The 15th International Conference on Algorithms and...

55
1 The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015) FINAL PROGRAM 18 20 November 2015 Zhangjiajie, Hunan Province, China Copyright © Trusted Computing Institute, Central South University, China http://trust.csu.edu.cn

Transcript of The 15th International Conference on Algorithms and...

Page 1: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

1

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

FINAL PROGRAM

18 – 20 November 2015 Zhangjiajie, Hunan Province, China

Copyright © Trusted Computing Institute, Central South University, China

http://trust.csu.edu.cn

Page 2: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

2

Introduction to Central South University

Central South University (CSU) is a comprehensive and national key university under the direct

administration of the Ministry of Education in China. CSU is among the first group of top universities in

China admitted into “Project 211”, which is a project of building national key universities and colleges for

the 21st century, and “Project 985”, which is a joint constructive project of building world-class

universities co-sponsored by the Chinese central government and the local governments, and “Project

2011”, which is targeted for promoting the capability and capacity of cooperative creativity in top

universities in China. Mr. Zhang Yaoxue, a member of the Chinese Academy of Engineering, and the

inventor of Transparent Computing (TC), is the President of CSU.

Approved by the State Council, CSU was established on April 29, 2000, by merging three separate

universities, including Hunan Medical University (HMU), Changsha Railway University (CRU), and

Central South University of Technology (CSUT). CSU covers an area of around 5,117 mu (341 hectares).

CSU boasts a high-quality group of faculty, comprising of many famous scholars and experts with great

influence both at home and abroad. Among them, there are 2 members of the Chinese Academy of

Sciences, 15 academicians who are members of Chinese Academy of Engineering, 9 are members of the

Discipline Assessment Group of the Academic Degrees Committee of the State Council, 23 scientific and

technological experts have been recognized at a national level for their outstanding achievements, 545

experts have been awarded special subsidies from the Government, more than 1000 are doctorate

supervisors and 33 are Special-term Professors funded by the Changjiang Scholar Program. In addition,

CSU has appointed a number of well-known Chinese and international scholars as honorary professors,

visiting professors, or adjunct professors.

CSU covers 12 fields of study, including engineering, science, medicine, management, literature, law,

economics, philosophy, education, history, agriculture, and art, and offers military science as well. It

consists of 30 colleges offering 92 programs for bachelors’ degrees, and a graduate school comprising of a

number of national key disciplines, including 6 at f irst-level (ranking 8th in China), 12 at second-level and

one in development. 91 first-level disciplines are authorized to confer masters and doctoral degrees. 191

programs are offered for doctoral degrees, 307 programs for masters’ degrees and 19 programs for

professional masters’ degrees. CSU also has 42 post-doctoral exchange centers, ranking 9th among

Chinese universities and colleges.

At present, more than 55,000 full-time students are studying at CSU, including 20,000 graduate students

and 800 foreign students, from 31 provinces and municipalities of the mainland China, as well as 80

countries and regions of the rest of the world. CSU is a leading and top ranking Chinese university in the

following aspects: one of the universities first starting an eight-year medical program ( M.D.), the first

university running a pilot class for training innovation-oriented senior engineering talents, the first civilian

university offering master degree in military command and technique for officers, boasting five national

talents training and teaching bases, six national centers for experimental teaching, 57 national exemplary

courses, six bilingual national exemplary courses, six “excellent teachers” and eight teaching teams highly

recognized by the state, 15 National Top 100 Doctoral Dissertations produced by its graduates since 2000.

CSU also possesses three national first-class affiliated hospitals equipped with state-of-the-art medical

facilities.

http://www.csu.edu.cn/

Page 3: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

3

Introduction to Jishou University

Jishou University (JSU) is a public university in the western part of Hunan Province and the only

comprehensive university in the border area of Hunan, Hubei, Chongqing and Guizhou provinces.

Founded in September 1958, the University is composed of two campuses in Jishou and Zhangjiajie cities,

with the main campus in Jishou City, the capital city of Xiangxi Autonomous Prefecture.

In 2003, the university was entitled the right to confer master’s degrees. In October 2006, the university

successfully passed the undergraduate education evaluation on regular institutions of higher learning

organized by the Ministry of Education with a comment of “Excellent”. The year of 2012 saw the

university rank among “universities of capacity construction project in mid-west”. At the same year, the

university was approved to carry out “Ph. D program catering for special demands of our country”.

The university covers an area of 1.29 million square meters with the total building area of 600,000 square

meters. Presently, the university has been equipped with various teaching and scientific researching

instruments and equipments with a total value of over RMB 170 million as well as a book and literature

collection of over 2.3million volumes. The university currently has over 1000 full-time teachers, of which

86% are provided with doctor’s or master’s degree.

At present, there are 70 undergraduate majors offered by the university, among which 3 are national

characteristic majors, 8 are provincial characteristic majors.8 are provincial key majors. The university is

now operating 1 Ph.D program catering for special demands of our county,14 first-grade disciplines for

master’ a degree, 1 professional master degree program and 1characteristic, advanced and key discipline,

covering 11 main disciplines. In addition, there are 14 provincial and ministerial level key research bases,1

national experimental teaching demonstration center,5 provincial practice teaching demonstration centers.

The students of various types total over 30,000, of which over 18,000 are full-time undergraduate students,

over 800 are graduate students. The number of undergraduates in the independent college is almost 8,000,

and that of adult diploma education students is over 7,000.

Over half a century, the university adheres to the educational philosophy of “Populace University”, regards

it as its own duty to serve for the regional economic and social development, fulfills irreplaceable

educational function in the west of Hunan and in the border area of Hunan, Hubei, Chongqing and

Guizhou provinces, forming distinguished schooling-running characteristics and being widely approved by

all sectors of the society.

http://www.jsu.edu.cn/

Page 4: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

4

Introduction to Central South University (CSU) Cover

Page 02

Introduction to Jishou University (JSU) Cover

Page 03

Final Program at a Glance Page 01

Quick Guide to Rooms for Keynote / Technical

Sessions Page 03

Welcome Messages Page 04

Keynote Speeches Page 13

Panel Discussions Page 17

Technical Sessions and Papers Page 19

Organizing and Program Committees Page 35

Introduction to School of Information Science and

Engineering, Central South University Page 48

Introduction to School of Software and Service

Outsourcing of Jishou University Page 49

Conference Venue Cover

Page 4

Sponsors, Organizers, and Publishers Cover

Page 5

TABLE OF CONTENTS

Page 5: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

1

FINAL PROGRAM OF ICA3PP 2015 AT A GLANCE

Important: ICA3PP 2015 attendees are also welcome to attend all keynote sessions/technical sessions/panel discussions of the co-located IEEE PRDC 2015 conference.

November 17 (Tuesday)

15:00-20:00 On-Site Registration

18:00-20:00 Reception @ Zhangjiajie International Hotel

November 18 (Wednesday)

On-Site Registration from 8:00 to 18:00

08:30-09:00 Opening Ceremony (Room 0)

09:00-09:45 Keynote 1: Prof. Wanlei Zhou, Senior Member of IEEE, Alfred Deakin Professor, Deakin University, Australia; Identifying Propagation Sources and Modeling Propagation

Dynamics in Networks (Room 0)

09:45-10:15 Coffee/Tea Break

10:15-12:30 T9A(Room0) T7A (Room3) DependSys-A(Room4) T6A(Room5) T5A(Room6) T4A(Room7) T3A(Room8) T1A(Room9)

12:30-14:00 Lunch @ Zhangjiajie International Hotel

14:00-16:00 T9B(Room0) T7B (Room3) DependSys-B(Room4) T6B(Room5) T5B(Room6) T4B(Room7) T3B(Room8) T1B(Room9)

16:00-16:15 Coffee/Tea Break

16:15-18:15 T9C(Room0) T7C (Room3) DependSys-C(Room4) T6C(Room5) T5C(Room6) T4C(Room7) T3C(Room8) T1C(Room9)

19:00-21:00 Dinner @ Zhangjiajie International Hotel

Page 6: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

2

November 19 (Thursday)

On-Site Registration from 8:00 to 18:00

08:30-09:15 Keynote 2: Prof. Jiannong Cao, Fellow of IEEE, Head and Professor at The Hong Kong Polytechnic University, Hong Kong; Design of Dis tributed Algorithms for

Engineering Applications of WSNs (Room 0)

09:15-11:15 Panel 2

(Room 0)

Panel 1

(Room 1) T7D(R3)

DependSys-D

(R4) T6D(R5) T5D(R6) T4D(R7) T8A(R8) T2A(R9)

11:15-11:30 Coffee/Tea Break

11:30-12:30 TrustData-A

(R0) TSP-A(R3) TSP-B(R4) TSP-C(R5) NOPE-A(R6) NOPE-B(R7) SCS-A(R8) SPPCN-A(R9)

12:30-14:00 Lunch @ Zhangjiajie International Hotel

14:00-16:00 T9D(R0) T3D(R3) DependSys-E

(R4) T7E(R5) T5E(R6) T4E(R7) T8B(R8) T2B(R9)

16:00-16:15 Coffee/Tea Break

16:15-18:15 T9E(R0) T3E(R3) T9F(R4) T7F(R5) T9G(R6) T9H(R7) T1D+T8C

(R8) SPPCN-B(R9)

19:00-21:00 Banquet @ Zhangjiajie International Hotel

November 20 (Friday)

On-Site Registration from 8:00 to 12:00

08:30-09:15 Keynote 3: Prof. John C.S . Lui, Fellow of ACM, Fellow of IEEE, The Chinese University of Hong Kong, Hong Kong; The Shapley Value: Its Use and Implications on

Internet Economics (Room 0, shared with PRDC 2015)

09:15-10:00 Keynote 4: Prof. Hai Jin, Senior Member of IEEE, Professor at Huazhong University of Science and Technology, China; In-Memory Computing: New Architecture for Big

Data Processing (Room 0)

10:00-10:30 Coffee/Tea Break

10:30-12:30 TrustData-B(Room 0) TSP-D(Room 3) (NOPE-C)+(T4F)

(Room4)

12:30-14:00 Lunch @ Zhangjiajie International Hotel, Closing of the Conference

Page 7: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

3

Quick Guide to Rooms for Keynote/Technical/Panel Sessions

Room Number Room Name Floor

Room 0 Grand Hall

(多功能厅) 2

Room 1 Guoyan Hall

(国宴厅) 2

Room 2 Xiangjiang Hall

(湘江厅) 2

Room 3 Lishui Hall

(澧水厅) 2

Room 4 Zijiang Hall

(资江厅) 2

Room 5 Yuanjiang Hall

(沅江厅) 2

Room 6 Business Center

(商务中心) 2

Room 7 Tianmen Shan

(天门山) 2

Room 8 Yangjiajie

(杨家界) 2

Room 9 Shi Li Hua Lang

(十里画廊) 2

Page 8: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

4

Welcome Messages from ICA3PP 2015 General Chairs

Welcome to the 15th International Conference on Algorithms and Architectures for Parallel Processing

(ICA3PP 2015), which is organized by Central South University, Hunan University, National University of

Defense Technology, and Jishou University.

It is our great pleasure to organize the ICA3PP 2015 conference in Zhangjiajie, China on 18-20 November

2015. On behalf of the organizing committee of the conference, we would like to express to all partic ipants

who will attend the conference, our cordial welcome and great gratitude.

ICA3PP 2015 is the 15th event in the series of conferences started in 1995 that is devoted to algorithms

and architectures for parallel processing. ICA3PP is now recognized as the main regular event in the world

that covers many dimensions of parallel algorithms and architectures, encompassing fundamental

theoretical approaches, practical experimental projects, and commercial components and systems. The

conference provides a forum for academics and practitioners from countries around the world to exchange

ideas for improving the efficiency, performance, reliability, security and interoperability of computing

systems and applications.

ICA3PP 2015 has attracted high-quality research papers which highlight the foundational work that strives

to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and

investigations that identify weaknesses in existing parallel processing technology.

ICA3PP 2015 consists of the main conference and six international symposia and workshops. Many

individuals have contributed to the success of the conference. We would like to express our special

appreciation to Prof. Yang Xiang, Prof. Andrzej Goscinski and Prof. Yi Pan, the Steering Committee Chairs,

for giving us the opportunity to host this prestigious conference and for their guidance on the conference

organization. Special thanks to the Program Chairs, Prof. Albert Zomaya, Prof. Gregorio Martinez and Prof.

Kenli Li, for their outstanding work on the technical program. Thanks also to the Workshop Chairs, Dr.

Mianxiong Dong, Dr. Ryan K. L. Ko and Dr. Md. Zakirul Alam Bhuiya, for their excellent work in

organizing attractive symposia and workshops. Thanks also to Publicity Chairs, Prof. Carlos Becker

Westphall, Dr. Yulei Wu, Prof. Christian Callegari, Prof. Kuan-Ching Li and Prof. James J. (Jong Hyuk)

Park, for the great job in publicizing this event for wide. We would like to give our thanks to all the

members of the Organizing Committee and Program Committee members and External Reviewers for their

efforts and support. We would also like to give our thanks to Keynote Speakers, Prof. John C.S. Lui, Prof.

Jiannong Cao, Prof. Wanlei Zhou and Prof. Hai J in, for offering insightful and enlightening talks. Last but

not least, we would like to thank all the authors who submitted their papers to the conference, and we hope

that you will be able to attend this wonderful event!

General Chairs

Guojun Wang, Central South University, China

Peter Mueller, IBM Zurich Research, Switzerland

Qingping Zhou, Jishou University, China

Page 9: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

5

Welcome Messages from ICA3PP 2015 Program Chairs

On behalf of the Program Committee of the 15th International Conference on Algorithms and

Architectures for Parallel Processing (ICA3PP 2015), we would like to welcome you to join the conference

in Zhangjiajie, China on 18-20 November, 2015.

The ICA3PP 2015 conference aims at bringing together researchers and practitioners in the world from

both academia and industry who are working on algorithms and architectures for parallel processing. The

conference will feature keynote speeches, panel discussions, technical presentations, symposiums and

workshops, where the technical presentations from both the research community and industry will cover

various aspects including fundamental theoretical approaches, practical experimental projects, and

commercial components and systems. ICA3PP 2015 is the next event in a series of highly successful

international conferences on algorithms and architectures for parallel processing, previously held as

ICA3PP-14 (Dalian, China, August 2014), ICA3PP-13 (Vietri sul Mare, Italy, December 2013),

ICA3PP-12 (Fukuoka, Japan, September 2012), ICA3PP-11 (Melbourne, Australia, October 2011),

ICA3PP-10 (Busan, Korea, May 2010), ICA3PP-09 (Taipei, Taiwan, June 2009), ICA3PP-08 (Cyprus,

June 2008), ICA3PP-07 (Hangzhou, China, June 2007), ICA3PP-05 (Melbourne, Australia, October

2005), ICA3PP-02 (Beijing, China, October 2002), ICA3PP-00 (Hong Kong, China, December 2000),

ICA3PP-97 (Melbourne, Australia, December 1997), ICA3PP-96 (Singapore, June 1996), and ICA3PP-95

(Brisbane, Australia, April 1995).

The ICA3PP 2015 conference collected research papers on the related research issues from all around the

world. This year we received 602 submissions for the main conference. All submissions received at least

three reviews from a high-quality review process. According to the review results, 219 papers are selected

for oral presentation at the conference, giving an acceptance rate of 36.4%.

We would like to offer our gratitude to Prof. Yang Xiang and Prof. Andrzej Goscinski from Deakin

University, Australia, and Prof. Yi Pan from Georgia State University, USA, the Steering Committee Chairs.

Our thanks also to the General Chairs, Prof. Guojun Wang from Central South University, China, Dr. Peter

Mueller from IBM Zurich Research, Switzerland, and Prof. Qingping Zhou from Jishou University, China,

for their great support and good suggestions to make the success of the final program. Special thanks to the

Workshop Chairs, Dr. Mianxiong Dong from Muroran Institute of Technology, Japan, and Dr. Ryan K. L.

Ko from the University of Waikato, New Zealand, and Dr. Md. Zakirul Alam Bhuiyan from Temple

University, USA. In particular, we would like to give our thanks to all researchers and practitioners who

submitted their manuscripts, and to the Program Committee and the external reviewers that contributed

their valuable time and expertise to provide professional reviews working under a very tight schedule.

Moreover, we are very grateful to our keynote speakers who have kindly accepted our invitation to give

insightful and prospective talks.

Finally, we sincerely hope that the conference will provide a very good opportunity for you to learn from

each other. Enjoy the conference, both technically and socially!

Program Chairs

Albert Zomaya, University of Sydney, Australia

Gregorio Martinez, University of Murcia, Spain

Kenli Li, Hunan University, China

Page 10: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

6

Welcome Messages from ICA3PP 2015 Workshop Chairs

Welcome to the 15th International Conference on Algorithms and Architectures for Parallel Processing

(ICA3PP 2015) in Zhangjiajie, China on 18-20 November 2015. The program of this year consists of 6

symposiums/workshops that cover a wide range of research topics on parallel processing technology:

(1) The Sixth International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)

(2) The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP

2015)

(3) The Third International Workshop on Network Optimization and Performance Evaluation (NOPE

2015)

(4) The Second International Symposium on Sensor-Cloud Systems (SCS 2015)

(5) The Second International Workshop on Security and Privacy Protection in Computer and Network

Systems (SPPCN 2015)

(6) The First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and

Applications

(DependSys 2015)

The aim of these symposiums/workshops is to provide a forum to bring together practitioners and

researchers from academia and industry for discussion and presentations on the current research and future

directions related to parallel processing technology. The themes and topics of these

symposiums/workshops are a valuable complement to the overall scope of ICA3PP 2015 and give

additional values and interests. We hope that all of the selected papers will have a good impact on future

research in the respective field.

The ICA3PP 2015 workshops collected research papers on the related research issues from all around the

world. This year we received 205 submissions for all workshops. All submissions received at least three

reviews from a high-quality review process. According to the review results, 77 papers are selected for oral

presentation at the conference, giving an acceptance rate of 37.6%.

We offer our sincere gratitude to the workshop organizers for their hard work on designing the call for

papers, assembling the program committee, managing the peer-review process for the selection of papers,

and planning the workshop program. We are grateful to the workshop program committees, external

reviewers, session chairs, contributing authors, and attendees. Our special thanks to the Organizing

Committees of ICA3PP 2015 for their strong support, and especially to the Program Chairs, Prof. Albert

Zomaya, Prof. Gregorio Martinez and Prof. Kenli Li, for their guidance.

Finally, we hope that you will find the symposiums and workshops interesting and stimulating, and also

enjoy the ICA3PP 2015 conference and the fantastic city of Zhangjiajie, China.

Workshop Chairs

Mianxiong Dong, Muroran Institute of Technology, Japan

Ryan K. L. Ko, The University of Waikato, New Zealand

Md. Zakirul Alam Bhuiyan, Temple University, USA

Page 11: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

7

Welcome Messages from TrustData 2015 Program Chairs

On behalf of the Program Committee of the 6th International Workshop on Trust, Security and Privacy for

Big Data (TrustData 2015), we would like to welcome you to join the conference in Zhangjiajie, China.

TrustData 2015 aims at bringing together people from both academia and industry to present their most

recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in

order to identify emerging research topics and define the future of Big Data.

TrustData 2015 is the next event in a series of highly successful international workshop on Trust, Security

and Privacy for Big Data (TrustData), previously held as TrustData-14 (Dalian, China, March 2012),

TrustData-13 (Zhangjiajie, China, November, 2013).

This international workshop collected research papers on the above research issues from all around the

world. Each paper was reviewed by at least three experts in the field. We feel very proud of the big number

of participation, and it has been difficult to collect the best papers from all the received, but at the end we

have defined an amazing conference that we hope, we can enjoy during the following days.

We would like to offer our gratitude to the General Chairs, Dr. Qin Liu and Dr. Muhammad Bashir

Abdullahi for their excellent support and invaluable suggestions to make the success of the final program.

In particular, we would like to thank all researchers and practitioners who submitted their manuscripts, and

thank the Program Committee members and the additional reviews for their tremendous efforts and timely

reviews.

We hope all of you enjoy TrustData 2015 and find that it will be a very good opportunity to learn from

each other and that your attendance will be most enjoyable and fruitful. Program Chairs

Keqin Li, State University of New York at New Paltz, USA

Avinash Srinivasan, Temple University, USA

Page 12: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

8

Welcome Messages from TSP 2015 Program Chairs

On behalf of the Program Committee of the 5th International Symposium on Trust, Security and Privacy

for Emerging Applications (TSP 2015), we would like to welcome you to join the conference in

Zhangjiajie, China.

The symposium focuses on trust, security, and privacy issues in social networks, cloud computing,

Internet of Things (IoT), wireless sensor networks, and other networking environments or system

applications; and provides a forum for them to present and discuss emerging ideas and trends in this highly

challenging research area. The aim of this symposium is to provide a leading edge forum to foster

interaction between researchers and developers with the trust, security, and privacy issues, and to give

attendees an opportunity to network with experts in this area.

Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, TSP-09 in Macau

SAR, China, during October 12-14, 2009, TSP-10 in Bradford, UK, during June 29-July 1, 2010, and

TSP-13 in Zhangjiajie, China, during November 13-15, 2013, the Fifth International Symposium on Trust,

Security and Privacy for Emerging Applications (TSP-15) will be held in Zhangjiajie, China, during

November 18-20, 2015, in conjunction with the 15th International Conference on Algorithms and

Architectures for Parallel Processing (ICA3PP 2015).

The symposium collected research papers on the above research issues from all around the world. Each

paper was reviewed by at least two experts in the field. We have defined an amazing symposium that we

hope, we can enjoy during the conference days.

We would like to thank all researchers and practitioners who submitted their manuscripts, and thank the

Program Committee members and the additional reviewers for their tremendous efforts and timely reviews.

We hope all of you enjoy TSP 2015 and find that it will be a very good opportunity to learn from each

other and that your attendance will be most enjoyable and fruitful.

Program Chairs

Imad Jawhar, United Arab Emirates University, UAE

Deqing Zou, Huazhong University of Science of Technology, China

Page 13: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

9

Welcome Messages from NOPE 2015 Program Chairs

Welcome to the 2015 International Workshop on Network Optimization and Performance Evaluation

(NOPE 2015) held in Zhangjiajie, China during November 18-20, 2015!

Network optimization and performance evaluation is a topic that attains a lot of attention in

network/Internet and distributed systems. Due to the recent advances in the Internet based applications as

well as WLANs, wireless home networks, and wireless sensor networks, wireless mesh networks, cloud

computing, we are witnessing a variety of new technologies. However, these systems and networks are

becoming very large and complex, and consuming large energy at the same time. System optimization and

performance evaluation remains to be resolved before these systems become a commodity.

On behalf of the organizing committee, we would like to take this opportunity to express our gratitude to

all reviewers who have been working hard to finish reviews on time. Thanks to the Publicity Chairs for

their efforts and support. Thanks also to all authors for your great support and contribution to the event. We

would like to give our special thanks to the organizing committee, colleagues and friends who have been

working behind-the-scenes. Without their unfailing cooperation, hard work and dedication, this event

would not be successfully organized.

We are grateful to all of you for participating in NOPE 2015, and we would like to encourage you to

explore the beautiful sight of Zhangjiajie during your stay and enjoy the conference.

Program Chair

Gaocai Wang, Guangxi University, China

Page 14: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

10

Welcome Messages from SCS 2015 Program Chairs

As the Program Chairs and on behalf of the Organizing Committee of the 2nd International Symposium on

Sensor-Cloud Systems (SCS 2015), we would like to express our cordial welcome and gratitude for all

participants that attend the symposium in Zhangjiajie, China, 18-20 November, 2015. This famous city is

the location of China’s first forest park (The Zhangjiajie National Forest Park) and a World Natural

Heritage site (Wulingyuan Scenic Area).

The aim of SCS 2015 is to bring together researchers and practitioners working on sensor-cloud systems

area to present and discuss emerging ideas and trends in this highly challenging research field. It has

attracted some high quality research papers which highlight the foundational work that strives to push

beyond limits of existing technologies, including experimental efforts, innovative systems, and

investigations that identify weaknesses in the existing technology services.

SCS 2015 is sponsored by National Natural Science Foundation of China, Springer, School of Information

Science and Engineering at Central South University, School of Software at Central South University,

organized by Central South University, Hunan University, National University of Defense Technology, and

Jishou University. SCS 2015 is in conjunction with the 15th International Conference Algorithms and

Architectures for Parallel Processing (ICA3PP 2015), which highlight the latest research trends in various

aspects of computer science and technology.

Many individuals have contributed to the success of this international symposium. We would like to

express our special appreciation to the General Chairs of main conference, Prof. Guojun Wang, Prof. Peter

Mueller and Prof. Qingping Zhou for giving us this opportunity to hold this symposium and for their

guidance on the organization. Thanks also to the General Chairs of this symposium, Prof. Jie Li and Prof.

Dongqing Xie, for their excellent work in organizing the symposium. We would like to give our thanks to

all the members of the Organizing Committee and Program Committee for their efforts and support.

Finally, we are grateful to the authors for submitting their fine work to SCS 2015 and all the participants

for their attendance. Hope you enjoy the conference as well as beautiful Zhangjiajie!

Program Chairs

Xiaofei Xing, Guangzhou University, China

Md. Zakirul Alam Bhuiyan, Central South University, China, and Temple University, USA

Page 15: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

11

Welcome Messages from SPPCN 2015 Program Chairs

On behalf of the Program Committee of the 2nd International Workshop on Security and Privacy

Protection in Computer and Network Systems (SPPCN 2015), we would like to welcome you to join the

workshop in Zhangjiajie, China.

The workshop focuses on security and privacy protection in computer and network systems, such as

authentication, access control, availability, integrity, privacy, confidentiality, dependability and

sustainability issues of computer and network systems. The aim of the workshop is to provide a leading

edge forum to foster interaction between researchers and developers with the security and privacy

protection in computer and network systems, and to give attendees an opportunity to network with experts

in this area.

SPPCN 2015 is the next event in a series of highly successful international conferences on security and

privacy protection in computer and network systems, previously held as SPPCN-15 (Dalian, China,

December 2015). The workshop collected research papers on the above research issues from all around the

world. Each paper was reviewed by at least two experts in the field.

We would like to offer our gratitude to the General Chair, Prof. Jian Weng, for their excellent support to

make the success of the final program. In particular, we would like to thank all researchers and

practitioners who submitted their manuscripts, and thank the Program Committee members and the

additional reviews for their tremendous efforts and timely reviews.

We hope all of you enjoy SPPCN 2015 and find that it will be a very good opportunity to learn from each

other and that your attendance will be most enjoyable and fruitful.

Program Chairs

Mianxiong Dong, Muroran Institute of Technology, Japan

Hua Guo, Beihang University, China

Tieming Cheng, Zhejiang University of Technology, China

Kaimin Wei, Jinan University, China

Page 16: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

12

Welcome Messages from DependSys 2015 Program Chairs

As the Program Chairs and on behalf of the Organizing Committee of the First International Symposium

on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys2015), we would

like to express our cordial welcome and gratitude to all the participants attending the international

symposium in Zhangjiajie, China during18-20 November, 2015. This famous city is the location of China’s

first forest park (The Zhangjiajie National Forest Park) and a World Natural Heritage site (Wulingyuan

Scenic Area).

DependSys 2015 is a timely event that targets bringing together new ideas, techniques, and solutions for

dependability and its issues in sensor, cloud, and big data systems and applications. As we are deep into the

Information Age, we witness the explosive growth of data available on the Internet. Human beings are

producing quintillion bytes of data every day, which come from sensors, individual archives, social

networks, Internet of Things, enterprises and Internet in all scales and formats. One of the most

challenging issues we face is to achieve the designed system performance to an expected level, i.e., how to

effectively provide dependability in sensor, cloud and big data systems. These systems need to typically

run continuously, which often tend to become inert, brittle, and vulnerable after a while.

This international symposium collected research papers on the above research issues from all around the

world. Though it is the first event of DependSys, we received a large number of submissions in response to

the call for papers. We had a large program body and each paper was reviewed by at least three experts in

the field. After detailed discussions among the Program Chairs and General Chairs, a set of quality papers

was finally accepted. We feel very proud of the big number of participations, and it has been difficult to

collect the best papers from all the received submissions, but at the end we have defined an amazing

symposium that we hope, we can enjoy during the following days.

Many individuals have contributed to the success of this high caliber international symposium. We would

like to express our special appreciation to the Steering Chairs, Prof. Jie Wu and Prof. Guojun Wang for

giving us this opportunity to hold this symposium and for their guidance on the symposium organization.

In particular, we would like to give our thanks to the Symposium Chairs, Prof. Mohammed Atiquzzaman,

Prof. Sheikh Iqbal Ahamed, and Dr. Md Zakirul Alam Bhuiyan for their excellent support and invaluable

suggestions to make the final program a success. Thanks to all the Program Committee members and the

additional reviewers for their tremendous efforts and timely reviews.

We hope all of you would enjoy DependSys 2015 and find that it will be a very good opportunity to learn

from each other and that your attendance will be most enjoyable and fruitful.

Program Chairs

Latifur Khan, The University of Texas at Dallas, USA

Joarder Kamruzzaman, Federation University and Monash University, Australia

Al-Sakib Khan Pathan, Islamic University in Madinah, Kingdom of Saudi Arabia

Page 17: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

13

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 1: Identifying Propagation Sources and Modeling

Propagation Dynamics in Networks

Speaker: Prof. Wanlei Zhou, Senior Member of IEEE, Alfred Deakin Professor, Deakin University, Australia

Chair: Dr. Peter Mueller, IBM Zurich Research, Switzerland 09:00-09:45, November 18, 2015 (Wednesday)

About the Keynote Speaker

Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the

highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and

Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international

conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.

Summary:

It has long been a significant but difficult problem to identify propagation sources and model

propagation dynamics based on limited knowledge of network structures and the varying states of network nodes. Real cases of identifying propagation sources and modeling propagation dynamics include finding the spreader of malware and propagation process in computer networks, and locating the sources of rumours and propagation dynamics of rumours and truths in online social networks. This talk reviews the state-of-the art in source identification techniques, and discusses the pros and cons of current methods in this field. In order to gain a quantitative understanding of current methods, we provide a series of experiments and comparisons based on various environment settings. We then present our work in modelling the propagation of scanning worms, online social network worms, as well as rumours and truths in online social networks.

Page 18: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

14

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 2: Design of Distributed Algorithms for Engineering Applications of WSNs

Speaker: Prof. Jiannong Cao, Fellow of IEEE, Head and Professor at The Hong Kong Polytechnic

University, Hong Kong Chair: Prof. Weijia Jia, Shanghai Jiao Tong University, China

08:30-09:15, November 19, 2015 (Thursday)

About the Keynote Speaker Jiannong Cao is currently a chair professor and head of the Department of Computing at Hong Kong Polytechnic University, Hung Hom, Hong Kong. His research interests include parallel and distributed computing, computer networks, mobile and pervasive computing, fault tolerance, and middleware. He has co-authored 3 books, co-edited 9 books, and published over 300 papers in major international journals and conference proceedings. He is a fellow of IEEE, a senior member of China Computer Federation, and a member of ACM. He was the Chair of the Technical Committee on Distributed Computing of IEEE Computer Society from 2012 - 2014. Dr. Cao

has served as an associate editor and a member of the editorial boards of many international journals, including ACM Transactions on Sensor Networks, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Networks, Pervasive and Mobile Computing Journal, and Peer-to-Peer Networking and Applications. He has also served as a chair and member of organizing / program committees for many international conferences, including PERCOM, INFOCOM, ICDCS, IPDPS, ICPP, RTSS, DSN, ICNP, SRDS, MASS, PRDC, ICC, GLOBECOM, and WCNC. Dr. Cao received the BSc degree in computer science from Nanjing University, Nanjing, China, and the MSc and the Ph.D degrees in computer science from Washington State University, Pullman, WA, USA.

Summary:

As technology advances, applications of wireless sensor networks (WSNs) have been extended from traditional habitat monitoring, air pollution monitoring, etc., to more domain-specific engineering areas such as structural health monitoring (SHM) and volcano tomography. However, how to implement the sophisticated models and algorithms of these engineering applications within a resource-limited WSN becomes the main roadblock. This task is difficult because these

algorithms are not only computationally intensive, but also involve data-level collaboration of multiple sensors. Data-level collaboration refers to that data collected from different sensors are tightly coupled in the computation process.In this presentation, using some typical engineering applications such as SHM, smart grid and volcanic tomography, I will discuss the issues and techniques of designing distributed, light-weight version of these engineering computation algorithms. The distributed algorithms should be able to optimize some pre-defined performance criteria (e.g. communication cost and time-to-completion) under severe resource constraints and various uncertainties in the system. I will describe frameworks for decomposing some typical sophisticated and centralized signal processing algorithms and computation tasks within a large scale WSN with guaranteed accuracy and optimized performance. Research in this direction will

provide the foundation for extending the capability of WSNs to more engineering application domains.

Page 19: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

15

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 3: The Shapley Value: Its Use and Implications on Internet Economics

Speaker: Prof. John C.S. Lui, Fellow of ACM, Fellow of IEEE, The Chinese University of Hong Kong, Hong Kong

Chair: Prof. Dong Xiang, Tsinghua University, China 08:30-09:15, November 20, 2015 (Friday)

About the Keynote Speaker John C.S. Lui is currently the Choh-Ming Li Chair Professor at the Chinese University of Hong Kong. He is a fellow of ACM, fellow of IEEE

and the senior research fellow of the Croucher Foundation. His research interests are in network science, Internet, network/system security, network economics and performance evaluation theory.

Summary:

Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize its profit. Peering agreements based on local views and bilateral settlements, while expedient, encourage selfish routing strategies and discriminatory interconnections. From a more global perspective, such settlements reduce aggregate profits, limit the stability of routes, and discourage potentially useful peering/connectivity arrangements, thereby unnecessarily balkanizing the Internet. We show that

if the distribution of profits is enforced at a global level, then there exist profit -sharing mechanisms derived from the coalition games concept of Shapley value and its extensions that will encourage these selfish ISPs who seek to maximize their own profits to converge to a Nash equilibrium. We show that these profit sharing schemes exhibit several fairness properties that support the argument that this distribution of profits is desirable. In addition, at the Nash equilibrium point, the routing and connecting/peering strategies maximize aggregate network profits, encourage ISP connectivity so as to limit balkanization.

Page 20: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

16

The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Keynote 4: In-Memory Computing: New Architecture for Big Data Processing

Speaker: Prof. Hai Jin, Senior Member of IEEE, Professor at Huazhong University of Science and Technology, China

Chair: Prof. Lei Shu, Guangdong University of Petrochemical University, China 09:15-10:00, November 20, 2015 (Friday)

About the Keynote Speaker Hai Jin is a Cheung Kung Scholars Chair Professor of computer science and engineering at Huazhong University of Science and Technology

(HUST) in China. Jin received his PhD in computer engineering from HUST in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security.Jin is

a senior member of the IEEE and a member of the ACM. He has co-authored 15 books and published over 600 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer -to-peer computing, network storage, and network security.

Summary:

With emerging of big data, the processing speed for the data is one of the key issues for big data technology. One of the efficient ways to handle the velocity of data is putting all the data in the memory. But traditional memory, DRAM, consumes a large amount of energy and cost to build a large memory system. In recent years, lots of non-volatile memory devices, such as phase change memory (PCM), are studied to be part of memory. We call it the storage class memory (SCM). Combing traditional memory and SCM together to build a large hybrid memory space is becoming one of the energy-efficient ways to extend the traditional in-memory computing system into a new level, to handle large quality of data in real time. In this talk, we will discuss this new in-memory computing system from different aspects and some challenges in this new system. We

will also report some ongoing effort in China to build this hybrid memory-based in-memory computing system, and some latest advances in this area.

Page 21: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

17

Panel 1: Open Dependability Issues in Cloud and Big Data Systems

09:15-11:15, November 19, 2015 (Thursday), Room 1

Computer systems (e.g., digital sensors, networks, and smart devices) are now available anytime,

anywhere, by different means, and are distributed unobtrusively throughout everyday environments in

which physical objects/artifacts embedded with invisible computers are sensible and networked locally and

globally. The rapid development of the computer systems with their extensive use is leading to the creation

of huge collections of data, and coins the term Big Data. Big Data is characterized by the integration of a

signif icant amount of data, of varying modalities or types, at a pace that cannot be handled by traditional

data management systems. Since huge amounts of data in unstructured and semi-structured forms are being

generated from various sources, new systems, frameworks and methodologies are being designed and

developed for data management and data analytics. Although tremendous efforts are being given to these

big systems, there is no doubt that they must be “dependable.”

In the last few years, cloud computing has grown from being a promising business concept to one of the

fastest growing segments of the IT industry. Cloud computing enables computing systems/resources to be

provided as IT services in a pay-as-you-go fashion. The services can be achieved with high efficiency and

effectiveness only if the systems are ‘dependable.’ Among various circumstances, dependability can be

affected by the open environment with very limited user-side control in Cloud. As a result, “dependability”

is going to be one of most concerned issues for Cloud computing. It is also a great challenge for Big Data

together with Cloud. Future systems need to close the dependability gap in face of challenges in different

circumstances. The emphasis will be on differing properties of such services, e.g., continuity, effective

performance, real-time responsiveness, ability to overcome data fault/corruption/anomaly, ability to avoid

failures, prevention of deliberate privacy intrusions, reliability/availability/adaptability/security/safety, and

so on. While information society, commercial and scientific companies, and industries share the need for

massive throughput, “dependability” of service becomes a big concern.

The aim of this panel discussion is to discuss various aspects and open ideas, explore key open issues, and

investigate technology enablers to motivate future research of dependability in Big Data and Cloud

computing.

Panelists:

Prof. Takashi Nanya, Canon, Japan

Prof. Jemal Abawajy, Deakin University, Australia

Prof. Weijia Jia, Shanghai Jiao Tong University, China

Prof. Yennun Huang, Academia Sinica, Taiwan

A/Prof. Jinjun Chen, University of Technology, Sydney, Australia

Chairs:

Prof. Guojun Wang, Central South University, China

Prof. Tatsuhiro Tsuchiya, Osaka University, Japan

Dr. Md Zakirul Alam Bhuiyan, Temple University, USA

Page 22: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

18

Panel 2: Training Innovative Talents with Cooperation of Industry, Academics

and Research, 09:15-11:15, November 19, 2015 (Thursday), Room 0

"Transformation and Innovation" is one of the main themes of social developments in China. In May 2015,

the State Council announced the "Made in China 2025" concept, which indicates that information industry

and traditional manufacturing industry will be deeply integrated to make breakthroughs in some key fields ;

new model and new format will be derived. Nowadays, the opportunities for entrepreneurship and

innovation are being open to most people other than only a few individuals. The industry, university,

research and application interaction with cooperation of industry, academics and research communities is

becoming an important form of the development of science and technology innovation. Participation and

collaboration of multiple innovation subjects is one of the important factors that lead to the success of

innovation. In this background, higher education in China emphasizes students' spirit of innovation and

practical abilities, and it is committed to train innovative talents of science and technology. Due to the

traditional education model which emphasizes examination-oriented education, there is a sharp lack of

high-quality talents who meet the requirements of the scientific frontier and high-level industrial

innovation. The situation becomes more serious in the fields of top-notch science and technology. With the

continuously increasing requirements of the economic and social developments on the innovative talents

and the continuous deepening of the education reform, some key issues including the integration of

educational resources, the optimization of training mode, and other deep-rooted contradictions are

becoming more serious. Therefore, it is urgent to resolve contradictions, exploit new methodologies,

innovate new technologies, and promote the cooperation of science, technology and education, so as to

build a new system of training high-level and innovative talents. The forum invites distinguished

professors from well-known universities in China and overseas, and elites officials from enterprises and

governments, to discuss these problems together. We are looking forward to the participation of more

experts, scholars and personages of various fields. Let us brainstorm for better thoughts and feasible

solutions.

Panelists:

Prof. Zhiying Wang, National University of Defense Technology, China

Prof. Dafang Zhang, Hunan University, China

Prof. Keqiu Li, Dalian University of Technology, China

Prof. Yang Xiang, Deakin University, Australia

Prof. Lei Shu, Guangdong University of Petrochemical University, China

Chairs:

Prof. Guojun Wang, Central South University, China

Prof. Kenli Li, Hunan University, China

Prof. Jianquan Ouyang, Xiangtan University, China

Page 23: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

19

A. SESSIONS AND PAPERS IN ICA3PP 2015

The 15th International Conference on Algorithms and Architectures for Parallel Processing

( ICA3PP 2015)

Track 1: Parallel and Distributed Architectures Session T1A: 10:15-12:30, November 18 (Wednesday), Room 9

Chair: Wenying Yang, Foshan University, China Parallelizing Block Cryptography Algorithms on Speculative Multicores

Yaobin Wang, Hong An, Zhiqin Liu, Lei Zhang, and Qingfeng Wang

Performance Characterization and Optimization for Intel Xeon Phi Coprocessor Cheng Zhang, Li Liu, Ruizhe Li, and Guangwen Yang

EH-Code: An Extended MDS Code to Improve Single Write Performance of Disk Arrays for Correcting Triple Disk

Failures

Yanbing Jiang, Chentao Wu, Jie Li, and Minyi Guo

A Distributed Location-based Service Discovery Protocol for Vehicular Ad-Hoc Networks Chang Liu, Juan Luo, and Qiu Pan

Unified Virtual Memory Support for Deep CNN Accelerator on SoC FPGA

Tao Xiao, Yuran Qiao, Junzhong Shen, Qianming Yang, and Mei Wen

DaSS: Dynamic Time Slice Scheduler for Virtual Machine Monitor

Ruhui Ma, Jian Li, Liwei Lin, and Haibing Guan

Session T1B: 14:00-16:00, November 18 (Wednesday), Room 9

Chair: Wenjuan Tang, Central South University, China Memory-Aware NoC Application Mapping Based on Adaptive Genetic Algorithm

Yizhuo Wang, Zhibiao Zhang, Lifu Huang, and Weixing Ji

A Study on Non-Volatile 3D Stacked Memory for Big Data Applications

Cheng Qian, Libo Huang, Peng Xie, Nong Xiao, and Zhiying Wang Parallel Implementation of Dense Optical Flow Computation on Many -Core Processor

Wenjie Chen, Jin Yu, Weihua Zhang, Linhua Jiang, Guanhua Zhang, and Zhilei Chai

A Power-Conserving Online Scheduling Scheme for Video Streaming Services

Yunyun Jiang, Tian Xiao, Jidong Zhai, Ying Zhao, and Wenguang Chen

Prevent Deadlock and Remove Blocking for Self-Timed Systems Edwin H.-M. Sha, Weiwen Jiang, Qingfeng Zhuge, Xianzhang Chen, and Lei Yang

Session T1C: 16:15-18:15, November 18 (Wednesday), Room 9

Chair: Zhuzhong Qian, Nanjing University, China Improving the Memory Efficiency of In-memory MapReduce based HPC Systems

Cheng Pei, Xuanhua Shi, and Hai Jin

DBFS: Dual Best-First Search Mapping Algorithm for Shared-Cache Multicore Processors Thomas Canhao Xu and Ville Leppanen

HVCRouter: Energy Efficient Network-on-Chip Router with Heterogeneous Virtual Channels

Ji Wu, Xiangke Liao, Dezun Dong, Li Wang, and Cunlu Li

Availability and Network-aware MapReduce Task Scheduling over the Internet

Bing Tang, Qi Xie, Haiwu He, and Gilles Fedak OptRS: An Optimized Algorithm Based on CRS Codes in Big Data Storage Systems

Chao Yin, Jianzong Wang, Haitao Lv, Zongmin Cui, Lianglun Cheng,Qin Zhan, and Tongfang Li

Session T1D: 16:15-18:15, November 19 (Thursday), Room 8

Chair: Qin Liu, Hunan University, China Quantum Computer Simulation on Multi-GPU Incorporating Data Locality

Pei Zhang, Jiabin Yuan, and Xiangwen Lu Query Execution Optimization Based on Incremental Update in Database Distributed Middleware

Wei Ye, Mei Wang, and Jiajin Le

*Optimizing the Deployment of Virtual Machine Image Replicas in Cloud Storage Clusters

Page 24: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

20

Cong Xu, Jiahai Yang, Jianping Weng, Ye Wang and Hui Yu

*Hardware Support for Message-passing in Chip Multi-Processors

Yanhua Li, Youhui Zhang, Cihang Jiang and Weimin Zheng

Track 2:Software Systems and Programming Models Session T2A: 09:15-11:15, November 19 (Thursday), Room 9

Chair: Phillip M. Dickens, University of Maine, Orono, Maine FT-Offload: A Scalable Fault-Tolerance Programing Model on MIC Cluster

Cheng Chen, Yunfei Du, Zhen Xu, and Canqun Yang

MC-RAIS: Multi-Chunk Redundant Array of Independent SSDs with Improved Performance

Suzhen Wuz, Weijian Yangz, Bo Maoy , and Yanping Linz An Energy Efficient Storage System for Astronomical Observation Data on Dome A

Zichao Yuan, Ce Yu, Jizhou Sun, Jian Xiao, Jianmei Wang, Zhaohui Shang, and Yi Hu

Parallel Aware Hybrid Solid-State Storage

Dan He, Fang Wang, Dan Feng, Jingning Liu, Yunxiang Wu, Ying He, and Yang Hu

Automatic Optimization of Software Transactional Memory through Linear Regression and Decision Tree Yang Xiao, Zhen Li, Ehsan Atoofian, and Ali Jannesari

A Data-centric Tool to Improve the Performance of Multithreaded Program on NUMA

Dan Zeng, Liang Zhu, Xiaofei Liao, and Hai Jin

Session T2B: 14:00-16:00, November 19 (Thursday), Room 9

Chair: Sancheng Peng, Zhaoqing University, China A Light-weight Hot Data Identi cation Scheme via Grouping-based LRU Lists

Biaobiao Shen, Yongkun Li, Yinlong Xu, and Yubiao Pan

iPLAR: Towards Interactive Programming with Parallel Linear Algebra in R

Zhaokang Wang, Shiqing Fan, Rong Gu, Chunfeng Yuan, and Yihua Huang

Enhancing I/O Scheduler Performance by Exploiting Internal Parallelism of SSDs

Jiayang Guo, Yimin Huz, and Bo Mao A Performance and Scalability Analysis of the MPI Based Tools Utilized in a Large Ice Sheet Model

Executing in a Multicore Environment

Phillip Dickens

*Kernel Mechanisms for Turning a 3D MMOG From Single to Multi-Server Architecture

Mei-Ling Chinag, Ching-Chung Tseng, Yen-Chu Chang, Shu-Chun Chao and Han Wang *Top-k Keyword Search with Recursive Semantics in Relational Databases

Dingjia Liu and Guohua Liu

Track 3: Distributed and Network-based Computing Session T3A: 10:15-12:30, November 18 (Wednesday), Room 8

Chair: Xiaoyu Zhu, Central South University, China Coding-based Cooperative Caching in Data Broadcast Environments

Houling Ji, Victor C.S. Lee, Chi-Yin Chow, Kai Liu, and Guoqing Wu

Usage History-directed Power Management for Smartphones Xianfeng Li, Wen Wen, and Xigui Wang

Application Streaming: A Mobile Application Distribution Method

Wang Yang, Lei Jia, and Guojun Wang

A Clustering Algorithm Based on Rough Sets for the Recommendation Domain in Trust -Based Access Control

Bin Zhao, Jingsha He, Xinggang Xuan, Yixuan Zhang, and Na Huang QoE based Spectrum Allocation Optimization using Bees Algorithm in Cognitive Radio Networks

Wenjuan Lu, Zizhong Quan, Quan Liu, Duzhong Zhang, and Wenjun Xu

Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms

Jiangtao Zhang, Shi Chen, Hejiao Huang, Xuan Wang, and Dingzhu Du

Session T3B: 14:00-16:00, November 18 (Wednesday), Room 8

Chair: Wei Zhou, Hunan Agricultural University, China A Service Industry Perspective on Software Defined Radio Access Networks

Casimer DeCusatis and Ioannis Papapanagiotou

An Approach to Rapid Worker Discovery in Software Crowdsourcing

Feiya Song, Haopeng Chen, and Ying Fu

STWM: A Solution to Self-adaptive Task-worker Matching in Software Crowdsourcing

Page 25: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

21

Ying Fu, Haopeng Chen, and Feiya Song

GroupDRM: Group-based Dynamic Resource Management Model in Wireless Network

Zhipeng Tan, Jie Cui, Dan Feng, and Wei Zhou ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications

Jiaqi Liu, Guojun Wang, Deng Li, and Hui Liu

Session T3C: 16:15-18:15, November 18 (Wednesday), Room 8

Chair: Qian Li, Xi’an Jiao Tong University, China Energy Efficient Sleep Scheduling for Wireless Sensor Networks

Paul Chiedozie Uzoh, Jilong Li, Zhenbo Cao, Jinbae Kim, Aamir Nadeem, and Kijun Han QoS Prediction in Dynamic Web Services with Asymmetric Correlation

Qi Xie, Bing Tang, Zibin Zheng, and Mengtian Cui

A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data

Huigui Rong, Liang Gong, Zheng Qin, Yupeng Hu, and Chunhua Hu

A General Methodology to Design Deadlock-free Routing Algorithms for Mesh Networks Zhigang Yu, Xinyu Wang, Kele Shen, and Haikuo Liu

Completion Time-aware Flow Scheduling in Heterogenous Networks

Shiming He, Kun Xie, and Dafang Zhang

Towards VM Power Metering: A Decision Tree Method and Evaluations

Chonglin Gu, Shuai Shi, Pengzhou Shi, Hejiao Huang, and Xiaohua Jia

Session T3D: 14:00-16:00, November 19 (Thursday), Room 3

Chair: Kai Liu, Chongqing University, China A Dynamic State Estimation of Power System Harmonics using Distributed Related Kalman Filter

Wei Sun, Chanjuan Zhao, Jianping Wang, Chenghui Zhu, Daoming Mu, Liangfeng Chen, Jie Li, and Qiyue Li

An Efficient Cluster-based Data Sharing Algorithm for Bidirectional Road Scenario in Vehicular Ad-hoc Networks

Junhua Wang, Kai Liu, Edwin H.M. Sha, Victor C.S. Lee, and Sang H.Son A Distributed Joint Cooperative Routing and Channel Assignment in Multi-radio Wireless Mesh Network

Hong Qiao, Dafang Zhang, Kun Xie, Ji Zhang, and Shiming He

Improved Approximating Algorithms for Computing Energy Constrained Minimum Cost Steiner Trees

Nianchen Zou and Longkun Guo

A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud Congyang Chen, Jianxun Liu, Yiping Wen, Jinjun Chen, and Dong Zhou

A Metadata Management Strategy Based on Event-classification in Intelligent Transportation System

Session T3E: 16:15-18:15, November 19 (Thursday), Room 3

Chair: Sivadon Chaisiri, The University of Waikato, New Zealand *Communication-aware Virtual Machine Migration in Cloud Data Centers

Wenxin Li, Heng Qi, Keqiu Li, Xiaoyi Tao and Xinhua Ji

*An adaptive hybrid ARQ method for coexistence of ZigBee and WiFi

Quan Liu, Xiaorui Li, Zizhong Quan, Duzhong Zhang, Wenjun Xu

*Detecting Spammers using Review Graph

Zhixiang He, Chonglin Gu, Shi Chen, Hejiao Huang and Xiaohua Jia *A Service Industry Perspective on Software Defined Radio Access Networks

Casimer Decusatis and Ioannis Papapanagiotou

*Area Coverage estimation Model for Directional Sensor Networks

Zhimin Liu, Weijia Jia, Guojun Wang

*A Sprouting Graph based Approach to Analyzing Timed Workflow Processes with Shared Resources Yanhua Du, Ruyue Li and Benyuan Yang

Track 4 : Big Data and its Applications Session T4A: 10:15-12:30, November 18 (Wednesday), Room 7

Chair: Yang Wei, Nankai University, China PAHDFS: Preference-Aware HDFS for Hybrid Storage

Wei Zhou, Dan Feng, Zhipeng Tan, Yingfei Zheng

Urban Traffic Congestion Prediction Using Floating Car Trajectory Data

Qiuyuan Yang, Jinzhong Wang, Ximeng Song, Xiangjie Kong, Zhenzhen Xu, and Benshi Zhang A Metadata Cooperative Caching Architecture Based on SSD and DRAM for File Systems

Zhisheng Huo, Limin Xiao, Qiaoling Zhong, Shupan Li, Ang Li, Li Ruan, Shouxin Wang, and Lihong Fu

Page 26: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

22

Parallel Training GBRT Based on KMeans Histogram Approximation for Big Data

Rong Gu, Lei Jin, Yongwei Wu, Jingying Qu, Tao Wang, Xiaojun Wang, Chunfeng Yuan, and Yihua Huang

DBSCAN-M: An Intelligent Clustering Algorithm based on Mutual Reinforcement Yin Li, Chuyuan Guo, Ronghua Shi, Xiaoqun Liu, and Yan Mei

An Effective Method for Gender Classification with Convolutional Neural Networks

Hao Zhang, Qing Zhu and Xiaoqi Jia

Session T4B: 14:00-16:00, November 18 (Wednesday), Room 7

Chair: Wenying Yang, Foshan University, China AQUAdex: A Highly Efficient Indexing and Retrieving Method for Astronomical Big Data of Time Series Images

Zhi Hong, Ce Yu, Ruolei Xia, Jian Xiao, Jie Wang, Jizhou Sun, and Chenzhou Cui

SAKMA: Specialized FPGA-based Accelerator Architecture for Data-Intensive K-Means Algorithms

Fahui Jia, Chao Wang, Xi Li, and Xuehai Zhou

HDCat: Effectively Identifying Hot Data in Large-scale I/O Streams with Enhanced Temporal Locality

Jiahao Chen, Yuhui Deng, and Zhan Huang LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data

Debin Jia, Zhengwei Liu, Xiaoyan Gu, Bo Li, Jingzi Gu, Weiping Wang, and Dan Meng

Enhancing Parallel Data Loading for Large Scale Scientific Database

Hui Li, Hongyuan Li, Mei Chen, Zhenyu Dai, Ming Zhu,and Menglin Huang

Session T4C: 16:15-18:15, November 18 (Wednesday), Room 7

Chair: Yinglong Dai, Central South University, China A MapReduce Reinforced Distributed Sequential Pattern Mining Algorithm

Xiao Yu, Jin Liu, Xiao Liu, Chuanxiang Ma,and Bin Li

SHDC: A Fast Documents Classification Method Based on Simhash

Liang Gu, Peng Yang,and Yongqiang Dong

Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU Fei Peng, Yin Zhu, and Min Long

Feature Selection Method Based on Feature’s Classification Bias and Performance

Jun Wang, Jinmao Wei, and Lu Zhang

Enriching Document Representation with the Deviations of Word Co-occurrence Frequencies

Yang Wei, Jinmao Wei, and Zhenglu Yang

Session T4D: 09:15-11:15, November 19 (Thursday), Room 7

Chair: Rob Cameron, Simon Fraser University, Canada Big Data Analytics and Visualization with Spatio-Temporal Correlations for Traffic Accidents

Xiaoliang Fan, Baoqin He, Cheng Wang, Jonathan Li, Ming Cheng, Huaqiang Huang1,and Xiao Liu

A Novel APP Recommendation Method Based on SVD and Social Influence

Qiudang Wang, Xiao Liu, Shasha Zhang, Yuanchun Jiang, Fei Du, Yading Yue, Yu Liang SHB+-Tree: A Segmentation Hybrid Index Structure for Temporal Data

Mei Wang, Meng Xiao

Fusion-Cache: A Refactored Content-Aware Host-Side SSD Cache

Xian Chen, Wenzhi Chen,and Zhongyong Lu

A Novel Storing and Accessing Method of Traffic Incident Video Based on Spatial-temporal Analysis Yaying Zhang, Yinyin Zhu

Session T4E: 14:00-16:00, November 19 (Thursday), Room 7

Chair: Yuanfang Chen, Institut Mines-Telecom, Telecom SudParis, France Arbitrary-length Jacket-Haar Transforms

Guibo Liu, Geli Lv, Dayong Luo, Ying Guo, and Moonho Lee

Circulant Euler-Jacket Transform and Its Applications Based on Fast Algorithm Yang Zhang, Geli Lv, Guibo Liu, and Ying Guo

*A Locality Constrained Self-Representation Approach for Unsupervised Feature Selection

Cuihua Wang, Shuyi Ma, Chao Bi, Hui Sun, Yugen Yi

*Package Balancing K-means Algorithm for Physical Distribution

Yinglong Dai, Wang Yang and Guojun Wang *U-Search: Usage-based Search with Collective Intelligence

Pengfei Yin, Guojun Wang and Wenjun Jiang

*A Collaborative Filtering Recommendation Method based on TagIEA Expert Degree Model

Weimin Li, Bin Wang, Jianbo Zou and Jinfang Sheng

Page 27: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

23

Session T4F: 10:30-12:30, November 20 (Friday), Room 4

Chair: Gaocai Wang, Guangxi University, China Tradeoff between the Price of Distributing a Database and Its Collusion Resistance Based

On Concatenated Codes Thach V. Bui, Thuc D. Nguyen, Noboru Sonehara, and Isao Echizen

Track 5 : Parallel and Distributed Algorithms Session T5A: 10:15-12:30, November 18 (Wednesday), Room 6

Chair: Wei Zhou, Hunan Agricultural University, China Deadline-oriented Task Scheduling for MapReduce Environments

Minghao Hu, Changjian Wang, Pengfei You, Zhen Huang, and Yuxing Peng

Bitwise Data Parallelism with LLVM: The ICgrep Case Study Robert D. Cameron, Nigel Medforth, Dan Lin, Dale Denis, and William N. Sumner

Parallel Bloom Filter on Xeon Phi Many-Core Processors

Sheng Ni, Rentong Guo, Xiaofei Liao, and Hai Jin

A List Scheduling Algorithm for DAG-Based Parallel Computing Models

Hao Fu, Ce Yu, Jizhou Sun, Mengmeng Wang, and Jun Du Parallel Computing Method for HRV Time-domain Based on GPU

Jie Wang, Weihao Chen, and Gang Hou

Accelerated Steiner Tree Problem Solving on GPU with CUD

Christian Mathieu and Matthias Klusch

Session T5B: 14:00-16:00, November 18 (Wednesday), Room 6

Chair: Feng Wang, Central South University, China Self-Timed Periodic Scheduling of Data-Dependent Tasks in Embedded Streaming Applications

Xuan Khanh Do, Amira Dkhil, and Stéphane Louise

A Novel Concurrent Generalized Deadlock Detection Algorithm in Distributed Systems

Wei Lu1, Yong Yang, Liqiang Wang, Weiwei Xing, and Xiaoping Che

BiTEM: A Two-Tier Energy Efficient Resource Management Framework for Real-Time Tasks in Clusters Wei Huang, Jin Shi, Zhen Wang, Zhuzhong Qian

Multitask Oriented GPU Resource Sharing and Virtualization in Cloud Environment

Xingfang Zhao, Yujie Zhang, Bing Su

Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration

Huanle Xu, Ronghai Yang, Zhibo Yang, and Wing Cheong Lau

Session T5C: 16:15-18:15, November 18 (Wednesday), Room 6

Chair: Lei Zhou, Central South University, China A Dynamic Extension and Data Migration Method Based on PVFS

Xiaoyu Zhang, Jie Tang, Heng Gao, and Gangshan Wu

Fast 3-Point Correlation Function Approximation on GPU

Chao Sun, Mujin Yang, Ce Yu, and Jizhou Sun Efficient Scheduling with Intensive In-Memory File Accesses Considering Bandwidth Constraint on Memory Bus

Lin Wu, Qingfeng Zhuge, Edwin H.-M Sha, and Zhilong Sun

GPU-Accelerated Algorithm for Fast Computation of Biomolecular Isotopic Envelopes

Jingpeng Wang, Jie Huang, Kaijie Xiao, and Zhixin Tian

Cost-efficient and Scalable Multicast Tree in Software Defined Networking Shanshan Zhou, Hua Wang, Shanwen Yi, and Fangjin Zhu

Session T5D: 09:15-11:15, November 19 (Thursday), Room 6

Chair: Deng Li, Central South University, China Parallel Data Regeneration Based on Multiple Trees with Network Coding in Distributed Storage System

Pengfei You, Zhen Huang, Changjian Wang, Minghao Hu, and Yuxing Peng

Maximize Throughput Scheduling and Cost-Fairness Optimization for Multiple DAGs with Deadline Constraint Wei Wang, Qingbo Wu, Yusong Tan, and Fuhui Wu

Unified Multi-Constraint and Multi-Objective Workflow Scheduling for Cloud System

Fuhui Wu, Qingbo Wu, Yusong Tan, and Wei Wang

Page 28: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

24

Bi-objective Optimization Genetic Algorithm of the Energy Consumption and Reliability for Workflow Applications in

Heterogeneous Computing Systems

Longxin Zhang, Kenli Li, and Keqin Li PE-TLD: Parallel Extended Tracking-Learning-Detection for Multi-target Tracking

Chenggang Zhou, Qiankun Dong, Wenjing Ma, Guoping Long, Tao Li

Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy

Wenyin Yang, Guojun Wang, and Md Zakirul Alam Bhuiyan

Session T5E: 14:00-16:00, November 19 (Thursday), Room 6

Chair: Xiaoyu Zhu, Central South University, China Improving Performance of Floating Point Division on GPU and MIC

Kun Huang, Yifeng Chen

UniDegree: A GPU-based Graph Representation for SSSP

Changyou Zhang, Feng Wang,Kun Huang, Zhiyou Liu,and Yifeng Chen

MTTF-aware Reliability Task Scheduling for Heterogeneous Multicore System Huaguo Liang, Yangyang Dai, Maoxiang Yi, Dawen Xu,and Zhengfeng Huang

One-to-One Disjoint Path Covers on Mesh

Manyi Du, Jianxi Fan, Yuejuan Han, and Cheng-Kuan Lin

*Para-Join: An Efficient Parallel Method for String Similarity Join

Cairong Yan and Jian Wang *Communication-Aware Task Scheduling Algorithm for Heterogeneous Computing

Tehui Huang, Tao Li, Qiankun Dong, Kezhao Zhao, Wenjing Ma and Yulu Yang

Track 6: Applications of Parallel and Distributed Computing Session T6A: 10:15-12:30, November 18 (Wednesday), Room 5

Chair: Feng Wang, Central South University, China On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks

Wenbin Hu, Liping Yan, Huan Wang, and Bo Du Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System

Weihao Liang, Hong An, Feng Li, and Yichao Cheng

Stencil Computations on HPC-oriented ARMv8 64-bit Multi-Core Processor

Chunjiang Li, Yushan Dong, and Kuan Li

A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, and Shanwen Yi

A Streaming Execution Method for Multi-Services in Mobile Cloud Computing

Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, and Yongbing Tang

Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud

Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, and Jianhang Huang

Session T6B: 14:00-16:00, November 18 (Wednesday), Room 5

Chair: Zheng Ma, Hunan University, China Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac

Ventricle

Qiang Lan, Namit Gaur, Johannes Langguth, and Xing Cai

Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core Architectures Yizhuo Wang, Weixing Ji, Xu Chen, and Sensen Hu

Refactoring for Separation of Concurrent Concerns

Yang Zhang, Dongwen Zhang, Weixing Ji, and Yizhuo Wang

Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph

Zhenchun Huang and Guoqing Li Resource-Efficient Vibration Data Collection in Cyber-Physical Systems

Md Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, and Xiangyong Liu

Session T6C: 16:15-18:15, November 18 (Wednesday), Room 5

Chair: Wenbin Jiang, Huazhong University of Science and Technology, China A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System

Wenbin Jiang, Zhiwei Lu, Hai Jin, and Ye Chi DFIS: A Scalable Distributed Fingerprint Identification System

Yunxiang Zhao, Wanxin Zhang, Dongsheng Li, and Zhen Huang

Page 29: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

25

Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm Optimization

Runshui Zhu, Hua Wang, Yanqing Gao, Shanwen Yi, and Fangjin Zhu

Pre-Stack Kirchhoff Time Migration on Hadoop and Spark Chen Yang, Jie Tang, Heng Gao, and Gangshan Wu

A Cyber Physical System with GPU for CNC Applications

Jen-Chieh Chang, Ting-Hsuan Chien, and Rong-Guey Chang

NCPSO: A Solution of the Controller Placement Problem in Software Defined Networks

Session T6D: 09:15-11:15, November 19 (Thursday), Room 5

Chair: Yinglong Dai, Central South University, China Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector Machines

Jiangang Wu, Chang Feng, Peihuan Gao, and Shizhong Liao

Real-time Deconvolution with GPU and Spark for Big Imaging Data Analysis

Lianyu Cao, Penghui Juan, and Yinghua Zhang Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters

Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, and Jianlei Zhang

MrBayes for Phylogenetic Inference Using Protein Data on A GPU Cluster

Shuai Pang, Rebecca J. Stones, Ming-ming Ren, Gang Wang, and Xiaoguang Liu

Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOP Shijin Yuan, Yiwen Qian, and Bin Mu

*Energy-aware Task Consolidation For Cloud Computing Data Center

Ya Chen and Yonghua Xiong

Track 7: Service Dependability and Security in Distributed and Parallel Systems Session T7A: 10:15-12:30, November 18 (Wednesday), Room 3

Chair: Chi Lin, Dalian University of Technology, China A Programming Framework for Implementing FaultTolerant Mechanism in IoT Applications

Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S.L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo

VCLT: An Accurate Trajectory Tracking Attack based on Crowdsourcing in VANETs

Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang Wu Yu, and Guowei Wu

A Novel Search Engine-Based Method for Discovering Command and Control Server

Xiaojun Guo, Guang Cheng,Wubin Pan, Truong Dinhtu, and Yixin Liang Leveraging Behavior Diversity to Detect Spammers in Online Social Networks

Jian Cao, Qiang Fu, Qiang Li, and Dong Guo

A Proactive Fault Tolerance Scheme for Large Scale Storage Systems

Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, and Zhongwei Li

When Software Defined Networks Meet Fault Tolerance: A Survey Jue Chen, Jinbang Chen, Fei Xu, Min Yin, and Wei Zhang

Session T7B: 14:00-16:00, November 18 (Wednesday), Room 3

Chair: Wenjun Jiang, Hunan University, China A Novel Signature Generation Approach for Polymorphic Worms

Jie Wang, and Xiaoxian He

Scalable Access Policy for Attribute Based Encryption in Cloud Storage Jing Wang, Chuanhe Huang, and Jinhai Wang

Minimizing Resource Expenditure while Maximizing Destructiveness for Node Capture Attacks

Chi Lin, Guowei Wu, Xiaochen Lai, and Tie Qiu

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection

Shaobo Zhang, Qin Liu, and Guojun Wang Exploring Efficient and Robust Virtual Machine Introspection Techniques

Chonghua Wang, Xiaochun Yun, Zhiyu Hao, Lei Cui, Yandong Han, and Qingxin Zou

CRVad: Confidential Reasoning and Verification towards Secure Routing in Ad Hoc Networks

Teng Li, Jianfeng Ma, and Cong Sun

Session T7C: 16:15-18:15, November 18 (Wednesday), Room 3

Chair: Wenjun Jiang, Hunan University, China NMHP: A Privacy Preserving Profile Matching Protocol in Multi-Hop Proximity Mobile Social Networks

Entao Luo, Qin Liu, and Guojun Wang

Page 30: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

26

A New Data Replication Scheme for PVFS2

Nianyuan Bao, Jie Tang, Xiaoyu Zhang, and Gangshan Wu

Efficient Private Matching Scheme for Friend Information Exchange Fang Qi, and Wenbo Wang

A Real-time Android Malware Detection System Based on Network Traffic Analysis

Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, and Lei Zhang

Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships

Houwu Chen, and Jiwu Shu Adopting Multi-Mode Access Control for Secure Data Sharing in Cloud

Chunhua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, and Hao Jin

Session T7D: 09:15-11:15, November 19 (Thursday), Room 3

Chair: Lei Zhou, Central South University, China A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud

Zheng Yan, Wenxiu Ding, and Haiqi Zhu HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems

Xuhui Liu, Qin Liu, Tao Peng, and Jie Wu

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications

Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, and Peng Liu

Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA Sheng Huo, Dafang Zhang, and Yanbiao Li

A Robust and Efficient Detection Model of DDoS Attack for Cloud Services

Jian Zhang, Ya-Wei Zhang, Jian-Biao He, and Ou Jin

Secure Bisimulation for Interactive Systems

Guanjun Liu, and Changjun Jiang

Session T7E: 14:00-16:00, November 19 (Thursday), Room 5

Chair: Wenjuan Tang, Central South University, China Privacy Preserving for Network Coding in Smart Grid

Shiming He, Weini Zeng, and Kun Xie

Verifiable Dynamic Fuzzy Search over Encrypted Data in Cloud Computing

Xiaoyu Zhu, Qin Liu, and Guojun Wang A Secure and Fine-grained Query Results Verification Scheme for Private Search over Encrypted Cloud Data

Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, and Huigui Rong

PEM4RFID: Privacy Enhancement Model for RFID Systems

Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, and Zhiyong Feng

Improved WOW Adaptive Image Steganography Method Xin Liao, Guoyong Chen, Qi Li, and Jun Liu

CloudS: A Multi-Cloud Storage System with Multi-Level Security

Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, and Xiaoguang Liu

Session T7F: 16:15-18:15, November 19 (Thursday), Room 5

Chair: Xiangyong Liu, Central South University, China Crossing – A Highly Available Quorum Protocol for Arbitrary Planar Topologies

Robert Schadek and Oliver Theel

Fast Bridge Fault Test Generation Based on Critical Area

Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki

Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel System

Yuan Yao, Pan He, Zhihao Zheng, Chun Tan, and Yue Yuan Addressing NoC Reliability through an Efficient Fibonaccibased Crosstalk Avoidance Codec Design

Zahra Shirmohammadi, and Seyed Ghassem Miremadi

An Agent-based Framework for Simulating and Analysing Attacks on Cyber Physical Systems

Sridhar Adepu, Aditya Mathur1, Jagadeesh Gunda, and Sasa Djokic

*Thwarting Android App Repackaging by Executable Code Fragmentation Ruxia Fan, Dingyi Fang and Zhanyong Tang

Track 8: Internet of Things and Cyber-Physical-Social Computing Session T8A: 09:15-11:15, November 19 (Thursday), Room 8

Chair: Wenjie Chen, East China Normal University, China

Page 31: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

27

NRLoc: Neighbor Relative RSS-Based Indoor Localization System

Xuefeng Sha, Kai Lin, Wenjian Wang, and Jiming Luo

Social Attributes based Cooperative Caching in Ad Hoc Networks Zhiwei Yang, Weigang Wu, and Zhenghao Zhu

Entropy-Based Social Influence Evaluation in Mobile Social Networks

Sancheng Peng1, Jian Li1, and Aimin Yang

An Energy Efficient Multi-hop Charging Scheme with Mobile Charger for Wireless Rechargeable Sensor Network

Shuo Li, Jian He, Xiaoyong Zhang, and Jun Peng Distributed Compressive Sensing Based Data Gathering in Energy Harvesting Sensor Network

Weirong Liu, Gaorong Qin, Fu Jiang, Kaiyang Liu, and Zhengfa Zhu

Feedback Mechanism Based Dynamic Fingerprint Indoor Localization Algorithm in Wireless Sensor Networks

Yu Liu, Juan Luo, Qian Yang, and Jinyu Hu

Session T8B: 14:00-16:00, November 19 (Thursday), Room 8

Chair: Pengfei Yin, Jishou University, China A GPU Based Fast Community Detection Implementation for Social Network

Guo Li, Dafang Zhang, Kun Xie, Tanlong Huang, and Yanbiao Li

An Efficient Privacy-Preserving Compressive Data Gathering Scheme in WSNs

Kun Xie, Xueping Ning, Xin Wang, Jigang Wen, Xiaoxiao Liu, Shiming He, and Daqiang Zhang

A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing Zuoting Ning, Dafang Zhang, and Kun Xie

An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery

Changming Liu, Cai Fu, Deliang Xu, Lin Sun, and Lansheng Han

MN-ALG: A Data Delivery Algorithm for Large Scale Wireless Electronic Shelf Label System

Yingzhuang Chen, Qifei Zhang, Chaofan Tu, Yuchang Zhang, Fan Bai,Yinchao Xue, and Sheng Zhang The Optimization and Improvement of MapReduce in Web Data Mining

Changqing Yin, Shichao Zhang, Shukun Liu, Shangwei Song, Guangyu Gao, and Xiyuan Zhou

Session T8C: 16:15-18:15, November 19 (Thursday), Room 8

Chair: Qin Liu, Hunan University, China An Intimacy-based Algorithm for Social Network Community Detection

Yi Zheng, Dafang Zhang, and Kun Xie A Method for Detection of Anomaly Node in IOT

Zhenguo Chen, Liqin Tian, and Chuang Lin

Track 9:Performance Modeling and Evaluation Session T9A: 10:15-12:30, November 18 (Wednesday), Room 0

Chair: Lin Gu, Huazhong University of Science and Technology, China An Efficient Algorithm for a Generalized LCS Problem

Daxin Zhu,Yingjie Wu, and Xiaodong Wang On Exploring a Quantum Particle Swarm Optimization Method for Urban Traffic Light Scheduling

Wenbin Hu, Huan Wang, Liping Yan, and Bo Du

Identifying Repeated Interleavings to Improve the Efficiency of Concurrency Bug Detection

Zhendong Wu, Kai Lu, and Xiaoping Wang

Global Reliability Evaluation for Cloud Storage Systems with Proactive Fault Tolerance Jing Li, Mingze Li, Gang Wang, Xiaoguang Liu, Zhongwei Li, and Huijun Tang

Performance Evaluation and Optimization of Wi-Fi Display on Android

Xianfeng Li, and Baobao Jin

A Novel Scheduling Algorithm for File Fetch in Transparent Computing

Kehua Guo, Yayuan Tang, and Jiacheng Gu

Session T9B: 14:00-16:00, November 18 (Wednesday), Room 0

Chair: Abbas E. Kiasari, The University of Manchester, United Kingdom Performance Evaluation of HPGMG on Tianhe-2: Early Experience

Yulong Ao, Yiqun Liu, Chao Yang, Fangfang Liu, Peng Zhang, Yutong Lu, and Yunfei Du

Joint Power and Reduced Spectral Leakage-based Resource Allocation for D2D Communications in 5G

Mithun Mukherjee, Lei Shu, Yan Zhang, Zhangbing Zhou, and Kun Wang4 Performance Analysis for Job Scheduling in Hierarchical HPC Systems: A Coloured Petri Nets Method

Zhijia Li, Li Jiao, and Xiang Hu

Page 32: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

28

An Optimization Strategy of Energy Consumption for Data Transmission Based on Optimal Stopping Theory in Mobile

Networks

Ying Peng, Nao Wang, and Gaocai Wang Exploration of the Relationship between Just-in-Time Compilation Policy and Number of Cores

Mingkai Huang, Xianhua Liu, Tingyu Zhang, and Xu Cheng

CSAP: a Performance Predictor for Climate Simulation Applications on Intel CPUs

Ruizhe Li, Li Liu, Cheng Zhang, and Guangwen Yang

Session T9C: 16:15-18:15, November 18 (Wednesday), Room 0

Chair: Deze Zeng, China University of Geosciences, China On Routing Algorithms for the DPillar Data Centre Networks

Abbas Eslami Kiasari, Javier Navaridas, and Iain A. Stewart

MR-COF: A Genetic MapReduce Configuration Optimization Framework

Chao Liu, Deze Zeng, Hong Yao, Chengyu Hu, Xuesong Yan, and Yuanyuan Fan

Analysis of Repair Cost in Distributed Storage Systems with Fault -Tolerant Coding Strategies Yanbo Lu, Jie Hao, Xin-Ji Liu, and Shu-Tao Xia

Design Efficient In-Database Video Storage Approach by Learning from Performance Evaluation of BLOB

Hui Li, Mei Chen, Zhenyu Dai, Ming Zhu, and Menglin Huang

Skyline Query on Anti-Correlated Distributions: From the Perspective of Spatial Index

Jinchao Zhang, Dong Zhang, Bo Yu1, Bo Li, Weiping Wang, and Dan Meng PNSICC: A Novel Parallel Network Security Inspection Mechanism based on Cloud Computing

Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, and Guangwei Wang

Session T9D: 14:00-16:00, November 19 (Thursday), Room 0

Chair: Shuhong Chen, Hunan Institute of Engineering, China Simulation Platform for X-ray Computed Tomography based on Low-power Systems

Estefania Serrano, Javier Garcia Blas, Alberto Verza, and Jesus Carretero STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets

Yu-E Sun, He Huang, Miaomiao Tian, Zehao Sun, Wei Yang, Hansong Guo, and Liusheng Huang

Reality Mining with Mobile Data: Understanding the Impact of Network Structure on Propagation Dynamics

Yuanfang Chen, Noel Crespi, Lei Shu, and Gyu Myoung Lee

Reducing Journaling Overhead with Hybrid Buffer Cache Zhiyong Zhang, Lei Ju, and Zhiping Jia

A Green Scheduler for Cloud Data Centers Using Renewable Energy

Chonglin Gu, Chunyan Liu, Chen Shi, Zhixiang He, Hejiao Huang, and Xiaohua Jia

Fine-Grained Fault-Tolerant Adaptive Routing for Networks-on-Chip

Junxiu Liu, Jim Harkin, Liam Maguire, Yuhua Li, Lei Wan, and Yuling Luo

Session T9E: 16:15-18:15, November 19 (Thursday), Room 0

Chair: Entao Luo, Central South University, China On the Optimal Provider Selection for Repair in Distributed Storage System with Network Coding

Chengjin Jia, Jin Wang, Yanqin Zhu, Xin Wang, Kejie Lu, Xiumin Wang, and Zhengqing Wen

Local State Reusing for Efficient Model Checking of Multithreaded Programs

Junrui Zhou, Hong An, Yunyun Wang, and Junshi Chen Intelligent Road Congestion Prediction Employing Queueing Based Model

Lianghao Gao, Chengfang Ma, Lei Liu, Xinjing Wei

Evaluation and Analysis of Three Typical Resource Allocation Algorithms in Virtual Router Platform

Xianming Gao, Baosheng Wang, Xiaozhe Zhang, and Shicong Ma

Beyond Data Parallelism: Identifying Parallel Tasks in Sequential Programs Zhen Li, Bo Zhao, Ali Jannesari, and Felix Wolf

Fast Data-Dependence Profiling by Skipping Repeatedly Executed Memory Operations

Zhen Li, Michael Beaumont, Ali Jannesari, and Felix Wolf

Session T9F: 16:15-18:15, November 19 (Thursday), Room 4

Chair: Shaobo Zhang, Central South University, China P-index: An Efficient Searchable M etadata Indexing Scheme based on Data Provenance in Cold Storage

Jinjun Liu, Dan Feng, Yu Hua, Bin Peng, Pengfei Zuo, and Yuanyuan Sun

Performance Optimization and Evaluation of Space Management in Cloud Storage Systems

Guangping Xu, Huan Li, Qunfang Mao,Sheng Lin, and Hua Zhang

Performance Prediction for Concurrent Workloads in Distributed Database Systems

Page 33: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

29

Hui Li, Xiaohuan Hou, Mei Chen, Zhenyu Dai, Ming Zhu, and Menglin Huang

An Energy-Aware File Relocation Strategy Based on File-Access Frequency and Correlations

Cheng Hu, and Yuhui Deng Projective Synchronization for Complex Dynamical Networks of Non-delayed and Delayed Coupling with Different

Scale Factors via Impulsive Control

Yuxiu Li, and Guoliang Cai

Elastic Database Replication in the Cloud

Xianxia Zou, Jiuhui Pan, Wei Du, and Shuhong Chen

Session T9G: 16:15-18:15, November 19 (Thursday), Room 6

Chair: Qiang Zhang, Central South University, China A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs

Subir Halder, and Amrita Ghosal

Traffic Replay in Virtual Network Based on IP-Mapping

Lun Li, Zhiyu Hao, Yongzheng Zhang, Zhenquan Ding, and Haiqiang Fei Optimizing the Overheads for Uncoordinated Proactive Checkpointing

Lei Zhu, Jianhua Gu, and Zhennao Cai

Tunneling-based Multi-Path Routing Mechanism in Packet-Switched Non-Geostationary Satellite Networks

Guyu Hu, Zhaofeng Wu, Fenglin Jin, Bowei Yang, Yu Song, and Yinjin Fu

Cost-effective Scheduling Analysis through Discrete Event Simulation for Distributed Systems Siti Fajar Jalal, Masnida Hussin, Abdullah Muhammed, and Rohaya Latip

Energy Consumption Prediction based on Time-Series Models for CPU-Intensive Activities in the Cloud

Juan Li, Xiao Liu, Zhou Zhao, and Jin Liu

HYPAD: Hyper-Graph-Driven Approach for Parallel Data Warehouse Design

Ahcene Boukorca, Ladjel Bellatreche, and Soumia Benkrid

Session T9H: 16:15-18:15, November 19 (Thursday), Room 7

Chair: Gaocai Wang, Guangxi University, China Efficient Space Management and Wear Leveling for PCM -Based Storage Systems

Zhangling Wu, Peiquan Jin, and Lihua Yue

An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution

Fatimah Adamu-Fika, and Arshad Jhumka An Efficient Dynamic Programming Algorithm for SEQ-IC-SEQ-EC-LCS Problem

Daxin Zhu, Lei Wang,Yingjie Wu, and Xiaodong Wang

A Hybrid QoS Evaluation Tool Based on the Cloud Computing Platform

Yanjun Shu, Yan Zhao, Hongwei Liu, Decheng Zuo, and Xiaozong Yang

*Data or Index: A Trade-Off in Mobile Delay Tolerant Networks Hong Yao, Han Zhang, Jie Wu, Huanyang Zheng, Changkai Zhang and Deze Zeng

*Evaluation and Comparison of Ten Data Race Detection Techniques

Zhen Yu, Zhen Yang, Xiaohong Su and Peijun Ma

*An Energy-Aware Cooperative Content Distributed Strategy Based on MST in Mobile Environment

Nao Wang, Tianxiao Xie and Gaocai Wang

Page 34: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

30

B. SESSIONS AND PAPERS IN TrustData 2015

The 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)

Session TrustData-A: 11:30-12:30, November 19 (Thursday), Room 0

Chair: Qin Liu, Hunan University, China An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network

Zheng Ma, Jin Zheng, Weijia Jia, and Guojun Wang

Nth-order Multifunction Filter Employing Current Differencing Transconductance Amplifiers

Meili Cao, Haizhen He, Rongming Luo, and Lei Wen

An Improved Method for Reversible Data Hiding in Encrypted Image

Yuling Liu, and Zuhong Liu

Session TrustData-B: 10:30-12:30, November 20 (Friday), Room 0

Chair: Qin Liu, Hunan University, China Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks

Hongyun Xu, Jun Yang, Yong Zhang, Mengzhen Xu, and Jiayi Gan

A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups

Peixin Chen, Xiaofeng Wang, and Jinshu Su

STRATUS: Towards Returning Data Control to Cloud Users

Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie,

Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, and Geoffrey Holmes

VSEP: A Distributed Algorithm for Graph Edge Partitioning

Yu Zhang, Yanbing Liu, Jing Yu, Ping Liu, and Li Guo

Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture

Qun Liao, Shuangshuang Jiang, Qiaoxiang Hei, Tao Li, and Yulu Yang

An Output-oriented Approach of Test Data Generation Based on Genetic Algorithm

Weixiang Zhang, Bo Wei, and Huisen Du

C. SESSIONS AND PAPERS IN TSP 2015

The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP

2015)

Session TSP-A: 11:30-12:30, November 19 (Thursday), Room 3

Chair: Wenjun Jiang, Hunan University, China An Efficient Pre-filter to Accelerate Regular Expression Matching

Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, and Jinshu Su

A Hybrid Optimization Approach for Anonymizing Transactional Data Li-e Wang, and Xianxian Li

Program Obfuscator for Privacy-carrying Unidirectional One-hop Re-encryption

Mingwu Zhang, Biwen Chen, and Hua Shen

Session TSP-B: 11:30-12:30, November 19 (Thursday), Room 4

Page 35: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

31

Chair: Binji Mo, Central South University, China Predicting Severity of Software Vulnerability Based on Grey System Theory

Jinkun Geng, Daren Ye, and Ping Luo

Characterization of Android Applications with Root Exploit by Using Static Feature Analysis Huikang Hao, Zhoujun Li, Yueying He, and Jinxin Ma

LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in

Proximity

Yufeng Wang, Xiaohong Chen, Qun Jin, and Jianhua Ma

Session TSP-C: 11:30-12:30, November 19 (Thursday), Room 5

Chair: Lei Jia, Central South University, China Context-aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration

Luyan Nie, Chuanzhi Xie, Yujun Yin, and Xin Li

Continuous User Identity Verification for Trusted Operators in Control Rooms

Enrico Schiavone, Andrea Ceccarelli, and Andrea Bondavalli

Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model Leyou Zhang, Zhuanning Wang, and Qing Wu

Session TSP-D: 10:30-12:30, November 20 (Friday), Room 3

Chair: Subir Halder, B. C. Roy Engineering College, Durgapur, India Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical

Machines

Qingxin Xia, Yuqing Lan, and Limin Xiao Towards Mechanised Semantics of HPC: the BSP with Subgroup Synchronisation Case

Jean Fortin, and Frederic Gava

Cloud Computing Threats and Provider Security Assessment

Huiming Yu, Ken Williams, and Xiaohong Yuan

Collaborative Multiparty Association Rules Mining with Threshold Homomorphic Encryption Marcin Gorawski, Zacheusz Siedlecki, and Anna Gorawska

An Illegal Indirect Access Prevention Method in Transparent Computing System

Wenjuan Tang, Yang Xu, Guojun Wang, and Yaoxue Zhang

EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks

Hongling Xiao, Hong Song, and Weiping Wang

D. SESSIONS AND PAPERS IN NOPE 2015

The 3rd International Workshop on Network Optimization and Performance Evaluation (NOPE

2015)

Session NOPE-A: 11:30-12:30, November 19 (Thursday), Room 6

Chair: Gaocai Wang, Guangxi University, China Energy Saving Mechanism Analysis Based on Dynamic Resource Scaling for Cloud Computing

Xiaojie Zhang, Nao Wang, Xin Zheng, Caocai Wang, and Dongmei Bin

An Optimal Rate Adaptive Video Streaming Scheme to Improve QoE of Dash

Xiaolong Gong, Gaocai Wang, and Nao Wang

Community-Based Energy-Aware Routing Protocol in Mobile Social Networks

Dongmei Bin, Ying Peng, and Gaocai Wang

Session NOPE-B: 11:30-12:30, November 19 (Thursday), Room 7

Chair: Shan Peng, Central South University, China Research of CMABC Algorithm in Intrusion Detection

Ming Liu, Xiaoling Yang, Fanling Huang, and Yanming Fu

Page 36: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

32

A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems Zheng Xu, and Buyang Cao

Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks With Selfish Sensors

Guiyun Liu, Jing Yao, Hongbin Chen, Han Zhang, and Dong Tang

Session NOPE-C: 10:30-12:30, November 20 (Friday), Room 4

Chair: Gaocai Wang, Guangxi University, China File Creation Optimization for Metadata-intensive Application in File Systems

Limin Xiao, Qiaoling Zhong, Zhisheng Hu, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang, and Zheqi Lu

A Sharing-Memory Based Ring Framework Shicong Ma, Baosheng Wang, Xianming Gao, and Xiaozhe Zhang

Streaming Computing Technology for Android Applications: Design Model & Case Study

Binji Mo, Yang Xu, and Guojun Wang

An Energy-efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network

Lifang Liu, Xiaogang Qi, Gengzhong Zheng, and Mande Xie

TDD TDD-Based Massive MIMO Systems: Overview and Development

Ronghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, and Yunxiang Jiang

E. SESSIONS AND PAPERS IN SCS 2015

The 2nd International Symposium on Sensor-Cloud Systems (SCS 2015)

Session SCS-A: 11:30-12:30, November 19 (Thursday), Room 8

Chair: Xiaofei Xing, Guangzhou University, China A Hierarchical Shared Key Algorithm in Wireless Sensor Networks

Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, and Yangjie Cao

Evaluation Model of the Cloud Systems Based on Queuing Petri Net

Yangjie Cao, Huimin Lu, Xiaodong Shi, and Pengsong Duan

MTCPP: Multi-Targets K-Coverage Preservation Protocol in Wireless Sensor Networks Liu Yang

F. SESSIONS AND PAPERS IN SPPCN 2015

The 2nd International Workshop on Security and Privacy Protection in Computer and Network

Systems (SPPCN 2015)

Session SPPCN-A: 11:30-12:30, November 19 (Thursday), Room 9

Chair: Zheng Ma, Hunan University, China Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments

Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, and Song-Jhih Chen Privacy Preserving Personalization in Probabilistic Search

Rajeswary Ravi and Greeshma N Gopal

Page 37: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

33

A Security-Critical Task Management Method for Distributed Real-Time Systems

Yang Yu, Qi Dong, Zhipeng Luo, Hao Chen, Jun Deng, and Wei Guan

Session SPPCN-B: 16:15-18:15, November 19 (Thursday), Room 9

Chair: Xiaofei Xing, Guangzhou University, China Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme

Roshni Kadeparambil Raphel, Muhammed Ilyas H, and Janu R Panicker

Energy E cient Encryption Scheme for Network-coded Mobile Ad Hoc Networks

Deepa S Nair and Muhammed Ilyas H

A Model of Dynamic Malware Analysis Based on VMI

Chengye Li, Yangyue Xiang, and Jiangyong Shi

Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffc

Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, and Hongbo Han

Andriod Malware Network Behavior Analysis at HTTP Protocol Packet Level

Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, and Hongbo Han

G. SESSIONS AND PAPERS IN DependSys 2015

The 1st International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and

Applications (DependSys 2015)

Session DependSys-A: 10:15-12:30, November 18 (Wednesday), Room 4

Chair: Changji Wang, Yunnan University, China Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks

Changji Wang, and Jing Liu

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks Zhen Peng, Tian Wang, Md Zakirul Alam Bhuiyan, Xiaoqiang Wu, and Guojun Wang

A Web-based Resource Management Platform for Transparent Computing

Dacheng Wang, Hong Song, Yun Xu, Wenhao Zhang, and Jianxin Wang

Architecture and Scheduling Method of Cloud Video Surveillance System based on IoT

Xia Wei, Wen-Xiang Li, Cong Ran, Chun-Chun Pi, Ya-Jie Ma, and Yu-Xia Sheng HiTrans: An FPGA-based Gateway Design and Implementation in HPC Environments

Wei Shi, Gaofeng Lv, Zhigang Sun, and Zhenghu Gong

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Jin B. Hong, Chun-Jen Chung, Dijiang Huang, and Dong Seong Kim

Session DependSys-B: 14:00-16:00, November 18 (Wednesday), Room 4

Chair: Xiangdong Li, Central South University, China Removing Key Escrow from the LW-HIBE Scheme

Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, and Ilsun You

FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific Data

Hui Li, Nengjun Qiu, Mei Chen, Hongyuan Li, Zhenyu Dai, Ming Zhu, and Menglin Huang

An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data Centers Sheng Xu, Binzhang Fu, Mingyu Chen, and Lixin Zhang

Reliability-aware Distributed Computing Scheduling Policy

Jemal Abawajy, and Mohammad Mehedi Hassan

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage

Peixin Chen, Xiaofeng Wang, and Jinshu Su A Predictive Data Reliability Method for Wireless Sensor Network Applications

Adil Amjad Sheikh, Ahmed Lbath, Ehsan Ullah Warriach, and Emad Felemban

Session DependSys-C: 16:15-18:15, November 18 (Wednesday), Room 4

Page 38: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

34

Chair: Bo Wang, Central South University, China A Cycle-time-analysis Model for Byzantine Fault Tolerance

Liu Chen, and Wei Zhou

Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application Adrian Johannes, Priyadarsi Nanda, and Xiangjian He

Weight-Based Batch Rekeying Scheme for Dynamic Multi-Privileged Group Communications

Wei Zhou, Yang Xu, Lijuan Yang, and Guojun Wang

Application-Assisted Dynamic Attestation for JVM -Based Cloud

Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Tie Hong, and Yiming Li New Escrow-Free Scheme for Hierarchical Identity-Based Encryption

Fang Qi, Xin Tang, and Quanyun Wei

Neural Networks in Petrol Station Objects Calibration

Marcin Gorawski, Miros law Skrzewski, Michal Gorawski, and Anna Gorawska

Session DependSys-D: 09:15-11:15, November 19 (Thursday), Room 4

Chair: Min Guo, Central South University, China A Dependable, Scalable, Distributed, Virtual Data Structure

Silvia Grampone, Witold Litwin, and Thomas Schwarz

Effect of Bias Temperature Instability on Soft Error Rate

Zhen Wang, and Jianhui Jiang

Security Modeling and Analysis of a SDN based Web Service Taehoon Eom, Jin B. Hong, Jong Sou Park, and Dong Seong Kim

Single Anchor Node based Localization in Mobile Underwater Wireless Sensor Networks

Anjana P Das, and Sabu M Thampi

A Novel Bug Report Extraction Approach

Tao Lin, Jianhua Gao, Xue Fu, and Yan Lin ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive Data

Xin Zhou, Hui Li, Xiao Zhang, Shan Wang, Yanyu Ma, Keyan Liu, Ming Zhu, and Menglin Huang

Session DependSys-E: 14:00-16:00, November 19 (Thursday), Room 4

Chair: Jian Luo, Central South University, China A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor Networks

Zhihai Wang, and Weidong Chen Unknown Bit Stream Protocol Message Discovery with Zero Knowledge

Fengli Zhang, Junjiao Zhang, and Hongchuan Zhou

Distributed Authentication in the Cloud Computing Environment

Yanzhu Liu, Zhi Li, and Yuxia Sun

Influential Nuisance Factors on a Decision of Sufficient Testing Mahnaz Malekzadeh, and Iain Bate

Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem

Jun Xu, and Yong Tang

Acceleration of CFD Engineering Software on GPU and MIC

Yang Liu, and Liang Deng Dealing with Reliable Event-based Communications by Means of Layered Multicast

Christian Esposito, Aniello Castiglione, and Francesco Palmieri

Page 39: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

35

ICA3PP 2015 Organizing and Program Committees

General Chairs Guojun Wang, Central South Univers ity, China

Peter Mueller, IBM Zurich Research, Switzerland

Qingping Zhou, Jishou University, China

Program Chairs

Albert Zomaya, University of Sydney, Australia

Gregorio Martinez, University of Murcia, Spain

Kenli Li, Hunan University, China

Steering Chairs

Andrzej Goscinski, Deakin University, Australia

Yi Pan, Georgia State University, USA

Yang Xiang, Deakin University, Australia

Workshop Chairs Mianxiong Dong, Muroran Institute of Technology, Japan

Ryan K. L. Ko, The University of Waikato, New Zealand

Md. Zakirul Alam Bhuiyan, Central South University, China

Publicity Chairs Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Yulei Wu, The University of Exeter, UK

Christian Callegari, University of Pisa, Italy

Kuan-Ching Li, Providence University, Taiwan

James J. (Jong Hyuk) Park, SeoulTech, Korea

Publication Chairs Jin Zheng, Central South University, China

Wenjun Jiang, Hunan University, China

Finance Chairs Pin Liu, Central South University, China

Wang Yang, Central South University, China

Local Arrangement Chairs Fang Qi, Central South University, China

Qin Liu, Hunan University, China

Hongzhi Xu, Jishou University, China

Program Committee (in alphabetical order)

1. Parallel and Distributed Architectures Track

Chairs:

Stefano Giordano, Italian National Interuniversity Consortium for Telecommunications, Italy

Xiaofei Liao, Huazhong University of Science and Technology, China

Haikun Liu, Nanyang Technological University, Singapore

TPC members:

Marco Aldinucci, Universita' degli Studi di Torino, Italy

Yungang Bao, Chinese Academy of Sciences, China

Hui Chen, Auburn University, USA

Page 40: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

36

Vladimir Getov, University of Westminster, UK

Jie Jia, Northeastern University, China

Yusen Li, Nanyang Technological University, Singapore

Zengxiang Li, Agency for Science, Technology and Research, Singapore

Xue Liu, Northeastern University, China

Yongchao Liu, Georgia Institute of Technology, USA

Salvatore Orlando, Universita Ca' Foscari Venezia, Italy

Nicola Tonellotto, ISTI-CNR, Italy

Zeke Wang, Nanyang Technological University, Singapore

Quanqing Xu, Agency for Science, Technology and Research (A*STAR), Singapore

Ramin Yahyapour, Uni Goettingen, Germany

Jidong Zhai, Tsinghua University, China

Jianlong Zhong, GraphSQL Inc, USA

Andrei Tchernykh, CICESE Research Center, Ensenada, Baja California, Mexico

2. Software Systems and Programming Track

Chairs:

Xinjun Mao, National University of Defense Technology, China

Sanaa Sharafeddine, Lebanese American University, Beirut, Lebanon

TPC members:

Surendra Byna, Lawrence Berkeley National Lab, USA

Yue-Shan Chang, National Taipei University, Taiwan

Massimo Coppola, ISTI-CNR, Italy

Marco Danelutto, University of Pisa, Italy

Jose Daniel Garcia, University Carlos III of Madrid, Spain

Peter Kilpatrick, Queen's University Belfast, UK

Soo-Kyun Kim, PaiChai University, Korea

Rajeev Raje, Indiana University-Purdue University Indianapolis, USA

Salvatore Ruggieri, University of Pisa, Italy

Subhash Saini, NASA, USA

Peter Strazdins, The Australian National University, Australia

Domenico Talia, University of Calabria, Italy

Hiroyuki Tomiyama, Ritsumeikan University, Japan

Canqun Yang, National University of Defense Technology, China

Daniel Andresen, Kansas State University, USA

Sven-Bodo Scholz, Heriot Watt University, UK

Salvatore Venticinque, Second University of Naples, Italy

3. Distributed and Network-based Computing Track

Chairs:

Casimer DeCusatis, Marist College, US

Qi Wang, University of the West of Scotland, United Kingdom

TPC members:

Justin Baijian, Purdue University, USA

Aparicio Carranza, City University of New York, USA

Tzung-Shi Chen, National University of Tainan, Taiwan

Ciprian Dobre, University Politehnica of Bucharest, Romania

Longxiang Gao, Deakin University, Australia

Ansgar Gerlicher, Stuttgart Media University, Germany

Harald Gjermundrod, University of Nicosia, Cyprus

Christos Grecos, Independent Imaging Consultant, United Kingdom

Jia Hu, Liverpool Hope University, United Kingdom

Baback Izadi, State University of New York at New Paltz, USA

Morihiro Kuga, Kumamoto University, Japan

Mikolaj Leszczuk, AGH University of Science and Technology, Poland

Paul Lu, University of Alberta, Canada

Chunbo Luo, University of the West of Scotland, United Kingdom

Page 41: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

37

Ioannis Papapanagiotou, Purdue University, USA

Michael Hobbs, Deakin University, Australia

Cosimo Anglano, Università del Piemonte Orientale, Italy

Md. ObaidurRahman, Dhaka University of Engineering & Technology, Bangladesh

Aniello Castiglione, University of Salerno, Italy

Shuhong Chen, Hunan Institute of Engineering, China

4. Big Data and its Applications Track

Chairs:

Jose M. Alcaraz Calero, University of the West of Scotland, United Kingdom

Shui Yu, Deakin University, Australia

TPC members:

Alba Amato, Second University of Naples, Italy

Tania Cerquitelli, Politecnico di Torino, Italy

Zizhong (Jeffrey) Chen, University of California at Riverside, USA

Alfredo Cuzzocrea, University of Calabria, Italy

Saptarshi Debroy, University of Missouri-Columbia, USA

Yacine Djemaiel, Communication networks and Security, Res. Lab, Tunisia

Shadi Ibrahim, INRIA, France

Hongwei Li, UESTC, China

William Liu, Auckland University of Technology, New Zealand

Xiao Liu, East China Normal University, China

Karampelas Panagiotis, Hellenic Air Force Academy, Greece

Florin Pop, University Politehnica of Bucharest, Romania

Genoveva Vargas Solar, CNRS-LIG-LAFMIA, France

Chen Wang, CSIRO ICT Centre, Australia

Chao-Tung Yang, Tunghai University, Taiwan

Peng Zhang, Stony Brook University, USA

Ling Zhen, Southeast University, China

Roger Zimmermann, National University of Singapore, Singapore

Francesco Palmieri, University of Salerno, Italy

Rajiv Ranjan, CSIRO, Canberra, Australia

Felix Cuadrado, Queen Mary University of London, UK

Nilimesh Halder, The University of Western Australia, Australia

Kuan-Chou Lai, National Taichung University of Education, Taiwan

Jaafar GABER, UTBM, France

Eunok Paek, Hanyang University, Korea

You-ChiunWang, National Sun Yat-sen University, Taiwan

KeGu, Changsha University of Technology, China

5. Parallel and Distributed Algorithms Track

Chairs:

Dimitris A. Pados, The State University of New York at Buffalo, US

Baoliu Ye, Nanjing University, China

TPC members:

George Bosilca, University of Tennessee, USA

Massimo Cafaro, University of Salento, Italy

Stefania Colonnese, Stefania Colonnese, Universita degli Studi di Roma La Sapienza, Italy

Raphael Couturier, University of Franche Comte, France

Gregoire Danoy, University of Luxembourg, Luxembourg

Franco Frattolillo, Universita del Sannio, Italy

Che-Rung Lee, National Tsing Hua University, Taiwan

Laurent Lefevre, Inria, ENS-Lyon, University of Lyon, France

Amit Majumdar, San Diego Supercomputer Center, USA

Susumu Matsumae, Saga University, Japan

George N. Karystinos, Technical University of Crete, Greece

Dana Petcu, West University of Timisoara, Romania

Page 42: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

38

Francoise Sailhan, CNAM, France

Uwe Tangen, Ruhr-Universitaet Bochum, Germany

Wei Xue, Tsinghua University, China

Kalyan S. Perumalla, Oak Ridge National Laboratory, USA

Morris Riedel, University of Iceland, Germany

Gianluigi Folino, ICAR-CNR, Italy

Joanna Kolodziej, Cracow University of Technology, Poland

Luc Bougé, ENS Rennes, France

Hirotaka Ono, Kyushu University, Japan

Tansel Ozyer, TOBB Economics and Technology University, Turkey

Daniel Grosu, Wayne State University, USA

Tian Wang, Huaqiao University, China

Sancheng Peng, Zhaoqing University, China

Fang Qi, Central South University, China

Zhe Tang, Central South University, China

Jin Zheng, Central South University, China

6. Applications of Parallel and Distributed Computing Track

Chairs:

Yu Chen, Binghamton University, State University of New York, US

Michal Wozniak, Wroclaw University of Technology, Poland

TPC members:

Jose Alfredo F. Costa, Universidade Federal do Rio Grande do Norte, Brasil

Robert Burduk, Wroclaw University of Technology, Poland

Boguslaw Cyganek, AGH University of Science and Technology, Poland

Paolo Gasti, New York Institute of Technology, USA

Manuel Grana, University of the Basque Country, Spain

Houcine Hassan, Univ. Politecnica de Valencia, Spain

Alvaro Herrero, Universidad de Burgos, Spain

Jin Kocsis, University of Akron, USA

Esmond Ng, Lawrence Berkeley National Lab, USA

Dragan Simic, University of Novi Sad, Serbia

Ching-Lung Su, National Yunlin University of Science and Technology, Taiwan

Tomoaki Tsumura, Nagoya Institute of Technology, Japan

Krzysztof Walkowiak, Wroclaw University if Technology, Poland

Zi-Ang (John) Zhang, Binghamton University-SUNY, USA

Yunhui Zheng, IBM Research, USA

Hsi-Ya Chang, National Center for High-performance Computing, Taiwan

Chun-Yu Lin, HTC Corp., Taiwan

Nikzad Babaii Rizvandi, The University of Sydney, Australia

7. Service Dependability and Security in Distributed and Parallel Systems Track

Chairs:

Antonio Ruiz Martinez, University of Murcia, Spain

Jun Zhang, Deakin University, Australia

TPC members:

Jorge Bernal Bernabe, University of Murcia, Spain

Roberto Di Pietro, Universita di Roma Tre, Italy

Massimo Ficco, Second University of Naples(SUN), Italy

Yonggang Huang, Beijing Institute of Technology, China

Georgios Kambourakis, University of the Aegean, Greece

Muhammad Khurram Khan, King Saud University, Saudi Arabia

Liang Luo, Southwest University, China

Barbara Masucci, Universita di Salerno, Italy

Juan M. Marin, University of Murcia, Spain

Sabu M. Thampi, Indian Institute of Information Technology and Management - Kerala (IIITM-K), India

Fernando Pereniguez-Garcia, Catholic University of Murcia, Spain

Page 43: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

39

Yongli Ren, RMIT University, Australia

Yu Wang, Deakin University, Australia

Sheng Wen, Deakin University, Australia

Mazdak Zamani, Universiti Teknologi Malaysia, Malaysia

Susan K. Donohue, University of Virginia, USA

Oana Boncalo, University Politehnica Timisoara, Romania

KP Lam, University of Keele, UK

George Loukas, University of Greenwich, UK

Ugo Fiore, Federico II University, Italy

Christian Esposito, The UNiversity of Salerno, Italy

Arcangelo Castiglione, University of Salerno, Italy

Edward Jung, Kennesaw State University, USA

Md. ZakirulAlamBhuiyan, Central South University, China

Xiaofei Xing, Guangzhou Univers ity, China

Qin Liu, Hunan University, China

Wenjun Jiang, Hunan University, China

Gaocai Wang, Guangxi University, China

Kaimin Wei, Jinan University, China

8. Web Services and Internet Computing Track

Chairs:

Huansheng Ning, University of Science and Technology Beijing, China

Daqiang Zhang, Tongji University, China

TPC members:

Jing Chen, National Cheng Kung University, Taiwan

Eugen Dedu, University of Franche-Comte, France

Sotirios G. Ziavras, NJIT, USA

Luis Javier Garcia Villalba, Universidad Complutense de Madrid (UCM), Spain

Jaime Lloret, Universidad Politecnica de Valencia, Spain

Wei Lu, Keene University, USA

Stefano Marrone, Second University of Naples, Italy

Alejandro Masrur, Chemnitz University of Technology, Germany

Seungmin (Charlie) Rho, Sungkyul University, Korea

Giandomenico Spezzano, ICAR-CNR, Italy

Jiafu Wan, South China University of Technology, China

Yunsheng Wang, Kettering University, USA

Martine Wedlake, IBM, USA

Chung Wei-Ho, Research Center for Information Technology Innovation in Academia Sinica, Taiwan

Xingquan (Hill) Zhu, Florida Atlantic University, USA

Nikos Dimitriou, National Center for Scientific Research "Demokritos", Greece

Choi Jaeho, CBNU, Chonju, Korea

Shi-Jinn Horng, National Taiwan University of Science & Technology, Taiwan

9. Performance Modeling and Evaluation Track

Chairs:

Deze Zeng, China University of Geosciences, China

Bofeng Zhang, Shanghai University, China

TPC members:

Ladjel Bellatreche, ENSMA, France

Xiaoju Dong, Shanghai Jiao Tong University, China

Christian Engelman, Oak Ridge National Lab, USA

Javier Garcia Blas, University Carlos III, Spain

Mauro Iacono, Second University of Naples, Italy

Zhiyang Li, Dalian Maritime University, China

Tomas Margalef, Universitat Autonoma de Barcelona, Spain

Francesco Moscato, Second University of Naples, Italy

Heng Qi, Dalian University of Technology, China

Page 44: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

40

Bing Shi, Wuhan University of Technology, China

Magdalena Szmajduch, Cracow University of Technology, Poland

Qian Wang, Wuhan University, China

Zhibo Wang, Wuhan Univers ity, China

Weigang Wu, Sun Yat-sen University, China

David E. Singh, University Carlos III of Madrid, Spain

Edmund Lai, Massey University, New Zealand

Robert J. Latham, Argonne National Laboratory, USA

Zafeirios Papazachos, Queen's University of Belfast, UK

Novella Bartolini, Sapienza University of Rome, Italy

Takeshi Nanri, Kyushu University, Japan

Mais Nijim, Texas A&M University - Kingsville, USA

Salvador Petit, Universitat Politècnica de València, Spain

Daisuke Takahashi, University of Tsukuba, Japan

Cathryn Peoples, Ulster University, Northern Ireland, UK

Hamid Sarbazi-Azad, Sharif University of Technology and IPM, Iran

Md. Abdur Razzaque, University of Dhaka, Bangladesh

Angelo Brayner, University of Fortaleza, Brazil

Sushil Prasad, Georgia State University, USA

Danilo Ardagna, Politecnico di Milano, Italy

Sun-Yuan Hsieh, National Cheng Kung University, Taiwan

Li Chaoliang, Hunan University of Commerce, China

YongmingXie, Hunan Normal University, China

Guojun Wang, Central South University, China

Secretariats Zhe Tang, Central South University, China

Feng Wang, Central South University, China

Webmaster Xiangdong Lee, Central South University, China

Page 45: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

41

TrustData 2015 Organizing and Program Committees

Steering Co-Chairs Guojun Wang, Central South University, China

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

General Chairs Qin Liu, Hunan University, China

Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria

Program Chairs

Dr. Keqin Li, State University of New York at New Paltz, USA

Dr. Avinash Srinivasan, Temple University, USA

Publicity Chairs Shui Yu, Deakin University, Australia

Weirong Liu, Central South University, China

Program Committee (in alphabetical order) Andrei Tchernykh, CICESE Research Center, Mexico

Baoliu Ye, Nanjing University, China

Bimal Roy, Indian Statistical Institute, India

Chang-Ai Sun, University of Science and Technology, China

Chao Song, University of Electronic Science and Technology of China, China

Christian Callegari, The University of Pisa, Italy

Chunhua Su, Japan Advanced Institute of Science and Technology, Japan

Franco Chiaraluce, Polytechnical University of Marche (UVPM), Italy

Hai Jiang, Arkansas State University, United States

Horacio Gonzalez-Velez, National College of Ireland, Ireland

Imed Romdhani, Edinburgh Npier University, United Kingdom

Jianguo Yao, Shanghai Jiao Tong University, China

Joon S. Park, Syracuse University, United States

Kevin Chan, US Army Research Laboratory, United States

Lizhe Wang, Rochester Institute of Technology, United States

Masakazu Soshi, Hiroshima City University, Japan

Maurizio Atzori, University of Cagliari, Italy

Mehdi Kargahi, University of Tehran, Iran

Mingzhong Wang, Beijing Institute of Technology, China

Muneer Bani Yassein, Jordan University of Science and Technology, Jordan

Rajendra V. Boppana, UT San Antonio, USA

Robert C. H. Hsu, Chung Hua University, China

Ryan Ko, University of Waikato, New Zealand

Sherali Zeadally, University of the District of Columbia, United States

Tai-Hoon Kim, Sungshin W. University, South Korea

Toshihiro Yamauchi, Okayama University, Japan

Xin Liao, Hunan University, China

Yongdong Wu, Institute for Infocomm Research, Singapore

Young-Sik Jeong, Dongguk University, South Korea

Yu Hua, Huazhong University of Science and Technology, China

Yunsheng Wang, Kettering University, United States

Webmaster

Shan Peng, Central South University, China

Page 46: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

42

TSP 2015 Organizing and Program Committees

Program Chairs

Imad Jawhar, United Arab Emirates University, UAE

Deqing Zou, Huazhong University of Science of Technology

Program Committee Members (In alphabetical order)

Chao Song, University of Electronic Science and Technology, China

David Zheng, Frostburg State University,USA

Feng Li, Indiana University-Purdue University Indianapolis, USA

Haitao Lang, Beijing University of Chemical Technology, China

Huan Zhou, China Three Gorges University, China

Mingjun Xiao, University of Science and Technology of China, China

Mingwu Zhang, Hubei University of Technology, China

Shuhui Yang, Purdue University Calumet, USA

Xiaojun Hei, Huazhong University of Science and Technology, China

Xin Li, Nanjing University of Aeronautics and Astronautics, China

Xuanxia Yao, University of Science and Technology Beijing, China

Yaxiong Zhao, Google Inc., USA

YingDai, LinkedIn Corporation, United States

Yunsheng Wang, Kettering University, USA

Youwen Zhu, Nanjing University of Aeronautics and Astronautics, China

Yongming Xie, Changsha Medical University, China

Steering Committee

Wenjun Jiang, Hunan University, China (Chair)

Laurence T. Yang, St. Francis Xavier University, Canada

Guojun Wang, Central South University, China

Minyi Guo, Shanghai Jiao Tong University, China

Jie Li, University of Tsukuba, Japan

Jianhua Ma, Hosei University, Japan

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Indrakshi Ray, Colorado State University, USA

Kouichi Sakurai, Kyushu University, Japan

Bhavani Thuraisingham, The University of Texas at Dallas, USA

Jie Wu, Temple University, USA

Yang Xiang, Deakin University, Australia

Kun Yang, University of Essex, UK

Wanlei Zhou, Deakin University, Australia

Web Chair

Shan Peng, Central South University, China

Page 47: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

43

NOPE 2015 Organizing and Program Committees

Steering Committee Chairs

Wei Li, Texas Southern University, USA

Taoshen Li, Guangxi University, China

Program Chair

Gaocai Wang, Guangxi University, China

Program Committee Members

Dieter Fiems, Ghent University, Belgium

Shuqiang Huang, Jinan University, China

Juan F.Perez, Imperial College London, UK

Haoqian Wang, Tsinghua University, China

Yitian Peng, Southeast University, China

Hongbin Chen, Guilin University of Electronic Technology, China

Jin Ye, Guangxi University, China

Junbin Liang, Hong Kong Polytechnic University, Hong Kong

Xianfeng Liu, Hunan Normal University, China

Hao Zhang, Central South University, China

Chuyuan Wei, Beijing University of Civil Engineering and Architecture, China

Hongyun Xu, South China University of Technology, China

Zhefu Shi, University of Missouri, USA

Songfeng Lu, Huazhong University of Science & Technology, China

Yihui Deng, Jinan University, China

Lei Zhang, Beijing University of Civil Engineering and Architecture, China

Xiaoheng Deng, Central South University, China

Mingxing Luo, Southwest Jiaotong University, China

Bin Sun, Beijing University of Posts and Telecommunications, China

Zhiwei Wang, Nanjing University of Posts and Telecommunications,China

Yousheng Zhou,Chongqing University of Posts and Telecommunications,China

Daofeng Li, Guangxi University, China

Page 48: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

44

SCS 2015 Organizing and Program Committees

Steering Chairs

Jie Li, Tsukuba University, Japan

Dongqing Xie, Guangzhou University, China

Program Chairs

Xiaofei Xing, Guangzhou University, China

Md. Zakirul Alam Bhuiyan, Central South University, China, Temple University, USA

Program Committee Members (In alphabetical order)

Marco Aiello, University of Groningen, Netherlands

David Chadwick, University of Kent, UK

Aparicio Carranza, City University of New York, USA

Mooi Choo Chuah, Lehigh University, USA

Yueming Deng, Hunan Normal University, China

Christos Grecos, Independent Imaging Consultant, UK

Dritan Kaleshi, University of Bristol, UK

Donghyun Kim, North Carolina Central University, USA

Santosh Kumar, University of Memphis, USA

Muthoni Masinde, University of Nairobi, Kenya

Satyjayant Mishra, New Mexico State University, USA

Nam Nguyen, Towson University, USA

Jean-Marc Seigneur, University of Geneva, Switzerland

Hamid Sharif, University of Nebraska, USA

Sheng Wen, Deakin University, Australia

Publicity Chairs

Zeyu Sun, Xi'an Jiaotong University, China

Yongming Xie, Hunan Normal University, China

Page 49: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

45

SPPCN 2015 Organizing and Program Committees

General Chair Jian Weng, Jinan University, China

Program Chairs

Mianxiong Dong, Muroran Institute of Technology, Japan

Hua Guo, Beihang University, China

Tieming Chen, Zhejiang University of Technology, China

Kaimin Wei, Jinan University, China

Program Committee (in alphabetical order) Fuchun Guo, University of Wollongong, Austrilia

Jianguang Han, Nanjing University of Finance and Economics, Nanjing, China

Debiao He, Wuhan University, China

Xinyi Huang, Fujian Normal University, China

Xuanya Li, Chinese Academy of Sciences, China

Fengyong Li, Shanghai University of Electric Power, China

Changlu Lin, Fujian Normal University, China,

Chang Xu, Beijing Institute of Technology, China

Tao Xu, University of Jinan, China

Yanjiang Yang, I2R, Singapore

Yang Tian, Beihang University, China

Shengbao Wang, Hangzhou Normal University, China

Wei Wu, Fujian Normal University, China,

Xiyong Zhang, Information Engineering University, China

Lei Zhao, Wuhan University, China

Page 50: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

46

DependSys 2015 Organizing and Program Committees

Steering Committee Chairs

Jie Wu, Temple University, USA

Guojun Wang, Central South University, China

General Co-Chairs

Mohammed Atiquzzaman, University of Oklahoma, USA

Sheikh Iqbal Ahamed, Marquette University, USA,

Md Zakirul Alam Bhuiyan, Central South University, China, and Temple University, USA

Program Co-Chairs

Latifur Khan, The University of Texas at Dallas, USA

Joarder Kamruzzaman, Federation University and Monash University, Australia

Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia

Program Committee Members (in alphabetical order)

A. B. M Shawkat Ali, The University of Fiji, Fiji

A. B. M. Alim Al Islam, Bangladesh University of Engineering and Technology, Bangladesh

A. Sohel Ferdous, University of Western Australia, Australia

A.K.M. Najmul Islam, University of Turku, Finland

Abdul Azim Mohammad, Gyeongsang National University, South Korea

Abdur Rouf Mohammad, Dhaka University of Engineering & Technology, Bangladesh

Afrand Agah, West Chester University of Pennsylvania, USA

Andreas Pashalidis, Katholieke Universiteit Leuven - iMinds, Belgium

Asaduzzaman, Chittagong University of Engineering & Technology, Bangladesh

C. Chiu Tan, Temple University, USA

Changyu Dong, University of Strathclyde, Scotland

Dana Petcu, West University of Timisoara, Romania

Daqiang Zhang, Tongji University, China

Farzana Rahman, James Madison University, USA

Hugo Miranda, University of Lisbon, Portugal

Jaydip Sen, National Institute of Science & Technology, India

Jianfeng Yang, Wuhan University, China

Jinkyu Jeong, Sungkyunkwan University, South Korea

Kaoru Ota, Muroran Institute of Technology, Japan

Karampelas Panagiotis, Hellenic Air Force Academy, Greece

Lien-Wu Chen, Feng Chia University, Taiwan

Liu Jialin, Texas Tech University, USA

M. M. A. Hashem, Khulna University of Engineering and Technology, Bangladesh

M. Thampi Sabu, Indian Institute of Information Technology and Management, India

Mahbub Habib Sheikh, CASED/TU Darmstadt, Germany

Mahmuda Naznin, Bangladesh University of Engineering and Technology, Bangladesh

Mamoun Alazab, Australian National University, Australia

Manuel Mazzara, Innopolis University, Russia

Md. Abdur Razzaque, University of Dhaka, Bangladesh

Md. Arafatur Rahman, University Malaysia Pahang, Malaysia

Mohammad Asad Rehman Chaudhry, University of Toronto, Canada

Md. Obaidur Rahman, Dhaka University of Engineering & Technology, Bangladesh

Md. Rafiul Hassan, King Fahd University of Petroleum and Minerals, Saudi Arabia

Md. Saiful Azad, American International University, Bangladesh

Mehran Asadi, Lincoln University of Pennsylvania, USA

Mohamad Badra, Zayed University, UAE

Page 51: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

47

Mohamed Guerroumi, University of Sciences and Technology Houari Boumediene, Algeria

Mohammad Asadul Hoque, East Tennessee State University, USA

Mohammad Mehedi Hassan, King Saud University, KSA

Mohammad Shahriar Rahman, University of Asia Pacific, Bangladesh

Mohammed Shamsul Alam, International Islamic University Chittagong, Bangladesh

Morshed Chowdhury, Deakin University, Australia

Muhammad Mostafa Monowar, King AbdulAziz University, Saudi Arabia

N. Musau Felix, Kenyatta University, Kenya

Phan Cong, Vinh Nguyen Tat Thanh University, Vietnam

Qin Liu, Hunan University, China

Ragib Hasan, University of Alabama at Birmingham, USA

Raza Hasan, Middle East College, Oman

Reaz Ahmed, University of Waterloo, Canada

Risat Mahmud Pathan, Chalmers University of Technology, Sweden

S. M. Kamruzzaman, King Saud University, KSA

Salvatore Distefano, Politecnico di Milano, Italy

Shan Lin, Stony Brook University, USA

Shao Jie Tang, University of Texas at Dallas, USA

Sheng Wen, Deakin University, Australia

Shigeng Zhang, Central South University, China

Sk Md Mizanur Rahman, King Saud University, KSA

Subrota Mondal Hong Kong University of Science and Technology, Hong Kong

Syed Imran Ali, Middle East College, Oman

Tanveer Ahsan, International Islamic University Chittagong, Bangladesh

Tanzima Hashem, Bangladesh University of Engineering and Technology, Bangladesh

Tao li, The Hong Kong Polytechnic University, Hong Kong

Tarem Ahmed, BRAC University, Bangladesh

Tian Wang, Huaqiao University, China

Tzung-Shi Chen, National University of Tainan, Taiwan

Vaskar Raychoudhury, Indian Institute of Technology Roorkee, India

Wahid Khan, University of Saskatchewan, Canada

Weigang Li, University of Brasilia, Brazil

Weigang Wu, Sun Yat-sen University, China

William Liu, Auckland University of Technology, New Zealand

Xiaofei Xing, Guangzhou University, China

Xuefeng Liu, The Hong Kong Polytechnic University, Hong Kong

Xuyun Zhang, University of Melbourne, Australia

Yacine Djemaiel, Communication networks and Security, Res. Lab, Tunisia

Yifan Zhang, Binghamton University, USA

Yu Wang, Deakin University, Australia

Publication Co-Chairs

Jin Zheng, Central South University, China

Wenjun Jiang, Hunan University, China

Local Arrangement Co-Chairs

Fang Qi, Central South University, China

Qin Liu, Hunan University, China

Hongzhi Xu, Jishou University, China

Finance Co-Chairs

Pin Liu, Central South University, China

Wang Yang, Central South University, China

Web Chair Min Guo, Central South University, China

Page 52: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

48

Introduction to School of Information Science and Engineering of Central

South University

School of Information Science and Engineering (SISE) of Central South University was merged in June

2002 from School of Information Science and Engineering of the former Central South University of

Technology, School of Information Engineering of the former Changsha Railway University, and

Computer Center of the former Hunan Medical University.

Mr. Wang Yijun is the SISE Branch Party Secretary of the CSU Committee, and Mr. Zou Beiji is the Dean

of the School. At present, the School has around 300 staff and 4000 full-time undergraduate students and

2000 graduate students. The School is the largest one in terms of the total number of staff and students at

Central South University.

The disciplines and specialties of the School cover a wide range of subjects including Control Science and

Engineering, Computer Science and Technology, Electrical Engineering, Information and Communication

Engineering, Electronic Science and Technology, Systems Science, and Transportation Information

Engineering and Control. Currently, the School has 2 First-Level Disciplines and 9 Second-Level

Disciplines which have been authorized to grant doctorate degrees, as well as 2 National Key Disciplines,

3 Hunan Provincial Key Disciplines, 2 Postdoctorate Centers, and 3 Provincial Research and Development

Centers.

At present, the School stands in the front end of the privileged disciplines in the world. It is committed to

serving our society through the joint efforts of its staff and students. We are striving to build a group of

information disciplines to be recognized as a first-level training base in China and an advanced training

base in the world as well.

Quick Links:

SISE of Central South University: http://sise.csu.edu.cn/

Trusted Computing Institute of Central South University: http://trust.csu.edu.cn/

Page 53: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

49

Introduction to School of Software and Service Outsourcing of Jishou

University

School of Software and Service Outsourcing of Jishou University is a public full-time second-class

undergraduate college in accordance with exemplary software service outsourcing college model, located

in the beautiful tourist city---Zhangjiajie. With excellent faculty, advanced practice teaching platform,

first-class learning environment for software and information technology outsourcing and other high-tech

industries, the school has created senior software quality talents with solid basic knowledge of software

engineering, excellent software development technique, skilled experienced software engineering practices,

and software engineering comprehensive quality.

The school adheres to the development idea of "emphasizing engineering education, highlighting the

application-oriented institute". It has established the talent cultivation positioning of "training the senior

software engineers within the industry, facing the country, and serving the world". Through

school-enterprise cooperation, Sino-foreign cooperation, the combination of

government-industry-study-research, the school has high academic, rich engineering experienced, stable

professional teachers, including 8 professors, 15 PhD, 35 senior software engineers, and project managers.

The school has the dominant course laboratory jointly built by central and local government, the

appropriated fund laboratory through the program of the central government supporting the development

of the local university, Hunan province training base for service outsourcing talents, joint school-enterprise

training center for software engineering, the training base for software engineering college students

designated by the Ministry of Education, and other high-level modern practice teaching platform, the

laboratory owns 1340 sets of equipment, with a total value of about RMB18 million.

Quick Link:

School of Software and Service Outsourcing of Jishou University: http://rjxy.jsu.edu.cn/

Page 54: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

Map of Conference Venue

Zhangjiajie International Hotel, Zhangjiajie, China - A Quasi Five-Star Hotel

(张家界国际大酒店)

Address: 145 Sanjiao Ping, Zhangjiajie, Hunan, China

http://www.zjjihotel.com/

Public Transportation

(1) From Zhangjiajie Hehua Airport (also called Dayong Airport, IATA code: DYG) to Zhangjiajie International

Hotel: Take a taxi (around RMB40); or first take a bus #4 (get off at BIANMAO station), then take a bus #2 (get off

at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

张家界荷花国际机场到张家界国际大酒店:大约 8 公里,乘坐 4 路公交车到边贸,再转乘 2 路公交车到三角

坪,再步行 600 米到酒店,或乘坐的士(约 40 元);返程类似。

(2) From Zhangjiajie Railway Station to Zhangjiajie International Hotel: Take a taxi (around RMB35-40); or take a

bus #6 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

张家界火车站到张家界国际大酒店:大约 10 公里,乘坐 6 路公交车到三角坪,再步行 600 米到酒店,或乘

坐的士(约 35-40 元);返程类似。

Page 55: The 15th International Conference on Algorithms and ...trust.csu.edu.cn/conference/ICA3PP2015/program.pdf · who will attend the conference, our cordial welcome and great gratitude.

ICA3PP 2015 Sponsors and Organizers