December 17, 2007

 

Da Vinci Hall

Raphael Hall

Michelangelo Hall

08:30 ~ 10:10

Session 1A-1: TRUST

Session 1B-1: WSOC - Keynote speech

Session 1C-1: NCUS

1A-1.1

Attack-Resilient Random Key Distribution Scheme For Distributed Sensor Networks

Invited Talk I:  TBA

1C-1.1

A Multicast Extension for Enhanced Mobile IP by Home Agent Handover

1A-1.2

A critical approach to Privacy research in Ubiquitous Environments: Issues and Underlying Assumptions

 

1C-1.2

Autonomic Multi-Server Distribution in Flash Crowds Alleviation Network

1A-1.3

The Case Study of Information Security System for International Airports

Invited Talk II: TBA

1C-1.3

Generic Energy-efficient Geographic Routing for Ad-Hoc Wireless Networks

1A-1.4

Quantitative Evaluation of Intrusion Tolerant Systems subject to DoS Attacks via Semi-Markov Cost Models

 

1C-1.4

Description of a New Feature Meta-model

10:10  10:30

Break

10:30 ~ 12:10

Session 1A-2: TRUST

Session 1B-2: WSOC - Technical Session

Session 1C-2: NCUS

1A-2.1

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System

1B-2.1

High Speed Analog to Digital Converter for Ultra Wide Band Applications

1C-2.1

Studying of Multi-dimensional Based Replica Management in Object Storage System

1A-2.2

UPS: An Ubiquitous Proximity eService for Trust and Collaboration

1B-2.2

Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions

1C-2.2

Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations

1A-2.3

Obligations for Privacy and Confidentiality in Distributed Transactions

1B-2.3

Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies

1C-2.3

An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks

1A-2.4

Multi-channel Enhancements for IEEE 802.11-based Multi-hop Ad-hoc Wireless Networks

1B-2.4

A dynamic frequency allocation scheme for IEEE 802.16 OFDMA-based WMANs using Hungary Algorithm

 

 

12:10 13:20

Lunch Break

13:20 ~ 15:00

Session 1A-3: TRUST

Session 1B-3: WSOC - Technical Session

Session 1C-3: NCUS

1A-3.1

An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments

1B-3.1

Wireless Network Management System for WiMAX Wi-Fi Mesh Networks

1C-3.1

Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks

1A-3.2

A Loop-based Key Management Scheme for wireless sensor networks

1B-3.2

An Implementation of QoS Framework for Heterogeneous Networks

1C-3.2

Intelligent Monitoring using Wireless Sensor Networks

1A-3.3

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

1B-3.3

Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks

1C-3.3

On the Design of Micro-mobility for Mobile Network

1A-3.4

Security Technologies based on Home Gateway for making Smart Home secure

 

 

 

 

15:00 15:20

Break

15:20 ~ 17:00

Session 1A-4: TRUST

Session 1B-4: WSOC - Technical Session

Session 1C-4: NCUS

1A-4.1

Layered Peer to Peer Streaming Using Hidden Markov Models

1B-4.1

A Cross-layer Signaling and Middleware Platform for Multi-interface Mobile Devices

1C-4.1

ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment

1A-4.2

The Optimum Power Controller for Random Number Generator for Crypto Module in Ubiquitous Computing Environment

1B-4.2

Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e

1C-4.2

Self-authorized Public Key Management For Home Networks

1A-4.3

Fault Diagnosis and Prognosis for Reliability of System using Bayesian Network

1B-4.3

Enhanced Fingerprint-based Location Estimation System in Wireless LAN Environment

1C-4.3

A Cross-layered Diagnostician in OSGi Platform for Home Network

 

 

1B-4.4

Improving Channel Scanning Procedures for WLAN Handoffs

 

 

18:30 20:30

Reception

 

 

December 18, 2007

 

Da Vinci Hall

Raphael Hall

Michelangelo Hall

08:30  10:10

Keynote Speech: Dr. Wei Zhao, Plato Hall

10:10 10:30

Break

10:30 ~ 12:10

Session 2A-2: UUWSN - Applications                      Chair : Prof. Ki-Man Kim, Korea Maritime University

Session 2B-2: Power-Aware Computing

Session 2C-2: Reconfigurable Embedded Systems

 

Opening Ceremony & Welcome Speech                                          

2B-2.1

A Software Framework for Energy and Performance Tradeoff in Fixed-Priority Hard Real-time Embedded Systems

2C-2.1

Parallel Network Intrusion Detection on Reconfigurable Platforms

2A-2.1

LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks

2B-2.2

Real-Time Loop Scheduling with Energy Optimization via DVS and ABB for Multi-Core Embedded Systems

2C-2.2

Function-level Multitasking Interface Design in an Embedded Operating System with Reconfigurable Hardware

2A-2.2

TinyOS-based Gateway for Underwater Acoustics/Radio Frequency Communication

2B-2.3

Energy Efficient Scheduling for Real-Time Systems with Mixed Workload

2C-2.3

Task Scheduling for Context Minimization in Dynamically Reconfigurable Platforms

2A-2.3

An Energy Scheduling Algorithm for Ensuring the Pre-Determined Lifetime in Sensor Network

2B-2.4

A Shortest Time First Scheduling Mechanism for Reducing the Total Power Consumptions of an IEEE 802.11 Multiple Rate Ad Hoc Network

2C-2.4

Compiler Support for Dynamic Pipeline Scaling

12:10 13:20

Lunch Break

13:20 ~ 15:00

Session 2A-3: UUWSN - Protocols                               Chair : Prof. Young-Sik Jeong, Wonkwang University

Session 2B-3: Wireless Networks

Session 2C-3: Real-time/Embedded Operating Systems

 

Keynote : Ocean experiments in underwater acoustic networking
               Prof. Joseph A. Rice (Naval Postgraduate School, US)

2B-3.1

Evaluating Mobility Support in ZigBee Networks

2C-3.1

Revisiting Fixed Priority Techniques

2A-3.1

Underwater Acoustic Communication and Modem-Based Navigation Aids

2B-3.2

On Using Probabilistic Forwarding to Improve HEC-based Data Forwarding in Opportunistic Networks

2C-3.2

A Server-side Pre-linking Mechanism for Updating Embedded Clients Dynamically

2A-3.2

State-of-the-art in MAC protocols for Underwater Acoustics Sensor Networks

2B-3.3

Improving the Performance of the Wireless Data Broadcast by the Cyclic Indexing Schemes

2C-3.3

Real-Time Scheduling under Time-Interval Constraints

2A-3.3

An Ultrasonic Sensor based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks

2B-3.4

Employment of Wireless Sensor Network for Full-Scale Ship Application

2C-3.4

Towards a Software Framework for Building Highly Flexible Component-based Embedded Operating Systems

15:00 15:20

Break

15:20 ~ 17:00

Session 2A-4: UUWSN - Systems                               Chair : Prof. Dong-Won Jeong, Kunsan National University

Session 2B-4: Embedded System Architectures

Session 2C-4: Scheduling and Resource Management

2A-4.1

UWA-NAV: Energy Efficient Error Control scheme for Underwater Acoustic Sensor Network

2B-4.1

A Study on Asymmetric Operating Systems on Symmetric Multiprocessors

2C-4.1

Novel Radio Resource Management Scheme with Low Complexity for Multiple Antenna Wireless Network System

2A-4.2

Underwater Wideband Source Localization Using the Interference Pattern Matching

2B-4.2

An Efficient Code Generation Algorithm for Code Size Reduction Using 1-offset P-Code Queue Computation Model

2C-4.2

Consensus-Driven Distributable Thread Scheduling in Networked Embedded Systems

2A-4.3

A New Virtual Select Database Operation for Wireless Sensor Networks

2B-4.3

MPSoC Architectural Design and Synthesis for Real-Time Biomedical Signal Processing in Gamma Cameras

2C-4.3

Swing Scheduling: a Novel Scheduling Mechanism to Fully Utilize the Multiple Processors in the MPSoC Architecure

2A-4.4

GT2 : Reduced Wastes time Mechanism for Underwater Acoustic Sensor Network

2B-4.4

Integrated Global and Local Quality-of-Service Adaptation in Distributed, Heterogeneous Systems

 

 

18:30 20:00

PC and Organizing Committee Meeting

 

 

December 19, 2007

 

Da Vinci Hall

Raphael Hall

Michelangelo Hall

08:30 ~ 10:10

Session 3A-1: USN - RFID Protocols and Applications

Session 3B-1: Mobile Computing

Session 3C-1: System Security

3A-1.1

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-Collision Protocols for RFID Networks

3B-1.1

Modelling Protocols for Multiagent Interaction by F-logic

3C-1.1

ID-Based Key Agreement with Anonymity for Ad Hoc Network

3A-1.2

An Efficient Mutual Authentication protocol on RFID Tags

3B-1.2

Palpability Support Demonstrated

3C-1.2

Buffer Cache Level Encryption for Embedded Secure Operating System

3A-1.3

HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for Distributed RFID system

3B-1.3

GPS-based Location Extraction for Mobile Instant Messenger

3C-1.3

Bilateration: An attack-resistant localization of Wireless Sensor Network

 

 

3B-1.4

Adding Adaptability to Mailbox-based Mobile IP

3C-1.4

SOM-Based Anomaly Intrusion Detection System

10:10 10:30

Break

10:30 ~ 12:10

Session 3A-2: USN 2007 - USN Protocols and Services

Session 3B-2: Network Protocols

Session 3C-2: Fault Tolerance

3A-2.1

Target Classification in Sparse Sampling Acoustic Sensor Networks using IDDC Algorithm

3B-2.1

TCP-Taichung: A RTT-based Predictive Bandwidth Based with Optimal Shrink Factor for TCP Congestion Control in Heterogeneous Wired and Wireless Networks

3C-2.1

An Efficient Handoff Strategy for Mobile Computing Checkpoint System

3A-2.2

Scriptable Sensor Network based Home-Automation

3B-2.2

Rate-Adaptive Layered Multicast (RALM) for Video Services in WiMAX

3C-2.2

A Lightweight RFID Protocol Using Substring

3A-2.3

Applying Situation Awareness to Mobile Proactive Information Delivery

3B-2.3

A Time Slot Reservation Protocol for Wireless Ad Hoc Networks

3C-2.3

The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing

 

 

3B-2.4

Efficient and Load-Balance Overlay Multicast Scheme with Path Diversity for Video Streaming

3C-2.4

Fast and Simple On-Line Sensor Fault Detection Scheme for Wireless Sensor Networks

12:10 13:20

Lunch Break

13:20 ~ 15:00

Session 3A-3: ESO

Session 3B-3: Human-Computer Interface and Data Management

Session 3C-3: HW/SW Co-design and Design Automations

3A-3.1

Energy-Efficiency on a Variable-Bitrate Device

3B-3.1

Activity Recognition Based on Intra and Extra Manipulation of Everyday Objects

3C-3.1

A Floorplan-Based Power Network Analysis Methodology for System-on-chip Designs

3A-3.2

Software Power Peak Reduction on Smart Card Systems based on Iterative Compiling

3B-3.2

Finding and Extracting Data Records from Web Pages

3C-3.2

A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems

3A-3.3

The Secure DAES Design for Embedded System Application

3B-3.3

Towards Transparent Personal Content Storage in Multi-Service Access Networks

3C-3.3

SystemC-based Design Space Exploration of a 3D Graphics Acceleration SoC for Consumer Electronics

 

 

3B-3.4

Extraction and Classification of User Behavior

3C-3.4

Optimal Allocation of I/O Device Parameters in Hardware and Software Codesign Methodology

15:00 15:20

Break

15:20 ~ 17:00

Session 3A-4: ESO

Session 3B-4: Service-Aware Computing

Session 3C-4: SECUBIQ - Signature Scheme

3A-4.1

Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential

3B-4.1

User Preference Based Service Discovery

3A-2.1

Security analysis of the certificateless signature scheme proposed at SecUbiq 2006

3A-4.2

A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly- perturbed Computer Controlled Systems

3B-4.2

A Semantic P2P Framework for Building Contextaware Applications in Multiple Smart Spaces

3A-2.2

New Efficient Certificateless Signature Scheme

3A-4.3

Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems

3B-4.3

Usage-aware Search in Peer-to-Peer Systems

3A-2.3

An Practical Identity-Based Signature Scheme from Bilinear Map

3A-4.4

Evaluating modeling languages on their ability to support the partitioning of Automotive Embedded Systems

3B-4.4

A Service Query Dissemination Algorithm for Accommodating Sophisticated QoS Requirements in a Service Discovery System

3A-2.4

Linkable Ring Signatures from Linear Feedback Shift Register

18:30 20:30

 

Banquet

 

 

December 20, 2007

 

Da Vinci Hall

Raphael Hall

Michelangelo Hall

08:30 10:10

Keynote Speech: Dr. L.G. Chen, Socrates Hall

10:10 10:30

Break

10:30 ~ 12:10

Session 4A-2: SECUBIQ - Key Management

Session 4B-2: Ad Hoc and Sensor Networks

Session 4C-2: Ubiquitous Computing

4A-2.1

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem

4B-2.1

A Selective Push Algorithm for Cooperative Cache Consistency Maintenance in MANETs

4C-2.1

PerSON: A Framework for Service Overlay Network in Pervasive Environments

4A-2.2

A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks

4B-2.2

Hard Constraint Vertex-Cover Communication Algorithm for WSN

4C-2.2

Universal Adaptor: A Novel Approach to Supporting Multi-protocol Service Discovery in Pervasive Computing

4A-2.3

Token-based Authenticated Key Establishment Protocols for Three-party Communication

4B-2.3

A Constrained Multipath Routing Protocol for Wireless Sensor Networks

4C-2.3

U-Interactive: A Middleware for Ubiquitous Fashionable Computer to Spontaneously Interact with Ubiquitous Environment, U-TOPIA

4A-2.4

Two Approaches on Pairwise Key Path Establishment for Sensor Networks

4B-2.4

Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc Sensor Networks

4C-2.4

Towards Context-Awareness in Ubiquitous Computing

12:10 13:20

Lunch Break

13:20 ~ 15:00

Session 4A-3: SECUBIQ - Authentication Protocol

Session 4B-3: Sensor Networks

Session 4C-3: Embedded Software Designs

4A-3.1

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks

4B-3.1

An Optimal Distribution of Data Reduction in Sensor Networks with Hierarchical Caching

4C-3.1

Real-Time Embedded Software Design for Mobile and Ubiquitous Systems

4A-3.2

Low-cost and Strong-security RFID Authentication Protocol

4B-32.2

MOFBAN: A Lightweigt Modular Framework for Body Area Networks

4C-3.2

Schedulable Online Testing Framework for Real-Time Embedded Applications in VM

4A-3.3

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain

4B-3.3

Performance Analysis for Distributed Classification Fusion Using Soft-Decision Decoding in Wireless Sensor Networks

4C-3.3

Scalable Lossless High Definition Image Coding on Multicore Platforms

4A-3.4

 

 

4C-3.4

Self-Stabilizing Structure Forming Algorithms for Distributed Multi-Robot Systems

15:00 15:20

Break

15:20 ~ 17:00

Session 4A-4:

Session 4B-4:

Session 4C-4: