


default search action
ACM Transactions on Internet Technology, Volume 22
Volume 22, Number 1, February 2022
- Gaurav Singal
, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha, Deepak Garg
, Neeraj Kumar
:
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. 1:1-1:27 - Iram Bibi
, Adnan Akhunzada
, Jahanzaib Malik
, Muhammad Khurram Khan
, Muhammad Dawood:
Secure Distributed Mobile Volunteer Computing with Android. 2:1-2:21 - Chen Chen, Lei Liu, Shaohua Wan, Xiaozhe Hui, Qingqi Pei:
Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction. 3:1-3:18 - Weiwei Lin, Tiansheng Huang, Xin Li
, Fang Shi, Xiumin Wang, Ching-Hsien Hsu:
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme. 4:1-4:23 - Nan Jiang
, Debin Huang, Jing Chen, Jie Wen, Heng Zhang, Honglong Chen:
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV. 5:1-5:23 - Muhammad Junaid, Adnan Sohail, Fadi M. Al-Turjman
, Rashid Ali:
Agile Support Vector Machine for Energy-efficient Resource Allocation in IoT-oriented Cloud using PSO. 6:1-6:35 - Afiya Ayman, Amutheezan Sivagnanam
, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles. 7:1-7:29 - Laura Verde, Nadia Brancati, Giuseppe De Pietro, Maria Frucci, Giovanna Sannino
:
A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments. 8:1-8:16 - Rahul Kumar
, Ankur Gupta
, Harkirat Singh Arora
, Balasubramanian Raman
:
IBRDM: An Intelligent Framework for Brain Tumor Classification Using Radiomics- and DWT-based Fusion of MRI Sequences. 9:1-9:30 - Yanchen Qiao
, Weizhe Zhang, Xiaojiang Du, Mohsen Guizani:
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security. 10:1-10:22 - David J. Major, Danny Yuxing Huang, Marshini Chetty, Nick Feamster:
Alexa, Who Am I Speaking To?: Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa. 11:1-11:22 - Marwa Daaji
, Ali Ouni, Mohamed Mohsen Gammoudi, Salah Bouktif, Mohamed Wiem Mkaouer
:
Multi-criteria Web Services Selection: Balancing the Quality of Design and Quality of Service. 12:1-12:31 - Sajib Mistry
, Lie Qu, Athman Bouguettaya:
Layer-based Composite Reputation Bootstrapping. 13:1-13:28 - Ghazale Amel Zendehdel
, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova
, Erik J. Scheme:
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices. 14:1-14:31 - Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hsiang Lu, George K. Thiruvathukal:
Automated Discovery of Network Cameras in Heterogeneous Web Pages. 15:1-15:25 - Menatalla Abououf, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Ernesto Damiani:
Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model. 16:1-16:28 - Ovidiu Dan
, Vaibhav Parikh, Brian D. Davison
:
IP Geolocation through Reverse DNS. 17:1-17:29 - Di Zhang, Feng Xu, Chi-Man Pun, Yang Yang, Rushi Lan
, Liejun Wang, Yujie Li, Hao Gao
:
Virtual Reality Aided High-Quality 3D Reconstruction by Remote Drones. 18:1-18:20 - Zakaria Benomar
, Francesco Longo
, Giovanni Merlino
, Antonio Puliafito:
Cloud-based Network Virtualization in IoT with OpenStack. 19:1-19:26 - Jingjing Wang, Wenjun Jiang
, Kenli Li, Guojun Wang, Keqin Li:
Incremental Group-Level Popularity Prediction in Online Social Networks. 20:1-20:26 - Alessio Pagani, Zhuangkun Wei
, Ricardo Silva, Weisi Guo:
Neural Network Approximation of Graph Fourier Transform for Sparse Sampling of Networked Dynamics. 21:1-21:18 - Zhenyu Fan, Wang Yang, Fan Wu
, Jing Cao, Weisong Shi:
Serving at the Edge: An Edge Computing Service Architecture Based on ICN. 22:1-22:27 - Mengmeng Ge
, Jin-Hee Cho, Dong Seong Kim
, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. 24:1-24:31 - Florian Meier
, Alexander Bazo, David Elsweiler:
Using Social Media Data to Analyse Issue Engagement During the 2017 German Federal Election. 25:1-25:25 - Cosmin Avasalcai
, Christos Tsigkanos
, Schahram Dustdar
:
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability. 26:1-26:21 - Onuralp Ulusoy
, Pinar Yolum:
PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy. 27:1-27:32 - Ashima Yadav, Dinesh Kumar Vishwakarma
:
A Language-independent Network to Analyze the Impact of COVID-19 on the World via Sentiment Analysis. 28:1-28:30
Volume 22, Number 2, May 2022
- Yali Yuan, Chencheng Liang, Xu Chen, Thar Baker
, Xiaoming Fu:
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks. 29:1-29:20 - Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee
, Jaime Lloret:
DADC: A Novel Duty-cycling Scheme for IEEE 802.15.4 Cluster-tree-based IoT Applications. 30:1-30:26 - Jianfeng Lu, Zhao Zhang, Jiangtao Wang
, Ruixuan Li, Shaohua Wan:
A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing. 31:1-31:29 - Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis
, Francesco Palmieri, Raffaele Pizzolante:
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments. 32:1-32:21 - Hongyang Yan, Nan Jiang, Kang Li, Yilei Wang, Guoyu Yang:
Collusion-free for Cloud Verification toward the View of Game Theory. 33:1-33:21 - Wei Liang, Songyou Xie, Dafang Zhang, Xiong Li
, Kuan-Ching Li
:
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning. 34:1-34:20 - Mohammad Shorfuzzaman, M. Shamim Hossain:
Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development. 35:1-35:26 - Gunasekaran Manogaran, Bharat S. Rawal, Houbing Song
, Huihui Wang
, Chinghsien Hsu, Vijayalakshmi Saravanan, Seifedine Nimer Kadry, P. Mohamed Shakeel:
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning. 36:1-36:19 - Kamran Ahmad Awan
, Ikram Ud Din
, Abeer S. Almogren, Neeraj Kumar
, Ahmad Almogren:
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things. 37:1-37:28 - Zhihan Lv, Ranran Lou, Amit Kumar Singh, Qingjun Wang:
Transfer Learning-powered Resource Optimization for Green Computing in 5G-Aided Industrial Internet of Things. 38:1-38:16
- Gunasekaran Manogaran, Hassan Qudrat-Ullah, Qin Xin, Latifur Khan:
Guest Editorial Introduction for the Special Section on Deep Learning Algorithms and Systems for Enhancing Security in Cloud Services. 39e:1-39e:5 - Lea Dujic Rodic, Tomislav Zupanovic, Toni Perkovic
, Petar Solic
, Joel J. P. C. Rodrigues:
Machine Learning and Soil Humidity Sensing: Signal Strength Approach. 39:1-39:21 - Farhan Ullah
, Muhammad Rashid Naeem
, Abdullah S. Bajahzar
, Fadi Al-Turjman
:
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification. 40:1-40:17 - Bharat S. Rawal, Poongodi M, Gunasekaran Manogaran, Mounir Hamdi:
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform. 41:1-41:20 - Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed
, Awais Ahmad, Gwanggil Jeon:
Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data. 42:1-42:21 - Derui Wang, Sheng Wen, Alireza Jolfaei
, Mohammad Sayad Haghighi
, Surya Nepal
, Yang Xiang
:
On the Neural Backdoor of Federated Generative Models in Edge Computing. 43:1-43:21 - Huijie Yang, Jian Shen
, Tianqi Zhou, Sai Ji, Pandi Vijayakumar:
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs. 44:1-44:19 - Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab:
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing. 45:1-45:24 - Christos L. Stergiou, Konstantinos E. Psannis
, Brij B. Gupta
:
InFeMo: Flexible Big Data Management Through a Federated Cloud System. 46:1-46:22 - Yasser D. Al-Otaibi:
A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications. 47:1-47:17 - Tu N. Nguyen, Sherali Zeadally:
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions. 48:1-48:15 - Xiao Zheng, Mingchu Li, Syed Bilal Hussain Shah, Dinh-Thuan Do
, Yuanfang Chen, Constandinos X. Mavromoustakis, George Mastorakis, Evangelos Pallis:
Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing. 49:1-49:15 - Xiongtao Zhang, Xiaomin Zhu, Ji Wang, Weidong Bao, Laurence T. Yang:
DANCE: Distributed Generative Adversarial Networks with Communication Compression. 50:1-50:32
- Rui Zhang, Libing Wu, Shuqin Cao
, Xinrong Hu, Shan Xue
, Dan Wu, Qingan Li:
Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV. 51:1-51:24 - Tingmin Wu
, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal
, Yang Xiang
:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. 52:1-52:27 - Igor Ivkic
, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber
:
A Security Cost Modelling Framework for Cyber-Physical Systems. 53:1-53:31 - Heesuk Son, Dongman Lee:
An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments. 54:1-54:25
Volume 22, Number 3, August 2022
- M. Shamim Hossain, Changsheng Xu, Josu Bilbao
, Md. Abdur Rahman
, Abdulmotaleb El-Saddik, Mohamed Bin Zayed:
Special Section on Edge-AI for Connected Living. 55e:1-55e:3 - Prayag Tiwari
, Amit Kumar Jaiswal, Sahil Garg, Ilsun You
:
SANTM: Efficient Self-attention-driven Network for Text Matching. 55:1-55:21 - Songwen Pei, Yusheng Wu, Jin Guo, Meikang Qiu
:
Neural Network Pruning by Recurrent Weights for Finance Market. 56:1-56:23 - Mohammad Saidur Rahman, Ibrahim Khalil
, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. 57:1-57:25 - Chaonan Shen, Kai Zhang, Jinshan Tang:
A COVID-19 Detection Algorithm Using Deep Features and Discrete Social Learning Particle Swarm Optimization for Edge Computing Devices. 58:1-58:17 - Yi Liu
, Ruihui Zhao, Jiawen Kang
, Abdulsalam Yassine, Dusit Niyato, Jialiang Peng:
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things. 59:1-59:22 - Guihong Chen, Xi Liu, Mohammad Shorfuzzaman, Ali Karime
, Yonghua Wang, Yuanhang Qi:
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs. 60:1-60:17 - K. Shankar
, Eswaran Perumal, Mohamed Elhoseny
, Fatma Taher, B. B. Gupta
, Ahmed A. Abd El-Latif
:
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities. 61:1-61:14 - Min Chen
, Ke Shen, Rui Wang, Yiming Miao, Yingying Jiang, Kai Hwang, Yixue Hao
, Guangming Tao, Long Hu, Zhongchun Liu:
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring. 62:1-62:16
- Kaijian Xia, Wenbing Zhao, Alireza Jolfaei, M. Tamer Özsu:
Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence. 63e:1-63e:2 - Zhihan Lv
, Ranran Lou, Haibin Lv:
Edge Computing to Solve Security Issues for Infectious Disease Intelligence Prevention. 63:1-63:20 - Yizhang Jiang
, Xiaoqing Gu
, Lei Hua
, Kang Li
, Yuwen Tao
, Bo Li
:
Forecasting Trend of Coronavirus Disease 2019 using Multi-Task Weighted TSK Fuzzy System. 64:1-64:24 - Tongguang Ni
, Jiaqun Zhu
, Jia Qu
, Jing Xue
:
Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis. 65:1-65:21
- Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. 66:1-66:20 - Haipeng Chen
, Andrew Duncklee, Sushil Jajodia
, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. 67:1-67:24 - Bo Gu
, Mamoun Alazab
, Ziqi Lin
, Xu Zhang
, Jun Huang
:
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks. 68:1-68:17 - Lanyu Xu
, Arun Iyengar, Weisong Shi:
NLUBroker: A QoE-driven Broker System for Natural Language Understanding Services. 69:1-69:29 - Trinh Viet Doan
, Roland van Rijswijk-Deij
, Oliver Hohlfeld
, Vaibhav Bajpai
:
An Empirical View on Consolidation of the Web. 70:1-70:30 - Md. Arafat Hossain
, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir
, Steve Versteeg:
Extracting Formats of Service Messages with Varying Payloads. 71:1-71:31 - Genoveva Vargas-Solar
, Maysaa Khalil
, Javier A. Espinosa-Oviedo
, José-Luis Zechinelli-Martini
:
GREENHOME: A Household Energy Consumption and CO2 Footprint Metering Environment. 72:1-72:31 - Niki Pavlopoulou
, Edward Curry
:
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things. 73:1-73:30 - Jacopo Soldani
, Marco Cameriero
, Giulio Paparelli
, Antonio Brogi
:
Modelling and Analysing Replica- and Fault-aware Management of Horizontally Scalable Applications. 74:1-74:32 - Minxian Xu
, Chenghao Song, Huaming Wu
, Sukhpal Singh Gill
, Kejiang Ye, Chengzhong Xu
:
esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments. 75:1-75:24 - Roberto Yus
, Georgios Bouloukakis, Sharad Mehrotra, Nalini Venkatasubramanian:
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces. 76:1-76:33 - Enrico Tedeschi
, Tor-Arne S. Nordmo
, Dag Johansen
, Håvard D. Johansen
:
On Optimizing Transaction Fees in Bitcoin using AI: Investigation on Miners Inclusion Pattern. 77:1-77:28 - Ilir Murturi
, Schahram Dustdar
:
DECENT: A Decentralized Configurator for Controlling Elasticity in Dynamic Edge Networks. 78:1-78:21 - Tu Le
, Danny Yuxing Huang
, Noah J. Apthorpe
, Yuan Tian
:
SkillBot: Identifying Risky Content for Children in Alexa Skills. 79:1-79:31 - Hyungjune Shin
, Dongyoung Koo
, Junbeom Hur
:
Secure and Efficient Hybrid Data Deduplication in Edge Computing. 80:1-80:25
Volume 22, Number 4, November 2022
- Ching-Hsien Hsu
, Amir Hossein Alavi
, Mianxiong Dong
:
Introduction to the Special Section on Cyber Security in Internet of Vehicles. 81:1-81:6 - Haibo Yi
, Ruinan Chi, Xin Huang, Xuejun Cai, Zhe Nie:
Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions. 82:1-82:15 - Xiao Song, Kai Chen, Xiaoxiang Ren, Haitao Yuan:
Pedestrian Trajectory Prediction in Heterogeneous Traffic using Facial Keypoints-based Convolutional Encoder-decoder Network. 83:1-83:14 - Chandrasekar Ravi, Anmol Tigga
, G. Thippa Reddy
, Saqib Hakak, Mamoun Alazab
:
Driver Identification Using Optimized Deep Learning Model in Smart Transportation. 84:1-84:17 - Yangfan Liang
, Yining Liu
, Brij B. Gupta
:
PPRP: Preserving-Privacy Route Planning Scheme in VANETs. 85:1-85:18 - Mohamad Ali Mehrabi
, Alireza Jolfaei
:
Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles. 86:1-86:16 - Xiaojie Wang, Laisen Nie, Zhaolong Ning
, Lei Guo, Guoyin Wang, Xinbo Gao, Neeraj Kumar
:
Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles. 87:1-87:20 - Hui Tian
, Fang Peng, Hanyu Quan, Chin-Chen Chang:
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data. 88:1-88:24 - Ramesh Sekaran
, Fadi M. Al-Turjman
, Rizwan Patan
, Velmani Ramasamy
:
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN). 89:1-89:18 - Gunasekaran Manogaran, Bharat S. Rawal
, Vijayalakshmi Saravanan
, Priyan Malarvizhi Kumar, Qin Xin
, P. Mohamed Shakeel:
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication. 90:1-90:20 - Ao Zhou
, Xiao Ma, Siyi Gao, Shangguang Wang:
Providing Reliable Service for Parked-vehicle-assisted Mobile Edge Computing. 91:1-91:24 - Si Young Jang
, Sung Kyu Park
, Jin-Hee Cho
, Dongman Lee
:
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks. 92:1-92:24 - Mathias Fischer, Winfried Lamersdorf, Jörg Liebeherr, Max Mühlhäuser:
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems. 93:1-93:3 - Kurian Polachan
, Chandramani Singh, Tamma V. Prabhakar:
Decentralized Dynamic Scheduling of TCPS Flows and a Simulator for Time-sensitive Networking. 94:1-94:30 - Yevhenii Shudrenko
, Daniel Plöger, Koojana Kuladinithi
, Andreas Timm-Giel
:
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks. 95:1-95:29 - Thiago Pereira da Silva
, Thaís Vasconcelos Batista, Frederico Lopes, Aluizio Rocha Neto, Flávia Coimbra Delicato, Paulo F. Pires, Atslands Rego da Rocha
:
Fog Computing Platforms for Smart City Applications: A Survey. 96:1-96:32 - Christoph Döpmann
, Felix Fiedler
, Sergio Lucia
, Florian Tschorsch
:
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges. 97:1-97:30 - Chao Wu
, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, Kenichi Tayama:
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience. 98:1-98:25 - Andrei Ciortea
, Xiaomin Zhu
, Calton Pu
, Munindar P. Singh
:
Introduction to the Special Issue on Multiagent Systems and Services in the Internet of Things. 99:1-99:3 - Pierre Rust, Gauthier Picard
, Fano Ramparany:
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments. 100:1-100:31 - Alessandro Ricci
, Angelo Croatti
, Stefano Mariani
, Sara Montagna
, Marco Picone
:
Web of Digital Twins. 101:1-101:30 - Haoyu Ren
, Darko Anicic, Thomas A. Runkler:
Towards Semantic Management of On-Device Applications in Industrial IoT. 102:1-102:30 - Lina Barakat
, Phillip Taylor, Nathan Griffiths, Simon Miles
:
A Reputation-based Framework for Honest Provenance Reporting. 103:1-103:31 - Timotheus Kampik
, Adnane Mansour
, Olivier Boissier
, Sabrina Kirrane
, Julian A. Padget
, Terry R. Payne
, Munindar P. Singh
, Valentina Tamma
, Antoine Zimmermann
:
Governance of Autonomous Agents on the Web: Challenges and Opportunities. 104:1-104:31 - Vicente García-Díaz, Jerry Chun-Wei Lin
, Juan Antonio Morente-Molinera:
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities. 105:1-105:2 - Suresh Chavhan, Deepak Gupta
, Sarada Prasad Gochhayat, B. N. Chandana, Ashish Khanna, K. Shankar
, Joel J. P. C. Rodrigues:
Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities. 106:1-106:18 - Zhuoqun Xia
, Lingxuan Zeng
, Ke Gu
, Xiong Li
, Weijia Jia
:
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs. 107:1-107:28 - Michell Boerger
, Philipp Lämmel
, Nikolay Tcholtchev
, Manfred Hauswirth
:
Enabling Short-Term Energy Flexibility Markets Through Blockchain. 108:1-108:25 - Long Chen
, Mianyang Yao
, Yalan Wu
, Jigang Wu
:
EECDN: Energy-efficient Cooperative DNN Edge Inference in Wireless Sensor Networks. 109:1-109:30 - Sandeep Kumar Sood
, Keshav Singh Rawat
, Dheeraj Kumar
:
Emerging Trends of ICT in Airborne Disease Prevention. 110:1-110:18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.