Last update: Sat Aug 24 06:49:25 MDT 2024
Volume 1, Number 1, August, 2001Arvind Arasu and Junghoo Cho and Hector Garcia-Molina and Andreas Paepcke and Sriram Raghavan Searching the Web . . . . . . . . . . . 2--43 Martin Arlitt and Diwakar Krishnamurthy and Jerry Rolia Characterizing the scalability of a large web-based shopping system . . . . 44--69 Marjory S. Blumenthal and David D. Clark Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world . . . . . . . . . . . . . . . 70--109 Masatoshi Yoshikawa and Toshiyuki Amagasa and Takeyuki Shimura and Shunsuke Uemura XRel: a path-based approach to storage and retrieval of XML documents using relational databases . . . . . . . . . . 110--141
David M. Kristol HTTP Cookies: Standards, privacy, and politics . . . . . . . . . . . . . . . . 151--198 Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor The architecture of robust publishing systems . . . . . . . . . . . . . . . . 199--230 Joel L. Wolf and Philip S. Yu On balancing the load in a clustered web farm . . . . . . . . . . . . . . . . . . 231--261
Xin Guo An optimal strategy for sellers in an online auction . . . . . . . . . . . . . 1--13 Paul Huck and Michael Butler and Amar Gupta and Michael Feng A self-configuring and self-administering name system with dynamic address assignment . . . . . . . 14--46 Carey Williamson On filter effects in web caching hierarchies . . . . . . . . . . . . . . 47--77
Claus Brabrand and Anders Mòller and Michael I. Schwartzbach The $<$ bigwig$>$ project . . . . . . . . 79--114 Roy T. Fielding and Richard N. Taylor Principled design of the modern Web architecture . . . . . . . . . . . . . . 115--150 Christian Nentwich and Licia Capra and Wolfgang Emmerich and Anthony Finkelstein xlinkit: a consistency checking and smart link generation service . . . . . 151--185
Stanley M. Besen and Jeffrey S. Spigel and Padmanabhan Srinagesh Evaluating the competitive effects of mergers of Internet backbone providers 187--204 Stephen Dill and Ravi Kumar and Kevin S. Mccurley and Sridhar Rajagopalan and D. Sivakumar and Andrew Tomkins Self-similarity in the web . . . . . . . 205--223 Jian Yin and Lorenzo Alvisi and Mike Dahlin and Arun Iyengar Engineering web cache consistency . . . 224--259
Michael Gordon and Robert K. Lindsay and Weiguo Fan Literature-based discovery on the World Wide Web . . . . . . . . . . . . . . . . 261--275 Harry Hochheiser The platform for privacy preference as a social protocol: an examination within the U.S. policy context . . . . . . . . 276--306 Minwen Ji Affinity-based management of main memory database clusters . . . . . . . . . . . 307--339
Magdalini Eirinaki and Michalis Vazirgiannis Web mining for web personalization . . . 1--27 Joris Claessens and Bart Preneel and Joos Vandewalle (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions . . . . . . . 28--48 Paolo Merialdo and Paolo Atzeni and Giansalvatore Mecca Design and development of data-intensive web sites: The Araneus approach . . . . 49--92
Robert Cooley The use of web structure and content to identify subjectively interesting web usage patterns . . . . . . . . . . . . . 93--116 Haruo Hosoya and Benjamin C. Pierce XDuce: a statically typed XML processing language . . . . . . . . . . . . . . . . 117--148 Alfred Kobsa and Jörg Schreck Privacy through pseudonymity in user-adaptive systems . . . . . . . . . 149--183
Patricia Anthony and Nicholas R. Jennings Developing a bidding agent for multiple heterogeneous auctions . . . . . . . . . 185--217 Minghua He and Nicholas R. Jennings SouthamptonTAC: an adaptive autonomous trading agent . . . . . . . . . . . . . 218--235 Upkar Varshney Location management for mobile commerce applications in wireless Internet environment . . . . . . . . . . . . . . 236--255 Junghoo Cho and Hector Garcia-Molina Estimating frequency of change . . . . . 256--290
R. Braumandl and A. Kemper and D. Kossmann Quality of service in an information economy . . . . . . . . . . . . . . . . 291--333 Ali Amiri and Syam Menon Efficient scheduling of Internet banner advertisements . . . . . . . . . . . . . 334--346 Ludmila Cherkasova and Yun Fu and Wenting Tang and Amin Vahdat Measuring and characterizing end-to-end Internet service performance . . . . . . 347--391 Björn Knutsson and Honghui Lu and Jeffrey Mogul and Bryan Hopkins Architecture and performance of server-directed transcoding . . . . . . 392--424
Pawel Gburzynski and Jacek Maitan Fighting the spam wars: a remailer approach with restrictive aliasing . . . 1--30 Ronny Lempel and Shlomo Moran Optimizing result prefetching in Web search engines with segmented indices 31--59 Dan Boneh and Xuhua Ding and Gene Tsudik Fine-grained control of security capabilities . . . . . . . . . . . . . . 60--82 Gregory W. Bond and Eric Cheung and K. Hal Purdy and Pamela Zave and J. Christopher Ramming An open architecture for next-generation telecommunication services . . . . . . . 83--123
Gary William Flake and Paolo Frasconi and C. Lee Giles and Marco Maggini Guest editorial: Machine learning for the Internet . . . . . . . . . . . . . . 125--128 Eugene Agichtein and Steve Lawrence and Luis Gravano Learning to find answers to questions on the Web . . . . . . . . . . . . . . . . 129--162 Mukund Deshpande and George Karypis Selective Markov models for predicting Web page accesses . . . . . . . . . . . 163--184 Jianhan Zhu and Jun Hong and John G. Hughes PageCluster: Mining conceptual link hierarchies from Web log files for adaptive Web site navigation . . . . . . 185--208 Xiao Fang and Olivia R. Liu Sheng LinkSelector: A Web mining approach to hyperlink selection for Web portals . . 209--237
Simon Byers and Aviel D. Rubin and David Kormann Defending against an Internet-based attack on the physical world . . . . . . 239--254 François Goasdoué and Marie-Christine Rousset Answering queries using views: A KRDB perspective for the semantic Web . . . . 255--288 Roger Barga and David Lomet and German Shegalov and Gerhard Weikum Recovery guarantees for Internet applications . . . . . . . . . . . . . . 289--328 David Lybäck and Magnus Boman Agent trade servers in financial exchange systems . . . . . . . . . . . . 329--339
Gary William Flake and Paolo Frasconi and C. Lee Giles and Marco Maggini Guest editorial: Machine learning for the Internet . . . . . . . . . . . . . . 341--343 Michael O'Mahony and Neil Hurley and Nicholas Kushmerick and Guénolé Silvestre Collaborative recommendation: a robustness analysis . . . . . . . . . . 344--377 Filippo Menczer and Gautam Pant and Padmini Srinivasan Topical web crawlers: Evaluating adaptive algorithms . . . . . . . . . . 378--419 Sander M. Bohte and Enrico Gerding and Han La Poutré Market-based recommendation: Agents that compete for consumer attention . . . . . 420--448
Peter Thiemann An embedded domain-specific language for type-safe server-side Web scripting . . 1--46 Liliana Ardissono and Anna Goy and Giovanna Petrone and Marino Segnan A multi-agent infrastructure for developing personalized Web-based systems . . . . . . . . . . . . . . . . 47--69 Addison Chan and Rynson W. H. Lau and Beatrice Ng Motion prediction for caching and prefetching in mouse-driven DVE navigation . . . . . . . . . . . . . . . 70--91 Monica Bianchini and Marco Gori and Franco Scarselli Inside PageRank . . . . . . . . . . . . 92--128 Victoria Ungureanu Using certified policies to regulate E-commerce transactions . . . . . . . . 129--153 Hongjun Lu and Jeffrey Xu Yu and Guoren Wang and Shihui Zheng and Haifeng Jiang and Ge Yu and Aoying Zhou What makes the differences: benchmarking XML database implementations . . . . . . 154--194 Wilson Wai Ho Mok and R. P. Sundarraj Learning algorithms for single-instance electronic negotiations using the time-dependent behavioral tactic . . . . 195--230 Allan Borodin and Gareth O. Roberts and Jeffrey S. Rosenthal and Panayiotis Tsaparas Link analysis ranking: algorithms, theory, and experiments . . . . . . . . 231--297
Martin Abadi and Mike Burrows and Mark Manasse and Ted Wobber Moderately hard, memory-bound functions 299--327 Daniel Oberle and Steffen Staab and Rudi Studer and Raphael Volz Supporting application development in the Semantic Web . . . . . . . . . . . . 328--358 Jim Challenger and Paul Dantzig and Arun Iyengar and Karen Witting A fragment-based approach for efficiently creating dynamic Web content 359--389 Michalis Petropoulos and Yannis Papakonstantinou and Vasilis Vassalos Graphical query interfaces for semistructured data: the QURSED system 390--438
Ioana Manolescu and Marco Brambilla and Stefano Ceri and Sara Comai and Piero Fraternali Model-driven design and deployment of service-enabled Web applications . . . . 439--479 Keqiu Li and Hong Shen and Francis Y. L. Chin and Si Qing Zheng Optimal methods for coordinated enroute Web caching for tree networks . . . . . 480--507 Daniel Gomes and Mário J. Silva Characterizing a national community Web 508--531 Xuan Chen and John Heidemann Flash crowd mitigation via adaptive admission control based on application-level observations . . . . . 532--569 Vasilis Vassalos Corrigenda . . . . . . . . . . . . . . . 570--570
Kaname Harumoto and Tadashi Nakano and Shinya Fukumura and Shinji Shimojo and Shojiro Nishio Effective Web browsing through content delivery adaptation . . . . . . . . . . 571--600 Mingzhe Li and Mark Claypool and Robert Kinicki and James Nichols Characteristics of streaming media stored on the Web . . . . . . . . . . . 601--626 Oscar Diaz and Juan J. Rodriguez Portlet syndication: Raising variability concerns . . . . . . . . . . . . . . . . 627--659 Makoto Murata and Dongwon Lee and Murali Mani and Kohsuke Kawaguchi Taxonomy of XML schema languages using formal language theory . . . . . . . . . 660--704
Jeng-Wei Lin and Jan-Ming Ho and Li-Ming Tseng and Feipei Lai IDN server proxy architecture for Internationalized Domain Name resolution and experiences with providing Web services . . . . . . . . . . . . . . . . 1--19 Bianca Schroeder and Mor Harchol-Balter Web servers under overload: How scheduling can help . . . . . . . . . . 20--52 Shu-Yao Chien and Vassilis J. Tsotras and Carlo Zaniolo and Donghui Zhang Supporting complex queries on multiversion XML documents . . . . . . . 53--84 Simon Szykman and Ram D. Sriram Design and implementation of the Web-enabled NIST design repository . . . 85--116
Trevor Fenner and Mark Levene and George Loizou A stochastic model for the evolution of the Web allowing link deletion . . . . . 117--130 Ravi Kumar and Prabhakar Raghavan and Sridhar Rajagopalan and Andrew Tomkins Core algorithms in the CLEVER system . . 131--152 Junghoo Cho and Hector Garcia-Molina and Taher Haveliwala and Wang Lam and Andreas Paepcke and Sriram Raghavan and Gary Wesley Stanford WebBase components and applications . . . . . . . . . . . . . . 153--186 Salvatore J. Stolfo and Shlomo Hershkop and Chia-Wei Hu and Wei-Jen Li and Olivier Nimeskern and Ke Wang Behavior-based modeling and its application to Email analysis . . . . . 187--221
Jun-Ki Min and Myung-Jae Park and Chin-Wan Chung A compressor for effective archiving, retrieval, and updating of XML documents 223--258 Arno Bakker and Maarten Van Steen and Andrew S. Tanenbaum A wide-area Distribution Network for free software . . . . . . . . . . . . . 259--281 Michael Brinkmeier PageRank revisited . . . . . . . . . . . 282--301 Björn Thòr Jónsson and María Arinbjarnar and Bjarnsteinn Thórsson and Michael J. Franklin and Divesh Srivastava Performance and overhead of semantic cache management . . . . . . . . . . . . 302--331
Irma Becerra-Fernandez Searching for experts on the Web: a review of contemporary expertise locator systems . . . . . . . . . . . . . . . . 333--355 Paolo Bellavista and Antonio Corradi and Rebecca Montanari and Cesare Stefanelli A mobile computing middleware for location- and context-aware Internet data services . . . . . . . . . . . . . 356--380 Ah Chung Tsoi and Markus Hagenbuchner and Franco Scarselli Computing customized page ranks . . . . 381--414 Kai-Lung Hui and Bernard C. Y. Tan and Chyan-Yee Goh Online information disclosure: Motivators and measurements . . . . . . 415--441 Bernard J. Jansen and Tracy Mullen and Amanda Spink and Jan Pedersen Automated gathering of Web information: an in-depth examination of agents interacting with search engines . . . . 442--464 Minghua He and Nicholas R. Jennings and Adam Prügel-Bennett A heuristic bidding strategy for buying multiple goods in multiple English auctions . . . . . . . . . . . . . . . . 465--496 Jennifer Golbeck and James Hendler Inferring binary trust relationships in Web-based social networks . . . . . . . 497--529
Varghese S. Jacob and Ramayya Krishnan and Young U. Ryu Internet content filtering using isotonic separation on content category ratings . . . . . . . . . . . . . . . . 1:1--1:?? Stefano Ceri and Florian Daniel and Maristella Matera and Federico M. Facca Model-driven development of context-aware Web applications . . . . . 2:1--2:?? Xuhua Ding and Daniele Mazzocchi and Gene Tsudik Equipping smart devices with public key signatures . . . . . . . . . . . . . . . 3:1--3:?? Debora Donato and Luigi Laura and Stefano Leonardi and Stefano Millozzi The Web as a graph: How far we are . . . 4:1--4:?? Yun Huang and Xianjun Geng and Andrew B. Whinston Defeating DDoS attacks by fixing the incentive chain . . . . . . . . . . . . 5:1--5:?? Tak-Lam Wong and Wai Lam Adapting Web information extraction knowledge via mining site-invariant and site-dependent features . . . . . . . . 6:1--6:?? Daniel Villela and Prashant Pradhan and Dan Rubenstein Provisioning servers in the application tier for e-commerce systems . . . . . . 7:1--7:??
Angelos D. Keromytis and Jonathan M. Smith Requirements for scalable access control and security management architectures 8:1--8:?? Ricardo Baeza-Yates and Carlos Castillo and Efthimis N. Efthimiadis Characterization of national Web domains 9:1--9:?? Andrei Arion and Angela Bonifati and Ioana Manolescu and Andrea Pugliese XQueC: a query-conscious compressed XML database . . . . . . . . . . . . . . . . 10:1--10:?? Jing Zhou and Wendy Hall and David C. De Roure and Vijay K. Dialani Supporting ad-hoc resource sharing on the Web: a peer-to-peer approach to hypermedia link services . . . . . . . . 11:1--11:?? Esther David and Alex Rogers and Nicholas R. Jennings and Jeremy Schiff and Sarit Kraus and Michael H. Rothkopf Optimal design of English auctions with discrete bid levels . . . . . . . . . . 12:1--12:??
Amar Gupta and Satwiksai Seshasai Guest editorial: The Internet and outsourcing . . . . . . . . . . . . . . 13:1--13:?? Amar Gupta and Satwik Seshasai 24-hour knowledge factory: Using Internet technology to leverage spatial and temporal separations . . . . . . . . 14:1--14:?? Rafiq Dossani and Nathan Denny The Internet's role in offshored services: a case study of India . . . . 15:1--15:?? Ravi Aron and Siddarth Jayanty and Praveen Pathak Impact of Internet-based distributed monitoring systems on offshore sourcing of services . . . . . . . . . . . . . . 16:1--16:?? Li Xiong and Subramanyam Chitti and Ling Liu Preserving data privacy in outsourcing data aggregation services . . . . . . . 17:1--17:??
Sarabjot Singh Anand and Bamshad Mobasher Introduction to intelligent techniques for Web personalization . . . . . . . . 18:1--18:?? Wilfred Ng and Lin Deng and Dik Lun Lee Mining User preference using Spy voting for search engine personalization . . . 19:1--19:?? Maurice Coyle and Barry Smyth Supporting intelligent Web search . . . 20:1--20:?? Magdalini Eirinaki and Michalis Vazirgiannis Web site personalization based on link analysis and navigational patterns . . . 21:1--21:?? Sarabjot Singh Anand and Patricia Kearney and Mary Shapcott Generating semantically enriched user profiles for Web personalization . . . . 22:1--22:?? Bamshad Mobasher and Robin Burke and Runa Bhaumik and Chad Williams Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness . . . . . . . . . . 23:1--23:??
Brahim Medjahed and Athman Bouguettaya and Boualem Benatallah Introduction to special issue on semantic Web services . . . . . . . . . 1:1--1:?? Eran Toch and Avigdor Gal and Iris Reinhartz-Berger and Dov Dori A semantic approach to approximate service retrieval . . . . . . . . . . . 2:1--2:?? Marco Brambilla and Stefano Ceri and Federico Michele Facca and Irene Celino and Dario Cerizza and Emanuele Della Valle Model-driven design and development of semantic Web service applications . . . 3:1--3:?? Michael Mrissa and Chirine Ghedira and Djamal Benslimane and Zakaria Maamar and Florian Rosenberg and Schahram Dustdar A context-based mediation approach to compose semantic Web services . . . . . 4:1--4:?? Mohamed Shehab and Kamal Bhattacharya and Arif Ghafoor Web services discovery in secure collaboration environments . . . . . . . 5:1--5:??
Qing Li and Rynson W. H. Lau and Timothy Shih and Dennis McLeod Introduction to special issue Internet technologies for distance education . . 1:1--1:?? Xuping Tu and Hai Jin and Xiaofei Liao and Jiannong Cao Nearcast: a locality-aware P2P live streaming approach for distance education . . . . . . . . . . . . . . . 2:1--2:?? Peter Dolog and Bernd Simon and Wolfgang Nejdl and Toma\vz Klobu\vcar Personalizing access to learning networks . . . . . . . . . . . . . . . . 3:1--3:?? Paola Salomoni and Silvia Mirri and Stefano Ferretti and Marco Roccetti A multimedia broker to support accessible and mobile learning through learning objects adaptation . . . . . . 4:1--4:?? Qing Li and Rynson W. H. Lau and Timothy K. Shih and Frederick W. B. Li Technology supports for distributed and collaborative learning over the Internet 5:1--5:??
Qusay H. Mahmoud and Peter Langendoerfer Guest editorial: Service-oriented computing . . . . . . . . . . . . . . . 11:1--11:?? Robert A. Van Engelen A framework for service-oriented computing with C and C++ Web service components . . . . . . . . . . . . . . . 12:1--12:?? Wil M. P. van der Aalst and Marlon Dumas and Chun Ouyang and Anne Rozinat and Eric Verbeek Conformance checking of service behavior 13:1--13:?? Jingwen Jin and Klara Nahrstedt QoS-aware service management for component-based distributed applications 14:1--14:?? Uwe Zdun Pattern-based design of a service-oriented middleware for remote object federations . . . . . . . . . . . 15:1--15:??
Amir Herzberg and Ahmad Jbara Security and identification indicators for browsers against spoofing and phishing attacks . . . . . . . . . . . . 16:1--16:?? Manish Gupta and Shamik Banerjee and Manish Agrawal and H. Raghav Rao Security analysis of Internet technology components enabling globally distributed workplaces --- a framework . . . . . . . 17:1--17:?? Jeannie Albrecht and David Oppenheimer and Amin Vahdat and David A. Patterson Design and implementation trade-offs for wide-area resource discovery . . . . . . 18:1--18:?? Antonio Brogi and Sara Corfini and Razvan Popescu Semantics-based composition-oriented discovery of Web services . . . . . . . 19:1--19:?? Hai Zhuge and Yunpeng Xing and Peng Shi Resource space model, OWL and database: Mapping and integration . . . . . . . . 20:1--20:?? Xiao-Bing Xue and Zhi-Hua Zhou and Zhongfei (Mark) Zhang Improving Web search using image snippets . . . . . . . . . . . . . . . . 21:1--21:??
Bhuvan Urgaonkar and Prashant Shenoy and Timothy Roscoe Resource overbooking and application profiling in a shared Internet hosting platform . . . . . . . . . . . . . . . . 1:1--1:?? Sebastian Stein and Terry R. Payne and Nicholas R. Jennings Flexible provisioning of Web service workflows . . . . . . . . . . . . . . . 2:1--2:?? Paul Groth and Simon Miles and Luc Moreau A model of process documentation to determine provenance in mash-ups . . . . 3:1--3:?? Giancarlo Ruffo and Rossano Schifanella A peer-to-peer recommender system based on spontaneous affinities . . . . . . . 4:1--4:??
Scott Jordan Implications of Internet architecture on net neutrality . . . . . . . . . . . . . 5:1--5:?? Toby Ehrenkranz and Jun Li On the state of IP spoofing defense . . 6:1--6:?? Bettina Fazzinga and Sergio Flesca and Andrea Pugliese Retrieving XML data from heterogeneous sources through vague querying . . . . . 7:1--7:?? Erol Gelenbe Analysis of single and networked auctions . . . . . . . . . . . . . . . . 8:1--8:??
Xin Li and Jun Yan and Weiguo Fan and Ning Liu and Shuicheng Yan and Zheng Chen An online blog reading system by topic clustering and personalized ranking . . 9:1--9:?? Antonio M. Rinaldi An ontology-driven approach for semantic information retrieval on the Web . . . . 10:1--10:?? Christian Platzer and Florian Rosenberg and Schahram Dustdar Web service clustering using multidimensional angles as proximity measures . . . . . . . . . . . . . . . . 11:1--11:?? Duanning Zhou and Wayne Wei Huang Using a fuzzy classification approach to assess e-commerce Web sites: an empirical investigation . . . . . . . . 12:1--12:??
Joonho Kwon and Praveen Rao and Bongki Moon and Sukho Lee Fast XML document filtering by sequencing twig patterns . . . . . . . . 13:1--13:?? Dario Colazzo and Carlo Sartiani Detection of corrupted schema mappings in XML data integration systems . . . . 14:1--14:?? Alan Kenny and Séamus Mcloone and Tomás Ward Controlling entity state updates to maintain remote consistency within a distributed interactive application . . 15:1--15:?? Theoni Pitoura and Peter Triantafillou Distribution fairness in Internet-scale networks . . . . . . . . . . . . . . . . 16:1--16:??
David Michael Turner and Vassilis Prevelakis and Angelos D. Keromytis A market-based bandwidth charging framework . . . . . . . . . . . . . . . 1:1--1:?? Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney Semantic integrity in large-scale online simulations . . . . . . . . . . . . . . 2:1--2:?? Tzu-Chi Huang and Sherali Zeadally and Naveen Chilamkurti and Ce-Kuen Shieh A programmable network address translator: Design, implementation, and performance . . . . . . . . . . . . . . 3:1--3:?? Hweehwa Pang and Jialie Shen and Ramayya Krishnan Privacy-preserving similarity-based text retrieval . . . . . . . . . . . . . . . 4:1--4:??
Teh-Chung Chen and Scott Dick and James Miller Detecting visually similar Web pages: Application to phishing detection . . . 5:1--5:?? Chuan Yue and Haining Wang BogusBiter: a transparent protection against phishing attacks . . . . . . . . 6:1--6:?? Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong Teaching Johnny not to fall for phish 7:1--7:?? Ugur Kuter and Jennifer Golbeck Using probabilistic confidence models for trust inference in Web-based social networks . . . . . . . . . . . . . . . . 8:1--8:??
Moheeb Abu Rajab and Fabian Monrose and Niels Provos Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing 9:1--9:?? Alberto Bartoli and Giorgio Davanzo and Eric Medvet A Framework for Large-Scale Detection of Web Site Defacements . . . . . . . . . . 10:1--10:?? Ilya Gluhovsky Forecasting Click-Through Rates Based on Sponsored Search Advertiser Bids and Intermediate Variable Regression . . . . 11:1--11:?? Scott Jordan and Arijit Ghosh A Framework for Classification of Traffic Management Practices as Reasonable or Unreasonable . . . . . . . 12:1--12:??
Haifeng Shen and Chengzheng Sun Achieving Data Consistency by Contextualization in Web-Based Collaborative Applications . . . . . . . 13:1--13:?? Neil Hurley and Mi Zhang Novelty and Diversity in Top-$N$ Recommendation --- Analysis and Evaluation . . . . . . . . . . . . . . . 14:1--14:?? Mark Meiss and Filippo Menczer and Alessandro Vespignani Properties and Evolution of Internet Traffic Networks from Anonymized Flow Data . . . . . . . . . . . . . . . . . . 15:1--15:?? Adina Crainiceanu and Prakash Linga and Ashwin Machanavajjhala and Johannes Gehrke and Jayavel Shanmugasundaram Load Balancing and Range Queries in P2P Systems Using P-Ring . . . . . . . . . . 16:1--16:??
Alexander Totok and Vijay Karamcheti Exploiting Service Usage Information for Optimizing Server Resource Management 1:1--1:?? Martin Arlitt and Niklas Carlsson and Phillipa Gill and Aniket Mahanti and Carey Williamson Characterizing Intelligence Gathering and Control on an Edge Network . . . . . 2:1--2:?? Justin Zhan and B. John Oommen and Johanna Crisostomo Anomaly Detection in Dynamic Systems Using Weak Estimators . . . . . . . . . 3:1--3:?? Pierre Genev\`es and Nabil Laya\"\ida and Vincent Quint Impact of XML Schema Evolution . . . . . 4:1--4:??
Christoph Goebel and Dirk Neumann and Ramayya Krishnan Comparing ingress and egress detection to secure interdomain routing: An experimental analysis . . . . . . . . . 5:1--5:?? Jeannie Albrecht and Christopher Tuttle and Ryan Braud and Darren Dao and Nikolay Topilski and Alex C. Snoeren and Amin Vahdat Distributed application configuration, management, and visualization with plush 6:1--6:?? Ki-Woong Park and Kyu Ho Park ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services . . . . . . . . . . . 7:1--7:?? Amy Csizmar Dalal User-perceived quality assessment of streaming media using reduced feature sets . . . . . . . . . . . . . . . . . . 8:1--8:??
Quan Z. Sheng and Schahram Dustdar Introduction to special issue on context-aware Web services for the future Internet . . . . . . . . . . . . 9:1--9:?? Dhaminda B. Abeywickrama and Sita Ramakrishnan Context-aware services engineering: Models, transformations, and verification . . . . . . . . . . . . . . 10:1--10:?? Qinyuan Feng and Ling Liu and Yafei Dai Vulnerabilities and countermeasures in context-aware social rating services . . 11:1--11:?? Takuya Maekawa and Yutaka Yanagisawa and Yasushi Sakurai and Yasue Kishino and Koji Kamei and Takeshi Okadome Context-aware Web search in ubiquitous sensor environments . . . . . . . . . . 12:1--12:?? Jing He and Yanchun Zhang and Guangyan Huang and Jinli Cao A smart Web service based on the context of things . . . . . . . . . . . . . . . 13:1--13:?? Wanita Sherchan and Surya Nepal and Athman Bouguettaya and Shiping Chen Context-sensitive user interfaces for semantic services . . . . . . . . . . . 14:1--14:??
Alex X. Liu Firewall policy change-impact analysis 15:1--15:?? Zhisheng Li and Xiangye Xiao and Meng Wang and Chong Wang and Xufa Wang and Xing Xie Towards the taxonomy-oriented categorization of yellow pages queries 16:1--16:?? Kenneth Wai-Ting Leung and Dik Lun Lee and Wilfred Ng and Hing Yuet Fung A framework for personalizing web search with concept-based user profiles . . . . 17:1--17:??
Italo Dacosta and Saurabh Chakradeo and Mustaque Ahamad and Patrick Traynor One-time cookies: Preventing session hijacking attacks with stateless authentication tokens . . . . . . . . . 1:1--1:?? Marios D. Dikaiakos and Asterios Katsifodimos and George Pallis Minersoft: Software retrieval in grid and cloud computing infrastructures . . 2:1--2:?? Deke Guo and Yunhao Liu and Hai Jin and Zhong Liu and Weiming Zhang and Hui Liu Theory and network applications of balanced Kautz tree structures . . . . . 3:1--3:??
Gareth Tyson and Andreas Mauthe and Sebastian Kaune and Paul Grace and Adel Taweel and Thomas Plagemann Juno: a Middleware Platform for Supporting Delivery-Centric Applications 4:1--4:?? Valentin Robu and Lonneke Mous and Han La Poutré Using Priced Options to Solve the Exposure Problem in Sequential Auctions 5:1--5:?? Ziyang Liu and Yi Chen Exploiting and Maintaining Materialized Views for XML Keyword Queries . . . . . 6:1--6:??
Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou Providing Users' Anonymity in Mobile Hybrid Networks . . . . . . . . . . . . 7:1--7:?? Ilung Pranata and Rukshan Athauda and Geoff Skinner Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments . . . . . . . . . . 8:1--8:?? Lihua Yuan and Chao-Chih Chen and Prasant Mohapatra and Chen-Nee Chuah and Krishna Kant A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies . . . . . . . . . . . . . . . 9:1--9:??
Munindar P. Singh Vision for TOIT . . . . . . . . . . . . 10:1--10:?? Munindar P. Singh TOIT Administrative Updates . . . . . . 11:1--11:?? Meng Wang and Guangda Li and Zheng Lu and Yue Gao and Tat-Seng Chua When Amazon Meets Google: Product Visualization by Exploring Multiple Web Sources . . . . . . . . . . . . . . . . 12:1--12:?? Yu-Li Liang and Xinyu Xing and Hanqiang Cheng and Jianxun Dang and Sui Huang and Richard Han and Xue Liu and Qin Lv and Shivakant Mishra SafeVchat: a System for Obscene Content Detection in Online Video Chat Services 13:1--13:?? Craig A. Shue and Andrew J. Kalafut Resolvers Revealed: Characterizing DNS Resolvers and their Clients . . . . . . 14:1--14:??
Xitong Li and Stuart E. Madnick and Hongwei Zhu A Context-Based Approach to Reconciling Data Interpretation Conflicts in Web Services Composition . . . . . . . . . . 1:1--1:?? San-Tsai Sun and Eric Pospisil and Ildar Muslukhov and Nuray Dindar and Kirstie Hawkey and Konstantin Beznosov Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model . . . . . . . . . . . . 2:1--2:?? Massimiliano Albanese and Antonio d'Acierno and Vincenzo Moscato and Fabio Persia and Antonio Picariello A Multimedia Recommender System . . . . 3:1--3:??
Hassan Sayyadi and Louiqa Raschid A Graph Analytical Approach for Topic Detection . . . . . . . . . . . . . . . 4:1--4:?? Kemal Bicakci and Bruno Crispo and Gabriele Oligeri LAKE: a Server-Side Authenticated Key-Establishment with Low Computational Workload . . . . . . . . . . . . . . . . 5:1--5:?? Scott Jordan and Gwen Shaffer User and ISP Rights of Device Attachment and Device Management . . . . . . . . . 6:1--6:??
Xiaowen Chu and Xiaowei Chen and Adele Lu Jia and Johan A. Pouwelse and Dick H. J. Epema Dissecting Darknets: Measurement and Performance Analysis . . . . . . . . . . 7:1--7:?? Ghassan O. Karame and Aurélien Francillon and Victor Budilivschi and Srdjan Capkun and Vedran Capkun Microcomputations as Micropayments in Web-based Services . . . . . . . . . . . 8:1--8:?? Jeremy Blackburn and Nicolas Kourtellis and John Skvoretz and Matei Ripeanu and Adriana Iamnitchi Cheating in Online Games: a Social Network Perspective . . . . . . . . . . 9:1--9:?? Tian Guo and Upendra Sharma and Prashant Shenoy and Timothy Wood and Sambit Sahu Cost-Aware Cloud Bursting for Enterprise Applications . . . . . . . . . . . . . . 10:1--10:??
Xiao Bai and Rachid Guerraoui and Anne-Marie Kermarrec Personalizing Top-$k$ Processing Online in a Peer-to-Peer Social Tagging Network 11:1--11:?? Karim Benouaret and Djamal Benslimane and Allel Hadjali and Mahmoud Barhamgi and Zakaria Maamar and Quan Z. Sheng Web Service Compositions with Fuzzy Preferences: a Graded Dominance Relationship-Based Approach . . . . . . 12:1--12:?? Pierre Genev\`es and Nabil Laya\"\ida Equipping IDEs with XML-Path Reasoning Capabilities . . . . . . . . . . . . . . 13:1--13:??
Alexander Artikis and Avigdor Gal and Vana Kalogeraki and Matthias Weidlich Event Recognition Challenges and Techniques: Guest Editors' Introduction 1:1--1:?? Souleiman Hasan and Edward Curry Approximate Semantic Matching of Events for the Internet of Things . . . . . . . 2:1--2:?? Cristian Molinaro and Vincenzo Moscato and Antonio Picariello and Andrea Pugliese and Antonino Rullo and V. S. Subrahmanian PADUA: Parallel Architecture to Detect Unexplained Activities . . . . . . . . . 3:1--3:?? Christopher Mutschler and Michael Philippsen Adaptive Speculative Processing of Out-of-Order Event Streams . . . . . . . 4:1--4:?? Gregory Aaron Wilkin and Patrick Eugster and K. R. Jayaram Decentralized Fault-Tolerant Event Correlation . . . . . . . . . . . . . . 5:1--5:?? Beate Ottenwälder and Boris Koldehofe and Kurt Rothermel and Kirak Hong and David Lillethun and Umakishore Ramachandran MCEP: a Mobility-Aware Complex Event Processing System . . . . . . . . . . . 6:1--6:?? Boris Glavic and Kyumars Sheykh Esmaili and Peter M. Fischer and Nesime Tatbul Efficient Stream Provenance via Operator Instrumentation . . . . . . . . . . . . 7:1--7:??
Costas Courcoubetis and Roch Guérin and Patrick Loiseau and David Parkes and Jean Walrand and Adam Wierman Special Issue on Pricing and Incentives in Networks and Systems: Guest Editors' Introduction . . . . . . . . . . . . . . 8:1--8:?? Zeinab Abbassi and Nidhi Hegde and Laurent Massoulié Distributed Content Curation on the Web 9:1--9:?? Pierre Coucheney and Giuseppe D'acquisto and Patrick Maillé and Maurizio Naldi and Bruno Tuffin Influence of Search Neutrality on the Economics of Advertisement-Financed Content . . . . . . . . . . . . . . . . 10:1--10:?? Eitan Altman and Manjesh Kumar Hanawal and Rajesh Sundaresan Regulation of Off-Network Pricing in a Nonneutral Network . . . . . . . . . . . 11:1--11:?? Chi-Kin Chau and Qian Wang and Dah-Ming Chiu Economic Viability of Paris Metro Pricing for Digital Services . . . . . . 12:1--12:?? Roch Guérin and Jaudelice C. de Oliveira and Steven Weber Adoption of Bundled Services with Network Externalities and Correlated Affinities . . . . . . . . . . . . . . . 13:1--13:?? Matthew Andrews and Glenn Bruns and Mustafa Dogru and Hyoseop Lee Understanding Quota Dynamics in Wireless Networks . . . . . . . . . . . . . . . . 14:1--14:?? Emir Kavurmacioglu and Murat Alanyali and David Starobinski Demand-Invariant Price Relationships and Market Outcomes in Competitive Private Commons . . . . . . . . . . . . . . . . 15:1--15:?? Martin Hoefer and Thomas Kesselheim and Berthold Vöcking Approximation Algorithms for Secondary Spectrum Auctions . . . . . . . . . . . 16:1--16:?? Ioannis Caragiannis and Christos Kaklamanis and Panagiotis Kanellopoulos and Maria Kyropoulou Revenue Guarantees in the Generalized Second Price Auction . . . . . . . . . . 17:1--17:?? Josu Doncel and Urtzi Ayesta and Olivier Brun and Balakrishna Prabhu Is the Price of Anarchy the Right Measure for Load-Balancing Games? . . . 18:1--18:?? Aron Laszka and Benjamin Johnson and Pascal Schöttle and Jens Grossklags and Rainer Böhme Secure Team Composition to Thwart Insider Threats and Cyber-Espionage . . 19:1--19:?? Zhen Ye and Athman Bouguettaya and Xiaofang Zhou Economic Model-Driven Cloud Service Composition . . . . . . . . . . . . . . 20:1--20:?? Soudip Roy Chowdhury and Florian Daniel and Fabio Casati Recommendation and Weaving of Reusable Mashup Model Patterns for Assisted Development . . . . . . . . . . . . . . 21:1--21:??
Amit K. Chopra and Raian Ali and Maja Vukovic Introduction to the Special Issue on Foundations of Social Computing . . . . 22:1--22:?? Matteo Baldoni and Cristina Baroglio and Federico Capuzzimati A Commitment-Based Infrastructure for Programming Socio-Technical Systems . . 23:1--23:?? Flavio Figueiredo and Jussara M. Almeida and Marcos André Gonçalves and Fabrício Benevenuto On the Dynamics of Social Media Popularity: a YouTube Case Study . . . . 24:1--24:?? Thomas Lukasiewicz and Maria Vanina Martinez and Gerardo I. Simari and Oana Tifrea-Marciuska Ontology-Based Query Answering with Group Preferences . . . . . . . . . . . 25:1--25:?? Thiago H. Silva and Pedro O. S. Vaz de Melo and Jussara M. Almeida and Juliana Salles and Antonio A. F. Loureiro Revealing the City That We Cannot See 26:1--26:?? Jan Vosecky and Di Jiang and Kenneth Wai-Ting Leung and Kai Xing and Wilfred Ng Integrating Social and Auxiliary Semantics for Multifaceted Topic Modeling in Twitter . . . . . . . . . . 27:1--27:?? Dingqi Yang and Daqing Zhang and Zhiyong Yu and Zhiwen Yu and Djamal Zeghlache SESAME: Mining User Digital Footprints for Fine-Grained Preference-Aware Social Media Search . . . . . . . . . . . . . . 28:1--28:??
Nicolas Kourtellis and Jeremy Blackburn and Cristian Borcea and Adriana Iamnitchi Special Issue on Foundations of Social Computing: Enabling Social Applications via Decentralized Social Data Management 1:1--1:?? Alissa Cooper and Ian Brown Net Neutrality: Discrimination, Competition, and Innovation in the UK and US . . . . . . . . . . . . . . . . . 2:1--2:?? Pranav Dandekar and Ashish Goel and Michael P. Wellman and Bryce Wiedenbeck Strategic Formation of Credit Networks 3:1--3:?? David R. Bild and Yue Liu and Robert P. Dick and Z. Morley Mao and Dan S. Wallach Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph . . . . . . . . . . . . . 4:1--4:?? H. M. N. Dilum Bandara and Anura P. Jayasumana P2P-Based, Multi-Attribute Resource Discovery under Real-World Resources and Queries . . . . . . . . . . . . . . . . 5:1--5:??
Surya Nepal and Cecile Paris and Payam Aghaei Pour and Jill Freyne and Sanat Kumar Bista Interaction-Based Recommendations for Online Communities . . . . . . . . . . . 6:1--6:?? Amal Alhosban and Khayyam Hashmi and Zaki Malik and Brahim Medjahed and Salima Benbernou Bottom-Up Fault Management in Service-Based Systems . . . . . . . . . 7:1--7:?? Wei Dai and Scott Jordan The Effect of Data Caps upon ISP Service Tier Design and Users . . . . . . . . . 8:1--8:??
Yi Zhuang and Nan Jiang and Qing Li and Lei Chen and Chunhua Ju Progressive Batch Medical Image Retrieval Processing in Mobile Wireless Networks . . . . . . . . . . . . . . . . 9:1--9:?? Rostyslav Zabolotnyi and Philipp Leitner and Waldemar Hummer and Schahram Dustdar JCloudScale: Closing the Gap Between IaaS and PaaS . . . . . . . . . . . . . 10:1--10:?? Anonymous P-DONAS: a P2P-Based Domain Name System in Access Networks . . . . . . . . . . . 11:1--11:??
Timothy J. Norman and Suzanne Barber and Rino Falcone and Jie Zhang Introduction to Theme Section on Trust in Social Networks and Systems . . . . . 12:1--12:?? Rino Falcone and Alessandro Sapienza and Cristiano Castelfranchi The Relevance of Categories for Trusting Information Sources . . . . . . . . . . 13:1--13:?? Wenjun Jiang and Jie Wu and Guojun Wang On Selecting Recommenders for Trust Evaluation in Online Social Networks . . 14:1--14:?? Santiago Pina Ros and Ángel Pina Canelles and Manuel Gil Pérez and Félix Gómez Mármol and Gregorio Martínez Pérez Chasing Offensive Conduct in Social Networks: a Reputation-Based Practical Approach for Frisber . . . . . . . . . . 15:1--15:?? Alistair G. Sutcliffe and Di Wang and Robin I. M. Dunbar Modelling the Role of Trust in Social Relationships . . . . . . . . . . . . . 16:1--16:??
Djamal Benslimane and Quan Z. Sheng and Mahmoud Barhamgi and Henri Prade The Uncertain Web: Concepts, Challenges, and Current Solutions . . . . . . . . . 1:1--1:?? Peng Zhang and Jing He and Guodong Long and Guangyan Huang and Chengqi Zhang Towards Anomalous Diffusion Sources Detection in a Large Network . . . . . . 2:1--2:?? Asma Abboura and Soror Sahri and Latifa Baba-Hamed and Mourad Ouziri and Salima Benbernou Quality-Based Online Data Reconciliation 3:1--3:?? Jiangang Ma and Le Sun and Hua Wang and Yanchun Zhang and Uwe Aickelin Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams 4:1--4:?? Abdallah Makhoul and Christophe Guyeux and Mourad Hakem and Jacques M. Bahi Using an Epidemiological Approach to Maximize Data Survival in the Internet of Things . . . . . . . . . . . . . . . 5:1--5:?? Kenneth Wai-Ting Leung and Di Jiang and Dik Lun Lee and Wilfred Ng Constructing Maintainable Semantic Relation Network from Ambiguous Concepts in Web Content . . . . . . . . . . . . . 6:1--6:?? Zaki Malik and Brahim Medjahed and Abdelmounaam Rezgui sCARE: Reputation Estimation for Uncertain Web Services . . . . . . . . . 7:1--7:??
In-Young Ko and Han-Gyu Ko and Angel Jimenez Molina and Jung-Hyun Kwon SoIoT: Toward A User-Centric IoT-Based Service Framework . . . . . . . . . . . 8:1--8:?? Lina Yao and Quan Z. Sheng and Anne H. H. Ngu and Xue Li Things of Interest Recommendation by Leveraging Heterogeneous Relations in the Internet of Things . . . . . . . . . 9:1--9:?? Marco Lippi and Paolo Torroni Argumentation Mining: State of the Art and Emerging Trends . . . . . . . . . . 10:1--10:?? Michael Vögler and Johannes M. Schleicher and Christian Inzinger and Schahram Dustdar A Scalable Framework for Provisioning Large-Scale IoT Deployments . . . . . . 11:1--11:?? Lidong Bing and Tak-Lam Wong and Wai Lam Unsupervised Extraction of Popular Product Attributes from E-Commerce Web Sites by Considering Customer Reviews 12:1--12:?? Alba Amato and Salvatore Venticinque Multiobjective Optimization for Brokering of Multicloud Service Composition . . . . . . . . . . . . . . 13:1--13:?? Costas Courcoubetis and Laszlo Gyarmati and Nikolaos Laoutaris and Pablo Rodriguez and Kostas Sdrolias Negotiating Premium Peering Prices: a Quantitative Model with Applications . . 14:1--14:??
Philipp Leitner and Jürgen Cito Patterns in the Chaos --- A Study of Performance Variation and Predictability in Public IaaS Clouds . . . . . . . . . 15:1--15:?? Tien-Dung Cao and Tran-Vu Pham and Quang-Hieu Vu and Hong-Linh Truong and Duc-Hung Le and Schahram Dustdar MARSA: a Marketplace for Realtime Human Sensing Data . . . . . . . . . . . . . . 16:1--16:?? Carlos Rodríguez and Florian Daniel and Fabio Casati Mining and Quality Assessment of Mashup Model Patterns with the Crowd: a Feasibility Study . . . . . . . . . . . 17:1--17:?? Georgiana Copil and Daniel Moldovan and Hong-Linh Truong and Schahram Dustdar rSYBL: a Framework for Specifying and Controlling Cloud Services Elasticity 18:1--18:?? Delia Irazú Hernández Farías and Viviana Patti and Paolo Rosso Irony Detection in Twitter: The Role of Affective Content . . . . . . . . . . . 19:1--19:?? Gianni Costa and Riccardo Ortale Model-Based Collaborative Personalized Recommendation on Signed Social Rating Networks . . . . . . . . . . . . . . . . 20:1--20:?? Rui Zhang and Rui Xue and Ting Yu and Ling Liu Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data . . . . . . . . . . . . . 21:1--21:??
Elisa Bertino and Kim-Kwang Raymond Choo and Dimitrios Georgakopolous and Surya Nepal Internet of Things (IoT): Smart and Secure Service Delivery . . . . . . . . 22:1--22:?? Li Duan and Dongxi Liu and Yang Zhang and Shiping Chen and Ren Ping Liu and Bo Cheng and Junliang Chen Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems . . . . . . . 23:1--23:?? Yuexin Zhang and Yang Xiang and Xinyi Huang Password-Authenticated Group Key Exchange: a Cross-Layer Design . . . . . 24:1--24:?? Neetesh Saxena and Santiago Grijalva and Narendra S. Chaudhari Authentication Protocol for an IoT-Enabled LTE Network . . . . . . . . 25:1--25:?? Shachar Siboni and Asaf Shabtai and Nils O. Tippenhauer and Jemin Lee and Yuval Elovici Advanced Security Testbed Framework for Wearable IoT Devices . . . . . . . . . . 26:1--26:?? Ahmed Saeed and Ali Ahmadinia and Abbas Javed and Hadi Larijani Intelligent Intrusion Detection in Low-Power IoTs . . . . . . . . . . . . . 27:1--27:?? Ngoc Do and Ye Zhao and Cheng-Hsin Hsu and Nalini Venkatasubramanian Crowdsourced Mobile Data Transfer with Delay Bound . . . . . . . . . . . . . . 28:1--28:?? Aveek K. Das and Parth H. Pathak and Chen-Nee Chuah and Prasant Mohapatra Characterization of Wireless Multidevice Users . . . . . . . . . . . . . . . . . 29:1--29:??
Chloé Clavel and Rossana Damiano and Viviana Patti and Paolo Rosso Affect and Interaction in Agent-Based Systems and Social Media: Guest Editors' Introduction . . . . . . . . . . . . . . 1:1--1:?? Beste F. Yuksel and Penny Collisson and Mary Czerwinski Brains or Beauty: How to Engender Trust in User-Agent Interactions . . . . . . . 2:1--2:?? Maurizio Mancini and Beatrice Biancardi and Florian Pecune and Giovanna Varni and Yu Ding and Catherine Pelachaud and Gualtiero Volpe and Antonio Camurri Implementing and Evaluating a Laughing Virtual Character . . . . . . . . . . . 3:1--3:?? Mehdi Dastani and Alexander Pankov Other-Condemning Moral Emotions: Anger, Contempt and Disgust . . . . . . . . . . 4:1--4:?? Bexy Alfonso and Emilio Vivancos and Vicente Botti Toward Formal Modeling of Affective Agents in a BDI Architecture . . . . . . 5:1--5:?? Jahna Otterbacher and Chee Siang Ang and Marina Litvak and David Atkins Show Me You Care: Trait Empathy, Linguistic Style, and Mimicry on Facebook . . . . . . . . . . . . . . . . 6:1--6:?? Rosa Meo and Emilio Sulis Processing Affect in Social Media: a Comparison of Methods to Distinguish Emotions in Tweets . . . . . . . . . . . 7:1--7:?? Pasquale De Meo and Katarzyna Musial-Gabrys and Domenico Rosaci and Giuseppe M. L. Sarn\`e and Lora Aroyo Using Centrality Measures to Predict Helpfulness-Based Reputation in Trust Networks . . . . . . . . . . . . . . . . 8:1--8:?? Ruchdee Binmad and Mingchu Li Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism . . . . . . . . . . . . . . . 9:1--9:?? George Drosatos and Aimilia Tasidou and Pavlos S. Efraimidis Privacy-Enhanced Television Audience Measurements . . . . . . . . . . . . . . 10:1--10:??
Amit K. Chopra and Erez Shmueli and Vivek K. Singh Introduction to the Special Issue on Advances in Social Computing . . . . . . 11:1--11:?? Sara Rosenthal and Kathleen Mckeown Detecting Influencers in Multiple Online Genres . . . . . . . . . . . . . . . . . 12:1--12:?? Christos Perentis and Michele Vescovi and Chiara Leonardi and Corrado Moiso and Mirco Musolesi and Fabio Pianesi and Bruno Lepri Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure . . . . . . . . . . . . . . . 13:1--13:?? Jorge Goncalves and Simo Hosio and Vassilis Kostakos Eliciting Structured Knowledge from Situated Crowd Markets . . . . . . . . . 14:1--14:?? Atanu Roy and Ayush Singhal and Jaideep Srivastava Formation and Reciprocation of Dyadic Trust . . . . . . . . . . . . . . . . . 15:1--15:?? Yefeng Ruan and Ping Zhang and Lina Alfantoukh and Arjan Durresi Measurement Theory-Based Trust Management Framework for Online Social Communities . . . . . . . . . . . . . . 16:1--16:?? Christian Von Der Weth and Ashraf M. Abdul and Mohan Kankanhalli Cyber-Physical Social Networks . . . . . 17:1--17:?? Nasser Alsaedi and Pete Burnap and Omer Rana Can We Predict a Riot? Disruptive Event Detection Using Twitter . . . . . . . . 18:1--18:?? Zhenguo Yang and Qing Li and Zheng Lu and Yun Ma and Zhiguo Gong and Wenyin Liu Dual Structure Constrained Multimodal Feature Coding for Social Event Detection from Flickr Data . . . . . . . 19:1--19:?? Michal Ciesielczyk and Andrzej Szwabe and Mikolaj Morzy and Pawel Misiorek Progressive Random Indexing: Dimensionality Reduction Preserving Local Network Dependencies . . . . . . . 20:1--20:?? Benjamin Billet and Valérie Issarny Spinel: an Opportunistic Proxy for Connecting Sensors to the Internet of Things . . . . . . . . . . . . . . . . . 21:1--21:?? Xumin Liu and Weishi Shi and Arpeet Kale and Chen Ding and Qi Yu Statistical Learning of Domain-Specific Quality-of-Service Features from User Reviews . . . . . . . . . . . . . . . . 22:1--22:??
Iryna Gurevych and Marco Lippi and Paolo Torroni Argumentation in Social Media . . . . . 23:1--23:?? John Lawrence and Mark Snaith and Barbara Konat and Katarzyna Budzynska and Chris Reed Debating Technology for Dialogical Argument: Sensemaking, Engagement, and Analytics . . . . . . . . . . . . . . . 24:1--24:?? John Lawrence and Joonsuk Park and Katarzyna Budzynska and Claire Cardie and Barbara Konat and Chris Reed Using Argumentative Structure to Interpret Debates in Online Deliberative Democracy and eRulemaking . . . . . . . 25:1--25:?? Saif M. Mohammad and Parinaz Sobhani and Svetlana Kiritchenko Stance and Sentiment in Tweets . . . . . 26:1--26:?? Nadin Kökciyan and Nefise Yaglikci and Pinar Yolum An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks . . . . . . . . . . . . . . . . 27:1--27:?? Henning Wachsmuth and Benno Stein A Universal Model for Discourse-Level Argumentation Analysis . . . . . . . . . 28:1--28:?? Edmond Awad and Jean-François Bonnefon and Martin Caminada and Thomas W. Malone and Iyad Rahwan Experimental Assessment of Aggregation Principles in Argumentation-Enabled Collective Intelligence . . . . . . . . 29:1--29:?? Lucas Carstens and Francesca Toni Using Argumentation to Improve Classification in Natural Language Problems . . . . . . . . . . . . . . . . 30:1--30:?? Yan Hu and Weisong Shi and Hong Li and Xiaohui Hu Mitigating Data Sparsity Using Similarity Reinforcement-Enhanced Collaborative Filtering . . . . . . . . 31:1--31:?? Ero Balsa and Cristina Pérez-Sol\`a and Claudia Diaz Towards Inferring Communication Patterns in Online Social Networks . . . . . . . 32:1--32:??
Adriane Chapman and James Cheney and Simon Miles Guest Editorial: The Provenance of Online Data . . . . . . . . . . . . . . 33:1--33:?? Adam Bates and Dave (Jing) Tian and Grant Hernandez and Thomas Moyer and Kevin R. B. Butler and Trent Jaeger Taming the Costs of Trustworthy Provenance through Policy Reduction . . 34:1--34:?? Luc Moreau A Canonical Form for PROV Documents and Its Application to Equality, Signature, and Validation . . . . . . . . . . . . . 35:1--35:?? Vitor C. Neves and Daniel De Oliveira and Kary A. C. S. Ocaña and Vanessa Braganholo and Leonardo Murta Managing Provenance of Implicit Data Flows in Scientific Experiments . . . . 36:1--36:?? Manolis Stamatogiannakis and Elias Athanasopoulos and Herbert Bos and Paul Groth PROV$_{2R}$: Practical Provenance Analysis of Unstructured Processes . . . 37:1--37:?? Steven Weber Facilitating Adoption of Internet Technologies and Services with Externalities via Cost Subsidization . . 38:1--38:?? José Luis García-Dorado Bandwidth Measurements within the Cloud: Characterizing Regular Behaviors and Correlating Downtimes . . . . . . . . . 39:1--39:?? Jianhua Shao and Hoang Ong Exploiting Contextual Information in Attacking Set-Generalized Transactions 40:1--40:??
Ernesto Damiani and Ryszard Kowalczyk and Gerard Parr Extending the Outreach: From Smart Cities to Connected Communities . . . . 1:1--1:?? Haibo Zhang and Luming Wan and Yawen Chen and Laurence T. Yang and Lizhi Peng Adaptive Message Routing and Replication in Mobile Opportunistic Networks for Connected Communities . . . . . . . . . 2:1--2:?? Taehun Kim and Junsung Lim and Heesuk Son and Byoungheon Shin and Dongman Lee and Soon J. Hyun A Multi-Dimensional Smart Community Discovery Scheme for IoT-Enriched Smart Homes . . . . . . . . . . . . . . . . . 3:1--3:?? Catia Prandi and Silvia Mirri and Stefano Ferretti and Paola Salomoni On the Need of Trustworthy Sensing and Crowdsourcing for Urban Accessibility in Smart City . . . . . . . . . . . . . . . 4:1--4:?? Antonella Longo and Marco Zappatore and Mario Bochicchio and Shamkant B. Navathe Crowd-Sourced Data Collection for Urban Monitoring via Mobile Sensors . . . . . 5:1--5:?? Moreno Ambrosin and Paolo Braca and Mauro Conti and Riccardo Lazzeretti ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks . . . . . . . . . 6:1--6:?? Emanuele Bellini and Paolo Ceravolo and Paolo Nesi Quantify Resilience Enhancement of UTS through Exploiting Connected Community and Internet of Everything Emerging Technologies . . . . . . . . . . . . . . 7:1--7:?? M. Mazhar Rathore and Anand Paul and Awais Ahmad and Marco Anisetti and Gwanggil Jeon Hadoop-Based Intelligent Care System (HICS): Analytical Approach for Big Data in IoT . . . . . . . . . . . . . . . . . 8:1--8:?? Di Wang and Ahmad Al-Rubaie and Sandra Stinci\'c Clarke and John Davies Real-Time Traffic Event Detection From Social Media . . . . . . . . . . . . . . 9:1--9:?? Hiroshi Fujikawa and Hirofumi Yamaki and Setsuo Tsuruta Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks . . . . . 10:1--10:?? Claudia López and Rosta Farzan and Yu-Ru Lin Behind the Myths of Citizen Participation: Identifying Sustainability Factors of Hyper-Local Information Systems . . . . . . . . . . 11:1--11:?? Munindar P. Singh TOIT Reviewers over 2015 and 2016 . . . 12:1--12:??
Özgür Kafali and Natalia Criado and Martin Rehak and Jose M. Such and Pinar Yolum Guest Editors' Introduction . . . . . . 26:1--26:?? Igor Saenko and Igor Kotenko Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks . . 27:1--27:?? Michal Stolba and Jan Tozicka and Antonín Komenda Quantifying Privacy Leakage in Multi-Agent Planning . . . . . . . . . . 28:1--28:?? Daniele Codetta-Raiteri and Luigi Portinale Decision Networks for Security Risk Assessment of Critical Infrastructures 29:1--29:?? Sushil Jajodia and Noseong Park and Edoardo Serra and V. S. Subrahmanian SHARE: a Stackelberg Honey-Based Adversarial Reasoning Engine . . . . . . 30:1--30:?? Julian A. Padget and Wamberto W. Vasconcelos Fine-Grained Access Control via Policy-Carrying Data . . . . . . . . . . 31:1--31:?? Lina Yao and Quan Z. Sheng and Xianzhi Wang and Wei Emma Zhang and Yongrui Qin Collaborative Location Recommendation by Integrating Multi-dimensional Contextual Information . . . . . . . . . . . . . . 32:1--32:?? Haiying Shen and Harrison Chandler and Haoyu Wang Toward Efficient Short-Video Sharing in the YouTube Social Network . . . . . . . 33:1--33:?? Zhen Xu and James Miller Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity . . . . . . . . . 34:1--34:?? Wei Emma Zhang and Quan Z. Sheng and Lina Yao and Kerry Taylor and Ali Shemshadi and Yongrui Qin A Learning-Based Framework for Improving Querying on Web Interfaces of Curated Knowledge Bases . . . . . . . . . . . . 35:1--35:?? Sebastian Zander and Xuequn Wang Are We There Yet? IPv6 in Australia and China . . . . . . . . . . . . . . . . . 36:1--36:?? Wei Emma Zhang and Quan Z. Sheng and Jey Han Lau and Ermyas Abebe and Wenjie Ruan Duplicate Detection in Programming Question Answering Communities . . . . . 37:1--37:?? Tian Guo and Prashant Shenoy Providing Geo-Elasticity in Geographically Distributed Clouds . . . 38:1--38:?? Yonghong Guo and Lu Liu and Yan Wu and James Hardy Interest-Aware Content Discovery in Peer-to-Peer Social Networks . . . . . . 39:1--39:??
Tao Xie and Andre van Hoorn and Huaimin Wang and Ingo Weber Introduction to the Special Issue on Emerging Software Technologies for Internet-Based Systems: Internetware and DevOps . . . . . . . . . . . . . . . . . 13:1--13:?? Xuanzhe Liu and Meihua Yu and Yun Ma and Gang Huang and Hong Mei and Yunxin Liu i-Jacob: an Internetware-Oriented Approach to Optimizing Computation-Intensive Mobile Web Browsing . . . . . . . . . . . . . . . . 14:1--14:?? Xue Ouyang and Peter Garraghan and Bernhard Primas and David Mckee and Paul Townend and Jie Xu Adaptive Speculation for Efficient Internetware Application Execution in Clouds . . . . . . . . . . . . . . . . . 15:1--15:?? Nicolas Ferry and Franck Chauvel and Hui Song and Alessandro Rossini and Maksym Lushpenko and Arnor Solberg CloudMF: Model-Driven Management of Multi-Cloud Applications . . . . . . . . 16:1--16:?? Claus Pahl and Pooyan Jamshidi and Olaf Zimmermann Architectural Principles for Cloud Software . . . . . . . . . . . . . . . . 17:1--17:?? He Jiang and Xin Chen and Tieke He and Zhenyu Chen and Xiaochen Li Fuzzy Clustering of Crowdsourced Test Reports for Apps . . . . . . . . . . . . 18:1--18:?? Xin Peng and Jingxiao Gu and Tian Huat Tan and Jun Sun and Yijun Yu and Bashar Nuseibeh and Wenyun Zhao CrowdService: Optimizing Mobile Crowdsourcing and Service Composition 19:1--19:?? Wenhua Yang and Chang Xu and Minxue Pan and Xiaoxing Ma and Jian Lu Improving Verification Accuracy of CPS by Modeling and Calibrating Interaction Uncertainty . . . . . . . . . . . . . . 20:1--20:?? Felix Willnecker and Helmut Krcmar Multi-Objective Optimization of Deployment Topologies for Distributed Applications . . . . . . . . . . . . . . 21:1--21:?? Santiago Gómez Sáez and Vasilios Andrikopoulos and Marina Bitsaki and Frank Leymann and André van Hoorn Utility-Based Decision Making for Migrating Cloud-Based Applications . . . 22:1--22:?? Bowen Zhou and Amir Vahid Dastjerdi and Rodrigo N. Calheiros and Rajkumar Buyya An Online Algorithm for Task Offloading in Heterogeneous Mobile Clouds . . . . . 23:1--23:?? Balaji Palanisamy and Ling Liu and Yang Zhou and Qingyang Wang Privacy-Preserving Publishing of Multilevel Utility-Controlled Graph Datasets . . . . . . . . . . . . . . . . 24:1--24:?? Fabrizio Angiulli and Luciano Argento and Angelo Furfaro Exploiting Content Spatial Distribution to Improve Detection of Intrusions . . . 25:1--25:??
Cristina Baroglio and Olivier Boissier and Axel Polleres Special Issue: Computational Ethics and Accountability . . . . . . . . . . . . . 40:1--40:?? Alex Kayal and Willem-Paul Brinkman and Mark A. Neerincx and M. Birna Van Riemsdijk Automatic Resolution of Normative Conflicts in Supportive Technology Based on User Values . . . . . . . . . . . . . 41:1--41:?? Dilara Kekulluoglu and Nadin Kokciyan and Pinar Yolum Preserving Privacy as Social Responsibility in Online Social Networks 42:1--42:?? Ilse Verdiesen and Virginia Dignum and Jeroen Van Den Hoven Measuring Moral Acceptability in E-deliberation: a Practical Application of Ethics by Participation . . . . . . . 43:1--43:?? Leila Bahri and Barbara Carminati and Elena Ferrari and Andrea Bianco Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks . . . . . . . 44:1--44:?? Vasiliki Gkatziaki and Symeon Papadopoulos and Richard Mills and Sotiris Diplaris and Ioannis Tsampoulatidis and Ioannis Kompatsiaris easIE: Easy-to-Use Information Extraction for Constructing CSR Databases From the Web . . . . . . . . . 45:1--45:?? Marco Gavanelli and Marco Alberti and Evelina Lamma Accountable Protocols in Abductive Logic Programming . . . . . . . . . . . . . . 46:1--46:?? Rainer Böhme and Richard Clayton and Jens Grossklags and Katrina Ligett and Patrick Loiseau and Galina Schwartz Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction . . . . . . . . . . . . . . 47:1--47:?? Aron Laszka and Benjamin Johnson and Jens Grossklags On the Assessment of Systematic Risk in Networked Systems . . . . . . . . . . . 48:1--48:?? Samaneh Tajalizadehkhoob and Rainer Böhme and Carlos Gañán and Maciej Korczy\'nski and Michel Van Eeten Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse . . . . . . . . . . . . . . . . . 49:1--49:?? Tyler Moore and Nicolas Christin and Janos Szurdi Revisiting the Risks of Bitcoin Currency Exchange Closure . . . . . . . . . . . . 50:1--50:?? Jagdish Prasad Achara and Javier Parra-Arnau and Claude Castelluccia Fine-Grained Control over Tracking to Support the Ad-Based Web Economy . . . . 51:1--51:?? Reuben Binns and Jun Zhao and Max Van Kleek and Nigel Shadbolt Measuring Third-party Tracker Power across Web and Mobile . . . . . . . . . 52:1--52:?? Razieh Nokhbeh Zaeem and Rachel L. German and K. Suzanne Barber PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining . . . 53:1--53:?? James T. Graves and Alessandro Acquisti and Nicolas Christin Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking . . . . . 54:1--54:?? Mohsen Rezvani and Aleksandar Ignjatovic and Elisa Bertino A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems . . . . . . . . . . . . . . . . 55:1--55:?? Zhi Yang and Wei Chen A Game Theoretic Model for the Formation of Navigable Small-World Networks-The Tradeoff between Distance and Reciprocity . . . . . . . . . . . . . . 56:1--56:?? Munindar P. Singh TOIT Reviewers over 2017 . . . . . . . . 57:1--57:??
Zhiwen Yu and Fei Yi and Chao Ma and Zhu Wang and Bin Guo and Liming Chen Fine-grained Emotion Role Detection Based on Retweet Information . . . . . . 1:1--1:?? Timothy K. Shih and W. K. T. M. Gunarathne and Ankhtuya Ochirbat and Huang-Ming Su Grouping Peers Based on Complementary Degree and Social Relationship using Genetic Algorithm . . . . . . . . . . . 2:1--2:?? Oscar Novo Making Constrained Things Reachable: a Secure IP-Agnostic NAT Traversal Approach for IoT . . . . . . . . . . . . 3:1--3:?? Ali Ouni and Hanzhang Wang and Marouane Kessentini and Salah Bouktif and Katsuro Inoue A Hybrid Approach for Improving the Design Quality of Web Service Interfaces 4:1--4:?? Azadeh Ghari Neiat and Athman Bouguettaya and Sajib Mistry Incentive-Based Crowdsourcing of Hotspot Services . . . . . . . . . . . . . . . . 5:1--5:?? Samir Tata and Quan Z. Sheng and Eleni Stroulia Guest Editors' Introduction for Special Issue on Service Management for the Internet of Things . . . . . . . . . . . 6:1--6:?? Amir Taherkordi and Frank Eliassen and Michael Mcdonald and Geir Horn Context-Driven and Real-Time Provisioning of Data-Centric IoT Services in the Cloud . . . . . . . . . 7:1--7:?? Emna Mezghani and Ernesto Exposito and Khalil Drira An Autonomic Cognitive Pattern for Smart IoT-Based System Manageability: Application to Comorbidity Management 8:1--8:?? Redowan Mahmud and Kotagiri Ramamohanarao and Rajkumar Buyya Latency-Aware Application Module Management for Fog Computing Environments . . . . . . . . . . . . . . 9:1--9:?? Andreas Konstantinidis and Panagiotis Irakleous and Zacharias Georgiou and Demetrios Zeinalipour-Yazti and Panos K. Chrysanthis IoT Data Prefetching in Indoor Navigation SOAs . . . . . . . . . . . . 10:1--10:?? Aditya Ghose and Hamid R. Motahari Nezhad and Manfred Reichert Guest Editors' Introduction to the Special Issue on Knowledge-Driven Business Process Management . . . . . . 11:1--11:?? Rik Eshuis and Richard Hull and Mengfei Yi Reasoning About Property Preservation in Adaptive Case Management . . . . . . . . 12:1--12:?? Shaya Pourmirza and Sander Peters and Remco Dijkman and Paul Grefen BPMS-RA: a Novel Reference Architecture for Business Process Management Systems 13:1--13:?? Alaaeddine Yousfi and Kimon Batoulis and Mathias Weske Achieving Business Process Improvement via Ubiquitous Decision-Aware Business Processes . . . . . . . . . . . . . . . 14:1--14:?? Bedilia Estrada-Torres and Pedro Henrique Piccoli Richetti and Adela Del-Río-Ortega and Fernanda Araujo Baião and Manuel Resinas and Flávia Maria Santoro and Antonio Ruiz-Cortés Measuring Performance in Knowledge-intensive Processes . . . . . 15:1--15:?? Abel Armas-Cervantes and Marlon Dumas and Marcello La Rosa and Abderrahmane Maaradji Local Concurrency Detection in Business Process Event Logs . . . . . . . . . . . 16:1--16:??
Francesco Longo and Antonio Puliafito and Omer Rana Guest Editors' Introduction to the Special Issue on Fog, Edge, and Cloud Integration for Smart Environments . . . 17:1--17:?? Carlo Puliafito and Enzo Mingozzi and Francesco Longo and Antonio Puliafito and Omer Rana Fog Computing for the Internet of Things: a Survey . . . . . . . . . . . . 18:1--18:?? Madhurima Pore and Vinaya Chakati and Ayan Banerjee and Sandeep K. S. Gupta ContextAiDe: End-to-End Architecture for Mobile Crowd-sensing Applications . . . 19:1--19:?? Federico Concone and Giuseppe Lo Re and Marco Morana A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices . . . . . . . . . . . . . 20:1--20:?? He Li and Kaoru Ota and Mianxiong Dong Deep Reinforcement Scheduling for Mobile Crowdsensing in Fog Computing . . . . . 21:1--21:?? Farzad Samie and Vasileios Tsoutsouras and Lars Bauer and Sotirios Xydis and Dimitrios Soudris and Jörg Henkel Oops: Optimizing Operation-mode Selection for IoT Edge Devices . . . . . 22:1--22:?? Marios Avgeris and Dimitrios Dechouniotis and Nikolaos Athanasopoulos and Symeon Papavassiliou Adaptive Resource Allocation for Computation Offloading: a Control-Theoretic Approach . . . . . . . 23:1--23:?? Houssemeddine Mazouzi and Nadjib Achir and Khaled Boussetta DM2-ECOP: an Efficient Computation Offloading Policy for Multi-user Multi-cloudlet Mobile Edge Computing Environment . . . . . . . . . . . . . . 24:1--24:?? D. R. Vasconcelos and R. M. C. Andrade and V. Severino and J. N. De Souza Cloud, Fog, or Mist in IoT? That Is the Question . . . . . . . . . . . . . . . . 25:1--25:?? Jun Feng and Laurence T. Yang and Ronghao Zhang Practical Privacy-preserving High-order Bi-Lanczos in Integrated Edge-Fog-Cloud Architecture for Cyber-Physical-Social Systems . . . . . . . . . . . . . . . . 26:1--26:?? Luca Ferretti and Mirco Marchetti and Michele Colajanni Fog-based Secure Communications for Low-power IoT Devices . . . . . . . . . 27:1--27:?? Giovanni Merlino and Rustem Dautov and Salvatore Distefano and Dario Bruneo Enabling Workload Engineering in Edge, Fog, and Cloud Computing through OpenStack-based Middleware . . . . . . . 28:1--28:?? L. Baresi and D. F. Mendonça and M. Garriga and S. Guinea and G. Quattrocchi A Unified Model for the Mobile-Edge-Cloud Continuum . . . . . . 29:1--29:?? Min Chen and Wei Li and Giancarlo Fortino and Yixue Hao and Long Hu and Iztok Humar A Dynamic Service Migration Mechanism in Edge Cognitive Computing . . . . . . . . 30:1--30:??
Li Ye and Weijie Wu and Richard T. B. Ma and John C. S. Lui On the Profitability of Bundling Sale Strategy for Online Service Markets With Network Effects . . . . . . . . . . . . 31:1--31:?? Ricardo J. Rodríguez and Rafael Tolosana-calasanz and Omer F. Rana A Dynamic Data-throttling Approach to Minimize Workflow Imbalance . . . . . . 32:1--32:?? Jianwei Qian and Xiang-Yang Li and Taeho Jung and Yang Fan and Yu Wang and Shaojie Tang Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified? . . . . . . . . . . . . . 33:1--33:?? Eduardo Lima and Weishi Shi and Xumin Liu and Qi Yu Integrating Multi-level Tag Recommendation with External Knowledge Bases for Automatic Question Answering 34:1--34:?? Zexun Jiang and Hao Yin and Yulei Wu and Yongqiang Lyu and Geyong Min and Xu Zhang Constructing Novel Block Layouts for Webpage Analysis . . . . . . . . . . . . 35:1--35:?? Qingyang Wang and Shungeng Zhang and Yasuhiko Kanemasa and Calton Pu Mitigating Tail Response Time of $n$-Tier Applications: The Impact of Asynchronous Invocations . . . . . . . . 36:1--36:?? Schahram Dustdar and Surya Nepal and James Joshi Introduction to the Special Section on Advances in Internet-based Collaborative Technologies . . . . . . . . . . . . . . 37:1--37:?? Xiaodong Ning and Lina Yao and Boualem Benatallah and Yihong Zhang and Quan Z. Sheng and Salil S. Kanhere Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization . . . . . . . . . . . . . 37:1--37:?? Rafael Angarita and Bruno Lef\`evre and Shohreh Ahvar and Ehsan Ahvar and Nikolaos Georgantas and Valérie Issarny Universal Social Network Bus: Toward the Federation of Heterogeneous Online Social Network Services . . . . . . . . 38:1--38:?? Christian Von Der Weth and Ashraf Abdul and Abhinav R. Kashyap and Mohan S. Kankanhalli CloseUp --- a Community-Driven Live Online Search Engine . . . . . . . . . . 39:1--39:?? Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri Policy Adaptation in Hierarchical Attribute-based Access Control Systems 40:1--40:?? Harsha S. Gardiyawasam Pussewalage and Vladimir A. Oleshchuk An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment . . . . . . . . . . 41:1--41:?? Muhamad Felemban and Emad Felemban and Jason Kobes and Arif Ghafoor Threat Management in Data-centric IoT-Based Collaborative Systems . . . . 42:1--42:?? Daniel Sun and Shiping Chen and Guoqiang Li and Yuanyuan Zhang and Muhammad Atif Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds . . . . . . . . . . . . . . . 43:1--43:??
Pasquale De Meo Trust Prediction via Matrix Factorisation . . . . . . . . . . . . . 44:1--44:?? Jie Zhang and Jamal Bentahar and Rino Falcone and Timothy J. Norman and Murat Sensoy Introduction to the Special Section on Trust and AI . . . . . . . . . . . . . . 44:1--44:?? Feyza Merve Hafizoglu and Sandip Sen Understanding the Influences of Past Experience on Trust in Human-agent Teamwork . . . . . . . . . . . . . . . . 45:1--45:?? Claudia-Lavinia Ignat and Quang-Vinh Dang and Valerie L. Shalin The Influence of Trust Score on Cooperative Behavior . . . . . . . . . . 46:1--46:?? Manel Mrabet and Yosra Ben Saied and Leila Azouz Saidane CAN-TM: Chain Augmented Na\"\ive Bayes-based Trust Model for Reliable Cloud Service Selection . . . . . . . . 47:1--47:?? Teng-Chieh Huang and Razieh Nokhbeh Zaeem and K. Suzanne Barber It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter . . . 48:1--48:?? Yanjiao Chen and Xu Wang and Baochun Li and Qian Zhang An Incentive Mechanism for Crowdsourcing Systems with Network Effects . . . . . . 49:1--49:?? Kai Wang and Wei Quan and Nan Cheng and Mingyuan Liu and Yu Liu and H. Anthony Chan Betweenness Centrality Based Software Defined Routing: Observation from Practical Internet Datasets . . . . . . 50:1--50:?? Fadwa Estuka and James Miller A Pure Visual Approach for Automatically Extracting and Aligning Structured Web Data . . . . . . . . . . . . . . . . . . 51:1--51:?? Hong Xie and Weijie Wu and Richard T. B. Ma and John C. S. Lui Pay as Your Service Needs: an Application-Driven Pricing Approach for the Internet Economics . . . . . . . . . 52:1--52:??
Ling Liu Internet Technology Outlook: From Communication to Storage and Cognitive Computing . . . . . . . . . . . . . . . 1:1--1:4 Tarek Abdelzaher and Yifan Hao and Kasthuri Jayarajah and Archan Misra and Per Skarin and Shuochao Yao and Dulanga Weerakoon and Karl-Erik Årzén Five Challenges in Cloud-enabled Intelligence and Control . . . . . . . . 3:1--3:19 Calton Pu and Abhijit Suprem and Rodrigo Alves Lima and Aibek Musaev and De Wang and Danesh Irani and Steve Webb and Joao Eduardo Ferreira Beyond Artificial Reality: Finding and Monitoring Live Events from Social Sensors . . . . . . . . . . . . . . . . 2:1--2:21 Zhengdi Hu and Guangquan Xu and Xi Zheng and Jiang Liu and Zhangbing Li and Quan Z. Sheng and Wenjuan Lian and Hequn Xian SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation . . . . . . 4:1--4:20 Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng Privacy-preserving Network Path Validation . . . . . . . . . . . . . . . 5:1--5:27 Amitangshu Pal and Mayank Raj and Krishna Kant and Sajal K. Das A Smartphone-based Network Architecture for Post-disaster Operations Using WiFi Tethering . . . . . . . . . . . . . . . 6:1--6:27 Rui Pascoal and Ana De Almeida and Rute C. Sofia Mobile Pervasive Augmented Reality Systems --- MPARS: The Role of User Preferences in the Perceived Quality of Experience in Outdoor Applications . . . 7:1--7:17
Demetris Paschalides and Dimosthenis Stephanidis and Andreas Andreou and Kalia Orphanou and George Pallis and Marios D. Dikaiakos and Evangelos Markatos MANDOLA: a Big-Data Processing and Visualization Platform for Monitoring and Detecting Online Hate Speech . . . . 11:1--11:21 Flor-Miriam Plaza-Del-Arco and M. Dolores Molina-González and L. Alfonso Ureña-López and M. Teresa Martín-Valdivia Detecting Misogyny and Xenophobia in Spanish Tweets Using Language Technologies . . . . . . . . . . . . . . 12:1--12:19 Shuo Wang and Aishan Maoliniyazi and Xinle Wu and Xiaofeng Meng Emo2Vec: Learning Emotional Embeddings via Multi-Emotion Category . . . . . . . 13:1--13:17 Amitangshu Pal and Krishna Kant Exploiting Proxy Sensing for Efficient Monitoring of Large-Scale Sensor Networks . . . . . . . . . . . . . . . . 14:1--14:31 Zhiheng Zhong and Rajkumar Buyya A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources . . . . . . . . 15:1--15:24 Xingbin Jiang and Michele Lora and Sudipta Chattopadhyay An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices . . . . . . . . . . . . . . . . 16:1--16:24 Christos Tsigkanos and Martin Garriga and Luciano Baresi and Carlo Ghezzi Cloud Deployment Tradeoffs for the Analysis of Spatially Distributed Internet of Things Systems . . . . . . . 17:1--17:23 Ting Chen and Zihao Li and Yuxiao Zhu and Jiachi Chen and Xiapu Luo and John Chi-Shing Lui and Xiaodong Lin and Xiaosong Zhang Understanding Ethereum via Graph Analysis . . . . . . . . . . . . . . . . 18:1--18:32 Bilal Ghanem and Paolo Rosso and Francisco Rangel An Emotional Analysis of False Information in Social Media and News Articles . . . . . . . . . . . . . . . . 19:1--19:18
Rute C. Sofia and Eve M. Schooler and Dirk Kutscher and Chris Winkler Introduction to the Special Issue on Evolution of IoT Networking Architectures . . . . . . . . . . . . . 20:1--20:2 Marcel Enguehard and Yoann Desmouceaux and Giovanna Carofiglio Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation . . . . . . . . . 21:1--21:23 K. Panagidi and C. Anagnostopoulos and A. Chalvatzaras and S. Hadjiefthymiades To Transmit or Not to Transmit: Controlling Communications in the Mobile IoT Domain . . . . . . . . . . . . . . . 22:1--22:23 Xia Cheng and Junyang Shi and Mo Sha Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks 23:1--23:28 Jiaoyan Chen and Laurence T. Yang and Xianjun Deng and Xianggong Hong and Lingzhi Yi Optimal Receiver Placement for $K$-barrier Coverage in Passive Bistatic Radar Sensor Networks . . . . . . . . . 24:1--24:23 Zakaria Benomar and Francesco Longo and Giovanni Merlino and Antonio Puliafito Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge . . . . . . . . . . . . 25:1--25:28 Giuseppe Faraci and Christian Grasso and Giovanni Schembra Fog in the Clouds: UAVs to Provide Edge Computing to IoT Devices . . . . . . . . 26:1--26:26 Jan Seeger and Arne Bröring and Georg Carle Optimally Self-Healing IoT Choreographies . . . . . . . . . . . . . 27:1--27:20 Junyang Shi and Mo Sha Parameter Self-Adaptation for Industrial Wireless Sensor--Actuator Networks . . . 28:1--28:28 Marcin Luckner and Maciej Grzenda and Robert Kunicki and Jaroslaw Legierski IoT Architecture for Urban Data-Centric Services and Applications . . . . . . . 29:1--29:30 Nikolaos Athanasios Anagnostopoulos and Saad Ahmad and Tolga Arul and Daniel Steinmetzer and Matthias Hollick and Stefan Katzenbeisser Low-cost Security for Next-generation IoT Networks . . . . . . . . . . . . . . 30:1--30:31
Runhua Xu and James Joshi Trustworthy and Transparent Third-party Authority . . . . . . . . . . . . . . . 31:1--31:23 Meng Wang and Bo Cheng and Junliang Chen An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing . . . . . . . . . . . . . . . 32:1--32:21 Xiaoyu Ge and Panos K. Chrysanthis and Konstantinos Pelechrinis and Demetrios Zeinalipour-Yazti and Mohamed A. Sharaf Serendipity-based Points-of-Interest Navigation . . . . . . . . . . . . . . . 33:1--33:32 Michalis Pachilakis and Antonios A. Chariton and Panagiotis Papadopoulos and Panagiotis Ilia and Eirini Degkleri and Evangelos P. Markatos Design and Implementation of a Compressed Certificate Status Protocol 34:1--34:25 Elias Rohrer and Steffen Heidel and Florian Tschorsch Enabling Reference Verifiability for the World Wide Web with Webchain . . . . . . 35:1--35:23 Yang Zhou and Ling Liu and Kisung Lee and Balaji Palanisamy and Qi Zhang Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks . . . . . . . . . . 36:1--36:29 Hong Xie and Yongkun Li and John C. S. Lui A Reinforcement Learning Approach to Optimize Discount and Reputation Tradeoffs in E-commerce Systems . . . . 37:1--37:26 Weichao Gao and James Nguyen and Yalong Wu and William G. Hatcher and Wei Yu Routing in Large-scale Dynamic Networks: a Bloom Filter-based Dual-layer Scheme 38:1--38:24 Grigorios Loukides and Robert Gwadera and Shing-Wan Chang Overexposure-Aware Influence Maximization . . . . . . . . . . . . . . 39:1--39:31 Xudong Wu and Luoyi Fu and Zixin Zhang and Huan Long and Jingfan Meng and Xinbing Wang and Guihai Chen Evolving Influence Maximization in Evolving Networks . . . . . . . . . . . 40:1--40:31 Na Ruan and Dongli Zhou and Weijia Jia Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput 41:1--41:26 Chunli Huang and Wenjun Jiang and Jie Wu and Guojun Wang Personalized Review Recommendation based on Users' Aspect Sentiment . . . . . . . 42:1--42:26 Hongshuai Ren and Yang Wang and Chengzhong Xu and Xi Chen SMig-RL: an Evolutionary Migration Framework for Cloud Services Based on Deep Reinforcement Learning . . . . . . 43:1--43:18 Slava Novgorodov and Ido Guy and Guy Elad and Kira Radinsky Descriptions from the Customers: Comparative Analysis of Review-based Product Description Generation Methods 44:1--44:31 Kostas Kolomvatsos and Christos Anagnostopoulos An Intelligent Edge-centric Queries Allocation Scheme based on Ensemble Models . . . . . . . . . . . . . . . . . 45:1--45:25
Paolo Boldi and Georgios Gousios Fine-Grained Network Analysis for Modern Software Ecosystems . . . . . . . . . . 1:1--1:14 Liwei Huang and Yutao Ma and Yanbo Liu and Keqing He DAN-SNR: a Deep Attentive Network for Social-aware Next Point-of-interest Recommendation . . . . . . . . . . . . . 2:1--2:27 Wensheng Gan and Jerry Chun-Wei Lin and Philippe Fournier-Viger and Han-Chieh Chao and Philip S. Yu Beyond Frequency: Utility Mining with Varied Item-specific Minimum Utility . . 3:1--3:32 Sabah Mohammed and Jinan Fiaidhi and Carlos Ramos and Tai-Hoon Kim and Wai Chi Fang and Tarek Abdelzaher Blockchain in eCommerce: a Special Issue of the \booktitleACM Transactions on Internet of Things . . . . . . . . . . . 4:11--4:55 Yongjun Ren and Jian Qi and Yepeng Liu and Jin Wang and Gwang-Jun Kim Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator . . . . . . . . . . . . . . 5:1--5:19 Honghao Gao and Wanqiu Huang and Yucong Duan The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments: a QoS Prediction Perspective . . . . . . . . . 6:1--6:23 Xiaolong Xu and Dawei Zhu and Xiaoxian Yang and Shuo Wang and Lianyong Qi and Wanchun Dou Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain . . . . . . . . . . . . 7:1--7:17 Junho Kim and Mucheol Kim Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection 8:1--8:16 Shuiguang Deng and Guanjie Cheng and Hailiang Zhao and Honghao Gao and Jianwei Yin Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce . . . . 9:1--9:19 Liang Chen and Jiaying Peng and Yang Liu and Jintang Li and Fenfang Xie and Zibin Zheng Phishing Scams Detection in Ethereum Transaction Network . . . . . . . . . . 10:1--10:16 Lichen Cheng and Jiqiang Liu and Yi Jin and Yidong Li and Wei Wang Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain . . . . . . . . . . . . . . . 11:1--11:19 Zhitao Guan and Naiyu Wang and Xunfeng Fan and Xueyan Liu and Longfei Wu and Shaohua Wan Achieving Secure Search over Encrypted Data for e-Commerce: a Blockchain Approach . . . . . . . . . . . . . . . . 12:1--12:17 A. Qun Song and Yuhao Chen and Yan Zhong and Kun Lan and Simon Fong and B. Rui Tang A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology . . . . . . . . . . . . . . . 13:1--13:24 Junho Jeong and Donghyo Kim and Sun-Young Ihm and Yangsun Lee and Yunsik Son Multilateral Personal Portfolio Authentication System Based on Hyperledger Fabric . . . . . . . . . . . 14:1--14:17 You Sun and Rui Xue and Rui Zhang and Qianqian Su and Sheng Gao RTChain: a Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain . . . . . . . . . 15:1--15:24 Mahmoud Barhamgi and Michael N. Huhns and Charith Perera and Pinar Yolum Introduction to the Special Section on Human-centered Security, Privacy, and Trust in the Internet of Things . . . . 16:1--16:3 Zheng Yan and Li Peng and Wei Feng and Laurence T. Yang Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking . . . . . . 17:1--17:28 A. K. Singh and S. Thakur and Alireza Jolfaei and Gautam Srivastava and MD. Elhoseny and A. Mohan Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents . . . . . . . . . . . 18:1--18:20 Cong Peng and Jianhua Chen and Pandi Vijayakumar and Neeraj Kumar and Debiao He Efficient Distributed Decryption Scheme for IoT Gateway-based Applications . . . 19:1--19:23 Elie Chicha and Bechara Al Bouna and Mohamed Nassar and Richard Chbeir and Ramzi A. Haraty and Mourad Oussalah and Djamal Benslimane and Mansour Naser Alraja A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy . . . . . . . . . 20:1--20:25 Yekta Said Can and Cem Ersoy Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring . . . . . . . . . 21:1--21:17 Edy Hourany and Bachir Habib and Camille Fountaine and Abdallah Makhoul and Benoit Piranda and Julien Bourgeois PROLISEAN: a New Security Protocol for Programmable Matter . . . . . . . . . . 22:1--22:29 Faiza Loukil and Chirine Ghedira-Guegan and Khouloud Boukadi and A\"\icha-Nabila Benharkat and Elhadj Benkhelifa Data Privacy Based on IoT Device Behavior Control Using Blockchain . . . 23:1--23:20 Kaixi Hu and Lin Li and Jianquan Liu and Daniel Sun DuroNet: a Dual-robust Enhanced Spatial-temporal Learning Network for Urban Crime Prediction . . . . . . . . . 24:1--24:24 Vikram Mehta and Daniel Gooch and Arosha Bandara and Blaine Price and Bashar Nuseibeh Privacy Care: a Tangible Interaction Framework for Privacy Management . . . . 25:1--25:32 Tanusree Sharma and Hunter A. Dyer and Masooda. Bashir Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective . . . . . . . . . . . . . . 26:1--26:24
Xuanzhe Liu and Shangguang Wang and Yun Ma and Ying Zhang and Qiaozhu Mei and Yunxin Liu and Gang Huang Operating Systems for Resource-adaptive Intelligent Software: Challenges and Opportunities . . . . . . . . . . . . . 27:1--27:19 Francesco Piccialli and Nik Bessis and Gwanggil Jeon and Calton Pu Introduction to the Special Section on Data Science for Cyber-Physical Systems 28e:1--28e:7 Zhihan Lv and Amit Kumar Singh Big Data Analysis of Internet of Things System . . . . . . . . . . . . . . . . . 28:1--28:15 M. Tanveer and S. Sharma and K. Muhammad Large-Scale Least Squares Twin SVMs . . 29:1--29:19 Claudio Savaglio and Giancarlo Fortino A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing . . 30:1--30:22 Kuljeet Kaur and Sahil Garg and Georges Kaddoum and Neeraj Kumar Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems . . . . . . . . . 31:1--31:24 Chun-Wei Tsai and Zhi-Yan Fang An Effective Hyperparameter Optimization Algorithm for DNN to Predict Passengers at a Metro Station . . . . . . . . . . . 32:1--32:24 Pin Ni and Yuming Li and Gangmin Li and Victor Chang A Hybrid Siamese Neural Network for Natural Language Inference in Cyber-Physical Systems . . . . . . . . . 33:1--33:25 Chen Zhang and Zhuo Tang and Kenli Li and Jianzhong Yang and Li Yang A Polishing Robot Force Control System Based on Time Series Data in Industrial Internet of Things . . . . . . . . . . . 34:1--34:22 Yuyu Yin and Haoran Xu and Tingting Liang and Manman Chen and Honghao Gao and Antonella Longo Leveraging Data Augmentation for Service QoS Prediction in Cyber-physical Systems 35:1--35:25 Martin Garriga and Koen Aarns and Christos Tsigkanos and Damian A. Tamburri and Wjan Van Den Heuvel DataOps for Cyber-Physical Systems Governance: The Airport Passenger Flow Case . . . . . . . . . . . . . . . . . . 36:1--36:25 Iris Weiss and Birgit Vogel-Heuser and Emanuel Trunzer and Simon Kruppa Product Quality Monitoring in Hydraulic Presses Using a Minimal Sample of Sensor and Actuator Data . . . . . . . . . . . 37:1--37:23 Kkwang Raymond Choo and Uttam Ghosh and Deepak Tosh and Reza M. Parizi and Ali Dehghantanha Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems . . . . . . . . . 38e:1--38e:3 Laizhong Cui and Zhe Xiao and Jiahao Wang and Fei Chen and Yi Pan and Hua Dai and Jing Qin Improving Vaccine Safety Using Blockchain . . . . . . . . . . . . . . . 38:1--38:24 Truc D. T. Nguyen and My T. Thai A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels . . . . . . . . . . . . . . . . 39:1--39:22 Chao Lin and Debiao He and Sherali Zeadally and Xinyi Huang and Zhe Liu Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities . . 40:1--40:21 Jun Feng and Laurence T. Yang and Yuxiang Zhu and Nicholaus J. Gati and Yijun Mo Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems . . . . . 41:1--41:17 Ye Luo and Zehai Su and Wei Zheng and Zhaobin Chen and Fuqin Wang and Zhemin Zhang and Jinjun Chen A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems . . . . . . . . . 42:1--42:21 Hao Wang and Shenglan Ma and Chaonian Guo and Yulei Wu and Hong-Ning Dai and Di Wu Blockchain-Based Power Energy Trading Management . . . . . . . . . . . . . . . 43:1--43:16 Micha\l Król and Alberto Sonnino and Mustafa Al-Bassam and Argyrios G. Tasiopoulos and Etienne Rivi\`ere and Ioannis Psaras Proof-of-Prestige: a Useful Work Reward System for Unverifiable Tasks . . . . . 44:1--44:27 Bin Cao and Jiawei Wu and Sichao Wang and Honghao Gao and Jing Fan and Shuiguang Deng and Jianwei Yin and Xuan Liu Unsupervised Derivation of Keyword Summary for Short Texts . . . . . . . . 45:1--45:23 Vandana Bharti and Bhaskar Biswas and Kaushal Kumar Shukla A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security . . . . . . . . . . . . . 46:1--46:28 Shijie Hao and Tao Chen and Yang Wang and Yanrong Guo and Meng Wang and For the Alzheimer's Disease Neuroimaging Initiative Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer's Disease Study . . . . . . . 47:1--47:16 Yuanpeng Zhang and Yizhang Jiang and Lianyong Qi and Md Zakirul Alam Bhuiyan and Pengjiang Qian Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection . . . . . . . . 48:1--48:21 Jimmy Ming-Tai Wu and Gautam Srivastava and Jerry Chun-Wei Lin and Qian Teng A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments . . . . . . 49:1--49:26 Bjarne Pfitzner and Nico Steckhan and Bert Arnrich Federated Learning in a Medical Context: a Systematic Literature Review . . . . . 50:1--50:31 Karam Bou-Chaaya and Richard Chbeir and Mansour Naser Alraja and Philippe Arnould and Charith Perera and Mahmoud Barhamgi and Djamal Benslimane $ \delta $-Risk: Toward Context-aware Multi-objective Privacy Management in Connected Environments . . . . . . . . . 51:1--51:31 Abhinav Kumar and Sanjay Kumar Singh and K. Lakshmanan and Sonal Saxena and Sameer Shrivastava A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images . . . . . . 52:1--52:22
Amit Kumar Singh and Jonathan Wu and Ali Al-Haj and Calton Pu Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare . . . . . . . . . . . . 53:1--53:4 Mohammed Al-Khafajiy and Safa Otoum and Thar Baker and Muhammad Asim and Zakaria Maamar and Moayad Aloqaily and Mark Taylor and Martin Randles Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model . . . . . . . . . . 54:1--54:23 Zhihan Lv and Francesco Piccialli The Security of Medical Data on Internet Based on Differential Privacy Technology 55:1--55:18 Tao Wang and Zhigao Zheng and Ali Kashif Bashir and Alireza Jolfaei and Yanyan Xu FinPrivacy: a Privacy-preserving Mechanism for Fingerprint Identification 56:1--56:15 Zijie Yue and Shuai Ding and Lei Zhao and Youtao Zhang and Zehong Cao and M. Tanveer and Alireza Jolfaei and Xi Zheng Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework . . . . . . . . . . . 57:1--57:21 Tae-Yeun Kim and Sung-Hwan Kim and Hoon Ko Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System . . . . . . . . . . . . . . 60:1--60:17 Cong Peng and Debiao He and Jianhua Chen and Neeraj Kumar and Muhammad Khurram Khan EPRT: an Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System . . 61:1--61:24 Somanka Maiti and Ashish Kumar and Smriti Jain and Gaurav Bhatnagar A Novel Image Inpainting Framework Using Regression . . . . . . . . . . . . . . . 62:1--62:16 Haolun Li and Chi-Man Pun and Feng Xu and Longsheng Pan and Rui Zong and Hao Gao and Huimin Lu A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis . . . . 63:1--63:22 Wei Wei and Ammar Rayes and Wei Wang and Yiduo Mei Special Section on AI-Empowered Internet of Things for Smart Cities . . . . . . . 64:1--64:3 Mohamad Ali Mehrabi and Naila Mukhtar and Alireza Jolfaei Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms . . . . . . . . . . . . . . . 65:1--65:20 Guangwei Gao and Dong Zhu and Huimin Lu and Yi Yu and Heyou Chang and Dong Yue Robust Facial Image Super-Resolution by Kernel Locality-Constrained Coupled-Layer Regression . . . . . . . . 67:1--67:15 Francesco Piccialli and Fabio Giampaolo and Edoardo Prezioso and Danilo Crisci and Salvatore Cuomo Predictive Analytics for Smart Parking: a Deep Learning Approach in Forecasting of IoT Data . . . . . . . . . . . . . . 68:1--68:21 Feiran Huang and Chaozhuo Li and Boyu Gao and Yun Liu and Sattam Alotaibi and Hao Chen Deep Attentive Multimodal Network Representation Learning for Social Media Images . . . . . . . . . . . . . . . . . 69:1--69:17 David K. Y. Chiu and Tao Xu and Iker Gondra Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications . . . . . . . . . . . . . . 70:1--70:17 Laha Ale and Ning Zhang and Scott A. King and Jose Guardiola Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities . . . . . . . . . . . . 72:1--72:21 Celestine Iwendi and Saif Ur Rehman and Abdul Rehman Javed and Suleman Khan and Gautam Srivastava Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures . . . . . . . . . . . . . 73:1--73:22 He-Xuan Hu and Wen-Jie Mao and Zhen-Zhou Lin and Qiang Hu and Ye Zhang Multimodal Brain Tumor Segmentation Based on an Intelligent UNET--LSTM Algorithm in Smart Hospitals . . . . . . 74:1--74:14 Qianmu Li and Shunmei Meng and Xiaonan Sang and Hanrui Zhang and Shoujin Wang and Ali Kashif Bashir and Keping Yu and Usman Tariq Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing . . . . . . . . . . . . . . . 75:1--75:33 Wu Chen and Yong Yu and Keke Gai and Jiamou Liu and Kim-Kwang Raymond Choo Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing . . . 76:1--76:17 Mehedi Masud and Parminder Singh and Gurjot Singh Gaba and Avinash Kaur and Roobaea Alrobaea Alghamdi and Mubarak Alrashoud and Salman Ali Alqahtani CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson's Disease 77:1--77:18 Shehzad Ashraf Chaudhry and Azeem Irshad and Khalid Yahya and Neeraj Kumar and Mamoun Alazab and Yousaf Bin Zikria Rotating behind Privacy: an Improved Lightweight Authentication Scheme for Cloud-based IoT Environment . . . . . . 78:1--78:19 Lucia Cascone and Aniello Castiglione and Michele Nappi and Fabio Narducci and Ignazio Passero Waiting for Tactile: Robotic and Virtual Experiences in the Fog . . . . . . . . . 79:1--79:19 Liang Tan and Na Shi and Keping Yu and Moayad Aloqaily and Yaser Jararweh A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things . . . . . . . . . . . 80:1--80:20
Safa Otoum and Burak Kantarci and Hussein Mouftah A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures . . . . . . . . 81:1--81:22 Mojtaba Alizadeh and Mohammad Hesam Tadayon and Kouichi Sakurai and Hiroaki Anada and Alireza Jolfaei A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing . . . . . . . . . 82:1--82:16 Zhihan Lv and Dongliang Chen and Amit Kumar Singh Big Data Processing on Volunteer Computing . . . . . . . . . . . . . . . 83:1--83:20 Bin Yuan and Chen Lin and Deqing Zou and Laurence Tianruo Yang and Hai Jin Detecting Malicious Switches for a Secure Software-defined Tactile Internet 84:1--84:23 Mehedi Masud and M. Shamim Hossain and Hesham Alhumyani and Sultan S. Alshamrani and Omar Cheikhrouhou and Saleh Ibrahim and Ghulam Muhammad and Amr E. Eldin Rashed and B. B. Gupta Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images . . . . . . . . 85:1--85:17 Farooq Hoseiny and Sadoon Azizi and Mohammad Shojafar and Rahim Tafazolli Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System . . . . . . . 86:1--86:21 Ismaeel Al Ridhawi and Moayad Aloqaily and Yaser Jararweh An Incentive-based Mechanism for Volunteer Computing Using Blockchain . . 87:1--87:22 Di Wu and Wei Shi and Xiangyu Ma A Novel Real-time Anti-spam Framework 88:1--88:27 Jimmy Ming-Tai Wu and Qian Teng and Gautam Srivastava and Matin Pirouz and Jerry Chun-Wei Lin The Efficient Mining of Skyline Patterns from a Volunteer Computing Network . . . 89:1--89:20 Yan-Chun Chen and Ren-Hung Hwang and Mu-Yen Chen and Chih-Chin Wen and Chih-Ping Hsu Screw Slot Quality Inspection System Based on Tactile Network . . . . . . . . 90:1--90:17 Huimin Lu and Liao Wu and Giancarlo Fortino and Schahram Dustdar Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks . . 91e:1--91e:3 Zhiyang Lin and Jihua Zhu and Zutao Jiang and Yujie Li and Yaochen Li and Zhongyu Li Merging Grid Maps in Diverse Resolutions by the Context-based Descriptor . . . . 91:1--91:21 Zhihan Lv and Liang Qiao and Qingjun Wang Cognitive Robotics on 5G Networks . . . 92:1--92:18 Xin Jin and Yuwei Duan and Ying Zhang and Yating Huang and Mengdong Li and Ming Mao and Amit Kumar Singh and Yujie Li Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security . . . . . . . . . . . 93:1--93:15 Rushi Lan and Jing Wang and Wenming Huang and Zhenrong Deng and Xiyan Sun and Zhuo Chen and Xiaonan Luo Chinese Emotional Dialogue Response Generation via Reinforcement Learning 94:1--94:17 Song Deng and Fulin Chen and Xia Dong and Guangwei Gao and Xindong Wu Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition . . . . . . . . . . . . . . 95:1--95:28 Buddhadeb Pradhan and Nirmal Baran Hui and Diptendu Sinha Roy and Gautam Srivastava and Jerry Chun-Wei Lin Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots . . . . . . . . . . . . . . . . . 96:1--96:15 Min Chen and Wenjing Xiao and Long Hu and Yujun Ma and Yin Zhang and Guangming Tao Cognitive Wearable Robotics for Autism Perception Enhancement . . . . . . . . . 97:1--97:16 Wenpeng Lu and Rui Yu and Shoujin Wang and Can Wang and Ping Jian and Heyan Huang Sentence Semantic Matching Based on $3$D CNN for Human-Robot Language Interaction 98:1--98:24 Zhihan Lv and Liang Qiao and Amit Kumar Singh and Qingjun Wang AI-empowered IoT Security for Smart Cities . . . . . . . . . . . . . . . . . 99:1--99:21 Ramesh Sekaran and Rizwan Patan and Fadi Al-Turjman A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET . . . . . . . . . . . . . . . . . 100:1--100:15 Huniya Shahid and Munam Ali Shah and Ahmad Almogren and Hasan Ali Khattak and Ikram Ud Din and Neeraj Kumar and Carsten Maple Machine Learning-based Mist Computing Enabled Internet of Battlefield Things 101:1--101:26 Li Kuang and Jianbo Zheng and Kemu Li and Honghao Gao Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities . . . . . . . 102:1--102:24 Rafael Salema Marques and Gregory Epiphaniou and Haider Al-Khateeb and Carsten Maple and Mohammad Hammoudeh and Paulo André Lima De Castro and Ali Dehghantanha and Kim Kwang Raymond Choo A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks . . . . . . . 103:1--103:30 Zhihan Lv and Liang Qiao and Sahil Verma and Kavita AI-enabled IoT-Edge Data Analytics for Connected Living . . . . . . . . . . . . 104:1--104:20 V. Gomathy and K. Janarthanan and Fadi Al-Turjman and R. Sitharthan and M. Rajesh and K. Vengatesan and T. Priya Reshma Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation . . . . . . . . . . . . . . 105:1--105:10 Wei Wang and Junyang Chen and Yushu Zhang and Zhiguo Gong and Neeraj Kumar and Wei Wei A Multi-graph Convolutional Network Framework for Tourist Flow Prediction 106:1--106:13
Gaurav Singal and Vijay Laxmi and Manoj Singh Gaur and D. Vijay Rao and Riti Kushwaha and Deepak Garg and Neeraj Kumar QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges . . . . . . . . 1:1--1:27 Iram Bibi and Adnan Akhunzada and Jahanzaib Malik and Muhammad Khurram Khan and Muhammad Dawood Secure Distributed Mobile Volunteer Computing with Android . . . . . . . . . 2:1--2:21 Chen Chen and Lei Liu and Shaohua Wan and Xiaozhe Hui and Qingqi Pei Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction 3:1--3:18 Weiwei Lin and Tiansheng Huang and Xin Li and Fang Shi and Xiumin Wang and Ching-Hsien Hsu Energy-Efficient Computation Offloading for UAV-Assisted MEC: a Two-Stage Optimization Scheme . . . . . . . . . . 4:1--4:23 Nan Jiang and Debin Huang and Jing Chen and Jie Wen and Heng Zhang and Honglong Chen Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV . . . . . . . . . . . . . . . . 5:1--5:23 Muhammad Junaid and Adnan Sohail and Fadi Al Turjman and Rashid Ali Agile Support Vector Machine for Energy-efficient Resource Allocation in IoT-oriented Cloud using PSO . . . . . . 6:1--6:35 Afiya Ayman and Amutheezan Sivagnanam and Michael Wilbur and Philip Pugliese and Abhishek Dubey and Aron Laszka Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles . . . . . . . 7:1--7:29 Laura Verde and Nadia Brancati and Giuseppe De Pietro and Maria Frucci and Giovanna Sannino A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments . . . . . . . . . . 8:1--8:16 Rahul Kumar and Ankur Gupta and Harkirat Singh Arora and Balasubramanian Raman IBRDM: an Intelligent Framework for Brain Tumor Classification Using Radiomics- and DWT-based Fusion of MRI Sequences . . . . . . . . . . . . . . . 9:1--9:30 Yanchen Qiao and Weizhe Zhang and Xiaojiang Du and Mohsen Guizani Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security . . . . . . . . . . . . . . 10:1--10:22 David Major and Danny Yuxing Huang and Marshini Chetty and Nick Feamster Alexa, Who Am I Speaking To?: Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa . . . . 11:1--11:22 Marwa Daaji and Ali Ouni and Mohamed Mohsen Gammoudi and Salah Bouktif and Mohamed Wiem Mkaouer Multi-criteria Web Services Selection: Balancing the Quality of Design and Quality of Service . . . . . . . . . . . 12:1--12:31 Sajib Mistry and Lie Qu and Athman Bouguettaya Layer-based Composite Reputation Bootstrapping . . . . . . . . . . . . . 13:1--13:28 Ghazale Amel Zendehdel and Ratinder Kaur and Inderpreet Chopra and Natalia Stakhanova and Erik Scheme Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices . . . . . . . . . . . 14:1--14:31 Ryan Dailey and Aniesh Chawla and Andrew Liu and Sripath Mishra and Ling Zhang and Josh Majors and Yung-Hsiang Lu and George K. Thiruvathukal Automated Discovery of Network Cameras in Heterogeneous Web Pages . . . . . . . 15:1--15:25 Menatalla Abououf and Shakti Singh and Hadi Otrok and Rabeb Mizouni and Ernesto Damiani Machine Learning in Mobile Crowd Sourcing: a Behavior-Based Recruitment Model . . . . . . . . . . . . . . . . . 16:1--16:28 Ovidiu Dan and Vaibhav Parikh and Brian D. Davison IP Geolocation through Reverse DNS . . . 17:1--17:29 Di Zhang and Feng Xu and Chi-Man Pun and Yang Yang and Rushi Lan and Liejun Wang and Yujie Li and Hao Gao Virtual Reality Aided High-Quality $3$D Reconstruction by Remote Drones . . . . 18:1--18:20 Zakaria Benomar and Francesco Longo and Giovanni Merlino and Antonio Puliafito Cloud-based Network Virtualization in IoT with OpenStack . . . . . . . . . . . 19:1--19:26 Jingjing Wang and Wenjun Jiang and Kenli Li and Guojun Wang and Keqin Li Incremental Group-Level Popularity Prediction in Online Social Networks . . 20:1--20:26 Alessio Pagani and Zhuangkun Wei and Ricardo Silva and Weisi Guo Neural Network Approximation of Graph Fourier Transform for Sparse Sampling of Networked Dynamics . . . . . . . . . . . 21:1--21:18 Zhenyu Fan and Wang Yang and Fan Wu and Jing Cao and Weisong Shi Serving at the Edge: an Edge Computing Service Architecture Based on ICN . . . 22:1--22:27 Mengmeng Ge and Jin-Hee Cho and Dongseong Kim and Gaurav Dixit and Ing-Ray Chen Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception . . . . . . 24:1--24:31 Florian Meier and Alexander Bazo and David Elsweiler Using Social Media Data to Analyse Issue Engagement During the 2017 German Federal Election . . . . . . . . . . . . 25:1--25:25 Cosmin Avasalcai and Christos Tsigkanos and Schahram Dustdar Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability 26:1--26:21 Onuralp Ulusoy and Pinar Yolum PANOLA: a Personal Assistant for Supporting Users in Preserving Privacy 27:1--27:32 Ashima Yadav and Dinesh Kumar Vishwakarma A Language-independent Network to Analyze the Impact of COVID-19 on the World via Sentiment Analysis . . . . . . 28:1--28:30
Yali Yuan and Chencheng Liang and Xu Chen and Thar Baker and Xiaoming Fu Adaptive Fuzzy Game-Based Energy-Efficient Localization in $3$D Underwater Sensor Networks . . . . . . . 29:1--29:20 Nikumani Choudhury and Rakesh Matam and Mithun Mukherjee and Jaime Lloret DADC: a Novel Duty-cycling Scheme for IEEE 802.15.4 Cluster-tree-based IoT Applications . . . . . . . . . . . . . . 30:1--30:26 Jianfeng Lu and Zhao Zhang and Jiangtao Wang and Ruixuan Li and Shaohua Wan A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing . . . . . . . . . . 31:1--31:29 Bruno Carpentieri and Arcangelo Castiglione and Alfredo De Santis and Francesco Palmieri and Raffaele Pizzolante Privacy-preserving Secure Media Streaming for Multi-user Smart Environments . . . . . . . . . . . . . . 32:1--32:21 Hongyang Yan and Nan Jiang and Kang Li and Yilei Wang and Guoyu Yang Collusion-free for Cloud Verification toward the View of Game Theory . . . . . 33:1--33:21 Wei Liang and Songyou Xie and Dafang Zhang and Xiong Li and Kuan-ching Li A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning . . . . . . . . . . . . . . . . 34:1--34:20 Mohammad Shorfuzzaman and M. Shamim Hossain Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development . . . . . . . . 35:1--35:26 Gunasekaran Manogaran and Bharat S. Rawal and Houbing Song and Huihui Wang and Chinghsien Hsu and Vijayalakshmi Saravanan and Seifedine Nimer Kadry and P. Mohamed Shakeel Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning . . . . . . . . . . . . . . . . 36:1--36:19 Kamran Ahmad Awan and Ikram Ud Din and Abeer Almogren and Neeraj Kumar and Ahmad Almogren A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things . . . . . . . . . . . . . . . 37:1--37:28 Zhihan Lv and Ranran Lou and Amit Kumar Singh and Qingjun Wang Transfer Learning-powered Resource Optimization for Green Computing in 5G-Aided Industrial Internet of Things 38:1--38:16 Gunasekaran Manogaran and Hassan Qudrat-Ullah and Qin Xin and Latifur Khan Guest Editorial Introduction for the Special Section on Deep Learning Algorithms and Systems for Enhancing Security in Cloud Services . . . . . . . 39e:1--39e:5 Lea Duji\'c Rodi\'c and Tomislav Zupanovi\'c and Toni Perkovi\'c and Petar Soli\'c and Joel J. P. C. Rodrigues Machine Learning and Soil Humidity Sensing: Signal Strength Approach . . . 39:1--39:21 Farhan Ullah and Muhammad Rashid Naeem and Abdullah S. Bajahzar and Fadi Al-Turjman IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification . . . . . . . . 40:1--40:17 Bharat S. Rawal and Poongodi M. and Gunasekaran Manogaran and Mounir Hamdi Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform . . . . . . 41:1--41:20 Syed Atif Moqurrab and Adeel Anjum and Abid Khan and Mansoor Ahmed and Awais Ahmad and Gwanggil Jeon Deep-Confidentiality: an IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data . . . . 42:1--42:21 Derui Wang and Sheng Wen and Alireza Jolfaei and Mohammad Sayad Haghighi and Surya Nepal and Yang Xiang On the Neural Backdoor of Federated Generative Models in Edge Computing . . 43:1--43:21 Huijie Yang and Jian Shen and Tianqi Zhou and Sai Ji and Pandi Vijayakumar A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs . . . . . . . . . . 44:1--44:19 Xindi Ma and Jianfeng Ma and Saru Kumari and Fushan Wei and Mohammad Shojafar and Mamoun Alazab Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing . . . . . . . 45:1--45:24 Christos L. Stergiou and Konstantinos E. Psannis and Brij B. Gupta InFeMo: Flexible Big Data Management Through a Federated Cloud System . . . . 46:1--46:22 Yasser D. Al-Otaibi A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications . . . . . 47:1--47:17 Tu N. Nguyen and Sherali Zeadally Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions 48:1--48:15 Xiao Zheng and Mingchu Li and Syed Bilal Hussain Shah and Dinh-Thuan Do and Yuanfang Chen and Constandinos X. Mavromoustakis and George Mastorakis and Evangelos Pallis Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing . . . 49:1--49:15 Xiongtao Zhang and Xiaomin Zhu and Ji Wang and Weidong Bao and Laurence T. Yang DANCE: Distributed Generative Adversarial Networks with Communication Compression . . . . . . . . . . . . . . 50:1--50:32 Rui Zhang and Libing Wu and Shuqin Cao and Xinrong Hu and Shan Xue and Dan Wu and Qingan Li Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV . . . . . . . . . . . . 51:1--51:24 Tingmin Wu and Wanlun Ma and Sheng Wen and Xin Xia and Cecile Paris and Surya Nepal and Yang Xiang Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity . . . . . . . 52:1--52:27 Igor Ivki\'c and Patrizia Sailer and Antonios Gouglidis and Andreas Mauthe and Markus Tauber A Security Cost Modelling Framework for Cyber-Physical Systems . . . . . . . . . 53:1--53:31 Heesuk Son and Dongman Lee An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments . . . . . . 54:1--54:25
M. Shamim Hossain and Changsheng Xu and Josu Bilbao and Md. Abdur Rahman and Abdulmotaleb El Saddik and Mohamed Bin Zayed Special Section on Edge-AI for Connected Living . . . . . . . . . . . . . . . . . 55:1--55:?? Prayag Tiwari and Amit Kumar Jaiswal and Sahil Garg and Ilsun You SANTM: Efficient Self-attention-driven Network for Text Matching . . . . . . . 55:1--55:?? Songwen Pei and Yusheng Wu and Jin Guo and Meikang Qiu Neural Network Pruning by Recurrent Weights for Finance Market . . . . . . . 56:1--56:?? Mohammad Saidur Rahman and Ibrahim Khalil and Xun Yi and Mohammed Atiquzzaman and Elisa Bertino A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living . . . . . . . . . . . . 57:1--57:?? Chaonan Shen and Kai Zhang and Jinshan Tang A COVID-19 Detection Algorithm Using Deep Features and Discrete Social Learning Particle Swarm Optimization for Edge Computing Devices . . . . . . . . . 58:1--58:?? Yi Liu and Ruihui Zhao and Jiawen Kang and Abdulsalam Yassine and Dusit Niyato and Jialiang Peng Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things . . . 59:1--59:?? Guihong Chen and Xi Liu and Mohammad Shorfuzzaman and Ali Karime and Yonghua Wang and Yuanhang Qi MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs . . . . 60:1--60:?? K. Shankar and Eswaran Perumal and Mohamed Elhoseny and Fatma Taher and B. B. Gupta and Ahmed A. Abd El-Latif Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities . . . . . . . . 61:1--61:?? Min Chen and Ke Shen and Rui Wang and Yiming Miao and Yingying Jiang and Kai Hwang and Yixue Hao and Guangming Tao and Long Hu and Zhongchun Liu Negative Information Measurement at AI Edge: a New Perspective for Mental Health Monitoring . . . . . . . . . . . 62:1--62:?? Kaijian Xia and Wenbing Zhao and Alireza Jolfaei and Tamer Ozsu Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence . . . . . . . . . . 63:1--63:?? Zhihan Lv and Ranran Lou and Haibin Lv Edge Computing to Solve Security Issues for Infectious Disease Intelligence Prevention . . . . . . . . . . . . . . . 63:1--63:?? Yizhang Jiang and Xiaoqing Gu and Lei Hua and Kang Li and Yuwen Tao and Bo Li Forecasting Trend of Coronavirus Disease 2019 using Multi-Task Weighted TSK Fuzzy System . . . . . . . . . . . . . . . . . 64:1--64:?? Tongguang Ni and Jiaqun Zhu and Jia Qu and Jing Xue Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis . . . . . . . . . . . . . . . 65:1--65:?? Changda Wang and Xiaowei Li and Elisa Bertino Network Temperature: a Novel Statistical Index for Networks Measurement and Management . . . . . . . . . . . . . . . 66:1--66:?? Haipeng Chen and Andrew Duncklee and Sushil Jajodia and Rui Liu and Sean Mcnamara and V. S. Subrahmanian PCAM: a Data-driven Probabilistic Cyber-alert Management Framework . . . . 67:1--67:?? Bo Gu and Mamoun Alazab and Ziqi Lin and Xu Zhang and Jun Huang AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks . . . . . . . . . . 68:1--68:?? Lanyu Xu and Arun Iyengar and Weisong Shi NLUBroker: a QoE-driven Broker System for Natural Language Understanding Services . . . . . . . . . . . . . . . . 69:1--69:?? Trinh Viet Doan and Roland van Rijswijk-Deij and Oliver Hohlfeld and Vaibhav Bajpai An Empirical View on Consolidation of the Web . . . . . . . . . . . . . . . . 70:1--70:?? Md Arafat Hossain and Jun Han and Jean-Guy Schneider and Jiaojiao Jiang and Muhammad Ashad Kabir and Steve Versteeg Extracting Formats of Service Messages with Varying Payloads . . . . . . . . . 71:1--71:?? Genoveva Vargas-Solar and Maysaa Khalil and Javier A. Espinosa-Oviedo and José-Luis Zechinelli-Martini GREENHOME: a Household Energy Consumption and CO$_2$ Footprint Metering Environment . . . . . . . . . . 72:1--72:?? Niki Pavlopoulou and Edward Curry PoSSUM: an Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things . . 73:1--73:?? Jacopo Soldani and Marco Cameriero and Giulio Paparelli and Antonio Brogi Modelling and Analysing Replica- and Fault-aware Management of Horizontally Scalable Applications . . . . . . . . . 74:1--74:?? Minxian Xu and Chenghao Song and Huaming Wu and Sukhpal Singh Gill and Kejiang Ye and Chengzhong Xu esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments . . . . . . 75:1--75:?? Roberto Yus and Georgios Bouloukakis and Sharad Mehrotra and Nalini Venkatasubramanian The SemIoTic Ecosystem: a Semantic Bridge between IoT Devices and Smart Spaces . . . . . . . . . . . . . . . . . 76:1--76:?? Enrico Tedeschi and Tor-Arne S. Nordmo and Dag Johansen and Håvard D. Johansen On Optimizing Transaction Fees in Bitcoin using AI: Investigation on Miners Inclusion Pattern . . . . . . . . 77:1--77:?? Ilir Murturi and Schahram Dustdar DECENT: a Decentralized Configurator for Controlling Elasticity in Dynamic Edge Networks . . . . . . . . . . . . . . . . 78:1--78:?? Tu Le and Danny Yuxing Huang and Noah Apthorpe and Yuan Tian SkillBot: Identifying Risky Content for Children in Alexa Skills . . . . . . . . 79:1--79:?? Hyungjune Shin and Dongyoung Koo and Junbeom Hur Secure and Efficient Hybrid Data Deduplication in Edge Computing . . . . 80:1--80:??
Ching-Hsien Hsu and Amir H. Alavi and Mianxiong Dong Introduction to the Special Section on Cyber Security in Internet of Vehicles 81:1--81:?? Haibo Yi and Ruinan Chi and Xin Huang and Xuejun Cai and Zhe Nie Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions . . . 82:1--82:?? Song Xiao and Kai Chen and Xiaoxiang Ren and Haitao Yuan Pedestrian Trajectory Prediction in Heterogeneous Traffic using Facial Keypoints-based Convolutional Encoder-decoder Network . . . . . . . . 83:1--83:?? Chandrasekar Ravi and Anmol Tigga and G. Thippa Reddy and Saqib Hakak and Mamoun Alazab Driver Identification Using Optimized Deep Learning Model in Smart Transportation . . . . . . . . . . . . . 84:1--84:?? Yangfan Liang and Yining Liu and Brij B. Gupta PPRP: Preserving-Privacy Route Planning Scheme in VANETs . . . . . . . . . . . . 85:1--85:?? Mohamad Ali Mehrabi and Alireza Jolfaei Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles . . . . . . . . . 86:1--86:?? Xiaojie Wang and Laisen Nie and Zhaolong Ning and Lei Guo and Guoyin Wang and Xinbo Gao and Neeraj Kumar Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles . . . . . . . . 87:1--87:?? Hui Tian and Fang Peng and Hanyu Quan and Chin-Chen Chang Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data . . 88:1--88:?? Ramesh Sekaran and Fadi Al-Turjman and Rizwan Patan and Velmani Ramasamy Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN) . . . . . . . . . . . . . . . . . 89:1--89:?? Gunasekaran Manogaran and Bharat S. Rawal and Vijayalakshmi Saravanan and Priyan M. K. and Qin Xin and P. Shakeel Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication . . . . . . . . . 90:1--90:?? Ao Zhou and Xiao Ma and Siyi Gao and Shangguang Wang Providing Reliable Service for Parked-vehicle-assisted Mobile Edge Computing . . . . . . . . . . . . . . . 91:1--91:?? Si Young Jang and Sung Kyu Park and Jin Hee Cho and Dongman Lee CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks . . . . . . . . 92:1--92:?? Mathias Fischer and Winfried Lamersdorf and Jörg Liebeherr and Max Mühlhäuser Introduction to the Special Section on Recent Advances in Networks and Distributed Systems . . . . . . . . . . 93:1--93:?? Kurian Polachan and Chandramani Singh and T. V. Prabhakar Decentralized Dynamic Scheduling of TCPS Flows and a Simulator for Time-sensitive Networking . . . . . . . . . . . . . . . 94:1--94:?? Yevhenii Shudrenko and Daniel Plöger and Koojana Kuladinithi and Andreas Timm-Giel A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks . . . . 95:1--95:?? Thiago Pereira Da Silva and Thais Batista and Frederico Lopes and Aluizio Rocha Neto and Flávia C. Delicato and Paulo F. Pires and Atslands R. Da Rocha Fog Computing Platforms for Smart City Applications: a Survey . . . . . . . . . 96:1--96:?? Christoph Döpmann and Felix Fiedler and Sergio Lucia and Florian Tschorsch Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges . . . . . . 97:1--97:?? Chao Wu and Shingo Horiuchi and Kenji Murase and Hiroaki Kikushima and Kenichi Tayama An Intent-driven DaaS Management Framework to Enhance User Quality of Experience . . . . . . . . . . . . . . . 98:1--98:?? Andrei Ciortea and Xiaomin Zhu and Calton Pu and Munindar P. Singh Introduction to the Special Issue on Multiagent Systems and Services in the Internet of Things . . . . . . . . . . . 99:1--99:?? Pierre Rust and Gauthier Picard and Fano Ramparany Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments . . . . . . . . . 100:1--100:?? Alessandro Ricci and Angelo Croatti and Stefano Mariani and Sara Montagna and Marco Picone Web of Digital Twins . . . . . . . . . . 101:1--101:?? Haoyu Ren and Darko Anicic and Thomas A. Runkler Towards Semantic Management of On-Device Applications in Industrial IoT . . . . . 102:1--102:?? Lina Barakat and Phillip Taylor and Nathan Griffiths and Simon Miles A Reputation-based Framework for Honest Provenance Reporting . . . . . . . . . . 103:1--103:?? Timotheus Kampik and Adnane Mansour and Olivier Boissier and Sabrina Kirrane and Julian Padget and Terry R. Payne and Munindar P. Singh and Valentina Tamma and Antoine Zimmermann Governance of Autonomous Agents on the Web: Challenges and Opportunities . . . 104:1--104:?? Vicente GarcÍa-DÍaz and Jerry Chun-Wei Lin and Juan Antonio Morente Molinera Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities . . . . . . . . 105:1--105:?? Suresh Chavhan and Deepak Gupta and Sarada Prasad Gochhayat and Chandana B. N. and Ashish Khanna and K. Shankar and Joel J. P. C. Rodrigues Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities 106:1--106:?? Zhuoqun Xia and Lingxuan Zeng and Ke Gu and Xiong Li and Weijia Jia Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs . . . . . 107:1--107:?? Michell Boerger and Philipp Lämmel and Nikolay Tcholtchev and Manfred Hauswirth Enabling Short-Term Energy Flexibility Markets Through Blockchain . . . . . . . 108:1--108:?? Long Chen and Mianyang Yao and Yalan Wu and Jigang Wu EECDN: Energy-efficient Cooperative DNN Edge Inference in Wireless Sensor Networks . . . . . . . . . . . . . . . . 109:1--109:?? Sandeep Kumar Sood and Keshav Singh Rawat and Dheeraj Kumar Emerging Trends of ICT in Airborne Disease Prevention . . . . . . . . . . . 110:1--110:??
Pankaj Mishra and Ahmed Moustafa and Takayuki Ito Real-time Pricing-based Resource Allocation in Open Market Environments 1:1--1:?? Jianwei Hao and Piyush Subedi and Lakshmish Ramaswamy and In Kee Kim Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy . . . . . 2:1--2:?? Rongjunchen Zhang and Tingmin Wu and Sheng Wen and Surya Nepal and Cecile Paris and Yang Xiang SAM: Multi-turn Response Selection Based on Semantic Awareness Matching . . . . . 3:1--3:?? Sharon Hirsch and Slava Novgorodov and Ido Guy and Alexander Nus The Tip of the Buyer: Extracting Product Tips from Reviews . . . . . . . . . . . 4:1--4:?? Carlos Hernández-Castro and David F. Barrero and Maria Dolores R-Moreno Breaking CaptchaStar Using the BASECASS Methodology . . . . . . . . . . . . . . 5:1--5:?? Luigi Asprino and Enrico Daga and Aldo Gangemi and Paul Mulholland Knowledge Graph Construction with a Façade: a Unified Method to Access Heterogeneous Data Sources on the Web 6:1--6:?? Weiwei Fang and Wenyuan Xu and Chongchong Yu and Neal. N. Xiong Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters . . . . . . . . 7:1--7:?? Iulia Paun and Yashar Moshfeghi and Nikos Ntarmos White Box: On the Prediction of Collaborative Filtering Recommendation Systems' Performance . . . . . . . . . . 8:1--8:?? Yuanjun Dai and An Wang and Yang Guo and Songqing Chen Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks . . . . . . . . . . . . . . 9:1--9:?? Feijie Wu and Ho Yin Yuen and Henry Chan and Victor C. M. Leung and Wei Cai Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies . . . . . . . . . . . . . . 10:1--10:?? Massimo La Morgia and Alessandro Mei and Francesco Sassi and Julinda Stefa The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations . . . . . . 11:1--11:?? Man Zeng and Dandan Li and Pei Zhang and Kun Xie and Xiaohong Huang Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee . . . . . . . . . . . . . . . 12:1--12:?? Gonul Ayci and Murat Sensoy and Arzucan Özgür and Pinar Yolum Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions 13:1--13:?? Andrea De Salve and Luca Franceschi and Andrea Lisi and Paolo Mori and Laura Ricci L2DART: a Trust Management System Integrating Blockchain and Off-Chain Computation . . . . . . . . . . . . . . 14:1--14:?? Wenzhao Zhang and Yuxuan Zhang and Hongchang Fan and Yi Gao and Wei Dong A Low-code Development Framework for Cloud-native Edge Systems . . . . . . . 15:1--15:?? Gregorius Satia Budhi and Raymond Chiong A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction . . . . 16:1--16:?? Chong Zhang and Qiang Guo and Luoyi Fu and Jiaxin Ding and Xinde Cao and Fei Long and Xinbing Wang and Chenghu Zhou Finding the Source in Networks: an Approach Based on Structural Entropy . . 17:1--17:?? Habib Mostafaei and Shafi Afridi SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics . . . . . . . . . . . . . . . 18:1--18:?? Martino Trevisan and Francesca Soro and Marco Mellia and Idilio Drago and Ricardo Morla Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy? . . . 19:1--19:?? Sidharth Sharma and Aniruddha Kushwaha and Mohammad Alizadeh and George Varghese and Ashwin Gumaste Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency . . . . . . . . . . . . . . . . 20:1--20:?? Bolin Zhang and Zhiying Tu and Shaoshi Hang and Dianhui Chu and Xiaofei Xu Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot 21:1--21:?? Romain Fouquet and Pierre Laperdrix and Romain Rouvoy Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript . . . . . 22:1--22:?? Yu-Jhen Wang and Anthony J. T. Lee Movie Account Recommendation on Instagram . . . . . . . . . . . . . . . 23:1--23:??
Quan Z. Sheng and Arun Kumar Sangaiah and Ankit Chaudhary Guest Editors' Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services 24:1--24:?? Mu-Yen Chen and Yi-Wei Lai and Jiunn-Woei Lian Using Deep Learning Models to Detect Fake News about COVID-19 . . . . . . . . 25:1--25:?? Yucheng Dong and Qin Ran and Xiangrui Chao and Congcong Li and Shui Yu Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process . . . . . . 26:1--26:?? Yazhou Zhang and Dan Ma and Prayag Tiwari and Chen Zhang and Mehedi Masud and Mohammad Shorfuzzaman and Dawei Song Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks . . . . . . . . . . . . . . . . 27:1--27:?? Yi-Bing Lin and Yuan-Fu Liao and Sin-Horng Chen and Shaw-Hwa Hwang and Yih-Ru Wang VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English . . . . . . . . . . . . . . . . 28:1--28:?? Pedro Victor Borges and Chantal Taconet and Sophie Chabridon and Denis Conan and Everton Cavalcante and Thais Batista Taming Internet of Things Application Development with the IoTvar Middleware 29:1--29:?? Hucheng Wang and Zhi Wang and Lei Zhang and Xiaonan Luo and Xinheng Wang A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment . . . . . . . . . . . 30:1--30:?? Arvind Kumar Gangwar and Sandeep Kumar Concept Drift in Software Defect Prediction: a Method for Detecting and Handling the Drift . . . . . . . . . . . 31:1--31:?? Jing Chen and Wenjun Jiang and Jie Wu and Kenli Li and Keqin Li Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts . . . . . . . . . . . . . . . . 32:1--32:?? Luca Muscariello and Michele Papalini and Olivier Roques and Mauro Sardara and Arthur Tran Van Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking . . . . . 33:1--33:?? Yibin Xu and Jianhua Shao and Tijs Slaats and Boris Düdder MWPoW+: a Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding . . . . . . . . . . . . . . . . 34:1--34:?? Li Yang and Xi Li and Zhuoru Ma and Lu Li and Neal Xiong and Jianfeng Ma IRGA: an Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios . . . . 35:1--35:??
Shancang Li and Surya Nepal and Theo Tryfonas and Hongwei Li Blockchain-based Zero Trust Cybersecurity in the Internet of Things 36:1--36:?? Ying Li and Yaxin Yu and Xingwei Wang Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy . . . . . . . . . . 37:1--37:?? Keke Gai and Yufeng She and Liehuang Zhu and Kim-Kwang Raymond Choo and Zhiguo Wan A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing . . . . . . . . . . . . . . . . 38:1--38:?? Mohammad Wazid and Prosanta Gope BACKM-EHA: a Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications . . . . . . . 39:1--39:?? Fuchen Ma and Meng Ren and Fu Ying and Wanting Sun and Houbing Song and Heyuan Shi and Yu Jiang and Huizhong Li V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability 40:1--40:?? Zhenyu Li and Yong Ding and Honghao Gao and Bo Qu and Yujue Wang and Jun Li A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network . . . . 41:1--41:?? Jin Wang and Jiahao Chen and Neal Xiong and Osama Alfarraj and Amr Tolba and Yongjun Ren S-BDS: an Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT 42:1--42:?? Amjad Alsirhani and Muhammad Ali Khan and Abdullah Alomari and Sauda Maryam and Aiman Younas and Muddesar Iqbal and Muhammad Hameed Siqqidi and Amjad Ali Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack . . . . . . . . . . . . . . . . . 43:1--43:?? Fan Wang and Guangshun Li and Yilei Wang and Wajid Rafique and Mohammad R. Khosravi and Guanfeng Liu and Yuwen Liu and Lianyong Qi Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City . . . . . . . . 44:1--44:?? Luca Gioacchini and Luca Vassio and Marco Mellia and Idilio Drago and Zied Ben Houidi and Dario Rossi i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis . . . . . . . . 45:1--45:?? Mohammed Bahutair and Athman Bouguettaya An End-to-end Trust Management Framework for Crowdsourced IoT Services . . . . . 46:1--46:?? Keke Chen and Yuechun Gu and Sagar Sharma DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds . . . . . . . . . . . . . . . . . 47:1--47:?? Hossein Chegini and Fernando Beltran and Aniket Mahanti Designing and Developing a Weed Detection Model for California Thistle 48:1--48:??
Gautam Srivastava and Jerry Chun-Wei Lin and Calton Pu and Yudong Zhang Special Section on ``Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions'' . . . . . . . . . . . . . . 49:1--49:?? Xiuwen Fu and Pasquale Pace and Gianluca Aloi and Antonio Guerrieri and Wenfeng Li and Giancarlo Fortino Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures . . . . . . . . . . . . . . . . 50:1--50:?? Yirui Wu and Hao Cao and Guoqiang Yang and Tong Lu and Shaohua Wan Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems . . . . . . 51:1--51:?? Lizhen Deng and Guoxia Xu and Jiaqi Pi and Hu Zhu and Xiaokang Zhou Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution . . . . . . . . . . 52:1--52:?? Jan Pennekamp and Markus Dahlmanns and Frederik Fuhrmann and Timo Heutmann and Alexander Kreppein and Dennis Grunert and Christoph Lange and Robert H. Schmitt and Klaus Wehrle Offering Two-way Privacy for Evolved Purchase Inquiries . . . . . . . . . . . 53:1--53:?? Usman Ahmed and Jerry Chun-Wei Lin and Gautam Srivastava Exploring the Potential of Cyber Manufacturing System in the Digital Age 54:1--54:?? Pei-Cheng Song and Jeng-Shyang Pan and Han-Chieh Chao and Shu-Chuan Chu Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City . . . . . . . . . . . . . . . 55:1--55:?? Wenzhao Zhang and Yi Gao and Wei Dong Providing Realtime Support for Containerized Edge Services . . . . . . 56:1--56:?? Loredana Caruccio and Gaetano Cimino and Stefano Cirillo and Domenico Desiato and Giuseppe Polese and Genoveffa Tortora Malicious Account Identification in Social Network Platforms . . . . . . . . 57:1--57:?? Fanyi Yang and Huifang Ma and Cairui Yan and Zhixin Li and Liang Chang Polarized Communities Search via Co-guided Random Walk in Attributed Signed Networks . . . . . . . . . . . . 58:1--58:?? Wenhua Xiao and Xudong Fang and Bixin Liu and Ji Wang and Xiaomin Zhu UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud . . . . . . . . . . . . . . . . . 59:1--59:??
Zhiyi Song and Dipankar Chaki and Abdallah Lakhdari and Athman Bouguettaya Positional Encoding-based Resident Identification in Multi-resident Smart Homes . . . . . . . . . . . . . . . . . 1:1--1:?? Bofeng Pan and Natalia Stakhanova and Zhongwen Zhu EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum . . . . . . . . . . . . . . . . 2:1--2:?? Chao Dong and Fang Wang and Dan Feng DxHash: a Memory-saving Consistent Hashing Algorithm . . . . . . . . . . . 3:1--3:?? Jiashu Wu and Hao Dai and Kenneth B. Kent and Jerome Yen and Chengzhong Xu and Yang Wang Open Set Dandelion Network for IoT Intrusion Detection . . . . . . . . . . 4:1--4:?? Xuezheng Yang and Zhiwen Zeng and Anfeng Liu and Neal N. Xiong and Shaobo Zhang ADTO: a Trust Active Detecting-based Task Offloading Scheme in Edge Computing for Internet of Things . . . . . . . . . 5:1--5:?? Yi-Cheng Chen and Wang-Chien Lee A Novel Cross-Domain Recommendation with Evolution Learning . . . . . . . . . . . 6:1--6:?? Anuj Sachan and Neetesh Kumar SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion . . . . . . . . . . . . . . . 7:1--7:??
Wen Li and Lingfeng Bao and Jiachi Chen and John Grundy and Xin Xia and Xiaohu Yang Market Manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data . . . . . . . . . . . . 8:1--8:?? Fabien Charmet and Tomohiro Morikawa and Akira Tanaka and Takeshi Takahashi VORTEX: Visual phishing detectiOns aRe Through EXplanations . . . . . . . . . . 9:1--9:?? Yanming Chen and Tong Luo and Weiwei Fang and Neal. N. Xiong EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters . . . . . . . . . . . . 10:1--10:?? Zichen Wang and Xiangshan Gao and Cong Wang and Peng Cheng and Jiming Chen Efficient Vertical Federated Unlearning via Fast Retraining . . . . . . . . . . 11:1--11:??
Mohan Baruwal Chhetri and Shahroz Tariq and Ronal Singh and Fatemeh Jalalvand and Cecile Paris and Surya Nepal Towards Human-AI Teaming to Mitigate Alert Fatigue in Security Operations Centres . . . . . . . . . . . . . . . . 12:1--12:?? Ali Akbar Vali and Sadoon Azizi and Mohammad Shojafar RESP: a Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing . . . . . . . . . . . . . . . 13:1--13:?? Sepehr Saryazdi and Balsam Alkouz and Athman Bouguettaya and Abdallah Lakhdari Using Reinforcement Learning and Error Models for Drone Precise Landing . . . . 14:1--14:?? Aswani Aguru and Suresh Erukala OTI-IoT: a Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks . . . . . . . 15:1--15:??