Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
Lecture Notes in Computer Science 7861Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David HutchisonLancaster University, UK
Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA
Josef KittlerUniversity of Surrey, Guildford, UK
Jon M. KleinbergCornell University, Ithaca, NY, USA
Alfred KobsaUniversity of California, Irvine, CA, USA
Friedemann MatternETH Zurich, Switzerland
John C. MitchellStanford University, CA, USA
Moni NaorWeizmann Institute of Science, Rehovot, Israel
Oscar NierstraszUniversity of Bern, Switzerland
C. Pandu RanganIndian Institute of Technology, Madras, India
Bernhard SteffenTU Dortmund University, Germany
Madhu SudanMicrosoft Research, Cambridge, MA, USA
Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA
Doug TygarUniversity of California, Berkeley, CA, USA
Gerhard WeikumMax Planck Institute for Informatics, Saarbruecken, Germany
James J. (Jong Hyuk) ParkHamid R. Arabnia Cheonshik KimWeisong Shi Joon-Min Gil (Eds.)
Grid andPervasive Computing8th International Conference, GPC 2013and Colocated WorkshopsSeoul, Korea, May 9-11, 2013Proceedings
13
Volume Editors
James J. (Jong Hyuk) ParkSeoul University of Science and Technology, Seoul, KoreaE-mail: [email protected]
Hamid R. ArabniaUniversity of Georgia, Athens, USAE-mail: [email protected]
Cheonshik KimSejong University, Seoul, KoreaE-mail: [email protected]
Weisong ShiWayne State University, Detroit, MI, USAE-mail: [email protected]
Joon-Min GilCatholic University of Daegu, Gyeongsan-si, Gyeongbuk, KoreaE-mail: [email protected]
ISSN 0302-9743 e-ISSN 1611-3349ISBN 978-3-642-38026-6 e-ISBN 978-3-642-38027-3DOI 10.1007/978-3-642-38027-3Springer Heidelberg Dordrecht London New York
Library of Congress Control Number: 2013936008
CR Subject Classification (1998): F.2, C.1, C.2, C.3, C.5, H.5, H.3, D.4,K.6.5, K.4, B.2, B.8, C.4
LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues
© Springer-Verlag Berlin Heidelberg 2013This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
Welcome to the 8th International Conference on Grid and Pervasive Computing(GPC 2013), held in Seoul, Korea, during May 9–11, 2013. GPC-13 was the mostcomprehensive conference focused on the various aspects of grid and pervasivecomputing. GPC 2006, GPC 2007, GPC 2008, GPC 2009, GPC 2010, and GPC2011 took place in Taichung (Taiwan), Paris (France), Kunming (China), Geneva(Switzerland), Hualien (Taiwan), and Oulu (Finland), respectively, and GPC2012 in Hong Kong, China.
The papers included in the proceedings cover the following topics: cloud,cluster and grid computing; grid and cloud computing economy and businessmodels; security and privacy in grid, pervasive and cloud computing; embed-ded and pervasive computing; social network and services; machine to machinecommunications; service-oriented computing, mobile, peer-to-peer and pervasivecomputing. Accepted and presented papers highlight the new trends and chal-lenges of grid and pervasive computing. The presenters showed how new researchcould lead to novel and innovative applications. GPC 2013 provided an oppor-tunity for academic and industry professionals to discuss the latest issues andprogress in the area of GPC. In addition, the conference published high-qualitypapers that are closely related to the various theories and practical applicationsin GPC. Furthermore, we expect that the conference and its publications willbe a trigger for further related research and technology improvements in thisimportant subject.
For GPC 2013, we received many papers submission from more than 12 coun-tries. Out of these, after a rigorous peer-review process, we accepted 65 papers ofhigh quality for the GPC 2013 proceedings, published by Springer. All submittedpapers underwent blind reviews by at least two reviewers from the Technical Pro-gram Committee, comprising leading researchers from around the globe. Withouttheir hard work, achieving such high-quality proceedings would not have beenpossible. We take this opportunity to thank them for their great support andcooperation. We thank the organizers of the International Workshop on Ubiq-uitous and Multimedia Application Systems (UMAS 2013), the InternationalWorkshop DATICS-GPC 2013: Design, Analysis and Tools for Integrated Cir-cuits and Systems, the International Workshop on Future Science Technologiesand Application (FSTA 2013), and the Workshop on Green and Human Infor-mation Technology (GHIT 2013). The goal of the workshops was to providea forum for researchers to exchange and share new ideas, research results, and
VI Preface
ongoing work on advanced topics in grid and pervasive computing. Finally, wewould like to also thank all the authors, reviewers, and Organizing CommitteeMembers.
May 2013 James J. (Jong Hyuk) ParkHong Shen
Hamid R. ArabniaCheonshik Kim
Weisong ShiHeonChang Yu
Organization
General Chairs
James J. (Jong Hyuk) Park SeoulTech, KoreaHong Shen University of Adelaide, AustraliaHamid R. Arabnia The University of Georgia, USA
General Vice-chairs
Martin Sang-Soo Yeo Mokwon University, KoreaYoung-Sik Jeong Wonkwang University, Korea
Program Chairs
Cheonshik Kim Sejong University, Korea (Leading Chair)Weisong Shi Wayne State University, USAHeonChang Yu Korea University, KoreaGeorge Roussos University of London, UK
Workshop Chairs
Joon-Min Gil Catholic University of Daegu, Korea(Leading Chair)
Zhiyong Xu Suffolk University, USAMohamed Gaber University of Portsmouth, UK
Publication Chair
Hwa Young Jeong Kyung Hee University, Korea
Steering Committee
Hai Jin Huazhong University of Science andTechnology, China (Chair)
Nabil Abdennadher University of Applied Sciences, SwitzerlandChristophe Cerin University of Paris XIII, FranceSajal K. Das The University of Texas at Arlington, USAJean-Luc Gaudiot University of California - Irvine, USAKuan-Ching Li Providence University, TaiwanCho-Li Wang The University of Hong Kong, ChinaChao-Tung Yang Tunghai University, Taiwan
VIII Organization
Publicity Co-chairs
Jaehwa Chung Korea National Open University, KoreaZili Shao Hong Kong Polytechnic University, ChinaChun-Cheng Lin National Chiao Tung University, TaiwanJulio Sahuquillo Universidad Politecnica de Valencia, SpainAkihiro Fujiwara Kyushu Institute of Technology, JapanBong-Hwa Hong Kyung Hee Cyber University, Korea
Program Committee
Alfredo Navarra Universita degli Studi di Perugia, ItalyAndrew L. Wendelborn University of Adelaide, AustraliaBeniamino Di Martino Second University of Naples, ItalyBin Guo Institute TELECOM SudParis, FranceChao-Tung Yang Tunghai University, TaiwanChen Liu Clarkson University, USAChen Yu Huazhong University of Science and
Technology, ChinaCheng-Chin Chiang National Dong Hwa University, TaiwanChien-Min Wang Academia Sinica, TaiwanChin-Feng Lai National Ilan University, TaiwanChing-Hsien (Robert) Hsu Chung Hua University, TaiwanChristophe Cerin Universite de Paris XIII, FranceDaewon Lee Seokyeong University, KoreaDamon Shing-Min Liu National Chung Cheng University, TaiwanDan Grigoras University College Cork, IrelandDana Petcu Western University of Timisoara, RomaniaDavid De Roure University of Southampton, UKDavid H. C. Du University of Minnesota, USADavid Hung-Chang Du University of Minnesota, USADavid Laiymani I.U.T. de Belfort-Montbeliard, FranaceDer-Jiunn Deng National Changhua University of Education,
TaiwanEl-ghazali Talbi INRIA Lille - Nord Europe, FranceFahim Kawsar Bell labs, University of Lancaster, UKFevzi Belli Univ. Paderborn, GermanyFrancis C.M. Lau The University of Hong Kong, ChinaGuoying Zhao University of Oulu, FinlandHai Jiang Arkansas State University, USAHamid R. Arabnia University of Georgia, USAHedda Schmidtke Carnegie Mellon University in RwandaHong Tang Aliyun Inc.Hui-Huang Hsu Tamkang University, TaiwanHung-Chang Hsiao National Cheng Kung University, Taiwan
Organization IX
Hung-Chang Hsiao National Cheng Kung University, TaiwanHwamin Lee Soonchunhyang University, KoreaIncheon Paik University of Aizu, JapanInsik Shin KAIST, KoreaIoan Marius Bilasco University of Science and Technology of Lille,
FranceIoana Banicescu Mississippi State University, USAIvan Stojmenovic University of Ottawa, CanadaJan-Jan Wu Academia Sinica, TaiwanJemal Abawajy Deakin University, AustraliaJenq Kuen Lee National Tsing Hua University, TaiwanJerry Hsi-Ya Chang NCHC, TaiwanJie Tang Intel Research, Beijing, ChinaJingling Xue University of New South Wales, AustraliaJingyu Zhou Shanghai Jiaotong University, ChinaJose Fortes University of Florida - Gainesville, USAJunjie Peng Shanghai University, ChinaKaori Fujinami Tokyo University of Agriculture and
Technology, JapanKazunori Takashio Keio University, JapanKewei Sha Oklahoma City University, USAKuo-Chan Huang National Taichung University, TaiwanLuciana Arantes LIP6, FranceMarcin Paprzycki Computer Science Institute, PolandMartti Mantyla Helsinki Institute for Information Technology
HIIT, FinlandMasayoshi Ohashi ATR Media Information Science Laboratories,
JapanMeng-Yen Hsieh Providence University, TaiwanMichael Beigl University of Braunschweig, GermanyMichael Hobbs Deakin University, AustraliaMichel Koskas Amiens, FranceMing-Lu Li Shanghai Jiang Tong University, ChinaMitsuhisa Sato Tsukuba University, JapanMohamed Jemni ESSTT, TunisiaNabil Abdennadher University of Applied Sciences, SwitzerlandNiwat Thepvilojanapong Mie University, JapanNoel Crespi Institut Telecom France, FranceNong Xiao National University of Defense Technology,
ChinaOsamu Tatebe Tsukuba University, JapanPangfeng Liu National Taiwan University, TaiwanPedro Medeiros New University of Lisbon, PortugalPradip K. Srimani Clemson University, USAPutchong Uthayopas Kasetsart University, ThailandRaphael Couturier LIFC, University of Franche Comte, France
X Organization
Reen-Cheng Wang National Taitung University, TaiwanRodrigo Mello University of Sao Paulo, BrazilRonald H. Perrott Queen’s University Belfast, UKRui Zhang Palo Alto Research Center, USARuppa K. Thulasiram University of Manitoba, CanadaSabah Mohammed Lakehead University, CanadaSajid Hussain Acadia University, CanadaSasu Tarkoma University of Helsinki, FinlandSatoshi Sekiguchi AIST, JapanSeungjong Park Louisiana State University, USASherali Zeadally University of the District of Columbia, USASun-Yuan Hsieh National Cheng Kung University, TaiwanTaegyu Lee Korea Institute of Industrial Technology
(KITECH), KoreaTaeweon Suh Korea University, KoreaTakuro Yonezawa Keio University, JapanTatsuo Nakajima Waseda University, JapanTing-Wei Hou National Cheng Kung University, TaiwanTomas Margalef Burrull Universitat Autonoma de Barcelona, SpainTommi Mikkonen Tampere University of Technology, FinlandTrung Q. Duong Blekinge Institute of Technology, SwedenVictor Malyshkin Russian Academy of Sciences, RussiaWang-Chien Lee Penn State University, USAWasim Raad King Fahd University of Petroleum and
Minerals, Saudi ArabiaWeijun Xiao Virginia Commonwealth University, USAWeili Han Fudan University, ChinaWeng Fai Wong National University of Singapore, SingaporeWenguang Chen Tsinghua University, ChinaWon Woo Ro Yonsei University, KoreaXiangjian He University of Technology Sydney, AustraliaXiaowu Chen Beihang University, ChinaYanmin Zhu Imperial College London, UKYeh-Ching Chung National Tsing Hua University, TaiwanYong-Kee Jun Gyeongsang National University, KoreaYuanfang Chen Dalian University of Technology, ChinaYuezhi Zhou Tsinghua University, ChinaYuhong Yan Concordia University, CanadaYulei Wu University of Bradford, UKZhifeng Yun Louisiana State University, USAZhiwen Yu Northwestern Polytechnical University, China
Message from the UMAS 2013 Chair
Welcome to the proceedings of the 2013 International Workshop on Ubiquitousand Multimedia Application Systems (UMAS 2013), jointly held with GPC 2013in Seoul, Korea, during May 9–11, 2013.
The fast developments in the electronics industry and the emerging conver-gence of the triple (video, voice, and data) signal services have allowed mediacommunications and computing to increase ubiquitously. Meanwhile, the em-bedded systems, i.e., computers inside products, have been widely adopted inmany domains including multimedia communications, traditional control sys-tems, medical instruments, wired and wireless communication devices, aerospaceequipment, human–computer interfaces, and sensor networks. These services cre-ate our consumer and brand environment and have been contributing extensivelyand more closely to our life experience, especially the applications in mobile andother embedded devices. With the increasing number of customers who wouldlike to own a ubiquitous multimedia service because of the convenience, the re-quirements for this kind of service from customers are increasing, such as thequality, speed, and electric consumption. Therefore, the UMAS technologies havebecome state-of-the-art research topics and are expected to have an importantrole in the future.
UMAS 2013 aimed to advance ubiquitous multimedia techniques and embed-ded software and systems research, development, and design competence, and toenhance international communication and collaboration. The workshop coverstraditional core areas of media and embedded systems in architecture, software,hardware, real-time computing, and testing and verification, as well as new ar-eas of special emphasis: pervasive/ubiquitous computing and sensor networks,HW/SW co-, wireless communications, power-aware computing, security anddata protection, and multimedia.
UMAS 2013 was supported by many people and organizations. We would alsolike to express our appreciation to the organizers of GPC 2013, especially JamesJ. Park, for their constant support and kind help in the related items of UMAS2013. Thanks to all the Program Committee members for their valuable timeand effort in reviewing the papers. Without their help and advice, this programwould not have been successful.
Ching-Nung Yang
UMAS 2013 Organization
General Chair
Ching-Nung Yang National Dong Hwa University, Taiwan
Program Chairs
Cheonshik Kim Sejong University, KoreaEun-Jun Yoon Kyungil University, KoreaZhang Xinpeng Shanghai University, China
Session Chairs
You-Sik Hong Sangji University, KoreaJungyeon Shim Kangnam University, KoreaWoontack Woo Kwangju Institute of Science and Technology,
KoreaMinho Lee Kyungpook National University, KoreaKyu-Dae Lee Kongju National University, KoreaRaylin Tso National Chengchi University, Taiwan
Steering Committee
Injung Park Dankuk University, KoreaYong-Soo Choi Korea University, KoreaSuk-Hwan Lee Tongmyung University, KoreaSeongah Chin Sungkyul University, KoreaDo Hyeun Kim Jeju National University
Publicity Chairs
Beongku An Hongik University, KoreaHyoung-Joong Kim Korea University, KoreaKwang-Chun Ho Hansung University, KoreaSeungcheon Kim Hansung University, KoreaHoojin Lee Hansung University, Korea
Program Committee
Klaus Meißner Technische Universitat Dresden, GermanyJinsuk Baek Winston Salem State University, USAXiao Dong Wang Science & Technology, UK
XIV UMAS 2013 Organization
Wei-Jen Wang National Central University, TaiwanDa-Zhi Sun Tianjin University, ChinaJun Jo Griffith University, AustraliaWayne Pullan Griffith University, AustraliaVallipuram
Muthukkumarasamy Griffith University, AustraliaJunhu Wang Griffith University, AustraliaAlan Liew Griffith University, AustraliaBela Stantic Griffith University, AustraliaAnne Nguyen Griffith University, AustraliaSoo-Hyun Park Kookmin University, KoreaMoon-Wan Kim Tokyo University of Information Sciences,
JapanTzung-Shi Chen National University of Tainan, TaiwanWei-Chen Cheng Academia Sinica, TaiwanAlex M.H. Kuo University of Victoria, CanadaTruong Hai Bang University of Information Technology, VietnamRonald L. Hartung Franklin University, USAGyei-Kark Park National Maritime University, KoreaHyungJun Kim Hansei University, KoreaJae Gi Son KETI (Korea Electronics Technology
Institute), KoreaDongkyoo Shin Sejong University, KoreaDongil Shin Sejong University, KoreaMoon-Goo Lee Kimpo College, KoreaMyoung Nam Kim Kyungpook National University, KoreaYoung-Sun Im Kookje College, KoreaShi Xue Dou Wollongong University, AustraliaPhan Trung Huy Hanoi University, VietnamByung-Tae Chun Hankyong University, KoreaKwang-Baek Kim Silla University, KoreaJang-Geun Ki Kongju National University, KoreaKeehong Um Hansei University, KoreaWonil Kim Sejong University, KoreaJoon-Shik Park KETI (Korea Electronics Technology
Institute), KoreaMasaaki Fujiyoshi Tokyo Metropolitan University, JapanHae-Kyung Seong Hanyang Women’s College, KoreaYoung Huh KEIT(Korea Evaluation Institute of Industrial
Technology), KoreaYoung-Ho Park Sejong Cyber University, KoreaChoonsuk Oh Sun Moon University, KoreaElena Tsomko Namseoul University, KoreaSang-Woon Lee Nameseoul University, KoreaIn-Hwa Hong KETI (Korea Electronics Technology
Institute), Korea
DATICS-GPC 2013: Design, Analysis and Tools
for Integrated Circuits and Systems
The International Workshop DATICS-GPC 2013: Design, Analysis and Toolsfor Integrated Circuits and Systems at the 8th International Conference on Gridand Pervasive Computing took place in Seoul, South Korea, May 9–11, 2013.
The DATICS workshops were initially created by a network of researchersand engineers both from academia and industry in the areas of design, analysisand tools for integrated circuits and systems. Recently, DATICS has been ex-tended to the fields of communication, computer science, software engineeringand information technology.
The main target of DATICS-GPC 2013 was to bring together software/hardware engineering researchers, computer scientists, practitioners and peoplefrom industry to exchange theories, ideas, techniques and experiences related toall aspects of DATICS.
The International Program Committee (IPC) of DATICS-GPC 2013 con-sisted of about 150 experts in the related fields both from academia and industry.DATICS-GPC 2013 was partnered with CEOL: Centre for Efficiency-OrientedLanguages (Ireland), Minteos (Italy), KATRI (Japan and Hong Kong), Dis-tributed Thought (UK), ASIC LAB - Myongji University (South Korea), BalticInstitute of Advanced Technology - BPTI (Lithuania), Solari (Hong Kong), Tran-scend Epoch (Hong Kong) and Xi’an Jiaotong-Liverpool University — XJTLU(China — UK).
The DATICS-GPC 2013 technical program included seven papers that wereorganized into lecture sessions. On behalf of the IPC, we would like to welcomeyou to the proceedings of DATICS-GPC 2013.
Ka Lok ManNan Zhang
DATICS-GPC 2013 Organization
General Chairs
Ka Lok Man Xi’an Jiaotong-Liverpool University, ChinaNan Zhang Xi’an Jiaotong-Liverpool University, China
Organizing Chairs
Michele Mercaldi EnvEve, SwitzerlandChi Un Lei University of Hong KongTomas Krilavicius Baltic Institute of Advanced Technologies and
Vytautas Magnus University, Lithuania
Program Committee
Vladimir Hahanov Kharkov National University of RadioElectronics, Ukraine
Paolo Prinetto Politecnico di Torino, ItalyMassimo Poncino Politecnico di Torino, ItalyAlberto Macii Politecnico di Torino, ItalyJoongho Choi University of Seoul, South KoreaWei Li Fudan University, ChinaMichel Schellekens University College Cork, IrelandEmanuel Popovici University College Cork, IrelandJong-Kug Seon LS Industrial Systems R&D Center,
South KoreaUmberto Rossi STMicroelectronics, ItalyFranco Fummi University of Verona, ItalyGraziano Pravadelli University of Verona, ItalyYui Fai Lam Hong Kong University of Science and
Technology, Hong KongJinfeng Huang Philips and LiteOn Digital Solutions
Netherlands, The NetherlandsMonica Donno Minteos, ItalyJun-Dong Cho Sung Kyun Kwan University, South KoreaAHM Zahirul Alam International Islamic University Malaysia,
MalaysiaGregory Provan University College Cork, IrelandMiroslav N. Velev Aries Design Automation, USAM. Nasir Uddin Lakehead University, CanadaDragan Bosnacki Eindhoven University of Technology,
The Netherlands
XVIII DATICS-GPC 2013 Organization
Milan Pastrnak Atos IT Solutions and Services, SlovakiaJohn Herbert University College Cork, IrelandZhe-Ming Lu Sun Yat-Sen University, ChinaJeng-Shyang Pan National Kaohsiung University of Applied
Sciences, TaiwanChin-Chen Chang Feng Chia University, TaiwanMong-Fong Horng Shu-Te University, TaiwanLiang Chen University of Northern British Columbia,
CanadaChee-Peng Lim University of Science Malaysia, MalaysiaSalah Merniz Mentouri University, Constantine, AlgeriaOscar Valero University of Balearic Islands, SpainYang Yi Sun Yat-Sen University, ChinaFranck Vedrine CEA LIST, FranceBruno Monsuez ENSTA, FranceKang Yen Florida International University, USATakenobu Matsuura Tokai University, JapanR. Timothy Edwards MultiGiG, Inc., USAOlga Tveretina Karlsruhe University, GermanyMaria Helena Fino Universidade Nova De Lisboa, PortugalAdrian Patrick O’Riordan University College Cork, IrelandGrzegorz Labiak University of Zielona Gora, PolandJian Chang Texas Instruments, Inc., USAYeh-Ching Chung National Tsing-Hua University, TaiwanAnna Derezinska Warsaw University of Technology, PolandKyoung-Rok Cho Chungbuk National University, South KoreaYuanyuan Zeng Wuhan University, ChinaD.P. Vasudevan University College Cork, IrelandArkadiusz Bukowiec University of Zielona Gora, PolandMaziar Goudarzi Sharif University of Technology, IranJin Song Dong National University of Singapore, SingaporeDhamin Al-Khalili Royal Military College of Canada, CanadaZainalabedin Navabi University of Tehran, IranLyudmila Zinchenko Bauman Moscow State Technical University,
RussiaMuhammad Almas Anjum National University of Sciences and Technology
(NUST), PakistanDeepak Laxmi Narasimha University of Malaya, MalaysiaDanny Hughes Katholieke Universiteit Leuven, BelgiumJun Wang Fujitsu Laboratories of America, Inc., USAA.P. Sathish Kumar PSG Institute of Advanced Studies, IndiaN. Jaisankar VIT University, India
DATICS-GPC 2013 Organization XIX
Atif Mansoor National University of Sciences and Technology(NUST), Pakistan
Steven Hollands Synopsys, IrelandSiamak Mohammadi University of Tehran, IranFelipe Klein State University of Campinas (UNICAMP),
BrazilEng Gee Lim Xi’an Jiaotong-Liverpool University, ChinaKevin Lee Murdoch University, AustraliaPrabhat Mahanti University of New Brunswick, Saint John,
CanadaKaiyu Wan Xi’an Jiaotong-Liverpool University, ChinaTammam Tillo Xi’an Jiaotong-Liverpool University, ChinaYanyan Wu Xi’an Jiaotong-Liverpool University, ChinaWen Chang Huang Kun Shan University, TaiwanMasahiro Sasaki The University of Tokyo, JapanShishir K. Shandilya NRI Institute of Information Science and
Technology, IndiaJ.P.M. Voeten Eindhoven University of Technology,
The NetherlandsWichian Sittiprapaporn Mahasarakham University, ThailandAseem Gupta Freescale Semiconductor Inc., Austin, USAKevin Marquet Verimag Laboratory, FranceMatthieu Moy Verimag Laboratory, FranceRamy Iskander LIP6 Laboratory, FranceSuryaprasad Jayadevappa PES School of Engineering, IndiaShanmugasundaram
Hariharan Pavendar Bharathidasan College ofEngineering and Technology, India
Chung-Ho Chen National Cheng-Kung University, TaiwanKyung Ki Kim Daegu University, South KoreaShiho Kim Chungbuk National University, KoreaHi Seok Kim Cheongju University, KoreaBrian Logan University of Nottingham, UKAsoke Nath St. Xavier’s College (Autonomous), IndiaTharwon
Arunuphaptrairong Chulalongkorn University, ThailandShin-Ya Takahasi Fukuoka University, JapanCheng C. Liu University of Wisconsin at Stout, USAFarhan Siddiqui Walden University, Minneapolis, USAKatsumi Wasaki Shinshu University, JapanPankaj Gupta Microsoft Corporation, USATaikyeong Jeong Myongji University, South KoreaMasoud Daneshtalab University of Turku, FinlandAmit Chaudhry Technology Panjab University, IndiaBharat Bhushan Agarwal I.F.T.M., University, India
XX DATICS-GPC 2013 Organization
Abhilash Goyal Oracle (SunMicrosystems), USAYue Yang EJITEC, ChinaBoguslaw Cyganek AGH University of Science and Technology,
PolandYeo Kiat Seng Nanyang Technological University, SingaporeYoungmin Kim UNIST Academy-Industry Research
Corporation, South KoreaTom English Xlinx, IrelandNicolas Vallee RATP, FranceMou Ling Dennis Wong Swinburne University of Technology, MalaysiaRajeev Narayanan Cadence Design Systems, Austin, USAXuan Guan Freescale Semiconductor, Austin, USAPradip Kumar Sadhu Indian School of Mines, IndiaFei Qiao Tsinghua University, ChinaChao Lu Purdue University, USADing-Yuan Cheng National Chiao Tung University, TaiwanAmir-Mohammad Rahmani University of Turku, FinlandShin-Il Lim Seokyeong University, Seoul Korea
Message from the FSTA 2013 Symposium Chair
Welcome to the proceedings of the 2013 International Workshop on Future Sci-ence Technologies and Applications (FSTA 2013).
The Internet as well as cellular and wireless systems are now converging, thusgiving birth to the future Internet. The International Workshop on FSTA 2013brought together scientists, engineers, computer users, and students to exchangeand share their experiences, new ideas, and research results on all aspects (theory,applications and tools) of computer and information science, and to discuss thepractical challenges encountered and the solutions adopted. The Workshop onFuture Science Technologies and Applications aims to serve as an internationalforum for researchers and practitioners willing to present their early researchresults and share experiences in the field.
FSTA 2013 contained high-quality research papers submitted by researchersfrom all over the world. Each submitted paper was peer-reviewed by reviewerswho are experts in the subject area of the paper. Based on the review results,the Program Committee accepted 13 papers.
In organizing an international workshop, the support and help of many peopleis needed. We would like to thank all authors for their work and presentation,all members of the Program Committee and reviewers for their cooperation andtime spent in the reviewing process. Particularly, we thank the founding SteeringChair of GPC 2013, James J. (Jong Hyuk) Park, Workshop Chair GPC 2013,Joon-Min Gil, and the Program Chair of GPC 2013. Finally, special thanks areextended to the staff of FSTA 2013, who contributed greatly to the success ofthe conference.
Namje Park
FSTA 2013 Organization
Steering Chair
James J. Park SeoulTech, Korea
General Chairs
Stefanos Gritzalis University of the Aegean, GreeceYoung-Sik Jeong Wonkwang University, KoreaHan-Chieh Chao National Ilan University, Taiwan
Program Chair
Namje Park Jeju National University, Korea
Publicity Chairs
Deqing Zou Huazhong University of Science andTechnology, China
Damien Sauveron University of Limoges, FranceNeil Y. Yen The University of Aizu, Japan
Program Committee
Qiang Zhu The University of Michigan, USAShao-Shin Hung WuFeng University, TaiwanTat-Chee Wan Universiti Sains MalaysiaJun Xiao East China Normal University, ChinaYoung soo Kim Electronics and Telecommunications Research
Institute, KoreaOliver Amft Eindhoven University of Technology,
The NetherlandsChangjing Shang Aberystwyth University, UKWanqing Tu Glyndwr University, UKKok-Seng Wong Soongsil University, KoreaNarayanan Kulathuramaiyer Universiti Malaysia Sarawak, MalaysiaNik Bessis University of Derby, UKQinghe Du Xi’an Jiaotong University, ChinaKyoil Cheong Electronics and Telecommunications Research
Institute, Korea
XXIV FSTA 2013 Organization
Rachid Anane Coventry University, UKMehul Bhatt University of Bremen, GermanyZhou Su Waseda Univ, JapanChee-Peng LIM Deakin University, AustraliaRami Yared Japan Advanced Institute of Science and
Technology, JapanM. Elena Renda IIT-CNR, ItalyDooho Choi Electronics and Telecommunications Research
Institute, KoreaYoungsook Lee Howon University, KoreaSoohyun Oh Hoseo University, KoreaTaesung Lee KISA, Korea
Table of Contents
Cloud, Cluster and Grid I
Transparency in Cloud Business: Cluster Analysis of Softwareas a Service Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Jonas Repschlaeger
Distributed Accounting in Scope of Privacy Preserving . . . . . . . . . . . . . . . 11Marcus Hilbrich and Rene Jakel
Distributed Virtual Machine Monitor for Distributed Cloud ComputingNodes Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Li Ruan, Jinbing Peng, Limin Xiao, and Mingfa Zhu
Differentiated Policy Based Job Scheduling with Queue Model andAdvanced Reservation Technique in a Private CloudEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Shyamala Loganathan and Saswati Mukherjee
Scaling Out Recommender System for Digital Librarieswith MapReduce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Lun-Chi Chen, Ping-Jen Kuo, I-En Liao, and Jyun-Yao Huang
Layering of the Provenance Data for Cloud Computing . . . . . . . . . . . . . . . 48Muhammad Imran and Helmut Hlavacs
JCL: An OpenCL Programming Toolkit for HeterogeneousComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Tyng-Yeu Liang and Yu-Jie Lin
Network-Aware Multiway Join for MapReduce . . . . . . . . . . . . . . . . . . . . . . . 73Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, andJong Hyuk Park
Automatic Resource Scaling for Web Applications in the Cloud . . . . . . . . 81Ching-Chi Lin, Jan-Jan Wu, Pangfeng Liu, Jeng-An Lin, andLi-Chung Song
Implementation of Cloud-RAID: A Secure and Reliable Storageabove the Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Maxim Schnjakin and Christoph Meinel
An Improved Min-Min Task Scheduling Algorithm in GridComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Soheil Anousha and Mahmoud Ahmadi
XXVI Table of Contents
Cloud, Cluster and Grid II
Heterogeneous Diskless Remote Booting System on Cloud OperatingSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Jin-Neng Wu, Yao-Hsing Ko, Kuo-Ming Huang, and Mu-Kai Huang
RTRM: A Response Time-Based Replica Management Strategyfor Cloud Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Xiaohu Bai, Hai Jin, Xiaofei Liao, Xuanhua Shi, and Zhiyuan Shao
Secure Hadoop with Encrypted HDFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Seonyoung Park and Youngseok Lee
VM Migration for Fault Tolerance in Spot Instance Based CloudComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Daeyong Jung, SungHo Chin, Kwang Sik Chung, and HeonChang Yu
A Cloud Based Natural Disaster Management System . . . . . . . . . . . . . . . . 152Mansura Habiba and Shamim Akhter
A Hybrid Grid/Cloud Distributed Platform: A Case Study . . . . . . . . . . . . 162Mohamed Ben Belgacem, Haithem Hafsi, and Nabil Abdennadher
Comparison of Two Yield Management Strategies for Cloud ServiceProviders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Mohammad Mahdi Kashef, Azamat Uzbekov, Jorn Altmann, andMatthias Hovestadt
Comparing Java Virtual Machines for Sensor Nodes – First Glance:Takatuka and Darjeeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Oliver Maye and Michael Maaser
Research on Opinion Formation of Microblog in the View of Multi-agentSimulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Jianyong Zhang, Qihui Mi, Longji Hu, and Yue Tang
Implementation of Cloud IaaS for Virtualization with Live Migration . . . 199Chao-Tung Yang, Kuan-Lung Huang, William Cheng-Chung Chu,Fang-Yi Leu, and Shao-Feng Wang
Middleware, Resource Management
Security Considerations in Cloud Computing VirtualizationEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Sang-Soo Yeo and Jong Hyuk Park
Medicine Rating Prediction and Recommendation in Mobile SocialNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Shuai Li, Fei Hao, Mei Li, and Hee-Cheol Kim
Table of Contents XXVII
Cloud Browser: Enhancing the Web Browser with CloudSessions and Downloadable User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Antero Taivalsaari, Tommi Mikkonen, and Kari Systa
Visual Novels: An Methodology Guideline for Pervasive EducationalGames that Favors Discernment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Francisco Lepe Salazar, Tatsuo Nakajima, and Todorka Alexandrova
An Optimal Radio Access Network Selection Method for HeterogeneousWireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Glaucio H.S. Carvalho, Isaac Woungang,Md. Mizanur Rahman, and Alagan Anpalagan
Desktop Grid Computing at the Age of the Web . . . . . . . . . . . . . . . . . . . . . 253Leila Abidi, Christophe Cerin, and Mohamed Jemni
A Novel Model for Greenhouse Control Architecture . . . . . . . . . . . . . . . . . . 262Miran Baek, Myeongbae Lee, Honggean Kim, Taehyung Kim,Namjin Bae, Yongyun Cho, Jangwoo Park, and Changsun Shin
Mobile, Peer-to-Peer and Pervasive Computing
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks . . . . . . 270Chittaranjan Hota, Vikram Nunia, Mario Di Francesco,Jukka K. Nurminen, and Antti Yla-Jaaski
CE-SeMMS: Cost-Effective and Secure Mobility Management SchemeBased on SIP in NEMO Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Chulhee Cho, Jae Young Choi, Younghwa Cho, and Jong Pil Jeong
A System-Level Approach for Designing Context-Aware DistributedPervasive Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Kevin I-Kai Wang, HeeJong Park, Zoran Salcic, andPanith Ratnayaka
Architecture of a Context Aware Framework for Automated MobileDevice Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba, andCheonshik Kim
AMM-PF: Additional Mobility Management Scheme Based on PointerForwarding in PMIPv6 Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Seung Yoon Park, Jae Young Choi, and Jong Pil Jeong
Multi-core and High Performance Computing
The Evaluation and Optimization of 3-D Jacobi Iteration on a StreamProcessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Ying Zhang, Gen Li, Yongjin Li, Caixia Sun, and Pingjing Lu
XXVIII Table of Contents
DDASTM: Ensuring Conflict Serializability Efficiently in DistributedSTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Yu Zhang, Hai Jin, and Xiaofei Liao
Research on Log Pre-processing for Exascale System Using SparseRepresentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Lei Zhu, Jianhua Gu, Tianhai Zhao, and Yunlan Wang
Other GPC Related Topics
Using Event-Based Style for Developing M2M Applications . . . . . . . . . . . . 348Truong-Giang Le, Olivier Hermant, Matthieu Manceny,Renaud Pawlak, and Renaud Rioboo
Weighted Mining Association Rules Based Quantity Item with RFMScore for Personalized u-Commerce Recommendation System . . . . . . . . . . 367
Young Sung Cho, Si Choon Noh, and Song Chul Moon
Priority-Based Live Migration of Virtual Machine . . . . . . . . . . . . . . . . . . . . 376Bangjie Jiang, Junmin Wu, Xiaodong Zhu, and Die Hu
Improvement of the MCMA Blind Equalization Performance Usingthe Coordinate Change Method in 16-APSK . . . . . . . . . . . . . . . . . . . . . . . . 386
Youngguk Kim and Heung-Gyoon Ryu
Postural Transition Detection Using a Wireless Sensor ActivityMonitoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Richelle LeMay, Sangil Choi, Jong-Hoon Youn, and Jay Newstorm
Parallel and Distributed Systems
A Dedicated Serialization Scheme in Homogeneous Cluster RPCCommunication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Yong Wan, Dan Feng, Fang Wang, and Tingwei Zhu
Friends Based Keyword Search over Online Social Networks . . . . . . . . . . . 413Jinzhou Huang and Hai Jin
GPU Virtualization Support in Cloud System . . . . . . . . . . . . . . . . . . . . . . . 423Chih-Yuan Yeh, Chung-Yao Kao, Wei-Shu Hung, Ching-Chi Lin,Pangfeng Liu, Jan-Jan Wu, and Kuang-Chih Liu
MGMR: Multi-GPU Based MapReduce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433Yi Chen, Zhi Qiao, Hai Jiang, Kuan-Ching Li, and Won Woo Ro
Based on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358Xiaoling Wu, Huawei Fu, Xiaomin He, Guangcong Liu, Jianjun Li,Hainan Chen, Qianqiu Wang, and Qing He
Retracted: Scheduling Optimization of the RFID Tagged ExplosiveStorage
Table of Contents XXIX
Security and Privacy
DDoS Analysis Using Correlation Coefficient Based on KolmogorovComplexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Sung-ju Kim, Byung Chul Kim, and Jae Yong Lee
An Efficient Attribute-Based Encryption and Access Control Schemefor Cloud Storage Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Jyun-Yao Huang, Chen-Kang Chiang, and I-En Liao
Active One-Time Password Mechanism for User Authentication . . . . . . . . 464Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, and Chung-Yu Lin
Hardware Acceleration for Cryptography Algorithms by HotspotDetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Jed Kao-Tung Chang, Chen Liu, and Jean-Luc Gaudiot
Chaotic Wireless Communication System Using Retrodirective ArrayAntenna for Advanced High Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Junyeong Bok and Heung-Gyoon Ryu
Policy-Based Customized Privacy Preserving Mechanism for SaaSApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Yuliang Shi, Zhen Jiang, and Kun Zhang
QoC-Aware Access Control Based on Fuzzy Inference for PervasiveComputing Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Yao Ma, Hongwei Lu, and Zaobin Gan
Per-File Secure Deletion Combining with Enhanced Reliabilityfor SSDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Yi Qin, Dan Feng, Wei Tong, Jingning Liu, Yang Hu, andZhiming Zhu
An Energy-Aware Secured Routing Protocol for Mobile Ad HocNetworks Using Trust-Based Multipath . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
Isaac Woungang, Sanjay Kumar Dhurandher, and Michael Sahai
A Grid-Based Approximate K-NN Query Processing Algorithmfor Privacy Protection in Location-Based Services . . . . . . . . . . . . . . . . . . . . 526
Miyoung Jang and Jae-Woo Chang
Density-Based K-Anonymization Scheme for Preserving Users’ Privacyin Location-Based Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Hyunjo Lee and Jae-Woo Chang
XXX Table of Contents
Ubiquitous Communications, Sensor Networking,and RFID
A Routing Mechanism Using Virtual Coordination Anchor Node Applyto Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
Chih-Hsiao Tsai, Kai-Ti Chang, Cheng-Han Tsai, andYing-Hong Wang
Effect of Genetic Parameters in Tour Scheduling and RecommenderServices for Electric Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Byung-Jun Lee,Seulbi Lee, and Dae-Yong Im
Enabling Massive Machine-to-Machine Communicationsin LTE-Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Kyungkoo Jun
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks . . . . . 570Hyun-Ho Shin, Seungjin Lee, and Byung-Seo Kim
Smart Watch and Monitoring System for Dementia Patients . . . . . . . . . . . 577Dong-Min Shin, DongIl Shin, and Dongkyoo Shin
A Lesson from the Development of Surveillance and ReconnaissanceSensor Networks Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Daesik Kim, Seongkee Lee, and Mirim Ahn
A Classifier Algorithm Exploiting User’s EnvironmentalContext and Bio-signal for U-Home Services . . . . . . . . . . . . . . . . . . . . . . . . . 594
HyunJu Lee, DongIl Shin, Dongkyoo Shin, and SooHan Kim
DNA-S: Dynamic Cellular Network Architecture for SmartCommunications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
Taegyu Lee and Gi-Soo Chung
Ubiquitous and Multimedia Application Systems
Predicting of Abnormal Behavior Using Hierarchical Markov ModelBased on User Profile in Ubiquitous Environment . . . . . . . . . . . . . . . . . . . . 612
Jaewan Shin, Dongkyoo Shin, and DongIl Shin
Advanced Facial Skin Rendering with Actual Fresnel Refractive IndexReflecting Facial Tissue Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Sunghee Lee and Seongah Chin
Emotion Recognition Technique Using Complex Biomedical SignalAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Guyoun Hwang, Heejun Cho, Dongkyoo Shin, and DongIl Shin
Table of Contents XXXI
RWA: Reduced Whole Ack Mechanism for Underwater Acoustic SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Soo Young Shin and Soo Hyun Park
Data Hiding Based on Palette Images Using Weak Basesof Z2-Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh,Le Quang Hoa, and Ching-Nung Yang
Adaptive Smart Vehicle Middleware Platform for Aspect OrientedSoftware Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Jin-Hong Kim and Seung-Cheon Kim
Design, Analysis and Tools for Integrated Circuitsand Systems
Parallel Generation of Optimal Mortgage Refinancing ThresholdRates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Nan Zhang, Dejun Xie, Eng Gee Lim, Kaiyu Wan, and Ka Lok Man
Pricing American Options on Dividend-Paying Stocks and Estimatingthe Greek Letters Using Leisen-Reimer Binomial Trees . . . . . . . . . . . . . . . . 676
Nan Zhang, Kaiyu Wan, Eng Gee Lim, and Ka Lok Man
A Resource-Centric Architecture for Service-Oriented Cyber PhysicalSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Kaiyu Wan and Vangalur Alagar
Implied Volatilities of S&P 100 Index with Applications to FinancialMarket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Jin Zheng, Nan Zhang, and Dejun Xie
RF Characteristics of Wireless Capsule Endoscopy in Human Body . . . . 700Meng Zhang, Eng Gee Lim, Zhao Wang, Tammam Tillo,Ka Lok Man, and Jing Chen Wang
Building a Laboratory Surveillance System via a Wireless SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Chi-Un Lei, J.K. Seon, Zhun Shen, Ka Lok Man,Danny Hughes, and Youngmin Kim
S-Theory: A Unified Theory of Multi-paradigm SoftwareDevelopment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Danny Hughes, Nelly Bencomo, Brice Morin, Christophe Huygens,Zhun Shen, and Ka Lok Man
XXXII Table of Contents
Future Science Technologies and Applications
Design of J-VTS Middleware Based on IVEF Protocol . . . . . . . . . . . . . . . . 723Taekyeong Kang and Namje Park
On the Use of a Hash Function in a 3-Party Password-BasedAuthenticated Key Exchange Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
Youngsook Lee and Dongho Won
A Sequence Classification Model Based on Pattern Coverage Rate . . . . . . 737I-Hui Li, Jyun-Yao Huang, I-En Liao, and Jin-Han Lin
Development of STEAM Program and Teaching Method for UsingLEGO Line Tracer Robot in Elementary School . . . . . . . . . . . . . . . . . . . . . . 746
Yeonghae Ko and Namje Park
Improved Authentication Scheme with Anonymity for Roaming Servicein Global Mobility Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752
Youngseok Chung, Youngsook Lee, and Dongho Won
Cryptanalysis of an Authenticated Group Key Transfer ProtocolBased on Secret Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
Mijin Kim, Namje Park, and Dongho Won
Development of the STEAM-Based Media Education Materialsfor Prevention of Media Dysfunction in Elementary School . . . . . . . . . . . . 767
Jaeho An and Namje Park
Access Control Technique of Illegal Harmful Contents for ElementarySchoolchild Online Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773
Namje Park and Yeonghae Ko
The Concept of Delegation of Authorization and Its Expansionfor Multi Domain Smart Grid System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Mijin Kim and Namje Park
Security Requirement of End Point Security Software . . . . . . . . . . . . . . . . . 788Hyun-Jung Lee, Youngsook Lee, and Dongho Won
Collecting and Filtering Out Phishing Suspicious URLs UsingSpamTrap System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Inkyung Jeun, Youngsook Lee, and Dongho Won
Improvement of a Chaotic Map Based Key Agreement Protocol ThatPreserves Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Hyunsik Yang, Jin Qiuyan, Hanwook Lee, Kwangwoo Lee, andDongho Won
Solving Router Nodes Placement Problem with Priority ServiceConstraint in WMNs Using Simulated Annealing . . . . . . . . . . . . . . . . . . . . . 811
Chun-Cheng Lin, Yi-Ling Lin, and Wan-Yu Liu
Table of Contents XXXIII
Green and Human Information Technology
Topology Information Based Spare Capacity Provisioning in WDMNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Hoyoung Hwang and Seung-Cheon Kim
A Contents Service Profit Model Based on the Quality ofExperience and User Group Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . 826
Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong, and Yong Lee
Toward Hybrid Model for Architecture-Oriented Semantic Schemaof Self-adaptive System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Jin-Hong Kim and Seung-Cheon Kim
Optimal Channel Sensing in Cognitive Radio Network with MultipleSecondary Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Heejung Yu
H.264 Video Delivery over Wireless Mesh Networks Based on JointAdaptive Cross-Layer Mapping and MDCA MAC . . . . . . . . . . . . . . . . . . . . 846
Byung Joon Oh and Ki Young Lee
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDMSignal by MUSIC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Xin Wang and Heung-Gyoon Ryu
A White-List Based Security Architecture (WLSA) for the Safe MobileOffice in the BYOD Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
Jaeho Lee, Yongjin Lee, and Seung-Cheon Kim
A Study of Vessel Deviation Prevention Scheme Using a Triangulationin a Seaway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866
Shu Chen, Rashid Ahmad, Byung-Gil Lee, Byung-Doo Kim, andDo-Hyeun Kim
Analysis of Energy Consumption in Edge Router with Sleep Modefor Green OBS Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
Wonhyuk Yang, Mohamed A. Ahmed, Ki-Beom Lee, andYoung-Chon Kim
VLC Based Multi-hop Audio Data Transmission System . . . . . . . . . . . . . . 880Le The Dung, Seungwan Jo, and Beongku An
A Practical Adaptive Scheme for Enhancing Network Stability in MobileAd-Hoc Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 886
Le The Dung, Sue Hyung Ha, and Beongku An
A Geomulticast Routing Protocol Based on Route Stability in MobileAd-Hoc Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
Sue Hyung Ha, Le The Dung, and Beongku An
XXXIV Table of Contents
RFID-Based Indoor Location Recognition System for EmergencyRescue Evacuation Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899
Dae-Man Do, Maeng-Hwan Hyun, and Young-Bok Choi
A Symmetric Hierarchical Clustering Related to the Sink Position andPower Threshold for Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Joongjin Kook
A Study of Fire Refuge Guide Simulator Based on Sensor Networks . . . . 914Jun-Pill Boo, Sang-Chul Kim, Dong-Hwan Park,Hyo-Chan Bang, and Do-Hyeun Kim
Design of Parallel Pipelined Algorithm for Field ArithmeticArchitecture Based on Cellular Array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920
Kee-Won Kim and Jun-Cheol Jeon
Follower Classification Through Social Network Analysis in Twitter . . . . 926Jae-Wook Seol, Kwang-Yong Jeong, and Kyung-Soon Lee
An Initial Quantization Parameter Decision Method Based on FrameComplexity with Multiple Objectives of GOP for Rate Controlof H.264 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
Yalin Wu and Sun-Woo Ko
The Development of Privacy Telephone Sets in Encryption Systemagainst Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939
Seok-Pil Lee and Eui-seok Nahm
New ID-Based Proxy Signature Scheme with Message Recovery . . . . . . . . 945Eun-Jun Yoon, YongSoo Choi, and Cheonshik Kim
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
Erratum
Scheduling Optimization of the RFID Tagged Explosive StorageBased on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xiaoling Wu, Huawei Fu, Xiaomin He, Guangcong Liu, Jianjun Li,Hainan Chen, Qianqiu Wang, and Qing He
E1