


default search action
ACM Transactions on Internet Technology, Volume 19
Volume 19, Number 1, March 2019
- Zhiwen Yu

, Fei Yi, Chao Ma, Zhu Wang
, Bin Guo
, Liming Chen
:
Fine-grained Emotion Role Detection Based on Retweet Information. 1:1-1:23 - Timothy K. Shih, W. K. T. M. Gunarathne, Ankhtuya Ochirbat

, Huang-Ming Su:
Grouping Peers Based on Complementary Degree and Social Relationship using Genetic Algorithm. 2:1-2:29 - Oscar Novo

:
Making Constrained Things Reachable: A Secure IP-Agnostic NAT Traversal Approach for IoT. 3:1-3:21 - Ali Ouni

, Hanzhang Wang, Marouane Kessentini, Salah Bouktif, Katsuro Inoue:
A Hybrid Approach for Improving the Design Quality of Web Service Interfaces. 4:1-4:24 - Azadeh Ghari Neiat

, Athman Bouguettaya, Sajib Mistry
:
Incentive-Based Crowdsourcing of Hotspot Services. 5:1-5:24
- Samir Tata, Quan Z. Sheng

, Eleni Stroulia:
Guest Editors' Introduction for Special Issue on Service Management for the Internet of Things. 6:1-6:3 - Amir Taherkordi

, Frank Eliassen, Michael Mcdonald, Geir Horn
:
Context-Driven and Real-Time Provisioning of Data-Centric IoT Services in the Cloud. 7:1-7:24 - Emna Mezghani, Ernesto Exposito

, Khalil Drira:
An Autonomic Cognitive Pattern for Smart IoT-Based System Manageability: Application to Comorbidity Management. 8:1-8:17 - Md. Redowan Mahmud

, Kotagiri Ramamohanarao, Rajkumar Buyya
:
Latency-Aware Application Module Management for Fog Computing Environments. 9:1-9:21 - Andreas Konstantinidis, Panagiotis Irakleous, Zacharias Georgiou

, Demetrios Zeinalipour-Yazti
, Panos K. Chrysanthis
:
IoT Data Prefetching in Indoor Navigation SOAs. 10:1-10:21
- Aditya Ghose, Hamid R. Motahari Nezhad, Manfred Reichert:

Guest Editors' Introduction to the Special Issue on Knowledge-Driven Business Process Management. 11:1-11:2 - Rik Eshuis

, Richard Hull, Mengfei Yi:
Reasoning About Property Preservation in Adaptive Case Management. 12:1-12:21 - Shaya Pourmirza

, Sander Peters, Remco M. Dijkman
, Paul Grefen:
BPMS-RA: A Novel Reference Architecture for Business Process Management Systems. 13:1-13:23 - Alaaeddine Yousfi

, Kimon Batoulis, Mathias Weske:
Achieving Business Process Improvement via Ubiquitous Decision-Aware Business Processes. 14:1-14:19 - Bedilia Estrada-Torres

, Pedro Henrique Piccoli Richetti, Adela del-Río-Ortega
, Fernanda Baião
, Manuel Resinas, Flávia Maria Santoro, Antonio Ruiz-Cortés:
Measuring Performance in Knowledge-intensive Processes. 15:1-15:26 - Abel Armas-Cervantes

, Marlon Dumas
, Marcello La Rosa
, Abderrahmane Maaradji
:
Local Concurrency Detection in Business Process Event Logs. 16:1-16:23
Volume 19, Number 2, April 2019
- Francesco Longo

, Antonio Puliafito, Omer F. Rana
:
Guest Editors' Introduction to the Special Issue on Fog, Edge, and Cloud Integration for Smart Environments. 17:1-17:4 - Carlo Puliafito

, Enzo Mingozzi, Francesco Longo
, Antonio Puliafito, Omer F. Rana
:
Fog Computing for the Internet of Things: A Survey. 18:1-18:41 - Madhurima Pore, Vinaya Chakati, Ayan Banerjee

, Sandeep K. S. Gupta:
ContextAiDe: End-to-End Architecture for Mobile Crowd-sensing Applications. 19:1-19:23 - Federico Concone

, Giuseppe Lo Re
, Marco Morana
:
A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices. 20:1-20:20 - He Li

, Kaoru Ota
, Mianxiong Dong:
Deep Reinforcement Scheduling for Mobile Crowdsensing in Fog Computing. 21:1-21:18 - Farzad Samie

, Vasileios Tsoutsouras, Lars Bauer, Sotirios Xydis, Dimitrios Soudris
, Jörg Henkel:
Oops: Optimizing Operation-mode Selection for IoT Edge Devices. 22:1-22:21 - Marios Avgeris

, Dimitrios Dechouniotis
, Nikolaos Athanasopoulos, Symeon Papavassiliou:
Adaptive Resource Allocation for Computation Offloading: A Control-Theoretic Approach. 23:1-23:20 - Houssemeddine Mazouzi, Nadjib Achir, Khaled Boussetta:

DM2-ECOP: An Efficient Computation Offloading Policy for Multi-user Multi-cloudlet Mobile Edge Computing Environment. 24:1-24:24 - Danilo Reis de Vasconcelos, Rossana M. de Castro Andrade

, Valdenir Severino
, José Neuman de Souza
:
Cloud, Fog, or Mist in IoT? That Is the Question. 25:1-25:20 - Jun Feng

, Laurence T. Yang
, Ronghao Zhang:
Practical Privacy-preserving High-order Bi-Lanczos in Integrated Edge-Fog-Cloud Architecture for Cyber-Physical-Social Systems. 26:1-26:18 - Luca Ferretti

, Mirco Marchetti
, Michele Colajanni
:
Fog-based Secure Communications for Low-power IoT Devices. 27:1-27:21 - Giovanni Merlino

, Rustem Dautov
, Salvatore Distefano, Dario Bruneo:
Enabling Workload Engineering in Edge, Fog, and Cloud Computing through OpenStack-based Middleware. 28:1-28:22 - Luciano Baresi

, Danilo Filgueira Mendonça
, Martin Garriga, Sam Guinea, Giovanni Quattrocchi:
A Unified Model for the Mobile-Edge-Cloud Continuum. 29:1-29:21 - Min Chen

, Wei Li
, Giancarlo Fortino, Yixue Hao
, Long Hu, Iztok Humar:
A Dynamic Service Migration Mechanism in Edge Cognitive Computing. 30:1-30:15
Volume 19, Number 3, November 2019
- Li Ye

, Weijie Wu, Richard T. B. Ma
, John C. S. Lui
:
On the Profitability of Bundling Sale Strategy for Online Service Markets With Network Effects. 31:1-31:32 - Ricardo J. Rodríguez

, Rafael Tolosana-Calasanz, Omer F. Rana
:
A Dynamic Data-throttling Approach to Minimize Workflow Imbalance. 32:1-32:21 - Jianwei Qian

, Xiang-Yang Li, Taeho Jung, Yang Fan, Yu Wang
, Shaojie Tang:
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified? 33:1-33:22 - Eduardo Lima, Weishi Shi, Xumin Liu

, Qi Yu
:
Integrating Multi-level Tag Recommendation with External Knowledge Bases for Automatic Question Answering. 34:1-34:22 - Zexun Jiang

, Hao Yin, Yulei Wu, Yongqiang Lyu, Geyong Min, Xu Zhang:
Constructing Novel Block Layouts for Webpage Analysis. 35:1-35:18 - Qingyang Wang, Shungeng Zhang

, Yasuhiko Kanemasa, Calton Pu:
Mitigating Tail Response Time of n-Tier Applications: The Impact of Asynchronous Invocations. 36:1-36:25
- Schahram Dustdar, Surya Nepal

, James Joshi:
Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. - Xiaodong Ning, Lina Yao, Boualem Benatallah

, Yihong Zhang
, Quan Z. Sheng
, Salil S. Kanhere
:
Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization. 37:1-37:20 - Rafael Angarita, Bruno Lefevre

, Shohreh Ahvar, Ehsan Ahvar, Nikolaos Georgantas, Valérie Issarny:
Universal Social Network Bus: Toward the Federation of Heterogeneous Online Social Network Services. 38:1-38:19 - Christian von der Weth, Ashraf M. Abdul

, Abhinav Ramesh Kashyap, Mohan S. Kankanhalli
:
CloseUp - A Community-Driven Live Online Search Engine. 39:1-39:21 - Saptarshi Das

, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Policy Adaptation in Hierarchical Attribute-based Access Control Systems. 40:1-40:24 - Harsha S. Gardiyawasam Pussewalage

, Vladimir A. Oleshchuk:
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment. 41:1-41:22 - Muhamad Felemban

, Emad A. Felemban, Jason Kobes, Arif Ghafoor:
Threat Management in Data-centric IoT-Based Collaborative Systems. 42:1-42:19 - Daniel Sun

, Shiping Chen
, Guoqiang Li, Yuanyuan Zhang, Muhammad Atif:
Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds. 43:1-43:20
Volume 19, Number 4, November 2019
- Jie Zhang, Jamal Bentahar

, Rino Falcone, Timothy J. Norman, Murat Sensoy
:
Introduction to the Special Section on Trust and AI. - Pasquale De Meo

:
Trust Prediction via Matrix Factorisation. 44:1-44:20 - Feyza Merve Hafizoglu, Sandip Sen

:
Understanding the Influences of Past Experience on Trust in Human-agent Teamwork. 45:1-45:22 - Claudia-Lavinia Ignat

, Quang-Vinh Dang
, Valerie L. Shalin:
The Influence of Trust Score on Cooperative Behavior. 46:1-46:22 - Manel Mrabet

, Yosra Ben Saied, Leïla Azouz Saïdane:
CAN-TM: Chain Augmented Naïve Bayes-based Trust Model for Reliable Cloud Service Selection. 47:1-47:20 - Teng-Chieh Huang, Razieh Nokhbeh Zaeem

, K. Suzanne Barber:
It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter. 48:1-48:20
- Yanjiao Chen

, Xu Wang, Baochun Li, Qian Zhang
:
An Incentive Mechanism for Crowdsourcing Systems with Network Effects. 49:1-49:21 - Kai Wang

, Wei Quan
, Nan Cheng, Mingyuan Liu, Yu Liu, H. Anthony Chan:
Betweenness Centrality Based Software Defined Routing: Observation from Practical Internet Datasets. 50:1-50:19 - Fadwa Estuka, James Miller:

A Pure Visual Approach for Automatically Extracting and Aligning Structured Web Data. 51:1-51:26 - Hong Xie, Weijie Wu, Richard T. B. Ma

, John C. S. Lui:
Pay as Your Service Needs: An Application-Driven Pricing Approach for the Internet Economics. 52:1-52:28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














