03.11.2014 Views

Welcome Speech by Program Chair Download - Trusted Computing ...

Welcome Speech by Program Chair Download - Trusted Computing ...

Welcome Speech by Program Chair Download - Trusted Computing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The International Joint Conference of<br />

IEEE TrustCom-11/IEEE<br />

ICESS-11/FCST<br />

11/FCST-11<br />

<strong>Welcome</strong> <strong>Speech</strong><br />

<strong>Program</strong> <strong>Chair</strong><br />

Yang Xiang, Deakin University, Australia<br />

Email: yang.xiang@deakin.edu.au<br />

November 16, 2011, Changsha, China


Outline<br />

Keynote <strong>Speech</strong>es<br />

IEEE TrustCom-11<br />

IEEE ICESS-11<br />

FCST-11<br />

Acknowledgements


Outline<br />

Keynote <strong>Speech</strong>es<br />

IEEE TrustCom-11<br />

IEEE ICESS-11<br />

FCST-11<br />

Acknowledgements


Keynote <strong>Speech</strong>es


Keynote <strong>Speech</strong> 1<br />

• November 16, (Wednesday) 15:00-16:00:<br />

“Access Control in Distributed Systems: Merging<br />

Theory with Practice”<br />

Keynote Speaker: Prof. Ivan Stojmenovic<br />

(University of Ottawa, Canada)<br />

Keynote Session <strong>Chair</strong>: Prof. Weijia Jia<br />

(City University of Hong Kong, Hong Kong)


Keynote <strong>Speech</strong> 2<br />

• November 16, (Wednesday) 16:00-17:00:<br />

“Power Management in Embedded Systems: Clusters<br />

of Satellites as a Case Study”<br />

Keynote Speaker: Prof. Daniel Mossé<br />

(University of Pittsburgh, USA)<br />

Keynote Session <strong>Chair</strong>: Dr. Zili Shao<br />

(The Hong Kong Polytechnic University, Hong Kong)


Keynote <strong>Speech</strong> 3<br />

• November 16, (Wednesday) 17:15-18:15:<br />

“TRUSTIE: Design of a Trustworthy Software<br />

Production Environment”<br />

Keynote Speaker: Prof. Huaimin Wang<br />

(National University of Defense Technology, China)<br />

Keynote Session <strong>Chair</strong>: Dr. Yi Mu<br />

(University of Wollongong, Australia)


Keynote <strong>Speech</strong> 4<br />

• November 17, (Thursday) 8:30-9:30<br />

“Fault Detection in Cloud <strong>Computing</strong> Systems”<br />

Keynote Speaker: Prof. Yi Pan<br />

(Georgia State University, USA)<br />

Keynote Session <strong>Chair</strong>: Prof. Cho-Li Wang<br />

(The University of Hong Kong, Hong Kong)


Keynote <strong>Speech</strong> 5<br />

• November 17, (Thursday) 9:30-10:30:<br />

“Jacket Matrix and Its Applications to Signal Processing”<br />

Keynote Speaker: Prof. Moon Ho Lee<br />

(Chonbuk National University, Korea)<br />

Keynote Session <strong>Chair</strong>: Dr. Peter Mueller<br />

(IBM Zurich Research Laboratory, Switzerland)


Keynote <strong>Speech</strong> 6<br />

• November 17, (Thursday) 10:45-11:45:<br />

“Intelligence in Cyber-Physical-Social Spaces”<br />

Keynote Speaker: Prof. Zhaohui Wu<br />

(Zhejiang University, China)<br />

Keynote Session <strong>Chair</strong>: Prof. Tei-Wei Kuo<br />

(National Taiwan University, Taiwan)


Outline<br />

Keynote <strong>Speech</strong>es<br />

IEEE TrustCom-11<br />

IEEE ICESS-11<br />

FCST-11<br />

Acknowledgements


IEEE TrustCom-11 Organizing Committee<br />

General <strong>Chair</strong>s<br />

Yi Mu, University of Wollongong, Australia<br />

Gregorio Martinez, University of Murcia, Spain<br />

Geyong Min, University of Bradford, UK<br />

<strong>Program</strong> <strong>Chair</strong>s<br />

Huaimin Wang, National University of Defense Technology, China<br />

Stephen R. Tate, University of North Carolina at Greensboro, USA<br />

Yang Xiang, Deakin University, Australia<br />

Steering <strong>Chair</strong>s<br />

Guojun Wang, Central South University, China<br />

Laurence T. Yang, St. Francis Xavier University, Canada


The Final <strong>Program</strong><br />

11 Technical Sessions<br />

9 Symposiums/Workshops<br />

3 Special Issues<br />

2 Best Paper Awards (Nominations)


Contributed Papers<br />

• 471 total submissions<br />

from 27 countries or<br />

areas<br />

• 126 total acceptances<br />

(26.8%) from 25<br />

countries or areas<br />

• At least 3 reviews for<br />

each paper


Technical Sessions<br />

IEEE TrustCom 2011 (Thursday, November 17)<br />

• Session A01: Attack and Defense<br />

• Session A02: Trust & Cloud <strong>Computing</strong><br />

• Session A03: Detection Scheme<br />

• Session A04: Privacy<br />

• Session A05: Trust Model<br />

• Session A06: Trust Evaluation


Technical Sessions<br />

IEEE TrustCom 2011 (Friday, November 18 )<br />

• Session A07: Authentication<br />

• Session A08: Trust Architecture and Framework<br />

• Session A09: Key and Secret Management<br />

• Session A10: Trust & Networks<br />

• Session A11: Trust & Application


Symposiums/Workshops<br />

UbiSafe 2011 (Wednesday, November 16)<br />

• Session B01: UbiSafe <strong>Computing</strong><br />

ISSR 2011 (Wednesday, November 16)<br />

• Session C01: Security in e-Science and e-Research<br />

SPIoT 2011 (Wednesday, November 16)<br />

• Session D01: Security, Signature and Detection<br />

• Session D02: Privacy and Authentication


Symposiums/Workshops<br />

ACS 2011 (Wednesday, November 16)<br />

• Session E01: Anonymity and Communication Systems<br />

TrustID 2011 (Wednesday, November 16)<br />

• Session F01: Trust and Identity<br />

SQC 2011 (Wednesday, November 16)<br />

• Session G01: Security and Quantum Communications<br />

TSCloud 2011 (Wednesday, November 16)<br />

• Session H01: Trust and Security in Cloud <strong>Computing</strong>


BEST PAPER AWARD - 1<br />

Ben S. Y. Fung, Patrick P. C. Lee<br />

Your paper “A Privacy-Preserving Defense<br />

Mechanism Against Request Forgery Attacks”<br />

presented in “The 10th IEEE International Conference<br />

on Trust, Security and Privacy in <strong>Computing</strong> and<br />

Communications (IEEE TrustCom-11)”, Changsha,<br />

China, November 16-18, 2011, has been nominated<br />

the “Best Paper Award”. Congratulations!


BEST PAPER AWARD - 2<br />

Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang and Fan<br />

Jiang<br />

Your paper “LoongChecker: Practical Summary-based<br />

Semi-simulation to Detect Vulnerability in Binary Code”<br />

presented in “The 10th IEEE International Conference on<br />

Trust, Security and Privacy in <strong>Computing</strong> and<br />

Communications (IEEE TrustCom-11) ”, Changsha, China,<br />

November 16-18, 2011, has been nominated the “Best<br />

Paper Award”. Congratulations!


Special Issues<br />

• Special Issue 1:<br />

Elsevier's Journal of Computer and System Sciences<br />

(SCI and EI indexed).<br />

• Special Issue 2:<br />

IET Information Security (SCI and EI indexed).<br />

• Special Issue 3:<br />

Wiley's Security and Communication Networks (SCI<br />

and EI indexed).


Outline<br />

Keynote <strong>Speech</strong>es<br />

IEEE TrustCom-11<br />

IEEE ICESS-11<br />

FCST-11<br />

Acknowledgements


IEEE ICESS-11Organizing Committee<br />

General <strong>Chair</strong>s<br />

Guojun Wang, Central South University, China<br />

Giorgio Buttazzo, Scuola Superiore Sant'Anna of Pisa, Italy<br />

Tei-Wei Kuo, National Taiwan University, Taiwan<br />

<strong>Program</strong> <strong>Chair</strong>s<br />

Jian-Jia Chen, Karlsruhe Institute of Technology (KIT), Germany<br />

Marco Di Natale, Scuola Superiore Sant'Anna of Pisa, Italy<br />

Zonghua Gu, Zhejiang University, China<br />

Steering <strong>Chair</strong>s<br />

Laurence T. Yang, St. Francis Xavier University, Canada<br />

Zhaohui Wu, Zhejiang University, China


The Final <strong>Program</strong><br />

6 Technical Sessions<br />

2 Symposiums/Workshops<br />

2 Special Issues<br />

2 Best Paper Awards (Nominations)


Contributed Papers<br />

• 185 total submissions<br />

from 16 countries or areas<br />

• 52 total acceptances<br />

(28.1%) from 15 countries<br />

or areas<br />

• At least 3 reviews for each<br />

paper


Technical Sessions<br />

IEEE ICESS 2011 (Thursday, November 17)<br />

• Session I01: Real-Time Systems and Scheduling I<br />

• Session I02: Embedded Architectures<br />

• Session I03: Real-Time Systems and Scheduling II<br />

• Session I04: Formal Methods and Analysis Tools


Technical Sessions<br />

IEEE ICESS 2011 (Friday, November 18 )<br />

• Session I05: Safe and Reliable Systems<br />

• Session I06: Embedded Applications and WSNs


Symposiums/Workshops<br />

ESA 2011 (Wednesday, November 16)<br />

• Session J01: Advanced Topics on Embedded<br />

Systems and Applications<br />

IWCSEI 2011 (Wednesday, November 16)<br />

• Session K01: Computer System Education and<br />

Innovation


BEST PAPER AWARD - 1<br />

Miao Zhou, Santiago Bock, Alexandre P. Ferreira, Bruce<br />

Childers, Rami Melhem, Daniel Mosse<br />

Your paper “Real-Time Scheduling for Phase<br />

Change Main Memory Systems” presented in “The 8th<br />

IEEE International Conference on Embedded Software<br />

and Systems (IEEE ICESS-11) ”, Changsha, China,<br />

November 16-18, 2011, has been nominated the “Best<br />

Paper Award”. Congratulations!


BEST PAPER AWARD - 2<br />

Xiaowen Chen, Shuming Chen<br />

Your paper “DSBS: Distributed and Scalable Barrier<br />

Synchronization in Many-Core Network-on-Chips”<br />

presented in “The 8th IEEE International Conference<br />

on Embedded Software and Systems (IEEE ICESS-<br />

11)”, Changsha, China, November 16-18, 2011, has<br />

been nominated the “Best Paper Award”.<br />

Congratulations!


Special Issues<br />

• Special Issue 1:<br />

Elsevier's Journal of Systems Architecture<br />

(JSA) (SCI and EI indexed).<br />

• Special Issue 2:<br />

IEICE's Transactions on Information and<br />

Systems (SCI and EI indexed).


Outline<br />

Keynote <strong>Speech</strong>es<br />

IEEE TrustCom-11<br />

IEEE ICESS-11<br />

FCST-11<br />

Acknowledgements


FCST-11 Organizing Committee<br />

General <strong>Chair</strong>s<br />

Guojun Wang, Central South University, China<br />

Chengzheng Sun, Nanyang Technological University, Singapore<br />

Peter Mueller, IBM Zurich Research Laboratory, Switzerland<br />

<strong>Program</strong> <strong>Chair</strong>s<br />

Jianer Chen, Texas A&M University, USA<br />

Kouichi Sakurai, Kyushu University, Japan<br />

Cho-Li Wang, University of Hong Kong, Hong Kong<br />

Steering <strong>Chair</strong>s<br />

Minyi Guo, Shanghai Jiao Tong University, China<br />

Hai Jin, Huazhong University of Science & Technology, China


The Final <strong>Program</strong><br />

9 Technical Sessions<br />

4 Symposiums/Workshops<br />

2 Special Issues<br />

2 Best Paper Awards (Nominations)


Contributed Papers<br />

• 260 total submissions<br />

from 12 countries or<br />

areas<br />

• 75 total acceptances<br />

(28.8%) from 11<br />

countries or areas<br />

• At least 3 reviews for<br />

each paper


Technical Sessions<br />

FCST 2011 (Thursday, November 17)<br />

• Session L01: Parallel and Distributed <strong>Computing</strong><br />

• Session L02: Pervasive, Grid, P2P and Cloud <strong>Computing</strong><br />

• Session L03: Network and Internet <strong>Computing</strong><br />

• Session L04: Computer Vision and Image Processing<br />

• Session L05: Pattern Recognition and Artificial<br />

Intelligence<br />

• Session L06: System Software and Software Engineering


Technical Sessions<br />

FCST 2011 (Friday, November 18 )<br />

• Session L07: Security, Reliability and Trustworthy<br />

<strong>Computing</strong><br />

• Session L08: Wireless Sensor Networks and Mobile<br />

<strong>Computing</strong><br />

• Session L09: Theoretical Computer Science, Algorithm<br />

and Bio-informatics


Symposiums/Workshops<br />

WNM 2011 (Wednesday, November 16)<br />

• M01: Wireless Networks and Multimedia<br />

MWNS 2011 (Wednesday, November 16)<br />

• Session N01: Mobile and Wireless Network Security<br />

WPRIC 2011 (Wednesday, November 16)<br />

• Session O01: Pattern Recognition & Intelligence<br />

<strong>Computing</strong><br />

AIPNGN 2011 (Wednesday, November 16)<br />

• Session P01: All-IP Next Generation Networks


BEST PAPER AWARD - 1<br />

Weihua Cao, Gang Chen, Xin Chen, Min Wu<br />

Your paper “Optimal Tracking Agent: A New<br />

Framework for Multi-Agent Reinforcement Learning”<br />

presented in “The 6th International Conference on<br />

Frontier of Computer Science and Technology (FCST-<br />

11)”, Changsha, China, November 16-18, 2011, has<br />

been nominated the “Best Paper Award”.<br />

Congratulations!


BEST PAPER AWARD - 2<br />

Yunlong Zhang, Jingyu Zhou, and Jia Cheng<br />

Your paper “Preference-based Top-K Influential<br />

Nodes Mining in Social Networks” presented in “The 6th<br />

International Conference on Frontier of Computer<br />

Science and Technology (FCST-11)”, Changsha, China,<br />

November 16-18, 2011, has been nominated the “Best<br />

Paper Award”. Congratulations!


Special Issues<br />

• Special Issue 1:<br />

Elsevier's Future Generation Computer<br />

Systems (FGCS) (SCI and EI indexed).<br />

• Special Issue 2:<br />

IEICE's Transactions on Information and<br />

Systems (SCI and EI indexed).


Outline<br />

Keynote <strong>Speech</strong>es<br />

IEEE TrustCom-11<br />

IEEE ICESS-11<br />

FCST-11<br />

Acknowledgements


Acknowledgements<br />

• We appreciate all the authors who have submitted<br />

their papers.<br />

• We would like to thank the program committee<br />

members for their great efforts in reviewing the<br />

papers.<br />

• We would like to thank our keynote speakers for<br />

sharing their visions and insights with us, and the<br />

organizations that supported the conference.


Thanks<br />

Enjoy the conference in<br />

IEEE TrustCom-11/IEEE ICESS-11/FCST2011!<br />

See you next time in<br />

IEEE TrustCom-12/IEEE ICESS-12/FCST2012!<br />

Changsha, China<br />

November 16, 2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!