


default search action
ACM Transactions on Internet Technology, Volume 18
Volume 18, Number 1, December 2017
- Ernesto Damiani

, Ryszard Kowalczyk
, Gerard Parr:
Extending the Outreach: From Smart Cities to Connected Communities. 1:1-1:7 - Haibo Zhang

, Luming Wan, Yawen Chen
, Laurence T. Yang, Lizhi Peng:
Adaptive Message Routing and Replication in Mobile Opportunistic Networks for Connected Communities. 2:1-2:22 - Taehun Kim

, Junsung Lim, Heesuk Son, Byoungheon Shin, Dongman Lee, Soon J. Hyun:
A Multi-Dimensional Smart Community Discovery Scheme for IoT-Enriched Smart Homes. 3:1-3:20 - Catia Prandi

, Silvia Mirri
, Stefano Ferretti, Paola Salomoni:
On the Need of Trustworthy Sensing and Crowdsourcing for Urban Accessibility in Smart City. 4:1-4:21 - Antonella Longo

, Marco Zappatore, Mario A. Bochicchio
, Shamkant B. Navathe:
Crowd-Sourced Data Collection for Urban Monitoring via Mobile Sensors. 5:1-5:21 - Moreno Ambrosin

, Paolo Braca, Mauro Conti
, Riccardo Lazzeretti:
ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks. 6:1-6:22 - Emanuele Bellini

, Paolo Ceravolo
, Paolo Nesi:
Quantify Resilience Enhancement of UTS through Exploiting Connected Community and Internet of Everything Emerging Technologies. 7:1-7:34 - M. Mazhar Rathore, Anand Paul

, Awais Ahmad, Marco Anisetti, Gwanggil Jeon:
Hadoop-Based Intelligent Care System (HICS): Analytical Approach for Big Data in IoT. 8:1-8:24 - Di Wang, Ahmad Al-Rubaie, Sandra Stincic Clarke, John Davies:

Real-Time Traffic Event Detection From Social Media. 9:1-9:23 - Hiroshi Fujikawa, Hirofumi Yamaki, Setsuo Tsuruta:

Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks. 10:1-10:21 - Claudia López

, Rosta Farzan, Yu-Ru Lin:
Behind the Myths of Citizen Participation: Identifying Sustainability Factors of Hyper-Local Information Systems. 11:1-11:28 - Munindar P. Singh:

TOIT Reviewers over 2015 and 2016. 12:1-12:7
Volume 18, Number 2, March 2018
- Tao Xie, André van Hoorn, Huaimin Wang, Ingo Weber

:
Introduction to the Special Issue on Emerging Software Technologies for Internet-Based Systems: Internetware and DevOps. 13:1-13:2 - Xuanzhe Liu

, Meihua Yu, Yun Ma, Gang Huang, Hong Mei, Yunxin Liu:
i-Jacob: An Internetware-Oriented Approach to Optimizing Computation-Intensive Mobile Web Browsing. 14:1-14:23 - Xue Ouyang

, Peter Garraghan
, Bernhard Primas, David McKee
, Paul Townend, Jie Xu:
Adaptive Speculation for Efficient Internetware Application Execution in Clouds. 15:1-15:22 - Nicolas Ferry, Franck Chauvel, Hui Song, Alessandro Rossini, Maksym Lushpenko, Arnor Solberg

:
CloudMF: Model-Driven Management of Multi-Cloud Applications. 16:1-16:24 - Claus Pahl

, Pooyan Jamshidi
, Olaf Zimmermann:
Architectural Principles for Cloud Software. 17:1-17:23 - He Jiang, Xin Chen

, Tieke He, Zhenyu Chen, Xiaochen Li:
Fuzzy Clustering of Crowdsourced Test Reports for Apps. 18:1-18:28 - Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun

, Yijun Yu
, Bashar Nuseibeh
, Wenyun Zhao:
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. 19:1-19:25 - Wenhua Yang, Chang Xu, Minxue Pan, Xiaoxing Ma

, Jian Lu:
Improving Verification Accuracy of CPS by Modeling and Calibrating Interaction Uncertainty. 20:1-20:37 - Felix Willnecker, Helmut Krcmar:

Multi-Objective Optimization of Deployment Topologies for Distributed Applications. 21:1-21:21 - Santiago Gómez Sáez

, Vasilios Andrikopoulos
, Marina Bitsaki, Frank Leymann, André van Hoorn:
Utility-Based Decision Making for Migrating Cloud-Based Applications. 22:1-22:22
- Bowen Zhou

, Amir Vahid Dastjerdi, Rodrigo N. Calheiros
, Rajkumar Buyya
:
An Online Algorithm for Task Offloading in Heterogeneous Mobile Clouds. 23:1-23:25 - Balaji Palanisamy, Ling Liu, Yang Zhou, Qingyang Wang:

Privacy-Preserving Publishing of Multilevel Utility-Controlled Graph Datasets. 24:1-24:21 - Fabrizio Angiulli

, Luciano Argento, Angelo Furfaro
:
Exploiting Content Spatial Distribution to Improve Detection of Intrusions. 25:1-25:21
Volume 18, Number 3, May 2018
- Özgür Kafali, Natalia Criado

, Martin Rehák, Jose M. Such, Pinar Yolum:
Guest Editors' Introduction. 26:1-26:4 - Igor Saenko

, Igor V. Kotenko
:
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks. 27:1-27:21 - Michal Stolba, Jan Tozicka, Antonín Komenda:

Quantifying Privacy Leakage in Multi-Agent Planning. 28:1-28:21 - Daniele Codetta Raiteri

, Luigi Portinale:
Decision Networks for Security Risk Assessment of Critical Infrastructures. 29:1-29:22 - Sushil Jajodia

, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. 30:1-30:41 - Julian A. Padget

, Wamberto Weber Vasconcelos
:
Fine-Grained Access Control via Policy-Carrying Data. 31:1-31:24
- Lina Yao

, Quan Z. Sheng
, Xianzhi Wang
, Wei Emma Zhang
, Yongrui Qin:
Collaborative Location Recommendation by Integrating Multi-dimensional Contextual Information. 32:1-32:24 - Haiying Shen, Harrison Chandler, Haoyu Wang:

Toward Efficient Short-Video Sharing in the YouTube Social Network. 33:1-33:25 - Zhen Xu, James Miller:

Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity. 34:1-34:23 - Wei Emma Zhang

, Quan Z. Sheng
, Lina Yao
, Kerry Taylor, Ali Shemshadi, Yongrui Qin:
A Learning-Based Framework for Improving Querying on Web Interfaces of Curated Knowledge Bases. 35:1-35:20 - Sebastian Zander, Xuequn Wang

:
Are We There Yet? IPv6 in Australia and China. 36:1-36:20 - Wei Emma Zhang

, Quan Z. Sheng
, Jey Han Lau, Ermyas Abebe, Wenjie Ruan:
Duplicate Detection in Programming Question Answering Communities. 37:1-37:21 - Tian Guo

, Prashant J. Shenoy
:
Providing Geo-Elasticity in Geographically Distributed Clouds. 38:1-38:27 - Yonghong Guo, Lu Liu

, Yan Wu, James Hardy
:
Interest-Aware Content Discovery in Peer-to-Peer Social Networks. 39:1-39:21
Volume 18, Number 4, November 2018
- Cristina Baroglio, Olivier Boissier

, Axel Polleres:
Special Issue: Computational Ethics and Accountability. 40:1-40:4 - Alex Kayal, Willem-Paul Brinkman

, Mark A. Neerincx, M. Birna van Riemsdijk:
Automatic Resolution of Normative Conflicts in Supportive Technology Based on User Values. 41:1-41:21 - Dilara Keküllüoglu

, Nadin Kökciyan
, Pinar Yolum:
Preserving Privacy as Social Responsibility in Online Social Networks. 42:1-42:22 - Ilse Verdiesen, Virginia Dignum

, Jeroen van den Hoven:
Measuring Moral Acceptability in E-deliberation: A Practical Application of Ethics by Participation. 43:1-43:20 - Leila Bahri, Barbara Carminati, Elena Ferrari, Andrea Bianco:

Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks. 44:1-44:19 - Vasiliki Gkatziaki

, Symeon Papadopoulos, Richard A. Mills, Sotiris Diplaris
, Ioannis Tsampoulatidis
, Ioannis Kompatsiaris:
easIE: Easy-to-Use Information Extraction for Constructing CSR Databases From the Web. 45:1-45:21 - Marco Gavanelli

, Marco Alberti
, Evelina Lamma:
Accountable Protocols in Abductive Logic Programming. 46:1-46:20
- Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett

, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. 47:1-47:3 - Aron Laszka

, Benjamin Johnson, Jens Grossklags:
On the Assessment of Systematic Risk in Networked Systems. 48:1-48:28 - Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten

:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. 49:1-49:25 - Tyler Moore

, Nicolas Christin
, Janos Szurdi:
Revisiting the Risks of Bitcoin Currency Exchange Closure. 50:1-50:18 - Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia:

Fine-Grained Control over Tracking to Support the Ad-Based Web Economy. 51:1-51:25 - Reuben Binns

, Jun Zhao
, Max Van Kleek
, Nigel Shadbolt:
Measuring Third-party Tracker Power across Web and Mobile. 52:1-52:22 - Razieh Nokhbeh Zaeem, Rachel L. German, K. Suzanne Barber:

PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining. 53:1-53:18 - James T. Graves, Alessandro Acquisti

, Nicolas Christin
:
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking. 54:1-54:19
- Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:

A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. 55:1-55:20 - Zhi Yang, Wei Chen

:
A Game Theoretic Model for the Formation of Navigable Small-World Networks - The Tradeoff between Distance and Reciprocity. 56:1-56:38 - Munindar P. Singh:

TOIT Reviewers over 2017. 57:1-57:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














