December 17, 2007 |
||||||
|
Da Vinci Hall |
Raphael Hall |
Michelangelo Hall |
|||
08:30 ~ 10:10 |
Session 1A-1: TRUST |
Session 1B-1: WSOC - Keynote speech |
Session 1C-1: NCUS |
|||
1A-1.1 |
Attack-Resilient Random Key Distribution Scheme For Distributed Sensor Networks |
Invited Talk I: TBA |
1C-1.1 |
A Multicast Extension for Enhanced Mobile IP by Home Agent Handover |
||
1A-1.2 |
A critical approach to Privacy research in Ubiquitous Environments: Issues and Underlying Assumptions |
|
1C-1.2 |
Autonomic Multi-Server Distribution in Flash Crowds Alleviation Network |
||
1A-1.3 |
The Case Study of Information Security System for International Airports |
Invited Talk II: TBA |
1C-1.3 |
Generic Energy-efficient Geographic Routing for Ad-Hoc Wireless Networks |
||
1A-1.4 |
Quantitative Evaluation of Intrusion Tolerant Systems subject to DoS Attacks via Semi-Markov Cost Models |
|
1C-1.4 |
Description of a New Feature Meta-model |
||
10:10 10:30 |
Break |
|||||
10:30 ~ 12:10 |
Session 1A-2: TRUST |
Session 1B-2: WSOC - Technical Session |
Session 1C-2: NCUS |
|||
1A-2.1 |
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System |
1B-2.1 |
High Speed Analog to Digital Converter for Ultra Wide Band Applications |
1C-2.1 |
Studying of Multi-dimensional Based Replica Management in Object Storage System |
|
1A-2.2 |
UPS: An Ubiquitous Proximity eService for Trust and Collaboration |
1B-2.2 |
Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions |
1C-2.2 |
Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations |
|
1A-2.3 |
Obligations for Privacy and Confidentiality in Distributed Transactions |
1B-2.3 |
Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies |
1C-2.3 |
An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks |
|
1A-2.4 |
Multi-channel Enhancements for IEEE 802.11-based Multi-hop Ad-hoc Wireless Networks |
1B-2.4 |
A dynamic frequency allocation scheme for IEEE 802.16 OFDMA-based WMANs using Hungary Algorithm |
|
|
|
12:10 13:20 |
Lunch Break |
|||||
13:20 ~ 15:00 |
Session 1A-3: TRUST |
Session 1B-3: WSOC - Technical Session |
Session 1C-3: NCUS |
|||
1A-3.1 |
An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments |
1B-3.1 |
Wireless Network Management System for WiMAX Wi-Fi Mesh Networks |
1C-3.1 |
Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks |
|
1A-3.2 |
A Loop-based Key Management Scheme for wireless sensor networks |
1B-3.2 |
An Implementation of QoS Framework for Heterogeneous Networks |
1C-3.2 |
Intelligent Monitoring using Wireless Sensor Networks |
|
1A-3.3 |
A MAC Protocol with Little Idle Listening for Wireless Sensor Networks |
1B-3.3 |
Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks |
1C-3.3 |
On the Design of Micro-mobility for Mobile Network |
|
1A-3.4 |
Security Technologies based on Home Gateway for making Smart Home secure |
|
|
|
|
|
15:00 15:20 |
Break |
|||||
15:20 ~ 17:00 |
Session 1A-4: TRUST |
Session 1B-4: WSOC - Technical Session |
Session 1C-4: NCUS |
|||
1A-4.1 |
Layered Peer to Peer Streaming Using Hidden Markov Models |
1B-4.1 |
A Cross-layer Signaling and Middleware Platform for Multi-interface Mobile Devices |
1C-4.1 |
ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment |
|
1A-4.2 |
The Optimum Power Controller for Random Number Generator for Crypto Module in Ubiquitous Computing Environment |
1B-4.2 |
Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e |
1C-4.2 |
Self-authorized Public Key Management For Home Networks |
|
1A-4.3 |
Fault Diagnosis and Prognosis for Reliability of System using Bayesian Network |
1B-4.3 |
Enhanced Fingerprint-based Location Estimation System in Wireless LAN Environment |
1C-4.3 |
A Cross-layered Diagnostician in OSGi Platform for Home Network |
|
|
|
1B-4.4 |
Improving Channel Scanning Procedures for WLAN Handoffs |
|
|
|
18:30 20:30 |
Reception |
December 18, 2007 |
||||||
|
Da Vinci Hall |
Raphael Hall |
Michelangelo Hall |
|||
08:30 10:10 |
Keynote Speech: Dr. Wei Zhao, Plato Hall |
|||||
10:10 10:30 |
Break |
|||||
10:30 ~ 12:10 |
Session 2A-2: UUWSN - Applications Chair : Prof. Ki-Man Kim, Korea Maritime University |
Session 2B-2: Power-Aware Computing |
Session 2C-2: Reconfigurable Embedded Systems |
|||
|
Opening Ceremony & Welcome Speech |
2B-2.1 |
A Software Framework for Energy and Performance Tradeoff in Fixed-Priority Hard Real-time Embedded Systems |
2C-2.1 |
Parallel Network Intrusion Detection on Reconfigurable Platforms |
|
2A-2.1 |
LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks |
2B-2.2 |
Real-Time Loop Scheduling with Energy Optimization via DVS and ABB for Multi-Core Embedded Systems |
2C-2.2 |
Function-level Multitasking Interface Design in an Embedded Operating System with Reconfigurable Hardware |
|
2A-2.2 |
TinyOS-based Gateway for Underwater Acoustics/Radio Frequency Communication |
2B-2.3 |
Energy Efficient Scheduling for Real-Time Systems with Mixed Workload |
2C-2.3 |
Task Scheduling for Context Minimization in Dynamically Reconfigurable Platforms |
|
2A-2.3 |
An Energy Scheduling Algorithm for Ensuring the Pre-Determined Lifetime in Sensor Network |
2B-2.4 |
A Shortest Time First Scheduling Mechanism for Reducing the Total Power Consumptions of an IEEE 802.11 Multiple Rate Ad Hoc Network |
2C-2.4 |
Compiler Support for Dynamic Pipeline Scaling |
|
12:10 13:20 |
Lunch Break |
|||||
13:20 ~ 15:00 |
Session 2A-3: UUWSN - Protocols Chair : Prof. Young-Sik Jeong, Wonkwang University |
Session 2B-3: Wireless Networks |
Session 2C-3: Real-time/Embedded Operating Systems |
|||
|
Keynote : Ocean
experiments in underwater acoustic networking |
2B-3.1 |
Evaluating Mobility Support in ZigBee Networks |
2C-3.1 |
Revisiting Fixed Priority Techniques |
|
2A-3.1 |
Underwater Acoustic Communication and Modem-Based Navigation Aids |
2B-3.2 |
On Using Probabilistic Forwarding to Improve HEC-based Data Forwarding in Opportunistic Networks |
2C-3.2 |
A Server-side Pre-linking Mechanism for Updating Embedded Clients Dynamically |
|
2A-3.2 |
State-of-the-art in MAC protocols for Underwater Acoustics Sensor Networks |
2B-3.3 |
Improving the Performance of the Wireless Data Broadcast by the Cyclic Indexing Schemes |
2C-3.3 |
Real-Time Scheduling under Time-Interval Constraints |
|
2A-3.3 |
An Ultrasonic Sensor based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks |
2B-3.4 |
Employment of Wireless Sensor Network for Full-Scale Ship Application |
2C-3.4 |
Towards a Software Framework for Building Highly Flexible Component-based Embedded Operating Systems |
|
15:00 15:20 |
Break |
|||||
15:20 ~ 17:00 |
Session 2A-4: UUWSN - Systems Chair : Prof. Dong-Won Jeong, Kunsan National University |
Session 2B-4: Embedded System Architectures |
Session 2C-4: Scheduling and Resource Management |
|||
2A-4.1 |
UWA-NAV: Energy Efficient Error Control scheme for Underwater Acoustic Sensor Network |
2B-4.1 |
A Study on Asymmetric Operating Systems on Symmetric Multiprocessors |
2C-4.1 |
Novel Radio Resource Management Scheme with Low Complexity for Multiple Antenna Wireless Network System |
|
2A-4.2 |
Underwater Wideband Source Localization Using the Interference Pattern Matching |
2B-4.2 |
An Efficient Code Generation Algorithm for Code Size Reduction Using 1-offset P-Code Queue Computation Model |
2C-4.2 |
Consensus-Driven Distributable Thread Scheduling in Networked Embedded Systems |
|
2A-4.3 |
A New Virtual Select Database Operation for Wireless Sensor Networks |
2B-4.3 |
MPSoC Architectural Design and Synthesis for Real-Time Biomedical Signal Processing in Gamma Cameras |
2C-4.3 |
Swing Scheduling: a Novel Scheduling Mechanism to Fully Utilize the Multiple Processors in the MPSoC Architecure |
|
2A-4.4 |
GT2 : Reduced Wastes time Mechanism for Underwater Acoustic Sensor Network |
2B-4.4 |
Integrated Global and Local Quality-of-Service Adaptation in Distributed, Heterogeneous Systems |
|
|
|
18:30 20:00 |
PC and Organizing Committee Meeting |
December 19, 2007 |
||||||
|
Da Vinci Hall |
Raphael Hall |
Michelangelo Hall |
|||
08:30 ~ 10:10 |
Session 3A-1: USN - RFID Protocols and Applications |
Session 3B-1: Mobile Computing |
Session 3C-1: System Security |
|||
3A-1.1 |
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-Collision Protocols for RFID Networks |
3B-1.1 |
Modelling Protocols for Multiagent Interaction by F-logic |
3C-1.1 |
ID-Based Key Agreement with Anonymity for Ad Hoc Network |
|
3A-1.2 |
An Efficient Mutual Authentication protocol on RFID Tags |
3B-1.2 |
Palpability Support Demonstrated |
3C-1.2 |
Buffer Cache Level Encryption for Embedded Secure Operating System |
|
3A-1.3 |
HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for Distributed RFID system |
3B-1.3 |
GPS-based Location Extraction for Mobile Instant Messenger |
3C-1.3 |
Bilateration: An attack-resistant localization of Wireless Sensor Network |
|
|
|
3B-1.4 |
Adding Adaptability to Mailbox-based Mobile IP |
3C-1.4 |
SOM-Based Anomaly Intrusion Detection System |
|
10:10 10:30 |
Break |
|||||
10:30 ~ 12:10 |
Session 3A-2: USN 2007 - USN Protocols and Services |
Session 3B-2: Network Protocols |
Session 3C-2: Fault Tolerance |
|||
3A-2.1 |
Target Classification in Sparse Sampling Acoustic Sensor Networks using IDDC Algorithm |
3B-2.1 |
TCP-Taichung: A RTT-based Predictive Bandwidth Based with Optimal Shrink Factor for TCP Congestion Control in Heterogeneous Wired and Wireless Networks |
3C-2.1 |
An Efficient Handoff Strategy for Mobile Computing Checkpoint System |
|
3A-2.2 |
Scriptable Sensor Network based Home-Automation |
3B-2.2 |
Rate-Adaptive Layered Multicast (RALM) for Video Services in WiMAX |
3C-2.2 |
A Lightweight RFID Protocol Using Substring |
|
3A-2.3 |
Applying Situation Awareness to Mobile Proactive Information Delivery |
3B-2.3 |
A Time Slot Reservation Protocol for Wireless Ad Hoc Networks |
3C-2.3 |
The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing |
|
|
|
3B-2.4 |
Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming |
3C-2.4 |
Fast and Simple On-Line Sensor Fault Detection Scheme for Wireless Sensor Networks |
|
12:10 13:20 |
Lunch Break |
|||||
13:20 ~ 15:00 |
Session 3A-3: ESO |
Session 3B-3: Human-Computer Interface and Data Management |
Session 3C-3: HW/SW Co-design and Design Automations |
|||
3A-3.1 |
Energy-Efficiency on a Variable-Bitrate Device |
3B-3.1 |
Activity Recognition Based on Intra and Extra Manipulation of Everyday Objects |
3C-3.1 |
A Floorplan-Based Power Network Analysis Methodology for System-on-chip Designs |
|
3A-3.2 |
Software Power Peak Reduction on Smart Card Systems based on Iterative Compiling |
3B-3.2 |
Finding and Extracting Data Records from Web Pages |
3C-3.2 |
A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems |
|
3A-3.3 |
The Secure DAES Design for Embedded System Application |
3B-3.3 |
Towards Transparent Personal Content Storage in Multi-Service Access Networks |
3C-3.3 |
SystemC-based Design Space Exploration of a 3D Graphics Acceleration SoC for Consumer Electronics |
|
|
|
3B-3.4 |
Extraction and Classification of User Behavior |
3C-3.4 |
Optimal Allocation of I/O Device Parameters in Hardware and Software Codesign Methodology |
|
15:00 15:20 |
Break |
|||||
15:20 ~ 17:00 |
Session 3A-4: ESO |
Session 3B-4: Service-Aware Computing |
Session 3C-4: SECUBIQ - Signature Scheme |
|||
3A-4.1 |
Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential |
3B-4.1 |
User Preference Based Service Discovery |
3A-2.1 |
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006 |
|
3A-4.2 |
A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly- perturbed Computer Controlled Systems |
3B-4.2 |
A Semantic P2P Framework for Building Contextaware Applications in Multiple Smart Spaces |
3A-2.2 |
New Efficient Certificateless Signature Scheme |
|
3A-4.3 |
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems |
3B-4.3 |
Usage-aware Search in Peer-to-Peer Systems |
3A-2.3 |
An Practical Identity-Based Signature Scheme from Bilinear Map |
|
3A-4.4 |
Evaluating modeling languages on their ability to support the partitioning of Automotive Embedded Systems |
3B-4.4 |
A Service Query Dissemination Algorithm for Accommodating Sophisticated QoS Requirements in a Service Discovery System |
3A-2.4 |
Linkable Ring Signatures from Linear Feedback Shift Register |
|
18:30 20:30 |
|
Banquet |
December 20, 2007 |
||||||
|
Da Vinci Hall |
Raphael Hall |
Michelangelo Hall |
|||
08:30 10:10 |
Keynote Speech: Dr. L.G. Chen, Socrates Hall |
|||||
10:10 10:30 |
Break |
|||||
10:30 ~ 12:10 |
Session 4A-2: SECUBIQ - Key Management |
Session 4B-2: Ad Hoc and Sensor Networks |
Session 4C-2: Ubiquitous Computing |
|||
4A-2.1 |
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem |
4B-2.1 |
A Selective Push Algorithm for Cooperative Cache Consistency Maintenance in MANETs |
4C-2.1 |
PerSON: A Framework for Service Overlay Network in Pervasive Environments |
|
4A-2.2 |
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks |
4B-2.2 |
Hard Constraint Vertex-Cover Communication Algorithm for WSN |
4C-2.2 |
Universal Adaptor: A Novel Approach to Supporting Multi-protocol Service Discovery in Pervasive Computing |
|
4A-2.3 |
Token-based Authenticated Key Establishment Protocols for Three-party Communication |
4B-2.3 |
A Constrained Multipath Routing Protocol for Wireless Sensor Networks |
4C-2.3 |
U-Interactive: A Middleware for Ubiquitous Fashionable Computer to Spontaneously Interact with Ubiquitous Environment, U-TOPIA |
|
4A-2.4 |
Two Approaches on Pairwise Key Path Establishment for Sensor Networks |
4B-2.4 |
Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc Sensor Networks |
4C-2.4 |
Towards Context-Awareness in Ubiquitous Computing |
|
12:10 13:20 |
Lunch Break |
|||||
13:20 ~ 15:00 |
Session 4A-3: SECUBIQ - Authentication Protocol |
Session 4B-3: Sensor Networks |
Session 4C-3: Embedded Software Designs |
|||
4A-3.1 |
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks |
4B-3.1 |
An Optimal Distribution of Data Reduction in Sensor Networks with Hierarchical Caching |
4C-3.1 |
Real-Time Embedded Software Design for Mobile and Ubiquitous Systems |
|
4A-3.2 |
Low-cost and Strong-security RFID Authentication Protocol |
4B-32.2 |
MOFBAN: A Lightweigt Modular Framework for Body Area Networks |
4C-3.2 |
Schedulable Online Testing Framework for Real-Time Embedded Applications in VM |
|
4A-3.3 |
A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain |
4B-3.3 |
Performance Analysis for Distributed Classification Fusion Using Soft-Decision Decoding in Wireless Sensor Networks |
4C-3.3 |
Scalable Lossless High Definition Image Coding on Multicore Platforms |
|
4A-3.4 |
|
|
4C-3.4 |
Self-Stabilizing Structure Forming Algorithms for Distributed Multi-Robot Systems |
||
15:00 15:20 |
Break |
|||||
15:20 ~ 17:00 |
Session 4A-4: |
Session 4B-4: |
Session 4C-4: |
|||
|
|
|
|
|||
|
|
|
|
|||
|
|
|
|
|||
|
|
|
|
|
|