default search action
ACM Transactions on Internet Technology, Volume 22
Volume 22, Number 1, February 2022
- Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha, Deepak Garg, Neeraj Kumar:
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. 1:1-1:27 - Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, Muhammad Dawood:
Secure Distributed Mobile Volunteer Computing with Android. 2:1-2:21 - Chen Chen, Lei Liu, Shaohua Wan, Xiaozhe Hui, Qingqi Pei:
Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction. 3:1-3:18 - Weiwei Lin, Tiansheng Huang, Xin Li, Fang Shi, Xiumin Wang, Ching-Hsien Hsu:
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme. 4:1-4:23 - Nan Jiang, Debin Huang, Jing Chen, Jie Wen, Heng Zhang, Honglong Chen:
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV. 5:1-5:23 - Muhammad Junaid, Adnan Sohail, Fadi M. Al-Turjman, Rashid Ali:
Agile Support Vector Machine for Energy-efficient Resource Allocation in IoT-oriented Cloud using PSO. 6:1-6:35 - Afiya Ayman, Amutheezan Sivagnanam, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles. 7:1-7:29 - Laura Verde, Nadia Brancati, Giuseppe De Pietro, Maria Frucci, Giovanna Sannino:
A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments. 8:1-8:16 - Rahul Kumar, Ankur Gupta, Harkirat Singh Arora, Balasubramanian Raman:
IBRDM: An Intelligent Framework for Brain Tumor Classification Using Radiomics- and DWT-based Fusion of MRI Sequences. 9:1-9:30 - Yanchen Qiao, Weizhe Zhang, Xiaojiang Du, Mohsen Guizani:
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security. 10:1-10:22 - David J. Major, Danny Yuxing Huang, Marshini Chetty, Nick Feamster:
Alexa, Who Am I Speaking To?: Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa. 11:1-11:22 - Marwa Daaji, Ali Ouni, Mohamed Mohsen Gammoudi, Salah Bouktif, Mohamed Wiem Mkaouer:
Multi-criteria Web Services Selection: Balancing the Quality of Design and Quality of Service. 12:1-12:31 - Sajib Mistry, Lie Qu, Athman Bouguettaya:
Layer-based Composite Reputation Bootstrapping. 13:1-13:28 - Ghazale Amel Zendehdel, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova, Erik J. Scheme:
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices. 14:1-14:31 - Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hsiang Lu, George K. Thiruvathukal:
Automated Discovery of Network Cameras in Heterogeneous Web Pages. 15:1-15:25 - Menatalla Abououf, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Ernesto Damiani:
Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model. 16:1-16:28 - Ovidiu Dan, Vaibhav Parikh, Brian D. Davison:
IP Geolocation through Reverse DNS. 17:1-17:29 - Di Zhang, Feng Xu, Chi-Man Pun, Yang Yang, Rushi Lan, Liejun Wang, Yujie Li, Hao Gao:
Virtual Reality Aided High-Quality 3D Reconstruction by Remote Drones. 18:1-18:20 - Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Cloud-based Network Virtualization in IoT with OpenStack. 19:1-19:26 - Jingjing Wang, Wenjun Jiang, Kenli Li, Guojun Wang, Keqin Li:
Incremental Group-Level Popularity Prediction in Online Social Networks. 20:1-20:26 - Alessio Pagani, Zhuangkun Wei, Ricardo Silva, Weisi Guo:
Neural Network Approximation of Graph Fourier Transform for Sparse Sampling of Networked Dynamics. 21:1-21:18 - Zhenyu Fan, Wang Yang, Fan Wu, Jing Cao, Weisong Shi:
Serving at the Edge: An Edge Computing Service Architecture Based on ICN. 22:1-22:27 - Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. 24:1-24:31 - Florian Meier, Alexander Bazo, David Elsweiler:
Using Social Media Data to Analyse Issue Engagement During the 2017 German Federal Election. 25:1-25:25 - Cosmin Avasalcai, Christos Tsigkanos, Schahram Dustdar:
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability. 26:1-26:21 - Onuralp Ulusoy, Pinar Yolum:
PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy. 27:1-27:32 - Ashima Yadav, Dinesh Kumar Vishwakarma:
A Language-independent Network to Analyze the Impact of COVID-19 on the World via Sentiment Analysis. 28:1-28:30
Volume 22, Number 2, May 2022
- Yali Yuan, Chencheng Liang, Xu Chen, Thar Baker, Xiaoming Fu:
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks. 29:1-29:20 - Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee, Jaime Lloret:
DADC: A Novel Duty-cycling Scheme for IEEE 802.15.4 Cluster-tree-based IoT Applications. 30:1-30:26 - Jianfeng Lu, Zhao Zhang, Jiangtao Wang, Ruixuan Li, Shaohua Wan:
A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing. 31:1-31:29 - Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante:
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments. 32:1-32:21 - Hongyang Yan, Nan Jiang, Kang Li, Yilei Wang, Guoyu Yang:
Collusion-free for Cloud Verification toward the View of Game Theory. 33:1-33:21 - Wei Liang, Songyou Xie, Dafang Zhang, Xiong Li, Kuan-Ching Li:
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning. 34:1-34:20 - Mohammad Shorfuzzaman, M. Shamim Hossain:
Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development. 35:1-35:26 - Gunasekaran Manogaran, Bharat S. Rawal, Houbing Song, Huihui Wang, Chinghsien Hsu, Vijayalakshmi Saravanan, Seifedine Nimer Kadry, P. Mohamed Shakeel:
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning. 36:1-36:19 - Kamran Ahmad Awan, Ikram Ud Din, Abeer S. Almogren, Neeraj Kumar, Ahmad Almogren:
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things. 37:1-37:28 - Zhihan Lv, Ranran Lou, Amit Kumar Singh, Qingjun Wang:
Transfer Learning-powered Resource Optimization for Green Computing in 5G-Aided Industrial Internet of Things. 38:1-38:16
- Gunasekaran Manogaran, Hassan Qudrat-Ullah, Qin Xin, Latifur Khan:
Guest Editorial Introduction for the Special Section on Deep Learning Algorithms and Systems for Enhancing Security in Cloud Services. 39e:1-39e:5 - Lea Dujic Rodic, Tomislav Zupanovic, Toni Perkovic, Petar Solic, Joel J. P. C. Rodrigues:
Machine Learning and Soil Humidity Sensing: Signal Strength Approach. 39:1-39:21 - Farhan Ullah, Muhammad Rashid Naeem, Abdullah S. Bajahzar, Fadi Al-Turjman:
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification. 40:1-40:17 - Bharat S. Rawal, Poongodi M, Gunasekaran Manogaran, Mounir Hamdi:
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform. 41:1-41:20 - Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed, Awais Ahmad, Gwanggil Jeon:
Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data. 42:1-42:21 - Derui Wang, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Surya Nepal, Yang Xiang:
On the Neural Backdoor of Federated Generative Models in Edge Computing. 43:1-43:21 - Huijie Yang, Jian Shen, Tianqi Zhou, Sai Ji, Pandi Vijayakumar:
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs. 44:1-44:19 - Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab:
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing. 45:1-45:24 - Christos L. Stergiou, Konstantinos E. Psannis, Brij B. Gupta:
InFeMo: Flexible Big Data Management Through a Federated Cloud System. 46:1-46:22 - Yasser D. Al-Otaibi:
A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications. 47:1-47:17 - Tu N. Nguyen, Sherali Zeadally:
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions. 48:1-48:15 - Xiao Zheng, Mingchu Li, Syed Bilal Hussain Shah, Dinh-Thuan Do, Yuanfang Chen, Constandinos X. Mavromoustakis, George Mastorakis, Evangelos Pallis:
Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing. 49:1-49:15 - Xiongtao Zhang, Xiaomin Zhu, Ji Wang, Weidong Bao, Laurence T. Yang:
DANCE: Distributed Generative Adversarial Networks with Communication Compression. 50:1-50:32
- Rui Zhang, Libing Wu, Shuqin Cao, Xinrong Hu, Shan Xue, Dan Wu, Qingan Li:
Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV. 51:1-51:24 - Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. 52:1-52:27 - Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber:
A Security Cost Modelling Framework for Cyber-Physical Systems. 53:1-53:31 - Heesuk Son, Dongman Lee:
An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments. 54:1-54:25
Volume 22, Number 3, August 2022
- M. Shamim Hossain, Changsheng Xu, Josu Bilbao, Md. Abdur Rahman, Abdulmotaleb El-Saddik, Mohamed Bin Zayed:
Special Section on Edge-AI for Connected Living. 55e:1-55e:3 - Prayag Tiwari, Amit Kumar Jaiswal, Sahil Garg, Ilsun You:
SANTM: Efficient Self-attention-driven Network for Text Matching. 55:1-55:21 - Songwen Pei, Yusheng Wu, Jin Guo, Meikang Qiu:
Neural Network Pruning by Recurrent Weights for Finance Market. 56:1-56:23 - Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. 57:1-57:25 - Chaonan Shen, Kai Zhang, Jinshan Tang:
A COVID-19 Detection Algorithm Using Deep Features and Discrete Social Learning Particle Swarm Optimization for Edge Computing Devices. 58:1-58:17 - Yi Liu, Ruihui Zhao, Jiawen Kang, Abdulsalam Yassine, Dusit Niyato, Jialiang Peng:
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things. 59:1-59:22 - Guihong Chen, Xi Liu, Mohammad Shorfuzzaman, Ali Karime, Yonghua Wang, Yuanhang Qi:
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs. 60:1-60:17 - K. Shankar, Eswaran Perumal, Mohamed Elhoseny, Fatma Taher, B. B. Gupta, Ahmed A. Abd El-Latif:
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities. 61:1-61:14 - Min Chen, Ke Shen, Rui Wang, Yiming Miao, Yingying Jiang, Kai Hwang, Yixue Hao, Guangming Tao, Long Hu, Zhongchun Liu:
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring. 62:1-62:16
- Kaijian Xia, Wenbing Zhao, Alireza Jolfaei, M. Tamer Özsu:
Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence. 63e:1-63e:2 - Zhihan Lv, Ranran Lou, Haibin Lv:
Edge Computing to Solve Security Issues for Infectious Disease Intelligence Prevention. 63:1-63:20 - Yizhang Jiang, Xiaoqing Gu, Lei Hua, Kang Li, Yuwen Tao, Bo Li:
Forecasting Trend of Coronavirus Disease 2019 using Multi-Task Weighted TSK Fuzzy System. 64:1-64:24 - Tongguang Ni, Jiaqun Zhu, Jia Qu, Jing Xue:
Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis. 65:1-65:21
- Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. 66:1-66:20 - Haipeng Chen, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. 67:1-67:24 - Bo Gu, Mamoun Alazab, Ziqi Lin, Xu Zhang, Jun Huang:
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks. 68:1-68:17 - Lanyu Xu, Arun Iyengar, Weisong Shi:
NLUBroker: A QoE-driven Broker System for Natural Language Understanding Services. 69:1-69:29 - Trinh Viet Doan, Roland van Rijswijk-Deij, Oliver Hohlfeld, Vaibhav Bajpai:
An Empirical View on Consolidation of the Web. 70:1-70:30 - Md. Arafat Hossain, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir, Steve Versteeg:
Extracting Formats of Service Messages with Varying Payloads. 71:1-71:31 - Genoveva Vargas-Solar, Maysaa Khalil, Javier A. Espinosa-Oviedo, José-Luis Zechinelli-Martini:
GREENHOME: A Household Energy Consumption and CO2 Footprint Metering Environment. 72:1-72:31 - Niki Pavlopoulou, Edward Curry:
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things. 73:1-73:30 - Jacopo Soldani, Marco Cameriero, Giulio Paparelli, Antonio Brogi:
Modelling and Analysing Replica- and Fault-aware Management of Horizontally Scalable Applications. 74:1-74:32 - Minxian Xu, Chenghao Song, Huaming Wu, Sukhpal Singh Gill, Kejiang Ye, Chengzhong Xu:
esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments. 75:1-75:24 - Roberto Yus, Georgios Bouloukakis, Sharad Mehrotra, Nalini Venkatasubramanian:
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces. 76:1-76:33 - Enrico Tedeschi, Tor-Arne S. Nordmo, Dag Johansen, Håvard D. Johansen:
On Optimizing Transaction Fees in Bitcoin using AI: Investigation on Miners Inclusion Pattern. 77:1-77:28 - Ilir Murturi, Schahram Dustdar:
DECENT: A Decentralized Configurator for Controlling Elasticity in Dynamic Edge Networks. 78:1-78:21 - Tu Le, Danny Yuxing Huang, Noah J. Apthorpe, Yuan Tian:
SkillBot: Identifying Risky Content for Children in Alexa Skills. 79:1-79:31 - Hyungjune Shin, Dongyoung Koo, Junbeom Hur:
Secure and Efficient Hybrid Data Deduplication in Edge Computing. 80:1-80:25
Volume 22, Number 4, November 2022
- Ching-Hsien Hsu, Amir Hossein Alavi, Mianxiong Dong:
Introduction to the Special Section on Cyber Security in Internet of Vehicles. 81:1-81:6 - Haibo Yi, Ruinan Chi, Xin Huang, Xuejun Cai, Zhe Nie:
Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions. 82:1-82:15 - Xiao Song, Kai Chen, Xiaoxiang Ren, Haitao Yuan:
Pedestrian Trajectory Prediction in Heterogeneous Traffic using Facial Keypoints-based Convolutional Encoder-decoder Network. 83:1-83:14 - Chandrasekar Ravi, Anmol Tigga, G. Thippa Reddy, Saqib Hakak, Mamoun Alazab:
Driver Identification Using Optimized Deep Learning Model in Smart Transportation. 84:1-84:17 - Yangfan Liang, Yining Liu, Brij B. Gupta:
PPRP: Preserving-Privacy Route Planning Scheme in VANETs. 85:1-85:18 - Mohamad Ali Mehrabi, Alireza Jolfaei:
Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles. 86:1-86:16 - Xiaojie Wang, Laisen Nie, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, Neeraj Kumar:
Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles. 87:1-87:20 - Hui Tian, Fang Peng, Hanyu Quan, Chin-Chen Chang:
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data. 88:1-88:24 - Ramesh Sekaran, Fadi M. Al-Turjman, Rizwan Patan, Velmani Ramasamy:
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN). 89:1-89:18 - Gunasekaran Manogaran, Bharat S. Rawal, Vijayalakshmi Saravanan, Priyan Malarvizhi Kumar, Qin Xin, P. Mohamed Shakeel:
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication. 90:1-90:20 - Ao Zhou, Xiao Ma, Siyi Gao, Shangguang Wang:
Providing Reliable Service for Parked-vehicle-assisted Mobile Edge Computing. 91:1-91:24 - Si Young Jang, Sung Kyu Park, Jin-Hee Cho, Dongman Lee:
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks. 92:1-92:24 - Mathias Fischer, Winfried Lamersdorf, Jörg Liebeherr, Max Mühlhäuser:
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems. 93:1-93:3 - Kurian Polachan, Chandramani Singh, Tamma V. Prabhakar:
Decentralized Dynamic Scheduling of TCPS Flows and a Simulator for Time-sensitive Networking. 94:1-94:30 - Yevhenii Shudrenko, Daniel Plöger, Koojana Kuladinithi, Andreas Timm-Giel:
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks. 95:1-95:29 - Thiago Pereira da Silva, Thaís Vasconcelos Batista, Frederico Lopes, Aluizio Rocha Neto, Flávia Coimbra Delicato, Paulo F. Pires, Atslands Rego da Rocha:
Fog Computing Platforms for Smart City Applications: A Survey. 96:1-96:32 - Christoph Döpmann, Felix Fiedler, Sergio Lucia, Florian Tschorsch:
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges. 97:1-97:30 - Chao Wu, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, Kenichi Tayama:
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience. 98:1-98:25 - Andrei Ciortea, Xiaomin Zhu, Calton Pu, Munindar P. Singh:
Introduction to the Special Issue on Multiagent Systems and Services in the Internet of Things. 99:1-99:3 - Pierre Rust, Gauthier Picard, Fano Ramparany:
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments. 100:1-100:31 - Alessandro Ricci, Angelo Croatti, Stefano Mariani, Sara Montagna, Marco Picone:
Web of Digital Twins. 101:1-101:30 - Haoyu Ren, Darko Anicic, Thomas A. Runkler:
Towards Semantic Management of On-Device Applications in Industrial IoT. 102:1-102:30 - Lina Barakat, Phillip Taylor, Nathan Griffiths, Simon Miles:
A Reputation-based Framework for Honest Provenance Reporting. 103:1-103:31 - Timotheus Kampik, Adnane Mansour, Olivier Boissier, Sabrina Kirrane, Julian A. Padget, Terry R. Payne, Munindar P. Singh, Valentina A. M. Tamma, Antoine Zimmermann:
Governance of Autonomous Agents on the Web: Challenges and Opportunities. 104:1-104:31 - Vicente García-Díaz, Jerry Chun-Wei Lin, Juan Antonio Morente-Molinera:
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities. 105:1-105:2 - Suresh Chavhan, Deepak Gupta, Sarada Prasad Gochhayat, B. N. Chandana, Ashish Khanna, K. Shankar, Joel J. P. C. Rodrigues:
Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities. 106:1-106:18 - Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Xiong Li, Weijia Jia:
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs. 107:1-107:28 - Michell Boerger, Philipp Lämmel, Nikolay Tcholtchev, Manfred Hauswirth:
Enabling Short-Term Energy Flexibility Markets Through Blockchain. 108:1-108:25 - Long Chen, Mianyang Yao, Yalan Wu, Jigang Wu:
EECDN: Energy-efficient Cooperative DNN Edge Inference in Wireless Sensor Networks. 109:1-109:30 - Sandeep Kumar Sood, Keshav Singh Rawat, Dheeraj Kumar:
Emerging Trends of ICT in Airborne Disease Prevention. 110:1-110:18
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.