Systems (NBiS 2012) · 2012 15thInternational ConferenceonNetwork-Based InformationSystems...
Transcript of Systems (NBiS 2012) · 2012 15thInternational ConferenceonNetwork-Based InformationSystems...
2012 15th International
Conference on Network-Based
Information Systems
(NBiS 2012)
Melbourne, Australia
26 - 28 September 2012
IEEE IEEE Catalog Number:ISBN:
CFP1259H-PRT
978-1-4673-2331-4
2012 15th International Conference
on Network-Based Information Systems
NBiS 2012
Table of Contents
Welcome Message from NBiS 2012 General Co-Chairs xix
Welcome Message from NBiS 2012 Program Committee Co-Chairs xx
Welcome Message from NBiS Steering Committee Co-Chairs xxi
Welcome Message from Workshops Co-Chairs of NBiS 2012 xxii
Keynote 1 N/A
Keynote 2 xxiv
NBiS 2012 Organizing Committee xxv
Reviewers xxx
ADPNA 2012 Welcome Message xxxi
ADPNA 2012 Committee xxxii
ADPNA 2012 Reviewers xxxiii
CPSAT 2012 Welcome Message xxxiv
CPSAT 2012 Committee xxxv
CPSAT 2012 Reviewers xxxvi
DEMoC 2012 Welcome Message xxxvii
DEMoC 2012 Committee xxxviii
DEMoC 2012 Reviewers xxxix
HETNET 2012 Welcome Message xl
HETNET 2012 Committee xli
HETNET 2012 Reviewers xlii
INVITE 2012 Welcome Message N/A
INVITE 2012 Committee xliv
INVITE 2012 Reviewers xlv
INWC 2012 Welcome Message xlvi
INWC 2012 Committee. xlvii
INWC 2012 Reviewers N/A
ISSE 2012 Welcome Message xlvix
ISSE 2012 Committee 1
ISSE 2012 Reviewers 11
ITIS 2012 Welcome Message 1"
ITIS 2012 Committee N/A
V
ITIS 2012 Reviewers liv
MCCTA 2012 Welcome Message lv
MCCTA 2012 Committee. lvi
MCCTA 2012 Reviewers N/A
NeoFUSION 2012 Welcome Message lviii
NeoFUSION 2012 Committee lvix
NeoFUSION 2012 Reviewers lx
TwC 2012 Welcome Message N/A
TwC 2012 Committee lxii
TwC 2012 Reviewers lxiii
WReCS 2012 Welcome Message....... lxiv
WReCS 2012 Committee N/A
WReCS 2012 Reviewers. lxvi
WSSM 2012 Welcome Message lxvii
WSSM 2012 Committee lxviii
WSSM 2012 Reviewers bdx
Session 1A: Cloud and Scalable Computing
Reducing Power Consumption and Improving Quality of Service in Cloud Computing
Environments 1
Yuuki Awano and Shin-ichi Kuribayashi
Multitenancy - Security Risks and Countermeasures 7
WayneJ. Brown, Vince Anderson, and Qing Tan
The Cloud Computing Applications in Information Resource Dynamic Allocation 14
Hui Ma and Yue Qiu
Cloud Computing: Architecture for Efficient Provision of Services 18
Nawsher Khan, A. Noraziah, Tutut Herawan, Elrasheed Ismail, and Zakira Inayat
Session IB: Data Management
Single Transition Constraint for XML Update Validation 24
Norfaradilla Wahid and Eric Pardede
Integration ofData Warehouse and Unstructured Business Documents 32
AhmadAbdullah Alqarni andEric Pardede
Indexing Moving Objects in Indoor Cellular Space 38
Sultan Alamri, David Taniar, and Maytham Safar
Database Research: Are We at a Crossroad? Reflection on NoSQL 45
Maria Indrawan-Santiago
vi
Session 2A: P2P Computing and Networks
Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar 52
JoanArnedo-Moreno, Noemt Perez-Gilabert, and Marc Domingo-Prieto
Trustworthy Group Formation Algorithm Based on Decentralized Trust Management
in Distributed Systems 58
Ailixier Aikebaier, TomoyaEnokido, and Makoto Takizawa
Dynamic Reconfiguration ofChord Ring Based on Physical Network and Finger Table
Information 66
Yuta Shimano andFumiaki Sato
A Chunk Scheduling Based on Chunk Diffusion Ratio on P2P Live Streaming 74
Yoshiki Sakata, Kazuyuki Takayama, Rei Endo, and Hiroshi Shigeno
Session 2B: Intelligent Systems and Networking
Estimating the Number of Lanes on Rapid Road Map Survey System Using GPS
Trajectories as Collective Intelligence 82
Nobuyoshi Sato, Tsuyoshi Takayama, and Yoshitoshi Murata
Local Area Network Reactivation in Never Die Network for a Large Scale Disaster 89
Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata, andNorio Shiralori
Performance Evaluation of DYMO Protocol in Different VANET Scenarios 97
Evjola Spaho, Makoto Ikeda, Leonard Barolli, FatosXhafa, Aleksander Biberaj,
and Makoto Takizawa
Integrating Information Systems Business Rules into a Design Model 104
Mohammed Bonais, Wenny Rahayu, and Eric Pardede
Session 3A: Distributed Computing and Networking
The Extended Transmission Power Consumption Model for Communication-Based
Applications 112
Tomoya Enokido andMakoto Takizawa
Evaluation of an Energy-Aware Selection Algorithm for Computation
and Storage-Based Applications 120
Takuro Inoue, Ailixier Aikebaier, Tomoya Enokido, and Makoto Takizawa
RAIDv: Extensible RAID1 Based on Voting 128
Minoni Uehara
Session 3B: Mobile Ad Hoc Networks
A Comparative Study of a MANET Testbed Performance in Indoor and Outdoor Stairs
Environment 134
Masahiro Hiyama, Elis Kutla, Makoto Ikeda, Leonard Barolli, and Muhammad Younas
vii
Simulation Performance of a MANET Using Static Source and Destination
Considering AODV Routing Protocol 141
Elis Kulla, Makoto Ikeda, Leonard Barolli, Muhammad Younas, Kazunori Uchida,
and Makoto Takizawa
An Implementation ofVisualization System for Visualizing Network Topology
and Packet Flow in Mobile Ad Hoc Networks 148
Akio Koyama, ShoheiSato, Leonard Barolli, andMakoto Takizawa
TCP Congestion Control in MANETs for Multiple Traffic Considering Proactive
and Reactive Routing Protocols 156
Makoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Muhammad Younas,
and Makoto Takizawa
Session 4A: Multimedia Systems and Applications
Design and Evaluation of Multimedia Quorum-Based Synchronization Protocols 164
Tadatem Ohkawara, Ailixier Aikebaier, Tomoya Enokido, and Makoto Takizawa
Geological Visualisation with Augmented Reality 172
Dylan Mathiesen, Trina Myers, IanAtkinson, andJarrod Trevathan
Extending Service Coverage Using FGS-Aware Blind Repetition 180
Juyoung Park, Jaemyoun Lee, Junbeom Hur, andKyungtae Kang
Evaluation of a Seamless Surveillance Video Monitoring System Used by High-SpeedNetwork and High-Resolution Omm-directional Cameras 187
Takuma Kon, Noriki Uchida, Koji Hashimoto, and Yoshitaka Shibata
Session 4B: Wireless Sensor Networks
A Boundary Node Detection Based Solution for Minimizing the Effects ofNodes
Distribution over Key Exchange in Group Based WSN 194
Rabia LatifandAsadRaza
Energy-Efficient Data Gathering Using Traffic Reduction Based on Change in Data
Characteristics in Wireless Sensor Networks 200
Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara, and Shojiro Nishio
A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor
Networks 208
Qi Wang, Leonard Barolli, Elis Kulla, Arjan Durresi, Aleksander Biberqj, and Makoto Takizawa
Node Placement in WMNs and Visualization of Evolutionary Computation Process
Using WMN-GA System 214
Tetsuya Oda, Admir Barolli, Evjola Spaho, Leonard Barolli, FatosXhafa, and Jiro Iwashige
viii
Session 5A: Social Networks
Mobile Social Game Design from the Perspective ofPersuasive Technology ..221
Toshihiko Yamakami
Transition Analysis ofMobile Social Games from Feature-Phone to Smart-Phone 226
Toshihiko Yamakami
Feedback Capacity ofRandom Networks 231
Maytham Safar, Khaled Mahdi, and Ghufran Al-Shiridah
Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks 239
Alan Chia-Lung Chen, Mohamad Elzohbi, AhmedElhajj, Konstantinos F. Xylogiannopoulos,
Panagiotis Karampelas, MickRidley, andReda Alhajj
Session 5B: Secure Systems and Networks
TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones 247
Ingo Bente, Bastion Hellmann, Joerg Vieweg, Josefvon Helden, and Gabi Dreo
Vulnerability Analysis ofRelay Set Selection Algorithms for the Simplified Multicast
Forwarding (SMF) Protocol for Mobile Ad Hoc Networks 255
Jiazi Yi and Thomas Clausen
A Proposal of Security Advisory System at the Time ofthe Installation of Applications
on Android OS 261
Takayuki Matsudo, Eiichiro Kodama, Jiahong Wang, and Toyoo Takata
Session 6A: Communication Networks and Protocols
Theoretical Suggestion of Policy-Based Wide Area Network Management System
(wDACS System Part-I) 268
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, and Makoto Takizawa
The QoS-Aware Order Prediction Scheduling (QOPS) Scheme for Video Streaming
Using the Multi-path Datagram Congestion Control Protocol (MP-DCCP) 276
Chung-Ming Huang, Yih-Chung Chen, and Shih-YangLin
Application Layer Traffic Engineering for Multipoint Communication System 284
Yumi Nakayama, Katsuhiko Kaji, andNobuo Kawaguchi
Proposal and Evaluation ofAnt-Based Routing with Autonomous Zoning
for Convergence Improvement 290
Naomi Kuze, Naoki Wakamiya, and Masayuki Murata
Session 6B: Web and Internet Applications
A Mechanism ofTrailing the Footprint for the Previously Visited Web Pages to Ease
a Meta-Knowledge-Based Search 298
Keizo Sato, Yoshitaka Adachi, Makoto Nakashima, and Tetsuro Ito
ix
Building an Information System for Reality Mining Based on Communication Traces 306
Matthias Steinbauer and Gabriele Kotsis
Riskr: A Low-Technological Web2.0 Disaster Service to Monitor and Share
Information 311
Jess Farber, Trina Myers, Jarrod Trevathan, Ian Atkinson, and Trevor Andersen
Community Site for Music Therapists Based on the Session Records ofMusic Therapy 319
Naoko Kosugi andMayu Kondo
Session 7A: Mobile and Wireless Networks
An Interface for Simulating Node Placement in Wireless Mesh Networks 326
FatosXhafa, Albert Bravo, Admir Barolli, andMakoto Takizawa
Effects of Directional Receiving for MAC-Level Broadcasting on Wireless Ad Hoc
Networks ..334
Tetsuya Shigeyasu andHiroshi Matsuno
Performance Evaluation of WSNs Considering MAC and Routing Protocols Using
Goodput and Delay Metrics 341
Tao Yang, Elis Kulla, Tetsuya Oda, Leonard Barolli, Muhammad Younas, and Makoto Takizawa
Dynamic Superframe Selection Scheme for High-Speed Wireless Networks 349
Suhaimi Bin Abd LatifandMohammadAbdur Rashid
Session 7B: Ubiquitous and Pervasive Computing Applications
Building and Evaluating a Mobile Application for an Academic Library 357
Stan Kurkovsky and Wittawat Meesangnil
A Handling Management System for Freight with the Ambient Calculus and UHF
RFID Tags 364
Tom Kato and Masahiro Higuchi
General Pattern Discovery for Social Game on Facebook 372
Martin M. Weng, Guangyu Piao, Neil Y. Yen, and Timothy K. Shih
Session 8A: Secure Systems and Trust Management
On Remote Attestation for Google Chrome OS 376
Ingo Bente, Bastian Hellmann, Thomas Rossow, Joerg Vieweg, andJosefvon Helden
Robust Biometrics-Based Remote User Authentication Scheme Using Smart Cards 384
Toan Thinh Truong, Minh-Triet Tran, andAnh-DucDuong
Trust Management of Social Networks in Health Care 392
Pawat Chomphoosang, Arjan Durresi, Mimoza Durresi, andLeonard Barolli
x
ADPNA 2012
Session: Distributed Networks and Applications
Ordered Delivery ofMessages in Group Communication Protocols 397
Dilawaer Duolihm, Ailixier Aikebaier, Tomoya Enokido, andMakoto Takizawa
Trustworthiness of Peers in P2P Overlay Networks 402
Ailixier Aikebaier, Tomoya Enokido, and Makoto Takizawa
An Approach Mining Cyclic Association Rules in E-Commerce 408
Nguyen Dinh Thuan, Nguyen Gia Toan, and Nguyen Lam Vu Tuan
Online Slicing Analysis in Adverse Drug Reaction Data Warehouse 412
Xiuzhen Feng, XiaohongHe, and Bianling Feng
CPSAT 2012
Session 1: Cyber-Physical Systems and Cloud Web Services
Cyber-Physical Systems as an Enabler for Next Generation Applications 417
Jaipal Singh and OmarHussain
PID Controller for Temperature Control with Multiple Actuators in Cyber-PhysicalHome System 423
Wai Wai Shein, Yasno Tan, andAzman Osman Lim
Detecting and Mitigating HX-DoS Attacks against Cloud Web Services 429
Ashley Chonka and Jemal Abawajy
Session 2: Sensor Networks and Healthcare Systems
jxSensor: A Sensor Network Integration Layer for JXTA 435
Marc Domingo-Prieto, Joan Arnedo-Moreno, andXavi Vilajosana-Guillen
Empirical Study of Decision Trees and Ensemble Classifiers for Monitoring
ofDiabetes Patients in Pervasive Healthcare 441
A.V. Kelarev, A. Slranieri, J.L. Yearwood, andH.F. Jelinek
Establishing Context for Software Agents in Pervasive Healthcare Systems 447
Cedric Perrot, Gavin Finnie, andIain Morrison
DEMoC 2012
Session: Content Delivery Scheduling and Broadcasting Systems
A Scheduling Scheme for Improving Error Resilience on Media Data Broadcasting 453
Yusuke Gotoh andHideo Taniguchi
Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling 459
Yuuki Furukawa, Toshihiro Yamauchi, and Hideo Taniguchi
xi
TeleCaS: Division Based Broadcasting System Considering Sequential Playback 465
Akihiro Kimura, Yusuke Gotoh, andHideo Tanigiichi
Video Data Reception Methods Considering Playing Position on Hybrid BroadcastingEnvironments 471
Tomoki Yoshihisa and Shojiro Nishio
HETNET 2011
Session 1: Heterogeneous Networking and Applications
A Novel Server System to Support Different Types of Communication Services
for Applications .477
J. Elton andP.W.H. Chung
Crowdsourcing in Heterogeneous Networked Environments - Opportunitiesand Challenges 483
AxelKorthaus and Wei Dai
Intelligent Cargo Tracking System Based on the Internet of Things 489
Lixin Zhou and Catherine Xiaocui Lou
An Integration Technology for Socially Aware Mobile Applications in Heterogeneous
Networking Environments 494
Xiaomin Zhu, Donghua Chen, Wei Dai, and Runtong Zhang
Session 2: HETNETs for Enterprise and Business
Integration ofMobile-Devices-Based Personal Analytics into Enterprise
Organizational Transformation Scenarios 500
Serguei Dobrinevski
HetNet Framework for Supply Chain Management 506
Paul Moynihan and Wei Dai
Developing an Integrated Supply Chain System for Small Businesses in Australia: A
Service-Oriented PHOENIX Solution 512
Yongqiang Li, Wei Dai, Anona Armstrong, Andrew Clarke, and Miaoli Du
Robust Supply Chain Services System through Optimization Modeling for Enterprises 518
Catherine Xiaocui Lou and Wei Dai
INVITE 2012
Session 1: Multimedia Applications
A Preliminary Evaluation for Effectiveness of Media Switching Function 524
Kaoru Sugita and Masao Yokota
A Method for User-Location Estimation for Intuitive Input System on Very Large
Display Space 528
Akira Sakuraba, Tomoyuki Ishida, and Yoshitaka Shibata
xii
Digital 3D Ukiyoe Using the Effect of Motion Parallax 534
Tetsuro Ogi, Yoshisuke Tateyama, Hao Lit, and ErikaIkeda
Session 2: Tiled Display
Approaches to Display ofUltra-resolution Video Streaming by Multi-transmission
on Tiled Display Environment 540
YasnoEbara
A Universal Multimedia Contents on a Tiled Display Equipment 546
Kaoru Sugita and Masao Yokota
A Unified Large Scale Disaster Information Presentation System Using Ultra GIS
Based Tiled Display Environment ..550
Tomoyuki Ishida, Akira Sakuraba, Noriki Uchida, Koji Hashimoto, and Yoshitaka Shibata
INWC 2012
Session: Information Networking and Wireless Communication Systems
An Algorithm to Estimate Propagation Parameters Based on 2-Ray Model 556
Kazunori Uchida, Masafumi Takematsu, and Junichi Honda
Numerical and Experimental Study on Confinement of Microwave in Dielectric
and Metallic Post Array Waveguide ,562
Hiroshi Maeda, Huiii Chen, Kazaya Toniiura, and Takuya Shinohara
An Algorithm for Analysis ofReflected and Diffracted Fields from a Polyhedron Type
of Target above a Plane-Ground 567
Junichi Honda and Takuya Otsuyama
A Study on the Reading Characteristics of Colored 2-Dimensional Code 572
Toshihiko Wakahara, Samretwit Damri, andNoriyasu Yamamoto
ISSE 2012
Session: Intelligent Sensors and Smart Environments
Application of RFID Technology for In-House Drug Management System 577
Malabika Parida, Huan-Chi Yang, Shiang-Wen Jheng, and Chung-Jen Kuo
A Location-Based Personal Task Management Application for Indoor and Outdoor
Environments 582
Chi-Yi Lin, Ming-Tze Hung, and Wei-Hsun Huang
Posture Recognition with G-Sensors on Smart Phones 588
Hui-Huang Hsu, Kang-Chun Tsai, Zixue Cheng, and Tongjun Huang
Physiological Angry Emotion Detection Using Support Vector Regression 592
Chuan-Yu Chang, Yu-Mon Lin, and Jun-YingZheng
xiii
ITIS 2012
Session 1: Innovative Systems
A Multicast Routing Protocol for Wireless Mesh Networks Considering Network Load 597
Kiyotaka Oe andAkio Koyama
On Automatic Flying Distance Measurement on Ski Jumperfs Motion Monitoring
System 603
Nobuyoshi Sato, Tsuyoshi Takayama, and Yoshitoshi Murata
Design of Management System for Arrayed Returnable Containers>. 610
Reiltsuki
Storage Deduplication by Virtual Large-Scale Disks ............615
RituEndo, Junichi Kumamimi, and Minoru Uehara
Session 2: Innovative Applications
The Evaluations of Desktop as a Service in an Educational Cloud 621
Shinichiro Kibe, Teruaki Koyama, and Minoru Uehara
Proposal for Cloud Search Engine as a Service 627
Takamasa Miyano and Minoru Uehara
Evaluation of a Web-Based Programming Environment 633
Hideaki Yanagisawa
Long Term Management of Web Cache for Web Archive 639
Ryunosuke Ozawa and Minoru Uehara
MCCTA 2012
Session 1: Mobile and Cloud Computing
Meta Index Model Based Matchmaking for Human Resource Management: An
Approach for Similarity Comparing between Employee and Job Position Using Meta
Index Model 645
Keon Soo Lee andSeungmin Rho
A Study on the Design ofDigital Narrowband Communication System for Next
Generation Group Communication 650
Yang Sun Lee, Ze GuangJin, Jae Myeong Choi, and Sang-Soo Yeo
Mobile Cloud Computing for Biometric Applications 654
Milos Stojmenovic
Mobile Crowd Computing with Work Stealing 660
Niroshinie Fernando, Seng W. Loke, and W, Rahayu
xiv
Session 2: Modeling, Trust and Security
Trust Based Sensor Network Clustering with Load Balance Factors 666
Mucheo! Kim and Sang Oh Park
A Neural Network Model Using Extended Feature-Based Neuron: NNDFF 670
Seokhwan Yang andMokdong Chung
Improved Differential Fault Analysis on Block Cipher SEED-128 675
Yuseop Lee, Jongsung Kim, Seokhie Hong, and Changhoon Lee
Automated Security Level Conversion on Security Documents in Different Domains 681
Jae-Myeong Choi andSang-Soo Yeo
NeoFusion 2012
Session 1: Ubiquitous Computing
Providing High Availability for Distributed Stream Processing Application
with Replica Placement 685
Rong He, Zhongzhi Luan, Yuanqiang Huang, Zhendong Cheng, Depei Qian, and Gang Guan
Context-Based Hybrid Semantic Matching Framework for E-mentoring System 691
Mye Sohn, Young Min Kwon, andHyun Jung Lee
Construction ofTag-Based Dynamic Data Catalog (TaDDCat) Using Ontology 697
Hyun Jung Lee and Mye Sohn
Ambient Widget: An Ambient Information System Using Gesture-Based Interactions 703
Seongil Lee, Kyohyun Song, Jihwan Kim, andJiho Choi
Session 2: Wireless and Multimedia Networking
Efficient Statistical Computing on Multicore and MultiGPU Systems 709
Yulong Ou, Bo Li, Hailong Yang, Zhongzhi Luan, and Depei Qian
Routing Algorithm Based on Ant Colony Optimization for DTN Congestion Control 715
Chengjun Wang, Baokang Zhao, Wei Peng, Chunqing Wu, andZhenghu Gong
CLIP: A Distributed Emulation Platform for Research on Information Reconciliation 721
Dingjie Zoa, Baokang Zhao, Chunqing Wu, Bo Liu, Wanrong Yu, Xiangchun Ma, and Hongxin Zou
Following Routing: An Active Congestion Control Approach for Delay-Tolerant
Networks 727
Chengjun Wang, Baokang Zhao, WeiPeng, Chunqing Wu, and Zhenghu Gong
Session 3: Ubiquitous Services and Applications
A Ubiquitous Smart Learning Platform for the 21 st Smart Learners in an Advanced
Science and Engineering Education 733
JongSukRuth Lee, YoungJin Jung, Sun Rae Park, Junglok Yu, Du-seok Jin, and Kumwon Cho
xv
Automatic Evaluation of Document Classification Using N-Gram Statistics 739
Dongjin Choi, Byeongkyu Ko, Eimji Lee, Mytmggwon Hwang, and Pcrnkoo Kim
Mobile Image Retrieval Using Integration ofGeo-sensing and Visual Descriptor 743
Dong-Seok Yang and Yong-Hwan Lee
Efficient Image Retrieval Using Advanced Clustering SURF 749
Yong-Hwan Lee, HyochangAhn, andSang-Burm Rhee
Session 4: Ubiquitous Security and Intelligent System
An Improved Security Approach Based on Kerberos for M2M Open IPTV System 754
Inshil Doh, Kijoon Chae, Jiyoang Lint, and Min Young Chung
Access to an. Automated Security System Using Gesture-Based Passwords 760
Seongil Lee, Kyohyun Song, and Jiho Choi
Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A
Survey of Some Problems and Solutions 766
Hae-Duck J, Jeong, WooSeok Hyun, Jiyoung Lim, andIlsun You
An Intelligent Data De-duplication Based Backup System 771
GuofengZhu, Xingjun Zhang, Longxiang Wang, Yueguang Zhu, andXiaoshe Dong
TwC 2012
Session 1: Secure Systems
A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This
Method with Digital Watermarks 777
Hiroki Nishikawa, Shingo Kuse, Keiichi h/amura, andIsao Echizen
Cooperative Secure Integration Process for Secure System Development 782
Yoshiro Wataguchi, Takao Okubo, Yukie Unno, andNobuyuki Kanaya
Securing the Cloud, Dispelling Fears: Ways to Combat Climate Change 787
Danilo Valeros Bernardo
Session 2: Trust and Access Control
Access Control Methods Suitable for Stream Contents Delivery Cloud Services
by Using Hash-Chain Based Key Derivation Schemes 794
Yuji Suga
Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences 799
Yoshifitmi Kamoshida and HiroakiKikuchi
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering
Actual Behaviour and Amount of Data Exchanged between Peers 805
Konhei Umezaki, Evjola Spaho, LeonardBarolli, FatosXhafa, Muhammad Younas,
and Jiro Iwashige
xvi
WReCS 2012
Session 1: Bioinspired Computing
Biologically Inspired Hardware: Status and Perspectives (Invited Talk) 811
Salvatore Vitabile
Design of Development as a Service in the Cloud 815
Katsuyoshi Matsumoto, Shinichiro Kibe, Minoni Uehara, andHideki Mori
Session 2: Reconfigurable Systems
Castle of Chips: A New Chip Stacking Structure with Wireless Inductive Coupling
for Large Scale 3-D Multicore Systems 820
Hideharu Amano
Extension ofMemory Controller Equipped with MuCCRA-3-DP: Dynamically
Reconfigurable Processor Array 826
Tom Katagiri, Kazuei Hironaka, and HideharuAmano
A Uniform Partitioning Method for Mono-Instruction Set Computer (MISC) 832
Hiroyuki Ito and Minoru Watanabe
Session 3: Energy Saving
Proposed Sensor Network for Living Environments Using Cloud Computing 838
Yuichiro Takabe, Katsuyoshi Matsumoto, Motoi Yamagiwa, and Minoru Uehara
A Study on Constructing an Energy Saving Cloud System Powered by Photovoltaic
Generation 844
Motoi Yamagiwa and Minoru Uehara
Storage-Side Computing for Data Management in Private and Public Clouds 849
Tatsunori Takahashi, Hidenao Tanaka, Shinichiro Kibe, and Minoru Uehara
WSSM 2012
Session 1: Social Media Experiences
Evaluating the Usefulness of Online Reviews 855
Jim Iio
User Acceptance ofMobile Business Intelligence Services 861
Tobias Brockmann, Stefan Stieglitz, Johannes Kmieciak, andStephan Diederieh
How to Encourage Intermediary on Social Media 867
Yui Takizawa, Kazutaka Tsuji, and Tatsuhiro Yonekura
Investigating Trends in Social TV Services Based on User Participating Experiments 873
Narichika Hamaguchi, HiroshiFujisawa, Masaru Miyazaki, Ritsu Yonekura, and Satoshi Nishimtira
xvii
Session 2: Web Tools and Social Media
A Personal Branding for University Students by Practical Use of Social Media 879
Yoshihiro Kawano, Yuka Obu, Yorinori Kishimoto, Takashi Yamagnchi, EijiNanohiro,
and Tatsuhiro Yonekura
Web-Based Tool for Programming Interactive Animations in Terms
of State-Transition Diagrams 885
Naoto Takama, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, and Tatsuhiro Yonekura
An Authoring Tool for Flash Games in ActionScript3.0 889
Michitoshi Niibori, Yutaro Ariscrwa, Shusuke Okamoto, Masaru Kamada, and Tatsuhiro Yonekura
Authoring Tool for Flash 3D Animations in Terms of State-Transition Diagrams 893
Makoto Rokujo, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, and Tatsuhiro Yonekura
Author Index 898
xviii