default search action
ACM Transactions on Internet Technology, Volume 20
Volume 20, Number 1, March 2020
- Ling Liu:
Internet Technology Outlook: From Communication to Storage and Cognitive Computing. 1:1-1:4 - Tarek F. Abdelzaher, Yifan Hao, Kasthuri Jayarajah, Archan Misra, Per Skarin, Shuochao Yao, Dulanga Weerakoon, Karl-Erik Årzén:
Five Challenges in Cloud-enabled Intelligence and Control. 3:1-3:19
- Calton Pu, Abhijit Suprem, Rodrigo Alves Lima, Aibek Musaev, De Wang, Danesh Irani, Steve Webb, João Eduardo Ferreira:
Beyond Artificial Reality: Finding and Monitoring Live Events from Social Sensors. 2:1-2:21 - Zhengdi Hu, Guangquan Xu, Xi Zheng, Jiang Liu, Zhangbing Li, Quan Z. Sheng, Wenjuan Lian, Hequn Xian:
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation. 4:1-4:20 - Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-preserving Network Path Validation. 5:1-5:27 - Amitangshu Pal, Mayank Raj, Krishna Kant, Sajal K. Das:
A Smartphone-based Network Architecture for Post-disaster Operations Using WiFi Tethering. 6:1-6:27 - Rui Pascoal, Ana de Almeida, Rute C. Sofia:
Mobile Pervasive Augmented Reality Systems - MPARS: The Role of User Preferences in the Perceived Quality of Experience in Outdoor Applications. 7:1-7:17
Volume 20, Number 2, May 2020
Special Section on Emotions in Conflictual Social Interactions
- Rossana Damiano, Viviana Patti, Chloé Clavel, Paolo Rosso:
Introduction to the Special Section on Computational Modeling and Understanding of Emotions in Conflictual Social Interactions. 8:1-8:5 - Krit Gupta, Aditya Gujral, Theodora Chaspari, Adela C. Timmons, Sohyun C. Han, Yehsong Kim, Sarah Barrett, Stassja Sichko, Gayla Margolin:
Sub-Population Specific Models of Couples' Conflict. 9:1-9:20 - Michele Corazza, Stefano Menini, Elena Cabrio, Sara Tonelli, Serena Villata:
A Multilingual Evaluation for Online Hate Speech Detection. 10:1-10:22 - Demetris Paschalides, Dimosthenis Stephanidis, Andreas Andreou, Kalia Orphanou, George Pallis, Marios D. Dikaiakos, Evangelos P. Markatos:
MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. 11:1-11:21 - Flor Miriam Plaza del Arco, M. Dolores Molina-González, Luis Alfonso Ureña López, María Teresa Martín-Valdivia:
Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies. 12:1-12:19 - Shuo Wang, Aishan Maoliniyazi, Xinle Wu, Xiaofeng Meng:
Emo2Vec: Learning Emotional Embeddings via Multi-Emotion Category. 13:1-13:17
- Amitangshu Pal, Krishna Kant:
Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks. 14:1-14:31 - Zhiheng Zhong, Rajkumar Buyya:
A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources. 15:1-15:24 - Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay:
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices. 16:1-16:24 - Christos Tsigkanos, Martin Garriga, Luciano Baresi, Carlo Ghezzi:
Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems. 17:1-17:23 - Ting Chen, Zihao Li, Yuxiao Zhu, Jiachi Chen, Xiapu Luo, John Chi-Shing Lui, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. 18:1-18:32 - Bilal Ghanem, Paolo Rosso, Francisco M. Rangel Pardo:
An Emotional Analysis of False Information in Social Media and News Articles. 19:1-19:18
Volume 20, Number 3, October 2020
- Rute C. Sofia, Eve M. Schooler, Dirk Kutscher, Chris Winkler:
Introduction to the Special Issue on Evolution of IoT Networking Architectures. 20:1-20:2 - Marcel Enguehard, Yoann Desmouceaux, Giovanna Carofiglio:
Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation. 21:1-21:23 - Kyriaki Panagidi, Christos Anagnostopoulos, A. Chalvatzaras, Stathes Hadjiefthymiades:
To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain. 22:1-22:23 - Xia Cheng, Junyang Shi, Mo Sha:
Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks. 23:1-23:28 - Jiaoyan Chen, Laurence T. Yang, Xianjun Deng, Xianggong Hong, Lingzhi Yi:
Optimal Receiver Placement for K-barrier Coverage in Passive Bistatic Radar Sensor Networks. 24:1-24:23 - Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge. 25:1-25:28 - Giuseppe Faraci, Christian Grasso, Giovanni Schembra:
Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices. 26:1-26:26 - Jan Seeger, Arne Bröring, Georg Carle:
Optimally Self-Healing IoT Choreographies. 27:1-27:20 - Junyang Shi, Mo Sha:
Parameter Self-Adaptation for Industrial Wireless Sensor-Actuator Networks. 28:1-28:28 - Marcin Luckner, Maciej Grzenda, Robert Kunicki, Jaroslaw Legierski:
IoT Architecture for Urban Data-Centric Services and Applications. 29:1-29:30 - Nikolaos Athanasios Anagnostopoulos, Saad Ahmad, Tolga Arul, Daniel Steinmetzer, Matthias Hollick, Stefan Katzenbeisser:
Low-cost Security for Next-generation IoT Networks. 30:1-30:31
Volume 20, Number 4, November 2020
- Runhua Xu, James Joshi:
Trustworthy and Transparent Third-party Authority. 31:1-31:23 - Meng Wang, Bo Cheng, Junliang Chen:
An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing. 32:1-32:21 - Xiaoyu Ge, Panos K. Chrysanthis, Konstantinos Pelechrinis, Demetrios Zeinalipour-Yazti, Mohamed A. Sharaf:
Serendipity-based Points-of-Interest Navigation. 33:1-33:32 - Michalis Pachilakis, Antonios A. Chariton, Panagiotis Papadopoulos, Panagiotis Ilia, Eirini Degkleri, Evangelos P. Markatos:
Design and Implementation of a Compressed Certificate Status Protocol. 34:1-34:25 - Elias Rohrer, Steffen Heidel, Florian Tschorsch:
Enabling Reference Verifiability for the World Wide Web with Webchain. 35:1-35:23 - Yang Zhou, Ling Liu, Kisung Lee, Balaji Palanisamy, Qi Zhang:
Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks. 36:1-36:29 - Hong Xie, Yongkun Li, John C. S. Lui:
A Reinforcement Learning Approach to Optimize Discount and Reputation Tradeoffs in E-commerce Systems. 37:1-37:26 - Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme. 38:1-38:24 - Grigorios Loukides, Robert Gwadera, Shing-Wan Chang:
Overexposure-Aware Influence Maximization. 39:1-39:31 - Xudong Wu, Luoyi Fu, Zixin Zhang, Huan Long, Jingfan Meng, Xinbing Wang, Guihai Chen:
Evolving Influence Maximization in Evolving Networks. 40:1-40:31 - Na Ruan, Dongli Zhou, Weijia Jia:
Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput. 41:1-41:26 - Chunli Huang, Wenjun Jiang, Jie Wu, Guojun Wang:
Personalized Review Recommendation based on Users' Aspect Sentiment. 42:1-42:26 - Hongshuai Ren, Yang Wang, Chengzhong Xu, Xi Chen:
SMig-RL: An Evolutionary Migration Framework for Cloud Services Based on Deep Reinforcement Learning. 43:1-43:18 - Slava Novgorodov, Ido Guy, Guy Elad, Kira Radinsky:
Descriptions from the Customers: Comparative Analysis of Review-based Product Description Generation Methods. 44:1-44:31 - Kostas Kolomvatsos, Christos Anagnostopoulos:
An Intelligent Edge-centric Queries Allocation Scheme based on Ensemble Models. 45:1-45:25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.