Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.76",
%%%     date            = "24 August 2024",
%%%     time            = "06:48:29 MDT",
%%%     filename        = "toit.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "42763 28098 142873 1365616",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; ACM Transactions on
%%%                        Internet Technology",
%%%     license         = "public domain",
%%%     supported       = "no",
%%%     docstring       = "This is a COMPLETE BibTeX bibliography for
%%%                        the journal ACM Transactions on Internet
%%%                        Technology (CODEN none, ISSN 1046-8188), for
%%%                        2001--date.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        August 2001.  The journal appears quarterly,
%%%                        in February, May, August, and November.
%%%
%%%                        The journal has a World-Wide Web site at:
%%%
%%%                            http://www.acm.org/pubs/toit
%%%
%%%                        Tables-of-contents of all issues are
%%%                        available at:
%%%
%%%                            http://www.acm.org/pubs/contents/journals/toit/
%%%                            http://portal.acm.org/browse_dl.cfm?idx=J780
%%%                            https://dl.acm.org/loi/toit
%%%
%%%                        Qualified subscribers can retrieve the full
%%%                        text of recent articles in PDF form.
%%%
%%%                        At version 1.76, the COMPLETE journal
%%%                        coverage looked like this:
%%%
%%%                             2001 (   7)    2009 (  16)    2017 (  66)
%%%                             2002 (  12)    2010 (  12)    2018 (  31)
%%%                             2003 (  14)    2011 (  12)    2019 (  54)
%%%                             2004 (  17)    2012 (  15)    2020 (  42)
%%%                             2005 (  21)    2013 (  14)    2021 ( 105)
%%%                             2006 (  19)    2014 (  35)    2022 ( 112)
%%%                             2007 (  28)    2015 (  16)    2023 (  59)
%%%                             2008 (  16)    2016 (  29)    2024 (  15)
%%%
%%%                             Article:        767
%%%
%%%                             Total entries:  767
%%%
%%%                        The initial draft of this bibliography was
%%%                        derived from data at the ACM Web site.
%%%
%%%                        ACM copyrights explicitly permit abstracting
%%%                        with credit, so article abstracts, keywords,
%%%                        and subject classifications have been
%%%                        included in this bibliography wherever
%%%                        available.
%%%
%%%                        The bibsource keys in the bibliography
%%%                        entries below indicate the data sources.
%%%
%%%                        URL keys in the bibliography point to
%%%                        World Wide Web locations of additional
%%%                        information about the entry.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the
%%%                        companion file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume.''
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\input bibnames.sty"
  # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-TOIT                  = "ACM Transactions on Internet Technology
                                  (TOIT)"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-ACM                 = "ACM Press"}

@String{pub-ACM:adr             = "New York, NY 10036, USA"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Arasu:2001:SW,
  author =       "Arvind Arasu and Junghoo Cho and Hector Garcia-Molina
                 and Andreas Paepcke and Sriram Raghavan",
  title =        "Searching the {Web}",
  journal =      j-TOIT,
  volume =       "1",
  number =       "1",
  pages =        "2--43",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Arlitt:2001:CSL,
  author =       "Martin Arlitt and Diwakar Krishnamurthy and Jerry
                 Rolia",
  title =        "Characterizing the scalability of a large web-based
                 shopping system",
  journal =      j-TOIT,
  volume =       "1",
  number =       "1",
  pages =        "44--69",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Blumenthal:2001:RDI,
  author =       "Marjory S. Blumenthal and David D. Clark",
  title =        "Rethinking the design of the {Internet}: the
                 end-to-end arguments vs. the brave new world",
  journal =      j-TOIT,
  volume =       "1",
  number =       "1",
  pages =        "70--109",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yoshikawa:2001:XPB,
  author =       "Masatoshi Yoshikawa and Toshiyuki Amagasa and Takeyuki
                 Shimura and Shunsuke Uemura",
  title =        "{XRel}: a path-based approach to storage and retrieval
                 of {XML} documents using relational databases",
  journal =      j-TOIT,
  volume =       "1",
  number =       "1",
  pages =        "110--141",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kristol:2001:HCS,
  author =       "David M. Kristol",
  title =        "{HTTP Cookies}: {Standards}, privacy, and politics",
  journal =      j-TOIT,
  volume =       "1",
  number =       "2",
  pages =        "151--198",
  month =        nov,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Waldman:2001:ARP,
  author =       "Marc Waldman and Aviel D. Rubin and Lorrie Faith
                 Cranor",
  title =        "The architecture of robust publishing systems",
  journal =      j-TOIT,
  volume =       "1",
  number =       "2",
  pages =        "199--230",
  month =        nov,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Wolf:2001:BLC,
  author =       "Joel L. Wolf and Philip S. Yu",
  title =        "On balancing the load in a clustered web farm",
  journal =      j-TOIT,
  volume =       "1",
  number =       "2",
  pages =        "231--261",
  month =        nov,
  year =         "2001",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:08 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Guo:2002:OSS,
  author =       "Xin Guo",
  title =        "An optimal strategy for sellers in an online auction",
  journal =      j-TOIT,
  volume =       "2",
  number =       "1",
  pages =        "1--13",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:09 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Huck:2002:SCS,
  author =       "Paul Huck and Michael Butler and Amar Gupta and
                 Michael Feng",
  title =        "A self-configuring and self-administering name system
                 with dynamic address assignment",
  journal =      j-TOIT,
  volume =       "2",
  number =       "1",
  pages =        "14--46",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:09 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Williamson:2002:FEW,
  author =       "Carey Williamson",
  title =        "On filter effects in web caching hierarchies",
  journal =      j-TOIT,
  volume =       "2",
  number =       "1",
  pages =        "47--77",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Jan 30 14:43:09 MST 2002",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Brabrand:2002:BP,
  author =       "Claus Brabrand and Anders M{\o}ller and Michael I.
                 Schwartzbach",
  title =        "The {$<$ bigwig$>$} project",
  journal =      j-TOIT,
  volume =       "2",
  number =       "2",
  pages =        "79--114",
  month =        may,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:54 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Fielding:2002:PDM,
  author =       "Roy T. Fielding and Richard N. Taylor",
  title =        "Principled design of the modern {Web} architecture",
  journal =      j-TOIT,
  volume =       "2",
  number =       "2",
  pages =        "115--150",
  month =        may,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:54 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Nentwich:2002:XCC,
  author =       "Christian Nentwich and Licia Capra and Wolfgang
                 Emmerich and Anthony Finkelstein",
  title =        "{\tt xlinkit}: a consistency checking and smart link
                 generation service",
  journal =      j-TOIT,
  volume =       "2",
  number =       "2",
  pages =        "151--185",
  month =        may,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:54 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Besen:2002:ECE,
  author =       "Stanley M. Besen and Jeffrey S. Spigel and Padmanabhan
                 Srinagesh",
  title =        "Evaluating the competitive effects of mergers of
                 {Internet} backbone providers",
  journal =      j-TOIT,
  volume =       "2",
  number =       "3",
  pages =        "187--204",
  month =        aug,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:55 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dill:2002:SSW,
  author =       "Stephen Dill and Ravi Kumar and Kevin S. Mccurley and
                 Sridhar Rajagopalan and D. Sivakumar and Andrew
                 Tomkins",
  title =        "Self-similarity in the web",
  journal =      j-TOIT,
  volume =       "2",
  number =       "3",
  pages =        "205--223",
  month =        aug,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:55 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yin:2002:EWC,
  author =       "Jian Yin and Lorenzo Alvisi and Mike Dahlin and Arun
                 Iyengar",
  title =        "Engineering web cache consistency",
  journal =      j-TOIT,
  volume =       "2",
  number =       "3",
  pages =        "224--259",
  month =        aug,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:55 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gordon:2002:LBD,
  author =       "Michael Gordon and Robert K. Lindsay and Weiguo Fan",
  title =        "Literature-based discovery on the {World Wide Web}",
  journal =      j-TOIT,
  volume =       "2",
  number =       "4",
  pages =        "261--275",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:55 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hochheiser:2002:PPP,
  author =       "Harry Hochheiser",
  title =        "The platform for privacy preference as a social
                 protocol: an examination within the {U.S.} policy
                 context",
  journal =      j-TOIT,
  volume =       "2",
  number =       "4",
  pages =        "276--306",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:55 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ji:2002:ABM,
  author =       "Minwen Ji",
  title =        "Affinity-based management of main memory database
                 clusters",
  journal =      j-TOIT,
  volume =       "2",
  number =       "4",
  pages =        "307--339",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:55 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Eirinaki:2003:WMW,
  author =       "Magdalini Eirinaki and Michalis Vazirgiannis",
  title =        "{Web} mining for web personalization",
  journal =      j-TOIT,
  volume =       "3",
  number =       "1",
  pages =        "1--27",
  month =        feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:56 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Claessens:2003:HCM,
  author =       "Joris Claessens and Bart Preneel and Joos Vandewalle",
  title =        "(How) can mobile agents do secure electronic
                 transactions on untrusted hosts? {A} survey of the
                 security issues and the current solutions",
  journal =      j-TOIT,
  volume =       "3",
  number =       "1",
  pages =        "28--48",
  month =        feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:56 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Merialdo:2003:DDD,
  author =       "Paolo Merialdo and Paolo Atzeni and Giansalvatore
                 Mecca",
  title =        "Design and development of data-intensive web sites:
                 {The Araneus} approach",
  journal =      j-TOIT,
  volume =       "3",
  number =       "1",
  pages =        "49--92",
  month =        feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:56 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Cooley:2003:UWS,
  author =       "Robert Cooley",
  title =        "The use of web structure and content to identify
                 subjectively interesting web usage patterns",
  journal =      j-TOIT,
  volume =       "3",
  number =       "2",
  pages =        "93--116",
  month =        may,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:56 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hosoya:2003:XST,
  author =       "Haruo Hosoya and Benjamin C. Pierce",
  title =        "{XDuce}: a statically typed {XML} processing
                 language",
  journal =      j-TOIT,
  volume =       "3",
  number =       "2",
  pages =        "117--148",
  month =        may,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:56 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kobsa:2003:PTP,
  author =       "Alfred Kobsa and J{\"o}rg Schreck",
  title =        "Privacy through pseudonymity in user-adaptive
                 systems",
  journal =      j-TOIT,
  volume =       "3",
  number =       "2",
  pages =        "149--183",
  month =        may,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:56 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Anthony:2003:DBA,
  author =       "Patricia Anthony and Nicholas R. Jennings",
  title =        "Developing a bidding agent for multiple heterogeneous
                 auctions",
  journal =      j-TOIT,
  volume =       "3",
  number =       "3",
  pages =        "185--217",
  month =        aug,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:57 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{He:2003:SAA,
  author =       "Minghua He and Nicholas R. Jennings",
  title =        "{SouthamptonTAC}: an adaptive autonomous trading
                 agent",
  journal =      j-TOIT,
  volume =       "3",
  number =       "3",
  pages =        "218--235",
  month =        aug,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:57 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Varshney:2003:LMM,
  author =       "Upkar Varshney",
  title =        "Location management for mobile commerce applications
                 in wireless {Internet} environment",
  journal =      j-TOIT,
  volume =       "3",
  number =       "3",
  pages =        "236--255",
  month =        aug,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:57 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Cho:2003:EFC,
  author =       "Junghoo Cho and Hector Garcia-Molina",
  title =        "Estimating frequency of change",
  journal =      j-TOIT,
  volume =       "3",
  number =       "3",
  pages =        "256--290",
  month =        aug,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Aug 7 09:39:57 MDT 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Braumandl:2003:QSI,
  author =       "R. Braumandl and A. Kemper and D. Kossmann",
  title =        "Quality of service in an information economy",
  journal =      j-TOIT,
  volume =       "3",
  number =       "4",
  pages =        "291--333",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Oct 28 11:53:21 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Amiri:2003:ESI,
  author =       "Ali Amiri and Syam Menon",
  title =        "Efficient scheduling of {Internet} banner
                 advertisements",
  journal =      j-TOIT,
  volume =       "3",
  number =       "4",
  pages =        "334--346",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Oct 28 11:53:21 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Cherkasova:2003:MCE,
  author =       "Ludmila Cherkasova and Yun Fu and Wenting Tang and
                 Amin Vahdat",
  title =        "Measuring and characterizing end-to-end {Internet}
                 service performance",
  journal =      j-TOIT,
  volume =       "3",
  number =       "4",
  pages =        "347--391",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Oct 28 11:53:21 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Knutsson:2003:APS,
  author =       "Bj{\"o}rn Knutsson and Honghui Lu and Jeffrey Mogul
                 and Bryan Hopkins",
  title =        "Architecture and performance of server-directed
                 transcoding",
  journal =      j-TOIT,
  volume =       "3",
  number =       "4",
  pages =        "392--424",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Oct 28 11:53:21 MST 2003",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gburzynski:2004:FSW,
  author =       "Pawel Gburzynski and Jacek Maitan",
  title =        "Fighting the spam wars: a remailer approach with
                 restrictive aliasing",
  journal =      j-TOIT,
  volume =       "4",
  number =       "1",
  pages =        "1--30",
  month =        feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Feb 9 08:18:07 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lempel:2004:ORP,
  author =       "Ronny Lempel and Shlomo Moran",
  title =        "Optimizing result prefetching in {Web} search engines
                 with segmented indices",
  journal =      j-TOIT,
  volume =       "4",
  number =       "1",
  pages =        "31--59",
  month =        feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Feb 9 08:18:07 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Boneh:2004:FGC,
  author =       "Dan Boneh and Xuhua Ding and Gene Tsudik",
  title =        "Fine-grained control of security capabilities",
  journal =      j-TOIT,
  volume =       "4",
  number =       "1",
  pages =        "60--82",
  month =        feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Feb 9 08:18:07 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bond:2004:OAN,
  author =       "Gregory W. Bond and Eric Cheung and K. Hal Purdy and
                 Pamela Zave and J. Christopher Ramming",
  title =        "An open architecture for next-generation
                 telecommunication services",
  journal =      j-TOIT,
  volume =       "4",
  number =       "1",
  pages =        "83--123",
  month =        feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Feb 9 08:18:07 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Flake:2004:GEMa,
  author =       "Gary William Flake and Paolo Frasconi and C. Lee Giles
                 and Marco Maggini",
  title =        "Guest editorial: {Machine} learning for the
                 {Internet}",
  journal =      j-TOIT,
  volume =       "4",
  number =       "2",
  pages =        "125--128",
  month =        may,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:00 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Agichtein:2004:LFA,
  author =       "Eugene Agichtein and Steve Lawrence and Luis Gravano",
  title =        "Learning to find answers to questions on the {Web}",
  journal =      j-TOIT,
  volume =       "4",
  number =       "2",
  pages =        "129--162",
  month =        may,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:00 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Deshpande:2004:SMM,
  author =       "Mukund Deshpande and George Karypis",
  title =        "Selective {Markov} models for predicting {Web} page
                 accesses",
  journal =      j-TOIT,
  volume =       "4",
  number =       "2",
  pages =        "163--184",
  month =        may,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:00 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhu:2004:PMC,
  author =       "Jianhan Zhu and Jun Hong and John G. Hughes",
  title =        "{PageCluster}: {Mining} conceptual link hierarchies
                 from {Web} log files for adaptive {Web} site
                 navigation",
  journal =      j-TOIT,
  volume =       "4",
  number =       "2",
  pages =        "185--208",
  month =        may,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:00 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Fang:2004:LWM,
  author =       "Xiao Fang and Olivia R. Liu Sheng",
  title =        "{LinkSelector}: {A Web} mining approach to hyperlink
                 selection for {Web} portals",
  journal =      j-TOIT,
  volume =       "4",
  number =       "2",
  pages =        "209--237",
  month =        may,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:00 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Byers:2004:DAI,
  author =       "Simon Byers and Aviel D. Rubin and David Kormann",
  title =        "Defending against an {Internet-based} attack on the
                 physical world",
  journal =      j-TOIT,
  volume =       "4",
  number =       "3",
  pages =        "239--254",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:01 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Goasdoue:2004:AQU,
  author =       "Fran{\c{c}}ois Goasdou{\'e} and Marie-Christine
                 Rousset",
  title =        "Answering queries using views: {A KRDB} perspective
                 for the semantic {Web}",
  journal =      j-TOIT,
  volume =       "4",
  number =       "3",
  pages =        "255--288",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:01 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Barga:2004:RGI,
  author =       "Roger Barga and David Lomet and German Shegalov and
                 Gerhard Weikum",
  title =        "Recovery guarantees for {Internet} applications",
  journal =      j-TOIT,
  volume =       "4",
  number =       "3",
  pages =        "289--328",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:01 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lyback:2004:ATS,
  author =       "David Lyb{\"a}ck and Magnus Boman",
  title =        "Agent trade servers in financial exchange systems",
  journal =      j-TOIT,
  volume =       "4",
  number =       "3",
  pages =        "329--339",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 4 08:23:01 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Flake:2004:GEMb,
  author =       "Gary William Flake and Paolo Frasconi and C. Lee Giles
                 and Marco Maggini",
  title =        "Guest editorial: {Machine} learning for the
                 {Internet}",
  journal =      j-TOIT,
  volume =       "4",
  number =       "4",
  pages =        "341--343",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Nov 22 06:17:51 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{OMahony:2004:CRR,
  author =       "Michael O'Mahony and Neil Hurley and Nicholas
                 Kushmerick and Gu{\'e}nol{\'e} Silvestre",
  title =        "Collaborative recommendation: a robustness analysis",
  journal =      j-TOIT,
  volume =       "4",
  number =       "4",
  pages =        "344--377",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Nov 22 06:17:51 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Menczer:2004:TWC,
  author =       "Filippo Menczer and Gautam Pant and Padmini
                 Srinivasan",
  title =        "Topical web crawlers: {Evaluating} adaptive
                 algorithms",
  journal =      j-TOIT,
  volume =       "4",
  number =       "4",
  pages =        "378--419",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Nov 22 06:17:51 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bohte:2004:MBR,
  author =       "Sander M. Bohte and Enrico Gerding and Han {La
                 Poutr{\'e}}",
  title =        "Market-based recommendation: {Agents} that compete for
                 consumer attention",
  journal =      j-TOIT,
  volume =       "4",
  number =       "4",
  pages =        "420--448",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Nov 22 06:17:51 MST 2004",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Thiemann:2005:EDS,
  author =       "Peter Thiemann",
  title =        "An embedded domain-specific language for type-safe
                 server-side {Web} scripting",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "1--46",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ardissono:2005:MAI,
  author =       "Liliana Ardissono and Anna Goy and Giovanna Petrone
                 and Marino Segnan",
  title =        "A multi-agent infrastructure for developing
                 personalized {Web}-based systems",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "47--69",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chan:2005:MPC,
  author =       "Addison Chan and Rynson W. H. Lau and Beatrice Ng",
  title =        "Motion prediction for caching and prefetching in
                 mouse-driven {DVE} navigation",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "70--91",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bianchini:2005:IP,
  author =       "Monica Bianchini and Marco Gori and Franco Scarselli",
  title =        "Inside {PageRank}",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "92--128",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ungureanu:2005:UCP,
  author =       "Victoria Ungureanu",
  title =        "Using certified policies to regulate {E-commerce}
                 transactions",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "129--153",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lu:2005:WMD,
  author =       "Hongjun Lu and Jeffrey Xu Yu and Guoren Wang and
                 Shihui Zheng and Haifeng Jiang and Ge Yu and Aoying
                 Zhou",
  title =        "What makes the differences: benchmarking {XML}
                 database implementations",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "154--194",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mok:2005:LAS,
  author =       "Wilson Wai Ho Mok and R. P. Sundarraj",
  title =        "Learning algorithms for single-instance electronic
                 negotiations using the time-dependent behavioral
                 tactic",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "195--230",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Borodin:2005:LAR,
  author =       "Allan Borodin and Gareth O. Roberts and Jeffrey S.
                 Rosenthal and Panayiotis Tsaparas",
  title =        "Link analysis ranking: algorithms, theory, and
                 experiments",
  journal =      j-TOIT,
  volume =       "5",
  number =       "1",
  pages =        "231--297",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Apr 14 10:31:40 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Abadi:2005:MHM,
  author =       "Martin Abadi and Mike Burrows and Mark Manasse and Ted
                 Wobber",
  title =        "Moderately hard, memory-bound functions",
  journal =      j-TOIT,
  volume =       "5",
  number =       "2",
  pages =        "299--327",
  month =        may,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jul 7 12:39:56 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Oberle:2005:SAD,
  author =       "Daniel Oberle and Steffen Staab and Rudi Studer and
                 Raphael Volz",
  title =        "Supporting application development in the {Semantic
                 Web}",
  journal =      j-TOIT,
  volume =       "5",
  number =       "2",
  pages =        "328--358",
  month =        may,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jul 7 12:39:56 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Challenger:2005:FBA,
  author =       "Jim Challenger and Paul Dantzig and Arun Iyengar and
                 Karen Witting",
  title =        "A fragment-based approach for efficiently creating
                 dynamic {Web} content",
  journal =      j-TOIT,
  volume =       "5",
  number =       "2",
  pages =        "359--389",
  month =        may,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jul 7 12:39:56 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Petropoulos:2005:GQI,
  author =       "Michalis Petropoulos and Yannis Papakonstantinou and
                 Vasilis Vassalos",
  title =        "Graphical query interfaces for semistructured data:
                 the {QURSED} system",
  journal =      j-TOIT,
  volume =       "5",
  number =       "2",
  pages =        "390--438",
  month =        may,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jul 7 12:39:56 MDT 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  note =         "See address correction \cite{Vassalos:2005:C}.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Manolescu:2005:MDD,
  author =       "Ioana Manolescu and Marco Brambilla and Stefano Ceri
                 and Sara Comai and Piero Fraternali",
  title =        "Model-driven design and deployment of service-enabled
                 {Web} applications",
  journal =      j-TOIT,
  volume =       "5",
  number =       "3",
  pages =        "439--479",
  month =        aug,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Nov 18 08:22:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Li:2005:OMC,
  author =       "Keqiu Li and Hong Shen and Francis Y. L. Chin and Si
                 Qing Zheng",
  title =        "Optimal methods for coordinated enroute {Web} caching
                 for tree networks",
  journal =      j-TOIT,
  volume =       "5",
  number =       "3",
  pages =        "480--507",
  month =        aug,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Nov 18 08:22:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gomes:2005:CNC,
  author =       "Daniel Gomes and M{\'a}rio J. Silva",
  title =        "Characterizing a national community {Web}",
  journal =      j-TOIT,
  volume =       "5",
  number =       "3",
  pages =        "508--531",
  month =        aug,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Nov 18 08:22:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chen:2005:FCM,
  author =       "Xuan Chen and John Heidemann",
  title =        "Flash crowd mitigation via adaptive admission control
                 based on application-level observations",
  journal =      j-TOIT,
  volume =       "5",
  number =       "3",
  pages =        "532--569",
  month =        aug,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Nov 18 08:22:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Vassalos:2005:C,
  author =       "Vasilis Vassalos",
  title =        "Corrigenda",
  journal =      j-TOIT,
  volume =       "5",
  number =       "3",
  pages =        "570--570",
  month =        aug,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Nov 18 08:22:27 MST 2005",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  note =         "Address correction for \cite{Petropoulos:2005:GQI}.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Harumoto:2005:EWB,
  author =       "Kaname Harumoto and Tadashi Nakano and Shinya Fukumura
                 and Shinji Shimojo and Shojiro Nishio",
  title =        "Effective {Web} browsing through content delivery
                 adaptation",
  journal =      j-TOIT,
  volume =       "5",
  number =       "4",
  pages =        "571--600",
  month =        nov,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Jan 24 06:15:07 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Li:2005:CSM,
  author =       "Mingzhe Li and Mark Claypool and Robert Kinicki and
                 James Nichols",
  title =        "Characteristics of streaming media stored on the
                 {Web}",
  journal =      j-TOIT,
  volume =       "5",
  number =       "4",
  pages =        "601--626",
  month =        nov,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Jan 24 06:15:07 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Diaz:2005:PSR,
  author =       "Oscar Diaz and Juan J. Rodriguez",
  title =        "Portlet syndication: {Raising} variability concerns",
  journal =      j-TOIT,
  volume =       "5",
  number =       "4",
  pages =        "627--659",
  month =        nov,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Jan 24 06:15:07 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Murata:2005:TXS,
  author =       "Makoto Murata and Dongwon Lee and Murali Mani and
                 Kohsuke Kawaguchi",
  title =        "Taxonomy of {XML} schema languages using formal
                 language theory",
  journal =      j-TOIT,
  volume =       "5",
  number =       "4",
  pages =        "660--704",
  month =        nov,
  year =         "2005",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Jan 24 06:15:07 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lin:2006:ISP,
  author =       "Jeng-Wei Lin and Jan-Ming Ho and Li-Ming Tseng and
                 Feipei Lai",
  title =        "{IDN} server proxy architecture for {Internationalized
                 Domain Name} resolution and experiences with providing
                 {Web} services",
  journal =      j-TOIT,
  volume =       "6",
  number =       "1",
  pages =        "1--19",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1125274.1125275",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Apr 19 07:42:01 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Schroeder:2006:WSU,
  author =       "Bianca Schroeder and Mor Harchol-Balter",
  title =        "{Web} servers under overload: {How} scheduling can
                 help",
  journal =      j-TOIT,
  volume =       "6",
  number =       "1",
  pages =        "20--52",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1125274.1125276",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Apr 19 07:42:01 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chien:2006:SCQ,
  author =       "Shu-Yao Chien and Vassilis J. Tsotras and Carlo
                 Zaniolo and Donghui Zhang",
  title =        "Supporting complex queries on multiversion {XML}
                 documents",
  journal =      j-TOIT,
  volume =       "6",
  number =       "1",
  pages =        "53--84",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1125274.1125277",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Apr 19 07:42:01 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Szykman:2006:DIW,
  author =       "Simon Szykman and Ram D. Sriram",
  title =        "Design and implementation of the {Web}-enabled {NIST}
                 design repository",
  journal =      j-TOIT,
  volume =       "6",
  number =       "1",
  pages =        "85--116",
  month =        feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1125274.1125278",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Apr 19 07:42:01 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Fenner:2006:SME,
  author =       "Trevor Fenner and Mark Levene and George Loizou",
  title =        "A stochastic model for the evolution of the {Web}
                 allowing link deletion",
  journal =      j-TOIT,
  volume =       "6",
  number =       "2",
  pages =        "117--130",
  month =        may,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1149121.1149122",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:21:21 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Recently several authors have proposed stochastic
                 evolutionary models for the growth of the Web graph and
                 other networks that give rise to power-law
                 distributions. These models are based on the notion of
                 preferential attachment, leading to the ``rich get
                 richer'' phenomenon. We present a generalization of the
                 basic model by allowing deletion of individual links
                 and show that it also gives rise to a power-law
                 distribution. We derive the mean-field equations for
                 this stochastic model and show that, by examining a
                 snapshot of the distribution at the steady state of the
                 model, we are able to determine the extent to which
                 link deletion has taken place and estimate the
                 probability of deleting a link. Applying our model to
                 actual Web graph data provides evidence of the extent
                 to which link deletion has occurred. We also discuss a
                 problem that frequently arises in estimating the
                 power-law exponent from empirical data and a few
                 possible methods for dealing with this, indicating our
                 preferred approach. Using this approach our analysis of
                 the data suggests a power-law exponent of approximately
                 2.15 for the distribution of inlinks in the Web graph,
                 rather than the widely published value of 2.1.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kumar:2006:CAC,
  author =       "Ravi Kumar and Prabhakar Raghavan and Sridhar
                 Rajagopalan and Andrew Tomkins",
  title =        "Core algorithms in the {CLEVER} system",
  journal =      j-TOIT,
  volume =       "6",
  number =       "2",
  pages =        "131--152",
  month =        may,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1149121.1149123",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:21:21 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article describes the CLEVER search system
                 developed at the IBM Almaden Research Center. We
                 present a detailed and unified exposition of the
                 various algorithmic components that make up the system,
                 and then present results from two user studies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Cho:2006:SWC,
  author =       "Junghoo Cho and Hector Garcia-Molina and Taher
                 Haveliwala and Wang Lam and Andreas Paepcke and Sriram
                 Raghavan and Gary Wesley",
  title =        "{Stanford} {WebBase} components and applications",
  journal =      j-TOIT,
  volume =       "6",
  number =       "2",
  pages =        "153--186",
  month =        may,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1149121.1149124",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:21:21 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We describe the design and performance of WebBase, a
                 tool for Web research. The system includes a highly
                 customizable crawler, a repository for collected Web
                 pages, an indexer for both text and link-related page
                 features, and a high-speed content distribution
                 facility. The distribution module enables researchers
                 world-wide to retrieve pages from WebBase, and stream
                 them across the Internet at high speed. The advantage
                 for the researchers is that they need not all crawl the
                 Web before beginning their research. WebBase has been
                 used by scores of research and teaching organizations
                 world-wide, mostly for investigations into Web topology
                 and linguistic content analysis. After describing the
                 system's architecture, we explain our engineering
                 decisions for each of the WebBase components, and
                 present respective performance measurements.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Stolfo:2006:BBM,
  author =       "Salvatore J. Stolfo and Shlomo Hershkop and Chia-Wei
                 Hu and Wei-Jen Li and Olivier Nimeskern and Ke Wang",
  title =        "Behavior-based modeling and its application to {Email}
                 analysis",
  journal =      j-TOIT,
  volume =       "6",
  number =       "2",
  pages =        "187--221",
  month =        may,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1149121.1149125",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:21:21 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Email Mining Toolkit (EMT) is a data mining system
                 that computes behavior profiles or models of user email
                 accounts. These models may be used for a multitude of
                 tasks including forensic analyses and detection tasks
                 of value to law enforcement and intelligence agencies,
                 as well for as other typical tasks such as virus and
                 spam detection. To demonstrate the power of the
                 methods, we focus on the application of these models to
                 detect the early onset of a viral propagation without
                 ``content-base '' (or signature-based) analysis in
                 common use in virus scanners. We present several
                 experiments using real email from 15 users with
                 injected simulated viral emails and describe how the
                 combination of different behavior models improves
                 overall detection rates. The performance results vary
                 depending upon parameter settings, approaching 99 \%
                 true positive (TP) (percentage of viral emails caught)
                 in general cases and with 0.38 \% false positive (FP)
                 (percentage of emails with attachments that are
                 mislabeled as viral). The models used for this study
                 are based upon volume and velocity statistics of a
                 user's email rate and an analysis of the user's
                 (social) cliques revealed in the person's email
                 behavior. We show by way of simulation that virus
                 propagations are detectable since viruses may emit
                 emails at rates different than human behavior suggests
                 is normal, and email is directed to groups of
                 recipients in ways that violate the users' typical
                 communications with their social groups.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Min:2006:CEA,
  author =       "Jun-Ki Min and Myung-Jae Park and Chin-Wan Chung",
  title =        "A compressor for effective archiving, retrieval, and
                 updating of {XML} documents",
  journal =      j-TOIT,
  volume =       "6",
  number =       "3",
  pages =        "223--258",
  month =        aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1151087.1151088",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 23 05:13:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bakker:2006:WAD,
  author =       "Arno Bakker and Maarten {Van Steen} and Andrew S.
                 Tanenbaum",
  title =        "A wide-area {Distribution Network} for free software",
  journal =      j-TOIT,
  volume =       "6",
  number =       "3",
  pages =        "259--281",
  month =        aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1151087.1151089",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 23 05:13:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Globe Distribution Network (GDN) is an application
                 for the efficient, worldwide distribution of freely
                 redistributable software packages. Distribution is made
                 efficient by encapsulating the software into special
                 distributed objects which efficiently replicate
                 themselves near to the downloading clients. The Globe
                 Distribution Network takes a novel, optimistic approach
                 to stop the illegal distribution of copyrighted and
                 illicit material via the network. Instead of having
                 moderators check the packages at upload time, illegal
                 content is removed and its uploader's access to the
                 network permanently revoked only when the violation is
                 discovered. Other protective measures defend the GDN
                 against internal and external attacks to its
                 availability. By exploiting the replication of the
                 software and using fault-tolerant server software, the
                 Globe Distribution Network achieves high availability.
                 A prototype implementation of the GDN is available from
                 \path=http://www.cs.vu.nl/globe/=.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Brinkmeier:2006:PR,
  author =       "Michael Brinkmeier",
  title =        "{PageRank} revisited",
  journal =      j-TOIT,
  volume =       "6",
  number =       "3",
  pages =        "282--301",
  month =        aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1151087.1151090",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 23 05:13:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "PageRank, one part of the search engine Google, is one
                 of the most prominent link-based rankings of documents
                 in the World Wide Web. Usually it is described as a
                 Markov chain modeling a specific random surfer. In this
                 article, an alternative representation as a power
                 series is given. Nonetheless, it is possible to
                 interpret the values as probabilities in a random
                 surfer setting, differing from the usual one. Using the
                 new description we restate and extend some results
                 concerning the convergence of the standard iteration
                 used for PageRank. Furthermore we take a closer look at
                 sinks and sources, leading to some suggestions for
                 faster implementations.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jonsson:2006:POS,
  author =       "Bj{\"o}rn Th{\o}r J{\'o}nsson and Mar{\'\i}a
                 Arinbjarnar and Bjarnsteinn Th{\'o}rsson and Michael J.
                 Franklin and Divesh Srivastava",
  title =        "Performance and overhead of semantic cache
                 management",
  journal =      j-TOIT,
  volume =       "6",
  number =       "3",
  pages =        "302--331",
  month =        aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1151087.1151091",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 23 05:13:30 MDT 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  remark =       "The `Th' in the first and third author names should be
                 the Icelandic letter Thu.",
}

@Article{Becerra-Fernandez:2006:SEW,
  author =       "Irma Becerra-Fernandez",
  title =        "Searching for experts on the {Web}: a review of
                 contemporary expertise locator systems",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "333--355",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bellavista:2006:MCM,
  author =       "Paolo Bellavista and Antonio Corradi and Rebecca
                 Montanari and Cesare Stefanelli",
  title =        "A mobile computing middleware for location- and
                 context-aware {Internet} data services",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "356--380",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Tsoi:2006:CCP,
  author =       "Ah Chung Tsoi and Markus Hagenbuchner and Franco
                 Scarselli",
  title =        "Computing customized page ranks",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "381--414",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hui:2006:OID,
  author =       "Kai-Lung Hui and Bernard C. Y. Tan and Chyan-Yee Goh",
  title =        "Online information disclosure: {Motivators} and
                 measurements",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "415--441",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jansen:2006:AGW,
  author =       "Bernard J. Jansen and Tracy Mullen and Amanda Spink
                 and Jan Pedersen",
  title =        "Automated gathering of {Web} information: an in-depth
                 examination of agents interacting with search engines",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "442--464",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{He:2006:HBS,
  author =       "Minghua He and Nicholas R. Jennings and Adam
                 Pr{\"u}gel-Bennett",
  title =        "A heuristic bidding strategy for buying multiple goods
                 in multiple {English} auctions",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "465--496",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Golbeck:2006:IBT,
  author =       "Jennifer Golbeck and James Hendler",
  title =        "Inferring binary trust relationships in {Web}-based
                 social networks",
  journal =      j-TOIT,
  volume =       "6",
  number =       "4",
  pages =        "497--529",
  month =        nov,
  year =         "2006",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Nov 30 19:02:51 MST 2006",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jacob:2007:ICF,
  author =       "Varghese S. Jacob and Ramayya Krishnan and Young U.
                 Ryu",
  title =        "{Internet} content filtering using isotonic separation
                 on content category ratings",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189741",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The World Wide Web has enabled anybody with a low cost
                 Internet connection to access vast information
                 repositories. Some of these repositories contain
                 information (e.g., hate speech and pornography) that is
                 considered objectionable, especially for children to
                 view. Several efforts---legal and technical---are
                 underway to protect children and the generic public
                 from accessing this type of content. We propose a
                 technical approach utilizing a recently proposed
                 technique called isotonic separation for filtering with
                 content metadata if they satisfy monotone conditions.
                 We illustrate this approach using a category rating
                 method of PICS. In essence, we formulate the Internet
                 content filtering problem as a classification problem
                 on content metadata and report on experiments we
                 conducted with the isotonic separation technique.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Internet content filtering; isotonic separation;
                 PICS",
}

@Article{Ceri:2007:MDD,
  author =       "Stefano Ceri and Florian Daniel and Maristella Matera
                 and Federico M. Facca",
  title =        "Model-driven development of context-aware {Web}
                 applications",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189742",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Context-aware, multi-channel Web applications are more
                 and more gaining consensus among both content providers
                 and consumers, but very few proposals exist for their
                 conceptual modeling. This article illustrates a
                 conceptual framework that provides modeling facilities
                 for context-aware, multichannel Web applications; it
                 also shows how high-level modeling constructs can drive
                 the application development process through automatic
                 code generation. Our work stresses the importance of
                 user-independent, context-triggered adaptation actions,
                 in which the context plays the role of a ``first
                 class'' actor, operating independently of users on the
                 same hypertext the users navigate. Modeling concepts
                 are based on WebML (Web Modeling Language), an already
                 established conceptual model for data-intensive Web
                 applications, which is also accompanied by a
                 development method and a CASE tool. However, given
                 their general validity, the concepts of this article
                 shape up a complete framework that can be adopted
                 independently of the chosen model, method, and tool.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "adaptive hypertext; conceptual modeling; context;
                 context-aware Web applications; context-awareness;
                 WebML",
}

@Article{Ding:2007:ESD,
  author =       "Xuhua Ding and Daniele Mazzocchi and Gene Tsudik",
  title =        "Equipping smart devices with public key signatures",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189743",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "One of the major recent trends in computing has been
                 towards so-called smart devices, such as PDAs, cell
                 phones and sensors. Such devices tend to have a feature
                 in common: limited computational capabilities and
                 equally limited power, as most operate on batteries.
                 This makes them ill-suited for public key signatures.
                 This article explores practical and conceptual
                 implications of using Server-Aided Signatures (SAS) for
                 these devices. SAS is a signature method that relies on
                 partially-trusted servers for generating (normally
                 expensive) public key signatures for regular users.
                 Although the primary goal is to aid small,
                 resource-limited devices in signature generation, SAS
                 also offers fast certificate revocation, signature
                 causality and reliable timestamping. It also has some
                 interesting features such as built-in attack detection
                 for users and DoS resistance for servers. Our
                 experimental results also validate the feasibility of
                 deploying SAS on smart devices.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "digital signatures; public key infrastructure",
}

@Article{Donato:2007:WGH,
  author =       "Debora Donato and Luigi Laura and Stefano Leonardi and
                 Stefano Millozzi",
  title =        "The {Web} as a graph: {How} far we are",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189744",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article we present an experimental study of
                 the properties of webgraphs. We study a large crawl
                 from 2001 of 200M pages and about 1.4 billion edges,
                 made available by the WebBase project at Stanford, as
                 well as several synthetic ones generated according to
                 various models proposed recently. We investigate
                 several topological properties of such graphs,
                 including the number of bipartite cores and strongly
                 connected components, the distribution of degrees and
                 PageRank values and some correlations; we present a
                 comparison study of the models against these
                 measures.Our findings are that (i) the WebBase sample
                 differs slightly from the (older) samples studied in
                 the literature, and (ii) despite the fact that these
                 models do not catch all of its properties, they do
                 exhibit some peculiar behaviors not found, for example,
                 in the models from classical random graph
                 theory.Moreover we developed a software library able to
                 generate and measure massive graphs in secondary
                 memory; this library is publicy available under the GPL
                 licence. We discuss its implementation and some
                 computational issues related to secondary memory graph
                 algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "graph structure; models; World-Wide-Web",
}

@Article{Huang:2007:DDA,
  author =       "Yun Huang and Xianjun Geng and Andrew B. Whinston",
  title =        "Defeating {DDoS} attacks by fixing the incentive
                 chain",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "5:1--5:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189745",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Cooperative technological solutions for Distributed
                 Denial-of-Service (DDoS) attacks are already available,
                 yet organizations in the best position to implement
                 them lack incentive to do so, and the victims of DDoS
                 attacks cannot find effective methods to motivate them.
                 In this article we discuss two components of the
                 technological solutions to DDoS attacks: cooperative
                 filtering and cooperative traffic smoothing by caching.
                 We then analyze the broken incentive chain in each of
                 these technological solutions. As a remedy, we propose
                 usage-based pricing and Capacity Provision Networks,
                 which enable victims to disseminate enough incentive
                 along attack paths to stimulate cooperation against
                 DDoS attacks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "denial-of-service; incentive; pricing; security",
}

@Article{Wong:2007:AWI,
  author =       "Tak-Lam Wong and Wai Lam",
  title =        "Adapting {Web} information extraction knowledge via
                 mining site-invariant and site-dependent features",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "6:1--6:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189746",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We develop a novel framework that aims at
                 automatically adapting previously learned information
                 extraction knowledge from a source Web site to a new
                 unseen target site in the same domain. Two kinds of
                 features related to the text fragments from the Web
                 documents are investigated. The first type of feature
                 is called, a site-invariant feature. These features
                 likely remain unchanged in Web pages from different
                 sites in the same domain. The second type of feature is
                 called a site-dependent feature. These features are
                 different in the Web pages collected from different Web
                 sites, while they are similar in the Web pages
                 originating from the same site. In our framework, we
                 derive the site-invariant features from previously
                 learned extraction knowledge and the items previously
                 collected or extracted from the source Web site. The
                 derived site-invariant features will be exploited to
                 automatically seek a new set of training examples in
                 the new unseen target site. Both the site-dependent
                 features and the site-invariant features of these
                 automatically discovered training examples will be
                 considered in the learning of new information
                 extraction knowledge for the target site. We conducted
                 extensive experiments on a set of real-world Web sites
                 collected from three different domains to demonstrate
                 the performance of our framework. For example, by just
                 providing training examples from one online book
                 catalog Web site, our approach can automatically
                 extract information from ten different book catalog
                 sites achieving an average precision and recall of
                 71.9\% and 84.0\% respectively without any further
                 manual intervention.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "machine learning; text mining; Web mining; wrapper
                 adaptation",
}

@Article{Villela:2007:PSA,
  author =       "Daniel Villela and Prashant Pradhan and Dan
                 Rubenstein",
  title =        "Provisioning servers in the application tier for
                 e-commerce systems",
  journal =      j-TOIT,
  volume =       "7",
  number =       "1",
  pages =        "7:1--7:??",
  month =        feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1189740.1189747",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:57:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Server providers that support e-commerce applications
                 as a service for multiple e-commerce Web sites
                 traditionally use a tiered server architecture. This
                 architecture includes an application tier to process
                 requests for dynamically generated content. How this
                 tier is provisioned can significantly impact a
                 provider's profit margin. In this article we study
                 methods to provision servers in the application serving
                 tier that increase a server provider's profits. First,
                 we examine actual traces of request arrivals to the
                 application tier of an e-commerce site, and show that
                 the arrival process is effectively Poisson. Next, we
                 construct an optimization problem in the context of a
                 set of application servers modeled as M / G /1/ PS
                 queueing systems, and derive three simple methods that
                 approximate the allocation that maximizes profits.
                 Simulation results demonstrate that our approximation
                 methods achieve profits that are close to optimal, and
                 are significantly higher than those achieved via simple
                 heuristics.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "electronic commerce; server provisioning",
}

@Article{Keromytis:2007:RSA,
  author =       "Angelos D. Keromytis and Jonathan M. Smith",
  title =        "Requirements for scalable access control and security
                 management architectures",
  journal =      j-TOIT,
  volume =       "7",
  number =       "2",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1239971.1239972",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Maximizing local autonomy by delegating functionality
                 to end nodes when possible (the end-to-end design
                 principle) has led to a scalable Internet. Scalability
                 and the capacity for distributed control have
                 unfortunately not extended well to resource
                 access-control policies and mechanisms. Yet management
                 of security is becoming an increasingly challenging
                 problem in no small part due to scaling up of measures
                 such as number of users, protocols, applications,
                 network elements, topological constraints, and
                 functionality expectations.\par

                 In this article, we discuss scalability challenges for
                 traditional access-control mechanisms at the
                 architectural level and present a set of fundamental
                 requirements for authorization services in large-scale
                 networks. We show why existing mechanisms fail to meet
                 these requirements and investigate the current design
                 options for a scalable access-control
                 architecture.\par

                 We argue that the key design options to achieve
                 scalability are the choice of the representation of
                 access control policy, the distribution mechanism for
                 policy, and the choice of the access-rights revocation
                 scheme. Although these ideas have been considered in
                 the past, current access-control systems in use
                 continue to use simpler but restrictive architectural
                 models. With this article, we hope to influence the
                 design of future access-control systems towards more
                 decentralized and scalable mechanisms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "access control; authorization; credentials;
                 delegation; distributed systems; large-scale systems;
                 security policy; trust management",
}

@Article{Baeza-Yates:2007:CNW,
  author =       "Ricardo Baeza-Yates and Carlos Castillo and Efthimis
                 N. Efthimiadis",
  title =        "Characterization of national {Web} domains",
  journal =      j-TOIT,
  volume =       "7",
  number =       "2",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1239971.1239973",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "During the last few years, several studies on the
                 characterization of the public Web space of various
                 national domains have been published. The pages of a
                 country are an interesting set for studying the
                 characteristics of the Web because at the same time
                 these are diverse (as they are written by several
                 authors) and yet rather similar (as they share a common
                 geographical, historical and cultural
                 context).\par

                 This article discusses the methodologies used for
                 presenting the results of Web characterization studies,
                 including the granularity at which different aspects
                 are presented, and a separation of concerns between
                 contents, links, and technologies. Based on this, we
                 present a side-by-side comparison of the results of 12
                 Web characterization studies, comprising over 120
                 million pages from 24 countries. The comparison unveils
                 similarities and differences between the collections
                 and sheds light on how certain results of a single Web
                 characterization study on a sample may be valid in the
                 context of the full Web.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Web characterization; Web measurement",
}

@Article{Arion:2007:XQC,
  author =       "Andrei Arion and Angela Bonifati and Ioana Manolescu
                 and Andrea Pugliese",
  title =        "{XQueC}: a query-conscious compressed {XML} database",
  journal =      j-TOIT,
  volume =       "7",
  number =       "2",
  pages =        "10:1--10:??",
  month =        may,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1239971.1239974",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "XML compression has gained prominence recently because
                 it counters the disadvantage of the verbose
                 representation XML gives to data. In many applications,
                 such as data exchange and data archiving, entirely
                 compressing and decompressing a document is acceptable.
                 In other applications, where queries must be run over
                 compressed documents, compression may not be beneficial
                 since the performance penalty in running the query
                 processor over compressed data outweighs the data
                 compression benefits. While balancing the interests of
                 compression and query processing has received
                 significant attention in the domain of relational
                 databases, these results do not immediately translate
                 to XML data.\par

                 In this article, we address the problem of embedding
                 compression into XML databases without degrading query
                 performance. Since the setting is rather different from
                 relational databases, the choice of compression
                 granularity and compression algorithms must be
                 revisited. Query execution in the compressed domain
                 must also be rethought in the framework of XML query
                 processing due to the richer structure of XML data.
                 Indeed, a proper storage design for the compressed data
                 plays a crucial role here.\par

                 The XQ ue C system ( XQ uery Processor and C ompressor)
                 covers a wide set of XQuery queries in the compressed
                 domain and relies on a workload-based cost model to
                 perform the choices of the compression granules and of
                 their corresponding compression algorithms. As a
                 consequence, XQueC provides efficient query processing
                 on compressed XML data. An extensive experimental
                 assessment is presented, showing the effectiveness of
                 the cost model, the compression ratios, and the query
                 execution times.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "XML compression; XML data management; XML databases;
                 XQuery",
}

@Article{Zhou:2007:SAH,
  author =       "Jing Zhou and Wendy Hall and David C. {De Roure} and
                 Vijay K. Dialani",
  title =        "Supporting ad-hoc resource sharing on the {Web}: a
                 peer-to-peer approach to hypermedia link services",
  journal =      j-TOIT,
  volume =       "7",
  number =       "2",
  pages =        "11:1--11:??",
  month =        may,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1239971.1239975",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The key element to support ad-hoc resource sharing on
                 the Web is to discover resources of interest. The
                 hypermedia paradigm provides a way of overlaying a set
                 of resources with additional information in the form of
                 links to help people find other resources. However,
                 existing hypermedia approaches primarily develop
                 mechanisms to enable resource sharing in a fairly
                 static, centralized way. Recent developments in
                 distributed computing, on the other hand, introduced
                 peer-to-peer (P2P) computing that is notable for
                 employing distributed resources to perform a critical
                 function in a more dynamic and ad-hoc scenario. We
                 investigate the feasibility and potential benefits of
                 bringing together the P2P paradigm with the concept of
                 hypermedia link services to implement ad-hoc resource
                 sharing on the Web. This is accomplished by utilizing a
                 web-based Distributed Dynamic Link Service (DDLS) as a
                 testbed and addressing the issues arising from the
                 design, implementation, and enhancement of the service.
                 Our experimental result reveals the behavior and
                 performance of the semantics-based resource discovery
                 in DDLS and demonstrates that the proposed enhancing
                 technique for DDLS, topology reorganization, is
                 appropriate and efficient.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "distributed dynamic link service; open hypermedia;
                 peer-to-peer (P2P); reorganization; semantic search",
}

@Article{David:2007:ODE,
  author =       "Esther David and Alex Rogers and Nicholas R. Jennings
                 and Jeremy Schiff and Sarit Kraus and Michael H.
                 Rothkopf",
  title =        "Optimal design of {English} auctions with discrete bid
                 levels",
  journal =      j-TOIT,
  volume =       "7",
  number =       "2",
  pages =        "12:1--12:??",
  month =        may,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1239971.1239976",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article considers a canonical auction protocol
                 that forms the basis of nearly all current online
                 auctions. Such discrete bid auctions require that the
                 bidders submit bids at predetermined discrete bid
                 levels, and thus, there exists a minimal increment by
                 which the bid price may be raised. In contrast, the
                 academic literature of optimal auction design deals
                 almost solely with continuous bid auctions. As a
                 result, there is little practical guidance as to how an
                 auctioneer, seeking to maximize its revenue, should
                 determine the number and value of these discrete bid
                 levels, and it is this omission that is addressed here.
                 To this end, a model of an ascending price English
                 auction with discrete bid levels is considered. An
                 expression for the expected revenue of this auction is
                 derived and used to determine numerical and analytical
                 solutions for the optimal bid levels in the case of
                 uniform and exponential bidder's valuation
                 distributions. Finally, in order to develop an
                 intuitive understanding of how these optimal bid levels
                 are distributed, the limiting case where the number of
                 discrete bid levels is large is considered, and an
                 analytical expression for their distribution is
                 derived.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "discrete bids; English auction; optimal auction
                 design",
}

@Article{Gupta:2007:GEI,
  author =       "Amar Gupta and Satwiksai Seshasai",
  title =        "Guest editorial: {The Internet} and outsourcing",
  journal =      j-TOIT,
  volume =       "7",
  number =       "3",
  pages =        "13:1--13:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1275505.1275506",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gupta:2007:HKF,
  author =       "Amar Gupta and Satwik Seshasai",
  title =        "24-hour knowledge factory: {Using Internet} technology
                 to leverage spatial and temporal separations",
  journal =      j-TOIT,
  volume =       "7",
  number =       "3",
  pages =        "14:1--14:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1275505.1275507",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Several of the outsourcing endeavors of today will
                 gradually converge to a hybrid outsourcing model that
                 will involve a team spread across three or more
                 strategically-located centers interconnected by
                 Internet technology. White-collar professionals in the
                 US, Australia, and Poland, for example, could each work
                 on a standard 9--5 basis, transfer the activity to a
                 colleague in the next center, thereby enabling work to
                 be performed on a round-the-clock basis. The effective
                 use of sequential workers in such a 24-hour knowledge
                 factory requires that professional tasks be broken down
                 to the level where individuals can work on them with
                 minimal interaction with their peers, and where new
                 approaches can be employed to reduce the effort
                 involved in transitioning from one employee to the
                 next. This article describes an Internet-based
                 prototype system that uses a Web-based interactive
                 approach, coupled with a unique data model, to optimize
                 collection and storage of design rationale and history
                 from stakeholders and workers. The idea of multiple
                 individuals acting as one ``composite persona'' is
                 explored in the context of facilitating tasks and
                 knowledge to be shared across the Internet in a
                 seamless manner. The article also describes related
                 activities in the commercial arena.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "geographic boundaries; global teams; knowledge
                 management; knowledge sharing; outsourcing; temporal
                 boundaries",
}

@Article{Dossani:2007:IRO,
  author =       "Rafiq Dossani and Nathan Denny",
  title =        "The {Internet}'s role in offshored services: a case
                 study of {India}",
  journal =      j-TOIT,
  volume =       "7",
  number =       "3",
  pages =        "15:1--15:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1275505.1275508",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Using India as a case study, this article analyzes how
                 the Internet influenced its export-oriented software
                 industry. We show that prior to the Internet, domestic
                 entrepreneurship was the key factor for the industry's
                 origin and growth. The industry suffered from
                 relatively low value-addition. As a result, domestic
                 firms, though they were industry leaders within India,
                 were followers of the global leadership provided by
                 transnational firms. With the arrival of the Internet,
                 there was a rise in the level of domain expertise. We
                 show that the Internet facilitated the transfer of
                 domain expertise for foreign firms more than it helped
                 the acquisition of domain expertise by domestic firms.
                 While the value-addition of the industry increased as a
                 result, industry leadership began to pass to foreign
                 firms. The strategic lesson for other countries trying
                 to rapidly develop an export-oriented software industry
                 is unambiguous: exclusive reliance on domestic
                 entrepreneurship will usually result in the domestic
                 industry falling behind its global competitors, while
                 granting unrestricted entry to transnational firms will
                 lead to the domestic firms losing industry leadership
                 in most cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "globalization; India; services; software",
}

@Article{Aron:2007:IIB,
  author =       "Ravi Aron and Siddarth Jayanty and Praveen Pathak",
  title =        "Impact of {Internet-based} distributed monitoring
                 systems on offshore sourcing of services",
  journal =      j-TOIT,
  volume =       "7",
  number =       "3",
  pages =        "16:1--16:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1275505.1275509",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The use of Internet-based distributed monitoring
                 systems has allowed firms to source services globally
                 that were hitherto thought of as being too risky or
                 complex to execute offshore. These systems enable
                 buyers of such services (clients) to monitor the
                 execution of processes in real-time and exert a degree
                 of managerial control over information workers of
                 another firm located in a distant region. Our research
                 shows that process codifiability plays a key role in
                 determining output quality. Further, we show that the
                 efforts made by the client and the provider in
                 monitoring work via Internet-based monitoring
                 mechanisms have a significant impact on output quality.
                 Finally, we show that these monitoring mechanisms
                 enable clients and providers of services to focus on
                 those processes that are best managed by each entity.
                 This scheme of optimal allocation of monitoring effort
                 is termed by us as the efficient monitoring frontier.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "efficient monitoring frontier; Internet-enabled
                 monitoring systems; knowledge continuum; offshore
                 outsourcing; real-time monitoring",
}

@Article{Xiong:2007:PDP,
  author =       "Li Xiong and Subramanyam Chitti and Ling Liu",
  title =        "Preserving data privacy in outsourcing data
                 aggregation services",
  journal =      j-TOIT,
  volume =       "7",
  number =       "3",
  pages =        "17:1--17:??",
  month =        aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1275505.1275510",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Advances in distributed service-oriented computing and
                 Internet technology have formed a strong technology
                 push for outsourcing and information sharing. There is
                 an increasing need for organizations to share their
                 data across organization boundaries both within the
                 country and with countries that may have lesser privacy
                 and security standards. Ideally, we wish to share
                 certain statistical data and extract the knowledge from
                 the private databases without revealing any additional
                 information of each individual database apart from the
                 aggregate result that is permitted. In this article, we
                 describe two scenarios for outsourcing data aggregation
                 services and present a set of decentralized
                 peer-to-peer protocols for supporting data sharing
                 across multiple private databases while minimizing the
                 data disclosure among individual parties. Our basic
                 protocols include a set of novel probabilistic
                 computation mechanisms for important primitive data
                 aggregation operations across multiple private
                 databases such as max, min, and top k selection. We
                 provide an analytical study of our basic protocols in
                 terms of precision, efficiency, and privacy
                 characteristics. Our advanced protocols implement an
                 efficient algorithm for performing k NN classification
                 across multiple private databases. We provide a set of
                 experiments to evaluate the proposed protocols in terms
                 of their correctness, efficiency, and privacy
                 characteristics.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "classification; confidentiality; outsourcing;
                 privacy",
}

@Article{Anand:2007:IIT,
  author =       "Sarabjot Singh Anand and Bamshad Mobasher",
  title =        "Introduction to intelligent techniques for {Web}
                 personalization",
  journal =      j-TOIT,
  volume =       "7",
  number =       "4",
  pages =        "18:1--18:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1278366.1278367",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ng:2007:MUP,
  author =       "Wilfred Ng and Lin Deng and Dik Lun Lee",
  title =        "Mining {User} preference using {Spy} voting for search
                 engine personalization",
  journal =      j-TOIT,
  volume =       "7",
  number =       "4",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1278366.1278368",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article addresses search engine personalization.
                 We present a new approach to mining a user's
                 preferences on the search results from clickthrough
                 data and using the discovered preferences to adapt the
                 search engine's ranking function for improving search
                 quality. We develop a new preference mining technique
                 called SpyNB, which is based on the practical
                 assumption that the search results clicked on by the
                 user reflect the user's preferences but does not draw
                 any conclusions about the results that the user did not
                 click on. As such, SpyNB is still valid even if the
                 user does not follow any order in reading the search
                 results or does not click on all relevant results. Our
                 extensive offline experiments demonstrate that SpyNB
                 discovers many more accurate preferences than existing
                 algorithms do. The interactive online experiments
                 further confirm that SpyNB and our personalization
                 approach are effective in practice. We also show that
                 the efficiency of SpyNB is comparable to existing
                 simple preference mining algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "clickthrough data; personalization; search engine;
                 user preferences",
}

@Article{Coyle:2007:SIW,
  author =       "Maurice Coyle and Barry Smyth",
  title =        "Supporting intelligent {Web} search",
  journal =      j-TOIT,
  volume =       "7",
  number =       "4",
  pages =        "20:1--20:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1278366.1278369",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Search engines continue to struggle to provide
                 everyday users with a service capable of delivering
                 focussed results that are relevant to their information
                 needs. Moreover, traditional search engines really only
                 provide users with a starting point for their
                 information search. That is, upon selecting a page from
                 a search result list, the interaction between user and
                 search engine is effectively over and the user must
                 continue their search alone. In this article, we argue
                 that a comprehensive search service needs to provide
                 the user with more help, both at the result list level
                 and beyond, and we outline some recommendations for
                 intelligent Web search support. We introduce the
                 SearchGuide Web search support system and we describe
                 how it fulfills the requirements for a search support
                 system, providing evaluation results where
                 applicable.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "collaborative search; explanation; interaction
                 history; personalization; visualisation; Web search",
}

@Article{Eirinaki:2007:WSP,
  author =       "Magdalini Eirinaki and Michalis Vazirgiannis",
  title =        "{Web} site personalization based on link analysis and
                 navigational patterns",
  journal =      j-TOIT,
  volume =       "7",
  number =       "4",
  pages =        "21:1--21:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1278366.1278370",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The continuous growth in the size and use of the World
                 Wide Web imposes new methods of design and development
                 of online information services. The need for predicting
                 the users' needs in order to improve the usability and
                 user retention of a Web site is more than evident and
                 can be addressed by personalizing it. Recommendation
                 algorithms aim at proposing ``next'' pages to users
                 based on their current visit and past users'
                 navigational patterns. In the vast majority of related
                 algorithms, however, only the usage data is used to
                 produce recommendations, disregarding the structural
                 properties of the Web graph. Thus important---in terms
                 of PageRank authority score---pages may be underrated.
                 In this work, we present UPR, a PageRank-style
                 algorithm which combines usage data and link analysis
                 techniques for assigning probabilities to Web pages
                 based on their importance in the Web site's
                 navigational graph. We propose the application of a
                 localized version of UPR ( l-UPR ) to personalized
                 navigational subgraphs for online Web page ranking and
                 recommendation. Moreover, we propose a hybrid
                 probabilistic predictive model based on Markov models
                 and link analysis for assigning prior probabilities in
                 a hybrid probabilistic model. We prove, through
                 experimentation, that this approach results in more
                 objective and representative predictions than the ones
                 produced from the pure usage-based approaches.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "link analysis; Markov models; recommendations;
                 usage-based PageRank; Web personalization",
}

@Article{Anand:2007:GSE,
  author =       "Sarabjot Singh Anand and Patricia Kearney and Mary
                 Shapcott",
  title =        "Generating semantically enriched user profiles for
                 {Web} personalization",
  journal =      j-TOIT,
  volume =       "7",
  number =       "4",
  pages =        "22:1--22:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1278366.1278371",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Traditional collaborative filtering generates
                 recommendations for the active user based solely on
                 ratings of items by other users. However, most
                 businesses today have item ontologies that provide a
                 useful source of content descriptors that can be used
                 to enhance the quality of recommendations generated. In
                 this article, we present a novel approach to
                 integrating user rating vectors with an item ontology
                 to generate recommendations. The approach is novel in
                 measuring similarity between users in that it first
                 derives factors, referred to as impacts, driving the
                 observed user behavior and then uses these factors
                 within the similarity computation. In doing so, a more
                 comprehensive user model is learned that is sensitive
                 to the context of the user visit.\par

                 An evaluation of our recommendation algorithm was
                 carried out using data from an online retailer of
                 movies with over 94,000 movies, 44,000 actors, and
                 10,000 directors within the item knowledge base. The
                 evaluation showed a statistically significant
                 improvement in the prediction accuracy over traditional
                 collaborative filtering. Additionally, the algorithm
                 was shown to generate recommendations for visitors that
                 belong to sparse sections of the user space, areas
                 where traditional collaborative filtering would
                 generally fail to generate accurate recommendations.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "collaborative filtering; evaluation; implicit ratings;
                 personalization; similarity metric",
}

@Article{Mobasher:2007:TTR,
  author =       "Bamshad Mobasher and Robin Burke and Runa Bhaumik and
                 Chad Williams",
  title =        "Toward trustworthy recommender systems: an analysis of
                 attack models and algorithm robustness",
  journal =      j-TOIT,
  volume =       "7",
  number =       "4",
  pages =        "23:1--23:??",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1278366.1278372",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Publicly accessible adaptive systems such as
                 collaborative recommender systems present a security
                 problem. Attackers, who cannot be readily distinguished
                 from ordinary users, may inject biased profiles in an
                 attempt to force a system to ``adapt'' in a manner
                 advantageous to them. Such attacks may lead to a
                 degradation of user trust in the objectivity and
                 accuracy of the system. Recent research has begun to
                 examine the vulnerabilities and robustness of different
                 collaborative recommendation techniques in the face of
                 ``profile injection'' attacks. In this article, we
                 outline some of the major issues in building secure
                 recommender systems, concentrating in particular on the
                 modeling of attacks and their impact on various
                 recommendation algorithms. We introduce several new
                 attack models and perform extensive simulation-based
                 evaluations to show which attacks are most successful
                 and practical against common recommendation techniques.
                 Our study shows that both user-based and item-based
                 algorithms are highly vulnerable to specific attack
                 models, but that hybrid algorithms may provide a higher
                 degree of robustness. Using our formal characterization
                 of attack models, we also introduce a novel
                 classification-based approach for detecting attack
                 profiles and evaluate its effectiveness in neutralizing
                 attacks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "attack detection; collaborative filtering; profile
                 injection attacks; recommender systems; shilling",
}

@Article{Medjahed:2007:ISI,
  author =       "Brahim Medjahed and Athman Bouguettaya and Boualem
                 Benatallah",
  title =        "Introduction to special issue on semantic {Web}
                 services",
  journal =      j-TOIT,
  volume =       "8",
  number =       "1",
  pages =        "1:1--1:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1294148.1294149",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Toch:2007:SAA,
  author =       "Eran Toch and Avigdor Gal and Iris Reinhartz-Berger
                 and Dov Dori",
  title =        "A semantic approach to approximate service retrieval",
  journal =      j-TOIT,
  volume =       "8",
  number =       "1",
  pages =        "2:1--2:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1294148.1294150",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Web service discovery is one of the main applications
                 of semantic Web services, which extend standard Web
                 services with semantic annotations. Current discovery
                 solutions were developed in the context of automatic
                 service composition. Thus, the ``client'' of the
                 discovery procedure is an automated computer program
                 rather than a human, with little, if any, tolerance to
                 inexact results. However, in the real world, services
                 which might be semantically distanced from each other
                 are glued together using manual coding. In this
                 article, we propose a new retrieval model for semantic
                 Web services, with the objective of simplifying service
                 discovery for human users. The model relies on simple
                 and extensible keyword-based query language and enables
                 efficient retrieval of approximate results, including
                 approximate service compositions. Since representing
                 all possible compositions and all approximate concept
                 references can result in an exponentially-sized index,
                 we investigate clustering methods to provide a scalable
                 mechanism for service indexing. Results of experiments,
                 designed to evaluate our indexing and query methods,
                 show that satisfactory approximate search is feasible
                 with efficient processing time.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "ontology; Semantic Web; service retrieval; Web
                 service",
}

@Article{Brambilla:2007:MDD,
  author =       "Marco Brambilla and Stefano Ceri and Federico Michele
                 Facca and Irene Celino and Dario Cerizza and Emanuele
                 Della Valle",
  title =        "Model-driven design and development of semantic {Web}
                 service applications",
  journal =      j-TOIT,
  volume =       "8",
  number =       "1",
  pages =        "3:1--3:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1294148.1294151",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article proposes a model-driven methodology to
                 design and develop semantic Web service applications
                 and their components, described according to the
                 emerging WSMO standard. In particular, we show that
                 business processes and Web engineering models have
                 sufficient expressive power to support the
                 semiautomatic extraction of semantic descriptions
                 (i.e., WSMO ontologies, goals, Web services, and
                 mediators), thus partially hiding the complexity of
                 dealing with semantics. Our method is based on existing
                 models for the specification of business processes
                 (BPMN) combined with Web engineering models for
                 designing and developing semantically rich Web
                 applications (WebML). The proposed approach leads from
                 an abstract view of the business needs to a concrete
                 implementation of the application by means of several
                 design steps; high-level models are transformed into
                 software components. Our framework increases the
                 efficiency of the whole design process, yielding to the
                 construction of semantic Web service applications
                 spanning over several enterprises.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Semantic Web service; WebML; WSMO",
}

@Article{Mrissa:2007:CBM,
  author =       "Michael Mrissa and Chirine Ghedira and Djamal
                 Benslimane and Zakaria Maamar and Florian Rosenberg and
                 Schahram Dustdar",
  title =        "A context-based mediation approach to compose semantic
                 {Web} services",
  journal =      j-TOIT,
  volume =       "8",
  number =       "1",
  pages =        "4:1--4:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1294148.1294152",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Web services composition is a keystone in the
                 development of interoperable systems. However, despite
                 the widespread adoption of Web services, several
                 obstacles still hinder their smooth automatic semantic
                 reconciliation when being composed. Consistent
                 understanding of data exchanged between composed Web
                 services is hampered by various implicit modeling
                 assumptions and representations. Our contribution in
                 this article revolves around context and how it
                 enriches data exchange between Web services. In
                 particular, a context-based mediation approach to solve
                 semantic heterogeneities between composed Web services
                 is presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "composition; context; mediation; semantics; Web
                 services",
}

@Article{Shehab:2007:WSD,
  author =       "Mohamed Shehab and Kamal Bhattacharya and Arif
                 Ghafoor",
  title =        "{Web} services discovery in secure collaboration
                 environments",
  journal =      j-TOIT,
  volume =       "8",
  number =       "1",
  pages =        "5:1--5:??",
  month =        nov,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1294148.1294153",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:58:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Multidomain application environments where distributed
                 domains interoperate with each other is a reality in
                 Web-services-based infrastructures. Collaboration
                 enables domains to effectively share resources;
                 however, it introduces several security and privacy
                 challenges. In this article, we use the current web
                 service standards such as SOAP and UDDI to enable
                 secure interoperability in a service-oriented
                 mediator-free environment. We propose a multihop SOAP
                 messaging protocol that enables domains to discover
                 secure access paths to access roles in different
                 domains. Then we propose a path authentication
                 mechanism based on the encapsulation of SOAP messages
                 and the SOAP-DISG standard. Furthermore, we provide a
                 service discovery protocol that enables domains to
                 discover service descriptions stored in private UDDI
                 registries.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "encapsulated SOAP; private UDDI registries; protocols;
                 secure access paths; secure collaboration; services",
}

@Article{Li:2008:ISI,
  author =       "Qing Li and Rynson W. H. Lau and Timothy Shih and
                 Dennis McLeod",
  title =        "Introduction to special issue {Internet} technologies
                 for distance education",
  journal =      j-TOIT,
  volume =       "8",
  number =       "2",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1323651.1323652",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Tu:2008:NLA,
  author =       "Xuping Tu and Hai Jin and Xiaofei Liao and Jiannong
                 Cao",
  title =        "Nearcast: a locality-aware {P2P} live streaming
                 approach for distance education",
  journal =      j-TOIT,
  volume =       "8",
  number =       "2",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1323651.1323653",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Peer-to-peer (P2P) live video streaming has been
                 widely used in distance education applications to
                 deliver the captured video courses to a large number of
                 online students. By allowing peers serving each other
                 in the network, P2P technology overcomes many
                 limitations in the traditional client-server paradigm
                 to achieve user and bandwidth scalabilities. However,
                 existing systems do not perform well when the number of
                 online students increases, and the system performance
                 degrades seriously. One of the reasons is that the
                 construction of the peer overlay in existing P2P
                 systems has not considered the underlying physical
                 network topology and can cause serious topology
                 mismatch between the P2P overlay network and the
                 physical network. The topology mismatch problem brings
                 great link stress (unnecessary traffic) in the Internet
                 infrastructure and greatly degrades the system
                 performance. In this article, we address this problem
                 and propose a locality-aware P2P overlay construction
                 method, called Nearcast, which builds an efficient
                 overlay multicast tree by letting each peer node choose
                 physically closer nodes as its logical children.\par

                 We have conducted extensive simulations to evaluate the
                 performance of Nearcast in comparison with the existing
                 RTT and NICE protocols. Also, Nearcast has been
                 deployed on a wide-area network testbed to delivery
                 video coursed to about 7200 users distributed across
                 100 collages in 32 cities in China. The experimental
                 results show that Nearcast leads to lower link stress
                 and shorter end-to-end latencies compared with the RTT
                 and NICE protocols.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "distance education; live streaming; peer-to-peer;
                 video",
}

@Article{Dolog:2008:PAL,
  author =       "Peter Dolog and Bernd Simon and Wolfgang Nejdl and
                 Toma{\v{z}} Klobu{\v{c}}ar",
  title =        "Personalizing access to learning networks",
  journal =      j-TOIT,
  volume =       "8",
  number =       "2",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1323651.1323654",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we describe a Smart Space for
                 Learning\TM{} (SS4L) framework and infrastructure that
                 enables personalized access to distributed
                 heterogeneous knowledge repositories. Helping a learner
                 to choose an appropriate learning resource or activity
                 is a key problem which we address in this framework,
                 enabling personalized access to federated learning
                 repositories with a vast number of learning offers. Our
                 infrastructure includes personalization strategies both
                 at the query and the query results level. Query
                 rewriting is based on learning and language
                 preferences; rule-based and ranking-based
                 personalization improves these results further.
                 Rule-based reasoning techniques are supported by formal
                 ontologies we have developed based on standard
                 information models for learning domains; ranking-based
                 recommendations are supported through ensuring minimal
                 sets of predicates appearing in query results. Our
                 evaluation studies show that the implemented solution
                 enables learners to find relevant learning resources in
                 a distributed environment and through goal-based
                 personalization improves relevancy of results.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "learning networks; ontologies; personalization;
                 personalized access; semantic Web",
}

@Article{Salomoni:2008:MBS,
  author =       "Paola Salomoni and Silvia Mirri and Stefano Ferretti
                 and Marco Roccetti",
  title =        "A multimedia broker to support accessible and mobile
                 learning through learning objects adaptation",
  journal =      j-TOIT,
  volume =       "8",
  number =       "2",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1323651.1323655",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The large diffusion of e-learning technologies
                 represents a great opportunity for underserved segments
                 of population. This is particularly true for people
                 with disabilities for whom digital barriers should be
                 overstepped with the aim of reengaging them back into
                 society to education. In essence, before a mass of
                 learners can be engaged in a collective educational
                 process, each single member should be put in the
                 position to enjoy accessible and customized educational
                 experiences, regardless of the wide diversity of their
                 personal characteristics and technological equipment.
                 To respond to this demand, we developed LOT (Learning
                 Object Transcoder), a distributed PHP-based
                 service-oriented system designed to deliver flexible
                 and customized educational services for a multitude of
                 learners, each with his/her own diverse preferences and
                 needs. The main novelty of LOT amounts to a broking
                 service able to manage the transcoding activities
                 needed to convert multimedia digital material into the
                 form which better fits a given student profile.
                 Transcoding activities are performed based on the use
                 of Web service technologies. Experimental results
                 gathered from several field trials with LOT (available
                 online at \path=http://137.204.74.83/~lot/=) have
                 confirmed the viability of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "accessibility; content transcoding; device profiling;
                 e-learning; mobile-learning; multimedia adaptation;
                 user profiling",
}

@Article{Li:2008:TSD,
  author =       "Qing Li and Rynson W. H. Lau and Timothy K. Shih and
                 Frederick W. B. Li",
  title =        "Technology supports for distributed and collaborative
                 learning over the {Internet}",
  journal =      j-TOIT,
  volume =       "8",
  number =       "2",
  pages =        "5:1--5:??",
  month =        feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1323651.1323656",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "With the advent of Internet and World Wide Web (WWW)
                 technologies, distance education (e-learning or
                 Web-based learning) has enabled a new era of education.
                 There are a number of issues that have significant
                 impact on distance education, including those from
                 educational, sociological, and psychological
                 perspectives. Rather than attempting to cover
                 exhaustively all the related perspectives, in this
                 survey article, we focus on the technological issues. A
                 number of technology issues are discussed, including
                 distributed learning, collaborative learning,
                 distributed content management, mobile and situated
                 learning, and multimodal interaction and augmented
                 devices for e-learning. Although we have tried to
                 include the state-of-the-art technologies and systems
                 here, it is anticipated that many new ones will emerge
                 in the near future. As such, we point out several
                 emerging issues and technologies that we believe are
                 promising, for the purpose of highlighting important
                 directions for future research.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "collaborative learning; distance learning
                 technologies; distributed content management;
                 distributed learning",
}

@Article{Mahmoud:2008:GES,
  author =       "Qusay H. Mahmoud and Peter Langendoerfer",
  title =        "Guest editorial: {Service-oriented} computing",
  journal =      j-TOIT,
  volume =       "8",
  number =       "3",
  pages =        "11:1--11:??",
  month =        may,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1361186.1361187",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{VanEngelen:2008:FSO,
  author =       "Robert A. {Van Engelen}",
  title =        "A framework for service-oriented computing with {C}
                 and {C++ Web} service components",
  journal =      j-TOIT,
  volume =       "8",
  number =       "3",
  pages =        "12:1--12:??",
  month =        may,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1361186.1361188",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Service-oriented architectures use loosely coupled
                 software services to support the requirements of
                 business processes and software users. Several software
                 engineering challenges have to be overcome to expose
                 legacy C and C++ applications and specialized system
                 resources as XML-based software services. It is
                 critical to devise effective bindings between XML and
                 C/C++ data to efficiently interoperate with other
                 XML-based services. Binding application data to XML has
                 many software solutions, ranging from generic document
                 object models to idiosyncratic type mappings. A safe
                 binding must conform to XML validation constraints,
                 guarantee type safety, and should preserve the
                 structural integrity of communicated application data.
                 However, tight XML bindings impose mapping constraints
                 that can hamper interoperability between services. This
                 paper presents a framework for constructing loosely
                 coupled C/C++ services based on a programming model
                 that integrates XML bindings into the C and C++ syntax.
                 The concepts behind the bindings are generic, which
                 makes the approach applicable to other programming
                 languages.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "service-oriented computing; Web services standards",
}

@Article{vanderAalst:2008:CCS,
  author =       "Wil M. P. van der Aalst and Marlon Dumas and Chun
                 Ouyang and Anne Rozinat and Eric Verbeek",
  title =        "Conformance checking of service behavior",
  journal =      j-TOIT,
  volume =       "8",
  number =       "3",
  pages =        "13:1--13:??",
  month =        may,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1361186.1361189",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "A service-oriented system is composed of independent
                 software units, namely services, that interact with one
                 another exclusively through message exchanges. The
                 proper functioning of such system depends on whether or
                 not each individual service behaves as the other
                 services expect it to behave. Since services may be
                 developed and operated independently, it is unrealistic
                 to assume that this is always the case. This article
                 addresses the problem of checking and quantifying how
                 much the actual behavior of a service, as recorded in
                 message logs, conforms to the expected behavior as
                 specified in a process model. We consider the case
                 where the expected behavior is defined using the BPEL
                 industry standard (Business Process Execution Language
                 for Web Services). BPEL process definitions are
                 translated into Petri nets and Petri net-based
                 conformance checking techniques are applied to derive
                 two complementary indicators of conformance: fitness
                 and appropriateness. The approach has been implemented
                 in a toolset for business process analysis and mining,
                 namely ProM, and has been tested in an environment
                 comprising multiple Oracle BPEL servers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "BPEL; conformance; Petri nets; ProM; Web services",
}

@Article{Jin:2008:QAS,
  author =       "Jingwen Jin and Klara Nahrstedt",
  title =        "{QoS}-aware service management for component-based
                 distributed applications",
  journal =      j-TOIT,
  volume =       "8",
  number =       "3",
  pages =        "14:1--14:??",
  month =        may,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1361186.1361190",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Component-based software development has evolved from
                 a tightly coupled style to a loosely coupled style in
                 the recent few years. The paradigm shift will
                 eventually allow heterogeneous systems to interoperate
                 in open networks such as the Internet and will make
                 software development more of a management task than a
                 development task. Envisioning that future applications
                 may comprise dynamically aggregated component services
                 possibly distributed widely, we develop a Quality of
                 Service (QoS)-aware service management framework in the
                 middleware layer to make the component services
                 infrastructure transparent to the applications.
                 Specifically, we manage services not only as
                 individuals, but more importantly as meaningful
                 aggregated entities based on the logical compositional
                 needs coming from the applications, by composing
                 services properly according to QoS requirements at
                 application setup time, and performing continuous
                 maintenance at application runtime seamlessly. Our
                 service management framework is scalable in two
                 dimensions: network size and application's client
                 population size. Specifically, the framework employs a
                 decentralized management solution that scales to large
                 network size, and explores resource sharing in
                 one-to-many group-based applications by means of
                 multicasting mechanisms. Moreover, it incorporates
                 local adaptation operations and distributed failure
                 detection, reporting, and recovery mechanisms to deal
                 with runtime resource fluctuations and failures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "application-level routing; fault tolerance; multicast;
                 overlay networks; QoS; Service composition; service
                 management; SOA",
}

@Article{Zdun:2008:PBD,
  author =       "Uwe Zdun",
  title =        "Pattern-based design of a service-oriented middleware
                 for remote object federations",
  journal =      j-TOIT,
  volume =       "8",
  number =       "3",
  pages =        "15:1--15:??",
  month =        may,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1361186.1361191",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Jun 16 10:59:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Service-oriented middleware architectures should
                 enable the rapid realization of loosely coupled
                 services. Unfortunately, existing technologies used for
                 service-oriented middleware architectures, such as Web
                 services, P2P systems, coordination and cooperation
                 technologies, and spontaneous networking, do not fully
                 support all requirements in the realm of loosely
                 coupled business services yet. Typical problems that
                 arise in many business domains are for instance missing
                 central control, complex cooperation models, complex
                 lookup models, or issues regarding dynamic deployment.
                 We used a pattern-based approach to identify the well
                 working solutions in the different technologies for
                 loosely coupled services. Then we reused this design
                 knowledge in our concept for a service-oriented
                 middleware. This concept is centered around a
                 controlled environment, called a federation. Each
                 remote object (a peer service) is controlled in one or
                 more federations, but within this environment peers can
                 collaborate in a simple-to-use, loosely coupled, and ad
                 hoc style of communication. A semantic lookup service
                 is used to let the peers publish rich metadata about
                 themselves to their fellow peers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "middleware; Service-oriented Architecture; software
                 patterns",
}

@Article{Herzberg:2008:SII,
  author =       "Amir Herzberg and Ahmad Jbara",
  title =        "Security and identification indicators for browsers
                 against spoofing and phishing attacks",
  journal =      j-TOIT,
  volume =       "8",
  number =       "4",
  pages =        "16:1--16:??",
  month =        sep,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1391949.1391950",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 1 16:09:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In spite of the use of standard Web security measures
                 (SSL/TLS), users enter sensitive information such as
                 passwords into fake Web sites. Such fake sites cause
                 substantial damages to individuals and corporations. In
                 this work, we identify several vulnerabilities of
                 browsers, focusing on security and identification
                 indicators.\par

                 We present improved security and identification
                 indicators, as we implemented in TrustBar, a browser
                 extension we developed. With TrustBar, users can assign
                 a name or logo to identify SSL/TLS-protected sites; if
                 users did not assign a name or logo, TrustBar
                 identifies protected sites by the name or logo of the
                 site, and by the certificate authority (CA) who
                 identified the site.\par

                 We present usability experiments which compared
                 TrustBar's indicators to the basic indicators available
                 in most browsers (padlock, URL, and https prefix), and
                 some relevant secure-usability principles.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "human-computer interaction; phishing; secure
                 usability; Web spoofing",
}

@Article{Gupta:2008:SAI,
  author =       "Manish Gupta and Shamik Banerjee and Manish Agrawal
                 and H. Raghav Rao",
  title =        "Security analysis of {Internet} technology components
                 enabling globally distributed workplaces --- a
                 framework",
  journal =      j-TOIT,
  volume =       "8",
  number =       "4",
  pages =        "17:1--17:??",
  month =        sep,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1391949.1391951",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 1 16:09:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "As organizations increasingly operate, compete, and
                 cooperate in a global context, business processes are
                 also becoming global to propagate the benefits from
                 coordination and standardization across geographical
                 boundaries. In this context, security has gained
                 significance due to increased threats, as well as
                 legislation and compliance issues. This article
                 presents a framework for assessing the security of
                 Internet technology components that support a globally
                 distributed workplace. Four distinct information flow
                 and design architectures are identified based on
                 location sensitivities and placements of the
                 infrastructure components. Using a combination of
                 scenarios, architectures, and technologies, the article
                 presents the framework of a development tool for
                 information security officers to evaluate the security
                 posture of an information system. To aid managers in
                 better understanding their options to improve security
                 of the system, we also propose a three-dimensional
                 representation, based on the framework, for embedding
                 solution alternatives. To demonstrate its use in a
                 real-world context, the article also applies the
                 framework to assess a globally distributed workforce
                 application at a northeast financial institution.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "globally distributed workforce; Internet applications;
                 risk management; security analysis",
}

@Article{Albrecht:2008:DIT,
  author =       "Jeannie Albrecht and David Oppenheimer and Amin Vahdat
                 and David A. Patterson",
  title =        "Design and implementation trade-offs for wide-area
                 resource discovery",
  journal =      j-TOIT,
  volume =       "8",
  number =       "4",
  pages =        "18:1--18:??",
  month =        sep,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1391949.1391952",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 1 16:09:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We describe the design and implementation of SWORD, a
                 scalable resource discovery service for wide-area
                 distributed systems. In contrast to previous systems,
                 SWORD allows users to describe desired resources as a
                 topology of interconnected groups with required
                 intragroup, intergroup, and per-node characteristics,
                 along with the utility that the application derives
                 from specified ranges of metric values. This design
                 gives users the flexibility to find geographically
                 distributed resources for applications that are
                 sensitive to both node and network characteristics, and
                 allows the system to rank acceptable configurations
                 based on their quality for that application.\par

                 Rather than evaluating a single implementation of
                 SWORD, we explore a variety of architectural designs
                 that deliver the required functionality in a scalable
                 and highly available manner. We discuss the trade-offs
                 of using a centralized architecture as compared to a
                 fully decentralized design to perform wide-area
                 resource discovery. To summarize our results, we found
                 that a centralized architecture based on 4-node server
                 cluster sites at network-peering facilities outperforms
                 a decentralized DHT-based resource discovery
                 infrastructure with respect to query latency for all
                 but the smallest number of sites. However, although a
                 centralized architecture shows significant promise in
                 stable environments, we find that our decentralized
                 implementation has acceptable performance and also
                 benefits from the DHT's self-healing properties in more
                 volatile environments. We evaluate the advantages and
                 disadvantages of centralized and distributed resource
                 discovery architectures on 1000 hosts in emulation and
                 on approximately 200 PlanetLab nodes spread across the
                 Internet.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "PlanetLab; resource discovery",
}

@Article{Brogi:2008:SBC,
  author =       "Antonio Brogi and Sara Corfini and Razvan Popescu",
  title =        "Semantics-based composition-oriented discovery of
                 {Web} services",
  journal =      j-TOIT,
  volume =       "8",
  number =       "4",
  pages =        "19:1--19:??",
  month =        sep,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1391949.1391953",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 1 16:09:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Service discovery and service aggregation are two
                 crucial issues in the emerging area of service-oriented
                 computing (SOC). We propose a new technique for the
                 discovery of (Web) services that accounts for the need
                 of composing several services to satisfy a client
                 query. The proposed algorithm makes use of OWL-S
                 ontologies, and explicitly returns the sequence of
                 atomic process invocations that the client must perform
                 in order to achieve the desired result. When no full
                 match is possible, the algorithm features a flexible
                 matching by returning partial matches and by suggesting
                 additional inputs that would produce a full match.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "matchmaking algorithms; OWL-S ontologies; Web service
                 composition; Web service discovery",
}

@Article{Zhuge:2008:RSM,
  author =       "Hai Zhuge and Yunpeng Xing and Peng Shi",
  title =        "Resource space model, {OWL} and database: {Mapping}
                 and integration",
  journal =      j-TOIT,
  volume =       "8",
  number =       "4",
  pages =        "20:1--20:??",
  month =        sep,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1391949.1391954",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 1 16:09:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Semantics exhibits diversity in the real world, mental
                 abstraction world, document world, and machine world.
                 Studying mappings between different forms of semantics
                 helps unveil the uniformity in the diversity. This
                 article investigates the mappings between three typical
                 semantic models: the Web ontology language (OWL),
                 relational database model, and resource space model (a
                 classification-based semantic model). By establishing
                 mappings between the semantic primitives of the three
                 models, we study the mapping from OWL description onto
                 resource space and analyze the normal forms of the
                 generated resource space. Mapping back from resource
                 space onto OWL description is then discussed. Further,
                 we investigate the mapping between OWL description and
                 relational database, as well as the mapping between
                 relational database and resource space. Normal forms of
                 the generated relational tables are analyzed. To
                 support advanced applications on the future Web, we
                 suggest integrating the resource space, OWL, and
                 databases to form a powerful semantic platform that
                 enables different semantic models to enhance each
                 other.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "integration; mapping; relational database model;
                 resource space model; semantic link network; Semantic
                 Web; Web ontology language",
}

@Article{Xue:2008:IWS,
  author =       "Xiao-Bing Xue and Zhi-Hua Zhou and Zhongfei (Mark)
                 Zhang",
  title =        "Improving {Web} search using image snippets",
  journal =      j-TOIT,
  volume =       "8",
  number =       "4",
  pages =        "21:1--21:??",
  month =        sep,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1391949.1391955",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 1 16:09:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Web has become the largest information repository
                 in the world; thus, effectively and efficiently
                 searching the Web becomes a key challenge. Interactive
                 Web search divides the search process into several
                 rounds, and for each round the search engine interacts
                 with the user for more knowledge of the user's
                 information requirement. Previous research mainly uses
                 the text information on Web pages, while little
                 attention is paid to other modalities. This article
                 shows that Web search performance can be significantly
                 improved if imagery is considered in interactive Web
                 search. Compared with text, imagery has its own
                 advantage: the time for ``reading'' an image is as
                 little as that for reading one or two words, while the
                 information brought by an image is as much as that
                 conveyed by a whole passage of text. In order to
                 exploit the advantages of imagery, a novel interactive
                 Web search framework is proposed, where {\em image
                 snippets\/} are first extracted from Web pages and then
                 provided, along with the text snippets, to the user for
                 result presentation and relevance feedback, as well as
                 being presented alone to the user for image suggestion.
                 User studies show that it is more convenient for the
                 user to identify the Web pages he or she expects and to
                 reformulate the initial query. Further experiments
                 demonstrate the promise of introducing multimodal
                 techniques into the proposed interactive Web search
                 framework.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "image snippet; image suggestion; interactive Web
                 search; multimodality; relevance feedback; term
                 suggestion",
}

@Article{Urgaonkar:2009:ROA,
  author =       "Bhuvan Urgaonkar and Prashant Shenoy and Timothy
                 Roscoe",
  title =        "Resource overbooking and application profiling in a
                 shared {Internet} hosting platform",
  journal =      j-TOIT,
  volume =       "9",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1462159.1462160",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Feb 19 14:20:34 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we present techniques for
                 provisioning CPU and network resources in shared
                 Internet hosting platforms running potentially
                 antagonistic third-party applications. The primary
                 contribution of our work is to demonstrate the
                 feasibility and benefits of overbooking resources in
                 shared Internet platforms. Since an accurate estimate
                 of an application's resource needs is necessary when
                 overbooking resources, we present techniques to profile
                 applications on dedicated nodes, possibly while in
                 service, and use these profiles to guide the placement
                 of application components onto shared nodes. We then
                 propose techniques to overbook cluster resources in a
                 controlled fashion. We outline an empirical approach to
                 determine the degree of overbooking that allows a
                 platform to achieve improvements in revenue while
                 providing performance guarantees to Internet
                 applications. We show how our techniques can be
                 combined with commonly used QoS resource allocation
                 mechanisms to provide application isolation and
                 performance guarantees at run-time. We implement our
                 techniques in a Linux cluster and evaluate them using
                 common server applications. We find that the efficiency
                 (and consequently revenue) benefits from controlled
                 overbooking of resources can be dramatic. Specifically,
                 we find that overbooking resources by as little as 1\%
                 we can increase the utilization of the cluster by a
                 factor of two, and a 5\% overbooking yields a
                 300--500\% improvement, while still providing useful
                 resource guarantees to applications.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "capsule; dedicated hosting platform; high percentile;
                 Internet application; placement; profile;
                 quality-of-service; resource overbooking; shared
                 hosting platform; yield management",
}

@Article{Stein:2009:FPW,
  author =       "Sebastian Stein and Terry R. Payne and Nicholas R.
                 Jennings",
  title =        "Flexible provisioning of {Web} service workflows",
  journal =      j-TOIT,
  volume =       "9",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1462159.1462161",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Feb 19 14:20:34 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Web services promise to revolutionize the way
                 computational resources and business processes are
                 offered and invoked in open, distributed systems, such
                 as the Internet. These services are described using
                 machine-readable metadata, which enables consumer
                 applications to automatically discover and provision
                 suitable services for their workflows at run-time.
                 However, current approaches have typically assumed
                 service descriptions are accurate and deterministic,
                 and so have neglected to account for the fact that
                 services in these open systems are inherently
                 unreliable and uncertain. Specifically, network
                 failures, software bugs and competition for services
                 may regularly lead to execution delays or even service
                 failures. To address this problem, the process of
                 provisioning services needs to be performed in a more
                 flexible manner than has so far been considered, in
                 order to proactively deal with failures and to recover
                 workflows that have partially failed. To this end, we
                 devise and present a heuristic strategy that varies the
                 provisioning of services according to their predicted
                 performance. Using simulation, we then benchmark our
                 algorithm and show that it leads to a 700\% improvement
                 in average utility, while successfully completing up to
                 eight times as many workflows as approaches that do not
                 consider service failures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "semantic Web services; service composition; service
                 provisioning; service-oriented computing; Web services;
                 workflows",
}

@Article{Groth:2009:MPD,
  author =       "Paul Groth and Simon Miles and Luc Moreau",
  title =        "A model of process documentation to determine
                 provenance in mash-ups",
  journal =      j-TOIT,
  volume =       "9",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1462159.1462162",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Feb 19 14:20:34 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Through technologies such as RSS (Really Simple
                 Syndication), Web Services, and AJAX (Asynchronous
                 JavaScript and XML), the Internet has facilitated the
                 emergence of applications that are composed from a
                 variety of services and data sources. Through tools
                 such as Yahoo Pipes, these ``mash-ups'' can be composed
                 in a dynamic, just-in-time manner from components
                 provided by multiple institutions (i.e., Google,
                 Amazon, your neighbor). However, when using these
                 applications, it is not apparent where data comes from
                 or how it is processed. Thus, to inspire trust and
                 confidence in mash-ups, it is critical to be able to
                 analyze their processes after the fact. These {\em
                 trailing analyses}, in particular the determination of
                 the provenance of a result (i.e., the process that led
                 to it), are enabled by {\em process documentation},
                 which is documentation of an application's past process
                 created by the components of that application at
                 execution time. In this article, we define a generic
                 conceptual data model that supports the autonomous
                 creation of attributable, factual process documentation
                 for dynamic multi-institutional applications. The data
                 model is instantiated using two Internet formats, OWL
                 and XML, and is evaluated with respect to questions
                 about the provenance of results generated by a complex
                 bioinformatics mash-up.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "concept maps; data model; mash-ups; Process; process
                 documentation; provenance",
}

@Article{Ruffo:2009:PPR,
  author =       "Giancarlo Ruffo and Rossano Schifanella",
  title =        "A peer-to-peer recommender system based on spontaneous
                 affinities",
  journal =      j-TOIT,
  volume =       "9",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1462159.1462163",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Feb 19 14:20:34 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Network analysis has proved to be very useful in many
                 social and natural sciences, and in particular Small
                 World topologies have been exploited in many
                 application fields. In this article, we focus on P2P
                 file sharing applications, where spontaneous
                 communities of users are studied and analyzed. We
                 define a family of structures that we call ``Affinity
                 Networks'' (or even Graphs) that show self-organized
                 interest-based clusters. Empirical evidence proves that
                 affinity networks are small worlds and shows scale-free
                 features. The relevance of this finding is augmented
                 with the introduction of a proactive recommendation
                 scheme, namely {\em DeHinter}, that exploits this
                 natural feature. The intuition behind this scheme is
                 that a user would trust her network of ``elective
                 affinities'' more than anonymous and generic
                 suggestions made by impersonal entities. The accuracy
                 of the recommendation is evaluated by way of a 10-fold
                 cross validation, and a prototype has been implemented
                 for further feedbacks from the users.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "complex networks; file sharing systems; Peer-to-Peer;
                 recommender system; social networks",
}

@Article{Jordan:2009:IIA,
  author =       "Scott Jordan",
  title =        "Implications of {Internet} architecture on net
                 neutrality",
  journal =      j-TOIT,
  volume =       "9",
  number =       "2",
  pages =        "5:1--5:??",
  month =        may,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1516539.1516540",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu May 7 15:04:10 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Net neutrality represents the idea that Internet users
                 are entitled to service that does not discriminate on
                 the basis of source, destination, or ownership of
                 Internet traffic. The United States Congress is
                 considering legislation on net neutrality, and debate
                 over the issue has generated intense lobbying.
                 Congressional action will substantially affect the
                 evolution of the Internet and of future Internet
                 research. In this article, we argue that neither the
                 pro nor anti net neutrality positions are consistent
                 with the philosophy of Internet architecture. We
                 develop a net neutrality policy founded on a
                 segmentation of Internet services into infrastructure
                 services and application services, based on the
                 Internet's layered architecture. Our net neutrality
                 policy restricts an Internet service Provider's ability
                 to engage in anticompetitive behavior while
                 simultaneously ensuring that it can use desirable forms
                 of network management. We illustrate the effect of this
                 policy by discussing acceptable and unacceptable uses
                 of network management.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ehrenkranz:2009:SIS,
  author =       "Toby Ehrenkranz and Jun Li",
  title =        "On the state of {IP} spoofing defense",
  journal =      j-TOIT,
  volume =       "9",
  number =       "2",
  pages =        "6:1--6:??",
  month =        may,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1516539.1516541",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu May 7 15:04:10 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "IP source address spoofing has plagued the Internet
                 for many years. Attackers spoof source addresses to
                 mount attacks and redirect blame. Researchers have
                 proposed many mechanisms to defend against spoofing,
                 with varying levels of success. With the defense
                 mechanisms available today, where do we stand? How do
                 the various defense mechanisms compare? This article
                 first looks into the current state of IP spoofing, then
                 thoroughly surveys the current state of IP spoofing
                 defense. It evaluates data from the Spoofer Project,
                 and describes and analyzes host-based defense methods,
                 router-based defense methods, and their combinations.
                 It further analyzes what obstacles stand in the way of
                 deploying those modern solutions and what areas require
                 further research.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "IP spoofing; packet filtering; spoofing defense;
                 spoofing packet",
}

@Article{Fazzinga:2009:RXD,
  author =       "Bettina Fazzinga and Sergio Flesca and Andrea
                 Pugliese",
  title =        "Retrieving {XML} data from heterogeneous sources
                 through vague querying",
  journal =      j-TOIT,
  volume =       "9",
  number =       "2",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1516539.1516542",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu May 7 15:04:10 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We propose a framework for querying heterogeneous XML
                 data sources. The framework ensures high autonomy to
                 participating sources as it does not rely on a global
                 schema or on semantic mappings between schemas. The
                 basic intuition is that of extending traditional
                 approaches for approximate query evaluation, by
                 providing techniques for combining partial answers
                 coming from different sources, possibly on the basis of
                 limited knowledge about the local schemas (i.e., key
                 constraints). We define a query language and its
                 associated semantics, that allows us to collect as much
                 information as possible from several heterogeneous XML
                 sources. We provide algorithms for query evaluation and
                 characterize the complexity of the query language.
                 Finally, we validate the approach in a medical
                 application scenario.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "heterogeneous databases; querying; XML",
}

@Article{Gelenbe:2009:ASN,
  author =       "Erol Gelenbe",
  title =        "Analysis of single and networked auctions",
  journal =      j-TOIT,
  volume =       "9",
  number =       "2",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1516539.1516543",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu May 7 15:04:10 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Web-based computerized auctions are increasingly
                 present in the Internet. We can imagine that in the
                 future this trend will actually be extended to
                 situations where virtual buyer and seller agents will
                 conduct automated transactions across the network, and
                 that large sectors of the economy may be structured in
                 this manner. The purpose of this article is to model
                 automated bidders and sellers which interact through a
                 network. We model the bidding process as a random
                 arrival process while the price attained by a good is
                 modeled as a discrete random variable. We obtain
                 analytical solutions allowing us to compute the income
                 from a single auction, or the income per unit time from
                 a repeated sequence of auctions. A variety of
                 single-auction models are studied, including English
                 and Vickrey auctions, and the income per unit time is
                 derived as a function of other parameters, including
                 the rate of arrival of bids, the seller's decision
                 time, the value of the good, and the ``rest time'' of
                 the seller between successive auctions. We illustrate
                 the results via numerical examples. We also introduce a
                 model for networked auctions where bidders can
                 circulate among a set of interconnected auctions which
                 we call the Mobile Bidder Model (MBM). We obtain an
                 analytical solution for the MBM under the
                 assumption,which we call the ``active bidders
                 assumption,'' that activities that are internal to an
                 auction (bids and sales) are much more frequent than
                 changes that occur in the number of bidders at each
                 auction.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Automated auctions; Autonomic systems; E-commerce;
                 Internet technologies",
}

@Article{Li:2009:OBR,
  author =       "Xin Li and Jun Yan and Weiguo Fan and Ning Liu and
                 Shuicheng Yan and Zheng Chen",
  title =        "An online blog reading system by topic clustering and
                 personalized ranking",
  journal =      j-TOIT,
  volume =       "9",
  number =       "3",
  pages =        "9:1--9:??",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1552291.1552292",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Aug 11 19:15:17 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "There is an increasing number of people reading,
                 writing, and commenting on blogs. According to a recent
                 survey made by Technorati, there are about 75,000 new
                 blogs and 1.2 million new posts everyday. However, it
                 is difficult and time consuming for a blog reader to
                 find the most interesting posts in the huge and dynamic
                 blog world. In this article, an online Personalized
                 Blog Reader (PBR) system is proposed, which facilitates
                 blog readers in browsing the coolest and newest blog
                 posts of their interests by automatically clustering
                 the most relevant stories. PBR aims to make a user's
                 potential favorite topics always ranked higher than
                 those nonfavorite ones. This is accomplished in the
                 following steps. First, the system collects and
                 provides a unified incremental index of posts coming
                 from different blogs. Then, an incremental clustering
                 algorithm with a flexible half-bounded window of
                 observation is proposed to satisfy the requirements of
                 online processing. It learns people's personalized
                 reading preferences to present a user with a final
                 reading list. The experimental results show that the
                 proposed incremental clustering algorithm is effective
                 and efficient, and the personalization of the PBR
                 performs well.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Blog; connected subgraph; content information; link
                 information; personalization; ranking; story; topic",
}

@Article{Rinaldi:2009:ODA,
  author =       "Antonio M. Rinaldi",
  title =        "An ontology-driven approach for semantic information
                 retrieval on the {Web}",
  journal =      j-TOIT,
  volume =       "9",
  number =       "3",
  pages =        "10:1--10:??",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1552291.1552293",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Aug 11 19:15:17 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The concept of relevance is a hot topic in the
                 information retrieval process. In recent years the
                 extreme growth of digital documents brought to light
                 the need for novel approaches and more efficient
                 techniques to improve the accuracy of IR systems to
                 take into account real users' information needs. In
                 this article we propose a novel metric to measure the
                 semantic relatedness between words. Our approach is
                 based on ontologies represented using a general
                 knowledge base for dynamically building a semantic
                 network. This network is based on linguistic properties
                 and it is combined with our metric to create a measure
                 of semantic relatedness. In this way we obtain an
                 efficient strategy to rank digital documents from the
                 Internet according to the user's interest domain. The
                 proposed methods, metrics, and techniques are
                 implemented in a system for information retrieval on
                 the Web. Experiments are performed on a test set built
                 using a directory service having information about
                 analyzed documents. The obtained results compared to
                 other similar systems show an effective improvement.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Ontologies; semantic relatedness metrics; WordNet",
}

@Article{Platzer:2009:WSC,
  author =       "Christian Platzer and Florian Rosenberg and Schahram
                 Dustdar",
  title =        "{Web} service clustering using multidimensional angles
                 as proximity measures",
  journal =      j-TOIT,
  volume =       "9",
  number =       "3",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1552291.1552294",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Aug 11 19:15:17 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Increasingly, application developers seek the ability
                 to search for existing Web services within large
                 Internet-based repositories. The goal is to retrieve
                 services that match the user's requirements. With the
                 growing number of services in the repositories and the
                 challenges of quickly finding the right ones, the need
                 for clustering related services becomes evident to
                 enhance search engine results with a list of similar
                 services for each hit. In this article, a statistical
                 clustering approach is presented that enhances an
                 existing distributed vector space search engine for Web
                 services with the possibility of dynamically
                 calculating clusters of similar services for each hit
                 in the list found by the search engine. The focus is
                 laid on a very efficient and scalable clustering
                 implementation that can handle very large service
                 repositories. The evaluation with a large service
                 repository demonstrates the feasibility and performance
                 of the approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "clustering; discovery; search; search engines; service
                 discovery; vector space; Web service",
}

@Article{Zhou:2009:UFC,
  author =       "Duanning Zhou and Wayne Wei Huang",
  title =        "Using a fuzzy classification approach to assess
                 e-commerce {Web} sites: an empirical investigation",
  journal =      j-TOIT,
  volume =       "9",
  number =       "3",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1552291.1552295",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Aug 11 19:15:17 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "E-commerce Web site assessment helps determine whether
                 a corporation's Web site is effectively designed to
                 meet its business needs and whether the investment in
                 Web sites is well justified. Due to the complexity of
                 commercial Web sites that may include hundreds of Web
                 pages for many big corporations, there may inevitably
                 exist uncertainties when human assessors express their
                 subjective judgments in assessing e-commerce Web sites.
                 Fuzzy set theory is widely used to model uncertain and
                 imprecise information in applications. Prior studies in
                 e-commerce Web site assessment identified some key
                 factors to assess commercial Web sites by using a
                 numeric assessment scale that may not be effective and
                 efficient in modeling uncertainty. This study intends
                 to propose an e-commerce Web site assessment framework
                 using a fuzzy classification approach. Based on this
                 framework, a Web-based e-commerce assessment system was
                 designed and developed, which can provide online
                 assessment services to corporations on evaluating their
                 commercial Web sites. An empirical investigation into
                 assessing commercial Web sites of the top 120 Fortune
                 Corporations of the USA was conducted using the
                 developed online assessment system to demonstrate the
                 usefulness of the proposed framework. Research findings
                 and implications are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "E-commerce Web site assessment; e-commerce Web site
                 assessment system; fuzzy set",
}

@Article{Kwon:2009:FXD,
  author =       "Joonho Kwon and Praveen Rao and Bongki Moon and Sukho
                 Lee",
  title =        "Fast {XML} document filtering by sequencing twig
                 patterns",
  journal =      j-TOIT,
  volume =       "9",
  number =       "4",
  pages =        "13:1--13:??",
  month =        sep,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1592446.1592447",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Oct 9 20:43:32 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "XML-enabled publish-subscribe (pub-sub) systems have
                 emerged as an increasingly important tool for
                 e-commerce and Internet applications. In a typical
                 pub-sub system, subscribed users specify their
                 interests in a profile expressed in the XPath language.
                 Each new data content is then matched against the user
                 profiles so that the content is delivered only to the
                 interested subscribers. As the number of subscribed
                 users and their profiles can grow very large, the
                 scalability of the service is critical to the success
                 of pub-sub systems. In this article, we propose a novel
                 scalable filtering system called iFiST that transforms
                 user profiles of a twig pattern expressed in XPath into
                 sequences using the Pr{\"u}fer's method. Consequently,
                 instead of breaking a twig pattern into multiple linear
                 paths and matching them separately, FiST performs {\em
                 holistic matching\/} of twig patterns with each
                 incoming document in a {\em bottom-up\/} fashion. FiST
                 organizes the sequences into a dynamic hash-based index
                 for efficient filtering, and exploits the commonality
                 among user profiles to enable shared processing during
                 the filtering phase. We demonstrate that the holistic
                 matching approach reduces filtering cost and memory
                 consumption, thereby improving the scalability of
                 FiST.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Pr{\"u}fer sequences; selective dissemination of
                 information; twig pattern; XML filtering",
}

@Article{Colazzo:2009:DCS,
  author =       "Dario Colazzo and Carlo Sartiani",
  title =        "Detection of corrupted schema mappings in {XML} data
                 integration systems",
  journal =      j-TOIT,
  volume =       "9",
  number =       "4",
  pages =        "14:1--14:??",
  month =        sep,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1592446.1592448",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Oct 9 20:43:32 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In modern data integration scenarios, many remote data
                 sources are located on the Web and are accessible only
                 through forms or Web services, and no guarantee is
                 given about their stability. In these contexts the
                 detection of corrupted mappings, as a consequence of a
                 change in the source or in the target schema, is a key
                 problem. A corrupted mapping fails in matching the
                 target or the source schema, hence it is not able to
                 transform data conforming to a schema S into data
                 conforming to a schema T, nor it can be used for
                 effective query reformulation.\par

                 This article describes a novel technique for
                 maintaining schema mappings in XML data integration
                 systems, based on a notion of mapping correctness
                 relying on the denotational semantics of mappings.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "data exchange; data integration; mapping correctness;
                 p2p systems; type inference; type systems; XML",
}

@Article{Kenny:2009:CES,
  author =       "Alan Kenny and S{\'e}amus Mcloone and Tom{\'a}s Ward",
  title =        "Controlling entity state updates to maintain remote
                 consistency within a distributed interactive
                 application",
  journal =      j-TOIT,
  volume =       "9",
  number =       "4",
  pages =        "15:1--15:??",
  month =        sep,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1592446.1592449",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Oct 9 20:43:32 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "One of the ongoing challenges for Distributed
                 Interactive Applications (DIAs) is balancing the
                 quality of service delivered to the end user with the
                 operational costs involved. In particular the resultant
                 network traffic should be minimized without affecting
                 the end user experience where possible. This article
                 proposes the use of remote feedback as a method of
                 maintaining a desired consistency level within a
                 peer-to-peer DIA. Though many existing techniques
                 attempt to maintain consistency within a DIA, they
                 operate in an open-loop manner and do not take error
                 introduced into the system due to transmission delay
                 into consideration. The goal of the work presented in
                 this article is to transform this open-loop scheme into
                 a closed-loop control system utilizing feedback from
                 the remote users. By incorporating remote error into
                 the systems update paradigm, the Protocol Data Unit
                 (PDU) transmission rate can be dynamically altered to
                 reflect changing network conditions. The performance of
                 the resultant closed-loop control system is presented
                 within.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "consistency maintenance; dead reckoning; distributed
                 interactive applications (DIAs); multiplayer games;
                 prediction mechanisms; remote feedback",
}

@Article{Pitoura:2009:DFI,
  author =       "Theoni Pitoura and Peter Triantafillou",
  title =        "Distribution fairness in {Internet}-scale networks",
  journal =      j-TOIT,
  volume =       "9",
  number =       "4",
  pages =        "16:1--16:??",
  month =        sep,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1592446.1592450",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Fri Oct 9 20:43:32 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We address the issue of measuring distribution
                 fairness in Internet-scale networks. This problem has
                 several interesting instances encountered in different
                 applications, ranging from assessing the distribution
                 of load between network nodes for load balancing
                 purposes, to measuring node utilization for optimal
                 resource exploitation, and to guiding autonomous
                 decisions of nodes in networks built with market-based
                 economic principles. Although some metrics have been
                 proposed, particularly for assessing load balancing
                 algorithms, they fall short. We first study the
                 appropriateness of various known and previously
                 proposed statistical metrics for measuring distribution
                 fairness. We put forward a number of required
                 characteristics for appropriate metrics. We propose and
                 comparatively study the appropriateness of the Gini
                 coefficient ($G$) for this task. Our study reveals as
                 most appropriate the metrics of $G$, the fairness index
                 ({\em FI\/}), and the coefficient of variation ($ C_V$)
                 in this order. Second, we develop six distributed
                 sampling algorithms to estimate metrics online
                 efficiently, accurately, and scalably. One of these
                 algorithms ({\em 2-PRWS\/}) is based on two effective
                 optimizations of a basic algorithm, and the other two
                 (the sequential sampling algorithm, {\em LBS-HL}, and
                 the clustered sampling one, {\em EBSS\/}) are novel,
                 developed especially to estimate $G$. Third, we show
                 how these metrics, and especially $G$, can be readily
                 utilized online by higher-level algorithms, which can
                 now know when to best intervene to correct unfair
                 distributions (in particular, load imbalances). We
                 conclude with a comprehensive experimentation which
                 comparatively evaluates both the various proposed
                 estimation algorithms and the three most appropriate
                 metrics ($G$, $ C_V$, and $ F I$). Specifically, the
                 evaluation quantifies the efficiency (in terms of
                 number of the messages and a latency indicator),
                 precision, and accuracy achieved by the proposed
                 algorithms when estimating the competing fairness
                 metrics. The central conclusion is that the proposed
                 metric, $G$, can be estimated with a small number of
                 messages and latency, regardless of the skew of the
                 underlying distribution.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "distributed sampling; distribution fairness;
                 peer-to-peer networks; the Gini coefficient",
}

@Article{Turner:2010:MBB,
  author =       "David Michael Turner and Vassilis Prevelakis and
                 Angelos D. Keromytis",
  title =        "A market-based bandwidth charging framework",
  journal =      j-TOIT,
  volume =       "10",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Mar 15 18:33:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jha:2010:SIL,
  author =       "Somesh Jha and Stefan Katzenbeisser and Christian
                 Schallhart and Helmut Veith and Stephen Chenney",
  title =        "Semantic integrity in large-scale online simulations",
  journal =      j-TOIT,
  volume =       "10",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Mar 15 18:33:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Huang:2010:PNA,
  author =       "Tzu-Chi Huang and Sherali Zeadally and Naveen
                 Chilamkurti and Ce-Kuen Shieh",
  title =        "A programmable network address translator: {Design},
                 implementation, and performance",
  journal =      j-TOIT,
  volume =       "10",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Mar 15 18:33:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Pang:2010:PPS,
  author =       "Hweehwa Pang and Jialie Shen and Ramayya Krishnan",
  title =        "Privacy-preserving similarity-based text retrieval",
  journal =      j-TOIT,
  volume =       "10",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Mon Mar 15 18:33:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chen:2010:DVS,
  author =       "Teh-Chung Chen and Scott Dick and James Miller",
  title =        "Detecting visually similar {Web} pages: {Application}
                 to phishing detection",
  journal =      j-TOIT,
  volume =       "10",
  number =       "2",
  pages =        "5:1--5:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754393.1754394",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jun 3 13:18:07 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We propose a novel approach for detecting visual
                 similarity between two Web pages. The proposed approach
                 applies Gestalt theory and considers a Web page as a
                 single indivisible entity. The concept of supersignals,
                 as a realization of Gestalt principles, supports our
                 contention that Web pages must be treated as
                 indivisible entities. We objectify, and directly
                 compare, these indivisible supersignals using
                 algorithmic complexity theory. We illustrate our
                 approach by applying it to the problem of detecting
                 phishing scams. Via a large-scale, real-world case
                 study, we demonstrate that (1) our approach effectively
                 detects similar Web pages; and (2) it accurately
                 distinguishes legitimate and phishing pages.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Algorithmic complexity theory; anti-phishing
                 technologies; Gestalt theory; Web page similarity",
}

@Article{Yue:2010:BTP,
  author =       "Chuan Yue and Haining Wang",
  title =        "{BogusBiter}: a transparent protection against
                 phishing attacks",
  journal =      j-TOIT,
  volume =       "10",
  number =       "2",
  pages =        "6:1--6:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754393.1754395",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jun 3 13:18:07 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Many anti-phishing mechanisms currently focus on
                 helping users verify whether a Web site is genuine.
                 However, usability studies have demonstrated that
                 prevention-based approaches alone fail to effectively
                 suppress phishing attacks and protect Internet users
                 from revealing their credentials to phishing sites. In
                 this paper, instead of preventing human users from
                 ``biting the bait,'' we propose a new approach to
                 protect against phishing attacks with ``bogus bites.''
                 We develop {\em BogusBiter}, a unique client-side
                 anti-phishing tool, which transparently feeds a
                 relatively large number of bogus credentials into a
                 suspected phishing site. BogusBiter conceals a victim's
                 real credential among bogus credentials, and moreover,
                 it enables a legitimate Web site to identify stolen
                 credentials in a timely manner. Leveraging the power of
                 client-side automatic phishing detection techniques,
                 BogusBiter is complementary to existing preventive
                 anti-phishing approaches. We implemented BogusBiter as
                 an extension to the Firefox 2 Web browser, and
                 evaluated its efficacy through real experiments on both
                 phishing and legitimate Web sites. Our experimental
                 results indicate that it is promising to use BogusBiter
                 to transparently protect against phishing attacks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "credential theft; Phishing; security; usability; web
                 spoofing",
}

@Article{Kumaraguru:2010:TJF,
  author =       "Ponnurangam Kumaraguru and Steve Sheng and Alessandro
                 Acquisti and Lorrie Faith Cranor and Jason Hong",
  title =        "Teaching {Johnny} not to fall for phish",
  journal =      j-TOIT,
  volume =       "10",
  number =       "2",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754393.1754396",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jun 3 13:18:07 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Phishing attacks, in which criminals lure Internet
                 users to Web sites that spoof legitimate Web sites, are
                 occurring with increasing frequency and are causing
                 considerable harm to victims. While a great deal of
                 effort has been devoted to solving the phishing problem
                 by prevention and detection of phishing emails and
                 phishing Web sites, little research has been done in
                 the area of training users to recognize those attacks.
                 Our research focuses on educating users about phishing
                 and helping them make better trust decisions. We
                 identified a number of challenges for end-user security
                 education in general and anti-phishing education in
                 particular: users are not motivated to learn about
                 security; for most users, security is a secondary task;
                 it is difficult to teach people to identify security
                 threats without also increasing their tendency to
                 misjudge nonthreats as threats. Keeping these
                 challenges in mind, we developed an email-based
                 anti-phishing education system called ``PhishGuru'' and
                 an online game called ``Anti-Phishing Phil'' that
                 teaches users how to use cues in URLs to avoid falling
                 for phishing attacks. We applied learning science
                 instructional principles in the design of PhishGuru and
                 Anti-Phishing Phil. In this article we present the
                 results of PhishGuru and Anti-Phishing Phil user
                 studies that demonstrate the effectiveness of these
                 tools. Our results suggest that, while automated
                 detection systems should be used as the first line of
                 defense against phishing attacks, user education offers
                 a complementary approach to help people better
                 recognize fraudulent emails and websites.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "email; Embedded training; instructional principles;
                 learning science; phishing; situated learning; usable
                 privacy and security",
}

@Article{Kuter:2010:UPC,
  author =       "Ugur Kuter and Jennifer Golbeck",
  title =        "Using probabilistic confidence models for trust
                 inference in {Web}-based social networks",
  journal =      j-TOIT,
  volume =       "10",
  number =       "2",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754393.1754397",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Thu Jun 3 13:18:07 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we describe a new approach that gives
                 an explicit probabilistic interpretation for social
                 networks. In particular, we focus on the observation
                 that many existing Web-based trust-inference algorithms
                 conflate the notions of ``trust'' and ``confidence,''
                 and treat the amalgamation of the two concepts to
                 compute the trust value associated with a social
                 relationship. Unfortunately, the result of such an
                 algorithm that merges trust and confidence is not a
                 trust value, but rather a new variable in the inference
                 process. Thus, it is hard to evaluate the outputs of
                 such an algorithm in the context of trust
                 inference.\par

                 This article first describes a formal probabilistic
                 network model for social networks that allows us to
                 address that issue. Then we describe SUNNY, a new trust
                 inference algorithm that uses probabilistic sampling to
                 separately estimate trust information and our
                 confidence in the trust estimate and use the two values
                 in order to compute an estimate of trust based on only
                 those information sources with the highest confidence
                 estimates.\par

                 We present an experimental evaluation of SUNNY. In our
                 experiments, SUNNY produced more accurate trust
                 estimates than the well-known trust inference algorithm
                 TidalTrust, demonstrating its effectiveness. Finally,
                 we discuss the implications these results will have on
                 systems designed for personalizing content and making
                 recommendations.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "Bayesian networks; Social networks; trust",
}

@Article{Rajab:2010:PTC,
  author =       "Moheeb Abu Rajab and Fabian Monrose and Niels Provos",
  title =        "Peeking Through the Cloud: Client Density Estimation
                 via {DNS} Cache Probing",
  journal =      j-TOIT,
  volume =       "10",
  number =       "3",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1852096.1852097",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 20 12:29:08 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Reliable network demographics are quickly becoming a
                 much sought-after digital commodity. However, as the
                 need for more refined Internet demographics has grown,
                 so too has the tension between privacy and utility.
                 Unfortunately, current techniques lean too much in
                 favor of functional requirements over protecting the
                 privacy of users. For example, the most prominent
                 proposals for measuring the relative popularity of a
                 Web site depend on the deployment of client-side
                 measurement agents that are generally perceived as
                 infringing on users' privacy, thereby limiting their
                 wide-scale adoption. Moreover, the client-side nature
                 of these techniques also makes them susceptible to
                 various manipulation tactics that undermine the
                 integrity of their results. In this article, we propose
                 a new estimation technique that uses DNS cache probing
                 to infer the density of clients accessing a given
                 service. Compared to earlier techniques, our scheme is
                 less invasive as it does not reveal user-specific
                 traits, and is more robust against manipulation. We
                 demonstrate the flexibility of our approach through two
                 important security applications. First, we illustrate
                 how our scheme can be used as a lightweight technique
                 for measuring and verifying the relative popularity
                 rank of different Web sites. Second, using data from
                 several hundred botnets, we apply our technique to
                 indirectly measure the infected population of this
                 increasing Internet phenomenon.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "botnets; client density estimation; measurement;
                 Network security; Web metering",
}

@Article{Bartoli:2010:FLS,
  author =       "Alberto Bartoli and Giorgio Davanzo and Eric Medvet",
  title =        "A Framework for Large-Scale Detection of {Web} Site
                 Defacements",
  journal =      j-TOIT,
  volume =       "10",
  number =       "3",
  pages =        "10:1--10:??",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1852096.1852098",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 20 12:29:08 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Web site defacement, the process of introducing
                 unauthorized modifications to a Web site, is a very
                 common form of attack. In this paper we describe and
                 evaluate experimentally a framework that may constitute
                 the basis for a {\em defacement detection service\/}
                 capable of monitoring thousands of remote Web sites
                 systematically and automatically.\par

                 In our framework an organization may join the service
                 by simply providing the URLs of the resources to be
                 monitored along with the contact point of an
                 administrator. The monitored organization may thus take
                 advantage of the service with just a few mouse clicks,
                 without installing any software locally or changing its
                 own daily operational processes. Our approach is based
                 on anomaly detection and allows monitoring the
                 integrity of many remote Web resources automatically
                 while remaining fully decoupled from them, in
                 particular, without requiring any prior knowledge about
                 those resources.\par

                 We evaluated our approach over a selection of dynamic
                 resources and a set of publicly available defacements.
                 The results are very satisfactory: all attacks are
                 detected while keeping false positives to a minimum. We
                 also assessed performance and scalability of our
                 proposal and we found that it may indeed constitute the
                 basis for actually deploying the proposed service on a
                 large scale.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "experimental evaluation; Intrusion detection;
                 monitoring service; Web site defacement",
}

@Article{Gluhovsky:2010:FCT,
  author =       "Ilya Gluhovsky",
  title =        "Forecasting Click-Through Rates Based on Sponsored
                 Search Advertiser Bids and Intermediate Variable
                 Regression",
  journal =      j-TOIT,
  volume =       "10",
  number =       "3",
  pages =        "11:1--11:??",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1852096.1852099",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 20 12:29:08 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "To participate in sponsored search online advertising,
                 an advertiser bids on a set of keywords relevant to
                 his/her product or service. When one of these keywords
                 matches a user search string, the ad is then considered
                 for display among sponsored search results. Advertisers
                 compete for positions in which their ads appear, as
                 higher slots typically result in more user clicks. All
                 existing position allocating mechanisms charge more per
                 click for a higher slot. Therefore, an advertiser must
                 decide whether to bid high and receive more, but more
                 expensive, clicks.\par

                 In this work, we propose a novel methodology for
                 building forecasting landscapes relating an individual
                 advertiser bid to the expected click-through rate
                 and/or the expected daily click volume. Displaying such
                 landscapes is currently offered as a service to
                 advertisers by all major search engine providers. Such
                 landscapes are expected to be instrumental in helping
                 the advertisers devise their bidding strategies.\par

                 We propose a {\em triply\/} monotone regression
                 methodology. We start by applying the current
                 state-of-the-art monotone regression solution. We then
                 propose to condition on the ad position and to estimate
                 the bid-position and position-click effects separately.
                 While the latter translates into a standard monotone
                 regression problem, we devise a novel solution to the
                 former based on approximate maximum likelihood. We show
                 that our proposal significantly outperforms the
                 standard monotone regression solution, while the latter
                 similarly improves upon routinely used ad-hoc
                 methods.\par

                 Last, we discuss other e-commerce applications of the
                 proposed intermediate variable regression
                 methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
  keywords =     "bidding agents; click-through rate estimation;
                 electronic commerce; isotonic regression; nonparametric
                 regression; Online auctions; shape constraints;
                 sponsored search; statistical inference",
}

@Article{Jordan:2010:FCT,
  author =       "Scott Jordan and Arijit Ghosh",
  title =        "A Framework for Classification of Traffic Management
                 Practices as Reasonable or Unreasonable",
  journal =      j-TOIT,
  volume =       "10",
  number =       "3",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1852096.1852100",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Oct 20 12:29:08 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Traffic management practices of ISPs are an issue of
                 public concern. We propose a framework for
                 classification of traffic management practices as
                 reasonable or unreasonable. We present a survey of
                 traffic management techniques and examples of how these
                 techniques are used by ISPs. We suggest that whether a
                 traffic management practice is reasonable rests on the
                 answers to four questions regarding the techniques and
                 practices used. We propose a framework that classifies
                 techniques as unreasonable if they are unreasonably
                 anticompetitive, cause undue harm to consumers, or
                 unreasonably impair free speech. We propose
                 alternatives to unreasonable or borderline congestion
                 management practices.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Shen:2011:ADC,
  author =       "Haifeng Shen and Chengzheng Sun",
  title =        "Achieving Data Consistency by Contextualization in
                 {Web-Based} Collaborative Applications",
  journal =      j-TOIT,
  volume =       "10",
  number =       "4",
  pages =        "13:1--13:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1944339.1944340",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Mar 29 17:36:50 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Recent years have witnessed the emergence and rapid
                 development of collaborative Web-based applications
                 exemplified by Web-based office productivity
                 applications. One major challenge in building these
                 applications is maintaining data consistency while
                 meeting the requirements of fast local response, total
                 work preservation, unconstrained interaction, and
                 customizable collaboration mode. These requirements are
                 important in determining users' experiences in
                 interaction and collaboration, and in meeting users'
                 diverse needs under complex and dynamic collaboration
                 and networking environments; but none of existing
                 solutions is able to meet all of them. In this article,
                 we present a data consistency maintenance solution
                 capable of meeting these requirements for collaborative
                 Web-based applications.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hurley:2011:NDT,
  author =       "Neil Hurley and Mi Zhang",
  title =        "Novelty and Diversity in Top-{$N$} Recommendation ---
                 Analysis and Evaluation",
  journal =      j-TOIT,
  volume =       "10",
  number =       "4",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1944339.1944341",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Mar 29 17:36:50 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "For recommender systems that base their product
                 rankings primarily on a measure of similarity between
                 items and the user query, it can often happen that
                 products on the recommendation list are highly similar
                 to each other and lack diversity. In this article we
                 argue that the motivation of diversity research is to
                 increase the probability of retrieving unusual or novel
                 items which are relevant to the user and introduce a
                 methodology to evaluate their performance in terms of
                 novel item retrieval. Moreover, noting that the
                 retrieval of a set of items matching a user query is a
                 common problem across many applications of information
                 retrieval, we formulate the trade-off between diversity
                 and matching quality as a binary optimization problem,
                 with an input control parameter allowing explicit
                 tuning of this trade-off.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Meiss:2011:PEI,
  author =       "Mark Meiss and Filippo Menczer and Alessandro
                 Vespignani",
  title =        "Properties and Evolution of {Internet} Traffic
                 Networks from Anonymized Flow Data",
  journal =      j-TOIT,
  volume =       "10",
  number =       "4",
  pages =        "15:1--15:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1944339.1944342",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Mar 29 17:36:50 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Many projects have tried to analyze the structure and
                 dynamics of application overlay networks on the
                 Internet using packet analysis and network flow data.
                 While such analysis is essential for a variety of
                 network management and security tasks, it is infeasible
                 on many networks: either the volume of data is so large
                 as to make packet inspection intractable, or privacy
                 concerns forbid packet capture and require the
                 dissociation of network flows from users' actual IP
                 addresses. Our analytical framework permits useful
                 analysis of network usage patterns even under
                 circumstances where the only available source of data
                 is anonymized flow records. Using this data, we are
                 able to uncover distributions and scaling relations in
                 host-to-host networks that bear implications for
                 capacity planning and network application design.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Crainiceanu:2011:LBR,
  author =       "Adina Crainiceanu and Prakash Linga and Ashwin
                 Machanavajjhala and Johannes Gehrke and Jayavel
                 Shanmugasundaram",
  title =        "Load Balancing and Range Queries in {P2P} Systems
                 Using {P-Ring}",
  journal =      j-TOIT,
  volume =       "10",
  number =       "4",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1944339.1944343",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Tue Mar 29 17:36:50 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In peer-to-peer (P2P) systems, computers from around
                 the globe share data and can participate in distributed
                 computation. P2P became famous, and infamous, due to
                 file-sharing systems like Napster. However, the
                 scalability and robustness of these systems make them
                 appealing to a wide range of applications. This article
                 introduces P-Ring, a new peer-to-peer index structure.
                 P-Ring is fully distributed, fault tolerant, and
                 provides load balancing and logarithmic search
                 performance while supporting both equality and range
                 queries. Our theoretical analysis as well as
                 experimental results, obtained both in a simulated
                 environment and on PlanetLab, show the performance of
                 our system.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Totok:2011:ESU,
  author =       "Alexander Totok and Vijay Karamcheti",
  title =        "Exploiting Service Usage Information for Optimizing
                 Server Resource Management",
  journal =      j-TOIT,
  volume =       "11",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1993083.1993084",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 17 09:48:22 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "It is often difficult to tune the performance of
                 modern component-based Internet services because: (1)
                 component middleware are complex software systems that
                 expose several independently tuned server resource
                 management mechanisms; (2) session-oriented client
                 behavior with complex data access patterns makes it
                 hard to predict what impact tuning these mechanisms has
                 on application behavior; and (3) component-based
                 Internet services themselves exhibit complex structural
                 organization with requests of different types having
                 widely ranging execution complexity. In this article we
                 show that exposing and using detailed information about
                 how clients use Internet services enables mechanisms
                 that achieve two interconnected goals: (1) providing
                 improved QoS to the service clients, and (2) optimizing
                 server resource utilization.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Arlitt:2011:CIG,
  author =       "Martin Arlitt and Niklas Carlsson and Phillipa Gill
                 and Aniket Mahanti and Carey Williamson",
  title =        "Characterizing Intelligence Gathering and Control on
                 an Edge Network",
  journal =      j-TOIT,
  volume =       "11",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1993083.1993085",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 17 09:48:22 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "There is a continuous struggle for control of
                 resources at every organization that is connected to
                 the Internet. The local organization wishes to use its
                 resources to achieve strategic goals. Some external
                 entities seek direct control of these resources, for
                 purposes such as spamming or launching
                 denial-of-service attacks. Other external entities seek
                 indirect control of assets (e.g., users, finances), but
                 provide services in exchange for them. Using a
                 year-long trace from an edge network, we examine what
                 various external organizations know about one
                 organization. We compare the types of information
                 exposed by or to external organizations using either
                 active (reconnaissance) or passive (surveillance)
                 techniques.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhan:2011:ADD,
  author =       "Justin Zhan and B. John Oommen and Johanna
                 Crisostomo",
  title =        "Anomaly Detection in Dynamic Systems Using Weak
                 Estimators",
  journal =      j-TOIT,
  volume =       "11",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1993083.1993086",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 17 09:48:22 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Anomaly detection involves identifying observations
                 that deviate from the normal behavior of a system. One
                 of the ways to achieve this is by identifying the
                 phenomena that characterize ``normal'' observations.
                 Subsequently, based on the characteristics of data
                 learned from the ``normal'' observations, new
                 observations are classified as being either ``normal''
                 or not. Most state-of-the-art approaches, especially
                 those which belong to the family of parameterized
                 statistical schemes, work under the assumption that the
                 underlying distributions of the observations are
                 stationary. That is, they assume that the distributions
                 that are learned during the training (or learning)
                 phase, though unknown, are not time-varying. They
                 further assume that the same distributions are relevant
                 even as new observations are encountered.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Geneves:2011:IXS,
  author =       "Pierre Genev{\`e}s and Nabil Laya{\"\i}da and Vincent
                 Quint",
  title =        "Impact of {XML} Schema Evolution",
  journal =      j-TOIT,
  volume =       "11",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1993083.1993087",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  bibdate =      "Wed Aug 17 09:48:22 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We consider the problem of XML Schema evolution. In
                 the ever-changing context of the web, XML schemas
                 continuously change in order to cope with the natural
                 evolution of the entities they describe. Schema changes
                 have important consequences. First, existing documents
                 valid with respect to the original schema are no longer
                 guaranteed to fulfill the constraints described by the
                 evolved schema. Second, the evolution also impacts
                 programs, manipulating documents whose structure is
                 described by the original schema. We propose a unifying
                 framework for determining the effects of XML Schema
                 evolution both on the validity of documents and on
                 queries. The system is very powerful in analyzing
                 various scenarios in which forward/backward
                 compatibility of schemas is broken, and in which the
                 result of a query may no longer be what was expected.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Goebel:2011:CIE,
  author =       "Christoph Goebel and Dirk Neumann and Ramayya
                 Krishnan",
  title =        "Comparing ingress and egress detection to secure
                 interdomain routing: An experimental analysis",
  journal =      j-TOIT,
  volume =       "11",
  number =       "2",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2049656.2049657",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 15 09:10:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The global economy and society increasingly depends on
                 computer networks linked together by the Internet. The
                 importance of computer networks reaches far beyond the
                 telecommunications sector since they have become a
                 critical factor for many other crucial infrastructures
                 and markets. With threats mounting and security
                 incidents becoming more frequent, concerns about
                 network security grow. It is an acknowledged fact that
                 some of the most fundamental network protocols that
                 make the Internet work are exposed to serious threats.
                 One of them is the Border Gateway Protocol (BGP) which
                 determines how Internet traffic is routed through the
                 topology of administratively independent networks that
                 the Internet is comprised of.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Albrecht:2011:DAC,
  author =       "Jeannie Albrecht and Christopher Tuttle and Ryan Braud
                 and Darren Dao and Nikolay Topilski and Alex C. Snoeren
                 and Amin Vahdat",
  title =        "Distributed application configuration, management, and
                 visualization with plush",
  journal =      j-TOIT,
  volume =       "11",
  number =       "2",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2049656.2049658",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 15 09:10:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Support for distributed application management in
                 large-scale networked environments remains in its early
                 stages. Although a number of solutions exist for
                 subtasks of application deployment, monitoring, and
                 maintenance in distributed environments, few tools
                 provide a unified framework for application management.
                 Many of the existing tools address the management needs
                 of a single type of application or service that runs in
                 a specific environment, and these tools are not
                 adaptable enough to be used for other applications or
                 platforms. To this end, we present the design and
                 implementation of Plush, a fully configurable
                 application management infrastructure designed to meet
                 the general requirements of several different classes
                 of distributed applications.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Park:2011:ACC,
  author =       "Ki-Woong Park and Kyu Ho Park",
  title =        "{ACCENT}: Cognitive cryptography plugged compression
                 for {SSL\slash TLS-based} cloud computing services",
  journal =      j-TOIT,
  volume =       "11",
  number =       "2",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2049656.2049659",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 15 09:10:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Emerging cloud services, including mobile offices,
                 Web-based storage services, and content delivery
                 services, run diverse workloads under various device
                 platforms, networks, and cloud service providers. They
                 have been realized on top of SSL/TLS, which is the de
                 facto protocol for end-to-end secure communication over
                 the Internet. In an attempt to achieve a cognitive
                 SSL/TLS with heterogeneous environments (device,
                 network, and cloud) and workload awareness, we
                 thoroughly analyze SSL/TLS-based data communication and
                 identify three critical mismatches in a conventional
                 SSL/TLS-based data transmission. The first mismatch is
                 the performance of loosely coupled
                 encryption-compression and communication routines that
                 lead to underutilized computation and communication
                 resources.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dalal:2011:UPQ,
  author =       "Amy Csizmar Dalal",
  title =        "User-perceived quality assessment of streaming media
                 using reduced feature sets",
  journal =      j-TOIT,
  volume =       "11",
  number =       "2",
  pages =        "8:1--8:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2049656.2049660",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 15 09:10:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "While subjective measurements are the most natural for
                 assessing the user-perceived quality of a media stream,
                 there are issues with their scalability and their
                 context accuracy. We explore techniques to select
                 application-layer measurements, collected by an
                 instrumented media player, that most accurately predict
                 the subjective quality rating that a user would assign
                 to a stream. We consider three feature subset selection
                 techniques that reduce the number of features
                 (measurements) under consideration to ones most
                 relevant to user-perceived stream quality. Two of the
                 three techniques mathematically consider stream
                 characteristics when selecting measurements, while the
                 third is based on observation. We apply the reduced
                 feature sets to two nearest-neighbor algorithms for
                 predicting user-perceived stream quality.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Sheng:2012:ISI,
  author =       "Quan Z. Sheng and Schahram Dustdar",
  title =        "Introduction to special issue on context-aware {Web}
                 services for the future {Internet}",
  journal =      j-TOIT,
  volume =       "11",
  number =       "3",
  pages =        "9:1--9:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2078316.2078317",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jan 31 17:38:01 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Abeywickrama:2012:CAS,
  author =       "Dhaminda B. Abeywickrama and Sita Ramakrishnan",
  title =        "Context-aware services engineering: Models,
                 transformations, and verification",
  journal =      j-TOIT,
  volume =       "11",
  number =       "3",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2078316.2078318",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jan 31 17:38:01 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Context-aware Web services are identified as an
                 important technology to support new applications on the
                 future Internet. Context information has several
                 qualities that make the development of these services
                 challenging, compared to conventional, Web services.
                 Therefore, sound software engineering practices are
                 needed during their development and execution. This
                 article discusses a novel software engineering-based
                 approach, which leverages the benefits of model-driven
                 architecture, aspect-oriented modeling, and formal
                 model checking, for modeling and verifying
                 context-aware services. The approach is explored using
                 a real-world case study in intelligent transport. An
                 evaluation framework is established to validate the
                 main methods and tools employed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Feng:2012:VCC,
  author =       "Qinyuan Feng and Ling Liu and Yafei Dai",
  title =        "Vulnerabilities and countermeasures in context-aware
                 social rating services",
  journal =      j-TOIT,
  volume =       "11",
  number =       "3",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2078316.2078319",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jan 31 17:38:01 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Social trust and recommendation services are the most
                 popular social rating systems today for service
                 providers to learn about the social opinion or
                 popularity of a product, item, or service, such as a
                 book on Amazon, a seller on eBay, a story on Digg or a
                 movie on Netflix. Such social rating systems are very
                 convenient and offer alternative learning environments
                 for decision makers, but they open the door for
                 attackers to manipulate the social rating systems by
                 selfishly promoting or maliciously demoting certain
                 items. Although a fair amount of effort has been made
                 to understand various risks and possible defense
                 mechanisms to counter such attacks, most of the
                 existing work to date has been devoted to studying
                 specific types of attacks and their countermeasures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Maekawa:2012:CAW,
  author =       "Takuya Maekawa and Yutaka Yanagisawa and Yasushi
                 Sakurai and Yasue Kishino and Koji Kamei and Takeshi
                 Okadome",
  title =        "Context-aware {Web} search in ubiquitous sensor
                 environments",
  journal =      j-TOIT,
  volume =       "11",
  number =       "3",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2078316.2078320",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jan 31 17:38:01 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article proposes a new concept for a
                 context-aware Web search method that automatically
                 retrieves a webpage related to the daily activity that
                 a user currently is engaged in and displays the page on
                 nearby Internet-connected home appliances such as
                 televisions. For example, when a user is washing a
                 coffeemaker, a webpage is retrieved that includes tips
                 such as ``cleaning a coffee maker with vinegar removes
                 stains well,'' and the page is displayed on a nearby
                 appliance. In this article, we design and implement a
                 Web search method that employs ubiquitous sensors to
                 monitor a user's daily life. Our proposed method
                 automatically searches for a webpage related to a daily
                 activity by using a query constructed from the use of
                 daily objects employed in the activity that is detected
                 with object-attached sensors.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{He:2012:SWS,
  author =       "Jing He and Yanchun Zhang and Guangyan Huang and Jinli
                 Cao",
  title =        "A smart {Web} service based on the context of things",
  journal =      j-TOIT,
  volume =       "11",
  number =       "3",
  pages =        "13:1--13:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2078316.2078321",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jan 31 17:38:01 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Combining the Semantic Web and the Ubiquitous Web, Web
                 3.0 is for things. The Semantic Web enables human
                 knowledge to be machine-readable and the Ubiquitous Web
                 allows Web services to serve any thing, forming a
                 bridge between the virtual world and the real world. By
                 using context, Web services can become smarter---that
                 is, aware of the target things' or applications'
                 physical environments, or situations and respond
                 proactively and intelligently. Existing methods for
                 implementing context-aware Web services on Web 2.0
                 mainly enumerate different implementations
                 corresponding to different attribute values of the
                 context, in order to improve the Quality of Services
                 (QoS). However, things in the physical world are
                 extremely diverse, which poses new problems for Web
                 services: it is difficult to unify the context of
                 things and to implement a flexible smart Web service
                 for things.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Sherchan:2012:CSU,
  author =       "Wanita Sherchan and Surya Nepal and Athman Bouguettaya
                 and Shiping Chen",
  title =        "Context-sensitive user interfaces for semantic
                 services",
  journal =      j-TOIT,
  volume =       "11",
  number =       "3",
  pages =        "14:1--14:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2078316.2078322",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jan 31 17:38:01 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Service-centric solutions usually require rich context
                 to fully deliver and better reflect on the underlying
                 applications. We present a novel use of context in the
                 form of customized user interface services with the
                 concept of User Interface as a Service (UIaaS). UIaaS
                 takes user profiles as input to generate context-aware
                 interface services. Such interface services can be used
                 as context to augment semantic services with contextual
                 information leading to UIaaS as a Context (UIaaSaaC).
                 The added serendipitous benefit of the proposed concept
                 is that the composition of a customized user interface
                 with the requested service is performed by the service
                 composition engine, as is the case with any other
                 services.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Liu:2012:FPC,
  author =       "Alex X. Liu",
  title =        "Firewall policy change-impact analysis",
  journal =      j-TOIT,
  volume =       "11",
  number =       "4",
  pages =        "15:1--15:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2109211.2109212",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Mar 19 17:12:01 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Firewalls are the cornerstones of the security
                 infrastructure for most enterprises. They have been
                 widely deployed for protecting private networks. The
                 quality of the protection provided by a firewall
                 directly depends on the quality of its policy (i.e.,
                 configuration). Due to the lack of tools for analyzing
                 firewall policies, many firewalls used today have
                 policy errors. A firewall policy error either creates
                 security holes that will allow malicious traffic to
                 sneak into a private network or blocks legitimate
                 traffic and disrupts normal business processes, which
                 in turn could lead to irreparable, if not tragic,
                 consequences. A major cause of policy errors are policy
                 changes. Firewall policies often need to be changed as
                 networks evolve and new threats emerge. Users behind a
                 firewall often request the firewall administrator to
                 modify rules to allow or protect the operation of some
                 services. In this article, we first present the theory
                 and algorithms for firewall policy change-impact
                 analysis. Our algorithms take as input a firewall
                 policy and a proposed change, then output the accurate
                 impact of the change. Thus, a firewall administrator
                 can verify a proposed change before committing it. We
                 implemented our firewall change-impact analysis
                 algorithms, and tested them on both real-life and
                 synthetic firewall policies. The experimental results
                 show that our algorithms are effective in terms of
                 ensuring firewall policy correctness and efficient in
                 terms of computing the impact of policy changes. Thus,
                 our tool can be practically used in the iterative
                 process of firewall policy design and maintenance.
                 Although the focus of this article is on firewalls, the
                 change-impact analysis algorithms proposed in this
                 article are not limited to firewalls. Rather, they can
                 be applied to other rule-based systems, such as router
                 access control lists (ACLs), as well.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Li:2012:TTO,
  author =       "Zhisheng Li and Xiangye Xiao and Meng Wang and Chong
                 Wang and Xufa Wang and Xing Xie",
  title =        "Towards the taxonomy-oriented categorization of yellow
                 pages queries",
  journal =      j-TOIT,
  volume =       "11",
  number =       "4",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2109211.2109213",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Mar 19 17:12:01 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Yellow pages search is a popular service that provides
                 a means for finding businesses close to particular
                 locations. The efficient search of yellow pages is
                 becoming a rapidly evolving research area. The
                 underlying data maintained in yellow pages search
                 engines are typically labeled according to Standard
                 Industry Classification (SIC) categories, and users can
                 search yellow pages with categories according to their
                 interests. Categorizing yellow pages queries into a
                 subset of topical categories can help to improve search
                 experience and quality. However, yellow pages queries
                 are usually short and ambiguous. In addition, a yellow
                 pages query taxonomy is typically organized by a
                 hierarchy of a fairly large number of categories. These
                 characteristics make automatic yellow pages query
                 categorization difficult and challenging. In this
                 article, we propose a flexible yellow pages query
                 categorization approach. The proposed technique is
                 built based on a TF-IDF similarity taxonomy matching
                 scheme that is able to provide more accurate query
                 categorization than previous keyword-based matching
                 schemes. To further improve the categorization
                 performance, we design several filtering schemes.
                 Through extensive experimentation, we demonstrate
                 encouraging results. We obtain F1 measures of about 0.5
                 and 0.3 for categorizing yellow pages queries into 19
                 coarse categories and 244 finer categories,
                 respectively. We investigate different components in
                 the proposed approach and also demonstrate the
                 superiority of our approach over a hierarchical support
                 vector machine classifier.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Leung:2012:FPW,
  author =       "Kenneth Wai-Ting Leung and Dik Lun Lee and Wilfred Ng
                 and Hing Yuet Fung",
  title =        "A framework for personalizing web search with
                 concept-based user profiles",
  journal =      j-TOIT,
  volume =       "11",
  number =       "4",
  pages =        "17:1--17:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2109211.2109214",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Mar 19 17:12:01 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Personalized search is an important means to improve
                 the performance of a search engine. In this article, we
                 propose a framework that supports mining a user's
                 conceptual preferences from users' clickthrough data
                 resulting from Web search. The discovered preferences
                 are utilized to adapt a search engine's ranking
                 function. In this framework, an extended set of
                 conceptual preferences was derived for a user based on
                 the concepts extracted from the search results and the
                 clickthrough data. Then, a concept-based user profile
                 (CUP) representing the user profile as a concept
                 ontology tree is generated. Finally, the CUP is input
                 to a support vector machine (SVM) to learn a concept
                 preference vector for adapting a personalized ranking
                 function that reranks the search results. In order to
                 achieve more flexible personalization, the framework
                 allows a user to control the amount of specific CUP
                 ontology information to be exposed to the personalized
                 search engine. We study various parameters, such as
                 conceptual relationships and concept features, arising
                 from CUP that affect the ranking quality. Experiments
                 confirm that our approach is able to significantly
                 improve the retrieval effectiveness for the user.
                 Further, our proposed control parameters of CUP
                 information can adjust the exposed user information
                 more smoothly and maintain better ranking quality than
                 the existing methods.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dacosta:2012:OTC,
  author =       "Italo Dacosta and Saurabh Chakradeo and Mustaque
                 Ahamad and Patrick Traynor",
  title =        "One-time cookies: Preventing session hijacking attacks
                 with stateless authentication tokens",
  journal =      j-TOIT,
  volume =       "12",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2220352.2220353",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jul 10 18:01:14 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "HTTP cookies are the de facto mechanism for session
                 authentication in Web applications. However, their
                 inherent security weaknesses allow attacks against the
                 integrity of Web sessions. HTTPS is often recommended
                 to protect cookies, but deploying full HTTPS support
                 can be challenging due to performance and financial
                 concerns, especially for highly distributed
                 applications. Moreover, cookies can be exposed in a
                 variety of ways even when HTTPS is enabled. In this
                 article, we propose one-time cookies (OTC), a more
                 robust alternative for session authentication. OTC
                 prevents attacks such as session hijacking by signing
                 each user request with a session secret securely stored
                 in the browser. Unlike other proposed solutions, OTC
                 does not require expensive state synchronization in the
                 Web application, making it easily deployable in highly
                 distributed systems. We implemented OTC as a plug-in
                 for the popular WordPress platform and as an extension
                 for Firefox and Firefox for mobile browsers. Our
                 extensive experimental analysis shows that OTC
                 introduces a latency of less than 6 ms when compared to
                 cookies --- a negligible overhead for most Web
                 applications. Moreover, we show that OTC can be
                 combined with HTTPS to effectively add another layer of
                 security to Web applications. In so doing, we
                 demonstrate that one-time cookies can significantly
                 improve the security of Web applications with minimal
                 impact on performance and scalability.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dikaiakos:2012:MSR,
  author =       "Marios D. Dikaiakos and Asterios Katsifodimos and
                 George Pallis",
  title =        "{Minersoft}: Software retrieval in grid and cloud
                 computing infrastructures",
  journal =      j-TOIT,
  volume =       "12",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2220352.2220354",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jul 10 18:01:14 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "One of the main goals of Cloud and Grid
                 infrastructures is to make their services easily
                 accessible and attractive to end-users. In this article
                 we investigate the problem of supporting keyword-based
                 searching for the discovery of software files that are
                 installed on the nodes of large-scale, federated Grid
                 and Cloud computing infrastructures. We address a
                 number of challenges that arise from the unstructured
                 nature of software and the unavailability of
                 software-related metadata on large-scale networked
                 environments. We present Minersoft, a harvester that
                 visits Grid/Cloud infrastructures, crawls their file
                 systems, identifies and classifies software files, and
                 discovers implicit associations between them. The
                 results of Minersoft harvesting are encoded in a
                 weighted, typed graph, called the Software Graph. A
                 number of information retrieval (IR) algorithms are
                 used to enrich this graph with structural and content
                 associations, to annotate software files with keywords
                 and build inverted indexes to support keyword-based
                 searching for software. Using a real testbed, we
                 present an evaluation study of our approach, using data
                 extracted from production-quality Grid and Cloud
                 computing infrastructures. Experimental results show
                 that Minersoft is a powerful tool for software search
                 and discovery.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Guo:2012:TNA,
  author =       "Deke Guo and Yunhao Liu and Hai Jin and Zhong Liu and
                 Weiming Zhang and Hui Liu",
  title =        "Theory and network applications of balanced {Kautz}
                 tree structures",
  journal =      j-TOIT,
  volume =       "12",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2220352.2220355",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jul 10 18:01:14 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In order to improve scalability and to reduce the
                 maintenance overhead for structured peer-to-peer (P2P)
                 networks, researchers have proposed architectures based
                 on several interconnection networks with a fixed-degree
                 and a logarithmical diameter. Among existing
                 fixed-degree interconnection networks, the Kautz
                 digraph has many distinctive topological properties
                 compared to others. It, however, requires that the
                 number of peers have the some given values, determined
                 by peer degree and network diameter. In practice, we
                 cannot guarantee how many peers will join a P2P network
                 at a given time, since a P2P network is typically
                 dynamic with peers frequently entering and leaving. To
                 address such an issue, we propose the balanced Kautz
                 tree and Kautz ring structures. We further design a
                 novel structured P2P system, called BAKE, based on the
                 two structures that has the logarithmical diameter and
                 constant degree, even the number of peers is an
                 arbitrary value. By keeping a total ordering of peers
                 and employing a robust locality-preserved resource
                 placement strategy, resources that are similar in a
                 single or multidimensional attributes space are stored
                 on the same peer or neighboring peers. Through analysis
                 and simulation, we show that BAKE achieves the optimal
                 diameter and as good a connectivity as the Kautz
                 digraph does (almost achieves the Moore bound), and
                 supports the exact as well as the range queries
                 efficiently. Indeed, the structures of balanced Kautz
                 tree and Kautz ring we propose can also be applied to
                 other interconnection networks after minimal
                 modifications, for example, the de Bruijn digraph.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Tyson:2012:JMP,
  author =       "Gareth Tyson and Andreas Mauthe and Sebastian Kaune
                 and Paul Grace and Adel Taweel and Thomas Plagemann",
  title =        "{Juno}: a Middleware Platform for Supporting
                 Delivery-Centric Applications",
  journal =      j-TOIT,
  volume =       "12",
  number =       "2",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2390209.2390210",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 15 19:32:37 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article proposes a new delivery-centric
                 abstraction which extends the existing content-centric
                 networking API. A delivery-centric abstraction allows
                 applications to generate content requests agnostic to
                 location or protocol, with the additional ability to
                 stipulate high-level requirements regarding such things
                 as performance, security, and resource consumption.
                 Fulfilling these requirements, however, is complex as
                 often the ability of a provider to satisfy requirements
                 will vary between different consumers and over time.
                 Therefore, we argue that it is vital to manage this
                 variance to ensure an application fulfills its needs.
                 To this end, we present the Juno middleware, which
                 implements delivery-centric support using a
                 reconfigurable software architecture to: (i) discover
                 multiple sources of an item of content; (ii) model each
                 source's ability to provide the content; then (iii)
                 adapt to interact with the source(s) that can best
                 fulfill the application's requirements. Juno therefore
                 utilizes existing providers in a backwards compatible
                 way, supporting immediate deployment. This article
                 evaluates Juno using Emulab to validate its ability to
                 adapt to its environment.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Robu:2012:UPO,
  author =       "Valentin Robu and Lonneke Mous and Han {La
                 Poutr{\'e}}",
  title =        "Using Priced Options to Solve the Exposure Problem in
                 Sequential Auctions",
  journal =      j-TOIT,
  volume =       "12",
  number =       "2",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2390209.2390211",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 15 19:32:37 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We propose a priced options model for solving the
                 exposure problem of bidders with valuation synergies
                 participating in a sequence of online auctions. We
                 consider a setting in which complementary-valued items
                 are offered sequentially by different sellers, who have
                 the choice of either selling their item directly or
                 through a priced option. In our model, the seller fixes
                 the exercise price for this option, and then sells it
                 through a first-price auction. We analyze this model
                 from a decision-theoretic perspective and we show, for
                 a setting where the competition is formed by local
                 bidders (which desire a single item), that using
                 options can increase the expected profit for both
                 sides. Furthermore, we derive the equations that
                 provide minimum and maximum bounds between which the
                 bids of the synergy buyer are expected to fall, in
                 order for both sides of the market to have an incentive
                 to use the options mechanism. Next, we perform an
                 experimental analysis of a market in which multiple
                 synergy buyers are active simultaneously. We show that,
                 despite the extra competition, some synergy buyers may
                 benefit, because sellers are forced to set their
                 exercise prices for options at levels which encourage
                 participation of all buyers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Liu:2012:EMM,
  author =       "Ziyang Liu and Yi Chen",
  title =        "Exploiting and Maintaining Materialized Views for
                 {XML} Keyword Queries",
  journal =      j-TOIT,
  volume =       "12",
  number =       "2",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2390209.2390212",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 15 19:32:37 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Keyword query is a user-friendly mechanism for
                 retrieving useful information from XML data in Web and
                 scientific applications. Inspired by the performance
                 benefits of exploiting materialized views when
                 processing structured queries, we investigate the
                 feasibility and present a general framework for
                 answering XML keyword queries using materialized views.
                 Then we develop an XML keyword search engine that
                 leverages materialized views for query evaluation and
                 maintains materialized views incrementally upon XML
                 data update. Experimental evaluation demonstrates the
                 significance and efficiency of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ardagna:2013:PUA,
  author =       "Claudio A. Ardagna and Sushil Jajodia and Pierangela
                 Samarati and Angelos Stavrou",
  title =        "Providing Users' Anonymity in Mobile Hybrid Networks",
  journal =      j-TOIT,
  volume =       "12",
  number =       "3",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2461321.2461322",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat May 25 16:26:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We present a novel hybrid communication protocol that
                 guarantees mobile users' anonymity against a wide-range
                 of adversaries by exploiting the capability of handheld
                 devices to connect to both WiFi and cellular networks.
                 Unlike existing anonymity schemes, we consider all
                 parties that can intercept communications between a
                 mobile user and a server as potential privacy threats.
                 We formally quantify the privacy exposure and the
                 protection of our system in the presence of malicious
                 neighboring peers, global WiFi eavesdroppers, and
                 omniscient mobile network operators, which possibly
                 collude to breach user's anonymity or disrupt the
                 communication. We also describe how a micropayment
                 scheme that suits our mobile scenario can provide
                 incentives for peers to collaborate in the protocol.
                 Finally, we evaluate the network overhead and attack
                 resiliency of our protocol using a prototype
                 implementation deployed in Emulab and Orbit, and our
                 probabilistic model.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Pranata:2013:MDR,
  author =       "Ilung Pranata and Rukshan Athauda and Geoff Skinner",
  title =        "Modeling Decentralized Reputation-Based Trust for
                 Initial Transactions in Digital Environments",
  journal =      j-TOIT,
  volume =       "12",
  number =       "3",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2461321.2461323",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat May 25 16:26:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The advent of digital environments has generated
                 significant benefits for businesses, organizations,
                 governments, academia and societies in general. Today,
                 over millions of transactions take place on the
                 Internet. Although the widespread use of digital
                 environments has generally provided opportunities for
                 societies, a number of threats have limited their
                 adoption. The de-facto standard today is for
                 certification authorities to authenticate the identity
                 of service providers while trust on the provided
                 services is implied. This approach has certain
                 shortcomings, for example, single point of failure,
                 implied trust rather than explicit trust and others.
                 One approach for minimizing such threats is to
                 introduce an effective and resilient trust mechanism
                 that is capable of determining the trustworthiness of
                 service providers in providing their services.
                 Determining the trustworthiness of services reduces
                 invalid transactions in digital environments and
                 further encourages collaborations. Evaluating
                 trustworthiness of a service provider without any prior
                 historical transactions (i.e. the initial transaction)
                 pose a number of challenging issues. This article
                 presents TIDE --- a decentralized reputation trust
                 mechanism that determines the initial trustworthiness
                 of entities in digital environments. TIDE improves the
                 precision of trust computation by considering raters'
                 feedback, number of transactions, credibility,
                 incentive to encourage raters' participation, strategy
                 for updating raters' category, and safeguards against
                 dynamic personalities. Furthermore, TIDE classifies
                 raters into three categories and promotes the
                 flexibility and customization through its parameters.
                 Evaluation of TIDE against several attack vectors
                 demonstrates its accuracy, robustness and resilience.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yuan:2013:PVQ,
  author =       "Lihua Yuan and Chao-Chih Chen and Prasant Mohapatra
                 and Chen-Nee Chuah and Krishna Kant",
  title =        "A Proxy View of Quality of {Domain Name Service},
                 Poisoning Attacks and Survival Strategies",
  journal =      j-TOIT,
  volume =       "12",
  number =       "3",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2461321.2461324",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat May 25 16:26:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Domain Name System (DNS) provides a critical
                 service for the Internet --- mapping of user-friendly
                 domain names to their respective IP addresses. Yet,
                 there is no standard set of metrics quantifying the
                 Quality of Domain Name Service (QoDNS), let alone a
                 thorough evaluation of it. This article attempts to
                 fill this gap from the perspective of a DNS
                 proxy/cache, which is the bridge between clients and
                 authoritative servers. We present an analytical model
                 of DNS proxy operations that offers insights into the
                 design trade-offs of DNS infrastructure and the
                 selection of critical DNS parameters. Due to the
                 critical role DNS proxies play in QoDNS, they are the
                 focus of attacks including cache poisoning attack. We
                 extend the analytical model to study DNS cache
                 poisoning attacks and their impact on QoDNS metrics.
                 This analytical study prompts us to present Domain Name
                 Cross-Referencing (DoX), a peer-to-peer systems for DNS
                 proxies to cooperatively defend cache poisoning
                 attacks. Based on QoDNS, we compare DoX with the
                 cryptography-based DNS Security Extension (DNSSEC) to
                 understand their relative merits.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Singh:2013:VT,
  author =       "Munindar P. Singh",
  title =        "Vision for {TOIT}",
  journal =      j-TOIT,
  volume =       "12",
  number =       "4",
  pages =        "10:1--10:??",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2499926.2499929",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Jul 27 08:21:55 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Singh:2013:TAU,
  author =       "Munindar P. Singh",
  title =        "{TOIT} Administrative Updates",
  journal =      j-TOIT,
  volume =       "12",
  number =       "4",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2499926.2499930",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Jul 27 08:21:55 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Wang:2013:WAM,
  author =       "Meng Wang and Guangda Li and Zheng Lu and Yue Gao and
                 Tat-Seng Chua",
  title =        "When {Amazon} Meets {Google}: Product Visualization by
                 Exploring Multiple {Web} Sources",
  journal =      j-TOIT,
  volume =       "12",
  number =       "4",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2492690",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Jul 27 08:21:55 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Product visualization is able to help users easily get
                 knowledge about the visual appearance of a product. It
                 is useful in many application and commercialization
                 scenarios. However, the existing product image search
                 on e-commerce Web sites or general search engines
                 usually get insufficient search results or return
                 images that are redundant and not relevant enough. In
                 this article, we present a novel product visualization
                 approach that automatically collects a set of diverse
                 and relevant product images by exploring multiple Web
                 sources. Our approach simultaneously leverages Amazon
                 and Google image search engines, which represent
                 domain-specific knowledge resource and general Web
                 information collection, respectively. We propose a
                 conditional clustering approach that is formulated as
                 an affinity propagation problem regarding the Amazon
                 examples as information prior. The ranking information
                 of Google image search results is also explored. In
                 this way, a set of exemplars can be found from the
                 Google search results and they are provided together
                 with the Amazon example images for product
                 visualization. Experiments demonstrate the feasibility
                 and effectiveness of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Liang:2013:SSO,
  author =       "Yu-Li Liang and Xinyu Xing and Hanqiang Cheng and
                 Jianxun Dang and Sui Huang and Richard Han and Xue Liu
                 and Qin Lv and Shivakant Mishra",
  title =        "{SafeVchat}: a System for Obscene Content Detection in
                 Online Video Chat Services",
  journal =      j-TOIT,
  volume =       "12",
  number =       "4",
  pages =        "13:1--13:??",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2499926.2499927",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Jul 27 08:21:55 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Online video chat services such as Chatroulette,
                 Omegle, and vChatter that randomly match pairs of users
                 in video chat sessions are quickly becoming very
                 popular, with over a million users per month in the
                 case of Chatroulette. A key problem encountered in such
                 systems is the presence of flashers and obscene
                 content. This problem is especially acute given the
                 presence of underage minors in such systems. This
                 article presents SafeVchat, a novel solution to the
                 problem of flasher detection that employs an array of
                 image detection algorithms. A key contribution of the
                 article concerns how the results of the individual
                 detectors are fused together into an overall decision
                 classifying a user as misbehaving or not, based on
                 Dempster-Shafer theory. The article introduces a novel,
                 motion-based skin detection method that achieves
                 significantly higher recall and better precision. The
                 proposed methods have been evaluated over real-world
                 data and image traces obtained from Chatroulette.com.
                 SafeVchat has been deployed in Chatroulette. A
                 combination of SafeVchat with human moderation has
                 resulted in banning as many as 50,000 inappropriate
                 users per day on Chatoulette. Furthermore, offensive
                 content on Chatoulette has dropped significantly from
                 33.08\% (before SafeVchat installation) to 3.49\%
                 (after SafeVchat installation).",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Shue:2013:RRC,
  author =       "Craig A. Shue and Andrew J. Kalafut",
  title =        "Resolvers Revealed: Characterizing {DNS} Resolvers and
                 their Clients",
  journal =      j-TOIT,
  volume =       "12",
  number =       "4",
  pages =        "14:1--14:??",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2499926.2499928",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Jul 27 08:21:55 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Domain Name System (DNS) allows clients to use
                 resolvers, sometimes called caches, to query a set of
                 authoritative servers to translate host names into IP
                 addresses. Prior work has proposed using the
                 interaction between these DNS resolvers and the
                 authoritative servers as an access control mechanism.
                 However, while prior work has examined the DNS from
                 many angles, the resolver component has received little
                 scrutiny. Essential factors for using a resolver in an
                 access control system, such as whether a resolver is
                 part of an ISP's infrastructure or running on an
                 end-user's system, have not been examined. In this
                 study, we examine DNS resolver behavior and usage, from
                 query patterns and reactions to nonstandard responses
                 to passive association techniques to pair resolvers
                 with their client hosts. In doing so, we discover
                 evidence of security protocol support, misconfigured
                 resolvers, techniques to fingerprint resolvers, and
                 features for detecting automated clients. These
                 measurements can influence the implementation and
                 design of these resolvers and DNS-based access control
                 systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Li:2013:CBA,
  author =       "Xitong Li and Stuart E. Madnick and Hongwei Zhu",
  title =        "A Context-Based Approach to Reconciling Data
                 Interpretation Conflicts in {Web} Services
                 Composition",
  journal =      j-TOIT,
  volume =       "13",
  number =       "1",
  pages =        "1:1--1:??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2532638",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Dec 3 18:44:00 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We present a comprehensive classification of data
                 misinterpretation problems and develop an approach to
                 automatic detection and reconciliation of data
                 interpretation conflicts in Web services composition.
                 The approach uses a lightweight ontology augmented with
                 modifiers, contexts, and atomic conversions between the
                 contexts. The WSDL descriptions of Web services are
                 annotated to establish correspondences to the ontology.
                 Given the naive Business Process Execution Language
                 (BPEL) specification of the desired Web services
                 composition with data interpretation conflicts, the
                 approach can automatically detect the conflicts and
                 produce the corresponding mediated BPEL. Finally, we
                 develop a prototype to validate and evaluate the
                 approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Sun:2013:IUP,
  author =       "San-Tsai Sun and Eric Pospisil and Ildar Muslukhov and
                 Nuray Dindar and Kirstie Hawkey and Konstantin
                 Beznosov",
  title =        "Investigating Users' Perspectives of {Web} Single
                 Sign-On: Conceptual Gaps and Acceptance Model",
  journal =      j-TOIT,
  volume =       "13",
  number =       "1",
  pages =        "2:1--2:??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2532639",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Dec 3 18:44:00 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "OpenID and OAuth are open and simple Web SSO protocols
                 that have been adopted by major service providers, and
                 millions of supporting Web sites. However, the average
                 user's perception of Web SSO is still poorly
                 understood. Through several user studies, this work
                 investigates users' perceptions and concerns when using
                 Web SSO for authentication. We found that our
                 participants had several misconceptions and concerns
                 that impeded their adoption. This ranged from their
                 inadequate mental models of Web SSO, to their concerns
                 about personal data exposure, and a reduction in
                 perceived Web SSO value due to the employment of
                 password management practices. Informed by our
                 findings, we offer a Web SSO technology acceptance
                 model, and suggest design improvements.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Albanese:2013:MRS,
  author =       "Massimiliano Albanese and Antonio d'Acierno and
                 Vincenzo Moscato and Fabio Persia and Antonio
                 Picariello",
  title =        "A Multimedia Recommender System",
  journal =      j-TOIT,
  volume =       "13",
  number =       "1",
  pages =        "3:1--3:??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2532640",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Dec 3 18:44:00 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The extraordinary technological progress we have
                 witnessed in recent years has made it possible to
                 generate and exchange multimedia content at an
                 unprecedented rate. As a consequence, massive
                 collections of multimedia objects are now widely
                 available to a large population of users. As the task
                 of browsing such large collections could be daunting,
                 Recommender Systems are being developed to assist users
                 in finding items that match their needs and
                 preferences. In this article, we present a novel
                 approach to recommendation in multimedia browsing
                 systems, based on modeling recommendation as a social
                 choice problem. In social choice theory, a set of
                 voters is called to rank a set of alternatives, and
                 individual rankings are aggregated into a global
                 ranking. In our formulation, the set of voters and the
                 set of alternatives both coincide with the set of
                 objects in the data collection. We first define what
                 constitutes a choice in the browsing domain and then
                 define a mechanism to aggregate individual choices into
                 a global ranking. The result is a framework for
                 computing customized recommendations by originally
                 combining intrinsic features of multimedia objects,
                 past behavior of individual users, and overall behavior
                 of the entire community of users. Recommendations are
                 ranked using an importance ranking algorithm that
                 resembles the well-known PageRank strategy. Experiments
                 conducted on a prototype of the proposed system confirm
                 the effectiveness and efficiency of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Sayyadi:2013:GAA,
  author =       "Hassan Sayyadi and Louiqa Raschid",
  title =        "A Graph Analytical Approach for Topic Detection",
  journal =      j-TOIT,
  volume =       "13",
  number =       "2",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2542214.2542215",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Dec 23 18:38:12 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Topic detection with large and noisy data collections
                 such as social media must address both scalability and
                 accuracy challenges. KeyGraph is an efficient method
                 that improves on current solutions by considering
                 keyword cooccurrence. We show that KeyGraph has similar
                 accuracy when compared to state-of-the-art approaches
                 on small, well-annotated collections, and it can
                 successfully filter irrelevant documents and identify
                 events in large and noisy social media collections. An
                 extensive evaluation using Amazon's Mechanical Turk
                 demonstrated the increased accuracy and high precision
                 of KeyGraph, as well as superior runtime performance
                 compared to other solutions.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bicakci:2013:LSS,
  author =       "Kemal Bicakci and Bruno Crispo and Gabriele Oligeri",
  title =        "{LAKE}: a Server-Side Authenticated Key-Establishment
                 with Low Computational Workload",
  journal =      j-TOIT,
  volume =       "13",
  number =       "2",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2542214.2542216",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Dec 23 18:38:12 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Server-side authenticated key-establishment protocols
                 are characterized by placing a heavy workload on the
                 server. We propose LAKE: a new protocol that enables
                 amortizing servers' workload peaks by moving most of
                 the computational burden to the clients. We provide a
                 formal analysis of the LAKE protocol under the
                 Canetti-Krawczyk model and prove it to be secure. To
                 the best of our knowledge, this is the most
                 computationally efficient authenticated
                 key-establishment ever proposed in the literature.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jordan:2013:UIR,
  author =       "Scott Jordan and Gwen Shaffer",
  title =        "User and {ISP} Rights of Device Attachment and Device
                 Management",
  journal =      j-TOIT,
  volume =       "13",
  number =       "2",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2513227",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Dec 23 18:38:12 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Internet research often assumes users may connect
                 devices without consent by their service providers.
                 However, in many networks the service provider only
                 allows use of devices obtained directly from the
                 provider. We review how United States communications
                 law addresses the rights of users to connect devices of
                 their choice. We explicate a set of user and service
                 provider rights. We propose legal requirements for
                 attachment and management of devices. We illustrate how
                 these proposed regulations would affect the services
                 currently offered on telephone, cable, satellite, video
                 networks, and cellular networks, as well as on the
                 Internet.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chu:2014:DDM,
  author =       "Xiaowen Chu and Xiaowei Chen and Adele Lu Jia and
                 Johan A. Pouwelse and Dick H. J. Epema",
  title =        "Dissecting {Darknets}: Measurement and Performance
                 Analysis",
  journal =      j-TOIT,
  volume =       "13",
  number =       "3",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2611527",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jun 3 14:03:29 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "BitTorrent (BT) plays an important role in Internet
                 content distribution. Because public BTs suffer from
                 the free-rider problem, Darknets are becoming
                 increasingly popular, which use Sharing Ratio
                 Enforcement to increase their efficiency. We crawled
                 and traced 17 Darknets from September 2009 to February
                 2011, and obtained datasets about over 5 million
                 torrents. We conducted a broad range of measurements,
                 including traffic, sites, torrents, and users
                 activities. We found that some of the features of
                 Darknets are noticeably different from public BTs. The
                 results of our study reflect both macroscopic and
                 microscopic aspects of the overall ecosystem of
                 BitTorrent Darknets.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Karame:2014:MMW,
  author =       "Ghassan O. Karame and Aur{\'e}lien Francillon and
                 Victor Budilivschi and Srdjan Capkun and Vedran
                 Capkun",
  title =        "Microcomputations as Micropayments in {Web}-based
                 Services",
  journal =      j-TOIT,
  volume =       "13",
  number =       "3",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2611526",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jun 3 14:03:29 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we propose a new micropayment model
                 for nonspecialized commodity web-services based on
                 microcomputations. In our model, a user that wishes to
                 access online content (offered by a website) does not
                 need to register or pay to access the website; instead,
                 he will accept to run microcomputations on behalf of
                 the service provider in exchange for access to the
                 content. These microcomputations can, for example,
                 support ongoing computing projects that have clear
                 social benefits (e.g., projects relating to medical
                 research) or can contribute towards commercial
                 computing projects. We analyze the security and privacy
                 of our proposal and we show that it preserves the
                 privacy of users. We argue that this micropayment model
                 is economically and technically viable and that it can
                 be integrated in existing distributed computing
                 frameworks (e.g., the BOINC platform). In this respect,
                 we implement a prototype of a system based on our model
                 and we deploy our prototype on Amazon Mechanical Turk
                 to evaluate its performance and usability given a large
                 number of users. Our results show that our proposed
                 scheme does not affect the browsing experience of users
                 and is likely to be used by a non-trivial proportion of
                 users. Finally, we empirically show that our scheme
                 incurs comparable bandwidth and CPU consumption to the
                 resource usage incurred by online advertisements
                 featured in popular websites.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Blackburn:2014:COG,
  author =       "Jeremy Blackburn and Nicolas Kourtellis and John
                 Skvoretz and Matei Ripeanu and Adriana Iamnitchi",
  title =        "Cheating in Online Games: a Social Network
                 Perspective",
  journal =      j-TOIT,
  volume =       "13",
  number =       "3",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2602570",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jun 3 14:03:29 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Online gaming is a multi-billion dollar industry that
                 entertains a large, global population. One unfortunate
                 phenomenon, however, poisons the competition and spoils
                 the fun: cheating. The costs of cheating span from
                 industry-supported expenditures to detect and limit it,
                 to victims' monetary losses due to cyber crime. This
                 article studies cheaters in the Steam Community, an
                 online social network built on top of the world's
                 dominant digital game delivery platform. We collected
                 information about more than 12 million gamers connected
                 in a global social network, of which more than 700
                 thousand have their profiles flagged as cheaters. We
                 also observed timing information of the cheater flags,
                 as well as the dynamics of the cheaters' social
                 neighborhoods. We discovered that cheaters are well
                 embedded in the social and interaction networks: their
                 network position is largely indistinguishable from that
                 of fair players. Moreover, we noticed that the number
                 of cheaters is not correlated with the geographical,
                 real-world population density, or with the local
                 popularity of the Steam Community. Also, we observed a
                 social penalty involved with being labeled as a
                 cheater: cheaters lose friends immediately after the
                 cheating label is publicly applied. Most importantly,
                 we observed that cheating behavior spreads through a
                 social mechanism: the number of cheater friends of a
                 fair player is correlated with the likelihood of her
                 becoming a cheater in the future. This allows us to
                 propose ideas for limiting cheating contagion.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Guo:2014:CAC,
  author =       "Tian Guo and Upendra Sharma and Prashant Shenoy and
                 Timothy Wood and Sambit Sahu",
  title =        "Cost-Aware Cloud Bursting for Enterprise
                 Applications",
  journal =      j-TOIT,
  volume =       "13",
  number =       "3",
  pages =        "10:1--10:??",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2602571",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jun 3 14:03:29 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The high cost of provisioning resources to meet peak
                 application demands has led to the widespread adoption
                 of pay-as-you-go cloud computing services to handle
                 workload fluctuations. Some enterprises with existing
                 IT infrastructure employ a hybrid cloud model where the
                 enterprise uses its own private resources for the
                 majority of its computing, but then ``bursts'' into the
                 cloud when local resources are insufficient. However,
                 current commercial tools rely heavily on the system
                 administrator's knowledge to answer key questions such
                 as when a cloud burst is needed and which applications
                 must be moved to the cloud. In this article, we
                 describe Seagull, a system designed to facilitate cloud
                 bursting by determining which applications should be
                 transitioned into the cloud and automating the movement
                 process at the proper time. Seagull optimizes the
                 bursting of applications using an optimization
                 algorithm as well as a more efficient but approximate
                 greedy heuristic. Seagull also optimizes the overhead
                 of deploying applications into the cloud using an
                 intelligent precopying mechanism that proactively
                 replicates virtualized applications, lowering the
                 bursting time from hours to minutes. Our evaluation
                 shows over 100\% improvement compared to na{\"\i}ve
                 solutions but produces more expensive solutions
                 compared to ILP. However, the scalability of our greedy
                 algorithm is dramatically better as the number of VMs
                 increase. Our evaluation illustrates scenarios where
                 our prototype can reduce cloud costs by more than 45\%
                 when bursting to the cloud, and that the incremental
                 cost added by precopying applications is offset by a
                 burst time reduction of nearly 95\%.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bai:2014:PTK,
  author =       "Xiao Bai and Rachid Guerraoui and Anne-Marie
                 Kermarrec",
  title =        "Personalizing Top-$k$ Processing Online in a
                 Peer-to-Peer Social Tagging Network",
  journal =      j-TOIT,
  volume =       "13",
  number =       "4",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2602572",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:39:42 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The rapidly increasing amount of user-generated
                 content in social tagging systems provides a huge
                 source of information. Yet, performing effective search
                 in these systems is very challenging, especially when
                 we seek the most appropriate items that match a
                 potentially ambiguous query. Collaborative
                 filtering-based personalization is appealing in this
                 context, as it limits the search within a small network
                 of participants with similar preferences. Offline
                 personalization, which consists in maintaining, for
                 every user, a network of similar participants based on
                 their tagging behaviors, is effective for queries that
                 are close to the querying user's tagging profile but
                 performs poorly when the queries, reflecting emerging
                 interests, have little correlation with the querying
                 user's profile. We present P$^2$ TK$^2$, the first
                 protocol to personalize query processing in social
                 tagging systems online. P$^2$ TK$^2$ is completely
                 decentralized, and this design choice stems from the
                 observation that the evolving social tagging systems
                 naturally resemble P2P systems where users are both
                 producers and consumers. This design exploits the power
                 of the crowd and prevents any central authority from
                 controlling personal information. P$^2$ TK$^2$ is
                 gossip-based and probabilistic. It dynamically
                 associates each user with social acquaintances sharing
                 similar tagging behaviors. Appropriate users for
                 answering a query are discovered at query time with the
                 help of social acquaintances. This is achieved
                 according to the hybrid interest of the querying user,
                 taking into account both her tagging behavior and her
                 query. Results are iteratively refined and returned to
                 the querying user. We evaluate P$^2$ TK$^2$ on
                 CiteULike and Delicious traces involving up to 50,000
                 users. We highlight the advantages of online
                 personalization compared to offline personalization, as
                 well as its efficiency, scalability, and inherent
                 ability to cope with user departure and interest
                 evolution in P2P systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Benouaret:2014:WSC,
  author =       "Karim Benouaret and Djamal Benslimane and Allel
                 Hadjali and Mahmoud Barhamgi and Zakaria Maamar and
                 Quan Z. Sheng",
  title =        "{Web} Service Compositions with Fuzzy Preferences: a
                 Graded Dominance Relationship-Based Approach",
  journal =      j-TOIT,
  volume =       "13",
  number =       "4",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2576231",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:39:42 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Data-driven Web services build on service-oriented
                 technologies to provide an interoperable method of
                 interacting with data sources on top of the Web. Data
                 Web services composition has emerged as a flexible
                 solution to answer users' complex queries on the fly.
                 However, as the number of Web services on the Web grows
                 quickly, a large number of candidate compositions that
                 would use different (most likely competing) services
                 may be used to answer the same query. User preferences
                 are a key factor that can be used to rank candidate
                 services/compositions and retain only the best ones. In
                 this article, we present a novel approach for computing
                 the top-$k$ data service compositions based on user
                 preferences. In our approach, we model user preferences
                 using fuzzy sets and incorporate them into the
                 composition query. We use an efficient RDF query
                 rewriting algorithm to determine the relevant services
                 that may be used to answer the composition query. We
                 match the (fuzzy) constraints of the relevant services
                 to those of the query and determine their matching
                 degrees using a set of matching methods. We then
                 rank-order the candidate services based on a
                 fuzzification of Pareto dominance and compute the
                 top-$k$ data service compositions. In addition, we
                 introduce a new method for increasing the diversity of
                 returned top-$k$ compositions while maintaining as much
                 as possible the compositions with the highest scores.
                 Finally, we describe the architecture of our system and
                 present a thorough experimental study of our proposed
                 techniques and algorithms. The experimental study
                 demonstrates the efficiency and the effectiveness of
                 our techniques in different settings.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Geneves:2014:EIX,
  author =       "Pierre Genev{\`e}s and Nabil Laya{\"\i}da",
  title =        "Equipping {IDEs} with {XML-Path} Reasoning
                 Capabilities",
  journal =      j-TOIT,
  volume =       "13",
  number =       "4",
  pages =        "13:1--13:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2602573",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:39:42 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "One of the challenges in Web development is to achieve
                 a good level of quality in terms of code size and
                 runtime performance for popular domain-specific
                 languages such as XQuery, XSLT, and XML Schema. We
                 present the first IDE augmented with static detection
                 of inconsistent XPath expressions that assists the
                 programmer with simplifying development and debugging
                 of any application involving XPath expressions. The
                 tool is based on newly developed formal verification
                 techniques based on expressive modal logics, which are
                 now mature enough to be introduced in the process of
                 software development. We further develop this idea in
                 the context of XQuery for which we introduce an
                 analysis for identifying and eliminating dead code
                 automatically. This proof of concept aims at
                 illustrating the benefits of equipping modern IDEs with
                 reasoning capabilities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Artikis:2014:ERC,
  author =       "Alexander Artikis and Avigdor Gal and Vana Kalogeraki
                 and Matthias Weidlich",
  title =        "Event Recognition Challenges and Techniques: {Guest
                 Editors}' Introduction",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2632220",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hasan:2014:ASM,
  author =       "Souleiman Hasan and Edward Curry",
  title =        "Approximate Semantic Matching of Events for the
                 {Internet of Things}",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633684",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Event processing follows a decoupled model of
                 interaction in space, time, and synchronization.
                 However, another dimension of semantic coupling also
                 exists and poses a challenge to the scalability of
                 event processing systems in highly semantically
                 heterogeneous and dynamic environments such as the
                 Internet of Things (IoT). Current state-of-the-art
                 approaches of content-based and concept-based event
                 systems require a significant agreement between event
                 producers and consumers on event schema or an external
                 conceptual model of event semantics. Thus, they do not
                 address the semantic coupling issue. This article
                 proposes an approach where participants only agree on a
                 distributional statistical model of semantics
                 represented in a corpus of text to derive semantic
                 similarity and relatedness. It also proposes an
                 approximate model for relaxing the semantic coupling
                 dimension via an approximation-enabled rule language
                 and an approximate event matcher. The model is
                 formalized as an ensemble of semantic and top-$k$
                 matchers along with a probability model for uncertainty
                 management. The model has been empirically validated on
                 large sets of events and subscriptions synthesized from
                 real-world smart city and energy management systems.
                 Experiments show that the proposed model achieves more
                 than 95\% F$_1$ Score of effectiveness and thousands of
                 events/sec of throughput for medium degrees of
                 approximation while not requiring users to have
                 complete prior knowledge of event semantics. In
                 semantically loosely-coupled environments, one
                 approximate subscription can compensate for hundreds of
                 exact subscriptions to cover all possibilities in
                 environments which require complete prior knowledge of
                 event semantics. Results indicate that approximate
                 semantic event processing could play a promising role
                 in the IoT middleware layer.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Molinaro:2014:PPA,
  author =       "Cristian Molinaro and Vincenzo Moscato and Antonio
                 Picariello and Andrea Pugliese and Antonino Rullo and
                 V. S. Subrahmanian",
  title =        "{PADUA: Parallel Architecture to Detect Unexplained
                 Activities}",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633685",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "There are numerous applications (e.g., video
                 surveillance, fraud detection, cybersecurity) in which
                 we wish to identify unexplained sets of events. Most
                 related past work has been domain-dependent (e.g.,
                 video surveillance, cybersecurity) and has focused on
                 the valuable class of statistical anomalies in which
                 statistically unusual events are considered. In
                 contrast, suppose there is a set $A$ of known activity
                 models (both harmless and harmful) and a log $L$ of
                 time-stamped observations. We define a part $ L'
                 \subseteq L$ of the log to represent an unexplained
                 situation when none of the known activity models can
                 explain $ L'$ with a score exceeding a user-specified
                 threshold. We represent activities via probabilistic
                 penalty graphs (PPGs) and show how a set of PPGs can be
                 combined into one Super-PPG for which we define an
                 index structure. Given a compute cluster of $ (K + 1)$
                 nodes (one of which is a master node), we show how to
                 split a Super-PPG into $K$ subgraphs, each of which can
                 be independently processed by a compute node. We
                 provide algorithms for the individual compute nodes to
                 ensure seamless handoffs that maximally leverage
                 parallelism. PADUA is domain-independent and can be
                 applied to many domains (perhaps with some
                 specialization). We conducted detailed experiments with
                 PADUA on two real-world datasets-the ITEA CANDELA video
                 surveillance dataset and a network traffic dataset
                 appropriate for cybersecurity applications. PADUA
                 scales extremely well with the number of processors and
                 significantly outperforms past work both in accuracy
                 and time. Thus, PADUA represents the first parallel
                 architecture and algorithm for identifying unexplained
                 situations in observation data, offering both
                 scalability and accuracy.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mutschler:2014:ASP,
  author =       "Christopher Mutschler and Michael Philippsen",
  title =        "Adaptive Speculative Processing of Out-of-Order Event
                 Streams",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633686",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Distributed event-based systems are used to detect
                 meaningful events with low latency in high data-rate
                 event streams that occur in surveillance, sports,
                 finances, etc. However, both known approaches to
                 dealing with the predominant out-of-order event arrival
                 at the distributed detectors have their shortcomings:
                 buffering approaches introduce latencies for event
                 ordering, and stream revision approaches may result in
                 system overloads due to unbounded retraction cascades.
                 This article presents an adaptive speculative
                 processing technique for out-of-order event streams
                 that enhances typical buffering approaches. In contrast
                 to other stream revision approaches developed so far,
                 our novel technique encapsulates the event detector,
                 uses the buffering technique to delay events but also
                 speculatively processes a portion of it, and adapts the
                 degree of speculation at runtime to fit the available
                 system resources so that detection latency becomes
                 minimal. Our technique outperforms known approaches on
                 both synthetical data and real sensor data from a
                 realtime locating system (RTLS) with several thousands
                 of out-of-order sensor events per second. Speculative
                 buffering exploits system resources and reduces latency
                 by 40\% on average.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Wilkin:2014:DFT,
  author =       "Gregory Aaron Wilkin and Patrick Eugster and K. R.
                 Jayaram",
  title =        "Decentralized Fault-Tolerant Event Correlation",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633687",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Despite the prognosed use of event correlation
                 techniques for monitoring critical complex
                 infrastructures or dealing with disasters in the
                 physical world, little work exists on making event
                 correlation systems themselves tolerant to failure.
                 Existing systems either provide no guarantees on event
                 deliveries, do not support multicast and thus provide
                 no guarantees across individual processes, or then rely
                 on centralized components or strong assumptions on the
                 infrastructure. The FAIDECS system attempts to
                 reconcile strong guarantees with practical performance
                 in the presence of process crash failures. To that end,
                 the FAIDECS system uses an overlay network with
                 specific guarantees aligned with its proposed
                 correlation language and guarantees. However, the
                 language proposed lacks expressivity, and the system
                 itself supports only very specific rigid semantics,
                 incapable of supporting even fundamental features like
                 sliding windows. After providing a comprehensive
                 overview of the FAIDECS model and system, this article
                 bridges the gap between strong guarantees and more
                 established correlation languages and systems in
                 several steps. First, we propose alternative semantics
                 for several modules of the FAIDECS matching engine and
                 revisit guarantees. Second, we pinpoint which
                 guarantees are contradicted by which combinations of
                 semantic options. Third, we investigate four
                 correlation languages-StreamSQL, EQL, CEL, and
                 TESLA-showing which semantic options their respective
                 features correspond to in our model, and thus,
                 ultimately, which guarantees of FAIDECS are maintained
                 by which language features.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ottenwalder:2014:MMA,
  author =       "Beate Ottenw{\"a}lder and Boris Koldehofe and Kurt
                 Rothermel and Kirak Hong and David Lillethun and
                 Umakishore Ramachandran",
  title =        "{MCEP}: a Mobility-Aware Complex Event Processing
                 System",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "6:1--6:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633688",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "With the proliferation of mobile devices and sensors,
                 complex event processing (CEP) is becoming increasingly
                 important to scalably detect situations in real time.
                 Current CEP systems are not capable of dealing
                 efficiently with highly dynamic mobile consumers whose
                 interests change with their location. We introduce the
                 distributed mobile CEP (MCEP) system which
                 automatically adapts the processing of events according
                 to a consumer's location. MCEP significantly reduces
                 latency, network utilization, and processing overhead
                 by providing on-demand and opportunistic adaptation
                 algorithms to dynamically assign event streams and
                 computing resources to operators of the MCEP system.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Glavic:2014:ESP,
  author =       "Boris Glavic and Kyumars Sheykh Esmaili and Peter M.
                 Fischer and Nesime Tatbul",
  title =        "Efficient Stream Provenance via Operator
                 Instrumentation",
  journal =      j-TOIT,
  volume =       "14",
  number =       "1",
  pages =        "7:1--7:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633689",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 8 11:38:18 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Managing fine-grained provenance is a critical
                 requirement for data stream management systems (DSMS),
                 not only for addressing complex applications that
                 require diagnostic capabilities and assurance, but also
                 for providing advanced functionality, such as revision
                 processing or query debugging. This article introduces
                 a novel approach that uses operator instrumentation,
                 that is, modifying the behavior of operators, to
                 generate and propagate fine-grained provenance through
                 several operators of a query network. In addition to
                 applying this technique to compute provenance eagerly
                 during query execution, we also study how to decouple
                 provenance computation from query processing to reduce
                 runtime overhead and avoid unnecessary provenance
                 retrieval. Our proposals include computing a concise
                 superset of the provenance (to allow lazily replaying a
                 query and reconstruct its provenance) as well as lazy
                 retrieval (to avoid unnecessary reconstruction of
                 provenance). We develop stream-specific compression
                 methods to reduce the computational and storage
                 overhead of provenance generation and retrieval.
                 Ariadne, our provenance-aware extension of the Borealis
                 DSMS implements these techniques. Our experiments
                 confirm that Ariadne manages provenance with minor
                 overhead and clearly outperforms query rewrite, the
                 current state of the art.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Courcoubetis:2014:SIP,
  author =       "Costas Courcoubetis and Roch Gu{\'e}rin and Patrick
                 Loiseau and David Parkes and Jean Walrand and Adam
                 Wierman",
  title =        "Special Issue on Pricing and Incentives in Networks
                 and Systems: {Guest Editors}' Introduction",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "8:1--8:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2665064",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Abbassi:2014:DCC,
  author =       "Zeinab Abbassi and Nidhi Hegde and Laurent
                 Massouli{\'e}",
  title =        "Distributed Content Curation on the {Web}",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663489",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In recent years there has been an explosive growth of
                 digital content in the form of news feeds, videos, and
                 original content on online platforms such as blogs and
                 social networks. Indeed, such platforms have been used
                 as a means of sharing and republishing information,
                 leading to a large collection of content that users
                 must sift through. We consider the problem of curating
                 this vast catalogue of content such that aggregators or
                 publishers can offer readers content that is of
                 interest to them, with minimal spam. Under a
                 game-theoretic model we obtain several results on the
                 optimal content selection and on the efficiency of
                 distributed curation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Coucheney:2014:ISN,
  author =       "Pierre Coucheney and Giuseppe D'acquisto and Patrick
                 Maill{\'e} and Maurizio Naldi and Bruno Tuffin",
  title =        "Influence of Search Neutrality on the Economics of
                 Advertisement-Financed Content",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "10:1--10:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663490",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The search neutrality debate questions the ranking
                 methods of search engines. We analyze the issue when
                 content providers offer content for free, but get
                 revenues from advertising. We investigate the
                 noncooperative game among competing content providers
                 under different ranking policies. When the search
                 engine is not involved with high-quality content
                 providers, it should adopt neutral ranking, also
                 maximizing user quality-of-experience. If the search
                 engine controls high-quality content, favoring its
                 ranking and adding advertisement yield a larger
                 revenue. Though user perceived quality may not be
                 impaired, the advertising revenues of the other content
                 providers drastically decrease.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Altman:2014:RNP,
  author =       "Eitan Altman and Manjesh Kumar Hanawal and Rajesh
                 Sundaresan",
  title =        "Regulation of Off-Network Pricing in a Nonneutral
                 Network",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "11:1--11:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663491",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Representatives of several Internet service providers
                 (ISPs) have expressed their wish to see a substantial
                 change in the pricing policies of the Internet. In
                 particular, they would like to see content providers
                 (CPs) pay for use of the network, given the large
                 amount of resources they use. This would be in clear
                 violation of the ``network neutrality'' principle that
                 had characterized the development of the wireline
                 Internet. Our first goal in this article is to propose
                 and study possible ways of implementing such payments
                 and of regulating their amount. We introduce a model
                 that includes the users' behavior, the utilities of the
                 ISP and of the CPs, and, the monetary flow that
                 involves the content users, the ISP and CP, and, in
                 particular, the CP's revenues from advertisements. We
                 consider various game models and study the resulting
                 equilibria; they are all combinations of a
                 noncooperative game (in which the ISPs and CPs
                 determine how much they will charge the users) with a
                 ``cooperative'' one on how the CP and the ISP share the
                 payments. We include in our model a possible asymmetric
                 weighting parameter (that varies between zero to one).
                 We also study equilibria that arise when one of the CPs
                 colludes with the ISP. We also study two dynamic game
                 models as well as the convergence of prices to the
                 equilibrium values.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chau:2014:EVP,
  author =       "Chi-Kin Chau and Qian Wang and Dah-Ming Chiu",
  title =        "Economic Viability of {Paris Metro Pricing} for
                 Digital Services",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663492",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Nowadays digital services, such as cloud computing and
                 network access services, allow dynamic resource
                 allocation and virtual resource isolation. This trend
                 can create a new paradigm of flexible pricing schemes.
                 A simple pricing scheme is to allocate multiple
                 isolated service classes with differentiated prices,
                 namely Paris Metro Pricing (PMP). The benefits of PMP
                 are its simplicity and applicability to a wide variety
                 of general digital services, without considering
                 specific performance guarantees for different service
                 classes. The central issue of our study is whether PMP
                 is economically viable, namely whether it will produce
                 more profit for the service provider and whether it
                 will achieve more social welfare. Prior studies had
                 only considered specific models and arrived at
                 conflicting conclusions. In this article, we identify
                 unifying principles in a general setting and derive
                 general sufficient conditions that can guarantee the
                 viability of PMP. We further apply the results to
                 analyze various examples of digital services.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Guerin:2014:ABS,
  author =       "Roch Gu{\'e}rin and Jaudelice C. de Oliveira and
                 Steven Weber",
  title =        "Adoption of Bundled Services with Network
                 Externalities and Correlated Affinities",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "13:1--13:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663493",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The goal of this article is to develop a principled
                 understanding of when it is beneficial to bundle
                 technologies or services whose value is heavily
                 dependent on the size of their user base, that is,
                 exhibits positive exernalities. Of interest is how the
                 joint distribution, and in particular the correlation,
                 of the values users assign to components of a bundle
                 affect its odds of success. The results offer insight
                 and guidelines for deciding when bundling new Internet
                 technologies or services can help improve their overall
                 adoption. In particular, successful outcomes appear to
                 require a minimum level of value correlation.
                 Categories and Subject Descriptors (2012): Networks ---
                 Network Algorithms --- Network economics; Networks ---
                 Network properties --- Network dynamics; Information
                 systems --- Information systems applications ---
                 Collaborative and social computing systems and tools;
                 Security and privacy --- Human and societal aspects of
                 security and privacy; Human-centered computing ---
                 Collaborative and social computing theory, concepts and
                 paradigms",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Andrews:2014:UQD,
  author =       "Matthew Andrews and Glenn Bruns and Mustafa Dogru and
                 Hyoseop Lee",
  title =        "Understanding Quota Dynamics in Wireless Networks",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "14:1--14:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663494",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In designing new service plans, network service
                 providers need to understand how consumption of voice
                 or data service will change in response to pricing
                 signals. It is difficult to acquire such information
                 from customer usage data because voice minutes and data
                 bandwidth are typically sold in the form of large
                 quotas. We address this issue by studying how end-users
                 consume their quotas, both in a prepaid setting (where
                 users pay in advance and refill as needed) and a
                 postpaid setting (where users pay each month for a
                 fixed amount of quota). Our presentation has three main
                 parts. In the first we present data on quota usage for
                 prepaid voice/text services and show that users reduce
                 their voice usage when their balances become low.
                 Moreover, when balances are low there is a tendency to
                 shift from voice to SMS. In the second part, we provide
                 descriptive models of both prepaid and postpaid
                 services. The main feature of these models is that
                 there is a background level of potential demand and the
                 rate at which this potential demand is realized depends
                 on the amount of quota balance available. In the third
                 part, we propose utility maximizing models that can
                 account for this type of behavior. In the prepaid case
                 the main feature of the model is a discount function
                 that represents the perceived cost to the user of a
                 quota refill that will occur sometime in the future. In
                 the postpaid case, where the end-user is attempting to
                 get the maximum amount of utility from his monthly
                 quota, we present a dynamic programming formulation in
                 which utility functions are time varying and not known
                 to the user in advance.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kavurmacioglu:2014:DIP,
  author =       "Emir Kavurmacioglu and Murat Alanyali and David
                 Starobinski",
  title =        "Demand-Invariant Price Relationships and Market
                 Outcomes in Competitive Private Commons",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "15:1--15:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663495",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We introduce a private commons model that consists of
                 network providers who serve a fixed primary demand and
                 strategically price to improve their revenues from an
                 additional secondary demand. For general forms of
                 secondary demand, we establish the existence and
                 uniqueness of two characteristic prices: the break-even
                 price and the market sharing price. We show that the
                 market sharing price is always greater than the
                 break-even price, leading to a price interval in which
                 a provider is both profitable and willing to share the
                 demand. Making use of this result, we give insight into
                 the nature of market outcomes.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hoefer:2014:AAS,
  author =       "Martin Hoefer and Thomas Kesselheim and Berthold
                 V{\"o}cking",
  title =        "Approximation Algorithms for Secondary Spectrum
                 Auctions",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "16:1--16:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663496",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We study combinatorial auctions for secondary spectrum
                 markets, where short-term communication licenses are
                 sold to wireless nodes. Channels can be assigned to
                 multiple bidders according to interference constraints
                 captured by a conflict graph. We suggest a novel
                 approach to such combinatorial auctions using a graph
                 parameter called inductive independence number. We
                 achieve good approximation results by showing that
                 interference constraints for wireless networks imply a
                 bounded inductive independence number. For example, in
                 the physical model the factor becomes $ O (\sqrt k
                 \log^2 n) $ for $n$ bidders and $k$ channels. Our
                 algorithms can be turned into incentive-compatible
                 mechanisms for bidders with arbitrary valuations.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Caragiannis:2014:RGG,
  author =       "Ioannis Caragiannis and Christos Kaklamanis and
                 Panagiotis Kanellopoulos and Maria Kyropoulou",
  title =        "Revenue Guarantees in the Generalized Second Price
                 Auction",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "17:1--17:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663497",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Sponsored search auctions are the main source of
                 revenue for search engines. In such an auction, a set
                 of utility maximizing advertisers competes for a set of
                 ad slots. The assignment of advertisers to slots
                 depends on the bids they submit; these bids may be
                 different than the true valuations of the advertisers
                 for the slots. Variants of the celebrated VCG auction
                 mechanism guarantee that advertisers act truthfully
                 and, under some assumptions, lead to revenue or social
                 welfare maximization. Still, the sponsored search
                 industry mostly uses generalized second price (GSP)
                 auctions; these auctions are known to be nontruthful
                 and suboptimal in terms of social welfare and revenue.
                 In an attempt to explain this tradition, we study a
                 Bayesian setting wherein the valuations of advertisers
                 are drawn independently from a common regular
                 probability distribution. In this setting, it is well
                 known from the work of Myerson [1981] that the optimal
                 revenue is obtained by the VCG mechanism with a
                 particular reserve price that depends on the
                 probability distribution. We show that, by
                 appropriately setting the reserve price, the revenue
                 over any Bayes-Nash equilibrium of the game induced by
                 the GSP auction is at most a small constant factor away
                 from the optimal revenue, improving previous results of
                 Lucier et al. [2012]. Our analysis is based on the
                 Bayes-Nash equilibrium conditions and the improved
                 results are obtained by bounding the utility of each
                 player at equilibrium using infinitely many deviating
                 bids and also by developing novel prophet-like
                 inequalities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Doncel:2014:PAR,
  author =       "Josu Doncel and Urtzi Ayesta and Olivier Brun and
                 Balakrishna Prabhu",
  title =        "Is the Price of Anarchy the Right Measure for
                 Load-Balancing Games?",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "18:1--18:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663498",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Price of anarchy is an oft-used worst-case measure of
                 the inefficiency of noncooperative decentralized
                 architectures. For a noncooperative load-balancing game
                 with two classes of servers and for a finite or
                 infinite number of dispatchers, we show that the price
                 of anarchy is an overly pessimistic measure that does
                 not reflect the performance obtained in most instances
                 of the problem. We explicitly characterize the
                 worst-case traffic conditions for the efficiency of
                 noncooperative load-balancing schemes and show that,
                 contrary to a common belief, the worst inefficiency is
                 in general not achieved in heavy traffic.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Laszka:2014:STC,
  author =       "Aron Laszka and Benjamin Johnson and Pascal
                 Sch{\"o}ttle and Jens Grossklags and Rainer B{\"o}hme",
  title =        "Secure Team Composition to Thwart Insider Threats and
                 Cyber-Espionage",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663499",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We develop a formal nondeterministic game model for
                 secure team composition to counter cyber-espionage and
                 to protect organizational secrets against an attacker
                 who tries to sidestep technical security mechanisms by
                 offering a bribe to a project team member. The game
                 captures the adversarial interaction between the
                 attacker and the project manager who has a secret she
                 wants to protect but must share with a team of
                 individuals selected from within her organization. Our
                 interdisciplinary work is important in the face of the
                 multipronged approaches utilized by well-motivated
                 attackers to circumvent the fortifications of otherwise
                 well-defended targets.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ye:2014:EMD,
  author =       "Zhen Ye and Athman Bouguettaya and Xiaofang Zhou",
  title =        "Economic Model-Driven Cloud Service Composition",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "20:1--20:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2651420",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article considers cloud service composition from
                 a decision analysis perspective. Traditional QoS-aware
                 composition techniques usually consider the qualities
                 available at the time of the composition because
                 compositions are usually immediately consumed. This is
                 fundamentally different in the cloud environment where
                 the cloud service composition typically lasts for a
                 relatively long period of time. The two most important
                 drivers when composing cloud service are the long-term
                 nature of the composition and the economic motivation
                 for outsourcing tasks to the cloud. We propose an
                 economic model, which we represent as a Bayesian
                 network, to select and compose cloud services. We then
                 leverage influence diagrams to model the cloud service
                 composition. We further extend the traditional
                 influence diagram problem to a hybrid one and adopt an
                 extended Shenoy-Shafer architecture to solve such
                 hybrid influence diagrams that include deterministic
                 chance nodes. In addition, analytical and simulation
                 results are presented to show the performance of the
                 proposed composition approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chowdhury:2014:RWR,
  author =       "Soudip Roy Chowdhury and Florian Daniel and Fabio
                 Casati",
  title =        "Recommendation and Weaving of Reusable Mashup Model
                 Patterns for Assisted Development",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "21:1--21:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663500",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "With this article, we give an answer to one of the
                 open problems of mashup development that users may face
                 when operating a model-driven mashup tool, namely the
                 lack of modeling expertise. Although commonly
                 considered simple applications, mashups can also be
                 complex software artifacts depending on the number and
                 types of Web resources (the components) they integrate.
                 Mashup tools have undoubtedly simplified mashup
                 development, yet the problem is still generally
                 nontrivial and requires intimate knowledge of the
                 components provided by the mashup tool, its underlying
                 mashup paradigm, and of how to apply such to the
                 integration of the components. This knowledge is
                 generally neither intuitive nor standardized across
                 different mashup tools and the consequent lack of
                 modeling expertise affects both skilled programmers and
                 end-user programmers alike. In this article, we show
                 how to effectively assist the users of mashup tools
                 with contextual, interactive recommendations of
                 composition knowledge in the form of reusable mashup
                 model patterns. We design and study three different
                 recommendation algorithms and describe a pattern
                 weaving approach for the one-click reuse of composition
                 knowledge. We report on the implementation of three
                 pattern recommender plugins for different mashup tools
                 and demonstrate via user studies that recommending and
                 weaving contextual mashup model patterns significantly
                 reduces development times in all three cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chopra:2014:ISI,
  author =       "Amit K. Chopra and Raian Ali and Maja Vukovic",
  title =        "Introduction to the Special Issue on Foundations of
                 Social Computing",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "22:1--22:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2680536",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Baldoni:2014:CBI,
  author =       "Matteo Baldoni and Cristina Baroglio and Federico
                 Capuzzimati",
  title =        "A Commitment-Based Infrastructure for Programming
                 Socio-Technical Systems",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2677206",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Socio-Technical Systems demand an evolution of
                 computing into social computing, with a transition from
                 an individualistic to a societal view. As such, they
                 seem particularly suitable to realize multiparty,
                 cross-organizational systems. Multi-Agent Systems are a
                 natural candidate to realize Socio-Technical Systems.
                 However, while Socio-Technical Systems envisage an
                 explicit layer that contains the regulations that all
                 parties must respect in their interaction, and thus
                 preserve the agents' autonomy, current frameworks and
                 platforms require to hard-code the coordination
                 requirements inside the agents. We propose to
                 explicitly represent the missing layer of
                 Socio-Technical Systems in terms of social
                 relationships among the involved parties, that is, in
                 terms of a set of normatively defined relationships
                 among two or more parties, subject to social control by
                 monitoring the observable behaviour. In our proposal,
                 social relationships are resources, available to
                 agents, who use them in their practical reasoning. Both
                 agents and social relationships are first-class
                 entities of the model. The work also describes
                 2COMM4JADE, a framework that realizes the proposal by
                 extending the well-known JADE and CArtAgO. The impact
                 of the approach on programming is explained both
                 conceptually and with the help of an example.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Figueiredo:2014:DSM,
  author =       "Flavio Figueiredo and Jussara M. Almeida and Marcos
                 Andr{\'e} Gon{\c{c}}alves and Fabr{\'\i}cio
                 Benevenuto",
  title =        "On the Dynamics of Social Media Popularity: a
                 {YouTube} Case Study",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2665065",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Understanding the factors that impact the popularity
                 dynamics of social media can drive the design of
                 effective information services, besides providing
                 valuable insights to content generators and online
                 advertisers. Taking YouTube as case study, we analyze
                 how video popularity evolves since upload, extracting
                 popularity trends that characterize groups of videos.
                 We also analyze the referrers that lead users to
                 videos, correlating them, features of the video and
                 early popularity measures with the popularity trend and
                 total observed popularity the video will experience.
                 Our findings provide fundamental knowledge about
                 popularity dynamics and its implications for services
                 such as advertising and search.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lukasiewicz:2014:OBQ,
  author =       "Thomas Lukasiewicz and Maria Vanina Martinez and
                 Gerardo I. Simari and Oana Tifrea-Marciuska",
  title =        "Ontology-Based Query Answering with Group
                 Preferences",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "25:1--25:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2677207",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Web has recently been evolving into a system that
                 is in many ways centered on social interactions and is
                 now more and more becoming what is called the Social
                 Semantic Web. One of the many implications of such an
                 evolution is that the ranking of search results no
                 longer depends solely on the structure of the
                 interconnections among Web pages-instead, the social
                 components must also come into play. In this article,
                 we argue that such rankings can be based on ontological
                 background knowledge and on user preferences. Another
                 aspect that has become increasingly important in recent
                 times is that of uncertainty management, since
                 uncertainty can arise due to many uncontrollable
                 factors. To combine these two aspects, we propose
                 extensions of the Datalog+/-- family of ontology
                 languages that both allow for the management of
                 partially ordered preferences of groups of users as
                 well as uncertainty, which is represented via a
                 probabilistic model. We focus on answering k -rank
                 queries in this context, presenting different
                 strategies to compute group preferences as an
                 aggregation of the preferences of a collection of
                 single users. We also study merging operators that are
                 useful for combining the preferences of the users with
                 those induced by the values obtained from the
                 probabilistic model. We then provide algorithms to
                 answer k -rank queries for DAQs (disjunctions of atomic
                 queries) under these group preferences and uncertainty
                 that generalizes top- k queries based on the iterative
                 computation of classical skyline answers. We show that
                 such DAQ answering in Datalog+/-- can be done in
                 polynomial time in the data complexity, under certain
                 reasonable conditions, as long as query answering can
                 also be done in polynomial time (in the data
                 complexity) in the underlying classical ontology.
                 Finally, we present a prototype implementation of the
                 query answering system, as well as experimental results
                 (on the running time of our algorithms and the quality
                 of their results) obtained from real-world ontological
                 data and preference models, derived from information
                 gathered from real users, showing in particular that
                 our approach is feasible in practice.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Silva:2014:RCW,
  author =       "Thiago H. Silva and Pedro O. S. Vaz de Melo and
                 Jussara M. Almeida and Juliana Salles and Antonio A. F.
                 Loureiro",
  title =        "Revealing the City That We Cannot See",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "26:1--26:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2677208",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We here investigate the potential of participatory
                 sensor networks derived from location sharing systems,
                 such as Foursquare, to understand the human dynamics of
                 cities. We propose the City Image visualization
                 technique, which builds a transition graph mapping
                 people's movements between location categories, and
                 demonstrate its use to identify similarities and
                 differences of human dynamics across cities by
                 clustering cities according to their citizens'
                 routines. We also analyze centrality metrics of the
                 transition graphs built for different cities,
                 considering transitions between specific venues. We
                 show that these metrics complement the City Image
                 technique, contributing to a deeper understanding of
                 city dynamics.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Vosecky:2014:ISA,
  author =       "Jan Vosecky and Di Jiang and Kenneth Wai-Ting Leung
                 and Kai Xing and Wilfred Ng",
  title =        "Integrating Social and Auxiliary Semantics for
                 Multifaceted Topic Modeling in {Twitter}",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "27:1--27:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2651403",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Microblogging platforms, such as Twitter, have already
                 played an important role in recent cultural, social and
                 political events. Discovering latent topics from social
                 streams is therefore important for many downstream
                 applications, such as clustering, classification or
                 recommendation. However, traditional topic models that
                 rely on the bag-of-words assumption are insufficient to
                 uncover the rich semantics and temporal aspects of
                 topics in Twitter. In particular, microblog content is
                 often influenced by external information sources, such
                 as Web documents linked from Twitter posts, and often
                 focuses on specific entities, such as people or
                 organizations. These external sources provide useful
                 semantics to understand microblogs and we generally
                 refer to these semantics as auxiliary semantics. In
                 this article, we address the mentioned issues and
                 propose a unified framework for Multifaceted Topic
                 Modeling from Twitter streams. We first extract social
                 semantics from Twitter by modeling the social chatter
                 associated with hashtags. We further extract terms and
                 named entities from linked Web documents to serve as
                 auxiliary semantics during topic modeling. The
                 Multifaceted Topic Model (MfTM) is then proposed to
                 jointly model latent semantics among the social terms
                 from Twitter, auxiliary terms from the linked Web
                 documents and named entities. Moreover, we capture the
                 temporal characteristics of each topic. An efficient
                 online inference method for MfTM is developed, which
                 enables our model to be applied to large-scale and
                 streaming data. Our experimental evaluation shows the
                 effectiveness and efficiency of our model compared with
                 state-of-the-art baselines. We evaluate each aspect of
                 our framework and show its utility in the context of
                 tweet clustering.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yang:2014:SMU,
  author =       "Dingqi Yang and Daqing Zhang and Zhiyong Yu and Zhiwen
                 Yu and Djamal Zeghlache",
  title =        "{SESAME}: Mining User Digital Footprints for
                 Fine-Grained Preference-Aware Social Media Search",
  journal =      j-TOIT,
  volume =       "14",
  number =       "4",
  pages =        "28:1--28:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2677209",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Wed Jan 7 15:19:30 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "With the recent popularity of social network services,
                 a significant volume of heterogeneous social media data
                 is generated by users, in the form of texts, photos,
                 videos and collections of points of interest, etc. Such
                 social media data provides users with rich resources
                 for exploring content, such as looking for an
                 interesting video or a favorite point of interest.
                 However, the rapid growth of social media causes
                 difficulties for users to efficiently retrieve their
                 desired media items. Fortunately, users' digital
                 footprints on social networks such as comments
                 massively reflect individual's fine-grained preference
                 on media items, that is, preference on different
                 aspects of the media content, which can then be used
                 for personalized social media search. In this article,
                 we propose SESAME, a fine-grained preference-aware
                 social media search framework leveraging user digital
                 footprints on social networks. First, we collect users'
                 direct feedback on media content from their social
                 networks. Second, we extract users' sentiment about the
                 media content and the associated keywords from their
                 comments to characterize their fine-grained preference.
                 Third, we propose a parallel multituple based ranking
                 tensor factorization algorithm to perform the
                 personalized media item ranking by incorporating two
                 unique features, viz., integrating an enhanced
                 bootstrap sampling method by considering user
                 activeness and adopting stochastic gradient descent
                 parallelization techniques. We experimentally evaluate
                 the SESAME framework using two datasets collected from
                 Foursquare and YouTube, respectively. The results show
                 that SESAME can subtly capture user preference on
                 social media items and consistently outperform baseline
                 approaches by achieving better personalized ranking
                 quality.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kourtellis:2015:SIF,
  author =       "Nicolas Kourtellis and Jeremy Blackburn and Cristian
                 Borcea and Adriana Iamnitchi",
  title =        "Special Issue on Foundations of Social Computing:
                 Enabling Social Applications via Decentralized Social
                 Data Management",
  journal =      j-TOIT,
  volume =       "15",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700057",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Mar 13 07:20:59 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "An unprecedented information wealth produced by online
                 social networks, further augmented by
                 location/collocation data, is currently fragmented
                 across different proprietary services. Combined, it can
                 accurately represent the social world and enable novel
                 socially aware applications. We present Prometheus, a
                 socially aware peer-to-peer service that collects
                 social information from multiple sources into a
                 multigraph managed in a decentralized fashion on
                 user-contributed nodes, and exposes it through an
                 interface implementing nontrivial social inferences
                 while complying with user-defined access policies.
                 Simulations and experiments on PlanetLab with emulated
                 application workloads show the system exhibits good
                 end-to-end response time, low communication overhead,
                 and resilience to malicious attacks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Cooper:2015:NND,
  author =       "Alissa Cooper and Ian Brown",
  title =        "Net Neutrality: Discrimination, Competition, and
                 Innovation in the {UK} and {US}",
  journal =      j-TOIT,
  volume =       "15",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700055",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Mar 13 07:20:59 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We analyze UK and US experiences as they relate to two
                 central net neutrality questions: (1) whether
                 competition serves as a deterrent to the discriminatory
                 treatment of Internet traffic, and (2) whether
                 discrimination creates barriers to application
                 development and innovation. Relying on consumer
                 switching behavior to provide more comprehensive
                 competitive discipline was insufficient for a variety
                 of reasons, including the presence of switching costs.
                 The process of correcting errors in the technology used
                 for application-specific management revealed that such
                 management creates costs for application developers and
                 innovators, regardless of whether their products are
                 targeted for traffic management.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dandekar:2015:SFC,
  author =       "Pranav Dandekar and Ashish Goel and Michael P. Wellman
                 and Bryce Wiedenbeck",
  title =        "Strategic Formation of Credit Networks",
  journal =      j-TOIT,
  volume =       "15",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700058",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Mar 13 07:20:59 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Credit networks are an abstraction for modeling trust
                 among agents in a network. Agents who do not directly
                 trust each other can transact through exchange of IOUs
                 (obligations) along a chain of trust in the network.
                 Credit networks are robust to intrusion, can enable
                 transactions between strangers in exchange economies,
                 and have the liquidity to support a high rate of
                 transactions. We study the formation of such networks
                 when agents strategically decide how much credit to
                 extend each other. We find strong positive network
                 formation results for the simplest theoretical model.
                 When each agent trusts a fixed set of other agents and
                 transacts directly only with those it trusts, all
                 pure-strategy Nash equilibria are social optima.
                 However, when we allow transactions over longer paths,
                 the price of anarchy may be unbounded. On the positive
                 side, when agents have a shared belief about the
                 trustworthiness of each agent, simple greedy dynamics
                 quickly converge to a star-shaped network, which is a
                 social optimum. Similar star-like structures are found
                 in equilibria of heuristic strategies found via
                 simulation studies. In addition, we simulate
                 environments where agents may have varying information
                 about each others' trustworthiness based on their
                 distance in a social network. Empirical game analysis
                 of these scenarios suggests that star structures arise
                 only when defaults are relatively rare, and otherwise,
                 credit tends to be issued over short social distances
                 conforming to the locality of information. Overall, we
                 find that networks formed by self-interested agents
                 achieve a high fraction of available value, as long as
                 this potential value is large enough to enable any
                 network to form.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bild:2015:ACU,
  author =       "David R. Bild and Yue Liu and Robert P. Dick and Z.
                 Morley Mao and Dan S. Wallach",
  title =        "Aggregate Characterization of User Behavior in
                 {Twitter} and Analysis of the Retweet Graph",
  journal =      j-TOIT,
  volume =       "15",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700060",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Mar 13 07:20:59 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Most previous analysis of Twitter user behavior has
                 focused on individual information cascades and the
                 social followers graph, in which the nodes for two
                 users are connected if one follows the other. We
                 instead study aggregate user behavior and the retweet
                 graph with a focus on quantitative descriptions. We
                 find that the lifetime tweet distribution is a type-II
                 discrete Weibull stemming from a power law hazard
                 function, that the tweet rate distribution, although
                 asymptotically power law, exhibits a lognormal cutoff
                 over finite sample intervals, and that the inter-tweet
                 interval distribution is a power law with exponential
                 cutoff. The retweet graph is small-world and
                 scale-free, like the social graph, but less
                 disassortative and has much stronger clustering. These
                 differences are consistent with it better capturing the
                 real-world social relationships of and trust between
                 users than the social graph. Beyond just understanding
                 and modeling human communication patterns and social
                 networks, applications for alternative, decentralized
                 microblogging systems---both predicting real-word
                 performance and detecting spam---are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bandara:2015:PBM,
  author =       "H. M. N. Dilum Bandara and Anura P. Jayasumana",
  title =        "{P2P}-Based, Multi-Attribute Resource Discovery under
                 Real-World Resources and Queries",
  journal =      j-TOIT,
  volume =       "15",
  number =       "1",
  pages =        "5:1--5:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2729139",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Mar 13 07:20:59 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Collaborative peer-to-peer (P2P), grid, and cloud
                 computing rely on resource discovery (RD) solutions to
                 aggregate groups of multi-attribute, dynamic, and
                 distributed resources. However, specific
                 characteristics of real-world resources and queries,
                 and their impact on P2P-based RD, are largely unknown.
                 We analyze the characteristics of resources and queries
                 using data from four real-world systems. These
                 characteristics are then used to qualitatively and
                 quantitatively evaluate the fundamental design choices
                 for P2P-based multi-attribute RD. The datasets exhibit
                 several noteworthy features that affect the
                 performance. For example, compared to uniform queries,
                 real-world queries are relatively easier to resolve
                 using unstructured, superpeer, and
                 single-attribute-dominated query-based structured P2P
                 solutions, as queries mostly specify only a small
                 subset of the available attributes and large ranges of
                 attribute values. However, all the solutions are prone
                 to significant load balancing issues, as the resources
                 and queries are highly skewed and correlated. The
                 implications of our findings for improving RD solutions
                 are also discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Nepal:2015:IBR,
  author =       "Surya Nepal and Cecile Paris and Payam Aghaei Pour and
                 Jill Freyne and Sanat Kumar Bista",
  title =        "Interaction-Based Recommendations for Online
                 Communities",
  journal =      j-TOIT,
  volume =       "15",
  number =       "2",
  pages =        "6:1--6:??",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2774974",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 7 08:55:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "A key challenge in online communities is that of
                 keeping a community active and alive. All online
                 communities work hard to keep their members through
                 various initiatives, such as personalisation and
                 recommendation technologies. In online communities
                 aimed at supporting behavioural change, that is, in
                 domains such as diet, lifestyle, or the environment,
                 the main reason for participation is not to connect
                 with real-world friends for sharing and communicating,
                 but to meet and gain support from like-minded people in
                 an online environment. Introducing personalisation and
                 recommendation features in these networks is
                 challenging, as traditional approaches leverage the
                 densely populated friendship relations found in typical
                 social networks, and these are not present in these new
                 community types. We address this challenge by looking
                 beyond the articulated friendships of a community for
                 evidence of relationships. In particular, we look at
                 the interactions of members of an online community with
                 other members and resources. In this article, we
                 present a social behaviour model and apply it to two
                 types of recommendation systems, a people recommender
                 and a content recommender system. We evaluate our
                 systems using the interaction logs of an online diet
                 and lifestyle community in which 5,000 Australians
                 participated in a 12-week programme. Our results show
                 that our social behaviour-based recommendation
                 algorithms outperform baselines, friendship-based, and
                 link-prediction algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Alhosban:2015:BFM,
  author =       "Amal Alhosban and Khayyam Hashmi and Zaki Malik and
                 Brahim Medjahed and Salima Benbernou",
  title =        "Bottom-Up Fault Management in Service-Based Systems",
  journal =      j-TOIT,
  volume =       "15",
  number =       "2",
  pages =        "7:1--7:??",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2739045",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 7 08:55:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Service Oriented Architecture (SOA) enables the
                 creation of distributed applications from independently
                 developed and deployed services. As with any
                 component-based system, the overall performance and
                 quality of the system is an aggregate function of its
                 component services. In this article, we present a novel
                 approach for managing bottom-up faults in service-based
                 systems. Bottom-up faults are a special case of
                 system-wide exceptions that are defined as abnormal
                 conditions or defects occurring in component services,
                 which if not detected and/or managed, may lead to
                 runtime failures. Examples of bottom-up faults include
                 network outage, server disruption, and changes to
                 service provisioning (e.g., new operation parameter
                 required) that may have an impact on the way component
                 services are consumed. We propose a soft-state
                 signaling-based approach to propagate these faults from
                 participants to composite services. Soft-state refers
                 to a class of protocols where the state of a service is
                 constantly refreshed by periodic messages, and
                 user/service takes up the responsibility of
                 communicating and maintaining its state.
                 Soft-state-based protocols have a number of advantages
                 including implicit error recovery and easier fault
                 management, resulting in high availability for systems.
                 Although soft-state has been widely used in various
                 Internet protocols, this work is the first (to the best
                 of our knowledge) to adopt soft-state for fault
                 management in composite services. The proposed approach
                 includes protocols for fault propagation (pure
                 soft-state and soft-state with explicit removal) and
                 fault reaction (rule-based). We also present experiment
                 results to assess the performance and applicability of
                 our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dai:2015:EDC,
  author =       "Wei Dai and Scott Jordan",
  title =        "The Effect of Data Caps upon {ISP} Service Tier Design
                 and Users",
  journal =      j-TOIT,
  volume =       "15",
  number =       "2",
  pages =        "8:1--8:??",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2774973",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Aug 7 08:55:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We model the design and impact of Internet pricing
                 plans with data caps. We consider a monopoly ISP that
                 maximizes its profit by setting tier prices, tier
                 rates, network capacity, data caps, and overage
                 charges. We show that when data caps are used to
                 maximize profit, a monopoly ISP will keep the basic
                 tier price the same, increase the premium tier rate,
                 and decrease the premium tier price and the basic tier
                 rate. We give analytical and numerical results to
                 illustrate the increase in ISP profit, and the
                 corresponding changes in user tier choices, user
                 surplus, and social welfare.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhuang:2015:PBM,
  author =       "Yi Zhuang and Nan Jiang and Qing Li and Lei Chen and
                 Chunhua Ju",
  title =        "Progressive Batch Medical Image Retrieval Processing
                 in Mobile Wireless Networks",
  journal =      j-TOIT,
  volume =       "15",
  number =       "3",
  pages =        "9:1--9:??",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2783437",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:52 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article addresses a multi-query optimization
                 problem for distributed medical image retrieval in
                 mobile wireless networks by exploiting the dependencies
                 in the derivation of a retrieval evaluation plan. To
                 the best of our knowledge, this is the first work
                 investigating batch medical image retrieval (BMIR)
                 processing in a mobile wireless network environment.
                 Four steps are incorporated in our BMIR algorithm.
                 First, when a number of retrieval requests (i.e., m
                 retrieval images and m radii) are simultaneously
                 submitted by users, then a cost-based dynamic retrieval
                 ( CDRS ) scheduling procedure is invoked to efficiently
                 and effectively identify the correlation among the
                 retrieval spheres (requests) based on a cost model.
                 Next, an index-based image set reduction ( ISR ) is
                 performed at the execution-node level in parallel.
                 Then, a refinement processing of the candidate images
                 is conducted to get the answers. Finally, at the
                 transmission-node level, the corresponding image
                 fragment (IF) replicas are chosen based on an adaptive
                 multi-resolution ( AMR )-based IF replicas selection
                 scheme, and transmitted to the user-node level by a
                 priority-based IF replicas transmission ( PIFT )
                 scheme. The experimental results validate the
                 efficiency and effectiveness of the algorithm in
                 minimizing the response time and increasing the
                 parallelism of I/O and CPU.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zabolotnyi:2015:JCG,
  author =       "Rostyslav Zabolotnyi and Philipp Leitner and Waldemar
                 Hummer and Schahram Dustdar",
  title =        "{JCloudScale}: Closing the Gap Between {IaaS} and
                 {PaaS}",
  journal =      j-TOIT,
  volume =       "15",
  number =       "3",
  pages =        "10:1--10:??",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2792980",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:52 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Building Infrastructure-as-a-Service (IaaS)
                 applications today is a complex, repetitive, and
                 error-prone endeavor, as IaaS does not provide
                 abstractions on top of virtual machines. This article
                 presents JCloudScale, a Java-based middleware for
                 moving elastic applications to IaaS clouds, with
                 minimal adjustments to the application code. We discuss
                 the architecture and technical features, as well as
                 evaluate our system with regard to user acceptance and
                 performance overhead. Our user study reveals that
                 JCloudScale allows many participants to build IaaS
                 applications more efficiently, compared to industrial
                 Platform-as-a-Service (PaaS) solutions. Additionally,
                 unlike PaaS, JCloudScale does not lead to a control
                 loss and vendor lock-in.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Anonymous:2015:PDP,
  author =       "Anonymous",
  title =        "{P-DONAS}: a {P2P}-Based Domain Name System in Access
                 Networks",
  journal =      j-TOIT,
  volume =       "15",
  number =       "3",
  pages =        "11:1--11:??",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2808229",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:52 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The domain name system (DNS) includes infrastructures
                 deployed by Internet service providers (ISPs) and
                 third-party suppliers to ensure high responsiveness,
                 resilience, and load sharing. This equipment implies
                 high effort and energy for 24/7 operation. To
                 facilitate cost reductions in this regard, P-DONAS-a
                 peer-to-peer (P2P)-based DNS-organizes access nodes
                 (ANs) of an ISP's access network, which possess
                 available resources, into a decentralized,
                 self-organizing distributed hash table--based P2P
                 network. Each AN acts as traditional DNS server and
                 solely stores a piece of DNS data. DNS requests issued
                 to an AN are resolved via P2P lookups while maintaining
                 full compatibility with traditional DNS. The article
                 discusses the application of P-DONAS as both a
                 complement and an alternative to traditional DNS.
                 Results from both simulations and a practical test
                 arrangement prove P-DONAS' high scalability and its
                 performance comparable to that of a commercial DNS name
                 server relieving this name server by 53\% to 75\% of
                 DNS traffic.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Norman:2015:ITS,
  author =       "Timothy J. Norman and Suzanne Barber and Rino Falcone
                 and Jie Zhang",
  title =        "Introduction to Theme Section on Trust in Social
                 Networks and Systems",
  journal =      j-TOIT,
  volume =       "15",
  number =       "4",
  pages =        "12:1--12:??",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2835510",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:53 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Falcone:2015:RCT,
  author =       "Rino Falcone and Alessandro Sapienza and Cristiano
                 Castelfranchi",
  title =        "The Relevance of Categories for Trusting Information
                 Sources",
  journal =      j-TOIT,
  volume =       "15",
  number =       "4",
  pages =        "13:1--13:??",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2803175",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:53 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we are interested in the fact that
                 relevance and trustworthiness of information acquired
                 by an agent X from a source F strictly depends and
                 derives from X's trust in F with respect to the kind of
                 information. In particular, we are interested in
                 analyzing the relevance of F's category as indicator
                 for its trustworthiness with respect to the specific
                 informative goals of X. In this article, we analyze an
                 interactive cognitive model for searching information
                 in a world in which each agent can be considered as
                 belonging to a specific agent's category. We also
                 consider variability within the canonical categorical
                 behavior and consequent influence on the
                 trustworthiness of provided information. The introduced
                 interactive cognitive model also allows evaluation of
                 the trustworthiness of a source both on the basis of
                 its category and on past direct experience with it,
                 thus selecting the more adequate source with respect to
                 the informative goals to achieve. We present a
                 computational approach based on fuzzy sets and some
                 selected simulation scenarios together with the
                 discussion of their more interesting results.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jiang:2015:SRT,
  author =       "Wenjun Jiang and Jie Wu and Guojun Wang",
  title =        "On Selecting Recommenders for Trust Evaluation in
                 Online Social Networks",
  journal =      j-TOIT,
  volume =       "15",
  number =       "4",
  pages =        "14:1--14:??",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2807697",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:53 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Trust is a central component of social interactions
                 among humans. Many applications motivate the
                 consideration of trust evaluation in online social
                 networks (OSNs). Some work has been proposed based on a
                 trusted graph. However, it is still an open challenge
                 to construct a trusted graph, especially in terms of
                 selecting proper recommenders, which can be used to
                 predict the trustworthiness of an unknown target
                 efficiently and effectively. Based on the intuition
                 that people who are close to and influential to us can
                 make more proper and acceptable recommendations, we
                 present the idea of recommendation-aware trust
                 evaluation (RATE). We further model the recommender
                 selection problem as an optimization problem, with the
                 objectives of higher accuracy, lower risk
                 (uncertainty), and lower cost. Four metrics:
                 trustworthiness, expertise, uncertainty, and cost, are
                 identified to measure and adjust the quality of
                 recommenders. We focus on a 1-hop recommender
                 selection, for which we propose the FluidTrust model to
                 better illustrate the trust--decision making process of
                 a user. We also discuss the extension of multihop
                 scenarios and multitarget scenarios. Experimental
                 results, with the real social network datasets of
                 Epinions and Advogato, validate the effectiveness of
                 RATE: it can predict trust with higher accuracy (it
                 gains about 20\% higher accuracy in Epinions), lower
                 risk, and less cost (about a 30\% improvement).",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ros:2015:COC,
  author =       "Santiago Pina Ros and {\'A}ngel Pina Canelles and
                 Manuel Gil P{\'e}rez and F{\'e}lix G{\'o}mez M{\'a}rmol
                 and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Chasing Offensive Conduct in Social Networks: a
                 Reputation-Based Practical Approach for {Frisber}",
  journal =      j-TOIT,
  volume =       "15",
  number =       "4",
  pages =        "15:1--15:??",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2797139",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:53 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Social network users take advantage of anonymity to
                 share rumors or gossip about others, making it
                 important to provide means to report offensive conduct.
                 This article presents a proposal to automatically
                 manage these reports. We consider not only the users'
                 public behavior, but also private messages between
                 users. The automatic approach is based, in both cases,
                 on the reporters' reputation along with other metrics
                 intrinsic to social networks. Promising results from
                 adopting the proposed reporting methods on Frisber, a
                 geolocalized social network in production, are
                 presented as well as some experiments based on real
                 data extracted from Frisber.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Sutcliffe:2015:MRT,
  author =       "Alistair G. Sutcliffe and Di Wang and Robin I. M.
                 Dunbar",
  title =        "Modelling the Role of Trust in Social Relationships",
  journal =      j-TOIT,
  volume =       "15",
  number =       "4",
  pages =        "16:1--16:??",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2815620",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Dec 19 18:06:53 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "A social trust model is presented for investigating
                 social relationships and social networks in the real
                 world and in social media. The results demonstrate that
                 multilevel social structures, with a few strong
                 relationships, more medium ties, and large numbers of
                 weak ties, emerge in an evolutionary simulation when
                 well-being and alliances are rewarded with high levels
                 of social interaction. `Favour-the-few' trust
                 strategies were more competitive than others under a
                 wide range of fitness conditions, suggesting that the
                 development of complex, multilevel social structures
                 depends on capacity for high investment in social time
                 and preferential social interaction strategies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Benslimane:2016:UWC,
  author =       "Djamal Benslimane and Quan Z. Sheng and Mahmoud
                 Barhamgi and Henri Prade",
  title =        "The Uncertain {Web}: Concepts, Challenges, and Current
                 Solutions",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2847252",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2016:TAD,
  author =       "Peng Zhang and Jing He and Guodong Long and Guangyan
                 Huang and Chengqi Zhang",
  title =        "Towards Anomalous Diffusion Sources Detection in a
                 Large Network",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2806889",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Witnessing the wide spread of malicious information in
                 large networks, we develop an efficient method to
                 detect anomalous diffusion sources and thus protect
                 networks from security and privacy attacks. To date,
                 most existing work on diffusion sources detection are
                 based on the assumption that network snapshots that
                 reflect information diffusion can be obtained
                 continuously. However, obtaining snapshots of an entire
                 network needs to deploy detectors on all network nodes
                 and thus is very expensive. Alternatively, in this
                 article, we study the diffusion sources locating
                 problem by learning from information diffusion data
                 collected from only a small subset of network nodes.
                 Specifically, we present a new regression learning
                 model that can detect anomalous diffusion sources by
                 jointly solving five challenges, that is, unknown
                 number of source nodes, few activated detectors,
                 unknown initial propagation time, uncertain propagation
                 path and uncertain propagation time delay. We
                 theoretically analyze the strength of the model and
                 derive performance bounds. We empirically test and
                 compare the model using both synthetic and real-world
                 networks to demonstrate its performance.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Abboura:2016:QBO,
  author =       "Asma Abboura and Soror Sahri and Latifa Baba-Hamed and
                 Mourad Ouziri and Salima Benbernou",
  title =        "Quality-Based Online Data Reconciliation",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2806888",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "One of the main challenges in data matching and data
                 cleaning, in highly integrated systems, is duplicates
                 detection. While the literature abounds of approaches
                 detecting duplicates corresponding to the same
                 real-world entity, most of these approaches tend to
                 eliminate duplicates (wrong information) from the
                 sources, hence leading to what is called data repair.
                 In this article, we propose a framework that
                 automatically detects duplicates at query time and
                 effectively identifies the consistent version of the
                 data, while keeping inconsistent data in the sources.
                 Our framework uses matching dependencies (MDs) to
                 detect duplicates through the concept of data
                 reconciliation rules (DRR) and conditional function
                 dependencies (CFDs) to assess the quality of different
                 attribute values. We also build a duplicate
                 reconciliation index ( DRI ), based on clusters of
                 duplicates detected by a set of DRRs to speed up the
                 online data reconciliation process. Our experiments of
                 a real-world data collection show the efficiency and
                 effectiveness of our framework.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ma:2016:SAD,
  author =       "Jiangang Ma and Le Sun and Hua Wang and Yanchun Zhang
                 and Uwe Aickelin",
  title =        "Supervised Anomaly Detection in Uncertain
                 Pseudoperiodic Data Streams",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2806890",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Uncertain data streams have been widely generated in
                 many Web applications. The uncertainty in data streams
                 makes anomaly detection from sensor data streams far
                 more challenging. In this article, we present a novel
                 framework that supports anomaly detection in uncertain
                 data streams. The proposed framework adopts the wavelet
                 soft-thresholding method to remove the noises or errors
                 in data streams. Based on the refined data streams, we
                 develop effective period pattern recognition and
                 feature extraction techniques to improve the
                 computational efficiency. We use classification methods
                 for anomaly detection in the corrected data stream. We
                 also empirically show that the proposed approach shows
                 a high accuracy of anomaly detection on several real
                 datasets.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Makhoul:2016:UEA,
  author =       "Abdallah Makhoul and Christophe Guyeux and Mourad
                 Hakem and Jacques M. Bahi",
  title =        "Using an Epidemiological Approach to Maximize Data
                 Survival in the {Internet of Things}",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "5:1--5:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2812810",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Internet of Things (IoT) has gained worldwide
                 attention in recent years. It transforms the everyday
                 objects that surround us into proactive actors of the
                 Internet, generating and consuming information. An
                 important issue related to the appearance of such a
                 large-scale self-coordinating IoT is the reliability
                 and the collaboration between the objects in the
                 presence of environmental hazards. High failure rates
                 lead to significant loss of data. Therefore, data
                 survivability is a main challenge of the IoT. In this
                 article, we have developed a compartmental e-Epidemic
                 SIR (Susceptible-Infectious-Recovered) model to save
                 the data in the network and let it survive after
                 attacks. Furthermore, our model takes into account the
                 dynamic topology of the network where natural death
                 (crashing nodes) and birth are defined and analyzed.
                 Theoretical methods and simulations are employed to
                 solve and simulate the system of equations developed
                 and to analyze the model.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Leung:2016:CMS,
  author =       "Kenneth Wai-Ting Leung and Di Jiang and Dik Lun Lee
                 and Wilfred Ng",
  title =        "Constructing Maintainable Semantic Relation Network
                 from Ambiguous Concepts in {Web} Content",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "6:1--6:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2814568",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The semantic network is a form of knowledge that
                 represents various relationships between concepts with
                 ambiguity. The knowledge can be employed to identify
                 semantically related objects. It helps, for example, a
                 recommender system to generate effective
                 recommendations to the users. We propose to study a new
                 semantic network, namely, the Concept Relation Network
                 (CRN), which is efficiently constructed and maintained
                 using existing web search engines. CRN tackles the
                 uncertainty and dynamics of web content, and thus is
                 optimized for many important web applications, such as
                 social networks and search engines. It is a large
                 semantic network for the collection, analysis, and
                 interpretation of web content, and serves as a
                 cornerstone for applications such as web search
                 engines, recommendation systems, and social networks
                 that can benefit from a large-scale knowledge base. In
                 this article, we present two applications for CRN: (1)
                 search engine and web analytic and (2) semantic
                 information retrieval. Experimental results show that
                 CRN effectively enhances these applications by
                 considering the heterogeneous and polysemous nature of
                 web content.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Malik:2016:SRE,
  author =       "Zaki Malik and Brahim Medjahed and Abdelmounaam
                 Rezgui",
  title =        "{sCARE}: Reputation Estimation for Uncertain {Web}
                 Services",
  journal =      j-TOIT,
  volume =       "16",
  number =       "1",
  pages =        "7:1--7:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2792979",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we propose a Statistical
                 Cloud-Assisted Reputation Estimation (sCARE) approach
                 for service-oriented environments in uncertain
                 situations. sCARE uses the ratings from cooperating
                 service consumers to uniformly describe the randomness
                 and fuzziness of the different submitted ratings and
                 their associated relationships in quantitative terms.
                 We also define discriminant functions to model the
                 honesty (or lack thereof) of the service raters.
                 Experiment results show that our proposed model
                 performs in a fairly accurate manner for a number of
                 real-world scenarios. A comparison study with similar
                 existing works is also provided to asses sCARE's
                 performance.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ko:2016:STU,
  author =       "In-Young Ko and Han-Gyu Ko and Angel Jimenez Molina
                 and Jung-Hyun Kwon",
  title =        "{SoIoT}: Toward A User-Centric {IoT}-Based Service
                 Framework",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "8:1--8:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2835492",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "An emerging issue in urban computing environments is
                 the seamless selection, composition, and delivery of
                 user-centric services that run over what is known as
                 the Internet of Things (IoT). This challenge is about
                 enabling services actuated by IoT devices to be
                 delivered spontaneously from the perspective of users.
                 To accomplish this goal, we propose the
                 Service-Oriented Internet of Things (SoIoT), a
                 user-centric IoT-based service framework, which
                 integrates services that utilize IoT resources in an
                 urban computing environment. This framework provides a
                 task-oriented computing approach that enables the
                 composition of IoT-based services in a spontaneous
                 manner to accomplish a user task. Tasks can also be
                 recommended to users based on the available IoT
                 resources in an environment and on the contextual
                 knowledge that is represented and managed in social,
                 spatial, and temporal aspects. These tasks are then
                 bound to a set of service instances and performed in a
                 distributed manner. This final composition ensures the
                 Quality of Service (QoS) requirements of the tasks and
                 is assigned to multiple client devices for the
                 efficient utilization of IoT resources. We prove the
                 practicality of our approach by showing a real-case
                 service scenario implemented in our IoT-based test-bed
                 as well as experimental results.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yao:2016:TIR,
  author =       "Lina Yao and Quan Z. Sheng and Anne H. H. Ngu and Xue
                 Li",
  title =        "Things of Interest Recommendation by Leveraging
                 Heterogeneous Relations in the {Internet of Things}",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "9:1--9:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2837024",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The emerging Internet of Things (IoT) bridges the gap
                 between the physical and the digital worlds, which
                 enables a deeper understanding of user preferences and
                 behaviors. The rich interactions and relations between
                 users and things call for effective and efficient
                 recommendation approaches to better meet users'
                 interests and needs. In this article, we focus on the
                 problem of things recommendation in IoT, which is
                 important for many applications such as e-Commerce and
                 health care. We discuss the new properties of
                 recommending things of interest in IoT, and propose a
                 unified probabilistic factor based framework by fusing
                 relations across heterogeneous entities of IoT, for
                 example, user-thing relations, user-user relations, and
                 thing-thing relations, to make more accurate
                 recommendations. Specifically, we develop a hypergraph
                 to model things' spatiotemporal correlations, on top of
                 which implicit things correlations can be generated. We
                 have built an IoT testbed to validate our approach and
                 the experimental results demonstrate its feasibility
                 and effectiveness.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lippi:2016:AMS,
  author =       "Marco Lippi and Paolo Torroni",
  title =        "Argumentation Mining: State of the Art and Emerging
                 Trends",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "10:1--10:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2850417",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Argumentation mining aims at automatically extracting
                 structured arguments from unstructured textual
                 documents. It has recently become a hot topic also due
                 to its potential in processing information originating
                 from the Web, and in particular from social media, in
                 innovative ways. Recent advances in machine learning
                 methods promise to enable breakthrough applications to
                 social and economic sciences, policy making, and
                 information technology: something that only a few years
                 ago was unthinkable. In this survey article, we
                 introduce argumentation models and methods, review
                 existing systems and applications, and discuss
                 challenges and perspectives of this exciting new
                 research area.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Vogler:2016:SFP,
  author =       "Michael V{\"o}gler and Johannes M. Schleicher and
                 Christian Inzinger and Schahram Dustdar",
  title =        "A Scalable Framework for Provisioning Large-Scale
                 {IoT} Deployments",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "11:1--11:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2850416",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Internet of Things (IoT) devices are usually
                 considered external application dependencies that only
                 provide data or process and execute simple
                 instructions. The recent emergence of IoT devices with
                 embedded execution environments allows practitioners to
                 deploy and execute custom application logic directly on
                 the device. This approach fundamentally changes the
                 overall process of designing, developing, deploying,
                 and managing IoT systems. However, these devices
                 exhibit significant differences in available execution
                 environments, processing, and storage capabilities. To
                 accommodate this diversity, a structured approach is
                 needed to uniformly and transparently deploy
                 application components onto a large number of
                 heterogeneous devices. This is especially important in
                 the context of large-scale IoT systems, such as in the
                 smart city domain. In this article, we present LEONORE,
                 an infrastructure toolset that provides elastic
                 provisioning of application components on
                 resource-constrained and heterogeneous edge devices in
                 large-scale IoT deployments. LEONORE supports
                 push-based as well as pull-based deployments. To
                 improve scalability and reduce generated network
                 traffic between cloud and edge infrastructure, we
                 present a distributed provisioning approach that
                 deploys LEONORE local nodes within the deployment
                 infrastructure close to the actual edge devices. We
                 show that our solution is able to elastically provision
                 large numbers of devices using a testbed based on a
                 real-world industry scenario.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bing:2016:UEP,
  author =       "Lidong Bing and Tak-Lam Wong and Wai Lam",
  title =        "Unsupervised Extraction of Popular Product Attributes
                 from E-Commerce {Web} Sites by Considering Customer
                 Reviews",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "12:1--12:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2857054",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We develop an unsupervised learning framework for
                 extracting popular product attributes from product
                 description pages originated from different E-commerce
                 Web sites. Unlike existing information extraction
                 methods that do not consider the popularity of product
                 attributes, our proposed framework is able to not only
                 detect popular product features from a collection of
                 customer reviews but also map these popular features to
                 the related product attributes. One novelty of our
                 framework is that it can bridge the vocabulary gap
                 between the text in product description pages and the
                 text in customer reviews. Technically, we develop a
                 discriminative graphical model based on hidden
                 Conditional Random Fields. As an unsupervised model,
                 our framework can be easily applied to a variety of new
                 domains and Web sites without the need of labeling
                 training samples. Extensive experiments have been
                 conducted to demonstrate the effectiveness and
                 robustness of our framework.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Amato:2016:MOB,
  author =       "Alba Amato and Salvatore Venticinque",
  title =        "Multiobjective Optimization for Brokering of
                 Multicloud Service Composition",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "13:1--13:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2870634",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The choice of cloud providers whose offers best fit
                 the requirements of a particular application is a
                 complex issue due to the heterogeneity of the services
                 in terms of resources, costs, technology, and service
                 levels that providers ensure. This article investigates
                 the effectiveness of multiobjective genetic algorithms
                 to resolve a multicloud brokering problem. Experimental
                 results provide clear evidence about how such a
                 solution improves the choice made manually by users
                 returning in real time optimal alternatives. It also
                 investigates how the optimality depends on different
                 genetic algorithms and parameters, problem type, and
                 time constraints.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Courcoubetis:2016:NPP,
  author =       "Costas Courcoubetis and Laszlo Gyarmati and Nikolaos
                 Laoutaris and Pablo Rodriguez and Kostas Sdrolias",
  title =        "Negotiating Premium Peering Prices: a Quantitative
                 Model with Applications",
  journal =      j-TOIT,
  volume =       "16",
  number =       "2",
  pages =        "14:1--14:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2883610",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jun 20 07:06:50 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We have developed a novel methodology for deriving
                 bandwidth prices for premium direct peering between
                 Access ISPs (A-ISPs) and Content and Service Providers
                 (CSPs) that want to deliver content and services in
                 premium quality. Our methodology establishes a direct
                 link between service profitability, for example, from
                 advertising, user and subscriber loyalty,
                 interconnection costs, and finally bandwidth price for
                 peering. Unlike existing work in both the networking
                 and economics literature, our resulting computational
                 model, built around Nash bargaining, can be used for
                 deriving quantitative results comparable to actual
                 market prices. We analyze the U.S. market and derive
                 prices for video, that compare favorably with existing
                 prices for transit and paid peering. We also observe
                 that the fair prices returned by the model for
                 high-profit/low-volume services such as search, are
                 orders of magnitude higher than current bandwidth
                 prices. This implies that resolving existing (fierce)
                 interconnection tussles may require per service,
                 instead of wholesale, peering between A-ISPs and CSPs.
                 Our model can be used for deriving initial benchmark
                 prices for such negotiations.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Leitner:2016:PCS,
  author =       "Philipp Leitner and J{\"u}rgen Cito",
  title =        "Patterns in the Chaos --- A Study of Performance
                 Variation and Predictability in Public {IaaS} Clouds",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "15:1--15:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2885497",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Benchmarking the performance of public cloud providers
                 is a common research topic. Previous work has already
                 extensively evaluated the performance of different
                 cloud platforms for different use cases, and under
                 different constraints and experiment setups. In this
                 article, we present a principled, large-scale
                 literature review to collect and codify existing
                 research regarding the predictability of performance in
                 public Infrastructure-as-a-Service (IaaS) clouds. We
                 formulate 15 hypotheses relating to the nature of
                 performance variations in IaaS systems, to the factors
                 of influence of performance variations, and how to
                 compare different instance types. In a second step, we
                 conduct extensive real-life experimentation on four
                 cloud providers to empirically validate those
                 hypotheses. We show that there are substantial
                 differences between providers. Hardware heterogeneity
                 is today less prevalent than reported in earlier
                 research, while multitenancy has a dramatic impact on
                 performance and predictability, but only for some cloud
                 providers. We were unable to discover a clear impact of
                 the time of the day or the day of the week on cloud
                 performance.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Cao:2016:MMR,
  author =       "Tien-Dung Cao and Tran-Vu Pham and Quang-Hieu Vu and
                 Hong-Linh Truong and Duc-Hung Le and Schahram Dustdar",
  title =        "{MARSA}: a Marketplace for Realtime Human Sensing
                 Data",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "16:1--16:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2883611",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article introduces a dynamic cloud-based
                 marketplace of near-realtime human sensing data (MARSA)
                 for different stakeholders to sell and buy
                 near-realtime data. MARSA is designed for environments
                 where information technology (IT) infrastructures are
                 not well developed but the need to gather and sell
                 near-realtime data is great. To this end, we present
                 techniques for selecting data types and managing data
                 contracts based on different cost models, quality of
                 data, and data rights. We design our MARSA platform by
                 leveraging different data transferring solutions to
                 enable an open and scalable communication mechanism
                 between sellers (data providers) and buyers (data
                 consumers). To evaluate MARSA, we carry out several
                 experiments with the near-realtime transportation data
                 provided by people in Ho Chi Minh City, Vietnam, and
                 simulated scenarios in multicloud environments.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Rodriguez:2016:MQA,
  author =       "Carlos Rodr{\'\i}guez and Florian Daniel and Fabio
                 Casati",
  title =        "Mining and Quality Assessment of Mashup Model Patterns
                 with the Crowd: a Feasibility Study",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "17:1--17:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2903138",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Pattern mining, that is, the automated discovery of
                 patterns from data, is a mathematically complex and
                 computationally demanding problem that is generally not
                 manageable by humans. In this article, we focus on
                 small datasets and study whether it is possible to mine
                 patterns with the help of the crowd by means of a set
                 of controlled experiments on a common crowdsourcing
                 platform. We specifically concentrate on mining model
                 patterns from a dataset of real mashup models taken
                 from Yahoo! Pipes and cover the entire pattern mining
                 process, including pattern identification and quality
                 assessment. The results of our experiments show that a
                 sensible design of crowdsourcing tasks indeed may
                 enable the crowd to identify patterns from small
                 datasets (40 models). The results, however, also show
                 that the design of tasks for the assessment of the
                 quality of patterns to decide which patterns to retain
                 for further processing and use is much harder (our
                 experiments fail to elicit assessments from the crowd
                 that are similar to those by an expert). The problem is
                 relevant in general to model-driven development (e.g.,
                 UML, business processes, scientific workflows), in that
                 reusable model patterns encode valuable modeling and
                 domain knowledge, such as best practices,
                 organizational conventions, or technical choices, that
                 modelers can benefit from when designing their own
                 models.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Copil:2016:RFS,
  author =       "Georgiana Copil and Daniel Moldovan and Hong-Linh
                 Truong and Schahram Dustdar",
  title =        "{rSYBL}: a Framework for Specifying and Controlling
                 Cloud Services Elasticity",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "18:1--18:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2925990",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Cloud applications can benefit from the on-demand
                 capacity of cloud infrastructures, which offer
                 computing and data resources with diverse capabilities,
                 pricing, and quality models. However, state-of-the-art
                 tools mainly enable the user to specify
                 ``if-then-else'' policies concerning resource usage and
                 size, resulting in a cumbersome specification process
                 that lacks expressiveness for enabling the control of
                 complex multilevel elasticity requirements. In this
                 article, first we propose SYBL, a novel language for
                 specifying elasticity requirements at multiple levels
                 of abstraction. Second, we design and develop the rSYBL
                 framework for controlling cloud services at multiple
                 levels of abstractions. To enforce user-specified
                 requirements, we develop a multilevel elasticity
                 control mechanism enhanced with conflict resolution.
                 rSYBL supports different cloud providers and is highly
                 extensible, allowing service providers or developers to
                 define their own connectors to the desired
                 infrastructures or tools. We validate it through
                 experiments with two distinct services, evaluating
                 rSYBL over two distinct cloud infrastructures, and
                 showing the importance of multilevel elasticity
                 control.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Farias:2016:IDT,
  author =       "Delia Iraz{\'u} Hern{\'a}ndez Far{\'\i}as and Viviana
                 Patti and Paolo Rosso",
  title =        "Irony Detection in {Twitter}: The Role of Affective
                 Content",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "19:1--19:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2930663",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Irony has been proven to be pervasive in social media,
                 posing a challenge to sentiment analysis systems. It is
                 a creative linguistic phenomenon where affect-related
                 aspects play a key role. In this work, we address the
                 problem of detecting irony in tweets, casting it as a
                 classification problem. We propose a novel model that
                 explores the use of affective features based on a wide
                 range of lexical resources available for English,
                 reflecting different facets of affect. Classification
                 experiments over different corpora show that affective
                 information helps in distinguishing among ironic and
                 nonironic tweets. Our model outperforms the state of
                 the art in almost all cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Costa:2016:MBC,
  author =       "Gianni Costa and Riccardo Ortale",
  title =        "Model-Based Collaborative Personalized Recommendation
                 on Signed Social Rating Networks",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "20:1--20:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2934681",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Recommendation on signed social rating networks is
                 studied through an innovative approach. Bayesian
                 probabilistic modeling is used to postulate a realistic
                 generative process, wherein user and item interactions
                 are explained by latent factors, whose relevance varies
                 within the underlying network organization into user
                 communities and item groups. Approximate posterior
                 inference captures distrust propagation and drives
                 Gibbs sampling to allow rating and (dis)trust
                 prediction for recommendation along with the
                 unsupervised exploratory analysis of network
                 organization. Comparative experiments reveal the
                 superiority of our approach in rating and link
                 prediction on Epinions and Ciao, besides community
                 quality and recommendation sensitivity to network
                 organization.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2016:DEP,
  author =       "Rui Zhang and Rui Xue and Ting Yu and Ling Liu",
  title =        "Dynamic and Efficient Private Keyword Search over
                 Inverted Index-Based Encrypted Data",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "21:1--21:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2940328",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Querying over encrypted data is gaining increasing
                 popularity in cloud-based data hosting services.
                 Security and efficiency are recognized as two important
                 and yet conflicting requirements for querying over
                 encrypted data. In this article, we propose an
                 efficient private keyword search (EPKS) scheme that
                 supports binary search and extend it to dynamic
                 settings (called DEPKS ) for inverted index--based
                 encrypted data. First, we describe our approaches of
                 constructing a searchable symmetric encryption (SSE)
                 scheme that supports binary search. Second, we present
                 a novel framework for EPKS and provide its formal
                 security definitions in terms of plaintext privacy and
                 predicate privacy by modifying Shen et al.'s security
                 notions [Shen et al. 2009]. Third, built on the
                 proposed framework, we design an EPKS scheme whose
                 complexity is logarithmic in the number of keywords.
                 The scheme is based on the groups of prime order and
                 enjoys strong notions of security, namely statistical
                 plaintext privacy and statistical predicate privacy.
                 Fourth, we extend the EPKS scheme to support dynamic
                 keyword and document updates. The extended scheme not
                 only maintains the properties of logarithmic-time
                 search efficiency and plaintext privacy and predicate
                 privacy but also has fewer rounds of communications for
                 updates compared to existing dynamic search encryption
                 schemes. We experimentally evaluate the proposed EPKS
                 and DEPKS schemes and show that they are significantly
                 more efficient in terms of both keyword search
                 complexity and communication complexity than existing
                 randomized SSE schemes.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bertino:2016:ITI,
  author =       "Elisa Bertino and Kim-Kwang Raymond Choo and Dimitrios
                 Georgakopolous and Surya Nepal",
  title =        "{Internet of Things (IoT)}: Smart and Secure Service
                 Delivery",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "22:1--22:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3013520",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Internet of Things (IoT) is the latest Internet
                 evolution that incorporates a diverse range of things
                 such as sensors, actuators, and services deployed by
                 different organizations and individuals to support a
                 variety of applications. The information captured by
                 IoT present an unprecedented opportunity to solve
                 large-scale problems in those application domains to
                 deliver services; example applications include
                 precision agriculture, environment monitoring, smart
                 health, smart manufacturing, and smart cities. Like all
                 other Internet based services in the past, IoT-based
                 services are also being developed and deployed without
                 security consideration. By nature, IoT devices and
                 services are vulnerable to malicious cyber threats as
                 they cannot be given the same protection that is
                 received by enterprise services within an enterprise
                 perimeter. While IoT services will play an important
                 role in our daily life resulting in improved
                 productivity and quality of life, the trend has also
                 ``encouraged'' cyber-exploitation and evolution and
                 diversification of malicious cyber threats. Hence,
                 there is a need for coordinated efforts from the
                 research community to address resulting concerns, such
                 as those presented in this special section. Several
                 potential research topics are also identified in this
                 special section.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Duan:2016:SDC,
  author =       "Li Duan and Dongxi Liu and Yang Zhang and Shiping Chen
                 and Ren Ping Liu and Bo Cheng and Junliang Chen",
  title =        "Secure Data-Centric Access Control for Smart Grid
                 Services Based on Publish\slash Subscribe Systems",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3007190",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The communication systems in existing smart grids
                 mainly take the request/reply interaction model, in
                 which data access is under the direct control of data
                 producers. This tightly controlled interaction model is
                 not scalable to support complex interactions among
                 smart grid services. On the contrary, the
                 publish/subscribe system features a loose coupling
                 communication infrastructure and allows indirect,
                 anonymous and multicast interactions among smart grid
                 services. The publish/subscribe system can thus support
                 scalable and flexible collaboration among smart grid
                 services. However, the access is not under the direct
                 control of data producers, it might not be easy to
                 implement an access control scheme for a
                 publish/subscribe system. In this article, we propose a
                 Data-Centric Access Control Framework (DCACF) to
                 support secure access control in a publish/subscribe
                 model. This framework helps to build scalable smart
                 grid services, while keeping features of service
                 interactions and data confidentiality at the same time.
                 The data published in our DCACF is encrypted with a
                 fully homomorphic encryption scheme, which allows
                 in-grid homomorphic aggregation of the encrypted data.
                 The encrypted data is accompanied by Bloom-filter
                 encoded control policies and access credentials to
                 enable indirect access control. We have analyzed the
                 correctness and security of our DCACF and evaluated its
                 performance in a distributed environment.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2016:PAG,
  author =       "Yuexin Zhang and Yang Xiang and Xinyi Huang",
  title =        "Password-Authenticated Group Key Exchange: a
                 Cross-Layer Design",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2955095",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Two-party password-authenticated key exchange (2PAKE)
                 protocols provide a natural mechanism for secret key
                 establishment in distributed applications, and they
                 have been extensively studied in past decades. However,
                 only a few efforts have been made so far to design
                 password-authenticated group key exchange (GPAKE)
                 protocols. In a 2PAKE or GPAKE protocol, it is assumed
                 that short passwords are preshared among users. This
                 assumption, however, would be impractical in certain
                 applications. Motivated by this observation, this
                 article presents a GPAKE protocol without the password
                 sharing assumption. To obtain the passwords, wireless
                 devices, such as smart phones, tablets, and laptops,
                 are used to extract short secrets at the physical
                 layer. Using the extracted secrets, users in our
                 protocol can establish a group key at higher layers
                 with light computation consumptions. Thus, our GPAKE
                 protocol is a cross-layer design. Additionally, our
                 protocol is a compiler, that is, our protocol can
                 transform any provably secure 2PAKE protocol into a
                 GPAKE protocol with only one more round of
                 communications. Besides, the proposed protocol is
                 proved secure in the standard model.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Saxena:2016:API,
  author =       "Neetesh Saxena and Santiago Grijalva and Narendra S.
                 Chaudhari",
  title =        "Authentication Protocol for an {IoT}-Enabled {LTE}
                 Network",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "25:1--25:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2981547",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Evolved Packet System-based Authentication and Key
                 Agreement (EPS-AKA) protocol of the long-term evolution
                 (LTE) network does not support Internet of Things (IoT)
                 objects and has several security limitations, including
                 transmission of the object's (user/device) identity and
                 key set identifier in plaintext over the network,
                 synchronization, large overhead, limited identity
                 privacy, and security attack vulnerabilities. In this
                 article, we propose a new secure and efficient AKA
                 protocol for the LTE network that supports secure and
                 efficient communications among various IoT devices as
                 well as among the users. Analysis shows that our
                 protocol is secure, efficient, and privacy preserved,
                 and reduces bandwidth consumption during
                 authentication.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Siboni:2016:AST,
  author =       "Shachar Siboni and Asaf Shabtai and Nils O.
                 Tippenhauer and Jemin Lee and Yuval Elovici",
  title =        "Advanced Security Testbed Framework for Wearable {IoT}
                 Devices",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "26:1--26:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2981546",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Analyzing the security of Wearable Internet-of-Things
                 (WIoT) devices is considered a complex task due to
                 their heterogeneous nature. In addition, there is
                 currently no mechanism that performs security testing
                 for WIoT devices in different contexts. In this
                 article, we propose an innovative security testbed
                 framework targeted at wearable devices, where a set of
                 security tests are conducted, and a dynamic analysis is
                 performed by realistically simulating environmental
                 conditions in which WIoT devices operate. The
                 architectural design of the proposed testbed and a
                 proof-of-concept, demonstrating a preliminary analysis
                 and the detection of context-based attacks executed by
                 smartwatch devices, are presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Saeed:2016:IID,
  author =       "Ahmed Saeed and Ali Ahmadinia and Abbas Javed and Hadi
                 Larijani",
  title =        "Intelligent Intrusion Detection in Low-Power {IoTs}",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "27:1--27:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2990499",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Security and privacy of data are one of the prime
                 concerns in today's Internet of Things (IoT).
                 Conventional security techniques like signature-based
                 detection of malware and regular updates of a signature
                 database are not feasible solutions as they cannot
                 secure such systems effectively, having limited
                 resources. Programming languages permitting immediate
                 memory accesses through pointers often result in
                 applications having memory-related errors, which may
                 lead to unpredictable failures and security
                 vulnerabilities. Furthermore, energy efficient IoT
                 devices running on batteries cannot afford the
                 implementation of cryptography algorithms as such
                 techniques have significant impact on the system power
                 consumption. Therefore, in order to operate IoT in a
                 secure manner, the system must be able to detect and
                 prevent any kind of intrusions before the network
                 (i.e., sensor nodes and base station) is destabilised
                 by the attackers. In this article, we have presented an
                 intrusion detection and prevention mechanism by
                 implementing an intelligent security architecture using
                 random neural networks (RNNs). The application's source
                 code is also instrumented at compile time in order to
                 detect out-of-bound memory accesses. It is based on
                 creating tags, to be coupled with each memory
                 allocation and then placing additional tag checking
                 instructions for each access made to the memory. To
                 validate the feasibility of the proposed security
                 solution, it is implemented for an existing IoT system
                 and its functionality is practically demonstrated by
                 successfully detecting the presence of any suspicious
                 sensor node within the system operating range and
                 anomalous activity in the base station with an accuracy
                 of 97.23\%. Overall, the proposed security solution has
                 presented a minimal performance overhead.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Do:2016:CMD,
  author =       "Ngoc Do and Ye Zhao and Cheng-Hsin Hsu and Nalini
                 Venkatasubramanian",
  title =        "Crowdsourced Mobile Data Transfer with Delay Bound",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "28:1--28:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2939376",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this article, we design a crowdsourcing system,
                 CrowdMAC, where mobile devices form a local community
                 or marketplace to share network access and transfer
                 data for each other. CrowdMAC enables (i) mobile
                 clients to select and exploit multiple mobile hotspots
                 in its vicinity for data transfer and (ii) mobile
                 hotspots to open their cellular connectivity to
                 admit/serve delay-bounded requests from mobile users
                 for a fee. The evaluations of CrowdMAC indicate that
                 (i) mobile clients can tune preferred trade-offs
                 between cost and delay through a control knob, (ii)
                 mobile hotspots comply with all delay bounds, and (iii)
                 the system ensures stable and efficient transfer.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Das:2016:CWM,
  author =       "Aveek K. Das and Parth H. Pathak and Chen-Nee Chuah
                 and Prasant Mohapatra",
  title =        "Characterization of Wireless Multidevice Users",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2955096",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The number of wireless-enabled devices owned by a user
                 has had huge growth over the past few years. Over one
                 third of adults in the United States currently own
                 three wireless devices: a smartphone, laptop, and
                 tablet. This article provides a study of the network
                 usage behavior of today's multidevice users. Using data
                 collected from a large university campus, we provide a
                 detailed multidevice user (MDU) measurement study of
                 more than 30,000 users. The major objective of this
                 work is to study how the presence of multiple wireless
                 devices affects the network usage behavior of users.
                 Specifically, we characterize the usage pattern of the
                 different device types in terms of total and
                 intermittent usage, how the usage of different devices
                 overlap over time, and uncarried device usage
                 statistics. We also study user preferences of accessing
                 sensitive content and device-specific factors that
                 govern the choice of WiFi encryption type. The study
                 reveals several interesting findings about MDUs. We see
                 how the use of tablets and laptops are interchangeable
                 and how the overall multidevice usage is additive
                 instead of being shared among the devices. We also
                 observe how current DHCP configurations are oblivious
                 to multiple devices, which results in inefficient
                 utilization of available IP address space. All findings
                 about multidevice usage patterns have the potential to
                 be utilized by different entities, such as app
                 developers, network providers, security researchers,
                 and analytics and advertisement systems, to provide
                 more intelligent and informed services to users who
                 have at least two devices among a smartphone, tablet,
                 and laptop.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "29",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Clavel:2017:AIA,
  author =       "Chlo{\'e} Clavel and Rossana Damiano and Viviana Patti
                 and Paolo Rosso",
  title =        "Affect and Interaction in Agent-Based Systems and
                 Social Media: {Guest Editors}' Introduction",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3018980",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yuksel:2017:BBH,
  author =       "Beste F. Yuksel and Penny Collisson and Mary
                 Czerwinski",
  title =        "Brains or Beauty: How to Engender Trust in User-Agent
                 Interactions",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2998572",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Software-based agents are becoming increasingly
                 ubiquitous and automated. However, current technology
                 and algorithms are still fallible, which considerably
                 affects users' trust and interaction with such agents.
                 In this article, we investigate two factors that can
                 engender user trust in agents: reliability and
                 attractiveness of agents. We show that agent
                 reliability is not more important than agent
                 attractiveness. Subjective user ratings of agent trust
                 and perceived accuracy suggest that attractiveness may
                 be even more important than reliability.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mancini:2017:IEL,
  author =       "Maurizio Mancini and Beatrice Biancardi and Florian
                 Pecune and Giovanna Varni and Yu Ding and Catherine
                 Pelachaud and Gualtiero Volpe and Antonio Camurri",
  title =        "Implementing and Evaluating a Laughing Virtual
                 Character",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2998571",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Laughter is a social signal capable of facilitating
                 interaction in groups of people: it communicates
                 interest, helps to improve creativity, and facilitates
                 sociability. This article focuses on: endowing virtual
                 characters with computational models of laughter
                 synthesis, based on an expressivity-copying paradigm;
                 evaluating how the physically co-presence of the
                 laughing character impacts on the user's perception of
                 an audio stimulus and mood. We adopt music as a means
                 to stimulate laughter. Results show that the character
                 presence influences the user's perception of music and
                 mood. Expressivity-copying has an influence on the
                 user's perception of music, but does not have any
                 significant impact on mood.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dastani:2017:OCM,
  author =       "Mehdi Dastani and Alexander Pankov",
  title =        "Other-Condemning Moral Emotions: Anger, Contempt and
                 Disgust",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2998570",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article studies and analyzes three
                 other-condemning moral emotions: anger, contempt, and
                 disgust. We utilize existing psychological
                 theories-appraisal theories of emotion and the CAD
                 triad hypothesis-and incorporate them into a unified
                 framework. A semiformal specification of the
                 elicitation conditions and prototypical coping
                 strategies for the other-condemning emotions are
                 proposed. The appraisal conditions are specified in
                 terms of cognitive and social concepts such as goals,
                 beliefs, actions, control and accountability, while
                 coping strategies are classified as belief-, goal- and
                 intention-affecting strategies, and specified in terms
                 of action specifications. Our conceptual analysis and
                 semiformal specification of the three other-condemning
                 moral emotions are illustrated by means of an example
                 of trolling in the domain of social media.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Alfonso:2017:TFM,
  author =       "Bexy Alfonso and Emilio Vivancos and Vicente Botti",
  title =        "Toward Formal Modeling of Affective Agents in a {BDI}
                 Architecture",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3001584",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Affective characteristics are crucial factors that
                 influence human behavior, and often, the prevalence of
                 either emotions or reason varies on each individual. We
                 aim to facilitate the development of agents' reasoning
                 considering their affective characteristics. We first
                 identify core processes in an affective BDI agent, and
                 we integrate them into an affective agent architecture
                 ( GenIA$^3$ ). These tasks include the extension of the
                 BDI agent reasoning cycle to be compliant with the
                 architecture, the extension of the agent language
                 (Jason) to support affect-based reasoning, and the
                 adjustment of the equilibrium between the agent's
                 affective and rational sides.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Otterbacher:2017:SMY,
  author =       "Jahna Otterbacher and Chee Siang Ang and Marina Litvak
                 and David Atkins",
  title =        "Show Me You Care: Trait Empathy, Linguistic Style, and
                 Mimicry on {Facebook}",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996188",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Linguistic mimicry, the adoption of another's language
                 patterns, is a subconscious behavior with pro-social
                 benefits. However, some professions advocate its
                 conscious use in empathic communication. This involves
                 mutual mimicry; effective communicators mimic their
                 interlocutors, who also mimic them back. Since mimicry
                 has often been studied in face-to-face contexts, we ask
                 whether individuals with empathic dispositions have
                 unique communication styles and/or elicit mimicry in
                 mediated communication on Facebook. Participants
                 completed Davis's Interpersonal Reactivity Index and
                 provided access to Facebook activity. We confirm that
                 dispositional empathy is correlated to the use of
                 particular stylistic features. In addition, we identify
                 four empathy profiles and find correlations to writing
                 style. When a linguistic feature is used, this often
                 ``triggers'' use by friends. However, the presence of
                 particular features, rather than participant
                 disposition, best predicts mimicry. This suggests that
                 machine-human communications could be enhanced based on
                 recently used features, without extensive user
                 profiling.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Meo:2017:PAS,
  author =       "Rosa Meo and Emilio Sulis",
  title =        "Processing Affect in Social Media: a Comparison of
                 Methods to Distinguish Emotions in Tweets",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "7:1--7:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996187",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Emotion analysis in social media is challenging. While
                 most studies focus on positive and negative sentiments,
                 the differentiation between emotions is more difficult.
                 We investigate the problem as a collection of binary
                 classification tasks on the basis of four opposing
                 emotion pairs provided by Plutchik. We processed the
                 content of messages by three alternative methods:
                 structural and lexical features, latent factors, and
                 natural language processing. The final prediction is
                 suggested by classifiers deriving from the state of the
                 art in machine learning. Results are convincing in the
                 possibility to distinguish the emotions pairs in social
                 media.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Meo:2017:UCM,
  author =       "Pasquale {De Meo} and Katarzyna Musial-Gabrys and
                 Domenico Rosaci and Giuseppe M. L. Sarn{\`e} and Lora
                 Aroyo",
  title =        "Using Centrality Measures to Predict Helpfulness-Based
                 Reputation in Trust Networks",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "8:1--8:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2981545",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In collaborative Web-based platforms, user reputation
                 scores are generally computed according to two
                 orthogonal perspectives: (a) helpfulness-based
                 reputation (HBR) scores and (b) centrality-based
                 reputation (CBR) scores. In HBR approaches, the most
                 reputable users are those who post the most helpful
                 reviews according to the opinion of the members of
                 their community. In CBR approaches, a
                 ``who-trusts-whom'' network-known as a trust network
                 -is available and the most reputable users occupy the
                 most central position in the trust network, according
                 to some definition of centrality. The identification of
                 users featuring large HBR scores is one of the most
                 important research issue in the field of Social
                 Networks, and it is a critical success factor of many
                 Web-based platforms like e-marketplaces, product review
                 Web sites, and question-and-answering systems.
                 Unfortunately, user reviews/ratings are often sparse,
                 and this makes the calculation of HBR scores
                 inaccurate. In contrast, CBR scores are relatively easy
                 to calculate provided that the topology of the trust
                 network is known. In this article, we investigate if
                 CBR scores are effective to predict HBR ones, and, to
                 perform our study, we used real-life datasets extracted
                 from CIAO and Epinions (two product review Web sites)
                 and Wikipedia and applied five popular centrality
                 measures-Degree Centrality, Closeness Centrality,
                 Betweenness Centrality, PageRank and Eigenvector
                 Centrality-to calculate CBR scores. Our analysis
                 provides a positive answer to our research question:
                 CBR scores allow for predicting HBR ones and
                 Eigenvector Centrality was found to be the most
                 important predictor. Our findings prove that we can
                 leverage trust relationships to spot those users
                 producing the most helpful reviews for the whole
                 community.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Binmad:2017:IEO,
  author =       "Ruchdee Binmad and Mingchu Li",
  title =        "Improving the Efficiency of an Online Marketplace by
                 Incorporating Forgiveness Mechanism",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996189",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Reputation plays a key role in online marketplace
                 communities improving trust among community members.
                 Reputation works as a decision-making tool for
                 understanding the behavior of the business partners.
                 Success of any online business depends on the trust the
                 business agents share with each other. However,
                 untrustworthy agents have anno place in online
                 marketplaces and are forced to leave the market even if
                 they will potentially cooperate. In this study, we
                 propose an exploration strategy based on a forgiveness
                 mechanism for untrustworthy agents to recover their
                 reputation. Furthermore, a number of experiments based
                 on the NetLogo simulation are performed to validate the
                 applicability of the proposed mechanism. The results
                 show that the online marketplaces incorporating a
                 forgiveness mechanism can be used with the existing
                 reputation systems and improve the efficiency of online
                 marketplaces.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Drosatos:2017:PET,
  author =       "George Drosatos and Aimilia Tasidou and Pavlos S.
                 Efraimidis",
  title =        "Privacy-Enhanced Television Audience Measurements",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3009969",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Internet-enabled television systems (SmartTVs) are a
                 development that introduces these devices into the
                 interconnected environment of the Internet of Things.
                 We propose a privacy-preserving application for
                 computing Television Audience Measurement (TAM)
                 ratings. SmartTVs communicate over the Internet to
                 calculate aggregate measurements. Contemporary
                 cryptographic building blocks are utilized to ensure
                 the privacy of the participating individuals and the
                 validity of the computed TAM ratings. Additionally,
                 user compensation capabilities are introduced to bring
                 some of the company profits back to the data owners. A
                 prototype implementation is developed on an
                 Android-based SmartTV platform and experimental results
                 illustrate the feasibility of the approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chopra:2017:ISI,
  author =       "Amit K. Chopra and Erez Shmueli and Vivek K. Singh",
  title =        "Introduction to the Special Issue on Advances in
                 Social Computing",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "11:1--11:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3080258",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Rosenthal:2017:DIM,
  author =       "Sara Rosenthal and Kathleen Mckeown",
  title =        "Detecting Influencers in Multiple Online Genres",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "12:1--12:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3014164",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Social media has become very popular and mainstream,
                 leading to an abundance of content. This wealth of
                 content contains many interactions and conversations
                 that can be analyzed for a variety of information. One
                 such type of information is analyzing the roles people
                 take in a conversation. Detecting influencers, one such
                 role, can be useful for political campaigning,
                 successful advertisement strategies, and detecting
                 terrorist leaders. We explore influence in discussion
                 forums, weblogs, and micro-blogs through the
                 development of learned language analysis components to
                 recognize known indicators of influence. Our components
                 are author traits, agreement, claims, argumentation,
                 persuasion, credibility, and certain dialog patterns.
                 Each of these components is motivated by social science
                 through Robert Cialdini's ``Weapons of Influence''
                 [Cialdini 2007]. We classify influencers across five
                 online genres and analyze which features are most
                 indicative of influencers in each genre. First, we
                 describe a rich suite of features that were generated
                 using each of the system components. Then, we describe
                 our experiments and results, including using domain
                 adaptation to exploit the data from multiple online
                 genres.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Perentis:2017:AUF,
  author =       "Christos Perentis and Michele Vescovi and Chiara
                 Leonardi and Corrado Moiso and Mirco Musolesi and Fabio
                 Pianesi and Bruno Lepri",
  title =        "Anonymous or Not? {Understanding} the Factors
                 Affecting Personal Mobile Data Disclosure",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "13:1--13:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3017431",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The wide adoption of mobile devices and social media
                 platforms have dramatically increased the collection
                 and sharing of personal information. More and more
                 frequently, users are called to make decisions
                 concerning the disclosure of their personal
                 information. In this study, we investigate the factors
                 affecting users' choices toward the disclosure of their
                 personal data, including not only their demographic and
                 self-reported individual characteristics, but also
                 their social interactions and their mobility patterns
                 inferred from months of mobile phone data activity. We
                 report the findings of a field study conducted with a
                 community of 63 subjects provided with (i) a
                 smart-phone and (ii) a Personal Data Store (PDS)
                 enabling them to control the disclosure of their data.
                 We monitor the sharing behavior of our participants
                 through the PDS and evaluate the contribution of
                 different factors affecting their disclosing choices of
                 location and social interaction data. Our analysis
                 shows that social interaction inferred by mobile phones
                 is an important factor revealing willingness to share,
                 regardless of the data type. In addition, we provide
                 further insights on the individual traits relevant to
                 the prediction of sharing behavior.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Goncalves:2017:ESK,
  author =       "Jorge Goncalves and Simo Hosio and Vassilis Kostakos",
  title =        "Eliciting Structured Knowledge from Situated Crowd
                 Markets",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "14:1--14:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3007900",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We present a crowdsourcing methodology to elicit
                 highly structured knowledge for arbitrary questions.
                 The method elicits potential answers (``options''),
                 criteria against which those options should be
                 evaluated, and a ranking of the top ``options.'' Our
                 study shows that situated crowdsourcing markets can
                 reliably elicit/moderate knowledge to generate a
                 ranking of options based on different criteria that
                 correlate with established online platforms. Our
                 evaluation also shows that local crowds can generate
                 knowledge that is missing from online platforms and on
                 how a local crowd perceives a certain issue. Finally,
                 we discuss the benefits and challenges of eliciting
                 structured knowledge from local crowds.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Roy:2017:FRD,
  author =       "Atanu Roy and Ayush Singhal and Jaideep Srivastava",
  title =        "Formation and Reciprocation of Dyadic Trust",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "15:1--15:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996184",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This paper reports a detailed empirical study of
                 interpersonal trust in a multi-relational online social
                 network. This study addresses two main aspects of
                 interpersonal trust: formation and reciprocation.
                 Computational models developed, using multi-relational
                 networks, for these processes provide interesting
                 insights about online social interactions. Our findings
                 for trust formation (initiation) indicate a strong role
                 of lower familiarity interactions before trust(high
                 familiarity relationship) is formed. Similarly, trust
                 reciprocation is not automatic, but strongly depends on
                 enough lower familiarity interactions. This study is
                 the first quantification of the ``scaffolding role''
                 played by lower familiarity interactions, in formation
                 of high familiarity relationships.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ruan:2017:MTB,
  author =       "Yefeng Ruan and Ping Zhang and Lina Alfantoukh and
                 Arjan Durresi",
  title =        "Measurement Theory-Based Trust Management Framework
                 for Online Social Communities",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "16:1--16:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3015771",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We propose a trust management framework based on
                 measurement theory to infer indirect trust in online
                 social communities using trust's transitivity property.
                 Inspired by the similarities between human trust and
                 measurement, we propose a new trust metric, composed of
                 impression and confidence, which captures both trust
                 level and its certainty. Furthermore, based on error
                 propagation theory, we propose a method to compute
                 indirect confidence according to different trust
                 transitivity and aggregation operators. We perform
                 experiments on two real data sets, Epinions.com and
                 Twitter, to validate our framework. Also, we show that
                 inferring indirect trust can connect more pairs of
                 users.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Weth:2017:CPS,
  author =       "Christian {Von Der Weth} and Ashraf M. Abdul and Mohan
                 Kankanhalli",
  title =        "Cyber-Physical Social Networks",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "17:1--17:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996186",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In the offline world, getting to know new people is
                 heavily influenced by people's physical context, that
                 is, their current geolocation. People meet in classes,
                 bars, clubs, public transport, and so on. In contrast,
                 first-generation online social networks such as
                 Facebook or Google+ do not consider users' context and
                 thus mainly reflect real-world relationships (e.g.,
                 family, friends, colleagues). Location-based social
                 networks, or second-generation social networks, such as
                 Foursquare or Facebook Places, take the physical
                 location of users into account to find new friends.
                 However, with the increasing number and wide range of
                 popular platforms and services on the Web, people spend
                 a considerable time moving through the online worlds.
                 In this article, we introduce cyber-physical social
                 networks (CPSN) as the third generation of online
                 social networks. Beside their physical locations, CPSN
                 consider also users' virtual locations for connecting
                 to new friends. In a nutshell, we regard a web page as
                 a place where people can meet and interact. The
                 intuition is that a web page is a good indicator for a
                 user's current interest, likings, or information needs.
                 Moreover, we link virtual and physical locations,
                 allowing for users to socialize across the online and
                 offline world. Our main contributions focus on the two
                 fundamental tasks of creating meaningful virtual
                 locations as well as creating meaningful links between
                 virtual and physical locations, where ``meaningful''
                 depends on the application scenario. To this end, we
                 present OneSpace, our prototypical implementation of a
                 cyber-physical social network. OneSpace provides a live
                 and social recommendation service for touristic venues
                 (e.g., hotels, restaurants, attractions). It allows
                 mobile users close to a venue and web users browsing
                 online content about the venue to connect and interact
                 in an ad hoc manner. Connecting users based on their
                 shared virtual and physical locations gives way to a
                 plethora of novel use cases for social computing, as we
                 will illustrate. We evaluate our proposed methods for
                 constructing and linking locations and present the
                 results of a first user study investigating the
                 potential impact of cyber-physical social networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Alsaedi:2017:CWP,
  author =       "Nasser Alsaedi and Pete Burnap and Omer Rana",
  title =        "Can We Predict a Riot? {Disruptive} Event Detection
                 Using {Twitter}",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "18:1--18:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996183",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In recent years, there has been increased interest in
                 real-world event detection using publicly accessible
                 data made available through Internet technology such as
                 Twitter, Facebook, and YouTube. In these highly
                 interactive systems, the general public are able to
                 post real-time reactions to ``real world'' events,
                 thereby acting as social sensors of terrestrial
                 activity. Automatically detecting and categorizing
                 events, particularly small-scale incidents, using
                 streamed data is a non-trivial task but would be of
                 high value to public safety organisations such as local
                 police, who need to respond accordingly. To address
                 this challenge, we present an end-to-end integrated
                 event detection framework that comprises five main
                 components: data collection, pre-processing,
                 classification, online clustering, and summarization.
                 The integration between classification and clustering
                 enables events to be detected, as well as related
                 smaller-scale ``disruptive events,'' smaller incidents
                 that threaten social safety and security or could
                 disrupt social order. We present an evaluation of the
                 effectiveness of detecting events using a variety of
                 features derived from Twitter posts, namely temporal,
                 spatial, and textual content. We evaluate our framework
                 on a large-scale, real-world dataset from Twitter.
                 Furthermore, we apply our event detection system to a
                 large corpus of tweets posted during the August 2011
                 riots in England. We use ground-truth data based on
                 intelligence gathered by the London Metropolitan Police
                 Service, which provides a record of actual terrestrial
                 events and incidents during the riots, and show that
                 our system can perform as well as terrestrial sources,
                 and even better in some cases.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yang:2017:DSC,
  author =       "Zhenguo Yang and Qing Li and Zheng Lu and Yun Ma and
                 Zhiguo Gong and Wenyin Liu",
  title =        "Dual Structure Constrained Multimodal Feature Coding
                 for Social Event Detection from {Flickr} Data",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "19:1--19:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3015463",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In this work, a three-stage social event detection
                 (SED) framework is proposed to discover events from
                 Flickr-like data. First, multiple bipartite graphs are
                 constructed for the heterogeneous feature modalities to
                 achieve fused features. Furthermore, considering the
                 geometrical structures of dictionary and data, a dual
                 structure constrained multimodal feature coding model
                 is designed to learn discriminative feature codes by
                 incorporating corresponding regularization terms into
                 the objective. Finally, clustering models utilizing
                 density or label knowledge and data recovery residual
                 models are devised to discover real-world events. The
                 proposed SED approach achieves the highest performance
                 on the MediaEval 2014 SED dataset.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ciesielczyk:2017:PRI,
  author =       "Michal Ciesielczyk and Andrzej Szwabe and Mikolaj
                 Morzy and Pawel Misiorek",
  title =        "Progressive Random Indexing: Dimensionality Reduction
                 Preserving Local Network Dependencies",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "20:1--20:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996185",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The vector space model is undoubtedly among the most
                 popular data representation models used in the
                 processing of large networks. Unfortunately, the vector
                 space model suffers from the so-called curse of
                 dimensionality, a phenomenon where data become
                 extremely sparse due to an exponential growth of the
                 data space volume caused by a large number of
                 dimensions. Thus, dimensionality reduction techniques
                 are necessary to make large networks represented in the
                 vector space model available for analysis and
                 processing. Most dimensionality reduction techniques
                 tend to focus on principal components present in the
                 data, effectively disregarding local relationships that
                 may exist between objects. This behavior is a
                 significant drawback of current dimensionality
                 reduction techniques, because these local relationships
                 are crucial for maintaining high accuracy in many
                 network analysis tasks, such as link prediction or
                 community detection. To rectify the aforementioned
                 drawback, we propose Progressive Random Indexing, a new
                 dimensionality reduction technique. Built upon
                 Reflective Random Indexing, our method significantly
                 reduces the dimensionality of the vector space model
                 while retaining all important local relationships
                 between objects. The key element of the Progressive
                 Random Indexing technique is the use of the gain value
                 at each reflection step, which determines how much
                 information about local relationships should be
                 included in the space of reduced dimensionality. Our
                 experiments indicate that when applied to large
                 real-world networks (Facebook social network, MovieLens
                 movie recommendations), Progressive Random Indexing
                 outperforms state-of-the-art methods in link prediction
                 tasks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Billet:2017:SOP,
  author =       "Benjamin Billet and Val{\'e}rie Issarny",
  title =        "{Spinel}: an Opportunistic Proxy for Connecting
                 Sensors to the {Internet of Things}",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "21:1--21:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3041025",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Nowadays, various static wireless sensor networks
                 (WSN) are deployed in the environment for many
                 purposes: traffic control, pollution monitoring, and so
                 on. The willingness to open these legacy WSNs to the
                 users is emerging, by integrating them to the Internet
                 network as part of the future Internet of Things (IoT),
                 for example, in the context of smart cities and open
                 data policies. While legacy sensors cannot be directly
                 connected to the Internet in general, emerging
                 standards such as 6LoWPAN are aimed at solving this
                 issue but require us to update or replace the existing
                 devices. As a solution to connect legacy sensors to the
                 IoT, we propose to take advantage of the multi-modal
                 connectivity as well as the mobility of smartphones to
                 use phones as opportunistic proxies, that is, mobile
                 proxies that opportunistically discover closeby static
                 sensors and act as intermediaries with the IoT, with
                 the additional benefit of bringing fresh information
                 about the environment to the smartphones' owners.
                 However, this requires us to monitor the smartphone's
                 mobility and further infer when to discover and
                 register the sensors to guarantee the efficiency and
                 reliability of opportunistic proxies. To that end, we
                 introduce and evaluate an approach based on mobility
                 analysis that uses a novel path prediction technique to
                 predict when and where the user is not moving, and
                 thereby serves to anticipate the registration of
                 sensors within communication range. We show that this
                 technique enables the deployment of low-cost
                 resource-efficient mobile proxies to connect legacy
                 WSNs with the IoT.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Liu:2017:SLD,
  author =       "Xumin Liu and Weishi Shi and Arpeet Kale and Chen Ding
                 and Qi Yu",
  title =        "Statistical Learning of Domain-Specific
                 Quality-of-Service Features from User Reviews",
  journal =      j-TOIT,
  volume =       "17",
  number =       "2",
  pages =        "22:1--22:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3053381",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "With the fast increase of online services of all
                 kinds, users start to care more about the Quality of
                 Service (QoS) that a service provider can offer besides
                 the functionalities of the services. As a result,
                 QoS-based service selection and recommendation have
                 received significant attention since the mid-2000s.
                 However, existing approaches primarily consider a small
                 number of standard QoS parameters, most of which relate
                 to the response time, fee, availability of services,
                 and so on. As online services start to diversify
                 significantly over different domains, these small set
                 of QoS parameters will not be able to capture the
                 different quality aspects that users truly care about
                 over different domains. Most existing approaches for
                 QoS data collection depend on the information from
                 service providers, which are sensitive to the
                 trustworthiness of the providers. Some service
                 monitoring mechanisms collect QoS data through actual
                 service invocations but may be affected by actual
                 hardware/software configurations. In either case,
                 domain-specific QoS data that capture what users truly
                 care about have not been successfully collected or
                 analyzed by existing works in service computing. To
                 address this demanding issue, we develop a statistical
                 learning approach to extract domain-specific QoS
                 features from user-provided service reviews. In
                 particular, we aim to classify user reviews based on
                 their sentiment orientations into either a positive or
                 negative category. Meanwhile, statistical feature
                 selection is performed to identify statistically
                 nontrivial terms from review text, which can serve as
                 candidate QoS features. We also develop a topic
                 models-based approach that automatically groups
                 relevant terms and returns the term groups to users,
                 where each term group corresponds to one high-level
                 quality aspect of services. We have conducted extensive
                 experiments on three real-world datasets to
                 demonstrates the effectiveness of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gurevych:2017:ASM,
  author =       "Iryna Gurevych and Marco Lippi and Paolo Torroni",
  title =        "Argumentation in Social Media",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "23:1--23:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3056539",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lawrence:2017:DTD,
  author =       "John Lawrence and Mark Snaith and Barbara Konat and
                 Katarzyna Budzynska and Chris Reed",
  title =        "Debating Technology for Dialogical Argument:
                 Sensemaking, Engagement, and Analytics",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "24:1--24:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3007210",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Debating technologies, a newly emerging strand of
                 research into computational technologies to support
                 human debating, offer a powerful way of providing
                 naturalistic, dialogue-based interaction with complex
                 information spaces. The full potential of debating
                 technologies for dialogical argument can, however, only
                 be realized once key technical and engineering
                 challenges are overcome, namely data structure, data
                 availability, and interoperability between components.
                 Our aim in this article is to show that the Argument
                 Web, a vision for integrated, reusable, semantically
                 rich resources connecting views, opinions, arguments,
                 and debates online, offers a solution to these
                 challenges. Through the use of a running example taken
                 from the domain of citizen dialogue, we demonstrate for
                 the first time that different Argument Web components
                 focusing on sensemaking, engagement, and analytics can
                 work in concert as a suite of debating technologies for
                 rich, complex, dialogical argument.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lawrence:2017:UAS,
  author =       "John Lawrence and Joonsuk Park and Katarzyna Budzynska
                 and Claire Cardie and Barbara Konat and Chris Reed",
  title =        "Using Argumentative Structure to Interpret Debates in
                 Online Deliberative Democracy and {eRulemaking}",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "25:1--25:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3032989",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Governments around the world are increasingly
                 utilising online platforms and social media to engage
                 with, and ascertain the opinions of, their citizens.
                 Whilst policy makers could potentially benefit from
                 such enormous feedback from society, they first face
                 the challenge of making sense out of the large volumes
                 of data produced. In this article, we show how the
                 analysis of argumentative and dialogical structures
                 allows for the principled identification of those
                 issues that are central, controversial, or popular in
                 an online corpus of debates. Although areas such as
                 controversy mining work towards identifying issues that
                 are a source of disagreement, by looking at the deeper
                 argumentative structure, we show that a much richer
                 understanding can be obtained. We provide results from
                 using a pipeline of argument-mining techniques on the
                 debate corpus, showing that the accuracy obtained is
                 sufficient to automatically identify those issues that
                 are key to the discussion, attracting proportionately
                 more support than others, and those that are divisive,
                 attracting proportionately more conflicting
                 viewpoints.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mohammad:2017:SST,
  author =       "Saif M. Mohammad and Parinaz Sobhani and Svetlana
                 Kiritchenko",
  title =        "Stance and Sentiment in Tweets",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "26:1--26:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3003433",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We can often detect from a person's utterances whether
                 he or she is in favor of or against a given target
                 entity-one's stance toward the target. However, a
                 person may express the same stance toward a target by
                 using negative or positive language. Here for the first
                 time we present a dataset of tweet-target pairs
                 annotated for both stance and sentiment. The targets
                 may or may not be referred to in the tweets, and they
                 may or may not be the target of opinion in the tweets.
                 Partitions of this dataset were used as training and
                 test sets in a SemEval-2016 shared task competition. We
                 propose a simple stance detection system that
                 outperforms submissions from all 19 teams that
                 participated in the shared task. Additionally, access
                 to both stance and sentiment annotations allows us to
                 explore several research questions. We show that
                 although knowing the sentiment expressed by a tweet is
                 beneficial for stance classification, it alone is not
                 sufficient. Finally, we use additional unlabeled data
                 through distant supervision techniques and word
                 embeddings to further improve stance classification.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kokciyan:2017:AAR,
  author =       "Nadin K{\"o}kciyan and Nefise Yaglikci and Pinar
                 Yolum",
  title =        "An Argumentation Approach for Resolving Privacy
                 Disputes in Online Social Networks",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "27:1--27:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3003434",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Preserving users' privacy is important for Web
                 systems. In systems where transactions are managed by a
                 single user, such as e-commerce systems, preserving
                 privacy of the transactions is merely the capability of
                 access control. However, in online social networks,
                 where each transaction is managed by and has effect on
                 others, preserving privacy is difficult. In many cases,
                 the users' privacy constraints are distributed,
                 expressed in a high-level manner, and would depend on
                 information that only becomes available over
                 interactions with others. Hence, when a content is
                 being shared by a user, others who might be affected by
                 the content should discuss and agree on how the content
                 will be shared online so that none of their privacy
                 constraints are violated. To enable this, we model
                 users of the social networks as agents that represent
                 their users' privacy constraints as semantic rules.
                 Agents argue with each other on propositions that
                 enable their privacy rules by generating facts and
                 assumptions from their ontology. Moreover, agents can
                 seek help from others by requesting new information to
                 enrich their ontology. Using assumption-based
                 argumentation, agents decide whether a content should
                 be shared or not. We evaluate the applicability of our
                 approach on real-life privacy scenarios in comparison
                 with user surveys.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Wachsmuth:2017:UMD,
  author =       "Henning Wachsmuth and Benno Stein",
  title =        "A Universal Model for Discourse-Level Argumentation
                 Analysis",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "28:1--28:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2957757",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The argumentative structure of texts is increasingly
                 exploited for analysis tasks, for example, for stance
                 classification or the assessment of argumentation
                 quality. Most existing approaches, however, model only
                 the local structure of single arguments. This article
                 considers the question of how to capture the global
                 discourse-level structure of a text for
                 argumentation-related analyses. In particular, we
                 propose to model the global structure as a flow of
                 ``task-related rhetorical moves,'' such as discourse
                 functions or aspect-based sentiment. By comparing the
                 flow of a text to a set of common flow patterns, we map
                 the text into the feature space of global structures,
                 thus capturing its discourse-level argumentation. We
                 show how to identify different types of flow patterns,
                 and we provide evidence that they generalize well
                 across different domains of texts. In our evaluation
                 for two analysis tasks, the classification of review
                 sentiment and the scoring of essay organization, the
                 features derived from flow patterns prove both
                 effective and more robust than strong baselines. We
                 conclude with a discussion of the universality of
                 modeling flow for discourse-level argumentation
                 analysis.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Awad:2017:EAA,
  author =       "Edmond Awad and Jean-Fran{\c{c}}ois Bonnefon and
                 Martin Caminada and Thomas W. Malone and Iyad Rahwan",
  title =        "Experimental Assessment of Aggregation Principles in
                 Argumentation-Enabled Collective Intelligence",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "29:1--29:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3053371",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "On the Web, there is always a need to aggregate
                 opinions from the crowd (as in posts, social networks,
                 forums, etc.). Different mechanisms have been
                 implemented to capture these opinions such as Like in
                 Facebook, Favorite in Twitter, thumbs-up/-down,
                 flagging, and so on. However, in more contested domains
                 (e.g., Wikipedia, political discussion, and climate
                 change discussion), these mechanisms are not
                 sufficient, since they only deal with each issue
                 independently without considering the relationships
                 between different claims. We can view a set of
                 conflicting arguments as a graph in which the nodes
                 represent arguments and the arcs between these nodes
                 represent the defeat relation. A group of people can
                 then collectively evaluate such graphs. To do this, the
                 group must use a rule to aggregate their individual
                 opinions about the entire argument graph. Here we
                 present the first experimental evaluation of different
                 principles commonly employed by aggregation rules
                 presented in the literature. We use randomized
                 controlled experiments to investigate which principles
                 people consider better at aggregating opinions under
                 different conditions. Our analysis reveals a number of
                 factors, not captured by traditional formal models,
                 that play an important role in determining the efficacy
                 of aggregation. These results help bring formal models
                 of argumentation closer to real-world application.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "29",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Carstens:2017:UAI,
  author =       "Lucas Carstens and Francesca Toni",
  title =        "Using Argumentation to Improve Classification in
                 Natural Language Problems",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "30:1--30:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3017679",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Argumentation has proven successful in a number of
                 domains, including Multi-Agent Systems and decision
                 support in medicine and engineering. We propose its
                 application to a domain yet largely unexplored by
                 argumentation research: computational linguistics. We
                 have developed a novel classification methodology that
                 incorporates reasoning through argumentation with
                 supervised learning. We train classifiers and then
                 argue about the validity of their output. To do so, we
                 identify arguments that formalise prototypical
                 knowledge of a problem and use them to correct
                 misclassifications. We illustrate our methodology on
                 two tasks. On the one hand, we address cross-domain
                 sentiment polarity classification, where we train
                 classifiers on one corpus, for example, Tweets, to
                 identify positive/negative polarity and classify
                 instances from another corpus, for example, sentences
                 from movie reviews. On the other hand, we address a
                 form of argumentation mining that we call
                 Relation-based Argumentation Mining, where we classify
                 pairs of sentences based on whether the first sentence
                 attacks or supports the second or whether it does
                 neither. Whenever we find that one sentence
                 attacks/supports the other, we consider both to be
                 argumentative, irrespective of their stand-alone
                 argumentativeness. For both tasks, we improve
                 classification performance when using our methodology,
                 compared to using standard classifiers only.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "30",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Hu:2017:MDS,
  author =       "Yan Hu and Weisong Shi and Hong Li and Xiaohui Hu",
  title =        "Mitigating Data Sparsity Using Similarity
                 Reinforcement-Enhanced Collaborative Filtering",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "31:1--31:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3062179",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The data sparsity problem has attracted significant
                 attention in collaborative filtering-based recommender
                 systems. To alleviate data sparsity, several previous
                 efforts employed hybrid approaches that incorporate
                 auxiliary data sources into recommendation techniques,
                 like content, context, or social relationships.
                 However, due to privacy and security concerns, it is
                 generally difficult to collect such auxiliary
                 information. In this article, we focus on the pure
                 collaborative filtering methods without relying on any
                 auxiliary data source. We propose an improved
                 memory-based collaborative filtering approach enhanced
                 by a novel similarity reinforcement mechanism. It can
                 discover potential similarity relationships between
                 users or items by making better use of known but
                 limited user-item interactions, thus to extract
                 plentiful historical rating information from similar
                 neighbors to make more reliable and accurate rating
                 predictions. This approach integrates user similarity
                 reinforcement and item similarity reinforcement into a
                 comprehensive framework and lets them enhance each
                 other. Comprehensive experiments conducted on several
                 public datasets demonstrate that, in the face of data
                 sparsity, our approach achieves a significant
                 improvement in prediction accuracy when compared with
                 the state-of-the-art memory-based and model-based
                 collaborative filtering algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "31",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Balsa:2017:TIC,
  author =       "Ero Balsa and Cristina P{\'e}rez-Sol{\`a} and Claudia
                 Diaz",
  title =        "Towards Inferring Communication Patterns in Online
                 Social Networks",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "32:1--32:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093897",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The separation between the public and private spheres
                 on online social networks is known to be, at best,
                 blurred. On the one hand, previous studies have shown
                 how it is possible to infer private attributes from
                 publicly available data. On the other hand, no
                 distinction exists between public and private data when
                 we consider the ability of the online social network
                 (OSN) provider to access them. Even when OSN users go
                 to great lengths to protect their privacy, such as by
                 using encryption or communication obfuscation,
                 correlations between data may render these solutions
                 useless. In this article, we study the relationship
                 between private communication patterns and publicly
                 available OSN data. Such a relationship informs both
                 privacy-invasive inferences as well as OSN
                 communication modelling, the latter being key toward
                 developing effective obfuscation tools. We propose an
                 inference model based on Bayesian analysis and
                 evaluate, using a real social network dataset, how
                 archetypal social graph features can lead to inferences
                 about private communication. Our results indicate that
                 both friendship graph and public traffic data may not
                 be informative enough to enable these inferences, with
                 time analysis having a non-negligible impact on their
                 precision.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "32",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Chapman:2017:GEP,
  author =       "Adriane Chapman and James Cheney and Simon Miles",
  title =        "Guest Editorial: The Provenance of Online Data",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "33:1--33:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3108938",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "33",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bates:2017:TCT,
  author =       "Adam Bates and Dave (Jing) Tian and Grant Hernandez
                 and Thomas Moyer and Kevin R. B. Butler and Trent
                 Jaeger",
  title =        "Taming the Costs of Trustworthy Provenance through
                 Policy Reduction",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "34:1--34:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3062180",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Provenance is an increasingly important tool for
                 understanding and even actively preventing system
                 intrusion, but the excessive storage burden imposed by
                 automatic provenance collection threatens to undermine
                 its value in practice. This situation is made worse by
                 the fact that the majority of this metadata is unlikely
                 to be of interest to an administrator, instead
                 describing system noise or other background activities
                 that are not germane to the forensic investigation. To
                 date, storing data provenance in perpetuity was a
                 necessary concession in even the most advanced
                 provenance tracking systems in order to ensure the
                 completeness of the provenance record for future
                 analyses. In this work, we overcome this obstacle by
                 proposing a policy-based approach to provenance
                 filtering, leveraging the confinement properties
                 provided by Mandatory Access Control (MAC) systems in
                 order to identify and isolate subdomains of system
                 activity for which to collect provenance. We introduce
                 the notion of minimal completeness for provenance
                 graphs, and design and implement a system that provides
                 this property by exclusively collecting provenance for
                 the trusted computing base of a target application. In
                 evaluation, we discover that, while the efficacy of our
                 approach is domain dependent, storage costs can be
                 reduced by as much as 89\% in critical scenarios such
                 as provenance tracking in cloud computing data centers.
                 To the best of our knowledge, this is the first
                 policy-based provenance monitor to appear in the
                 literature.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "34",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Moreau:2017:CFP,
  author =       "Luc Moreau",
  title =        "A Canonical Form for {PROV} Documents and Its
                 Application to Equality, Signature, and Validation",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "35:1--35:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3032990",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We present a canonical form for prov that is a
                 normalized way of representing prov documents as
                 mathematical expressions. As opposed to the normal form
                 specified by the prov-constraints recommendation, the
                 canonical form we present is defined for all prov
                 documents, irrespective of their validity, and it can
                 be serialized in a unique way. The article makes the
                 case for a canonical form for prov and its potential
                 uses, namely comparison of prov documents in different
                 formats, validation, and signature of prov documents. A
                 signature of a prov document allows the integrity and
                 the author of provenance to be ascertained; since the
                 signature is based on the canonical form, these checks
                 are not tied to a particular encoding, but can be
                 performed on any representation of prov.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "35",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Neves:2017:MPI,
  author =       "Vitor C. Neves and Daniel {De Oliveira} and Kary A. C.
                 S. Oca{\~n}a and Vanessa Braganholo and Leonardo
                 Murta",
  title =        "Managing Provenance of Implicit Data Flows in
                 Scientific Experiments",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "36:1--36:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3053372",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Scientific experiments modeled as scientific workflows
                 may create, change, or access data products not
                 explicitly referenced in the workflow specification,
                 leading to implicit data flows. The lack of knowledge
                 about implicit data flows makes the experiments hard to
                 understand and reproduce. In this article, we present
                 ProvMonitor, an approach that identifies the creation,
                 change, or access to data products even within implicit
                 data flows. ProvMonitor links this information with the
                 workflow activity that generated it, allowing for
                 scientists to compare data products within and
                 throughout trials of the same workflow, identifying
                 side effects on data evolution caused by implicit data
                 flows. We evaluated ProvMonitor and observed that it
                 could answer queries for scenarios that demand specific
                 knowledge related to implicit provenance.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "36",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Stamatogiannakis:2017:PPP,
  author =       "Manolis Stamatogiannakis and Elias Athanasopoulos and
                 Herbert Bos and Paul Groth",
  title =        "{PROV$_{2R}$}: Practical Provenance Analysis of
                 Unstructured Processes",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "37:1--37:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3062176",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Information produced by Internet applications is
                 inherently a result of processes that are executed
                 locally. Think of a web server that makes use of a CGI
                 script, or a content management system where a post was
                 first edited using a word processor. Given the impact
                 of these processes to the content published online, a
                 consumer of that information may want to understand
                 what those impacts were. For example, understanding
                 from where text was copied and pasted to make a post,
                 or if the CGI script was updated with the latest
                 security patches, may all influence the confidence on
                 the published content. Capturing and exposing this
                 information provenance is thus important to
                 ascertaining trust to online content. Furthermore,
                 providers of internet applications may wish to have
                 access to the same information for debugging or audit
                 purposes. For processes following a rigid structure
                 (such as databases or workflows), disclosed provenance
                 systems have been developed that efficiently and
                 accurately capture the provenance of the produced data.
                 However, accurately capturing provenance from
                 unstructured processes, for example, user-interactive
                 computing used to produce web content, remains a
                 problem to be tackled. In this article, we address the
                 problem of capturing and exposing provenance from
                 unstructured processes. Our approach, called
                 PROV$_{2R}$ (PROVenance Record and Replay) is composed
                 of two parts: (a) the decoupling of provenance analysis
                 from its capture; and (b) the capture of high-fidelity
                 provenance from unmodified programs. We use techniques
                 originating in the security and reverse engineering
                 communities, namely, record and replay and taint
                 tracking. Taint tracking fundamentally addresses the
                 data provenance problem but is impractical to apply at
                 runtime due to extremely high overhead. With a number
                 of case studies, we demonstrate that PROV$_{2R}$
                 enables the use of taint analysis for high-fidelity
                 provenance capture, while keeping the runtime overhead
                 at manageable levels. In addition, we show how captured
                 information can be represented using the W3C PROV
                 provenance model for exposure on the Web.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "37",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Weber:2017:FAI,
  author =       "Steven Weber",
  title =        "Facilitating Adoption of {Internet} Technologies and
                 Services with Externalities via Cost Subsidization",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "38:1--38:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3091109",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article models the temporal adoption dynamics of
                 an abstracted Internet technology or service, where the
                 instantaneous net value of the service perceived by
                 each (current or potential) user/customer incorporates
                 three key features: (i) user service affinity
                 heterogeneity, (ii) a network externality, and (iii) a
                 subscription cost. Internet technologies and services
                 with network externalities face a ``chicken-and-egg''
                 adoption problem in that the service requires an
                 established customer base to attract new customers. In
                 this article, we study cost subsidization as a means to
                 ``reach the knee,'' at which point the externality
                 drives rapid service adoption, and thereby change the
                 equilibrium service fractional adoption level from an
                 initial near-zero level to a final near-one level (full
                 adoption). We present three simple subsidy models and
                 evaluate them under two natural performance metrics:
                 (i) the duration required for the subsidized service to
                 reach a given target adoption level and (ii) the
                 aggregate cost of the subsidy born by the service
                 provide. First, we present a ``two-target adoption
                 subsidy'' that subsidizes the cost to keep the fraction
                 of users with positive net utility at a (constant)
                 target level until the actual adoption target is
                 reached. Second, we study a special case of the above
                 where the target ensures all users have positive net
                 utility, corresponding to a ``quickest adoption''
                 subsidy (QAS). Third, we introduce an approximation of
                 QAS that only requires the service provider adjust the
                 subsidy level a prescribed number of times. Fourth, we
                 study equilibria and their stability under uniformly
                 and normally distributed user service affinities,
                 highlighting the unstable equilibrium in each case as
                 the natural target adoption level for the provider.
                 Finally, we provide a fictional case study to
                 illustrate the application of the results in a
                 (hopefully) realistic scenario, along with a brief
                 discussion of the limitations of the model and
                 analysis.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "38",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Garcia-Dorado:2017:BMW,
  author =       "Jos{\'e} Luis Garc{\'\i}a-Dorado",
  title =        "Bandwidth Measurements within the Cloud:
                 Characterizing Regular Behaviors and Correlating
                 Downtimes",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "39:1--39:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093893",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The search for availability, reliability, and quality
                 of service has led cloud infrastructure customers to
                 disseminate their services, contents, and data over
                 multiple cloud data centers, often involving several
                 Cloud service providers (CSPs). The consequence of this
                 is that a large amount of data must be transmitted
                 across the public Cloud. However, little is known about
                 the bandwidth dynamics involved. To address this, we
                 have conducted a measurement campaign for bandwidth
                 between 18 data centers of four major CSPs. This
                 extensive campaign allowed us to characterize the
                 resulting time series of bandwidth as the addition of a
                 stationary component and some infrequent excursions
                 (typically downtimes). While the former provides a
                 description of the bandwidth users can expect in the
                 Cloud, the latter is closely related to the robustness
                 of the Cloud (i.e., the occurrence of downtimes is
                 correlated). Both components have been studied further
                 by applying factor analysis, specifically analysis of
                 variance, as a mechanism to formally compare data
                 centers' behaviors and extract generalities. The
                 results show that the stationary process is closely
                 related to the data center locations and CSPs involved
                 in transfers that, fortunately, make the Cloud more
                 predictable and allow the set of reported measurements
                 to be extrapolated. On the other hand, although
                 correlation in the Cloud is low, that is, only 10\% of
                 the measured pair of paths showed some correlation, we
                 found evidence that such correlation depends on the
                 particular relationships between pairs of data centers
                 with little connection to more general factors.
                 Positively, this implies that data centers either in
                 the same area or within the same CSP do not show
                 qualitatively more correlation than other data centers,
                 which eases the deployment of robust infrastructures.
                 On the downside, this metric is scarcely generalizable
                 and, consequently, calls for exhaustive monitoring.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "39",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Shao:2017:ECI,
  author =       "Jianhua Shao and Hoang Ong",
  title =        "Exploiting Contextual Information in Attacking
                 Set-Generalized Transactions",
  journal =      j-TOIT,
  volume =       "17",
  number =       "4",
  pages =        "40:1--40:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3106165",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:05 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Transactions are records that contain a set of items
                 about individuals. For example, items browsed by a
                 customer when shopping online form a transaction.
                 Today, many activities are carried out on the Internet,
                 resulting in a large amount of transaction data being
                 collected. Such data are often shared and analyzed to
                 improve business and services, but they also contain
                 private information about individuals that must be
                 protected. Techniques have been proposed to sanitize
                 transaction data before their release, and set-based
                 generalization is one such method. In this article, we
                 study how well set-based generalization can protect
                 transactions. We propose methods to attack
                 set-generalized transactions by exploiting contextual
                 information that is available within the released data.
                 Our results show that set-based generalization may not
                 provide adequate protection for transactions, and up to
                 70\% of the items added into the transactions during
                 generalization to obfuscate original data can be
                 detected by our methods with a precision over 80\%.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "40",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Damiani:2017:EOS,
  author =       "Ernesto Damiani and Ryszard Kowalczyk and Gerard
                 Parr",
  title =        "Extending the Outreach: From Smart Cities to Connected
                 Communities",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3140543",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Connected Communities (CCs) are socio-technical
                 systems that rely on an information and communication
                 technology (ICT) infrastructure to integrate people and
                 organizations (companies, schools, hospitals,
                 universities, local and national government agencies)
                 willing to share information and perform joint
                 decision-making to create sustainable and equitable
                 work and living environments. We discuss a research
                 agenda considering CCs from three distinct but
                 complementary points of view: CC metaphors, models, and
                 services.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2017:AMR,
  author =       "Haibo Zhang and Luming Wan and Yawen Chen and Laurence
                 T. Yang and Lizhi Peng",
  title =        "Adaptive Message Routing and Replication in Mobile
                 Opportunistic Networks for Connected Communities",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3122984",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Mobile opportunistic networking is a promising
                 technology that can supplement existing cellular and
                 WiFi networks to provide desirable services for smart
                 and connected communities. Message routing is the most
                 compelling challenge in mobile opportunistic networks
                 due to the lack of contemporaneous end-to-end paths and
                 the resource constraints at mobile devices. To improve
                 the probability of successful message delivery, most
                 existing routing schemes use the past contact history
                 to predict future contacts for message forwarding, and
                 exploit message replication and redundancy for
                 multicopy routing. However, most existing
                 prediction-based routing schemes simply use the average
                 pairwise contact probability as the routing metric and
                 neglect the benefits of exploring fine-grained contact
                 information such as pairwise repeated contact patterns
                 to improve the accuracy of predicting future contacts.
                 Moreover, there is no efficient mechanism that can
                 adaptively control message replication in a
                 decentralized manner to achieve both high probability
                 of successful message delivery and low message
                 overhead. To address these problems, we present FGAR, a
                 routing protocol designed for mobile opportunistic
                 networks by leveraging fine-grained contact
                 characterization and adaptive message replication. In
                 FGAR, contact history is characterized in a
                 fine-grained manner with timing information using a
                 sliding window mechanism, and future contacts are
                 predicted based on the fine-grained contact
                 information, thereby improving the accuracy of contact
                 prediction. We further design an efficient message
                 replication scheme in which message replication is
                 controlled in a fully decentralized manner by taking
                 into account the expected message delivery probability,
                 the replication history, and the quality of the
                 encountered device. A replica is generated only when it
                 is necessary to fulfill the expected message delivery
                 probability. We evaluate our scheme through
                 trace-driven simulations, and the simulation results
                 show that FGAR outperforms existing schemes. In
                 comparison with PRoPHET, FGAR can achieve more than
                 20\% improvement on average on successful message
                 delivery, whereas the message overhead has been reduced
                 by a factor up to 15.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kim:2017:MDS,
  author =       "Taehun Kim and Junsung Lim and Heesuk Son and
                 Byoungheon Shin and Dongman Lee and Soon J. Hyun",
  title =        "A Multi-Dimensional Smart Community Discovery Scheme
                 for {IoT}-Enriched Smart Homes",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3062178",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The proliferation of the Internet into every household
                 has provided more opportunities for residents to become
                 closer to each other than before. However, solid
                 structural barrier is raised and social relationships
                 within such neighborhoods are weak compared to those in
                 traditional towns. Accordingly, activating communities
                 and ultimately enhancing a sense of community through
                 constructive participation and communal sharing of
                 labor among residents has currently emerged as a
                 challenging issue in a contemporary housing complex. In
                 an effort to activate those communities, a notion of
                 smart community is presented in which multiple smart
                 homes are equipped with Internet of Things and
                 interconnected with each other. Beyond the unadorned
                 smart community composed by physical proximity, it is
                 essential to discover a human-centric community that
                 achieves communal benefits and enables residents to
                 maximize individual economic gain by leveraging
                 collective intelligence. In this article, we present a
                 multi-dimensional smart community discovery scheme that
                 enables householders to find human-centric community
                 considering multi-dimensional factors in terms of
                 physical, social, and economical aspects. We conduct
                 experiments with 30 real households by applying a
                 community-based energy saving scenario. Experiment
                 results show that the proposed scheme performs better
                 when compared to the physical proximity-based one in
                 energy consumption and user satisfaction.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Prandi:2017:NTS,
  author =       "Catia Prandi and Silvia Mirri and Stefano Ferretti and
                 Paola Salomoni",
  title =        "On the Need of Trustworthy Sensing and Crowdsourcing
                 for Urban Accessibility in {Smart City}",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3133327",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Mobility in urban environments is an undisputed key
                 factor that can affect citizens' well-being and quality
                 of life. This is particularly relevant for those people
                 with disabilities or with reduced mobility who have to
                 face the presence of barriers in urban areas. In this
                 scenario, the availability of information about such
                 architectural elements (together with facilities) can
                 greatly support citizens' mobility by enhancing their
                 independence and their abilities in conducting daily
                 outdoor activities. With this in mind, we have designed
                 and developed mobile Pervasive Accessibility Social
                 Sensing (mPASS), a system that provides users with
                 personalized paths, computed on the basis of their own
                 preferences and needs, with a customizable and
                 accessible interface. The system collects data from
                 crowdsourcing and crowdsensing to map urban and
                 architectural accessibility by providing reliable
                 information coming from different data sources with
                 different levels of trustworthiness. In this context,
                 reliability can be ensured by properly managing
                 crowdsourced and crowdsensed data, combined when
                 possible with authoritative datasets, provided by
                 disability rights organizations and local authorities.
                 To demonstrate this claim, in this article we present
                 our trustworthiness model and discuss results we have
                 obtained by simulations.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Longo:2017:CSD,
  author =       "Antonella Longo and Marco Zappatore and Mario
                 Bochicchio and Shamkant B. Navathe",
  title =        "Crowd-Sourced Data Collection for Urban Monitoring via
                 Mobile Sensors",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093895",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "A considerable amount of research has addressed
                 Internet of Things and connected communities. It is
                 possible to exploit the sensing capabilities of
                 connected communities, by leveraging the continuously
                 growing use of cloud computing solutions and mobile
                 devices. The pervasiveness of mobile sensors also
                 enables the Mobile Crowd Sensing (MCS) paradigm, which
                 aims at using mobile-embedded sensors to extend
                 monitoring of multiple (environmental) phenomena in
                 expansive urban areas. In this article, we discuss our
                 approach with a cloud-based platform to pave the way
                 for applying crowd sensing in urban scenarios. We have
                 implemented a complete solution for environmental
                 monitoring of several pollutants, like noise, air,
                 electromagnetic fields, and so on in an urban area
                 based on this paradigm. Through extensive
                 experimentation, specifically on noise pollution, we
                 show how the proposed infrastructure exhibits the
                 ability to collect data from connected communities, and
                 enables a seamless support of services needed for
                 improving citizens' quality of life and eventually
                 helps city decision makers in urban planning.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ambrosin:2017:OBB,
  author =       "Moreno Ambrosin and Paolo Braca and Mauro Conti and
                 Riccardo Lazzeretti",
  title =        "{ODIN}: Obfuscation-Based Privacy-Preserving Consensus
                 Algorithm for Decentralized Information Fusion in Smart
                 Device Networks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3137573",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The large spread of sensors and smart devices in urban
                 infrastructures are motivating research in the area of
                 the Internet of Things (IoT) to develop new services
                 and improve citizens' quality of life. Sensors and
                 smart devices generate large amounts of measurement
                 data from sensing the environment, which is used to
                 enable services such as control of power consumption or
                 traffic density. To deal with such a large amount of
                 information and provide accurate measurements, service
                 providers can adopt information fusion, which given the
                 decentralized nature of urban deployments can be
                 performed by means of consensus algorithms. These
                 algorithms allow distributed agents to (iteratively)
                 compute linear functions on the exchanged data, and
                 take decisions based on the outcome, without the need
                 for the support of a central entity. However, the use
                 of consensus algorithms raises several security
                 concerns, especially when private or security critical
                 information is involved in the computation. In this
                 article we propose ODIN, a novel algorithm allowing
                 information fusion over encrypted data. ODIN is a
                 privacy-preserving extension of the popular consensus
                 gossip algorithm, which prevents distributed agents
                 from having direct access to the data while they
                 iteratively reach consensus; agents cannot access even
                 the final consensus value but can only retrieve partial
                 information (e.g., a binary decision). ODIN uses
                 efficient additive obfuscation and proxy re-encryption
                 during the update steps and garbled circuits to make
                 final decisions on the obfuscated consensus. We discuss
                 the security of our proposal and show its
                 practicability and efficiency on real-world
                 resource-constrained devices, developing a prototype
                 implementation for Raspberry Pi devices.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bellini:2017:QRE,
  author =       "Emanuele Bellini and Paolo Ceravolo and Paolo Nesi",
  title =        "Quantify Resilience Enhancement of {UTS} through
                 Exploiting Connected Community and {Internet} of
                 Everything Emerging Technologies",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3137572",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This work aims at investigating and quantifying the
                 Urban Transport System (UTS) resilience enhancement
                 enabled by the adoption of emerging technology such as
                 Internet of Everything (IoE) and the new trend of the
                 Connected Community (CC). A conceptual extension of
                 Functional Resonance Analysis Method (FRAM) and its
                 formalization have been proposed and used to model UTS
                 complexity. The scope is to identify the system
                 functions and their interdependencies with a particular
                 focus on those that have a relation and impact on
                 people and communities. Network analysis techniques
                 have been applied to the FRAM model to identify and
                 estimate the most critical community-related functions.
                 The notion of Variability Rate (VR) has been defined as
                 the amount of output variability generated by an
                 upstream function that can be tolerated/absorbed by a
                 downstream function, without significantly increasing
                 of its subsequent output variability. A fuzzy-based
                 quantification of the VR based on expert judgment has
                 been developed when quantitative data are not
                 available. Our approach has been applied to a critical
                 scenario as flash flooding considering two cases: when
                 UTS has CC and IoE implemented or not. However, the
                 method can be applied in different scenarios and
                 critical infrastructures. The results show a remarkable
                 VR enhancement if CC and IoE are deployed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Rathore:2017:HBI,
  author =       "M. Mazhar Rathore and Anand Paul and Awais Ahmad and
                 Marco Anisetti and Gwanggil Jeon",
  title =        "{Hadoop-Based Intelligent Care System (HICS)}:
                 Analytical Approach for Big Data in {IoT}",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "8:1--8:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3108936",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Internet of Things (IoT) is increasingly becoming
                 a worldwide network of interconnected things that are
                 uniquely addressable, via standard communication
                 protocols. The use of IoT for continuous monitoring of
                 public health is being rapidly adopted by various
                 countries while generating a massive volume of
                 heterogeneous, multisource, dynamic, and sparse
                 high-velocity data. Handling such an enormous amount of
                 high-speed medical data while integrating, collecting,
                 processing, analyzing, and extracting knowledge
                 constitutes a challenging task. On the other hand, most
                 of the existing IoT devices do not cooperate with one
                 another by using the same medium of communication. For
                 this reason, it is a challenging task to develop
                 healthcare applications for IoT that fulfill all user
                 needs through real-time monitoring of health
                 parameters. Therefore, to address such issues, this
                 article proposed a Hadoop-based intelligent care system
                 (HICS) that demonstrates IoT-based collaborative
                 contextual Big Data sharing among all of the devices in
                 a healthcare system. In particular, the proposed system
                 involves a network architecture with enhanced
                 processing features for data collection generated by
                 millions of connected devices. In the proposed system,
                 various sensors, such as wearable devices, are attached
                 to the human body and measure health parameters and
                 transmit them to a primary mobile device (PMD). The
                 collected data are then forwarded to intelligent
                 building (IB) using the Internet where the data are
                 thoroughly analyzed to identify abnormal and serious
                 health conditions. Intelligent building consists of (1)
                 a Big Data collection unit (used for data collection,
                 filtration, and load balancing); (2) a Hadoop
                 processing unit (HPU) (composed of Hadoop distributed
                 file system (HDFS) and MapReduce); and (3) an analysis
                 and decision unit. The HPU, analysis, and decision unit
                 are equipped with a medical expert system, which reads
                 the sensor data and performs actions in the case of an
                 emergency situation. To demonstrate the feasibility and
                 efficiency of the proposed system, we use publicly
                 available medical sensory datasets and real-time sensor
                 traffic while identifying the serious health conditions
                 of patients by using thresholds, statistical methods,
                 and machine-learning techniques. The results show that
                 the proposed system is very efficient and able to
                 process high-speed WBAN sensory data in real time.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Wang:2017:RTT,
  author =       "Di Wang and Ahmad Al-Rubaie and Sandra Stinci{\'c}
                 Clarke and John Davies",
  title =        "Real-Time Traffic Event Detection From Social Media",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3122982",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Smart communities are composed of groups,
                 organizations, and individuals who share information
                 and make use of that shared information for better
                 decision making. Shared information can come from many
                 sources, particularly, but not exclusively, from
                 sensors and social media. Social media has become an
                 important source of near-instantaneous user-generated
                 information that can be shared and analyzed to support
                 better decision making. One domain where social media
                 data can add value is transportation and traffic
                 management. This article looks at the exploitation of
                 Twitter data in the traffic reporting domain. A key
                 challenge is how to identify relevant information from
                 a huge amount of user-generated data and then analyze
                 the relevant data for automatic geocoded incident
                 detection. The article proposes an instant traffic
                 alert and warning system based on a novel latent
                 Dirichlet allocation (LDA) approach (``tweet-LDA'').
                 The system is evaluated and shown to perform better
                 than related approaches.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Fujikawa:2017:SVN,
  author =       "Hiroshi Fujikawa and Hirofumi Yamaki and Setsuo
                 Tsuruta",
  title =        "Seamless Virtual Network for International Business
                 Continuity in Presence of Intentional Blocks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "10:1--10:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3133325",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In developing countries, links are poor among domestic
                 communities or internet service providers. Besides,
                 international internet channels are suddenly blocked by
                 such as Golden Shield (GS) in China. Offshore business
                 communications are involved in these. To avoid such
                 involvement, a seamless virtual network is proposed as
                 an international business communication bridging
                 solution. This uses Round Trip Time (RTT) based
                 multiple thresholds for differential switch to Virtual
                 Private Network (VPN) bypass. The characteristics are
                 (1) using multiple threshold integrated differential
                 calculus of RTT increase, a sign of the block is
                 recognized as the steep staircase increase of RTT, (2)
                 followed by the immediate automatic switch to VPN
                 having RTT below 200ms. (3) Asymmetrically, only the
                 absolute threshold value and continuation time are used
                 to determine when to switch back. This method is
                 analytically and statistically evaluated as being
                 successful (below 3\% errors), using around 200 cases
                 of data on GS blocks. Furthermore, it has been
                 validated by the real seamless usage in more than 20
                 offshore companies for three years. Besides response
                 time in offshore applications, our method can also
                 alleviate problems such as voice echoes and video
                 jitters which irritate business users. These effects
                 were validated analytically and by questionnaires to
                 scores of business customers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Lopez:2017:BMC,
  author =       "Claudia L{\'o}pez and Rosta Farzan and Yu-Ru Lin",
  title =        "Behind the Myths of Citizen Participation: Identifying
                 Sustainability Factors of Hyper-Local Information
                 Systems",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "11:1--11:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093892",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Various information systems have emerged to facilitate
                 citizen participation in the life of their communities.
                 However, there is a lack of robust understanding of
                 what enables the sustainability of such systems. This
                 work introduces a framework to identify and analyze
                 various factors that influence the sustainability of
                 ``hyper-local'' information systems. Using longitudinal
                 observations of participation from 35 online
                 neighborhood discussion forums over six years, we
                 analyze the relationship between sustainability and
                 online-offline community characteristics. Our results
                 not only show patterns consistent with previous
                 observations but reveal the dubious influences of
                 member heterogeneity and network structure. Design
                 insights are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Singh:2017:TR,
  author =       "Munindar P. Singh",
  title =        "{TOIT} Reviewers over 2015 and 2016",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "12:1--12:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3140541",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kafali:2017:GEI,
  author =       "{\"O}zg{\"u}r Kafali and Natalia Criado and Martin
                 Rehak and Jose M. Such and Pinar Yolum",
  title =        "{Guest Editors}' Introduction",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "26:1--26:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3177884",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Saenko:2017:GAS,
  author =       "Igor Saenko and Igor Kotenko",
  title =        "Genetic Algorithms for Solving Problems of Access
                 Control Design and Reconfiguration in Computer
                 Networks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "27:1--27:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093898",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "To create solutions for providing the required access
                 control in computer networks it is not sufficient to
                 have only tools and protocols in the network that are
                 needed for it. It is necessary to create corresponding
                 configuration, or scheme, of such tools, which will
                 allow us to satisfy the existing security requirements.
                 At the same time, the problems of creating an access
                 control scheme, as a rule, are NP-complete and require
                 heuristic models for their solving. In this article, we
                 propose a unified approach to creation of control
                 access schemes, based on usage of genetic algorithms.
                 The approach is applied not only to original schemes
                 configuration but to reconfiguration as well.
                 Successful testing of the suggested approach on RBAC,
                 VLAN, and VPN schemes allows us to suppose that it may
                 be applied to other types of access control schemes as
                 well. Experimental testing of suggested genetic
                 algorithms, performed on a specially designed test bed,
                 showed their sufficiently high efficiency.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Stolba:2017:QPL,
  author =       "Michal Stolba and Jan Tozicka and Anton{\'\i}n
                 Komenda",
  title =        "Quantifying Privacy Leakage in Multi-Agent Planning",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "28:1--28:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3133326",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Multi-agent planning using MA-STRIPS-related models is
                 often motivated by the preservation of private
                 information. Such a motivation is not only natural for
                 multi-agent systems but also is one of the main reasons
                 multi-agent planning problems cannot be solved with a
                 centralized approach. Although the motivation is common
                 in the literature, the formal treatment of privacy is
                 often missing. In this article, we expand on a privacy
                 measure based on information leakage introduced in
                 previous work, where the leaked information is measured
                 in terms of transition systems represented by the
                 public part of the problem with regard to the
                 information obtained during the planning process.
                 Moreover, we present a general approach to computing
                 privacy leakage of search-based multi-agent planners by
                 utilizing search-tree reconstruction and classification
                 of leaked superfluous information about the
                 applicability of actions. Finally, we present an
                 analysis of the privacy leakage of two well-known
                 algorithms-multi-agent forward search (MAFS) and
                 Secure-MAFS-both in general and on a particular
                 example. The results of the analysis show that
                 Secure-MAFS leaks less information than MAFS.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Codetta-Raiteri:2017:DNS,
  author =       "Daniele Codetta-Raiteri and Luigi Portinale",
  title =        "Decision Networks for Security Risk Assessment of
                 Critical Infrastructures",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "29:1--29:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3137570",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We exploit Decision Networks (DN) for the analysis of
                 attack/defense scenarios in critical infrastructures.
                 DN extend Bayesian Networks (BN) with decision and
                 value nodes. DN inherit from BN the possibility to
                 naturally address uncertainty at every level, making
                 possible the modeling of situations that are not
                 limited to Boolean combinations of events. By means of
                 decision nodes, DN can include the interaction level of
                 attacks and countermeasures. Inference algorithms can
                 be directly exploited for implementing a probabilistic
                 analysis of both the risk and the importance of the
                 attacks. Thanks to value nodes, a sound decision
                 theoretic analysis has the goal of selecting the
                 optimal set of countermeasures to activate.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "29",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jajodia:2017:SSH,
  author =       "Sushil Jajodia and Noseong Park and Edoardo Serra and
                 V. S. Subrahmanian",
  title =        "{SHARE}: a {Stackelberg} Honey-Based Adversarial
                 Reasoning Engine",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "30:1--30:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3137571",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "A ``noisy-rich'' (NR) cyber-attacker (Lippmann et al.
                 2012) is one who tries all available vulnerabilities
                 until he or she successfully compromises the targeted
                 network. We develop an adversarial foundation, based on
                 Stackelberg games, for how NR-attackers will explore an
                 enterprise network and how they will attack it, based
                 on the concept of a system vulnerability dependency
                 graph. We develop a mechanism by which the network can
                 be modified by the defender to induce deception by
                 placing honey nodes and apparent vulnerabilities into
                 the network to minimize the expected impact of the
                 NR-attacker's attacks (according to multiple measures
                 of impact). We also consider the case where the
                 adversary learns from blocked attacks using
                 reinforcement learning. We run detailed experiments
                 with real network data (but with simulated attack data)
                 and show that Stackelberg Honey-based Adversarial
                 Reasoning Engine performs very well, even when the
                 adversary deviates from the initial assumptions made
                 about his or her behavior. We also develop a method for
                 the attacker to use reinforcement learning when his or
                 her activities are stopped by the defender. We propose
                 two stopping policies for the defender: Stop Upon
                 Detection allows the attacker to learn about the
                 defender's strategy and (according to our experiments)
                 leads to significant damage in the long run, whereas
                 Stop After Delay allows the defender to introduce
                 greater uncertainty into the attacker, leading to
                 better defendability in the long run.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "30",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Padget:2017:FGA,
  author =       "Julian A. Padget and Wamberto W. Vasconcelos",
  title =        "Fine-Grained Access Control via Policy-Carrying Data",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "31:1--31:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3133324",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We address the problem of associating access policies
                 with datasets and how to monitor compliance via
                 policy-carrying data. Our contributions are a formal
                 model in first-order logic inspired by normative
                 multi-agent systems to regulate data access, and a
                 computational model for the validation of specific use
                 cases and the verification of policies against
                 criteria. Existing work on access policy identifies
                 roles as a key enabler, with which we concur, but much
                 of the rest focusses on authentication and
                 authorization technology. Our proposal aims to address
                 the normative principles put forward in Berners-Lee's
                 bill of rights for the internet, through human-readable
                 but machine-processable access control policies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "31",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yao:2017:CLR,
  author =       "Lina Yao and Quan Z. Sheng and Xianzhi Wang and Wei
                 Emma Zhang and Yongrui Qin",
  title =        "Collaborative Location Recommendation by Integrating
                 Multi-dimensional Contextual Information",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "32:1--32:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3134438",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Point-of-Interest (POI) recommendation is a new type
                 of recommendation task that comes along with the
                 prevalence of location-based social networks and
                 services in recent years. Compared with traditional
                 recommendation tasks, POI recommendation focuses more
                 on making personalized and context-aware
                 recommendations to improve user experience.
                 Traditionally, the most commonly used contextual
                 information includes geographical and social context
                 information. However, the increasing availability of
                 check-in data makes it possible to design more
                 effective location recommendation applications by
                 modeling and integrating comprehensive types of
                 contextual information, especially the temporal
                 information. In this article, we propose a
                 collaborative filtering method based on Tensor
                 Factorization, a generalization of the Matrix
                 Factorization approach, to model the multi-dimensional
                 contextual information. Tensor Factorization naturally
                 extends Matrix Factorization by increasing the
                 dimensionality of concerns, within which the
                 three-dimensional model is the one most popularly used.
                 Our method exploits a high-order tensor to fuse
                 heterogeneous contextual information about users'
                 check-ins instead of the traditional two-dimensional
                 user-location matrix. The factorization of this tensor
                 leads to a more compact model of the data that is
                 naturally suitable for integrating contextual
                 information to make POI recommendations. Based on the
                 model, we further improve the recommendation accuracy
                 by utilizing the internal relations within users and
                 locations to regularize the latent factors.
                 Experimental results on a large real-world dataset
                 demonstrate the effectiveness of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "32",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Shen:2017:TES,
  author =       "Haiying Shen and Harrison Chandler and Haoyu Wang",
  title =        "Toward Efficient Short-Video Sharing in the {YouTube}
                 Social Network",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "33:1--33:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3137569",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The past few years have seen an explosion in the
                 popularity of online short-video sharing in YouTube. As
                 the number of users continue to grow, the bandwidth
                 required to maintain acceptable quality of service
                 (QoS) has greatly increased. Peer-to-peer (P2P)
                 architectures have shown promise in reducing the
                 bandwidth costs; however, the previous works build one
                 P2P overlay for each video, which provides limited
                 availability of video providers and produces high
                 overlay maintenance overhead. To handle these problems,
                 in this work, we novelly leverage the existing social
                 network in YouTube, where a user subscribes to another
                 user's channel to track all his/her uploaded videos.
                 The subscribers of a channel tend to watch the
                 channel's videos and common-interest nodes tend to
                 watch the same videos. Also, the popularity of videos
                 in one channel varies greatly. We study real trace data
                 to confirm these properties. Based on these properties,
                 we propose SocialTube, which builds the subscribers of
                 one channel into a P2P overlay and also clusters
                 common-interest nodes in a higher level. It also
                 incorporates a prefetching algorithm that prefetches
                 higher-popularity videos. To enhance the system
                 performance, we further propose the demand/supply-based
                 cache management scheme and reputation-based neighbor
                 management scheme. Extensive trace-driven simulation
                 results and PlanetLab real-world experimental results
                 verify the effectiveness of SocialTube at reducing
                 server load and overlay maintenance overhead and at
                 improving QoS for users.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "33",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Xu:2017:CBD,
  author =       "Zhen Xu and James Miller",
  title =        "Cross-Browser Differences Detection Based on an
                 Empirical Metric for {Web} Page Visual Similarity",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "34:1--34:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3140544",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This article aims to develop a method to detect visual
                 differences introduced into web pages when they are
                 rendered in different browsers. To achieve this goal,
                 we propose an empirical visual similarity metric by
                 mimicking human mechanisms of perception. The Gestalt
                 laws of grouping are translated into a computer
                 compatible rule set. A block tree is then parsed by the
                 rules for similarity calculation. During the
                 translation of the Gestalt laws, experiments are
                 performed to obtain metrics for proximity, color
                 similarity, and image similarity. After a validation
                 experiment, the empirical metric is employed to detect
                 cross-browser differences. Experiments and case studies
                 on the world's most popular web pages provide positive
                 results for this methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "34",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2017:LBF,
  author =       "Wei Emma Zhang and Quan Z. Sheng and Lina Yao and
                 Kerry Taylor and Ali Shemshadi and Yongrui Qin",
  title =        "A Learning-Based Framework for Improving Querying on
                 {Web} Interfaces of Curated Knowledge Bases",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "35:1--35:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3155806",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Knowledge Bases (KBs) are widely used as one of the
                 fundamental components in Semantic Web applications as
                 they provide facts and relationships that can be
                 automatically understood by machines. Curated knowledge
                 bases usually use Resource Description Framework (RDF)
                 as the data representation model. To query the
                 RDF-presented knowledge in curated KBs, Web interfaces
                 are built via SPARQL Endpoints. Currently, querying
                 SPARQL Endpoints has problems like network instability
                 and latency, which affect the query efficiency. To
                 address these issues, we propose a client-side caching
                 framework, SPARQL Endpoint Caching Framework (SECF),
                 aiming at accelerating the overall querying speed over
                 SPARQL Endpoints. SECF identifies the potential issued
                 queries by leveraging the querying patterns learned
                 from clients' historical queries and prefecthes/caches
                 these queries. In particular, we develop a distance
                 function based on graph edit distance to measure the
                 similarity of SPARQL queries. We propose a feature
                 modelling method to transform SPARQL queries to vector
                 representation that are fed into machine-learning
                 algorithms. A time-aware smoothing-based method,
                 Modified Simple Exponential Smoothing (MSES), is
                 developed for cache replacement. Extensive experiments
                 performed on real-world queries showcase the
                 effectiveness of our approach, which outperforms the
                 state-of-the-art work in terms of the overall querying
                 speed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "35",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zander:2017:WTY,
  author =       "Sebastian Zander and Xuequn Wang",
  title =        "Are We There Yet? {IPv6} in {Australia} and {China}",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "36:1--36:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3158374",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "IP (Internet Protocol) version 6 (IPv6) was
                 standardised in 1998 to address the expected runout of
                 IP version 4 (IPv4) addresses. However, the transition
                 from IPv4 to IPv6 has been very slow in many countries.
                 We investigate the state of IPv6 deployment in
                 Australian and Chinese organisations based on a survey
                 of organisations' IT staff. Compared to earlier
                 studies, IPv6 deployment has advanced markedly, but it
                 is still years away for a significant portion of
                 organisations. We provide insights into the deployment
                 problems, arguments for deploying IPv6, and how to
                 speed up the transition, which are relevant for many
                 countries.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "36",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2017:DDP,
  author =       "Wei Emma Zhang and Quan Z. Sheng and Jey Han Lau and
                 Ermyas Abebe and Wenjie Ruan",
  title =        "Duplicate Detection in Programming Question Answering
                 Communities",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "37:1--37:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3169795",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Community-based Question Answering (CQA) websites are
                 attracting increasing numbers of users and contributors
                 in recent years. However, duplicate questions
                 frequently occur in CQA websites and are currently
                 manually identified by the moderators. Automatic
                 duplicate detection, on one hand, alleviates this
                 laborious effort for moderators before taking close
                 actions, and, on the other hand, helps question issuers
                 quickly find answers. A number of studies have looked
                 into related problems, but very limited works target
                 Duplicate Detection in Programming CQA (PCQA), a branch
                 of CQA that is dedicated to programmers. Existing works
                 framed the task as a supervised learning problem on the
                 question pairs and relied on only textual features.
                 Moreover, the issue of selecting candidate duplicates
                 from large volumes of historical questions is often
                 un-addressed. To tackle these issues, we model
                 duplicate detection as a two-stage
                 ``ranking-classification'' problem over question pairs.
                 In the first stage, we rank the historical questions
                 according to their similarities to the newly issued
                 question and select the top ranked ones as candidates
                 to reduce the search space. In the second stage, we
                 develop novel features that capture both textual
                 similarity and latent semantics on question pairs,
                 leveraging techniques in deep learning and information
                 retrieval literature. Experiments on real-world
                 questions about multiple programming languages
                 demonstrate that our method works very well; in some
                 cases, up to 25\% improvement compared to the
                 state-of-the-art benchmarks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "37",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Guo:2017:PGE,
  author =       "Tian Guo and Prashant Shenoy",
  title =        "Providing Geo-Elasticity in Geographically Distributed
                 Clouds",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "38:1--38:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3169794",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Geographically distributed cloud platforms are well
                 suited for serving a geographically diverse user base.
                 However, traditional cloud provisioning mechanisms that
                 make local scaling decisions are not adequate for
                 delivering the best possible performance for modern web
                 applications that observe both temporal and spatial
                 workload fluctuations. We propose GeoScale, a system
                 that provides geo-elasticity by combining model-driven
                 proactive and agile reactive provisioning approaches.
                 GeoScale can dynamically provision server capacity at
                 any location based on workload dynamics. We conduct a
                 detailed evaluation of GeoScale on Amazon's
                 geo-distributed cloud and show up to 40\% improvement
                 in the 95th percentile response time when compared to
                 traditional elasticity techniques.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "38",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Guo:2017:IAC,
  author =       "Yonghong Guo and Lu Liu and Yan Wu and James Hardy",
  title =        "Interest-Aware Content Discovery in Peer-to-Peer
                 Social Networks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "39:1--39:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3176247",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "With the increasing popularity and rapid development
                 of Online Social Networks (OSNs), OSNs not only bring
                 fundamental changes to information and communication
                 technologies, but also make an extensive and profound
                 impact on all aspects of our social life. Efficient
                 content discovery is a fundamental challenge for
                 large-scale distributed OSNs. However, the similarity
                 between social networks and online social networks
                 leads us to believe that the existing social theories
                 are useful for improving the performance of social
                 content discovery in online social networks. In this
                 article, we propose an interest-aware social-like
                 peer-to-peer (IASLP) model for social content discovery
                 in OSNs by mimicking ten different social theories and
                 strategies. In the IASLP network, network nodes with
                 similar interests can meet, help each other, and
                 co-operate autonomously to identify useful contents.
                 The presented model has been evaluated and simulated in
                 a dynamic environment with an evolving network. The
                 experimental results show that the recall of IASLP is
                 20\% higher than the existing method SESD while the
                 overhead is 10\% lower. The IASLP can generate higher
                 flexibility and adaptability and achieve better
                 performance than the existing methods.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "39",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Xie:2018:ISI,
  author =       "Tao Xie and Andre van Hoorn and Huaimin Wang and Ingo
                 Weber",
  title =        "Introduction to the Special Issue on Emerging Software
                 Technologies for {Internet}-Based Systems: Internetware
                 and {DevOps}",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "13:1--13:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3173572",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Liu:2018:JIO,
  author =       "Xuanzhe Liu and Meihua Yu and Yun Ma and Gang Huang
                 and Hong Mei and Yunxin Liu",
  title =        "{i-Jacob}: an Internetware-Oriented Approach to
                 Optimizing Computation-Intensive Mobile {Web}
                 Browsing",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093899",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Web browsing is always a key requirement of Internet
                 users. Current mobile Web apps can contain
                 computation-intensive JavaScript logics and thus affect
                 browsing performance. Learning from our over-decade
                 research and development experiences of the
                 Internetware paradigm, we present the novel and generic
                 i-Jacob approach to improving the performance of mobile
                 Web browsing with effective JavaScript-code offloading.
                 Our approach proposes a programming abstraction to make
                 mobile Web situational and adaptive to contexts, by
                 specifying the computation-intensive and `` offloadable
                 '' code, and develops a platform-independent
                 lightweight runtime spanning the mobile devices and the
                 cloud. We demonstrate the efficiency of i-Jacob with
                 some typical computation-intensive tasks over various
                 combinations of hardware, operating systems, browsers,
                 and network connections. The improvements can reach up
                 to 49$ \times $ speed-up in response time and 90\%
                 saving in energy.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ouyang:2018:ASE,
  author =       "Xue Ouyang and Peter Garraghan and Bernhard Primas and
                 David Mckee and Paul Townend and Jie Xu",
  title =        "Adaptive Speculation for Efficient {Internetware}
                 Application Execution in Clouds",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "15:1--15:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093896",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Modern Cloud computing systems are massive in scale,
                 featuring environments that can execute highly dynamic
                 Internetware applications with huge numbers of
                 interacting tasks. This has led to a substantial
                 challenge-the straggler problem, whereby a small subset
                 of slow tasks significantly impede parallel job
                 completion. This problem results in longer service
                 responses, degraded system performance, and late timing
                 failures that can easily threaten Quality of Service
                 (QoS) compliance. Speculative execution (or
                 speculation) is the prominent method deployed in Clouds
                 to tolerate stragglers by creating task replicas at
                 runtime. The method detects stragglers by specifying a
                 predefined threshold to calculate the difference
                 between individual tasks and the average task
                 progression within a job. However, such a static
                 threshold debilitates speculation effectiveness as it
                 fails to capture the intrinsic diversity of timing
                 constraints in Internetware applications, as well as
                 dynamic environmental factors, such as resource
                 utilization. By considering such characteristics,
                 different levels of strictness for replica creation can
                 be imposed to adaptively achieve specified levels of
                 QoS for different applications. In this article, we
                 present an algorithm to improve the execution
                 efficiency of Internetware applications by dynamically
                 calculating the straggler threshold, considering key
                 parameters including job QoS timing constraints, task
                 execution progress, and optimal system resource
                 utilization. We implement this dynamic straggler
                 threshold into the YARN architecture to evaluate it's
                 effectiveness against existing state-of-the-art
                 solutions. Results demonstrate that the proposed
                 approach is capable of reducing parallel job response
                 time by up to 20\% compared to the static threshold, as
                 well as a higher speculation success rate, achieving up
                 to 66.67\% against 16.67\% in comparison to the static
                 method.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ferry:2018:CMD,
  author =       "Nicolas Ferry and Franck Chauvel and Hui Song and
                 Alessandro Rossini and Maksym Lushpenko and Arnor
                 Solberg",
  title =        "{CloudMF}: Model-Driven Management of Multi-Cloud
                 Applications",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3125621",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "While the number of cloud solutions is continuously
                 increasing, the development and operation of
                 large-scale and distributed cloud applications are
                 still challenging. A major challenge is the lack of
                 interoperability between the existing cloud solutions,
                 which increases the complexity of maintaining and
                 evolving complex applications potentially deployed
                 across multiple cloud infrastructures and platforms. In
                 this article, we show how the Cloud Modelling Framework
                 leverages model-driven engineering and supports the
                 DevOps ideas to tame this complexity by providing: (i)
                 a domain-specific language for specifying the
                 provisioning and deployment of multi-cloud
                 applications, and (ii) a models@run-time environment
                 for their continuous provisioning, deployment, and
                 adaptation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Pahl:2018:APC,
  author =       "Claus Pahl and Pooyan Jamshidi and Olaf Zimmermann",
  title =        "Architectural Principles for Cloud Software",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "17:1--17:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3104028",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "A cloud is a distributed Internet-based software
                 system providing resources as tiered services. Through
                 service-orientation and virtualization for resource
                 provisioning, cloud applications can be deployed and
                 managed dynamically. We discuss the building blocks of
                 an architectural style for cloud-based software
                 systems. We capture style-defining architectural
                 principles and patterns for control-theoretic,
                 model-based architectures for cloud software. While
                 service orientation is agreed on in the form of
                 service-oriented architecture and microservices,
                 challenges resulting from multi-tiered, distributed and
                 heterogeneous cloud architectures cause uncertainty
                 that has not been sufficiently addressed. We define
                 principles and patterns needed for effective
                 development and operation of adaptive cloud-native
                 systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Jiang:2018:FCC,
  author =       "He Jiang and Xin Chen and Tieke He and Zhenyu Chen and
                 Xiaochen Li",
  title =        "Fuzzy Clustering of Crowdsourced Test Reports for
                 Apps",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "18:1--18:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3106164",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "DevOps is a new approach to drive a seamless
                 Application (App) cycle from development to delivery.
                 As a critical part to promote the successful
                 implementation of DevOps, testing can significantly
                 improve team productivity and reliably deliver user
                 experience. However, it is difficult to use traditional
                 testing to cover diverse mobile phones, network
                 environments, operating systems, and so on. Hence, many
                 large companies crowdsource their App testing tasks to
                 workers from open platforms. In crowdsourced testing,
                 test reports submitted by workers may be highly
                 redundant, and their quality may vary sharply.
                 Meanwhile, multi-bug test reports may be submitted, and
                 their root causes are hard to diagnose. Hence, it is a
                 time-consuming and tedious task for developers to
                 manually inspect these test reports. To help developers
                 address the above challenges, we issue the new problem
                 of Fuzzy Clustering Test Reports (FULTER). Aiming to
                 resolve FULTER, a series of barriers need to be
                 overcome. In this study, we propose a new framework
                 named Test Report Fuzzy Clustering Framework (TERFUR)
                 by aggregating redundant and multi-bug test reports
                 into clusters to reduce the number of inspected test
                 reports. First, we construct a filter to remove invalid
                 test reports to break through the invalid barrier.
                 Then, a preprocessor is built to enhance the
                 descriptions of short test reports to break through the
                 uneven barrier. Last, a two-phase merging algorithm is
                 proposed to partition redundant and multi-bug test
                 reports into clusters that can break through the
                 multi-bug barrier. Experimental results over 1,728 test
                 reports from five industrial Apps show that TERFUR can
                 cluster test reports by up to 78.15\% in terms of
                 AverageP, 78.41\% in terms of AverageR, and 75.82\% in
                 terms of AverageF1 and outperform comparative methods
                 by up to 31.69\%, 33.06\%, and 24.55\%, respectively.
                 In addition, the effectiveness of TERFUR is validated
                 in prioritizing test reports for manual inspection.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Peng:2018:COM,
  author =       "Xin Peng and Jingxiao Gu and Tian Huat Tan and Jun Sun
                 and Yijun Yu and Bashar Nuseibeh and Wenyun Zhao",
  title =        "{CrowdService}: Optimizing Mobile Crowdsourcing and
                 Service Composition",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "19:1--19:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3108935",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Some user needs can only be met by leveraging the
                 capabilities of others to undertake particular tasks
                 that require intelligence and labor. Crowdsourcing such
                 capabilities is one way to achieve this. But providing
                 a service that leverages crowd intelligence and labor
                 is a challenge, since various factors need to be
                 considered to enable reliable service provisioning. For
                 example, the selection of an optimal set of workers
                 from those who bid to perform a task needs to be made
                 based on their reliability, expected reward, and
                 distance to the target locations. Moreover, for an
                 application involving multiple services, the overall
                 cost and time constraints must be optimally allocated
                 to each involved service. In this article, we develop a
                 framework, named CrowdService, that supplies crowd
                 intelligence and labor as publicly accessible crowd
                 services via mobile crowdsourcing. The article extends
                 our earlier work by providing an approach for
                 constraints synthesis and worker selection. It employs
                 a genetic algorithm to dynamically synthesize and
                 update near-optimal cost and time constraints for each
                 crowd service involved in a composite service and
                 selects a near-optimal set of workers for each crowd
                 service to be executed. We implement the proposed
                 framework on Android platforms and evaluate its
                 effectiveness, scalability, and usability in both
                 experimental and user studies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yang:2018:IVA,
  author =       "Wenhua Yang and Chang Xu and Minxue Pan and Xiaoxing
                 Ma and Jian Lu",
  title =        "Improving Verification Accuracy of {CPS} by Modeling
                 and Calibrating Interaction Uncertainty",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "20:1--20:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093894",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Cyber-Physical Systems (CPS) intrinsically combine
                 hardware and physical systems with software and
                 network, which are together creating complex and
                 correlated interactions. CPS applications often
                 experience uncertainty in interacting with environment
                 through unreliable sensors. They can be faulty and
                 exhibit runtime errors if developers have not
                 considered environmental interaction uncertainty
                 adequately. Existing work in verifying CPS applications
                 ignores interaction uncertainty and thus may overlook
                 uncertainty-related faults. To improve verification
                 accuracy, in this article we propose a novel approach
                 to verifying CPS applications with explicit modeling of
                 uncertainty arisen in the interaction between them and
                 the environment. Our approach builds an Interactive
                 State Machine network for a CPS application and models
                 interaction uncertainty by error ranges and
                 distributions. Then it encodes both the application and
                 uncertainty models to Satisfiability Modulo Theories
                 (SMT) formula to leverage SMT solvers searching for
                 counterexamples that represent application failures.
                 The precision of uncertainty model can affect the
                 verification results. However, it may be difficult to
                 model interaction uncertainty precisely enough at the
                 beginning, because of the uncontrollable noise of
                 sensors and insufficient data sample size. To further
                 improve the accuracy of the verification results, we
                 propose an approach to identifying and calibrating
                 imprecise uncertainty models. We exploit the
                 inconsistency between the counterexamples' estimate and
                 actual occurrence probabilities to identify possible
                 imprecision in uncertainty models, and the calibration
                 of imprecise models is to minimize the inconsistency,
                 which is reduced to a Search-Based Software Engineering
                 problem. We experimentally evaluated our verification
                 and calibration approaches with real-world CPS
                 applications, and the experimental results confirmed
                 their effectiveness and efficiency.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Willnecker:2018:MOO,
  author =       "Felix Willnecker and Helmut Krcmar",
  title =        "Multi-Objective Optimization of Deployment Topologies
                 for Distributed Applications",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "21:1--21:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3106158",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Modern applications are typically implemented as
                 distributed systems comprising several components.
                 Deciding where to deploy which component is a difficult
                 task that today is usually assisted by logical topology
                 recommendations. Choosing inefficient topologies
                 allocates the wrong amount of resources, leads to
                 unnecessary operation costs, or results in poor
                 performance. Testing different topologies to find good
                 solutions takes a lot of time and might delay
                 productive operations. Therefore, this work introduces
                 a software-based deployment topology optimization
                 approach for distributed applications. We use an
                 enhanced performance model generator that extracts
                 models from operational monitoring data of running
                 applications. The extracted model is used to simulate
                 performance metrics (e.g., resource utilization,
                 response times, throughput) and runtime costs of
                 distributed applications. Subsequently, we introduce a
                 deployment topology optimizer, which selects an
                 optimized topology for a specified workload and
                 considers on-premise, cloud, and hybrid topologies. The
                 following three optimization goals are presented in
                 this work: (i) minimum response time for an optimized
                 user experience, (ii) approximate resource utilization
                 around certain peaks, and (iii) minimum cost for
                 running the application. To evaluate the approach, we
                 use the SPECjEnterpriseNEXT industry benchmark as
                 distributed application in an on-premise and in a
                 cloud/on-premise hybrid environment. The evaluation
                 demonstrates the accuracy of the simulation compared to
                 the actual deployment by deploying an optimized
                 topology and comparing measurements with simulation
                 results.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Saez:2018:UBD,
  author =       "Santiago G{\'o}mez S{\'a}ez and Vasilios Andrikopoulos
                 and Marina Bitsaki and Frank Leymann and Andr{\'e} van
                 Hoorn",
  title =        "Utility-Based Decision Making for Migrating
                 Cloud-Based Applications",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "22:1--22:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3140545",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Nowadays, cloud providers offer a broad catalog of
                 services for migrating and distributing applications in
                 the cloud. However, the existence of a wide spectrum of
                 cloud services has become a challenge for deciding
                 where to host applications, as these vary in
                 performance and cost. This work addresses such a
                 challenge, and provides a utility-based decision
                 support model and method that evaluates and ranks
                 during design time potential application distributions
                 spanned among heterogeneous cloud services. The utility
                 model is evaluated using the MediaWiki (Wikipedia)
                 application, and shows an improved efficiency for
                 selecting cloud services in comparison to other
                 decision making approaches.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhou:2018:OAT,
  author =       "Bowen Zhou and Amir Vahid Dastjerdi and Rodrigo N.
                 Calheiros and Rajkumar Buyya",
  title =        "An Online Algorithm for Task Offloading in
                 Heterogeneous Mobile Clouds",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "23:1--23:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3122981",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Mobile cloud computing is emerging as a promising
                 approach to enrich user experiences at the mobile
                 device end. Computation offloading in a heterogeneous
                 mobile cloud environment has recently drawn increasing
                 attention in research. The computation offloading
                 decision making and tasks scheduling among
                 heterogeneous shared resources in mobile clouds are
                 becoming challenging problems in terms of providing
                 global optimal task response time and energy
                 efficiency. In this article, we address these two
                 problems together in a heterogeneous mobile cloud
                 environment as an optimization problem. Different from
                 conventional distributed computing system scheduling
                 problems, our joint offloading and scheduling
                 optimization problem considers unique contexts of
                 mobile clouds such as wireless network connections and
                 mobile device mobility, which makes the problem more
                 complex. We propose a context-aware mixed integer
                 programming model to provide off-line optimal solutions
                 for making the offloading decisions and scheduling the
                 offloaded tasks among the shared computing resources in
                 heterogeneous mobile clouds. The objective is to
                 minimize the global task completion time (i.e.,
                 makespan). To solve the problem in real time, we
                 further propose a deterministic online algorithm-the
                 Online Code Offloading and Scheduling (OCOS)
                 algorithm-based on the rent/buy problem and prove the
                 algorithm is 2-competitive. Performance evaluation
                 results show that the OCOS algorithm can generate
                 schedules that have around two times shorter makespan
                 than conventional independent task scheduling
                 algorithms. Also, it can save around 30\% more on
                 makespan of task execution schedules than conventional
                 offloading strategies, and scales well as the number of
                 users grows.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Palanisamy:2018:PPP,
  author =       "Balaji Palanisamy and Ling Liu and Yang Zhou and
                 Qingyang Wang",
  title =        "Privacy-Preserving Publishing of Multilevel
                 Utility-Controlled Graph Datasets",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "24:1--24:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3125622",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Conventional private data publication schemes are
                 targeted at publication of sensitive datasets either
                 after the k -anonymization process or through
                 differential privacy constraints. Typically these
                 schemes are designed with the objective of retaining as
                 much utility as possible for the aggregate queries
                 while ensuring the privacy of the individual records.
                 Such an approach, though suitable for publishing
                 aggregate information as public datasets, is
                 inapplicable when users have different levels of access
                 to the same data. We argue that existing schemes either
                 result in increased disclosure of private information
                 or lead to reduced utility when some users have more
                 access privileges than the others. In this article, we
                 present an anonymization framework for publishing large
                 datasets with the goals of providing different levels
                 of utility to the users based on their access privilege
                 levels. We design and implement our proposed multilevel
                 utility-controlled anonymization schemes in the context
                 of large association graphs considering three levels of
                 user utility, namely, (1) users having access to only
                 the graph structure, (2) users having access to the
                 graph structure and aggregate query results, and (3)
                 users having access to the graph structure, aggregate
                 query results, and individual associations. Our
                 experiments on real large association graphs show that
                 the proposed techniques are effective and scalable and
                 yield the required level of privacy and utility for
                 each user privacy and access privilege level.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Angiulli:2018:ECS,
  author =       "Fabrizio Angiulli and Luciano Argento and Angelo
                 Furfaro",
  title =        "Exploiting Content Spatial Distribution to Improve
                 Detection of Intrusions",
  journal =      j-TOIT,
  volume =       "18",
  number =       "2",
  pages =        "25:1--25:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3143422",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We present PCkAD, a novel semisupervised anomaly-based
                 IDS (Intrusion Detection System) technique, detecting
                 application-level content-based attacks. Its
                 peculiarity is to learn legitimate payloads by
                 splitting packets into chunks and determining the
                 within-packet distribution of n-grams. This strategy is
                 resistant to evasion techniques as blending. We prove
                 that finding the right legitimate content is NP-hard in
                 the presence of chunks. Moreover, it improves the
                 false-positive rate for a given detection rate with
                 respect to the case where the spatial information is
                 not considered. Comparison with well-known IDSs using
                 n-grams highlights that PCkAD achieves state-of-the-art
                 performances.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Baroglio:2018:SIC,
  author =       "Cristina Baroglio and Olivier Boissier and Axel
                 Polleres",
  title =        "Special Issue: Computational Ethics and
                 Accountability",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "40:1--40:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3195835",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "40",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kayal:2018:ARN,
  author =       "Alex Kayal and Willem-Paul Brinkman and Mark A.
                 Neerincx and M. Birna {Van Riemsdijk}",
  title =        "Automatic Resolution of Normative Conflicts in
                 Supportive Technology Based on User Values",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "41:1--41:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3158371",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Social commitments (SCs) provide a flexible,
                 norm-based, governance structure for sharing and
                 receiving data. However, users of data sharing
                 applications can subscribe to multiple SCs, possibly
                 producing opposing sharing and receiving requirements.
                 We propose resolving such conflicts automatically
                 through a conflict resolution model based on relevant
                 user values such as privacy and safety. The model
                 predicts a user's preferred resolution by choosing the
                 commitment that best supports the user's values. We
                 show through an empirical user study ( n = 396) that
                 values, as well as recency and norm type, significantly
                 improve a system's ability to predict user preference
                 in location sharing conflicts.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "41",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Kekulluoglu:2018:PPS,
  author =       "Dilara Kekulluoglu and Nadin Kokciyan and Pinar
                 Yolum",
  title =        "Preserving Privacy as Social Responsibility in Online
                 Social Networks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "42:1--42:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3158373",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Online social networks provide an environment for
                 their users to share content with others, where the
                 user who shares a content item is put in charge,
                 generally ignoring others that might be affected by it.
                 However, a content that is shared by one user can very
                 well violate the privacy of other users. To remedy
                 this, ideally, all users who are related to a content
                 should get a say in how the content should be shared.
                 Recent approaches advocate the use of agreement
                 technologies to enable stakeholders of a post to
                 discuss the privacy configurations of a post. This
                 allows related individuals to express concerns so that
                 various privacy violations are avoided up front.
                 Existing techniques try to establish an agreement on a
                 single post. However, most of the time, agreement
                 should be established over multiple posts such that the
                 user can tolerate slight breaches of privacy in return
                 of a right to share posts themselves in future
                 interactions. As a result, users can help each other
                 preserve their privacy, viewing this as their social
                 responsibility. This article develops a
                 reciprocity-based negotiation for reaching privacy
                 agreements among users and introduces a negotiation
                 architecture that combines semantic privacy rules with
                 utility functions. We evaluate our approach over
                 multiagent simulations with software agents that mimic
                 users based on a user study.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "42",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Verdiesen:2018:MMA,
  author =       "Ilse Verdiesen and Virginia Dignum and Jeroen {Van Den
                 Hoven}",
  title =        "Measuring Moral Acceptability in E-deliberation: a
                 Practical Application of Ethics by Participation",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "43:1--43:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3183324",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Current developments in governance and policy setting
                 are challenging traditional top-down models of
                 decision-making. Whereas, on the one hand, citizens are
                 increasingly demanding and expected to participate
                 directly on governance questions, social networking
                 platforms are, on the other hand, increasingly
                 providing podia for the spread of unfounded, extremist
                 and/or harmful ideas. Participatory deliberation is a
                 form of democratic policy making in which deliberation
                 is central to decision-making using both consensus
                 decision-making and majority rule. However, by
                 definition, it will lead to socially accepted results
                 rather than ensuring the moral acceptability of the
                 result. In fact, participation per se offers no
                 guidance regarding the ethics of the decisions taken,
                 nor does it provide means to evaluate alternatives in
                 terms of their moral ``quality.'' This article proposes
                 an open participatory model, Massive Open Online
                 Deliberation (MOOD), that can be used to solve some of
                 the current policy authority deficits. MOOD taps on
                 individual understanding and opinions by harnessing
                 open, participatory, crowd-sourced, and wiki-like
                 methodologies, effectively producing collective
                 judgements regarding complex political and social
                 issues in real time. MOOD offers the opportunity for
                 people to develop and draft collective judgements on
                 complex issues and crises in real time. MOOD is based
                 on the concept of Ethics by Participation, a formalized
                 and guided process of moral deliberation that extends
                 deliberative democracy platforms to identify morally
                 acceptable outcomes and enhance critical thinking and
                 reflection among participants.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "43",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bahri:2018:EAS,
  author =       "Leila Bahri and Barbara Carminati and Elena Ferrari
                 and Andrea Bianco",
  title =        "Enhanced Audit Strategies for Collaborative and
                 Accountable Data Sharing in Social Networks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "44:1--44:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3134439",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Data sharing and access control management is one of
                 the issues still hindering the development of
                 decentralized online social networks (DOSNs), which are
                 now gaining more research attention with the recent
                 developments in P2P computing, such as the secure
                 public ledger-based protocols (Blockchains) for
                 monetary systems. In a previous work, we proposed an
                 initial audit-based model for access control in DOSNs.
                 In this article, we focus on enhancing the audit
                 strategies and the privacy issues emerging from records
                 kept for audit purposes. We propose enhanced audit and
                 collaboration strategies, for which experimental
                 results, on a real online social network graph with
                 simulated sharing behavior, show an improvement in the
                 detection rate of bad behavior of more than 50\%
                 compared to the basic model. We also provide an
                 analysis of the related privacy issues and discuss
                 possible privacy-preserving alternatives.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "44",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gkatziaki:2018:EEU,
  author =       "Vasiliki Gkatziaki and Symeon Papadopoulos and Richard
                 Mills and Sotiris Diplaris and Ioannis Tsampoulatidis
                 and Ioannis Kompatsiaris",
  title =        "{easIE}: Easy-to-Use Information Extraction for
                 Constructing {CSR} Databases From the {Web}",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "45:1--45:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3155807",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Public awareness of and concerns about companies'
                 social and environmental impacts have seen a marked
                 increase over recent decades. In parallel, the quantity
                 of relevant information has increased, as states pass
                 laws requiring certain forms of reporting, researchers
                 investigate companies' performance, and companies
                 themselves seek to gain a competitive advantage by
                 being seen to operate fairly and transparently.
                 However, this information is typically dispersed and
                 non-standardized, making it complicated to collect and
                 analyze. To address this challenge, the WikiRate
                 platform aims to collect this information and store it
                 in a standardized format within a centralized public
                 repository, making it much more amenable to analysis.
                 In the context of WikiRate, this article introduces
                 easIE, an easy-to-use information extraction (IE)
                 framework that leverages general Web IE principles for
                 building datasets with environmental, social, and
                 governance information from the Web. To demonstrate the
                 flexibility and value of easIE, we built a large-scale
                 corporate social responsibility database comprising
                 654,491 metrics related to 49,009 companies spending
                 less than 16 hours for data engineering, collection,
                 and indexing. Finally, a data collection exercise
                 involving 12 subjects was performed to showcase the
                 ease of use of the developed framework.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "45",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Gavanelli:2018:APA,
  author =       "Marco Gavanelli and Marco Alberti and Evelina Lamma",
  title =        "Accountable Protocols in Abductive Logic Programming",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "46:1--46:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3107936",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Finding the entity responsible for an unpleasant
                 situation is often difficult, especially in artificial
                 agent societies. S CIFF is a formalization of agent
                 societies, including a language to describe rules and
                 protocols, and an abductive proof procedure for
                 compliance checking. However, how to identify the
                 entity responsible for a violation is not always clear.
                 In this work, a definition of accountability for
                 artificial societies is formalized in S CIFF. Two tools
                 are provided for the designer of interaction protocols:
                 a guideline, in terms of syntactic features that ensure
                 accountability of the protocol, and an algorithm
                 (implemented in a software tool) to investigate if, for
                 a given protocol, nonaccountability issues could
                 arise.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "46",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Bohme:2018:SIE,
  author =       "Rainer B{\"o}hme and Richard Clayton and Jens
                 Grossklags and Katrina Ligett and Patrick Loiseau and
                 Galina Schwartz",
  title =        "Special Issue on the Economics of Security and
                 Privacy: {Guest Editors}' Introduction",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "47:1--47:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3216902",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "This editorial introduces the special issue on the
                 economics of security and privacy.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "47",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Laszka:2018:ASR,
  author =       "Aron Laszka and Benjamin Johnson and Jens Grossklags",
  title =        "On the Assessment of Systematic Risk in Networked
                 Systems",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "48:1--48:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3166069",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "In a networked system, the risk of security
                 compromises depends not only on each node's security
                 but also on the topological structure formed by the
                 connected individuals, businesses, and computer
                 systems. Research in network security has been
                 exploring this phenomenon for a long time, with a
                 variety of modeling frameworks predicting how many
                 nodes we should expect to lose, on average, for a given
                 network topology, after certain types of incidents.
                 Meanwhile, the pricing of insurance contracts for risks
                 related to information technology (better known as
                 cyber-insurance) requires determining additional
                 information, for example, the maximum number of nodes
                 we should expect to lose within a 99.5\% confidence
                 interval. Previous modeling research in network
                 security has not addressed these types of questions,
                 while research on cyber-insurance pricing for networked
                 systems has not taken into account the network's
                 topology. Our goal is to bridge that gap, by providing
                 a mathematical basis for the assessment of systematic
                 risk in networked systems. We define a loss-number
                 distribution to be a probability distribution on the
                 total number of compromised nodes within a network
                 following the occurrence of a given incident, and we
                 provide a number of modeling results that aim to be
                 useful for cyber-insurers in this context. We prove
                 NP-hardness for the general case of computing the
                 loss-number distribution for an arbitrary network
                 topology but obtain simplified computable formulas for
                 the special cases of star topologies, ER-random
                 topologies, and uniform topologies. We also provide a
                 simulation algorithm that approximates the loss-number
                 distribution for an arbitrary network topology and that
                 appears to converge efficiently for many common classes
                 of topologies. Scale-free network topologies have a
                 degree distribution that follows a power law and are
                 commonly found in real-world networks. We provide an
                 example of a scale-free network in which a
                 cyber-insurance pricing mechanism that relies naively
                 on incidence reporting data will fail to accurately
                 predict the true risk level of the entire system. We
                 offer an alternative mechanism that yields an accurate
                 forecast by taking into account the network topology,
                 thus highlighting the lack/importance of topological
                 data in security incident reporting. Our results
                 constitute important steps toward the understanding of
                 systematic risk and help to contribute to the emergence
                 of a viable cyber-insurance market.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "48",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Tajalizadehkhoob:2018:RAB,
  author =       "Samaneh Tajalizadehkhoob and Rainer B{\"o}hme and
                 Carlos Ga{\~n}{\'a}n and Maciej Korczy{\'n}ski and
                 Michel {Van Eeten}",
  title =        "Rotten Apples or Bad Harvest? {What} We Are Measuring
                 When We Are Measuring Abuse",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "49:1--49:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3122985",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Internet security and technology policy research
                 regularly uses technical indicators of abuse to
                 identify culprits and to tailor mitigation strategies.
                 As a major obstacle, current inferences from abuse data
                 that aim to characterize providers with poor security
                 practices often use a naive normalization of abuse
                 (abuse counts divided by network size) and do not take
                 into account other inherent or structural properties of
                 providers. Even the size estimates are subject to
                 measurement errors relating to attribution,
                 aggregation, and various sources of heterogeneity. More
                 precise indicators are costly to measure at Internet
                 scale. We address these issues for the case of hosting
                 providers with a statistical model of the abuse data
                 generation process, using phishing sites in hosting
                 networks as a case study. We decompose error sources
                 and then estimate key parameters of the model,
                 controlling for heterogeneity in size and business
                 model. We find that 84\% of the variation in abuse
                 counts across 45,358 hosting providers can be explained
                 with structural factors alone. Informed by the fitted
                 model, we systematically select and enrich a subset of
                 105 homogeneous ``statistical twins'' with additional
                 explanatory variables, unreasonable to collect for all
                 hosting providers. We find that abuse is positively
                 associated with the popularity of websites hosted and
                 with the prevalence of popular content management
                 systems. Moreover, hosting providers who charge higher
                 prices (after controlling for level differences between
                 countries) witness less abuse. These structural factors
                 together explain a further 77\% of the remaining
                 variation. This calls into question premature
                 inferences from raw abuse indicators about the security
                 efforts of actors, and suggests the adoption of similar
                 analysis frameworks in all domains where network
                 measurement aims at informing technology policy.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "49",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Moore:2018:RRB,
  author =       "Tyler Moore and Nicolas Christin and Janos Szurdi",
  title =        "Revisiting the Risks of {Bitcoin} Currency Exchange
                 Closure",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "50:1--50:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3155808",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Bitcoin has enjoyed wider adoption than any previous
                 cryptocurrency; yet its success has also attracted the
                 attention of fraudsters who have taken advantage of
                 operational insecurity and transaction irreversibility.
                 We study the risk that investors face from the closure
                 of Bitcoin exchanges, which convert between Bitcoins
                 and hard currency. We examine the track record of 80
                 Bitcoin exchanges established between 2010 and 2015. We
                 find that nearly half (38) have since closed, with
                 customer account balances sometimes wiped out.
                 Fraudsters are sometimes to blame, but not always.
                 Twenty-five exchanges suffered security breaches, 15 of
                 which subsequently closed. We present logistic
                 regressions using longitudinal data on Bitcoin
                 exchanges aggregated quarterly. We find that
                 experiencing a breach is correlated with a 13 times
                 greater odds that an exchange will close in that same
                 quarter. We find that higher-volume exchanges are less
                 likely to close (each doubling in trade volume
                 corresponds to a 12\% decrease in the odds of closure).
                 We also find that exchanges that derive most of their
                 business from trading less popular (fiat) currencies,
                 which are offered by at most one competitor, are less
                 likely to close.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "50",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Achara:2018:FGC,
  author =       "Jagdish Prasad Achara and Javier Parra-Arnau and
                 Claude Castelluccia",
  title =        "Fine-Grained Control over Tracking to Support the
                 Ad-Based {Web} Economy",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "51:1--51:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3158372",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The intrusiveness of Web tracking and the increasing
                 invasiveness of digital advertising have raised serious
                 concerns regarding user privacy and Web usability,
                 leading a substantial chunk of the populace to adopt
                 ad-blocking technologies in recent years. The problem
                 with these technologies, however, is that they are
                 extremely limited and radical in their approach, and
                 they completely disregard the underlying economic model
                 of the Web, in which users get content free in return
                 for allowing advertisers to show them ads. Nowadays,
                 with around 200 million people regularly using such
                 tools, said economic model is in danger. In this
                 article, we investigate an Internet technology that
                 targets users who are not, in general, against
                 advertising, accept the trade-off that comes with the
                 ``free'' content, but-for privacy concerns-they wish to
                 exert fine-grained control over tracking. Our working
                 assumption is that some categories of web pages (e.g.,
                 related to health or religion) are more
                 privacy-sensitive to users than others (e.g., about
                 education or science). Capitalizing on this, we propose
                 a technology that allows users to specify the
                 categories of web pages that are privacy-sensitive to
                 them and block the trackers present on such web pages
                 only. As tracking is prevented by blocking network
                 connections of third-party domains, we avoid not only
                 tracking but also third-party ads. Since users continue
                 receiving ads on those web pages that belong to
                 non-sensitive categories, our approach may provide a
                 better point of operation within the trade-off between
                 user privacy and the Web economy. To test the
                 appropriateness and feasibility of our solution, we
                 implemented it as a Web-browser plug-in, which is
                 currently available for Google Chrome and Mozilla
                 Firefox. Experimental results from the collected data
                 of 746 users during one year show that only 16.25\% of
                 ads are blocked by our tool, which seems to indicate
                 that the economic impact of the ad-blocking exerted by
                 privacy-sensitive users could be significantly
                 reduced.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "51",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Binns:2018:MTP,
  author =       "Reuben Binns and Jun Zhao and Max {Van Kleek} and
                 Nigel Shadbolt",
  title =        "Measuring Third-party Tracker Power across {Web} and
                 Mobile",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "52:1--52:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3176246",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Third-party networks collect vast amounts of data
                 about users via websites and mobile applications.
                 Consolidations among tracker companies can
                 significantly increase their individual tracking
                 capabilities, prompting scrutiny by competition
                 regulators. Traditional measures of market share, based
                 on revenue or sales, fail to represent the tracking
                 capability of a tracker, especially if it spans both
                 web and mobile. This article proposes a new approach to
                 measure the concentration of tracking capability, based
                 on the reach of a tracker on popular websites and apps.
                 Our results reveal that tracker prominence and
                 parent-subsidiary relationships have significant impact
                 on accurately measuring concentration.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "52",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zaeem:2018:PAS,
  author =       "Razieh Nokhbeh Zaeem and Rachel L. German and K.
                 Suzanne Barber",
  title =        "{PrivacyCheck}: Automatic Summarization of Privacy
                 Policies Using Data Mining",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "53:1--53:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3127519",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Prior research shows that only a tiny percentage of
                 users actually read the online privacy policies they
                 implicitly agree to while using a website. Prior
                 research also suggests that users ignore privacy
                 policies because these policies are lengthy and, on
                 average, require 2 years of college education to
                 comprehend. We propose a novel technique that tackles
                 this problem by automatically extracting summaries of
                 online privacy policies. We use data mining models to
                 analyze the text of privacy policies and answer 10
                 basic questions concerning the privacy and security of
                 user data, what information is gathered from them, and
                 how this information is used. In order to train the
                 data mining models, we thoroughly study privacy
                 policies of 400 companies (considering 10\% of all
                 listings on NYSE, Nasdaq, and AMEX stock markets)
                 across industries. Our free Chrome browser extension,
                 PrivacyCheck, utilizes the data mining models to
                 summarize any HTML page that contains a privacy policy.
                 PrivacyCheck stands out from currently available
                 counterparts because it is readily applicable on any
                 online privacy policy. Cross-validation results show
                 that PrivacyCheck summaries are accurate 40\% to 73\%
                 of the time. Over 400 independent Chrome users are
                 currently using PrivacyCheck.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "53",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Graves:2018:SCC,
  author =       "James T. Graves and Alessandro Acquisti and Nicolas
                 Christin",
  title =        "Should Credit Card Issuers Reissue Cards in Response
                 to a Data Breach?: Uncertainty and Transparency in
                 Metrics for Data Security Policymaking",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "54:1--54:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3122983",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "When card data is exposed in a data breach but has not
                 yet been used to attempt fraud, the overall social
                 costs of that breach depend on whether the financial
                 institutions that issued those cards immediately cancel
                 them and issue new cards or instead wait until fraud is
                 attempted. This article empirically investigates the
                 social costs and benefits of those options. We use a
                 parameterized model and Monte Carlo simulation to
                 compare the cost of reissuing cards to the total
                 expected cost of fraud if cards are not reissued. The
                 ranges and distributions in our model are informed by
                 publicly available information, from which we
                 extrapolate estimates of the number of credit card
                 records historically exposed in data breaches, the
                 probability that a card exposed in a breach will be
                 used for fraud, and the associated expected cost of
                 existing-account credit card fraud. We find that
                 automatically reissuing cards may have lower social
                 costs than the costs of waiting until fraud is
                 attempted, although the range of results is
                 considerably broad.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "54",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Rezvani:2018:PAM,
  author =       "Mohsen Rezvani and Aleksandar Ignjatovic and Elisa
                 Bertino",
  title =        "A Provenance-Aware Multi-dimensional Reputation System
                 for Online Rating Systems",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "55:1--55:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3183323",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Online rating systems are widely accepted as means for
                 quality assessment on the web and users increasingly
                 rely on these systems when deciding to purchase an item
                 online. This makes such rating systems frequent targets
                 of attempted manipulation by posting unfair rating
                 scores. Therefore, providing useful, realistic rating
                 scores as well as detecting unfair behavior are both of
                 very high importance. Existing solutions are mostly
                 majority based, also employing temporal analysis and
                 clustering techniques. However, they are still
                 vulnerable to unfair ratings. They also ignore
                 distances between options, the provenance of
                 information, and different dimensions of cast rating
                 scores while computing aggregate rating scores and
                 trustworthiness of users. In this article, we propose a
                 robust iterative algorithm which leverages information
                 in the profile of users and provenance of information,
                 and which takes into account the distance between
                 options to provide both more robust and informative
                 rating scores for items and trustworthiness of users.
                 We also prove convergence of iterative ranking
                 algorithms under very general assumptions, which are
                 satisfied by the algorithm proposed in this article. We
                 have implemented and tested our rating method using
                 both simulated data as well as four real-world datasets
                 from various applications of reputation systems. The
                 experimental results demonstrate that our model
                 provides realistic rating scores even in the presence
                 of a massive amount of unfair ratings and outperforms
                 the well-known ranking algorithms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "55",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yang:2018:GTM,
  author =       "Zhi Yang and Wei Chen",
  title =        "A Game Theoretic Model for the Formation of Navigable
                 Small-World Networks-The Tradeoff between Distance and
                 Reciprocity",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "56:1--56:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3183325",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Kleinberg proposed a family of small-world networks to
                 explain the navigability of large-scale real-world
                 social networks. However, the underlying mechanism that
                 drives real networks to be navigable is not yet well
                 understood. In this article, we present a game
                 theoretic model for the formation of navigable
                 small-world networks. We model the network formation as
                 a game called the Distance-Reciprocity Balanced (DRB)
                 game in which people seek for both high reciprocity and
                 long-distance relationships. We show that the game has
                 only two Nash equilibria: One is the navigable
                 small-world network, and the other is the random
                 network in which each node connects with each other
                 node with equal probability, and any other network
                 state can reach the navigable small world via a
                 sequence of best-response moves of nodes. We further
                 show that the navigable small-world equilibrium is very
                 stable-(a) no collusion of any size would benefit from
                 deviating from it; and (b) after an arbitrary
                 deviations of a large random set of nodes, the network
                 would return to the navigable small world as soon as
                 every node takes one best-response step. In contrast,
                 for the random network, a small group collusion or
                 random perturbations is guaranteed to bring the network
                 out of the random-network equilibrium and move to the
                 navigable network as soon as every node takes one
                 best-response step. Moreover, we show that navigable
                 small-world equilibrium has much better social welfare
                 than the random network, and we provide the
                 price-of-anarchy and price-of-stability results of the
                 game. Our empirical evaluation further demonstrates
                 that the system always converges to the navigable
                 network even when limited or no information about other
                 players' strategies is available, and the DRB game
                 simulated on real-world networks leads to navigability
                 characteristic that is very close to that of the real
                 networks, even though the real-world networks have
                 non-uniform population distributions different from
                 Kleinberg's small-world model. Our theoretical and
                 empirical analyses provide important new insight on the
                 connection between distance, reciprocity, and
                 navigability in social networks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "56",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Singh:2018:TR,
  author =       "Munindar P. Singh",
  title =        "{TOIT} Reviewers over 2017",
  journal =      j-TOIT,
  volume =       "18",
  number =       "4",
  pages =        "57:1--57:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3232919",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "57",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yu:2019:FGE,
  author =       "Zhiwen Yu and Fei Yi and Chao Ma and Zhu Wang and Bin
                 Guo and Liming Chen",
  title =        "Fine-grained Emotion Role Detection Based on Retweet
                 Information",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3191820",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "User behaviors in online social networks convey not
                 only literal information but also one's emotional
                 attitudes towards the information. To compute this
                 attitude, we define the concept of emotion role as the
                 concentrated reflection of a user's online emotional
                 characteristics. Emotion role detection aims to better
                 understand the structure and sentiments of online
                 social networks and support further analysis, e.g.,
                 revealing public opinions, providing personalized
                 recommendations, and detecting influential users. In
                 this article, we first introduce the definition of a
                 fine-grained emotion role, which consists of two
                 dimensions: emotion orientation (i.e., positive,
                 negative, and neutral) and emotion influence (i.e.,
                 leader and follower). We then propose a
                 Multi-dimensional Emotion Role Mining model (MERM) to
                 determine a user's emotion role in online social
                 networks. Specifically, we tend to identify emotion
                 roles by combining a set of features that reflect a
                 user's online emotional status, including degree of
                 emotional characteristics, accumulated emotion
                 preference, structural factor, temporal factor, and
                 emotion change factor. Experiment results on a
                 real-life micro-blog reposting dataset show that the
                 classification accuracy of the proposed model can
                 achieve up to 90.1\%.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Shih:2019:GPB,
  author =       "Timothy K. Shih and W. K. T. M. Gunarathne and
                 Ankhtuya Ochirbat and Huang-Ming Su",
  title =        "Grouping Peers Based on Complementary Degree and
                 Social Relationship using Genetic Algorithm",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3193180",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The aim of this article is to propose a new innovative
                 grouping approach using the genetic algorithm (GA) to
                 enhance the interaction and collaboration among peers
                 by considering the complementary degree of students'
                 learning status and their social relationships. In
                 order to validate our approach, experiments were
                 designed with a group of students and the outcomes were
                 tested with an e-Learning system. The auto-grouping
                 mechanism is developed using GA for better learning
                 results, which is justified based on the performance of
                 students tested on the e-Learning system. The outcomes
                 clearly indicate that the proposed approach can
                 generate a high degree of heterogeneous grouping and
                 encourage students to learn better. The technical
                 contribution of this article can be implemented in any
                 massive open online course platforms with thousands of
                 students, with regard to identifying peers for
                 collaborative works.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Novo:2019:MCT,
  author =       "Oscar Novo",
  title =        "Making Constrained Things Reachable: a Secure
                 {IP}-Agnostic {NAT} Traversal Approach for {IoT}",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3230640",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The widespread adoption of the Internet of Things
                 (IoT) has created a demand for ubiquitous connectivity
                 of IoT devices into the Internet. While end-to-end
                 connectivity for IoT requires in practice IPv6, a vast
                 majority of nodes in Internet are only IPv4-capable. To
                 address this issue, the use of Network Address
                 Translation (NAT) at the IoT network boundary becomes
                 necessary. However, the constrained nature of the IoT
                 devices hinders the integration of traditional NAT
                 traversal architectures through IoT networks. In this
                 article, we introduce a novel transition mechanism that
                 transparently enables IoT devices behind NATs to
                 connect across different network-layer infrastructures.
                 Our mechanism adopts the IoT standards to provide a
                 global connectivity solution in a transparent, secure,
                 and elegant way. Additionally, we revisit the NAT
                 solutions for IoT and describe and evaluate our current
                 implementation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ouni:2019:HAI,
  author =       "Ali Ouni and Hanzhang Wang and Marouane Kessentini and
                 Salah Bouktif and Katsuro Inoue",
  title =        "A Hybrid Approach for Improving the Design Quality of
                 {Web} Service Interfaces",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3226593",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "A key success of a Web service is to appropriately
                 design its interface to make it easy to consume and
                 understand. In the context of service-oriented
                 computing (SOC), the service's interface is the main
                 source of interaction with the consumers to reuse the
                 service functionality in real-world applications. The
                 SOC paradigm provides a collection of principles and
                 guidelines to properly design services to provide best
                 practice of third-party reuse. However, recent studies
                 showed that service designers tend to pay little care
                 to the design of their service interfaces, which often
                 lead to several side effects known as antipatterns. One
                 of the most common Web service interface antipatterns
                 is to expose a large number of semantically unrelated
                 operations, implementing different abstractions, in one
                 single interface. Such bad design practices may have a
                 significant impact on the service reusability,
                 understandability, as well as the development and
                 run-time characteristics. To address this problem, in
                 this article, we propose a hybrid approach to improve
                 the design quality of Web service interfaces and fix
                 antipatterns as a combination of both deterministic and
                 heuristic-based approaches. The first step consists of
                 a deterministic approach using a graph
                 partitioning-based technique to split the operations of
                 a large service interface into more cohesive
                 interfaces, each one representing a distinct
                 abstraction. Then, the produced interfaces will be
                 checked using a heuristic-based approach based on the
                 non-dominated sorting genetic algorithm (NSGA-II) to
                 correct potential antipatterns while reducing the
                 interface design deviation to avoid taking the service
                 away from its original design. To evaluate our
                 approach, we conduct an empirical study on a benchmark
                 of 26 real-world Web services provided by Amazon and
                 Yahoo. Our experiments consist of a quantitative
                 evaluation based on design quality metrics, as well as
                 a qualitative evaluation with developers to assess its
                 usefulness in practice. The results show that our
                 approach significantly outperforms existing approaches
                 and provides more meaningful results from a developer's
                 perspective.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Neiat:2019:IBC,
  author =       "Azadeh Ghari Neiat and Athman Bouguettaya and Sajib
                 Mistry",
  title =        "Incentive-Based Crowdsourcing of Hotspot Services",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3229047",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We present a new spatio-temporal incentive-based
                 approach to achieve a geographically balanced coverage
                 of crowdsourced services. The proposed approach is
                 based on a new spatio-temporal incentive model that
                 considers multiple parameters including location
                 entropy, time of day, and spatio-temporal density to
                 encourage the participation of crowdsourced service
                 providers. We present a greedy network flow algorithm
                 that offers incentives to redistribute crowdsourced
                 service providers to improve the crowdsourced coverage
                 balance within an area. A novel participation
                 probability model is also introduced to estimate the
                 expected number of crowdsourced service providers'
                 movement based on spatio-temporal features.
                 Experimental results validate the efficiency and
                 effectiveness of the proposed approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Tata:2019:GEI,
  author =       "Samir Tata and Quan Z. Sheng and Eleni Stroulia",
  title =        "{Guest Editors}' Introduction for Special Issue on
                 Service Management for the {Internet of Things}",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3293539",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Taherkordi:2019:CDR,
  author =       "Amir Taherkordi and Frank Eliassen and Michael
                 Mcdonald and Geir Horn",
  title =        "Context-Driven and Real-Time Provisioning of
                 Data-Centric {IoT} Services in the Cloud",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "7:1--7:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3151006",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The convergence of Internet of Things (IoT) and the
                 Cloud has significantly facilitated the provision and
                 management of services in large-scale applications,
                 such as smart cities. With a huge number of IoT
                 services accessible through clouds, it is very
                 important to model and expose cloud-based IoT services
                 in an efficient manner, promising easy and real-time
                 delivery of cloud-based, data-centric IoT services. The
                 existing work in this area has adopted a uniform and
                 flat view to IoT services and their data, making it
                 difficult to achieve the above goal. In this article,
                 we propose a software framework, Context-driven And
                 Real-time IoT (CARIoT) for real-time provisioning of
                 cloud-based IoT services and their data, driven by
                 their contextual properties. The main idea behind the
                 proposed framework is to structure the description of
                 data-centric IoT services and their real-time and
                 historical data in a hierarchical form in accordance
                 with the end-user application's context model. CARIoT
                 features design choices and software services to
                 realize this service provisioning model and the
                 supporting data structures for hierarchical IoT data
                 access. Using this approach, end-user applications can
                 access IoT services and subscribe to their real-time
                 and historical data in an efficient manner at different
                 contextual levels, e.g., from a municipal district to a
                 street in smart city use cases. We leverage a popular
                 cloud-based data storage platform, called Firebase, to
                 implement the CARIoT framework and evaluate its
                 efficiency. The evaluation results show that CARIoT's
                 hierarchical structure imposes no additional overhead
                 with less data notification delay as compared to
                 existing flat structures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mezghani:2019:ACP,
  author =       "Emna Mezghani and Ernesto Exposito and Khalil Drira",
  title =        "An Autonomic Cognitive Pattern for Smart {IoT}-Based
                 System Manageability: Application to Comorbidity
                 Management",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "8:1--8:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3166070",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The adoption of the Internet of Things (IoT)
                 drastically witnesses an increase in different domains
                 and contributes to the fast digitalization of the
                 universe. Henceforth, next generation of IoT-based
                 systems are set to become more complex to design and
                 manage. Collecting real-time IoT-generated data
                 unleashes a new wave of opportunities for business to
                 take more precise and accurate decisions at the right
                 time. However, a set of challenges, including the
                 design complexity of IoT-based systems and the
                 management of the ensuing heterogeneous big data as
                 well as the system scalability, need to be addressed
                 for the development of flexible smart IoT-based
                 systems. Consequently, we proposed a set of design
                 patterns that diminish the system design complexity
                 through selecting the appropriate combination of
                 patterns based on the system requirements. These
                 patterns identify four maturity levels for the design
                 and development of smart IoT-based systems. In this
                 article, we are mainly dealing with the system design
                 complexity to manage the context changeability at
                 runtime. Thus, we delineate the autonomic cognitive
                 management pattern, which is at the most mature level.
                 Based on the autonomic computing, this pattern
                 identifies a combination of management processes able
                 to continuously detect and manage the context changes.
                 These processes are coordinated based on cognitive
                 mechanisms that allow the system perceiving and
                 understanding the meaning of the received data to make
                 business decisions, as well as dynamically discovering
                 new processes that meet the requirements evolution at
                 runtime. We demonstrated the use of the proposed
                 pattern with a use case from the healthcare domain;
                 more precisely, the patient comorbidity management
                 based on wearables.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mahmud:2019:LAA,
  author =       "Redowan Mahmud and Kotagiri Ramamohanarao and Rajkumar
                 Buyya",
  title =        "Latency-Aware Application Module Management for Fog
                 Computing Environments",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3186592",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The fog computing paradigm has drawn significant
                 research interest as it focuses on bringing cloud-based
                 services closer to Internet of Things (IoT) users in an
                 efficient and timely manner. Most of the physical
                 devices in the fog computing environment, commonly
                 named fog nodes, are geographically distributed,
                 resource constrained, and heterogeneous. To fully
                 leverage the capabilities of the fog nodes, large-scale
                 applications that are decomposed into interdependent
                 Application Modules can be deployed in an orderly way
                 over the nodes based on their latency sensitivity. In
                 this article, we propose a latency-aware Application
                 Module management policy for the fog environment that
                 meets the diverse service delivery latency and amount
                 of data signals to be processed in per unit of time for
                 different applications. The policy aims to ensure
                 applications' Quality of Service (QoS) in satisfying
                 service delivery deadlines and to optimize resource
                 usage in the fog environment. We model and evaluate our
                 proposed policy in an iFogSim-simulated fog
                 environment. Results of the simulation studies
                 demonstrate significant improvement in performance over
                 alternative latency-aware strategies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Konstantinidis:2019:IDP,
  author =       "Andreas Konstantinidis and Panagiotis Irakleous and
                 Zacharias Georgiou and Demetrios Zeinalipour-Yazti and
                 Panos K. Chrysanthis",
  title =        "{IoT} Data Prefetching in Indoor Navigation {SOAs}",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3177777",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Internet-based Indoor Navigation Service-Oriented
                 Architectures (IIN-SOA) organize signals collected by
                 IoT-based devices to enable a wide range of novel
                 applications indoors, where people spend 80--90\% of
                 their time. In this article, we study the problem of
                 prefetching (or hoarding) the most important IoT data
                 from an IIN-SOA to a mobile device, without knowing its
                 user's destination during navigation. Our proposed Grap
                 (Graph Prefetching) framework structurally analyzes
                 building topologies to identify important areas that
                 become virtual targets to an online heuristic search
                 algorithm we developed. We tested Grap with datasets
                 from a real IIN-SOA and found it to be impressively
                 accurate.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ghose:2019:GEI,
  author =       "Aditya Ghose and Hamid R. Motahari Nezhad and Manfred
                 Reichert",
  title =        "{Guest Editors}' Introduction to the Special Issue on
                 Knowledge-Driven Business Process Management",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "11:1--11:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3296981",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Eshuis:2019:RAP,
  author =       "Rik Eshuis and Richard Hull and Mengfei Yi",
  title =        "Reasoning About Property Preservation in Adaptive Case
                 Management",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "12:1--12:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3177778",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Adaptive Case Management (ACM) has emerged as a key
                 BPM technology for supporting the unstructured business
                 process. A key problem in ACM is that case schemas need
                 to be changed to best fit the case at hand. Such
                 changes are ad hoc, and may result in schemas that do
                 not reflect the intended logic or properties. This
                 article presents a formal approach for reasoning about
                 which properties of a case schema are preserved after a
                 modification, and describes change operations that are
                 guaranteed to preserve certain properties. The approach
                 supports reasoning about rollbacks. The Case Management
                 model used here is a variant of the
                 Guard-Stage-Milestone model for declarative business
                 artifacts. A real-life example illustrates
                 applicability.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Pourmirza:2019:BRN,
  author =       "Shaya Pourmirza and Sander Peters and Remco Dijkman
                 and Paul Grefen",
  title =        "{BPMS-RA}: a Novel Reference Architecture for Business
                 Process Management Systems",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "13:1--13:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3232677",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3232677",
  abstract =     "A growing number of business process management
                 systems is under development both in academia and in
                 practice. These systems typically are based on modern
                 system engineering principles, such as service-oriented
                 architecture. At the same time, the advent of big data
                 analytics has changed the scope of these systems,
                 including functionality such as data mining. However,
                 existing reference architectures for business process
                 management systems date back 20 years and,
                 consequently, are not up-to-date with these modern
                 developments. To fill the gap, this article proposes an
                 up-to-date reference architecture, called BPMS-RA, for
                 modern business process management systems. BPMS-RA is
                 based on analysis of recent literature and of existing
                 commercial implementations. This reference architecture
                 aims to provide a guideline template for the
                 development of modern-day business process management
                 systems by specifying functions and interfaces that
                 need to be provided by these systems as well as a set
                 of quality criteria that they need to meet.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yousfi:2019:ABP,
  author =       "Alaaeddine Yousfi and Kimon Batoulis and Mathias
                 Weske",
  title =        "Achieving Business Process Improvement via Ubiquitous
                 Decision-Aware Business Processes",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3298986",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Business process improvement is an endless challenge
                 for many organizations. As long as there is a process,
                 it must be improved. Nowadays, improvement initiatives
                 are driven by professionals. This is no longer
                 practical because people cannot perceive the enormous
                 data of current business environments. Here, we
                 introduce ubiquitous decision-aware business processes.
                 They pervade the physical space, analyze the
                 ever-changing environments, and make decisions
                 accordingly. We explain how they can be built and used
                 for improvement. Our approach can be a valuable
                 improvement option to alleviate the workload of
                 participants by helping focus on the crucial rather
                 than the menial tasks.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Estrada-Torres:2019:MPK,
  author =       "Bedilia Estrada-Torres and Pedro Henrique Piccoli
                 Richetti and Adela Del-R{\'\i}o-Ortega and Fernanda
                 Araujo Bai{\~a}o and Manuel Resinas and Fl{\'a}via
                 Maria Santoro and Antonio Ruiz-Cort{\'e}s",
  title =        "Measuring Performance in Knowledge-intensive
                 Processes",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "15:1--15:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3289180",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Knowledge-intensive Processes (KIPs) are processes
                 whose execution is heavily dependent on knowledge
                 workers performing various interconnected
                 knowledge-intensive decision-making tasks. Among other
                 characteristics, KIPs are usually non-repeatable,
                 collaboration-oriented, unpredictable, and, in many
                 cases, driven by implicit knowledge, derived from the
                 capabilities and previous experiences of participants.
                 Despite the growing body of research focused on
                 understanding KIPs and on proposing systems to support
                 these KIPs, the research question on how to define
                 performance measures thereon remains open. In this
                 article, we address this issue with a proposal to
                 enable the performance management of KIPs. Our approach
                 comprises an ontology that allows us to define process
                 performance indicators (PPIs) in the context of KIPs,
                 and a methodology that builds on the ontology and the
                 concepts of lead and lag indicators to provide process
                 participants with actionable guidelines that help them
                 conduct the KIP in a way that fulfills a set of
                 performance goals. Both the ontology and the
                 methodology have been applied to a case study of a real
                 organization in Brazil to manage the performance of an
                 Incident Troubleshooting Process within an ICT
                 (Information and Communications Technology) Outsourcing
                 Company.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Armas-Cervantes:2019:LCD,
  author =       "Abel Armas-Cervantes and Marlon Dumas and Marcello {La
                 Rosa} and Abderrahmane Maaradji",
  title =        "Local Concurrency Detection in Business Process Event
                 Logs",
  journal =      j-TOIT,
  volume =       "19",
  number =       "1",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3289181",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Process mining techniques aim at analyzing records
                 generated during the execution of a business process in
                 order to provide insights on the actual performance of
                 the process. Detecting concurrency relations between
                 events is a fundamental primitive underpinning a range
                 of process mining techniques. Existing approaches to
                 this problem identify concurrency relations at the
                 level of event types under a global interpretation. If
                 two event types are declared to be concurrent, every
                 occurrence of one event type is deemed to be concurrent
                 to one occurrence of the other. In practice, this
                 interpretation is too coarse-grained and leads to
                 over-generalization. This article proposes a
                 finer-grained approach, whereby two event types may be
                 deemed to be in a concurrency relation relative to one
                 state of the process, but not relative to other states.
                 In other words, the detected concurrency relation holds
                 locally, relative to a set of states. Experimental
                 results both with artificial and real-life logs show
                 that the proposed local concurrency detection approach
                 improves the accuracy of existing concurrency detection
                 techniques.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Longo:2019:GEI,
  author =       "Francesco Longo and Antonio Puliafito and Omer Rana",
  title =        "{Guest Editors}' Introduction to the Special Issue on
                 Fog, Edge, and Cloud Integration for Smart
                 Environments",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "17:1--17:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3319404",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3319404",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Puliafito:2019:FCI,
  author =       "Carlo Puliafito and Enzo Mingozzi and Francesco Longo
                 and Antonio Puliafito and Omer Rana",
  title =        "Fog Computing for the {Internet of Things}: a Survey",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "18:1--18:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3301443",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301443",
  abstract =     "Research in the Internet of Things (IoT) conceives a
                 world where everyday objects are connected to the
                 Internet and exchange, store, process, and collect data
                 from the surrounding environment. IoT devices are
                 becoming essential for supporting the delivery of data
                 to enable electronic services, but they are not
                 sufficient in most cases to host application services
                 directly due to their intrinsic resource constraints.
                 Fog Computing (FC) can be a suitable paradigm to
                 overcome these limitations, as it can coexist and
                 cooperate with centralized Cloud systems and extends
                 the latter toward the network edge. In this way, it is
                 possible to distribute resources and services of
                 computing, storage, and networking along the
                 Cloud-to-Things continuum. As such, FC brings all the
                 benefits of Cloud Computing (CC) closer to end (user)
                 devices. This article presents a survey on the
                 employment of FC to support IoT devices and services.
                 The principles and literature characterizing FC are
                 described, highlighting six IoT application domains
                 that may benefit from the use of this paradigm. The
                 extension of Cloud systems towards the network edge
                 also creates new challenges and can have an impact on
                 existing approaches employed in Cloud-based
                 deployments. Research directions being adopted by the
                 community are highlighted, with an indication of which
                 of these are likely to have the greatest impact. An
                 overview of existing FC software and hardware platforms
                 for the IoT is also provided, along with the
                 standardisation efforts in this area initiated by the
                 OpenFog Consortium (OFC).",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Pore:2019:CEE,
  author =       "Madhurima Pore and Vinaya Chakati and Ayan Banerjee
                 and Sandeep K. S. Gupta",
  title =        "{ContextAiDe}: End-to-End Architecture for Mobile
                 Crowd-sensing Applications",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "19:1--19:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3301444",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301444",
  abstract =     "Mobile crowd-sensing (MCS) enables development of
                 context-aware applications by mining relevant
                 information from a large set of devices selected in an
                 ad hoc manner. For example, MCS has been used for
                 real-time monitoring such as Vehicle ad hoc
                 Networks-based traffic updates as well as offline data
                 mining and tagging for future use in applications with
                 location-based services. However, MCS could be
                 potentially used for much more demanding applications
                 such as real-time perpetrator tracking by online mining
                 of images from nearby mobile users. A recent example is
                 tracking the miscreant responsible for the Boston
                 bombing. We present a new design approach for tracking
                 using MCS for such complex processing in real time.
                 Since MCS applications assume an unreliable underlying
                 computational platform, most typically sample size for
                 recruited devices is guided by concerns such as fault
                 tolerance and reliability of information. As the
                 real-time requirements get stricter coupled with
                 increasing complexity of data-mining approaches, the
                 communication and computation overheads can impose a
                 very tight constraint on the sample size of devices
                 needed for realizing real-time operation. This results
                 in trade-off in acquiring context-relevant data and
                 resource usage incurred while the real-time operation
                 requirements get updated dynamically. Such effects have
                 not been properly studied and optimized to enable
                 real-time MCS applications such as perpetrator
                 tracking. In this article, we propose ContextAiDe
                 architecture, a combination of API, middleware, and
                 optimization engine. The key innovation in ContextAiDe
                 is context-optimized recruitment for execution of
                 computation- and communication-heavy MCS applications
                 in edge environment. ContextAiDe uses a notion of two
                 types of contexts, exact (hard constraints), which have
                 to be satisfied, and preferred (soft constraints),
                 which may be satisfied to a certain degree. By
                 adjusting the preferred contexts, ContextAiDe can
                 optimize the operational overheads to enable real-time
                 operation. ContextAiDe provides an API to specify
                 contexts requirements and the code of MCS app, offload
                 execution environment, a middleware that enables
                 context-optimized and a fault-tolerant distributed
                 execution. ContextAiDe evaluation using a real-time
                 perpetrator tracking application shows reduced energy
                 consumption of 37.8\%, decrease in data transfer of
                 24.8\%, and 43\% less time compared to existing
                 strategy. In spite of a small increase in the minimum
                 distance from the perpetrator, iterations of
                 optimization tracks the perpetrator successfully.
                 Pro-actively learning the context and using stochastic
                 optimization strategy minimizes the performance
                 degradation caused due to uncertainty (\&lt;20\%) in
                 usage-dependent contexts.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Concone:2019:FBA,
  author =       "Federico Concone and Giuseppe {Lo Re} and Marco
                 Morana",
  title =        "A Fog-Based Application for Human Activity Recognition
                 Using Personal Smart Devices",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "20:1--20:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3266142",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3266142",
  abstract =     "The diffusion of heterogeneous smart devices capable
                 of capturing and analysing data about users, and/or the
                 environment, has encouraged the growth of novel sensing
                 methodologies. One of the most attractive scenarios in
                 which such devices, such as smartphones, tablet
                 computers, or activity trackers, can be exploited to
                 infer relevant information is human activity
                 recognition (HAR). Even though some simple HAR
                 techniques can be directly implemented on mobile
                 devices, in some cases, such as when complex activities
                 need to be analysed timely, users' smart devices can
                 operate as part of a more complex architecture. In this
                 article, we propose a multi-device HAR framework that
                 exploits the fog computing paradigm to move heavy
                 computation from the sensing layer to intermediate
                 devices and then to the cloud. As compared to
                 traditional cloud-based solutions, this choice allows
                 to overcome processing and storage limitations of
                 wearable devices while also reducing the overall
                 bandwidth consumption. Experimental analysis aims to
                 evaluate the performance of the entire platform in
                 terms of accuracy of the recognition process while also
                 highlighting the benefits it might bring in smart
                 environments.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Li:2019:DRS,
  author =       "He Li and Kaoru Ota and Mianxiong Dong",
  title =        "Deep Reinforcement Scheduling for Mobile Crowdsensing
                 in Fog Computing",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "21:1--21:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3234463",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234463",
  abstract =     "Mobile crowdsensing becomes a promising technology for
                 the emerging Internet of Things (IoT) applications in
                 smart environments. Fog computing is enabling a new
                 breed of IoT services, which is also a new opportunity
                 for mobile crowdsensing. Thus, in this article, we
                 introduce a framework enabling mobile crowdsensing in
                 fog environments with a hierarchical scheduling
                 strategy. We first introduce the crowdsensing framework
                 that has a hierarchical structure to organize different
                 resources. Since different positions and performance of
                 fog nodes influence the quality of service (QoS) of IoT
                 applications, we formulate a scheduling problem in the
                 hierarchical fog structure and solve it by using a deep
                 reinforcement learning-based strategy. From extensive
                 simulation results, our solution outperforms other
                 scheduling solutions for mobile crowdsensing in the
                 given fog computing environment.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Samie:2019:OOO,
  author =       "Farzad Samie and Vasileios Tsoutsouras and Lars Bauer
                 and Sotirios Xydis and Dimitrios Soudris and J{\"o}rg
                 Henkel",
  title =        "{Oops}: Optimizing Operation-mode Selection for {IoT}
                 Edge Devices",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "22:1--22:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3230642",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230642",
  abstract =     "The massive increase of IoT devices and their
                 collected data raises the question of how to analyze
                 all that data. Edge computing provides a suitable
                 compromise, but the question remains: How much
                 processing should be done locally vs. offloaded to
                 other devices? The diverse application requirements and
                 limited resources at the edge extend the challenges. We
                 propose Oops, an optimization framework to adapt the
                 resource management at runtime distributedly. It
                 orchestrates the IoT devices and adapts their operation
                 mode with respect to their constraints and the
                 gateway's limited shared resources. Oops reduces
                 runtime overhead significantly while increasing user
                 utility compared to state-of-the-art.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Avgeris:2019:ARA,
  author =       "Marios Avgeris and Dimitrios Dechouniotis and Nikolaos
                 Athanasopoulos and Symeon Papavassiliou",
  title =        "Adaptive Resource Allocation for Computation
                 Offloading: a Control-Theoretic Approach",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "23:1--23:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3284553",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284553",
  abstract =     "Although mobile devices today have powerful hardware
                 and networking capabilities, they fall short when it
                 comes to executing compute-intensive applications.
                 Computation offloading (i.e., delegating
                 resource-consuming tasks to servers located at the edge
                 of the network) contributes toward moving to a mobile
                 cloud computing paradigm. In this work, a two-level
                 resource allocation and admission control mechanism for
                 a cluster of edge servers offers an alternative choice
                 to mobile users for executing their tasks. At the lower
                 level, the behavior of edge servers is modeled by a set
                 of linear systems, and linear controllers are designed
                 to meet the system's constraints and quality of service
                 metrics, whereas at the upper level, an optimizer
                 tackles the problems of load balancing and application
                 placement toward the maximization of the number the
                 offloaded requests. The evaluation illustrates the
                 effectiveness of the proposed offloading mechanism
                 regarding the performance indicators, such as
                 application average response time, and the optimal
                 utilization of the computational resources of edge
                 servers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Mazouzi:2019:DEE,
  author =       "Houssemeddine Mazouzi and Nadjib Achir and Khaled
                 Boussetta",
  title =        "{DM2-ECOP}: an Efficient Computation Offloading Policy
                 for Multi-user Multi-cloudlet Mobile Edge Computing
                 Environment",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "24:1--24:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3241666",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241666",
  abstract =     "Mobile Edge Computing is a promising paradigm that can
                 provide cloud computing capabilities at the edge of the
                 network to support low latency mobile services. The
                 fundamental concept relies on bringing cloud
                 computation closer to users by deploying cloudlets or
                 edge servers, which are small clusters of servers that
                 are mainly located on existing wireless Access Points
                 (APs), set-top boxes, or Base Stations (BSs). In this
                 article, we focus on computation offloading over a
                 heterogeneous cloudlet environment. We consider several
                 users with different energy-and latency-constrained
                 tasks that can be offloaded over cloudlets with
                 differentiated system and network resources capacities.
                 We investigate offloading policies that decide which
                 tasks should be offloaded and select the assigned
                 cloudlet, accordingly with network and system
                 resources. The objective is to minimize an offloading
                 cost function, which we defined as a combination of
                 tasks' execution time and mobiles' energy consumption.
                 We formulate this problem as a Mixed-Binary
                 Programming. Since the centralized optimal solution is
                 NP-hard, we propose a distributed linear
                 relaxation-based heuristic approach that relies on the
                 Lagrangian decomposition method. To solve the
                 subproblems, we also propose a greedy heuristic
                 algorithm that computes the best cloudlet selection and
                 bandwidth allocation following tasks' offloading costs.
                 Numerical results show that our offloading policy
                 achieves a good solution quickly. We also discuss the
                 performances of our approach for large-scale scenarios
                 and compare it to state-of-the-art approaches from the
                 literature.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Vasconcelos:2019:CFM,
  author =       "D. R. Vasconcelos and R. M. C. Andrade and V. Severino
                 and J. N. {De Souza}",
  title =        "Cloud, Fog, or Mist in {IoT}? {That} Is the Question",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "25:1--25:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3309709",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309709",
  abstract =     "Internet of Things (IoT) has been commercially
                 explored as Platforms as a Services (PaaS). The
                 standard solution for this kind of service is to
                 combine the Cloud computing infrastructure with IoT
                 software, services, and protocols also known as CoT
                 (Cloud of Things). However, the use of CoT in
                 latency-sensitive applications has been shown to be
                 unfeasible due to the inherent latency of cloud
                 computing services. One proposal to solve this problem
                 is the use of the computational resources available at
                 the edge of the network, which is called Fog computing.
                 Fog computing solves the problem of latency but adds
                 complexity to the use of these resources due to the
                 dynamism and heterogeneity of the IoT. An even more
                 accentuated form of fog computing is Mist computing,
                 where the use of the computational resources is limited
                 to the close neighborhood of the client device. The
                 decision of what computing infrastructure (Fog, Mist,
                 or Cloud computing) is the best to provide
                 computational resources is not always simple,
                 especially in cases where latency requirements should
                 be met by CoT. This work proposes an algorithm for
                 selecting the best physical infrastructure to use the
                 computational resource (Fog, Mist, or Cloud computing)
                 based on cost, bandwidth, and latency criteria defined
                 by the client device, resource availability, and
                 topology of the network. The article also introduces
                 the concept of feasible Fog that limits the growth of
                 device search time in the neighborhood of the client
                 device. Simulation results suggest the algorithm's
                 choice adequately attends the client's device
                 requirements and that the proposed method can be used
                 in IoT environment located on the edge of the
                 network.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Feng:2019:PPP,
  author =       "Jun Feng and Laurence T. Yang and Ronghao Zhang",
  title =        "Practical Privacy-preserving High-order Bi-{Lanczos}
                 in Integrated Edge-Fog-Cloud Architecture for
                 Cyber-Physical-Social Systems",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "26:1--26:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3230641",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230641",
  abstract =     "Smart environments, also referred to as
                 cyber-physical-social systems (CPSSs), are expected to
                 significantly benefit from the integration of edge,
                 fog, and cloud for intelligence service flexibility,
                 efficiency, and cost saving. High-order Bi-Lanczos
                 method has emerged as a powerful tool serving as
                 multi-dimensional data processing, such as prevailing
                 feature extraction, classification, and clustering of
                 high-order data, in CPSSs. However, integrated
                 edge-fog-cloud architecture is open and users have very
                 limited control; how to carry out big data processing
                 without compromising the security and privacy is a
                 challenging issue in edge-fog-cloud-assisted smart
                 applications. In this work, we propose a novel and
                 practical privacy-preserving high-order Bi-Lanczos
                 scheme in integrated edge-fog-cloud architectural
                 paradigm for smart environments. More precisely, we
                 first propose a privacy-preserving big data processing
                 model using the synergy of edge, fog, and cloud. The
                 proposed model enables edge, fog, and cloud to
                 cooperatively complete big data processing without
                 compromising users' privacy for large-scale tensor data
                 in CPSSs. Subsequently, making use of the model, we
                 present a privacy-preserving high-order Bi-Lanczos
                 scheme. Finally, we theoretically and empirically
                 analyze the security and efficiency of the proposed
                 privacy-preserving high-order Bi-Lanczos scheme based
                 on an intelligent surveillance system case study. And
                 the results demonstrate that the proposed scheme
                 provides a privacy-preserving and efficient way of
                 computations in integrated edge-fog-cloud paradigm for
                 smart environments.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Ferretti:2019:FBS,
  author =       "Luca Ferretti and Mirco Marchetti and Michele
                 Colajanni",
  title =        "Fog-based Secure Communications for Low-power {IoT}
                 Devices",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "27:1--27:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3284554",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284554",
  abstract =     "Designing secure, scalable, and resilient IoT networks
                 is a challenging task because of resource-constrained
                 devices and no guarantees of reliable network
                 connectivity. Fog computing improves the resiliency of
                 IoT, but its security model assumes that fog nodes are
                 fully trusted. We relax this latter constraint by
                 proposing a solution that guarantees confidentiality of
                 messages exchanged through semi-honest fog nodes thanks
                 to a lightweight proxy re-encryption scheme. We
                 demonstrate the feasibility of the solution by applying
                 it to IoT networks of low-power devices through
                 experiments on microcontrollers and ARM-based
                 architectures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Merlino:2019:EWE,
  author =       "Giovanni Merlino and Rustem Dautov and Salvatore
                 Distefano and Dario Bruneo",
  title =        "Enabling Workload Engineering in Edge, Fog, and Cloud
                 Computing through {OpenStack}-based Middleware",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "28:1--28:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3309705",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309705",
  abstract =     "To enable and support smart environments, a recent ICT
                 trend promotes pushing computation from the remote
                 Cloud as close to data sources as possible, resulting
                 in the emergence of the Fog and Edge computing
                 paradigms. Together with Cloud computing, they
                 represent a stacked architecture, in which raw datasets
                 are first pre-processed locally at the Edge and then
                 vertically offloaded to the Fog and/or the Cloud.
                 However, as hardware is becoming increasingly powerful,
                 Edge devices are seen as candidates for offering data
                 processing capabilities, able to pool and share
                 computing resources to achieve better performance at a
                 lower network latency-a pattern that can be also
                 applied to Fog nodes. In these circumstances, it is
                 important to enable efficient, intelligent, and
                 balanced allocation of resources, as well as their
                 further orchestration, in an elastic and transparent
                 manner. To address such a requirement, this article
                 proposes an OpenStack-based middleware platform through
                 which resource containers at the Edge, Fog, and Cloud
                 levels can be discovered, combined, and provisioned to
                 end users and applications, thereby facilitating and
                 orchestrating offloading processes. As demonstrated
                 through a proof of concept on an intelligent
                 surveillance system, by converging the Edge, Fog, and
                 Cloud, the proposed architecture has the potential to
                 enable faster data processing, as compared to
                 processing at the Edge, Fog, or Cloud levels
                 separately. This also allows architects to combine
                 different offloading patterns in a flexible and
                 fine-grained manner, thus providing new workload
                 engineering patterns. Measurements demonstrated the
                 effectiveness of such patterns, even outperforming edge
                 clusters.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Internet Technol.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Baresi:2019:UMM,
  author =       "L. Baresi and D. F. Mendon{\c{c}}a and M. Garriga and
                 S. Guinea and G. Quattrocchi",
  title =        "A Unified Model for the Mobile-Edge-Cloud Continuum",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "29:1--29:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3226644",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=32