things and 4th - gbv · cyber-physicalsystemsandsociety energy efficiency basedon qualityofdata...
TRANSCRIPT
2011 International Conference on
Internet of Things and 4th
International Conference on Cyber,
Physical and Social Computing
(iThings/CPSCom 2011)
Dalian, China
19-22 October 2011
Editors:
Feng Xia
Zhikui Chen
Gang Pan
Laurence T. YangJianhua Ma
IEEE IEEE Catalog Number: CFP1114K-PRT
ISBN: 978-1-4577-1976-9
2011 IEEE International
Conferences on Internet
of Things, and Cyber, Physicaland Social Computing
iThings/CPSCom 2011
Table of Contents
Message from the iThings 2011 General
Chairs xvi"
Message from the iThings 2011 Program
Chairs xtx
Message from the iThings 2011 Steering
Chairs xx
Message from the iThings 2011 Workshop
Chairs xxi
iThings 2011 Organizing and Program
Committees xxii
Message from the CPSCom 2011 General
Chairs xxv
Message from the CPSCom 2011 Program
Chairs xxvi
Message from the CPSCom 2011 Steering
Committee'
..xxvii
Message from the CPSCom 2011 Workshop
Chairs xxvili
CPSCom 2011 Organizing and Program
Committees xxix
Message from the UUMA 2011 Workshop
Chairsxxxi
UUMA 2011 Organizing and Program
Committeesxxxii
V
Message from the RelSOC 2011 Workshop
Chairs xxxiii
RelSOC 2011 Organizing and Program
Committees xxxiv
Message from the TFWS 2011 Workshop
Chairs xxxv
TFWS 2011 Organizing and Program
Committees xxxvi
Message from the TESL 2011 Workshop
Chairs xxxvii
TESL 2011 Organizing and Program
Committees xxxviii
Message from the PhoneCom 2011 Workshop
Chairs xxxix
PhoneCom 2011 Organizing and Program
Committees xl
Message from the CPSA 2011 Workshop
Chairs xli
CPSA 2011 Organizing and Program
Committees xlii
Message from the DOIoT 2011 Workshop
Chairs xtiii
DOIoT 2011 Organizing and Program
Committees xliv
Message from the QoSloT 2011 Workshop
Chairs xlv
QoSloT2011 Organizing and Program
Committees xlvi
Keynote Speeches of iThings 2011
and CPSCom 2011 xlvii
Keynote Speech of RelSOC 2011 lii
Keynote Speech of PhoneCom 2011 liii
vi
2011 IEEE International Conference on Internet of Things(iThings 2011)
Architecture and Infrastructure I
Advanced Internet of Things 1
Lei Zhang and Nathalie Mitton
Web of Things: Description, Discovery and Integration 9
Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
D-LITe: Distributed Logic for Internet of Things Services 16
Sylvain Cherrier, Yacine M. Ghamri-Doudane, Stephane Lohier, and Gilles Roussel
Hyper-Environments: A Different Way to Think about loT 25
Jonata Tyska Carvalho, Rafael A. Penna dos Santos,
Silvia Silva da Costa Botelho, Nelson Duarte Filho, Rodrigo Ruas Oliveira,
and Edevaldo Santos
Architecture and Infrastructure II
A Framework for Dynamic Updating of Service Pack in the Internet of Things 33
Jianhua Liu and Weiqin Tong
Ontology Based Service Discovery Method for Internet of Things 43
Siming Yang, Yang Xu, and Qingyi He
An Experimental Facility for Wireless Multi-hop Networks in Future Internet
Scenarios 48
Oliver Hahm, Mesut Gune§, Felix Juraschek, Bastian Blywis,
and Nicolai Schmittberger
Scalable ID/Locator Resolution for the loT 58
George Roussos and Paul Chartier|
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing
System with Multiple Master Multiple Slave Architecture 67
Sanjay K. Dhurandher, Ankit Aggarwal, Aashish Bhandari, Abhishek Verma,
Mohammad S. Obaidat, and Isaac Woungang
System Design, Modeling, and Evaluation
GPEP: Graphics Processing Enhanced Pattern-Matching
for High-Performance Deep Packet Inspection 74
Lucas John Vespa and Ning Weng
vii
Design and Implementation of a Fault Tolerant Multiple Master Cloud
Computing System 82
Mohammad S. Obaidat, Harsh Bedi, Aashish Bhandari, M.S. Don Bosco,
Ankur Maheshwari, Sanjay K. Dhurandher, and Isaac Woungang
From U-Tile to Indoor-Tracer: An Indoor Location Sensing Platform Based
on Passive RFID 89
Lei Jing, Zixue Cheng, Yinghui Zhou, and Junbo Wang
Wireless Intelligent Fire Fighting Systems Software Platform R&D 94
Sheng'an Duan, Kaitao Cheng, Quanbo Ge, and Chenglin Wen.
Intelligent Information ProcessingMassive Heterogeneous Sensor Data Management in the Internet of Things 100
Zhiming Ding, Qi Yang, and Hong Wu
Anonymous Video Processing for Live Street View. 109
Ulrik Soderstrom and Haibo Li
A Learning Automata Based Solution for Preventing Distributed Denial
of Service in Internet of Things 114
Sudip Misra, P. Venkata Krishna, Harshit Agarwal, Antriksh Saxena,
and Mohammad S. Obaidat
An Optimized Schema to Improve the Time Efficiency of the EPG Gen-2
Protocol 123
Xin-Qing Yan, Juan 8a/, Yan Xu, and Bin Li
On Error Performance Improvements of Passive UHF RFID Systemsvia Syndrome Decoding 127
Robert Morelos-Zaragoza
Networks and Communications
ENST: A Simulation Toolbox Based on Simulink for E-Textile Networks 131
Wei Cheng, Nenggan Zheng, Man Lin, and Laurence Tianruo Yang
Principal-Agent Theory Model in Dynamic Spectrum Sharing 139
Yang Liu, Zhikui Chen, and Xiaoning Lv
Improvement of Assurance for Wireless Sensor Networks Using Packet
Detouring and Dispersed Data Transmission 144
Tomoya Okazaki, Eitaro Kohno, and Yoshiaki Kakuda
ODAM-C: An Improved Algorithm for Vehicle Ad Hoc Network 152
Weifeng Sun, Jong Fu, Yu Su, Feng Xia, and Jianhua Ma
An Algorithm of Weighted Monte Carlo Localization Based on Smallest
Enclosing Circle 157
Jiang Xu, Fanyu Bu, Wei Si, Yiteng Qiu, and Zhikui Chen
viii
Applications: Business and Social Issues
Towards a Smart Campus with Mobile Social Networking 162
Zhiwen Yu, Yunji Liang, Bukan Xu, Yue Yang, and Bin Guo
Social Media Game Concept within the Digital Zoo: New Ways of Connecting
a Tourist Attraction with Its Visitors 170
Karin Fahlquist, Thomas Mejtoft, and Johannes Karlsson
Internet of Things: An Emerging Industrial or a New Major? 178
Huansheng Ning and Sha Hu
Connecting Agriculture to the Internet of Things through Sensor Networks 184
Junyan Ma, Xingshe Zhou, Shining Li, and Zhigang Li
2011 IEEE International Conference on Cyber, Physicaland Social Computing (CPSCom 2011)
Invited Papers I
Study on the Effect of Utility Uncertainty on Behavior Diffusion in Autonomous
and Rational Networks 188
Yufeng Wang, Athanasios V. Vasilakos, and Jianhua Ma
Management System for IPv6-Enabled Wireless Sensor Networks 195
Luis M.L. Oliveira, Joao P. Amaral, Joao M.P.L. Caldeira,
Joel J.P.C. Rodrigues, and Liang Zhou
Improved Compact Routing Scheme with Applications in Static Sensor
Networks and Internet 201
Qin Xin, Jean-Charles Delvenne, Zhanlong Zhang, and Wei He
Invited Papers II
Understanding Location-Based Information Sharing in a Mobile Human
Computation Game 209
Dion Hoe-Lian Goh, Khasfariyati Razikin, Alton Y.K. Chua, Chei Sian Lee,
and Keng-Tiong Tan
SoPhoNet: Photo Sharing Based on Participatory Sensing 217
Wei Liu, Zeming Zheng, Gan Pan, and Shijian Li
Toward High-Level Activity Recognition from Accelerometers on Mobile
Phones 225
Sozo Inoue and Yuichi Hattori
ix
Cyber-Physical Systems and Society
Energy Efficiency Based on Quality of Data for Cyber Physical Systems 232
Luong Thi Thu Phuong, Nguyen Trung Hieu, Jin Wang, Sungyoung Lee,
and Young-Koo Lee
Power-Efficient Cyber-Physical Late Arrival Detection with Smartphones 242
Daniel Guymon, Brian Dougherty, Jules White, and Mani Golparvar-Fard
Supervised Gabor-Based Kernel Locality Preserving Projections for Face
Recognition 252
Chuang Lin, Xirui Sun, Kuanjiu Zhou, and Feng Xia
Touch-Driven Interaction between Physical Space and Cyberspace with NFC 258
Longbiao Chen, Gang Pan, and Shijian Li
Pervasive Social Computing I
Does Age Make a Difference in the Behaviour of Online Social Network
Users? 266
Darren Quinn, Liming Chen, and Maurice Mulvenna
Physical Proximity and Online User Behaviour in an Indoor Mobile Social
Networking Application 273
Bin Xu, Alvin Chin, Hao Wang, Lele Chang, Ke Zhang, Fangxi Yin, Hao Wang,
and Li Zhang
Better Organizing Your Contacts: An Empirical Study of an Intelligent Social
Contact Management System 283
Dingqi Yang, Bin Guo, and Daqing Zhang
Anomaly Detection on Collective Moving Patterns: A Hidden Markov Model
Based Solution 291
Su Yang and Weihua Liu
Pervasive Social Computing II
Living with Internet of Things: The Emergence of Embedded Intelligence 297
Bin Guo, Daqing Zhang, and Zhu Wang
A Structural Approach for Finding Real-Friend Links in Internet Social
Networks 305
Yao-Ting Huang, Kuan-Hung Lin, and Bang Ye Wu
Emerging Trust Patterns in Online Communities 313
Sonia C. Sousa and David Lamas
Influence Strength Aware Diffusion Models for Dynamic Influence
Maximization in Social Networks 317
Fei Hao, Chunsheng Zhu, Min Chen, Laurence T. Yang, and Zheng Pei
X
Sensor/Actuator Networks
MuZi: Multi-channel ZigBee Networks for Avoiding WiFi Interference 323
Ruitao Xu, Gaotao Shi, Jun Luo, Zenghua Zhao, and Yantai Shu
A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol
for WSNs 330
Chi Lin, Guowei Wu, Mingchu Li, Xiaojie Chen, Zuosong Liu, and Lin Yao
MLMAC: Multi-channel Low-latency MAC Protocol for Industrial Wireless
Sensor Networks 338
Xuan Zhang, Guangchi Liu, Qian Tian, and Zhiqun Li
Autonomous Coordination Technology in Wireless Sensor Networks for Online
Expansion 343
Md. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, and Kinji Mori
N-Times Trilateral Centroid Weighted Localization Algorithm of Wireless
Sensor Networks 351
Yu Zhou, Tie Qiu, Feng Xia, and Gang Hou
Security, Privacy, and Trust
Empirical Analysis of Behavior on Information Security 358
Toshihiko Takemura
Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol
for Mobile Ad Hoc Networks 364
Jiazi Yi, Thomas Clausen, and Ulrich Herberg
Using a Smart Phone to Strengthen Password-Based Authentication 372
Weili Han, Ye Cao, and Chang Lei
A Taxonomy of Cyber Attacks on SCADA Systems 380
Bonnie Zhu, Anthony Joseph, and Shankar Sastry
Applications and Services
Goal-Driven Navigation for Learning Activities Based on Process Optimization 389
Jian Chen, Haifeng Man, Qun Jin, and Runhe Huang
An Optimal Unequal Frame Protection Scheme in Video Streaming 396
Ching-Lung Chang, Yu-shian Lin, and Ching-Hung Chang
Characterizing SMP Virtual Machine Scheduling in Virtualization Environment 402
Jia Tian, Yuyang Du, and Hongliang Yu
Task Matching in Crowdsourcing : 409
Man-Ching Yuen, Irwin King, and Kwong-Sak Leung
xi
International Workshop on Universal User Modelingand Applications (UUMA 2011)
User Modeling
User-Session-Based Test Cases Optimization Method Based on Agglutinate
Hierarchy Clustering 413
Yue Liu, Kang Wang, Wang Wei, Bofeng Zhang, and Hailin Zhong
Event Similarity Computation in Text 419
Xujie Zhang, Zongtian Liu, Wei Liu, Wenjie Xu, and Dong Wang
A Willing Events Identification Method 424
Yang Zhao, Wen Zhou, Yao Li, Zongtian Liu, Ying Zhu, and Ping Zhu
Using Metadata to Maintain Link Integrity for Linked Data 432
Fangfang Liu and Xiaojing Li
Modeling Predicate Abstraction of Timed Automata in PVS 438
Xia Yin, Qingguo Xu, and Kunliang Han
Algorithms and Methods
User Model Evolution Algorithm: Forgetting and Reenergizing User Preference 444
So Zhou, Bofeng Zhang, Yucong Liu, and Kun Xing
Behavior Based User Interests Extraction Algorithm 448
Kun Xing, Bofeng Zhang, Bo Zhou, and Yucong Liu
A Kind of Case Similarity Evaluation Model Based on Case-Based Reasoning 453
Haobin Shi, Mingjun Xin, and Wenjie Dong
Document Clustering Method Based on Visual Features 458
Yucong Liu, Bofeng Zhang, Kun Xing, and Bo Zhou
The Methods of Data Prefetching Based on User Model in Cloud Computing 463
Ge Yunwen, Wu Shaochun, Yuan Bowen, and Li Jiazheng
Systems and ApplicationsA Dynamic Image Matching Model and Architecture for Smart Devices 467
Tanvir Shahid, Ashraf Uddin Ahmed, Chris Craney, and Bill Haraguchi
Forgery Attacks on Two Pairing-Based Proxy Signature Schemes 473
Chan Wang and Xiaotong Fu
The Effects of Innovation Alliance on Network Structure and Association Rules 479
Fei Shengnan, Zhou Wen, Liu Zongtian, Zhao Yan, Zhu Ying, and Lu Xiaolong
A TCM Diagnosis System Based on Textbook Information Extraction 483
Wenhao Zhu, Li Fu, Lei Xu, and Bofeng Zhang
xii
Topic Tracking Based on Event Network
Dong Wang, Wei Liu, Wenjie Xu, and Xujie Zhang
.488
International Workshop on Resilience and ICT for Secure
Open Cities (RelSOC 2011)
An Education Support System with Anonymized Medical Data Based on Thin
Client System 494
Yutaka Hatakeyama, Hiromi Kataoka, Noriaki Nakajima, Teruaki Watabe,
Yoshiyasu Okuhara, and Yusuke Sagara
The Structure of Psychological Resistance and Incentives in Lifelog
Disclosure: An Experimental Study with Smartphone Users 498
Tetsuro Kobayashi, Noboru Sonehara, and Yu Ichifuji
A Proposal of "Identity Commons": Utilization of Life Log and ID Information
for Resilient Social System 503
Memiko Otsuki and Noboru Sonehara
Location Privacy in Mobile Telephony Networks—Conflict of Interest
between Safety, Security and Privacy 508
Klaus Rechert, Konrad Meier, Dennis Wehrle, and Dirk von Suchodoletz
Data Provenance with Watermarks for Usage Control Monitors at Disaster
Recovery 514
Martin Salter, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer,
and Isao Echizen
Quasi Real-Time Evaluation System for Seismic Disaster Based on Internet
of Things 520
Zhikui Chen, Zhenyu Li, Jing Li, Jianyun Chen, and Yang Liu
International Workshop on the Trend and Future of Web
Science (TFWS 2011)
Query Performance Evaluation of OWL Storage Model 525
Jinhyung Kim, Dongmin Seo, Hanmin Jung, Pyung Kim, Seungwoo Lee,
and Won-Kyung Sung
Towards Discovering Emerging Technologies Based on Decision Tree 529
Jinhee Lee, Jinhyung Kim, Seungwoo Lee, Dongmin Seo, Hanmin Jung,
and Won-Kyung Sung
Measuring Similarities between Technical Terms Based on Wikipedia 533
Myunggwon Hwang, Do-Heon Jeong, Seungwoo Lee, and Hanmin Jung
Multi-faceted Navigation of Legal Documents 537
Seungwoo Lee, Pyung Kim, Dongmin Seo, Jinhyung Kim, Jinhee Lee,
Hanmin Jung, and Christian Dirschl
xiii
Establishing Usability and Development Strategies: Focused on Intelligent
Legislation Support System
Mikyoung, Hanmin Jung, Jinhyung Kim, Young-hyun Choi, and Seungin Kim
541
International Workshop on Technology-Enhanced Social
Learning (TESL 2011)
New Models and Systems for Social Learning SupportCAPK: A Learning Process Model for Web 2.0 Technology Enhanced
Community of Practice 546
Haifeng Man, Hong Chen, Yan Wu, and Qun Jin
Learning by Logging: Supporting Ubiquitous Learning Using a Lifelogging Tool 552
Hiroaki Ogata, Mengmeng Li, Bin Hou, Noriko Uosaki, and Yoneo Yano
Building a Search Engine for Scientific Projects Survey 558
Chengjiu Yin, Yoshiyuki Tabata, Xiaobin Wu, Tetsuya Nakatoh,
and Sachio Hirokawa
A Hybrid P2P Search Engine for Social Learning 564
Ashraf Uddin Ahmed, Tanvir Shahid, Hong Chen, and Qun Jin
Social Learning Pedagogy and Strategy, and LanguageLearning
TSI-Enhanced Engaging Pedagogical Agents 570
Steve Leung, Sandeep Virwaney, Fuhua Lin, and Andrew J. Armstrong
The Effect of Integrating STS Strategy to Online Inquiry-Based Learning
on Students' Learning Performance 576
Gwo-Jen Hwang, Han-Yu Sung, and Hong-Sheng Chang
Online Japanese Composition Correction System 581
Yuqin Liu, Guohai Jiang, Bo Jiang, and Bing Yan
Implementation of CALL-Based Online Janpanese Learning System 585
Lanling Han, Dechao Liu, and Yunqin Liu
International Workshop on Sensing, Networking,and Computing with Smartphones (PhoneCom 2011)Trust Behavior Based Recommender System for Software Usage 589
Zheng Yan and Peng Zhang
Web of X Service Environment for Ubiquitous Network and Computing 592
Zhenyu Wu, Chunhong Zhang, Yang Ji, and Yunjie Liu
Role-Based Contextual Recommendation 598
Cheng Zeng, Liang Hong, Jian Wang, Chuan He, Jilei Tian, and Xiaogang Yang
xiv
Using Physical Context in a Mobile Social Networking Application
for Improving Friend Recommendations 602
Bin Xu, Alvin Chin, Hao Wang, and Hao Wang
Monitoring Energy Consumption of Smartphones 610
Fangwei Ding, Feng Xia, Wei Zhang, Xuhai Zhao, and Chengchuan Ma
Using Smartphones in Healthcare and to Save Lives 614
Gabor Kiss
International Workshop on Cyber-Physical Systemsand Applications (CPSA 2011)
Applications and Services
Smart Baggage in Aviation 620
Farid Abedan Kondori and Shahrouz Yousefi
Study of Classroom Teaching Aids System Based on Wearable Computing
and Centralized Sensor Network Technique 624
Zhang Heng, Chen Dong Yi, and Ling Jian Zhong
Remote Neonatal Pain Assessment System Based on Internet of Things 629
Yang Zhong and Li Liu
i-Function of Electronic Cigarette: Building Social Network by Electronic
Cigarette 634
Bo Li, Shafiq ur Rehman, and Haibo Li
A Novel Depth Map Generation Method Based on K-Means Clustering
and Depth Pattern Recognition 638
Hao Jiang, Shuxu Guo, Siming Meng, and Xiaonan Luo
Modeling and Design
Symbiotic, Mobile Methodologies for Digital-to-Analog Converters 644
Zhenhua Wang, Benxiong Huang, Guo Zhe, and Lai Tu
Statistical Modeling for Image Matching in Large Image Databases 648
David KSIIberg, Oleg Seleznjev, Nikolaj Leonenko, and Haibo Li
Network Worm Propagation Model Based on a Campus Network Topology 653
Aliyu Mohammed, Sulaiman Mohd Nor, and Muhammad Nadzir Marsono
Edge-Collapse Mesh Simplification Method Based on Gauss Curvature 660
Yan Tang and Qingchen Zhang
An Improved Iris Localization Method for Authentication System 663
Zongqiang Zhang, Mingchu Li, Feng Xia, and Jianhua Ma
A Multi-attribute Hierarchical Threshold Scheme 667
Dong Jiao, Mingchu Li, Cheng Guo, and Jianhua Ma
XV
International Workshop on the Future Design of the Internet
of Things (DOIoT 2011)
Value, Space, and Time
Internet of Things and Co-creation of Value 672
Thomas Mejtoft
Personal Relative Time: Towards Internet of Watches 678
Alaa Halawani and Haibo Li
Personal Internet-Driven Maps Based on Time Distances 683
Ulrik Sdderstrdm
Nodes Social Relations Cognition for Mobility-Aware in the Internet of Things 687
Jian An, Xiaolin Gui, Wendong Zhang, and JinHua Jiang
An Architecture of Data Processing Using Deluge Computing in Internet
of Things 692
Yang Liu, Zhikui Chen, Haozhe Wang, and Xiaoning Lv
Security, Authentication, and Applications
Pervasive Computing Oriented Interval-Valued Fuzzy Trust Model Research 698
Zhanrong Chen, Xunwen Xu, and Longxin Lin
A New Authenticated Tripartite Key Agreement Protocol 702
Cao Pan, Hui Ding, and Hongyuan Wang
Model of TrustRank Evaluation Based on Fuzzy Set for Pervasive Computing 705
Xun Wen Xu and Zhanrong Chen
RFID as an Enabler of the Internet of Things: Issues of Security and Privacy 709
Benjamin Khoo
Internet of Food 713
Jean-Paul Kouma and Li Liu
International Workshop on QoS of the Internet of Things(QoSloT 2011)
Architecture and Design
A QoS Architecture for IOT 717
Ren Duan, Xiaojiang Chen, and Tianzhang Xing
A Resource Management and Control Model Supporting Applications in
the Internet of Things 721
Van Shi, Min Sheng, and Fang He
xvi
Qualitative Evaluation of a Proposed Federated Object Naming Service
Architecture 726
Sandoche Balakrichenan, Antonio Kin-Foo, and Mohsen Souissi
Using SOA in Critical-Embedded Systems 733
Douglas Rodrigues, Rayner de Melo Pires, Julio Cezar Estrella,
Emerson Alberto Marconato, Onofre Trindade Junior,
and Kalinka Regina Lucas Jaquie Castelo Branco
SWRL Bridge-Peer Model: An Improved Super-Peer Model Based on
the Extended SWRL and Its Application 739
Yu Liu, Ruomei Wang, Liyi Peng, and Xiaonan Luo
Systems and ApplicationsInteraction Design for Digital Zoo 744
Keni Ren, Johannes Karlsson, and Haibo Li
Research on Wireless Sensor Network and Carrying Network Integration
Based on Gateway 748
Yanyan Han, Deshi Li, Jian Chen, and Tianyu Wang
A Reliable Transmission Protocol Based on Dynamic Link Cache 752
Hao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong,
Baishun Zhou, and Lang Qin
The Rapid Worm Detecting Technology in Large-Scale Network 756
Wang Yongjian, Feng Bin, and Wang Shupeng
A Simulation Platform for Measurements in Dynamic Environment
of Ultrasonic Wireless 762
Zhanwei Du, Yongjian Yang, Shuqiu Li, Li Ma, Xiange Li, and Yuan Bai
Address Allocation in IPv6 Sensor Networks for Medical Monitoring
Applications 768
Lujuan Ma, Deshi Li, Yuanyuan Zeng, Xianli Liu, and Xiaoliang Wang
Author Index 772
xvii