-uitous and Multimedia Application Systems (UMAS 2013), the InternationalWorkshop DATICS-GPC 2013: Design, Analysis and Tools for Integrated Cir-cuits and Systems, the International Workshop on Future Science Technologiesand Application (FSTA 2013), and the Workshop on Green and Human Infor-mation Technology (GHIT 2013). The goal of the workshops was to providea forum for researchers to exchange and share new ideas, research results, and

Page 5: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

VI Preface

ongoing work on advanced topics in grid and pervasive computing. Finally, wewould like to also thank all the authors, reviewers, and Organizing CommitteeMembers.

May 2013 James J. (Jong Hyuk) ParkHong Shen

Hamid R. ArabniaCheonshik Kim

Weisong ShiHeonChang Yu

Page 6: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Organization

General Chairs

James J. (Jong Hyuk) Park SeoulTech, KoreaHong Shen University of Adelaide, AustraliaHamid R. Arabnia The University of Georgia, USA

General Vice-chairs

Martin Sang-Soo Yeo Mokwon University, KoreaYoung-Sik Jeong Wonkwang University, Korea

Program Chairs

Cheonshik Kim Sejong University, Korea (Leading Chair)Weisong Shi Wayne State University, USAHeonChang Yu Korea University, KoreaGeorge Roussos University of London, UK

Workshop Chairs

Joon-Min Gil Catholic University of Daegu, Korea(Leading Chair)

Zhiyong Xu Suffolk University, USAMohamed Gaber University of Portsmouth, UK

Publication Chair

Hwa Young Jeong Kyung Hee University, Korea

Steering Committee

Hai Jin Huazhong University of Science andTechnology, China (Chair)

Nabil Abdennadher University of Applied Sciences, SwitzerlandChristophe Cerin University of Paris XIII, FranceSajal K. Das The University of Texas at Arlington, USAJean-Luc Gaudiot University of California - Irvine, USAKuan-Ching Li Providence University, TaiwanCho-Li Wang The University of Hong Kong, ChinaChao-Tung Yang Tunghai University, Taiwan

Page 7: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

VIII Organization

Publicity Co-chairs

Jaehwa Chung Korea National Open University, KoreaZili Shao Hong Kong Polytechnic University, ChinaChun-Cheng Lin National Chiao Tung University, TaiwanJulio Sahuquillo Universidad Politecnica de Valencia, SpainAkihiro Fujiwara Kyushu Institute of Technology, JapanBong-Hwa Hong Kyung Hee Cyber University, Korea

Program Committee

Alfredo Navarra Universita degli Studi di Perugia, ItalyAndrew L. Wendelborn University of Adelaide, AustraliaBeniamino Di Martino Second University of Naples, ItalyBin Guo Institute TELECOM SudParis, FranceChao-Tung Yang Tunghai University, TaiwanChen Liu Clarkson University, USAChen Yu Huazhong University of Science and

Technology, ChinaCheng-Chin Chiang National Dong Hwa University, TaiwanChien-Min Wang Academia Sinica, TaiwanChin-Feng Lai National Ilan University, TaiwanChing-Hsien (Robert) Hsu Chung Hua University, TaiwanChristophe Cerin Universite de Paris XIII, FranceDaewon Lee Seokyeong University, KoreaDamon Shing-Min Liu National Chung Cheng University, TaiwanDan Grigoras University College Cork, IrelandDana Petcu Western University of Timisoara, RomaniaDavid De Roure University of Southampton, UKDavid H. C. Du University of Minnesota, USADavid Hung-Chang Du University of Minnesota, USADavid Laiymani I.U.T. de Belfort-Montbeliard, FranaceDer-Jiunn Deng National Changhua University of Education,

TaiwanEl-ghazali Talbi INRIA Lille - Nord Europe, FranceFahim Kawsar Bell labs, University of Lancaster, UKFevzi Belli Univ. Paderborn, GermanyFrancis C.M. Lau The University of Hong Kong, ChinaGuoying Zhao University of Oulu, FinlandHai Jiang Arkansas State University, USAHamid R. Arabnia University of Georgia, USAHedda Schmidtke Carnegie Mellon University in RwandaHong Tang Aliyun Inc.Hui-Huang Hsu Tamkang University, TaiwanHung-Chang Hsiao National Cheng Kung University, Taiwan

Page 8: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Organization IX

Hung-Chang Hsiao National Cheng Kung University, TaiwanHwamin Lee Soonchunhyang University, KoreaIncheon Paik University of Aizu, JapanInsik Shin KAIST, KoreaIoan Marius Bilasco University of Science and Technology of Lille,

FranceIoana Banicescu Mississippi State University, USAIvan Stojmenovic University of Ottawa, CanadaJan-Jan Wu Academia Sinica, TaiwanJemal Abawajy Deakin University, AustraliaJenq Kuen Lee National Tsing Hua University, TaiwanJerry Hsi-Ya Chang NCHC, TaiwanJie Tang Intel Research, Beijing, ChinaJingling Xue University of New South Wales, AustraliaJingyu Zhou Shanghai Jiaotong University, ChinaJose Fortes University of Florida - Gainesville, USAJunjie Peng Shanghai University, ChinaKaori Fujinami Tokyo University of Agriculture and

Technology, JapanKazunori Takashio Keio University, JapanKewei Sha Oklahoma City University, USAKuo-Chan Huang National Taichung University, TaiwanLuciana Arantes LIP6, FranceMarcin Paprzycki Computer Science Institute, PolandMartti Mantyla Helsinki Institute for Information Technology

HIIT, FinlandMasayoshi Ohashi ATR Media Information Science Laboratories,

JapanMeng-Yen Hsieh Providence University, TaiwanMichael Beigl University of Braunschweig, GermanyMichael Hobbs Deakin University, AustraliaMichel Koskas Amiens, FranceMing-Lu Li Shanghai Jiang Tong University, ChinaMitsuhisa Sato Tsukuba University, JapanMohamed Jemni ESSTT, TunisiaNabil Abdennadher University of Applied Sciences, SwitzerlandNiwat Thepvilojanapong Mie University, JapanNoel Crespi Institut Telecom France, FranceNong Xiao National University of Defense Technology,

ChinaOsamu Tatebe Tsukuba University, JapanPangfeng Liu National Taiwan University, TaiwanPedro Medeiros New University of Lisbon, PortugalPradip K. Srimani Clemson University, USAPutchong Uthayopas Kasetsart University, ThailandRaphael Couturier LIFC, University of Franche Comte, France

Page 9: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

X Organization

Reen-Cheng Wang National Taitung University, TaiwanRodrigo Mello University of Sao Paulo, BrazilRonald H. Perrott Queen’s University Belfast, UKRui Zhang Palo Alto Research Center, USARuppa K. Thulasiram University of Manitoba, CanadaSabah Mohammed Lakehead University, CanadaSajid Hussain Acadia University, CanadaSasu Tarkoma University of Helsinki, FinlandSatoshi Sekiguchi AIST, JapanSeungjong Park Louisiana State University, USASherali Zeadally University of the District of Columbia, USASun-Yuan Hsieh National Cheng Kung University, TaiwanTaegyu Lee Korea Institute of Industrial Technology

(KITECH), KoreaTaeweon Suh Korea University, KoreaTakuro Yonezawa Keio University, JapanTatsuo Nakajima Waseda University, JapanTing-Wei Hou National Cheng Kung University, TaiwanTomas Margalef Burrull Universitat Autonoma de Barcelona, SpainTommi Mikkonen Tampere University of Technology, FinlandTrung Q. Duong Blekinge Institute of Technology, SwedenVictor Malyshkin Russian Academy of Sciences, RussiaWang-Chien Lee Penn State University, USAWasim Raad King Fahd University of Petroleum and

Minerals, Saudi ArabiaWeijun Xiao Virginia Commonwealth University, USAWeili Han Fudan University, ChinaWeng Fai Wong National University of Singapore, SingaporeWenguang Chen Tsinghua University, ChinaWon Woo Ro Yonsei University, KoreaXiangjian He University of Technology Sydney, AustraliaXiaowu Chen Beihang University, ChinaYanmin Zhu Imperial College London, UKYeh-Ching Chung National Tsing Hua University, TaiwanYong-Kee Jun Gyeongsang National University, KoreaYuanfang Chen Dalian University of Technology, ChinaYuezhi Zhou Tsinghua University, ChinaYuhong Yan Concordia University, CanadaYulei Wu University of Bradford, UKZhifeng Yun Louisiana State University, USAZhiwen Yu Northwestern Polytechnical University, China

Page 10: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Message from the UMAS 2013 Chair

Welcome to the proceedings of the 2013 International Workshop on Ubiquitousand Multimedia Application Systems (UMAS 2013), jointly held with GPC 2013in Seoul, Korea, during May 9–11, 2013.

The fast developments in the electronics industry and the emerging conver-gence of the triple (video, voice, and data) signal services have allowed mediacommunications and computing to increase ubiquitously. Meanwhile, the em-bedded systems, i.e., computers inside products, have been widely adopted inmany domains including multimedia communications, traditional control sys-tems, medical instruments, wired and wireless communication devices, aerospaceequipment, human–computer interfaces, and sensor networks. These services cre-ate our consumer and brand environment and have been contributing extensivelyand more closely to our life experience, especially the applications in mobile andother embedded devices. With the increasing number of customers who wouldlike to own a ubiquitous multimedia service because of the convenience, the re-quirements for this kind of service from customers are increasing, such as thequality, speed, and electric consumption. Therefore, the UMAS technologies havebecome state-of-the-art research topics and are expected to have an importantrole in the future.

UMAS 2013 aimed to advance ubiquitous multimedia techniques and embed-ded software and systems research, development, and design competence, and toenhance international communication and collaboration. The workshop coverstraditional core areas of media and embedded systems in architecture, software,hardware, real-time computing, and testing and verification, as well as new ar-eas of special emphasis: pervasive/ubiquitous computing and sensor networks,HW/SW co-, wireless communications, power-aware computing, security anddata protection, and multimedia.

UMAS 2013 was supported by many people and organizations. We would alsolike to express our appreciation to the organizers of GPC 2013, especially JamesJ. Park, for their constant support and kind help in the related items of UMAS2013. Thanks to all the Program Committee members for their valuable timeand effort in reviewing the papers. Without their help and advice, this programwould not have been successful.

Ching-Nung Yang

Page 11: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

UMAS 2013 Organization

General Chair

Ching-Nung Yang National Dong Hwa University, Taiwan

Program Chairs

Cheonshik Kim Sejong University, KoreaEun-Jun Yoon Kyungil University, KoreaZhang Xinpeng Shanghai University, China

Session Chairs

You-Sik Hong Sangji University, KoreaJungyeon Shim Kangnam University, KoreaWoontack Woo Kwangju Institute of Science and Technology,

KoreaMinho Lee Kyungpook National University, KoreaKyu-Dae Lee Kongju National University, KoreaRaylin Tso National Chengchi University, Taiwan

Steering Committee

Injung Park Dankuk University, KoreaYong-Soo Choi Korea University, KoreaSuk-Hwan Lee Tongmyung University, KoreaSeongah Chin Sungkyul University, KoreaDo Hyeun Kim Jeju National University

Publicity Chairs

Beongku An Hongik University, KoreaHyoung-Joong Kim Korea University, KoreaKwang-Chun Ho Hansung University, KoreaSeungcheon Kim Hansung University, KoreaHoojin Lee Hansung University, Korea

Program Committee

Klaus Meißner Technische Universitat Dresden, GermanyJinsuk Baek Winston Salem State University, USAXiao Dong Wang Science & Technology, UK

Page 12: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XIV UMAS 2013 Organization

Wei-Jen Wang National Central University, TaiwanDa-Zhi Sun Tianjin University, ChinaJun Jo Griffith University, AustraliaWayne Pullan Griffith University, AustraliaVallipuram

Muthukkumarasamy Griffith University, AustraliaJunhu Wang Griffith University, AustraliaAlan Liew Griffith University, AustraliaBela Stantic Griffith University, AustraliaAnne Nguyen Griffith University, AustraliaSoo-Hyun Park Kookmin University, KoreaMoon-Wan Kim Tokyo University of Information Sciences,

JapanTzung-Shi Chen National University of Tainan, TaiwanWei-Chen Cheng Academia Sinica, TaiwanAlex M.H. Kuo University of Victoria, CanadaTruong Hai Bang University of Information Technology, VietnamRonald L. Hartung Franklin University, USAGyei-Kark Park National Maritime University, KoreaHyungJun Kim Hansei University, KoreaJae Gi Son KETI (Korea Electronics Technology

Institute), KoreaDongkyoo Shin Sejong University, KoreaDongil Shin Sejong University, KoreaMoon-Goo Lee Kimpo College, KoreaMyoung Nam Kim Kyungpook National University, KoreaYoung-Sun Im Kookje College, KoreaShi Xue Dou Wollongong University, AustraliaPhan Trung Huy Hanoi University, VietnamByung-Tae Chun Hankyong University, KoreaKwang-Baek Kim Silla University, KoreaJang-Geun Ki Kongju National University, KoreaKeehong Um Hansei University, KoreaWonil Kim Sejong University, KoreaJoon-Shik Park KETI (Korea Electronics Technology

Institute), KoreaMasaaki Fujiyoshi Tokyo Metropolitan University, JapanHae-Kyung Seong Hanyang Women’s College, KoreaYoung Huh KEIT(Korea Evaluation Institute of Industrial

Technology), KoreaYoung-Ho Park Sejong Cyber University, KoreaChoonsuk Oh Sun Moon University, KoreaElena Tsomko Namseoul University, KoreaSang-Woon Lee Nameseoul University, KoreaIn-Hwa Hong KETI (Korea Electronics Technology

Institute), Korea

Page 13: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

DATICS-GPC 2013: Design, Analysis and Tools

for Integrated Circuits and Systems

The International Workshop DATICS-GPC 2013: Design, Analysis and Toolsfor Integrated Circuits and Systems at the 8th International Conference on Gridand Pervasive Computing took place in Seoul, South Korea, May 9–11, 2013.

The DATICS workshops were initially created by a network of researchersand engineers both from academia and industry in the areas of design, analysisand tools for integrated circuits and systems. Recently, DATICS has been ex-tended to the fields of communication, computer science, software engineeringand information technology.

The main target of DATICS-GPC 2013 was to bring together software/hardware engineering researchers, computer scientists, practitioners and peoplefrom industry to exchange theories, ideas, techniques and experiences related toall aspects of DATICS.

The International Program Committee (IPC) of DATICS-GPC 2013 con-sisted of about 150 experts in the related fields both from academia and industry.DATICS-GPC 2013 was partnered with CEOL: Centre for Efficiency-OrientedLanguages (Ireland), Minteos (Italy), KATRI (Japan and Hong Kong), Dis-tributed Thought (UK), ASIC LAB - Myongji University (South Korea), BalticInstitute of Advanced Technology - BPTI (Lithuania), Solari (Hong Kong), Tran-scend Epoch (Hong Kong) and Xi’an Jiaotong-Liverpool University — XJTLU(China — UK).

The DATICS-GPC 2013 technical program included seven papers that wereorganized into lecture sessions. On behalf of the IPC, we would like to welcomeyou to the proceedings of DATICS-GPC 2013.

Ka Lok ManNan Zhang

Page 14: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

DATICS-GPC 2013 Organization

General Chairs

Ka Lok Man Xi’an Jiaotong-Liverpool University, ChinaNan Zhang Xi’an Jiaotong-Liverpool University, China

Organizing Chairs

Michele Mercaldi EnvEve, SwitzerlandChi Un Lei University of Hong KongTomas Krilavicius Baltic Institute of Advanced Technologies and

Vytautas Magnus University, Lithuania

Program Committee

Vladimir Hahanov Kharkov National University of RadioElectronics, Ukraine

Paolo Prinetto Politecnico di Torino, ItalyMassimo Poncino Politecnico di Torino, ItalyAlberto Macii Politecnico di Torino, ItalyJoongho Choi University of Seoul, South KoreaWei Li Fudan University, ChinaMichel Schellekens University College Cork, IrelandEmanuel Popovici University College Cork, IrelandJong-Kug Seon LS Industrial Systems R&D Center,

South KoreaUmberto Rossi STMicroelectronics, ItalyFranco Fummi University of Verona, ItalyGraziano Pravadelli University of Verona, ItalyYui Fai Lam Hong Kong University of Science and

Technology, Hong KongJinfeng Huang Philips and LiteOn Digital Solutions

Netherlands, The NetherlandsMonica Donno Minteos, ItalyJun-Dong Cho Sung Kyun Kwan University, South KoreaAHM Zahirul Alam International Islamic University Malaysia,

MalaysiaGregory Provan University College Cork, IrelandMiroslav N. Velev Aries Design Automation, USAM. Nasir Uddin Lakehead University, CanadaDragan Bosnacki Eindhoven University of Technology,

The Netherlands

Page 15: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XVIII DATICS-GPC 2013 Organization

Milan Pastrnak Atos IT Solutions and Services, SlovakiaJohn Herbert University College Cork, IrelandZhe-Ming Lu Sun Yat-Sen University, ChinaJeng-Shyang Pan National Kaohsiung University of Applied

Sciences, TaiwanChin-Chen Chang Feng Chia University, TaiwanMong-Fong Horng Shu-Te University, TaiwanLiang Chen University of Northern British Columbia,

CanadaChee-Peng Lim University of Science Malaysia, MalaysiaSalah Merniz Mentouri University, Constantine, AlgeriaOscar Valero University of Balearic Islands, SpainYang Yi Sun Yat-Sen University, ChinaFranck Vedrine CEA LIST, FranceBruno Monsuez ENSTA, FranceKang Yen Florida International University, USATakenobu Matsuura Tokai University, JapanR. Timothy Edwards MultiGiG, Inc., USAOlga Tveretina Karlsruhe University, GermanyMaria Helena Fino Universidade Nova De Lisboa, PortugalAdrian Patrick O’Riordan University College Cork, IrelandGrzegorz Labiak University of Zielona Gora, PolandJian Chang Texas Instruments, Inc., USAYeh-Ching Chung National Tsing-Hua University, TaiwanAnna Derezinska Warsaw University of Technology, PolandKyoung-Rok Cho Chungbuk National University, South KoreaYuanyuan Zeng Wuhan University, ChinaD.P. Vasudevan University College Cork, IrelandArkadiusz Bukowiec University of Zielona Gora, PolandMaziar Goudarzi Sharif University of Technology, IranJin Song Dong National University of Singapore, SingaporeDhamin Al-Khalili Royal Military College of Canada, CanadaZainalabedin Navabi University of Tehran, IranLyudmila Zinchenko Bauman Moscow State Technical University,

RussiaMuhammad Almas Anjum National University of Sciences and Technology

(NUST), PakistanDeepak Laxmi Narasimha University of Malaya, MalaysiaDanny Hughes Katholieke Universiteit Leuven, BelgiumJun Wang Fujitsu Laboratories of America, Inc., USAA.P. Sathish Kumar PSG Institute of Advanced Studies, IndiaN. Jaisankar VIT University, India

Page 16: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

DATICS-GPC 2013 Organization XIX

Atif Mansoor National University of Sciences and Technology(NUST), Pakistan

Steven Hollands Synopsys, IrelandSiamak Mohammadi University of Tehran, IranFelipe Klein State University of Campinas (UNICAMP),

BrazilEng Gee Lim Xi’an Jiaotong-Liverpool University, ChinaKevin Lee Murdoch University, AustraliaPrabhat Mahanti University of New Brunswick, Saint John,

CanadaKaiyu Wan Xi’an Jiaotong-Liverpool University, ChinaTammam Tillo Xi’an Jiaotong-Liverpool University, ChinaYanyan Wu Xi’an Jiaotong-Liverpool University, ChinaWen Chang Huang Kun Shan University, TaiwanMasahiro Sasaki The University of Tokyo, JapanShishir K. Shandilya NRI Institute of Information Science and

Technology, IndiaJ.P.M. Voeten Eindhoven University of Technology,

The NetherlandsWichian Sittiprapaporn Mahasarakham University, ThailandAseem Gupta Freescale Semiconductor Inc., Austin, USAKevin Marquet Verimag Laboratory, FranceMatthieu Moy Verimag Laboratory, FranceRamy Iskander LIP6 Laboratory, FranceSuryaprasad Jayadevappa PES School of Engineering, IndiaShanmugasundaram

Hariharan Pavendar Bharathidasan College ofEngineering and Technology, India

Chung-Ho Chen National Cheng-Kung University, TaiwanKyung Ki Kim Daegu University, South KoreaShiho Kim Chungbuk National University, KoreaHi Seok Kim Cheongju University, KoreaBrian Logan University of Nottingham, UKAsoke Nath St. Xavier’s College (Autonomous), IndiaTharwon

Arunuphaptrairong Chulalongkorn University, ThailandShin-Ya Takahasi Fukuoka University, JapanCheng C. Liu University of Wisconsin at Stout, USAFarhan Siddiqui Walden University, Minneapolis, USAKatsumi Wasaki Shinshu University, JapanPankaj Gupta Microsoft Corporation, USATaikyeong Jeong Myongji University, South KoreaMasoud Daneshtalab University of Turku, FinlandAmit Chaudhry Technology Panjab University, IndiaBharat Bhushan Agarwal I.F.T.M., University, India

Page 17: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XX DATICS-GPC 2013 Organization

Abhilash Goyal Oracle (SunMicrosystems), USAYue Yang EJITEC, ChinaBoguslaw Cyganek AGH University of Science and Technology,

PolandYeo Kiat Seng Nanyang Technological University, SingaporeYoungmin Kim UNIST Academy-Industry Research

Corporation, South KoreaTom English Xlinx, IrelandNicolas Vallee RATP, FranceMou Ling Dennis Wong Swinburne University of Technology, MalaysiaRajeev Narayanan Cadence Design Systems, Austin, USAXuan Guan Freescale Semiconductor, Austin, USAPradip Kumar Sadhu Indian School of Mines, IndiaFei Qiao Tsinghua University, ChinaChao Lu Purdue University, USADing-Yuan Cheng National Chiao Tung University, TaiwanAmir-Mohammad Rahmani University of Turku, FinlandShin-Il Lim Seokyeong University, Seoul Korea

Page 18: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Message from the FSTA 2013 Symposium Chair

Welcome to the proceedings of the 2013 International Workshop on Future Sci-ence Technologies and Applications (FSTA 2013).

The Internet as well as cellular and wireless systems are now converging, thusgiving birth to the future Internet. The International Workshop on FSTA 2013brought together scientists, engineers, computer users, and students to exchangeand share their experiences, new ideas, and research results on all aspects (theory,applications and tools) of computer and information science, and to discuss thepractical challenges encountered and the solutions adopted. The Workshop onFuture Science Technologies and Applications aims to serve as an internationalforum for researchers and practitioners willing to present their early researchresults and share experiences in the field.

FSTA 2013 contained high-quality research papers submitted by researchersfrom all over the world. Each submitted paper was peer-reviewed by reviewerswho are experts in the subject area of the paper. Based on the review results,the Program Committee accepted 13 papers.

In organizing an international workshop, the support and help of many peopleis needed. We would like to thank all authors for their work and presentation,all members of the Program Committee and reviewers for their cooperation andtime spent in the reviewing process. Particularly, we thank the founding SteeringChair of GPC 2013, James J. (Jong Hyuk) Park, Workshop Chair GPC 2013,Joon-Min Gil, and the Program Chair of GPC 2013. Finally, special thanks areextended to the staff of FSTA 2013, who contributed greatly to the success ofthe conference.

Namje Park

Page 19: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

FSTA 2013 Organization

Steering Chair

James J. Park SeoulTech, Korea

General Chairs

Stefanos Gritzalis University of the Aegean, GreeceYoung-Sik Jeong Wonkwang University, KoreaHan-Chieh Chao National Ilan University, Taiwan

Program Chair

Namje Park Jeju National University, Korea

Publicity Chairs

Deqing Zou Huazhong University of Science andTechnology, China

Damien Sauveron University of Limoges, FranceNeil Y. Yen The University of Aizu, Japan

Program Committee

Qiang Zhu The University of Michigan, USAShao-Shin Hung WuFeng University, TaiwanTat-Chee Wan Universiti Sains MalaysiaJun Xiao East China Normal University, ChinaYoung soo Kim Electronics and Telecommunications Research

Institute, KoreaOliver Amft Eindhoven University of Technology,

The NetherlandsChangjing Shang Aberystwyth University, UKWanqing Tu Glyndwr University, UKKok-Seng Wong Soongsil University, KoreaNarayanan Kulathuramaiyer Universiti Malaysia Sarawak, MalaysiaNik Bessis University of Derby, UKQinghe Du Xi’an Jiaotong University, ChinaKyoil Cheong Electronics and Telecommunications Research

Institute, Korea

Page 20: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XXIV FSTA 2013 Organization

Rachid Anane Coventry University, UKMehul Bhatt University of Bremen, GermanyZhou Su Waseda Univ, JapanChee-Peng LIM Deakin University, AustraliaRami Yared Japan Advanced Institute of Science and

Technology, JapanM. Elena Renda IIT-CNR, ItalyDooho Choi Electronics and Telecommunications Research

Institute, KoreaYoungsook Lee Howon University, KoreaSoohyun Oh Hoseo University, KoreaTaesung Lee KISA, Korea

Page 21: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Table of Contents

Cloud, Cluster and Grid I

Transparency in Cloud Business: Cluster Analysis of Softwareas a Service Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Jonas Repschlaeger

Distributed Accounting in Scope of Privacy Preserving . . . . . . . . . . . . . . . 11Marcus Hilbrich and Rene Jakel

Distributed Virtual Machine Monitor for Distributed Cloud ComputingNodes Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Li Ruan, Jinbing Peng, Limin Xiao, and Mingfa Zhu

Differentiated Policy Based Job Scheduling with Queue Model andAdvanced Reservation Technique in a Private CloudEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Shyamala Loganathan and Saswati Mukherjee

Scaling Out Recommender System for Digital Librarieswith MapReduce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Lun-Chi Chen, Ping-Jen Kuo, I-En Liao, and Jyun-Yao Huang

Layering of the Provenance Data for Cloud Computing . . . . . . . . . . . . . . . 48Muhammad Imran and Helmut Hlavacs

JCL: An OpenCL Programming Toolkit for HeterogeneousComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Tyng-Yeu Liang and Yu-Jie Lin

Network-Aware Multiway Join for MapReduce . . . . . . . . . . . . . . . . . . . . . . . 73Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, andJong Hyuk Park

Automatic Resource Scaling for Web Applications in the Cloud . . . . . . . . 81Ching-Chi Lin, Jan-Jan Wu, Pangfeng Liu, Jeng-An Lin, andLi-Chung Song

Implementation of Cloud-RAID: A Secure and Reliable Storageabove the Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Maxim Schnjakin and Christoph Meinel

An Improved Min-Min Task Scheduling Algorithm in GridComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Soheil Anousha and Mahmoud Ahmadi

Page 22: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XXVI Table of Contents

Cloud, Cluster and Grid II

Heterogeneous Diskless Remote Booting System on Cloud OperatingSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Jin-Neng Wu, Yao-Hsing Ko, Kuo-Ming Huang, and Mu-Kai Huang

RTRM: A Response Time-Based Replica Management Strategyfor Cloud Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Xiaohu Bai, Hai Jin, Xiaofei Liao, Xuanhua Shi, and Zhiyuan Shao

Secure Hadoop with Encrypted HDFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Seonyoung Park and Youngseok Lee

VM Migration for Fault Tolerance in Spot Instance Based CloudComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

Daeyong Jung, SungHo Chin, Kwang Sik Chung, and HeonChang Yu

A Cloud Based Natural Disaster Management System . . . . . . . . . . . . . . . . 152Mansura Habiba and Shamim Akhter

A Hybrid Grid/Cloud Distributed Platform: A Case Study . . . . . . . . . . . . 162Mohamed Ben Belgacem, Haithem Hafsi, and Nabil Abdennadher

Comparison of Two Yield Management Strategies for Cloud ServiceProviders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

Mohammad Mahdi Kashef, Azamat Uzbekov, Jorn Altmann, andMatthias Hovestadt

Comparing Java Virtual Machines for Sensor Nodes – First Glance:Takatuka and Darjeeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

Oliver Maye and Michael Maaser

Research on Opinion Formation of Microblog in the View of Multi-agentSimulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

Jianyong Zhang, Qihui Mi, Longji Hu, and Yue Tang

Implementation of Cloud IaaS for Virtualization with Live Migration . . . 199Chao-Tung Yang, Kuan-Lung Huang, William Cheng-Chung Chu,Fang-Yi Leu, and Shao-Feng Wang

Middleware, Resource Management

Security Considerations in Cloud Computing VirtualizationEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

Sang-Soo Yeo and Jong Hyuk Park

Medicine Rating Prediction and Recommendation in Mobile SocialNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

Shuai Li, Fei Hao, Mei Li, and Hee-Cheol Kim

Page 23: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Table of Contents XXVII

Cloud Browser: Enhancing the Web Browser with CloudSessions and Downloadable User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

Antero Taivalsaari, Tommi Mikkonen, and Kari Systa

Visual Novels: An Methodology Guideline for Pervasive EducationalGames that Favors Discernment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

Francisco Lepe Salazar, Tatsuo Nakajima, and Todorka Alexandrova

An Optimal Radio Access Network Selection Method for HeterogeneousWireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

Glaucio H.S. Carvalho, Isaac Woungang,Md. Mizanur Rahman, and Alagan Anpalagan

Desktop Grid Computing at the Age of the Web . . . . . . . . . . . . . . . . . . . . . 253Leila Abidi, Christophe Cerin, and Mohamed Jemni

A Novel Model for Greenhouse Control Architecture . . . . . . . . . . . . . . . . . . 262Miran Baek, Myeongbae Lee, Honggean Kim, Taehyung Kim,Namjin Bae, Yongyun Cho, Jangwoo Park, and Changsun Shin

Mobile, Peer-to-Peer and Pervasive Computing

Enhanced Search in Unstructured Peer-to-Peer Overlay Networks . . . . . . 270Chittaranjan Hota, Vikram Nunia, Mario Di Francesco,Jukka K. Nurminen, and Antti Yla-Jaaski

CE-SeMMS: Cost-Effective and Secure Mobility Management SchemeBased on SIP in NEMO Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

Chulhee Cho, Jae Young Choi, Younghwa Cho, and Jong Pil Jeong

A System-Level Approach for Designing Context-Aware DistributedPervasive Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

Kevin I-Kai Wang, HeeJong Park, Zoran Salcic, andPanith Ratnayaka

Architecture of a Context Aware Framework for Automated MobileDevice Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba, andCheonshik Kim

AMM-PF: Additional Mobility Management Scheme Based on PointerForwarding in PMIPv6 Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

Seung Yoon Park, Jae Young Choi, and Jong Pil Jeong

Multi-core and High Performance Computing

The Evaluation and Optimization of 3-D Jacobi Iteration on a StreamProcessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

Ying Zhang, Gen Li, Yongjin Li, Caixia Sun, and Pingjing Lu

Page 24: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XXVIII Table of Contents

DDASTM: Ensuring Conflict Serializability Efficiently in DistributedSTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

Yu Zhang, Hai Jin, and Xiaofei Liao

Research on Log Pre-processing for Exascale System Using SparseRepresentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

Lei Zhu, Jianhua Gu, Tianhai Zhao, and Yunlan Wang

Other GPC Related Topics

Using Event-Based Style for Developing M2M Applications . . . . . . . . . . . . 348Truong-Giang Le, Olivier Hermant, Matthieu Manceny,Renaud Pawlak, and Renaud Rioboo

Weighted Mining Association Rules Based Quantity Item with RFMScore for Personalized u-Commerce Recommendation System . . . . . . . . . . 367

Young Sung Cho, Si Choon Noh, and Song Chul Moon

Priority-Based Live Migration of Virtual Machine . . . . . . . . . . . . . . . . . . . . 376Bangjie Jiang, Junmin Wu, Xiaodong Zhu, and Die Hu

Improvement of the MCMA Blind Equalization Performance Usingthe Coordinate Change Method in 16-APSK . . . . . . . . . . . . . . . . . . . . . . . . 386

Youngguk Kim and Heung-Gyoon Ryu

Postural Transition Detection Using a Wireless Sensor ActivityMonitoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393

Richelle LeMay, Sangil Choi, Jong-Hoon Youn, and Jay Newstorm

Parallel and Distributed Systems

A Dedicated Serialization Scheme in Homogeneous Cluster RPCCommunication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

Yong Wan, Dan Feng, Fang Wang, and Tingwei Zhu

Friends Based Keyword Search over Online Social Networks . . . . . . . . . . . 413Jinzhou Huang and Hai Jin

GPU Virtualization Support in Cloud System . . . . . . . . . . . . . . . . . . . . . . . 423Chih-Yuan Yeh, Chung-Yao Kao, Wei-Shu Hung, Ching-Chi Lin,Pangfeng Liu, Jan-Jan Wu, and Kuang-Chih Liu

MGMR: Multi-GPU Based MapReduce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433Yi Chen, Zhi Qiao, Hai Jiang, Kuan-Ching Li, and Won Woo Ro

Based on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358Xiaoling Wu, Huawei Fu, Xiaomin He, Guangcong Liu, Jianjun Li,Hainan Chen, Qianqiu Wang, and Qing He

Retracted: Scheduling Optimization of the RFID Tagged ExplosiveStorage

Page 25: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Table of Contents XXIX

Security and Privacy

DDoS Analysis Using Correlation Coefficient Based on KolmogorovComplexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

Sung-ju Kim, Byung Chul Kim, and Jae Yong Lee

An Efficient Attribute-Based Encryption and Access Control Schemefor Cloud Storage Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453

Jyun-Yao Huang, Chen-Kang Chiang, and I-En Liao

Active One-Time Password Mechanism for User Authentication . . . . . . . . 464Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, and Chung-Yu Lin

Hardware Acceleration for Cryptography Algorithms by HotspotDetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472

Jed Kao-Tung Chang, Chen Liu, and Jean-Luc Gaudiot

Chaotic Wireless Communication System Using Retrodirective ArrayAntenna for Advanced High Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482

Junyeong Bok and Heung-Gyoon Ryu

Policy-Based Customized Privacy Preserving Mechanism for SaaSApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491

Yuliang Shi, Zhen Jiang, and Kun Zhang

QoC-Aware Access Control Based on Fuzzy Inference for PervasiveComputing Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

Yao Ma, Hongwei Lu, and Zaobin Gan

Per-File Secure Deletion Combining with Enhanced Reliabilityfor SSDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509

Yi Qin, Dan Feng, Wei Tong, Jingning Liu, Yang Hu, andZhiming Zhu

An Energy-Aware Secured Routing Protocol for Mobile Ad HocNetworks Using Trust-Based Multipath . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

Isaac Woungang, Sanjay Kumar Dhurandher, and Michael Sahai

A Grid-Based Approximate K-NN Query Processing Algorithmfor Privacy Protection in Location-Based Services . . . . . . . . . . . . . . . . . . . . 526

Miyoung Jang and Jae-Woo Chang

Density-Based K-Anonymization Scheme for Preserving Users’ Privacyin Location-Based Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

Hyunjo Lee and Jae-Woo Chang

Page 26: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XXX Table of Contents

Ubiquitous Communications, Sensor Networking,and RFID

A Routing Mechanism Using Virtual Coordination Anchor Node Applyto Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

Chih-Hsiao Tsai, Kai-Ti Chang, Cheng-Han Tsai, andYing-Hong Wang

Effect of Genetic Parameters in Tour Scheduling and RecommenderServices for Electric Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Byung-Jun Lee,Seulbi Lee, and Dae-Yong Im

Enabling Massive Machine-to-Machine Communicationsin LTE-Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

Kyungkoo Jun

Enhancements for Local Repair in AODV-Based Ad-Hoc Networks . . . . . 570Hyun-Ho Shin, Seungjin Lee, and Byung-Seo Kim

Smart Watch and Monitoring System for Dementia Patients . . . . . . . . . . . 577Dong-Min Shin, DongIl Shin, and Dongkyoo Shin

A Lesson from the Development of Surveillance and ReconnaissanceSensor Networks Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585

Daesik Kim, Seongkee Lee, and Mirim Ahn

A Classifier Algorithm Exploiting User’s EnvironmentalContext and Bio-signal for U-Home Services . . . . . . . . . . . . . . . . . . . . . . . . . 594

HyunJu Lee, DongIl Shin, Dongkyoo Shin, and SooHan Kim

DNA-S: Dynamic Cellular Network Architecture for SmartCommunications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602

Taegyu Lee and Gi-Soo Chung

Ubiquitous and Multimedia Application Systems

Predicting of Abnormal Behavior Using Hierarchical Markov ModelBased on User Profile in Ubiquitous Environment . . . . . . . . . . . . . . . . . . . . 612

Jaewan Shin, Dongkyoo Shin, and DongIl Shin

Advanced Facial Skin Rendering with Actual Fresnel Refractive IndexReflecting Facial Tissue Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623

Sunghee Lee and Seongah Chin

Emotion Recognition Technique Using Complex Biomedical SignalAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631

Guyoun Hwang, Heejun Cho, Dongkyoo Shin, and DongIl Shin

Page 27: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Table of Contents XXXI

RWA: Reduced Whole Ack Mechanism for Underwater Acoustic SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641

Soo Young Shin and Soo Hyun Park

Data Hiding Based on Palette Images Using Weak Basesof Z2-Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649

Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh,Le Quang Hoa, and Ching-Nung Yang

Adaptive Smart Vehicle Middleware Platform for Aspect OrientedSoftware Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659

Jin-Hong Kim and Seung-Cheon Kim

Design, Analysis and Tools for Integrated Circuitsand Systems

Parallel Generation of Optimal Mortgage Refinancing ThresholdRates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665

Nan Zhang, Dejun Xie, Eng Gee Lim, Kaiyu Wan, and Ka Lok Man

Pricing American Options on Dividend-Paying Stocks and Estimatingthe Greek Letters Using Leisen-Reimer Binomial Trees . . . . . . . . . . . . . . . . 676

Nan Zhang, Kaiyu Wan, Eng Gee Lim, and Ka Lok Man

A Resource-Centric Architecture for Service-Oriented Cyber PhysicalSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686

Kaiyu Wan and Vangalur Alagar

Implied Volatilities of S&P 100 Index with Applications to FinancialMarket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694

Jin Zheng, Nan Zhang, and Dejun Xie

RF Characteristics of Wireless Capsule Endoscopy in Human Body . . . . 700Meng Zhang, Eng Gee Lim, Zhao Wang, Tammam Tillo,Ka Lok Man, and Jing Chen Wang

Building a Laboratory Surveillance System via a Wireless SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707

Chi-Un Lei, J.K. Seon, Zhun Shen, Ka Lok Man,Danny Hughes, and Youngmin Kim

S-Theory: A Unified Theory of Multi-paradigm SoftwareDevelopment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715

Danny Hughes, Nelly Bencomo, Brice Morin, Christophe Huygens,Zhun Shen, and Ka Lok Man

Page 28: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XXXII Table of Contents

Future Science Technologies and Applications

Design of J-VTS Middleware Based on IVEF Protocol . . . . . . . . . . . . . . . . 723Taekyeong Kang and Namje Park

On the Use of a Hash Function in a 3-Party Password-BasedAuthenticated Key Exchange Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730

Youngsook Lee and Dongho Won

A Sequence Classification Model Based on Pattern Coverage Rate . . . . . . 737I-Hui Li, Jyun-Yao Huang, I-En Liao, and Jin-Han Lin

Development of STEAM Program and Teaching Method for UsingLEGO Line Tracer Robot in Elementary School . . . . . . . . . . . . . . . . . . . . . . 746

Yeonghae Ko and Namje Park

Improved Authentication Scheme with Anonymity for Roaming Servicein Global Mobility Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752

Youngseok Chung, Youngsook Lee, and Dongho Won

Cryptanalysis of an Authenticated Group Key Transfer ProtocolBased on Secret Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761

Mijin Kim, Namje Park, and Dongho Won

Development of the STEAM-Based Media Education Materialsfor Prevention of Media Dysfunction in Elementary School . . . . . . . . . . . . 767

Jaeho An and Namje Park

Access Control Technique of Illegal Harmful Contents for ElementarySchoolchild Online Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773

Namje Park and Yeonghae Ko

The Concept of Delegation of Authorization and Its Expansionfor Multi Domain Smart Grid System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781

Mijin Kim and Namje Park

Security Requirement of End Point Security Software . . . . . . . . . . . . . . . . . 788Hyun-Jung Lee, Youngsook Lee, and Dongho Won

Collecting and Filtering Out Phishing Suspicious URLs UsingSpamTrap System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796

Inkyung Jeun, Youngsook Lee, and Dongho Won

Improvement of a Chaotic Map Based Key Agreement Protocol ThatPreserves Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803

Hyunsik Yang, Jin Qiuyan, Hanwook Lee, Kwangwoo Lee, andDongho Won

Solving Router Nodes Placement Problem with Priority ServiceConstraint in WMNs Using Simulated Annealing . . . . . . . . . . . . . . . . . . . . . 811

Chun-Cheng Lin, Yi-Ling Lin, and Wan-Yu Liu

Page 29: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

Table of Contents XXXIII

Green and Human Information Technology

Topology Information Based Spare Capacity Provisioning in WDMNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819

Hoyoung Hwang and Seung-Cheon Kim

A Contents Service Profit Model Based on the Quality ofExperience and User Group Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . 826

Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong, and Yong Lee

Toward Hybrid Model for Architecture-Oriented Semantic Schemaof Self-adaptive System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832

Jin-Hong Kim and Seung-Cheon Kim

Optimal Channel Sensing in Cognitive Radio Network with MultipleSecondary Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838

Heejung Yu

H.264 Video Delivery over Wireless Mesh Networks Based on JointAdaptive Cross-Layer Mapping and MDCA MAC . . . . . . . . . . . . . . . . . . . . 846

Byung Joon Oh and Ki Young Lee

Automatic Tracking Angle of Arrival of Bandpass Sampling OFDMSignal by MUSIC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854

Xin Wang and Heung-Gyoon Ryu

A White-List Based Security Architecture (WLSA) for the Safe MobileOffice in the BYOD Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860

Jaeho Lee, Yongjin Lee, and Seung-Cheon Kim

A Study of Vessel Deviation Prevention Scheme Using a Triangulationin a Seaway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866

Shu Chen, Rashid Ahmad, Byung-Gil Lee, Byung-Doo Kim, andDo-Hyeun Kim

Analysis of Energy Consumption in Edge Router with Sleep Modefor Green OBS Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873

Wonhyuk Yang, Mohamed A. Ahmed, Ki-Beom Lee, andYoung-Chon Kim

VLC Based Multi-hop Audio Data Transmission System . . . . . . . . . . . . . . 880Le The Dung, Seungwan Jo, and Beongku An

A Practical Adaptive Scheme for Enhancing Network Stability in MobileAd-Hoc Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 886

Le The Dung, Sue Hyung Ha, and Beongku An

A Geomulticast Routing Protocol Based on Route Stability in MobileAd-Hoc Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893

Sue Hyung Ha, Le The Dung, and Beongku An

Page 30: Lecture Notes in Computer Science 7861 - Springer978-3-642-38027-3/1.pdf · Lecture Notes in Computer Science 7861 Commenced Publication in 1973 Founding and Former Series Editors:

XXXIV Table of Contents

RFID-Based Indoor Location Recognition System for EmergencyRescue Evacuation Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899

Dae-Man Do, Maeng-Hwan Hyun, and Young-Bok Choi

A Symmetric Hierarchical Clustering Related to the Sink Position andPower Threshold for Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907

Joongjin Kook

A Study of Fire Refuge Guide Simulator Based on Sensor Networks . . . . 914Jun-Pill Boo, Sang-Chul Kim, Dong-Hwan Park,Hyo-Chan Bang, and Do-Hyeun Kim

Design of Parallel Pipelined Algorithm for Field ArithmeticArchitecture Based on Cellular Array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920

Kee-Won Kim and Jun-Cheol Jeon

Follower Classification Through Social Network Analysis in Twitter . . . . 926Jae-Wook Seol, Kwang-Yong Jeong, and Kyung-Soon Lee

An Initial Quantization Parameter Decision Method Based on FrameComplexity with Multiple Objectives of GOP for Rate Controlof H.264 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932

Yalin Wu and Sun-Woo Ko

The Development of Privacy Telephone Sets in Encryption Systemagainst Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939

Seok-Pil Lee and Eui-seok Nahm

New ID-Based Proxy Signature Scheme with Message Recovery . . . . . . . . 945Eun-Jun Yoon, YongSoo Choi, and Cheonshik Kim

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953

Erratum

Scheduling Optimization of the RFID Tagged Explosive StorageBased on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Xiaoling Wu, Huawei Fu, Xiaomin He, Guangcong Liu, Jianjun Li,Hainan Chen, Qianqiu Wang, and Qing He

E1