default search action
ACM Transactions on Internet Technology, Volume 18
Volume 18, Number 1, December 2017
- Ernesto Damiani, Ryszard Kowalczyk, Gerard Parr:
Extending the Outreach: From Smart Cities to Connected Communities. 1:1-1:7 - Haibo Zhang, Luming Wan, Yawen Chen, Laurence T. Yang, Lizhi Peng:
Adaptive Message Routing and Replication in Mobile Opportunistic Networks for Connected Communities. 2:1-2:22 - Taehun Kim, Junsung Lim, Heesuk Son, Byoungheon Shin, Dongman Lee, Soon J. Hyun:
A Multi-Dimensional Smart Community Discovery Scheme for IoT-Enriched Smart Homes. 3:1-3:20 - Catia Prandi, Silvia Mirri, Stefano Ferretti, Paola Salomoni:
On the Need of Trustworthy Sensing and Crowdsourcing for Urban Accessibility in Smart City. 4:1-4:21 - Antonella Longo, Marco Zappatore, Mario A. Bochicchio, Shamkant B. Navathe:
Crowd-Sourced Data Collection for Urban Monitoring via Mobile Sensors. 5:1-5:21 - Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzeretti:
ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks. 6:1-6:22 - Emanuele Bellini, Paolo Ceravolo, Paolo Nesi:
Quantify Resilience Enhancement of UTS through Exploiting Connected Community and Internet of Everything Emerging Technologies. 7:1-7:34 - M. Mazhar Rathore, Anand Paul, Awais Ahmad, Marco Anisetti, Gwanggil Jeon:
Hadoop-Based Intelligent Care System (HICS): Analytical Approach for Big Data in IoT. 8:1-8:24 - Di Wang, Ahmad Al-Rubaie, Sandra Stincic Clarke, John Davies:
Real-Time Traffic Event Detection From Social Media. 9:1-9:23 - Hiroshi Fujikawa, Hirofumi Yamaki, Setsuo Tsuruta:
Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks. 10:1-10:21 - Claudia López, Rosta Farzan, Yu-Ru Lin:
Behind the Myths of Citizen Participation: Identifying Sustainability Factors of Hyper-Local Information Systems. 11:1-11:28 - Munindar P. Singh:
TOIT Reviewers over 2015 and 2016. 12:1-12:7
Volume 18, Number 2, March 2018
- Tao Xie, André van Hoorn, Huaimin Wang, Ingo Weber:
Introduction to the Special Issue on Emerging Software Technologies for Internet-Based Systems: Internetware and DevOps. 13:1-13:2 - Xuanzhe Liu, Meihua Yu, Yun Ma, Gang Huang, Hong Mei, Yunxin Liu:
i-Jacob: An Internetware-Oriented Approach to Optimizing Computation-Intensive Mobile Web Browsing. 14:1-14:23 - Xue Ouyang, Peter Garraghan, Bernhard Primas, David McKee, Paul Townend, Jie Xu:
Adaptive Speculation for Efficient Internetware Application Execution in Clouds. 15:1-15:22 - Nicolas Ferry, Franck Chauvel, Hui Song, Alessandro Rossini, Maksym Lushpenko, Arnor Solberg:
CloudMF: Model-Driven Management of Multi-Cloud Applications. 16:1-16:24 - Claus Pahl, Pooyan Jamshidi, Olaf Zimmermann:
Architectural Principles for Cloud Software. 17:1-17:23 - He Jiang, Xin Chen, Tieke He, Zhenyu Chen, Xiaochen Li:
Fuzzy Clustering of Crowdsourced Test Reports for Apps. 18:1-18:28 - Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. 19:1-19:25 - Wenhua Yang, Chang Xu, Minxue Pan, Xiaoxing Ma, Jian Lu:
Improving Verification Accuracy of CPS by Modeling and Calibrating Interaction Uncertainty. 20:1-20:37 - Felix Willnecker, Helmut Krcmar:
Multi-Objective Optimization of Deployment Topologies for Distributed Applications. 21:1-21:21 - Santiago Gómez Sáez, Vasilios Andrikopoulos, Marina Bitsaki, Frank Leymann, André van Hoorn:
Utility-Based Decision Making for Migrating Cloud-Based Applications. 22:1-22:22
- Bowen Zhou, Amir Vahid Dastjerdi, Rodrigo N. Calheiros, Rajkumar Buyya:
An Online Algorithm for Task Offloading in Heterogeneous Mobile Clouds. 23:1-23:25 - Balaji Palanisamy, Ling Liu, Yang Zhou, Qingyang Wang:
Privacy-Preserving Publishing of Multilevel Utility-Controlled Graph Datasets. 24:1-24:21 - Fabrizio Angiulli, Luciano Argento, Angelo Furfaro:
Exploiting Content Spatial Distribution to Improve Detection of Intrusions. 25:1-25:21
Volume 18, Number 3, May 2018
- Özgür Kafali, Natalia Criado, Martin Rehák, Jose M. Such, Pinar Yolum:
Guest Editors' Introduction. 26:1-26:4 - Igor Saenko, Igor V. Kotenko:
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks. 27:1-27:21 - Michal Stolba, Jan Tozicka, Antonín Komenda:
Quantifying Privacy Leakage in Multi-Agent Planning. 28:1-28:21 - Daniele Codetta Raiteri, Luigi Portinale:
Decision Networks for Security Risk Assessment of Critical Infrastructures. 29:1-29:22 - Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. 30:1-30:41 - Julian A. Padget, Wamberto Weber Vasconcelos:
Fine-Grained Access Control via Policy-Carrying Data. 31:1-31:24
- Lina Yao, Quan Z. Sheng, Xianzhi Wang, Wei Emma Zhang, Yongrui Qin:
Collaborative Location Recommendation by Integrating Multi-dimensional Contextual Information. 32:1-32:24 - Haiying Shen, Harrison Chandler, Haoyu Wang:
Toward Efficient Short-Video Sharing in the YouTube Social Network. 33:1-33:25 - Zhen Xu, James Miller:
Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity. 34:1-34:23 - Wei Emma Zhang, Quan Z. Sheng, Lina Yao, Kerry Taylor, Ali Shemshadi, Yongrui Qin:
A Learning-Based Framework for Improving Querying on Web Interfaces of Curated Knowledge Bases. 35:1-35:20 - Sebastian Zander, Xuequn Wang:
Are We There Yet? IPv6 in Australia and China. 36:1-36:20 - Wei Emma Zhang, Quan Z. Sheng, Jey Han Lau, Ermyas Abebe, Wenjie Ruan:
Duplicate Detection in Programming Question Answering Communities. 37:1-37:21 - Tian Guo, Prashant J. Shenoy:
Providing Geo-Elasticity in Geographically Distributed Clouds. 38:1-38:27 - Yonghong Guo, Lu Liu, Yan Wu, James Hardy:
Interest-Aware Content Discovery in Peer-to-Peer Social Networks. 39:1-39:21
Volume 18, Number 4, November 2018
- Cristina Baroglio, Olivier Boissier, Axel Polleres:
Special Issue: Computational Ethics and Accountability. 40:1-40:4 - Alex Kayal, Willem-Paul Brinkman, Mark A. Neerincx, M. Birna van Riemsdijk:
Automatic Resolution of Normative Conflicts in Supportive Technology Based on User Values. 41:1-41:21 - Dilara Keküllüoglu, Nadin Kökciyan, Pinar Yolum:
Preserving Privacy as Social Responsibility in Online Social Networks. 42:1-42:22 - Ilse Verdiesen, Virginia Dignum, Jeroen van den Hoven:
Measuring Moral Acceptability in E-deliberation: A Practical Application of Ethics by Participation. 43:1-43:20 - Leila Bahri, Barbara Carminati, Elena Ferrari, Andrea Bianco:
Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks. 44:1-44:19 - Vasiliki Gkatziaki, Symeon Papadopoulos, Richard A. Mills, Sotiris Diplaris, Ioannis Tsampoulatidis, Ioannis Kompatsiaris:
easIE: Easy-to-Use Information Extraction for Constructing CSR Databases From the Web. 45:1-45:21 - Marco Gavanelli, Marco Alberti, Evelina Lamma:
Accountable Protocols in Abductive Logic Programming. 46:1-46:20
- Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. 47:1-47:3 - Aron Laszka, Benjamin Johnson, Jens Grossklags:
On the Assessment of Systematic Risk in Networked Systems. 48:1-48:28 - Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. 49:1-49:25 - Tyler Moore, Nicolas Christin, Janos Szurdi:
Revisiting the Risks of Bitcoin Currency Exchange Closure. 50:1-50:18 - Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia:
Fine-Grained Control over Tracking to Support the Ad-Based Web Economy. 51:1-51:25 - Reuben Binns, Jun Zhao, Max Van Kleek, Nigel Shadbolt:
Measuring Third-party Tracker Power across Web and Mobile. 52:1-52:22 - Razieh Nokhbeh Zaeem, Rachel L. German, K. Suzanne Barber:
PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining. 53:1-53:18 - James T. Graves, Alessandro Acquisti, Nicolas Christin:
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking. 54:1-54:19
- Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. 55:1-55:20 - Zhi Yang, Wei Chen:
A Game Theoretic Model for the Formation of Navigable Small-World Networks - The Tradeoff between Distance and Reciprocity. 56:1-56:38 - Munindar P. Singh:
TOIT Reviewers over 2017. 57:1-57:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.