TOIT - volume 20 - 2020 论文列表 |
点击这里查看 ACM Transactions on Internet Technology 的JCR分区、影响因子等信息 |
Kostas Kolomvatsos Christos Anagnostopoulos
Descriptions from the Customers: Comparative Analysis of Review-based Product Description Generation Methods.Slava Novgorodov Ido Guy Guy Elad Kira Radinsky
SMig-RL: An Evolutionary Migration Framework for Cloud Services Based on Deep Reinforcement Learning.Hongshuai Ren Yang Wang Chengzhong Xu Xi Chen
Personalized Review Recommendation based on Users' Aspect Sentiment.Chunli Huang Wenjun Jiang Jie Wu Guojun Wang
Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput.Na Ruan Dongli Zhou Weijia Jia
Evolving Influence Maximization in Evolving Networks.Xudong Wu Luoyi Fu Zixin Zhang Huan Long Jingfan Meng Xinbing Wang Guihai Chen
Overexposure-Aware Influence Maximization.Grigorios Loukides Robert Gwadera Shing-Wan Chang
Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme.Weichao Gao James H. Nguyen Yalong Wu William G. Hatcher Wei Yu
A Reinforcement Learning Approach to Optimize Discount and Reputation Tradeoffs in E-commerce Systems.Hong Xie Yongkun Li John C. S. Lui
Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks.Yang Zhou Ling Liu Kisung Lee Balaji Palanisamy Qi Zhang
Enabling Reference Verifiability for the World Wide Web with Webchain.Elias Rohrer Steffen Heidel Florian Tschorsch
Design and Implementation of a Compressed Certificate Status Protocol.Michalis Pachilakis Antonios A. Chariton Panagiotis Papadopoulos Panagiotis Ilia Eirini Degkleri Evangelos P. Markatos
Serendipity-based Points-of-Interest Navigation.Xiaoyu Ge Panos K. Chrysanthis Konstantinos Pelechrinis Demetrios Zeinalipour-Yazti Mohamed A. Sharaf
An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing. Trustworthy and Transparent Third-party Authority.Nikolaos Athanasios Anagnostopoulos Saad Ahmad Tolga Arul Daniel Steinmetzer Matthias Hollick Stefan Katzenbeisser
IoT Architecture for Urban Data-Centric Services and Applications.Marcin Luckner Maciej Grzenda Robert Kunicki Jaroslaw Legierski
Parameter Self-Adaptation for Industrial Wireless Sensor-Actuator Networks. Optimally Self-Healing IoT Choreographies.Jan Seeger Arne Bröring Georg Carle
Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices.Giuseppe Faraci Christian Grasso Giovanni Schembra
Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge.Zakaria Benomar Francesco Longo Giovanni Merlino Antonio Puliafito
Optimal Receiver Placement for K-barrier Coverage in Passive Bistatic Radar Sensor Networks.Jiaoyan Chen Laurence T. Yang Xianjun Deng Xianggong Hong Lingzhi Yi
Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks. To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain.Kyriaki Panagidi Christos Anagnostopoulos A. Chalvatzaras Stathes Hadjiefthymiades
Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation. Introduction to the Special Issue on Evolution of IoT Networking Architectures.Bilal Ghanem Paolo Rosso Francisco M. Rangel Pardo
Understanding Ethereum via Graph Analysis.Ting Chen Zihao Li Yuxiao Zhu Jiachi Chen Xiapu Luo John Chi-Shing Lui Xiaodong Lin Xiaosong Zhang
Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems.Christos Tsigkanos Martin Garriga Luciano Baresi Carlo Ghezzi
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices.Xingbin Jiang Michele Lora Sudipta Chattopadhyay
A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources. Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks. Emo2Vec: Learning Emotional Embeddings via Multi-Emotion Category.Shuo Wang Aishan Maoliniyazi Xinle Wu Xiaofeng Meng
Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies.Flor Miriam Plaza del Arco M. Dolores Molina-González Luis Alfonso Ureña López María Teresa Martín-Valdivia
MANDOLA: A Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech.Demetris Paschalides Dimosthenis Stephanidis Andreas Andreou Kalia Orphanou George Pallis Marios D. Dikaiakos Evangelos P. Markatos
A Multilingual Evaluation for Online Hate Speech Detection.Michele Corazza Stefano Menini Elena Cabrio Sara Tonelli Serena Villata
Sub-Population Specific Models of Couples' Conflict.Krit Gupta Aditya Gujral Theodora Chaspari Adela C. Timmons Sohyun C. Han Yehsong Kim Sarah Barrett Stassja Sichko Gayla Margolin
Introduction to the Special Section on Computational Modeling and Understanding of Emotions in Conflictual Social Interactions.Rui Pascoal Ana de Almeida Rute C. Sofia
A Smartphone-based Network Architecture for Post-disaster Operations Using WiFi Tethering.Amitangshu Pal Mayank Raj Krishna Kant Sajal K. Das
Privacy-preserving Network Path Validation.Binanda Sengupta Yingjiu Li Kai Bu Robert H. Deng
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation.Zhengdi Hu Guangquan Xu Xi Zheng Jiang Liu Zhangbing Li Quan Z. Sheng Wenjuan Lian Hequn Xian
Beyond Artificial Reality: Finding and Monitoring Live Events from Social Sensors.Calton Pu Abhijit Suprem Rodrigo Alves Lima Aibek Musaev De Wang Danesh Irani Steve Webb João Eduardo Ferreira
Five Challenges in Cloud-enabled Intelligence and Control.Tarek F. Abdelzaher Yifan Hao Kasthuri Jayarajah Archan Misra Per Skarin Shuochao Yao Dulanga Weerakoon Karl-Erik Årzén
Internet Technology Outlook: From Communication to Storage and Cognitive Computing.