The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

FINAL PROGRAM

18 – 20 November 2015 Zhangjiajie, Province, China

Copyright © Trusted Computing Institute, Central South University, China http://trust.csu.edu.cn

1

Introduction to Central South University

Central South University (CSU) is a comprehensive and national key university under the direct administration of the Ministry of Education in China. CSU is among the first group of top universities in China admitted into “Project 211”, which is a project of building national key universities and colleges for the 21st century, and “Project 985”, which is a joint constructive project of building world-class universities co-sponsored by the Chinese central government and the local governments, and “Project 2011”, which is targeted for promoting the capability and capacity of cooperative creativity in top universities in China. Mr. Zhang Yaoxue, a member of the Chinese Academy of Engineering, and the inventor of Transparent Computing (TC), is the President of CSU.

Approved by the State Council, CSU was established on April 29, 2000, by merging three separate universities, including Hunan Medical University (HMU), Railway University (CRU), and Central South University of Technology (CSUT). CSU covers an area of around 5,117 mu (341 hectares).

CSU boasts a high-quality group of faculty, comprising of many famous scholars and experts with great influence both at home and abroad. Among them, there are 2 members of the Chinese Academy of Sciences, 15 academicians who are members of Chinese Academy of Engineering, 9 are members of the Discipline Assessment Group of the Academic Degrees Committee of the State Council, 23 scientific and technological experts have been recognized at a national level for their outstanding achievements, 545 experts have been awarded special subsidies from the Government, more than 1000 are doctorate supervisors and 33 are Special-term Professors funded by the Changjiang Scholar Program. In addition, CSU has appointed a number of well-known Chinese and international scholars as honorary professors, visiting professors, or adjunct professors.

CSU covers 12 fields of study, including engineering, science, medicine, management, literature, law, economics, philosophy, education, history, agriculture, and art, and offers military science as well. It consists of 30 colleges offering 92 programs for bachelors’ degrees, and a graduate school comprising of a number of national key disciplines, including 6 at first-level (ranking 8th in China), 12 at second-level and one in development. 91 first-level disciplines are authorized to confer masters and doctoral degrees. 191 programs are offered for doctoral degrees, 307 programs for masters’ degrees and 19 programs for professional masters’ degrees. CSU also has 42 post-doctoral exchange centers, ranking 9th among Chinese universities and colleges.

At present, more than 55,000 full-time students are studying at CSU, including 20,000 graduate students and 800 foreign students, from 31 provinces and municipalities of the mainland China, as well as 80 countries and regions of the rest of the world. CSU is a leading and top ranking Chinese university in the following aspects: one of the universities first starting an eight-year medical program ( M.D.), the first university running a pilot class for training innovation-oriented senior engineering talents, the first civilian university offering master degree in military command and technique for officers, boasting five national talents training and teaching bases, six national centers for experimental teaching, 57 national exemplary courses, six bilingual national exemplary courses, six “excellent teachers” and eight teaching teams highly recognized by the state, 15 National Top 100 Doctoral Dissertations produced by its graduates since 2000. CSU also possesses three national first-class affiliated hospitals equipped with state-of-the-art medical facilities.

http://www.csu.edu.cn/

2

Introduction to Jishou University

Jishou University (JSU) is a public university in the western part of Hunan Province and the only comprehensive university in the border area of Hunan, , Chongqing and Guizhou provinces. Founded in September 1958, the University is composed of two campuses in Jishou and Zhangjiajie cities, with the main campus in Jishou City, the capital city of Xiangxi Autonomous Prefecture.

In 2003, the university was entitled the right to confer master’s degrees. In October 2006, the university successfully passed the undergraduate education evaluation on regular institutions of higher learning organized by the Ministry of Education with a comment of “Excellent”. The year of 2012 saw the university rank among “universities of capacity construction project in mid-west”. At the same year, the university was approved to carry out “Ph. D program catering for special demands of our country”.

The university covers an area of 1.29 million square meters with the total building area of 600,000 square meters. Presently, the university has been equipped with various teaching and scientific researching instruments and equipments with a total value of over RMB 170 million as well as a book and literature collection of over 2.3million volumes. The university currently has over 1000 full-time teachers, of which 86% are provided with doctor’s or master’s degree.

At present, there are 70 undergraduate majors offered by the university, among which 3 are national characteristic majors, 8 are provincial characteristic majors.8 are provincial key majors. The university is now operating 1 Ph.D program catering for special demands of our county,14 first-grade disciplines for master’ a degree, 1 professional master degree program and 1characteristic, advanced and key discipline, covering 11 main disciplines. In addition, there are 14 provincial and ministerial level key research bases,1 national experimental teaching demonstration center,5 provincial practice teaching demonstration centers.

The students of various types total over 30,000, of which over 18,000 are full-time undergraduate students, over 800 are graduate students. The number of undergraduates in the independent college is almost 8,000, and that of adult diploma education students is over 7,000.

Over half a century, the university adheres to the educational philosophy of “Populace University”, regards it as its own duty to serve for the regional economic and social development, fulfills irreplaceable educational function in the west of Hunan and in the border area of Hunan, Hubei, Chongqing and Guizhou provinces, forming distinguished schooling-running characteristics and being widely approved by all sectors of the society.

http://www.jsu.edu.cn/

3

TABLE OF CONTENTS

Cover Introduction to Central South University (CSU) Page 02 Cover Introduction to Jishou University (JSU) Page 03 Final Program at a Glance Page 01 Quick Guide to Rooms for Keynote / Technical Page 03 Sessions Welcome Messages Page 04

Keynote Speeches Page 13

Panel Discussions Page 17

Technical Sessions and Papers Page 19

Organizing and Program Committees Page 35 Introduction to School of Information Science and Page 48 Engineering, Central South University Introduction to School of Software and Service Page 49 Outsourcing of Jishou University Cover Conference Venue Page 4 Cover Sponsors, Organizers, and Publishers Page 5

4

FINAL PROGRAM OF ICA3PP 2015 AT A GLANCE

Important: ICA3PP 2015 attendees are also welcome to attend all keynote sessions/technical sessions/panel discussions of the co-located IEEE PRDC 2015 conference. November 17 (Tuesday)

15:00-20:00 On-Site Registration

18:00-20:00 Reception @ Zhangjiajie International Hotel

November 18 (Wednesday)

On-Site Registration from 8:00 to 18:00

08:30-09:00 Opening Ceremony (Room 0) Keynote 1: Prof. Wanlei Zhou, Senior Member of IEEE, Alfred Deakin Professor, Deakin University, Australia; Identifying Propagation Sources and Modeling Propagation 09:00-09:45 Dynamics in Networks (Room 0) 09:45-10:15 Coffee/Tea Break

10:15-12:30 T9A(Room0) T7A (Room3) DependSys-A(Room4) T6A(Room5) T5A(Room6) T4A(Room7) T3A(Room8) T1A(Room9)

12:30-14:00 Lunch @ Zhangjiajie International Hotel

14:00-16:00 T9B(Room0) T7B (Room3) DependSys-B(Room4) T6B(Room5) T5B(Room6) T4B(Room7) T3B(Room8) T1B(Room9)

16:00-16:15 Coffee/Tea Break

16:15-18:15 T9C(Room0) T7C (Room3) DependSys-C(Room4) T6C(Room5) T5C(Room6) T4C(Room7) T3C(Room8) T1C(Room9)

19:00-21:00 Dinner @ Zhangjiajie International Hotel

1

November 19 (Thursday)

On-Site Registration from 8:00 to 18:00 Keynote 2: Prof. Jiannong Cao, Fellow of IEEE, Head and Professor at The Hong Kong Polytechnic University, Hong Kong; Design of Distributed Algorithms for 08:30-09:15 Engineering Applications of WSNs (Room 0) Panel 2 Panel 1 DependSys-D 09:15-11:15 T7D(R3) T6D(R5) T5D(R6) T4D(R7) T8A(R8) T2A(R9) (Room 0) (Room 1) (R4) 11:15-11:30 Coffee/Tea Break TrustData-A 11:30-12:30 TSP-A(R3) TSP-B(R4) TSP-C(R5) NOPE-A(R6) NOPE-B(R7) SCS-A(R8) SPPCN-A(R9) (R0) 12:30-14:00 Lunch @ Zhangjiajie International Hotel DependSys-E 14:00-16:00 T9D(R0) T3D(R3) T7E(R5) T5E(R6) T4E(R7) T8B(R8) T2B(R9) (R4) 16:00-16:15 Coffee/Tea Break T1D+T8C 16:15-18:15 T9E(R0) T3E(R3) T9F(R4) T7F(R5) T9G(R6) T9H(R7) SPPCN-B(R9) (R8) 19:00-21:00 Banquet @ Zhangjiajie International Hotel

November 20 (Friday)

On-Site Registration from 8:00 to 12:00 Keynote 3: Prof. John C.S. Lui, Fellow of ACM, Fellow of IEEE, The Chinese University of Hong Kong, Hong Kong; The Shapley Value: Its Use and Implications on 08:30-09:15 Internet Economics (Room 0, shared with PRDC 2015) Keynote 4: Prof. Hai Jin, Senior Member of IEEE, Professor at Huazhong University of Science and Technology, China; In-Memory Computing: New Architecture for Big 09:15-10:00 Data Processing (Room 0) 10:00-10:30 Coffee/Tea Break (NOPE-C)+(T4F) 10:30-12:30 TrustData-B(Room 0) TSP-D(Room 3) (Room4) 12:30-14:00 Lunch @ Zhangjiajie International Hotel, Closing of the Conference

2

Quick Guide to Rooms for Keynote/Technical/Panel Sessions

Room Number Room Name Floor

Grand Hall Room 0 2 (多功能厅) Guoyan Hall Room 1 2 (国宴厅) Xiangjiang Hall Room 2 2 (湘江厅) Lishui Hall Room 3 2 (澧水厅) Zijiang Hall Room 4 2 (资江厅) Yuanjiang Hall Room 5 2 (沅江厅) Business Center Room 6 2 (商务中心) Tianmen Shan Room 7 2 (天门山) Yangjiajie Room 8 2 (杨家界) Shi Li Hua Lang Room 9 2 (十里画廊)

3

Welcome Messages from ICA3PP 2015 General Chairs

Welcome to the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), which is organized by Central South University, Hunan University, National University of Defense Technology, and Jishou University.

It is our great pleasure to organize the ICA3PP 2015 conference in Zhangjiajie, China on 18-20 November 2015. On behalf of the organizing committee of the conference, we would like to express to all participants who will attend the conference, our cordial welcome and great gratitude.

ICA3PP 2015 is the 15th event in the series of conferences started in 1995 that is devoted to algorithms and architectures for parallel processing. ICA3PP is now recognized as the main regular event in the world that covers many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. The conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications.

ICA3PP 2015 has attracted high-quality research papers which highlight the foundational work that strives to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing parallel processing technology.

ICA3PP 2015 consists of the main conference and six international symposia and workshops. Many individuals have contributed to the success of the conference. We would like to express our special appreciation to Prof. Yang Xiang, Prof. Andrzej Goscinski and Prof. Yi Pan, the Steering Committee Chairs, for giving us the opportunity to host this prestigious conference and for their guidance on the conference organization. Special thanks to the Program Chairs, Prof. Albert Zomaya, Prof. Gregorio Martinez and Prof. Kenli Li, for their outstanding work on the technical program. Thanks also to the Workshop Chairs, Dr. Mianxiong Dong, Dr. Ryan K. L. Ko and Dr. Md. Zakirul Alam Bhuiya, for their excellent work in organizing attractive symposia and workshops. Thanks also to Publicity Chairs, Prof. Carlos Becker Westphall, Dr. Yulei Wu, Prof. Christian Callegari, Prof. Kuan-Ching Li and Prof. James J. (Jong Hyuk) Park, for the great job in publicizing this event for wide. We would like to give our thanks to all the members of the Organizing Committee and Program Committee members and External Reviewers for their efforts and support. We would also like to give our thanks to Keynote Speakers, Prof. John C.S. Lui, Prof. Jiannong Cao, Prof. Wanlei Zhou and Prof. Hai Jin, for offering insightful and enlightening talks. Last but not least, we would like to thank all the authors who submitted their papers to the conference, and we hope that you will be able to attend this wonderful event!

General Chairs Guojun Wang, Central South University, China Peter Mueller, IBM Zurich Research, Switzerland Qingping Zhou, Jishou University, China

4

Welcome Messages from ICA3PP 2015 Program Chairs

On behalf of the Program Committee of the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), we would like to welcome you to join the conference in Zhangjiajie, China on 18-20 November, 2015.

The ICA3PP 2015 conference aims at bringing together researchers and practitioners in the world from both academia and industry who are working on algorithms and architectures for parallel processing. The conference will feature keynote speeches, panel discussions, technical presentations, symposiums and workshops, where the technical presentations from both the research community and industry will cover various aspects including fundamental theoretical approaches, practical experimental projects, and commercial components and systems. ICA3PP 2015 is the next event in a series of highly successful international conferences on algorithms and architectures for parallel processing, previously held as ICA3PP-14 (Dalian, China, August 2014), ICA3PP-13 (Vietri sul Mare, Italy, December 2013), ICA3PP-12 (Fukuoka, Japan, September 2012), ICA3PP-11 (Melbourne, Australia, October 2011), ICA3PP-10 (Busan, Korea, May 2010), ICA3PP-09 (Taipei, Taiwan, June 2009), ICA3PP-08 (Cyprus, June 2008), ICA3PP-07 (Hangzhou, China, June 2007), ICA3PP-05 (Melbourne, Australia, October 2005), ICA3PP-02 (Beijing, China, October 2002), ICA3PP-00 (Hong Kong, China, December 2000), ICA3PP-97 (Melbourne, Australia, December 1997), ICA3PP-96 (Singapore, June 1996), and ICA3PP-95 (Brisbane, Australia, April 1995).

The ICA3PP 2015 conference collected research papers on the related research issues from all around the world. This year we received 602 submissions for the main conference. All submissions received at least three reviews from a high-quality review process. According to the review results, 219 papers are selected for oral presentation at the conference, giving an acceptance rate of 36.4%.

We would like to offer our gratitude to Prof. Yang Xiang and Prof. Andrzej Goscinski from Deakin University, Australia, and Prof. Yi Pan from Georgia State University, USA, the Steering Committee Chairs. Our thanks also to the General Chairs, Prof. Guojun Wang from Central South University, China, Dr. Peter Mueller from IBM Zurich Research, Switzerland, and Prof. Qingping Zhou from Jishou University, China, for their great support and good suggestions to make the success of the final program. Special thanks to the Workshop Chairs, Dr. Mianxiong Dong from Muroran Institute of Technology, Japan, and Dr. Ryan K. L. Ko from the University of Waikato, New Zealand, and Dr. Md. Zakirul Alam Bhuiyan from Temple University, USA. In particular, we would like to give our thanks to all researchers and practitioners who submitted their manuscripts, and to the Program Committee and the external reviewers that contributed their valuable time and expertise to provide professional reviews working under a very tight schedule. Moreover, we are very grateful to our keynote speakers who have kindly accepted our invitation to give insightful and prospective talks.

Finally, we sincerely hope that the conference will provide a very good opportunity for you to learn from each other. Enjoy the conference, both technically and socially!

Program Chairs Albert Zomaya, University of Sydney, Australia Gregorio Martinez, University of Murcia, Spain Kenli Li, Hunan University, China

5

Welcome Messages from ICA3PP 2015 Workshop Chairs

Welcome to the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015) in Zhangjiajie, China on 18-20 November 2015. The program of this year consists of 6 symposiums/workshops that cover a wide range of research topics on parallel processing technology:

(1) The Sixth International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015) (2) The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2015) (3) The Third International Workshop on Network Optimization and Performance Evaluation (NOPE 2015) (4) The Second International Symposium on Sensor-Cloud Systems (SCS 2015) (5) The Second International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015) (6) The First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2015)

The aim of these symposiums/workshops is to provide a forum to bring together practitioners and researchers from academia and industry for discussion and presentations on the current research and future directions related to parallel processing technology. The themes and topics of these symposiums/workshops are a valuable complement to the overall scope of ICA3PP 2015 and give additional values and interests. We hope that all of the selected papers will have a good impact on future research in the respective field.

The ICA3PP 2015 workshops collected research papers on the related research issues from all around the world. This year we received 205 submissions for all workshops. All submissions received at least three reviews from a high-quality review process. According to the review results, 77 papers are selected for oral presentation at the conference, giving an acceptance rate of 37.6%.

We offer our sincere gratitude to the workshop organizers for their hard work on designing the call for papers, assembling the program committee, managing the peer-review process for the selection of papers, and planning the workshop program. We are grateful to the workshop program committees, external reviewers, session chairs, contributing authors, and attendees. Our special thanks to the Organizing Committees of ICA3PP 2015 for their strong support, and especially to the Program Chairs, Prof. Albert Zomaya, Prof. Gregorio Martinez and Prof. Kenli Li, for their guidance.

Finally, we hope that you will find the symposiums and workshops interesting and stimulating, and also enjoy the ICA3PP 2015 conference and the fantastic city of Zhangjiajie, China.

Workshop Chairs Mianxiong Dong, Muroran Institute of Technology, Japan Ryan K. L. Ko, The University of Waikato, New Zealand Md. Zakirul Alam Bhuiyan, Temple University, USA

6

Welcome Messages from TrustData 2015 Program Chairs

On behalf of the Program Committee of the 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015), we would like to welcome you to join the conference in Zhangjiajie, China.

TrustData 2015 aims at bringing together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data.

TrustData 2015 is the next event in a series of highly successful international workshop on Trust, Security and Privacy for Big Data (TrustData), previously held as TrustData-14 (Dalian, China, March 2012), TrustData-13 (Zhangjiajie, China, November, 2013).

This international workshop collected research papers on the above research issues from all around the world. Each paper was reviewed by at least three experts in the field. We feel very proud of the big number of participation, and it has been difficult to collect the best papers from all the received, but at the end we have defined an amazing conference that we hope, we can enjoy during the following days.

We would like to offer our gratitude to the General Chairs, Dr. Qin Liu and Dr. Muhammad Bashir Abdullahi for their excellent support and invaluable suggestions to make the success of the final program. In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and thank the Program Committee members and the additional reviews for their tremendous efforts and timely reviews.

We hope all of you enjoy TrustData 2015 and find that it will be a very good opportunity to learn from each other and that your attendance will be most enjoyable and fruitful.

Program Chairs Keqin Li, State University of New York at New Paltz, USA Avinash Srinivasan, Temple University, USA

7

Welcome Messages from TSP 2015 Program Chairs

On behalf of the Program Committee of the 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2015), we would like to welcome you to join the conference in Zhangjiajie, China.

The symposium focuses on trust, security, and privacy issues in social networks, cloud computing, Internet of Things (IoT), wireless sensor networks, and other networking environments or system applications; and provides a forum for them to present and discuss emerging ideas and trends in this highly challenging research area. The aim of this symposium is to provide a leading edge forum to foster interaction between researchers and developers with the trust, security, and privacy issues, and to give attendees an opportunity to network with experts in this area.

Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, TSP-09 in Macau SAR, China, during October 12-14, 2009, TSP-10 in Bradford, UK, during June 29-July 1, 2010, and TSP-13 in Zhangjiajie, China, during November 13-15, 2013, the Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15) will be held in Zhangjiajie, China, during November 18-20, 2015, in conjunction with the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015).

The symposium collected research papers on the above research issues from all around the world. Each paper was reviewed by at least two experts in the field. We have defined an amazing symposium that we hope, we can enjoy during the conference days.

We would like to thank all researchers and practitioners who submitted their manuscripts, and thank the Program Committee members and the additional reviewers for their tremendous efforts and timely reviews.

We hope all of you enjoy TSP 2015 and find that it will be a very good opportunity to learn from each other and that your attendance will be most enjoyable and fruitful.

Program Chairs

Imad Jawhar, United Arab Emirates University, UAE Deqing Zou, Huazhong University of Science of Technology, China

8

Welcome Messages from NOPE 2015 Program Chairs

Welcome to the 2015 International Workshop on Network Optimization and Performance Evaluation (NOPE 2015) held in Zhangjiajie, China during November 18-20, 2015!

Network optimization and performance evaluation is a topic that attains a lot of attention in network/Internet and distributed systems. Due to the recent advances in the Internet based applications as well as WLANs, wireless home networks, and wireless sensor networks, wireless mesh networks, cloud computing, we are witnessing a variety of new technologies. However, these systems and networks are becoming very large and complex, and consuming large energy at the same time. System optimization and performance evaluation remains to be resolved before these systems become a commodity.

On behalf of the organizing committee, we would like to take this opportunity to express our gratitude to all reviewers who have been working hard to finish reviews on time. Thanks to the Publicity Chairs for their efforts and support. Thanks also to all authors for your great support and contribution to the event. We would like to give our special thanks to the organizing committee, colleagues and friends who have been working behind-the-scenes. Without their unfailing cooperation, hard work and dedication, this event would not be successfully organized.

We are grateful to all of you for participating in NOPE 2015, and we would like to encourage you to explore the beautiful sight of Zhangjiajie during your stay and enjoy the conference.

Program Chair Gaocai Wang, Guangxi University, China

9

Welcome Messages from SCS 2015 Program Chairs

As the Program Chairs and on behalf of the Organizing Committee of the 2nd International Symposium on Sensor-Cloud Systems (SCS 2015), we would like to express our cordial welcome and gratitude for all participants that attend the symposium in Zhangjiajie, China, 18-20 November, 2015. This famous city is the location of China’s first forest park (The Zhangjiajie National Forest Park) and a World Natural Heritage site (Wulingyuan Scenic Area).

The aim of SCS 2015 is to bring together researchers and practitioners working on sensor-cloud systems area to present and discuss emerging ideas and trends in this highly challenging research field. It has attracted some high quality research papers which highlight the foundational work that strives to push beyond limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in the existing technology services.

SCS 2015 is sponsored by National Natural Science Foundation of China, Springer, School of Information Science and Engineering at Central South University, School of Software at Central South University, organized by Central South University, Hunan University, National University of Defense Technology, and Jishou University. SCS 2015 is in conjunction with the 15th International Conference Algorithms and Architectures for Parallel Processing (ICA3PP 2015), which highlight the latest research trends in various aspects of computer science and technology.

Many individuals have contributed to the success of this international symposium. We would like to express our special appreciation to the General Chairs of main conference, Prof. Guojun Wang, Prof. Peter Mueller and Prof. Qingping Zhou for giving us this opportunity to hold this symposium and for their guidance on the organization. Thanks also to the General Chairs of this symposium, Prof. Jie Li and Prof. Dongqing Xie, for their excellent work in organizing the symposium. We would like to give our thanks to all the members of the Organizing Committee and Program Committee for their efforts and support.

Finally, we are grateful to the authors for submitting their fine work to SCS 2015 and all the participants for their attendance. Hope you enjoy the conference as well as beautiful Zhangjiajie!

Program Chairs Xiaofei Xing, Guangzhou University, China Md. Zakirul Alam Bhuiyan, Central South University, China, and Temple University, USA

10

Welcome Messages from SPPCN 2015 Program Chairs

On behalf of the Program Committee of the 2nd International Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015), we would like to welcome you to join the workshop in Zhangjiajie, China.

The workshop focuses on security and privacy protection in computer and network systems, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of computer and network systems. The aim of the workshop is to provide a leading edge forum to foster interaction between researchers and developers with the security and privacy protection in computer and network systems, and to give attendees an opportunity to network with experts in this area.

SPPCN 2015 is the next event in a series of highly successful international conferences on security and privacy protection in computer and network systems, previously held as SPPCN-15 (Dalian, China, December 2015). The workshop collected research papers on the above research issues from all around the world. Each paper was reviewed by at least two experts in the field.

We would like to offer our gratitude to the General Chair, Prof. Jian Weng, for their excellent support to make the success of the final program. In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and thank the Program Committee members and the additional reviews for their tremendous efforts and timely reviews.

We hope all of you enjoy SPPCN 2015 and find that it will be a very good opportunity to learn from each other and that your attendance will be most enjoyable and fruitful.

Program Chairs Mianxiong Dong, Muroran Institute of Technology, Japan Hua Guo, Beihang University, China Tieming Cheng, University of Technology, China Kaimin Wei, Jinan University, China

11

Welcome Messages from DependSys 2015 Program Chairs

As the Program Chairs and on behalf of the Organizing Committee of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys2015), we would like to express our cordial welcome and gratitude to all the participants attending the international symposium in Zhangjiajie, China during18-20 November, 2015. This famous city is the location of China’s first forest park (The Zhangjiajie National Forest Park) and a World Natural Heritage site (Wulingyuan Scenic Area).

DependSys 2015 is a timely event that targets bringing together new ideas, techniques, and solutions for dependability and its issues in sensor, cloud, and big data systems and applications. As we are deep into the Information Age, we witness the explosive growth of data available on the Internet. Human beings are producing quintillion bytes of data every day, which come from sensors, individual archives, social networks, Internet of Things, enterprises and Internet in all scales and formats. One of the most challenging issues we face is to achieve the designed system performance to an expected level, i.e., how to effectively provide dependability in sensor, cloud and big data systems. These systems need to typically run continuously, which often tend to become inert, brittle, and vulnerable after a while.

This international symposium collected research papers on the above research issues from all around the world. Though it is the first event of DependSys, we received a large number of submissions in response to the call for papers. We had a large program body and each paper was reviewed by at least three experts in the field. After detailed discussions among the Program Chairs and General Chairs, a set of quality papers was finally accepted. We feel very proud of the big number of participations, and it has been difficult to collect the best papers from all the received submissions, but at the end we have defined an amazing symposium that we hope, we can enjoy during the following days.

Many individuals have contributed to the success of this high caliber international symposium. We would like to express our special appreciation to the Steering Chairs, Prof. Jie Wu and Prof. Guojun Wang for giving us this opportunity to hold this symposium and for their guidance on the symposium organization. In particular, we would like to give our thanks to the Symposium Chairs, Prof. Mohammed Atiquzzaman, Prof. Sheikh Iqbal Ahamed, and Dr. Md Zakirul Alam Bhuiyan for their excellent support and invaluable suggestions to make the final program a success. Thanks to all the Program Committee members and the additional reviewers for their tremendous efforts and timely reviews.

We hope all of you would enjoy DependSys 2015 and find that it will be a very good opportunity to learn from each other and that your attendance will be most enjoyable and fruitful.

Program Chairs Latifur Khan, The University of Texas at Dallas, USA Joarder Kamruzzaman, Federation University and Monash University, Australia Al-Sakib Khan Pathan, Islamic University in Madinah, Kingdom of Saudi Arabia

12

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 1: Identifying Propagation Sources and Modeling Propagation Dynamics in Networks

Speaker: Prof. Wanlei Zhou, Senior Member of IEEE, Alfred Deakin Professor, Deakin University, Australia Chair: Dr. Peter Mueller, IBM Zurich Research, Switzerland 09:00-09:45, November 18, 2015 (Wednesday)

About the Keynote Speaker

Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.

Summary:

It has long been a significant but difficult problem to identify propagation sources and model propagation dynamics based on limited knowledge of network structures and the varying states of network nodes. Real cases of identifying propagation sources and modeling propagation dynamics include finding the spreader of malware and propagation process in computer networks, and locating the sources of rumours and propagation dynamics of rumours and truths in online social networks. This talk reviews the state-of-the art in source identification techniques, and discusses the pros and cons of current methods in this field. In order to gain a quantitative understanding of current methods, we provide a series of experiments and comparisons based on various environment settings. We then present our work in modelling the propagation of scanning worms, online social network worms, as well as rumours and truths in online social networks.

13

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 2: Design of Distributed Algorithms for Engineering Applications of WSNs

Speaker: Prof. Jiannong Cao, Fellow of IEEE, Head and Professor at The Hong Kong Polytechnic University, Hong Kong Chair: Prof. Weijia Jia, Shanghai Jiao Tong University, China 08:30-09:15, November 19, 2015 (Thursday)

About the Keynote Speaker

Jiannong Cao is currently a chair professor and head of the Department of Computing at Hong Kong Polytechnic University, Hung Hom, Hong Kong. His research interests include parallel and distributed computing, computer networks, mobile and pervasive computing, fault tolerance, and middleware. He has co-authored 3 books, co-edited 9 books, and published over 300 papers in major international journals and conference proceedings. He is a fellow of IEEE, a senior member of China Computer Federation, and a member of ACM. He was the Chair of the Technical Committee on Distributed Computing of IEEE Computer Society from 2012 - 2014. Dr. Cao has served as an associate editor and a member of the editorial boards of many international journals, including ACM Transactions on Sensor Networks, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Networks, Pervasive and Mobile Computing Journal, and Peer-to-Peer Networking and Applications. He has also served as a chair and member of organizing / program committees for many international conferences, including PERCOM, INFOCOM, ICDCS, IPDPS, ICPP, RTSS, DSN, ICNP, SRDS, MASS, PRDC, ICC, GLOBECOM, and WCNC. Dr. Cao received the BSc degree in computer science from University, Nanjing, China, and the MSc and the Ph.D degrees in computer science from Washington State University, Pullman, WA, USA.

Summary:

As technology advances, applications of wireless sensor networks (WSNs) have been extended from traditional habitat monitoring, air pollution monitoring, etc., to more domain-specific engineering areas such as structural health monitoring (SHM) and volcano tomography. However, how to implement the sophisticated models and algorithms of these engineering applications within a resource-limited WSN becomes the main roadblock. This task is difficult because these algorithms are not only computationally intensive, but also involve data-level collaboration of multiple sensors. Data-level collaboration refers to that data collected from different sensors are tightly coupled in the computation process.In this presentation, using some typical engineering applications such as SHM, smart grid and volcanic tomography, I will discuss the issues and techniques of designing distributed, light-weight version of these engineering computation algorithms. The distributed algorithms should be able to optimize some pre-defined performance criteria (e.g. communication cost and time-to-completion) under severe resource constraints and various uncertainties in the system. I will describe frameworks for decomposing some typical sophisticated and centralized signal processing algorithms and computation tasks within a large scale WSN with guaranteed accuracy and optimized performance. Research in this direction will provide the foundation for extending the capability of WSNs to more engineering application domains.

14

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 3: The Shapley Value: Its Use and Implications on Internet Economics

Speaker: Prof. John C.S. Lui, Fellow of ACM, Fellow of IEEE, The Chinese University of Hong Kong, Hong Kong Chair: Prof. Dong Xiang, Tsinghua University, China 08:30-09:15, November 20, 2015 (Friday)

About the Keynote Speaker

John C.S. Lui is currently the Choh-Ming Li Chair Professor at the Chinese University of Hong Kong. He is a fellow of ACM, fellow of IEEE and the senior research fellow of the Croucher Foundation. His research interests are in network science, Internet, network/system security, network economics and performance evaluation theory.

Summary:

Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize its profit. Peering agreements based on local views and bilateral settlements, while expedient, encourage selfish routing strategies and discriminatory interconnections. From a more global perspective, such settlements reduce aggregate profits, limit the stability of routes, and discourage potentially useful peering/connectivity arrangements, thereby unnecessarily balkanizing the Internet. We show that if the distribution of profits is enforced at a global level, then there exist profit-sharing mechanisms derived from the coalition games concept of Shapley value and its extensions that will encourage these selfish ISPs who seek to maximize their own profits to converge to a Nash equilibrium. We show that these profit sharing schemes exhibit several fairness properties that support the argument that this distribution of profits is desirable. In addition, at the Nash equilibrium point, the routing and connecting/peering strategies maximize aggregate network profits, encourage ISP connectivity so as to limit balkanization.

15

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 4: In-Memory Computing: New Architecture for Big Data Processing

Speaker: Prof. Hai Jin, Senior Member of IEEE, Professor at Huazhong University of Science and Technology, China Chair: Prof. Lei Shu, Guangdong University of Petrochemical University, China 09:15-10:00, November 20, 2015 (Friday)

About the Keynote Speaker

Hai Jin is a Cheung Kung Scholars Chair Professor of computer science and engineering at Huazhong University of Science and Technology (HUST) in China. Jin received his PhD in computer engineering from HUST in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security.Jin is a senior member of the IEEE and a member of the ACM. He has co-authored 15 books and published over 600 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer-to-peer computing, network storage, and network security.

Summary:

With emerging of big data, the processing speed for the data is one of the key issues for big data technology. One of the efficient ways to handle the velocity of data is putting all the data in the memory. But traditional memory, DRAM, consumes a large amount of energy and cost to build a large memory system. In recent years, lots of non-volatile memory devices, such as phase change memory (PCM), are studied to be part of memory. We call it the storage class memory (SCM). Combing traditional memory and SCM together to build a large hybrid memory space is becoming one of the energy-efficient ways to extend the traditional in-memory computing system into a new level, to handle large quality of data in real time. In this talk, we will discuss this new in-memory computing system from different aspects and some challenges in this new system. We will also report some ongoing effort in China to build this hybrid memory-based in-memory computing system, and some latest advances in this area.

16

Panel 1: Open Dependability Issues in Cloud and Big Data Systems 09:15-11:15, November 19, 2015 (Thursday), Room 1

Computer systems (e.g., digital sensors, networks, and smart devices) are now available anytime, anywhere, by different means, and are distributed unobtrusively throughout everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. The rapid development of the computer systems with their extensive use is leading to the creation of huge collections of data, and coins the term Big Data. Big Data is characterized by the integration of a significant amount of data, of varying modalities or types, at a pace that cannot be handled by traditional data management systems. Since huge amounts of data in unstructured and semi-structured forms are being generated from various sources, new systems, frameworks and methodologies are being designed and developed for data management and data analytics. Although tremendous efforts are being given to these big systems, there is no doubt that they must be “dependable.”

In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Cloud computing enables computing systems/resources to be provided as IT services in a pay-as-you-go fashion. The services can be achieved with high efficiency and effectiveness only if the systems are ‘dependable.’ Among various circumstances, dependability can be affected by the open environment with very limited user-side control in Cloud. As a result, “dependability” is going to be one of most concerned issues for Cloud computing. It is also a great challenge for Big Data together with Cloud. Future systems need to close the dependability gap in face of challenges in different circumstances. The emphasis will be on differing properties of such services, e.g., continuity, effective performance, real-time responsiveness, ability to overcome data fault/corruption/anomaly, ability to avoid failures, prevention of deliberate privacy intrusions, reliability/availability/adaptability/security/safety, and so on. While information society, commercial and scientific companies, and industries share the need for massive throughput, “dependability” of service becomes a big concern.

The aim of this panel discussion is to discuss various aspects and open ideas, explore key open issues, and investigate technology enablers to motivate future research of dependability in Big Data and Cloud computing.

Panelists: Prof. Takashi Nanya, Canon, Japan Prof. Jemal Abawajy, Deakin University, Australia Prof. Weijia Jia, Shanghai Jiao Tong University, China Prof. Yennun Huang, Academia Sinica, Taiwan A/Prof. Jinjun Chen, University of Technology, Sydney, Australia

Chairs: Prof. Guojun Wang, Central South University, China Prof. Tatsuhiro Tsuchiya, Osaka University, Japan Dr. Md Zakirul Alam Bhuiyan, Temple University, USA

17

Panel 2: Training Innovative Talents with Cooperation of Industry, Academics and Research, 09:15-11:15, November 19, 2015 (Thursday), Room 0

"Transformation and Innovation" is one of the main themes of social developments in China. In May 2015, the State Council announced the "Made in China 2025" concept, which indicates that information industry and traditional manufacturing industry will be deeply integrated to make breakthroughs in some key fields; new model and new format will be derived. Nowadays, the opportunities for entrepreneurship and innovation are being open to most people other than only a few individuals. The industry, university, research and application interaction with cooperation of industry, academics and research communities is becoming an important form of the development of science and technology innovation. Participation and collaboration of multiple innovation subjects is one of the important factors that lead to the success of innovation. In this background, higher education in China emphasizes students' spirit of innovation and practical abilities, and it is committed to train innovative talents of science and technology. Due to the traditional education model which emphasizes examination-oriented education, there is a sharp lack of high-quality talents who meet the requirements of the scientific frontier and high-level industrial innovation. The situation becomes more serious in the fields of top-notch science and technology. With the continuously increasing requirements of the economic and social developments on the innovative talents and the continuous deepening of the education reform, some key issues including the integration of educational resources, the optimization of training mode, and other deep-rooted contradictions are becoming more serious. Therefore, it is urgent to resolve contradictions, exploit new methodologies, innovate new technologies, and promote the cooperation of science, technology and education, so as to build a new system of training high-level and innovative talents. The forum invites distinguished professors from well-known universities in China and overseas, and elites officials from enterprises and governments, to discuss these problems together. We are looking forward to the participation of more experts, scholars and personages of various fields. Let us brainstorm for better thoughts and feasible solutions.

Panelists: Prof. Zhiying Wang, National University of Defense Technology, China Prof. Dafang Zhang, Hunan University, China Prof. Keqiu Li, Dalian University of Technology, China Prof. Yang Xiang, Deakin University, Australia Prof. Lei Shu, Guangdong University of Petrochemical University, China

Chairs: Prof. Guojun Wang, Central South University, China Prof. Kenli Li, Hunan University, China Prof. Jianquan Ouyang, Xiangtan University, China

18

A. SESSIONS AND PAPERS IN ICA3PP 2015 The 15th International Conference on Algorithms and Architectures for Parallel Processing

(ICA3PP 2015)

Track 1: Parallel and Distributed Architectures Session T1A: 10:15-12:30, November 18 (Wednesday), Room 9 Chair: Wenying Yang, Foshan University, China Parallelizing Block Cryptography Algorithms on Speculative Multicores Yaobin Wang, Hong An, Zhiqin Liu, Lei Zhang, and Qingfeng Wang Performance Characterization and Optimization for Intel Xeon Phi Coprocessor Cheng Zhang, Li Liu, Ruizhe Li, and Guangwen Yang EH-Code: An Extended MDS Code to Improve Single Write Performance of Disk Arrays for Correcting Triple Disk Failures Yanbing Jiang, Chentao Wu, Jie Li, and Minyi Guo A Distributed Location-based Service Discovery Protocol for Vehicular Ad-Hoc Networks Chang Liu, Juan Luo, and Qiu Pan Unified Virtual Memory Support for Deep CNN Accelerator on SoC FPGA Tao Xiao, Yuran Qiao, Junzhong Shen, Qianming Yang, and Mei Wen DaSS: Dynamic Time Slice Scheduler for Virtual Machine Monitor Ruhui Ma, Jian Li, Liwei Lin, and Haibing Guan

Session T1B: 14:00-16:00, November 18 (Wednesday), Room 9 Chair: Wenjuan Tang, Central South University, China Memory-Aware NoC Application Mapping Based on Adaptive Genetic Algorithm Yizhuo Wang, Zhibiao Zhang, Lifu Huang, and Weixing Ji A Study on Non-Volatile 3D Stacked Memory for Big Data Applications Cheng Qian, Libo Huang, Peng Xie, Nong Xiao, and Zhiying Wang Parallel Implementation of Dense Optical Flow Computation on Many -Core Processor Wenjie Chen, Jin Yu, Weihua Zhang, Linhua Jiang, Guanhua Zhang, and Zhilei Chai A Power-Conserving Online Scheduling Scheme for Video Streaming Services Yunyun Jiang, Tian Xiao, Jidong Zhai, Ying Zhao, and Wenguang Chen Prevent Deadlock and Remove Blocking for Self-Timed Systems Edwin H.-M. Sha, Weiwen Jiang, Qingfeng Zhuge, Xianzhang Chen, and Lei Yang

Session T1C: 16:15-18:15, November 18 (Wednesday), Room 9 Chair: Zhuzhong Qian, Nanjing University, China Improving the Memory Efficiency of In-memory MapReduce based HPC Systems Cheng Pei, Xuanhua Shi, and Hai Jin DBFS: Dual Best-First Search Mapping Algorithm for Shared-Cache Multicore Processors Thomas Canhao Xu and Ville Leppanen HVCRouter: Energy Efficient Network-on-Chip Router with Heterogeneous Virtual Channels Ji Wu, Xiangke Liao, Dezun Dong, Li Wang, and Cunlu Li Availability and Network-aware MapReduce Task Scheduling over the Internet Bing Tang, Qi Xie, Haiwu He, and Gilles Fedak OptRS: An Optimized Algorithm Based on CRS Codes in Big Data Storage Systems Chao Yin, Jianzong Wang, Haitao Lv, Zongmin Cui, Lianglun Cheng,Qin Zhan, and Tongfang Li

Session T1D: 16:15-18:15, November 19 (Thursday), Room 8 Chair: Qin Liu, Hunan University, China Quantum Computer Simulation on Multi-GPU Incorporating Data Locality Pei Zhang, Jiabin Yuan, and Xiangwen Lu Query Execution Optimization Based on Incremental Update in Database Distributed Middleware Wei Ye, Mei Wang, and Jiajin Le *Optimizing the Deployment of Virtual Machine Image Replicas in Cloud Storage Clusters

19 Cong Xu, Jiahai Yang, Jianping Weng, Ye Wang and Hui Yu *Hardware Support for Message-passing in Chip Multi-Processors Yanhua Li, Youhui Zhang, Cihang Jiang and Weimin Zheng

Track 2:Software Systems and Programming Models Session T2A: 09:15-11:15, November 19 (Thursday), Room 9 Chair: Phillip M. Dickens, University of Maine, Orono, Maine FT-Offload: A Scalable Fault-Tolerance Programing Model on MIC Cluster Cheng Chen, Yunfei Du, Zhen Xu, and Canqun Yang MC-RAIS: Multi-Chunk Redundant Array of Independent SSDs with Improved Performance Suzhen Wuz, Weijian Yangz, Bo Maoy , and Yanping Linz An Energy Efficient Storage System for Astronomical Observation Data on Dome A Zichao Yuan, Ce Yu, Jizhou , Jian Xiao, Jianmei Wang, Zhaohui Shang, and Yi Hu Parallel Aware Hybrid Solid-State Storage Dan He, Fang Wang, Dan Feng, Jingning Liu, Yunxiang Wu, Ying He, and Yang Hu Automatic Optimization of Software Transactional Memory through Linear Regression and Decision Tree Yang Xiao, Zhen Li, Ehsan Atoofian, and Ali Jannesari A Data-centric Tool to Improve the Performance of Multithreaded Program on NUMA Dan Zeng, Liang Zhu, Xiaofei Liao, and Hai Jin

Session T2B: 14:00-16:00, November 19 (Thursday), Room 9 Chair: Sancheng Peng, Zhaoqing University, China A Light-weight Hot Data Identi cation Scheme via Grouping-based LRU Lists Biaobiao Shen, Yongkun Li, Yinlong Xu, and Yubiao Pan iPLAR: Towards Interactive Programming with Parallel Linear Algebra in R Zhaokang Wang, Shiqing Fan, Rong Gu, Chunfeng Yuan, and Yihua Huang Enhancing I/O Scheduler Performance by Exploiting Internal Parallelism of SSDs Jiayang Guo, Yimin Huz, and Bo Mao A Performance and Scalability Analysis of the MPI Based Tools Utilized in a Large Ice Sheet Model Executing in a Multicore Environment Phillip Dickens *Kernel Mechanisms for Turning a 3D MMOG From Single to Multi-Server Architecture Mei-Ling Chinag, Ching-Chung Tseng, Yen-Chu Chang, Shu-Chun Chao and Han Wang *Top-k Keyword Search with Recursive Semantics in Relational Databases Dingjia Liu and Guohua Liu

Track 3: Distributed and Network-based Computing Session T3A: 10:15-12:30, November 18 (Wednesday), Room 8 Chair: Xiaoyu Zhu, Central South University, China Coding-based Cooperative Caching in Data Broadcast Environments Houling Ji, Victor C.S. Lee, Chi-Yin Chow, Kai Liu, and Guoqing Wu Usage History-directed Power Management for Smartphones Xianfeng Li, Wen Wen, and Xigui Wang Application Streaming: A Mobile Application Distribution Method Wang Yang, Lei Jia, and Guojun Wang A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust-Based Access Control Bin Zhao, Jingsha He, Xinggang Xuan, Yixuan Zhang, and Na Huang QoE based Spectrum Allocation Optimization using Bees Algorithm in Cognitive Radio Networks Wenjuan Lu, Zizhong Quan, Quan Liu, Duzhong Zhang, and Wenjun Xu Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms Jiangtao Zhang, Shi Chen, Hejiao Huang, Xuan Wang, and Dingzhu Du

Session T3B: 14:00-16:00, November 18 (Wednesday), Room 8 Chair: Wei Zhou, Hunan Agricultural University, China A Service Industry Perspective on Software Defined Radio Access Networks Casimer DeCusatis and Ioannis Papapanagiotou An Approach to Rapid Worker Discovery in Software Crowdsourcing Feiya Song, Haopeng Chen, and Ying Fu STWM: A Solution to Self-adaptive Task-worker Matching in Software Crowdsourcing

20 Ying Fu, Haopeng Chen, and Feiya Song GroupDRM: Group-based Dynamic Resource Management Model in Wireless Network Zhipeng Tan, Jie Cui, Dan Feng, and Wei Zhou ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications Jiaqi Liu, Guojun Wang, Deng Li, and Hui Liu

Session T3C: 16:15-18:15, November 18 (Wednesday), Room 8 Chair: Qian Li, Xi’an Jiao Tong University, China Energy Efficient Sleep Scheduling for Wireless Sensor Networks Paul Chiedozie Uzoh, Jilong Li, Zhenbo Cao, Jinbae Kim, Aamir Nadeem, and Kijun Han QoS Prediction in Dynamic Web Services with Asymmetric Correlation Qi Xie, Bing Tang, Zibin Zheng, and Mengtian Cui A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data Huigui Rong, Liang Gong, Zheng Qin, Yupeng Hu, and Chunhua Hu A General Methodology to Design Deadlock-free Routing Algorithms for Mesh Networks Zhigang Yu, Xinyu Wang, Kele Shen, and Haikuo Liu Completion Time-aware Flow Scheduling in Heterogenous Networks Shiming He, Kun Xie, and Dafang Zhang Towards VM Power Metering: A Decision Tree Method and Evaluations Chonglin Gu, Shuai Shi, Pengzhou Shi, Hejiao Huang, and Xiaohua Jia

Session T3D: 14:00-16:00, November 19 (Thursday), Room 3 Chair: Kai Liu, Chongqing University, China A Dynamic State Estimation of Power System Harmonics using Distributed Related Kalman Filter Wei Sun, Chanjuan Zhao, Jianping Wang, Chenghui Zhu, Daoming Mu, Liangfeng Chen, Jie Li, and Qiyue Li An Efficient Cluster-based Data Sharing Algorithm for Bidirectional Road Scenario in Vehicular Ad-hoc Networks Junhua Wang, Kai Liu, Edwin H.M. Sha, Victor C.S. Lee, and Sang H.Son A Distributed Joint Cooperative Routing and Channel Assignment in Multi-radio Wireless Mesh Network Hong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, and Shiming He Improved Approximating Algorithms for Computing Energy Constrained Minimum Cost Steiner Trees Nianchen Zou and Longkun Guo A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud Congyang Chen, Jianxun Liu, Yiping Wen, Jinjun Chen, and Dong Zhou A Metadata Management Strategy Based on Event-classification in Intelligent Transportation System

Session T3E: 16:15-18:15, November 19 (Thursday), Room 3 Chair: Sivadon Chaisiri, The University of Waikato, New Zealand *Communication-aware Virtual Machine Migration in Cloud Data Centers Wenxin Li, Heng Qi, Keqiu Li, Xiaoyi Tao and Xinhua Ji *An adaptive hybrid ARQ method for coexistence of ZigBee and WiFi Quan Liu, Xiaorui Li, Zizhong Quan, Duzhong Zhang, Wenjun Xu *Detecting Spammers using Review Graph Zhixiang He, Chonglin Gu, Shi Chen, Hejiao Huang and Xiaohua Jia *A Service Industry Perspective on Software Defined Radio Access Networks Casimer Decusatis and Ioannis Papapanagiotou *Area Coverage estimation Model for Directional Sensor Networks Zhimin Liu, Weijia Jia, Guojun Wang *A Sprouting Graph based Approach to Analyzing Timed Workflow Processes with Shared Resources Yanhua Du, Ruyue Li and Benyuan Yang

Track 4: Big Data and its Applications Session T4A: 10:15-12:30, November 18 (Wednesday), Room 7 Chair: Yang Wei, Nankai University, China PAHDFS: Preference-Aware HDFS for Hybrid Storage Wei Zhou, Dan Feng, Zhipeng Tan, Yingfei Zheng Urban Traffic Congestion Prediction Using Floating Car Trajectory Data Qiuyuan Yang, Jinzhong Wang, Ximeng Song, Xiangjie Kong, Zhenzhen Xu, and Benshi Zhang A Metadata Cooperative Caching Architecture Based on SSD and DRAM for File Systems Zhisheng Huo, Limin Xiao, Qiaoling Zhong, Shupan Li, Ang Li, Li Ruan, Shouxin Wang, and Lihong Fu

21 Parallel Training GBRT Based on KMeans Histogram Approximation for Big Data Rong Gu, Lei Jin, Yongwei Wu, Jingying Qu, Tao Wang, Xiaojun Wang, Chunfeng Yuan, and Yihua Huang DBSCAN-M: An Intelligent Clustering Algorithm based on Mutual Reinforcement , Chuyuan Guo, Ronghua Shi, Xiaoqun Liu, and Yan Mei An Effective Method for Gender Classification with Convolutional Neural Networks Hao Zhang, Qing Zhu and Xiaoqi Jia

Session T4B: 14:00-16:00, November 18 (Wednesday), Room 7 Chair: Wenying Yang, Foshan University, China AQUAdex: A Highly Efficient Indexing and Retrieving Method for Astronomical Big Data of Time Series Images Zhi Hong, Ce Yu, Ruolei Xia, Jian Xiao, Jie Wang, Jizhou Sun, and Chenzhou Cui SAKMA: Specialized FPGA-based Accelerator Architecture for Data-Intensive K-Means Algorithms Fahui Jia, Chao Wang, Xi Li, and Xuehai Zhou HDCat: Effectively Identifying Hot Data in Large-scale I/O Streams with Enhanced Temporal Locality Jiahao Chen, Yuhui Deng, and Zhan Huang LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data Debin Jia, Zhengwei Liu, Xiaoyan Gu, Bo Li, Jingzi Gu, Weiping Wang, and Dan Meng Enhancing Parallel Data Loading for Large Scale Scientific Database Hui Li, Hongyuan Li, Mei Chen, Zhenyu Dai, Ming Zhu,and Menglin Huang

Session T4C: 16:15-18:15, November 18 (Wednesday), Room 7 Chair: Yinglong Dai, Central South University, China A MapReduce Reinforced Distributed Sequential Pattern Mining Algorithm Xiao Yu, Jin Liu, Xiao Liu, Chuanxiang Ma,and Bin Li SHDC: A Fast Documents Classification Method Based on Simhash Liang Gu, Peng Yang,and Yongqiang Dong Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU Fei Peng, Yin Zhu, and Min Long Feature Selection Method Based on Feature’s Classification Bias and Performance Jun Wang, Jinmao Wei, and Lu Zhang Enriching Document Representation with the Deviations of Word Co-occurrence Frequencies Yang Wei, Jinmao Wei, and Zhenglu Yang

Session T4D: 09:15-11:15, November 19 (Thursday), Room 7 Chair: Rob Cameron, Simon Fraser University, Canada Big Data Analytics and Visualization with Spatio-Temporal Correlations for Traffic Accidents Xiaoliang Fan, Baoqin He, Cheng Wang, Jonathan Li, Ming Cheng, Huaqiang Huang1,and Xiao Liu A Novel APP Recommendation Method Based on SVD and Social Influence Qiudang Wang, Xiao Liu, Shasha Zhang, Yuanchun Jiang, Fei Du, Yading Yue, Yu Liang SHB+-Tree: A Segmentation Hybrid Index Structure for Temporal Data Mei Wang, Meng Xiao Fusion-Cache: A Refactored Content-Aware Host-Side SSD Cache Xian Chen, Wenzhi Chen,and Zhongyong Lu A Novel Storing and Accessing Method of Traffic Incident Video Based on Spatial-temporal Analysis Yaying Zhang, Yinyin Zhu

Session T4E: 14:00-16:00, November 19 (Thursday), Room 7 Chair: Yuanfang Chen, Institut Mines-Telecom, Telecom SudParis, France Arbitrary-length Jacket-Haar Transforms Guibo Liu, Geli Lv, Dayong Luo, Ying Guo, and Moonho Lee Circulant Euler-Jacket Transform and Its Applications Based on Fast Algorithm Yang Zhang, Geli Lv, Guibo Liu, and Ying Guo *A Locality Constrained Self-Representation Approach for Unsupervised Feature Selection Cuihua Wang, Shuyi Ma, Chao Bi, Hui Sun, Yugen Yi *Package Balancing K-means Algorithm for Physical Distribution Yinglong Dai, Wang Yang and Guojun Wang *U-Search: Usage-based Search with Collective Intelligence Pengfei Yin, Guojun Wang and Wenjun Jiang *A Collaborative Filtering Recommendation Method based on TagIEA Expert Degree Model Weimin Li, Bin Wang, Jianbo Zou and Jinfang Sheng

22

Session T4F: 10:30-12:30, November 20 (Friday), Room 4 Chair: Gaocai Wang, Guangxi University, China Tradeoff between the Price of Distributing a Database and Its Collusion Resistance Based On Concatenated Codes Thach V. Bui, Thuc D. Nguyen, Noboru Sonehara, and Isao Echizen

Track 5: Parallel and Distributed Algorithms Session T5A: 10:15-12:30, November 18 (Wednesday), Room 6 Chair: Wei Zhou, Hunan Agricultural University, China Deadline-oriented Task Scheduling for MapReduce Environments Minghao Hu, Changjian Wang, Pengfei You, Zhen Huang, and Yuxing Peng Bitwise Data Parallelism with LLVM: The ICgrep Case Study Robert D. Cameron, Nigel Medforth, Dan Lin, Dale Denis, and William N. Sumner Parallel Bloom Filter on Xeon Phi Many-Core Processors Sheng Ni, Rentong Guo, Xiaofei Liao, and Hai Jin A List Scheduling Algorithm for DAG-Based Parallel Computing Models Hao Fu, Ce Yu, Jizhou Sun, Mengmeng Wang, and Jun Du Parallel Computing Method for HRV Time-domain Based on GPU Jie Wang, Weihao Chen, and Gang Hou Accelerated Steiner Tree Problem Solving on GPU with CUD Christian Mathieu and Matthias Klusch

Session T5B: 14:00-16:00, November 18 (Wednesday), Room 6 Chair: Feng Wang, Central South University, China Self-Timed Periodic Scheduling of Data-Dependent Tasks in Embedded Streaming Applications Xuan Khanh Do, Amira Dkhil, and Stéphane Louise A Novel Concurrent Generalized Deadlock Detection Algorithm in Distributed Systems Wei Lu1, Yong Yang, Liqiang Wang, Weiwei Xing, and Xiaoping Che BiTEM: A Two-Tier Energy Efficient Resource Management Framework for Real-Time Tasks in Clusters Wei Huang, Jin Shi, Zhen Wang, Zhuzhong Qian Multitask Oriented GPU Resource Sharing and Virtualization in Cloud Environment Xingfang Zhao, Yujie Zhang, Bing Su Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration Huanle Xu, Ronghai Yang, Zhibo Yang, and Wing Cheong Lau

Session T5C: 16:15-18:15, November 18 (Wednesday), Room 6 Chair: Lei Zhou, Central South University, China A Dynamic Extension and Data Migration Method Based on PVFS Xiaoyu Zhang, Jie Tang, Heng Gao, and Gangshan Wu Fast 3-Point Correlation Function Approximation on GPU Chao Sun, Mujin Yang, Ce Yu, and Jizhou Sun Efficient Scheduling with Intensive In-Memory File Accesses Considering Bandwidth Constraint on Memory Bus Lin Wu, Qingfeng Zhuge, Edwin H.-M Sha, and Zhilong Sun GPU-Accelerated Algorithm for Fast Computation of Biomolecular Isotopic Envelopes Jingpeng Wang, Jie Huang, Kaijie Xiao, and Zhixin Tian Cost-efficient and Scalable Multicast Tree in Software Defined Networking Shanshan Zhou, Hua Wang, Shanwen Yi, and Fangjin Zhu

Session T5D: 09:15-11:15, November 19 (Thursday), Room 6 Chair: Deng Li, Central South University, China Parallel Data Regeneration Based on Multiple Trees with Network Coding in Distributed Storage System Pengfei You, Zhen Huang, Changjian Wang, Minghao Hu, and Yuxing Peng Maximize Throughput Scheduling and Cost-Fairness Optimization for Multiple DAGs with Deadline Constraint Wei Wang, Qingbo Wu, Yusong Tan, and Fuhui Wu Unified Multi-Constraint and Multi-Objective Workflow Scheduling for Cloud System Fuhui Wu, Qingbo Wu, Yusong Tan, and Wei Wang

23 Bi-objective Optimization Genetic Algorithm of the Energy Consumption and Reliability for Workflow Applications in Heterogeneous Computing Systems Longxin Zhang, Kenli Li, and Keqin Li PE-TLD: Parallel Extended Tracking-Learning-Detection for Multi-target Tracking Chenggang Zhou, Qiankun Dong, Wenjing Ma, Guoping Long, Tao Li Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy Wenyin Yang, Guojun Wang, and Md Zakirul Alam Bhuiyan

Session T5E: 14:00-16:00, November 19 (Thursday), Room 6 Chair: Xiaoyu Zhu, Central South University, China Improving Performance of Floating Point Division on GPU and MIC Kun Huang, Yifeng Chen UniDegree: A GPU-based Graph Representation for SSSP Changyou Zhang, Feng Wang,Kun Huang, Zhiyou Liu,and Yifeng Chen MTTF-aware Reliability Task Scheduling for Heterogeneous Multicore System Huaguo Liang, Yangyang Dai, Maoxiang Yi, Dawen Xu,and Zhengfeng Huang One-to-One Disjoint Path Covers on Mesh Manyi Du, Jianxi Fan, Yuejuan Han, and Cheng-Kuan Lin *Para-Join: An Efficient Parallel Method for String Similarity Join Cairong Yan and Jian Wang *Communication-Aware Task Scheduling Algorithm for Heterogeneous Computing Tehui Huang, Tao Li, Qiankun Dong, Kezhao Zhao, Wenjing Ma and Yulu Yang

Track 6: Applications of Parallel and Distributed Computing Session T6A: 10:15-12:30, November 18 (Wednesday), Room 5 Chair: Feng Wang, Central South University, China On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks Wenbin Hu, Liping Yan, Huan Wang, and Bo Du Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System Weihao Liang, Hong An, Feng Li, and Yichao Cheng Stencil Computations on HPC-oriented ARMv8 64-bit Multi-Core Processor Chunjiang Li, Yushan Dong, and Kuan Li A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, and Shanwen Yi A Streaming Execution Method for Multi-Services in Mobile Cloud Computing Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, and Yongbing Tang Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, and Jianhang Huang

Session T6B: 14:00-16:00, November 18 (Wednesday), Room 5 Chair: Zheng Ma, Hunan University, China Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac Ventricle Qiang Lan, Namit Gaur, Johannes Langguth, and Xing Cai Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core Architectures Yizhuo Wang, Weixing Ji, Xu Chen, and Sensen Hu Refactoring for Separation of Concurrent Concerns Yang Zhang, Dongwen Zhang, Weixing Ji, and Yizhuo Wang Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph Zhenchun Huang and Guoqing Li Resource-Efficient Vibration Data Collection in Cyber-Physical Systems Md Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, and Xiangyong Liu

Session T6C: 16:15-18:15, November 18 (Wednesday), Room 5 Chair: Wenbin Jiang, Huazhong University of Science and Technology, China A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System Wenbin Jiang, Zhiwei Lu, Hai Jin, and Ye Chi DFIS: A Scalable Distributed Fingerprint Identification System Yunxiang Zhao, Wanxin Zhang, Dongsheng Li, and Zhen Huang

24 Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm Optimization Runshui Zhu, Hua Wang, Yanqing Gao, Shanwen Yi, and Fangjin Zhu Pre-Stack Kirchhoff Time Migration on Hadoop and Spark Chen Yang, Jie Tang, Heng Gao, and Gangshan Wu A Cyber Physical System with GPU for CNC Applications Jen-Chieh Chang, Ting-Hsuan Chien, and Rong-Guey Chang NCPSO: A Solution of the Controller Placement Problem in Software Defined Networks

Session T6D: 09:15-11:15, November 19 (Thursday), Room 5 Chair: Yinglong Dai, Central South University, China Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector Machines Jiangang Wu, Chang Feng, Peihuan Gao, and Shizhong Liao Real-time Deconvolution with GPU and Spark for Big Imaging Data Analysis Lianyu Cao, Penghui Juan, and Yinghua Zhang Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, and Jianlei Zhang MrBayes for Phylogenetic Inference Using Protein Data on A GPU Cluster Shuai Pang, Rebecca J. Stones, Ming-ming Ren, Gang Wang, and Xiaoguang Liu Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOP Shijin Yuan, Yiwen Qian, and Bin Mu *Energy-aware Task Consolidation For Cloud Computing Data Center Ya Chen and Yonghua Xiong

Track 7: Service Dependability and Security in Distributed and Parallel Systems Session T7A: 10:15-12:30, November 18 (Wednesday), Room 3 Chair: Chi Lin, Dalian University of Technology, China A Programming Framework for Implementing FaultTolerant Mechanism in IoT Applications Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S.L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo VCLT: An Accurate Trajectory Tracking Attack based on Crowdsourcing in VANETs Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang Wu Yu, and Guowei Wu A Novel Search Engine-Based Method for Discovering Command and Control Server Xiaojun Guo, Guang Cheng,Wubin Pan, Truong Dinhtu, and Yixin Liang Leveraging Behavior Diversity to Detect Spammers in Online Social Networks Jian Cao, Qiang Fu, Qiang Li, and Dong Guo A Proactive Fault Tolerance Scheme for Large Scale Storage Systems Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, and Zhongwei Li When Software Defined Networks Meet Fault Tolerance: A Survey Jue Chen, Jinbang Chen, Fei Xu, Min Yin, and Wei Zhang

Session T7B: 14:00-16:00, November 18 (Wednesday), Room 3 Chair: Wenjun Jiang, Hunan University, China A Novel Signature Generation Approach for Polymorphic Worms Jie Wang, and Xiaoxian He Scalable Access Policy for Attribute Based Encryption in Cloud Storage Jing Wang, Chuanhe Huang, and Jinhai Wang Minimizing Resource Expenditure while Maximizing Destructiveness for Node Capture Attacks Chi Lin, Guowei Wu, Xiaochen Lai, and Tie Qiu Deviation-Based Location Switching Protocol for Trajectory Privacy Protection Shaobo Zhang, Qin Liu, and Guojun Wang Exploring Efficient and Robust Virtual Machine Introspection Techniques Chonghua Wang, Xiaochun Yun, Zhiyu Hao, Lei Cui, Yandong Han, and Qingxin Zou CRVad: Confidential Reasoning and Verification towards Secure Routing in Ad Hoc Networks Teng Li, Jianfeng Ma, and Cong Sun

Session T7C: 16:15-18:15, November 18 (Wednesday), Room 3 Chair: Wenjun Jiang, Hunan University, China NMHP: A Privacy Preserving Profile Matching Protocol in Multi-Hop Proximity Mobile Social Networks Entao Luo, Qin Liu, and Guojun Wang

25 A New Data Replication Scheme for PVFS2 Nianyuan Bao, Jie Tang, Xiaoyu Zhang, and Gangshan Wu Efficient Private Matching Scheme for Friend Information Exchange Fang Qi, and Wenbo Wang A Real-time Android Malware Detection System Based on Network Traffic Analysis Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, and Lei Zhang Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships Houwu Chen, and Jiwu Shu Adopting Multi-Mode Access Control for Secure Data Sharing in Cloud Chunhua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, and Hao Jin

Session T7D: 09:15-11:15, November 19 (Thursday), Room 3 Chair: Lei Zhou, Central South University, China A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud Zheng Yan, Wenxiu Ding, and Haiqi Zhu HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems Xuhui Liu, Qin Liu, Tao Peng, and Jie Wu Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, and Peng Liu Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA Sheng Huo, Dafang Zhang, and Yanbiao Li A Robust and Efficient Detection Model of DDoS Attack for Cloud Services Jian Zhang, Ya-Wei Zhang, Jian-Biao He, and Ou Jin Secure Bisimulation for Interactive Systems Guanjun Liu, and Changjun Jiang

Session T7E: 14:00-16:00, November 19 (Thursday), Room 5 Chair: Wenjuan Tang, Central South University, China Privacy Preserving for Network Coding in Smart Grid Shiming He, Weini Zeng, and Kun Xie Verifiable Dynamic Fuzzy Search over Encrypted Data in Cloud Computing Xiaoyu Zhu, Qin Liu, and Guojun Wang A Secure and Fine-grained Query Results Verification Scheme for Private Search over Encrypted Cloud Data Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, and Huigui Rong PEM4RFID: Privacy Enhancement Model for RFID Systems Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, and Zhiyong Feng Improved WOW Adaptive Image Steganography Method Xin Liao, Guoyong Chen, Qi Li, and Jun Liu CloudS: A Multi-Cloud Storage System with Multi-Level Security Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, and Xiaoguang Liu

Session T7F: 16:15-18:15, November 19 (Thursday), Room 5 Chair: Xiangyong Liu, Central South University, China Crossing – A Highly Available Quorum Protocol for Arbitrary Planar Topologies Robert Schadek and Oliver Theel Fast Bridge Fault Test Generation Based on Critical Area Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel System Yuan Yao, Pan He, Zhihao Zheng, Chun Tan, and Yue Yuan Addressing NoC Reliability through an Efficient Fibonaccibased Crosstalk Avoidance Codec Design Zahra Shirmohammadi, and Seyed Ghassem Miremadi An Agent-based Framework for Simulating and Analysing Attacks on Cyber Physical Systems Sridhar Adepu, Aditya Mathur1, Jagadeesh Gunda, and Sasa Djokic *Thwarting Android App Repackaging by Executable Code Fragmentation Ruxia Fan, Dingyi Fang and Zhanyong Tang

Track 8: Internet of Things and Cyber-Physical-Social Computing Session T8A: 09:15-11:15, November 19 (Thursday), Room 8 Chair: Wenjie Chen, East China Normal University, China

26 NRLoc: Neighbor Relative RSS-Based Indoor Localization System Xuefeng Sha, Kai Lin, Wenjian Wang, and Jiming Luo Social Attributes based Cooperative Caching in Ad Hoc Networks Zhiwei Yang, Weigang Wu, and Zhenghao Zhu Entropy-Based Social Influence Evaluation in Mobile Social Networks Sancheng Peng1, Jian Li1, and Aimin Yang An Energy Efficient Multi-hop Charging Scheme with Mobile Charger for Wireless Rechargeable Sensor Network Shuo Li, Jian He, Xiaoyong Zhang, and Jun Peng Distributed Compressive Sensing Based Data Gathering in Energy Harvesting Sensor Network Weirong Liu, Gaorong Qin, Fu Jiang, Kaiyang Liu, and Zhengfa Zhu Feedback Mechanism Based Dynamic Fingerprint Indoor Localization Algorithm in Wireless Sensor Networks Yu Liu, Juan Luo, Qian Yang, and Jinyu Hu

Session T8B: 14:00-16:00, November 19 (Thursday), Room 8 Chair: Pengfei Yin, Jishou University, China A GPU Based Fast Community Detection Implementation for Social Network Guo Li, Dafang Zhang, Kun Xie, Tanlong Huang, and Yanbiao Li An Efficient Privacy-Preserving Compressive Data Gathering Scheme in WSNs Kun Xie, Xueping Ning, Xin Wang, Jigang Wen, Xiaoxiao Liu, Shiming He, and Daqiang Zhang A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing Zuoting Ning, Dafang Zhang, and Kun Xie An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery Changming Liu, Cai Fu, Deliang Xu, Lin Sun, and Lansheng Han MN-ALG: A Data Delivery Algorithm for Large Scale Wireless Electronic Shelf Label System Yingzhuang Chen, Qifei Zhang, Chaofan Tu, Yuchang Zhang, Fan Bai,Yinchao Xue, and Sheng Zhang The Optimization and Improvement of MapReduce in Web Data Mining Changqing Yin, Shichao Zhang, Shukun Liu, Shangwei Song, Guangyu Gao, and Xiyuan Zhou

Session T8C: 16:15-18:15, November 19 (Thursday), Room 8 Chair: Qin Liu, Hunan University, China An Intimacy-based Algorithm for Social Network Community Detection Yi Zheng, Dafang Zhang, and Kun Xie A Method for Detection of Anomaly Node in IOT Zhenguo Chen, Liqin Tian, and Chuang Lin

Track 9:Performance Modeling and Evaluation Session T9A: 10:15-12:30, November 18 (Wednesday), Room 0 Chair: Lin Gu, Huazhong University of Science and Technology, China An Efficient Algorithm for a Generalized LCS Problem Daxin Zhu,Yingjie Wu, and Xiaodong Wang On Exploring a Quantum Particle Swarm Optimization Method for Urban Traffic Light Scheduling Wenbin Hu, Huan Wang, Liping Yan, and Bo Du Identifying Repeated Interleavings to Improve the Efficiency of Concurrency Bug Detection Zhendong Wu, Kai Lu, and Xiaoping Wang Global Reliability Evaluation for Cloud Storage Systems with Proactive Fault Tolerance Jing Li, Mingze Li, Gang Wang, Xiaoguang Liu, Zhongwei Li, and Huijun Tang Performance Evaluation and Optimization of Wi-Fi Display on Android Xianfeng Li, and Baobao Jin A Novel Scheduling Algorithm for File Fetch in Transparent Computing Kehua Guo, Yayuan Tang, and Jiacheng Gu

Session T9B: 14:00-16:00, November 18 (Wednesday), Room 0 Chair: Abbas E. Kiasari, The University of Manchester, United Kingdom Performance Evaluation of HPGMG on Tianhe-2: Early Experience Yulong Ao, Yiqun Liu, Chao Yang, Fangfang Liu, Peng Zhang, Yutong Lu, and Yunfei Du Joint Power and Reduced Spectral Leakage-based Resource Allocation for D2D Communications in 5G Mithun Mukherjee, Lei Shu, Yan Zhang, Zhangbing Zhou, and Kun Wang4 Performance Analysis for Job Scheduling in Hierarchical HPC Systems: A Coloured Petri Nets Method Zhijia Li, Li Jiao, and Xiang Hu

27 An Optimization Strategy of Energy Consumption for Data Transmission Based on Optimal Stopping Theory in Mobile Networks Ying Peng, Nao Wang, and Gaocai Wang Exploration of the Relationship between Just-in-Time Compilation Policy and Number of Cores Mingkai Huang, Xianhua Liu, Tingyu Zhang, and Xu Cheng CSAP: a Performance Predictor for Climate Simulation Applications on Intel CPUs Ruizhe Li, Li Liu, Cheng Zhang, and Guangwen Yang

Session T9C: 16:15-18:15, November 18 (Wednesday), Room 0 Chair: Deze Zeng, China University of Geosciences, China On Routing Algorithms for the DPillar Data Centre Networks Abbas Eslami Kiasari, Javier Navaridas, and Iain A. Stewart MR-COF: A Genetic MapReduce Configuration Optimization Framework Chao Liu, Deze Zeng, Hong Yao, Chengyu Hu, Xuesong Yan, and Yuanyuan Fan Analysis of Repair Cost in Distributed Storage Systems with Fault-Tolerant Coding Strategies Yanbo Lu, Jie Hao, Xin-Ji Liu, and Shu-Tao Xia Design Efficient In-Database Video Storage Approach by Learning from Performance Evaluation of BLOB Hui Li, Mei Chen, Zhenyu Dai, Ming Zhu, and Menglin Huang Skyline Query on Anti-Correlated Distributions: From the Perspective of Spatial Index Jinchao Zhang, Dong Zhang, Bo Yu1, Bo Li, Weiping Wang, and Dan Meng PNSICC: A Novel Parallel Network Security Inspection Mechanism based on Cloud Computing Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, and Guangwei Wang

Session T9D: 14:00-16:00, November 19 (Thursday), Room 0 Chair: Shuhong Chen, Hunan Institute of Engineering, China Simulation Platform for X-ray Computed Tomography based on Low-power Systems Estefania Serrano, Javier Garcia Blas, Alberto Verza, and Jesus Carretero STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets Yu-E Sun, He Huang, Miaomiao Tian, Zehao Sun, Wei Yang, Hansong Guo, and Liusheng Huang Reality Mining with Mobile Data: Understanding the Impact of Network Structure on Propagation Dynamics Yuanfang Chen, Noel Crespi, Lei Shu, and Gyu Myoung Lee Reducing Journaling Overhead with Hybrid Buffer Cache Zhiyong Zhang, Lei Ju, and Zhiping Jia A Green Scheduler for Cloud Data Centers Using Renewable Energy Chonglin Gu, Chunyan Liu, Chen Shi, Zhixiang He, Hejiao Huang, and Xiaohua Jia Fine-Grained Fault-Tolerant Adaptive Routing for Networks-on-Chip Junxiu Liu, Jim Harkin, Liam Maguire, Yuhua Li, Lei Wan, and Yuling Luo

Session T9E: 16:15-18:15, November 19 (Thursday), Room 0 Chair: Entao Luo, Central South University, China On the Optimal Provider Selection for Repair in Distributed Storage System with Network Coding Chengjin Jia, Jin Wang, Yanqin Zhu, Xin Wang, Kejie Lu, Xiumin Wang, and Zhengqing Wen Local State Reusing for Efficient Model Checking of Multithreaded Programs Junrui Zhou, Hong An, Yunyun Wang, and Junshi Chen Intelligent Road Congestion Prediction Employing Queueing Based Model Lianghao Gao, Chengfang Ma, Lei Liu, Xinjing Wei Evaluation and Analysis of Three Typical Resource Allocation Algorithms in Virtual Router Platform Xianming Gao, Baosheng Wang, Xiaozhe Zhang, and Shicong Ma Beyond Data Parallelism: Identifying Parallel Tasks in Sequential Programs Zhen Li, Bo Zhao, Ali Jannesari, and Felix Wolf Fast Data-Dependence Profiling by Skipping Repeatedly Executed Memory Operations Zhen Li, Michael Beaumont, Ali Jannesari, and Felix Wolf

Session T9F: 16:15-18:15, November 19 (Thursday), Room 4 Chair: Shaobo Zhang, Central South University, China P-index: An Efficient Searchable Metadata Indexing Scheme based on Data Provenance in Cold Storage Jinjun Liu, Dan Feng, Yu Hua, Bin Peng, Pengfei Zuo, and Yuanyuan Sun Performance Optimization and Evaluation of Space Management in Cloud Storage Systems Guangping Xu, Huan Li, Qunfang Mao,Sheng Lin, and Hua Zhang Performance Prediction for Concurrent Workloads in Distributed Database Systems

28 Hui Li, Xiaohuan Hou, Mei Chen, Zhenyu Dai, Ming Zhu, and Menglin Huang An Energy-Aware File Relocation Strategy Based on File-Access Frequency and Correlations Cheng Hu, and Yuhui Deng Projective Synchronization for Complex Dynamical Networks of Non-delayed and Delayed Coupling with Different Scale Factors via Impulsive Control Yuxiu Li, and Guoliang Cai Elastic Database Replication in the Cloud Xianxia Zou, Jiuhui Pan, Wei Du, and Shuhong Chen

Session T9G: 16:15-18:15, November 19 (Thursday), Room 6 Chair: Qiang Zhang, Central South University, China A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs Subir Halder, and Amrita Ghosal Traffic Replay in Virtual Network Based on IP-Mapping Lun Li, Zhiyu Hao, Yongzheng Zhang, Zhenquan Ding, and Haiqiang Fei Optimizing the Overheads for Uncoordinated Proactive Checkpointing Lei Zhu, Jianhua Gu, and Zhennao Cai Tunneling-based Multi-Path Routing Mechanism in Packet-Switched Non-Geostationary Satellite Networks Guyu Hu, Zhaofeng Wu, Fenglin Jin, Bowei Yang, Yu Song, and Yinjin Fu Cost-effective Scheduling Analysis through Discrete Event Simulation for Distributed Systems Siti Fajar Jalal, Masnida Hussin, Abdullah Muhammed, and Rohaya Latip Energy Consumption Prediction based on Time-Series Models for CPU-Intensive Activities in the Cloud Juan Li, Xiao Liu, Zhou Zhao, and Jin Liu HYPAD: Hyper-Graph-Driven Approach for Parallel Data Warehouse Design Ahcene Boukorca, Ladjel Bellatreche, and Soumia Benkrid

Session T9H: 16:15-18:15, November 19 (Thursday), Room 7 Chair: Gaocai Wang, Guangxi University, China Efficient Space Management and Wear Leveling for PCM -Based Storage Systems Zhangling Wu, Peiquan Jin, and Lihua Yue An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution Fatimah Adamu-Fika, and Arshad Jhumka An Efficient Dynamic Programming Algorithm for SEQ-IC-SEQ-EC-LCS Problem Daxin Zhu, Lei Wang,Yingjie Wu, and Xiaodong Wang A Hybrid QoS Evaluation Tool Based on the Cloud Computing Platform Yanjun Shu, Yan Zhao, Hongwei Liu, Decheng Zuo, and Xiaozong Yang *Data or Index: A Trade-Off in Mobile Delay Tolerant Networks Hong Yao, Han Zhang, Jie Wu, Huanyang Zheng, Changkai Zhang and Deze Zeng *Evaluation and Comparison of Ten Data Race Detection Techniques Zhen Yu, Zhen Yang, Xiaohong Su and Peijun Ma *An Energy-Aware Cooperative Content Distributed Strategy Based on MST in Mobile Environment Nao Wang, Tianxiao Xie and Gaocai Wang

29

B. SESSIONS AND PAPERS IN TrustData 2015 The 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)

Session TrustData-A: 11:30-12:30, November 19 (Thursday), Room 0 Chair: Qin Liu, Hunan University, China An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network Zheng Ma, Jin Zheng, Weijia Jia, and Guojun Wang Nth-order Multifunction Filter Employing Current Differencing Transconductance Amplifiers Meili Cao, Haizhen He, Rongming Luo, and Lei Wen

An Improved Method for Reversible Data Hiding in Encrypted Image Yuling Liu, and Zuhong Liu

Session TrustData-B: 10:30-12:30, November 20 (Friday), Room 0 Chair: Qin Liu, Hunan University, China Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks Hongyun Xu, Jun Yang, Yong Zhang, Mengzhen Xu, and Jiayi Gan A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups Peixin Chen, Xiaofeng Wang, and Jinshu Su

STRATUS: Towards Returning Data Control to Cloud Users Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, and Geoffrey Holmes

VSEP: A Distributed Algorithm for Graph Edge Partitioning Yu Zhang, Yanbing Liu, Jing Yu, Ping Liu, and Li Guo

Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture Qun Liao, Shuangshuang Jiang, Qiaoxiang Hei, Tao Li, and Yulu Yang

An Output-oriented Approach of Test Data Generation Based on Genetic Algorithm Weixiang Zhang, Bo Wei, and Huisen Du

C. SESSIONS AND PAPERS IN TSP 2015 The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP

2015)

Session TSP-A: 11:30-12:30, November 19 (Thursday), Room 3 Chair: Wenjun Jiang, Hunan University, China An Efficient Pre-filter to Accelerate Regular Expression Matching Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, and Jinshu Su A Hybrid Optimization Approach for Anonymizing Transactional Data Li-e Wang, and Xianxian Li Program Obfuscator for Privacy-carrying Unidirectional One-hop Re-encryption Mingwu Zhang, Biwen Chen, and Hua Shen

Session TSP-B: 11:30-12:30, November 19 (Thursday), Room 4

30 Chair: Binji Mo, Central South University, China Predicting Severity of Software Vulnerability Based on Grey System Theory Jinkun Geng, Daren Ye, and Ping Luo Characterization of Android Applications with Root Exploit by Using Static Feature Analysis Huikang Hao, Zhoujun Li, Yueying He, and Jinxin Ma LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity Yufeng Wang, Xiaohong Chen, Qun Jin, and Jianhua Ma

Session TSP-C: 11:30-12:30, November 19 (Thursday), Room 5 Chair: Lei Jia, Central South University, China Context-aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration Luyan Nie, Chuanzhi Xie, Yujun Yin, and Xin Li Continuous User Identity Verification for Trusted Operators in Control Rooms Enrico Schiavone, Andrea Ceccarelli, and Andrea Bondavalli Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model Leyou Zhang, Zhuanning Wang, and Qing Wu

Session TSP-D: 10:30-12:30, November 20 (Friday), Room 3 Chair: Subir Halder, B. C. Roy Engineering College, Durgapur, India Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines Qingxin Xia, Yuqing Lan, and Limin Xiao Towards Mechanised Semantics of HPC: the BSP with Subgroup Synchronisation Case Jean Fortin, and Frederic Gava Cloud Computing Threats and Provider Security Assessment Huiming Yu, Ken Williams, and Xiaohong Yuan Collaborative Multiparty Association Rules Mining with Threshold Homomorphic Encryption Marcin Gorawski, Zacheusz Siedlecki, and Anna Gorawska An Illegal Indirect Access Prevention Method in Transparent Computing System Wenjuan Tang, Yang Xu, Guojun Wang, and Yaoxue Zhang EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks Hongling Xiao, Hong Song, and Weiping Wang

D. SESSIONS AND PAPERS IN NOPE 2015 The 3rd International Workshop on Network Optimization and Performance Evaluation (NOPE

2015)

Session NOPE-A: 11:30-12:30, November 19 (Thursday), Room 6 Chair: Gaocai Wang, Guangxi University, China Energy Saving Mechanism Analysis Based on Dynamic Resource Scaling for Cloud Computing Xiaojie Zhang, Nao Wang, Xin Zheng, Caocai Wang, and Dongmei Bin An Optimal Rate Adaptive Video Streaming Scheme to Improve QoE of Dash Xiaolong Gong, Gaocai Wang, and Nao Wang

Community-Based Energy-Aware Routing Protocol in Mobile Social Networks Dongmei Bin, Ying Peng, and Gaocai Wang

Session NOPE-B: 11:30-12:30, November 19 (Thursday), Room 7 Chair: Shan Peng, Central South University, China Research of CMABC Algorithm in Intrusion Detection Ming Liu, Xiaoling Yang, Fanling Huang, and Yanming Fu

31 A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems Zheng Xu, and Buyang Cao

Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks With Selfish Sensors Guiyun Liu, Jing Yao, Hongbin Chen, Han Zhang, and Dong Tang

Session NOPE-C: 10:30-12:30, November 20 (Friday), Room 4 Chair: Gaocai Wang, Guangxi University, China File Creation Optimization for Metadata-intensive Application in File Systems Limin Xiao, Qiaoling Zhong, Zhisheng Hu, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang, and Zheqi Lu

A Sharing-Memory Based Ring Framework Shicong Ma, Baosheng Wang, Xianming Gao, and Xiaozhe Zhang

Streaming Computing Technology for Android Applications: Design Model & Case Study Binji Mo, Yang Xu, and Guojun Wang

An Energy-efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network Lifang Liu, Xiaogang Qi, Gengzhong Zheng, and Mande Xie

TDD TDD-Based Massive MIMO Systems: Overview and Development Ronghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, and Yunxiang Jiang

E. SESSIONS AND PAPERS IN SCS 2015 The 2nd International Symposium on Sensor-Cloud Systems (SCS 2015)

Session SCS-A: 11:30-12:30, November 19 (Thursday), Room 8 Chair: Xiaofei Xing, Guangzhou University, China A Hierarchical Shared Key Algorithm in Wireless Sensor Networks Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, and Yangjie Cao

Evaluation Model of the Cloud Systems Based on Queuing Petri Net Yangjie Cao, Huimin Lu, Xiaodong Shi, and Pengsong Duan

MTCPP: Multi-Targets K-Coverage Preservation Protocol in Wireless Sensor Networks Liu Yang

F. SESSIONS AND PAPERS IN SPPCN 2015 The 2nd International Workshop on Security and Privacy Protection in Computer and Network

Systems (SPPCN 2015)

Session SPPCN-A: 11:30-12:30, November 19 (Thursday), Room 9 Chair: Zheng Ma, Hunan University, China Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, and Song-Jhih Chen Privacy Preserving Personalization in Probabilistic Search Rajeswary Ravi and Greeshma N Gopal

32 A Security-Critical Task Management Method for Distributed Real-Time Systems Yang Yu, Qi Dong, Zhipeng Luo, Hao Chen, Jun Deng, and Wei Guan

Session SPPCN-B: 16:15-18:15, November 19 (Thursday), Room 9 Chair: Xiaofei Xing, Guangzhou University, China Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme Roshni Kadeparambil Raphel, Muhammed Ilyas H, and Janu R Panicker Energy E cient Encryption Scheme for Network-coded Mobile Ad Hoc Networks Deepa S Nair and Muhammed Ilyas H A Model of Dynamic Malware Analysis Based on VMI Chengye Li, Yangyue Xiang, and Jiangyong Shi

Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffc Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, and Hongbo Han

Andriod Malware Network Behavior Analysis at HTTP Protocol Packet Level Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, and Hongbo Han

G. SESSIONS AND PAPERS IN DependSys 2015 The 1st International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and

Applications (DependSys 2015)

Session DependSys-A: 10:15-12:30, November 18 (Wednesday), Room 4 Chair: Changji Wang, Yunnan University, China Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks Changji Wang, and Jing Liu Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks Zhen Peng, Tian Wang, Md Zakirul Alam Bhuiyan, Xiaoqiang Wu, and Guojun Wang A Web-based Resource Management Platform for Transparent Computing Dacheng Wang, Hong Song, Yun Xu, Wenhao Zhang, and Jianxin Wang Architecture and Scheduling Method of Cloud Video Surveillance System based on IoT Xia Wei, Wen-Xiang Li, Cong Ran, Chun-Chun Pi, Ya-Jie Ma, and Yu-Xia Sheng HiTrans: An FPGA-based Gateway Design and Implementation in HPC Environments Wei Shi, Gaofeng Lv, Zhigang Sun, and Zhenghu Gong Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Jin B. Hong, Chun-Jen Chung, Dijiang Huang, and Dong Seong Kim

Session DependSys-B: 14:00-16:00, November 18 (Wednesday), Room 4 Chair: Xiangdong Li, Central South University, China Removing Key Escrow from the LW-HIBE Scheme Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, and Ilsun You FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific Data Hui Li, Nengjun Qiu, Mei Chen, Hongyuan Li, Zhenyu Dai, Ming Zhu, and Menglin Huang An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data Centers Sheng Xu, Binzhang Fu, Mingyu Chen, and Lixin Zhang Reliability-aware Distributed Computing Scheduling Policy Jemal Abawajy, and Mohammad Mehedi Hassan An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage Peixin Chen, Xiaofeng Wang, and Jinshu Su A Predictive Data Reliability Method for Wireless Sensor Network Applications Adil Amjad Sheikh, Ahmed Lbath, Ehsan Ullah Warriach, and Emad Felemban

Session DependSys-C: 16:15-18:15, November 18 (Wednesday), Room 4

33 Chair: Bo Wang, Central South University, China A Cycle-time-analysis Model for Byzantine Fault Tolerance Liu Chen, and Wei Zhou Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application Adrian Johannes, Priyadarsi Nanda, and Xiangjian He Weight-Based Batch Rekeying Scheme for Dynamic Multi-Privileged Group Communications Wei Zhou, Yang Xu, Lijuan Yang, and Guojun Wang Application-Assisted Dynamic Attestation for JVM -Based Cloud Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Tie Hong, and Yiming Li New Escrow-Free Scheme for Hierarchical Identity-Based Encryption Fang Qi, Xin Tang, and Quanyun Wei Neural Networks in Petrol Station Objects Calibration Marcin Gorawski, Miros law Skrzewski, Michal Gorawski, and Anna Gorawska

Session DependSys-D: 09:15-11:15, November 19 (Thursday), Room 4 Chair: Min Guo, Central South University, China A Dependable, Scalable, Distributed, Virtual Data Structure Silvia Grampone, Witold Litwin, and Thomas Schwarz Effect of Bias Temperature Instability on Soft Error Rate Zhen Wang, and Jianhui Jiang Security Modeling and Analysis of a SDN based Web Service Taehoon Eom, Jin B. Hong, Jong Sou Park, and Dong Seong Kim Single Anchor Node based Localization in Mobile Underwater Wireless Sensor Networks Anjana P Das, and Sabu M Thampi A Novel Bug Report Extraction Approach Tao Lin, Jianhua Gao, Xue Fu, and Yan Lin ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive Data Xin Zhou, Hui Li, Xiao Zhang, Shan Wang, Yanyu Ma, Keyan Liu, Ming Zhu, and Menglin Huang

Session DependSys-E: 14:00-16:00, November 19 (Thursday), Room 4 Chair: Jian Luo, Central South University, China A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor Networks Zhihai Wang, and Weidong Chen Unknown Bit Stream Protocol Message Discovery with Zero Knowledge Fengli Zhang, Junjiao Zhang, and Hongchuan Zhou Distributed Authentication in the Cloud Computing Environment Yanzhu Liu, Zhi Li, and Yuxia Sun Influential Nuisance Factors on a Decision of Sufficient Testing Mahnaz Malekzadeh, and Iain Bate Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem Jun Xu, and Yong Tang Acceleration of CFD Engineering Software on GPU and MIC Yang Liu, and Liang Deng Dealing with Reliable Event-based Communications by Means of Layered Multicast Christian Esposito, Aniello Castiglione, and Francesco Palmieri

34

ICA3PP 2015 Organizing and Program Committees

General Chairs Guojun Wang, Central South University, China Peter Mueller, IBM Zurich Research, Switzerland Qingping Zhou, Jishou University, China

Program Chairs Albert Zomaya, University of Sydney, Australia Gregorio Martinez, University of Murcia, Spain Kenli Li, Hunan University, China

Steering Chairs Andrzej Goscinski, Deakin University, Australia Yi Pan, Georgia State University, USA Yang Xiang, Deakin University, Australia

Workshop Chairs Mianxiong Dong, Muroran Institute of Technology, Japan Ryan K. L. Ko, The University of Waikato, New Zealand Md. Zakirul Alam Bhuiyan, Central South University, China

Publicity Chairs Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Yulei Wu, The University of Exeter, UK Christian Callegari, University of Pisa, Italy Kuan-Ching Li, Providence University, Taiwan James J. (Jong Hyuk) Park, SeoulTech, Korea

Publication Chairs Jin Zheng, Central South University, China Wenjun Jiang, Hunan University, China

Finance Chairs Pin Liu, Central South University, China Wang Yang, Central South University, China

Local Arrangement Chairs Fang Qi, Central South University, China Qin Liu, Hunan University, China Hongzhi Xu, Jishou University, China

Program Committee (in alphabetical order)

1. Parallel and Distributed Architectures Track Chairs: Stefano Giordano, Italian National Interuniversity Consortium for Telecommunications, Italy Xiaofei Liao, Huazhong University of Science and Technology, China Haikun Liu, Nanyang Technological University, Singapore

TPC members: Marco Aldinucci, Universita' degli Studi di Torino, Italy Yungang Bao, Chinese Academy of Sciences, China Hui Chen, Auburn University, USA

35 Vladimir Getov, University of Westminster, UK Jie Jia, Northeastern University, China Yusen Li, Nanyang Technological University, Singapore Zengxiang Li, Agency for Science, Technology and Research, Singapore Xue Liu, Northeastern University, China Yongchao Liu, Georgia Institute of Technology, USA Salvatore Orlando, Universita Ca' Foscari Venezia, Italy Nicola Tonellotto, ISTI-CNR, Italy Zeke Wang, Nanyang Technological University, Singapore Quanqing Xu, Agency for Science, Technology and Research (A*STAR), Singapore Ramin Yahyapour, Uni Goettingen, Germany Jidong Zhai, Tsinghua University, China Jianlong Zhong, GraphSQL Inc, USA Andrei Tchernykh, CICESE Research Center, Ensenada, Baja California, Mexico

2. Software Systems and Programming Track Chairs: Xinjun Mao, National University of Defense Technology, China Sanaa Sharafeddine, Lebanese American University, Beirut, Lebanon

TPC members: Surendra Byna, Lawrence Berkeley National Lab, USA Yue-Shan Chang, National Taipei University, Taiwan Massimo Coppola, ISTI-CNR, Italy Marco Danelutto, University of Pisa, Italy Jose Daniel Garcia, University Carlos III of Madrid, Spain Peter Kilpatrick, Queen's University Belfast, UK Soo-Kyun Kim, PaiChai University, Korea Rajeev Raje, Indiana University-Purdue University Indianapolis, USA Salvatore Ruggieri, University of Pisa, Italy Subhash Saini, NASA, USA Peter Strazdins, The Australian National University, Australia Domenico Talia, University of Calabria, Italy Hiroyuki Tomiyama, Ritsumeikan University, Japan Canqun Yang, National University of Defense Technology, China Daniel Andresen, Kansas State University, USA Sven-Bodo Scholz, Heriot Watt University, UK Salvatore Venticinque, Second University of Naples, Italy

3. Distributed and Network-based Computing Track Chairs: Casimer DeCusatis, Marist College, US Qi Wang, University of the West of Scotland, United Kingdom

TPC members: Justin Baijian, Purdue University, USA Aparicio Carranza, City University of New York, USA Tzung-Shi Chen, National University of Tainan, Taiwan Ciprian Dobre, University Politehnica of Bucharest, Romania Longxiang Gao, Deakin University, Australia Ansgar Gerlicher, Stuttgart Media University, Germany Harald Gjermundrod, University of Nicosia, Cyprus Christos Grecos, Independent Imaging Consultant, United Kingdom Jia Hu, Liverpool Hope University, United Kingdom Baback Izadi, State University of New York at New Paltz, USA Morihiro Kuga, Kumamoto University, Japan Mikolaj Leszczuk, AGH University of Science and Technology, Poland Paul Lu, University of Alberta, Canada Chunbo Luo, University of the West of Scotland, United Kingdom

36 Ioannis Papapanagiotou, Purdue University, USA Michael Hobbs, Deakin University, Australia Cosimo Anglano, Università del Piemonte Orientale, Italy Md. ObaidurRahman, Dhaka University of Engineering & Technology, Bangladesh Aniello Castiglione, University of Salerno, Italy Shuhong Chen, Hunan Institute of Engineering, China

4. Big Data and its Applications Track Chairs: Jose M. Alcaraz Calero, University of the West of Scotland, United Kingdom Shui Yu, Deakin University, Australia

TPC members: Alba Amato, Second University of Naples, Italy Tania Cerquitelli, Politecnico di Torino, Italy Zizhong (Jeffrey) Chen, University of California at Riverside, USA Alfredo Cuzzocrea, University of Calabria, Italy Saptarshi Debroy, University of Missouri-Columbia, USA Yacine Djemaiel, Communication networks and Security, Res. Lab, Tunisia Shadi Ibrahim, INRIA, France Hongwei Li, UESTC, China William Liu, Auckland University of Technology, New Zealand Xiao Liu, East China Normal University, China Karampelas Panagiotis, Hellenic Air Force Academy, Greece Florin Pop, University Politehnica of Bucharest, Romania Genoveva Vargas Solar, CNRS-LIG-LAFMIA, France Chen Wang, CSIRO ICT Centre, Australia Chao-Tung Yang, Tunghai University, Taiwan Peng Zhang, Stony Brook University, USA Ling Zhen, Southeast University, China Roger Zimmermann, National University of Singapore, Singapore Francesco Palmieri, University of Salerno, Italy Rajiv Ranjan, CSIRO, Canberra, Australia Felix Cuadrado, Queen Mary University of London, UK Nilimesh Halder, The University of Western Australia, Australia Kuan-Chou Lai, National Taichung University of Education, Taiwan Jaafar GABER, UTBM, France Eunok Paek, Hanyang University, Korea You-ChiunWang, National Sun Yat-sen University, Taiwan KeGu, Changsha University of Technology, China

5. Parallel and Distributed Algorithms Track Chairs: Dimitris A. Pados, The State University of New York at Buffalo, US Baoliu Ye, Nanjing University, China

TPC members: George Bosilca, University of Tennessee, USA Massimo Cafaro, University of Salento, Italy Stefania Colonnese, Stefania Colonnese, Universita degli Studi di Roma La Sapienza, Italy Raphael Couturier, University of Franche Comte, France Gregoire Danoy, University of Luxembourg, Luxembourg Franco Frattolillo, Universita del Sannio, Italy Che-Rung Lee, National Tsing Hua University, Taiwan Laurent Lefevre, Inria, ENS-Lyon, University of Lyon, France Amit Majumdar, San Diego Supercomputer Center, USA Susumu Matsumae, Saga University, Japan George N. Karystinos, Technical University of Crete, Greece Dana Petcu, West University of Timisoara, Romania

37 Francoise Sailhan, CNAM, France Uwe Tangen, Ruhr-Universitaet Bochum, Germany Wei Xue, Tsinghua University, China Kalyan S. Perumalla, Oak Ridge National Laboratory, USA Morris Riedel, University of Iceland, Germany Gianluigi Folino, ICAR-CNR, Italy Joanna Kolodziej, Cracow University of Technology, Poland Luc Bougé, ENS Rennes, France Hirotaka Ono, Kyushu University, Japan Tansel Ozyer, TOBB Economics and Technology University, Turkey Daniel Grosu, Wayne State University, USA Tian Wang, Huaqiao University, China Sancheng Peng, Zhaoqing University, China Fang Qi, Central South University, China Zhe Tang, Central South University, China Jin Zheng, Central South University, China

6. Applications of Parallel and Distributed Computing Track Chairs: Yu Chen, Binghamton University, State University of New York, US Michal Wozniak, Wroclaw University of Technology, Poland

TPC members: Jose Alfredo F. Costa, Universidade Federal do Rio Grande do Norte, Brasil Robert Burduk, Wroclaw University of Technology, Poland Boguslaw Cyganek, AGH University of Science and Technology, Poland Paolo Gasti, New York Institute of Technology, USA Manuel Grana, University of the Basque Country, Spain Houcine Hassan, Univ. Politecnica de Valencia, Spain Alvaro Herrero, Universidad de Burgos, Spain Jin Kocsis, University of Akron, USA Esmond Ng, Lawrence Berkeley National Lab, USA Dragan Simic, University of Novi Sad, Serbia Ching-Lung Su, National Yunlin University of Science and Technology, Taiwan Tomoaki Tsumura, Nagoya Institute of Technology, Japan Krzysztof Walkowiak, Wroclaw University if Technology, Poland Zi-Ang (John) Zhang, Binghamton University-SUNY, USA Yunhui Zheng, IBM Research, USA Hsi-Ya Chang, National Center for High-performance Computing, Taiwan Chun-Yu Lin, HTC Corp., Taiwan Nikzad Babaii Rizvandi, The University of Sydney, Australia

7. Service Dependability and Security in Distributed and Parallel Systems Track Chairs: Antonio Ruiz Martinez, University of Murcia, Spain Jun Zhang, Deakin University, Australia

TPC members: Jorge Bernal Bernabe, University of Murcia, Spain Roberto Di Pietro, Universita di Roma Tre, Italy Massimo Ficco, Second University of Naples(SUN), Italy Yonggang Huang, Beijing Institute of Technology, China Georgios Kambourakis, University of the Aegean, Greece Muhammad Khurram Khan, King Saud University, Saudi Arabia Liang Luo, Southwest University, China Barbara Masucci, Universita di Salerno, Italy Juan M. Marin, University of Murcia, Spain Sabu M. Thampi, Indian Institute of Information Technology and Management - Kerala (IIITM-K), India Fernando Pereniguez-Garcia, Catholic University of Murcia, Spain

38 Yongli Ren, RMIT University, Australia Yu Wang, Deakin University, Australia Sheng Wen, Deakin University, Australia Mazdak Zamani, Universiti Teknologi Malaysia, Malaysia Susan K. Donohue, University of Virginia, USA Oana Boncalo, University Politehnica Timisoara, Romania KP Lam, University of Keele, UK George Loukas, University of Greenwich, UK Ugo Fiore, Federico II University, Italy Christian Esposito, The UNiversity of Salerno, Italy Arcangelo Castiglione, University of Salerno, Italy Edward Jung, Kennesaw State University, USA Md. ZakirulAlamBhuiyan, Central South University, China Xiaofei Xing, Guangzhou University, China Qin Liu, Hunan University, China Wenjun Jiang, Hunan University, China Gaocai Wang, Guangxi University, China Kaimin Wei, Jinan University, China

8. Web Services and Internet Computing Track Chairs: Huansheng Ning, University of Science and Technology Beijing, China Daqiang Zhang, Tongji University, China

TPC members: Jing Chen, National Cheng Kung University, Taiwan Eugen Dedu, University of Franche-Comte, France Sotirios G. Ziavras, NJIT, USA Luis Javier Garcia Villalba, Universidad Complutense de Madrid (UCM), Spain Jaime Lloret, Universidad Politecnica de Valencia, Spain Wei Lu, Keene University, USA Stefano Marrone, Second University of Naples, Italy Alejandro Masrur, Chemnitz University of Technology, Germany Seungmin (Charlie) Rho, Sungkyul University, Korea Giandomenico Spezzano, ICAR-CNR, Italy Jiafu Wan, South China University of Technology, China Yunsheng Wang, Kettering University, USA Martine Wedlake, IBM, USA Chung Wei-Ho, Research Center for Information Technology Innovation in Academia Sinica, Taiwan Xingquan (Hill) Zhu, Florida Atlantic University, USA Nikos Dimitriou, National Center for Scientific Research "Demokritos", Greece Choi Jaeho, CBNU, Chonju, Korea Shi-Jinn Horng, National Taiwan University of Science & Technology, Taiwan

9. Performance Modeling and Evaluation Track Chairs: Deze Zeng, China University of Geosciences, China Bofeng Zhang, Shanghai University, China

TPC members: Ladjel Bellatreche, ENSMA, France Xiaoju Dong, Shanghai Jiao Tong University, China Christian Engelman, Oak Ridge National Lab, USA Javier Garcia Blas, University Carlos III, Spain Mauro Iacono, Second University of Naples, Italy Zhiyang Li, Dalian Maritime University, China Tomas Margalef, Universitat Autonoma de Barcelona, Spain Francesco Moscato, Second University of Naples, Italy Heng Qi, Dalian University of Technology, China

39 Bing Shi, Wuhan University of Technology, China Magdalena Szmajduch, Cracow University of Technology, Poland Qian Wang, Wuhan University, China Zhibo Wang, Wuhan University, China Weigang Wu, Sun Yat-sen University, China David E. Singh, University Carlos III of Madrid, Spain Edmund Lai, Massey University, New Zealand Robert J. Latham, Argonne National Laboratory, USA Zafeirios Papazachos, Queen's University of Belfast, UK Novella Bartolini, Sapienza University of Rome, Italy Takeshi Nanri, Kyushu University, Japan Mais Nijim, Texas A&M University - Kingsville, USA Salvador Petit, Universitat Politècnica de València, Spain Daisuke Takahashi, University of Tsukuba, Japan Cathryn Peoples, Ulster University, Northern Ireland, UK Hamid Sarbazi-Azad, Sharif University of Technology and IPM, Iran Md. Abdur Razzaque, University of Dhaka, Bangladesh Angelo Brayner, University of Fortaleza, Brazil Sushil Prasad, Georgia State University, USA Danilo Ardagna, Politecnico di Milano, Italy Sun-Yuan Hsieh, National Cheng Kung University, Taiwan Li Chaoliang, Hunan University of Commerce, China YongmingXie, Hunan Normal University, China Guojun Wang, Central South University, China

Secretariats Zhe Tang, Central South University, China Feng Wang, Central South University, China

Webmaster Xiangdong Lee, Central South University, China

40 TrustData 2015 Organizing and Program Committees

Steering Co-Chairs Guojun Wang, Central South University, China Peter Mueller, IBM Zurich Research Laboratory, Switzerland

General Chairs Qin Liu, Hunan University, China Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria

Program Chairs Dr. Keqin Li, State University of New York at New Paltz, USA Dr. Avinash Srinivasan, Temple University, USA

Publicity Chairs Shui Yu, Deakin University, Australia Weirong Liu, Central South University, China

Program Committee (in alphabetical order) Andrei Tchernykh, CICESE Research Center, Mexico Baoliu Ye, Nanjing University, China Bimal Roy, Indian Statistical Institute, India Chang-Ai Sun, University of Science and Technology, China Chao Song, University of Electronic Science and Technology of China, China Christian Callegari, The University of Pisa, Italy Chunhua Su, Japan Advanced Institute of Science and Technology, Japan Franco Chiaraluce, Polytechnical University of Marche (UVPM), Italy Hai Jiang, Arkansas State University, United States Horacio Gonzalez-Velez, National College of Ireland, Ireland Imed Romdhani, Edinburgh Npier University, United Kingdom Jianguo Yao, Shanghai Jiao Tong University, China Joon S. Park, Syracuse University, United States Kevin Chan, US Army Research Laboratory, United States Lizhe Wang, Rochester Institute of Technology, United States Masakazu Soshi, Hiroshima City University, Japan Maurizio Atzori, University of Cagliari, Italy Mehdi Kargahi, University of Tehran, Iran Mingzhong Wang, Beijing Institute of Technology, China Muneer Bani Yassein, Jordan University of Science and Technology, Jordan Rajendra V. Boppana, UT San Antonio, USA Robert C. H. Hsu, Chung Hua University, China Ryan Ko, University of Waikato, New Zealand Sherali Zeadally, University of the District of Columbia, United States Tai-Hoon Kim, Sungshin W. University, South Korea Toshihiro Yamauchi, Okayama University, Japan Xin Liao, Hunan University, China Yongdong Wu, Institute for Infocomm Research, Singapore Young-Sik Jeong, Dongguk University, South Korea Yu Hua, Huazhong University of Science and Technology, China Yunsheng Wang, Kettering University, United States

Webmaster Shan Peng, Central South University, China

41

TSP 2015 Organizing and Program Committees

Program Chairs Imad Jawhar, United Arab Emirates University, UAE Deqing Zou, Huazhong University of Science of Technology

Program Committee Members (In alphabetical order) Chao Song, University of Electronic Science and Technology, China David Zheng, Frostburg State University,USA Feng Li, Indiana University-Purdue University Indianapolis, USA Haitao Lang, Beijing University of Chemical Technology, China Huan Zhou, China Three Gorges University, China Mingjun Xiao, University of Science and Technology of China, China Mingwu Zhang, Hubei University of Technology, China Shuhui Yang, Purdue University Calumet, USA Xiaojun Hei, Huazhong University of Science and Technology, China Xin Li, Nanjing University of Aeronautics and Astronautics, China Xuanxia Yao, University of Science and Technology Beijing, China Yaxiong Zhao, Google Inc., USA YingDai, LinkedIn Corporation, United States Yunsheng Wang, Kettering University, USA Youwen Zhu, Nanjing University of Aeronautics and Astronautics, China Yongming Xie, Changsha Medical University, China

Steering Committee Wenjun Jiang, Hunan University, China (Chair) Laurence T. Yang, St. Francis Xavier University, Canada Guojun Wang, Central South University, China Minyi Guo, Shanghai Jiao Tong University, China Jie Li, University of Tsukuba, Japan Jianhua Ma, Hosei University, Japan Peter Mueller, IBM Zurich Research Laboratory, Switzerland Indrakshi Ray, Colorado State University, USA Kouichi Sakurai, Kyushu University, Japan Bhavani Thuraisingham, The University of Texas at Dallas, USA Jie Wu, Temple University, USA Yang Xiang, Deakin University, Australia Kun Yang, University of Essex, UK Wanlei Zhou, Deakin University, Australia

Web Chair Shan Peng, Central South University, China

42

NOPE 2015 Organizing and Program Committees

Steering Committee Chairs Wei Li, Texas Southern University, USA Taoshen Li, Guangxi University, China

Program Chair Gaocai Wang, Guangxi University, China

Program Committee Members Dieter Fiems, Ghent University, Belgium Shuqiang Huang, Jinan University, China Juan F.Perez, Imperial College London, UK Haoqian Wang, Tsinghua University, China Yitian Peng, Southeast University, China Hongbin Chen, Guilin University of Electronic Technology, China Jin Ye, Guangxi University, China Junbin Liang, Hong Kong Polytechnic University, Hong Kong Xianfeng Liu, Hunan Normal University, China Hao Zhang, Central South University, China Chuyuan Wei, Beijing University of Civil Engineering and Architecture, China Hongyun Xu, South China University of Technology, China Zhefu Shi, University of Missouri, USA Songfeng Lu, Huazhong University of Science & Technology, China Yihui Deng, Jinan University, China Lei Zhang, Beijing University of Civil Engineering and Architecture, China Xiaoheng Deng, Central South University, China Mingxing Luo, Southwest Jiaotong University, China Bin Sun, Beijing University of Posts and Telecommunications, China Zhiwei Wang, Nanjing University of Posts and Telecommunications,China Yousheng Zhou,Chongqing University of Posts and Telecommunications,China Daofeng Li, Guangxi University, China

43

SCS 2015 Organizing and Program Committees

Steering Chairs Jie Li, Tsukuba University, Japan Dongqing Xie, Guangzhou University, China

Program Chairs Xiaofei Xing, Guangzhou University, China Md. Zakirul Alam Bhuiyan, Central South University, China, Temple University, USA

Program Committee Members (In alphabetical order) Marco Aiello, University of Groningen, Netherlands David Chadwick, University of Kent, UK Aparicio Carranza, City University of New York, USA Mooi Choo Chuah, Lehigh University, USA Yueming Deng, Hunan Normal University, China Christos Grecos, Independent Imaging Consultant, UK Dritan Kaleshi, University of Bristol, UK Donghyun Kim, North Carolina Central University, USA Santosh Kumar, University of Memphis, USA Muthoni Masinde, University of Nairobi, Kenya Satyjayant Mishra, New Mexico State University, USA Nam Nguyen, Towson University, USA Jean-Marc Seigneur, University of Geneva, Switzerland Hamid Sharif, University of Nebraska, USA Sheng Wen, Deakin University, Australia

Publicity Chairs Zeyu Sun, Xi'an Jiaotong University, China Yongming Xie, Hunan Normal University, China

44

SPPCN 2015 Organizing and Program Committees

General Chair Jian Weng, Jinan University, China

Program Chairs Mianxiong Dong, Muroran Institute of Technology, Japan Hua Guo, Beihang University, China Tieming Chen, Zhejiang University of Technology, China Kaimin Wei, Jinan University, China

Program Committee (in alphabetical order) Fuchun Guo, University of Wollongong, Austrilia Jianguang Han, Nanjing University of Finance and Economics, Nanjing, China Debiao He, Wuhan University, China Xinyi Huang, Fujian Normal University, China Xuanya Li, Chinese Academy of Sciences, China Fengyong Li, Shanghai University of Electric Power, China Changlu Lin, Fujian Normal University, China, Chang Xu, Beijing Institute of Technology, China Tao Xu, University of Jinan, China Yanjiang Yang, I2R, Singapore Yang Tian, Beihang University, China Shengbao Wang, Hangzhou Normal University, China Wei Wu, Fujian Normal University, China, Xiyong Zhang, Information Engineering University, China Lei Zhao, Wuhan University, China

45

DependSys 2015 Organizing and Program Committees

Steering Committee Chairs Jie Wu, Temple University, USA Guojun Wang, Central South University, China

General Co-Chairs Mohammed Atiquzzaman, University of Oklahoma, USA Sheikh Iqbal Ahamed, Marquette University, USA, Md Zakirul Alam Bhuiyan, Central South University, China, and Temple University, USA

Program Co-Chairs Latifur Khan, The University of Texas at Dallas, USA Joarder Kamruzzaman, Federation University and Monash University, Australia Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia

Program Committee Members (in alphabetical order) A. B. M Shawkat Ali, The University of Fiji, Fiji A. B. M. Alim Al Islam, Bangladesh University of Engineering and Technology, Bangladesh A. Sohel Ferdous, University of Western Australia, Australia A.K.M. Najmul Islam, University of Turku, Finland Abdul Azim Mohammad, Gyeongsang National University, South Korea Abdur Rouf Mohammad, Dhaka University of Engineering & Technology, Bangladesh Afrand Agah, West Chester University of Pennsylvania, USA Andreas Pashalidis, Katholieke Universiteit Leuven - iMinds, Belgium Asaduzzaman, Chittagong University of Engineering & Technology, Bangladesh C. Chiu Tan, Temple University, USA Changyu Dong, University of Strathclyde, Scotland Dana Petcu, West University of Timisoara, Romania Daqiang Zhang, Tongji University, China Farzana Rahman, James Madison University, USA Hugo Miranda, University of Lisbon, Portugal Jaydip Sen, National Institute of Science & Technology, India Jianfeng Yang, Wuhan University, China Jinkyu Jeong, Sungkyunkwan University, South Korea Kaoru Ota, Muroran Institute of Technology, Japan Karampelas Panagiotis, Hellenic Air Force Academy, Greece Lien-Wu Chen, Feng Chia University, Taiwan Liu Jialin, Texas Tech University, USA M. M. A. Hashem, Khulna University of Engineering and Technology, Bangladesh M. Thampi Sabu, Indian Institute of Information Technology and Management, India Mahbub Habib Sheikh, CASED/TU Darmstadt, Germany Mahmuda Naznin, Bangladesh University of Engineering and Technology, Bangladesh Mamoun Alazab, Australian National University, Australia Manuel Mazzara, Innopolis University, Russia Md. Abdur Razzaque, University of Dhaka, Bangladesh Md. Arafatur Rahman, University Malaysia Pahang, Malaysia Mohammad Asad Rehman Chaudhry, University of Toronto, Canada Md. Obaidur Rahman, Dhaka University of Engineering & Technology, Bangladesh Md. Rafiul Hassan, King Fahd University of Petroleum and Minerals, Saudi Arabia Md. Saiful Azad, American International University, Bangladesh Mehran Asadi, Lincoln University of Pennsylvania, USA Mohamad Badra, Zayed University, UAE

46 Mohamed Guerroumi, University of Sciences and Technology Houari Boumediene, Algeria Mohammad Asadul Hoque, East Tennessee State University, USA Mohammad Mehedi Hassan, King Saud University, KSA Mohammad Shahriar Rahman, University of Asia Pacific, Bangladesh Mohammed Shamsul Alam, International Islamic University Chittagong, Bangladesh Morshed Chowdhury, Deakin University, Australia Muhammad Mostafa Monowar, King AbdulAziz University, Saudi Arabia N. Musau Felix, Kenyatta University, Kenya Phan Cong, Vinh Nguyen Tat Thanh University, Vietnam Qin Liu, Hunan University, China Ragib Hasan, University of Alabama at Birmingham, USA Raza Hasan, Middle East College, Oman Reaz Ahmed, University of Waterloo, Canada Risat Mahmud Pathan, Chalmers University of Technology, Sweden S. M. Kamruzzaman, King Saud University, KSA Salvatore Distefano, Politecnico di Milano, Italy Shan Lin, Stony Brook University, USA Shao Jie Tang, University of Texas at Dallas, USA Sheng Wen, Deakin University, Australia Shigeng Zhang, Central South University, China Sk Md Mizanur Rahman, King Saud University, KSA Subrota Mondal Hong Kong University of Science and Technology, Hong Kong Syed Imran Ali, Middle East College, Oman Tanveer Ahsan, International Islamic University Chittagong, Bangladesh Tanzima Hashem, Bangladesh University of Engineering and Technology, Bangladesh Tao li, The Hong Kong Polytechnic University, Hong Kong Tarem Ahmed, BRAC University, Bangladesh Tian Wang, Huaqiao University, China Tzung-Shi Chen, National University of Tainan, Taiwan Vaskar Raychoudhury, Indian Institute of Technology Roorkee, India Wahid Khan, University of Saskatchewan, Canada Weigang Li, University of Brasilia, Brazil Weigang Wu, Sun Yat-sen University, China William Liu, Auckland University of Technology, New Zealand Xiaofei Xing, Guangzhou University, China Xuefeng Liu, The Hong Kong Polytechnic University, Hong Kong Xuyun Zhang, University of Melbourne, Australia Yacine Djemaiel, Communication networks and Security, Res. Lab, Tunisia Yifan Zhang, Binghamton University, USA Yu Wang, Deakin University, Australia

Publication Co-Chairs Jin Zheng, Central South University, China Wenjun Jiang, Hunan University, China

Local Arrangement Co-Chairs Fang Qi, Central South University, China Qin Liu, Hunan University, China Hongzhi Xu, Jishou University, China

Finance Co-Chairs Pin Liu, Central South University, China Wang Yang, Central South University, China

Web Chair Min Guo, Central South University, China

47

Introduction to School of Information Science and Engineering of Central South University

School of Information Science and Engineering (SISE) of Central South University was merged in June 2002 from School of Information Science and Engineering of the former Central South University of Technology, School of Information Engineering of the former Changsha Railway University, and Computer Center of the former Hunan Medical University.

Mr. Wang Yijun is the SISE Branch Party Secretary of the CSU Committee, and Mr. Zou Beiji is the Dean of the School. At present, the School has around 300 staff and 4000 full-time undergraduate students and 2000 graduate students. The School is the largest one in terms of the total number of staff and students at Central South University.

The disciplines and specialties of the School cover a wide range of subjects including Control Science and Engineering, Computer Science and Technology, Electrical Engineering, Information and Communication Engineering, Electronic Science and Technology, Systems Science, and Transportation Information Engineering and Control. Currently, the School has 2 First-Level Disciplines and 9 Second-Level Disciplines which have been authorized to grant doctorate degrees, as well as 2 National Key Disciplines, 3 Hunan Provincial Key Disciplines, 2 Postdoctorate Centers, and 3 Provincial Research and Development Centers.

At present, the School stands in the front end of the privileged disciplines in the world. It is committed to serving our society through the joint efforts of its staff and students. We are striving to build a group of information disciplines to be recognized as a first-level training base in China and an advanced training base in the world as well.

Quick Links:

SISE of Central South University: http://sise.csu.edu.cn/

Trusted Computing Institute of Central South University: http://trust.csu.edu.cn/

48

Introduction to School of Software and Service Outsourcing of Jishou University

School of Software and Service Outsourcing of Jishou University is a public full-time second-class undergraduate college in accordance with exemplary software service outsourcing college model, located in the beautiful tourist city---Zhangjiajie. With excellent faculty, advanced practice teaching platform, first-class learning environment for software and information technology outsourcing and other high-tech industries, the school has created senior software quality talents with solid basic knowledge of software engineering, excellent software development technique, skilled experienced software engineering practices, and software engineering comprehensive quality.

The school adheres to the development idea of "emphasizing engineering education, highlighting the application-oriented institute". It has established the talent cultivation positioning of "training the senior software engineers within the industry, facing the country, and serving the world". Through school-enterprise cooperation, Sino-foreign cooperation, the combination of government-industry-study-research, the school has high academic, rich engineering experienced, stable professional teachers, including 8 professors, 15 PhD, 35 senior software engineers, and project managers. The school has the dominant course laboratory jointly built by central and local government, the appropriated fund laboratory through the program of the central government supporting the development of the local university, Hunan province training base for service outsourcing talents, joint school-enterprise training center for software engineering, the training base for software engineering college students designated by the Ministry of Education, and other high-level modern practice teaching platform, the laboratory owns 1340 sets of equipment, with a total value of about RMB18 million.

Quick Link:

School of Software and Service Outsourcing of Jishou University: http://rjxy.jsu.edu.cn/

49

Map of Conference Venue

Zhangjiajie International Hotel, Zhangjiajie, China - A Quasi Five-Star Hotel (张家界国际大酒店) Address: 145 Sanjiao Ping, Zhangjiajie, Hunan, China http://www.zjjihotel.com/

Public Transportation

(1) From Zhangjiajie Hehua Airport (also called Dayong Airport, IATA code: DYG) to Zhangjiajie International Hotel: Take a taxi (around RMB40); or first take a bus #4 (get off at BIANMAO station), then take a bus #2 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

张家界荷花国际机场到张家界国际大酒店:大约 8 公里,乘坐 4 路公交车到边贸,再转乘 2 路公交车到三角 坪,再步行 600 米到酒店,或乘坐的士(约 40 元);返程类似。

(2) From Zhangjiajie Railway Station to Zhangjiajie International Hotel: Take a taxi (around RMB35-40); or take a bus #6 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

张家界火车站到张家界国际大酒店:大约 10 公里,乘坐 6 路公交车到三角坪,再步行 600 米到酒店,或乘 坐的士(约 35-40 元);返程类似。

ICA3PP 2015 Sponsors and Organizers