Home | Committee | Program | Venue | Keynotes | Registration | Tourism ATC2010


Papers accepted for the ATC-09 workshops

Please use the workshop abbreviation (e.g. MANS) and the paper id when registering your paper.

CPSC

Paper ID Authors ,Title
2 Youling Zhou, Wenjin Liu, Benxiong Huang, Angli Liu. A Duty Cycle Adaptive Algorithm Based on Throughput
4 Hong Feng Lai. Hidden Community Mining Under the RST/POSL Framework
6 Marius Bujorianu, Manuela Bujorianu, Howard Barringer. Uncertain and Human Centric Modelling of Cyber-physical Systems
7 Zhihua Gao, Kerong Ben, Lilin Cui. Underwater Vehicle Noise Source Recognition Using Structure Dynamic Adjustable SVM
8 Hao Wang, Furong Wang, Zhe Guo, Lai Tu. Measurement and Feedback Scheme for CAC in Cellular Networks
10 Jian Zhang, Wanhua Cao, Huan Zhang, Li Feng. A Distributed IPS Model Based On Neighbor Distance
15 Kewei Li, Furong Wang, Xu Xie, Hao Wang. Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems
17 Furong wang, Chen Huang, Juan He, Chunming Rong. A Novel Relay Encryption Scheme for Mobile Ad hoc Networks
18 Jiaping Liao, Bo Fu, Yu Chen. On-line Fault Diagnosis Model of the Hydropower Units Based on MAS
20 Ma Zen, Hu Jun, Zhao Shi. Mobile Network Optimization Using Fuzzy Case-based Reasoning for GSM
21 Guanfeng Liu, Yan Wang, Lei Li. Trust in the Web-based Social Networks
22 Sarah Eljack. Synchronized Multi- channel Cognitive MAC protocol with reliable neighboring discovery
23 Bin Xie, Anup Kumar, Padmanabhan Ramaswamy, Laurence T. Yang. Social Behavior Association and Influence in Social Networks
25 Yu Changrong, Zhou Jiehan. Expression and Analysis of Emotions: Survey and Experiment
27 Murthy V.K., Krishnamurthy E.V.. In silico Consciousness: The Goal of Ambient Intelligent Computing

 

CTC

Paper ID Authors ,Title
2 Julian Jang. A Trust Enhanced Email Application using Trusted Computing
3 Paul Watters. Data Loss in the British Government: A Bounty of Credentials for Organised Crime
4 Amber Stabek, Simon Brown and Paul Watters. The Case for a Consistent Cyberscam Classification Framework (CCCF)
5 Liping Ma, Bahadorrezda Ofoghi, Paul Watters and Simon Brown. Detecting Phishing Emails Using Hybrid Features
6 Robert Layton and Paul Watters. Using differencing to increase distinctiveness for phishing website clustering
7 Manuel Aston, Stephen McCombie, Ben Reardon and Paul Watters. A Preliminary Profiling of Internet Money Mules: An Australian Perspective
8 Xuefeng Li, Haixin Duan and Wu Liu. UNDERSTANDING THE CONSTRUCTION MECHANISM OF BOTNETS
9 Hong Zhang, Haixin Duan, Wu Liu and Jianping Wu. IPGroupRep: A Novel Reputation based System for Anti-Spam
10 Wu Liu. H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy
12 Man Qi. Spam and Social Effects

 

MANS

Paper ID Authors ,Title
1 Zhang, Junzhou Luo, and Ming Yang. An Improved DSSS-Based Flow MarkingTechnique for Anonymous Communication Traceback
2 Lai Tu, Fan Zhang, Furong Wang. A Random Group Mobility Model for Mobile Networks
3 Jiehan Zhou and Changrong Yu. Frontier research on pervasive emotion computing
4 Shen Ling and Wu Wei. Fault-Tolerant K-Connectivity Overlay for Unstructured P2P Network
5 Laiping Zhao, Mingchu Li. Kouichi SAKURAI and Yizhi Ren. The Optimal Choice by Resource Consumers in Grid Market
6 Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo and Kouichi Sakurai. Enhancing Cooperative Behavior for P2P Reputation Systems by GroupSelection
9 Jakob Salzmann, Ralf Behnke, Martin Gag and Dirk Timmermann. 4-MASCLE - Improved Coverage Aware Clustering with Self Healing Abilities
13 Cong Sun, Liyong Tang and Zhong Chen. Secure Information Flow by Model Checking Pushdown System
14 Bo Zong, Feng Xu, Jing Pan and Jian Lv. Comparing Information Collection Strategies of Trust-Based Reputation Systems in Open Environment
15 Junaid Chaudhry. Autonomic Fault Identification for Self Healing Systems
16 Manuel Nickschas and Uwe Brinkschulte. Decentralized Task Allocation in an Organic Real-Time Middleware -- An Auction-Based Approach

 

UFirst

Paper ID Authors ,Title
5 Ying-Hong Wang, Kuo-Feng Huang and Ting-Wei Chang. An Efficient Mechanism for Mobile Target Tracking in Grid-based Wireless Sensor Networks
10 Hung-Yu Chien, Chieh-Shian Tu and Tzong-Chen Wu. Gen 2-based, Anonymous Authentication scheme
13 Mainetti and Antonio Tamborino. MoWeT: a Configurable Framework for Location-Aware Applications
17 Grigoris Antoniou and Dimitris Plexousakis. Exploiting Semantics for Indoor Navigation and User-Tracking
20 Fano Ramparany and Yazid Benazzouz. Agenda driven home automation - Towards high level context aware systems
26 Nicolai Kuntze and Carsten Rudolph. Trust in Distributed small sized Data Centers
27 Qianping WANG. A Routing Algorithm Based on Mobile Agent for Mine Monitoring
28 Touhid Bhuiyan and Audun Josang. An Analysis of Trust Transitivity Taking Base Rate into Account
29 Yuanyuan Cao, Linmi Tao and Guangyou Xu. An Event-driven Context Model in Elderly Health Monitoring
32 Kenta Cho, Naoki Iketani, Hisao Setoguchi and Masanori Hattori. Human Activity Recognizer for Mobile Devices with Multiple Sensors
35 Marcin Krol and Janusz Sosnowski. Multidimensional monitoring of computer systems
38 Jia Hou. Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless Networking
42 Hyeong-Joon Kwon, Tae-Hoon Lee, Jung-Hyun Kim and Kwang-Seok Hong. Improving Prediction Accuracy Using Entropy Weighting in Collaborative Filtering
50 Wendy M. Maiden, Jereme N. Haack, Glenn A. Fink, David McKinnon, and Errin W. Fulp. Trust Management in Swarm-Based Autonomic Computing Systems
52 Nairon S. Viana, Orlewilson B. Maia and Vicente F. Lucena Jr.. Using the iDTV for Managing Services in the Ubiquitous Computing Environment
54 Mauro Marcelo Mattos. Ubiquitous Computing and Time Dimension
55 Nils Müllner, Abhishek Dhama, and Oliver Theel. Deriving a Good Trade-off Between the System Availability and Time Redundancy
56 Che-Jen Chen, Lee-Kuo Lin and Wei-Shen Wu. An Automatic Algorithm of Dangerous Construction Warning System
68 Sang-Hyeon Jin, Dong-Ju Kim, Chee-Hyun Park and Kwang-Seok Hong. User Location Estimation based on Stereo Audio-Vision
69 Jun-Hong Lu, Chiung-Ying Wang and Ren-Hung Hwang. An Open Framework for Distributed Context Management in Ubiquitous Environment
80 Fiona Redhead, Dekker Andrew and Brereton Margot. A Situated Display for Local Community Participation: The Design and Use of Nnub
87 Ahmet Soylu, Patrick De Causmaecker and Piet Desmet. Context and Adaptivity in Pervasive Computing Systems: Links with Application Development and Ontological Engineering
89 Shivanajay Marwaha, Jadwiga Indulska and Marius Portmann. Biologically Inspired Ant-Based Routing In Mobile Ad hoc Networks (MANET): A Survey
91 Youssef ROUMMIEH and Parisa GHODOUS. Adaptive Interface for Collaborative Environment - AICE