8th International Joint Conference on e-Business and Telecommunications
ICETE 2011 – International Joint Conference on e-Business and Telecommunications: July 18-21, Seville, Spain
July 18-21     Seville, Spain
Keynote Speakers

ICETE is a joint conference composed of six concurrent conferences: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS.
The six conferences are always co-located and held in parallel.
Keynote lectures are plenary sessions and can be attended by all ICETE participants.

KEYNOTE SPEAKERS LIST

Han-Chieh Chao, National Ilan University, Taiwan
          Title: WiMAX? A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks

Vincenzo Piuri, Università degli Studi di Milano, Italy
          Title: Biometrics Privacy: Technologies and Applications

Enrique Cabello, University Rey Juan Carlos, Spain
          Title: Face Biometrics without Intrusion in Airport

Winfried Lamersdorf, University of Hamburg, Germany
          Title: Paradigms of Distributed Software Systems: Services, Processes, and Self-Organization

 

Keynote Lecture 1
WiMAX?
A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks
Han-Chieh Chao
National Ilan University
Taiwan


Brief Bio
Han-Chieh Chao is a joint appointed Full Professor of the Department of Electronic Engineering and Institute of Computer Science & Information Engineering where also serves as the president of National Ilan University, I-Lan, Taiwan, R.O.C. He has been appointed as the Director of the Computer Center for Ministry of Education starting from September 2008 to July 2010. His research interests include High Speed Networks, Wireless Networks, IPv6 based Networks, Digital Creative Arts and Digital Divide. He received his MS and Ph.D. degrees in Electrical Engineering from Purdue University in 1989 and 1993 respectively. He has authored or co-authored 4 books and has published about 280 refereed professional research papers. He has completed 100 MSEE thesis students and 3 PhD students. Dr. Chao has received many research awards, including Purdue University SRC awards, and NSC research awards (National Science Council of Taiwan). He also received many funded research grants from NSC, Ministry of Education (MOE), RDEC, Industrial Technology of Research Institute, Institute of Information Industry and FarEasTone Telecommunications Lab. Dr. Chao has been invited frequently to give talks at national and international conferences and research organizations. Dr. Chao is the Editor-in-Chief for IET Communications, Journal of Internet Technology, International Journal of Internet Protocol Technology and International Journal of Ad Hoc and Ubiquitous Computing. Dr. Chao has served as the guest editors for Mobile Networking and Applications (ACM MONET), IEEE JSAC, IEEE Communications Magazine, Computer Communications, IEE Proceedings Communications, the Computer Journal, Telecommunication Systems, Wireless Personal Communications, and Wireless Communications & Mobile Computing. Dr. Chao is an IEEE senior member and a Fellow of IET (IEE). He is a Chartered Fellow of British Computer Society.


Abstract
The telecommunication service providers regard the fixed WiMAX (Worldwide Interoperability for Microwave Access) as a solution of last mile problem, but its coverage range is not ideal. The current placement of fixed infrastructure and mobile 802.16 networks still exists many problems, such as non-light-of-sight (NLOS) connections, low signal to noise ratio (SNR) and coverage holes which bring shadowing effects. In order to solve the above-mentioned embarrassed problems, the IEEE 802.16j is proposed and aimed to extend the transmitting area by using relay technologies. Relay Station (RS) can be thought as a lightweight base station (BS) in 802.16j networks.

The coverage problem in IEEE 802.16j networks is defined based on integer linear programming. We also propose the Supergraph Tree algorithm to deploy the base stations and relay stations at the lowest cost position to support desired utilities and constrained by deployment limitations. The proposed algorithm is formulated based on graph theoretic technique, and analyzed with the simulation results. The results show the proposed algorithm provides the lowest construction cost with different network topologies.

 

Keynote Lecture 2
Biometrics Privacy: Technologies and Applications
Vincenzo Piuri
Università degli Studi di Milano
Italy


Brief Bio
Vincenzo Piuri obtained the Ph.D. in Computer Engineering in 1989, at Politecnico di Milano, Italy. Since October 2000 he is Full Professor in Computer Engineering at the University of Milano, Italy. He was Visiting Professor at the University of Texas at Austin during the summers from 1993 to 1999.
His research interests include biometrics, signal and image processing for industrial applications, theory and industrial applications of neural networks, intelligent measurement systems, fault tolerance, and digital processing architectures. Original results have been published in more than 300 papers in book chapters, international journals, and proceedings of international conferences.
He is Fellow of the IEEE and Distinguished Scientist of ACM. He was Associate Editor of the IEEE Transactions on Neural Networks and the IEEE Transactions on Instrumentation and Measurement. He is Series Editor of the Tutorial Series on Biometrics in the IEEE e-Learning Library. He is IEEE Division X Director (2010-2012). He was President of the IEEE Computational Intelligence Society, Vice President for Publications of the IEEE Instrumentation and Measurement Society and the IEEE Systems Council, and Vice President for Education of the IEEE Biometrics Council. More information at http://www.dti.unimi.it/piuri


Abstract
The use of biometric traits for security and secure applications (including personal identification, access control, forensics applications, e-commerce, e-government, and e-health) is receiving an increasing attention. The main reason for such an interest is that biometric features of individuals are tightly bound with their identities. Moreover, they cannot be easily forgotten or lost. Therefore they provide significant potentials in applications where both security and client convenience are needed.
A serious concern in the design and use of biometric authentication systems is the privacy protection of the information derived from human biometric traits, especially since such traits cannot be replaced. The goal is to secure the biometric data and prevent improper access and abuse of biometric information.
Some techniques have been proposed in addition to conventional cryptography, by combining cryptography and biometrics to allow for building protection in the biometric templates themselves. These solutions can increase the confidence in biometric systems when biometric information is stored for verification, even though some critical aspects must be addressed properly to ensure their usability with real biometrics in real-world applications.
This keynote speech introduces the biometrics technologies and applications with specific emphasis on a comprehensive system design methodology which takes into account the need for privacy protection among the application requirements. Privacy-aware multimodal biometric system and modular structured schemes are presented to adapt the solution to the application requirements. Recent results are discussed. Suggestions and design guidelines are also offered.

 

Keynote Lecture 3
Face Biometrics without Intrusion in Airport
Enrique Cabello
University Rey Juan Carlos
Spain


Brief Bio
BSc in Physical Sciences (esp: Electronics) by the University of Salamanca (Spain). PhD. by the Polytechnic University of Madrid (Best Computer Science Thesis prize). Full time professor at the University of Salamanca (1990-1998) and, since 1998, full time professor at University Rey Juan Carlos.
Since 1990 he was working in Computer vision projects, applied to real environments. Now he is focused in computer vision systems applied to security in real environments such as airports (face recognition and verification, detection of suspicious behaviors) and to traffic safety (pedestrian and vehicles detection and tracking, driver surveillance to detect distractions).


Abstract
In recent years biometric applications has start to move from research labs to real world applications. Examples of this movement are the huge amount of fingerprint sensors and the increased interest in face recognition and iris identification as mature technologies to be placed in access control. These leading technologies are in the roots of the development of two fields of interest both related with security applications. First one is the Automatic Border Crossing (ABC) systems. These systems use biometric technology to avoid police inspection of passports; data considered is mainly facial and fingerprint verification. And second one is protection of critical infrastructure. In this field, computer vision and surveillance systems are the selected technologies. Both fields can be combined in the use of placed cameras in one critical infrastructure like an airport to perform face identification. One of the main advantages of facial biometry over fingerprint or iris identification is that can be used without the awareness of the subject. This keynote speech presents a project developed in an airport to evaluate face identification considering placed cameras.
Performance decreases if the subject is non-collaborative or in a high uncontrolled environment. Lessons learned and results obtained from surveillance cameras and comparison with other environments and systems will be shown.

 

Keynote Lecture 4
Paradigms of Distributed Software Systems: Services, Processes, and Self-Organization
Winfried Lamersdorf
University of Hamburg
Germany


Brief Bio
Winfried Lamersdorf is a full Professor in the Informatics Department of Hamburg University since 1991 and head of the "Distributed and Information Systems" group. After his PhD in Computer Science in 1985, he spent a year at the University of Maryland, USA, and was, from 1983 to 1990, scientific staff member at the IBM Scientific and European Networking Centre(s) in Heidelberg working in the area of open distributed applications. He has lead and conducted several major research projects - e.g. sponsored by the German national research fund (DFG), the European Commission (in FP 5, 6, and 7), the German ministry for education and research (BMBF), as well as with a number of industry partners. He has (co-) authored and edited numerous scientific papers as well as several books. He has chaired and organized several scientific conferences - including the initial IFIP e-commerce conference in 1998 which, later on, led to the IFIP I3E conference series. He is also a co-chair of IFIP WG 6.11. He has also some 10 years of experience in international standardization and is, currently, a member of the EU 7FP Network of Excellence on "Software Services and Systems" (S-Cube).


Abstract
State-of-the-art distributed software systems as well as applications as, e.g., e-commerce, e-business, e-services etc. are fundamentally based on the paradigm of distributed software or application services.
Such services may already exist or may be newly developed for specific application purposes. They are able to interact - also in open and heterogeneous distributed environments - based on standardised interfaces and interconnection protocols as, e.g., provided by related "Web Services" standards.
On the application side, advanced service-based software systems reflect (e.g. business) scenarios which are increasingly structured as sets of distributed co-operating entities. Such applications typically involve several and heterogeneous services from various sources - internally as well as from external sites. Further on, based on elementary services, more complex business processes or procedures help to realise more complex business semantics by composing services - even in dynamically changing environments - according to predefined (functional as well as non-functional) application needs.
If, finally, such service become more and more "independent" and act "autonomously" (e.g. as "agents") for achieving given goals and characteristics, services as well as business procedures should increasingly self-organise according to another actual distributed systems paradigm.
The talk gives an overview of related problems, solutions, concepts, projects, implementations as well as some related standards.