Academic Journals Database
Disseminating quality controlled scientific knowledge

Guest Editorial

Author(s): Fei Yu | Chin-Chen Chang | Wen Chen | Jun Zhang | Guangxue Yue

Journal: Journal of Networks
ISSN 1796-2056

Volume: 5;
Issue: 6;
Start page: 631;
Date: 2010;
Original page

Keywords: Information Processing | Intelligent Information Systems

This special issue comprises of seven selected papers from the International Symposium on Information Processing 2009(ISIP 2009), Huangshan, China, 21-23 August 2009 and International Symposium on Intelligent Information Systems and Applications 2009 (IISA 2009) , Qingdao, China, 28-30 October 2009. The conference received 623 papers submissions from 11 countries and regions, of which 320 papers were selected for presentation after a rigorous review process. From these 320 research papers, through two rounds of reviewing, the guest editors selected eight as the best papers on the Networks track of the Conference. The candidates of the Special Issue are all the authors, whose papers have been accepted and presented at the ISIP 2009 and IISA 2009, with the contents not been published elsewhere before.The ISIP 2009 are Co-sponsored by Jiaxing University, China, Peoples' Friendship University of Russia, Russia, Nanchang HangKong University, China, Sichuan University, China, Hunan Agricultural University, China, National Chung Hsing University, Taiwan, Guangdong University of Business Studies, China, Academy Publisher of Finland, Finland.The IISA 2009 are Co-sponsored by Qingdao University of Science & Technology, China; Peoples’ Friendship University of Russia, Russia; Nanchang HangKong University, China; National Chung Hsing University, Taiwan; Hunan Agricultural University , China; Guangdong University of Business Studies, China; Jiaxing University, China. Technical Co-Sponsors of the conference are IEEE, IEEE Shandong Section, IEEE Shanghai Section.“Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes”, by Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen and Guowen Li, proposes two forward-secure multisignature schemes, one forward-secure threshold signature scheme, and one forward-secure blind signature scheme.“Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains”, by Yu Rong-Wei, Yin Fan, Ke Jin and Wang Li-Na, proposes a behavior-based attestation of policy enforcement for distributed services in trusted virtual machine, which is adapted to trusted virtual domain.“The Maximum Coverage Set Calculated Algorithm for WSN Area Coverage”, by Xin He, Hua Yang and Xiaolin Gui. this paper firstly utilizes node minimum layer overlapping subfield to find out area minimum coverage value, as the upper limit of coverage node set’s number. On the basis of this maximum,it put forward to way of dividing node set. Secondly, the maximum coverage set number calculated algorithm is proposed.“Energy Efficient Path-constrained Sink Navigation in Delay-guaranteed Wireless Sensor Networks”, by Shuai Gao and Hongke Zhang. This paper focuses on the path selection problem in delay-guaranteed sensor networks with a path-constrained mobile sink. The optimal path is chosen to meet the requirement on delay as well as minimize the energy consumption of entire network.“Ad Hoc Network Measurement Based on Network Tomography: Theory, Technique, and Application”, by Yao Ye and Cai Wandong,proposes an Ad Hoc network measurement model, and presents in detail the functions and implementation of each elements in this model.“Agent Communication Language for Automated Negotiation Online”, by Mukun Cao, proposes a negotiation communication language expanded from KQML, The work has been attempted in such a way so as to provide general support for a wide variety of commercial negotiation circumstances, and therefore to be particularly suitable for electronic commerce.“An Efficient Receiver Deniable Encryption Scheme and Its Applications” by Bo Meng, and JiangQing Wang. proposes a practical efficient receiver deniable encryption scheme based on BCP commitment scheme and idea of Klonowski et al. is proposed. The proposed scheme is a one-move scheme without any pre-encryption information required to be sent between the sender and the receiver prior to encryption.“Bit-coding Aggregation Tree for Global Network Link Quality Representation in WSN”, by Zhenhua Wu, Jian Shu, and Pengliu Tan, presents a three levels framework for global network link quality aggregation and representation (LQAR) and a bit-coding aggregation tree (BAT) algorithm for link quality aggregation and routing to sink node. The LQAR framework includes three levels: storage and digest level, aggregation level and representation level. BAT algorithm integrates bit-coding method with aggregation tree for energy saving.We are particularly grateful to IEEE Fellow Prof. Gary G. Yen, President-Elect of IEEE Computational Intelligence Society and Editor-in-Chief of IEEE Computational Intelligence Magazine, Oklahoma State University, USA; IEEE Fellow Prof. Jun Wang from Chinese University of Hong Kong, Hong Kong; IEEE Fellow Prof. Derong Liu, Associate Editor of IEEE Trans. on Neural Networks, University of Illinois at Chicago, USA; IEEE & IET Fellow Prof. Chin-Chen Chang from National Chung Hsing University, Taiwan, and Chair of IEEE Shanghai Section; and Prof. Junfa Mao at Shanghai Jiaotong University, China. for accepting our invitation to deliver invited talks at this year’s conference. We wish to thank the Jiaxing University,China and Qingdao University of Science & Technology, China for providing the venue to host the conference.We would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and for their valuable contributions. We wish to express our deepest gratitude to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for their thorough reviews under a tight time schedule. Last, but not least, our thanks go to the Editorial Board of the Journal of Networks for the exceptional effort they did throughout this process. The ISIP 2010 will be held in Guangdong University of Business Studies, China, we are looking forward to seeing you in Guangdong University of Business Studies, China.In closing, we sincerely hope that you will enjoy reading this special issue.

Tango Jona
Tangokurs Rapperswil-Jona

     Affiliate Program