Table of contents for issues of ACM Transactions on Internet Technology (TOIT)

Last update: Sat Aug 24 06:49:25 MDT 2024                Valid HTML 3.2!

Volume 1, Number 1, August, 2001
Volume 1, Number 2, November, 2001
Volume 2, Number 1, February, 2002
Volume 2, Number 2, May, 2002
Volume 2, Number 3, August, 2002
Volume 2, Number 4, November, 2002
Volume 3, Number 1, February, 2003
Volume 3, Number 2, May, 2003
Volume 3, Number 3, August, 2003
Volume 3, Number 4, November, 2003
Volume 4, Number 1, February, 2004
Volume 4, Number 2, May, 2004
Volume 4, Number 3, August, 2004
Volume 4, Number 4, November, 2004
Volume 5, Number 1, February, 2005
Volume 5, Number 2, May, 2005
Volume 5, Number 3, August, 2005
Volume 5, Number 4, November, 2005
Volume 6, Number 1, February, 2006
Volume 6, Number 2, May, 2006
Volume 6, Number 3, August, 2006
Volume 6, Number 4, November, 2006
Volume 7, Number 1, February, 2007
Volume 7, Number 2, May, 2007
Volume 7, Number 3, August, 2007
Volume 7, Number 4, October, 2007
Volume 8, Number 1, November, 2007
Volume 8, Number 2, February, 2008
Volume 8, Number 3, May, 2008
Volume 8, Number 4, September, 2008
Volume 9, Number 1, February, 2009
Volume 9, Number 2, May, 2009
Volume 9, Number 3, July, 2009
Volume 9, Number 4, September, 2009
Volume 10, Number 1, February, 2010
Volume 10, Number 2, May, 2010
Volume 10, Number 3, October, 2010
Volume 10, Number 4, March, 2011
Volume 11, Number 1, July, 2011
Volume 11, Number 2, December, 2011
Volume 11, Number 3, January, 2012
Volume 11, Number 4, March, 2012
Volume 12, Number 1, June, 2012
Volume 12, Number 2, December, 2012
Volume 12, Number 3, May, 2013
Volume 12, Number 4, July, 2013
Volume 13, Number 1, November, 2013
Volume 13, Number 2, December, 2013
Volume 13, Number 3, May, 2014
Volume 13, Number 4, July, 2014
Volume 14, Number 1, July, 2014
Volume 14, Number 2--3, October, 2014
Volume 14, Number 4, December, 2014
Volume 15, Number 1, February, 2015
Volume 15, Number 2, June, 2015
Volume 15, Number 3, September, 2015
Volume 15, Number 4, December, 2015
Volume 16, Number 1, February, 2016
Volume 16, Number 2, April, 2016
Volume 16, Number 3, August, 2016
Volume 16, Number 4, December, 2016
Volume 17, Number 1, March, 2017
Volume 17, Number 2, May, 2017
Volume 17, Number 3, July, 2017
Volume 17, Number 4, September, 2017
Volume 18, Number 1, December, 2017
Volume 18, Number 3, May, 2017
Volume 18, Number 2, March, 2018
Volume 18, Number 4, November, 2018
Volume 19, Number 1, March, 2019
Volume 19, Number 2, April, 2019
Volume 19, Number 3, November, 2019
Volume 19, Number 4, November, 2019
Volume 20, Number 1, March, 2020
Volume 20, Number 2, March, 2020
Volume 20, Number 3, October, 2020
Volume 20, Number 4, November, 2020
Volume 21, Number 1, February, 2021
Volume 21, Number 2, June, 2021
Volume 21, Number 3, June, 2021
Volume 21, Number 4, July, 2021
Volume 22, Number 1, February, 2022
Volume 22, Number 2, May, 2022
Volume 22, Number 3, August, 2022
Volume 22, Number 4, November, 2022
Volume 23, Number 1, February, 2023
Volume 23, Number 2, May, 2023
Volume 23, Number 3, August, 2023
Volume 23, Number 4, November, 2023
Volume 24, Number 1, February, 2024
Volume 24, Number 2, May, 2024
Volume 24, Number 3, 2024


ACM Transactions on Internet Technology (TOIT)
Volume 1, Number 1, August, 2001

               Arvind Arasu and   
                Junghoo Cho and   
       Hector Garcia-Molina and   
            Andreas Paepcke and   
                Sriram Raghavan   Searching the Web  . . . . . . . . . . . 2--43
              Martin Arlitt and   
      Diwakar Krishnamurthy and   
                    Jerry Rolia   Characterizing the scalability of a
                                  large web-based shopping system  . . . . 44--69
      Marjory S. Blumenthal and   
                 David D. Clark   Rethinking the design of the Internet:
                                  the end-to-end arguments vs. the brave
                                  new world  . . . . . . . . . . . . . . . 70--109
        Masatoshi Yoshikawa and   
          Toshiyuki Amagasa and   
           Takeyuki Shimura and   
                Shunsuke Uemura   XRel: a path-based approach to storage
                                  and retrieval of XML documents using
                                  relational databases . . . . . . . . . . 110--141

ACM Transactions on Internet Technology (TOIT)
Volume 1, Number 2, November, 2001

               David M. Kristol   HTTP Cookies: Standards, privacy, and
                                  politics . . . . . . . . . . . . . . . . 151--198
               Marc Waldman and   
             Aviel D. Rubin and   
            Lorrie Faith Cranor   The architecture of robust publishing
                                  systems  . . . . . . . . . . . . . . . . 199--230
               Joel L. Wolf and   
                   Philip S. Yu   On balancing the load in a clustered web
                                  farm . . . . . . . . . . . . . . . . . . 231--261


ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 1, February, 2002

                        Xin Guo   An optimal strategy for sellers in an
                                  online auction . . . . . . . . . . . . . 1--13
                  Paul Huck and   
             Michael Butler and   
                 Amar Gupta and   
                   Michael Feng   A self-configuring and
                                  self-administering name system with
                                  dynamic address assignment . . . . . . . 14--46
               Carey Williamson   On filter effects in web caching
                                  hierarchies  . . . . . . . . . . . . . . 47--77

ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 2, May, 2002

             Claus Brabrand and   
       Anders Mòller and   
        Michael I. Schwartzbach   The $<$ bigwig$>$ project  . . . . . . . . 79--114
            Roy T. Fielding and   
              Richard N. Taylor   Principled design of the modern Web
                                  architecture . . . . . . . . . . . . . . 115--150
         Christian Nentwich and   
                Licia Capra and   
          Wolfgang Emmerich and   
            Anthony Finkelstein   xlinkit: a consistency checking and
                                  smart link generation service  . . . . . 151--185

ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 3, August, 2002

           Stanley M. Besen and   
          Jeffrey S. Spigel and   
          Padmanabhan Srinagesh   Evaluating the competitive effects of
                                  mergers of Internet backbone providers   187--204
               Stephen Dill and   
                 Ravi Kumar and   
          Kevin S. Mccurley and   
        Sridhar Rajagopalan and   
               D. Sivakumar and   
                 Andrew Tomkins   Self-similarity in the web . . . . . . . 205--223
                   Jian Yin and   
             Lorenzo Alvisi and   
                Mike Dahlin and   
                   Arun Iyengar   Engineering web cache consistency  . . . 224--259

ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 4, November, 2002

             Michael Gordon and   
          Robert K. Lindsay and   
                     Weiguo Fan   Literature-based discovery on the World
                                  Wide Web . . . . . . . . . . . . . . . . 261--275
               Harry Hochheiser   The platform for privacy preference as a
                                  social protocol: an examination within
                                  the U.S. policy context  . . . . . . . . 276--306
                      Minwen Ji   Affinity-based management of main memory
                                  database clusters  . . . . . . . . . . . 307--339


ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 1, February, 2003

         Magdalini Eirinaki and   
          Michalis Vazirgiannis   Web mining for web personalization . . . 1--27
            Joris Claessens and   
               Bart Preneel and   
                Joos Vandewalle   (How) can mobile agents do secure
                                  electronic transactions on untrusted
                                  hosts? A survey of the security issues
                                  and the current solutions  . . . . . . . 28--48
             Paolo Merialdo and   
               Paolo Atzeni and   
            Giansalvatore Mecca   Design and development of data-intensive
                                  web sites: The Araneus approach  . . . . 49--92

ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 2, May, 2003

                  Robert Cooley   The use of web structure and content to
                                  identify subjectively interesting web
                                  usage patterns . . . . . . . . . . . . . 93--116
               Haruo Hosoya and   
             Benjamin C. Pierce   XDuce: a statically typed XML processing
                                  language . . . . . . . . . . . . . . . . 117--148
               Alfred Kobsa and   
              Jörg Schreck   Privacy through pseudonymity in
                                  user-adaptive systems  . . . . . . . . . 149--183

ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 3, August, 2003

           Patricia Anthony and   
           Nicholas R. Jennings   Developing a bidding agent for multiple
                                  heterogeneous auctions . . . . . . . . . 185--217
                 Minghua He and   
           Nicholas R. Jennings   SouthamptonTAC: an adaptive autonomous
                                  trading agent  . . . . . . . . . . . . . 218--235
                 Upkar Varshney   Location management for mobile commerce
                                  applications in wireless Internet
                                  environment  . . . . . . . . . . . . . . 236--255
                Junghoo Cho and   
           Hector Garcia-Molina   Estimating frequency of change . . . . . 256--290

ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 4, November, 2003

               R. Braumandl and   
                  A. Kemper and   
                    D. Kossmann   Quality of service in an information
                                  economy  . . . . . . . . . . . . . . . . 291--333
                  Ali Amiri and   
                     Syam Menon   Efficient scheduling of Internet banner
                                  advertisements . . . . . . . . . . . . . 334--346
         Ludmila Cherkasova and   
                     Yun Fu and   
               Wenting Tang and   
                    Amin Vahdat   Measuring and characterizing end-to-end
                                  Internet service performance . . . . . . 347--391
        Björn Knutsson and   
                 Honghui Lu and   
              Jeffrey Mogul and   
                  Bryan Hopkins   Architecture and performance of
                                  server-directed transcoding  . . . . . . 392--424


ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 1, February, 2004

           Pawel Gburzynski and   
                   Jacek Maitan   Fighting the spam wars: a remailer
                                  approach with restrictive aliasing . . . 1--30
               Ronny Lempel and   
                   Shlomo Moran   Optimizing result prefetching in Web
                                  search engines with segmented indices    31--59
                  Dan Boneh and   
                 Xuhua Ding and   
                    Gene Tsudik   Fine-grained control of security
                                  capabilities . . . . . . . . . . . . . . 60--82
            Gregory W. Bond and   
                Eric Cheung and   
               K. Hal Purdy and   
                Pamela Zave and   
         J. Christopher Ramming   An open architecture for next-generation
                                  telecommunication services . . . . . . . 83--123

ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 2, May, 2004

         Gary William Flake and   
             Paolo Frasconi and   
               C. Lee Giles and   
                  Marco Maggini   Guest editorial: Machine learning for
                                  the Internet . . . . . . . . . . . . . . 125--128
           Eugene Agichtein and   
             Steve Lawrence and   
                   Luis Gravano   Learning to find answers to questions on
                                  the Web  . . . . . . . . . . . . . . . . 129--162
           Mukund Deshpande and   
                 George Karypis   Selective Markov models for predicting
                                  Web page accesses  . . . . . . . . . . . 163--184
                Jianhan Zhu and   
                   Jun Hong and   
                 John G. Hughes   PageCluster: Mining conceptual link
                                  hierarchies from Web log files for
                                  adaptive Web site navigation . . . . . . 185--208
                  Xiao Fang and   
            Olivia R. Liu Sheng   LinkSelector: A Web mining approach to
                                  hyperlink selection for Web portals  . . 209--237

ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 3, August, 2004

                Simon Byers and   
             Aviel D. Rubin and   
                  David Kormann   Defending against an Internet-based
                                  attack on the physical world . . . . . . 239--254
François Goasdoué and   
        Marie-Christine Rousset   Answering queries using views: A KRDB
                                  perspective for the semantic Web . . . . 255--288
                Roger Barga and   
                David Lomet and   
            German Shegalov and   
                 Gerhard Weikum   Recovery guarantees for Internet
                                  applications . . . . . . . . . . . . . . 289--328
          David Lybäck and   
                   Magnus Boman   Agent trade servers in financial
                                  exchange systems . . . . . . . . . . . . 329--339

ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 4, November, 2004

         Gary William Flake and   
             Paolo Frasconi and   
               C. Lee Giles and   
                  Marco Maggini   Guest editorial: Machine learning for
                                  the Internet . . . . . . . . . . . . . . 341--343
           Michael O'Mahony and   
                Neil Hurley and   
        Nicholas Kushmerick and   
Guénolé Silvestre   Collaborative recommendation: a
                                  robustness analysis  . . . . . . . . . . 344--377
            Filippo Menczer and   
                Gautam Pant and   
             Padmini Srinivasan   Topical web crawlers: Evaluating
                                  adaptive algorithms  . . . . . . . . . . 378--419
            Sander M. Bohte and   
             Enrico Gerding and   
           Han La Poutré   Market-based recommendation: Agents that
                                  compete for consumer attention . . . . . 420--448


ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 1, February, 2005

                 Peter Thiemann   An embedded domain-specific language for
                                  type-safe server-side Web scripting  . . 1--46
          Liliana Ardissono and   
                   Anna Goy and   
           Giovanna Petrone and   
                  Marino Segnan   A multi-agent infrastructure for
                                  developing personalized Web-based
                                  systems  . . . . . . . . . . . . . . . . 47--69
               Addison Chan and   
           Rynson W. H. Lau and   
                    Beatrice Ng   Motion prediction for caching and
                                  prefetching in mouse-driven DVE
                                  navigation . . . . . . . . . . . . . . . 70--91
           Monica Bianchini and   
                 Marco Gori and   
               Franco Scarselli   Inside PageRank  . . . . . . . . . . . . 92--128
             Victoria Ungureanu   Using certified policies to regulate
                                  E-commerce transactions  . . . . . . . . 129--153
                 Hongjun Lu and   
              Jeffrey Xu Yu and   
                Guoren Wang and   
               Shihui Zheng and   
              Haifeng Jiang and   
                      Ge Yu and   
                    Aoying Zhou   What makes the differences: benchmarking
                                  XML database implementations . . . . . . 154--194
          Wilson Wai Ho Mok and   
                R. P. Sundarraj   Learning algorithms for single-instance
                                  electronic negotiations using the
                                  time-dependent behavioral tactic . . . . 195--230
              Allan Borodin and   
          Gareth O. Roberts and   
       Jeffrey S. Rosenthal and   
            Panayiotis Tsaparas   Link analysis ranking: algorithms,
                                  theory, and experiments  . . . . . . . . 231--297

ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 2, May, 2005

               Martin Abadi and   
               Mike Burrows and   
               Mark Manasse and   
                     Ted Wobber   Moderately hard, memory-bound functions  299--327
              Daniel Oberle and   
              Steffen Staab and   
                Rudi Studer and   
                   Raphael Volz   Supporting application development in
                                  the Semantic Web . . . . . . . . . . . . 328--358
             Jim Challenger and   
               Paul Dantzig and   
               Arun Iyengar and   
                  Karen Witting   A fragment-based approach for
                                  efficiently creating dynamic Web content 359--389
       Michalis Petropoulos and   
    Yannis Papakonstantinou and   
               Vasilis Vassalos   Graphical query interfaces for
                                  semistructured data: the QURSED system   390--438

ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 3, August, 2005

            Ioana Manolescu and   
            Marco Brambilla and   
               Stefano Ceri and   
                 Sara Comai and   
               Piero Fraternali   Model-driven design and deployment of
                                  service-enabled Web applications . . . . 439--479
                   Keqiu Li and   
                  Hong Shen and   
         Francis Y. L. Chin and   
                  Si Qing Zheng   Optimal methods for coordinated enroute
                                  Web caching for tree networks  . . . . . 480--507
               Daniel Gomes and   
          Mário J. Silva   Characterizing a national community Web  508--531
                  Xuan Chen and   
                 John Heidemann   Flash crowd mitigation via adaptive
                                  admission control based on
                                  application-level observations . . . . . 532--569
               Vasilis Vassalos   Corrigenda . . . . . . . . . . . . . . . 570--570

ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 4, November, 2005

            Kaname Harumoto and   
             Tadashi Nakano and   
            Shinya Fukumura and   
             Shinji Shimojo and   
                 Shojiro Nishio   Effective Web browsing through content
                                  delivery adaptation  . . . . . . . . . . 571--600
                 Mingzhe Li and   
              Mark Claypool and   
             Robert Kinicki and   
                  James Nichols   Characteristics of streaming media
                                  stored on the Web  . . . . . . . . . . . 601--626
                 Oscar Diaz and   
              Juan J. Rodriguez   Portlet syndication: Raising variability
                                  concerns . . . . . . . . . . . . . . . . 627--659
              Makoto Murata and   
                Dongwon Lee and   
                Murali Mani and   
              Kohsuke Kawaguchi   Taxonomy of XML schema languages using
                                  formal language theory . . . . . . . . . 660--704


ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 1, February, 2006

               Jeng-Wei Lin and   
                Jan-Ming Ho and   
              Li-Ming Tseng and   
                     Feipei Lai   IDN server proxy architecture for
                                  Internationalized Domain Name resolution
                                  and experiences with providing Web
                                  services . . . . . . . . . . . . . . . . 1--19
           Bianca Schroeder and   
             Mor Harchol-Balter   Web servers under overload: How
                                  scheduling can help  . . . . . . . . . . 20--52
              Shu-Yao Chien and   
        Vassilis J. Tsotras and   
              Carlo Zaniolo and   
                  Donghui Zhang   Supporting complex queries on
                                  multiversion XML documents . . . . . . . 53--84
              Simon Szykman and   
                  Ram D. Sriram   Design and implementation of the
                                  Web-enabled NIST design repository . . . 85--116

ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 2, May, 2006

              Trevor Fenner and   
                Mark Levene and   
                  George Loizou   A stochastic model for the evolution of
                                  the Web allowing link deletion . . . . . 117--130
                 Ravi Kumar and   
         Prabhakar Raghavan and   
        Sridhar Rajagopalan and   
                 Andrew Tomkins   Core algorithms in the CLEVER system . . 131--152
                Junghoo Cho and   
       Hector Garcia-Molina and   
           Taher Haveliwala and   
                   Wang Lam and   
            Andreas Paepcke and   
            Sriram Raghavan and   
                    Gary Wesley   Stanford WebBase components and
                                  applications . . . . . . . . . . . . . . 153--186
        Salvatore J. Stolfo and   
            Shlomo Hershkop and   
                Chia-Wei Hu and   
                 Wei-Jen Li and   
          Olivier Nimeskern and   
                        Ke Wang   Behavior-based modeling and its
                                  application to Email analysis  . . . . . 187--221

ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 3, August, 2006

                 Jun-Ki Min and   
             Myung-Jae Park and   
                 Chin-Wan Chung   A compressor for effective archiving,
                                  retrieval, and updating of XML documents 223--258
                Arno Bakker and   
          Maarten Van Steen and   
            Andrew S. Tanenbaum   A wide-area Distribution Network for
                                  free software  . . . . . . . . . . . . . 259--281
             Michael Brinkmeier   PageRank revisited . . . . . . . . . . . 282--301
Björn Thòr Jónsson and   
   María Arinbjarnar and   
Bjarnsteinn Thórsson and   
        Michael J. Franklin and   
              Divesh Srivastava   Performance and overhead of semantic
                                  cache management . . . . . . . . . . . . 302--331

ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 4, November, 2006

         Irma Becerra-Fernandez   Searching for experts on the Web: a
                                  review of contemporary expertise locator
                                  systems  . . . . . . . . . . . . . . . . 333--355
           Paolo Bellavista and   
            Antonio Corradi and   
          Rebecca Montanari and   
              Cesare Stefanelli   A mobile computing middleware for
                                  location- and context-aware Internet
                                  data services  . . . . . . . . . . . . . 356--380
              Ah Chung Tsoi and   
        Markus Hagenbuchner and   
               Franco Scarselli   Computing customized page ranks  . . . . 381--414
               Kai-Lung Hui and   
          Bernard C. Y. Tan and   
                  Chyan-Yee Goh   Online information disclosure:
                                  Motivators and measurements  . . . . . . 415--441
          Bernard J. Jansen and   
               Tracy Mullen and   
               Amanda Spink and   
                   Jan Pedersen   Automated gathering of Web information:
                                  an in-depth examination of agents
                                  interacting with search engines  . . . . 442--464
                 Minghua He and   
       Nicholas R. Jennings and   
       Adam Prügel-Bennett   A heuristic bidding strategy for buying
                                  multiple goods in multiple English
                                  auctions . . . . . . . . . . . . . . . . 465--496
           Jennifer Golbeck and   
                  James Hendler   Inferring binary trust relationships in
                                  Web-based social networks  . . . . . . . 497--529


ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 1, February, 2007

          Varghese S. Jacob and   
           Ramayya Krishnan and   
                   Young U. Ryu   Internet content filtering using
                                  isotonic separation on content category
                                  ratings  . . . . . . . . . . . . . . . . 1:1--1:??
               Stefano Ceri and   
             Florian Daniel and   
          Maristella Matera and   
              Federico M. Facca   Model-driven development of
                                  context-aware Web applications . . . . . 2:1--2:??
                 Xuhua Ding and   
          Daniele Mazzocchi and   
                    Gene Tsudik   Equipping smart devices with public key
                                  signatures . . . . . . . . . . . . . . . 3:1--3:??
              Debora Donato and   
                Luigi Laura and   
           Stefano Leonardi and   
               Stefano Millozzi   The Web as a graph: How far we are . . . 4:1--4:??
                  Yun Huang and   
               Xianjun Geng and   
             Andrew B. Whinston   Defeating DDoS attacks by fixing the
                                  incentive chain  . . . . . . . . . . . . 5:1--5:??
               Tak-Lam Wong and   
                        Wai Lam   Adapting Web information extraction
                                  knowledge via mining site-invariant and
                                  site-dependent features  . . . . . . . . 6:1--6:??
             Daniel Villela and   
           Prashant Pradhan and   
                 Dan Rubenstein   Provisioning servers in the application
                                  tier for e-commerce systems  . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 2, May, 2007

       Angelos D. Keromytis and   
              Jonathan M. Smith   Requirements for scalable access control
                                  and security management architectures    8:1--8:??
        Ricardo Baeza-Yates and   
            Carlos Castillo and   
        Efthimis N. Efthimiadis   Characterization of national Web domains 9:1--9:??
               Andrei Arion and   
            Angela Bonifati and   
            Ioana Manolescu and   
                Andrea Pugliese   XQueC: a query-conscious compressed XML
                                  database . . . . . . . . . . . . . . . . 10:1--10:??
                  Jing Zhou and   
                 Wendy Hall and   
          David C. De Roure and   
               Vijay K. Dialani   Supporting ad-hoc resource sharing on
                                  the Web: a peer-to-peer approach to
                                  hypermedia link services . . . . . . . . 11:1--11:??
               Esther David and   
                Alex Rogers and   
       Nicholas R. Jennings and   
              Jeremy Schiff and   
                Sarit Kraus and   
            Michael H. Rothkopf   Optimal design of English auctions with
                                  discrete bid levels  . . . . . . . . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 3, August, 2007

                 Amar Gupta and   
             Satwiksai Seshasai   Guest editorial: The Internet and
                                  outsourcing  . . . . . . . . . . . . . . 13:1--13:??
                 Amar Gupta and   
                Satwik Seshasai   24-hour knowledge factory: Using
                                  Internet technology to leverage spatial
                                  and temporal separations . . . . . . . . 14:1--14:??
              Rafiq Dossani and   
                   Nathan Denny   The Internet's role in offshored
                                  services: a case study of India  . . . . 15:1--15:??
                  Ravi Aron and   
           Siddarth Jayanty and   
                 Praveen Pathak   Impact of Internet-based distributed
                                  monitoring systems on offshore sourcing
                                  of services  . . . . . . . . . . . . . . 16:1--16:??
                   Li Xiong and   
         Subramanyam Chitti and   
                       Ling Liu   Preserving data privacy in outsourcing
                                  data aggregation services  . . . . . . . 17:1--17:??

ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 4, October, 2007

       Sarabjot Singh Anand and   
               Bamshad Mobasher   Introduction to intelligent techniques
                                  for Web personalization  . . . . . . . . 18:1--18:??
                 Wilfred Ng and   
                   Lin Deng and   
                    Dik Lun Lee   Mining User preference using Spy voting
                                  for search engine personalization  . . . 19:1--19:??
              Maurice Coyle and   
                    Barry Smyth   Supporting intelligent Web search  . . . 20:1--20:??
         Magdalini Eirinaki and   
          Michalis Vazirgiannis   Web site personalization based on link
                                  analysis and navigational patterns . . . 21:1--21:??
       Sarabjot Singh Anand and   
           Patricia Kearney and   
                  Mary Shapcott   Generating semantically enriched user
                                  profiles for Web personalization . . . . 22:1--22:??
           Bamshad Mobasher and   
                Robin Burke and   
               Runa Bhaumik and   
                  Chad Williams   Toward trustworthy recommender systems:
                                  an analysis of attack models and
                                  algorithm robustness . . . . . . . . . . 23:1--23:??


ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 1, November, 2007

            Brahim Medjahed and   
         Athman Bouguettaya and   
             Boualem Benatallah   Introduction to special issue on
                                  semantic Web services  . . . . . . . . . 1:1--1:??
                  Eran Toch and   
                Avigdor Gal and   
      Iris Reinhartz-Berger and   
                       Dov Dori   A semantic approach to approximate
                                  service retrieval  . . . . . . . . . . . 2:1--2:??
            Marco Brambilla and   
               Stefano Ceri and   
     Federico Michele Facca and   
               Irene Celino and   
              Dario Cerizza and   
           Emanuele Della Valle   Model-driven design and development of
                                  semantic Web service applications  . . . 3:1--3:??
             Michael Mrissa and   
            Chirine Ghedira and   
          Djamal Benslimane and   
             Zakaria Maamar and   
          Florian Rosenberg and   
               Schahram Dustdar   A context-based mediation approach to
                                  compose semantic Web services  . . . . . 4:1--4:??
             Mohamed Shehab and   
         Kamal Bhattacharya and   
                   Arif Ghafoor   Web services discovery in secure
                                  collaboration environments . . . . . . . 5:1--5:??

ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 2, February, 2008

                    Qing Li and   
           Rynson W. H. Lau and   
               Timothy Shih and   
                  Dennis McLeod   Introduction to special issue Internet
                                  technologies for distance education  . . 1:1--1:??
                  Xuping Tu and   
                    Hai Jin and   
               Xiaofei Liao and   
                   Jiannong Cao   Nearcast: a locality-aware P2P live
                                  streaming approach for distance
                                  education  . . . . . . . . . . . . . . . 2:1--2:??
                Peter Dolog and   
                Bernd Simon and   
             Wolfgang Nejdl and   
             Toma\vz Klobu\vcar   Personalizing access to learning
                                  networks . . . . . . . . . . . . . . . . 3:1--3:??
             Paola Salomoni and   
               Silvia Mirri and   
           Stefano Ferretti and   
                 Marco Roccetti   A multimedia broker to support
                                  accessible and mobile learning through
                                  learning objects adaptation  . . . . . . 4:1--4:??
                    Qing Li and   
           Rynson W. H. Lau and   
            Timothy K. Shih and   
             Frederick W. B. Li   Technology supports for distributed and
                                  collaborative learning over the Internet 5:1--5:??

ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 3, May, 2008

           Qusay H. Mahmoud and   
            Peter Langendoerfer   Guest editorial: Service-oriented
                                  computing  . . . . . . . . . . . . . . . 11:1--11:??
          Robert A. Van Engelen   A framework for service-oriented
                                  computing with C and C++ Web service
                                  components . . . . . . . . . . . . . . . 12:1--12:??
    Wil M. P. van der Aalst and   
               Marlon Dumas and   
                Chun Ouyang and   
               Anne Rozinat and   
                   Eric Verbeek   Conformance checking of service behavior 13:1--13:??
                Jingwen Jin and   
                Klara Nahrstedt   QoS-aware service management for
                                  component-based distributed applications 14:1--14:??
                       Uwe Zdun   Pattern-based design of a
                                  service-oriented middleware for remote
                                  object federations . . . . . . . . . . . 15:1--15:??

ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 4, September, 2008

              Amir Herzberg and   
                    Ahmad Jbara   Security and identification indicators
                                  for browsers against spoofing and
                                  phishing attacks . . . . . . . . . . . . 16:1--16:??
               Manish Gupta and   
            Shamik Banerjee and   
             Manish Agrawal and   
                  H. Raghav Rao   Security analysis of Internet technology
                                  components enabling globally distributed
                                  workplaces --- a framework . . . . . . . 17:1--17:??
           Jeannie Albrecht and   
          David Oppenheimer and   
                Amin Vahdat and   
             David A. Patterson   Design and implementation trade-offs for
                                  wide-area resource discovery . . . . . . 18:1--18:??
              Antonio Brogi and   
               Sara Corfini and   
                 Razvan Popescu   Semantics-based composition-oriented
                                  discovery of Web services  . . . . . . . 19:1--19:??
                  Hai Zhuge and   
               Yunpeng Xing and   
                       Peng Shi   Resource space model, OWL and database:
                                  Mapping and integration  . . . . . . . . 20:1--20:??
              Xiao-Bing Xue and   
               Zhi-Hua Zhou and   
          Zhongfei (Mark) Zhang   Improving Web search using image
                                  snippets . . . . . . . . . . . . . . . . 21:1--21:??


ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 1, February, 2009

           Bhuvan Urgaonkar and   
            Prashant Shenoy and   
                 Timothy Roscoe   Resource overbooking and application
                                  profiling in a shared Internet hosting
                                  platform . . . . . . . . . . . . . . . . 1:1--1:??
            Sebastian Stein and   
             Terry R. Payne and   
           Nicholas R. Jennings   Flexible provisioning of Web service
                                  workflows  . . . . . . . . . . . . . . . 2:1--2:??
                 Paul Groth and   
                Simon Miles and   
                     Luc Moreau   A model of process documentation to
                                  determine provenance in mash-ups . . . . 3:1--3:??
            Giancarlo Ruffo and   
            Rossano Schifanella   A peer-to-peer recommender system based
                                  on spontaneous affinities  . . . . . . . 4:1--4:??

ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 2, May, 2009

                   Scott Jordan   Implications of Internet architecture on
                                  net neutrality . . . . . . . . . . . . . 5:1--5:??
            Toby Ehrenkranz and   
                         Jun Li   On the state of IP spoofing defense  . . 6:1--6:??
           Bettina Fazzinga and   
              Sergio Flesca and   
                Andrea Pugliese   Retrieving XML data from heterogeneous
                                  sources through vague querying . . . . . 7:1--7:??
                   Erol Gelenbe   Analysis of single and networked
                                  auctions . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 3, July, 2009

                     Xin Li and   
                    Jun Yan and   
                 Weiguo Fan and   
                   Ning Liu and   
              Shuicheng Yan and   
                     Zheng Chen   An online blog reading system by topic
                                  clustering and personalized ranking  . . 9:1--9:??
             Antonio M. Rinaldi   An ontology-driven approach for semantic
                                  information retrieval on the Web . . . . 10:1--10:??
          Christian Platzer and   
          Florian Rosenberg and   
               Schahram Dustdar   Web service clustering using
                                  multidimensional angles as proximity
                                  measures . . . . . . . . . . . . . . . . 11:1--11:??
              Duanning Zhou and   
                Wayne Wei Huang   Using a fuzzy classification approach to
                                  assess e-commerce Web sites: an
                                  empirical investigation  . . . . . . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 4, September, 2009

                Joonho Kwon and   
                Praveen Rao and   
                Bongki Moon and   
                      Sukho Lee   Fast XML document filtering by
                                  sequencing twig patterns . . . . . . . . 13:1--13:??
              Dario Colazzo and   
                 Carlo Sartiani   Detection of corrupted schema mappings
                                  in XML data integration systems  . . . . 14:1--14:??
                 Alan Kenny and   
      Séamus Mcloone and   
              Tomás Ward   Controlling entity state updates to
                                  maintain remote consistency within a
                                  distributed interactive application  . . 15:1--15:??
             Theoni Pitoura and   
            Peter Triantafillou   Distribution fairness in Internet-scale
                                  networks . . . . . . . . . . . . . . . . 16:1--16:??


ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 1, February, 2010

       David Michael Turner and   
        Vassilis Prevelakis and   
           Angelos D. Keromytis   A market-based bandwidth charging
                                  framework  . . . . . . . . . . . . . . . 1:1--1:??
                 Somesh Jha and   
       Stefan Katzenbeisser and   
       Christian Schallhart and   
               Helmut Veith and   
                Stephen Chenney   Semantic integrity in large-scale online
                                  simulations  . . . . . . . . . . . . . . 2:1--2:??
              Tzu-Chi Huang and   
           Sherali Zeadally and   
         Naveen Chilamkurti and   
                  Ce-Kuen Shieh   A programmable network address
                                  translator: Design, implementation, and
                                  performance  . . . . . . . . . . . . . . 3:1--3:??
               Hweehwa Pang and   
                Jialie Shen and   
               Ramayya Krishnan   Privacy-preserving similarity-based text
                                  retrieval  . . . . . . . . . . . . . . . 4:1--4:??

ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 2, May, 2010

             Teh-Chung Chen and   
                 Scott Dick and   
                   James Miller   Detecting visually similar Web pages:
                                  Application to phishing detection  . . . 5:1--5:??
                  Chuan Yue and   
                   Haining Wang   BogusBiter: a transparent protection
                                  against phishing attacks . . . . . . . . 6:1--6:??
     Ponnurangam Kumaraguru and   
                Steve Sheng and   
        Alessandro Acquisti and   
        Lorrie Faith Cranor and   
                     Jason Hong   Teaching Johnny not to fall for phish    7:1--7:??
                 Ugur Kuter and   
               Jennifer Golbeck   Using probabilistic confidence models
                                  for trust inference in Web-based social
                                  networks . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 3, October, 2010

           Moheeb Abu Rajab and   
             Fabian Monrose and   
                   Niels Provos   Peeking Through the Cloud: Client
                                  Density Estimation via DNS Cache Probing 9:1--9:??
            Alberto Bartoli and   
            Giorgio Davanzo and   
                    Eric Medvet   A Framework for Large-Scale Detection of
                                  Web Site Defacements . . . . . . . . . . 10:1--10:??
                 Ilya Gluhovsky   Forecasting Click-Through Rates Based on
                                  Sponsored Search Advertiser Bids and
                                  Intermediate Variable Regression . . . . 11:1--11:??
               Scott Jordan and   
                   Arijit Ghosh   A Framework for Classification of
                                  Traffic Management Practices as
                                  Reasonable or Unreasonable . . . . . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 4, March, 2011

               Haifeng Shen and   
                 Chengzheng Sun   Achieving Data Consistency by
                                  Contextualization in Web-Based
                                  Collaborative Applications . . . . . . . 13:1--13:??
                Neil Hurley and   
                       Mi Zhang   Novelty and Diversity in Top-$N$
                                  Recommendation --- Analysis and
                                  Evaluation . . . . . . . . . . . . . . . 14:1--14:??
                 Mark Meiss and   
            Filippo Menczer and   
          Alessandro Vespignani   Properties and Evolution of Internet
                                  Traffic Networks from Anonymized Flow
                                  Data . . . . . . . . . . . . . . . . . . 15:1--15:??
          Adina Crainiceanu and   
              Prakash Linga and   
     Ashwin Machanavajjhala and   
            Johannes Gehrke and   
       Jayavel Shanmugasundaram   Load Balancing and Range Queries in P2P
                                  Systems Using P-Ring . . . . . . . . . . 16:1--16:??


ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 1, July, 2011

            Alexander Totok and   
               Vijay Karamcheti   Exploiting Service Usage Information for
                                  Optimizing Server Resource Management    1:1--1:??
              Martin Arlitt and   
            Niklas Carlsson and   
              Phillipa Gill and   
             Aniket Mahanti and   
               Carey Williamson   Characterizing Intelligence Gathering
                                  and Control on an Edge Network . . . . . 2:1--2:??
                Justin Zhan and   
             B. John Oommen and   
             Johanna Crisostomo   Anomaly Detection in Dynamic Systems
                                  Using Weak Estimators  . . . . . . . . . 3:1--3:??
           Pierre Genev\`es and   
           Nabil Laya\"\ida and   
                  Vincent Quint   Impact of XML Schema Evolution . . . . . 4:1--4:??

ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 2, December, 2011

           Christoph Goebel and   
               Dirk Neumann and   
               Ramayya Krishnan   Comparing ingress and egress detection
                                  to secure interdomain routing: An
                                  experimental analysis  . . . . . . . . . 5:1--5:??
           Jeannie Albrecht and   
         Christopher Tuttle and   
                 Ryan Braud and   
                 Darren Dao and   
           Nikolay Topilski and   
            Alex C. Snoeren and   
                    Amin Vahdat   Distributed application configuration,
                                  management, and visualization with plush 6:1--6:??
              Ki-Woong Park and   
                    Kyu Ho Park   ACCENT: Cognitive cryptography plugged
                                  compression for SSL/TLS-based cloud
                                  computing services . . . . . . . . . . . 7:1--7:??
              Amy Csizmar Dalal   User-perceived quality assessment of
                                  streaming media using reduced feature
                                  sets . . . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 3, January, 2012

              Quan Z. Sheng and   
               Schahram Dustdar   Introduction to special issue on
                                  context-aware Web services for the
                                  future Internet  . . . . . . . . . . . . 9:1--9:??
   Dhaminda B. Abeywickrama and   
              Sita Ramakrishnan   Context-aware services engineering:
                                  Models, transformations, and
                                  verification . . . . . . . . . . . . . . 10:1--10:??
               Qinyuan Feng and   
                   Ling Liu and   
                      Yafei Dai   Vulnerabilities and countermeasures in
                                  context-aware social rating services . . 11:1--11:??
             Takuya Maekawa and   
          Yutaka Yanagisawa and   
            Yasushi Sakurai and   
              Yasue Kishino and   
                 Koji Kamei and   
                Takeshi Okadome   Context-aware Web search in ubiquitous
                                  sensor environments  . . . . . . . . . . 12:1--12:??
                    Jing He and   
              Yanchun Zhang and   
             Guangyan Huang and   
                      Jinli Cao   A smart Web service based on the context
                                  of things  . . . . . . . . . . . . . . . 13:1--13:??
            Wanita Sherchan and   
                Surya Nepal and   
         Athman Bouguettaya and   
                   Shiping Chen   Context-sensitive user interfaces for
                                  semantic services  . . . . . . . . . . . 14:1--14:??

ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 4, March, 2012

                    Alex X. Liu   Firewall policy change-impact analysis   15:1--15:??
                Zhisheng Li and   
               Xiangye Xiao and   
                  Meng Wang and   
                 Chong Wang and   
                  Xufa Wang and   
                       Xing Xie   Towards the taxonomy-oriented
                                  categorization of yellow pages queries   16:1--16:??
     Kenneth Wai-Ting Leung and   
                Dik Lun Lee and   
                 Wilfred Ng and   
                 Hing Yuet Fung   A framework for personalizing web search
                                  with concept-based user profiles . . . . 17:1--17:??


ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 1, June, 2012

              Italo Dacosta and   
          Saurabh Chakradeo and   
            Mustaque Ahamad and   
                Patrick Traynor   One-time cookies: Preventing session
                                  hijacking attacks with stateless
                                  authentication tokens  . . . . . . . . . 1:1--1:??
        Marios D. Dikaiakos and   
      Asterios Katsifodimos and   
                  George Pallis   Minersoft: Software retrieval in grid
                                  and cloud computing infrastructures  . . 2:1--2:??
                   Deke Guo and   
                 Yunhao Liu and   
                    Hai Jin and   
                  Zhong Liu and   
              Weiming Zhang and   
                        Hui Liu   Theory and network applications of
                                  balanced Kautz tree structures . . . . . 3:1--3:??

ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 2, December, 2012

               Gareth Tyson and   
             Andreas Mauthe and   
            Sebastian Kaune and   
                 Paul Grace and   
                Adel Taweel and   
               Thomas Plagemann   Juno: a Middleware Platform for
                                  Supporting Delivery-Centric Applications 4:1--4:??
              Valentin Robu and   
               Lonneke Mous and   
           Han La Poutré   Using Priced Options to Solve the
                                  Exposure Problem in Sequential Auctions  5:1--5:??
                 Ziyang Liu and   
                        Yi Chen   Exploiting and Maintaining Materialized
                                  Views for XML Keyword Queries  . . . . . 6:1--6:??

ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 3, May, 2013

         Claudio A. Ardagna and   
             Sushil Jajodia and   
        Pierangela Samarati and   
                Angelos Stavrou   Providing Users' Anonymity in Mobile
                                  Hybrid Networks  . . . . . . . . . . . . 7:1--7:??
              Ilung Pranata and   
            Rukshan Athauda and   
                  Geoff Skinner   Modeling Decentralized Reputation-Based
                                  Trust for Initial Transactions in
                                  Digital Environments . . . . . . . . . . 8:1--8:??
                 Lihua Yuan and   
             Chao-Chih Chen and   
          Prasant Mohapatra and   
             Chen-Nee Chuah and   
                   Krishna Kant   A Proxy View of Quality of Domain Name
                                  Service, Poisoning Attacks and Survival
                                  Strategies . . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 4, July, 2013

              Munindar P. Singh   Vision for TOIT  . . . . . . . . . . . . 10:1--10:??
              Munindar P. Singh   TOIT Administrative Updates  . . . . . . 11:1--11:??
                  Meng Wang and   
                 Guangda Li and   
                   Zheng Lu and   
                    Yue Gao and   
                  Tat-Seng Chua   When Amazon Meets Google: Product
                                  Visualization by Exploring Multiple Web
                                  Sources  . . . . . . . . . . . . . . . . 12:1--12:??
                Yu-Li Liang and   
                 Xinyu Xing and   
             Hanqiang Cheng and   
               Jianxun Dang and   
                  Sui Huang and   
                Richard Han and   
                    Xue Liu and   
                     Qin Lv and   
               Shivakant Mishra   SafeVchat: a System for Obscene Content
                                  Detection in Online Video Chat Services  13:1--13:??
              Craig A. Shue and   
              Andrew J. Kalafut   Resolvers Revealed: Characterizing DNS
                                  Resolvers and their Clients  . . . . . . 14:1--14:??


ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 1, November, 2013

                  Xitong Li and   
          Stuart E. Madnick and   
                    Hongwei Zhu   A Context-Based Approach to Reconciling
                                  Data Interpretation Conflicts in Web
                                  Services Composition . . . . . . . . . . 1:1--1:??
               San-Tsai Sun and   
              Eric Pospisil and   
            Ildar Muslukhov and   
               Nuray Dindar and   
             Kirstie Hawkey and   
            Konstantin Beznosov   Investigating Users' Perspectives of Web
                                  Single Sign-On: Conceptual Gaps and
                                  Acceptance Model . . . . . . . . . . . . 2:1--2:??
      Massimiliano Albanese and   
          Antonio d'Acierno and   
           Vincenzo Moscato and   
               Fabio Persia and   
             Antonio Picariello   A Multimedia Recommender System  . . . . 3:1--3:??

ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 2, December, 2013

             Hassan Sayyadi and   
                 Louiqa Raschid   A Graph Analytical Approach for Topic
                                  Detection  . . . . . . . . . . . . . . . 4:1--4:??
              Kemal Bicakci and   
               Bruno Crispo and   
               Gabriele Oligeri   LAKE: a Server-Side Authenticated
                                  Key-Establishment with Low Computational
                                  Workload . . . . . . . . . . . . . . . . 5:1--5:??
               Scott Jordan and   
                   Gwen Shaffer   User and ISP Rights of Device Attachment
                                  and Device Management  . . . . . . . . . 6:1--6:??

ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 3, May, 2014

                Xiaowen Chu and   
               Xiaowei Chen and   
               Adele Lu Jia and   
          Johan A. Pouwelse and   
               Dick H. J. Epema   Dissecting Darknets: Measurement and
                                  Performance Analysis . . . . . . . . . . 7:1--7:??
          Ghassan O. Karame and   
 Aurélien Francillon and   
         Victor Budilivschi and   
              Srdjan Capkun and   
                  Vedran Capkun   Microcomputations as Micropayments in
                                  Web-based Services . . . . . . . . . . . 8:1--8:??
           Jeremy Blackburn and   
         Nicolas Kourtellis and   
              John Skvoretz and   
              Matei Ripeanu and   
              Adriana Iamnitchi   Cheating in Online Games: a Social
                                  Network Perspective  . . . . . . . . . . 9:1--9:??
                   Tian Guo and   
             Upendra Sharma and   
            Prashant Shenoy and   
               Timothy Wood and   
                    Sambit Sahu   Cost-Aware Cloud Bursting for Enterprise
                                  Applications . . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 4, July, 2014

                   Xiao Bai and   
           Rachid Guerraoui and   
           Anne-Marie Kermarrec   Personalizing Top-$k$ Processing Online
                                  in a Peer-to-Peer Social Tagging Network 11:1--11:??
            Karim Benouaret and   
          Djamal Benslimane and   
              Allel Hadjali and   
           Mahmoud Barhamgi and   
             Zakaria Maamar and   
                  Quan Z. Sheng   Web Service Compositions with Fuzzy
                                  Preferences: a Graded Dominance
                                  Relationship-Based Approach  . . . . . . 12:1--12:??
           Pierre Genev\`es and   
               Nabil Laya\"\ida   Equipping IDEs with XML-Path Reasoning
                                  Capabilities . . . . . . . . . . . . . . 13:1--13:??


ACM Transactions on Internet Technology (TOIT)
Volume 14, Number 1, July, 2014

          Alexander Artikis and   
                Avigdor Gal and   
            Vana Kalogeraki and   
              Matthias Weidlich   Event Recognition Challenges and
                                  Techniques: Guest Editors' Introduction  1:1--1:??
            Souleiman Hasan and   
                   Edward Curry   Approximate Semantic Matching of Events
                                  for the Internet of Things . . . . . . . 2:1--2:??
          Cristian Molinaro and   
           Vincenzo Moscato and   
         Antonio Picariello and   
            Andrea Pugliese and   
             Antonino Rullo and   
             V. S. Subrahmanian   PADUA: Parallel Architecture to Detect
                                  Unexplained Activities . . . . . . . . . 3:1--3:??
      Christopher Mutschler and   
             Michael Philippsen   Adaptive Speculative Processing of
                                  Out-of-Order Event Streams . . . . . . . 4:1--4:??
       Gregory Aaron Wilkin and   
            Patrick Eugster and   
                  K. R. Jayaram   Decentralized Fault-Tolerant Event
                                  Correlation  . . . . . . . . . . . . . . 5:1--5:??
     Beate Ottenwälder and   
            Boris Koldehofe and   
             Kurt Rothermel and   
                 Kirak Hong and   
            David Lillethun and   
        Umakishore Ramachandran   MCEP: a Mobility-Aware Complex Event
                                  Processing System  . . . . . . . . . . . 6:1--6:??
               Boris Glavic and   
     Kyumars Sheykh Esmaili and   
           Peter M. Fischer and   
                  Nesime Tatbul   Efficient Stream Provenance via Operator
                                  Instrumentation  . . . . . . . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 14, Number 2--3, October, 2014

        Costas Courcoubetis and   
         Roch Guérin and   
            Patrick Loiseau and   
               David Parkes and   
               Jean Walrand and   
                   Adam Wierman   Special Issue on Pricing and Incentives
                                  in Networks and Systems: Guest Editors'
                                  Introduction . . . . . . . . . . . . . . 8:1--8:??
             Zeinab Abbassi and   
                Nidhi Hegde and   
       Laurent Massoulié   Distributed Content Curation on the Web  9:1--9:??
           Pierre Coucheney and   
        Giuseppe D'acquisto and   
      Patrick Maillé and   
             Maurizio Naldi and   
                   Bruno Tuffin   Influence of Search Neutrality on the
                                  Economics of Advertisement-Financed
                                  Content  . . . . . . . . . . . . . . . . 10:1--10:??
               Eitan Altman and   
      Manjesh Kumar Hanawal and   
              Rajesh Sundaresan   Regulation of Off-Network Pricing in a
                                  Nonneutral Network . . . . . . . . . . . 11:1--11:??
               Chi-Kin Chau and   
                  Qian Wang and   
                  Dah-Ming Chiu   Economic Viability of Paris Metro
                                  Pricing for Digital Services . . . . . . 12:1--12:??
         Roch Guérin and   
   Jaudelice C. de Oliveira and   
                   Steven Weber   Adoption of Bundled Services with
                                  Network Externalities and Correlated
                                  Affinities . . . . . . . . . . . . . . . 13:1--13:??
            Matthew Andrews and   
                Glenn Bruns and   
              Mustafa Dogru and   
                    Hyoseop Lee   Understanding Quota Dynamics in Wireless
                                  Networks . . . . . . . . . . . . . . . . 14:1--14:??
         Emir Kavurmacioglu and   
             Murat Alanyali and   
              David Starobinski   Demand-Invariant Price Relationships and
                                  Market Outcomes in Competitive Private
                                  Commons  . . . . . . . . . . . . . . . . 15:1--15:??
              Martin Hoefer and   
          Thomas Kesselheim and   
          Berthold Vöcking   Approximation Algorithms for Secondary
                                  Spectrum Auctions  . . . . . . . . . . . 16:1--16:??
        Ioannis Caragiannis and   
        Christos Kaklamanis and   
   Panagiotis Kanellopoulos and   
               Maria Kyropoulou   Revenue Guarantees in the Generalized
                                  Second Price Auction . . . . . . . . . . 17:1--17:??
                Josu Doncel and   
               Urtzi Ayesta and   
               Olivier Brun and   
             Balakrishna Prabhu   Is the Price of Anarchy the Right
                                  Measure for Load-Balancing Games?  . . . 18:1--18:??
                Aron Laszka and   
           Benjamin Johnson and   
       Pascal Schöttle and   
            Jens Grossklags and   
              Rainer Böhme   Secure Team Composition to Thwart
                                  Insider Threats and Cyber-Espionage  . . 19:1--19:??
                    Zhen Ye and   
         Athman Bouguettaya and   
                  Xiaofang Zhou   Economic Model-Driven Cloud Service
                                  Composition  . . . . . . . . . . . . . . 20:1--20:??
       Soudip Roy Chowdhury and   
             Florian Daniel and   
                   Fabio Casati   Recommendation and Weaving of Reusable
                                  Mashup Model Patterns for Assisted
                                  Development  . . . . . . . . . . . . . . 21:1--21:??

ACM Transactions on Internet Technology (TOIT)
Volume 14, Number 4, December, 2014

             Amit K. Chopra and   
                  Raian Ali and   
                   Maja Vukovic   Introduction to the Special Issue on
                                  Foundations of Social Computing  . . . . 22:1--22:??
             Matteo Baldoni and   
          Cristina Baroglio and   
           Federico Capuzzimati   A Commitment-Based Infrastructure for
                                  Programming Socio-Technical Systems  . . 23:1--23:??
          Flavio Figueiredo and   
         Jussara M. Almeida and   
Marcos André Gonçalves and   
     Fabrício Benevenuto   On the Dynamics of Social Media
                                  Popularity: a YouTube Case Study . . . . 24:1--24:??
         Thomas Lukasiewicz and   
      Maria Vanina Martinez and   
          Gerardo I. Simari and   
          Oana Tifrea-Marciuska   Ontology-Based Query Answering with
                                  Group Preferences  . . . . . . . . . . . 25:1--25:??
            Thiago H. Silva and   
    Pedro O. S. Vaz de Melo and   
         Jussara M. Almeida and   
             Juliana Salles and   
         Antonio A. F. Loureiro   Revealing the City That We Cannot See    26:1--26:??
                Jan Vosecky and   
                   Di Jiang and   
     Kenneth Wai-Ting Leung and   
                   Kai Xing and   
                     Wilfred Ng   Integrating Social and Auxiliary
                                  Semantics for Multifaceted Topic
                                  Modeling in Twitter  . . . . . . . . . . 27:1--27:??
                Dingqi Yang and   
               Daqing Zhang and   
                 Zhiyong Yu and   
                  Zhiwen Yu and   
               Djamal Zeghlache   SESAME: Mining User Digital Footprints
                                  for Fine-Grained Preference-Aware Social
                                  Media Search . . . . . . . . . . . . . . 28:1--28:??


ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 1, February, 2015

         Nicolas Kourtellis and   
           Jeremy Blackburn and   
            Cristian Borcea and   
              Adriana Iamnitchi   Special Issue on Foundations of Social
                                  Computing: Enabling Social Applications
                                  via Decentralized Social Data Management 1:1--1:??
              Alissa Cooper and   
                      Ian Brown   Net Neutrality: Discrimination,
                                  Competition, and Innovation in the UK
                                  and US . . . . . . . . . . . . . . . . . 2:1--2:??
            Pranav Dandekar and   
                Ashish Goel and   
         Michael P. Wellman and   
               Bryce Wiedenbeck   Strategic Formation of Credit Networks   3:1--3:??
              David R. Bild and   
                    Yue Liu and   
             Robert P. Dick and   
              Z. Morley Mao and   
                 Dan S. Wallach   Aggregate Characterization of User
                                  Behavior in Twitter and Analysis of the
                                  Retweet Graph  . . . . . . . . . . . . . 4:1--4:??
     H. M. N. Dilum Bandara and   
            Anura P. Jayasumana   P2P-Based, Multi-Attribute Resource
                                  Discovery under Real-World Resources and
                                  Queries  . . . . . . . . . . . . . . . . 5:1--5:??

ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 2, June, 2015

                Surya Nepal and   
               Cecile Paris and   
          Payam Aghaei Pour and   
                Jill Freyne and   
              Sanat Kumar Bista   Interaction-Based Recommendations for
                                  Online Communities . . . . . . . . . . . 6:1--6:??
              Amal Alhosban and   
             Khayyam Hashmi and   
                 Zaki Malik and   
            Brahim Medjahed and   
               Salima Benbernou   Bottom-Up Fault Management in
                                  Service-Based Systems  . . . . . . . . . 7:1--7:??
                    Wei Dai and   
                   Scott Jordan   The Effect of Data Caps upon ISP Service
                                  Tier Design and Users  . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 3, September, 2015

                  Yi Zhuang and   
                  Nan Jiang and   
                    Qing Li and   
                   Lei Chen and   
                     Chunhua Ju   Progressive Batch Medical Image
                                  Retrieval Processing in Mobile Wireless
                                  Networks . . . . . . . . . . . . . . . . 9:1--9:??
       Rostyslav Zabolotnyi and   
            Philipp Leitner and   
            Waldemar Hummer and   
               Schahram Dustdar   JCloudScale: Closing the Gap Between
                                  IaaS and PaaS  . . . . . . . . . . . . . 10:1--10:??
                      Anonymous   P-DONAS: a P2P-Based Domain Name System
                                  in Access Networks . . . . . . . . . . . 11:1--11:??

ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 4, December, 2015

          Timothy J. Norman and   
             Suzanne Barber and   
               Rino Falcone and   
                      Jie Zhang   Introduction to Theme Section on Trust
                                  in Social Networks and Systems . . . . . 12:1--12:??
               Rino Falcone and   
        Alessandro Sapienza and   
        Cristiano Castelfranchi   The Relevance of Categories for Trusting
                                  Information Sources  . . . . . . . . . . 13:1--13:??
               Wenjun Jiang and   
                     Jie Wu and   
                    Guojun Wang   On Selecting Recommenders for Trust
                                  Evaluation in Online Social Networks . . 14:1--14:??
          Santiago Pina Ros and   
 Ángel Pina Canelles and   
    Manuel Gil Pérez and   
Félix Gómez Mármol and   
Gregorio Martínez Pérez   Chasing Offensive Conduct in Social
                                  Networks: a Reputation-Based Practical
                                  Approach for Frisber . . . . . . . . . . 15:1--15:??
      Alistair G. Sutcliffe and   
                    Di Wang and   
             Robin I. M. Dunbar   Modelling the Role of Trust in Social
                                  Relationships  . . . . . . . . . . . . . 16:1--16:??


ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 1, February, 2016

          Djamal Benslimane and   
              Quan Z. Sheng and   
           Mahmoud Barhamgi and   
                    Henri Prade   The Uncertain Web: Concepts, Challenges,
                                  and Current Solutions  . . . . . . . . . 1:1--1:??
                 Peng Zhang and   
                    Jing He and   
               Guodong Long and   
             Guangyan Huang and   
                  Chengqi Zhang   Towards Anomalous Diffusion Sources
                                  Detection in a Large Network . . . . . . 2:1--2:??
               Asma Abboura and   
                Soror Sahri and   
          Latifa Baba-Hamed and   
              Mourad Ouziri and   
               Salima Benbernou   Quality-Based Online Data Reconciliation 3:1--3:??
                Jiangang Ma and   
                     Le Sun and   
                   Hua Wang and   
              Yanchun Zhang and   
                   Uwe Aickelin   Supervised Anomaly Detection in
                                  Uncertain Pseudoperiodic Data Streams    4:1--4:??
           Abdallah Makhoul and   
          Christophe Guyeux and   
               Mourad Hakem and   
                Jacques M. Bahi   Using an Epidemiological Approach to
                                  Maximize Data Survival in the Internet
                                  of Things  . . . . . . . . . . . . . . . 5:1--5:??
     Kenneth Wai-Ting Leung and   
                   Di Jiang and   
                Dik Lun Lee and   
                     Wilfred Ng   Constructing Maintainable Semantic
                                  Relation Network from Ambiguous Concepts
                                  in Web Content . . . . . . . . . . . . . 6:1--6:??
                 Zaki Malik and   
            Brahim Medjahed and   
            Abdelmounaam Rezgui   sCARE: Reputation Estimation for
                                  Uncertain Web Services . . . . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 2, April, 2016

                In-Young Ko and   
                 Han-Gyu Ko and   
       Angel Jimenez Molina and   
                 Jung-Hyun Kwon   SoIoT: Toward A User-Centric IoT-Based
                                  Service Framework  . . . . . . . . . . . 8:1--8:??
                   Lina Yao and   
              Quan Z. Sheng and   
             Anne H. H. Ngu and   
                         Xue Li   Things of Interest Recommendation by
                                  Leveraging Heterogeneous Relations in
                                  the Internet of Things . . . . . . . . . 9:1--9:??
                Marco Lippi and   
                  Paolo Torroni   Argumentation Mining: State of the Art
                                  and Emerging Trends  . . . . . . . . . . 10:1--10:??
        Michael Vögler and   
     Johannes M. Schleicher and   
         Christian Inzinger and   
               Schahram Dustdar   A Scalable Framework for Provisioning
                                  Large-Scale IoT Deployments  . . . . . . 11:1--11:??
                Lidong Bing and   
               Tak-Lam Wong and   
                        Wai Lam   Unsupervised Extraction of Popular
                                  Product Attributes from E-Commerce Web
                                  Sites by Considering Customer Reviews    12:1--12:??
                 Alba Amato and   
          Salvatore Venticinque   Multiobjective Optimization for
                                  Brokering of Multicloud Service
                                  Composition  . . . . . . . . . . . . . . 13:1--13:??
        Costas Courcoubetis and   
            Laszlo Gyarmati and   
         Nikolaos Laoutaris and   
            Pablo Rodriguez and   
                Kostas Sdrolias   Negotiating Premium Peering Prices: a
                                  Quantitative Model with Applications . . 14:1--14:??

ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 3, August, 2016

            Philipp Leitner and   
               Jürgen Cito   Patterns in the Chaos --- A Study of
                                  Performance Variation and Predictability
                                  in Public IaaS Clouds  . . . . . . . . . 15:1--15:??
              Tien-Dung Cao and   
               Tran-Vu Pham and   
              Quang-Hieu Vu and   
           Hong-Linh Truong and   
                Duc-Hung Le and   
               Schahram Dustdar   MARSA: a Marketplace for Realtime Human
                                  Sensing Data . . . . . . . . . . . . . . 16:1--16:??
    Carlos Rodríguez and   
             Florian Daniel and   
                   Fabio Casati   Mining and Quality Assessment of Mashup
                                  Model Patterns with the Crowd: a
                                  Feasibility Study  . . . . . . . . . . . 17:1--17:??
            Georgiana Copil and   
            Daniel Moldovan and   
           Hong-Linh Truong and   
               Schahram Dustdar   rSYBL: a Framework for Specifying and
                                  Controlling Cloud Services Elasticity    18:1--18:??
Delia Irazú Hernández Farías and   
              Viviana Patti and   
                    Paolo Rosso   Irony Detection in Twitter: The Role of
                                  Affective Content  . . . . . . . . . . . 19:1--19:??
               Gianni Costa and   
                Riccardo Ortale   Model-Based Collaborative Personalized
                                  Recommendation on Signed Social Rating
                                  Networks . . . . . . . . . . . . . . . . 20:1--20:??
                  Rui Zhang and   
                    Rui Xue and   
                    Ting Yu and   
                       Ling Liu   Dynamic and Efficient Private Keyword
                                  Search over Inverted Index-Based
                                  Encrypted Data . . . . . . . . . . . . . 21:1--21:??

ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 4, December, 2016

              Elisa Bertino and   
     Kim-Kwang Raymond Choo and   
   Dimitrios Georgakopolous and   
                    Surya Nepal   Internet of Things (IoT): Smart and
                                  Secure Service Delivery  . . . . . . . . 22:1--22:??
                    Li Duan and   
                 Dongxi Liu and   
                 Yang Zhang and   
               Shiping Chen and   
               Ren Ping Liu and   
                   Bo Cheng and   
                  Junliang Chen   Secure Data-Centric Access Control for
                                  Smart Grid Services Based on
                                  Publish/Subscribe Systems  . . . . . . . 23:1--23:??
               Yuexin Zhang and   
                 Yang Xiang and   
                    Xinyi Huang   Password-Authenticated Group Key
                                  Exchange: a Cross-Layer Design . . . . . 24:1--24:??
             Neetesh Saxena and   
          Santiago Grijalva and   
          Narendra S. Chaudhari   Authentication Protocol for an
                                  IoT-Enabled LTE Network  . . . . . . . . 25:1--25:??
             Shachar Siboni and   
               Asaf Shabtai and   
        Nils O. Tippenhauer and   
                  Jemin Lee and   
                  Yuval Elovici   Advanced Security Testbed Framework for
                                  Wearable IoT Devices . . . . . . . . . . 26:1--26:??
                Ahmed Saeed and   
              Ali Ahmadinia and   
                Abbas Javed and   
                  Hadi Larijani   Intelligent Intrusion Detection in
                                  Low-Power IoTs . . . . . . . . . . . . . 27:1--27:??
                    Ngoc Do and   
                    Ye Zhao and   
             Cheng-Hsin Hsu and   
      Nalini Venkatasubramanian   Crowdsourced Mobile Data Transfer with
                                  Delay Bound  . . . . . . . . . . . . . . 28:1--28:??
               Aveek K. Das and   
            Parth H. Pathak and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   Characterization of Wireless Multidevice
                                  Users  . . . . . . . . . . . . . . . . . 29:1--29:??


ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 1, March, 2017

        Chloé Clavel and   
            Rossana Damiano and   
              Viviana Patti and   
                    Paolo Rosso   Affect and Interaction in Agent-Based
                                  Systems and Social Media: Guest Editors'
                                  Introduction . . . . . . . . . . . . . . 1:1--1:??
            Beste F. Yuksel and   
            Penny Collisson and   
                Mary Czerwinski   Brains or Beauty: How to Engender Trust
                                  in User-Agent Interactions . . . . . . . 2:1--2:??
           Maurizio Mancini and   
         Beatrice Biancardi and   
             Florian Pecune and   
             Giovanna Varni and   
                    Yu Ding and   
        Catherine Pelachaud and   
            Gualtiero Volpe and   
                Antonio Camurri   Implementing and Evaluating a Laughing
                                  Virtual Character  . . . . . . . . . . . 3:1--3:??
              Mehdi Dastani and   
               Alexander Pankov   Other-Condemning Moral Emotions: Anger,
                                  Contempt and Disgust . . . . . . . . . . 4:1--4:??
               Bexy Alfonso and   
            Emilio Vivancos and   
                  Vicente Botti   Toward Formal Modeling of Affective
                                  Agents in a BDI Architecture . . . . . . 5:1--5:??
          Jahna Otterbacher and   
             Chee Siang Ang and   
              Marina Litvak and   
                   David Atkins   Show Me You Care: Trait Empathy,
                                  Linguistic Style, and Mimicry on
                                  Facebook . . . . . . . . . . . . . . . . 6:1--6:??
                   Rosa Meo and   
                   Emilio Sulis   Processing Affect in Social Media: a
                                  Comparison of Methods to Distinguish
                                  Emotions in Tweets . . . . . . . . . . . 7:1--7:??
            Pasquale De Meo and   
    Katarzyna Musial-Gabrys and   
            Domenico Rosaci and   
     Giuseppe M. L. Sarn\`e and   
                     Lora Aroyo   Using Centrality Measures to Predict
                                  Helpfulness-Based Reputation in Trust
                                  Networks . . . . . . . . . . . . . . . . 8:1--8:??
             Ruchdee Binmad and   
                     Mingchu Li   Improving the Efficiency of an Online
                                  Marketplace by Incorporating Forgiveness
                                  Mechanism  . . . . . . . . . . . . . . . 9:1--9:??
            George Drosatos and   
            Aimilia Tasidou and   
           Pavlos S. Efraimidis   Privacy-Enhanced Television Audience
                                  Measurements . . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 2, May, 2017

             Amit K. Chopra and   
               Erez Shmueli and   
                 Vivek K. Singh   Introduction to the Special Issue on
                                  Advances in Social Computing . . . . . . 11:1--11:??
             Sara Rosenthal and   
               Kathleen Mckeown   Detecting Influencers in Multiple Online
                                  Genres . . . . . . . . . . . . . . . . . 12:1--12:??
          Christos Perentis and   
            Michele Vescovi and   
            Chiara Leonardi and   
              Corrado Moiso and   
             Mirco Musolesi and   
              Fabio Pianesi and   
                    Bruno Lepri   Anonymous or Not? Understanding the
                                  Factors Affecting Personal Mobile Data
                                  Disclosure . . . . . . . . . . . . . . . 13:1--13:??
            Jorge Goncalves and   
                 Simo Hosio and   
              Vassilis Kostakos   Eliciting Structured Knowledge from
                                  Situated Crowd Markets . . . . . . . . . 14:1--14:??
                  Atanu Roy and   
              Ayush Singhal and   
             Jaideep Srivastava   Formation and Reciprocation of Dyadic
                                  Trust  . . . . . . . . . . . . . . . . . 15:1--15:??
                Yefeng Ruan and   
                 Ping Zhang and   
            Lina Alfantoukh and   
                  Arjan Durresi   Measurement Theory-Based Trust
                                  Management Framework for Online Social
                                  Communities  . . . . . . . . . . . . . . 16:1--16:??
     Christian Von Der Weth and   
            Ashraf M. Abdul and   
              Mohan Kankanhalli   Cyber-Physical Social Networks . . . . . 17:1--17:??
             Nasser Alsaedi and   
                Pete Burnap and   
                      Omer Rana   Can We Predict a Riot? Disruptive Event
                                  Detection Using Twitter  . . . . . . . . 18:1--18:??
               Zhenguo Yang and   
                    Qing Li and   
                   Zheng Lu and   
                     Yun Ma and   
                Zhiguo Gong and   
                     Wenyin Liu   Dual Structure Constrained Multimodal
                                  Feature Coding for Social Event
                                  Detection from Flickr Data . . . . . . . 19:1--19:??
         Michal Ciesielczyk and   
             Andrzej Szwabe and   
              Mikolaj Morzy and   
                 Pawel Misiorek   Progressive Random Indexing:
                                  Dimensionality Reduction Preserving
                                  Local Network Dependencies . . . . . . . 20:1--20:??
            Benjamin Billet and   
         Valérie Issarny   Spinel: an Opportunistic Proxy for
                                  Connecting Sensors to the Internet of
                                  Things . . . . . . . . . . . . . . . . . 21:1--21:??
                  Xumin Liu and   
                 Weishi Shi and   
                Arpeet Kale and   
                  Chen Ding and   
                          Qi Yu   Statistical Learning of Domain-Specific
                                  Quality-of-Service Features from User
                                  Reviews  . . . . . . . . . . . . . . . . 22:1--22:??

ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 3, July, 2017

             Iryna Gurevych and   
                Marco Lippi and   
                  Paolo Torroni   Argumentation in Social Media  . . . . . 23:1--23:??
              John Lawrence and   
                Mark Snaith and   
              Barbara Konat and   
        Katarzyna Budzynska and   
                     Chris Reed   Debating Technology for Dialogical
                                  Argument: Sensemaking, Engagement, and
                                  Analytics  . . . . . . . . . . . . . . . 24:1--24:??
              John Lawrence and   
               Joonsuk Park and   
        Katarzyna Budzynska and   
              Claire Cardie and   
              Barbara Konat and   
                     Chris Reed   Using Argumentative Structure to
                                  Interpret Debates in Online Deliberative
                                  Democracy and eRulemaking  . . . . . . . 25:1--25:??
           Saif M. Mohammad and   
            Parinaz Sobhani and   
           Svetlana Kiritchenko   Stance and Sentiment in Tweets . . . . . 26:1--26:??
        Nadin Kökciyan and   
            Nefise Yaglikci and   
                    Pinar Yolum   An Argumentation Approach for Resolving
                                  Privacy Disputes in Online Social
                                  Networks . . . . . . . . . . . . . . . . 27:1--27:??
          Henning Wachsmuth and   
                    Benno Stein   A Universal Model for Discourse-Level
                                  Argumentation Analysis . . . . . . . . . 28:1--28:??
                Edmond Awad and   
Jean-François Bonnefon and   
            Martin Caminada and   
           Thomas W. Malone and   
                    Iyad Rahwan   Experimental Assessment of Aggregation
                                  Principles in Argumentation-Enabled
                                  Collective Intelligence  . . . . . . . . 29:1--29:??
             Lucas Carstens and   
                 Francesca Toni   Using Argumentation to Improve
                                  Classification in Natural Language
                                  Problems . . . . . . . . . . . . . . . . 30:1--30:??
                     Yan Hu and   
                Weisong Shi and   
                    Hong Li and   
                     Xiaohui Hu   Mitigating Data Sparsity Using
                                  Similarity Reinforcement-Enhanced
                                  Collaborative Filtering  . . . . . . . . 31:1--31:??
                  Ero Balsa and   
Cristina Pérez-Sol\`a and   
                   Claudia Diaz   Towards Inferring Communication Patterns
                                  in Online Social Networks  . . . . . . . 32:1--32:??

ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 4, September, 2017

            Adriane Chapman and   
               James Cheney and   
                    Simon Miles   Guest Editorial: The Provenance of
                                  Online Data  . . . . . . . . . . . . . . 33:1--33:??
                 Adam Bates and   
           Dave (Jing) Tian and   
            Grant Hernandez and   
               Thomas Moyer and   
         Kevin R. B. Butler and   
                   Trent Jaeger   Taming the Costs of Trustworthy
                                  Provenance through Policy Reduction  . . 34:1--34:??
                     Luc Moreau   A Canonical Form for PROV Documents and
                                  Its Application to Equality, Signature,
                                  and Validation . . . . . . . . . . . . . 35:1--35:??
             Vitor C. Neves and   
         Daniel De Oliveira and   
 Kary A. C. S. Ocaña and   
         Vanessa Braganholo and   
                 Leonardo Murta   Managing Provenance of Implicit Data
                                  Flows in Scientific Experiments  . . . . 36:1--36:??
   Manolis Stamatogiannakis and   
       Elias Athanasopoulos and   
                Herbert Bos and   
                     Paul Groth   PROV$_{2R}$: Practical Provenance
                                  Analysis of Unstructured Processes . . . 37:1--37:??
                   Steven Weber   Facilitating Adoption of Internet
                                  Technologies and Services with
                                  Externalities via Cost Subsidization . . 38:1--38:??
José Luis García-Dorado   Bandwidth Measurements within the Cloud:
                                  Characterizing Regular Behaviors and
                                  Correlating Downtimes  . . . . . . . . . 39:1--39:??
               Jianhua Shao and   
                      Hoang Ong   Exploiting Contextual Information in
                                  Attacking Set-Generalized Transactions   40:1--40:??


ACM Transactions on Internet Technology (TOIT)
Volume 18, Number 1, December, 2017

            Ernesto Damiani and   
          Ryszard Kowalczyk and   
                    Gerard Parr   Extending the Outreach: From Smart
                                  Cities to Connected Communities  . . . . 1:1--1:??
                Haibo Zhang and   
                 Luming Wan and   
                 Yawen Chen and   
           Laurence T. Yang and   
                     Lizhi Peng   Adaptive Message Routing and Replication
                                  in Mobile Opportunistic Networks for
                                  Connected Communities  . . . . . . . . . 2:1--2:??
                 Taehun Kim and   
                Junsung Lim and   
                 Heesuk Son and   
            Byoungheon Shin and   
                Dongman Lee and   
                   Soon J. Hyun   A Multi-Dimensional Smart Community
                                  Discovery Scheme for IoT-Enriched Smart
                                  Homes  . . . . . . . . . . . . . . . . . 3:1--3:??
               Catia Prandi and   
               Silvia Mirri and   
           Stefano Ferretti and   
                 Paola Salomoni   On the Need of Trustworthy Sensing and
                                  Crowdsourcing for Urban Accessibility in
                                  Smart City . . . . . . . . . . . . . . . 4:1--4:??
            Antonella Longo and   
            Marco Zappatore and   
           Mario Bochicchio and   
            Shamkant B. Navathe   Crowd-Sourced Data Collection for Urban
                                  Monitoring via Mobile Sensors  . . . . . 5:1--5:??
            Moreno Ambrosin and   
                Paolo Braca and   
                Mauro Conti and   
            Riccardo Lazzeretti   ODIN: Obfuscation-Based
                                  Privacy-Preserving Consensus Algorithm
                                  for Decentralized Information Fusion in
                                  Smart Device Networks  . . . . . . . . . 6:1--6:??
           Emanuele Bellini and   
             Paolo Ceravolo and   
                     Paolo Nesi   Quantify Resilience Enhancement of UTS
                                  through Exploiting Connected Community
                                  and Internet of Everything Emerging
                                  Technologies . . . . . . . . . . . . . . 7:1--7:??
          M. Mazhar Rathore and   
                 Anand Paul and   
                Awais Ahmad and   
             Marco Anisetti and   
                  Gwanggil Jeon   Hadoop-Based Intelligent Care System
                                  (HICS): Analytical Approach for Big Data
                                  in IoT . . . . . . . . . . . . . . . . . 8:1--8:??
                    Di Wang and   
            Ahmad Al-Rubaie and   
    Sandra Stinci\'c Clarke and   
                    John Davies   Real-Time Traffic Event Detection From
                                  Social Media . . . . . . . . . . . . . . 9:1--9:??
           Hiroshi Fujikawa and   
            Hirofumi Yamaki and   
                 Setsuo Tsuruta   Seamless Virtual Network for
                                  International Business Continuity in
                                  Presence of Intentional Blocks . . . . . 10:1--10:??
       Claudia López and   
               Rosta Farzan and   
                      Yu-Ru Lin   Behind the Myths of Citizen
                                  Participation: Identifying
                                  Sustainability Factors of Hyper-Local
                                  Information Systems  . . . . . . . . . . 11:1--11:??
              Munindar P. Singh   TOIT Reviewers over 2015 and 2016  . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 18, Number 3, May, 2017

     Özgür Kafali and   
             Natalia Criado and   
               Martin Rehak and   
               Jose M. Such and   
                    Pinar Yolum   Guest Editors' Introduction  . . . . . . 26:1--26:??
                Igor Saenko and   
                   Igor Kotenko   Genetic Algorithms for Solving Problems
                                  of Access Control Design and
                                  Reconfiguration in Computer Networks . . 27:1--27:??
              Michal Stolba and   
                Jan Tozicka and   
         Antonín Komenda   Quantifying Privacy Leakage in
                                  Multi-Agent Planning . . . . . . . . . . 28:1--28:??
    Daniele Codetta-Raiteri and   
                Luigi Portinale   Decision Networks for Security Risk
                                  Assessment of Critical Infrastructures   29:1--29:??
             Sushil Jajodia and   
               Noseong Park and   
              Edoardo Serra and   
             V. S. Subrahmanian   SHARE: a Stackelberg Honey-Based
                                  Adversarial Reasoning Engine . . . . . . 30:1--30:??
           Julian A. Padget and   
        Wamberto W. Vasconcelos   Fine-Grained Access Control via
                                  Policy-Carrying Data . . . . . . . . . . 31:1--31:??
                   Lina Yao and   
              Quan Z. Sheng and   
               Xianzhi Wang and   
             Wei Emma Zhang and   
                    Yongrui Qin   Collaborative Location Recommendation by
                                  Integrating Multi-dimensional Contextual
                                  Information  . . . . . . . . . . . . . . 32:1--32:??
               Haiying Shen and   
          Harrison Chandler and   
                     Haoyu Wang   Toward Efficient Short-Video Sharing in
                                  the YouTube Social Network . . . . . . . 33:1--33:??
                    Zhen Xu and   
                   James Miller   Cross-Browser Differences Detection
                                  Based on an Empirical Metric for Web
                                  Page Visual Similarity . . . . . . . . . 34:1--34:??
             Wei Emma Zhang and   
              Quan Z. Sheng and   
                   Lina Yao and   
               Kerry Taylor and   
              Ali Shemshadi and   
                    Yongrui Qin   A Learning-Based Framework for Improving
                                  Querying on Web Interfaces of Curated
                                  Knowledge Bases  . . . . . . . . . . . . 35:1--35:??
           Sebastian Zander and   
                    Xuequn Wang   Are We There Yet? IPv6 in Australia and
                                  China  . . . . . . . . . . . . . . . . . 36:1--36:??
             Wei Emma Zhang and   
              Quan Z. Sheng and   
                Jey Han Lau and   
               Ermyas Abebe and   
                    Wenjie Ruan   Duplicate Detection in Programming
                                  Question Answering Communities . . . . . 37:1--37:??
                   Tian Guo and   
                Prashant Shenoy   Providing Geo-Elasticity in
                                  Geographically Distributed Clouds  . . . 38:1--38:??
               Yonghong Guo and   
                     Lu Liu and   
                     Yan Wu and   
                    James Hardy   Interest-Aware Content Discovery in
                                  Peer-to-Peer Social Networks . . . . . . 39:1--39:??

ACM Transactions on Internet Technology (TOIT)
Volume 18, Number 2, March, 2018

                    Tao Xie and   
            Andre van Hoorn and   
               Huaimin Wang and   
                     Ingo Weber   Introduction to the Special Issue on
                                  Emerging Software Technologies for
                                  Internet-Based Systems: Internetware and
                                  DevOps . . . . . . . . . . . . . . . . . 13:1--13:??
                Xuanzhe Liu and   
                  Meihua Yu and   
                     Yun Ma and   
                 Gang Huang and   
                   Hong Mei and   
                     Yunxin Liu   i-Jacob: an Internetware-Oriented
                                  Approach to Optimizing
                                  Computation-Intensive Mobile Web
                                  Browsing . . . . . . . . . . . . . . . . 14:1--14:??
                 Xue Ouyang and   
            Peter Garraghan and   
            Bernhard Primas and   
                David Mckee and   
               Paul Townend and   
                         Jie Xu   Adaptive Speculation for Efficient
                                  Internetware Application Execution in
                                  Clouds . . . . . . . . . . . . . . . . . 15:1--15:??
              Nicolas Ferry and   
             Franck Chauvel and   
                   Hui Song and   
         Alessandro Rossini and   
           Maksym Lushpenko and   
                  Arnor Solberg   CloudMF: Model-Driven Management of
                                  Multi-Cloud Applications . . . . . . . . 16:1--16:??
                 Claus Pahl and   
            Pooyan Jamshidi and   
                Olaf Zimmermann   Architectural Principles for Cloud
                                  Software . . . . . . . . . . . . . . . . 17:1--17:??
                   He Jiang and   
                   Xin Chen and   
                   Tieke He and   
                Zhenyu Chen and   
                    Xiaochen Li   Fuzzy Clustering of Crowdsourced Test
                                  Reports for Apps . . . . . . . . . . . . 18:1--18:??
                   Xin Peng and   
                Jingxiao Gu and   
              Tian Huat Tan and   
                    Jun Sun and   
                   Yijun Yu and   
            Bashar Nuseibeh and   
                    Wenyun Zhao   CrowdService: Optimizing Mobile
                                  Crowdsourcing and Service Composition    19:1--19:??
                Wenhua Yang and   
                   Chang Xu and   
                 Minxue Pan and   
                Xiaoxing Ma and   
                        Jian Lu   Improving Verification Accuracy of CPS
                                  by Modeling and Calibrating Interaction
                                  Uncertainty  . . . . . . . . . . . . . . 20:1--20:??
           Felix Willnecker and   
                  Helmut Krcmar   Multi-Objective Optimization of
                                  Deployment Topologies for Distributed
                                  Applications . . . . . . . . . . . . . . 21:1--21:??
Santiago Gómez Sáez and   
     Vasilios Andrikopoulos and   
             Marina Bitsaki and   
              Frank Leymann and   
         André van Hoorn   Utility-Based Decision Making for
                                  Migrating Cloud-Based Applications . . . 22:1--22:??
                 Bowen Zhou and   
       Amir Vahid Dastjerdi and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   An Online Algorithm for Task Offloading
                                  in Heterogeneous Mobile Clouds . . . . . 23:1--23:??
          Balaji Palanisamy and   
                   Ling Liu and   
                  Yang Zhou and   
                  Qingyang Wang   Privacy-Preserving Publishing of
                                  Multilevel Utility-Controlled Graph
                                  Datasets . . . . . . . . . . . . . . . . 24:1--24:??
          Fabrizio Angiulli and   
            Luciano Argento and   
                 Angelo Furfaro   Exploiting Content Spatial Distribution
                                  to Improve Detection of Intrusions . . . 25:1--25:??

ACM Transactions on Internet Technology (TOIT)
Volume 18, Number 4, November, 2018

          Cristina Baroglio and   
           Olivier Boissier and   
                  Axel Polleres   Special Issue: Computational Ethics and
                                  Accountability . . . . . . . . . . . . . 40:1--40:??
                 Alex Kayal and   
       Willem-Paul Brinkman and   
           Mark A. Neerincx and   
         M. Birna Van Riemsdijk   Automatic Resolution of Normative
                                  Conflicts in Supportive Technology Based
                                  on User Values . . . . . . . . . . . . . 41:1--41:??
         Dilara Kekulluoglu and   
             Nadin Kokciyan and   
                    Pinar Yolum   Preserving Privacy as Social
                                  Responsibility in Online Social Networks 42:1--42:??
             Ilse Verdiesen and   
            Virginia Dignum and   
           Jeroen Van Den Hoven   Measuring Moral Acceptability in
                                  E-deliberation: a Practical Application
                                  of Ethics by Participation . . . . . . . 43:1--43:??
                Leila Bahri and   
          Barbara Carminati and   
              Elena Ferrari and   
                  Andrea Bianco   Enhanced Audit Strategies for
                                  Collaborative and Accountable Data
                                  Sharing in Social Networks . . . . . . . 44:1--44:??
         Vasiliki Gkatziaki and   
        Symeon Papadopoulos and   
              Richard Mills and   
           Sotiris Diplaris and   
     Ioannis Tsampoulatidis and   
           Ioannis Kompatsiaris   easIE: Easy-to-Use Information
                                  Extraction for Constructing CSR
                                  Databases From the Web . . . . . . . . . 45:1--45:??
            Marco Gavanelli and   
              Marco Alberti and   
                  Evelina Lamma   Accountable Protocols in Abductive Logic
                                  Programming  . . . . . . . . . . . . . . 46:1--46:??
          Rainer Böhme and   
            Richard Clayton and   
            Jens Grossklags and   
             Katrina Ligett and   
            Patrick Loiseau and   
                Galina Schwartz   Special Issue on the Economics of
                                  Security and Privacy: Guest Editors'
                                  Introduction . . . . . . . . . . . . . . 47:1--47:??
                Aron Laszka and   
           Benjamin Johnson and   
                Jens Grossklags   On the Assessment of Systematic Risk in
                                  Networked Systems  . . . . . . . . . . . 48:1--48:??
   Samaneh Tajalizadehkhoob and   
          Rainer Böhme and   
 Carlos Gañán and   
        Maciej Korczy\'nski and   
               Michel Van Eeten   Rotten Apples or Bad Harvest? What We
                                  Are Measuring When We Are Measuring
                                  Abuse  . . . . . . . . . . . . . . . . . 49:1--49:??
                Tyler Moore and   
           Nicolas Christin and   
                   Janos Szurdi   Revisiting the Risks of Bitcoin Currency
                                  Exchange Closure . . . . . . . . . . . . 50:1--50:??
      Jagdish Prasad Achara and   
         Javier Parra-Arnau and   
            Claude Castelluccia   Fine-Grained Control over Tracking to
                                  Support the Ad-Based Web Economy . . . . 51:1--51:??
               Reuben Binns and   
                   Jun Zhao and   
              Max Van Kleek and   
                 Nigel Shadbolt   Measuring Third-party Tracker Power
                                  across Web and Mobile  . . . . . . . . . 52:1--52:??
       Razieh Nokhbeh Zaeem and   
           Rachel L. German and   
              K. Suzanne Barber   PrivacyCheck: Automatic Summarization of
                                  Privacy Policies Using Data Mining . . . 53:1--53:??
            James T. Graves and   
        Alessandro Acquisti and   
               Nicolas Christin   Should Credit Card Issuers Reissue Cards
                                  in Response to a Data Breach?:
                                  Uncertainty and Transparency in Metrics
                                  for Data Security Policymaking . . . . . 54:1--54:??
             Mohsen Rezvani and   
      Aleksandar Ignjatovic and   
                  Elisa Bertino   A Provenance-Aware Multi-dimensional
                                  Reputation System for Online Rating
                                  Systems  . . . . . . . . . . . . . . . . 55:1--55:??
                   Zhi Yang and   
                       Wei Chen   A Game Theoretic Model for the Formation
                                  of Navigable Small-World Networks-The
                                  Tradeoff between Distance and
                                  Reciprocity  . . . . . . . . . . . . . . 56:1--56:??
              Munindar P. Singh   TOIT Reviewers over 2017 . . . . . . . . 57:1--57:??


ACM Transactions on Internet Technology (TOIT)
Volume 19, Number 1, March, 2019

                  Zhiwen Yu and   
                     Fei Yi and   
                    Chao Ma and   
                   Zhu Wang and   
                    Bin Guo and   
                    Liming Chen   Fine-grained Emotion Role Detection
                                  Based on Retweet Information . . . . . . 1:1--1:??
            Timothy K. Shih and   
     W. K. T. M. Gunarathne and   
          Ankhtuya Ochirbat and   
                  Huang-Ming Su   Grouping Peers Based on Complementary
                                  Degree and Social Relationship using
                                  Genetic Algorithm  . . . . . . . . . . . 2:1--2:??
                     Oscar Novo   Making Constrained Things Reachable: a
                                  Secure IP-Agnostic NAT Traversal
                                  Approach for IoT . . . . . . . . . . . . 3:1--3:??
                   Ali Ouni and   
              Hanzhang Wang and   
        Marouane Kessentini and   
              Salah Bouktif and   
                  Katsuro Inoue   A Hybrid Approach for Improving the
                                  Design Quality of Web Service Interfaces 4:1--4:??
         Azadeh Ghari Neiat and   
         Athman Bouguettaya and   
                   Sajib Mistry   Incentive-Based Crowdsourcing of Hotspot
                                  Services . . . . . . . . . . . . . . . . 5:1--5:??
                 Samir Tata and   
              Quan Z. Sheng and   
                 Eleni Stroulia   Guest Editors' Introduction for Special
                                  Issue on Service Management for the
                                  Internet of Things . . . . . . . . . . . 6:1--6:??
            Amir Taherkordi and   
             Frank Eliassen and   
           Michael Mcdonald and   
                      Geir Horn   Context-Driven and Real-Time
                                  Provisioning of Data-Centric IoT
                                  Services in the Cloud  . . . . . . . . . 7:1--7:??
              Emna Mezghani and   
           Ernesto Exposito and   
                   Khalil Drira   An Autonomic Cognitive Pattern for Smart
                                  IoT-Based System Manageability:
                                  Application to Comorbidity Management    8:1--8:??
             Redowan Mahmud and   
     Kotagiri Ramamohanarao and   
                 Rajkumar Buyya   Latency-Aware Application Module
                                  Management for Fog Computing
                                  Environments . . . . . . . . . . . . . . 9:1--9:??
     Andreas Konstantinidis and   
       Panagiotis Irakleous and   
         Zacharias Georgiou and   
Demetrios Zeinalipour-Yazti and   
           Panos K. Chrysanthis   IoT Data Prefetching in Indoor
                                  Navigation SOAs  . . . . . . . . . . . . 10:1--10:??
               Aditya Ghose and   
   Hamid R. Motahari Nezhad and   
               Manfred Reichert   Guest Editors' Introduction to the
                                  Special Issue on Knowledge-Driven
                                  Business Process Management  . . . . . . 11:1--11:??
                 Rik Eshuis and   
               Richard Hull and   
                     Mengfei Yi   Reasoning About Property Preservation in
                                  Adaptive Case Management . . . . . . . . 12:1--12:??
            Shaya Pourmirza and   
              Sander Peters and   
              Remco Dijkman and   
                    Paul Grefen   BPMS-RA: a Novel Reference Architecture
                                  for Business Process Management Systems  13:1--13:??
          Alaaeddine Yousfi and   
             Kimon Batoulis and   
                  Mathias Weske   Achieving Business Process Improvement
                                  via Ubiquitous Decision-Aware Business
                                  Processes  . . . . . . . . . . . . . . . 14:1--14:??
     Bedilia Estrada-Torres and   
Pedro Henrique Piccoli Richetti and   
Adela Del-Río-Ortega and   
Fernanda Araujo Baião and   
             Manuel Resinas and   
Flávia Maria Santoro and   
     Antonio Ruiz-Cortés   Measuring Performance in
                                  Knowledge-intensive Processes  . . . . . 15:1--15:??
       Abel Armas-Cervantes and   
               Marlon Dumas and   
           Marcello La Rosa and   
          Abderrahmane Maaradji   Local Concurrency Detection in Business
                                  Process Event Logs . . . . . . . . . . . 16:1--16:??

ACM Transactions on Internet Technology (TOIT)
Volume 19, Number 2, April, 2019

            Francesco Longo and   
          Antonio Puliafito and   
                      Omer Rana   Guest Editors' Introduction to the
                                  Special Issue on Fog, Edge, and Cloud
                                  Integration for Smart Environments . . . 17:1--17:??
            Carlo Puliafito and   
              Enzo Mingozzi and   
            Francesco Longo and   
          Antonio Puliafito and   
                      Omer Rana   Fog Computing for the Internet of
                                  Things: a Survey . . . . . . . . . . . . 18:1--18:??
             Madhurima Pore and   
             Vinaya Chakati and   
              Ayan Banerjee and   
            Sandeep K. S. Gupta   ContextAiDe: End-to-End Architecture for
                                  Mobile Crowd-sensing Applications  . . . 19:1--19:??
           Federico Concone and   
             Giuseppe Lo Re and   
                   Marco Morana   A Fog-Based Application for Human
                                  Activity Recognition Using Personal
                                  Smart Devices  . . . . . . . . . . . . . 20:1--20:??
                      He Li and   
                  Kaoru Ota and   
                 Mianxiong Dong   Deep Reinforcement Scheduling for Mobile
                                  Crowdsensing in Fog Computing  . . . . . 21:1--21:??
               Farzad Samie and   
      Vasileios Tsoutsouras and   
                 Lars Bauer and   
             Sotirios Xydis and   
          Dimitrios Soudris and   
               Jörg Henkel   Oops: Optimizing Operation-mode
                                  Selection for IoT Edge Devices . . . . . 22:1--22:??
             Marios Avgeris and   
     Dimitrios Dechouniotis and   
    Nikolaos Athanasopoulos and   
           Symeon Papavassiliou   Adaptive Resource Allocation for
                                  Computation Offloading: a
                                  Control-Theoretic Approach . . . . . . . 23:1--23:??
      Houssemeddine Mazouzi and   
               Nadjib Achir and   
               Khaled Boussetta   DM2-ECOP: an Efficient Computation
                                  Offloading Policy for Multi-user
                                  Multi-cloudlet Mobile Edge Computing
                                  Environment  . . . . . . . . . . . . . . 24:1--24:??
          D. R. Vasconcelos and   
           R. M. C. Andrade and   
                V. Severino and   
                 J. N. De Souza   Cloud, Fog, or Mist in IoT? That Is the
                                  Question . . . . . . . . . . . . . . . . 25:1--25:??
                   Jun Feng and   
           Laurence T. Yang and   
                  Ronghao Zhang   Practical Privacy-preserving High-order
                                  Bi-Lanczos in Integrated Edge-Fog-Cloud
                                  Architecture for Cyber-Physical-Social
                                  Systems  . . . . . . . . . . . . . . . . 26:1--26:??
              Luca Ferretti and   
            Mirco Marchetti and   
              Michele Colajanni   Fog-based Secure Communications for
                                  Low-power IoT Devices  . . . . . . . . . 27:1--27:??
           Giovanni Merlino and   
              Rustem Dautov and   
        Salvatore Distefano and   
                   Dario Bruneo   Enabling Workload Engineering in Edge,
                                  Fog, and Cloud Computing through
                                  OpenStack-based Middleware . . . . . . . 28:1--28:??
                  L. Baresi and   
      D. F. Mendonça and   
                 M. Garriga and   
                  S. Guinea and   
                 G. Quattrocchi   A Unified Model for the
                                  Mobile-Edge-Cloud Continuum  . . . . . . 29:1--29:??
                   Min Chen and   
                     Wei Li and   
          Giancarlo Fortino and   
                  Yixue Hao and   
                    Long Hu and   
                    Iztok Humar   A Dynamic Service Migration Mechanism in
                                  Edge Cognitive Computing . . . . . . . . 30:1--30:??

ACM Transactions on Internet Technology (TOIT)
Volume 19, Number 3, November, 2019

                      Li Ye and   
                  Weijie Wu and   
           Richard T. B. Ma and   
                 John C. S. Lui   On the Profitability of Bundling Sale
                                  Strategy for Online Service Markets With
                                  Network Effects  . . . . . . . . . . . . 31:1--31:??
Ricardo J. Rodríguez and   
   Rafael Tolosana-calasanz and   
                   Omer F. Rana   A Dynamic Data-throttling Approach to
                                  Minimize Workflow Imbalance  . . . . . . 32:1--32:??
               Jianwei Qian and   
              Xiang-Yang Li and   
                 Taeho Jung and   
                   Yang Fan and   
                    Yu Wang and   
                   Shaojie Tang   Social Network De-anonymization: More
                                  Adversarial Knowledge, More Users
                                  Re-identified? . . . . . . . . . . . . . 33:1--33:??
               Eduardo Lima and   
                 Weishi Shi and   
                  Xumin Liu and   
                          Qi Yu   Integrating Multi-level Tag
                                  Recommendation with External Knowledge
                                  Bases for Automatic Question Answering   34:1--34:??
                Zexun Jiang and   
                    Hao Yin and   
                   Yulei Wu and   
              Yongqiang Lyu and   
                 Geyong Min and   
                       Xu Zhang   Constructing Novel Block Layouts for
                                  Webpage Analysis . . . . . . . . . . . . 35:1--35:??
              Qingyang Wang and   
             Shungeng Zhang and   
          Yasuhiko Kanemasa and   
                      Calton Pu   Mitigating Tail Response Time of
                                  $n$-Tier Applications: The Impact of
                                  Asynchronous Invocations . . . . . . . . 36:1--36:??
           Schahram Dustdar and   
                Surya Nepal and   
                    James Joshi   Introduction to the Special Section on
                                  Advances in Internet-based Collaborative
                                  Technologies . . . . . . . . . . . . . . 37:1--37:??
              Xiaodong Ning and   
                   Lina Yao and   
         Boualem Benatallah and   
               Yihong Zhang and   
              Quan Z. Sheng and   
               Salil S. Kanhere   Source-Aware Crisis-Relevant Tweet
                                  Identification and Key Information
                                  Summarization  . . . . . . . . . . . . . 37:1--37:??
            Rafael Angarita and   
            Bruno Lef\`evre and   
              Shohreh Ahvar and   
                Ehsan Ahvar and   
        Nikolaos Georgantas and   
         Valérie Issarny   Universal Social Network Bus: Toward the
                                  Federation of Heterogeneous Online
                                  Social Network Services  . . . . . . . . 38:1--38:??
     Christian Von Der Weth and   
               Ashraf Abdul and   
         Abhinav R. Kashyap and   
           Mohan S. Kankanhalli   CloseUp --- a Community-Driven Live
                                  Online Search Engine . . . . . . . . . . 39:1--39:??
              Saptarshi Das and   
               Shamik Sural and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   Policy Adaptation in Hierarchical
                                  Attribute-based Access Control Systems   40:1--40:??
Harsha S. Gardiyawasam Pussewalage and   
          Vladimir A. Oleshchuk   An Anonymous Delegatable Attribute-based
                                  Credential Scheme for a Collaborative
                                  E-health Environment . . . . . . . . . . 41:1--41:??
           Muhamad Felemban and   
              Emad Felemban and   
                Jason Kobes and   
                   Arif Ghafoor   Threat Management in Data-centric
                                  IoT-Based Collaborative Systems  . . . . 42:1--42:??
                 Daniel Sun and   
               Shiping Chen and   
                Guoqiang Li and   
             Yuanyuan Zhang and   
                  Muhammad Atif   Multi-objective Optimisation of Online
                                  Distributed Software Update for DevOps
                                  in Clouds  . . . . . . . . . . . . . . . 43:1--43:??

ACM Transactions on Internet Technology (TOIT)
Volume 19, Number 4, November, 2019

                Pasquale De Meo   Trust Prediction via Matrix
                                  Factorisation  . . . . . . . . . . . . . 44:1--44:??
                  Jie Zhang and   
             Jamal Bentahar and   
               Rino Falcone and   
          Timothy J. Norman and   
                   Murat Sensoy   Introduction to the Special Section on
                                  Trust and AI . . . . . . . . . . . . . . 44:1--44:??
      Feyza Merve Hafizoglu and   
                     Sandip Sen   Understanding the Influences of Past
                                  Experience on Trust in Human-agent
                                  Teamwork . . . . . . . . . . . . . . . . 45:1--45:??
      Claudia-Lavinia Ignat and   
            Quang-Vinh Dang and   
              Valerie L. Shalin   The Influence of Trust Score on
                                  Cooperative Behavior . . . . . . . . . . 46:1--46:??
               Manel Mrabet and   
            Yosra Ben Saied and   
            Leila Azouz Saidane   CAN-TM: Chain Augmented Na\"\ive
                                  Bayes-based Trust Model for Reliable
                                  Cloud Service Selection  . . . . . . . . 47:1--47:??
           Teng-Chieh Huang and   
       Razieh Nokhbeh Zaeem and   
              K. Suzanne Barber   It Is an Equal Failing to Trust
                                  Everybody and to Trust Nobody: Stock
                                  Price Prediction Using Trust Filters and
                                  Enhanced User Sentiment on Twitter . . . 48:1--48:??
               Yanjiao Chen and   
                    Xu Wang and   
                 Baochun Li and   
                     Qian Zhang   An Incentive Mechanism for Crowdsourcing
                                  Systems with Network Effects . . . . . . 49:1--49:??
                   Kai Wang and   
                   Wei Quan and   
                  Nan Cheng and   
               Mingyuan Liu and   
                     Yu Liu and   
                H. Anthony Chan   Betweenness Centrality Based Software
                                  Defined Routing: Observation from
                                  Practical Internet Datasets  . . . . . . 50:1--50:??
               Fadwa Estuka and   
                   James Miller   A Pure Visual Approach for Automatically
                                  Extracting and Aligning Structured Web
                                  Data . . . . . . . . . . . . . . . . . . 51:1--51:??
                   Hong Xie and   
                  Weijie Wu and   
           Richard T. B. Ma and   
                 John C. S. Lui   Pay as Your Service Needs: an
                                  Application-Driven Pricing Approach for
                                  the Internet Economics . . . . . . . . . 52:1--52:??


ACM Transactions on Internet Technology (TOIT)
Volume 20, Number 1, March, 2020

                       Ling Liu   Internet Technology Outlook: From
                                  Communication to Storage and Cognitive
                                  Computing  . . . . . . . . . . . . . . . 1:1--1:4
           Tarek Abdelzaher and   
                  Yifan Hao and   
         Kasthuri Jayarajah and   
               Archan Misra and   
                 Per Skarin and   
               Shuochao Yao and   
          Dulanga Weerakoon and   
   Karl-Erik Årzén   Five Challenges in Cloud-enabled
                                  Intelligence and Control . . . . . . . . 3:1--3:19
                  Calton Pu and   
             Abhijit Suprem and   
         Rodrigo Alves Lima and   
               Aibek Musaev and   
                    De Wang and   
               Danesh Irani and   
                 Steve Webb and   
          Joao Eduardo Ferreira   Beyond Artificial Reality: Finding and
                                  Monitoring Live Events from Social
                                  Sensors  . . . . . . . . . . . . . . . . 2:1--2:21
                 Zhengdi Hu and   
               Guangquan Xu and   
                   Xi Zheng and   
                  Jiang Liu and   
               Zhangbing Li and   
              Quan Z. Sheng and   
               Wenjuan Lian and   
                     Hequn Xian   SSL-SVD: Semi-supervised Learning-based
                                  Sparse Trust Recommendation  . . . . . . 4:1--4:20
           Binanda Sengupta and   
                 Yingjiu Li and   
                     Kai Bu and   
                 Robert H. Deng   Privacy-preserving Network Path
                                  Validation . . . . . . . . . . . . . . . 5:1--5:27
             Amitangshu Pal and   
                 Mayank Raj and   
               Krishna Kant and   
                   Sajal K. Das   A Smartphone-based Network Architecture
                                  for Post-disaster Operations Using WiFi
                                  Tethering  . . . . . . . . . . . . . . . 6:1--6:27
                Rui Pascoal and   
             Ana De Almeida and   
                  Rute C. Sofia   Mobile Pervasive Augmented Reality
                                  Systems --- MPARS: The Role of User
                                  Preferences in the Perceived Quality of
                                  Experience in Outdoor Applications . . . 7:1--7:17

ACM Transactions on Internet Technology (TOIT)
Volume 20, Number 2, March, 2020

       Demetris Paschalides and   
    Dimosthenis Stephanidis and   
            Andreas Andreou and   
             Kalia Orphanou and   
              George Pallis and   
        Marios D. Dikaiakos and   
             Evangelos Markatos   MANDOLA: a Big-Data Processing and
                                  Visualization Platform for Monitoring
                                  and Detecting Online Hate Speech . . . . 11:1--11:21
 Flor-Miriam Plaza-Del-Arco and   
M. Dolores Molina-González and   
L. Alfonso Ureña-López and   
M. Teresa Martín-Valdivia   Detecting Misogyny and Xenophobia in
                                  Spanish Tweets Using Language
                                  Technologies . . . . . . . . . . . . . . 12:1--12:19
                  Shuo Wang and   
         Aishan Maoliniyazi and   
                   Xinle Wu and   
                  Xiaofeng Meng   Emo2Vec: Learning Emotional Embeddings
                                  via Multi-Emotion Category . . . . . . . 13:1--13:17
             Amitangshu Pal and   
                   Krishna Kant   Exploiting Proxy Sensing for Efficient
                                  Monitoring of Large-Scale Sensor
                                  Networks . . . . . . . . . . . . . . . . 14:1--14:31
              Zhiheng Zhong and   
                 Rajkumar Buyya   A Cost-Efficient Container Orchestration
                                  Strategy in Kubernetes-Based Cloud
                                  Computing Infrastructures with
                                  Heterogeneous Resources  . . . . . . . . 15:1--15:24
              Xingbin Jiang and   
               Michele Lora and   
          Sudipta Chattopadhyay   An Experimental Analysis of Security
                                  Vulnerabilities in Industrial IoT
                                  Devices  . . . . . . . . . . . . . . . . 16:1--16:24
         Christos Tsigkanos and   
             Martin Garriga and   
             Luciano Baresi and   
                   Carlo Ghezzi   Cloud Deployment Tradeoffs for the
                                  Analysis of Spatially Distributed
                                  Internet of Things Systems . . . . . . . 17:1--17:23
                  Ting Chen and   
                   Zihao Li and   
                 Yuxiao Zhu and   
                Jiachi Chen and   
                  Xiapu Luo and   
         John Chi-Shing Lui and   
               Xiaodong Lin and   
                 Xiaosong Zhang   Understanding Ethereum via Graph
                                  Analysis . . . . . . . . . . . . . . . . 18:1--18:32
               Bilal Ghanem and   
                Paolo Rosso and   
               Francisco Rangel   An Emotional Analysis of False
                                  Information in Social Media and News
                                  Articles . . . . . . . . . . . . . . . . 19:1--19:18

ACM Transactions on Internet Technology (TOIT)
Volume 20, Number 3, October, 2020

              Rute C. Sofia and   
            Eve M. Schooler and   
              Dirk Kutscher and   
                  Chris Winkler   Introduction to the Special Issue on
                                  Evolution of IoT Networking
                                  Architectures  . . . . . . . . . . . . . 20:1--20:2
           Marcel Enguehard and   
          Yoann Desmouceaux and   
            Giovanna Carofiglio   Efficient Latency Control in Fog
                                  Deployments via Hardware-Accelerated
                                  Popularity Estimation  . . . . . . . . . 21:1--21:23
                K. Panagidi and   
         C. Anagnostopoulos and   
            A. Chalvatzaras and   
            S. Hadjiefthymiades   To Transmit or Not to Transmit:
                                  Controlling Communications in the Mobile
                                  IoT Domain . . . . . . . . . . . . . . . 22:1--22:23
                  Xia Cheng and   
                Junyang Shi and   
                         Mo Sha   Cracking Channel Hopping Sequences and
                                  Graph Routes in Industrial TSCH Networks 23:1--23:28
               Jiaoyan Chen and   
           Laurence T. Yang and   
               Xianjun Deng and   
             Xianggong Hong and   
                     Lingzhi Yi   Optimal Receiver Placement for
                                  $K$-barrier Coverage in Passive Bistatic
                                  Radar Sensor Networks  . . . . . . . . . 24:1--24:23
            Zakaria Benomar and   
            Francesco Longo and   
           Giovanni Merlino and   
              Antonio Puliafito   Cloud-based Enabling Mechanisms for
                                  Container Deployment and Migration at
                                  the Network Edge . . . . . . . . . . . . 25:1--25:28
            Giuseppe Faraci and   
           Christian Grasso and   
              Giovanni Schembra   Fog in the Clouds: UAVs to Provide Edge
                                  Computing to IoT Devices . . . . . . . . 26:1--26:26
                 Jan Seeger and   
          Arne Bröring and   
                    Georg Carle   Optimally Self-Healing IoT
                                  Choreographies . . . . . . . . . . . . . 27:1--27:20
                Junyang Shi and   
                         Mo Sha   Parameter Self-Adaptation for Industrial
                                  Wireless Sensor--Actuator Networks . . . 28:1--28:28
             Marcin Luckner and   
             Maciej Grzenda and   
             Robert Kunicki and   
             Jaroslaw Legierski   IoT Architecture for Urban Data-Centric
                                  Services and Applications  . . . . . . . 29:1--29:30
Nikolaos Athanasios Anagnostopoulos and   
                 Saad Ahmad and   
                 Tolga Arul and   
         Daniel Steinmetzer and   
           Matthias Hollick and   
           Stefan Katzenbeisser   Low-cost Security for Next-generation
                                  IoT Networks . . . . . . . . . . . . . . 30:1--30:31

ACM Transactions on Internet Technology (TOIT)
Volume 20, Number 4, November, 2020

                  Runhua Xu and   
                    James Joshi   Trustworthy and Transparent Third-party
                                  Authority  . . . . . . . . . . . . . . . 31:1--31:23
                  Meng Wang and   
                   Bo Cheng and   
                  Junliang Chen   An Efficient Service Function Chaining
                                  Placement Algorithm in Mobile Edge
                                  Computing  . . . . . . . . . . . . . . . 32:1--32:21
                  Xiaoyu Ge and   
       Panos K. Chrysanthis and   
   Konstantinos Pelechrinis and   
Demetrios Zeinalipour-Yazti and   
              Mohamed A. Sharaf   Serendipity-based Points-of-Interest
                                  Navigation . . . . . . . . . . . . . . . 33:1--33:32
        Michalis Pachilakis and   
       Antonios A. Chariton and   
    Panagiotis Papadopoulos and   
            Panagiotis Ilia and   
            Eirini Degkleri and   
          Evangelos P. Markatos   Design and Implementation of a
                                  Compressed Certificate Status Protocol   34:1--34:25
               Elias Rohrer and   
             Steffen Heidel and   
              Florian Tschorsch   Enabling Reference Verifiability for the
                                  World Wide Web with Webchain . . . . . . 35:1--35:23
                  Yang Zhou and   
                   Ling Liu and   
                 Kisung Lee and   
          Balaji Palanisamy and   
                       Qi Zhang   Improving Collaborative Filtering with
                                  Social Influence over Heterogeneous
                                  Information Networks . . . . . . . . . . 36:1--36:29
                   Hong Xie and   
                 Yongkun Li and   
                 John C. S. Lui   A Reinforcement Learning Approach to
                                  Optimize Discount and Reputation
                                  Tradeoffs in E-commerce Systems  . . . . 37:1--37:26
                Weichao Gao and   
               James Nguyen and   
                  Yalong Wu and   
         William G. Hatcher and   
                         Wei Yu   Routing in Large-scale Dynamic Networks:
                                  a Bloom Filter-based Dual-layer Scheme   38:1--38:24
         Grigorios Loukides and   
             Robert Gwadera and   
                Shing-Wan Chang   Overexposure-Aware Influence
                                  Maximization . . . . . . . . . . . . . . 39:1--39:31
                  Xudong Wu and   
                   Luoyi Fu and   
                Zixin Zhang and   
                  Huan Long and   
               Jingfan Meng and   
               Xinbing Wang and   
                    Guihai Chen   Evolving Influence Maximization in
                                  Evolving Networks  . . . . . . . . . . . 40:1--40:31
                    Na Ruan and   
                Dongli Zhou and   
                     Weijia Jia   Ursa: Robust Performance for Nakamoto
                                  Consensus with Self-adaptive Throughput  41:1--41:26
               Chunli Huang and   
               Wenjun Jiang and   
                     Jie Wu and   
                    Guojun Wang   Personalized Review Recommendation based
                                  on Users' Aspect Sentiment . . . . . . . 42:1--42:26
              Hongshuai Ren and   
                  Yang Wang and   
              Chengzhong Xu and   
                        Xi Chen   SMig-RL: an Evolutionary Migration
                                  Framework for Cloud Services Based on
                                  Deep Reinforcement Learning  . . . . . . 43:1--43:18
           Slava Novgorodov and   
                    Ido Guy and   
                   Guy Elad and   
                  Kira Radinsky   Descriptions from the Customers:
                                  Comparative Analysis of Review-based
                                  Product Description Generation Methods   44:1--44:31
         Kostas Kolomvatsos and   
       Christos Anagnostopoulos   An Intelligent Edge-centric Queries
                                  Allocation Scheme based on Ensemble
                                  Models . . . . . . . . . . . . . . . . . 45:1--45:25


ACM Transactions on Internet Technology (TOIT)
Volume 21, Number 1, February, 2021

                Paolo Boldi and   
               Georgios Gousios   Fine-Grained Network Analysis for Modern
                                  Software Ecosystems  . . . . . . . . . . 1:1--1:14
                Liwei Huang and   
                   Yutao Ma and   
                  Yanbo Liu and   
                      Keqing He   DAN-SNR: a Deep Attentive Network for
                                  Social-aware Next Point-of-interest
                                  Recommendation . . . . . . . . . . . . . 2:1--2:27
               Wensheng Gan and   
         Jerry Chun-Wei Lin and   
    Philippe Fournier-Viger and   
             Han-Chieh Chao and   
                   Philip S. Yu   Beyond Frequency: Utility Mining with
                                  Varied Item-specific Minimum Utility . . 3:1--3:32
             Sabah Mohammed and   
              Jinan Fiaidhi and   
               Carlos Ramos and   
               Tai-Hoon Kim and   
               Wai Chi Fang and   
               Tarek Abdelzaher   Blockchain in eCommerce: a Special Issue
                                  of the \booktitleACM Transactions on
                                  Internet of Things . . . . . . . . . . . 4:11--4:55
                Yongjun Ren and   
                    Jian Qi and   
                 Yepeng Liu and   
                   Jin Wang and   
                  Gwang-Jun Kim   Integrity Verification Mechanism of
                                  Sensor Data Based on Bilinear Map
                                  Accumulator  . . . . . . . . . . . . . . 5:1--5:19
                Honghao Gao and   
               Wanqiu Huang and   
                    Yucong Duan   The Cloud-edge-based Dynamic
                                  Reconfiguration to Service Workflow for
                                  Mobile Ecommerce Environments: a QoS
                                  Prediction Perspective . . . . . . . . . 6:1--6:23
                Xiaolong Xu and   
                  Dawei Zhu and   
              Xiaoxian Yang and   
                  Shuo Wang and   
                Lianyong Qi and   
                    Wanchun Dou   Concurrent Practical Byzantine Fault
                                  Tolerance for Integration of Blockchain
                                  and Supply Chain . . . . . . . . . . . . 7:1--7:17
                  Junho Kim and   
                    Mucheol Kim   Intelligent Mediator-based Enhanced
                                  Smart Contract for Privacy Protection    8:1--8:16
             Shuiguang Deng and   
              Guanjie Cheng and   
              Hailiang Zhao and   
                Honghao Gao and   
                    Jianwei Yin   Incentive-Driven Computation Offloading
                                  in Blockchain-Enabled E-Commerce . . . . 9:1--9:19
                 Liang Chen and   
               Jiaying Peng and   
                   Yang Liu and   
                 Jintang Li and   
                Fenfang Xie and   
                    Zibin Zheng   Phishing Scams Detection in Ethereum
                                  Transaction Network  . . . . . . . . . . 10:1--10:16
               Lichen Cheng and   
                Jiqiang Liu and   
                     Yi Jin and   
                  Yidong Li and   
                       Wei Wang   Account Guarantee Scheme: Making
                                  Anonymous Accounts Supervised in
                                  Blockchain . . . . . . . . . . . . . . . 11:1--11:19
                Zhitao Guan and   
                 Naiyu Wang and   
                Xunfeng Fan and   
                 Xueyan Liu and   
                 Longfei Wu and   
                    Shaohua Wan   Achieving Secure Search over Encrypted
                                  Data for e-Commerce: a Blockchain
                                  Approach . . . . . . . . . . . . . . . . 12:1--12:17
                A. Qun Song and   
                 Yuhao Chen and   
                  Yan Zhong and   
                    Kun Lan and   
                 Simon Fong and   
                    B. Rui Tang   A Supply-chain System Framework Based on
                                  Internet of Things Using Blockchain
                                  Technology . . . . . . . . . . . . . . . 13:1--13:24
                Junho Jeong and   
                Donghyo Kim and   
              Sun-Young Ihm and   
                Yangsun Lee and   
                     Yunsik Son   Multilateral Personal Portfolio
                                  Authentication System Based on
                                  Hyperledger Fabric . . . . . . . . . . . 14:1--14:17
                    You Sun and   
                    Rui Xue and   
                  Rui Zhang and   
                Qianqian Su and   
                      Sheng Gao   RTChain: a Reputation System with
                                  Transaction and Consensus Incentives for
                                  E-commerce Blockchain  . . . . . . . . . 15:1--15:24
           Mahmoud Barhamgi and   
           Michael N. Huhns and   
             Charith Perera and   
                    Pinar Yolum   Introduction to the Special Section on
                                  Human-centered Security, Privacy, and
                                  Trust in the Internet of Things  . . . . 16:1--16:3
                  Zheng Yan and   
                    Li Peng and   
                   Wei Feng and   
               Laurence T. Yang   Social-Chain: Decentralized Trust
                                  Evaluation Based on Blockchain in
                                  Pervasive Social Networking  . . . . . . 17:1--17:28
                A. K. Singh and   
                  S. Thakur and   
            Alireza Jolfaei and   
          Gautam Srivastava and   
               MD. Elhoseny and   
                       A. Mohan   Joint Encryption and Compression-Based
                                  Watermarking Technique for Security of
                                  Digital Documents  . . . . . . . . . . . 18:1--18:20
                  Cong Peng and   
               Jianhua Chen and   
          Pandi Vijayakumar and   
               Neeraj Kumar and   
                      Debiao He   Efficient Distributed Decryption Scheme
                                  for IoT Gateway-based Applications . . . 19:1--19:23
                Elie Chicha and   
           Bechara Al Bouna and   
             Mohamed Nassar and   
             Richard Chbeir and   
            Ramzi A. Haraty and   
            Mourad Oussalah and   
          Djamal Benslimane and   
           Mansour Naser Alraja   A User-Centric Mechanism for
                                  Sequentially Releasing Graph Datasets
                                  under Blowfish Privacy . . . . . . . . . 20:1--20:25
             Yekta Said Can and   
                      Cem Ersoy   Privacy-preserving Federated Deep
                                  Learning for Wearable IoT-based
                                  Biomedical Monitoring  . . . . . . . . . 21:1--21:17
                Edy Hourany and   
               Bachir Habib and   
          Camille Fountaine and   
           Abdallah Makhoul and   
             Benoit Piranda and   
               Julien Bourgeois   PROLISEAN: a New Security Protocol for
                                  Programmable Matter  . . . . . . . . . . 22:1--22:29
               Faiza Loukil and   
     Chirine Ghedira-Guegan and   
           Khouloud Boukadi and   
  A\"\icha-Nabila Benharkat and   
              Elhadj Benkhelifa   Data Privacy Based on IoT Device
                                  Behavior Control Using Blockchain  . . . 23:1--23:20
                   Kaixi Hu and   
                     Lin Li and   
               Jianquan Liu and   
                     Daniel Sun   DuroNet: a Dual-robust Enhanced
                                  Spatial-temporal Learning Network for
                                  Urban Crime Prediction . . . . . . . . . 24:1--24:24
               Vikram Mehta and   
               Daniel Gooch and   
             Arosha Bandara and   
               Blaine Price and   
                Bashar Nuseibeh   Privacy Care: a Tangible Interaction
                                  Framework for Privacy Management . . . . 25:1--25:32
            Tanusree Sharma and   
             Hunter A. Dyer and   
                Masooda. Bashir   Enabling User-centered Privacy Controls
                                  for Mobile Applications: COVID-19
                                  Perspective  . . . . . . . . . . . . . . 26:1--26:24

ACM Transactions on Internet Technology (TOIT)
Volume 21, Number 2, June, 2021

                Xuanzhe Liu and   
            Shangguang Wang and   
                     Yun Ma and   
                 Ying Zhang and   
                Qiaozhu Mei and   
                 Yunxin Liu and   
                     Gang Huang   Operating Systems for Resource-adaptive
                                  Intelligent Software: Challenges and
                                  Opportunities  . . . . . . . . . . . . . 27:1--27:19
        Francesco Piccialli and   
                 Nik Bessis and   
              Gwanggil Jeon and   
                      Calton Pu   Introduction to the Special Section on
                                  Data Science for Cyber-Physical Systems  28e:1--28e:7
                  Zhihan Lv and   
               Amit Kumar Singh   Big Data Analysis of Internet of Things
                                  System . . . . . . . . . . . . . . . . . 28:1--28:15
                 M. Tanveer and   
                  S. Sharma and   
                    K. Muhammad   Large-Scale Least Squares Twin SVMs  . . 29:1--29:19
           Claudio Savaglio and   
              Giancarlo Fortino   A Simulation-driven Methodology for IoT
                                  Data Mining Based on Edge Computing  . . 30:1--30:22
               Kuljeet Kaur and   
                 Sahil Garg and   
            Georges Kaddoum and   
                   Neeraj Kumar   Energy and SLA-driven MapReduce Job
                                  Scheduling Framework for Cloud-based
                                  Cyber-Physical Systems . . . . . . . . . 31:1--31:24
              Chun-Wei Tsai and   
                   Zhi-Yan Fang   An Effective Hyperparameter Optimization
                                  Algorithm for DNN to Predict Passengers
                                  at a Metro Station . . . . . . . . . . . 32:1--32:24
                     Pin Ni and   
                  Yuming Li and   
                 Gangmin Li and   
                   Victor Chang   A Hybrid Siamese Neural Network for
                                  Natural Language Inference in
                                  Cyber-Physical Systems . . . . . . . . . 33:1--33:25
                 Chen Zhang and   
                  Zhuo Tang and   
                   Kenli Li and   
             Jianzhong Yang and   
                        Li Yang   A Polishing Robot Force Control System
                                  Based on Time Series Data in Industrial
                                  Internet of Things . . . . . . . . . . . 34:1--34:22
                   Yuyu Yin and   
                  Haoran Xu and   
             Tingting Liang and   
                Manman Chen and   
                Honghao Gao and   
                Antonella Longo   Leveraging Data Augmentation for Service
                                  QoS Prediction in Cyber-physical Systems 35:1--35:25
             Martin Garriga and   
                 Koen Aarns and   
         Christos Tsigkanos and   
         Damian A. Tamburri and   
            Wjan Van Den Heuvel   DataOps for Cyber-Physical Systems
                                  Governance: The Airport Passenger Flow
                                  Case . . . . . . . . . . . . . . . . . . 36:1--36:25
                 Iris Weiss and   
        Birgit Vogel-Heuser and   
            Emanuel Trunzer and   
                   Simon Kruppa   Product Quality Monitoring in Hydraulic
                                  Presses Using a Minimal Sample of Sensor
                                  and Actuator Data  . . . . . . . . . . . 37:1--37:23
        Kkwang Raymond Choo and   
                Uttam Ghosh and   
                Deepak Tosh and   
             Reza M. Parizi and   
               Ali Dehghantanha   Introduction to the Special Issue on
                                  Decentralized Blockchain Applications
                                  and Infrastructures for Next Generation
                                  Cyber-Physical Systems . . . . . . . . . 38e:1--38e:3
               Laizhong Cui and   
                   Zhe Xiao and   
                Jiahao Wang and   
                   Fei Chen and   
                     Yi Pan and   
                    Hua Dai and   
                       Jing Qin   Improving Vaccine Safety Using
                                  Blockchain . . . . . . . . . . . . . . . 38:1--38:24
          Truc D. T. Nguyen and   
                     My T. Thai   A Blockchain-based Iterative Double
                                  Auction Protocol Using Multiparty State
                                  Channels . . . . . . . . . . . . . . . . 39:1--39:22
                   Chao Lin and   
                  Debiao He and   
           Sherali Zeadally and   
                Xinyi Huang and   
                        Zhe Liu   Blockchain-based Data Sharing System for
                                  Sensing-as-a-Service in Smart Cities . . 40:1--40:21
                   Jun Feng and   
           Laurence T. Yang and   
                Yuxiang Zhu and   
          Nicholaus J. Gati and   
                       Yijun Mo   Blockchain-enabled Tensor-based
                                  Conditional Deep Convolutional GAN for
                                  Cyber-physical-Social Systems  . . . . . 41:1--41:17
                     Ye Luo and   
                   Zehai Su and   
                  Wei Zheng and   
               Zhaobin Chen and   
                 Fuqin Wang and   
               Zhemin Zhang and   
                    Jinjun Chen   A Novel Memory-hard Password Hashing
                                  Scheme for Blockchain-based
                                  Cyber-physical Systems . . . . . . . . . 42:1--42:21
                   Hao Wang and   
                Shenglan Ma and   
               Chaonian Guo and   
                   Yulei Wu and   
              Hong-Ning Dai and   
                          Di Wu   Blockchain-Based Power Energy Trading
                                  Management . . . . . . . . . . . . . . . 43:1--43:16
        Micha\l Król and   
            Alberto Sonnino and   
          Mustafa Al-Bassam and   
    Argyrios G. Tasiopoulos and   
          Etienne Rivi\`ere and   
                 Ioannis Psaras   Proof-of-Prestige: a Useful Work Reward
                                  System for Unverifiable Tasks  . . . . . 44:1--44:27
                    Bin Cao and   
                  Jiawei Wu and   
                Sichao Wang and   
                Honghao Gao and   
                   Jing Fan and   
             Shuiguang Deng and   
                Jianwei Yin and   
                       Xuan Liu   Unsupervised Derivation of Keyword
                                  Summary for Short Texts  . . . . . . . . 45:1--45:23
             Vandana Bharti and   
             Bhaskar Biswas and   
           Kaushal Kumar Shukla   A Novel Multiobjective GDWCN-PSO
                                  Algorithm and Its Application to Medical
                                  Data Security  . . . . . . . . . . . . . 46:1--46:28
                 Shijie Hao and   
                   Tao Chen and   
                  Yang Wang and   
                Yanrong Guo and   
                  Meng Wang and   
For the Alzheimer's Disease Neuroimaging Initiative   Adaptive Multi-Task Dual-Structured
                                  Learning with Its Application on
                                  Alzheimer's Disease Study  . . . . . . . 47:1--47:16
             Yuanpeng Zhang and   
              Yizhang Jiang and   
                Lianyong Qi and   
    Md Zakirul Alam Bhuiyan and   
                 Pengjiang Qian   Epilepsy Diagnosis Using Multi-view &
                                  Multi-medoid Entropy-based Clustering
                                  with Privacy Protection  . . . . . . . . 48:1--48:21
          Jimmy Ming-Tai Wu and   
          Gautam Srivastava and   
         Jerry Chun-Wei Lin and   
                      Qian Teng   A Multi-Threshold Ant Colony
                                  System-based Sanitization Model in
                                  Shared Medical Environments  . . . . . . 49:1--49:26
            Bjarne Pfitzner and   
              Nico Steckhan and   
                   Bert Arnrich   Federated Learning in a Medical Context:
                                  a Systematic Literature Review . . . . . 50:1--50:31
           Karam Bou-Chaaya and   
             Richard Chbeir and   
       Mansour Naser Alraja and   
           Philippe Arnould and   
             Charith Perera and   
           Mahmoud Barhamgi and   
              Djamal Benslimane   $ \delta $-Risk: Toward Context-aware
                                  Multi-objective Privacy Management in
                                  Connected Environments . . . . . . . . . 51:1--51:31
              Abhinav Kumar and   
         Sanjay Kumar Singh and   
              K. Lakshmanan and   
               Sonal Saxena and   
             Sameer Shrivastava   A Novel Cloud-Assisted Secure Deep
                                  Feature Classification Framework for
                                  Cancer Histopathology Images . . . . . . 52:1--52:22

ACM Transactions on Internet Technology (TOIT)
Volume 21, Number 3, June, 2021

           Amit Kumar Singh and   
                Jonathan Wu and   
                 Ali Al-Haj and   
                      Calton Pu   Introduction to the Special Section on
                                  Security and Privacy of Medical Data for
                                  Smart Healthcare . . . . . . . . . . . . 53:1--53:4
       Mohammed Al-Khafajiy and   
                 Safa Otoum and   
                 Thar Baker and   
              Muhammad Asim and   
             Zakaria Maamar and   
            Moayad Aloqaily and   
                Mark Taylor and   
                 Martin Randles   Intelligent Control and Security of Fog
                                  Resources in Healthcare Systems via a
                                  Cognitive Fog Model  . . . . . . . . . . 54:1--54:23
                  Zhihan Lv and   
            Francesco Piccialli   The Security of Medical Data on Internet
                                  Based on Differential Privacy Technology 55:1--55:18
                   Tao Wang and   
               Zhigao Zheng and   
          Ali Kashif Bashir and   
            Alireza Jolfaei and   
                      Yanyan Xu   FinPrivacy: a Privacy-preserving
                                  Mechanism for Fingerprint Identification 56:1--56:15
                  Zijie Yue and   
                 Shuai Ding and   
                   Lei Zhao and   
               Youtao Zhang and   
                 Zehong Cao and   
                 M. Tanveer and   
            Alireza Jolfaei and   
                       Xi Zheng   Privacy-preserving Time-series Medical
                                  Images Analysis Using a Hybrid Deep
                                  Learning Framework . . . . . . . . . . . 57:1--57:21
               Tae-Yeun Kim and   
              Sung-Hwan Kim and   
                        Hoon Ko   Design and Implementation of BCI-based
                                  Intelligent Upper Limb Rehabilitation
                                  Robot System . . . . . . . . . . . . . . 60:1--60:17
                  Cong Peng and   
                  Debiao He and   
               Jianhua Chen and   
               Neeraj Kumar and   
          Muhammad Khurram Khan   EPRT: an Efficient Privacy-Preserving
                                  Medical Service Recommendation and Trust
                                  Discovery Scheme for eHealth System  . . 61:1--61:24
              Somanka Maiti and   
               Ashish Kumar and   
                Smriti Jain and   
               Gaurav Bhatnagar   A Novel Image Inpainting Framework Using
                                  Regression . . . . . . . . . . . . . . . 62:1--62:16
                  Haolun Li and   
                Chi-Man Pun and   
                    Feng Xu and   
              Longsheng Pan and   
                   Rui Zong and   
                    Hao Gao and   
                      Huimin Lu   A Hybrid Feature Selection Algorithm
                                  Based on a Discrete Artificial Bee
                                  Colony for Parkinson's Diagnosis . . . . 63:1--63:22
                    Wei Wei and   
                Ammar Rayes and   
                   Wei Wang and   
                      Yiduo Mei   Special Section on AI-Empowered Internet
                                  of Things for Smart Cities . . . . . . . 64:1--64:3
        Mohamad Ali Mehrabi and   
              Naila Mukhtar and   
                Alireza Jolfaei   Power Side-Channel Analysis of RNS GLV
                                  ECC Using Machine and Deep Learning
                                  Algorithms . . . . . . . . . . . . . . . 65:1--65:20
               Guangwei Gao and   
                   Dong Zhu and   
                  Huimin Lu and   
                      Yi Yu and   
                Heyou Chang and   
                       Dong Yue   Robust Facial Image Super-Resolution by
                                  Kernel Locality-Constrained
                                  Coupled-Layer Regression . . . . . . . . 67:1--67:15
        Francesco Piccialli and   
            Fabio Giampaolo and   
           Edoardo Prezioso and   
              Danilo Crisci and   
                Salvatore Cuomo   Predictive Analytics for Smart Parking:
                                  a Deep Learning Approach in Forecasting
                                  of IoT Data  . . . . . . . . . . . . . . 68:1--68:21
               Feiran Huang and   
                Chaozhuo Li and   
                   Boyu Gao and   
                    Yun Liu and   
            Sattam Alotaibi and   
                       Hao Chen   Deep Attentive Multimodal Network
                                  Representation Learning for Social Media
                                  Images . . . . . . . . . . . . . . . . . 69:1--69:17
           David K. Y. Chiu and   
                     Tao Xu and   
                    Iker Gondra   Random Graph-based Multiple Instance
                                  Learning for Structured IoT Smart City
                                  Applications . . . . . . . . . . . . . . 70:1--70:17
                   Laha Ale and   
                 Ning Zhang and   
              Scott A. King and   
                 Jose Guardiola   Spatio-temporal Bayesian Learning for
                                  Mobile Edge Computing Resource Planning
                                  in Smart Cities  . . . . . . . . . . . . 72:1--72:21
           Celestine Iwendi and   
             Saif Ur Rehman and   
         Abdul Rehman Javed and   
               Suleman Khan and   
              Gautam Srivastava   Sustainable Security for the Internet of
                                  Things Using Artificial Intelligence
                                  Architectures  . . . . . . . . . . . . . 73:1--73:22
                 He-Xuan Hu and   
                Wen-Jie Mao and   
              Zhen-Zhou Lin and   
                   Qiang Hu and   
                       Ye Zhang   Multimodal Brain Tumor Segmentation
                                  Based on an Intelligent UNET--LSTM
                                  Algorithm in Smart Hospitals . . . . . . 74:1--74:14
                  Qianmu Li and   
               Shunmei Meng and   
               Xiaonan Sang and   
               Hanrui Zhang and   
               Shoujin Wang and   
          Ali Kashif Bashir and   
                  Keping Yu and   
                    Usman Tariq   Dynamic Scheduling Algorithm in Cyber
                                  Mimic Defense Architecture of Volunteer
                                  Computing  . . . . . . . . . . . . . . . 75:1--75:33
                    Wu Chen and   
                    Yong Yu and   
                   Keke Gai and   
                 Jiamou Liu and   
         Kim-Kwang Raymond Choo   Time-Efficient Ensemble Learning with
                                  Sample Exchange for Edge Computing . . . 76:1--76:17
               Mehedi Masud and   
            Parminder Singh and   
          Gurjot Singh Gaba and   
               Avinash Kaur and   
  Roobaea Alrobaea Alghamdi and   
          Mubarak Alrashoud and   
           Salman Ali Alqahtani   CROWD: Crow Search and Deep Learning
                                  based Feature Extractor for
                                  Classification of Parkinson's Disease    77:1--77:18
    Shehzad Ashraf Chaudhry and   
               Azeem Irshad and   
               Khalid Yahya and   
               Neeraj Kumar and   
              Mamoun Alazab and   
              Yousaf Bin Zikria   Rotating behind Privacy: an Improved
                                  Lightweight Authentication Scheme for
                                  Cloud-based IoT Environment  . . . . . . 78:1--78:19
              Lucia Cascone and   
        Aniello Castiglione and   
              Michele Nappi and   
             Fabio Narducci and   
                Ignazio Passero   Waiting for Tactile: Robotic and Virtual
                                  Experiences in the Fog . . . . . . . . . 79:1--79:19
                  Liang Tan and   
                     Na Shi and   
                  Keping Yu and   
            Moayad Aloqaily and   
                 Yaser Jararweh   A Blockchain-empowered Access Control
                                  Framework for Smart Devices in Green
                                  Internet of Things . . . . . . . . . . . 80:1--80:20

ACM Transactions on Internet Technology (TOIT)
Volume 21, Number 4, July, 2021

                 Safa Otoum and   
             Burak Kantarci and   
                Hussein Mouftah   A Comparative Study of AI-Based
                                  Intrusion Detection Techniques in
                                  Critical Infrastructures . . . . . . . . 81:1--81:22
           Mojtaba Alizadeh and   
     Mohammad Hesam Tadayon and   
            Kouichi Sakurai and   
              Hiroaki Anada and   
                Alireza Jolfaei   A Secure Ticket-Based Authentication
                                  Mechanism for Proxy Mobile IPv6 Networks
                                  in Volunteer Computing . . . . . . . . . 82:1--82:16
                  Zhihan Lv and   
             Dongliang Chen and   
               Amit Kumar Singh   Big Data Processing on Volunteer
                                  Computing  . . . . . . . . . . . . . . . 83:1--83:20
                   Bin Yuan and   
                   Chen Lin and   
                 Deqing Zou and   
      Laurence Tianruo Yang and   
                        Hai Jin   Detecting Malicious Switches for a
                                  Secure Software-defined Tactile Internet 84:1--84:23
               Mehedi Masud and   
          M. Shamim Hossain and   
           Hesham Alhumyani and   
       Sultan S. Alshamrani and   
          Omar Cheikhrouhou and   
              Saleh Ibrahim and   
            Ghulam Muhammad and   
        Amr E. Eldin Rashed and   
                    B. B. Gupta   Pre-Trained Convolutional Neural
                                  Networks for Breast Cancer Detection
                                  Using Ultrasound Images  . . . . . . . . 85:1--85:17
             Farooq Hoseiny and   
               Sadoon Azizi and   
          Mohammad Shojafar and   
                Rahim Tafazolli   Joint QoS-aware and Cost-efficient Task
                                  Scheduling for Fog-cloud Resources in a
                                  Volunteer Computing System . . . . . . . 86:1--86:21
         Ismaeel Al Ridhawi and   
            Moayad Aloqaily and   
                 Yaser Jararweh   An Incentive-based Mechanism for
                                  Volunteer Computing Using Blockchain . . 87:1--87:22
                      Di Wu and   
                    Wei Shi and   
                     Xiangyu Ma   A Novel Real-time Anti-spam Framework    88:1--88:27
          Jimmy Ming-Tai Wu and   
                  Qian Teng and   
          Gautam Srivastava and   
               Matin Pirouz and   
             Jerry Chun-Wei Lin   The Efficient Mining of Skyline Patterns
                                  from a Volunteer Computing Network . . . 89:1--89:20
              Yan-Chun Chen and   
             Ren-Hung Hwang and   
                Mu-Yen Chen and   
              Chih-Chin Wen and   
                  Chih-Ping Hsu   Screw Slot Quality Inspection System
                                  Based on Tactile Network . . . . . . . . 90:1--90:17
                  Huimin Lu and   
                    Liao Wu and   
          Giancarlo Fortino and   
               Schahram Dustdar   Introduction to the Special Section on
                                  Cognitive Robotics on 5G/6G Networks . . 91e:1--91e:3
                Zhiyang Lin and   
                  Jihua Zhu and   
                Zutao Jiang and   
                   Yujie Li and   
                 Yaochen Li and   
                     Zhongyu Li   Merging Grid Maps in Diverse Resolutions
                                  by the Context-based Descriptor  . . . . 91:1--91:21
                  Zhihan Lv and   
                 Liang Qiao and   
                   Qingjun Wang   Cognitive Robotics on 5G Networks  . . . 92:1--92:18
                    Xin Jin and   
                 Yuwei Duan and   
                 Ying Zhang and   
               Yating Huang and   
                Mengdong Li and   
                   Ming Mao and   
           Amit Kumar Singh and   
                       Yujie Li   Fast Search of Lightweight Block Cipher
                                  Primitives via Swarm-like Metaheuristics
                                  for Cyber Security . . . . . . . . . . . 93:1--93:15
                  Rushi Lan and   
                  Jing Wang and   
              Wenming Huang and   
              Zhenrong Deng and   
                  Xiyan Sun and   
                  Zhuo Chen and   
                    Xiaonan Luo   Chinese Emotional Dialogue Response
                                  Generation via Reinforcement Learning    94:1--94:17
                  Song Deng and   
                 Fulin Chen and   
                   Xia Dong and   
               Guangwei Gao and   
                     Xindong Wu   Short-term Load Forecasting by Using
                                  Improved GEP and Abnormal Load
                                  Recognition  . . . . . . . . . . . . . . 95:1--95:28
          Buddhadeb Pradhan and   
           Nirmal Baran Hui and   
         Diptendu Sinha Roy and   
          Gautam Srivastava and   
             Jerry Chun-Wei Lin   Game-Theoretic Strategic Coordination
                                  and Navigation of Multiple Wheeled
                                  Robots . . . . . . . . . . . . . . . . . 96:1--96:15
                   Min Chen and   
               Wenjing Xiao and   
                    Long Hu and   
                   Yujun Ma and   
                  Yin Zhang and   
                  Guangming Tao   Cognitive Wearable Robotics for Autism
                                  Perception Enhancement . . . . . . . . . 97:1--97:16
                 Wenpeng Lu and   
                     Rui Yu and   
               Shoujin Wang and   
                   Can Wang and   
                  Ping Jian and   
                    Heyan Huang   Sentence Semantic Matching Based on $3$D
                                  CNN for Human-Robot Language Interaction 98:1--98:24
                  Zhihan Lv and   
                 Liang Qiao and   
           Amit Kumar Singh and   
                   Qingjun Wang   AI-empowered IoT Security for Smart
                                  Cities . . . . . . . . . . . . . . . . . 99:1--99:21
             Ramesh Sekaran and   
               Rizwan Patan and   
                Fadi Al-Turjman   A Novel Approach for Efficient Packet
                                  Transmission in Volunteered Computing
                                  MANET  . . . . . . . . . . . . . . . . . 100:1--100:15
              Huniya Shahid and   
             Munam Ali Shah and   
             Ahmad Almogren and   
          Hasan Ali Khattak and   
               Ikram Ud Din and   
               Neeraj Kumar and   
                  Carsten Maple   Machine Learning-based Mist Computing
                                  Enabled Internet of Battlefield Things   101:1--101:26
                   Li Kuang and   
               Jianbo Zheng and   
                    Kemu Li and   
                    Honghao Gao   Intelligent Traffic Signal Control Based
                                  on Reinforcement Learning with State
                                  Reduction for Smart Cities . . . . . . . 102:1--102:24
      Rafael Salema Marques and   
         Gregory Epiphaniou and   
          Haider Al-Khateeb and   
              Carsten Maple and   
         Mohammad Hammoudeh and   
Paulo André Lima De Castro and   
           Ali Dehghantanha and   
         Kim Kwang Raymond Choo   A Flow-based Multi-agent Data
                                  Exfiltration Detection Architecture for
                                  Ultra-low Latency Networks . . . . . . . 103:1--103:30
                  Zhihan Lv and   
                 Liang Qiao and   
                Sahil Verma and   
                         Kavita   AI-enabled IoT-Edge Data Analytics for
                                  Connected Living . . . . . . . . . . . . 104:1--104:20
                 V. Gomathy and   
             K. Janarthanan and   
            Fadi Al-Turjman and   
              R. Sitharthan and   
                  M. Rajesh and   
              K. Vengatesan and   
                T. Priya Reshma   Investigating the Spread of Coronavirus
                                  Disease via Edge-AI and Air Pollution
                                  Correlation  . . . . . . . . . . . . . . 105:1--105:10
                   Wei Wang and   
               Junyang Chen and   
                Yushu Zhang and   
                Zhiguo Gong and   
               Neeraj Kumar and   
                        Wei Wei   A Multi-graph Convolutional Network
                                  Framework for Tourist Flow Prediction    106:1--106:13


ACM Transactions on Internet Technology (TOIT)
Volume 22, Number 1, February, 2022

              Gaurav Singal and   
                Vijay Laxmi and   
           Manoj Singh Gaur and   
               D. Vijay Rao and   
              Riti Kushwaha and   
                Deepak Garg and   
                   Neeraj Kumar   QoS-aware Mesh-based Multicast Routing
                                  Protocols in Edge Ad Hoc Networks:
                                  Concepts and Challenges  . . . . . . . . 1:1--1:27
                  Iram Bibi and   
            Adnan Akhunzada and   
            Jahanzaib Malik and   
      Muhammad Khurram Khan and   
                Muhammad Dawood   Secure Distributed Mobile Volunteer
                                  Computing with Android . . . . . . . . . 2:1--2:21
                  Chen Chen and   
                    Lei Liu and   
                Shaohua Wan and   
                Xiaozhe Hui and   
                     Qingqi Pei   Data Dissemination for Industry 4.0
                                  Applications in Internet of Vehicles
                                  Based on Short-term Traffic Prediction   3:1--3:18
                 Weiwei Lin and   
            Tiansheng Huang and   
                     Xin Li and   
                   Fang Shi and   
                Xiumin Wang and   
                Ching-Hsien Hsu   Energy-Efficient Computation Offloading
                                  for UAV-Assisted MEC: a Two-Stage
                                  Optimization Scheme  . . . . . . . . . . 4:1--4:23
                  Nan Jiang and   
                Debin Huang and   
                  Jing Chen and   
                    Jie Wen and   
                 Heng Zhang and   
                  Honglong Chen   Semi-Direct Monocular Visual-Inertial
                                  Odometry Using Point and Line Features
                                  for IoV  . . . . . . . . . . . . . . . . 5:1--5:23
            Muhammad Junaid and   
               Adnan Sohail and   
            Fadi Al Turjman and   
                     Rashid Ali   Agile Support Vector Machine for
                                  Energy-efficient Resource Allocation in
                                  IoT-oriented Cloud using PSO . . . . . . 6:1--6:35
                Afiya Ayman and   
      Amutheezan Sivagnanam and   
             Michael Wilbur and   
            Philip Pugliese and   
             Abhishek Dubey and   
                    Aron Laszka   Data-Driven Prediction and Optimization
                                  of Energy Use for Transit Fleets of
                                  Electric and ICE Vehicles  . . . . . . . 7:1--7:29
                Laura Verde and   
             Nadia Brancati and   
         Giuseppe De Pietro and   
               Maria Frucci and   
               Giovanna Sannino   A Deep Learning Approach for Voice
                                  Disorder Detection for Smart Connected
                                  Living Environments  . . . . . . . . . . 8:1--8:16
                Rahul Kumar and   
                Ankur Gupta and   
       Harkirat Singh Arora and   
          Balasubramanian Raman   IBRDM: an Intelligent Framework for
                                  Brain Tumor Classification Using
                                  Radiomics- and DWT-based Fusion of MRI
                                  Sequences  . . . . . . . . . . . . . . . 9:1--9:30
               Yanchen Qiao and   
               Weizhe Zhang and   
               Xiaojiang Du and   
                 Mohsen Guizani   Malware Classification Based on
                                  Multilayer Perception and Word2Vec for
                                  IoT Security . . . . . . . . . . . . . . 10:1--10:22
                David Major and   
         Danny Yuxing Huang and   
            Marshini Chetty and   
                  Nick Feamster   Alexa, Who Am I Speaking To?:
                                  Understanding Users' Ability to Identify
                                  Third-Party Apps on Amazon Alexa . . . . 11:1--11:22
                Marwa Daaji and   
                   Ali Ouni and   
    Mohamed Mohsen Gammoudi and   
              Salah Bouktif and   
           Mohamed Wiem Mkaouer   Multi-criteria Web Services Selection:
                                  Balancing the Quality of Design and
                                  Quality of Service . . . . . . . . . . . 12:1--12:31
               Sajib Mistry and   
                     Lie Qu and   
             Athman Bouguettaya   Layer-based Composite Reputation
                                  Bootstrapping  . . . . . . . . . . . . . 13:1--13:28
     Ghazale Amel Zendehdel and   
              Ratinder Kaur and   
          Inderpreet Chopra and   
         Natalia Stakhanova and   
                    Erik Scheme   Automated Security Assessment Framework
                                  for Wearable BLE-enabled Health
                                  Monitoring Devices . . . . . . . . . . . 14:1--14:31
                Ryan Dailey and   
              Aniesh Chawla and   
                 Andrew Liu and   
             Sripath Mishra and   
                 Ling Zhang and   
                Josh Majors and   
             Yung-Hsiang Lu and   
        George K. Thiruvathukal   Automated Discovery of Network Cameras
                                  in Heterogeneous Web Pages . . . . . . . 15:1--15:25
          Menatalla Abououf and   
               Shakti Singh and   
                 Hadi Otrok and   
              Rabeb Mizouni and   
                Ernesto Damiani   Machine Learning in Mobile Crowd
                                  Sourcing: a Behavior-Based Recruitment
                                  Model  . . . . . . . . . . . . . . . . . 16:1--16:28
                 Ovidiu Dan and   
             Vaibhav Parikh and   
               Brian D. Davison   IP Geolocation through Reverse DNS . . . 17:1--17:29
                   Di Zhang and   
                    Feng Xu and   
                Chi-Man Pun and   
                  Yang Yang and   
                  Rushi Lan and   
                Liejun Wang and   
                   Yujie Li and   
                        Hao Gao   Virtual Reality Aided High-Quality $3$D
                                  Reconstruction by Remote Drones  . . . . 18:1--18:20
            Zakaria Benomar and   
            Francesco Longo and   
           Giovanni Merlino and   
              Antonio Puliafito   Cloud-based Network Virtualization in
                                  IoT with OpenStack . . . . . . . . . . . 19:1--19:26
              Jingjing Wang and   
               Wenjun Jiang and   
                   Kenli Li and   
                Guojun Wang and   
                       Keqin Li   Incremental Group-Level Popularity
                                  Prediction in Online Social Networks . . 20:1--20:26
             Alessio Pagani and   
              Zhuangkun Wei and   
              Ricardo Silva and   
                      Weisi Guo   Neural Network Approximation of Graph
                                  Fourier Transform for Sparse Sampling of
                                  Networked Dynamics . . . . . . . . . . . 21:1--21:18
                 Zhenyu Fan and   
                  Wang Yang and   
                     Fan Wu and   
                   Jing Cao and   
                    Weisong Shi   Serving at the Edge: an Edge Computing
                                  Service Architecture Based on ICN  . . . 22:1--22:27
                Mengmeng Ge and   
                Jin-Hee Cho and   
              Dongseong Kim and   
               Gaurav Dixit and   
                   Ing-Ray Chen   Proactive Defense for
                                  Internet-of-things: Moving Target
                                  Defense With Cyberdeception  . . . . . . 24:1--24:31
              Florian Meier and   
             Alexander Bazo and   
                David Elsweiler   Using Social Media Data to Analyse Issue
                                  Engagement During the 2017 German
                                  Federal Election . . . . . . . . . . . . 25:1--25:25
           Cosmin Avasalcai and   
         Christos Tsigkanos and   
               Schahram Dustdar   Adaptive Management of Volatile Edge
                                  Systems at Runtime With Satisfiability   26:1--26:21
             Onuralp Ulusoy and   
                    Pinar Yolum   PANOLA: a Personal Assistant for
                                  Supporting Users in Preserving Privacy   27:1--27:32
               Ashima Yadav and   
       Dinesh Kumar Vishwakarma   A Language-independent Network to
                                  Analyze the Impact of COVID-19 on the
                                  World via Sentiment Analysis . . . . . . 28:1--28:30

ACM Transactions on Internet Technology (TOIT)
Volume 22, Number 2, May, 2022

                  Yali Yuan and   
            Chencheng Liang and   
                    Xu Chen and   
                 Thar Baker and   
                    Xiaoming Fu   Adaptive Fuzzy Game-Based
                                  Energy-Efficient Localization in $3$D
                                  Underwater Sensor Networks . . . . . . . 29:1--29:20
         Nikumani Choudhury and   
               Rakesh Matam and   
           Mithun Mukherjee and   
                   Jaime Lloret   DADC: a Novel Duty-cycling Scheme for
                                  IEEE 802.15.4 Cluster-tree-based IoT
                                  Applications . . . . . . . . . . . . . . 30:1--30:26
                Jianfeng Lu and   
                 Zhao Zhang and   
              Jiangtao Wang and   
                 Ruixuan Li and   
                    Shaohua Wan   A Green Stackelberg-game Incentive
                                  Mechanism for Multi-service Exchange in
                                  Mobile Crowdsensing  . . . . . . . . . . 31:1--31:29
          Bruno Carpentieri and   
      Arcangelo Castiglione and   
          Alfredo De Santis and   
         Francesco Palmieri and   
            Raffaele Pizzolante   Privacy-preserving Secure Media
                                  Streaming for Multi-user Smart
                                  Environments . . . . . . . . . . . . . . 32:1--32:21
               Hongyang Yan and   
                  Nan Jiang and   
                    Kang Li and   
                 Yilei Wang and   
                     Guoyu Yang   Collusion-free for Cloud Verification
                                  toward the View of Game Theory . . . . . 33:1--33:21
                  Wei Liang and   
                Songyou Xie and   
               Dafang Zhang and   
                   Xiong Li and   
                  Kuan-ching Li   A Mutual Security Authentication Method
                                  for RFID-PUF Circuit Based on Deep
                                  Learning . . . . . . . . . . . . . . . . 34:1--34:20
      Mohammad Shorfuzzaman and   
              M. Shamim Hossain   Predictive Analytics of Energy Usage by
                                  IoT-Based Smart Home Appliances for
                                  Green Urban Development  . . . . . . . . 35:1--35:26
      Gunasekaran Manogaran and   
            Bharat S. Rawal and   
               Houbing Song and   
                Huihui Wang and   
             Chinghsien Hsu and   
    Vijayalakshmi Saravanan and   
      Seifedine Nimer Kadry and   
             P. Mohamed Shakeel   Optimal Energy-Centric Resource
                                  Allocation and Offloading Scheme for
                                  Green Internet of Things Using Machine
                                  Learning . . . . . . . . . . . . . . . . 36:1--36:19
          Kamran Ahmad Awan and   
               Ikram Ud Din and   
             Abeer Almogren and   
               Neeraj Kumar and   
                 Ahmad Almogren   A Taxonomy of Multimedia-based Graphical
                                  User Authentication for Green Internet
                                  of Things  . . . . . . . . . . . . . . . 37:1--37:28
                  Zhihan Lv and   
                 Ranran Lou and   
           Amit Kumar Singh and   
                   Qingjun Wang   Transfer Learning-powered Resource
                                  Optimization for Green Computing in
                                  5G-Aided Industrial Internet of Things   38:1--38:16
      Gunasekaran Manogaran and   
        Hassan Qudrat-Ullah and   
                    Qin Xin and   
                   Latifur Khan   Guest Editorial Introduction for the
                                  Special Section on Deep Learning
                                  Algorithms and Systems for Enhancing
                                  Security in Cloud Services . . . . . . . 39e:1--39e:5
        Lea Duji\'c Rodi\'c and   
       Tomislav Zupanovi\'c and   
            Toni Perkovi\'c and   
              Petar Soli\'c and   
        Joel J. P. C. Rodrigues   Machine Learning and Soil Humidity
                                  Sensing: Signal Strength Approach  . . . 39:1--39:21
               Farhan Ullah and   
      Muhammad Rashid Naeem and   
       Abdullah S. Bajahzar and   
                Fadi Al-Turjman   IoT-based Cloud Service for Secured
                                  Android Markets using PDG-based Deep
                                  Learning Classification  . . . . . . . . 40:1--40:17
            Bharat S. Rawal and   
                Poongodi M. and   
      Gunasekaran Manogaran and   
                   Mounir Hamdi   Multi-Tier Stack of Block Chain with
                                  Proxy Re-Encryption Method Scheme on the
                                  Internet of Things Platform  . . . . . . 41:1--41:20
         Syed Atif Moqurrab and   
                Adeel Anjum and   
                  Abid Khan and   
              Mansoor Ahmed and   
                Awais Ahmad and   
                  Gwanggil Jeon   Deep-Confidentiality: an IoT-Enabled
                                  Privacy-Preserving Framework for
                                  Unstructured Big Biomedical Data . . . . 42:1--42:21
                 Derui Wang and   
                  Sheng Wen and   
            Alireza Jolfaei and   
    Mohammad Sayad Haghighi and   
                Surya Nepal and   
                     Yang Xiang   On the Neural Backdoor of Federated
                                  Generative Models in Edge Computing  . . 43:1--43:21
                Huijie Yang and   
                  Jian Shen and   
                Tianqi Zhou and   
                     Sai Ji and   
              Pandi Vijayakumar   A Flexible and Privacy-Preserving
                                  Collaborative Filtering Scheme in Cloud
                                  Computing for VANETs . . . . . . . . . . 44:1--44:19
                   Xindi Ma and   
                Jianfeng Ma and   
                Saru Kumari and   
                 Fushan Wei and   
          Mohammad Shojafar and   
                  Mamoun Alazab   Privacy-Preserving Distributed
                                  Multi-Task Learning against Inference
                                  Attack in Cloud Computing  . . . . . . . 45:1--45:24
       Christos L. Stergiou and   
    Konstantinos E. Psannis and   
                  Brij B. Gupta   InFeMo: Flexible Big Data Management
                                  Through a Federated Cloud System . . . . 46:1--46:22
            Yasser D. Al-Otaibi   A Shared Two-way Cybersecurity Model for
                                  Enhancing Cloud Service Sharing for
                                  Distributed User Applications  . . . . . 47:1--47:17
               Tu N. Nguyen and   
               Sherali Zeadally   Mobile Crowd-sensing Applications: Data
                                  Redundancies, Challenges, and Solutions  48:1--48:15
                 Xiao Zheng and   
                 Mingchu Li and   
    Syed Bilal Hussain Shah and   
              Dinh-Thuan Do and   
              Yuanfang Chen and   
Constandinos X. Mavromoustakis and   
          George Mastorakis and   
               Evangelos Pallis   Enhancing Security-Problem-Based Deep
                                  Learning in Mobile Edge Computing  . . . 49:1--49:15
             Xiongtao Zhang and   
                Xiaomin Zhu and   
                    Ji Wang and   
                Weidong Bao and   
               Laurence T. Yang   DANCE: Distributed Generative
                                  Adversarial Networks with Communication
                                  Compression  . . . . . . . . . . . . . . 50:1--50:32
                  Rui Zhang and   
                  Libing Wu and   
                 Shuqin Cao and   
                 Xinrong Hu and   
                   Shan Xue and   
                     Dan Wu and   
                      Qingan Li   Task Offloading with Task Classification
                                  and Offloading Nodes Selection for
                                  MEC-Enabled IoV  . . . . . . . . . . . . 51:1--51:24
                 Tingmin Wu and   
                  Wanlun Ma and   
                  Sheng Wen and   
                    Xin Xia and   
               Cecile Paris and   
                Surya Nepal and   
                     Yang Xiang   Analysis of Trending Topics and
                                  Text-based Channels of Information
                                  Delivery in Cybersecurity  . . . . . . . 52:1--52:27
               Igor Ivki\'c and   
            Patrizia Sailer and   
         Antonios Gouglidis and   
             Andreas Mauthe and   
                  Markus Tauber   A Security Cost Modelling Framework for
                                  Cyber-Physical Systems . . . . . . . . . 53:1--53:31
                 Heesuk Son and   
                    Dongman Lee   An Efficient Interaction Protocol
                                  Inference Scheme for Incompatible
                                  Updates in IoT Environments  . . . . . . 54:1--54:25

ACM Transactions on Internet Technology (TOIT)
Volume 22, Number 3, August, 2022

          M. Shamim Hossain and   
              Changsheng Xu and   
                Josu Bilbao and   
           Md. Abdur Rahman and   
     Abdulmotaleb El Saddik and   
              Mohamed Bin Zayed   Special Section on Edge-AI for Connected
                                  Living . . . . . . . . . . . . . . . . . 55:1--55:??
              Prayag Tiwari and   
         Amit Kumar Jaiswal and   
                 Sahil Garg and   
                      Ilsun You   SANTM: Efficient Self-attention-driven
                                  Network for Text Matching  . . . . . . . 55:1--55:??
                Songwen Pei and   
                 Yusheng Wu and   
                    Jin Guo and   
                    Meikang Qiu   Neural Network Pruning by Recurrent
                                  Weights for Finance Market . . . . . . . 56:1--56:??
     Mohammad Saidur Rahman and   
             Ibrahim Khalil and   
                     Xun Yi and   
       Mohammed Atiquzzaman and   
                  Elisa Bertino   A Lossless Data-Hiding based IoT Data
                                  Authenticity Model in Edge-AI for
                                  Connected Living . . . . . . . . . . . . 57:1--57:??
               Chaonan Shen and   
                  Kai Zhang and   
                   Jinshan Tang   A COVID-19 Detection Algorithm Using
                                  Deep Features and Discrete Social
                                  Learning Particle Swarm Optimization for
                                  Edge Computing Devices . . . . . . . . . 58:1--58:??
                     Yi Liu and   
                Ruihui Zhao and   
                Jiawen Kang and   
         Abdulsalam Yassine and   
               Dusit Niyato and   
                  Jialiang Peng   Towards Communication-Efficient and
                                  Attack-Resistant Federated Edge Learning
                                  for Industrial Internet of Things  . . . 59:1--59:??
               Guihong Chen and   
                     Xi Liu and   
      Mohammad Shorfuzzaman and   
                 Ali Karime and   
               Yonghua Wang and   
                    Yuanhang Qi   MEC-Based Jamming-Aided
                                  Anti-Eavesdropping with Deep
                                  Reinforcement Learning for WBANs . . . . 60:1--60:??
                 K. Shankar and   
            Eswaran Perumal and   
           Mohamed Elhoseny and   
                Fatma Taher and   
                B. B. Gupta and   
          Ahmed A. Abd El-Latif   Synergic Deep Learning for Smart Health
                                  Diagnosis of COVID-19 for Connected
                                  Living and Smart Cities  . . . . . . . . 61:1--61:??
                   Min Chen and   
                    Ke Shen and   
                   Rui Wang and   
                Yiming Miao and   
             Yingying Jiang and   
                  Kai Hwang and   
                  Yixue Hao and   
              Guangming Tao and   
                    Long Hu and   
                  Zhongchun Liu   Negative Information Measurement at AI
                                  Edge: a New Perspective for Mental
                                  Health Monitoring  . . . . . . . . . . . 62:1--62:??
                Kaijian Xia and   
               Wenbing Zhao and   
            Alireza Jolfaei and   
                     Tamer Ozsu   Introduction To The Special Section On
                                  Edge/Fog Computing For Infectious
                                  Disease Intelligence . . . . . . . . . . 63:1--63:??
                  Zhihan Lv and   
                 Ranran Lou and   
                      Haibin Lv   Edge Computing to Solve Security Issues
                                  for Infectious Disease Intelligence
                                  Prevention . . . . . . . . . . . . . . . 63:1--63:??
              Yizhang Jiang and   
                Xiaoqing Gu and   
                    Lei Hua and   
                    Kang Li and   
                  Yuwen Tao and   
                          Bo Li   Forecasting Trend of Coronavirus Disease
                                  2019 using Multi-Task Weighted TSK Fuzzy
                                  System . . . . . . . . . . . . . . . . . 64:1--64:??
               Tongguang Ni and   
                 Jiaqun Zhu and   
                     Jia Qu and   
                       Jing Xue   Labeling Privacy Protection SVM Using
                                  Privileged Information for COVID-19
                                  Diagnosis  . . . . . . . . . . . . . . . 65:1--65:??
               Changda Wang and   
                 Xiaowei Li and   
                  Elisa Bertino   Network Temperature: a Novel Statistical
                                  Index for Networks Measurement and
                                  Management . . . . . . . . . . . . . . . 66:1--66:??
               Haipeng Chen and   
            Andrew Duncklee and   
             Sushil Jajodia and   
                    Rui Liu and   
              Sean Mcnamara and   
             V. S. Subrahmanian   PCAM: a Data-driven Probabilistic
                                  Cyber-alert Management Framework . . . . 67:1--67:??
                      Bo Gu and   
              Mamoun Alazab and   
                   Ziqi Lin and   
                   Xu Zhang and   
                      Jun Huang   AI-Enabled Task Offloading for Improving
                                  Quality of Computational Experience in
                                  Ultra Dense Networks . . . . . . . . . . 68:1--68:??
                   Lanyu Xu and   
               Arun Iyengar and   
                    Weisong Shi   NLUBroker: a QoE-driven Broker System
                                  for Natural Language Understanding
                                  Services . . . . . . . . . . . . . . . . 69:1--69:??
            Trinh Viet Doan and   
   Roland van Rijswijk-Deij and   
            Oliver Hohlfeld and   
                 Vaibhav Bajpai   An Empirical View on Consolidation of
                                  the Web  . . . . . . . . . . . . . . . . 70:1--70:??
          Md Arafat Hossain and   
                    Jun Han and   
         Jean-Guy Schneider and   
             Jiaojiao Jiang and   
       Muhammad Ashad Kabir and   
                 Steve Versteeg   Extracting Formats of Service Messages
                                  with Varying Payloads  . . . . . . . . . 71:1--71:??
      Genoveva Vargas-Solar and   
              Maysaa Khalil and   
  Javier A. Espinosa-Oviedo and   
José-Luis Zechinelli-Martini   GREENHOME: a Household Energy
                                  Consumption and CO$_2$ Footprint
                                  Metering Environment . . . . . . . . . . 72:1--72:??
           Niki Pavlopoulou and   
                   Edward Curry   PoSSUM: an Entity-centric
                                  Publish/Subscribe System for Diverse
                                  Summarization in Internet of Things  . . 73:1--73:??
             Jacopo Soldani and   
            Marco Cameriero and   
           Giulio Paparelli and   
                  Antonio Brogi   Modelling and Analysing Replica- and
                                  Fault-aware Management of Horizontally
                                  Scalable Applications  . . . . . . . . . 74:1--74:??
                 Minxian Xu and   
              Chenghao Song and   
                 Huaming Wu and   
         Sukhpal Singh Gill and   
                 Kejiang Ye and   
                  Chengzhong Xu   esDNN: Deep Neural Network Based
                                  Multivariate Workload Prediction in
                                  Cloud Computing Environments . . . . . . 75:1--75:??
                Roberto Yus and   
       Georgios Bouloukakis and   
            Sharad Mehrotra and   
      Nalini Venkatasubramanian   The SemIoTic Ecosystem: a Semantic
                                  Bridge between IoT Devices and Smart
                                  Spaces . . . . . . . . . . . . . . . . . 76:1--76:??
            Enrico Tedeschi and   
         Tor-Arne S. Nordmo and   
               Dag Johansen and   
       Håvard D. Johansen   On Optimizing Transaction Fees in
                                  Bitcoin using AI: Investigation on
                                  Miners Inclusion Pattern . . . . . . . . 77:1--77:??
               Ilir Murturi and   
               Schahram Dustdar   DECENT: a Decentralized Configurator for
                                  Controlling Elasticity in Dynamic Edge
                                  Networks . . . . . . . . . . . . . . . . 78:1--78:??
                      Tu Le and   
         Danny Yuxing Huang and   
              Noah Apthorpe and   
                      Yuan Tian   SkillBot: Identifying Risky Content for
                                  Children in Alexa Skills . . . . . . . . 79:1--79:??
             Hyungjune Shin and   
              Dongyoung Koo and   
                    Junbeom Hur   Secure and Efficient Hybrid Data
                                  Deduplication in Edge Computing  . . . . 80:1--80:??

ACM Transactions on Internet Technology (TOIT)
Volume 22, Number 4, November, 2022

            Ching-Hsien Hsu and   
              Amir H. Alavi and   
                 Mianxiong Dong   Introduction to the Special Section on
                                  Cyber Security in Internet of Vehicles   81:1--81:??
                   Haibo Yi and   
                 Ruinan Chi and   
                  Xin Huang and   
                 Xuejun Cai and   
                        Zhe Nie   Improving Security of Internet of
                                  Vehicles Based on Post-quantum
                                  Signatures with Systolic Divisions . . . 82:1--82:??
                  Song Xiao and   
                   Kai Chen and   
              Xiaoxiang Ren and   
                    Haitao Yuan   Pedestrian Trajectory Prediction in
                                  Heterogeneous Traffic using Facial
                                  Keypoints-based Convolutional
                                  Encoder-decoder Network  . . . . . . . . 83:1--83:??
          Chandrasekar Ravi and   
                Anmol Tigga and   
            G. Thippa Reddy and   
                Saqib Hakak and   
                  Mamoun Alazab   Driver Identification Using Optimized
                                  Deep Learning Model in Smart
                                  Transportation . . . . . . . . . . . . . 84:1--84:??
              Yangfan Liang and   
                 Yining Liu and   
                  Brij B. Gupta   PPRP: Preserving-Privacy Route Planning
                                  Scheme in VANETs . . . . . . . . . . . . 85:1--85:??
        Mohamad Ali Mehrabi and   
                Alireza Jolfaei   Efficient Cryptographic Hardware for
                                  Safety Message Verification in Internet
                                  of Connected Vehicles  . . . . . . . . . 86:1--86:??
               Xiaojie Wang and   
                 Laisen Nie and   
              Zhaolong Ning and   
                    Lei Guo and   
                Guoyin Wang and   
                  Xinbo Gao and   
                   Neeraj Kumar   Deep Learning-Based Network Traffic
                                  Prediction for Secure Backbone Networks
                                  in Internet of Vehicles  . . . . . . . . 87:1--87:??
                   Hui Tian and   
                  Fang Peng and   
                 Hanyu Quan and   
                Chin-Chen Chang   Identity-Based Public Auditing for Cloud
                                  Storage of Internet-of-Vehicles Data . . 88:1--88:??
             Ramesh Sekaran and   
            Fadi Al-Turjman and   
               Rizwan Patan and   
               Velmani Ramasamy   Tripartite Transmitting Methodology for
                                  Intermittently Connected Mobile Network
                                  (ICMN) . . . . . . . . . . . . . . . . . 89:1--89:??
      Gunasekaran Manogaran and   
            Bharat S. Rawal and   
    Vijayalakshmi Saravanan and   
               Priyan M. K. and   
                    Qin Xin and   
                     P. Shakeel   Token-Based Authorization and
                                  Authentication for Secure Internet of
                                  Vehicles Communication . . . . . . . . . 90:1--90:??
                    Ao Zhou and   
                    Xiao Ma and   
                   Siyi Gao and   
                Shangguang Wang   Providing Reliable Service for
                                  Parked-vehicle-assisted Mobile Edge
                                  Computing  . . . . . . . . . . . . . . . 91:1--91:??
              Si Young Jang and   
              Sung Kyu Park and   
                Jin Hee Cho and   
                    Dongman Lee   CARES: Context-Aware Trust Estimation
                                  for Realtime Crowdsensing Services in
                                  Vehicular Edge Networks  . . . . . . . . 92:1--92:??
            Mathias Fischer and   
        Winfried Lamersdorf and   
        Jörg Liebeherr and   
       Max Mühlhäuser   Introduction to the Special Section on
                                  Recent Advances in Networks and
                                  Distributed Systems  . . . . . . . . . . 93:1--93:??
            Kurian Polachan and   
          Chandramani Singh and   
                T. V. Prabhakar   Decentralized Dynamic Scheduling of TCPS
                                  Flows and a Simulator for Time-sensitive
                                  Networking . . . . . . . . . . . . . . . 94:1--94:??
         Yevhenii Shudrenko and   
         Daniel Plöger and   
        Koojana Kuladinithi and   
              Andreas Timm-Giel   A Novel Approach to Enhance the
                                  End-to-End Quality of Service for
                                  Avionic Wireless Sensor Networks . . . . 95:1--95:??
    Thiago Pereira Da Silva and   
              Thais Batista and   
            Frederico Lopes and   
         Aluizio Rocha Neto and   
  Flávia C. Delicato and   
             Paulo F. Pires and   
           Atslands R. Da Rocha   Fog Computing Platforms for Smart City
                                  Applications: a Survey . . . . . . . . . 96:1--96:??
     Christoph Döpmann and   
              Felix Fiedler and   
               Sergio Lucia and   
              Florian Tschorsch   Optimization-Based Predictive Congestion
                                  Control for the Tor Network:
                                  Opportunities and Challenges . . . . . . 97:1--97:??
                    Chao Wu and   
            Shingo Horiuchi and   
               Kenji Murase and   
          Hiroaki Kikushima and   
                 Kenichi Tayama   An Intent-driven DaaS Management
                                  Framework to Enhance User Quality of
                                  Experience . . . . . . . . . . . . . . . 98:1--98:??
             Andrei Ciortea and   
                Xiaomin Zhu and   
                  Calton Pu and   
              Munindar P. Singh   Introduction to the Special Issue on
                                  Multiagent Systems and Services in the
                                  Internet of Things . . . . . . . . . . . 99:1--99:??
                Pierre Rust and   
            Gauthier Picard and   
                 Fano Ramparany   Resilient Distributed Constraint
                                  Reasoning to Autonomously Configure and
                                  Adapt IoT Environments . . . . . . . . . 100:1--100:??
           Alessandro Ricci and   
             Angelo Croatti and   
            Stefano Mariani and   
              Sara Montagna and   
                   Marco Picone   Web of Digital Twins . . . . . . . . . . 101:1--101:??
                  Haoyu Ren and   
               Darko Anicic and   
              Thomas A. Runkler   Towards Semantic Management of On-Device
                                  Applications in Industrial IoT . . . . . 102:1--102:??
               Lina Barakat and   
             Phillip Taylor and   
           Nathan Griffiths and   
                    Simon Miles   A Reputation-based Framework for Honest
                                  Provenance Reporting . . . . . . . . . . 103:1--103:??
           Timotheus Kampik and   
             Adnane Mansour and   
           Olivier Boissier and   
            Sabrina Kirrane and   
              Julian Padget and   
             Terry R. Payne and   
          Munindar P. Singh and   
            Valentina Tamma and   
             Antoine Zimmermann   Governance of Autonomous Agents on the
                                  Web: Challenges and Opportunities  . . . 104:1--104:??
Vicente GarcÍa-DÍaz and   
         Jerry Chun-Wei Lin and   
  Juan Antonio Morente Molinera   Introduction to the Special Section on
                                  Edge Computing AI-IoT Integrated Energy
                                  Efficient Intelligent Transportation
                                  System for Smart Cities  . . . . . . . . 105:1--105:??
             Suresh Chavhan and   
               Deepak Gupta and   
    Sarada Prasad Gochhayat and   
             Chandana B. N. and   
              Ashish Khanna and   
                 K. Shankar and   
        Joel J. P. C. Rodrigues   Edge Computing AI-IoT Integrated
                                  Energy-efficient Intelligent
                                  Transportation System for Smart Cities   106:1--106:??
                Zhuoqun Xia and   
              Lingxuan Zeng and   
                      Ke Gu and   
                   Xiong Li and   
                     Weijia Jia   Conditional Identity Privacy-preserving
                                  Authentication Scheme Based on
                                  Cooperation of Multiple Fog Servers
                                  under Fog Computing-based IoVs . . . . . 107:1--107:??
            Michell Boerger and   
        Philipp Lämmel and   
         Nikolay Tcholtchev and   
              Manfred Hauswirth   Enabling Short-Term Energy Flexibility
                                  Markets Through Blockchain . . . . . . . 108:1--108:??
                  Long Chen and   
               Mianyang Yao and   
                   Yalan Wu and   
                      Jigang Wu   EECDN: Energy-efficient Cooperative DNN
                                  Edge Inference in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 109:1--109:??
         Sandeep Kumar Sood and   
         Keshav Singh Rawat and   
                  Dheeraj Kumar   Emerging Trends of ICT in Airborne
                                  Disease Prevention . . . . . . . . . . . 110:1--110:??


ACM Transactions on Internet Technology (TOIT)
Volume 23, Number 1, February, 2023

              Pankaj Mishra and   
             Ahmed Moustafa and   
                   Takayuki Ito   Real-time Pricing-based Resource
                                  Allocation in Open Market Environments   1:1--1:??
                Jianwei Hao and   
              Piyush Subedi and   
        Lakshmish Ramaswamy and   
                     In Kee Kim   Reaching for the Sky: Maximizing Deep
                                  Learning Inference Throughput on Edge
                                  Devices with AI Multi-Tenancy  . . . . . 2:1--2:??
          Rongjunchen Zhang and   
                 Tingmin Wu and   
                  Sheng Wen and   
                Surya Nepal and   
               Cecile Paris and   
                     Yang Xiang   SAM: Multi-turn Response Selection Based
                                  on Semantic Awareness Matching . . . . . 3:1--3:??
              Sharon Hirsch and   
           Slava Novgorodov and   
                    Ido Guy and   
                  Alexander Nus   The Tip of the Buyer: Extracting Product
                                  Tips from Reviews  . . . . . . . . . . . 4:1--4:??
Carlos Hernández-Castro and   
           David F. Barrero and   
         Maria Dolores R-Moreno   Breaking CaptchaStar Using the BASECASS
                                  Methodology  . . . . . . . . . . . . . . 5:1--5:??
              Luigi Asprino and   
                Enrico Daga and   
               Aldo Gangemi and   
                Paul Mulholland   Knowledge Graph Construction with a
                                  Façade: a Unified Method to Access
                                  Heterogeneous Data Sources on the Web    6:1--6:??
                Weiwei Fang and   
                 Wenyuan Xu and   
              Chongchong Yu and   
                 Neal. N. Xiong   Joint Architecture Design and Workload
                                  Partitioning for DNN Inference on
                                  Industrial IoT Clusters  . . . . . . . . 7:1--7:??
                 Iulia Paun and   
           Yashar Moshfeghi and   
                  Nikos Ntarmos   White Box: On the Prediction of
                                  Collaborative Filtering Recommendation
                                  Systems' Performance . . . . . . . . . . 8:1--8:??
                Yuanjun Dai and   
                    An Wang and   
                   Yang Guo and   
                  Songqing Chen   Elastically Augmenting the Control-path
                                  Throughput in SDN to Deal with Internet
                                  DDoS Attacks . . . . . . . . . . . . . . 9:1--9:??
                  Feijie Wu and   
                Ho Yin Yuen and   
                 Henry Chan and   
         Victor C. M. Leung and   
                        Wei Cai   Facilitating Serverless Match-based
                                  Online Games with Novel Blockchain
                                  Technologies . . . . . . . . . . . . . . 10:1--10:??
          Massimo La Morgia and   
             Alessandro Mei and   
            Francesco Sassi and   
                  Julinda Stefa   The Doge of Wall Street: Analysis and
                                  Detection of Pump and Dump
                                  Cryptocurrency Manipulations . . . . . . 11:1--11:??
                   Man Zeng and   
                  Dandan Li and   
                  Pei Zhang and   
                    Kun Xie and   
                 Xiaohong Huang   Federated Route Leak Detection in
                                  Inter-domain Routing with Privacy
                                  Guarantee  . . . . . . . . . . . . . . . 12:1--12:??
                 Gonul Ayci and   
               Murat Sensoy and   
    Arzucan Özgür and   
                    Pinar Yolum   Uncertainty-Aware Personal Assistant for
                                  Making Personalized Privacy Decisions    13:1--13:??
            Andrea De Salve and   
            Luca Franceschi and   
                Andrea Lisi and   
                 Paolo Mori and   
                    Laura Ricci   L2DART: a Trust Management System
                                  Integrating Blockchain and Off-Chain
                                  Computation  . . . . . . . . . . . . . . 14:1--14:??
              Wenzhao Zhang and   
               Yuxuan Zhang and   
              Hongchang Fan and   
                     Yi Gao and   
                       Wei Dong   A Low-code Development Framework for
                                  Cloud-native Edge Systems  . . . . . . . 15:1--15:??
      Gregorius Satia Budhi and   
                 Raymond Chiong   A Multi-type Classifier Ensemble for
                                  Detecting Fake Reviews Through
                                  Textual-based Feature Extraction . . . . 16:1--16:??
                Chong Zhang and   
                  Qiang Guo and   
                   Luoyi Fu and   
                Jiaxin Ding and   
                  Xinde Cao and   
                   Fei Long and   
               Xinbing Wang and   
                   Chenghu Zhou   Finding the Source in Networks: an
                                  Approach Based on Structural Entropy . . 17:1--17:??
            Habib Mostafaei and   
                   Shafi Afridi   SDN-enabled Resource Provisioning
                                  Framework for Geo-Distributed Streaming
                                  Analytics  . . . . . . . . . . . . . . . 18:1--18:??
           Martino Trevisan and   
             Francesca Soro and   
               Marco Mellia and   
               Idilio Drago and   
                  Ricardo Morla   Attacking DoH and ECH: Does Server Name
                                  Encryption Protect Users' Privacy? . . . 19:1--19:??
            Sidharth Sharma and   
         Aniruddha Kushwaha and   
          Mohammad Alizadeh and   
            George Varghese and   
                 Ashwin Gumaste   Tuneman: Customizing Networks to
                                  Guarantee Application Bandwidth and
                                  Latency  . . . . . . . . . . . . . . . . 20:1--20:??
                Bolin Zhang and   
                 Zhiying Tu and   
               Shaoshi Hang and   
                Dianhui Chu and   
                     Xiaofei Xu   Conco-ERNIE: Complex User Intent Detect
                                  Model for Smart Healthcare Cognitive Bot 21:1--21:??
             Romain Fouquet and   
           Pierre Laperdrix and   
                  Romain Rouvoy   Breaking Bad: Quantifying the Addiction
                                  of Web Elements to JavaScript  . . . . . 22:1--22:??
               Yu-Jhen Wang and   
              Anthony J. T. Lee   Movie Account Recommendation on
                                  Instagram  . . . . . . . . . . . . . . . 23:1--23:??

ACM Transactions on Internet Technology (TOIT)
Volume 23, Number 2, May, 2023

              Quan Z. Sheng and   
        Arun Kumar Sangaiah and   
                Ankit Chaudhary   Guest Editors' Introduction for Special
                                  Issue on Applications of Computational
                                  Linguistics in Multimedia IoT Services   24:1--24:??
                Mu-Yen Chen and   
                 Yi-Wei Lai and   
                Jiunn-Woei Lian   Using Deep Learning Models to Detect
                                  Fake News about COVID-19 . . . . . . . . 25:1--25:??
               Yucheng Dong and   
                    Qin Ran and   
              Xiangrui Chao and   
                Congcong Li and   
                        Shui Yu   Personalized Individual Semantics
                                  Learning to Support a Large-Scale
                                  Linguistic Consensus Process . . . . . . 26:1--26:??
               Yazhou Zhang and   
                     Dan Ma and   
              Prayag Tiwari and   
                 Chen Zhang and   
               Mehedi Masud and   
      Mohammad Shorfuzzaman and   
                     Dawei Song   Stance-level Sarcasm Detection with BERT
                                  and Stance-centered Graph Attention
                                  Networks . . . . . . . . . . . . . . . . 27:1--27:??
                Yi-Bing Lin and   
               Yuan-Fu Liao and   
             Sin-Horng Chen and   
             Shaw-Hwa Hwang and   
                    Yih-Ru Wang   VoiceTalk: Multimedia-IoT Applications
                                  for Mixing Mandarin, Taiwanese, and
                                  English  . . . . . . . . . . . . . . . . 28:1--28:??
        Pedro Victor Borges and   
            Chantal Taconet and   
           Sophie Chabridon and   
                Denis Conan and   
         Everton Cavalcante and   
                  Thais Batista   Taming Internet of Things Application
                                  Development with the IoTvar Middleware   29:1--29:??
               Hucheng Wang and   
                   Zhi Wang and   
                  Lei Zhang and   
                Xiaonan Luo and   
                   Xinheng Wang   A Highly Stable Fusion Positioning
                                  System of Smartphone under NLoS Acoustic
                                  Indoor Environment . . . . . . . . . . . 30:1--30:??
       Arvind Kumar Gangwar and   
                  Sandeep Kumar   Concept Drift in Software Defect
                                  Prediction: a Method for Detecting and
                                  Handling the Drift . . . . . . . . . . . 31:1--31:??
                  Jing Chen and   
               Wenjun Jiang and   
                     Jie Wu and   
                   Kenli Li and   
                       Keqin Li   Dynamic Personalized POI Sequence
                                  Recommendation with Fine-Grained
                                  Contexts . . . . . . . . . . . . . . . . 32:1--32:??
           Luca Muscariello and   
           Michele Papalini and   
             Olivier Roques and   
              Mauro Sardara and   
                Arthur Tran Van   Securing Scalable Real-time Multiparty
                                  Communications with Hybrid
                                  Information-centric Networking . . . . . 33:1--33:??
                   Yibin Xu and   
               Jianhua Shao and   
                Tijs Slaats and   
              Boris Düdder   MWPoW+: a Strong Consensus Protocol for
                                  Intra-Shard Consensus in Blockchain
                                  Sharding . . . . . . . . . . . . . . . . 34:1--34:??
                    Li Yang and   
                      Xi Li and   
                  Zhuoru Ma and   
                      Lu Li and   
                 Neal Xiong and   
                    Jianfeng Ma   IRGA: an Intelligent Implicit Real-time
                                  Gait Authentication System in
                                  Heterogeneous Complex Scenarios  . . . . 35:1--35:??

ACM Transactions on Internet Technology (TOIT)
Volume 23, Number 3, August, 2023

                Shancang Li and   
                Surya Nepal and   
              Theo Tryfonas and   
                     Hongwei Li   Blockchain-based Zero Trust
                                  Cybersecurity in the Internet of Things  36:1--36:??
                    Ying Li and   
                   Yaxin Yu and   
                   Xingwei Wang   Three-tier Storage Framework Based on
                                  TBchain and IPFS for Protecting IoT
                                  Security and Privacy . . . . . . . . . . 37:1--37:??
                   Keke Gai and   
                 Yufeng She and   
               Liehuang Zhu and   
     Kim-Kwang Raymond Choo and   
                     Zhiguo Wan   A Blockchain-Based Access Control Scheme
                                  for Zero Trust Cross-Organizational Data
                                  Sharing  . . . . . . . . . . . . . . . . 38:1--38:??
             Mohammad Wazid and   
                  Prosanta Gope   BACKM-EHA: a Novel Blockchain-enabled
                                  Security Solution for IoMT-based
                                  E-healthcare Applications  . . . . . . . 39:1--39:??
                  Fuchen Ma and   
                   Meng Ren and   
                    Fu Ying and   
                Wanting Sun and   
               Houbing Song and   
                 Heyuan Shi and   
                   Yu Jiang and   
                    Huizhong Li   V-Gas: Generating High Gas Consumption
                                  Inputs to Avoid Out-of-Gas Vulnerability 40:1--40:??
                  Zhenyu Li and   
                  Yong Ding and   
                Honghao Gao and   
                      Bo Qu and   
                 Yujue Wang and   
                         Jun Li   A Highly Compatible Verification
                                  Framework with Minimal Upgrades to
                                  Secure an Existing Edge Network  . . . . 41:1--41:??
                   Jin Wang and   
                Jiahao Chen and   
                 Neal Xiong and   
             Osama Alfarraj and   
                  Amr Tolba and   
                    Yongjun Ren   S-BDS: an Effective Blockchain-based
                                  Data Storage Scheme in Zero-Trust IoT    42:1--42:??
            Amjad Alsirhani and   
          Muhammad Ali Khan and   
           Abdullah Alomari and   
               Sauda Maryam and   
               Aiman Younas and   
             Muddesar Iqbal and   
    Muhammad Hameed Siqqidi and   
                      Amjad Ali   Securing Low-Power Blockchain-enabled
                                  IoT Devices against Energy Depletion
                                  Attack . . . . . . . . . . . . . . . . . 43:1--43:??
                   Fan Wang and   
               Guangshun Li and   
                 Yilei Wang and   
              Wajid Rafique and   
       Mohammad R. Khosravi and   
               Guanfeng Liu and   
                  Yuwen Liu and   
                    Lianyong Qi   Privacy-Aware Traffic Flow Prediction
                                  Based on Multi-Party Sensor Data with
                                  Zero Trust in Smart City . . . . . . . . 44:1--44:??
            Luca Gioacchini and   
                Luca Vassio and   
               Marco Mellia and   
               Idilio Drago and   
            Zied Ben Houidi and   
                    Dario Rossi   i-DarkVec: Incremental Embeddings for
                                  Darknet Traffic Analysis . . . . . . . . 45:1--45:??
          Mohammed Bahutair and   
             Athman Bouguettaya   An End-to-end Trust Management Framework
                                  for Crowdsourced IoT Services  . . . . . 46:1--46:??
                  Keke Chen and   
                 Yuechun Gu and   
                   Sagar Sharma   DisguisedNets: Secure Image Outsourcing
                                  for Confidential Model Training in
                                  Clouds . . . . . . . . . . . . . . . . . 47:1--47:??
            Hossein Chegini and   
           Fernando Beltran and   
                 Aniket Mahanti   Designing and Developing a Weed
                                  Detection Model for California Thistle   48:1--48:??

ACM Transactions on Internet Technology (TOIT)
Volume 23, Number 4, November, 2023

          Gautam Srivastava and   
         Jerry Chun-Wei Lin and   
                  Calton Pu and   
                   Yudong Zhang   Special Section on ``Advances in
                                  Cyber-Manufacturing: Architectures,
                                  Challenges, & Future Research
                                  Directions'' . . . . . . . . . . . . . . 49:1--49:??
                  Xiuwen Fu and   
              Pasquale Pace and   
              Gianluca Aloi and   
          Antonio Guerrieri and   
                 Wenfeng Li and   
              Giancarlo Fortino   Tolerance Analysis of
                                  Cyber-Manufacturing Systems to Cascading
                                  Failures . . . . . . . . . . . . . . . . 50:1--50:??
                   Yirui Wu and   
                    Hao Cao and   
              Guoqiang Yang and   
                    Tong Lu and   
                    Shaohua Wan   Digital Twin of Intelligent Small
                                  Surface Defect Detection with
                                  Cyber-manufacturing Systems  . . . . . . 51:1--51:??
                Lizhen Deng and   
                  Guoxia Xu and   
                   Jiaqi Pi and   
                     Hu Zhu and   
                  Xiaokang Zhou   Unpaired Self-supervised Learning for
                                  Industrial Cyber-Manufacturing Spectrum
                                  Blind Deconvolution  . . . . . . . . . . 52:1--52:??
              Jan Pennekamp and   
           Markus Dahlmanns and   
          Frederik Fuhrmann and   
              Timo Heutmann and   
         Alexander Kreppein and   
             Dennis Grunert and   
            Christoph Lange and   
          Robert H. Schmitt and   
                   Klaus Wehrle   Offering Two-way Privacy for Evolved
                                  Purchase Inquiries . . . . . . . . . . . 53:1--53:??
                Usman Ahmed and   
         Jerry Chun-Wei Lin and   
              Gautam Srivastava   Exploring the Potential of Cyber
                                  Manufacturing System in the Digital Age  54:1--54:??
             Pei-Cheng Song and   
            Jeng-Shyang Pan and   
             Han-Chieh Chao and   
                  Shu-Chuan Chu   Collaborative Hotspot Data Collection
                                  with Drones and 5G Edge Computing in
                                  Smart City . . . . . . . . . . . . . . . 55:1--55:??
              Wenzhao Zhang and   
                     Yi Gao and   
                       Wei Dong   Providing Realtime Support for
                                  Containerized Edge Services  . . . . . . 56:1--56:??
          Loredana Caruccio and   
             Gaetano Cimino and   
            Stefano Cirillo and   
           Domenico Desiato and   
            Giuseppe Polese and   
              Genoveffa Tortora   Malicious Account Identification in
                                  Social Network Platforms . . . . . . . . 57:1--57:??
                 Fanyi Yang and   
                 Huifang Ma and   
                 Cairui Yan and   
                  Zhixin Li and   
                    Liang Chang   Polarized Communities Search via
                                  Co-guided Random Walk in Attributed
                                  Signed Networks  . . . . . . . . . . . . 58:1--58:??
                Wenhua Xiao and   
                Xudong Fang and   
                  Bixin Liu and   
                    Ji Wang and   
                    Xiaomin Zhu   UNION: Fault-tolerant Cooperative
                                  Computing in Opportunistic Mobile Edge
                                  Cloud  . . . . . . . . . . . . . . . . . 59:1--59:??


ACM Transactions on Internet Technology (TOIT)
Volume 24, Number 1, February, 2024

                 Zhiyi Song and   
             Dipankar Chaki and   
          Abdallah Lakhdari and   
             Athman Bouguettaya   Positional Encoding-based Resident
                                  Identification in Multi-resident Smart
                                  Homes  . . . . . . . . . . . . . . . . . 1:1--1:??
                 Bofeng Pan and   
         Natalia Stakhanova and   
                   Zhongwen Zhu   EtherShield: Time-interval Analysis for
                                  Detection of Malicious Behavior on
                                  Ethereum . . . . . . . . . . . . . . . . 2:1--2:??
                  Chao Dong and   
                  Fang Wang and   
                       Dan Feng   DxHash: a Memory-saving Consistent
                                  Hashing Algorithm  . . . . . . . . . . . 3:1--3:??
                  Jiashu Wu and   
                    Hao Dai and   
            Kenneth B. Kent and   
                 Jerome Yen and   
              Chengzhong Xu and   
                      Yang Wang   Open Set Dandelion Network for IoT
                                  Intrusion Detection  . . . . . . . . . . 4:1--4:??
              Xuezheng Yang and   
                Zhiwen Zeng and   
                 Anfeng Liu and   
              Neal N. Xiong and   
                   Shaobo Zhang   ADTO: a Trust Active Detecting-based
                                  Task Offloading Scheme in Edge Computing
                                  for Internet of Things . . . . . . . . . 5:1--5:??
              Yi-Cheng Chen and   
                 Wang-Chien Lee   A Novel Cross-Domain Recommendation with
                                  Evolution Learning . . . . . . . . . . . 6:1--6:??
                Anuj Sachan and   
                  Neetesh Kumar   SDN-enabled Quantized LQR for Smart
                                  Traffic Light Controller to Optimize
                                  Congestion . . . . . . . . . . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 24, Number 2, May, 2024

                     Wen Li and   
               Lingfeng Bao and   
                Jiachi Chen and   
                John Grundy and   
                    Xin Xia and   
                    Xiaohu Yang   Market Manipulation of Cryptocurrencies:
                                  Evidence from Social Media and
                                  Transaction Data . . . . . . . . . . . . 8:1--8:??
             Fabien Charmet and   
          Tomohiro Morikawa and   
               Akira Tanaka and   
              Takeshi Takahashi   VORTEX: Visual phishing detectiOns aRe
                                  Through EXplanations . . . . . . . . . . 9:1--9:??
               Yanming Chen and   
                   Tong Luo and   
                Weiwei Fang and   
                 Neal. N. Xiong   EdgeCI: Distributed Workload Assignment
                                  and Model Partitioning for CNN Inference
                                  on Edge Clusters . . . . . . . . . . . . 10:1--10:??
                Zichen Wang and   
              Xiangshan Gao and   
                  Cong Wang and   
                 Peng Cheng and   
                    Jiming Chen   Efficient Vertical Federated Unlearning
                                  via Fast Retraining  . . . . . . . . . . 11:1--11:??

ACM Transactions on Internet Technology (TOIT)
Volume 24, Number 3, 2024

      Mohan Baruwal Chhetri and   
              Shahroz Tariq and   
                Ronal Singh and   
          Fatemeh Jalalvand and   
               Cecile Paris and   
                    Surya Nepal   Towards Human-AI Teaming to Mitigate
                                  Alert Fatigue in Security Operations
                                  Centres  . . . . . . . . . . . . . . . . 12:1--12:??
             Ali Akbar Vali and   
               Sadoon Azizi and   
              Mohammad Shojafar   RESP: a Recursive Clustering Approach
                                  for Edge Server Placement in Mobile Edge
                                  Computing  . . . . . . . . . . . . . . . 13:1--13:??
            Sepehr Saryazdi and   
              Balsam Alkouz and   
         Athman Bouguettaya and   
              Abdallah Lakhdari   Using Reinforcement Learning and Error
                                  Models for Drone Precise Landing . . . . 14:1--14:??
               Aswani Aguru and   
                 Suresh Erukala   OTI-IoT: a Blockchain-based Operational
                                  Threat Intelligence Framework for
                                  Multi-vector DDoS Attacks  . . . . . . . 15:1--15:??