


default search action
12th TrustCom / 11th ISPA / 12th IUCC 2013: Melbourne, Australia
- 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5022-0

The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
Session 1: Privacy in Cloud Computing
- Gaofeng Zhang, Yun Yang, Jinjun Chen:

A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing. 1-8 - Chang Liu, Xuyun Zhang

, Chengfei Liu
, Yun Yang, Rajiv Ranjan
, Dimitrios Georgakopoulos
, Jinjun Chen:
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing. 9-16 - Juan Li, Yan Bai, Nazia Zaman:

A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud. 17-23 - Bernd Zwattendorfer, Daniel Slamanig

:
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud. 24-33 - Xiaolin Si, Pengpian Wang, Liwu Zhang:

KP-ABE Based Verifiable Cloud Access Control Scheme. 34-41
Session 2: Security and Trust in Network Routing
- Chuanhao Qu, Lei Ju, Zhiping Jia, Huaqiang Xu, Longpeng Zheng:

Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks. 42-49 - Shaahin Madani, Ibrahim Khalil

:
Garbled Routing (GR): Towards Unification of Anonymous Networks. 50-57 - Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao

:
Secure Routing Based on Network Coding in Wireless Sensor Networks. 58-64 - Ming Xiang

, William Liu
, Quan Bai
:
TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks. 65-72 - Rakesh Matam, Somanath Tripathy

:
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks. 73-80
Session 3: Trust in Mobile and Wireless Networks
- Marcin Seredynski

, Riad Aggoune
, Krzysztof Szczypiorski
, Djamel Khadraoui:
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs. 81-88 - Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu, Zhiguang Chen:

Novel Physically-Embedded Data Encryption for Embedded Device. 89-93 - Aymen Boudguiga

, Alexis Olivereau, Nouha Oualha
:
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. 94-101 - Mohammad Saiful Islam Mamun, Atsuko Miyaji

:
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption. 102-109 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:

Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs. 110-117
Session 4: Privacy in Mobile and Wireless Networks
- Xun Yi, Jan Willemson

, Farid Naït-Abdesselam:
Privacy-Preserving Wireless Medical Sensor Network. 118-125 - Lingguang Lei, Yuewu Wang, Jian Zhou, Lei Wang, Zhongwen Zhang:

A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones. 126-133 - Yong Wang, Nan Zhang, Yan-mei Wu, Bin-bin Su, Yong-jian Liao:

Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment. 134-141 - Bryan Dixon, Shivakant Mishra:

Power Based Malicious Code Detection Techniques for Smartphones. 142-149 - Yu-Jia Chen

, Chia-Yu Lin
, Li-Chun Wang
:
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications. 150-155
Session 5: Security in Mobile and Wireless Networks
- Qihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu, Baohua Zhao:

ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain. 156-162 - Min Zheng, Mingshen Sun, John C. S. Lui:

Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. 163-171 - Younchan Jung

, Marnel Peradilla
, J. William Atwood:
Securing Domain Name System Combined with MIPv6 for Mobile Hosts. 172-179 - Florent Batard, Karima Boudaoud, Michel Riveill

:
Securing Mobile Mashups with SCCM. 180-187 - Soufiene Ben Othman, Abdelbasset Trad

, Habib Youssef, Hani Alzaid:
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks. 188-195
Session 6: Trust and Security in Social Networks
- Sancheng Peng, Guojun Wang, Shui Yu

:
Modeling Malware Propagation in Smartphone Social Networks. 196-201 - Zheng Yan

, Raimo Kantola, Gaowa Shi, Peng Zhang:
Unwanted Content Control via Trust Management in Pervasive Social Networking. 202-209 - Sana Hamdi, Amel Bouzeghoub, Alda Lopes Gançarski, Sadok Ben Yahia

:
Trust Inference Computation for Online Social Networks. 210-217 - Owen Sacco, John G. Breslin, Stefan Decker

:
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web. 218-225 - Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:

Preserving Utility in Social Network Graph Anonymization. 226-232
Session 7: Network Security
- Yuan Tao, Shui Yu

:
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics. 233-240 - Yuxin Meng

, Lam-for Kwok
:
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. 241-248 - Yang Yu, Zhanfei Zhou:

Rational Secret Sharing Information - Theoretically Secure against Adaptive Adversaries. 249-256 - Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi:

What is the Pattern of a Botnet? 257-264 - Yong Qiao, Yuexiang Yang, Lin Ji, Jie He:

Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences. 265-270
Session 8: Attack and Defense
- Nelcileno Virgilio de Souza Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Emerencio do Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava:

Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks. 271-276 - Jinson Zhang, Mao Lin Huang

:
Visual Analytics Model for Intrusion Detection in Flood Attack. 277-284 - Mingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun, Shenpei Chen, Xiaoya Zhu:

A Regional Statistics Detection Scheme against Sybil Attacks in WSNs. 285-291 - Abdulmohsen Almalawi

, Zahir Tari
, Adil Fahad, Ibrahim Khalil
:
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems. 292-301 - Michael N. Johnstone, Robert Thompson:

Security Aspects of Military Sensor-Based Defence Systems. 302-309
Session 9: Trusted Computing Algorithms
- Anmin Fu

, Gongxuan Zhang, Zhenchao Zhu:
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol. 310-314 - T. Raghu Vamsi Krishna, Rajesh P. Barnwal

, Soumya K. Ghosh:
MDS-Based Trust Estimation of Event Reporting Node in VANET. 315-320 - Oliver Bonham-Carter, Abhishek Parakh, Dhundy Bastola:

sEncrypt: An Encryption Algorithm Inspired from Biological Processes. 321-327 - Xavier Bonnaire, Rudyar Cortés, Fabrice Kordon, Olivier Marin

:
A Scalable Architecture for Highly Reliable Certification. 328-335 - Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. 336-345
Session 10: Privacy and Trust
- Roland Assam, Thomas Seidl

:
A Model for Context-Aware Location Identity Preservation Using Differential Privacy. 346-353 - Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake:

P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. 354-361 - Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov, Mohit Kothari, Animesh Nandi:

On the Use of LSH for Privacy Preserving Personalization. 362-371 - Jordi Soria-Comas

, Josep Domingo-Ferrer
, David Sánchez
, Sergio Martínez
:
Improving the Utility of Differentially Private Data Releases via k-Anonymity. 372-379 - Maria das Gracas da Silva Oliveira, Ruy J. G. B. de Queiroz:

Scheme of User Privacy Protection Applied to Online Marketing. 380-387 - Tianqing Zhu, Ping Xiong, Yang Xiang

, Wanlei Zhou
:
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. 388-395
Session 11: Security Models and Frameworks
- Dirar Abu-Saymeh

, Dhiah el Diehn I. Abou-Tair
, Ahmad Zmily:
An Application Security Framework for Near Field Communication. 396-403 - Jin Bum Hong

, Dong Seong Kim
, Tadao Takaoka:
Scalable Attack Representation Model Using Logic Reduction Techniques. 404-411 - Florian Volk, Florian Sokoli, Sascha Hauke, Max Mühlhäuser

:
Formalizing and Modeling Fairness for Benefit Distribution in Collaborations. 412-420 - Ahmad Samer Wazan, Gregory Blanc

, Hervé Debar
, Joaquín García-Alfaro
:
Attribute-Based Mining Process for the Organization-Based Access Control Model. 421-430 - Keita Emura

, Atsuko Miyaji
, Mohammad Shahriar Rahman
:
Private Multiparty Set Intersection Protocol in Rational Model. 431-438
Session 12: Trust and Security in Cloud Computing
- Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang:

A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. 439-446 - Miao Zhou, Yi Mu, Willy Susilo

, Man Ho Au
:
Privacy-Enhanced Keyword Search in Clouds. 447-451 - Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin:

iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search. 452-458 - Sheikh Mahbub Habib

, Vijay Varadharajan
, Max Mühlhäuser
:
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces. 459-468 - Talal H. Noor, Quan Z. Sheng

, Abdullah Alfazi:
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services. 469-476
Session 13: Cloud Application Security
- Xuejiao Liu, Yingjie Xia, Shasha Jiang, Fubiao Xia, Yanbo Wang:

Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing. 477-484 - Mansura Habiba, Md. Rafiqul Islam, A. B. M. Shawkat Ali:

Access Control Management for Cloud. 485-492 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton

:
Cloud Computing: Insider Attacks on Virtual Machines during Migration. 493-500 - Xuyun Zhang

, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. 501-508 - Nelson Mimura Gonzalez, Marco Antonio Torrez Rojas, Marcos Vinicius Maciel da Silva

, Fernando F. Redígolo
, Tereza Cristina Melo de Brito Carvalho
, Charles Christian Miers
, Mats Näslund, Abu Shohel Ahmed:
A Framework for Authentication and Authorization Credentials in Cloud Computing. 509-516
Session 14: Trust Management
- Aarthi Krishna, Vijay Varadharajan

, Nathan Tarr:
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. 517-524 - Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser

, Dominik Heider
:
On the Application of Supervised Machine Learning to Trustworthiness Assessment. 525-534 - Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:

Building Confidence in Information-Trustworthiness Metrics for Decision Support. 535-543 - Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu:

Efficient Fair UC-Secure Two-Party Computation on Committed Inputs. 544-551 - Udaya Kiran Tupakula, Vijay Varadharajan

:
Trust Enhanced Security Architecture for Detecting Insider Threats. 552-559
Session 15: Data Security and Privacy
- Lan Zhou, Vijay Varadharajan

, Michael Hitchens
:
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage. 560-569 - Ying Zhou, Chen Wang

:
An Online Query Authentication System for Outsourced Databases. 570-577 - Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:

Word N-Gram Based Classification for Data Leakage Prevention. 578-585 - Longxiang Gao, Ming Li, Wanlei Zhou

, Wen Shi:
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks. 586-593 - Chun Hui Suen, Ryan K. L. Ko

, Yu Shyang Tan
, Peter Jagadpramana, Bu-Sung Lee:
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. 594-602
Session 16: Cyber Security and Privacy
- Nicholas Charles Patterson

, Michael Hobbs
, Darren Palmer
:
A Direct Insight into Victims of Cybercrime. 603-610 - Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis

:
Card-Present Transactions on the Internet Using the Smart Card Web Server. 611-619 - Jingquan Wang, Guilin Wang, Willy Susilo

:
Secure Single Sign-On Schemes Constructed from Nominative Signatures. 620-627 - Isredza Rahmi A. Hamid

, Jemal H. Abawajy:
Profiling Phishing Email Based on Clustering Approach. 628-635 - Lei Pan

, Yan Zhou:
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks. 636-643
Session 17: Communication Security and Trust
- Wei Zhou, Yang Xu, Guojun Wang:

Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications. 644-650 - Ming Zheng, Jianping Wu, Hai-Xin Duan:

Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication. 651-658 - Younchan Jung

, Enrique Festijo:
Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications. 659-666 - Alasdair Thomason, Matthew Leeke, Matthew Bradbury

, Arshad Jhumka:
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. 667-674 - Adnan Aziz, Dirk Hoffstadt, Sebastian Ganz, Erwin P. Rathgeb:

Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic. 675-682
Session 18: Security Algorithms
- Minghui Zheng, Yongquan Cui, Liang Chen:

Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme. 683-687 - Muhammad R. Ahmed, Xu Huang, Hongyan Cui:

A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN. 688-693 - Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent

:
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. 694-703 - Hui Cui

, Yi Mu, Man Ho Au
:
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. 704-711 - Weiyu Jiang, Ji Xiang, Limin Liu, Daren Zha, Lei Wang:

From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password. 712-719
Session 19: Identity Management and Access Control
- Ebenezer Paintsil:

Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems. 720-727 - Ibrahim F. Elashry, Yi Mu, Willy Susilo

:
Identity-Based Mediated RSA Revisited. 728-735 - Md. Sadek Ferdous

, Ron Poet:
Portable Personal Identity Provider in Mobile Phones. 736-745 - Rick Lopes de Souza, Lau Cheuk Lung, Ricardo Felipe Custódio:

Multi-factor Authentication in Key Management Systems. 746-752 - A. S. M. Kayes

, Jun Han, Alan Colman
:
A Semantic Policy Framework for Context-Aware Access Control Applications. 753-762
Session 20: Data Protection
- Xiaochen Yuan

, Chi-Man Pun
:
Feature Based Video Watermarking Resistant to Geometric Distortions. 763-767 - Soumyadeb Chowdhury

, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords Using Verbal Descriptions. 768-775 - Peili Li, Haixia Xu, Shu Guo:

Public Verification of Outsourced Computation of Polynomial Functions. 776-780 - Harini Ragavan, Brajendra Panda:

Mitigating Malicious Updates: Prevention of Insider Threat to Databases. 781-788 - Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez

:
De-anonymization Attack on Geolocated Data. 789-797
Trusted 21: Trusted Computing Applications
- M. Manzur Murshed

, Tishna Sabrina, Anindya Iqbal, Mortuza Ali:
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines. 798-804 - Wei Ye, Ruixuan Li, Huaqing Li:

Role Mining Using Boolean Matrix Decomposition with Hierarchy. 805-812 - Guowei Wu, Jia Wang, Lin Yao, Chi Lin:

A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks. 813-820 - Gonzalo Huerta Cánepa, Seungwook Han, Dongman Lee, Byoungoh Kim:

A Place-Aware Stereotypical Trust Supporting Scheme. 821-828 - Charles Thevathayan, James Harland

, Peter Bertók
:
An Endorsement Trust Model. 829-836
The 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-13)
Session 1: Networking and Modeling
- Md. Zakirul Alam Bhuiyan

, Guojun Wang, Jiannong Cao
, Jie Wu:
Local Monitoring and Maintenance for Operational Wireless Sensor Networks. 837-844 - Waltenegus Dargie

, Jianjun Wen:
A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface Cards. 845-852 - Chen Chen, Yao Wu, Joshua Suetterlein

, Long Zheng, Minyi Guo, Guang R. Gao:
Automatic Locality Exploitation in the Codelet Model. 853-862 - Tao Li, Hua Li, Xuechen Liu, Shuai Zhang, Kai Wang, Yulu Yang:

GPU Acceleration of Interior Point Methods in Large Scale SVM Training. 863-870 - Chung Hwan Lee, Peter Strazdins:

An Analysis of Driver Domain Offload for Paravirtualized Communication. 871-878 - Shuai Zhang, Zhiyong Liu, Dongrui Fan

, Fenglong Song, Mingzhe Zhang:
Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip Networks. 879-886
Session 2: Parallel and Distributed Applications
- Yifeng Geng, Xiaomeng Huang, Meiqi Zhu, Huabin Ruan, Guangwen Yang:

SciHive: Array-Based Query Processing with HiveQL. 887-894 - Burkhard Englert, Reza Gheissari:

Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants. 895-902 - Qi Guo, Chao Wang, Xuehai Zhou, Xi Li:

Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoC. 903-910 - Wencan Wang, Xiaomeng Huang, Haohuan Fu, Yong Hu, Shizhen Xu, Guangwen Yang:

CFIO: A Fast I/O Library for Climate Models. 911-918 - Qi Guo, Chao Wang, Xiaojing Feng, Xuehai Zhou:

Automatic Loop-Based Pipeline Optimization on Reconfigurable Platform. 919-926
Session 3: Parallel and Distributed Systems
- Xuemeng Zhang, Hui Wu

, Haiyan Sun:
Register Allocation by Incremental Graph Colouring for Clustered VLIW Processors. 927-934 - Ehsan Atoofian:

TxSnoop: Power-Aware Transactional Snoop. 935-940 - Bharath Ramesh, Calvin J. Ribbens, Srinidhi Varadarajan:

Regional Consistency: Programmability and Performance for Non-cache-coherent Systems. 941-948 - Aftab Ahmed Chandio

, Cheng-Zhong Xu
, Nikos Tziritas, Kashif Bilal, Samee Ullah Khan
:
A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems. 949-957 - Savio S. H. Tse:

Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Pareto Upper Bounds. 958-965
Session 4: Parallel and Distributed Algorithms
- Mahmood A. Rashid

, M. A. Hakim Newton
, Md. Tamjidul Hoque, Abdul Sattar
:
Collaborative Parallel Local Search for Simplified Protein Structure Prediction. 966-973 - Abdullah M. Baqasah

, Eric Pardede
, Irena Holubová
, J. Wenny Rahayu:
On Change Detection of XML Schemas. 974-982 - Dong Xiang, Zhigang Yu

, Jie Wu:
Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels. 983-990 - Junrui Zhou, Hong An, Yanyan Zou, Tao Sun:

Quantitative Analysis of Inter-block Dependence in Speculative Execution. 991-998 - Servesh Muralidharan, Aravind Vasudevan, Avinash Malik, David Gregg:

Heterogeneous Multiconstraint Application Partitioner (HMAP). 999-1007
Session 5: High-Performance Computing
- Xiaochuan Yu, Alvin Chan Toong Shoon:

A Hypercubic Overlay Using Bloom-Filter Based Addressing for a Non-dedicated Distributed Tag-Based Pub/Sub System. 1008-1015 - Yunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang:

KVM-Loongson: An Efficient Hypervisor on MIPS. 1016-1022 - Rui Shan, Tao Li, Jungang Han:

The Buffered Edge Reconfigurable Cell Array and Its Applications. 1023-1030 - Vasiliki Kalavri

, Vladimir Vlassov
:
MapReduce: Limitations, Optimizations and Open Issues. 1031-1038 - Shinichi Yamagiwa, Shixun Zhang:

Scenario-Based Execution Method for Massively Parallel Accelerators. 1039-1048
Session 6: Data Management
- Long Wang, Rubing Duan, Xiaorong Li, Sifei Lu, Terence Hung, Rodrigo N. Calheiros

, Rajkumar Buyya:
An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds. 1049-1056 - Radu Tudoran, Alexandru Costan

, Gabriel Antoniu:
DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds. 1057-1064 - Walid Saad, Heithem Abbes

, Christophe Cérin, Mohamed Jemni
:
A Data Prefetching Model for Desktop Grids and the Condor Use Case. 1065-1072 - Antonio Gómez-Iglesias

, Andreas T. Ernst
, Gaurav Singh
:
Scalable Multi Swarm-Based Algorithms with Lagrangian Relaxation for Constrained Problems. 1073-1080 - Richard K. Lomotey, Ralph Deters

:
Real-Time Effective Framework for Unstructured Data Mining. 1081-1088
Session 7: Scheduling Algorithms
- Chunghan Lee

, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet. 1089-1098 - Yin Li, Chuang Lin, Fengyuan Ren, Yifeng Geng:

H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System. 1099-1106 - Yohei Miyake

, Hiroshi Nakashima:
Low-Cost Load Balancing for Parallel Particle-in-Cell Simulations with Thick Overlapping Layers. 1107-1114 - Joshua D. Goehner, Taylor L. Groves, Dorian C. Arnold, Dong H. Ahn, Gregory L. Lee:

An Optimal Algorithm for Extreme Scale Job Launching. 1115-1122 - Carlo Brandolese, William Fornaciari

, Luigi Rucco:
Power Management Support to Optimal Duty-Cycling in Stateful Multitasking WSN. 1123-1132
Session 8: Resource Management
- Cheng Luo, Reiji Suda:

An Efficient Task Partitioning and Scheduling Method for Symmetric Multiple GPU Architecture. 1133-1142 - Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Jongwoo Bae:

Performance Optimization of Aho-Corasick Algorithm on a GPU. 1143-1152 - Tao Huang, Jing Wang, Xuetao Guan, Qi Zhong, Keyi Wang:

Combining Process-Based Cache Partitioning and Pollute Region Isolation to Improve Shared Last Level Cache Utilization on Multicore Systems. 1153-1160 - Zhikun Chen, Shuqiang Yang, Shuang Tan, Ge Zhang, Huiyu Yang:

Hybrid Range Consistent Hash Partitioning Strategy - A New Data Partition Strategy for NoSQL Database. 1161-1169 - Hugo Meyer

, Ronal Muresano
, Dolores Rexachs
, Emilio Luque
:
Tuning SPMD Applications in Order to Increase Performability. 1170-1178
Session 9: Multithreaded Computing
- Servesh Muralidharan, Kevin Casey, David Gregg:

A Parallel Runtime Framework for Communication Intensive Stream Applications. 1179-1187 - HeeJong Park, Zoran Salcic

, Kevin I-Kai Wang, Udayanto Dwi Atmojo
, Wei-Tsun Sun, Avinash Malik:
A New Design Paradigm for Designing Reactive Pervasive Concurrent Systems with an Ambient Intelligence Example. 1188-1197 - Mingzhe Zhang, Da Wang, Xiaochun Ye, Liqiang He, Dongrui Fan

, Zhiyong Liu:
A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor. 1198-1205 - Licheng Chen, Yongbing Huang, Yungang Bao, Guangming Tan, Zehan Cui:

A Study of Leveraging Memory Level Parallelism for DRAM System on Multi-core/Many-Core Architecture. 1206-1215 - Hamilton A. Turner, Jules White:

Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony Optimization. 1216-1223
Session 10: Multicore Algorithms
- Zied Ellouze, Nada Louati

, Rafik Bouaziz
:
A Next Generation Object-Oriented Environment for Real-Time Database Application Development. 1224-1232 - Abhishek Biswas

, Desh Ranjan, Mohammad Zubair:
Genome Assembly on a Multicore System. 1233-1240 - Karolina Sarnowska-Upton, Andrew S. Grimshaw:

The Value of Automation: A Study of MPI Application Migration Methods. 1241-1248 - Flavien Quesnel, Adrien Lebre, Jonathan Pastor, Mario Südholt, Daniel Balouek:

Advanced Validation of the DVMS Approach to Fully Distributed VM Scheduling. 1249-1256 - Guowei Wu, Ying Li, Jiankang Ren, Chi Lin:

Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform. 1257-1264
Session 11: Reliability and Performance
- Alvaro Wong

, Dolores Rexachs
, Emilio Luque
:
Enhanced Method for the Signature Adaptability to the Application Behavior. 1265-1273 - Joao Gramacho, Dolores Rexachs

, Emilio Luque
:
Saving Time in a Program Robustness Evaluation. 1274-1282 - Daniele Apiletti, Elena Baralis, Tania Cerquitelli

, Silvia Chiusano
, Luigi Grimaudo:
SeaRum: A Cloud-Based Service for Association Rule Mining. 1283-1290 - João Salada, João Pedro Barreto

:
TurboSockets: Democratizing Distributed Deduplication. 1291-1298 - Yanheng Zhao, Xin Li, Zhiping Jia, Lei Ju, Ziliang Zong:

Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core Clusters. 1299-1306
The 12th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2013)
Session 1: Ubiquitous Computing
- Longpeng Zheng, Zhiping Jia, Ruihua Zhang, Hui Xia, Lei Ju, Chuanhao Qu:

Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering. 1307-1314 - Qingfeng Yu, Yijiao Chen, Xilong Mao, Baokang Zhao, Jinfeng Huang:

SMC: A Shared Memory Based SpaceWire Controller Solution. 1315-1322 - Jurairat Phuttharak, Seng W. Loke:

LogicCrowd: A Declarative Programming Platform for Mobile Crowdsourcing. 1323-1330 - Ahmad A. Alzahrani

, Seng W. Loke, Hongen Lu:
Conflict and Interference Resolution for Physical Annotation Systems. 1331-1338 - Wei Wang, Ruihua Zhang, Zhongwei Chen, Lei Ju:

Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. 1339-1344
Session 2: Ubiquitous Communications
- Yi-Hsueh Tsai, Yi-Ting Lin, Kanchei Loa, Tsung-Yu Tsai, Chun-Che Chien, Dun-Cheih Huang, Shiann-Tsong Sheu:

Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using E-UTRAN and WLAN. 1345-1350 - Dan Zhao, Chunqing Wu, Xiaofeng Hu, Xiaofeng Wang, Baokang Zhao:

Characterization of OSPF Convergence with Correlated Failures. 1351-1356 - Yinbo Liu, Xingang Liu, Zhixin Shen, Laurence T. Yang:

Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for H.264/AVC. 1357-1361 - Yanpeng Ma, Wei Peng

, Xiaofeng Wang, Baokang Zhao, Jinshu Su
, Chunqing Wu:
A Location Management Algorithm for LEO Satellite Networks. 1362-1366 - Yanpeng Ma, Wei Peng

, Wanrong Yu, Jinshu Su
, Chunqing Wu, Guohong Zhao:
A Distributed Routing Algorithm for LEO Satellite Networks. 1367-1371 - Ki-Sook Chung, Young-Mee Shin:

Communication and Collaboration Service Components for Ubiquitous Communication Applications. 1372-1377
Session 3: Ubiquitous Systems
- Javeria Samad, Seng W. Loke, Karl Reed:

Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case Study. 1378-1385 - Yang Li, Lei Ju, Zhiping Jia, Yi Wang

, Zili Shao
:
Thermal-Aware On-Chip Memory Architecture Exploration. 1386-1393 - Chao Sun, Xingang Liu, Kai Kang, Laurence T. Yang:

Quality Assessment for Stereoscopic Image Based on DCT Frequency Information. 1394-1398 - Xiaochuan Yu, Alvin Chan Toong Shoon:

Hope: A Fault-Tolerant Distributed Pub/Sub Architecture for Large-Scale Dynamic Network Environment. 1399-1406 - Aekyung Moon, Sangho Lee:

Design of the Farmer's Experience Based Greenhouse Operating Systems. 1407-1411 - Franz Gravenhorst, Timothy Turner, Conny Draper, Richard M. Smith, Gerhard Tröster:

Validation of a Rowing Oar Angle Measurement System Based on an Inertial Measurement Unit. 1412-1419
Session 4: Ubiquitous Services
- Adam Muhlbauer, Timothy Zelinsky, Salil S. Kanhere

:
Platform Zero: A Context-Based Computing Platform for Collaboration. 1420-1427 - Uzo Okafor, Ramesh K. Karne, Alexander L. Wijesinha, Patrick Appiah-Kubi:

A Methodology to Transform an OS-Based Application to a Bare Machine Application. 1428-1433 - Halikul Lenando

, Mohamad Nazim Jambli, Kartinah bt Hj Zen, Johari Abdullah:
Impact of Mobility Models on Social Structure Formation in Opportunistic Networks. 1434-1441 - Octavio J. Salcedo Parra, Neil Orlando Diaz Martinez, Gustavo López Rubio:

Comparison SIP and IAX to Voice Packet Signaling over VOIP. 1442-1449 - Yann Busnel

, Nuno Cruz
, Denis Gillet, Adrian Holzer, Hugo Miranda
:
Reinventing Mobile Community Computing and Communication. 1450-1457
Session 5: Ubiquitous Applications
- Umran Azziz Abdulla, Ken Taylor, Michael G. Barlow, Khushnood Z. Naqshbandi:

Measuring Walking and Running Cadence Using Magnetometers. 1458-1462 - Saeed Farooq Khan, Marius Portmann

, Neil W. Bergmann
:
VoIP Spam Prevention. 1463-1470 - Shuo Zhang, Baosheng Wang, Baokang Zhao, Jing Tao:

An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center. 1471-1477 - Jingguo Ge, Hanji Shen, Yuepeng E., Yulei Wu, Junling You:

An OpenFlow-Based Dynamic Path Adjustment Algorithm for Multicast Spanning Trees. 1478-1483 - Pingjian Wang, Zongbin Liu, Lei Wang, Neng Gao:

High Radix Montgomery Modular Multiplier on Modern FPGA. 1484-1489 - Andreas Huebner, Christian Facchi

, Markus Meyer, Helge Janicke
:
A Model-Based Approach for RFID Application Testing. 1490-1497
The Third IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications TrustID 2013)
Session 1: Trust Management
- Xiaofeng Qiu, Lei Cao, Pengfei Li, Liang Zhao:

A Trust Evaluation Method for Supplier Selection. 1498-1503 - Yue Yu, Huaimin Wang, Bo Liu, Gang Yin:

A Trusted Remote Attestation Model Based on Trusted Computing. 1504-1509 - Carlos Ballester Lafuente, Jean-Marc Seigneur

:
Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies. 1510-1515 - Zhongwei Chen, Ruihua Zhang, Lei Ju, Wei Wang:

Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks. 1516-1521 - Zheng Yan

, Peng Zhang, Valtteri Niemi, Raimo Kantola:
A Research Model for Trustworthy Pervasive Social Networking. 1522-1527
Session 2: Identity Management Systems and Applications
- Hani Moaiteq Aljahdali, Ron Poet:

The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom. 1528-1534 - Miroslaw Kutylowski, Piotr Lipiak:

Disability Parking Permit - Lightweight But Trustworthy Identity Documents. 1535-1540 - Gianluca Dini

, Fabio Martinelli, Ilaria Matteucci
, Marinella Petrocchi, Andrea Saracino
, Daniele Sgandurra:
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach. 1541-1546 - Tao Feng, Xi Zhao, Bogdan Carbunar, Weidong Shi:

Continuous Mobile Authentication Using Virtual Key Typing Biometrics. 1547-1552 - Ana Ferreira

, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini
:
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates. 1553-1558
The Third IEEE International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2013)
- Y. Govinda Ramaiah, G. Vijaya Kumari:

Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing. 1559-1566 - Wenkang Wu, Zhuo Tang, Renfa Li:

On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service. 1567-1572 - Karthick Ramachandran, Hanan Lutfiyya, Mark Perry

:
On Subjective Trust for Privacy Policy Enforcement in Cloud Computing. 1573-1580 - Wenjuan Fan, Harry G. Perros:

A Reliability-Based Trust Management Mechanism for Cloud Services. 1581-1586 - Kazi Wali Ullah, Abu Shohel Ahmed, Jukka Ylitalo:

Towards Building an Automated Security Compliance Tool for the Cloud. 1587-1593
The Fifth IEEE International Workshop on Security in e-Science and e-Research (ISSR 2013)
- Zubair Ahmed Baig

, Saif Ahmad, Sadiq M. Sait:
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps. 1594-1599 - Saad Alsunbul, Phu Dung Le, Jefferson Tan:

A Defense Security Approach for Infrastructures against Hacking. 1600-1606 - Yong Qiao, Yuexiang Yang, Lin Ji, Chuan Tang, Jie He:

A Lightweight Design of Malware Behavior Representation. 1607-1612 - Manabu Hirano, David W. Chadwick

, Suguru Yamaguchi:
Use of Role Based Access Control for Security-Purpose Hypervisors. 1613-1619
TThe Fifth IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe-13)
- Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:

A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers. 1620-1625 - Ammar Alazab

, Jemal H. Abawajy, Michael Hobbs
, Robert Layton, Ansam Khraisat:
Crime Toolkits: The Productisation of Cybercrime. 1626-1632 - Al Amin Hossain, Seung-Jin Lee, Eui-Nam Huh:

Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database. 1633-1638 - Arnaud Oglaza, Romain Laborde, Pascale Zaraté:

Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data. 1639-1644 - Roberto Gallo

, Henrique Kawakami, Ricardo Dahab
:
Case Study: On the Security of Key Storage on PCs. 1645-1651 - Manman Peng, Yan Hu:

A Power Model Combined of Architectural Level and Gate Level for Multicore Processors. 1652-1655 - Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:

Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment. 1656-1661 - Kashif Saleem

, Mohammed Sayim Khalil
, Norsheila Fisal, Adel Ali Ahmed
, Mehmet Ali Orgun
:
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs. 1662-1668
The Third IEEE International Symposium on Security and Privacy in Internet of Things (IEEE SPIoT-13)
- Luke Mirowski

:
Exposing Clone RFID Tags at the Reader. 1669-1674 - Naim Asaj, Florian Schaub

, Michael Müter, Albert Held, Michael Weber:
ProTACD: A Generic Privacy Process for Vehicle Development. 1675-1682
The Third IEEE International Symposium on Anonymity and Communication Systems (IEEE ACS-13)
- Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki

, Miroslaw Kutylowski:
Mutual Chip Authentication. 1683-1689 - Shouwen Yang, Hui Li, Xiaotao Zhang, Gang Zhao:

Celerity Hardware Implementation of the AES with Data Parallel and Pipelining Architecture inside the Round Function. 1690-1695 - Wagner Medeiros dos Santos, Ruy J. G. B. de Queiroz, Carlos E. R. Saraiva, Gleudson P. V. Junior:

Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems. 1696-1703 - Zhiwei Wang, Wei Lv:

Server-Aided Verification Proxy Re-signature. 1704-1707 - Muhammad Khurram Khan

, Debiao He:
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard". 1708-1710 - Paul Robertson, Robert Laddaga, Mark H. Burstein:

Trust and Adaptation in STRATUS. 1711-1716 - Dennis Titze, Hans Hofinger, Peter Schoo:

Using Secure Multiparty Computation for Collaborative Information Exchange. 1717-1722 - Sören Finster

, Ingmar Baumgart
:
Pseudonymous Smart Metering without a Trusted Third Party. 1723-1728
The Fourth International Workshop on Wireless Networks and Multimedia (WNM-2013)
- Yiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang:

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism. 1729-1734 - Khosrow Ramezani, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:

Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks. 1735-1740 - Chong Yan, Zhiping Jia, Lei Ju, Hui Xia, Huaqiang Xu:

TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator. 1741-1746 - Li Li, Wang Yang, Guojun Wang:

HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization. 1747-1753 - Zeshan Aslam Khan, Edison Pignaton de Freitas

, Tony Larsson, Haider Abbas
:
A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks. 1754-1761 - Chi-Hsien Wang, Gwo-Jong Yu:

Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks. 1762-1767 - Pingping Xu, Hongyun Chu, Suheng Zhang:

A Novel Device-Device Beam Discovery Scheme with Cross-Layer Design for Millimeter-Wave WPAN. 1768-1773 - Qiong Wu, Pingping Xu, Suheng Zhang, Hongyun Chu:

A Distributed Localization Algorithm Based on Random Diffusion in WSN. 1774-1777
The Fist International Workshop on Cloud Data Mining (IWCDM-2013)
Session 1: Data Mining in Cloud Systems
- Meng Sun, Weidong Gu, Xinchang Zhang, Huiling Shi, Wei Zhang:

A Matrix Transformation Algorithm for Virtual Machine Placement in Cloud. 1778-1783 - Wenjie Yang, Xingang Liu, Lan Zhang, Laurence T. Yang:

Big Data Real-Time Processing Based on Storm. 1784-1787 - Dong Dai, Xi Li, Chao Wang, Junneng Zhang, Xuehai Zhou:

Detecting Associations in Large Dataset on MapReduce. 1788-1794 - Norfaradilla Wahid, Eric Pardede

:
Protecting Cumulative Node Constraint during XML Update. 1795-1802
Session 2: Data Mining in Security and Privacy Applications
- Mayssaa El Rifai, Pramode K. Verma:

An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol. 1803-1807 - Dae-Ha Park, Eun-Ae Cho, Byung-Won On:

Social Spam Discovery Using Bayesian Network Classifiers Based on Feature Extractions. 1808-1811 - Athar Mahmood Ahmed Qureshi, Nina Evans

:
The Role of Trust in Absorptive Capacity Operationalization. 1812-1816 - Xinfeng Ye, Jupeng Zheng:

An Adaptive Rating System for Service Computing. 1817-1824
The Fifth IEEE International Workshop on Multicore and Multithreaded Architectures and Algorithms (M2A2 2013)
Session 1: Multithreaded Algorithms
- Xiaoxian Liu, Rongcai Zhao, Lin Han, Peng Liu:

An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP. 1825-1831 - Rashid Khogali, Olivia Das, Kaamran Raahemifar:

Mobile Parallel Computing Algorithms for Single-Buffered, Speed-Scalable Processors. 1832-1839 - Naoki Yonezawa, Ken'ichi Katou, Issei Kino, Koichi Wada:

Probabilistic Analysis of Parallel Program with Partially Eliminated Barriers. 1840-1847 - Hucai Huang, Tao Li, Jungang Han:

Simulator Implementation and Performance Study of a Polymorphous Array Computer. 1848-1855 - Carlos Domínguez, Houcine Hassan

, Vicent Mayans, Alfons Crespo
:
Multicore Parallel Implementation of Agent Emotional Processes. 1856-1861 - Felipe Díaz Sánchez

, Maurice Gagnaire, Iain James Marshall, Jean-Pierre Laisné:
COSCHED: A Scheduling Agent Maximizing Cloud Broker's Revenues under the CompatibleOne Architecture. 1862-1867
Session 2: Multicore and Multithreaded Applications
- Jingguo Ge, Chuan Du, Yulei Wu, Yuepeng E, Junling You:

Performance Analysis of Load-Aware Anycasting Based on OpenFlow. 1868-1872 - Alex Pappachen James

, Sherin Sugathan
:
Parallel Realization of Cognitive Cells on Film Mammography. 1873-1878 - Young-Ho Lee, Jihong Kim:

Fast and Accurate On-line Prediction of Performance and Power Consumption in Multicore-based Systems. 1879-1886 - Arthur Pyka, Mathias Rohde, Sascha Uhrig:

Performance Evaluation of the Time Analysable On-Demand Coherent Cache. 1887-1892 - Rongjie Yan, Kai Huang, Min Yu, Xiaomeng Zhang:

Communication Pipelining for Code Generation from Simulink Models. 1893-1900 - Luechao Yuan, Zuocheng Xing, Yang Zhang, Xiaobao Chen:

An Optimizing Strategy Research of LDPC Decoding Based on GPGPU. 1901-1906 - Ahsan Morshed, Jagannath Aryal

, Ritaban Dutta:
Environmental Spatio-temporal Ontology for the Linked Open Data Cloud. 1907-1912

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














