Papers accepted for the ATC-09 workshops
Please use the workshop abbreviation (e.g. MANS) and the paper id when registering your paper.
CPSC
Paper ID | Authors ,Title |
2 | Youling Zhou, Wenjin Liu, Benxiong Huang, Angli Liu. A Duty Cycle Adaptive Algorithm Based on Throughput |
4 | Hong Feng Lai. Hidden Community Mining Under the RST/POSL Framework |
6 | Marius Bujorianu, Manuela Bujorianu, Howard Barringer. Uncertain and Human Centric Modelling of Cyber-physical Systems |
7 | Zhihua Gao, Kerong Ben, Lilin Cui. Underwater Vehicle Noise Source Recognition Using Structure Dynamic Adjustable SVM |
8 | Hao Wang, Furong Wang, Zhe Guo, Lai Tu. Measurement and Feedback Scheme for CAC in Cellular Networks |
10 | Jian Zhang, Wanhua Cao, Huan Zhang, Li Feng. A Distributed IPS Model Based On Neighbor Distance |
15 | Kewei Li, Furong Wang, Xu Xie, Hao Wang. Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems |
17 | Furong wang, Chen Huang, Juan He, Chunming Rong. A Novel Relay Encryption Scheme for Mobile Ad hoc Networks |
18 | Jiaping Liao, Bo Fu, Yu Chen. On-line Fault Diagnosis Model of the Hydropower Units Based on MAS |
20 | Ma Zen, Hu Jun, Zhao Shi. Mobile Network Optimization Using Fuzzy Case-based Reasoning for GSM |
21 | Guanfeng Liu, Yan Wang, Lei Li. Trust in the Web-based Social Networks |
22 | Sarah Eljack. Synchronized Multi- channel Cognitive MAC protocol with reliable neighboring discovery |
23 | Bin Xie, Anup Kumar, Padmanabhan Ramaswamy, Laurence T. Yang. Social Behavior Association and Influence in Social Networks |
25 | Yu Changrong, Zhou Jiehan. Expression and Analysis of Emotions: Survey and Experiment |
27 | Murthy V.K., Krishnamurthy E.V.. In silico Consciousness: The Goal of Ambient Intelligent Computing |
CTC
Paper ID | Authors ,Title |
2 | Julian Jang. A Trust Enhanced Email Application using Trusted Computing |
3 | Paul Watters. Data Loss in the British Government: A Bounty of Credentials for Organised Crime |
4 | Amber Stabek, Simon Brown and Paul Watters. The Case for a Consistent Cyberscam Classification Framework (CCCF) |
5 | Liping Ma, Bahadorrezda Ofoghi, Paul Watters and Simon Brown. Detecting Phishing Emails Using Hybrid Features |
6 | Robert Layton and Paul Watters. Using differencing to increase distinctiveness for phishing website clustering |
7 | Manuel Aston, Stephen McCombie, Ben Reardon and Paul Watters. A Preliminary Profiling of Internet Money Mules: An Australian Perspective |
8 | Xuefeng Li, Haixin Duan and Wu Liu. UNDERSTANDING THE CONSTRUCTION MECHANISM OF BOTNETS |
9 | Hong Zhang, Haixin Duan, Wu Liu and Jianping Wu. IPGroupRep: A Novel Reputation based System for Anti-Spam |
10 | Wu Liu. H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy |
12 | Man Qi. Spam and Social Effects |
MANS
Paper ID | Authors ,Title |
1 | Zhang, Junzhou Luo, and Ming Yang. An Improved DSSS-Based Flow MarkingTechnique for Anonymous Communication Traceback |
2 | Lai Tu, Fan Zhang, Furong Wang. A Random Group Mobility Model for Mobile Networks |
3 | Jiehan Zhou and Changrong Yu. Frontier research on pervasive emotion computing |
4 | Shen Ling and Wu Wei. Fault-Tolerant K-Connectivity Overlay for Unstructured P2P Network |
5 | Laiping Zhao, Mingchu Li. Kouichi SAKURAI and Yizhi Ren. The Optimal Choice by Resource Consumers in Grid Market |
6 | Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo and Kouichi Sakurai. Enhancing Cooperative Behavior for P2P Reputation Systems by GroupSelection |
9 | Jakob Salzmann, Ralf Behnke, Martin Gag and Dirk Timmermann. 4-MASCLE - Improved Coverage Aware Clustering with Self Healing Abilities |
13 | Cong Sun, Liyong Tang and Zhong Chen. Secure Information Flow by Model Checking Pushdown System |
14 | Bo Zong, Feng Xu, Jing Pan and Jian Lv. Comparing Information Collection Strategies of Trust-Based Reputation Systems in Open Environment |
15 | Junaid Chaudhry. Autonomic Fault Identification for Self Healing Systems |
16 | Manuel Nickschas and Uwe Brinkschulte. Decentralized Task Allocation in an Organic Real-Time Middleware -- An Auction-Based Approach |
UFirst
Paper ID | Authors ,Title |
5 | Ying-Hong Wang, Kuo-Feng Huang and Ting-Wei Chang. An Efficient Mechanism for Mobile Target Tracking in Grid-based Wireless Sensor Networks |
10 | Hung-Yu Chien, Chieh-Shian Tu and Tzong-Chen Wu. Gen 2-based, Anonymous Authentication scheme |
13 | Mainetti and Antonio Tamborino. MoWeT: a Configurable Framework for Location-Aware Applications |
17 | Grigoris Antoniou and Dimitris Plexousakis. Exploiting Semantics for Indoor Navigation and User-Tracking |
20 | Fano Ramparany and Yazid Benazzouz. Agenda driven home automation - Towards high level context aware systems |
26 | Nicolai Kuntze and Carsten Rudolph. Trust in Distributed small sized Data Centers |
27 | Qianping WANG. A Routing Algorithm Based on Mobile Agent for Mine Monitoring |
28 | Touhid Bhuiyan and Audun Josang. An Analysis of Trust Transitivity Taking Base Rate into Account |
29 | Yuanyuan Cao, Linmi Tao and Guangyou Xu. An Event-driven Context Model in Elderly Health Monitoring |
32 | Kenta Cho, Naoki Iketani, Hisao Setoguchi and Masanori Hattori. Human Activity Recognizer for Mobile Devices with Multiple Sensors |
35 | Marcin Krol and Janusz Sosnowski. Multidimensional monitoring of computer systems |
38 | Jia Hou. Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless Networking |
42 | Hyeong-Joon Kwon, Tae-Hoon Lee, Jung-Hyun Kim and Kwang-Seok Hong. Improving Prediction Accuracy Using Entropy Weighting in Collaborative Filtering |
50 | Wendy M. Maiden, Jereme N. Haack, Glenn A. Fink, David McKinnon, and Errin W. Fulp. Trust Management in Swarm-Based Autonomic Computing Systems |
52 | Nairon S. Viana, Orlewilson B. Maia and Vicente F. Lucena Jr.. Using the iDTV for Managing Services in the Ubiquitous Computing Environment |
54 | Mauro Marcelo Mattos. Ubiquitous Computing and Time Dimension |
55 | Nils Müllner, Abhishek Dhama, and Oliver Theel. Deriving a Good Trade-off Between the System Availability and Time Redundancy |
56 | Che-Jen Chen, Lee-Kuo Lin and Wei-Shen Wu. An Automatic Algorithm of Dangerous Construction Warning System |
68 | Sang-Hyeon Jin, Dong-Ju Kim, Chee-Hyun Park and Kwang-Seok Hong. User Location Estimation based on Stereo Audio-Vision |
69 | Jun-Hong Lu, Chiung-Ying Wang and Ren-Hung Hwang. An Open Framework for Distributed Context Management in Ubiquitous Environment |
80 | Fiona Redhead, Dekker Andrew and Brereton Margot. A Situated Display for Local Community Participation: The Design and Use of Nnub |
87 | Ahmet Soylu, Patrick De Causmaecker and Piet Desmet. Context and Adaptivity in Pervasive Computing Systems: Links with Application Development and Ontological Engineering |
89 | Shivanajay Marwaha, Jadwiga Indulska and Marius Portmann. Biologically Inspired Ant-Based Routing In Mobile Ad hoc Networks (MANET): A Survey |
91 | Youssef ROUMMIEH and Parisa GHODOUS. Adaptive Interface for Collaborative Environment - AICE |