Welcome Message

IEEE CIT 2016 is the 16th edition of the highly successful International Conference on Computer and Information Technology. The goal of the conference is to provide a forum for scientists, engineers and researchers to discuss and exchange novel ideas, results, experiences and work-in-process on all aspects of computer and information technology. CIT has become a major platform for researchers and industry practitioners from different fields of computer and information technology. Each year, CIT attendees appreciate and benefit from multidisciplinary exchanges in computer and information technology. In previous years, CIT has attracted many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. These papers highlight foundational work that strives to push beyond limits of existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services.

IEEE CIT 2016 will be held on 7-10 December 2016 in Shangri-La's Fijian Resort and Spa, Fiji, co-located with SC2-2016, IOV 2016, and IEEE SocialSec 2016. Learn More.

Conference Program

IEEE CIT 2016 Conference Proceedings

Wednesday 07 Dec 2016

16:00 - 17:00
Registration @ Ratu Makutu South Terrace
17:00 - 18:00
Welcome Cocktail Party and Light Diner @ Rara Lawn
19:00 - 20:00
Multicultural Event @ Ratu Makutu 1

Thursday 08 Dec 2016

08:30 - 09:15
Opening Ceremony @ Ratu Makutu Event Center
  • Robust Allocation of Resources to Enhance System Performance
    Professor H. J. Siegel
    Colorado State University
    USA
  • Computational Social Science Meets Big Data
    Professor Feng Xia
    Dalian University of Technology
    China
  • 10:45 - 11:15
    Conference Photo Session & Morning Tea @ Kalevu Verandah
  • Generalized Concatenated Codes for Block and Device Failure Protection
    Peter Trifonov, Yuangang Wang
  • Generating Test Suites with High 3-Way Coverage for Software Testing
    Yasmeen Akhtar, Soumen Maity, Reshma C. Chandrasekharan
  • Application Characterization Assisted System Design
    I-Hsin Chung, Carlos Costa, Leopold Grinberg, Hui-Fang Wen
  • Template4EHR: Building Dynamically GUIs for the Electronic Health Records Using Archetypes
    André Magno Costa de Araújo, Valéria Cesário Times, Marcus Urbano Silva
  • Adaptations of *AIDA programs
    Yutaka Watanobe, Nikolay Mirenkov, Mirai Watanabe
  • Spatial Alloy: An Alloy Extension for Modeling Spatial Properties
    Fei Tang, Jing Liu, Junfeng Sun
  • 13:15 - 14:15
    Lunch @ Sea Side View
  • Searchable Symmetric Encryption: Potential Attacks, Practical Constructions and Extensions
    Professor Jinjun Chen
    University of Technology Sydney
    Australia
  • 15:00 - 15:30
    Afternoon Tea @ Kalevu Verandah
  • inLoc : Location-aware Emergency Evacuation Assistant
    Kaan Eksen, Tacha Serif, George Ghinea, Tor-Morten Grønli
  • QoE Control of Network using Collective Intelligence of SNS in Large-Scale Disasters
    Chihiro Maru, Miki Enoki, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi
  • Reducing risk of rollover in curve for heavy-duty vehicles with an agent-based advanced driver assistance system
    Willy Tiengo
  • Comparison of Accuracy and Precision of GPS-Enabled Mobile Devices
    Leong Lee, Matthew Jones, Gregory Ridenour, Sam Bennett, Arisha Majors, Bianca Melito, Michael Wilson
  • Drishti: A Mobile Application Based Multipurpose Surveillance System
    Md. Arifuzzaman, Md. Jahidul Islam, SM Sazirul Islam, Rajesh Palit
  • Brain Cancer Diagnosis- Association Rule Based Computational Intelligence Approach
    Dr. Jesmin Nahar, Dr. Tasadduq Imam, Dr. Kevin Tickle, Dr.Shawkat Ali, Dr.Yi-Ping Phoebe Chen
  • The SmartPT: Wearble sensor integration and tracking in training equipment
    Teddy Falsen Hiis, Tor-Morten Groenli, Gheorghita Ghinea
  • Development of an Android Service to add IOIO hardware features to Android Apps
    Slim Chtourou, Mohamed Kharrat, Nader Ben Amor, Mohamed Jallouli, Mohamed Abid
  • Analysis of Complex Data in Telecommunications Industry
    Nayana Gupta, Mohammed Wasid, Rashid Ali
  • A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative Environment
    Smrithy G S, Ramadoss Balakrishnan
  • Quantum computing in big data analytics: a survey
    Tawseef Shaikh, Rashid Ali
  • Moving towards the Edge with Software-Defined IoT
    Ralph Deters
  • Campus Ride: An Environment-friendly Ride Sharing Platform for Academic Institutions
    Anindya Chowdhury, Abid Jamal, Rubayath Alam, Rajesh Palit
  • 18:30 - 19:30
    Fijian Wine-Kava Drinking Session @ Takali Pool Deck

    Friday 09 Dec 2016

  • Urban Sensing: Making Smart Cities Friendly and Safe to Pedestrians
    Professor Kwei-Jay Lin
    University of California, Irvine, USA
    NTU IoX Center, Taiwan
    Nagoya Institute of Technology, Japan
  • A Survey on Mobility Management Techniques in VANETs
    Bilal Haider, Bilal Haider, Farhan Aadil
  • Architecture for Hybrid Language Systems
    Mirai Watanabe, Yutaka Watanobe, Alexander Vazhenin
  • Relative and absolute positioning in ultra dense Mems system
    Dermas Moffo, Philippe Canalda, François Spies
  • Implications of Domain Ontology Development for System Design Research
    Shah J MIAH, Ahmad Z Samsudin, Hafizul Islam
  • Implementation of Alternating Median Based Round Robin Scheduling Algorithm
    Salman Arif, Naveed Ghaffar, Ali Javed
  • 10:45 - 11:15
    Morning Tea @ Kalevu Verandah
  • Extracting actions with improved Part Of Speech tagging for social networking texts
    Ameni Youssfi Nouira, Yassine Jamoussi, Henda Ben Ghezela Hajjami
  • Community detection for cold start problem in personalization
    Ankush Bhatia
  • Degree of Integration into Weibo (DIW) Evaluation Model and the Statistical Analysis of Group Behavior Characteristics
    Xi Chen, Jianwei Li, Zeyu Zheng, Tianran Wang, Huancheng Yang
  • Dynamic Community Mining and Tracking Based on Temporal Social Network Analysis
    Xiaokang Zhou, Wei Liang, Bo Wu, Zixian Lu, Shoji Nishimura, Takashi Shinomiya, Qun Jin
  • User Actions and Timestamp Based Personalized Recommendation for E-commerce System
    Congcong Chen, Dong Wang, Yue Ding
  • An Improved Ant Colony Optimization Algorithm for Recommendation of Micro-learning Path
    Qin Zhao, Yueqin Zhang, Jian Chen
  • 13:15 - 14:15
    Lunch @ Sea Side View
  • Recommendations based on Offline Data Processing: Techniques, Features, and Challenges
    Professor Wanlei Zhou
    Deakin University
    Australia
  • 15:00 - 15:30
    Afternoon Tea @ Kalevu Verandah
  • QoS-aware Traffic-efficient Web Service Selection over BigData Space
    T. H. Akila S. Siriweera, Incheon Paik, Banaage T. G. S. Kumara
  • Joint Optimization of VM Placement and Rule Placement towards Energy Efficient Software-Defined Data Centers
    Hong Yao, Hui Li, Chao Liu, Muzhou Xiong, Deze Zeng
  • Availability Modeling and Analysis of a Virtualized System using Stochastic Reward Nets
    Dong Seong Kim, Jin B. Hong, Tuan Anh Nguyen, Fumio Machida, Kishor S. Trivedi
  • Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems
    Nitin Naik, Paul Jenkins
  • High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy
    Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie McCann
  • Hurst Parameter based Anomaly Detection for Intrusion Detection System
    Song Jin Yu, Pauline Koh, Hyukmin Kwon, Dong Seong Kim, Huy Kang Kim
  • Hybrid Attack Path Enumeration System based on Reputation Scores
    Young Hoon Moon, Ji Hong Kim, Dong Seong Kim, Huy Kang Kim
  • Security Modelling and Analysis of Dynamic Enterprise Networks
    Simon Yusuf, Mengmeng Ge, Jin Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim
  • Performance Evaluation of Game Theory-Based Fault Diagnosis Algorithm Under Partial Comparison Syndrome
    Mourad Elhadef, Sofiane Grira
  • 18:00 - 19:00
    Poll Volleyball Competition - China Vs Rest @ Pool A

    Saturday 10 Dec 2016

  • Particle Swarm Stepwise Algorithm (PaSS) on Multicore Hybrid CPU-GPU Clusters
    Mu Yang, Ray-Bing Chen, I-Hsin Chung, Weichung Wang
  • Concept Drift Detection on Streaming Data under Limited Labeling
    Young In Kim, Cheong Hee Park
  • Bag-of-Concepts Document Representation for Bayesian Text Classification
    Marcos Mouriño-García, Roberto Pérez-Rodríguez, Luis Anido-Rifón, Miguel Gómez-Carballa
  • Impact of Future Intelligent Information Technologies on the Methodology of Scientific Research
    Andrzej M.J. Skulimowski
  • A Controlled Experiment Between Two Methods on Ten-Digits Air Writing
    Yiming Zhou, Zeyang Dai, Lei Jing
  • Distributed multi-class rule based classification using RIPPER
    Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay K. Sahay
  • 10:45 - 11:15
    Morning Tea @ Kalevu Verandah
  • Feature Descriptors: a Review of Multiple Cues Approaches
    Cuong Pham, Yuichi Yaguchi, Keitaro Naruse
  • Saliency Detection via Background Seeds Combined With Bayesian Model
    Xiao Lin, Pengfei Bai, Linhua Jiang
  • Piecewise polynomial high-order hidden Markov models with applications in speech recognition
    Lee-Min Lee
  • Sentence-Level Automatic Lecture Highlighting Based on Acoustic Analysis
    Xiaoyin Che, Sheng Luo, Haojin Yang, Christoph Meinel
  • Micro-scale Severe Weather Prediction based on Region Trajectories Extracted from Meteorological Radar Data
    Xingang Wang, Suiping Qi
  • 13:15 - 14:15
    Lunch @ Sea Side View
  • Advanced Techniques on Searchable Encryption
    Dr Joseph Liu
    Monash University
    Australia
  • 15:00 - 15:30
    Afternoon Tea @ Kalevu Verandah
  • Multi-way Clustering for Heterogeneous Information Networks with General Network Schema
    Jibing Wu, Yahui Wu, Su Deng, Hongbin Huang
  • Tabu Approach for Adaptive Resource Allocation and Selection Carrier Aggregation in LTE-Advanced Network
    Radhia khdhir, Kais Mnif, Aymen Belghith, Lotfi Kamoun
  • Improving DHT Load Balance Using the Churn
    Qi Zhang, Jie Yu, Qingbo Wu, Shasha Li
  • Reasonably Migrating Virtual Machine in NFV-featured Networks
    Jing Xia, Deming Pang, Zhiping Cai, Ming Xu, Gang Hu
  • Towards Privacy-Aware Web Services Compositions
    Imen Khabou, Mohsen Rouached, Mohamed Abid, Rafik bouaziz
  • Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator
    sonia KOTEL, Fatma SBIAA, Medien ZEGHID, Mohsen MACHHOUT, Adel BAGANNE, Rached TOURKI
  • Analysis on Bidding Behaviours for Detecting Shill Bidders in Online Auctions
    Nazia Majadi, Jarrod Trevathan
  • A Selective Encryption Scheme with Multiple security Levels for the H.264/AVC Video Coding Standard
    fatma SBIAA, Sonia KOTEL, Medien ZEGHID, Rached TOURKI, Mohsen MACHHOUT, Adel BAGANNE
  • 18:00 - 19:00
    Conference Closing @ Ratu Makutu Event Center
    19:00 - 24:00
    Conference Diner & South Pacific Cultural Night @ Marau Village

    Program in a Glance

    Keynotes

    Robust Allocation of Resources to Enhance System Performance

    Professor H. J. Siegel

    Department of Electrical and Computer Engineering and
    Department of Computer Science
    Colorado State University
    Fort Collins, Colorado, USA

    Learn More

    Abstract

    Throughout all fields of science and engineering, it is important that resources are allocated so that systems are robust against uncertainty. The robustness analysis approach presented here can be adapted to a variety of computing, communication, and information technology environments, such as high performance computing, clouds, grids, internet of vehicles, big data, security, embedded, multicore, content distribution, wireless, and sensor networks.

    What does it mean for a system to be “robust”? How can the performance of a system be robust against uncertainty? How can robustness be described? How does one determine if a claim of robustness is true? How can one decide which of two systems is more robust? We explore these general questions in the context of parallel and distributed computing systems. Such computing systems are often heterogeneous mixtures of machines, used to execute collections of tasks with diverse computational requirements. A critical research problem is how to allocate heterogeneous resources to tasks to optimize some performance objective. However, systems frequently have degraded performance due to uncertainties, such as inaccurate estimates of actual workload parameters. To avoid this degradation, we present a model for deriving the robustness of a resource allocation. The robustness of a resource allocation is quantified as the probability that a user-specified level of system performance can be met. We show how to use historical data to build a probabilistic model to evaluate the robustness of resource assignments and to design resource management techniques that produce robust allocations.

    Biography

    H. J. Siegel is the George T. Abell Endowed Chair Distinguished Professor of Electrical and Computer Engineering at Colorado State University (CSU), where he is also a Professor of Computer Science. Before joining CSU, he was a professor at Purdue University from 1976 to 2001. He received two B.S. degrees from the Massachusetts Institute of Technology (MIT), and the M.A., M.S.E., and Ph.D. degrees from Princeton University. He is a Fellow of the IEEE and a Fellow of the ACM. Prof. Siegel has co-authored over 440 published technical papers in the areas of parallel and distributed computing and communications, which have been cited over 15,000 times. He was a Coeditor-in-Chief of the Journal of Parallel and Distributed Computing, and was on the Editorial Boards of the IEEE Transactions on Parallel and Distributed Systems and the IEEE Transactions on Computers. For more information, please see http://www.engr.colostate.edu/~hj.

    Computational Social Science Meets Big Data

    Professor Feng Xia

    Assistant Dean, School of Software
    Head, Department of Cyber Engineering
    Director, Mobile and Social Computing Laboratory
    Dalian University of Technology (DUT), China

    Learn More

    Abstract

    We are entering the new era of big data. With the widespread deployment of various data collection tools and systems, the amount of data that we can access and process is increasing at an unprecedented speed far from what we could imagine even a decade ago. This is happening in almost all domains in the world, including e.g. healthcare, research, finance, transportation, and education. In particular, the availability of big data has created new opportunities for transforming how we study social science phenomena. Data-driven computational social science emerges as a result of the integration of computer science and social sciences, which has been attracting more and more attentions from both academia and industry. This talk will present an overview of the computational social science in the era of big data. Special attention will be given to newly emerging topics like how to explore big data to understand human dynamics. Recent advances in the field will be introduced. Opportunities and challenges will also be discussed.

    Biography

    Dr. Feng Xia is currently Full Professor in Dalian University of Technology (DUT), China. He is Head of Department of Cyber Engineering and Assistant Dean of School of Software. He is the (Guest) Editor of over 10 international journals and a (founding) organizer of several conferences. He serves as General Chair, PC Chair, Workshop Chair, Publicity Chair, or PC Member of dozens of conferences. Dr. Xia has authored/co-authored two books, over 200 scientific papers in int’l journals and conferences (such as IEEE TMC, TBD, TCSS, TC, TPDS, TETC, THMS, TVT, TIE, ACM TOMM, WWW, JCDL, and MobiCom) and 2 book chapters, and has edited 3 int’l conference proceedings and 4 books. He has an h-index of 26, an i10-index of 84, and a total of more than 2900 citations to his work according to Google Scholar. Dr. Xia received a number of awards. He is named on the 2014 list and the 2015 list of Most Cited Chinese Researchers (published by Elsevier). He is a Senior Member of IEEE (Computer Society, SMC Society) and ACM (SIGWEB), and a Member of AAAS.

    Searchable Symmetric Encryption: Potential Attacks, Practical Constructions and Extensions

    Professor Jinjun Chen

    School of Computing and Communications
    University of Technology Sydney
    Australia

    Learn More

    Abstract

    Data outsourcing has become one of the most successful applications of cloud computing, as it significantly reduces data owners' costs on data storage and management. To prevent privacy disclosure, sensitive data has to be encrypted before outsourcing. Traditional encryption tools such as AES, however, destroy the data searchability because keyword searches cannot be performed over encrypted data. Though the above issue has been addressed by an advanced cryptographic primitive, called searchable symmetric encryption (SSE), we observe that existing SSE schemes still suffer security, efficiency or functionality flaws. In this research, we further study SSE on three aspects. Firstly, we address the search pattern leakage issue. We demonstrate that potential attacks are exist as long as an adversary with some background knowledge learns users' search pattern. We then develop a general countermeasure to transform an existing SSE scheme to a new scheme where the search pattern is hidden. Secondly, motivated by the practical phenomenon in data outsourcing scenarios that user data is distributed over multiple data sources, we propose efficient SSE constructions which allow each data source to build a local index individually and enable the storage provider to merge all local indexes into a global one. Thirdly, we extend SSE into graph encryption with support for specific graph queries. E.g., we investigate how to perform shortest distance queries on an encrypted graph.

    Biography

    Dr Jinjun Chen is a Professor from Faculty of Engineering and IT, University of Technology Sydney (UTS), Australia. He is the Director of Lab for Data Systems and Visual Analytics in the Global Big Data Technologies Centre at UTS. He holds a PhD in Information Technology from Swinburne University of Technology, Australia. His research interests include scalability, big data, data science, data intensive systems, cloud computing, workflow management, privacy and security, and related various research topics. His research results have been published in more than 130 papers in international journals and conferences, including ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Cloud Computing, IEEE Transactions on Computers (TC), IEEE Transactions on Service Computing, and IEEE TKDE.

    He received UTS Vice-Chancellor's Awards for Research Excellence Highly Commended (2014), UTS Vice-Chancellor's Awards for Research Excellence Finalist (2013), Swinburne Vice-Chancellor’s Research Award (ECR) (2008), IEEE Computer Society Outstanding Leadership Award (2008-2009) and (2010-2011), IEEE Computer Society Service Award (2007), Swinburne Faculty of ICT Research Thesis Excellence Award (2007). He is an Associate Editor for ACM Computing Surveys, IEEE Transactions on Big Data, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Cloud Computing, as well as other journals such as Journal of Computer and System Sciences, JNCA. He is the Chair of IEEE Computer Society’s Technical Committee on Scalable Computing (TCSC), Vice Chair of Steering Committee of Australasian Symposium on Parallel and Distributed Computing, Founder and Coordinator of IEEE TCSC Technical Area on Big Data and MapReduce, Founder and Steering Committee Co-Chair of IEEE International Conference on Big Data and Cloud Computing, IEEE International Conference on Big Data Science and Engineering, and IEEE International Conference on Data Science and Systems.

    Urban Sensing: Making Smart Cities Friendly and Safe to Pedestrians

    Professor Kwei-Jay Lin

    University of California, Irvine, USA
    NTU IoX Center, Taiwan
    Nagoya Institute of Technology, Japan

    Learn More

    Abstract

    Most of the world’s population now live in big cities. As cities grow bigger, there are bound to be dark corners. Local people who are familiar with an area would avoid using certain side streets unless they have no other choice. However, for tourists from out of town and those who must work in the area, a smart pedestrian GPS with “urban sensors” would be very useful to guide people move around in the area. We study urban sensors that can identify specific types of people, events, and situations on city streets to build real-time pedestrian guiding systems. For example, homeless and drunk people may be detected and traced by street cameras that are now ubiquitous in all cities. Occasional accidents, fire or natural disasters may also be detected by urban sensors built from social or crowd sensing to mark certain areas too dangerous to use. Algorithms and techniques can be integrated for real time detection of urban events and situations. Combined with historical data analytics, urban sensing may make predictions on the perimeter of areas for people to avoid. In this talk, the issues, techniques and challenges for urban sensing are presented.

    Biography

    Kwei-Jay Lin is a Professor at the University of California, Irvine. He is an Adjunct Professor at the National Taiwan University and National Tsinghua University, Taiwan; Zhejiang University, China; Nagoya Institute of Technology, Japan. He is a Chief Scientist at the NTU IoX Research Center at the National Taiwan University, Taipei. He was a Visiting Research Fellow at the Academia Sinica, Taiwan in Spring 2016.

    Prof. Lin is an IEEE Fellow, and Editor-In- Chief of the Springer Journal on Service-Oriented Computing and Applications (SOCA). He was the Co-Chair of the IEEE Technical Committee on Business Informatics and Systems (TCBIS) until 2012. He has served on many international conferences, recently as conference co-chairs of IEEE SOCA 2016. His research interest includes service-oriented systems, IoT systems, middleware, real-time computing, and distributed computing.

    Recommendations based on Offline Data Processing: Techniques, Features, and Challenges

    Professor Wanlei Zhou

    Alfred Deakin Professor and Chair of Information Technology
    Associate Dean (International Research Engagement)
    Faculty of Science, Engineering and Built Environment
    Deakin University, Melbourne, Australia

    Learn More

    Abstract

    Recommendations based on off-line data processing has attracted increasing attention from both research communities and IT industries. The recommendation techniques could be used to explore huge volumes of data, identify the items that users probably like, and translate the research results into real-world applications and so on. This talk surveys the recent progress in the research of recommendation techniques based on off-line data processing, with emphasis on new techniques (such as temporal recommendation, graph-based recommendation and trust-based recommendation), new features (such as serendipitous recommendation), and new research issues (such as tag recommendation, group recommendation, privacy-preserving recommendation). We also provide an extensive review of evaluation measurements, benchmark datasets, and available open source tools. Finally, we present our recent work on recommendation techniques and outline some existing challenges for future research. The talk will be based on the following papers:

    1. Yongli Ren, Gang Li, Jun Zhang, and Wanlei Zhou, "Lazy Collaborative Filtering for Datasets with Missing Values", IEEE Transactions on Cybernetics, Vol. 43, No. 6, pp. 1822-1834, December 2013.
    2. Yongli Ren, Gang Li, and Wanlei Zhou, "A learning method for Top-N recommendations with incomplete data", Social Network Analysis and Mining (Springer), Volume 3, Issue 4, pp 1135-1148, December 2013.
    3. Tianqing Zhu, Yongli Ren, Wanlei Zhou, Jia Rong, Ping Xiong, "An Effective Privacy Preserving Algorithm for Neighborhood-based Collaborative Filtering", Future Generation Computer System, Volume 36, Pages 142-155, 2014.
    4. Yongli Ren, Gang Li, and Wanlei Zhou, "A Survey of Recommendation Techniques Based on Off-line Data Processing" Concurrency and Computation: Practice and Experience, Volume 27, Issue 15, October 2015.
    5. Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, and Cao Yuan, "Privacy-preserving topic model for tagging recommender systems", Knowledge and Information Systems (Springer), Volume 46, Issue 1, pp 33-58, January 2016.

    Biography

    Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.

    Advanced Techniques on Searchable Encryption

    Dr Joseph Liu

    Faculty of Information Technology
    Monash University
    Australia

    Learn More

    Abstract

    Searchable Encryption allows the data owner to search for some keywords (Boolean query) or a numeric value (range query) within the encrypted domain. The recent protocol proposed by Cash et al (CASH) established the state-of-the-art searchable symmetric encryption (SSE). Yet there are still many interesting extensions or improvements over the CASH protocol. In this talk, we first give an overview of the CASH protocol. Then we provide an extensive review of some interesting extensions, such as multi-client search and range search based on the original CASH protocol. Finally, we present our recent work on non-interactive multi-client search and discuss some possible future research directions on this area.

    Biography

    Dr. Joseph Liu received the Ph.D. degree in Information Engineering from the Chinese University of Hong Kong (CUHK) in July 2004, specializing in cyber security, protocols for securing wireless networks, privacy, authentication, and provable security. He is now a senior lecturer at Faculty of Information Technology, Monash University, Australia. Prior to that, he was a Research Scientist at Infocomm Security Department, Institute for Infocomm Research (I2R) in Singapore for more than 7 years. His current technical focus is particularly applied cryptography and cyber security in the cloud computing paradigm, big data, lightweight security, and privacy enhanced technology. He has published more than 120 referred journal and conference papers and received the Best Paper Award from ESORICS 2014 and ESORICS 2015. He is the co-founder of ProvSec (International Conference on Provable Security). He has served as the program chair of ProvSec 2007, 2014 ACISP 2016, and as the program committee of more than 50 international conferences.

    Registration

    Details of conference registration, as well as hotel and airport transport booking, can be found in the following registration form. Please complete the registration form and return to NeerajS@unifiji.ac.fj.

    Registration form (PDF) Registration form (DOCX)

    Full registration payment is required by 30 October 2016 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 30 October 2016 will result in the exclusion of the papers from the Conference Proceedings.

    Final Paper Upload

    The camera-ready copy of accepted paper is required before 30 October 2016. Authors must access IEEE CIT 2016 Author Kit to submit the Copyright Release Form and the camera-ready copy of the accepted paper.

    IEEE CIT 2016 Author Kit

    Call For Papers

    IEEE CIT 2016 welcomes original and innovative research on computer and information technology from the academia, industry and government. Topics of particular interests include the following tracks, but are not limited to:

    All papers need to be submitted electronically through the paper submission system with PDF format. The materials presented in the papers should not be published or under submission elsewhere. Each paper is limited to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page: http://www.computer.org/web/cs-cps/.

    Paper Submission System

    Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper at the conference.

    CFP PDF Version CFP TXT Version

    Important Dates

    Paper Submission Due30 September 2016 Final Extension
    Author Notification20 October 2016
    Camera-ready Due30 October 2016
    Registration Due30 October 2016
    Conference Date7-10 December 2016

    Accepted Papers

    Programming & Software Analysis

    • Generalized Concatenated Codes for Block and Device Failure Protection
      Peter Trifonov, Yuangang Wang
    • Generating Test Suites with High 3-Way Coverage for Software Testing
      Yasmeen Akhtar, Soumen Maity, Reshma C. Chandrasekharan
    • Application Characterization Assisted System Design
      I-Hsin Chung, Carlos Costa, Leopold Grinberg, Hui-Fang Wen
    • Template4EHR: Building Dynamically GUIs for the Electronic Health Records Using Archetypes
      André Magno Costa de Araújo, Valéria Cesário Times, Marcus Urbano Silva
    • Adaptations of *AIDA programs
      Yutaka Watanobe, Nikolay Mirenkov, Mirai Watanabe
    • Spatial Alloy: An Alloy Extension for Modeling Spatial Properties
      Fei Tang, Jing Liu, Junfeng Sun

    Applications

    • inLoc : Location-aware Emergency Evacuation Assistant
      Kaan Eksen, Tacha Serif, George Ghinea, Tor-Morten Grønli
    • QoE Control of Network using Collective Intelligence of SNS in Large-Scale Disasters
      Chihiro Maru, Miki Enoki, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi
    • Reducing risk of rollover in curve for heavy-duty vehicles with an agent-based advanced driver assistance system
      Willy Tiengo
    • Comparison of Accuracy and Precision of GPS-Enabled Mobile Devices
      Leong Lee, Matthew Jones, Gregory Ridenour, Sam Bennett, Arisha Majors, Bianca Melito, Michael Wilson
    • Drishti: A Mobile Application Based Multipurpose Surveillance System
      Md. Arifuzzaman, Md. Jahidul Islam, SM Sazirul Islam, Rajesh Palit
    • Brain Cancer Diagnosis- Association Rule Based Computational Intelligence Approach
      Dr. Jesmin Nahar, Dr. Tasadduq Imam, Dr. Kevin Tickle, Dr.Shawkat Ali, Dr.Yi-Ping Phoebe Chen

    Short Papers

    • The SmartPT: Wearble sensor integration and tracking in training equipment
      Teddy Falsen Hiis, Tor-Morten Groenli, Gheorghita Ghinea
    • Development of an Android Service to add IOIO hardware features to Android Apps
      Slim Chtourou, Mohamed Kharrat, Nader Ben Amor, Mohamed Jallouli, Mohamed Abid
    • Analysis of Complex Data in Telecommunications Industry
      Nayana Gupta, Mohammed Wasid, Rashid Ali
    • A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative Environment
      Smrithy G S, Ramadoss Balakrishnan
    • Quantum computing in big data analytics: a survey
      Tawseef Shaikh, Rashid Ali
    • Moving towards the Edge with Software-Defined IoT
      Ralph Deters
    • Campus Ride: An Environment-friendly Ride Sharing Platform for Academic Institutions
      Anindya Chowdhury, Abid Jamal, Rubayath Alam, Rajesh Palit

    System Design

    • A Survey on Mobility Management Techniques in VANETs
      Bilal Haider, Bilal Haider, Farhan Aadil
    • Architecture for Hybrid Language Systems
      Mirai Watanabe, Yutaka Watanobe, Alexander Vazhenin
    • Relative and absolute positioning in ultra dense Mems system
      Dermas Moffo, Philippe Canalda, François Spies
    • Implications of Domain Ontology Development for System Design Research
      Shah J MIAH, Ahmad Z Samsudin, Hafizul Islam
    • Implementation of Alternating Median Based Round Robin Scheduling Algorithm
      Salman Arif, Naveed Ghaffar, Ali Javed

    Social Networks & Recommendation System

    • Extracting actions with improved Part Of Speech tagging for social networking texts
      Ameni Youssfi Nouira, Yassine Jamoussi, Henda Ben Ghezela Hajjami
    • Community detection for cold start problem in personalization
      Ankush Bhatia
    • Degree of Integration into Weibo (DIW) Evaluation Model and the Statistical Analysis of Group Behavior Characteristics
      Xi Chen, Jianwei Li, Zeyu Zheng, Tianran Wang, Huancheng Yang
    • Dynamic Community Mining and Tracking Based on Temporal Social Network Analysis
      Xiaokang Zhou, Wei Liang, Bo Wu, Zixian Lu, Shoji Nishimura, Takashi Shinomiya, Qun Jin
    • User Actions and Timestamp Based Personalized Recommendation for E-commerce System
      Congcong Chen, Dong Wang, Yue Ding
    • An Improved Ant Colony Optimization Algorithm for Recommendation of Micro-learning Path
      Qin Zhao, Yueqin Zhang, Jian Chen

    Networking & Web

    • QoS-aware Traffic-efficient Web Service Selection over BigData Space
      T. H. Akila S. Siriweera, Incheon Paik, Banaage T. G. S. Kumara
    • Joint Optimization of VM Placement and Rule Placement towards Energy Efficient Software-Defined Data Centers
      Hong Yao, Hui Li, Chao Liu, Muzhou Xiong, Deze Zeng
    • Availability Modeling and Analysis of a Virtualized System using Stochastic Reward Nets
      Dong Seong Kim, Jin B. Hong, Tuan Anh Nguyen, Fumio Machida, Jong Sou Park, Kishor S. Trivedi
    • Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems
      Nitin Naik, Paul Jenkins
    • Multi-way Clustering for Heterogeneous Information Networks with General Network Schema
      Jibing Wu, Yahui Wu, Su Deng, Hongbin Huang
    • Tabu Approach for Adaptive Resource Allocation and Selection Carrier Aggregation in LTE-Advanced Network
      Radhia khdhir, Kais Mnif, Aymen Belghith, Lotfi Kamoun
    • Improving DHT Load Balance Using the Churn
      Qi Zhang, Jie Yu, Qingbo Wu, Shasha Li
    • Reasonably Migrating Virtual Machine in NFV-featured Networks
      Jing Xia, Deming Pang, Zhiping Cai, Ming Xu, Gang Hu

    Security & Privacy

    • High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy
      Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie McCann
    • Hurst Parameter based Anomaly Detection for Intrusion Detection System
      Song Jin Yu, Pauline Koh, Hyukmin Kwon, Dong Seong Kim, Huy Kang Kim
    • Hybrid Attack Path Enumeration System based on Reputation Scores
      Young Hoon Moon, Ji Hong Kim, Dong Seong Kim, Huy Kang Kim
    • Security Modelling and Analysis of Dynamic Enterprise Networks
      Simon Yusuf, Mengmeng Ge, Jin Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim
    • Performance Evaluation of Game Theory-Based Fault Diagnosis Algorithm Under Partial Comparison Syndrome
      Mourad Elhadef, Sofiane Grira
    • Towards Privacy-Aware Web Services Compositions
      Imen Khabou, Mohsen Rouached, Mohamed Abid, Rafik bouaziz
    • Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator
      sonia KOTEL, Fatma SBIAA, Medien ZEGHID, Mohsen MACHHOUT, Adel BAGANNE, Rached TOURKI
    • Analysis on Bidding Behaviours for Detecting Shill Bidders in Online Auctions
      Nazia Majadi, Jarrod Trevathan
    • A Selective Encryption Scheme with Multiple security Levels for the H.264/AVC Video Coding Standard
      fatma SBIAA, Sonia KOTEL, Medien ZEGHID, Rached TOURKI, Mohsen MACHHOUT, Adel BAGANNE

    Artificial Intelligence & Machine Learning

    • Particle Swarm Stepwise Algorithm (PaSS) on Multicore Hybrid CPU-GPU Clusters
      Mu Yang, Ray-Bing Chen, I-Hsin Chung, Weichung Wang
    • Concept Drift Detection on Streaming Data under Limited Labeling
      Young In Kim, Cheong Hee Park
    • Bag-of-Concepts Document Representation for Bayesian Text Classification
      Marcos Mouriño-García, Roberto Pérez-Rodríguez, Luis Anido-Rifón, Miguel Gómez-Carballa
    • Impact of Future Intelligent Information Technologies on the Methodology of Scientific Research
      Andrzej M.J. Skulimowski
    • A Controlled Experiment Between Two Methods on Ten-Digits Air Writing
      Yiming Zhou, Zeyang Dai, Lei Jing
    • Distributed multi-class rule based classification using RIPPER
      Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay K. Sahay

    Speech & Image Analysis

    • Feature Descriptors: a Review of Multiple Cues Approaches
      Cuong Pham, Yuichi Yaguchi, Keitaro Naruse
    • Saliency Detection via Background Seeds Combined With Bayesian Model
      Xiao Lin, Pengfei Bai, Linhua Jiang
    • Piecewise polynomial high-order hidden Markov models with applications in speech recognition
      Lee-Min Lee
    • Sentence-Level Automatic Lecture Highlighting Based on Acoustic Analysis
      Xiaoyin Che, Sheng Luo, Haojin Yang, Christoph Meinel
    • Micro-scale Severe Weather Prediction based on Region Trajectories Extracted from Meteorological Radar Data
      Xingang Wang, Suiping Qi

    Journal Special Issue

    Selected papers presented at the CIT 2016 will be invited to consider submission (after significant extension) for special issues in FGCS.

    Future Generation Computer Systems (FGCS) Impact Factor: 2.430
    Special Issue on Security and Privacy in Social Big Data
    Learn more
    Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 0.942
    Special Issue on Social Network Security and Privacy
    Learn more

    Organisation Committees

    General Chairs

    • A B M Shawkat Ali, The University of Fiji, Fiji
    • Yang Xiang, Deakin University, Australia
    • Albert Zomaya, The University of Sydney, Australia

    Program Committee Chairs

    • Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
    • Qun Jin, Waseda University, Japan
    • Xiaodong Lin, University of Ontario Institute of Technology, Canada
    • Vincenzo Piuri, Universita' degli Studi di Milano, Italy

    Program Committee Vice-Chairs

    • Aniello Castiglione, University of Salerno and University of Naples, Italy
    • Yu Wang, Deakin University, Australia
    • Jun Zhang, Deakin University, Australia

    Publicity Chairs

    • Al-Sakib Khan Pathan, Southeast University, Bangladesh
    • Yi Qian, University of Nebraska-Lincoln, USA
    • Xin Zhu,The University of Aizu, Japan

    Workshop Chairs

    • Md Zakirul Alam Bhuiyan, Temple University, USA
    • Wenxi Chen, University of Aizu, Japan
    • Sheng Wen, Deakin University, Australia

    Finance Chair

    • Neeraj Sharma, The University of Fiji, Fiji

    International Advisory Committee

    • Mohammed Atiquzzaman, University of Oklahoma, USA
    • Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
    • Hai Jin, Huazhong University of Science and Technology, China
    • George A. Papadopoulos, University of Cyprus, Cyprus
    • Wanlei Zhou, Deakin University, Australia

    Steering Committee

    • Daming Wei (Chair), Professor Emeritus, University of Aizu and Tohoku University, Japan
    • Laurence T. Yang (Chair), St. Francis Xavier University, Canada
    • Goutam Chakrabarty, Iwate Prefectural University, Japan
    • Hai Jin, Huazhong University of Science and Technology, China
    • Xiangjian He, University of Technology Sydney, Australia
    • Chunming Qiao, The State University of New York, USA
    • Chang-Sung Jeong, Korea University, Korea
    • Incheon Paik, University of Aizu, Japan
    • Qun Jin, Waseda University, Japan
    • Xingang Liu, University of Electronic Science and Technology of China, China
    • Geyong Min, University of Exeter, UK
    • George A. Papadopoulos, University of Cyprus, Cyprus
    • Bofeng Zhang, Shanghai University, China
    • Jinjun Chen, University of Technology Sydney, Australia
    • Yan Zheng, Xidian University, China

    Program Committee

    • Taufiq Asyhari, Bradford University, UK
    • Mohamed Bakhouya, The University of Technology of Belfort Montbeliard, France
    • Alessandra De Benedictis, University of Naples, Italy
    • Maria Bermudez-Edo, University of Granada, Spain
    • Jakramate Bootkrajang, Chiang Mai University, Thailand
    • Julien Bourgeois, University of Franche-Comté, France
    • Jiuwen Cao, Hangzhou Dianzi University, China
    • Arcangelo Castiglione, University of Salerno, Italy
    • Sudip Chakraborty, Valdosta State University, USA
    • Chaur-Chin Chen, National Tsing Hua University, Taiwan
    • Chi-Hua Chen, National Chiao Tung University, Taiwan
    • Jin-Hee Cho, U.S. Army Research Laboratory, USA
    • Shuo-Yan Chou, NationalTaiwan University of Science and Technology, Taiwan
    • I-Hsin Chung, IBM T. J. Watson Research Center, USA
    • Expósito David, University Carlos III, Spain
    • Eugen Dedu, University of Franche-Comté, France
    • Bin Dong, Lawrence Berkeley National Lab, USA
    • Christian Esposito, University of Naples, Italy
    • Franco Frattolillo, Universitá del Sannio, Italy
    • Paul Fremantle, University of Portsmouth, UK
    • Harald Gjermundord, University of Nicosia, Cyprus
    • Marco Guazzone, Università del Piemonte Orientale "A. Avogadro", Italy
    • Bin Guo, Northwestern Polytechnical University, China
    • Hassan Hamdoun, Aberdeen University, UK
    • Fei Hao, Shanxi Agricultural University, China
    • Matthew Hawes, University of Sheffield, UK
    • Jang-Eui Hong, Chungbuk National University, Korea
    • Ronghui Hou, Xidian University, China
    • Chen Hsing-Lung, NationalTaiwan University of Science and Technology, Taiwan
    • Robert C. Hsu, Chung Hua University, Taiwan
    • Chun-His Huang, University of Connecticut, USA
    • Jingshan Huang, University of South Alabama, USA
    • Kuo-Chan Huang, National Taichung University, Taiwan
    • Che-Lun Hung, Providence University, Taiwan
    • Lazaros Illiadis, University Of Thrace, Greece
    • Muhammad Ali Imran, University of Surrey, UK
    • Wenbin Jiang, Huazhong University of Science and Technology, China
    • Carlos Juiz, University of Balearic Islands, Spain
    • Kamen Kanev, Shizuoka University, Japan
    • Panagiotis Karampelas, Hellenic Air Force Academy, Greece
    • Tom Kirkham, Science and Technology Facilities Council, UK
    • Hitoshi Kitazawa, Tokyo University of Agriculture and Tech, Japan
    • Sy-Yen Kuo, National Taiwan University, Taiwan
    • Alexey Lastovetsky, University College Dublin, Ireland
    • Che-Rung Lee, National Tsing Hua University, Taiwan
    • Jeff Y. Lei, The University of Texas at Arlington, USA
    • Guowei Li, Huazhong University of Science and Technology, China
    • Juan Li, North Dakota State University, USA
    • Ruidong Li, National Institute of Information and Communications Technology (NICT), Japan
    • Ruixuan Li, Huazhong University of Science and Technology, China
    • Hao Liang, University of Alberta, Canada
    • Spiros Likothanassis, University of Patras, Greece
    • Chang Liu, Ohio University, USA
    • Chunfeng Liu, Tianjin University, China
    • Feng Liu, Chinese Academy of Sciences, China
    • Jianxun Liu, Hunan University of Science and Technology, China
    • Xin Lou, City University of HongKong, China
    • Wei Lu, Keene University, USA
    • Mourad Maouche, Philadelphia University, Jordan
    • Alejandro Masrur, TU Chemnitz, Germany
    • Barbara Masucci, University of Salerno, Italy
    • P. Takis Mathiopoulos, National and Kapodistrian University of Athens, Greece
    • Yu Mei, Simula Research Lab, Norway/Tianjin University, China
    • Alba Melo, CIC- UnB, Brazil
    • Souham Meshoul, University Constantine 2, Algeria
    • Spyros Mikroulis, University College London, UK
    • Manki Min, South Dakota State University, USA
    • Yang Mingjing, Fuzhou University, China
    • In Hyun Nahm, Sunmoon University, Korea
    • Michael O'Grady, University College Dublin, Ireland
    • Satoru Ohta, Toyama Prefectural University, Japan
    • Romulo Silva de Oliveira, DAS-UFSC, Brazil
    • Michael Oudshoorn, Wentworth Institute of Technology, USA
    • Gareth Owen, University of Portsmouth, UK
    • Jeng-Shyang Pan, National Kaohsiung University of Applied Sciences, Taiwan
    • Eric Pardede, La Trobe University, Australia
    • Cheong Hee Park, Chungnam National University, South Korea
    • Ronald Perrott, Queen's University Belfast, UK
    • Lucian Prodan, Politehnica University of Timisoara, Romania
    • Khaled Ragab, King Faisal University, Saudi Arabia
    • Xuebin Ren, Xi’an Jiaotong University, China
    • Imed Romdhani, Napier University, UK
    • Subhash Saini, NASA, USA
    • Momodou Sanyang, University of Birmingham, UK
    • Stefan Schaeckeler, Cisco, USA
    • Colas Schretter, Vrije Universiteit Brussel, Belgium
    • Hussain Seker, University of Northumbria at Newcastle, UK
    • Yanming Shen, Dalian University of Technolgoy, China
    • Zhengguo Sheng, Sussex University, UK
    • Frank Siqueira, INE-UFSC, Brazil
    • Liyan Song, University of Birmingham, UK
    • Susanna Spinsante, University of Ancona, Italy
    • Yanzan Sun, Shanghai University, China
    • Daisuke Takahashi, University of Tsukuba, Japan
    • Domenico Talia, Università della Calabria, Italy
    • Qing Tan, Athabasca University, Canada
    • Vahid Taslimi, Kno.e.sis, Wright State University, USA
    • Parimala Thulasiraman, University of Manitoba, Canada
    • I-Hsien Ting, National University of Kaohsiung, Taiwan
    • George Tsoulos, University of Peloponnese, Greece
    • Luis Javier García Villalba, Universidad Complutense de Madrid (UCM), Spain
    • Klyuev Vitaly, University of Aizu, Japan
    • Haozhe Wang, University of Exeter, UK
    • Siyi Wang, Xijiao Liverpool University, China
    • Weichao Wang, University of North Caroline at Charlotte, USA
    • Martine Wedlake, IBM, USA
    • Wei Wei, Xi'an University of Technology, China
    • Chang Xiaolin, Beijing Jiaotong University, China
    • Li Xu, Fujian Normal University, China
    • Tianhua Xu, University College London, UK
    • Birkan Yilmaz, Yonsei University, South Korea
    • Zhao Yong, University of Electronic Science and Technology of China, China
    • Lei Yu, Harbin Institute of Technology, China
    • Hu Yuan, University of Warwick, UK
    • Qasim Zeeshan Ahmed, University of Kent, UK
    • Lei Zhang, University of Surrey, UK
    • Yong Zhang, Liaoning Normal University, China
    • Peng Zhao, Xi'an Jiaotong University, China
    • Huiru Zheng, University of Ulster, UK
    • Kainan Zhu, University of Liverpool, UK
    • Olga Zlydareva, Dublin City University, Ireland

    Sponsors

    The University of Fiji
    CCSR
    IEEE

    Conference Venue

    IEEE CIT 2016 will take place at Shangri-La's Fijian Resort and Spa, Yanuca Island, Fiji on 7-10 December 2016. Get ready to enjoy a unique trip in an wonderful island in this Globe.

    Gallery

    Transportation

    • Fiji Airways (Qantas & American Airlines Codeshare) fly direct to Nadi from Singapore, Australia, New Zealand, Los Angeles, Hong Kong (with connections to UK/Europeon Cathay Pacific), Vancouver (via Honolulu) & Honolulu
    • Virgin Australia fly direct to Nadi from Brisbane, Sydney, Melbourne.
    • Air New Zealand (United Airlines Codeshare) fly direct to Nadi from Auckland.
    • Korean Air fly out of UK/Europe to Seoul then direct to Nadi.
    • Shangri-La's Fijian Resort and Spa is located approximately 60 minutes by scenic countryside road from Nadi International Airport. There are several options to reach Shangri-La's Fijian Resort and Spa. Guests can choose from limousine transfer or car rental.
    • Hotel limousine transfer can be arranged by providing your flight details and estimated time of arrival when you make your booking online.
    • Car rental services, including Avis, Thrifty and Budget, are available at Nadi International Airport.
    • Private Taxis with English speaking driver can take you to Shangri-La's Fijian Resort and Spa in 40 mins with a cost around US$35.00.

    Co-located Events

    Contact

    For further information regarding to CIT 2016, please contact nsclab.events@gmail.com.