


default search action
ACM Transactions on Internet Technology, Volume 20
Volume 20, Number 1, March 2020
- Ling Liu:
Internet Technology Outlook: From Communication to Storage and Cognitive Computing. 1:1-1:4 - Tarek F. Abdelzaher, Yifan Hao, Kasthuri Jayarajah, Archan Misra
, Per Skarin
, Shuochao Yao, Dulanga Weerakoon, Karl-Erik Årzén:
Five Challenges in Cloud-enabled Intelligence and Control. 3:1-3:19
- Calton Pu, Abhijit Suprem, Rodrigo Alves Lima, Aibek Musaev, De Wang, Danesh Irani, Steve Webb, João Eduardo Ferreira
:
Beyond Artificial Reality: Finding and Monitoring Live Events from Social Sensors. 2:1-2:21 - Zhengdi Hu, Guangquan Xu, Xi Zheng
, Jiang Liu, Zhangbing Li, Quan Z. Sheng
, Wenjuan Lian, Hequn Xian:
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation. 4:1-4:20 - Binanda Sengupta
, Yingjiu Li, Kai Bu, Robert H. Deng
:
Privacy-preserving Network Path Validation. 5:1-5:27 - Amitangshu Pal
, Mayank Raj
, Krishna Kant, Sajal K. Das:
A Smartphone-based Network Architecture for Post-disaster Operations Using WiFi Tethering. 6:1-6:27 - Rui Pascoal
, Ana de Almeida
, Rute C. Sofia
:
Mobile Pervasive Augmented Reality Systems - MPARS: The Role of User Preferences in the Perceived Quality of Experience in Outdoor Applications. 7:1-7:17
Volume 20, Number 2, May 2020
Special Section on Emotions in Conflictual Social Interactions
- Rossana Damiano, Viviana Patti, Chloé Clavel, Paolo Rosso:
Introduction to the Special Section on Computational Modeling and Understanding of Emotions in Conflictual Social Interactions. 8:1-8:5 - Krit Gupta, Aditya Gujral, Theodora Chaspari, Adela C. Timmons
, Sohyun C. Han, Yehsong Kim, Sarah Barrett, Stassja Sichko, Gayla Margolin:
Sub-Population Specific Models of Couples' Conflict. 9:1-9:20 - Michele Corazza
, Stefano Menini, Elena Cabrio, Sara Tonelli, Serena Villata:
A Multilingual Evaluation for Online Hate Speech Detection. 10:1-10:22 - Demetris Paschalides, Dimosthenis Stephanidis, Andreas Andreou, Kalia Orphanou
, George Pallis, Marios D. Dikaiakos, Evangelos P. Markatos:
MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech. 11:1-11:21 - Flor Miriam Plaza del Arco
, M. Dolores Molina-González
, Luis Alfonso Ureña López, María Teresa Martín-Valdivia
:
Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies. 12:1-12:19 - Shuo Wang, Aishan Maoliniyazi, Xinle Wu, Xiaofeng Meng:
Emo2Vec: Learning Emotional Embeddings via Multi-Emotion Category. 13:1-13:17
- Amitangshu Pal
, Krishna Kant:
Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks. 14:1-14:31 - Zhiheng Zhong
, Rajkumar Buyya
:
A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources. 15:1-15:24 - Xingbin Jiang, Michele Lora
, Sudipta Chattopadhyay:
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices. 16:1-16:24 - Christos Tsigkanos
, Martin Garriga, Luciano Baresi
, Carlo Ghezzi:
Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems. 17:1-17:23 - Ting Chen
, Zihao Li
, Yuxiao Zhu, Jiachi Chen
, Xiapu Luo, John Chi-Shing Lui
, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. 18:1-18:32 - Bilal Ghanem
, Paolo Rosso, Francisco M. Rangel Pardo:
An Emotional Analysis of False Information in Social Media and News Articles. 19:1-19:18
Volume 20, Number 3, October 2020
- Rute C. Sofia, Eve M. Schooler, Dirk Kutscher
, Chris Winkler:
Introduction to the Special Issue on Evolution of IoT Networking Architectures. 20:1-20:2 - Marcel Enguehard
, Yoann Desmouceaux, Giovanna Carofiglio:
Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation. 21:1-21:23 - Kyriaki Panagidi
, Christos Anagnostopoulos
, A. Chalvatzaras, Stathes Hadjiefthymiades:
To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain. 22:1-22:23 - Xia Cheng, Junyang Shi, Mo Sha
:
Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks. 23:1-23:28 - Jiaoyan Chen, Laurence T. Yang, Xianjun Deng
, Xianggong Hong, Lingzhi Yi
:
Optimal Receiver Placement for K-barrier Coverage in Passive Bistatic Radar Sensor Networks. 24:1-24:23 - Zakaria Benomar
, Francesco Longo
, Giovanni Merlino, Antonio Puliafito:
Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge. 25:1-25:28 - Giuseppe Faraci, Christian Grasso, Giovanni Schembra
:
Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices. 26:1-26:26 - Jan Seeger
, Arne Bröring, Georg Carle:
Optimally Self-Healing IoT Choreographies. 27:1-27:20 - Junyang Shi, Mo Sha
:
Parameter Self-Adaptation for Industrial Wireless Sensor-Actuator Networks. 28:1-28:28 - Marcin Luckner, Maciej Grzenda
, Robert Kunicki, Jaroslaw Legierski:
IoT Architecture for Urban Data-Centric Services and Applications. 29:1-29:30 - Nikolaos Athanasios Anagnostopoulos
, Saad Ahmad
, Tolga Arul
, Daniel Steinmetzer, Matthias Hollick
, Stefan Katzenbeisser:
Low-cost Security for Next-generation IoT Networks. 30:1-30:31
Volume 20, Number 4, November 2020
- Runhua Xu
, James Joshi:
Trustworthy and Transparent Third-party Authority. 31:1-31:23 - Meng Wang
, Bo Cheng, Junliang Chen:
An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing. 32:1-32:21 - Xiaoyu Ge, Panos K. Chrysanthis
, Konstantinos Pelechrinis, Demetrios Zeinalipour-Yazti
, Mohamed A. Sharaf:
Serendipity-based Points-of-Interest Navigation. 33:1-33:32 - Michalis Pachilakis, Antonios A. Chariton, Panagiotis Papadopoulos
, Panagiotis Ilia
, Eirini Degkleri, Evangelos P. Markatos:
Design and Implementation of a Compressed Certificate Status Protocol. 34:1-34:25 - Elias Rohrer
, Steffen Heidel, Florian Tschorsch:
Enabling Reference Verifiability for the World Wide Web with Webchain. 35:1-35:23 - Yang Zhou, Ling Liu, Kisung Lee, Balaji Palanisamy, Qi Zhang:
Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks. 36:1-36:29 - Hong Xie, Yongkun Li, John C. S. Lui:
A Reinforcement Learning Approach to Optimize Discount and Reputation Tradeoffs in E-commerce Systems. 37:1-37:26 - Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu
:
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme. 38:1-38:24 - Grigorios Loukides
, Robert Gwadera, Shing-Wan Chang
:
Overexposure-Aware Influence Maximization. 39:1-39:31 - Xudong Wu, Luoyi Fu, Zixin Zhang, Huan Long, Jingfan Meng, Xinbing Wang, Guihai Chen
:
Evolving Influence Maximization in Evolving Networks. 40:1-40:31 - Na Ruan, Dongli Zhou, Weijia Jia:
Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput. 41:1-41:26 - Chunli Huang, Wenjun Jiang
, Jie Wu, Guojun Wang:
Personalized Review Recommendation based on Users' Aspect Sentiment. 42:1-42:26 - Hongshuai Ren, Yang Wang, Chengzhong Xu
, Xi Chen:
SMig-RL: An Evolutionary Migration Framework for Cloud Services Based on Deep Reinforcement Learning. 43:1-43:18 - Slava Novgorodov, Ido Guy, Guy Elad, Kira Radinsky:
Descriptions from the Customers: Comparative Analysis of Review-based Product Description Generation Methods. 44:1-44:31 - Kostas Kolomvatsos, Christos Anagnostopoulos
:
An Intelligent Edge-centric Queries Allocation Scheme based on Ensemble Models. 45:1-45:25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.