Upload
phungkhanh
View
217
Download
0
Embed Size (px)
Citation preview
Message from the Steering Committee andGeneral Chairs
All research topics of IEEE NCA*, for more than one decade, have been con-tributing to the creation of the foundation of the Network/Cloud Computingresearch and application do domain. Now, Network/ Cloud Computing is be-coming the major mode of operation of the Information Technology Indus-try over the Internet. BIG Data, So�ware De�ned Networks (SDN), NetworkFunctions Virtualization (NFI), Internet of�ings (IoT) have profound e�ecton the innovations and modern society. �e challenge for Network CloudComputing is to realize a true Internet of �ings, a network capable of sup-porting potentially trillions of wireless connected devices and with overallbandwidth one thousand times higher that today’s wireless networks. Cur-rent IT technologies are approaching their limits. �e organizers of the IEEENCA2016 would like to recognize the support of the leading scientists in thisresearch �eld. �ey contributed to the NCA* as distinguished chairs, keynotespeakers or provided sponsorship.
We would like to mention some of the leading institutions and compa-nies, such as Massachusetts Institute of Technology – MIT Cambridge, MA;Akamai Technologies Inc., Cambridge, MA; IBM – �omas J. Watson Re-search Center, New York; Cornell University, USA; BBN Cambridge, MA,USA; Microso� Research, CA, USA; CNRS – LAAS, Toulouse, France; Uni-versity of Tennessee & Oakridge National Labs; National Science Founda-tion – NSF,USA; DARPA, USA; Cisco, MA, USA; Argonne National Lab –Chicago; European Research Counsel – ERC, Brussels, Belgium; Universityof Illinois at Urbana Champaign; International Research Institute on Auto-nomic Network Computing – IRIANC, Boston/ Munich Germany.We would like to thank all TPCmembers, PC Chair A. Gkoulalas-Divanis,
PCCo-Chair and Financial Chair A. Pellegrini, PCCo-Chair and PublicationChair P. Di Sanzo, for their voluntary hard work, which has contributed to thesuccess of IEEE NCA2016.Our special acknowledgments are to the IEEE Computer Society for its
Sponsorship and �e IEEE Computer Society Technical Committee on Dis-tributed Processing (TCDP).
Dimiter R. Avresky Mladen A. VoukSteering Committee Chair General Chair
1
Message from the Program Chairs
Dear friends, Dear colleagues, Dear participants,It is with great pleasure that we welcome you to the 15th edition of IEEE NCA. Overthe years, NCA has become a successful series of conferences that serves as a largeinternational forum for presenting and sharing recent research results and techno-logical developments in the �elds of Network and Cloud Computing. �is edition ofNCA features a lively, interesting, and stimulating program with a lot of opportuni-ties for discussing new results, on-going projects, and the future trend in our �elds.
As in the previous editions, the conference is organized in thematic sessions thatre�ect the diversity of topics. �is year, we received a total of 105 submissions, andaccepted 29 as full papers, which is a selective rate of acceptance of less than 28%.Additionally, 36 contributions have been accepted as short papers, to allow for amoredynamic and interactive event.
�e Technical Program Committee, consisting of 36 distinguished experts, madethis selection, closely aided by an External Review Committee of 28 additional ex-perts, active in our �elds. We thank from our hearts the Technical Program Com-mittee and the external reviewers for their invaluable e�ort in this process, whichmade possible this year’s excellent program. Special thanks are also due to the NCASteering Committee Chair Dimiter Avresky for his support in the organization of thisevent.
�e high quality of this edition is also attested by two distinguished papers, winnerof the best paper award (Cost-e�ective Processing for Delay-sensitive Applications inCloud of �ings Systems by Yucen Nan, Wei Li, Wei Bao, Flavia C. Delicato, PauloF. Pires, and Albert Y. Zomaya), and the best student paper award (Analysis of thePropagation Time of a Rumour in Large-scale Distributed Systems by Yves Mocquard,Samantha Robert, Bruno Sericola, and Emmanuelle Anceaume). We are also pleasedto host a keynote from Tim Strayer on “Evolving Systems for Situational Awareness”,which is expected to interest everyone attending the conference. �e topics of thisyear’s edition are well re�ecting the needs of IT technologies. Some of them include:cloud computing, autonomic management, machine learning, SDN, NVF, security,privacy, and virtualization.
�e success of a conference is mainly on the side of the participants, we thereforewarmly thank all the contributors and participants. �e team of chair persons dida huge work—despite all the di�culties and hindrances faced during the process—which �nally led to a very attractive program. We wish you a successful conference,and a pleasant stay in the beautiful Boston!
Aris Gkoulalas-Divanis Alessandro PellegriniProgram Chair Pierangelo Di Sanzo
Program Co-Chairs
2
Venue
Conference Location
IEEE NCA 2016 takes place in Cambridge, MA, USA, from October 31st toNovember 2nd, at the Hyatt Regency Cambridge Hotel. Technical sessions arelocated in the Paul Revere room, lunch will be served each day in the�omasPaine room.
RIVERSIDE PAVILION
HAYM SALOMANTHOMAS PAINE
A B
A B
COURTYARD
RECEPTION AREA CRISPUS ATTUCKS WILLIAM DAWESMOLLY PITCHER
ELEVATORS
PREFUNCTION
A
D
C
B
D
C
B A
PRESIDENT’S BALLROOM
OUTDOOR
COURTYARD
MEDIA ROOM
B PAUL REVERE
C
A
MAIN
ENTRANCE
FRONT
DESK
ESCALATOR
LOBBY LEVEL
PATRIOT’S HALL
WOMEN
MEN
Conference SessionsLunch Room
Registration desk
�e registration desk is located outside the main conference room. �e reg-istration desk is open everyday from 08:15.
Badges and WiFi
Please wear visibly your conference badges during conference sessions, lunch,and social event. It helps us with organizational matters.
Internet access is provided through WiFi. �e wireless setup to be used isHyatt Meeting. You will then be prompted with a sign-on page. �e pass-word to access the network is: IEEE2016.
3
Maps
An interactive version of the map is available online:
http://u.osmfr.org/m/103532/
Conference Banquet
�e conference banquet of IEEENCA2016will be held atLegal SeafoodKendallSquare, on Tuesday November 1st, starting at 19:30.To reach the venue, you can either have a pleasant walk near the Charles
River (around 30 minutes, green path) or you can take a bus (yellow path).�e direct bus line is CT2. You can get on at Amesbury St @ Vassar St and geto� at Kendall/MIT. It’s 2 stops, and should take around 10 minutes.
4
Keynote
Evolving Systems for Situational AwarenessDr. Tim Strayer
Abstract. �e most basic functions of any organism or organized unit re-quires understanding the environment. �is is accomplished through sens-ing; for organisms, sensing is an evolved faculty. �e same is true for militaryand �rst responder units such as squads, who are relying on more sophis-ticated sensing systems to gain greater situational awareness (SA) in orderto more e�ectively and safely conduct their missions. Adding sensing to thesquad, however, only solves part of the problem; theremust be an appropriatecommunications system in place tomake full use of the acquired SA informa-tion. �is talk will explore the use of content-based networking solutions fore�ciently distributing the SA information in a decentralized manner.
Dr. Tim Strayer is a Principal Scientist in RaytheonBBN Technologies’ Network and Communicationsgroup, where he leads several Government-fundedprojects focused on applying content-based net-working techniques to soldier communications atthe tactical edge. He joined BBN in 1997 fromSandiaNational Laboratories (California), where hewas developing novel transport protocols. At BBN,
he has worked on many DARPA and industry sponsored projects in the ar-eas of Active Networking, satellite packet switching, mobile IP, virtual privatenetworks, and routing systems, as well as many projects on attack tracing andbotnet detection. He received his PhD from theUniversity of Virginia in 1992.He haswritten over 30 journal and conference papers, 14 patents, several bookchapters, and two Addison-Wesley books.
5
Conference OverviewMonday, October 31
08:30 – 08:45 Conference Opening
08:45 – 10:00 Session 1: Systems, Architectures, and Applications
10:00 – 10:30 Co�ee Break
10:30 – 12:30 Session 2: Cloud Computing
12:30 – 14:00 Lunch
14:00 – 16:00 Session 3: Network Security I
16:00 – 16:30 Co�ee Break
16:30 – 18:30 Session 4: Networking
Tuesday, November 1
08:30 – 10:00 Session 5: Networking
10:00 – 10:30 Co�ee Break
10:30 – 11:00 Session 6: Internet of�ings
11:00 – 12:00 Keynote: Evolving Systems for Situational Awareness
12:30 – 14:00 Lunch
14:00 – 16:00 Session 7: Fault Tolerance
16:00 – 16:30 Co�ee Break
16:30 – 18:00 Session 8: Distributed Computing I and Energy E�ciency
19:30 Conference Banquet @ Legal Seafood Kendall Square
Wednesday, November 2
09:00 – 10:00 Session 9: Distributed Computing II
10:00 – 10:30 Co�ee Break
10:30 – 12:30 Session 10: Mobile Computing and Security
12:30 – 14:00 Lunch
14:00 – 16:00 Session 11: Performance, QoS, and Monitoring
16:00 – 16:30 Co�ee Break
16:30 – 18:00 Session 12: Network Security II
18:30 – 18:45 Conference Closing
6
Conference Program
Monday, October 31
Session 1: Systems, Architectures, and Applications
Crowdsourcing-based architecture forpost-disasterGeolocation: a com-parative performance evaluationFlorent Coriat, Anne Fladenmuller, Luciana Arantes and Olivier Marin
GeoTrie: AScalableArchitecture for Location-TemporalRangeQueriesover Massive GeoTagged Data SetRudyar Cortes, Xavier Bonnaire, Olivier Marin, Luciana Arantes and PierreSens
Characterizing GPS Outages: Geodesic Dead Reckoning Solution forVANETs and ITS (short paper)Pedro P. L. L. do Nascimento, Richard W. Pazzi, Daniel L. Guidoni and Le-andro A. Villas
ContextualGeotracking Service of IncidentMarkers inDisaster Search-and-Rescue Operations (short paper)Ev Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, SalmanAhmad and Prasad Calyam
Session 2: Cloud Computing
UsingNASParallel Benchmarks toEvaluateHPCPerformance inClouds(short paper)�iago Kenji Okada, Alfredo Goldman and Gerson G. H. Cavalheiro
AUser Level Approach to Schedule BoTApplications onPrivate Clouds(short paper)Maicon Anca dos Santos, Andre R. Du Bois and Gerson Geraldo H. Caval-heiro
HeterogeneousResourceAllocation inCloudManagement (short paper)Serdar Kadioglu, Mike Colena and Samir Sebbah
7
Leveraging an Homomorphic Encryption Library to Implement a Co-ordination Service (short paper)Eugenio A. Silva and Miguel Correia
Multi-PhaseProactiveCloudSchedulingFrameworkBasedonHighLevelWork�ow and Resource Characterization (short paper)Nelson Mimura Gonzalez, TerezaCristinaMelo de BritoCarvalho andCharlesChristian Miers
Task Based Load Balancing for CloudAwareMassivelyMultiplayer On-line Games (short paper)Andre Pessoa Negrao, Luıs Veiga and Paulo Ferreira
Session 3: Network Security I
DARSHANA: Detecting Route Hijacking For Communication Con�-dentialityKaran Balu, Miguel L. Pardal and Miguel Correia
MACHETE: Multi-path Communication for SecurityDiogo Raposo, Miguel L. Pardal, Luıs Rodrigues and Miguel Correia
Feature Set Tuning forMachine Learning based Network Intrusion De-tectionArnaldo Gouveia and Miguel Correia
ASecurityPolicyQueryEngine forFullyAutomatedResolutionofAnoma-lies in Firewall Con�gurations (short paper)Ahmed Bouhoula and Anis Yazidi
Enforcement of Global Security Policies in Federated Cloud Networkswith Virtual Network Functions (short paper)Philippe Massonet, SebastienDupont, ArnaudMichot, AnnaLevin andMas-simo Villari
Neutralizing Interest Flooding Attacks in Named Data Networks usingCryptographic Route Tokens (short paper)Aubrey Alston and Tamer Refaei
8
Evaluation of Distributed Denial of Service �reat in the Internet of�ings (short paper)Luis Alberto B. Pacheco, Joao J. C. Gondim, Priscila A. Solis Barreto and Ed-uardo Alchieri
Session 4: Networking
A Continuous Enhancement Routing Solution aware of Data Aggrega-tion for Wireless Sensor NetworksEdson Ticona Zegarra, Rafael Schouery, Flavio K. Miyazawa and LeandroA. Villas
Fast Hybrid Network Recon�guration for Large-Scale Lossless Inter-connection NetworksEvangelos Tasoulas, Ernst Gunnar Gran, Tor Skeie and Bjørn Dag Johnsen
AnO�set Based Global Sleeping Schedule for Self-OrganizingWirelessSensor Networks (short paper)Stephanie Imelda Pella, Prakash Veeraraghavan and Ghosh Somnath
Label Encoding Algorithm for MPLS SegmentRouting (short paper)Rabah Guedrez, Olivier Dugeon, Samer Lahoud and Geraldine Texier
Named Data Networking for Tactical Communication Environments(short paper)M. Tamer Refaei, Sean Ha, Zac Cavaliero and Creighton Hager
Reducing the Latency-Tail of Short-Lived Flows: Adding Forward ErrorCorrection in Data Centers (short paper)Klaus-Tycho Foerster, Demian Jaeger, David Stolz and Roger Wattenhofer
9
�e Cardinality-Constrained Paths Problem: Multicast Data Routingin Heterogeneous Communication Networks (short paper)Alvaro Velasquez, Piotr Wojciechowski, K. Subramani, Steven L. Drager andSumit Kumar Jha
Tuesday, November 1
Session 5: Software-Defined Networks
A Network Service Design and Deployment Process for NFV SystemsSadaf Musta�z, Francis Palma, Maria Toeroe and Ferhat Khendek
ViTeNA:AnSDN-BasedVirtualNetworkEmbeddingAlgorithmforMulti-Tenant Data CentersDaniel Caixinha, Pradeeban Kathiravelu and Luıs Veiga
A Scalable Peer-to-Peer Control Plane Architecture for So�ware De-�ned Networks (short paper)Kuldip Singh Atwal, Ajay Guleria and Mostafa Bassiouni
Enabling So�ware-De�ned Networking forWireless Mesh Networks inSmart Environments (short paper)Prithviraj Patil, Akram Hakiri, Yogesh Barve and Aniruddha Gokhale
SDAR: So�ware De�ned Intra-Domain Routing in Named Data Net-works (short paper)Yaoqing Liu and Hitesh Wadekar
Session 6: Internet of Things
Cost-e�ective Processing for Delay-sensitive Applications in Cloud of�ings SystemsYucen Nan, Wei Li, Wei Bao, Flavia C. Delicato, Paulo F. Pires and Albert Y.Zomaya
10
Smart SceneManagement for IoT-basedConstrainedDevicesUsingCheck-pointing (short paper)Francois Aıssaoui, Gene Cooperman,�ierry Monteil and Saıd Tazi
Session 7: Fault Tolerance
Byzantine Reliable Broadcast in Sparse NetworksSisi Duan, Lucas Nicely and Haibin Zhang
Evaluating Reliability Techniques in the Master-Worker ParadigmEvgenia Christoforou, Antonio FernandezAnta, KishoriM.Konwar andNico-las Nicolaou
NoSQL Undo: Recovering NoSQL Databases by Undoing OperationsDavid Matos and Miguel Correia
Exploiting Universal Redundancy (short paper)Ali Shoker
Towards Designing Reliable Messaging Patterns (short paper)Naghmeh Ivaki, Nuno Laranjeiro and Filipe Araujo
Tra�cEngineeringbasedonShortest PathRoutingAlgorithms forFTV(Free-Viewpoint Television) Applications (short paper)Priscila Solis and Henrique Domingues Garcia
vtTLS:AVulnerability-TolerantCommunicationProtocol (short paper)Andre Joaquim, Miguel L. Pardal and Miguel Correia
Session 8: Distributed Computing I and Energy Efficiency
Optimal Proportion Computation with Population ProtocolsYves Mocquard, Emmanuelle Anceaume and Bruno Sericola
CoVer-ability: ConsistentVersioning inAsynchronous, Fail-Prone,Message-Passing EnvironmentsNicolas Nicolaou, Antonio Fernandez Anta and Chryssis Georgiou
11
CMTS: Consensus-based Multi-hop Time Synchronization Protocol inWireless Sensor Networks (short paper)Amin Saiah, Cha�ka Benzaid and Nadjib Badache
V-Hadoop: Virtualized Hadoop Using Containers (short paper)Srihari Radhakrishnan, Bryan J. Muscedere and Khuzaima Daudjee
A Hardware and So�ware Web-Based Environment for Energy Con-sumption Analysis in Mobile Devices (short paper)SidarthaA. L. Carvalho, RafaelN. Lima, Daniel C. Cunha andAbel G. Silva-Filho
EnergyE�cientFileDistributionProblemand itsApplications (short paper)Kshitiz Verma, Alberto Garcıa-Martınez and Samar Agnihotri
On the Use of Nonlinear Methods for Low-Power CPU Frequency Pre-diction Based on Android Context Variables (short paper)Sidartha A. L. Carvalho, Daniel C. Cunha and Abel G. Silva-Filho
Wednesday, November 2
Session 9: Distributed Computing II
A Distributed Self-Recon�guration Algorithm for Cylindrical Lattice-Based Modular RobotsAndre Naz, Benoıt Piranda, Julien Bourgeois and Seth Copen Goldstein
Analysis of thePropagationTimeof aRumour inLarge-scaleDistributedSystemsYvesMocquard, SamanthaRobert, Bruno Sericola andEmmanuelle Anceaume
Cost Sensitive Moving Target ConsensusSisi Duan, Yun Li and Karl Levitt
Session 10: Mobile Computing and Security
Peripheral Authentication for Autonomous Vehicles (short paper)Shlomi Dolev and Nisha Panwar
12
E�cient Transmission Strategy Selection Algorithm forM2MCommu-nications: An Evolutionary Game ApproachSafa Hamdoun, AbderrezakRachedi, HamidouTembine andYacineGhamri-Doudane
On�e Privacy-Utility Tradeo� in Participatory Sensing SystemsRim Ben Messaoud, Nouha Sghaier,MohamedAliMoussa andYacineGhamri-Doudane
Decision-�eoretic Approach to Designing Cyber Resilient SystemsVineetMehta, PaulD. Rowe, Gene Lewis, AsheMagalhaes andMykel Kochen-derfer
�e Blockchain AnomalyChristopher Natoli and Vincent Gramoli
Safety Analysis of Bitcoin Improvement ProposalsEmmanuelle Anceaume,�ibaut Lajoie-Mazenc, Romaric Ludinard andBrunoSericola
Session 11: Performance, QoS, and Monitoring
AComparisonofGPUExecutionTimePredictionusingMachineLearn-ing and Analytical ModelingMarcos Amarıs, Raphael Y. De Camargo, Mohamed Dyab, Alfredo Goldmanand Denis Trystram
AQoS-Aware Controller for Apache StormM.Reza HoseinyFarahabady, Hamid R. Dehghani Samani, YidanWang, Al-bert Y. Zomaya and Zahir Tari
An Algorithm Based on Response Time and Tra�c Demands to ScaleContainers on a Cloud Computing SystemMarcelo Cerqueira de Abranches and Priscila Solis
SLA and Pro�t-aware SaaS Provisioning through Proactive Renegotia-tionAyaOmezzine, Narjes Bellamine Ben Saoud, Saıd Tazi andGene Cooperman
13
ModelingDynamicLocationUpdate Strategies forPCSNetworks (short paper)Chung-Chin Lu, Ruey-Cheng Shyu and Yung-Chung Wang
Client-Side Monitoring Techniques for Web Sites (short paper)Ricardo Filipe and Filipe Araujo
Session 12: Network Security II
To Route or To Secure: Tradeo�s in ICNs over MANETsHasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir and FareedZa�ar
Con�dential andAuthenticatedCommunications in aLargeFixed-WingUAV SwarmRichard B.�ompson and Preetha�ulasiraman
A Back-end O�oad Architecture for Security of Resource-constrainedNetworks (short paper)Jiyong Han and Daeyoung Kim
MANETsMonitoringwith aDistributedHybridArchitecture (short paper)Jose Alvarez, Stephane Maag and Fatiha Zaıdi
Secure Complex Monitoring Event Processing (short paper)Mehdi Bentounsi and Salima Benbernou
14
Conference Organization
General Chair Mladen A. Vouk, NC State University, USAProgram Chairs Aris Gkoulalas-Divanis, IBMWatson Health, USA
Alessandro Pellegrini, Sapienza University of Rome, ItalyPierangelo Di Sanzo, Sapienza University of Rome, Italy
Financial Chair Alessandro Pellegrini, Sapienza University of Rome, ItalyPublication Chair Pierangelo Di Sanzo, Sapienza University of Rome, Italy
Steering Dimiter R. Avresky, IRIANC, USA/GermanyCommittee Chair
Technical Program Committee
Emmanuelle Anceaume, CNRS / IRISA, FranceSpiros Antonatos, IBM Research, Dublin, IrelandLuciana Arantes, Universite Pierre et Marie Curie-Paris6, FranceDimiter R. Avresky, IRIANC, Boston, USA / Munich, GermanyArndt Bode, Technische Universitat Munchen, GermanyYann Busnel, Crest (Ensai) / Inria, FranceBruno Ciciani, Sapienza, University of Rome, ItalyGene Cooperman, Northeastern University, MA, USAMichel Cukier, University of Maryland, MD, USAPeter Desnoyers, Northeastern University, MA, USAPierangelo Di Sanzo, Sapienza University of Rome, ItalyAris Gkoulalas-Divanis, IBMWatson Health, Cambridge, MA, USAAlfredo Goldman, University of Sao Paulo, BrazilDoan Hoang, University of Technology, Sydney, AustraliaBarry W. Johnson, University of Virginia, VA, USAZbigniew Kalbarczyk, Coordinated Science Laboratory, IL, USAKostas Katrinis, IBM Dublin Technology Campus, IrelandRoger Khazan, MIT Lincoln Laboratory, MA, USAIoannis Konstantinou, National Technical University of Athens, GreeceNectarios Koziris, National Technical University of Athens, GreeceMichael Liu, the Chinese University of Hong KongErik Maehle, University of Lubeck, GermanyGrzegorz Malewicz, Facebook, USA
15
Antonio Manzalini, Telecom Italia Lab, ItalyPhilippe Massonet, CETIC, BelgiumRasmus L. Olsen, Aalborg University, DenmarkPhilippe Owezarski, LAAS-CNRS, FranceRoberto Palmieri, Virginia Tech, VA, USAAlessandro Pellegrini, Sapienza University of Roma, ItalyFrancesco Quaglia, Sapienza, University of Rome, ItalyHans-Peter Schwefel, Aalborg University, DenmarkPierre Sens, LIP6 - University of Paris 6 - CNRS – INRIA, FranceJacek Sera�nski, OtherLevelsWilfried Steiner, TTTech Computertechnik AG, AustriaMladen A. Vouk, NC State University, NC, USAGabriel Wainer, Carleton University, ON, Canada
External Reviewers
Andrea Ceccarelli, Universita degli studi di Firenze, ItalyDavide Cingolani, Sapienza University of Rome, ItalyDaniel Cordeiro, University of Sao Paulo, BrazilKaterina Doka, National Technical University of Athens, GreeceSimone Economo, Sapienza University of Rome, ItalyAthena Elafrou, National Technical University of Athens, GreeceRene Gabner, FTW Telecommunications, AustriaIoannis Giannakopoulos, National Technical University of Athens, GreeceJan Haase, Universitat zu Lubeck, GermanyPinjia He,�e Chinese University of Hong KongMichel Hur�n, Inria Rennes, FranceMauro Ianni, Sapienza University of Rome, ItalyEvie Kassela, National Technical University of Athens, GreeceMohammed Kemal, Aalborg Universitet, DenmarkJian Li,�e Chinese University of Hong KongRomaric Ludinard, Crest (Ensai) / Inria Rennes, FranceTatiana Madsen, Aalborg Universitet, DenmarkRomolo Marotta, Sapienza University of Rome, ItalyNikela Papadopoulou, National Technical University of Athens, Greece�omas Paulin, Aalborg Universitet, DenmarkNuno Pratas, Aalborg Universitet, Denmark
16
Nicolo Rivetti, Sapienza University of Rome, ItalyHan Shao,�e Chinese University of Hong KongDimitrios Siakavaras, National Technical University of Athens, GreeceHui Xu,�e Chinese University of Hong KongXiaotian Yu,�e Chinese University of Hong KongJichuan Zeng,�e Chinese University of Hong KongShenglin Zhao,�e Chinese University of Hong Kong
17