Table of contents for issues of ACM Transactions on Internet Technology (TOIT)

Last update: Fri Dec 22 18:14:29 MST 2017                Valid HTML 3.2!

Volume 1, Number 1, August, 2001
Volume 1, Number 2, November, 2001
Volume 2, Number 1, February, 2002
Volume 2, Number 2, May, 2002
Volume 2, Number 3, August, 2002
Volume 2, Number 4, November, 2002
Volume 3, Number 1, February, 2003
Volume 3, Number 2, May, 2003
Volume 3, Number 3, August, 2003
Volume 3, Number 4, November, 2003
Volume 4, Number 1, February, 2004
Volume 4, Number 2, May, 2004
Volume 4, Number 3, August, 2004
Volume 4, Number 4, November, 2004
Volume 5, Number 1, February, 2005
Volume 5, Number 2, May, 2005
Volume 5, Number 3, August, 2005
Volume 5, Number 4, November, 2005
Volume 6, Number 1, February, 2006
Volume 6, Number 2, May, 2006
Volume 6, Number 3, August, 2006
Volume 6, Number 4, November, 2006
Volume 7, Number 1, February, 2007
Volume 7, Number 2, May, 2007
Volume 7, Number 3, August, 2007
Volume 7, Number 4, October, 2007
Volume 8, Number 1, November, 2007
Volume 8, Number 2, February, 2008
Volume 8, Number 3, May, 2008
Volume 8, Number 4, September, 2008
Volume 9, Number 1, February, 2009
Volume 9, Number 2, May, 2009
Volume 9, Number 3, July, 2009
Volume 9, Number 4, September, 2009
Volume 10, Number 1, February, 2010
Volume 10, Number 2, May, 2010
Volume 10, Number 3, October, 2010
Volume 10, Number 4, March, 2011
Volume 11, Number 1, July, 2011
Volume 11, Number 2, December, 2011
Volume 11, Number 3, January, 2012
Volume 11, Number 4, March, 2012
Volume 12, Number 1, June, 2012
Volume 12, Number 2, December, 2012
Volume 12, Number 3, May, 2013
Volume 12, Number 4, July, 2013
Volume 13, Number 1, November, 2013
Volume 13, Number 2, December, 2013
Volume 13, Number 3, May, 2014
Volume 13, Number 4, July, 2014
Volume 14, Number 1, July, 2014
Volume 14, Number 2--3, October, 2014
Volume 14, Number 4, December, 2014
Volume 15, Number 1, February, 2015
Volume 15, Number 2, June, 2015
Volume 15, Number 3, September, 2015
Volume 15, Number 4, December, 2015
Volume 16, Number 1, February, 2016
Volume 16, Number 2, April, 2016
Volume 16, Number 3, August, 2016
Volume 16, Number 4, December, 2016
Volume 17, Number 1, March, 2017
Volume 17, Number 2, May, 2017
Volume 17, Number 3, July, 2017
Volume 17, Number 4, September, 2017
Volume 18, Number 1, December, 2017


ACM Transactions on Internet Technology (TOIT)
Volume 1, Number 1, August, 2001

               Arvind Arasu and   
                Junghoo Cho and   
       Hector Garcia-Molina and   
            Andreas Paepcke and   
                Sriram Raghavan   Searching the Web  . . . . . . . . . . . 2--43
              Martin Arlitt and   
      Diwakar Krishnamurthy and   
                    Jerry Rolia   Characterizing the scalability of a
                                  large web-based shopping system  . . . . 44--69
      Marjory S. Blumenthal and   
                 David D. Clark   Rethinking the design of the Internet:
                                  the end-to-end arguments vs. the brave
                                  new world  . . . . . . . . . . . . . . . 70--109
        Masatoshi Yoshikawa and   
          Toshiyuki Amagasa and   
           Takeyuki Shimura and   
                Shunsuke Uemura   XRel: a path-based approach to storage
                                  and retrieval of XML documents using
                                  relational databases . . . . . . . . . . 110--141

ACM Transactions on Internet Technology (TOIT)
Volume 1, Number 2, November, 2001

               David M. Kristol   HTTP Cookies: Standards, privacy, and
                                  politics . . . . . . . . . . . . . . . . 151--198
               Marc Waldman and   
             Aviel D. Rubin and   
            Lorrie Faith Cranor   The architecture of robust publishing
                                  systems  . . . . . . . . . . . . . . . . 199--230
               Joel L. Wolf and   
                   Philip S. Yu   On balancing the load in a clustered web
                                  farm . . . . . . . . . . . . . . . . . . 231--261


ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 1, February, 2002

                        Xin Guo   An optimal strategy for sellers in an
                                  online auction . . . . . . . . . . . . . 1--13
                  Paul Huck and   
             Michael Butler and   
                 Amar Gupta and   
                   Michael Feng   A self-configuring and
                                  self-administering name system with
                                  dynamic address assignment . . . . . . . 14--46
               Carey Williamson   On filter effects in web caching
                                  hierarchies  . . . . . . . . . . . . . . 47--77

ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 2, May, 2002

             Claus Brabrand and   
       Anders Mòller and   
        Michael I. Schwartzbach   The $<$bigwig$>$ project . . . . . . . . . 79--114
            Roy T. Fielding and   
              Richard N. Taylor   Principled design of the modern Web
                                  architecture . . . . . . . . . . . . . . 115--150
         Christian Nentwich and   
                Licia Capra and   
          Wolfgang Emmerich and   
            Anthony Finkelstein   xlinkit: a consistency checking and
                                  smart link generation service  . . . . . 151--185

ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 3, August, 2002

           Stanley M. Besen and   
          Jeffrey S. Spigel and   
          Padmanabhan Srinagesh   Evaluating the competitive effects of
                                  mergers of Internet backbone providers   187--204
               Stephen Dill and   
                 Ravi Kumar and   
          Kevin S. Mccurley and   
        Sridhar Rajagopalan and   
               D. Sivakumar and   
                 Andrew Tomkins   Self-similarity in the web . . . . . . . 205--223
                   Jian Yin and   
             Lorenzo Alvisi and   
                Mike Dahlin and   
                   Arun Iyengar   Engineering web cache consistency  . . . 224--259

ACM Transactions on Internet Technology (TOIT)
Volume 2, Number 4, November, 2002

             Michael Gordon and   
          Robert K. Lindsay and   
                     Weiguo Fan   Literature-based discovery on the World
                                  Wide Web . . . . . . . . . . . . . . . . 261--275
               Harry Hochheiser   The platform for privacy preference as a
                                  social protocol: An examination within
                                  the U.S. policy context  . . . . . . . . 276--306
                      Minwen Ji   Affinity-based management of main memory
                                  database clusters  . . . . . . . . . . . 307--339


ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 1, February, 2003

         Magdalini Eirinaki and   
          Michalis Vazirgiannis   Web mining for web personalization . . . 1--27
            Joris Claessens and   
               Bart Preneel and   
                Joos Vandewalle   (How) can mobile agents do secure
                                  electronic transactions on untrusted
                                  hosts? A survey of the security issues
                                  and the current solutions  . . . . . . . 28--48
             Paolo Merialdo and   
               Paolo Atzeni and   
            Giansalvatore Mecca   Design and development of data-intensive
                                  web sites: The Araneus approach  . . . . 49--92

ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 2, May, 2003

                  Robert Cooley   The use of web structure and content to
                                  identify subjectively interesting web
                                  usage patterns . . . . . . . . . . . . . 93--116
               Haruo Hosoya and   
             Benjamin C. Pierce   XDuce: A statically typed XML processing
                                  language . . . . . . . . . . . . . . . . 117--148
               Alfred Kobsa and   
              Jörg Schreck   Privacy through pseudonymity in
                                  user-adaptive systems  . . . . . . . . . 149--183

ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 3, August, 2003

           Patricia Anthony and   
           Nicholas R. Jennings   Developing a bidding agent for multiple
                                  heterogeneous auctions . . . . . . . . . 185--217
                 Minghua He and   
           Nicholas R. Jennings   SouthamptonTAC: An adaptive autonomous
                                  trading agent  . . . . . . . . . . . . . 218--235
                 Upkar Varshney   Location management for mobile commerce
                                  applications in wireless Internet
                                  environment  . . . . . . . . . . . . . . 236--255
                Junghoo Cho and   
           Hector Garcia-Molina   Estimating frequency of change . . . . . 256--290

ACM Transactions on Internet Technology (TOIT)
Volume 3, Number 4, November, 2003

               R. Braumandl and   
                  A. Kemper and   
                    D. Kossmann   Quality of service in an information
                                  economy  . . . . . . . . . . . . . . . . 291--333
                  Ali Amiri and   
                     Syam Menon   Efficient scheduling of Internet banner
                                  advertisements . . . . . . . . . . . . . 334--346
         Ludmila Cherkasova and   
                     Yun Fu and   
               Wenting Tang and   
                    Amin Vahdat   Measuring and characterizing end-to-end
                                  Internet service performance . . . . . . 347--391
        Björn Knutsson and   
                 Honghui Lu and   
              Jeffrey Mogul and   
                  Bryan Hopkins   Architecture and performance of
                                  server-directed transcoding  . . . . . . 392--424


ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 1, February, 2004

           Pawel Gburzynski and   
                   Jacek Maitan   Fighting the spam wars: A remailer
                                  approach with restrictive aliasing . . . 1--30
               Ronny Lempel and   
                   Shlomo Moran   Optimizing result prefetching in Web
                                  search engines with segmented indices    31--59
                  Dan Boneh and   
                 Xuhua Ding and   
                    Gene Tsudik   Fine-grained control of security
                                  capabilities . . . . . . . . . . . . . . 60--82
            Gregory W. Bond and   
                Eric Cheung and   
               K. Hal Purdy and   
                Pamela Zave and   
         J. Christopher Ramming   An open architecture for next-generation
                                  telecommunication services . . . . . . . 83--123

ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 2, May, 2004

         Gary William Flake and   
             Paolo Frasconi and   
               C. Lee Giles and   
                  Marco Maggini   Guest editorial: Machine learning for
                                  the Internet . . . . . . . . . . . . . . 125--128
           Eugene Agichtein and   
             Steve Lawrence and   
                   Luis Gravano   Learning to find answers to questions on
                                  the Web  . . . . . . . . . . . . . . . . 129--162
           Mukund Deshpande and   
                 George Karypis   Selective Markov models for predicting
                                  Web page accesses  . . . . . . . . . . . 163--184
                Jianhan Zhu and   
                   Jun Hong and   
                 John G. Hughes   PageCluster: Mining conceptual link
                                  hierarchies from Web log files for
                                  adaptive Web site navigation . . . . . . 185--208
                  Xiao Fang and   
            Olivia R. Liu Sheng   LinkSelector: A Web mining approach to
                                  hyperlink selection for Web portals  . . 209--237

ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 3, August, 2004

                Simon Byers and   
             Aviel D. Rubin and   
                  David Kormann   Defending against an Internet-based
                                  attack on the physical world . . . . . . 239--254
François Goasdoué and   
        Marie-Christine Rousset   Answering queries using views: A KRDB
                                  perspective for the semantic Web . . . . 255--288
                Roger Barga and   
                David Lomet and   
            German Shegalov and   
                 Gerhard Weikum   Recovery guarantees for Internet
                                  applications . . . . . . . . . . . . . . 289--328
          David Lybäck and   
                   Magnus Boman   Agent trade servers in financial
                                  exchange systems . . . . . . . . . . . . 329--339

ACM Transactions on Internet Technology (TOIT)
Volume 4, Number 4, November, 2004

         Gary William Flake and   
             Paolo Frasconi and   
               C. Lee Giles and   
                  Marco Maggini   Guest editorial: Machine learning for
                                  the Internet . . . . . . . . . . . . . . 341--343
           Michael O'Mahony and   
                Neil Hurley and   
        Nicholas Kushmerick and   
Guénolé Silvestre   Collaborative recommendation: A
                                  robustness analysis  . . . . . . . . . . 344--377
            Filippo Menczer and   
                Gautam Pant and   
             Padmini Srinivasan   Topical web crawlers: Evaluating
                                  adaptive algorithms  . . . . . . . . . . 378--419
            Sander M. Bohte and   
             Enrico Gerding and   
           Han La Poutré   Market-based recommendation: Agents that
                                  compete for consumer attention . . . . . 420--448


ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 1, February, 2005

                 Peter Thiemann   An embedded domain-specific language for
                                  type-safe server-side Web scripting  . . 1--46
          Liliana Ardissono and   
                   Anna Goy and   
           Giovanna Petrone and   
                  Marino Segnan   A multi-agent infrastructure for
                                  developing personalized Web-based
                                  systems  . . . . . . . . . . . . . . . . 47--69
               Addison Chan and   
           Rynson W. H. Lau and   
                    Beatrice Ng   Motion prediction for caching and
                                  prefetching in mouse-driven DVE
                                  navigation . . . . . . . . . . . . . . . 70--91
           Monica Bianchini and   
                 Marco Gori and   
               Franco Scarselli   Inside PageRank  . . . . . . . . . . . . 92--128
             Victoria Ungureanu   Using certified policies to regulate
                                  E-commerce transactions  . . . . . . . . 129--153
                 Hongjun Lu and   
              Jeffrey Xu Yu and   
                Guoren Wang and   
               Shihui Zheng and   
              Haifeng Jiang and   
                      Ge Yu and   
                    Aoying Zhou   What makes the differences: benchmarking
                                  XML database implementations . . . . . . 154--194
          Wilson Wai Ho Mok and   
                R. P. Sundarraj   Learning algorithms for single-instance
                                  electronic negotiations using the
                                  time-dependent behavioral tactic . . . . 195--230
              Allan Borodin and   
          Gareth O. Roberts and   
       Jeffrey S. Rosenthal and   
            Panayiotis Tsaparas   Link analysis ranking: algorithms,
                                  theory, and experiments  . . . . . . . . 231--297

ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 2, May, 2005

               Martin Abadi and   
               Mike Burrows and   
               Mark Manasse and   
                     Ted Wobber   Moderately hard, memory-bound functions  299--327
              Daniel Oberle and   
              Steffen Staab and   
                Rudi Studer and   
                   Raphael Volz   Supporting application development in
                                  the Semantic Web . . . . . . . . . . . . 328--358
             Jim Challenger and   
               Paul Dantzig and   
               Arun Iyengar and   
                  Karen Witting   A fragment-based approach for
                                  efficiently creating dynamic Web content 359--389
       Michalis Petropoulos and   
    Yannis Papakonstantinou and   
               Vasilis Vassalos   Graphical query interfaces for
                                  semistructured data: the QURSED system   390--438

ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 3, August, 2005

            Ioana Manolescu and   
            Marco Brambilla and   
               Stefano Ceri and   
                 Sara Comai and   
               Piero Fraternali   Model-driven design and deployment of
                                  service-enabled Web applications . . . . 439--479
                   Keqiu Li and   
                  Hong Shen and   
         Francis Y. L. Chin and   
                  Si Qing Zheng   Optimal methods for coordinated enroute
                                  Web caching for tree networks  . . . . . 480--507
               Daniel Gomes and   
          Mário J. Silva   Characterizing a national community Web  508--531
                  Xuan Chen and   
                 John Heidemann   Flash crowd mitigation via adaptive
                                  admission control based on
                                  application-level observations . . . . . 532--569
               Vasilis Vassalos   Corrigenda . . . . . . . . . . . . . . . 570--570

ACM Transactions on Internet Technology (TOIT)
Volume 5, Number 4, November, 2005

            Kaname Harumoto and   
             Tadashi Nakano and   
            Shinya Fukumura and   
             Shinji Shimojo and   
                 Shojiro Nishio   Effective Web browsing through content
                                  delivery adaptation  . . . . . . . . . . 571--600
                 Mingzhe Li and   
              Mark Claypool and   
             Robert Kinicki and   
                  James Nichols   Characteristics of streaming media
                                  stored on the Web  . . . . . . . . . . . 601--626
                 Oscar Diaz and   
              Juan J. Rodriguez   Portlet syndication: Raising variability
                                  concerns . . . . . . . . . . . . . . . . 627--659
              Makoto Murata and   
                Dongwon Lee and   
                Murali Mani and   
              Kohsuke Kawaguchi   Taxonomy of XML schema languages using
                                  formal language theory . . . . . . . . . 660--704


ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 1, February, 2006

               Jeng-Wei Lin and   
                Jan-Ming Ho and   
              Li-Ming Tseng and   
                     Feipei Lai   IDN server proxy architecture for
                                  Internationalized Domain Name resolution
                                  and experiences with providing Web
                                  services . . . . . . . . . . . . . . . . 1--19
           Bianca Schroeder and   
             Mor Harchol-Balter   Web servers under overload: How
                                  scheduling can help  . . . . . . . . . . 20--52
              Shu-Yao Chien and   
        Vassilis J. Tsotras and   
              Carlo Zaniolo and   
                  Donghui Zhang   Supporting complex queries on
                                  multiversion XML documents . . . . . . . 53--84
              Simon Szykman and   
                  Ram D. Sriram   Design and implementation of the
                                  Web-enabled NIST design repository . . . 85--116

ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 2, May, 2006

              Trevor Fenner and   
                Mark Levene and   
                  George Loizou   A stochastic model for the evolution of
                                  the Web allowing link deletion . . . . . 117--130
                 Ravi Kumar and   
         Prabhakar Raghavan and   
        Sridhar Rajagopalan and   
                 Andrew Tomkins   Core algorithms in the CLEVER system . . 131--152
                Junghoo Cho and   
       Hector Garcia-Molina and   
           Taher Haveliwala and   
                   Wang Lam and   
            Andreas Paepcke and   
            Sriram Raghavan and   
                    Gary Wesley   Stanford WebBase components and
                                  applications . . . . . . . . . . . . . . 153--186
        Salvatore J. Stolfo and   
            Shlomo Hershkop and   
                Chia-Wei Hu and   
                 Wei-Jen Li and   
          Olivier Nimeskern and   
                        Ke Wang   Behavior-based modeling and its
                                  application to Email analysis  . . . . . 187--221

ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 3, August, 2006

                 Jun-Ki Min and   
             Myung-Jae Park and   
                 Chin-Wan Chung   A compressor for effective archiving,
                                  retrieval, and updating of XML documents 223--258
                Arno Bakker and   
          Maarten Van Steen and   
            Andrew S. Tanenbaum   A wide-area Distribution Network for
                                  free software  . . . . . . . . . . . . . 259--281
             Michael Brinkmeier   PageRank revisited . . . . . . . . . . . 282--301
Björn Thòr Jónsson and   
   María Arinbjarnar and   
Bjarnsteinn Thórsson and   
        Michael J. Franklin and   
              Divesh Srivastava   Performance and overhead of semantic
                                  cache management . . . . . . . . . . . . 302--331

ACM Transactions on Internet Technology (TOIT)
Volume 6, Number 4, November, 2006

         Irma Becerra-Fernandez   Searching for experts on the Web: A
                                  review of contemporary expertise locator
                                  systems  . . . . . . . . . . . . . . . . 333--355
           Paolo Bellavista and   
            Antonio Corradi and   
          Rebecca Montanari and   
              Cesare Stefanelli   A mobile computing middleware for
                                  location- and context-aware Internet
                                  data services  . . . . . . . . . . . . . 356--380
              Ah Chung Tsoi and   
        Markus Hagenbuchner and   
               Franco Scarselli   Computing customized page ranks  . . . . 381--414
               Kai-Lung Hui and   
          Bernard C. Y. Tan and   
                  Chyan-Yee Goh   Online information disclosure:
                                  Motivators and measurements  . . . . . . 415--441
          Bernard J. Jansen and   
               Tracy Mullen and   
               Amanda Spink and   
                   Jan Pedersen   Automated gathering of Web information:
                                  An in-depth examination of agents
                                  interacting with search engines  . . . . 442--464
                 Minghua He and   
       Nicholas R. Jennings and   
       Adam Prügel-Bennett   A heuristic bidding strategy for buying
                                  multiple goods in multiple English
                                  auctions . . . . . . . . . . . . . . . . 465--496
           Jennifer Golbeck and   
                  James Hendler   Inferring binary trust relationships in
                                  Web-based social networks  . . . . . . . 497--529


ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 1, February, 2007

          Varghese S. Jacob and   
           Ramayya Krishnan and   
                   Young U. Ryu   Internet content filtering using
                                  isotonic separation on content category
                                  ratings  . . . . . . . . . . . . . . . . 1:1--1:??
               Stefano Ceri and   
             Florian Daniel and   
          Maristella Matera and   
              Federico M. Facca   Model-driven development of
                                  context-aware Web applications . . . . . 2:1--2:??
                 Xuhua Ding and   
          Daniele Mazzocchi and   
                    Gene Tsudik   Equipping smart devices with public key
                                  signatures . . . . . . . . . . . . . . . 3:1--3:??
              Debora Donato and   
                Luigi Laura and   
           Stefano Leonardi and   
               Stefano Millozzi   The Web as a graph: How far we are . . . 4:1--4:??
                  Yun Huang and   
               Xianjun Geng and   
             Andrew B. Whinston   Defeating DDoS attacks by fixing the
                                  incentive chain  . . . . . . . . . . . . 5:1--5:??
               Tak-Lam Wong and   
                        Wai Lam   Adapting Web information extraction
                                  knowledge via mining site-invariant and
                                  site-dependent features  . . . . . . . . 6:1--6:??
             Daniel Villela and   
           Prashant Pradhan and   
                 Dan Rubenstein   Provisioning servers in the application
                                  tier for e-commerce systems  . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 2, May, 2007

       Angelos D. Keromytis and   
              Jonathan M. Smith   Requirements for scalable access control
                                  and security management architectures    8:1--8:??
        Ricardo Baeza-Yates and   
            Carlos Castillo and   
        Efthimis N. Efthimiadis   Characterization of national Web domains 9:1--9:??
               Andrei Arion and   
            Angela Bonifati and   
            Ioana Manolescu and   
                Andrea Pugliese   XQueC: A query-conscious compressed XML
                                  database . . . . . . . . . . . . . . . . 10:1--10:??
                  Jing Zhou and   
                 Wendy Hall and   
          David C. De Roure and   
               Vijay K. Dialani   Supporting ad-hoc resource sharing on
                                  the Web: A peer-to-peer approach to
                                  hypermedia link services . . . . . . . . 11:1--11:??
               Esther David and   
                Alex Rogers and   
       Nicholas R. Jennings and   
              Jeremy Schiff and   
                Sarit Kraus and   
            Michael H. Rothkopf   Optimal design of English auctions with
                                  discrete bid levels  . . . . . . . . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 3, August, 2007

                 Amar Gupta and   
             Satwiksai Seshasai   Guest editorial: The Internet and
                                  outsourcing  . . . . . . . . . . . . . . 13:1--13:??
                 Amar Gupta and   
                Satwik Seshasai   24-hour knowledge factory: Using
                                  Internet technology to leverage spatial
                                  and temporal separations . . . . . . . . 14:1--14:??
              Rafiq Dossani and   
                   Nathan Denny   The Internet's role in offshored
                                  services: A case study of India  . . . . 15:1--15:??
                  Ravi Aron and   
           Siddarth Jayanty and   
                 Praveen Pathak   Impact of Internet-based distributed
                                  monitoring systems on offshore sourcing
                                  of services  . . . . . . . . . . . . . . 16:1--16:??
                   Li Xiong and   
         Subramanyam Chitti and   
                       Ling Liu   Preserving data privacy in outsourcing
                                  data aggregation services  . . . . . . . 17:1--17:??

ACM Transactions on Internet Technology (TOIT)
Volume 7, Number 4, October, 2007

       Sarabjot Singh Anand and   
               Bamshad Mobasher   Introduction to intelligent techniques
                                  for Web personalization  . . . . . . . . 18:1--18:??
                 Wilfred Ng and   
                   Lin Deng and   
                    Dik Lun Lee   Mining User preference using Spy voting
                                  for search engine personalization  . . . 19:1--19:??
              Maurice Coyle and   
                    Barry Smyth   Supporting intelligent Web search  . . . 20:1--20:??
         Magdalini Eirinaki and   
          Michalis Vazirgiannis   Web site personalization based on link
                                  analysis and navigational patterns . . . 21:1--21:??
       Sarabjot Singh Anand and   
           Patricia Kearney and   
                  Mary Shapcott   Generating semantically enriched user
                                  profiles for Web personalization . . . . 22:1--22:??
           Bamshad Mobasher and   
                Robin Burke and   
               Runa Bhaumik and   
                  Chad Williams   Toward trustworthy recommender systems:
                                  An analysis of attack models and
                                  algorithm robustness . . . . . . . . . . 23:1--23:??


ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 1, November, 2007

            Brahim Medjahed and   
         Athman Bouguettaya and   
             Boualem Benatallah   Introduction to special issue on
                                  semantic Web services  . . . . . . . . . 1:1--1:??
                  Eran Toch and   
                Avigdor Gal and   
      Iris Reinhartz-Berger and   
                       Dov Dori   A semantic approach to approximate
                                  service retrieval  . . . . . . . . . . . 2:1--2:??
            Marco Brambilla and   
               Stefano Ceri and   
     Federico Michele Facca and   
               Irene Celino and   
              Dario Cerizza and   
           Emanuele Della Valle   Model-driven design and development of
                                  semantic Web service applications  . . . 3:1--3:??
             Michael Mrissa and   
            Chirine Ghedira and   
          Djamal Benslimane and   
             Zakaria Maamar and   
          Florian Rosenberg and   
               Schahram Dustdar   A context-based mediation approach to
                                  compose semantic Web services  . . . . . 4:1--4:??
             Mohamed Shehab and   
         Kamal Bhattacharya and   
                   Arif Ghafoor   Web services discovery in secure
                                  collaboration environments . . . . . . . 5:1--5:??

ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 2, February, 2008

                    Qing Li and   
           Rynson W. H. Lau and   
               Timothy Shih and   
                  Dennis McLeod   Introduction to special issue Internet
                                  technologies for distance education  . . 1:1--1:??
                  Xuping Tu and   
                    Hai Jin and   
               Xiaofei Liao and   
                   Jiannong Cao   Nearcast: A locality-aware P2P live
                                  streaming approach for distance
                                  education  . . . . . . . . . . . . . . . 2:1--2:??
                Peter Dolog and   
                Bernd Simon and   
             Wolfgang Nejdl and   
             Toma\vz Klobu\vcar   Personalizing access to learning
                                  networks . . . . . . . . . . . . . . . . 3:1--3:??
             Paola Salomoni and   
               Silvia Mirri and   
           Stefano Ferretti and   
                 Marco Roccetti   A multimedia broker to support
                                  accessible and mobile learning through
                                  learning objects adaptation  . . . . . . 4:1--4:??
                    Qing Li and   
           Rynson W. H. Lau and   
            Timothy K. Shih and   
             Frederick W. B. Li   Technology supports for distributed and
                                  collaborative learning over the internet 5:1--5:??

ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 3, May, 2008

           Qusay H. Mahmoud and   
            Peter Langendoerfer   Guest editorial: Service-oriented
                                  computing  . . . . . . . . . . . . . . . 11:1--11:??
          Robert A. Van Engelen   A framework for service-oriented
                                  computing with C and C++ Web service
                                  components . . . . . . . . . . . . . . . 12:1--12:??
    Wil M. P. van der Aalst and   
               Marlon Dumas and   
                Chun Ouyang and   
               Anne Rozinat and   
                   Eric Verbeek   Conformance checking of service behavior 13:1--13:??
                Jingwen Jin and   
                Klara Nahrstedt   QoS-aware service management for
                                  component-based distributed applications 14:1--14:??
                       Uwe Zdun   Pattern-based design of a
                                  service-oriented middleware for remote
                                  object federations . . . . . . . . . . . 15:1--15:??

ACM Transactions on Internet Technology (TOIT)
Volume 8, Number 4, September, 2008

              Amir Herzberg and   
                    Ahmad Jbara   Security and identification indicators
                                  for browsers against spoofing and
                                  phishing attacks . . . . . . . . . . . . 16:1--16:??
               Manish Gupta and   
            Shamik Banerjee and   
             Manish Agrawal and   
                  H. Raghav Rao   Security analysis of Internet technology
                                  components enabling globally distributed
                                  workplaces --- a framework . . . . . . . 17:1--17:??
           Jeannie Albrecht and   
          David Oppenheimer and   
                Amin Vahdat and   
             David A. Patterson   Design and implementation trade-offs for
                                  wide-area resource discovery . . . . . . 18:1--18:??
              Antonio Brogi and   
               Sara Corfini and   
                 Razvan Popescu   Semantics-based composition-oriented
                                  discovery of Web services  . . . . . . . 19:1--19:??
                  Hai Zhuge and   
               Yunpeng Xing and   
                       Peng Shi   Resource space model, OWL and database:
                                  Mapping and integration  . . . . . . . . 20:1--20:??
              Xiao-Bing Xue and   
               Zhi-Hua Zhou and   
          Zhongfei (Mark) Zhang   Improving Web search using image
                                  snippets . . . . . . . . . . . . . . . . 21:1--21:??


ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 1, February, 2009

           Bhuvan Urgaonkar and   
            Prashant Shenoy and   
                 Timothy Roscoe   Resource overbooking and application
                                  profiling in a shared Internet hosting
                                  platform . . . . . . . . . . . . . . . . 1:1--1:??
            Sebastian Stein and   
             Terry R. Payne and   
           Nicholas R. Jennings   Flexible provisioning of Web service
                                  workflows  . . . . . . . . . . . . . . . 2:1--2:??
                 Paul Groth and   
                Simon Miles and   
                     Luc Moreau   A model of process documentation to
                                  determine provenance in mash-ups . . . . 3:1--3:??
            Giancarlo Ruffo and   
            Rossano Schifanella   A peer-to-peer recommender system based
                                  on spontaneous affinities  . . . . . . . 4:1--4:??

ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 2, May, 2009

                   Scott Jordan   Implications of Internet architecture on
                                  net neutrality . . . . . . . . . . . . . 5:1--5:??
            Toby Ehrenkranz and   
                         Jun Li   On the state of IP spoofing defense  . . 6:1--6:??
           Bettina Fazzinga and   
              Sergio Flesca and   
                Andrea Pugliese   Retrieving XML data from heterogeneous
                                  sources through vague querying . . . . . 7:1--7:??
                   Erol Gelenbe   Analysis of single and networked
                                  auctions . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 3, July, 2009

                     Xin Li and   
                    Jun Yan and   
                 Weiguo Fan and   
                   Ning Liu and   
              Shuicheng Yan and   
                     Zheng Chen   An online blog reading system by topic
                                  clustering and personalized ranking  . . 9:1--9:??
             Antonio M. Rinaldi   An ontology-driven approach for semantic
                                  information retrieval on the Web . . . . 10:1--10:??
          Christian Platzer and   
          Florian Rosenberg and   
               Schahram Dustdar   Web service clustering using
                                  multidimensional angles as proximity
                                  measures . . . . . . . . . . . . . . . . 11:1--11:??
              Duanning Zhou and   
                Wayne Wei Huang   Using a fuzzy classification approach to
                                  assess e-commerce Web sites: An
                                  empirical investigation  . . . . . . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 9, Number 4, September, 2009

                Joonho Kwon and   
                Praveen Rao and   
                Bongki Moon and   
                      Sukho Lee   Fast XML document filtering by
                                  sequencing twig patterns . . . . . . . . 13:1--13:??
              Dario Colazzo and   
                 Carlo Sartiani   Detection of corrupted schema mappings
                                  in XML data integration systems  . . . . 14:1--14:??
                 Alan Kenny and   
      Séamus Mcloone and   
              Tomás Ward   Controlling entity state updates to
                                  maintain remote consistency within a
                                  distributed interactive application  . . 15:1--15:??
             Theoni Pitoura and   
            Peter Triantafillou   Distribution fairness in Internet-scale
                                  networks . . . . . . . . . . . . . . . . 16:1--16:??


ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 1, February, 2010

       David Michael Turner and   
        Vassilis Prevelakis and   
           Angelos D. Keromytis   A market-based bandwidth charging
                                  framework  . . . . . . . . . . . . . . . 1:1--1:??
                 Somesh Jha and   
       Stefan Katzenbeisser and   
       Christian Schallhart and   
               Helmut Veith and   
                Stephen Chenney   Semantic integrity in large-scale online
                                  simulations  . . . . . . . . . . . . . . 2:1--2:??
              Tzu-Chi Huang and   
           Sherali Zeadally and   
         Naveen Chilamkurti and   
                  Ce-Kuen Shieh   A programmable network address
                                  translator: Design, implementation, and
                                  performance  . . . . . . . . . . . . . . 3:1--3:??
               Hweehwa Pang and   
                Jialie Shen and   
               Ramayya Krishnan   Privacy-preserving similarity-based text
                                  retrieval  . . . . . . . . . . . . . . . 4:1--4:??

ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 2, May, 2010

             Teh-Chung Chen and   
                 Scott Dick and   
                   James Miller   Detecting visually similar Web pages:
                                  Application to phishing detection  . . . 5:1--5:??
                  Chuan Yue and   
                   Haining Wang   BogusBiter: A transparent protection
                                  against phishing attacks . . . . . . . . 6:1--6:??
     Ponnurangam Kumaraguru and   
                Steve Sheng and   
        Alessandro Acquisti and   
        Lorrie Faith Cranor and   
                     Jason Hong   Teaching Johnny not to fall for phish    7:1--7:??
                 Ugur Kuter and   
               Jennifer Golbeck   Using probabilistic confidence models
                                  for trust inference in Web-based social
                                  networks . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 3, October, 2010

           Moheeb Abu Rajab and   
             Fabian Monrose and   
                   Niels Provos   Peeking Through the Cloud: Client
                                  Density Estimation via DNS Cache Probing 9:1--9:??
            Alberto Bartoli and   
            Giorgio Davanzo and   
                    Eric Medvet   A Framework for Large-Scale Detection of
                                  Web Site Defacements . . . . . . . . . . 10:1--10:??
                 Ilya Gluhovsky   Forecasting Click-Through Rates Based on
                                  Sponsored Search Advertiser Bids and
                                  Intermediate Variable Regression . . . . 11:1--11:??
               Scott Jordan and   
                   Arijit Ghosh   A Framework for Classification of
                                  Traffic Management Practices as
                                  Reasonable or Unreasonable . . . . . . . 12:1--12:??

ACM Transactions on Internet Technology (TOIT)
Volume 10, Number 4, March, 2011

               Haifeng Shen and   
                 Chengzheng Sun   Achieving Data Consistency by
                                  Contextualization in Web-Based
                                  Collaborative Applications . . . . . . . 13:1--13:??
                Neil Hurley and   
                       Mi Zhang   Novelty and Diversity in Top-$N$
                                  Recommendation --- Analysis and
                                  Evaluation . . . . . . . . . . . . . . . 14:1--14:??
                 Mark Meiss and   
            Filippo Menczer and   
          Alessandro Vespignani   Properties and Evolution of Internet
                                  Traffic Networks from Anonymized Flow
                                  Data . . . . . . . . . . . . . . . . . . 15:1--15:??
          Adina Crainiceanu and   
              Prakash Linga and   
     Ashwin Machanavajjhala and   
            Johannes Gehrke and   
       Jayavel Shanmugasundaram   Load Balancing and Range Queries in P2P
                                  Systems Using P-Ring . . . . . . . . . . 16:1--16:??


ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 1, July, 2011

            Alexander Totok and   
               Vijay Karamcheti   Exploiting Service Usage Information for
                                  Optimizing Server Resource Management    1:1--1:??
              Martin Arlitt and   
            Niklas Carlsson and   
              Phillipa Gill and   
             Aniket Mahanti and   
               Carey Williamson   Characterizing Intelligence Gathering
                                  and Control on an Edge Network . . . . . 2:1--2:??
                Justin Zhan and   
             B. John Oommen and   
             Johanna Crisostomo   Anomaly Detection in Dynamic Systems
                                  Using Weak Estimators  . . . . . . . . . 3:1--3:??
           Pierre Genev\`es and   
           Nabil Laya\"\ida and   
                  Vincent Quint   Impact of XML Schema Evolution . . . . . 4:1--4:??

ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 2, December, 2011

           Christoph Goebel and   
               Dirk Neumann and   
               Ramayya Krishnan   Comparing ingress and egress detection
                                  to secure interdomain routing: An
                                  experimental analysis  . . . . . . . . . 5:1--5:??
           Jeannie Albrecht and   
         Christopher Tuttle and   
                 Ryan Braud and   
                 Darren Dao and   
           Nikolay Topilski and   
            Alex C. Snoeren and   
                    Amin Vahdat   Distributed application configuration,
                                  management, and visualization with plush 6:1--6:??
              Ki-Woong Park and   
                    Kyu Ho Park   ACCENT: Cognitive cryptography plugged
                                  compression for SSL/TLS-based cloud
                                  computing services . . . . . . . . . . . 7:1--7:??
              Amy Csizmar Dalal   User-perceived quality assessment of
                                  streaming media using reduced feature
                                  sets . . . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 3, January, 2012

              Quan Z. Sheng and   
               Schahram Dustdar   Introduction to special issue on
                                  context-aware Web services for the
                                  future Internet  . . . . . . . . . . . . 9:1--9:??
   Dhaminda B. Abeywickrama and   
              Sita Ramakrishnan   Context-aware services engineering:
                                  Models, transformations, and
                                  verification . . . . . . . . . . . . . . 10:1--10:??
               Qinyuan Feng and   
                   Ling Liu and   
                      Yafei Dai   Vulnerabilities and countermeasures in
                                  context-aware social rating services . . 11:1--11:??
             Takuya Maekawa and   
          Yutaka Yanagisawa and   
            Yasushi Sakurai and   
              Yasue Kishino and   
                 Koji Kamei and   
                Takeshi Okadome   Context-aware Web search in ubiquitous
                                  sensor environments  . . . . . . . . . . 12:1--12:??
                    Jing He and   
              Yanchun Zhang and   
             Guangyan Huang and   
                      Jinli Cao   A smart Web service based on the context
                                  of things  . . . . . . . . . . . . . . . 13:1--13:??
            Wanita Sherchan and   
                Surya Nepal and   
         Athman Bouguettaya and   
                   Shiping Chen   Context-sensitive user interfaces for
                                  semantic services  . . . . . . . . . . . 14:1--14:??

ACM Transactions on Internet Technology (TOIT)
Volume 11, Number 4, March, 2012

                    Alex X. Liu   Firewall policy change-impact analysis   15:1--15:??
                Zhisheng Li and   
               Xiangye Xiao and   
                  Meng Wang and   
                 Chong Wang and   
                  Xufa Wang and   
                       Xing Xie   Towards the taxonomy-oriented
                                  categorization of yellow pages queries   16:1--16:??
     Kenneth Wai-Ting Leung and   
                Dik Lun Lee and   
                 Wilfred Ng and   
                 Hing Yuet Fung   A framework for personalizing web search
                                  with concept-based user profiles . . . . 17:1--17:??


ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 1, June, 2012

              Italo Dacosta and   
          Saurabh Chakradeo and   
            Mustaque Ahamad and   
                Patrick Traynor   One-time cookies: Preventing session
                                  hijacking attacks with stateless
                                  authentication tokens  . . . . . . . . . 1:1--1:??
        Marios D. Dikaiakos and   
      Asterios Katsifodimos and   
                  George Pallis   Minersoft: Software retrieval in grid
                                  and cloud computing infrastructures  . . 2:1--2:??
                   Deke Guo and   
                 Yunhao Liu and   
                    Hai Jin and   
                  Zhong Liu and   
              Weiming Zhang and   
                        Hui Liu   Theory and network applications of
                                  balanced Kautz tree structures . . . . . 3:1--3:??

ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 2, December, 2012

               Gareth Tyson and   
             Andreas Mauthe and   
            Sebastian Kaune and   
                 Paul Grace and   
                Adel Taweel and   
               Thomas Plagemann   Juno: a Middleware Platform for
                                  Supporting Delivery-Centric Applications 4:1--4:??
              Valentin Robu and   
               Lonneke Mous and   
           Han La Poutré   Using Priced Options to Solve the
                                  Exposure Problem in Sequential Auctions  5:1--5:??
                 Ziyang Liu and   
                        Yi Chen   Exploiting and Maintaining Materialized
                                  Views for XML Keyword Queries  . . . . . 6:1--6:??

ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 3, May, 2013

         Claudio A. Ardagna and   
             Sushil Jajodia and   
        Pierangela Samarati and   
                Angelos Stavrou   Providing Users' Anonymity in Mobile
                                  Hybrid Networks  . . . . . . . . . . . . 7:1--7:??
              Ilung Pranata and   
            Rukshan Athauda and   
                  Geoff Skinner   Modeling Decentralized Reputation-Based
                                  Trust for Initial Transactions in
                                  Digital Environments . . . . . . . . . . 8:1--8:??
                 Lihua Yuan and   
             Chao-Chih Chen and   
          Prasant Mohapatra and   
             Chen-Nee Chuah and   
                   Krishna Kant   A Proxy View of Quality of Domain Name
                                  Service, Poisoning Attacks and Survival
                                  Strategies . . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Internet Technology (TOIT)
Volume 12, Number 4, July, 2013

              Munindar P. Singh   Vision for TOIT  . . . . . . . . . . . . 10:1--10:??
              Munindar P. Singh   TOIT Administrative Updates  . . . . . . 11:1--11:??
                  Meng Wang and   
                 Guangda Li and   
                   Zheng Lu and   
                    Yue Gao and   
                  Tat-Seng Chua   When Amazon Meets Google: Product
                                  Visualization by Exploring Multiple Web
                                  Sources  . . . . . . . . . . . . . . . . 12:1--12:??
                Yu-Li Liang and   
                 Xinyu Xing and   
             Hanqiang Cheng and   
               Jianxun Dang and   
                  Sui Huang and   
                Richard Han and   
                    Xue Liu and   
                     Qin Lv and   
               Shivakant Mishra   SafeVchat: a System for Obscene Content
                                  Detection in Online Video Chat Services  13:1--13:??
              Craig A. Shue and   
              Andrew J. Kalafut   Resolvers Revealed: Characterizing DNS
                                  Resolvers and their Clients  . . . . . . 14:1--14:??


ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 1, November, 2013

                  Xitong Li and   
          Stuart E. Madnick and   
                    Hongwei Zhu   A Context-Based Approach to Reconciling
                                  Data Interpretation Conflicts in Web
                                  Services Composition . . . . . . . . . . 1:1--1:??
               San-Tsai Sun and   
              Eric Pospisil and   
            Ildar Muslukhov and   
               Nuray Dindar and   
             Kirstie Hawkey and   
            Konstantin Beznosov   Investigating Users' Perspectives of Web
                                  Single Sign-On: Conceptual Gaps and
                                  Acceptance Model . . . . . . . . . . . . 2:1--2:??
      Massimiliano Albanese and   
          Antonio d'Acierno and   
           Vincenzo Moscato and   
               Fabio Persia and   
             Antonio Picariello   A Multimedia Recommender System  . . . . 3:1--3:??

ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 2, December, 2013

             Hassan Sayyadi and   
                 Louiqa Raschid   A Graph Analytical Approach for Topic
                                  Detection  . . . . . . . . . . . . . . . 4:1--4:??
              Kemal Bicakci and   
               Bruno Crispo and   
               Gabriele Oligeri   LAKE: a Server-Side Authenticated
                                  Key-Establishment with Low Computational
                                  Workload . . . . . . . . . . . . . . . . 5:1--5:??
               Scott Jordan and   
                   Gwen Shaffer   User and ISP Rights of Device Attachment
                                  and Device Management  . . . . . . . . . 6:1--6:??

ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 3, May, 2014

                Xiaowen Chu and   
               Xiaowei Chen and   
               Adele Lu Jia and   
          Johan A. Pouwelse and   
               Dick H. J. Epema   Dissecting Darknets: Measurement and
                                  Performance Analysis . . . . . . . . . . 7:1--7:??
          Ghassan O. Karame and   
 Aurélien Francillon and   
         Victor Budilivschi and   
              Srdjan Capkun and   
                  Vedran Capkun   Microcomputations as Micropayments in
                                  Web-based Services . . . . . . . . . . . 8:1--8:??
           Jeremy Blackburn and   
         Nicolas Kourtellis and   
              John Skvoretz and   
              Matei Ripeanu and   
              Adriana Iamnitchi   Cheating in Online Games: a Social
                                  Network Perspective  . . . . . . . . . . 9:1--9:??
                   Tian Guo and   
             Upendra Sharma and   
            Prashant Shenoy and   
               Timothy Wood and   
                    Sambit Sahu   Cost-Aware Cloud Bursting for Enterprise
                                  Applications . . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Internet Technology (TOIT)
Volume 13, Number 4, July, 2014

                   Xiao Bai and   
           Rachid Guerraoui and   
           Anne-Marie Kermarrec   Personalizing Top-$k$ Processing Online
                                  in a Peer-to-Peer Social Tagging Network 11:1--11:??
            Karim Benouaret and   
          Djamal Benslimane and   
              Allel Hadjali and   
           Mahmoud Barhamgi and   
             Zakaria Maamar and   
                  Quan Z. Sheng   Web Service Compositions with Fuzzy
                                  Preferences: a Graded Dominance
                                  Relationship-Based Approach  . . . . . . 12:1--12:??
           Pierre Genev\`es and   
               Nabil Laya\"\ida   Equipping IDEs with XML-Path Reasoning
                                  Capabilities . . . . . . . . . . . . . . 13:1--13:??


ACM Transactions on Internet Technology (TOIT)
Volume 14, Number 1, July, 2014

          Alexander Artikis and   
                Avigdor Gal and   
            Vana Kalogeraki and   
              Matthias Weidlich   Event Recognition Challenges and
                                  Techniques: Guest Editors' Introduction  1:1--1:??
            Souleiman Hasan and   
                   Edward Curry   Approximate Semantic Matching of Events
                                  for the Internet of Things . . . . . . . 2:1--2:??
          Cristian Molinaro and   
           Vincenzo Moscato and   
         Antonio Picariello and   
            Andrea Pugliese and   
             Antonino Rullo and   
             V. S. Subrahmanian   PADUA: Parallel Architecture to Detect
                                  Unexplained Activities . . . . . . . . . 3:1--3:??
      Christopher Mutschler and   
             Michael Philippsen   Adaptive Speculative Processing of
                                  Out-of-Order Event Streams . . . . . . . 4:1--4:??
       Gregory Aaron Wilkin and   
            Patrick Eugster and   
                  K. R. Jayaram   Decentralized Fault-Tolerant Event
                                  Correlation  . . . . . . . . . . . . . . 5:1--5:??
     Beate Ottenwälder and   
            Boris Koldehofe and   
             Kurt Rothermel and   
                 Kirak Hong and   
            David Lillethun and   
        Umakishore Ramachandran   MCEP: a Mobility-Aware Complex Event
                                  Processing System  . . . . . . . . . . . 6:1--6:??
               Boris Glavic and   
     Kyumars Sheykh Esmaili and   
           Peter M. Fischer and   
                  Nesime Tatbul   Efficient Stream Provenance via Operator
                                  Instrumentation  . . . . . . . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 14, Number 2--3, October, 2014

        Costas Courcoubetis and   
         Roch Guérin and   
            Patrick Loiseau and   
               David Parkes and   
               Jean Walrand and   
                   Adam Wierman   Special Issue on Pricing and Incentives
                                  in Networks and Systems: Guest Editors'
                                  Introduction . . . . . . . . . . . . . . 8:1--8:??
             Zeinab Abbassi and   
                Nidhi Hegde and   
       Laurent Massoulié   Distributed Content Curation on the Web  9:1--9:??
           Pierre Coucheney and   
        Giuseppe D'acquisto and   
      Patrick Maillé and   
             Maurizio Naldi and   
                   Bruno Tuffin   Influence of Search Neutrality on the
                                  Economics of Advertisement-Financed
                                  Content  . . . . . . . . . . . . . . . . 10:1--10:??
               Eitan Altman and   
      Manjesh Kumar Hanawal and   
              Rajesh Sundaresan   Regulation of Off-Network Pricing in a
                                  Nonneutral Network . . . . . . . . . . . 11:1--11:??
               Chi-Kin Chau and   
                  Qian Wang and   
                  Dah-Ming Chiu   Economic Viability of Paris Metro
                                  Pricing for Digital Services . . . . . . 12:1--12:??
         Roch Guérin and   
   Jaudelice C. de Oliveira and   
                   Steven Weber   Adoption of Bundled Services with
                                  Network Externalities and Correlated
                                  Affinities . . . . . . . . . . . . . . . 13:1--13:??
            Matthew Andrews and   
                Glenn Bruns and   
              Mustafa Dogru and   
                    Hyoseop Lee   Understanding Quota Dynamics in Wireless
                                  Networks . . . . . . . . . . . . . . . . 14:1--14:??
         Emir Kavurmacioglu and   
             Murat Alanyali and   
              David Starobinski   Demand-Invariant Price Relationships and
                                  Market Outcomes in Competitive Private
                                  Commons  . . . . . . . . . . . . . . . . 15:1--15:??
              Martin Hoefer and   
          Thomas Kesselheim and   
          Berthold Vöcking   Approximation Algorithms for Secondary
                                  Spectrum Auctions  . . . . . . . . . . . 16:1--16:??
        Ioannis Caragiannis and   
        Christos Kaklamanis and   
   Panagiotis Kanellopoulos and   
               Maria Kyropoulou   Revenue Guarantees in the Generalized
                                  Second Price Auction . . . . . . . . . . 17:1--17:??
                Josu Doncel and   
               Urtzi Ayesta and   
               Olivier Brun and   
             Balakrishna Prabhu   Is the Price of Anarchy the Right
                                  Measure for Load-Balancing Games?  . . . 18:1--18:??
                Aron Laszka and   
           Benjamin Johnson and   
       Pascal Schöttle and   
            Jens Grossklags and   
              Rainer Böhme   Secure Team Composition to Thwart
                                  Insider Threats and Cyber-Espionage  . . 19:1--19:??
                    Zhen Ye and   
         Athman Bouguettaya and   
                  Xiaofang Zhou   Economic Model-Driven Cloud Service
                                  Composition  . . . . . . . . . . . . . . 20:1--20:??
       Soudip Roy Chowdhury and   
             Florian Daniel and   
                   Fabio Casati   Recommendation and Weaving of Reusable
                                  Mashup Model Patterns for Assisted
                                  Development  . . . . . . . . . . . . . . 21:1--21:??

ACM Transactions on Internet Technology (TOIT)
Volume 14, Number 4, December, 2014

             Amit K. Chopra and   
                  Raian Ali and   
                   Maja Vukovic   Introduction to the Special Issue on
                                  Foundations of Social Computing  . . . . 22:1--22:??
             Matteo Baldoni and   
          Cristina Baroglio and   
           Federico Capuzzimati   A Commitment-Based Infrastructure for
                                  Programming Socio-Technical Systems  . . 23:1--23:??
          Flavio Figueiredo and   
         Jussara M. Almeida and   
Marcos André Gonçalves and   
     Fabrício Benevenuto   On the Dynamics of Social Media
                                  Popularity: a YouTube Case Study . . . . 24:1--24:??
         Thomas Lukasiewicz and   
      Maria Vanina Martinez and   
          Gerardo I. Simari and   
          Oana Tifrea-Marciuska   Ontology-Based Query Answering with
                                  Group Preferences  . . . . . . . . . . . 25:1--25:??
            Thiago H. Silva and   
    Pedro O. S. Vaz de Melo and   
         Jussara M. Almeida and   
             Juliana Salles and   
         Antonio A. F. Loureiro   Revealing the City That We Cannot See    26:1--26:??
                Jan Vosecky and   
                   Di Jiang and   
     Kenneth Wai-Ting Leung and   
                   Kai Xing and   
                     Wilfred Ng   Integrating Social and Auxiliary
                                  Semantics for Multifaceted Topic
                                  Modeling in Twitter  . . . . . . . . . . 27:1--27:??
                Dingqi Yang and   
               Daqing Zhang and   
                 Zhiyong Yu and   
                  Zhiwen Yu and   
               Djamal Zeghlache   SESAME: Mining User Digital Footprints
                                  for Fine-Grained Preference-Aware Social
                                  Media Search . . . . . . . . . . . . . . 28:1--28:??


ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 1, February, 2015

         Nicolas Kourtellis and   
           Jeremy Blackburn and   
            Cristian Borcea and   
              Adriana Iamnitchi   Special Issue on Foundations of Social
                                  Computing: Enabling Social Applications
                                  via Decentralized Social Data Management 1:1--1:??
              Alissa Cooper and   
                      Ian Brown   Net Neutrality: Discrimination,
                                  Competition, and Innovation in the UK
                                  and US . . . . . . . . . . . . . . . . . 2:1--2:??
            Pranav Dandekar and   
                Ashish Goel and   
         Michael P. Wellman and   
               Bryce Wiedenbeck   Strategic Formation of Credit Networks   3:1--3:??
              David R. Bild and   
                    Yue Liu and   
             Robert P. Dick and   
              Z. Morley Mao and   
                 Dan S. Wallach   Aggregate Characterization of User
                                  Behavior in Twitter and Analysis of the
                                  Retweet Graph  . . . . . . . . . . . . . 4:1--4:??
     H. M. N. Dilum Bandara and   
            Anura P. Jayasumana   P2P-Based, Multi-Attribute Resource
                                  Discovery under Real-World Resources and
                                  Queries  . . . . . . . . . . . . . . . . 5:1--5:??

ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 2, June, 2015

                Surya Nepal and   
               Cecile Paris and   
          Payam Aghaei Pour and   
                Jill Freyne and   
              Sanat Kumar Bista   Interaction-Based Recommendations for
                                  Online Communities . . . . . . . . . . . 6:1--6:??
              Amal Alhosban and   
             Khayyam Hashmi and   
                 Zaki Malik and   
            Brahim Medjahed and   
               Salima Benbernou   Bottom-Up Fault Management in
                                  Service-Based Systems  . . . . . . . . . 7:1--7:??
                    Wei Dai and   
                   Scott Jordan   The Effect of Data Caps upon ISP Service
                                  Tier Design and Users  . . . . . . . . . 8:1--8:??

ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 3, September, 2015

                  Yi Zhuang and   
                  Nan Jiang and   
                    Qing Li and   
                   Lei Chen and   
                     Chunhua Ju   Progressive Batch Medical Image
                                  Retrieval Processing in Mobile Wireless
                                  Networks . . . . . . . . . . . . . . . . 9:1--9:??
       Rostyslav Zabolotnyi and   
            Philipp Leitner and   
            Waldemar Hummer and   
               Schahram Dustdar   JCloudScale: Closing the Gap Between
                                  IaaS and PaaS  . . . . . . . . . . . . . 10:1--10:??
                      Anonymous   P-DONAS: a P2P-Based Domain Name System
                                  in Access Networks . . . . . . . . . . . 11:1--11:??

ACM Transactions on Internet Technology (TOIT)
Volume 15, Number 4, December, 2015

          Timothy J. Norman and   
             Suzanne Barber and   
               Rino Falcone and   
                      Jie Zhang   Introduction to Theme Section on Trust
                                  in Social Networks and Systems . . . . . 12:1--12:??
               Rino Falcone and   
        Alessandro Sapienza and   
        Cristiano Castelfranchi   The Relevance of Categories for Trusting
                                  Information Sources  . . . . . . . . . . 13:1--13:??
               Wenjun Jiang and   
                     Jie Wu and   
                    Guojun Wang   On Selecting Recommenders for Trust
                                  Evaluation in Online Social Networks . . 14:1--14:??
          Santiago Pina Ros and   
 Ángel Pina Canelles and   
    Manuel Gil Pérez and   
Félix Gómez Mármol and   
Gregorio Martínez Pérez   Chasing Offensive Conduct in Social
                                  Networks: a Reputation-Based Practical
                                  Approach for Frisber . . . . . . . . . . 15:1--15:??
      Alistair G. Sutcliffe and   
                    Di Wang and   
             Robin I. M. Dunbar   Modelling the Role of Trust in Social
                                  Relationships  . . . . . . . . . . . . . 16:1--16:??


ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 1, February, 2016

          Djamal Benslimane and   
              Quan Z. Sheng and   
           Mahmoud Barhamgi and   
                    Henri Prade   The Uncertain Web: Concepts, Challenges,
                                  and Current Solutions  . . . . . . . . . 1:1--1:??
                 Peng Zhang and   
                    Jing He and   
               Guodong Long and   
             Guangyan Huang and   
                  Chengqi Zhang   Towards Anomalous Diffusion Sources
                                  Detection in a Large Network . . . . . . 2:1--2:??
               Asma Abboura and   
                Soror Sahri and   
          Latifa Baba-Hamed and   
              Mourad Ouziri and   
               Salima Benbernou   Quality-Based Online Data Reconciliation 3:1--3:??
                Jiangang Ma and   
                     Le Sun and   
                   Hua Wang and   
              Yanchun Zhang and   
                   Uwe Aickelin   Supervised Anomaly Detection in
                                  Uncertain Pseudoperiodic Data Streams    4:1--4:??
           Abdallah Makhoul and   
          Christophe Guyeux and   
               Mourad Hakem and   
                Jacques M. Bahi   Using an Epidemiological Approach to
                                  Maximize Data Survival in the Internet
                                  of Things  . . . . . . . . . . . . . . . 5:1--5:??
     Kenneth Wai-Ting Leung and   
                   Di Jiang and   
                Dik Lun Lee and   
                     Wilfred Ng   Constructing Maintainable Semantic
                                  Relation Network from Ambiguous Concepts
                                  in Web Content . . . . . . . . . . . . . 6:1--6:??
                 Zaki Malik and   
            Brahim Medjahed and   
            Abdelmounaam Rezgui   sCARE: Reputation Estimation for
                                  Uncertain Web Services . . . . . . . . . 7:1--7:??

ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 2, April, 2016

                In-Young Ko and   
                 Han-Gyu Ko and   
       Angel Jimenez Molina and   
                 Jung-Hyun Kwon   SoIoT: Toward A User-Centric IoT-Based
                                  Service Framework  . . . . . . . . . . . 8:1--8:??
                   Lina Yao and   
              Quan Z. Sheng and   
             Anne H. H. Ngu and   
                         Xue Li   Things of Interest Recommendation by
                                  Leveraging Heterogeneous Relations in
                                  the Internet of Things . . . . . . . . . 9:1--9:??
                Marco Lippi and   
                  Paolo Torroni   Argumentation Mining: State of the Art
                                  and Emerging Trends  . . . . . . . . . . 10:1--10:??
        Michael Vögler and   
     Johannes M. Schleicher and   
         Christian Inzinger and   
               Schahram Dustdar   A Scalable Framework for Provisioning
                                  Large-Scale IoT Deployments  . . . . . . 11:1--11:??
                Lidong Bing and   
               Tak-Lam Wong and   
                        Wai Lam   Unsupervised Extraction of Popular
                                  Product Attributes from E-Commerce Web
                                  Sites by Considering Customer Reviews    12:1--12:??
                 Alba Amato and   
          Salvatore Venticinque   Multiobjective Optimization for
                                  Brokering of Multicloud Service
                                  Composition  . . . . . . . . . . . . . . 13:1--13:??
        Costas Courcoubetis and   
            Laszlo Gyarmati and   
         Nikolaos Laoutaris and   
            Pablo Rodriguez and   
                Kostas Sdrolias   Negotiating Premium Peering Prices: a
                                  Quantitative Model with Applications . . 14:1--14:??

ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 3, August, 2016

            Philipp Leitner and   
               Jürgen Cito   Patterns in the Chaos --- A Study of
                                  Performance Variation and Predictability
                                  in Public IaaS Clouds  . . . . . . . . . 15:1--15:??
              Tien-Dung Cao and   
               Tran-Vu Pham and   
              Quang-Hieu Vu and   
           Hong-Linh Truong and   
                Duc-Hung Le and   
               Schahram Dustdar   MARSA: a Marketplace for Realtime Human
                                  Sensing Data . . . . . . . . . . . . . . 16:1--16:??
    Carlos Rodríguez and   
             Florian Daniel and   
                   Fabio Casati   Mining and Quality Assessment of Mashup
                                  Model Patterns with the Crowd: a
                                  Feasibility Study  . . . . . . . . . . . 17:1--17:??
            Georgiana Copil and   
            Daniel Moldovan and   
           Hong-Linh Truong and   
               Schahram Dustdar   rSYBL: a Framework for Specifying and
                                  Controlling Cloud Services Elasticity    18:1--18:??
Delia Irazú Hernández Farías and   
              Viviana Patti and   
                    Paolo Rosso   Irony Detection in Twitter: The Role of
                                  Affective Content  . . . . . . . . . . . 19:1--19:??
               Gianni Costa and   
                Riccardo Ortale   Model-Based Collaborative Personalized
                                  Recommendation on Signed Social Rating
                                  Networks . . . . . . . . . . . . . . . . 20:1--20:??
                  Rui Zhang and   
                    Rui Xue and   
                    Ting Yu and   
                       Ling Liu   Dynamic and Efficient Private Keyword
                                  Search over Inverted Index-Based
                                  Encrypted Data . . . . . . . . . . . . . 21:1--21:??

ACM Transactions on Internet Technology (TOIT)
Volume 16, Number 4, December, 2016

              Elisa Bertino and   
     Kim-Kwang Raymond Choo and   
   Dimitrios Georgakopolous and   
                    Surya Nepal   Internet of Things (IoT): Smart and
                                  Secure Service Delivery  . . . . . . . . 22:1--22:??
                    Li Duan and   
                 Dongxi Liu and   
                 Yang Zhang and   
               Shiping Chen and   
               Ren Ping Liu and   
                   Bo Cheng and   
                  Junliang Chen   Secure Data-Centric Access Control for
                                  Smart Grid Services Based on
                                  Publish/Subscribe Systems  . . . . . . . 23:1--23:??
               Yuexin Zhang and   
                 Yang Xiang and   
                    Xinyi Huang   Password-Authenticated Group Key
                                  Exchange: a Cross-Layer Design . . . . . 24:1--24:??
             Neetesh Saxena and   
          Santiago Grijalva and   
          Narendra S. Chaudhari   Authentication Protocol for an
                                  IoT-Enabled LTE Network  . . . . . . . . 25:1--25:??
             Shachar Siboni and   
               Asaf Shabtai and   
        Nils O. Tippenhauer and   
                  Jemin Lee and   
                  Yuval Elovici   Advanced Security Testbed Framework for
                                  Wearable IoT Devices . . . . . . . . . . 26:1--26:??
                Ahmed Saeed and   
              Ali Ahmadinia and   
                Abbas Javed and   
                  Hadi Larijani   Intelligent Intrusion Detection in
                                  Low-Power IoTs . . . . . . . . . . . . . 27:1--27:??
                    Ngoc Do and   
                    Ye Zhao and   
             Cheng-Hsin Hsu and   
      Nalini Venkatasubramanian   Crowdsourced Mobile Data Transfer with
                                  Delay Bound  . . . . . . . . . . . . . . 28:1--28:??
               Aveek K. Das and   
            Parth H. Pathak and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   Characterization of Wireless Multidevice
                                  Users  . . . . . . . . . . . . . . . . . 29:1--29:??


ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 1, March, 2017

        Chloé Clavel and   
            Rossana Damiano and   
              Viviana Patti and   
                    Paolo Rosso   Affect and Interaction in Agent-Based
                                  Systems and Social Media: Guest Editors'
                                  Introduction . . . . . . . . . . . . . . 1:1--1:??
            Beste F. Yuksel and   
            Penny Collisson and   
                Mary Czerwinski   Brains or Beauty: How to Engender Trust
                                  in User-Agent Interactions . . . . . . . 2:1--2:??
           Maurizio Mancini and   
         Beatrice Biancardi and   
             Florian Pecune and   
             Giovanna Varni and   
                    Yu Ding and   
        Catherine Pelachaud and   
            Gualtiero Volpe and   
                Antonio Camurri   Implementing and Evaluating a Laughing
                                  Virtual Character  . . . . . . . . . . . 3:1--3:??
              Mehdi Dastani and   
               Alexander Pankov   Other-Condemning Moral Emotions: Anger,
                                  Contempt and Disgust . . . . . . . . . . 4:1--4:??
               Bexy Alfonso and   
            Emilio Vivancos and   
                  Vicente Botti   Toward Formal Modeling of Affective
                                  Agents in a BDI Architecture . . . . . . 5:1--5:??
          Jahna Otterbacher and   
             Chee Siang Ang and   
              Marina Litvak and   
                   David Atkins   Show Me You Care: Trait Empathy,
                                  Linguistic Style, and Mimicry on
                                  Facebook . . . . . . . . . . . . . . . . 6:1--6:??
                   Rosa Meo and   
                   Emilio Sulis   Processing Affect in Social Media: a
                                  Comparison of Methods to Distinguish
                                  Emotions in Tweets . . . . . . . . . . . 7:1--7:??
            Pasquale De Meo and   
    Katarzyna Musial-Gabrys and   
            Domenico Rosaci and   
     Giuseppe M. L. Sarn\`e and   
                     Lora Aroyo   Using Centrality Measures to Predict
                                  Helpfulness-Based Reputation in Trust
                                  Networks . . . . . . . . . . . . . . . . 8:1--8:??
             Ruchdee Binmad and   
                     Mingchu Li   Improving the Efficiency of an Online
                                  Marketplace by Incorporating Forgiveness
                                  Mechanism  . . . . . . . . . . . . . . . 9:1--9:??
            George Drosatos and   
            Aimilia Tasidou and   
           Pavlos S. Efraimidis   Privacy-Enhanced Television Audience
                                  Measurements . . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 2, May, 2017

             Amit K. Chopra and   
               Erez Shmueli and   
                 Vivek K. Singh   Introduction to the Special Issue on
                                  Advances in Social Computing . . . . . . 11:1--11:??
             Sara Rosenthal and   
               Kathleen Mckeown   Detecting Influencers in Multiple Online
                                  Genres . . . . . . . . . . . . . . . . . 12:1--12:??
          Christos Perentis and   
            Michele Vescovi and   
            Chiara Leonardi and   
              Corrado Moiso and   
             Mirco Musolesi and   
              Fabio Pianesi and   
                    Bruno Lepri   Anonymous or Not? Understanding the
                                  Factors Affecting Personal Mobile Data
                                  Disclosure . . . . . . . . . . . . . . . 13:1--13:??
            Jorge Goncalves and   
                 Simo Hosio and   
              Vassilis Kostakos   Eliciting Structured Knowledge from
                                  Situated Crowd Markets . . . . . . . . . 14:1--14:??
                  Atanu Roy and   
              Ayush Singhal and   
             Jaideep Srivastava   Formation and Reciprocation of Dyadic
                                  Trust  . . . . . . . . . . . . . . . . . 15:1--15:??
                Yefeng Ruan and   
                 Ping Zhang and   
            Lina Alfantoukh and   
                  Arjan Durresi   Measurement Theory-Based Trust
                                  Management Framework for Online Social
                                  Communities  . . . . . . . . . . . . . . 16:1--16:??
     Christian Von Der Weth and   
            Ashraf M. Abdul and   
              Mohan Kankanhalli   Cyber-Physical Social Networks . . . . . 17:1--17:??
             Nasser Alsaedi and   
                Pete Burnap and   
                      Omer Rana   Can We Predict a Riot? Disruptive Event
                                  Detection Using Twitter  . . . . . . . . 18:1--18:??
               Zhenguo Yang and   
                    Qing Li and   
                   Zheng Lu and   
                     Yun Ma and   
                Zhiguo Gong and   
                     Wenyin Liu   Dual Structure Constrained Multimodal
                                  Feature Coding for Social Event
                                  Detection from Flickr Data . . . . . . . 19:1--19:??
         Michal Ciesielczyk and   
             Andrzej Szwabe and   
              Mikolaj Morzy and   
                 Pawel Misiorek   Progressive Random Indexing:
                                  Dimensionality Reduction Preserving
                                  Local Network Dependencies . . . . . . . 20:1--20:??
            Benjamin Billet and   
         Valérie Issarny   Spinel: an Opportunistic Proxy for
                                  Connecting Sensors to the Internet of
                                  Things . . . . . . . . . . . . . . . . . 21:1--21:??
                  Xumin Liu and   
                 Weishi Shi and   
                Arpeet Kale and   
                  Chen Ding and   
                          Qi Yu   Statistical Learning of Domain-Specific
                                  Quality-of-Service Features from User
                                  Reviews  . . . . . . . . . . . . . . . . 22:1--22:??

ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 3, July, 2017

             Iryna Gurevych and   
                Marco Lippi and   
                  Paolo Torroni   Argumentation in Social Media  . . . . . 23:1--23:??
              John Lawrence and   
                Mark Snaith and   
              Barbara Konat and   
        Katarzyna Budzynska and   
                     Chris Reed   Debating Technology for Dialogical
                                  Argument: Sensemaking, Engagement, and
                                  Analytics  . . . . . . . . . . . . . . . 24:1--24:??
              John Lawrence and   
               Joonsuk Park and   
        Katarzyna Budzynska and   
              Claire Cardie and   
              Barbara Konat and   
                     Chris Reed   Using Argumentative Structure to
                                  Interpret Debates in Online Deliberative
                                  Democracy and eRulemaking  . . . . . . . 25:1--25:??
           Saif M. Mohammad and   
            Parinaz Sobhani and   
           Svetlana Kiritchenko   Stance and Sentiment in Tweets . . . . . 26:1--26:??
        Nadin Kökciyan and   
            Nefise Yaglikci and   
                    Pinar Yolum   An Argumentation Approach for Resolving
                                  Privacy Disputes in Online Social
                                  Networks . . . . . . . . . . . . . . . . 27:1--27:??
          Henning Wachsmuth and   
                    Benno Stein   A Universal Model for Discourse-Level
                                  Argumentation Analysis . . . . . . . . . 28:1--28:??
                Edmond Awad and   
Jean-François Bonnefon and   
            Martin Caminada and   
           Thomas W. Malone and   
                    Iyad Rahwan   Experimental Assessment of Aggregation
                                  Principles in Argumentation-Enabled
                                  Collective Intelligence  . . . . . . . . 29:1--29:??
             Lucas Carstens and   
                 Francesca Toni   Using Argumentation to Improve
                                  Classification in Natural Language
                                  Problems . . . . . . . . . . . . . . . . 30:1--30:??
                     Yan Hu and   
                Weisong Shi and   
                    Hong Li and   
                     Xiaohui Hu   Mitigating Data Sparsity Using
                                  Similarity Reinforcement-Enhanced
                                  Collaborative Filtering  . . . . . . . . 31:1--31:??
                  Ero Balsa and   
Cristina Pérez-Sol\`a and   
                   Claudia Diaz   Towards Inferring Communication Patterns
                                  in Online Social Networks  . . . . . . . 32:1--32:??

ACM Transactions on Internet Technology (TOIT)
Volume 17, Number 4, September, 2017

            Adriane Chapman and   
               James Cheney and   
                    Simon Miles   Guest Editorial: The Provenance of
                                  Online Data  . . . . . . . . . . . . . . 33:1--33:??
                 Adam Bates and   
           Dave (Jing) Tian and   
            Grant Hernandez and   
               Thomas Moyer and   
         Kevin R. B. Butler and   
                   Trent Jaeger   Taming the Costs of Trustworthy
                                  Provenance through Policy Reduction  . . 34:1--34:??
                     Luc Moreau   A Canonical Form for PROV Documents and
                                  Its Application to Equality, Signature,
                                  and Validation . . . . . . . . . . . . . 35:1--35:??
             Vitor C. Neves and   
         Daniel De Oliveira and   
 Kary A. C. S. Ocaña and   
         Vanessa Braganholo and   
                 Leonardo Murta   Managing Provenance of Implicit Data
                                  Flows in Scientific Experiments  . . . . 36:1--36:??
   Manolis Stamatogiannakis and   
       Elias Athanasopoulos and   
                Herbert Bos and   
                     Paul Groth   PROV_${2R}$: Practical Provenance
                                  Analysis of Unstructured Processes . . . 37:1--37:??
                   Steven Weber   Facilitating Adoption of Internet
                                  Technologies and Services with
                                  Externalities via Cost Subsidization . . 38:1--38:??
José Luis García-Dorado   Bandwidth Measurements within the Cloud:
                                  Characterizing Regular Behaviors and
                                  Correlating Downtimes  . . . . . . . . . 39:1--39:??
               Jianhua Shao and   
                      Hoang Ong   Exploiting Contextual Information in
                                  Attacking Set-Generalized Transactions   40:1--40:??


ACM Transactions on Internet Technology (TOIT)
Volume 18, Number 1, December, 2017

            Ernesto Damiani and   
          Ryszard Kowalczyk and   
                    Gerard Parr   Extending the Outreach: From Smart
                                  Cities to Connected Communities  . . . . 1:1--1:??
                Haibo Zhang and   
                 Luming Wan and   
                 Yawen Chen and   
           Laurence T. Yang and   
                     Lizhi Peng   Adaptive Message Routing and Replication
                                  in Mobile Opportunistic Networks for
                                  Connected Communities  . . . . . . . . . 2:1--2:??
                 Taehun Kim and   
                Junsung Lim and   
                 Heesuk Son and   
            Byoungheon Shin and   
                Dongman Lee and   
                   Soon J. Hyun   A Multi-Dimensional Smart Community
                                  Discovery Scheme for IoT-Enriched Smart
                                  Homes  . . . . . . . . . . . . . . . . . 3:1--3:??
               Catia Prandi and   
               Silvia Mirri and   
           Stefano Ferretti and   
                 Paola Salomoni   On the Need of Trustworthy Sensing and
                                  Crowdsourcing for Urban Accessibility in
                                  Smart City . . . . . . . . . . . . . . . 4:1--4:??
            Antonella Longo and   
            Marco Zappatore and   
           Mario Bochicchio and   
            Shamkant B. Navathe   Crowd-Sourced Data Collection for Urban
                                  Monitoring via Mobile Sensors  . . . . . 5:1--5:??
            Moreno Ambrosin and   
                Paolo Braca and   
                Mauro Conti and   
            Riccardo Lazzeretti   ODIN: Obfuscation-Based
                                  Privacy-Preserving Consensus Algorithm
                                  for Decentralized Information Fusion in
                                  Smart Device Networks  . . . . . . . . . 6:1--6:??
           Emanuele Bellini and   
             Paolo Ceravolo and   
                     Paolo Nesi   Quantify Resilience Enhancement of UTS
                                  through Exploiting Connected Community
                                  and Internet of Everything Emerging
                                  Technologies . . . . . . . . . . . . . . 7:1--7:??
          M. Mazhar Rathore and   
                 Anand Paul and   
                Awais Ahmad and   
             Marco Anisetti and   
                  Gwanggil Jeon   Hadoop-Based Intelligent Care System
                                  (HICS): Analytical Approach for Big Data
                                  in IoT . . . . . . . . . . . . . . . . . 8:1--8:??
                    Di Wang and   
            Ahmad Al-Rubaie and   
    Sandra Stinci\'c Clarke and   
                    John Davies   Real-Time Traffic Event Detection From
                                  Social Media . . . . . . . . . . . . . . 9:1--9:??
           Hiroshi Fujikawa and   
            Hirofumi Yamaki and   
                 Setsuo Tsuruta   Seamless Virtual Network for
                                  International Business Continuity in
                                  Presence of Intentional Blocks . . . . . 10:1--10:??
       Claudia López and   
               Rosta Farzan and   
                      Yu-Ru Lin   Behind the Myths of Citizen
                                  Participation: Identifying
                                  Sustainability Factors of Hyper-Local
                                  Information Systems  . . . . . . . . . . 11:1--11:??
              Munindar P. Singh   TOIT Reviewers over 2015 and 2016  . . . 12:1--12:??