Home |  Call for Papers  |  Paper Submission  |  Dates and Deadlines |  Invited Speakers |  Proceedings
Organization  |  Registration |  Accommodation |  Contact Information  |  Co-located Conferences

Proceedings will be published by:

Conference Program is now available.
Please click here to download and check it.

The First International Symposium on u- and e- Service, Science and Technology will be held on December 13 ~ 15, 2008, Horizon Resort, Sanya, Hainan Island, China.

UNESST 2008 will be the most comprehensive Symposium focused on the various aspects of advances in u- and e- Service, Science and Technology. Our Symposium provides a chance for academic and industry professionals to discuss recent progress in the area of u- and e- Service, Science and Technology.

The goal of this Symposium is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of u- and e- Service, Science and Technology.

All accepted papers will be included in the IEEE CS Pre-proceedings(EI and ISTP) or CCIS Post-proceedings(DBLP and EI). And some papers selected will be included in some journals.

Our Symposium provides a chance for academic and industry professionals to discuss recent progress in the area of u- and e- Service, Science and Technology.

Topics of Symposium

The main topics include but will not be limited to: (Excellent surveying works in these areas are welcome, too.)

Adoption of Standards and Protocols for e- or u-Business Applications
B2B, B2C and C2C Architectures
Case Studies in Industry and Government
Collaborative Business Systems
CRM and Business Solutions
Data and Knowledge Engineering
e- or u-Banking
e- or u-Business Systems for Multiple Platforms
e- or u-Entertainment
e- or u-Government
e- or u-Learning
e- or u-Marketing and Consumer Behavior
e- or u-Negotiation and Auction Mechanisms
e- or u-Payment Systems
GPS Applications and Location-based Services
Grid Computing for e- or u-Business
Healthcare and Medical Applications
Intellectual Rights
Interoperability and Integration
m-Business and Ubiquitous Services
Mobile Services and Architectures
Mobility Management in Next Generation Networks
Multi-Agent Systems and Information Integration
Open Source Technologies in e- or u-Business
Quality of Service (QoS) and Metrics
Security and Privacy
Semantic Web Applications and Ontology Sharing
Service-Oriented Architectures
Supply-chain Management
Systems Development and Evaluation
Telematics and Middleware Platforms
Trust and Privacy Issues in Social Networks
User Interfaces and Usability
Virtual Organizations
VPN Technology and Services
Web Data Visualization
Web Personalization and Decision Making
Web Services
Web Site Monitoring and Optimization
Workflow Management Systems
XML and Domain Mark-up Languages




All papers should be submitted by online system for review.

All accepted symposium papers will be included in IEEE CS Pre-proceedings(EI and ISTP) or CCIS POst-proceedings(DBLP and EI). And selected papers will be included in some International Journals.

1. Online submission system for IEEE CS Pre-proceedings:

UNESST 2008: http://submission.sersc.org/UNESST2008 (Closed)

2. Online submission system for Invited Paper Session Papers:

UNESST 2008 IPS: http://submission.sersc.org/UNESST2008/ips

3. Online submission system for CCIS Post-proceedings:

CCIS Post-Proceedings: http://submission.sersc.org/FGCNPostProceedings2008


  • IEEE CS Pre-Proceedings
    Submission of papers : August 31, 2008 (Closed)
    Notification of acceptance : September 20, 2008
    Submission of the camera ready: September 30, 2008 (Extended)
    Registration: October 10, 2008 (Extended)

  • CCIS Post - Proceedings
    Submission of papers : October 25, 2008
    Notification of acceptance : November 11, 2008
    Submission for SERSC (IJAST) proceedings: November 21, 2008
    Submission of the camera ready for CCIS: January 10, 2009



Dr. Hamid R. Arabnia,
The University of Georgia, USA

Email: hra@cs.uga.edu

A Reconfigurable Network Topology for Medical Imaging
Inherent limitations on the computational power of sequential uniprocessor systems have lead to the development of parallel multiprocessor systems. The two major issues in the formulation and design of parallel multiprocessor systems are algorithm design and architecture design. The parallel multiprocessor systems should be so designed so as to facilitate the design and implementation of the efficient parallel algorithms that exploit optimally the capabilities of the system. From an architectural point of view, the system should have low hardware complexity, be capable of being built of components that can be easily replicated, should exhibit desirable cost-performance characteristics, be cost effective and exhibit good scalability in terms of hardware complexity and cost with increasing problem size. In distributed memory multiprocessor systems, the processing elements can be considered to be nodes that are connected together via an interconnection network. In order to facilitate algorithm and architecture design, we require that the interconnection network have a low diameter, the system be symmetric and each node in the system have low degree of connectivity. Further, it is also desirable that the system configuration and behavior be amenable to a suitable and tractable mathematical description. The requirement of network symmetry ensures that each node in the network is identical to any other, thereby greatly reducing the architecture and algorithm design effort. For most symmetric network topologies, however, the requirements of low degree of connectivity for each node and low network diameter are often conflicting. Low network diameter often entails that each node in the network have a high degree of connectivity resulting in a drastic increase in the number of inter-processor connection links. A low degree of connectivity on the other hand, results in a high network diameter which in turn results in high inter-processor communication overhead and reduced efficiency of parallelism. Reconfigurable networks attempt to address this tradeoff. In a reconfigurable network each node has a fixed degree of connectivity irrespective of the network size. The network diameter is restricted by allowing the network to reconfigure itself into different configurations. Broadly speaking, a reconfigurable system needs to satisfy the following criteria in order to be considered practically viable: (a) In each configuration the nodes in the network should have a fixed degree of connectivity irrespective of network size, (b) The network diameter should be kept low via the reconfiguration mechanism and (c) The hardware for the reconfiguration mechanism (i.e. switch) should be of reasonable complexity. In this presentation, we discuss our design of a reconfigurable network topology that is targeted at medical applications. We present some results and discuss the future roadmap of this project.
About Dr. Hamid R. Arabnia

Hamid R. Arabnia received a Ph.D. degree in Computer Science from the University of Kent (Canterbury, England) in 1987. In 1987, he worked as a Consultant for Caplin Cybernetics Corporation (London, England), where he helped in the design of a number of image processing algorithms that were targeted at a particular parallel machine architecture. Prof. Arabnia is currently a Full Professor of Computer Science at University of Georgia (Georgia, USA), where he has been since October 1987. His research interests include Parallel and distributed processing techniques and algorithms, interconnection networks, and applications (in particular, in image processing, medical imaging, and other computational intensive problems). Prof. Arabnia is the founding chair of WORLDCOMP Congress. He is Editor-in-Chief of The Journal of Supercomputing (Springer) and is on the editorial and advisory boards of 17 other journals and magazines. He is the chair of the world committee of PDPTA (Parallel and Distributed Processing Techniques and Applications research organization: PDPTA is composed of 28 task forces with over 2,800 active participants) and is on the Advisory Board of IEEE Technical Committee on Scalable Computing (TCSC).

Prof. Arabnia is the recipient of William F. Rockwell, Jr. Medal for promotion of multi-disciplinary research (Rockwell Medal is International Technology Institute's highest honor). In 2000, Prof. Arabnia was inducted to the World Level of the Hall of Fame for Engineering, Science and Technology (The World Level is the highest possible level for a living person; since 1982, 41 other individuals have been inducted at this level, including: Allen E. Puckett, CEO of Hughes Aircraft Company; Dr. Robert C. Seamans, Chairman of the board of trustees of Aerospace Corp.; Dr. James C. Fletcher, 7th head of NASA; Dr. Ralph E. Gomory, IBM Director of Research; Dr. Richard M. Cyert, President of Carnegie Mellon University; Dr. John R. Koza, Stanford University; Dr. George M. Reed, Oxford University; Dr. Andrew S. Grove, CEO of Intel Corp.; Dr. Irwin M. Jacobs, CEO of Qualcomm, Inc.; Bill Gates, Chairman of Microsoft Corp.; see http://www.hofest.org/inductee-wlh.asp for the complete list) He has received a number of other awards, including, The Johns Hopkins University National Search in recognition of his contributions to the national program for enhancing the quality of life for people with disabilities through the application of computing technology (presented to him in December 1991 - signatories: co-directors of the National Search and President of Johns Hopkins U.) In 2006, Prof. Arabnia received the Distinguished Service Award in recognition and appreciation of his contributions to the profession of computer science and his assistance and support to students and scholars from all over the world; this award was formally presented to him on June 26, 2006 by Professor Barry Vercoe (Massachusetts Institute of Technology / MIT). Most recently (October 14, 2007), Prof. Arabnia received an "Outstanding Achievement Award in Recognition of His Leadership and Outstanding Research Contributions to the Field of Supercomputing". This award was formally presented to him at Harvard University Medical School (signatories: Lawrence O. Hall, President of IEEE/SMC; Zhi-Pei Liang, Vice President of IEEE/EMB; Jack. Y. Yang, General Chair of IEEE BIBE and Harvard University; Mary Qu Yang, Chair of Steering Committee, IEEE BIBE and NIH). Prof. Arabnia has published extensively in journals and refereed conference proceedings. He has over 250 research publications (journals, proceedings, editorship) in his area of research. Prof. Arabnia has been a Co-PI on $7,139,525 externally funded projects/initiatives (mainly via Yamacraw and includes significant UGA matching) and on $103,453 internally funded projects (as of October 2007). He has also contributed projects for justification for equipment purchase (grant proposals worth over $3 Million - awarded).

Dr. Hsiao-Hwa Chen,
Department of Engineering Science
National Cheng Kung University, Taiwan

Email: hshwchen@ieee.org

The Next Generation CDMA Technologies
Future wireless communication systems should be operating mainly, if not completely, for burst data services carrying multimedia traffics. The need to support high-speed burst traffic has already posed a great challenge to all currently available air-link technologies based on either TDMA or CDMA. The current CDMA technology has been widely used in both 2G and 3G mobile cellular standards and it has been suggested that it is not suitable for high-speed burst-type traffic. There are many problems with current CDMA technology, such as its low spreading efficiency, interference-limited capacity and the need for precision power control, etc. This talk will address various important issues about the next generation CDMA technologies as a major air-link technology for futuristic wireless applications. In particular, it will cover two major topics: why we need the next generation CDMA technologies, and what is the next generation CDMA technology.
About Dr. Hsiao-Hwa Chen
Hsiao-Hwa Chen is currently a full Professor in Department of Engineering Science, National Cheng Kung University, Taiwan, and he was the founding Director of the Institute of Communications Engineering of the National Sun Yat-Sen University, Taiwan. He received BSc and MSc degrees from Zhejiang University, China, and PhD degree from University of Oulu, Finland, in 1982, 1985 and 1990, respectively, all in Electrical Engineering. He has authored or co-authored over 300 technical papers in major international journals and conferences, five books and several book chapters in the areas of communications, including the books titled "Next Generation Wireless Systems and Networks" (512 pages) and "The Next Generation CDMA Technologies" (468 pages), both published by John Wiley and Sons in 2005 and 2007, respectively. He has been an active volunteer for IEEE various technical activities for over 20 years. Currently, he is serving as the Chair of IEEE ComSoc Radio Communications Committee, and the Vice Chair of IEEE ComSoc Communications & Information Security Technical Committee. He served or is serving as symposium chair/co-chair of many major IEEE conferences, including VTC, ICC, Globecom and WCNC, etc. He served or is serving as Associate Editor or/and Guest Editor of numerous important technical journals in communications. He is serving as the Chief Editor (Asia and Pacific) for Wiley's Wireless Communications and Mobile Computing (WCMC) Journal and Wiley's International Journal of Communication Systems, etc. He is the founding Editor-in-Chief of Wiley' Security and Communication Networks journal (www.interscience.wiley.com/journal/security). He is also an adjunct Professor of Zhejiang University, China, and Shanghai Jiao Tong University, China. Professor Chen is a recipient of the Best Paper Award in IEEE WCNC 2008.

Dr. Roger Y. Lee,
Software Engineering and Information Technology Institute
Computer Science Department
Central Michigan University
Mt. Pleasant, Michigan, U.S.A.

Embedded Software Development with MDA

Model-Driven Architecture (MDA) is currently one of the most exciting approaches for accelerating code development and improving the quality of software in complex systems like embedded systems in ubiquitous era. MDA is an approach to the full lifecycle integration of enterprise systems comprised of software, hardware, humans, and business practices. It provides a systematic framework to understand, design, operate, and evolve all aspects of such enterprise systems, using engineering methods and tools. MDA utilizes models and a generalized idea of architecture standards to address integration of enterprise systems in the face of heterogeneous and evolving technology and embedded business domains. MDA combines computer-aided verification and machine intelligence during modeling to discover and remove design bugs before code reviews and testing. MDA represents an evolutionary step forward from previous development approaches. It’s built on the solid foundation of well established standards, including Unified Modeling Language (UML), the ubiquitous modeling notation used and supported by every major company in the software industry, and XML Metadata Interchange (XMI), the standard for storing and exchanging models using XML.

MDA is well-suited for embedded software development because it separates functional logic from implementation details and with the right MDA technology, automates the generation and testing of any embedded application architecture. MDA provides embedded software developers with a fundamentally different and higher-level way to accommodate changing requirements, increase reuse and extend system longevity.

In my talks, we will discuss the MDA and will help you understand what MDA is, how best to adopt it and the benefits it provides when implemented the embedded software with a model automation and transformation environment. We will also deliver the advantages of this approach as faster, more predictable software delivery cycles, minimizing the impact of requirements changes on development schedules, greater component reuse & implementation consistency and architectural flexibility and platform independences.

About Dr. Roger Lee
Roger Lee is Director of Software Engineering & Information Technology Institute and Professor of Computer Science at Central Michigan University, Mount Pleasant, Michigan, U.S.A. He received his Ph.Ds in Computer Science from Shizuoka University in Japan and the University of Southern Mississippi in USA.

His current research interest areas include Software Engineering, Software Architecture, Requirements Engineering, and Component-Based Development.

Dr. Lee’s contributions to the field include the establishment of the International Association for Computer and Information Science (ACIS) in 1999 and the International Journal of Computer and Information Science (IJCIS) in 2000.

He is currently serving as CEO of the International Association for Computer & Information Science (ACIS) and Editor-in-Chief of International Journal of Computer & Information Science.

He is a member of ACIS, ACM, and IEEE.

Dr. Sankar K. Pal
Director and Distinguished Scientist,
Indian Statistical Institute, India

Machine Intelligence, Computational Theory of Perception and Rough-Fuzzy Computing

Components of Machine Intelligence and their relation with Computational Theory of Perception (CTP) is explained. The significance of fuzzy-granulation in CTP is stated. The role of rough fuzzy computing in the said framework along with the relevance of integration is explained. Two examples of such integration are described for problems of clustering and generating class prototypes. Here rough sets are used for granular computing using information granules and for uncertainty handling in defining cluster shapes using lower and upper approximation, whereas fuzzy sets are used for linguistic representation and fuzzy granulation, and modeling uncertainty arising from overlapping regions. In effect, rough-fuzzy clustering provides a balanced compromise between restrictive (hard) and descriptive (fuzzy) representations of class belonging for overlapping regions, while rough-fuzzy case generation helps in determining class prototyped which are efficient in terms of generation time, retrieval time, classification accuracy and average features required per case for representation. Merits of rough-fuzzy case generation as knowledge encoding are demonstrated for multi-spectral image segmentation. Features and merits of both rough-fuzzy c-means and c-medoids are demonstrated, with quantitative indices, for segmentation of brain MR images and determining bio-bases in encoding protein sequence for analysis respectively. The talk concludes with the possible future uses in data mining and bioinformatics.

About Dr. Sankar K. Pal
He is the Director and a Distinguished Scientist of the Indian Statistical Institute. He founded the Machine Intelligence Unit, and the Center for Soft Computing Research: A National Facility in the Institute in Calcutta. He received a Ph.D. in Radio Physics and Electronics from the University of Calcutta in 1979, and another Ph.D. in Electrical Engineering along with DIC from Imperial College, University of London in 1982.

He worked at the University of California, Berkeley and the University of Maryland, College Park in 1986-87; the NASA Johnson Space Center, Houston, Texas in 1990-92 & 1994; and in US Naval Research Laboratory, Washington DC in 2004. Since 1997 he has been serving as a Distinguished Visitor of IEEE Computer Society (USA) for the Asia-Pacific Region, and held several visiting positions in Hong Kong and Australian universities.

Prof. Pal is a Fellow of the IEEE, USA, The Academy of Sciences for the Developing World, Italy, International Association for Pattern recognition, USA, and all the four National Academies for Science/Engineering in India. He is a co-author of fourteen books and about three hundred research publications in the areas of Pattern Recognition and Machine Learning, Image Processing, Data Mining and Web Intelligence, Soft Computing, Neural Nets, Genetic Algorithms, Fuzzy Sets, Rough Sets and Bioinformatics.

He has received the 1990 S.S. Bhatnagar Prize (which is the most coveted award for a scientist in India), and many prestigious awards in India and abroad including the 1999 G.D. Birla Award, 1998 Om Bhasin Award, 1993 Jawaharlal Nehru Fellowship, 2000 Khwarizmi International Award from the Islamic Republic of Iran, 2000-2001 FICCI Award, 1993 Vikram Sarabhai Research Award, 1993 NASA Tech Brief Award (USA), 1994 IEEE Trans. Neural Networks Outstanding Paper Award (USA), 1995 NASA Patent Application Award (USA), 1997 IETE-R.L. Wadhwa Gold Medal, the 2001 INSA-S.H. Zaheer Meda, and 2005-06 ISC-P.C. Mahalanobis Birth Centenary Award (Gold Medal) for Lifetime Achievement.

Prof. Pal is an Associate Editor of IEEE Trans. Pattern Analysis and Machine Intelligence, IEEE Trans. Neural Networks [1994-98, 2003-2006], Pattern Recognition Letters, Neurocomputing (1995-2005), Applied Intelligence, Information Sciences, Fuzzy Sets and Systems, Fundamenta Informaticae, LNCS Trans. On Rough Sets, Int. J. Computational Intelligence and Applications, and Proc. INSA-A; a Member, Executive Advisory Editorial Board, IEEE Trans. Fuzzy Systems, Int. Journal on Image and Graphics, and Int. Journal of Approximate Reasoning; and a Guest Editor of IEEE Computer.

Dr. Jianhua Ma
Professor, Dept. of Digital Media Science,
Faculty of Computer & Information Sciences, Hosei University

Email: jianhua@hosei.ac.jp
Spacelog Concept and Issues for Novel u-Services in Smart Spaces

Spacelog is a continuous collection of digital records on existence states and activity experiences of multiple entities in a real space or physical environment such as a laboratory, a classroom, a library, a home, a clinic, a shop, a restaurant, a farmland, or a construction field. The entities in a space can be people, facilities, artifacts, and space-related states, e.g., temperature distribution, air quality, noise level, sound source, etc. This variety of possible entities in a space marks one essential difference of the spacelog from the lifelog, which the latter refers specifically to activity records of a person - single entity. Furthermore, while monitoring cameras are widely used to record raw video data for security surveillance, the spacelog is to automatically collect different kinds of data related to multiple entities via various sensors distributed in a space, and efficiently keep the data in an integrated database.
That is, spacelog can be regarded conceptually as a special database of a physical environment to automatically record what occurred inside the environment. Actually, spacelog can also serve as a context history database in a smart space system, and function as a “memory organ” of a smart space.
The spacelog concept, first proposed by us, was motivated by the outcomes of our three previous research streams: (1) context-aware smart applications, (2) robot-integrated smart space, and (3) outdoor lifelog analysis. The spacelog can be exploited to extend functions of physical environments and provide many novel services, including but not limited to (a) effective retrievals of past events that happened in a space; (b) systematic summaries of entities’ experiences which occurred in a specified period; and (c) automatic detections of important events or changes for prompt reactions. Furthermore, the intelligent capability of smart spaces/environments can be greatly enhanced when incorporated with the spacelog, and the whole individual’s lifelog may be conveniently collected by integrating spacelogs in different environments the individual has stayed.
This talk will first clarify the spacelog concept from various aspects, next discuss the related technical issues for making spacelog systems, then depict the possible novel u-services using spacelog, and finally show our preliminary study on some specific spacelog system prototypes: HomeLog and LabLog in the robot-integrated smart environments.

About Dr. Jianhua Ma
Jianhua Ma is a Professor at the Faculty of Computer and Information Sciences of Hosei University since 2000. Previously, he had 15 years' teaching/research experience at NUDT, Xidian University and the University of Aizu (Japan). His research from 1983 to 2003 covered coding techniques for wireless communications, data/video transmission security, speech recognition and synthesis, multimedia QoS, 1-to-m HC hyper-interface, graphics rendering ASIC, e-learning and virtual university, CSCW, multi-agents, Internet audio and video, mobile web service, P2P network, etc. Since 2003 he has been devoted to what he called Smart Worlds (SW) pervaded with smart/intelligent u-things including three kinds of essential elements: smart object, smart space/hyperspace and smart system, which are based on the vision of the future Ubiquitous Intelligence (UI, u-Intelligence) or Pervasive Intelligence (PI, p).

Dr. Ma is the Co-Editor-in-Chief of three international journals: Journal of Ubiquitous Computing and Intelligence (JUCI), Journal of Mobile Multimedia (JMM) and Journal of Autonomic and Trusted Computing (JoATC), and the Assistant Editor-in-Chief of International Journal of Pervasive Computing and Communications (JPCC). He is on the editorial board of IJCPOL, IJDET, IJWMC, and IJSH, and has edited more than 10 journal special issues as a Guest Editor. He organized the 6th Int'l Conference on Distributed Multimedia Systems (DMS'99) as PC Co-Chair, the 1st Int'l Conference on Cyber Worlds (CW'02) as one of founders and PC Co-Chairs, and the 18th IEEE Int'l Conference on Advanced Information Networks and Applications as a General Co-Chair. He is a founder of Int'l Conf. on Ubiquitous Intelligence and Computing (UIC) and Int'l Conf. on Autonomic and Trusted Computing (ATC). He has severed many other conferences/workshops as various chairs and committee members.

Dr. Ma obtained his B.S, M.S. and Ph.D in 1982, 1985 and 1990, respectively. He was awarded as the Excellent Graduated Student by NUDT in 1982. He received the Annual Excellent Paper Awards from China Information Theory Society, Electronics Society, and Association of Hunan Science and Technology, respectively. He received the Best Paper Award from the Int'l Conference on Information Society in the 21st Century (IS2000), and the Highly Commended Paper Award from the IEEE Int'l Conference on Advanced Information Networking and Applications (AINA2004). He received the Appreciation Certificate from IEEE Computer Society in 2004, 2005 and 2006, respectively.

Dr. Saman K. Halgamuge
Professor, Melbourne School of Engineering
The University of Melbourne

Email: saman@unimelb.edu.au

Discovering the almost unknown in Biological Data

Finding hidden patterns in data or grouping data is essential for making sense of present-day biomedical research involving multi-dimensional, multi-scope large data sets. A promising method to achieve this goal is semi-supervised learning that can discover almost unknown knowledge. The main advantage of this machine learning approach is the ability to adapt its structure using the data set features (i.e. learn), thus making it immensely useful for many applications including work of the presenter in Environmental Genomics and microarray data analysis.

About Dr. Saman K. Halgamuge
The presenter Dr Saman Halgamuge is a Professor in the Melbourne School of Engineering of The University of Melbourne and a member of theschool wide initiative of Biomedical Engineering. He received Dipl.-Ing (1990) and Dr.-Ing (1995) degrees in Electrical Engineering from TechnicalUniversity of Darmstadt, Germany. He leads a group of postdocs and PhDstudents working on Pattern Recognition and Optimization looking into problems in Bioengineering and Sustainable Energy.

See his webpage http://www.mame.mu.oz.au/people/staff/saman_halgamuge.html

Dr. MingChu Li
Dalian University of Technology, Dalian, China

Email: li_mingchu@yahoo.com

Indirect Reciprocity in complicated reputation systems

Once business deal mode will be very frequent in the world along with the economy development. It is very difficult for an entity to make correct judgment for a strange adversary according to own previous experiences. Thus, the reputation of an entity among the group and its trustworthiness for other entities will be key factors for its success and making its benefits. How to build a good reputation system makes that the cooperation among strange entities is successful. In our study, we explore the problem and find that the use of indirect reciprocity can provide an efficient module for the cooperation and trade in strange entities among deal groups.

We first classify two new types of indirect reciprocity based M. Nowak and K. Sigmund (1998). Then a new mathematics module with indirect reciprocity is provided for a complicated reputation system, and the different functions are used to score the increase and the decrease of an reputation in our module, respectively, so that they are more closed to the cognizant criterion in our human society, and a punishment mechanism with arbitration is also provided to guarantee the stabilization of indirect reciprocity and to restrain vicious or revengeful punishments. Our experiments also show that the stabilization of indirect reciprocity in complicated reputation is good and our punishment mechanism would bring useful effect on indirect reciprocity.

About Dr. Ming Chu Li
MingChu Li received a Ph.D. degree from the University of Toronto (Toronto, Canada) in 1998. During 1997-2002, he worked as a system software Engineer in north america, where he helped in the design and implementation of algorithms and the structures of projects. In 2002, he was a Full Professor of Computer Science at Tianjin University (Tianjin, China). In 1993, he was a Full Associate Professor at the University of Science and Technology Beijing (Beijing, China). Prof. Li is currently a Full Professor of Computer Science at DaLian University of Technology (DLUT) (Dalian, China), where he has been since September 2004. He is also Vice Dean of School of Software of DLUT. His research interests include Hamiltonian Graph Theory, NP-Theory and Algorithms, Network and Information Security, Reputation Systems,and Grid computing and its applications. Prof. Li received several projects by National Nature Science Foundation of China, High-technology 863 plan of China and 973 plan of China since 2002, and have published more than 80 papers in journals and international academic conferences. He is the chair of 2007 International workshop on Graph Theory, Algorithm and its Applications, and 2008 workshop among Asia Information security labs.


1. IEEE CS Pre-Proceedings

All papers submitted before August 24 will be carefully reviewed by at least 2 members of PC and external reviewers. Accepted and registered papers will be included in IEEE CS proceedings, and this proceedings will be distributed at the conference site.

2. CCIS Post-Proceedings

All papers submitted between August 25 and October 25 will be reviewed by at least 3 members of PC and external reviewers. Accepted registered papers will be included in SERSC CD proceedings (with ISBN & page numbers), and this CD proceeding will be distributed at the conference site.

After Conference, presented papers will be included in CCIS Post-Proceeding after revision. And it will be dispatched to each corresponding author by Springer.

And selected papers will be included in next journals.

  1. IJSEIA - International Journal of Software Engineering and Its Applications
  2. IJSIA - International Journal of Security and Its Applications
  3. IJHIT - International Journal of Hybrid Information Technology



Steering Co-chairs
Tai-hoon Kim, Hannam University, Korea
Wai Chi Fang, National Chiao Tung University, Taiwan

General Chair
Jianhua Ma, Hosei University, Japan

Program Co-chairs
Frode Eika Sandnes, Oslo University College, Norway
Hangbae Chang, Daejin University, Korea

Publicity Co-chairs
Timothy K. Shih, Tamkang University, Taiwan
Deok Gyu Lee, ETRI, Korea

International Advisory Board
Byeong-Ho KANG, University of Tasmania, Australia

Program Committee
Alexander Loui, Eastman Kodak Company, USA
Antonio Coronato, ICAR-CNR, Italy
Antonio Kruger, University of Muenster, Germany
Biplab Kumer Sarker, R & D, Innovatia Inc.
Birgit Hofreiter, University of Vienna, Austria
Bok-Min Goi, Multimedia University, Malaysia
Byeongho Kang, University of Tasmania, Australia
Chao-Tung Yang, Tunghai University, Taiwan
Chantana Chantrapornchai, Silpakorn University, Thailand
Chengcui Zhang, University of Alabama at Birmingham, USA
Chu-Song Chen, Academia Sinica, Taiwan
Costas Lambrinoudakis , University of the Aegean , Greece
David Taniar, Monash University, Australia
Dorin Bocu, University Transilvania of Brasov, Romania
Elhadi Shakshuki, Acadia University, Canada
Gokce Dane, Qualcomm, USA
Guenther Pernul, University of Regensburg, Germany
Haeng-kon Kim, Catholic Univ. of Taegu, Korea
Hakan Duman, University of Essex, UK
Hans Weigand, Tilburg University, Netherlands
Hans-Dieter Zimmermann, Swiss Institute for Information Research, HTW Chur, Switzerland
Hari Kalva, Florida Atlantic University, USA
Helmar Burkhart, University of Basel, Switzerland
Hiroshi Yoshiura, University of Electro-Communications, Japan
Hongxiu Li, Turku School of Economics, Finland
Igor Kotenko, St. Petersburg Institute for Informatics and Automation, Russia
Javier Garcia-Villalba, Complutense University of Madrid, Spain
Jiang (Leo) Li, Howard University, USA
Jianhua He, University of Essex, UK
Kim-Kwang Raymond Choo, Australian Institute of Criminology, Australia
Khoongming Khoo, DSO National Laboratories, Singapore
Kristof Van Laerhoven, TU Darmstadt, Germany
Kuo-Ming Chao, Coventry University, UK
Kwon Hyuk Jun, Yonsei University, Korea
Lan-Da Van, National Chiao Tung University, Taiwan
Lee Hong Joo, Seoul National University, Korea
Lei Ye, University of Wollongong, Australia
Ling-Jyh Chen, Academia Sinica, Taiwan
Liu Wanquan, Curtin University of Technology, Australia
Mei-Ling Shyu, University of Miami, USA
Ranjan Kini, Indiana University, USA
Rami Yared, JAIST, Japan
Rubem Pereira, MSc. Programme Leader School of Computing and Mathematical Sciences, UK
Ryuya Uda, Tokyo University of Technology, Japan
Samee U. Khan, Colorado State University, USA
Satoshi Kurihara, Osaka University, Japan
Seng W. Loke, La Trobe University, Australia
SeongHan Shin, JAIST, Japan
Sheng Zhong, State University of New York at Buffalo, USA
Simone Fischer-Hübner, Karlstad University, Sweden
Stefano Ferretti, Universita di Bologna, Italy
Tomasz Janowski, United Nations University, Macao
Tomoo Inoue, University of Tsukuba, Japan
Tony Y. T. Chan, The University of Akureyri, Iceland
Wei Feng, City University of Hong Kong, Hong Kong
Xiaowen Chu, Hong Kong Batist University, Hong Kong
Yao Chung Chang, National Taitung University, Twain
Yeong-Deok Kim, Woosong University, Korea
Yinsheng Li, Fudan University, China
Yong Liu, Abo Academy, Finlnd
Young Jin Nam, Daegu University, Korea
Zhaohao Sun, Hebei Normal University, PRC
Zhenjiang Miao, The Beijing Jiaotong University, China
Zhuowei Li, Indiana University, USA



Registration Deadline

All attendees for UNESST 2008 must make the registration. At least one author per paper must be accompanied by one Mandatory Registration.Without a dedicated registration, the paper can not be included in the Proceedings / Journals.


  1. Registration for IEEE CS pre-proceedings.
    Registration must be paid by September 30.

  2. Registration for CCIS post-proceedings.
    Registration fee must be paid by November 21.

Please click here to go to Registration pages:




1. International Information (updated on October 31)
2. Korean Information (updated on October 31)
If you have any question, please contact our travel agent:

Mrs. M. Yoo



Next 9 International Events will be held on December 13 ~ 15, 2008, Horizon Resort, Sanya, Hainan Island, China.



For general enquiries about UNESST 2008 Symposium or in case of any difficulty, please contact:

The UNESST Secretariat
Mr. Rosslin John Robless
Science & Engineering Research Support Center, Korea.
Email: unesst@sersc.org
Tel: +82 42 629 8386
Fax: +82 42 629 8383