Last update:
Thu Jun 5 06:55:59 MDT 2025
Arvind Arasu and
Junghoo Cho and
Hector Garcia-Molina and
Andreas Paepcke and
Sriram Raghavan Searching the Web . . . . . . . . . . . 2--43
Martin Arlitt and
Diwakar Krishnamurthy and
Jerry Rolia Characterizing the scalability of a
large web-based shopping system . . . . 44--69
Marjory S. Blumenthal and
David D. Clark Rethinking the design of the Internet:
the end-to-end arguments vs. the brave
new world . . . . . . . . . . . . . . . 70--109
Masatoshi Yoshikawa and
Toshiyuki Amagasa and
Takeyuki Shimura and
Shunsuke Uemura XRel: a path-based approach to storage
and retrieval of XML documents using
relational databases . . . . . . . . . . 110--141
David M. Kristol HTTP Cookies: Standards, privacy, and
politics . . . . . . . . . . . . . . . . 151--198
Marc Waldman and
Aviel D. Rubin and
Lorrie Faith Cranor The architecture of robust publishing
systems . . . . . . . . . . . . . . . . 199--230
Joel L. Wolf and
Philip S. Yu On balancing the load in a clustered web
farm . . . . . . . . . . . . . . . . . . 231--261
Xin Guo An optimal strategy for sellers in an
online auction . . . . . . . . . . . . . 1--13
Paul Huck and
Michael Butler and
Amar Gupta and
Michael Feng A self-configuring and
self-administering name system with
dynamic address assignment . . . . . . . 14--46
Carey Williamson On filter effects in web caching
hierarchies . . . . . . . . . . . . . . 47--77
Claus Brabrand and
Anders Mòller and
Michael I. Schwartzbach The $<$ bigwig$>$ project . . . . . . . . 79--114
Roy T. Fielding and
Richard N. Taylor Principled design of the modern Web
architecture . . . . . . . . . . . . . . 115--150
Christian Nentwich and
Licia Capra and
Wolfgang Emmerich and
Anthony Finkelstein xlinkit: a consistency checking and
smart link generation service . . . . . 151--185
Stanley M. Besen and
Jeffrey S. Spigel and
Padmanabhan Srinagesh Evaluating the competitive effects of
mergers of Internet backbone providers 187--204
Stephen Dill and
Ravi Kumar and
Kevin S. Mccurley and
Sridhar Rajagopalan and
D. Sivakumar and
Andrew Tomkins Self-similarity in the web . . . . . . . 205--223
Jian Yin and
Lorenzo Alvisi and
Mike Dahlin and
Arun Iyengar Engineering web cache consistency . . . 224--259
Michael Gordon and
Robert K. Lindsay and
Weiguo Fan Literature-based discovery on the World
Wide Web . . . . . . . . . . . . . . . . 261--275
Harry Hochheiser The platform for privacy preference as a
social protocol: an examination within
the U.S. policy context . . . . . . . . 276--306
Minwen Ji Affinity-based management of main memory
database clusters . . . . . . . . . . . 307--339
Magdalini Eirinaki and
Michalis Vazirgiannis Web mining for web personalization . . . 1--27
Joris Claessens and
Bart Preneel and
Joos Vandewalle (How) can mobile agents do secure
electronic transactions on untrusted
hosts? A survey of the security issues
and the current solutions . . . . . . . 28--48
Paolo Merialdo and
Paolo Atzeni and
Giansalvatore Mecca Design and development of data-intensive
web sites: The Araneus approach . . . . 49--92
Robert Cooley The use of web structure and content to
identify subjectively interesting web
usage patterns . . . . . . . . . . . . . 93--116
Haruo Hosoya and
Benjamin C. Pierce XDuce: a statically typed XML processing
language . . . . . . . . . . . . . . . . 117--148
Alfred Kobsa and
Jörg Schreck Privacy through pseudonymity in
user-adaptive systems . . . . . . . . . 149--183
Patricia Anthony and
Nicholas R. Jennings Developing a bidding agent for multiple
heterogeneous auctions . . . . . . . . . 185--217
Minghua He and
Nicholas R. Jennings SouthamptonTAC: an adaptive autonomous
trading agent . . . . . . . . . . . . . 218--235
Upkar Varshney Location management for mobile commerce
applications in wireless Internet
environment . . . . . . . . . . . . . . 236--255
Junghoo Cho and
Hector Garcia-Molina Estimating frequency of change . . . . . 256--290
R. Braumandl and
A. Kemper and
D. Kossmann Quality of service in an information
economy . . . . . . . . . . . . . . . . 291--333
Ali Amiri and
Syam Menon Efficient scheduling of Internet banner
advertisements . . . . . . . . . . . . . 334--346
Ludmila Cherkasova and
Yun Fu and
Wenting Tang and
Amin Vahdat Measuring and characterizing end-to-end
Internet service performance . . . . . . 347--391
Björn Knutsson and
Honghui Lu and
Jeffrey Mogul and
Bryan Hopkins Architecture and performance of
server-directed transcoding . . . . . . 392--424
Pawel Gburzynski and
Jacek Maitan Fighting the spam wars: a remailer
approach with restrictive aliasing . . . 1--30
Ronny Lempel and
Shlomo Moran Optimizing result prefetching in Web
search engines with segmented indices 31--59
Dan Boneh and
Xuhua Ding and
Gene Tsudik Fine-grained control of security
capabilities . . . . . . . . . . . . . . 60--82
Gregory W. Bond and
Eric Cheung and
K. Hal Purdy and
Pamela Zave and
J. Christopher Ramming An open architecture for next-generation
telecommunication services . . . . . . . 83--123
Gary William Flake and
Paolo Frasconi and
C. Lee Giles and
Marco Maggini Guest editorial: Machine learning for
the Internet . . . . . . . . . . . . . . 125--128
Eugene Agichtein and
Steve Lawrence and
Luis Gravano Learning to find answers to questions on
the Web . . . . . . . . . . . . . . . . 129--162
Mukund Deshpande and
George Karypis Selective Markov models for predicting
Web page accesses . . . . . . . . . . . 163--184
Jianhan Zhu and
Jun Hong and
John G. Hughes PageCluster: Mining conceptual link
hierarchies from Web log files for
adaptive Web site navigation . . . . . . 185--208
Xiao Fang and
Olivia R. Liu Sheng LinkSelector: A Web mining approach to
hyperlink selection for Web portals . . 209--237
Simon Byers and
Aviel D. Rubin and
David Kormann Defending against an Internet-based
attack on the physical world . . . . . . 239--254
François Goasdoué and
Marie-Christine Rousset Answering queries using views: A KRDB
perspective for the semantic Web . . . . 255--288
Roger Barga and
David Lomet and
German Shegalov and
Gerhard Weikum Recovery guarantees for Internet
applications . . . . . . . . . . . . . . 289--328
David Lybäck and
Magnus Boman Agent trade servers in financial
exchange systems . . . . . . . . . . . . 329--339
Gary William Flake and
Paolo Frasconi and
C. Lee Giles and
Marco Maggini Guest editorial: Machine learning for
the Internet . . . . . . . . . . . . . . 341--343
Michael O'Mahony and
Neil Hurley and
Nicholas Kushmerick and
Guénolé Silvestre Collaborative recommendation: a
robustness analysis . . . . . . . . . . 344--377
Filippo Menczer and
Gautam Pant and
Padmini Srinivasan Topical web crawlers: Evaluating
adaptive algorithms . . . . . . . . . . 378--419
Sander M. Bohte and
Enrico Gerding and
Han La Poutré Market-based recommendation: Agents that
compete for consumer attention . . . . . 420--448
Peter Thiemann An embedded domain-specific language for
type-safe server-side Web scripting . . 1--46
Liliana Ardissono and
Anna Goy and
Giovanna Petrone and
Marino Segnan A multi-agent infrastructure for
developing personalized Web-based
systems . . . . . . . . . . . . . . . . 47--69
Addison Chan and
Rynson W. H. Lau and
Beatrice Ng Motion prediction for caching and
prefetching in mouse-driven DVE
navigation . . . . . . . . . . . . . . . 70--91
Monica Bianchini and
Marco Gori and
Franco Scarselli Inside PageRank . . . . . . . . . . . . 92--128
Victoria Ungureanu Using certified policies to regulate
E-commerce transactions . . . . . . . . 129--153
Hongjun Lu and
Jeffrey Xu Yu and
Guoren Wang and
Shihui Zheng and
Haifeng Jiang and
Ge Yu and
Aoying Zhou What makes the differences: benchmarking
XML database implementations . . . . . . 154--194
Wilson Wai Ho Mok and
R. P. Sundarraj Learning algorithms for single-instance
electronic negotiations using the
time-dependent behavioral tactic . . . . 195--230
Allan Borodin and
Gareth O. Roberts and
Jeffrey S. Rosenthal and
Panayiotis Tsaparas Link analysis ranking: algorithms,
theory, and experiments . . . . . . . . 231--297
Martin Abadi and
Mike Burrows and
Mark Manasse and
Ted Wobber Moderately hard, memory-bound functions 299--327
Daniel Oberle and
Steffen Staab and
Rudi Studer and
Raphael Volz Supporting application development in
the Semantic Web . . . . . . . . . . . . 328--358
Jim Challenger and
Paul Dantzig and
Arun Iyengar and
Karen Witting A fragment-based approach for
efficiently creating dynamic Web content 359--389
Michalis Petropoulos and
Yannis Papakonstantinou and
Vasilis Vassalos Graphical query interfaces for
semistructured data: the QURSED system 390--438
Ioana Manolescu and
Marco Brambilla and
Stefano Ceri and
Sara Comai and
Piero Fraternali Model-driven design and deployment of
service-enabled Web applications . . . . 439--479
Keqiu Li and
Hong Shen and
Francis Y. L. Chin and
Si Qing Zheng Optimal methods for coordinated enroute
Web caching for tree networks . . . . . 480--507
Daniel Gomes and
Mário J. Silva Characterizing a national community Web 508--531
Xuan Chen and
John Heidemann Flash crowd mitigation via adaptive
admission control based on
application-level observations . . . . . 532--569
Vasilis Vassalos Corrigenda . . . . . . . . . . . . . . . 570--570
Kaname Harumoto and
Tadashi Nakano and
Shinya Fukumura and
Shinji Shimojo and
Shojiro Nishio Effective Web browsing through content
delivery adaptation . . . . . . . . . . 571--600
Mingzhe Li and
Mark Claypool and
Robert Kinicki and
James Nichols Characteristics of streaming media
stored on the Web . . . . . . . . . . . 601--626
Oscar Diaz and
Juan J. Rodriguez Portlet syndication: Raising variability
concerns . . . . . . . . . . . . . . . . 627--659
Makoto Murata and
Dongwon Lee and
Murali Mani and
Kohsuke Kawaguchi Taxonomy of XML schema languages using
formal language theory . . . . . . . . . 660--704
Jeng-Wei Lin and
Jan-Ming Ho and
Li-Ming Tseng and
Feipei Lai IDN server proxy architecture for
Internationalized Domain Name resolution
and experiences with providing Web
services . . . . . . . . . . . . . . . . 1--19
Bianca Schroeder and
Mor Harchol-Balter Web servers under overload: How
scheduling can help . . . . . . . . . . 20--52
Shu-Yao Chien and
Vassilis J. Tsotras and
Carlo Zaniolo and
Donghui Zhang Supporting complex queries on
multiversion XML documents . . . . . . . 53--84
Simon Szykman and
Ram D. Sriram Design and implementation of the
Web-enabled NIST design repository . . . 85--116
Trevor Fenner and
Mark Levene and
George Loizou A stochastic model for the evolution of
the Web allowing link deletion . . . . . 117--130
Ravi Kumar and
Prabhakar Raghavan and
Sridhar Rajagopalan and
Andrew Tomkins Core algorithms in the CLEVER system . . 131--152
Junghoo Cho and
Hector Garcia-Molina and
Taher Haveliwala and
Wang Lam and
Andreas Paepcke and
Sriram Raghavan and
Gary Wesley Stanford WebBase components and
applications . . . . . . . . . . . . . . 153--186
Salvatore J. Stolfo and
Shlomo Hershkop and
Chia-Wei Hu and
Wei-Jen Li and
Olivier Nimeskern and
Ke Wang Behavior-based modeling and its
application to Email analysis . . . . . 187--221
Jun-Ki Min and
Myung-Jae Park and
Chin-Wan Chung A compressor for effective archiving,
retrieval, and updating of XML documents 223--258
Arno Bakker and
Maarten Van Steen and
Andrew S. Tanenbaum A wide-area Distribution Network for
free software . . . . . . . . . . . . . 259--281
Michael Brinkmeier PageRank revisited . . . . . . . . . . . 282--301
Björn Thòr Jónsson and
María Arinbjarnar and
Bjarnsteinn Thórsson and
Michael J. Franklin and
Divesh Srivastava Performance and overhead of semantic
cache management . . . . . . . . . . . . 302--331
Irma Becerra-Fernandez Searching for experts on the Web: a
review of contemporary expertise locator
systems . . . . . . . . . . . . . . . . 333--355
Paolo Bellavista and
Antonio Corradi and
Rebecca Montanari and
Cesare Stefanelli A mobile computing middleware for
location- and context-aware Internet
data services . . . . . . . . . . . . . 356--380
Ah Chung Tsoi and
Markus Hagenbuchner and
Franco Scarselli Computing customized page ranks . . . . 381--414
Kai-Lung Hui and
Bernard C. Y. Tan and
Chyan-Yee Goh Online information disclosure:
Motivators and measurements . . . . . . 415--441
Bernard J. Jansen and
Tracy Mullen and
Amanda Spink and
Jan Pedersen Automated gathering of Web information:
an in-depth examination of agents
interacting with search engines . . . . 442--464
Minghua He and
Nicholas R. Jennings and
Adam Prügel-Bennett A heuristic bidding strategy for buying
multiple goods in multiple English
auctions . . . . . . . . . . . . . . . . 465--496
Jennifer Golbeck and
James Hendler Inferring binary trust relationships in
Web-based social networks . . . . . . . 497--529
Varghese S. Jacob and
Ramayya Krishnan and
Young U. Ryu Internet content filtering using
isotonic separation on content category
ratings . . . . . . . . . . . . . . . . 1:1--1:??
Stefano Ceri and
Florian Daniel and
Maristella Matera and
Federico M. Facca Model-driven development of
context-aware Web applications . . . . . 2:1--2:??
Xuhua Ding and
Daniele Mazzocchi and
Gene Tsudik Equipping smart devices with public key
signatures . . . . . . . . . . . . . . . 3:1--3:??
Debora Donato and
Luigi Laura and
Stefano Leonardi and
Stefano Millozzi The Web as a graph: How far we are . . . 4:1--4:??
Yun Huang and
Xianjun Geng and
Andrew B. Whinston Defeating DDoS attacks by fixing the
incentive chain . . . . . . . . . . . . 5:1--5:??
Tak-Lam Wong and
Wai Lam Adapting Web information extraction
knowledge via mining site-invariant and
site-dependent features . . . . . . . . 6:1--6:??
Daniel Villela and
Prashant Pradhan and
Dan Rubenstein Provisioning servers in the application
tier for e-commerce systems . . . . . . 7:1--7:??
Angelos D. Keromytis and
Jonathan M. Smith Requirements for scalable access control
and security management architectures 8:1--8:??
Ricardo Baeza-Yates and
Carlos Castillo and
Efthimis N. Efthimiadis Characterization of national Web domains 9:1--9:??
Andrei Arion and
Angela Bonifati and
Ioana Manolescu and
Andrea Pugliese XQueC: a query-conscious compressed XML
database . . . . . . . . . . . . . . . . 10:1--10:??
Jing Zhou and
Wendy Hall and
David C. De Roure and
Vijay K. Dialani Supporting ad-hoc resource sharing on
the Web: a peer-to-peer approach to
hypermedia link services . . . . . . . . 11:1--11:??
Esther David and
Alex Rogers and
Nicholas R. Jennings and
Jeremy Schiff and
Sarit Kraus and
Michael H. Rothkopf Optimal design of English auctions with
discrete bid levels . . . . . . . . . . 12:1--12:??
Amar Gupta and
Satwiksai Seshasai Guest editorial: The Internet and
outsourcing . . . . . . . . . . . . . . 13:1--13:??
Amar Gupta and
Satwik Seshasai 24-hour knowledge factory: Using
Internet technology to leverage spatial
and temporal separations . . . . . . . . 14:1--14:??
Rafiq Dossani and
Nathan Denny The Internet's role in offshored
services: a case study of India . . . . 15:1--15:??
Ravi Aron and
Siddarth Jayanty and
Praveen Pathak Impact of Internet-based distributed
monitoring systems on offshore sourcing
of services . . . . . . . . . . . . . . 16:1--16:??
Li Xiong and
Subramanyam Chitti and
Ling Liu Preserving data privacy in outsourcing
data aggregation services . . . . . . . 17:1--17:??
Sarabjot Singh Anand and
Bamshad Mobasher Introduction to intelligent techniques
for Web personalization . . . . . . . . 18:1--18:??
Wilfred Ng and
Lin Deng and
Dik Lun Lee Mining User preference using Spy voting
for search engine personalization . . . 19:1--19:??
Maurice Coyle and
Barry Smyth Supporting intelligent Web search . . . 20:1--20:??
Magdalini Eirinaki and
Michalis Vazirgiannis Web site personalization based on link
analysis and navigational patterns . . . 21:1--21:??
Sarabjot Singh Anand and
Patricia Kearney and
Mary Shapcott Generating semantically enriched user
profiles for Web personalization . . . . 22:1--22:??
Bamshad Mobasher and
Robin Burke and
Runa Bhaumik and
Chad Williams Toward trustworthy recommender systems:
an analysis of attack models and
algorithm robustness . . . . . . . . . . 23:1--23:??
Brahim Medjahed and
Athman Bouguettaya and
Boualem Benatallah Introduction to special issue on
semantic Web services . . . . . . . . . 1:1--1:??
Eran Toch and
Avigdor Gal and
Iris Reinhartz-Berger and
Dov Dori A semantic approach to approximate
service retrieval . . . . . . . . . . . 2:1--2:??
Marco Brambilla and
Stefano Ceri and
Federico Michele Facca and
Irene Celino and
Dario Cerizza and
Emanuele Della Valle Model-driven design and development of
semantic Web service applications . . . 3:1--3:??
Michael Mrissa and
Chirine Ghedira and
Djamal Benslimane and
Zakaria Maamar and
Florian Rosenberg and
Schahram Dustdar A context-based mediation approach to
compose semantic Web services . . . . . 4:1--4:??
Mohamed Shehab and
Kamal Bhattacharya and
Arif Ghafoor Web services discovery in secure
collaboration environments . . . . . . . 5:1--5:??
Qing Li and
Rynson W. H. Lau and
Timothy Shih and
Dennis McLeod Introduction to special issue Internet
technologies for distance education . . 1:1--1:??
Xuping Tu and
Hai Jin and
Xiaofei Liao and
Jiannong Cao Nearcast: a locality-aware P2P live
streaming approach for distance
education . . . . . . . . . . . . . . . 2:1--2:??
Peter Dolog and
Bernd Simon and
Wolfgang Nejdl and
Toma\vz Klobu\vcar Personalizing access to learning
networks . . . . . . . . . . . . . . . . 3:1--3:??
Paola Salomoni and
Silvia Mirri and
Stefano Ferretti and
Marco Roccetti A multimedia broker to support
accessible and mobile learning through
learning objects adaptation . . . . . . 4:1--4:??
Qing Li and
Rynson W. H. Lau and
Timothy K. Shih and
Frederick W. B. Li Technology supports for distributed and
collaborative learning over the Internet 5:1--5:??
Qusay H. Mahmoud and
Peter Langendoerfer Guest editorial: Service-oriented
computing . . . . . . . . . . . . . . . 11:1--11:??
Robert A. Van Engelen A framework for service-oriented
computing with C and C++ Web service
components . . . . . . . . . . . . . . . 12:1--12:??
Wil M. P. van der Aalst and
Marlon Dumas and
Chun Ouyang and
Anne Rozinat and
Eric Verbeek Conformance checking of service behavior 13:1--13:??
Jingwen Jin and
Klara Nahrstedt QoS-aware service management for
component-based distributed applications 14:1--14:??
Uwe Zdun Pattern-based design of a
service-oriented middleware for remote
object federations . . . . . . . . . . . 15:1--15:??
Amir Herzberg and
Ahmad Jbara Security and identification indicators
for browsers against spoofing and
phishing attacks . . . . . . . . . . . . 16:1--16:??
Manish Gupta and
Shamik Banerjee and
Manish Agrawal and
H. Raghav Rao Security analysis of Internet technology
components enabling globally distributed
workplaces --- a framework . . . . . . . 17:1--17:??
Jeannie Albrecht and
David Oppenheimer and
Amin Vahdat and
David A. Patterson Design and implementation trade-offs for
wide-area resource discovery . . . . . . 18:1--18:??
Antonio Brogi and
Sara Corfini and
Razvan Popescu Semantics-based composition-oriented
discovery of Web services . . . . . . . 19:1--19:??
Hai Zhuge and
Yunpeng Xing and
Peng Shi Resource space model, OWL and database:
Mapping and integration . . . . . . . . 20:1--20:??
Xiao-Bing Xue and
Zhi-Hua Zhou and
Zhongfei (Mark) Zhang Improving Web search using image
snippets . . . . . . . . . . . . . . . . 21:1--21:??
Bhuvan Urgaonkar and
Prashant Shenoy and
Timothy Roscoe Resource overbooking and application
profiling in a shared Internet hosting
platform . . . . . . . . . . . . . . . . 1:1--1:??
Sebastian Stein and
Terry R. Payne and
Nicholas R. Jennings Flexible provisioning of Web service
workflows . . . . . . . . . . . . . . . 2:1--2:??
Paul Groth and
Simon Miles and
Luc Moreau A model of process documentation to
determine provenance in mash-ups . . . . 3:1--3:??
Giancarlo Ruffo and
Rossano Schifanella A peer-to-peer recommender system based
on spontaneous affinities . . . . . . . 4:1--4:??
Scott Jordan Implications of Internet architecture on
net neutrality . . . . . . . . . . . . . 5:1--5:??
Toby Ehrenkranz and
Jun Li On the state of IP spoofing defense . . 6:1--6:??
Bettina Fazzinga and
Sergio Flesca and
Andrea Pugliese Retrieving XML data from heterogeneous
sources through vague querying . . . . . 7:1--7:??
Erol Gelenbe Analysis of single and networked
auctions . . . . . . . . . . . . . . . . 8:1--8:??
Xin Li and
Jun Yan and
Weiguo Fan and
Ning Liu and
Shuicheng Yan and
Zheng Chen An online blog reading system by topic
clustering and personalized ranking . . 9:1--9:??
Antonio M. Rinaldi An ontology-driven approach for semantic
information retrieval on the Web . . . . 10:1--10:??
Christian Platzer and
Florian Rosenberg and
Schahram Dustdar Web service clustering using
multidimensional angles as proximity
measures . . . . . . . . . . . . . . . . 11:1--11:??
Duanning Zhou and
Wayne Wei Huang Using a fuzzy classification approach to
assess e-commerce Web sites: an
empirical investigation . . . . . . . . 12:1--12:??
Joonho Kwon and
Praveen Rao and
Bongki Moon and
Sukho Lee Fast XML document filtering by
sequencing twig patterns . . . . . . . . 13:1--13:??
Dario Colazzo and
Carlo Sartiani Detection of corrupted schema mappings
in XML data integration systems . . . . 14:1--14:??
Alan Kenny and
Séamus Mcloone and
Tomás Ward Controlling entity state updates to
maintain remote consistency within a
distributed interactive application . . 15:1--15:??
Theoni Pitoura and
Peter Triantafillou Distribution fairness in Internet-scale
networks . . . . . . . . . . . . . . . . 16:1--16:??
David Michael Turner and
Vassilis Prevelakis and
Angelos D. Keromytis A market-based bandwidth charging
framework . . . . . . . . . . . . . . . 1:1--1:??
Somesh Jha and
Stefan Katzenbeisser and
Christian Schallhart and
Helmut Veith and
Stephen Chenney Semantic integrity in large-scale online
simulations . . . . . . . . . . . . . . 2:1--2:??
Tzu-Chi Huang and
Sherali Zeadally and
Naveen Chilamkurti and
Ce-Kuen Shieh A programmable network address
translator: Design, implementation, and
performance . . . . . . . . . . . . . . 3:1--3:??
Hweehwa Pang and
Jialie Shen and
Ramayya Krishnan Privacy-preserving similarity-based text
retrieval . . . . . . . . . . . . . . . 4:1--4:??
Teh-Chung Chen and
Scott Dick and
James Miller Detecting visually similar Web pages:
Application to phishing detection . . . 5:1--5:??
Chuan Yue and
Haining Wang BogusBiter: a transparent protection
against phishing attacks . . . . . . . . 6:1--6:??
Ponnurangam Kumaraguru and
Steve Sheng and
Alessandro Acquisti and
Lorrie Faith Cranor and
Jason Hong Teaching Johnny not to fall for phish 7:1--7:??
Ugur Kuter and
Jennifer Golbeck Using probabilistic confidence models
for trust inference in Web-based social
networks . . . . . . . . . . . . . . . . 8:1--8:??
Moheeb Abu Rajab and
Fabian Monrose and
Niels Provos Peeking Through the Cloud: Client
Density Estimation via DNS Cache Probing 9:1--9:??
Alberto Bartoli and
Giorgio Davanzo and
Eric Medvet A Framework for Large-Scale Detection of
Web Site Defacements . . . . . . . . . . 10:1--10:??
Ilya Gluhovsky Forecasting Click-Through Rates Based on
Sponsored Search Advertiser Bids and
Intermediate Variable Regression . . . . 11:1--11:??
Scott Jordan and
Arijit Ghosh A Framework for Classification of
Traffic Management Practices as
Reasonable or Unreasonable . . . . . . . 12:1--12:??
Haifeng Shen and
Chengzheng Sun Achieving Data Consistency by
Contextualization in Web-Based
Collaborative Applications . . . . . . . 13:1--13:??
Neil Hurley and
Mi Zhang Novelty and Diversity in Top-$N$
Recommendation --- Analysis and
Evaluation . . . . . . . . . . . . . . . 14:1--14:??
Mark Meiss and
Filippo Menczer and
Alessandro Vespignani Properties and Evolution of Internet
Traffic Networks from Anonymized Flow
Data . . . . . . . . . . . . . . . . . . 15:1--15:??
Adina Crainiceanu and
Prakash Linga and
Ashwin Machanavajjhala and
Johannes Gehrke and
Jayavel Shanmugasundaram Load Balancing and Range Queries in P2P
Systems Using P-Ring . . . . . . . . . . 16:1--16:??
Alexander Totok and
Vijay Karamcheti Exploiting Service Usage Information for
Optimizing Server Resource Management 1:1--1:??
Martin Arlitt and
Niklas Carlsson and
Phillipa Gill and
Aniket Mahanti and
Carey Williamson Characterizing Intelligence Gathering
and Control on an Edge Network . . . . . 2:1--2:??
Justin Zhan and
B. John Oommen and
Johanna Crisostomo Anomaly Detection in Dynamic Systems
Using Weak Estimators . . . . . . . . . 3:1--3:??
Pierre Genev\`es and
Nabil Laya\"\ida and
Vincent Quint Impact of XML Schema Evolution . . . . . 4:1--4:??
Christoph Goebel and
Dirk Neumann and
Ramayya Krishnan Comparing ingress and egress detection
to secure interdomain routing: An
experimental analysis . . . . . . . . . 5:1--5:??
Jeannie Albrecht and
Christopher Tuttle and
Ryan Braud and
Darren Dao and
Nikolay Topilski and
Alex C. Snoeren and
Amin Vahdat Distributed application configuration,
management, and visualization with plush 6:1--6:??
Ki-Woong Park and
Kyu Ho Park ACCENT: Cognitive cryptography plugged
compression for SSL/TLS-based cloud
computing services . . . . . . . . . . . 7:1--7:??
Amy Csizmar Dalal User-perceived quality assessment of
streaming media using reduced feature
sets . . . . . . . . . . . . . . . . . . 8:1--8:??
Quan Z. Sheng and
Schahram Dustdar Introduction to special issue on
context-aware Web services for the
future Internet . . . . . . . . . . . . 9:1--9:??
Dhaminda B. Abeywickrama and
Sita Ramakrishnan Context-aware services engineering:
Models, transformations, and
verification . . . . . . . . . . . . . . 10:1--10:??
Qinyuan Feng and
Ling Liu and
Yafei Dai Vulnerabilities and countermeasures in
context-aware social rating services . . 11:1--11:??
Takuya Maekawa and
Yutaka Yanagisawa and
Yasushi Sakurai and
Yasue Kishino and
Koji Kamei and
Takeshi Okadome Context-aware Web search in ubiquitous
sensor environments . . . . . . . . . . 12:1--12:??
Jing He and
Yanchun Zhang and
Guangyan Huang and
Jinli Cao A smart Web service based on the context
of things . . . . . . . . . . . . . . . 13:1--13:??
Wanita Sherchan and
Surya Nepal and
Athman Bouguettaya and
Shiping Chen Context-sensitive user interfaces for
semantic services . . . . . . . . . . . 14:1--14:??
Alex X. Liu Firewall policy change-impact analysis 15:1--15:??
Zhisheng Li and
Xiangye Xiao and
Meng Wang and
Chong Wang and
Xufa Wang and
Xing Xie Towards the taxonomy-oriented
categorization of yellow pages queries 16:1--16:??
Kenneth Wai-Ting Leung and
Dik Lun Lee and
Wilfred Ng and
Hing Yuet Fung A framework for personalizing web search
with concept-based user profiles . . . . 17:1--17:??
Italo Dacosta and
Saurabh Chakradeo and
Mustaque Ahamad and
Patrick Traynor One-time cookies: Preventing session
hijacking attacks with stateless
authentication tokens . . . . . . . . . 1:1--1:??
Marios D. Dikaiakos and
Asterios Katsifodimos and
George Pallis Minersoft: Software retrieval in grid
and cloud computing infrastructures . . 2:1--2:??
Deke Guo and
Yunhao Liu and
Hai Jin and
Zhong Liu and
Weiming Zhang and
Hui Liu Theory and network applications of
balanced Kautz tree structures . . . . . 3:1--3:??
Gareth Tyson and
Andreas Mauthe and
Sebastian Kaune and
Paul Grace and
Adel Taweel and
Thomas Plagemann Juno: a Middleware Platform for
Supporting Delivery-Centric Applications 4:1--4:??
Valentin Robu and
Lonneke Mous and
Han La Poutré Using Priced Options to Solve the
Exposure Problem in Sequential Auctions 5:1--5:??
Ziyang Liu and
Yi Chen Exploiting and Maintaining Materialized
Views for XML Keyword Queries . . . . . 6:1--6:??
Claudio A. Ardagna and
Sushil Jajodia and
Pierangela Samarati and
Angelos Stavrou Providing Users' Anonymity in Mobile
Hybrid Networks . . . . . . . . . . . . 7:1--7:??
Ilung Pranata and
Rukshan Athauda and
Geoff Skinner Modeling Decentralized Reputation-Based
Trust for Initial Transactions in
Digital Environments . . . . . . . . . . 8:1--8:??
Lihua Yuan and
Chao-Chih Chen and
Prasant Mohapatra and
Chen-Nee Chuah and
Krishna Kant A Proxy View of Quality of Domain Name
Service, Poisoning Attacks and Survival
Strategies . . . . . . . . . . . . . . . 9:1--9:??
Munindar P. Singh Vision for TOIT . . . . . . . . . . . . 10:1--10:??
Munindar P. Singh TOIT Administrative Updates . . . . . . 11:1--11:??
Meng Wang and
Guangda Li and
Zheng Lu and
Yue Gao and
Tat-Seng Chua When Amazon Meets Google: Product
Visualization by Exploring Multiple Web
Sources . . . . . . . . . . . . . . . . 12:1--12:??
Yu-Li Liang and
Xinyu Xing and
Hanqiang Cheng and
Jianxun Dang and
Sui Huang and
Richard Han and
Xue Liu and
Qin Lv and
Shivakant Mishra SafeVchat: a System for Obscene Content
Detection in Online Video Chat Services 13:1--13:??
Craig A. Shue and
Andrew J. Kalafut Resolvers Revealed: Characterizing DNS
Resolvers and their Clients . . . . . . 14:1--14:??
Xitong Li and
Stuart E. Madnick and
Hongwei Zhu A Context-Based Approach to Reconciling
Data Interpretation Conflicts in Web
Services Composition . . . . . . . . . . 1:1--1:??
San-Tsai Sun and
Eric Pospisil and
Ildar Muslukhov and
Nuray Dindar and
Kirstie Hawkey and
Konstantin Beznosov Investigating Users' Perspectives of Web
Single Sign-On: Conceptual Gaps and
Acceptance Model . . . . . . . . . . . . 2:1--2:??
Massimiliano Albanese and
Antonio d'Acierno and
Vincenzo Moscato and
Fabio Persia and
Antonio Picariello A Multimedia Recommender System . . . . 3:1--3:??
Hassan Sayyadi and
Louiqa Raschid A Graph Analytical Approach for Topic
Detection . . . . . . . . . . . . . . . 4:1--4:??
Kemal Bicakci and
Bruno Crispo and
Gabriele Oligeri LAKE: a Server-Side Authenticated
Key-Establishment with Low Computational
Workload . . . . . . . . . . . . . . . . 5:1--5:??
Scott Jordan and
Gwen Shaffer User and ISP Rights of Device Attachment
and Device Management . . . . . . . . . 6:1--6:??
Xiaowen Chu and
Xiaowei Chen and
Adele Lu Jia and
Johan A. Pouwelse and
Dick H. J. Epema Dissecting Darknets: Measurement and
Performance Analysis . . . . . . . . . . 7:1--7:??
Ghassan O. Karame and
Aurélien Francillon and
Victor Budilivschi and
Srdjan Capkun and
Vedran Capkun Microcomputations as Micropayments in
Web-based Services . . . . . . . . . . . 8:1--8:??
Jeremy Blackburn and
Nicolas Kourtellis and
John Skvoretz and
Matei Ripeanu and
Adriana Iamnitchi Cheating in Online Games: a Social
Network Perspective . . . . . . . . . . 9:1--9:??
Tian Guo and
Upendra Sharma and
Prashant Shenoy and
Timothy Wood and
Sambit Sahu Cost-Aware Cloud Bursting for Enterprise
Applications . . . . . . . . . . . . . . 10:1--10:??
Xiao Bai and
Rachid Guerraoui and
Anne-Marie Kermarrec Personalizing Top-$k$ Processing Online
in a Peer-to-Peer Social Tagging Network 11:1--11:??
Karim Benouaret and
Djamal Benslimane and
Allel Hadjali and
Mahmoud Barhamgi and
Zakaria Maamar and
Quan Z. Sheng Web Service Compositions with Fuzzy
Preferences: a Graded Dominance
Relationship-Based Approach . . . . . . 12:1--12:??
Pierre Genev\`es and
Nabil Laya\"\ida Equipping IDEs with XML-Path Reasoning
Capabilities . . . . . . . . . . . . . . 13:1--13:??
Alexander Artikis and
Avigdor Gal and
Vana Kalogeraki and
Matthias Weidlich Event Recognition Challenges and
Techniques: Guest Editors' Introduction 1:1--1:??
Souleiman Hasan and
Edward Curry Approximate Semantic Matching of Events
for the Internet of Things . . . . . . . 2:1--2:??
Cristian Molinaro and
Vincenzo Moscato and
Antonio Picariello and
Andrea Pugliese and
Antonino Rullo and
V. S. Subrahmanian PADUA: Parallel Architecture to Detect
Unexplained Activities . . . . . . . . . 3:1--3:??
Christopher Mutschler and
Michael Philippsen Adaptive Speculative Processing of
Out-of-Order Event Streams . . . . . . . 4:1--4:??
Gregory Aaron Wilkin and
Patrick Eugster and
K. R. Jayaram Decentralized Fault-Tolerant Event
Correlation . . . . . . . . . . . . . . 5:1--5:??
Beate Ottenwälder and
Boris Koldehofe and
Kurt Rothermel and
Kirak Hong and
David Lillethun and
Umakishore Ramachandran MCEP: a Mobility-Aware Complex Event
Processing System . . . . . . . . . . . 6:1--6:??
Boris Glavic and
Kyumars Sheykh Esmaili and
Peter M. Fischer and
Nesime Tatbul Efficient Stream Provenance via Operator
Instrumentation . . . . . . . . . . . . 7:1--7:??
Costas Courcoubetis and
Roch Guérin and
Patrick Loiseau and
David Parkes and
Jean Walrand and
Adam Wierman Special Issue on Pricing and Incentives
in Networks and Systems: Guest Editors'
Introduction . . . . . . . . . . . . . . 8:1--8:??
Zeinab Abbassi and
Nidhi Hegde and
Laurent Massoulié Distributed Content Curation on the Web 9:1--9:??
Pierre Coucheney and
Giuseppe D'acquisto and
Patrick Maillé and
Maurizio Naldi and
Bruno Tuffin Influence of Search Neutrality on the
Economics of Advertisement-Financed
Content . . . . . . . . . . . . . . . . 10:1--10:??
Eitan Altman and
Manjesh Kumar Hanawal and
Rajesh Sundaresan Regulation of Off-Network Pricing in a
Nonneutral Network . . . . . . . . . . . 11:1--11:??
Chi-Kin Chau and
Qian Wang and
Dah-Ming Chiu Economic Viability of Paris Metro
Pricing for Digital Services . . . . . . 12:1--12:??
Roch Guérin and
Jaudelice C. de Oliveira and
Steven Weber Adoption of Bundled Services with
Network Externalities and Correlated
Affinities . . . . . . . . . . . . . . . 13:1--13:??
Matthew Andrews and
Glenn Bruns and
Mustafa Dogru and
Hyoseop Lee Understanding Quota Dynamics in Wireless
Networks . . . . . . . . . . . . . . . . 14:1--14:??
Emir Kavurmacioglu and
Murat Alanyali and
David Starobinski Demand-Invariant Price Relationships and
Market Outcomes in Competitive Private
Commons . . . . . . . . . . . . . . . . 15:1--15:??
Martin Hoefer and
Thomas Kesselheim and
Berthold Vöcking Approximation Algorithms for Secondary
Spectrum Auctions . . . . . . . . . . . 16:1--16:??
Ioannis Caragiannis and
Christos Kaklamanis and
Panagiotis Kanellopoulos and
Maria Kyropoulou Revenue Guarantees in the Generalized
Second Price Auction . . . . . . . . . . 17:1--17:??
Josu Doncel and
Urtzi Ayesta and
Olivier Brun and
Balakrishna Prabhu Is the Price of Anarchy the Right
Measure for Load-Balancing Games? . . . 18:1--18:??
Aron Laszka and
Benjamin Johnson and
Pascal Schöttle and
Jens Grossklags and
Rainer Böhme Secure Team Composition to Thwart
Insider Threats and Cyber-Espionage . . 19:1--19:??
Zhen Ye and
Athman Bouguettaya and
Xiaofang Zhou Economic Model-Driven Cloud Service
Composition . . . . . . . . . . . . . . 20:1--20:??
Soudip Roy Chowdhury and
Florian Daniel and
Fabio Casati Recommendation and Weaving of Reusable
Mashup Model Patterns for Assisted
Development . . . . . . . . . . . . . . 21:1--21:??
Amit K. Chopra and
Raian Ali and
Maja Vukovic Introduction to the Special Issue on
Foundations of Social Computing . . . . 22:1--22:??
Matteo Baldoni and
Cristina Baroglio and
Federico Capuzzimati A Commitment-Based Infrastructure for
Programming Socio-Technical Systems . . 23:1--23:??
Flavio Figueiredo and
Jussara M. Almeida and
Marcos André Gonçalves and
Fabrício Benevenuto On the Dynamics of Social Media
Popularity: a YouTube Case Study . . . . 24:1--24:??
Thomas Lukasiewicz and
Maria Vanina Martinez and
Gerardo I. Simari and
Oana Tifrea-Marciuska Ontology-Based Query Answering with
Group Preferences . . . . . . . . . . . 25:1--25:??
Thiago H. Silva and
Pedro O. S. Vaz de Melo and
Jussara M. Almeida and
Juliana Salles and
Antonio A. F. Loureiro Revealing the City That We Cannot See 26:1--26:??
Jan Vosecky and
Di Jiang and
Kenneth Wai-Ting Leung and
Kai Xing and
Wilfred Ng Integrating Social and Auxiliary
Semantics for Multifaceted Topic
Modeling in Twitter . . . . . . . . . . 27:1--27:??
Dingqi Yang and
Daqing Zhang and
Zhiyong Yu and
Zhiwen Yu and
Djamal Zeghlache SESAME: Mining User Digital Footprints
for Fine-Grained Preference-Aware Social
Media Search . . . . . . . . . . . . . . 28:1--28:??
Nicolas Kourtellis and
Jeremy Blackburn and
Cristian Borcea and
Adriana Iamnitchi Special Issue on Foundations of Social
Computing: Enabling Social Applications
via Decentralized Social Data Management 1:1--1:??
Alissa Cooper and
Ian Brown Net Neutrality: Discrimination,
Competition, and Innovation in the UK
and US . . . . . . . . . . . . . . . . . 2:1--2:??
Pranav Dandekar and
Ashish Goel and
Michael P. Wellman and
Bryce Wiedenbeck Strategic Formation of Credit Networks 3:1--3:??
David R. Bild and
Yue Liu and
Robert P. Dick and
Z. Morley Mao and
Dan S. Wallach Aggregate Characterization of User
Behavior in Twitter and Analysis of the
Retweet Graph . . . . . . . . . . . . . 4:1--4:??
H. M. N. Dilum Bandara and
Anura P. Jayasumana P2P-Based, Multi-Attribute Resource
Discovery under Real-World Resources and
Queries . . . . . . . . . . . . . . . . 5:1--5:??
Surya Nepal and
Cecile Paris and
Payam Aghaei Pour and
Jill Freyne and
Sanat Kumar Bista Interaction-Based Recommendations for
Online Communities . . . . . . . . . . . 6:1--6:??
Amal Alhosban and
Khayyam Hashmi and
Zaki Malik and
Brahim Medjahed and
Salima Benbernou Bottom-Up Fault Management in
Service-Based Systems . . . . . . . . . 7:1--7:??
Wei Dai and
Scott Jordan The Effect of Data Caps upon ISP Service
Tier Design and Users . . . . . . . . . 8:1--8:??
Yi Zhuang and
Nan Jiang and
Qing Li and
Lei Chen and
Chunhua Ju Progressive Batch Medical Image
Retrieval Processing in Mobile Wireless
Networks . . . . . . . . . . . . . . . . 9:1--9:??
Rostyslav Zabolotnyi and
Philipp Leitner and
Waldemar Hummer and
Schahram Dustdar JCloudScale: Closing the Gap Between
IaaS and PaaS . . . . . . . . . . . . . 10:1--10:??
Anonymous P-DONAS: a P2P-Based Domain Name System
in Access Networks . . . . . . . . . . . 11:1--11:??
Timothy J. Norman and
Suzanne Barber and
Rino Falcone and
Jie Zhang Introduction to Theme Section on Trust
in Social Networks and Systems . . . . . 12:1--12:??
Rino Falcone and
Alessandro Sapienza and
Cristiano Castelfranchi The Relevance of Categories for Trusting
Information Sources . . . . . . . . . . 13:1--13:??
Wenjun Jiang and
Jie Wu and
Guojun Wang On Selecting Recommenders for Trust
Evaluation in Online Social Networks . . 14:1--14:??
Santiago Pina Ros and
Ángel Pina Canelles and
Manuel Gil Pérez and
Félix Gómez Mármol and
Gregorio Martínez Pérez Chasing Offensive Conduct in Social
Networks: a Reputation-Based Practical
Approach for Frisber . . . . . . . . . . 15:1--15:??
Alistair G. Sutcliffe and
Di Wang and
Robin I. M. Dunbar Modelling the Role of Trust in Social
Relationships . . . . . . . . . . . . . 16:1--16:??
Djamal Benslimane and
Quan Z. Sheng and
Mahmoud Barhamgi and
Henri Prade The Uncertain Web: Concepts, Challenges,
and Current Solutions . . . . . . . . . 1:1--1:??
Peng Zhang and
Jing He and
Guodong Long and
Guangyan Huang and
Chengqi Zhang Towards Anomalous Diffusion Sources
Detection in a Large Network . . . . . . 2:1--2:??
Asma Abboura and
Soror Sahri and
Latifa Baba-Hamed and
Mourad Ouziri and
Salima Benbernou Quality-Based Online Data Reconciliation 3:1--3:??
Jiangang Ma and
Le Sun and
Hua Wang and
Yanchun Zhang and
Uwe Aickelin Supervised Anomaly Detection in
Uncertain Pseudoperiodic Data Streams 4:1--4:??
Abdallah Makhoul and
Christophe Guyeux and
Mourad Hakem and
Jacques M. Bahi Using an Epidemiological Approach to
Maximize Data Survival in the Internet
of Things . . . . . . . . . . . . . . . 5:1--5:??
Kenneth Wai-Ting Leung and
Di Jiang and
Dik Lun Lee and
Wilfred Ng Constructing Maintainable Semantic
Relation Network from Ambiguous Concepts
in Web Content . . . . . . . . . . . . . 6:1--6:??
Zaki Malik and
Brahim Medjahed and
Abdelmounaam Rezgui sCARE: Reputation Estimation for
Uncertain Web Services . . . . . . . . . 7:1--7:??
In-Young Ko and
Han-Gyu Ko and
Angel Jimenez Molina and
Jung-Hyun Kwon SoIoT: Toward A User-Centric IoT-Based
Service Framework . . . . . . . . . . . 8:1--8:??
Lina Yao and
Quan Z. Sheng and
Anne H. H. Ngu and
Xue Li Things of Interest Recommendation by
Leveraging Heterogeneous Relations in
the Internet of Things . . . . . . . . . 9:1--9:??
Marco Lippi and
Paolo Torroni Argumentation Mining: State of the Art
and Emerging Trends . . . . . . . . . . 10:1--10:??
Michael Vögler and
Johannes M. Schleicher and
Christian Inzinger and
Schahram Dustdar A Scalable Framework for Provisioning
Large-Scale IoT Deployments . . . . . . 11:1--11:??
Lidong Bing and
Tak-Lam Wong and
Wai Lam Unsupervised Extraction of Popular
Product Attributes from E-Commerce Web
Sites by Considering Customer Reviews 12:1--12:??
Alba Amato and
Salvatore Venticinque Multiobjective Optimization for
Brokering of Multicloud Service
Composition . . . . . . . . . . . . . . 13:1--13:??
Costas Courcoubetis and
Laszlo Gyarmati and
Nikolaos Laoutaris and
Pablo Rodriguez and
Kostas Sdrolias Negotiating Premium Peering Prices: a
Quantitative Model with Applications . . 14:1--14:??
Philipp Leitner and
Jürgen Cito Patterns in the Chaos --- A Study of
Performance Variation and Predictability
in Public IaaS Clouds . . . . . . . . . 15:1--15:??
Tien-Dung Cao and
Tran-Vu Pham and
Quang-Hieu Vu and
Hong-Linh Truong and
Duc-Hung Le and
Schahram Dustdar MARSA: a Marketplace for Realtime Human
Sensing Data . . . . . . . . . . . . . . 16:1--16:??
Carlos Rodríguez and
Florian Daniel and
Fabio Casati Mining and Quality Assessment of Mashup
Model Patterns with the Crowd: a
Feasibility Study . . . . . . . . . . . 17:1--17:??
Georgiana Copil and
Daniel Moldovan and
Hong-Linh Truong and
Schahram Dustdar rSYBL: a Framework for Specifying and
Controlling Cloud Services Elasticity 18:1--18:??
Delia Irazú Hernández Farías and
Viviana Patti and
Paolo Rosso Irony Detection in Twitter: The Role of
Affective Content . . . . . . . . . . . 19:1--19:??
Gianni Costa and
Riccardo Ortale Model-Based Collaborative Personalized
Recommendation on Signed Social Rating
Networks . . . . . . . . . . . . . . . . 20:1--20:??
Rui Zhang and
Rui Xue and
Ting Yu and
Ling Liu Dynamic and Efficient Private Keyword
Search over Inverted Index-Based
Encrypted Data . . . . . . . . . . . . . 21:1--21:??
Elisa Bertino and
Kim-Kwang Raymond Choo and
Dimitrios Georgakopolous and
Surya Nepal Internet of Things (IoT): Smart and
Secure Service Delivery . . . . . . . . 22:1--22:??
Li Duan and
Dongxi Liu and
Yang Zhang and
Shiping Chen and
Ren Ping Liu and
Bo Cheng and
Junliang Chen Secure Data-Centric Access Control for
Smart Grid Services Based on
Publish/Subscribe Systems . . . . . . . 23:1--23:??
Yuexin Zhang and
Yang Xiang and
Xinyi Huang Password-Authenticated Group Key
Exchange: a Cross-Layer Design . . . . . 24:1--24:??
Neetesh Saxena and
Santiago Grijalva and
Narendra S. Chaudhari Authentication Protocol for an
IoT-Enabled LTE Network . . . . . . . . 25:1--25:??
Shachar Siboni and
Asaf Shabtai and
Nils O. Tippenhauer and
Jemin Lee and
Yuval Elovici Advanced Security Testbed Framework for
Wearable IoT Devices . . . . . . . . . . 26:1--26:??
Ahmed Saeed and
Ali Ahmadinia and
Abbas Javed and
Hadi Larijani Intelligent Intrusion Detection in
Low-Power IoTs . . . . . . . . . . . . . 27:1--27:??
Ngoc Do and
Ye Zhao and
Cheng-Hsin Hsu and
Nalini Venkatasubramanian Crowdsourced Mobile Data Transfer with
Delay Bound . . . . . . . . . . . . . . 28:1--28:??
Aveek K. Das and
Parth H. Pathak and
Chen-Nee Chuah and
Prasant Mohapatra Characterization of Wireless Multidevice
Users . . . . . . . . . . . . . . . . . 29:1--29:??
Chloé Clavel and
Rossana Damiano and
Viviana Patti and
Paolo Rosso Affect and Interaction in Agent-Based
Systems and Social Media: Guest Editors'
Introduction . . . . . . . . . . . . . . 1:1--1:??
Beste F. Yuksel and
Penny Collisson and
Mary Czerwinski Brains or Beauty: How to Engender Trust
in User-Agent Interactions . . . . . . . 2:1--2:??
Maurizio Mancini and
Beatrice Biancardi and
Florian Pecune and
Giovanna Varni and
Yu Ding and
Catherine Pelachaud and
Gualtiero Volpe and
Antonio Camurri Implementing and Evaluating a Laughing
Virtual Character . . . . . . . . . . . 3:1--3:??
Mehdi Dastani and
Alexander Pankov Other-Condemning Moral Emotions: Anger,
Contempt and Disgust . . . . . . . . . . 4:1--4:??
Bexy Alfonso and
Emilio Vivancos and
Vicente Botti Toward Formal Modeling of Affective
Agents in a BDI Architecture . . . . . . 5:1--5:??
Jahna Otterbacher and
Chee Siang Ang and
Marina Litvak and
David Atkins Show Me You Care: Trait Empathy,
Linguistic Style, and Mimicry on
Facebook . . . . . . . . . . . . . . . . 6:1--6:??
Rosa Meo and
Emilio Sulis Processing Affect in Social Media: a
Comparison of Methods to Distinguish
Emotions in Tweets . . . . . . . . . . . 7:1--7:??
Pasquale De Meo and
Katarzyna Musial-Gabrys and
Domenico Rosaci and
Giuseppe M. L. Sarn\`e and
Lora Aroyo Using Centrality Measures to Predict
Helpfulness-Based Reputation in Trust
Networks . . . . . . . . . . . . . . . . 8:1--8:??
Ruchdee Binmad and
Mingchu Li Improving the Efficiency of an Online
Marketplace by Incorporating Forgiveness
Mechanism . . . . . . . . . . . . . . . 9:1--9:??
George Drosatos and
Aimilia Tasidou and
Pavlos S. Efraimidis Privacy-Enhanced Television Audience
Measurements . . . . . . . . . . . . . . 10:1--10:??
Amit K. Chopra and
Erez Shmueli and
Vivek K. Singh Introduction to the Special Issue on
Advances in Social Computing . . . . . . 11:1--11:??
Sara Rosenthal and
Kathleen Mckeown Detecting Influencers in Multiple Online
Genres . . . . . . . . . . . . . . . . . 12:1--12:??
Christos Perentis and
Michele Vescovi and
Chiara Leonardi and
Corrado Moiso and
Mirco Musolesi and
Fabio Pianesi and
Bruno Lepri Anonymous or Not? Understanding the
Factors Affecting Personal Mobile Data
Disclosure . . . . . . . . . . . . . . . 13:1--13:??
Jorge Goncalves and
Simo Hosio and
Vassilis Kostakos Eliciting Structured Knowledge from
Situated Crowd Markets . . . . . . . . . 14:1--14:??
Atanu Roy and
Ayush Singhal and
Jaideep Srivastava Formation and Reciprocation of Dyadic
Trust . . . . . . . . . . . . . . . . . 15:1--15:??
Yefeng Ruan and
Ping Zhang and
Lina Alfantoukh and
Arjan Durresi Measurement Theory-Based Trust
Management Framework for Online Social
Communities . . . . . . . . . . . . . . 16:1--16:??
Christian Von Der Weth and
Ashraf M. Abdul and
Mohan Kankanhalli Cyber-Physical Social Networks . . . . . 17:1--17:??
Nasser Alsaedi and
Pete Burnap and
Omer Rana Can We Predict a Riot? Disruptive Event
Detection Using Twitter . . . . . . . . 18:1--18:??
Zhenguo Yang and
Qing Li and
Zheng Lu and
Yun Ma and
Zhiguo Gong and
Wenyin Liu Dual Structure Constrained Multimodal
Feature Coding for Social Event
Detection from Flickr Data . . . . . . . 19:1--19:??
Michal Ciesielczyk and
Andrzej Szwabe and
Mikolaj Morzy and
Pawel Misiorek Progressive Random Indexing:
Dimensionality Reduction Preserving
Local Network Dependencies . . . . . . . 20:1--20:??
Benjamin Billet and
Valérie Issarny Spinel: an Opportunistic Proxy for
Connecting Sensors to the Internet of
Things . . . . . . . . . . . . . . . . . 21:1--21:??
Xumin Liu and
Weishi Shi and
Arpeet Kale and
Chen Ding and
Qi Yu Statistical Learning of Domain-Specific
Quality-of-Service Features from User
Reviews . . . . . . . . . . . . . . . . 22:1--22:??
Iryna Gurevych and
Marco Lippi and
Paolo Torroni Argumentation in Social Media . . . . . 23:1--23:??
John Lawrence and
Mark Snaith and
Barbara Konat and
Katarzyna Budzynska and
Chris Reed Debating Technology for Dialogical
Argument: Sensemaking, Engagement, and
Analytics . . . . . . . . . . . . . . . 24:1--24:??
John Lawrence and
Joonsuk Park and
Katarzyna Budzynska and
Claire Cardie and
Barbara Konat and
Chris Reed Using Argumentative Structure to
Interpret Debates in Online Deliberative
Democracy and eRulemaking . . . . . . . 25:1--25:??
Saif M. Mohammad and
Parinaz Sobhani and
Svetlana Kiritchenko Stance and Sentiment in Tweets . . . . . 26:1--26:??
Nadin Kökciyan and
Nefise Yaglikci and
Pinar Yolum An Argumentation Approach for Resolving
Privacy Disputes in Online Social
Networks . . . . . . . . . . . . . . . . 27:1--27:??
Henning Wachsmuth and
Benno Stein A Universal Model for Discourse-Level
Argumentation Analysis . . . . . . . . . 28:1--28:??
Edmond Awad and
Jean-François Bonnefon and
Martin Caminada and
Thomas W. Malone and
Iyad Rahwan Experimental Assessment of Aggregation
Principles in Argumentation-Enabled
Collective Intelligence . . . . . . . . 29:1--29:??
Lucas Carstens and
Francesca Toni Using Argumentation to Improve
Classification in Natural Language
Problems . . . . . . . . . . . . . . . . 30:1--30:??
Yan Hu and
Weisong Shi and
Hong Li and
Xiaohui Hu Mitigating Data Sparsity Using
Similarity Reinforcement-Enhanced
Collaborative Filtering . . . . . . . . 31:1--31:??
Ero Balsa and
Cristina Pérez-Sol\`a and
Claudia Diaz Towards Inferring Communication Patterns
in Online Social Networks . . . . . . . 32:1--32:??
Adriane Chapman and
James Cheney and
Simon Miles Guest Editorial: The Provenance of
Online Data . . . . . . . . . . . . . . 33:1--33:??
Adam Bates and
Dave (Jing) Tian and
Grant Hernandez and
Thomas Moyer and
Kevin R. B. Butler and
Trent Jaeger Taming the Costs of Trustworthy
Provenance through Policy Reduction . . 34:1--34:??
Luc Moreau A Canonical Form for PROV Documents and
Its Application to Equality, Signature,
and Validation . . . . . . . . . . . . . 35:1--35:??
Vitor C. Neves and
Daniel De Oliveira and
Kary A. C. S. Ocaña and
Vanessa Braganholo and
Leonardo Murta Managing Provenance of Implicit Data
Flows in Scientific Experiments . . . . 36:1--36:??
Manolis Stamatogiannakis and
Elias Athanasopoulos and
Herbert Bos and
Paul Groth PROV$_{2R}$: Practical Provenance
Analysis of Unstructured Processes . . . 37:1--37:??
Steven Weber Facilitating Adoption of Internet
Technologies and Services with
Externalities via Cost Subsidization . . 38:1--38:??
José Luis García-Dorado Bandwidth Measurements within the Cloud:
Characterizing Regular Behaviors and
Correlating Downtimes . . . . . . . . . 39:1--39:??
Jianhua Shao and
Hoang Ong Exploiting Contextual Information in
Attacking Set-Generalized Transactions 40:1--40:??
Ernesto Damiani and
Ryszard Kowalczyk and
Gerard Parr Extending the Outreach: From Smart
Cities to Connected Communities . . . . 1:1--1:??
Haibo Zhang and
Luming Wan and
Yawen Chen and
Laurence T. Yang and
Lizhi Peng Adaptive Message Routing and Replication
in Mobile Opportunistic Networks for
Connected Communities . . . . . . . . . 2:1--2:??
Taehun Kim and
Junsung Lim and
Heesuk Son and
Byoungheon Shin and
Dongman Lee and
Soon J. Hyun A Multi-Dimensional Smart Community
Discovery Scheme for IoT-Enriched Smart
Homes . . . . . . . . . . . . . . . . . 3:1--3:??
Catia Prandi and
Silvia Mirri and
Stefano Ferretti and
Paola Salomoni On the Need of Trustworthy Sensing and
Crowdsourcing for Urban Accessibility in
Smart City . . . . . . . . . . . . . . . 4:1--4:??
Antonella Longo and
Marco Zappatore and
Mario Bochicchio and
Shamkant B. Navathe Crowd-Sourced Data Collection for Urban
Monitoring via Mobile Sensors . . . . . 5:1--5:??
Moreno Ambrosin and
Paolo Braca and
Mauro Conti and
Riccardo Lazzeretti ODIN: Obfuscation-Based
Privacy-Preserving Consensus Algorithm
for Decentralized Information Fusion in
Smart Device Networks . . . . . . . . . 6:1--6:??
Emanuele Bellini and
Paolo Ceravolo and
Paolo Nesi Quantify Resilience Enhancement of UTS
through Exploiting Connected Community
and Internet of Everything Emerging
Technologies . . . . . . . . . . . . . . 7:1--7:??
M. Mazhar Rathore and
Anand Paul and
Awais Ahmad and
Marco Anisetti and
Gwanggil Jeon Hadoop-Based Intelligent Care System
(HICS): Analytical Approach for Big Data
in IoT . . . . . . . . . . . . . . . . . 8:1--8:??
Di Wang and
Ahmad Al-Rubaie and
Sandra Stinci\'c Clarke and
John Davies Real-Time Traffic Event Detection From
Social Media . . . . . . . . . . . . . . 9:1--9:??
Hiroshi Fujikawa and
Hirofumi Yamaki and
Setsuo Tsuruta Seamless Virtual Network for
International Business Continuity in
Presence of Intentional Blocks . . . . . 10:1--10:??
Claudia López and
Rosta Farzan and
Yu-Ru Lin Behind the Myths of Citizen
Participation: Identifying
Sustainability Factors of Hyper-Local
Information Systems . . . . . . . . . . 11:1--11:??
Munindar P. Singh TOIT Reviewers over 2015 and 2016 . . . 12:1--12:??
Özgür Kafali and
Natalia Criado and
Martin Rehak and
Jose M. Such and
Pinar Yolum Guest Editors' Introduction . . . . . . 26:1--26:??
Igor Saenko and
Igor Kotenko Genetic Algorithms for Solving Problems
of Access Control Design and
Reconfiguration in Computer Networks . . 27:1--27:??
Michal Stolba and
Jan Tozicka and
Antonín Komenda Quantifying Privacy Leakage in
Multi-Agent Planning . . . . . . . . . . 28:1--28:??
Daniele Codetta-Raiteri and
Luigi Portinale Decision Networks for Security Risk
Assessment of Critical Infrastructures 29:1--29:??
Sushil Jajodia and
Noseong Park and
Edoardo Serra and
V. S. Subrahmanian SHARE: a Stackelberg Honey-Based
Adversarial Reasoning Engine . . . . . . 30:1--30:??
Julian A. Padget and
Wamberto W. Vasconcelos Fine-Grained Access Control via
Policy-Carrying Data . . . . . . . . . . 31:1--31:??
Lina Yao and
Quan Z. Sheng and
Xianzhi Wang and
Wei Emma Zhang and
Yongrui Qin Collaborative Location Recommendation by
Integrating Multi-dimensional Contextual
Information . . . . . . . . . . . . . . 32:1--32:??
Haiying Shen and
Harrison Chandler and
Haoyu Wang Toward Efficient Short-Video Sharing in
the YouTube Social Network . . . . . . . 33:1--33:??
Zhen Xu and
James Miller Cross-Browser Differences Detection
Based on an Empirical Metric for Web
Page Visual Similarity . . . . . . . . . 34:1--34:??
Wei Emma Zhang and
Quan Z. Sheng and
Lina Yao and
Kerry Taylor and
Ali Shemshadi and
Yongrui Qin A Learning-Based Framework for Improving
Querying on Web Interfaces of Curated
Knowledge Bases . . . . . . . . . . . . 35:1--35:??
Sebastian Zander and
Xuequn Wang Are We There Yet? IPv6 in Australia and
China . . . . . . . . . . . . . . . . . 36:1--36:??
Wei Emma Zhang and
Quan Z. Sheng and
Jey Han Lau and
Ermyas Abebe and
Wenjie Ruan Duplicate Detection in Programming
Question Answering Communities . . . . . 37:1--37:??
Tian Guo and
Prashant Shenoy Providing Geo-Elasticity in
Geographically Distributed Clouds . . . 38:1--38:??
Yonghong Guo and
Lu Liu and
Yan Wu and
James Hardy Interest-Aware Content Discovery in
Peer-to-Peer Social Networks . . . . . . 39:1--39:??
Tao Xie and
Andre van Hoorn and
Huaimin Wang and
Ingo Weber Introduction to the Special Issue on
Emerging Software Technologies for
Internet-Based Systems: Internetware and
DevOps . . . . . . . . . . . . . . . . . 13:1--13:??
Xuanzhe Liu and
Meihua Yu and
Yun Ma and
Gang Huang and
Hong Mei and
Yunxin Liu i-Jacob: an Internetware-Oriented
Approach to Optimizing
Computation-Intensive Mobile Web
Browsing . . . . . . . . . . . . . . . . 14:1--14:??
Xue Ouyang and
Peter Garraghan and
Bernhard Primas and
David Mckee and
Paul Townend and
Jie Xu Adaptive Speculation for Efficient
Internetware Application Execution in
Clouds . . . . . . . . . . . . . . . . . 15:1--15:??
Nicolas Ferry and
Franck Chauvel and
Hui Song and
Alessandro Rossini and
Maksym Lushpenko and
Arnor Solberg CloudMF: Model-Driven Management of
Multi-Cloud Applications . . . . . . . . 16:1--16:??
Claus Pahl and
Pooyan Jamshidi and
Olaf Zimmermann Architectural Principles for Cloud
Software . . . . . . . . . . . . . . . . 17:1--17:??
He Jiang and
Xin Chen and
Tieke He and
Zhenyu Chen and
Xiaochen Li Fuzzy Clustering of Crowdsourced Test
Reports for Apps . . . . . . . . . . . . 18:1--18:??
Xin Peng and
Jingxiao Gu and
Tian Huat Tan and
Jun Sun and
Yijun Yu and
Bashar Nuseibeh and
Wenyun Zhao CrowdService: Optimizing Mobile
Crowdsourcing and Service Composition 19:1--19:??
Wenhua Yang and
Chang Xu and
Minxue Pan and
Xiaoxing Ma and
Jian Lu Improving Verification Accuracy of CPS
by Modeling and Calibrating Interaction
Uncertainty . . . . . . . . . . . . . . 20:1--20:??
Felix Willnecker and
Helmut Krcmar Multi-Objective Optimization of
Deployment Topologies for Distributed
Applications . . . . . . . . . . . . . . 21:1--21:??
Santiago Gómez Sáez and
Vasilios Andrikopoulos and
Marina Bitsaki and
Frank Leymann and
André van Hoorn Utility-Based Decision Making for
Migrating Cloud-Based Applications . . . 22:1--22:??
Bowen Zhou and
Amir Vahid Dastjerdi and
Rodrigo N. Calheiros and
Rajkumar Buyya An Online Algorithm for Task Offloading
in Heterogeneous Mobile Clouds . . . . . 23:1--23:??
Balaji Palanisamy and
Ling Liu and
Yang Zhou and
Qingyang Wang Privacy-Preserving Publishing of
Multilevel Utility-Controlled Graph
Datasets . . . . . . . . . . . . . . . . 24:1--24:??
Fabrizio Angiulli and
Luciano Argento and
Angelo Furfaro Exploiting Content Spatial Distribution
to Improve Detection of Intrusions . . . 25:1--25:??
Cristina Baroglio and
Olivier Boissier and
Axel Polleres Special Issue: Computational Ethics and
Accountability . . . . . . . . . . . . . 40:1--40:??
Alex Kayal and
Willem-Paul Brinkman and
Mark A. Neerincx and
M. Birna Van Riemsdijk Automatic Resolution of Normative
Conflicts in Supportive Technology Based
on User Values . . . . . . . . . . . . . 41:1--41:??
Dilara Kekulluoglu and
Nadin Kokciyan and
Pinar Yolum Preserving Privacy as Social
Responsibility in Online Social Networks 42:1--42:??
Ilse Verdiesen and
Virginia Dignum and
Jeroen Van Den Hoven Measuring Moral Acceptability in
E-deliberation: a Practical Application
of Ethics by Participation . . . . . . . 43:1--43:??
Leila Bahri and
Barbara Carminati and
Elena Ferrari and
Andrea Bianco Enhanced Audit Strategies for
Collaborative and Accountable Data
Sharing in Social Networks . . . . . . . 44:1--44:??
Vasiliki Gkatziaki and
Symeon Papadopoulos and
Richard Mills and
Sotiris Diplaris and
Ioannis Tsampoulatidis and
Ioannis Kompatsiaris easIE: Easy-to-Use Information
Extraction for Constructing CSR
Databases From the Web . . . . . . . . . 45:1--45:??
Marco Gavanelli and
Marco Alberti and
Evelina Lamma Accountable Protocols in Abductive Logic
Programming . . . . . . . . . . . . . . 46:1--46:??
Rainer Böhme and
Richard Clayton and
Jens Grossklags and
Katrina Ligett and
Patrick Loiseau and
Galina Schwartz Special Issue on the Economics of
Security and Privacy: Guest Editors'
Introduction . . . . . . . . . . . . . . 47:1--47:??
Aron Laszka and
Benjamin Johnson and
Jens Grossklags On the Assessment of Systematic Risk in
Networked Systems . . . . . . . . . . . 48:1--48:??
Samaneh Tajalizadehkhoob and
Rainer Böhme and
Carlos Gañán and
Maciej Korczy\'nski and
Michel Van Eeten Rotten Apples or Bad Harvest? What We
Are Measuring When We Are Measuring
Abuse . . . . . . . . . . . . . . . . . 49:1--49:??
Tyler Moore and
Nicolas Christin and
Janos Szurdi Revisiting the Risks of Bitcoin Currency
Exchange Closure . . . . . . . . . . . . 50:1--50:??
Jagdish Prasad Achara and
Javier Parra-Arnau and
Claude Castelluccia Fine-Grained Control over Tracking to
Support the Ad-Based Web Economy . . . . 51:1--51:??
Reuben Binns and
Jun Zhao and
Max Van Kleek and
Nigel Shadbolt Measuring Third-party Tracker Power
across Web and Mobile . . . . . . . . . 52:1--52:??
Razieh Nokhbeh Zaeem and
Rachel L. German and
K. Suzanne Barber PrivacyCheck: Automatic Summarization of
Privacy Policies Using Data Mining . . . 53:1--53:??
James T. Graves and
Alessandro Acquisti and
Nicolas Christin Should Credit Card Issuers Reissue Cards
in Response to a Data Breach?:
Uncertainty and Transparency in Metrics
for Data Security Policymaking . . . . . 54:1--54:??
Mohsen Rezvani and
Aleksandar Ignjatovic and
Elisa Bertino A Provenance-Aware Multi-dimensional
Reputation System for Online Rating
Systems . . . . . . . . . . . . . . . . 55:1--55:??
Zhi Yang and
Wei Chen A Game Theoretic Model for the Formation
of Navigable Small-World Networks-The
Tradeoff between Distance and
Reciprocity . . . . . . . . . . . . . . 56:1--56:??
Munindar P. Singh TOIT Reviewers over 2017 . . . . . . . . 57:1--57:??
Zhiwen Yu and
Fei Yi and
Chao Ma and
Zhu Wang and
Bin Guo and
Liming Chen Fine-grained Emotion Role Detection
Based on Retweet Information . . . . . . 1:1--1:??
Timothy K. Shih and
W. K. T. M. Gunarathne and
Ankhtuya Ochirbat and
Huang-Ming Su Grouping Peers Based on Complementary
Degree and Social Relationship using
Genetic Algorithm . . . . . . . . . . . 2:1--2:??
Oscar Novo Making Constrained Things Reachable: a
Secure IP-Agnostic NAT Traversal
Approach for IoT . . . . . . . . . . . . 3:1--3:??
Ali Ouni and
Hanzhang Wang and
Marouane Kessentini and
Salah Bouktif and
Katsuro Inoue A Hybrid Approach for Improving the
Design Quality of Web Service Interfaces 4:1--4:??
Azadeh Ghari Neiat and
Athman Bouguettaya and
Sajib Mistry Incentive-Based Crowdsourcing of Hotspot
Services . . . . . . . . . . . . . . . . 5:1--5:??
Samir Tata and
Quan Z. Sheng and
Eleni Stroulia Guest Editors' Introduction for Special
Issue on Service Management for the
Internet of Things . . . . . . . . . . . 6:1--6:??
Amir Taherkordi and
Frank Eliassen and
Michael Mcdonald and
Geir Horn Context-Driven and Real-Time
Provisioning of Data-Centric IoT
Services in the Cloud . . . . . . . . . 7:1--7:??
Emna Mezghani and
Ernesto Exposito and
Khalil Drira An Autonomic Cognitive Pattern for Smart
IoT-Based System Manageability:
Application to Comorbidity Management 8:1--8:??
Redowan Mahmud and
Kotagiri Ramamohanarao and
Rajkumar Buyya Latency-Aware Application Module
Management for Fog Computing
Environments . . . . . . . . . . . . . . 9:1--9:??
Andreas Konstantinidis and
Panagiotis Irakleous and
Zacharias Georgiou and
Demetrios Zeinalipour-Yazti and
Panos K. Chrysanthis IoT Data Prefetching in Indoor
Navigation SOAs . . . . . . . . . . . . 10:1--10:??
Aditya Ghose and
Hamid R. Motahari Nezhad and
Manfred Reichert Guest Editors' Introduction to the
Special Issue on Knowledge-Driven
Business Process Management . . . . . . 11:1--11:??
Rik Eshuis and
Richard Hull and
Mengfei Yi Reasoning About Property Preservation in
Adaptive Case Management . . . . . . . . 12:1--12:??
Shaya Pourmirza and
Sander Peters and
Remco Dijkman and
Paul Grefen BPMS-RA: a Novel Reference Architecture
for Business Process Management Systems 13:1--13:??
Alaaeddine Yousfi and
Kimon Batoulis and
Mathias Weske Achieving Business Process Improvement
via Ubiquitous Decision-Aware Business
Processes . . . . . . . . . . . . . . . 14:1--14:??
Bedilia Estrada-Torres and
Pedro Henrique Piccoli Richetti and
Adela Del-Río-Ortega and
Fernanda Araujo Baião and
Manuel Resinas and
Flávia Maria Santoro and
Antonio Ruiz-Cortés Measuring Performance in
Knowledge-intensive Processes . . . . . 15:1--15:??
Abel Armas-Cervantes and
Marlon Dumas and
Marcello La Rosa and
Abderrahmane Maaradji Local Concurrency Detection in Business
Process Event Logs . . . . . . . . . . . 16:1--16:??
Francesco Longo and
Antonio Puliafito and
Omer Rana Guest Editors' Introduction to the
Special Issue on Fog, Edge, and Cloud
Integration for Smart Environments . . . 17:1--17:??
Carlo Puliafito and
Enzo Mingozzi and
Francesco Longo and
Antonio Puliafito and
Omer Rana Fog Computing for the Internet of
Things: a Survey . . . . . . . . . . . . 18:1--18:??
Madhurima Pore and
Vinaya Chakati and
Ayan Banerjee and
Sandeep K. S. Gupta ContextAiDe: End-to-End Architecture for
Mobile Crowd-sensing Applications . . . 19:1--19:??
Federico Concone and
Giuseppe Lo Re and
Marco Morana A Fog-Based Application for Human
Activity Recognition Using Personal
Smart Devices . . . . . . . . . . . . . 20:1--20:??
He Li and
Kaoru Ota and
Mianxiong Dong Deep Reinforcement Scheduling for Mobile
Crowdsensing in Fog Computing . . . . . 21:1--21:??
Farzad Samie and
Vasileios Tsoutsouras and
Lars Bauer and
Sotirios Xydis and
Dimitrios Soudris and
Jörg Henkel Oops: Optimizing Operation-mode
Selection for IoT Edge Devices . . . . . 22:1--22:??
Marios Avgeris and
Dimitrios Dechouniotis and
Nikolaos Athanasopoulos and
Symeon Papavassiliou Adaptive Resource Allocation for
Computation Offloading: a
Control-Theoretic Approach . . . . . . . 23:1--23:??
Houssemeddine Mazouzi and
Nadjib Achir and
Khaled Boussetta DM2-ECOP: an Efficient Computation
Offloading Policy for Multi-user
Multi-cloudlet Mobile Edge Computing
Environment . . . . . . . . . . . . . . 24:1--24:??
D. R. Vasconcelos and
R. M. C. Andrade and
V. Severino and
J. N. De Souza Cloud, Fog, or Mist in IoT? That Is the
Question . . . . . . . . . . . . . . . . 25:1--25:??
Jun Feng and
Laurence T. Yang and
Ronghao Zhang Practical Privacy-preserving High-order
Bi-Lanczos in Integrated Edge-Fog-Cloud
Architecture for Cyber-Physical-Social
Systems . . . . . . . . . . . . . . . . 26:1--26:??
Luca Ferretti and
Mirco Marchetti and
Michele Colajanni Fog-based Secure Communications for
Low-power IoT Devices . . . . . . . . . 27:1--27:??
Giovanni Merlino and
Rustem Dautov and
Salvatore Distefano and
Dario Bruneo Enabling Workload Engineering in Edge,
Fog, and Cloud Computing through
OpenStack-based Middleware . . . . . . . 28:1--28:??
L. Baresi and
D. F. Mendonça and
M. Garriga and
S. Guinea and
G. Quattrocchi A Unified Model for the
Mobile-Edge-Cloud Continuum . . . . . . 29:1--29:??
Min Chen and
Wei Li and
Giancarlo Fortino and
Yixue Hao and
Long Hu and
Iztok Humar A Dynamic Service Migration Mechanism in
Edge Cognitive Computing . . . . . . . . 30:1--30:??
Li Ye and
Weijie Wu and
Richard T. B. Ma and
John C. S. Lui On the Profitability of Bundling Sale
Strategy for Online Service Markets With
Network Effects . . . . . . . . . . . . 31:1--31:??
Ricardo J. Rodríguez and
Rafael Tolosana-calasanz and
Omer F. Rana A Dynamic Data-throttling Approach to
Minimize Workflow Imbalance . . . . . . 32:1--32:??
Jianwei Qian and
Xiang-Yang Li and
Taeho Jung and
Yang Fan and
Yu Wang and
Shaojie Tang Social Network De-anonymization: More
Adversarial Knowledge, More Users
Re-identified? . . . . . . . . . . . . . 33:1--33:??
Eduardo Lima and
Weishi Shi and
Xumin Liu and
Qi Yu Integrating Multi-level Tag
Recommendation with External Knowledge
Bases for Automatic Question Answering 34:1--34:??
Zexun Jiang and
Hao Yin and
Yulei Wu and
Yongqiang Lyu and
Geyong Min and
Xu Zhang Constructing Novel Block Layouts for
Webpage Analysis . . . . . . . . . . . . 35:1--35:??
Qingyang Wang and
Shungeng Zhang and
Yasuhiko Kanemasa and
Calton Pu Mitigating Tail Response Time of
$n$-Tier Applications: The Impact of
Asynchronous Invocations . . . . . . . . 36:1--36:??
Schahram Dustdar and
Surya Nepal and
James Joshi Introduction to the Special Section on
Advances in Internet-based Collaborative
Technologies . . . . . . . . . . . . . . 37:1--37:??
Xiaodong Ning and
Lina Yao and
Boualem Benatallah and
Yihong Zhang and
Quan Z. Sheng and
Salil S. Kanhere Source-Aware Crisis-Relevant Tweet
Identification and Key Information
Summarization . . . . . . . . . . . . . 37:1--37:??
Rafael Angarita and
Bruno Lef\`evre and
Shohreh Ahvar and
Ehsan Ahvar and
Nikolaos Georgantas and
Valérie Issarny Universal Social Network Bus: Toward the
Federation of Heterogeneous Online
Social Network Services . . . . . . . . 38:1--38:??
Christian Von Der Weth and
Ashraf Abdul and
Abhinav R. Kashyap and
Mohan S. Kankanhalli CloseUp --- a Community-Driven Live
Online Search Engine . . . . . . . . . . 39:1--39:??
Saptarshi Das and
Shamik Sural and
Jaideep Vaidya and
Vijayalakshmi Atluri Policy Adaptation in Hierarchical
Attribute-based Access Control Systems 40:1--40:??
Harsha S. Gardiyawasam Pussewalage and
Vladimir A. Oleshchuk An Anonymous Delegatable Attribute-based
Credential Scheme for a Collaborative
E-health Environment . . . . . . . . . . 41:1--41:??
Muhamad Felemban and
Emad Felemban and
Jason Kobes and
Arif Ghafoor Threat Management in Data-centric
IoT-Based Collaborative Systems . . . . 42:1--42:??
Daniel Sun and
Shiping Chen and
Guoqiang Li and
Yuanyuan Zhang and
Muhammad Atif Multi-objective Optimisation of Online
Distributed Software Update for DevOps
in Clouds . . . . . . . . . . . . . . . 43:1--43:??
Pasquale De Meo Trust Prediction via Matrix
Factorisation . . . . . . . . . . . . . 44:1--44:??
Jie Zhang and
Jamal Bentahar and
Rino Falcone and
Timothy J. Norman and
Murat Sensoy Introduction to the Special Section on
Trust and AI . . . . . . . . . . . . . . 44:1--44:??
Feyza Merve Hafizoglu and
Sandip Sen Understanding the Influences of Past
Experience on Trust in Human-agent
Teamwork . . . . . . . . . . . . . . . . 45:1--45:??
Claudia-Lavinia Ignat and
Quang-Vinh Dang and
Valerie L. Shalin The Influence of Trust Score on
Cooperative Behavior . . . . . . . . . . 46:1--46:??
Manel Mrabet and
Yosra Ben Saied and
Leila Azouz Saidane CAN-TM: Chain Augmented Na\"\ive
Bayes-based Trust Model for Reliable
Cloud Service Selection . . . . . . . . 47:1--47:??
Teng-Chieh Huang and
Razieh Nokhbeh Zaeem and
K. Suzanne Barber It Is an Equal Failing to Trust
Everybody and to Trust Nobody: Stock
Price Prediction Using Trust Filters and
Enhanced User Sentiment on Twitter . . . 48:1--48:??
Yanjiao Chen and
Xu Wang and
Baochun Li and
Qian Zhang An Incentive Mechanism for Crowdsourcing
Systems with Network Effects . . . . . . 49:1--49:??
Kai Wang and
Wei Quan and
Nan Cheng and
Mingyuan Liu and
Yu Liu and
H. Anthony Chan Betweenness Centrality Based Software
Defined Routing: Observation from
Practical Internet Datasets . . . . . . 50:1--50:??
Fadwa Estuka and
James Miller A Pure Visual Approach for Automatically
Extracting and Aligning Structured Web
Data . . . . . . . . . . . . . . . . . . 51:1--51:??
Hong Xie and
Weijie Wu and
Richard T. B. Ma and
John C. S. Lui Pay as Your Service Needs: an
Application-Driven Pricing Approach for
the Internet Economics . . . . . . . . . 52:1--52:??
Ling Liu Internet Technology Outlook: From
Communication to Storage and Cognitive
Computing . . . . . . . . . . . . . . . 1:1--1:4
Tarek Abdelzaher and
Yifan Hao and
Kasthuri Jayarajah and
Archan Misra and
Per Skarin and
Shuochao Yao and
Dulanga Weerakoon and
Karl-Erik Årzén Five Challenges in Cloud-enabled
Intelligence and Control . . . . . . . . 3:1--3:19
Calton Pu and
Abhijit Suprem and
Rodrigo Alves Lima and
Aibek Musaev and
De Wang and
Danesh Irani and
Steve Webb and
Joao Eduardo Ferreira Beyond Artificial Reality: Finding and
Monitoring Live Events from Social
Sensors . . . . . . . . . . . . . . . . 2:1--2:21
Zhengdi Hu and
Guangquan Xu and
Xi Zheng and
Jiang Liu and
Zhangbing Li and
Quan Z. Sheng and
Wenjuan Lian and
Hequn Xian SSL-SVD: Semi-supervised Learning-based
Sparse Trust Recommendation . . . . . . 4:1--4:20
Binanda Sengupta and
Yingjiu Li and
Kai Bu and
Robert H. Deng Privacy-preserving Network Path
Validation . . . . . . . . . . . . . . . 5:1--5:27
Amitangshu Pal and
Mayank Raj and
Krishna Kant and
Sajal K. Das A Smartphone-based Network Architecture
for Post-disaster Operations Using WiFi
Tethering . . . . . . . . . . . . . . . 6:1--6:27
Rui Pascoal and
Ana De Almeida and
Rute C. Sofia Mobile Pervasive Augmented Reality
Systems --- MPARS: The Role of User
Preferences in the Perceived Quality of
Experience in Outdoor Applications . . . 7:1--7:17
Demetris Paschalides and
Dimosthenis Stephanidis and
Andreas Andreou and
Kalia Orphanou and
George Pallis and
Marios D. Dikaiakos and
Evangelos Markatos MANDOLA: a Big-Data Processing and
Visualization Platform for Monitoring
and Detecting Online Hate Speech . . . . 11:1--11:21
Flor-Miriam Plaza-Del-Arco and
M. Dolores Molina-González and
L. Alfonso Ureña-López and
M. Teresa Martín-Valdivia Detecting Misogyny and Xenophobia in
Spanish Tweets Using Language
Technologies . . . . . . . . . . . . . . 12:1--12:19
Shuo Wang and
Aishan Maoliniyazi and
Xinle Wu and
Xiaofeng Meng Emo2Vec: Learning Emotional Embeddings
via Multi-Emotion Category . . . . . . . 13:1--13:17
Amitangshu Pal and
Krishna Kant Exploiting Proxy Sensing for Efficient
Monitoring of Large-Scale Sensor
Networks . . . . . . . . . . . . . . . . 14:1--14:31
Zhiheng Zhong and
Rajkumar Buyya A Cost-Efficient Container Orchestration
Strategy in Kubernetes-Based Cloud
Computing Infrastructures with
Heterogeneous Resources . . . . . . . . 15:1--15:24
Xingbin Jiang and
Michele Lora and
Sudipta Chattopadhyay An Experimental Analysis of Security
Vulnerabilities in Industrial IoT
Devices . . . . . . . . . . . . . . . . 16:1--16:24
Christos Tsigkanos and
Martin Garriga and
Luciano Baresi and
Carlo Ghezzi Cloud Deployment Tradeoffs for the
Analysis of Spatially Distributed
Internet of Things Systems . . . . . . . 17:1--17:23
Ting Chen and
Zihao Li and
Yuxiao Zhu and
Jiachi Chen and
Xiapu Luo and
John Chi-Shing Lui and
Xiaodong Lin and
Xiaosong Zhang Understanding Ethereum via Graph
Analysis . . . . . . . . . . . . . . . . 18:1--18:32
Bilal Ghanem and
Paolo Rosso and
Francisco Rangel An Emotional Analysis of False
Information in Social Media and News
Articles . . . . . . . . . . . . . . . . 19:1--19:18
Rute C. Sofia and
Eve M. Schooler and
Dirk Kutscher and
Chris Winkler Introduction to the Special Issue on
Evolution of IoT Networking
Architectures . . . . . . . . . . . . . 20:1--20:2
Marcel Enguehard and
Yoann Desmouceaux and
Giovanna Carofiglio Efficient Latency Control in Fog
Deployments via Hardware-Accelerated
Popularity Estimation . . . . . . . . . 21:1--21:23
K. Panagidi and
C. Anagnostopoulos and
A. Chalvatzaras and
S. Hadjiefthymiades To Transmit or Not to Transmit:
Controlling Communications in the Mobile
IoT Domain . . . . . . . . . . . . . . . 22:1--22:23
Xia Cheng and
Junyang Shi and
Mo Sha Cracking Channel Hopping Sequences and
Graph Routes in Industrial TSCH Networks 23:1--23:28
Jiaoyan Chen and
Laurence T. Yang and
Xianjun Deng and
Xianggong Hong and
Lingzhi Yi Optimal Receiver Placement for
$K$-barrier Coverage in Passive Bistatic
Radar Sensor Networks . . . . . . . . . 24:1--24:23
Zakaria Benomar and
Francesco Longo and
Giovanni Merlino and
Antonio Puliafito Cloud-based Enabling Mechanisms for
Container Deployment and Migration at
the Network Edge . . . . . . . . . . . . 25:1--25:28
Giuseppe Faraci and
Christian Grasso and
Giovanni Schembra Fog in the Clouds: UAVs to Provide Edge
Computing to IoT Devices . . . . . . . . 26:1--26:26
Jan Seeger and
Arne Bröring and
Georg Carle Optimally Self-Healing IoT
Choreographies . . . . . . . . . . . . . 27:1--27:20
Junyang Shi and
Mo Sha Parameter Self-Adaptation for Industrial
Wireless Sensor--Actuator Networks . . . 28:1--28:28
Marcin Luckner and
Maciej Grzenda and
Robert Kunicki and
Jaroslaw Legierski IoT Architecture for Urban Data-Centric
Services and Applications . . . . . . . 29:1--29:30
Nikolaos Athanasios Anagnostopoulos and
Saad Ahmad and
Tolga Arul and
Daniel Steinmetzer and
Matthias Hollick and
Stefan Katzenbeisser Low-cost Security for Next-generation
IoT Networks . . . . . . . . . . . . . . 30:1--30:31
Runhua Xu and
James Joshi Trustworthy and Transparent Third-party
Authority . . . . . . . . . . . . . . . 31:1--31:23
Meng Wang and
Bo Cheng and
Junliang Chen An Efficient Service Function Chaining
Placement Algorithm in Mobile Edge
Computing . . . . . . . . . . . . . . . 32:1--32:21
Xiaoyu Ge and
Panos K. Chrysanthis and
Konstantinos Pelechrinis and
Demetrios Zeinalipour-Yazti and
Mohamed A. Sharaf Serendipity-based Points-of-Interest
Navigation . . . . . . . . . . . . . . . 33:1--33:32
Michalis Pachilakis and
Antonios A. Chariton and
Panagiotis Papadopoulos and
Panagiotis Ilia and
Eirini Degkleri and
Evangelos P. Markatos Design and Implementation of a
Compressed Certificate Status Protocol 34:1--34:25
Elias Rohrer and
Steffen Heidel and
Florian Tschorsch Enabling Reference Verifiability for the
World Wide Web with Webchain . . . . . . 35:1--35:23
Yang Zhou and
Ling Liu and
Kisung Lee and
Balaji Palanisamy and
Qi Zhang Improving Collaborative Filtering with
Social Influence over Heterogeneous
Information Networks . . . . . . . . . . 36:1--36:29
Hong Xie and
Yongkun Li and
John C. S. Lui A Reinforcement Learning Approach to
Optimize Discount and Reputation
Tradeoffs in E-commerce Systems . . . . 37:1--37:26
Weichao Gao and
James Nguyen and
Yalong Wu and
William G. Hatcher and
Wei Yu Routing in Large-scale Dynamic Networks:
a Bloom Filter-based Dual-layer Scheme 38:1--38:24
Grigorios Loukides and
Robert Gwadera and
Shing-Wan Chang Overexposure-Aware Influence
Maximization . . . . . . . . . . . . . . 39:1--39:31
Xudong Wu and
Luoyi Fu and
Zixin Zhang and
Huan Long and
Jingfan Meng and
Xinbing Wang and
Guihai Chen Evolving Influence Maximization in
Evolving Networks . . . . . . . . . . . 40:1--40:31
Na Ruan and
Dongli Zhou and
Weijia Jia Ursa: Robust Performance for Nakamoto
Consensus with Self-adaptive Throughput 41:1--41:26
Chunli Huang and
Wenjun Jiang and
Jie Wu and
Guojun Wang Personalized Review Recommendation based
on Users' Aspect Sentiment . . . . . . . 42:1--42:26
Hongshuai Ren and
Yang Wang and
Chengzhong Xu and
Xi Chen SMig-RL: an Evolutionary Migration
Framework for Cloud Services Based on
Deep Reinforcement Learning . . . . . . 43:1--43:18
Slava Novgorodov and
Ido Guy and
Guy Elad and
Kira Radinsky Descriptions from the Customers:
Comparative Analysis of Review-based
Product Description Generation Methods 44:1--44:31
Kostas Kolomvatsos and
Christos Anagnostopoulos An Intelligent Edge-centric Queries
Allocation Scheme based on Ensemble
Models . . . . . . . . . . . . . . . . . 45:1--45:25
Paolo Boldi and
Georgios Gousios Fine-Grained Network Analysis for Modern
Software Ecosystems . . . . . . . . . . 1:1--1:14
Liwei Huang and
Yutao Ma and
Yanbo Liu and
Keqing He DAN-SNR: a Deep Attentive Network for
Social-aware Next Point-of-interest
Recommendation . . . . . . . . . . . . . 2:1--2:27
Wensheng Gan and
Jerry Chun-Wei Lin and
Philippe Fournier-Viger and
Han-Chieh Chao and
Philip S. Yu Beyond Frequency: Utility Mining with
Varied Item-specific Minimum Utility . . 3:1--3:32
Sabah Mohammed and
Jinan Fiaidhi and
Carlos Ramos and
Tai-Hoon Kim and
Wai Chi Fang and
Tarek Abdelzaher Blockchain in eCommerce: a Special Issue
of the \booktitleACM Transactions on
Internet of Things . . . . . . . . . . . 4:11--4:55
Yongjun Ren and
Jian Qi and
Yepeng Liu and
Jin Wang and
Gwang-Jun Kim Integrity Verification Mechanism of
Sensor Data Based on Bilinear Map
Accumulator . . . . . . . . . . . . . . 5:1--5:19
Honghao Gao and
Wanqiu Huang and
Yucong Duan The Cloud-edge-based Dynamic
Reconfiguration to Service Workflow for
Mobile Ecommerce Environments: a QoS
Prediction Perspective . . . . . . . . . 6:1--6:23
Xiaolong Xu and
Dawei Zhu and
Xiaoxian Yang and
Shuo Wang and
Lianyong Qi and
Wanchun Dou Concurrent Practical Byzantine Fault
Tolerance for Integration of Blockchain
and Supply Chain . . . . . . . . . . . . 7:1--7:17
Junho Kim and
Mucheol Kim Intelligent Mediator-based Enhanced
Smart Contract for Privacy Protection 8:1--8:16
Shuiguang Deng and
Guanjie Cheng and
Hailiang Zhao and
Honghao Gao and
Jianwei Yin Incentive-Driven Computation Offloading
in Blockchain-Enabled E-Commerce . . . . 9:1--9:19
Liang Chen and
Jiaying Peng and
Yang Liu and
Jintang Li and
Fenfang Xie and
Zibin Zheng Phishing Scams Detection in Ethereum
Transaction Network . . . . . . . . . . 10:1--10:16
Lichen Cheng and
Jiqiang Liu and
Yi Jin and
Yidong Li and
Wei Wang Account Guarantee Scheme: Making
Anonymous Accounts Supervised in
Blockchain . . . . . . . . . . . . . . . 11:1--11:19
Zhitao Guan and
Naiyu Wang and
Xunfeng Fan and
Xueyan Liu and
Longfei Wu and
Shaohua Wan Achieving Secure Search over Encrypted
Data for e-Commerce: a Blockchain
Approach . . . . . . . . . . . . . . . . 12:1--12:17
A. Qun Song and
Yuhao Chen and
Yan Zhong and
Kun Lan and
Simon Fong and
B. Rui Tang A Supply-chain System Framework Based on
Internet of Things Using Blockchain
Technology . . . . . . . . . . . . . . . 13:1--13:24
Junho Jeong and
Donghyo Kim and
Sun-Young Ihm and
Yangsun Lee and
Yunsik Son Multilateral Personal Portfolio
Authentication System Based on
Hyperledger Fabric . . . . . . . . . . . 14:1--14:17
You Sun and
Rui Xue and
Rui Zhang and
Qianqian Su and
Sheng Gao RTChain: a Reputation System with
Transaction and Consensus Incentives for
E-commerce Blockchain . . . . . . . . . 15:1--15:24
Mahmoud Barhamgi and
Michael N. Huhns and
Charith Perera and
Pinar Yolum Introduction to the Special Section on
Human-centered Security, Privacy, and
Trust in the Internet of Things . . . . 16:1--16:3
Zheng Yan and
Li Peng and
Wei Feng and
Laurence T. Yang Social-Chain: Decentralized Trust
Evaluation Based on Blockchain in
Pervasive Social Networking . . . . . . 17:1--17:28
A. K. Singh and
S. Thakur and
Alireza Jolfaei and
Gautam Srivastava and
MD. Elhoseny and
A. Mohan Joint Encryption and Compression-Based
Watermarking Technique for Security of
Digital Documents . . . . . . . . . . . 18:1--18:20
Cong Peng and
Jianhua Chen and
Pandi Vijayakumar and
Neeraj Kumar and
Debiao He Efficient Distributed Decryption Scheme
for IoT Gateway-based Applications . . . 19:1--19:23
Elie Chicha and
Bechara Al Bouna and
Mohamed Nassar and
Richard Chbeir and
Ramzi A. Haraty and
Mourad Oussalah and
Djamal Benslimane and
Mansour Naser Alraja A User-Centric Mechanism for
Sequentially Releasing Graph Datasets
under Blowfish Privacy . . . . . . . . . 20:1--20:25
Yekta Said Can and
Cem Ersoy Privacy-preserving Federated Deep
Learning for Wearable IoT-based
Biomedical Monitoring . . . . . . . . . 21:1--21:17
Edy Hourany and
Bachir Habib and
Camille Fountaine and
Abdallah Makhoul and
Benoit Piranda and
Julien Bourgeois PROLISEAN: a New Security Protocol for
Programmable Matter . . . . . . . . . . 22:1--22:29
Faiza Loukil and
Chirine Ghedira-Guegan and
Khouloud Boukadi and
A\"\icha-Nabila Benharkat and
Elhadj Benkhelifa Data Privacy Based on IoT Device
Behavior Control Using Blockchain . . . 23:1--23:20
Kaixi Hu and
Lin Li and
Jianquan Liu and
Daniel Sun DuroNet: a Dual-robust Enhanced
Spatial-temporal Learning Network for
Urban Crime Prediction . . . . . . . . . 24:1--24:24
Vikram Mehta and
Daniel Gooch and
Arosha Bandara and
Blaine Price and
Bashar Nuseibeh Privacy Care: a Tangible Interaction
Framework for Privacy Management . . . . 25:1--25:32
Tanusree Sharma and
Hunter A. Dyer and
Masooda. Bashir Enabling User-centered Privacy Controls
for Mobile Applications: COVID-19
Perspective . . . . . . . . . . . . . . 26:1--26:24
Xuanzhe Liu and
Shangguang Wang and
Yun Ma and
Ying Zhang and
Qiaozhu Mei and
Yunxin Liu and
Gang Huang Operating Systems for Resource-adaptive
Intelligent Software: Challenges and
Opportunities . . . . . . . . . . . . . 27:1--27:19
Francesco Piccialli and
Nik Bessis and
Gwanggil Jeon and
Calton Pu Introduction to the Special Section on
Data Science for Cyber-Physical Systems 28e:1--28e:7
Zhihan Lv and
Amit Kumar Singh Big Data Analysis of Internet of Things
System . . . . . . . . . . . . . . . . . 28:1--28:15
M. Tanveer and
S. Sharma and
K. Muhammad Large-Scale Least Squares Twin SVMs . . 29:1--29:19
Claudio Savaglio and
Giancarlo Fortino A Simulation-driven Methodology for IoT
Data Mining Based on Edge Computing . . 30:1--30:22
Kuljeet Kaur and
Sahil Garg and
Georges Kaddoum and
Neeraj Kumar Energy and SLA-driven MapReduce Job
Scheduling Framework for Cloud-based
Cyber-Physical Systems . . . . . . . . . 31:1--31:24
Chun-Wei Tsai and
Zhi-Yan Fang An Effective Hyperparameter Optimization
Algorithm for DNN to Predict Passengers
at a Metro Station . . . . . . . . . . . 32:1--32:24
Pin Ni and
Yuming Li and
Gangmin Li and
Victor Chang A Hybrid Siamese Neural Network for
Natural Language Inference in
Cyber-Physical Systems . . . . . . . . . 33:1--33:25
Chen Zhang and
Zhuo Tang and
Kenli Li and
Jianzhong Yang and
Li Yang A Polishing Robot Force Control System
Based on Time Series Data in Industrial
Internet of Things . . . . . . . . . . . 34:1--34:22
Yuyu Yin and
Haoran Xu and
Tingting Liang and
Manman Chen and
Honghao Gao and
Antonella Longo Leveraging Data Augmentation for Service
QoS Prediction in Cyber-physical Systems 35:1--35:25
Martin Garriga and
Koen Aarns and
Christos Tsigkanos and
Damian A. Tamburri and
Wjan Van Den Heuvel DataOps for Cyber-Physical Systems
Governance: The Airport Passenger Flow
Case . . . . . . . . . . . . . . . . . . 36:1--36:25
Iris Weiss and
Birgit Vogel-Heuser and
Emanuel Trunzer and
Simon Kruppa Product Quality Monitoring in Hydraulic
Presses Using a Minimal Sample of Sensor
and Actuator Data . . . . . . . . . . . 37:1--37:23
Kkwang Raymond Choo and
Uttam Ghosh and
Deepak Tosh and
Reza M. Parizi and
Ali Dehghantanha Introduction to the Special Issue on
Decentralized Blockchain Applications
and Infrastructures for Next Generation
Cyber-Physical Systems . . . . . . . . . 38e:1--38e:3
Laizhong Cui and
Zhe Xiao and
Jiahao Wang and
Fei Chen and
Yi Pan and
Hua Dai and
Jing Qin Improving Vaccine Safety Using
Blockchain . . . . . . . . . . . . . . . 38:1--38:24
Truc D. T. Nguyen and
My T. Thai A Blockchain-based Iterative Double
Auction Protocol Using Multiparty State
Channels . . . . . . . . . . . . . . . . 39:1--39:22
Chao Lin and
Debiao He and
Sherali Zeadally and
Xinyi Huang and
Zhe Liu Blockchain-based Data Sharing System for
Sensing-as-a-Service in Smart Cities . . 40:1--40:21
Jun Feng and
Laurence T. Yang and
Yuxiang Zhu and
Nicholaus J. Gati and
Yijun Mo Blockchain-enabled Tensor-based
Conditional Deep Convolutional GAN for
Cyber-physical-Social Systems . . . . . 41:1--41:17
Ye Luo and
Zehai Su and
Wei Zheng and
Zhaobin Chen and
Fuqin Wang and
Zhemin Zhang and
Jinjun Chen A Novel Memory-hard Password Hashing
Scheme for Blockchain-based
Cyber-physical Systems . . . . . . . . . 42:1--42:21
Hao Wang and
Shenglan Ma and
Chaonian Guo and
Yulei Wu and
Hong-Ning Dai and
Di Wu Blockchain-Based Power Energy Trading
Management . . . . . . . . . . . . . . . 43:1--43:16
Micha\l Król and
Alberto Sonnino and
Mustafa Al-Bassam and
Argyrios G. Tasiopoulos and
Etienne Rivi\`ere and
Ioannis Psaras Proof-of-Prestige: a Useful Work Reward
System for Unverifiable Tasks . . . . . 44:1--44:27
Bin Cao and
Jiawei Wu and
Sichao Wang and
Honghao Gao and
Jing Fan and
Shuiguang Deng and
Jianwei Yin and
Xuan Liu Unsupervised Derivation of Keyword
Summary for Short Texts . . . . . . . . 45:1--45:23
Vandana Bharti and
Bhaskar Biswas and
Kaushal Kumar Shukla A Novel Multiobjective GDWCN-PSO
Algorithm and Its Application to Medical
Data Security . . . . . . . . . . . . . 46:1--46:28
Shijie Hao and
Tao Chen and
Yang Wang and
Yanrong Guo and
Meng Wang and
For the Alzheimer's Disease Neuroimaging Initiative Adaptive Multi-Task Dual-Structured
Learning with Its Application on
Alzheimer's Disease Study . . . . . . . 47:1--47:16
Yuanpeng Zhang and
Yizhang Jiang and
Lianyong Qi and
Md Zakirul Alam Bhuiyan and
Pengjiang Qian Epilepsy Diagnosis Using Multi-view &
Multi-medoid Entropy-based Clustering
with Privacy Protection . . . . . . . . 48:1--48:21
Jimmy Ming-Tai Wu and
Gautam Srivastava and
Jerry Chun-Wei Lin and
Qian Teng A Multi-Threshold Ant Colony
System-based Sanitization Model in
Shared Medical Environments . . . . . . 49:1--49:26
Bjarne Pfitzner and
Nico Steckhan and
Bert Arnrich Federated Learning in a Medical Context:
a Systematic Literature Review . . . . . 50:1--50:31
Karam Bou-Chaaya and
Richard Chbeir and
Mansour Naser Alraja and
Philippe Arnould and
Charith Perera and
Mahmoud Barhamgi and
Djamal Benslimane $ \delta $-Risk: Toward Context-aware
Multi-objective Privacy Management in
Connected Environments . . . . . . . . . 51:1--51:31
Abhinav Kumar and
Sanjay Kumar Singh and
K. Lakshmanan and
Sonal Saxena and
Sameer Shrivastava A Novel Cloud-Assisted Secure Deep
Feature Classification Framework for
Cancer Histopathology Images . . . . . . 52:1--52:22
Amit Kumar Singh and
Jonathan Wu and
Ali Al-Haj and
Calton Pu Introduction to the Special Section on
Security and Privacy of Medical Data for
Smart Healthcare . . . . . . . . . . . . 53:1--53:4
Mohammed Al-Khafajiy and
Safa Otoum and
Thar Baker and
Muhammad Asim and
Zakaria Maamar and
Moayad Aloqaily and
Mark Taylor and
Martin Randles Intelligent Control and Security of Fog
Resources in Healthcare Systems via a
Cognitive Fog Model . . . . . . . . . . 54:1--54:23
Zhihan Lv and
Francesco Piccialli The Security of Medical Data on Internet
Based on Differential Privacy Technology 55:1--55:18
Tao Wang and
Zhigao Zheng and
Ali Kashif Bashir and
Alireza Jolfaei and
Yanyan Xu FinPrivacy: a Privacy-preserving
Mechanism for Fingerprint Identification 56:1--56:15
Zijie Yue and
Shuai Ding and
Lei Zhao and
Youtao Zhang and
Zehong Cao and
M. Tanveer and
Alireza Jolfaei and
Xi Zheng Privacy-preserving Time-series Medical
Images Analysis Using a Hybrid Deep
Learning Framework . . . . . . . . . . . 57:1--57:21
Tae-Yeun Kim and
Sung-Hwan Kim and
Hoon Ko Design and Implementation of BCI-based
Intelligent Upper Limb Rehabilitation
Robot System . . . . . . . . . . . . . . 60:1--60:17
Cong Peng and
Debiao He and
Jianhua Chen and
Neeraj Kumar and
Muhammad Khurram Khan EPRT: an Efficient Privacy-Preserving
Medical Service Recommendation and Trust
Discovery Scheme for eHealth System . . 61:1--61:24
Somanka Maiti and
Ashish Kumar and
Smriti Jain and
Gaurav Bhatnagar A Novel Image Inpainting Framework Using
Regression . . . . . . . . . . . . . . . 62:1--62:16
Haolun Li and
Chi-Man Pun and
Feng Xu and
Longsheng Pan and
Rui Zong and
Hao Gao and
Huimin Lu A Hybrid Feature Selection Algorithm
Based on a Discrete Artificial Bee
Colony for Parkinson's Diagnosis . . . . 63:1--63:22
Wei Wei and
Ammar Rayes and
Wei Wang and
Yiduo Mei Special Section on AI-Empowered Internet
of Things for Smart Cities . . . . . . . 64:1--64:3
Mohamad Ali Mehrabi and
Naila Mukhtar and
Alireza Jolfaei Power Side-Channel Analysis of RNS GLV
ECC Using Machine and Deep Learning
Algorithms . . . . . . . . . . . . . . . 65:1--65:20
Guangwei Gao and
Dong Zhu and
Huimin Lu and
Yi Yu and
Heyou Chang and
Dong Yue Robust Facial Image Super-Resolution by
Kernel Locality-Constrained
Coupled-Layer Regression . . . . . . . . 67:1--67:15
Francesco Piccialli and
Fabio Giampaolo and
Edoardo Prezioso and
Danilo Crisci and
Salvatore Cuomo Predictive Analytics for Smart Parking:
a Deep Learning Approach in Forecasting
of IoT Data . . . . . . . . . . . . . . 68:1--68:21
Feiran Huang and
Chaozhuo Li and
Boyu Gao and
Yun Liu and
Sattam Alotaibi and
Hao Chen Deep Attentive Multimodal Network
Representation Learning for Social Media
Images . . . . . . . . . . . . . . . . . 69:1--69:17
David K. Y. Chiu and
Tao Xu and
Iker Gondra Random Graph-based Multiple Instance
Learning for Structured IoT Smart City
Applications . . . . . . . . . . . . . . 70:1--70:17
Laha Ale and
Ning Zhang and
Scott A. King and
Jose Guardiola Spatio-temporal Bayesian Learning for
Mobile Edge Computing Resource Planning
in Smart Cities . . . . . . . . . . . . 72:1--72:21
Celestine Iwendi and
Saif Ur Rehman and
Abdul Rehman Javed and
Suleman Khan and
Gautam Srivastava Sustainable Security for the Internet of
Things Using Artificial Intelligence
Architectures . . . . . . . . . . . . . 73:1--73:22
He-Xuan Hu and
Wen-Jie Mao and
Zhen-Zhou Lin and
Qiang Hu and
Ye Zhang Multimodal Brain Tumor Segmentation
Based on an Intelligent UNET--LSTM
Algorithm in Smart Hospitals . . . . . . 74:1--74:14
Qianmu Li and
Shunmei Meng and
Xiaonan Sang and
Hanrui Zhang and
Shoujin Wang and
Ali Kashif Bashir and
Keping Yu and
Usman Tariq Dynamic Scheduling Algorithm in Cyber
Mimic Defense Architecture of Volunteer
Computing . . . . . . . . . . . . . . . 75:1--75:33
Wu Chen and
Yong Yu and
Keke Gai and
Jiamou Liu and
Kim-Kwang Raymond Choo Time-Efficient Ensemble Learning with
Sample Exchange for Edge Computing . . . 76:1--76:17
Mehedi Masud and
Parminder Singh and
Gurjot Singh Gaba and
Avinash Kaur and
Roobaea Alrobaea Alghamdi and
Mubarak Alrashoud and
Salman Ali Alqahtani CROWD: Crow Search and Deep Learning
based Feature Extractor for
Classification of Parkinson's Disease 77:1--77:18
Shehzad Ashraf Chaudhry and
Azeem Irshad and
Khalid Yahya and
Neeraj Kumar and
Mamoun Alazab and
Yousaf Bin Zikria Rotating behind Privacy: an Improved
Lightweight Authentication Scheme for
Cloud-based IoT Environment . . . . . . 78:1--78:19
Lucia Cascone and
Aniello Castiglione and
Michele Nappi and
Fabio Narducci and
Ignazio Passero Waiting for Tactile: Robotic and Virtual
Experiences in the Fog . . . . . . . . . 79:1--79:19
Liang Tan and
Na Shi and
Keping Yu and
Moayad Aloqaily and
Yaser Jararweh A Blockchain-empowered Access Control
Framework for Smart Devices in Green
Internet of Things . . . . . . . . . . . 80:1--80:20
Safa Otoum and
Burak Kantarci and
Hussein Mouftah A Comparative Study of AI-Based
Intrusion Detection Techniques in
Critical Infrastructures . . . . . . . . 81:1--81:22
Mojtaba Alizadeh and
Mohammad Hesam Tadayon and
Kouichi Sakurai and
Hiroaki Anada and
Alireza Jolfaei A Secure Ticket-Based Authentication
Mechanism for Proxy Mobile IPv6 Networks
in Volunteer Computing . . . . . . . . . 82:1--82:16
Zhihan Lv and
Dongliang Chen and
Amit Kumar Singh Big Data Processing on Volunteer
Computing . . . . . . . . . . . . . . . 83:1--83:20
Bin Yuan and
Chen Lin and
Deqing Zou and
Laurence Tianruo Yang and
Hai Jin Detecting Malicious Switches for a
Secure Software-defined Tactile Internet 84:1--84:23
Mehedi Masud and
M. Shamim Hossain and
Hesham Alhumyani and
Sultan S. Alshamrani and
Omar Cheikhrouhou and
Saleh Ibrahim and
Ghulam Muhammad and
Amr E. Eldin Rashed and
B. B. Gupta Pre-Trained Convolutional Neural
Networks for Breast Cancer Detection
Using Ultrasound Images . . . . . . . . 85:1--85:17
Farooq Hoseiny and
Sadoon Azizi and
Mohammad Shojafar and
Rahim Tafazolli Joint QoS-aware and Cost-efficient Task
Scheduling for Fog-cloud Resources in a
Volunteer Computing System . . . . . . . 86:1--86:21
Ismaeel Al Ridhawi and
Moayad Aloqaily and
Yaser Jararweh An Incentive-based Mechanism for
Volunteer Computing Using Blockchain . . 87:1--87:22
Di Wu and
Wei Shi and
Xiangyu Ma A Novel Real-time Anti-spam Framework 88:1--88:27
Jimmy Ming-Tai Wu and
Qian Teng and
Gautam Srivastava and
Matin Pirouz and
Jerry Chun-Wei Lin The Efficient Mining of Skyline Patterns
from a Volunteer Computing Network . . . 89:1--89:20
Yan-Chun Chen and
Ren-Hung Hwang and
Mu-Yen Chen and
Chih-Chin Wen and
Chih-Ping Hsu Screw Slot Quality Inspection System
Based on Tactile Network . . . . . . . . 90:1--90:17
Huimin Lu and
Liao Wu and
Giancarlo Fortino and
Schahram Dustdar Introduction to the Special Section on
Cognitive Robotics on 5G/6G Networks . . 91e:1--91e:3
Zhiyang Lin and
Jihua Zhu and
Zutao Jiang and
Yujie Li and
Yaochen Li and
Zhongyu Li Merging Grid Maps in Diverse Resolutions
by the Context-based Descriptor . . . . 91:1--91:21
Zhihan Lv and
Liang Qiao and
Qingjun Wang Cognitive Robotics on 5G Networks . . . 92:1--92:18
Xin Jin and
Yuwei Duan and
Ying Zhang and
Yating Huang and
Mengdong Li and
Ming Mao and
Amit Kumar Singh and
Yujie Li Fast Search of Lightweight Block Cipher
Primitives via Swarm-like Metaheuristics
for Cyber Security . . . . . . . . . . . 93:1--93:15
Rushi Lan and
Jing Wang and
Wenming Huang and
Zhenrong Deng and
Xiyan Sun and
Zhuo Chen and
Xiaonan Luo Chinese Emotional Dialogue Response
Generation via Reinforcement Learning 94:1--94:17
Song Deng and
Fulin Chen and
Xia Dong and
Guangwei Gao and
Xindong Wu Short-term Load Forecasting by Using
Improved GEP and Abnormal Load
Recognition . . . . . . . . . . . . . . 95:1--95:28
Buddhadeb Pradhan and
Nirmal Baran Hui and
Diptendu Sinha Roy and
Gautam Srivastava and
Jerry Chun-Wei Lin Game-Theoretic Strategic Coordination
and Navigation of Multiple Wheeled
Robots . . . . . . . . . . . . . . . . . 96:1--96:15
Min Chen and
Wenjing Xiao and
Long Hu and
Yujun Ma and
Yin Zhang and
Guangming Tao Cognitive Wearable Robotics for Autism
Perception Enhancement . . . . . . . . . 97:1--97:16
Wenpeng Lu and
Rui Yu and
Shoujin Wang and
Can Wang and
Ping Jian and
Heyan Huang Sentence Semantic Matching Based on $3$D
CNN for Human-Robot Language Interaction 98:1--98:24
Zhihan Lv and
Liang Qiao and
Amit Kumar Singh and
Qingjun Wang AI-empowered IoT Security for Smart
Cities . . . . . . . . . . . . . . . . . 99:1--99:21
Ramesh Sekaran and
Rizwan Patan and
Fadi Al-Turjman A Novel Approach for Efficient Packet
Transmission in Volunteered Computing
MANET . . . . . . . . . . . . . . . . . 100:1--100:15
Huniya Shahid and
Munam Ali Shah and
Ahmad Almogren and
Hasan Ali Khattak and
Ikram Ud Din and
Neeraj Kumar and
Carsten Maple Machine Learning-based Mist Computing
Enabled Internet of Battlefield Things 101:1--101:26
Li Kuang and
Jianbo Zheng and
Kemu Li and
Honghao Gao Intelligent Traffic Signal Control Based
on Reinforcement Learning with State
Reduction for Smart Cities . . . . . . . 102:1--102:24
Rafael Salema Marques and
Gregory Epiphaniou and
Haider Al-Khateeb and
Carsten Maple and
Mohammad Hammoudeh and
Paulo André Lima De Castro and
Ali Dehghantanha and
Kim Kwang Raymond Choo A Flow-based Multi-agent Data
Exfiltration Detection Architecture for
Ultra-low Latency Networks . . . . . . . 103:1--103:30
Zhihan Lv and
Liang Qiao and
Sahil Verma and
Kavita AI-enabled IoT-Edge Data Analytics for
Connected Living . . . . . . . . . . . . 104:1--104:20
V. Gomathy and
K. Janarthanan and
Fadi Al-Turjman and
R. Sitharthan and
M. Rajesh and
K. Vengatesan and
T. Priya Reshma Investigating the Spread of Coronavirus
Disease via Edge-AI and Air Pollution
Correlation . . . . . . . . . . . . . . 105:1--105:10
Wei Wang and
Junyang Chen and
Yushu Zhang and
Zhiguo Gong and
Neeraj Kumar and
Wei Wei A Multi-graph Convolutional Network
Framework for Tourist Flow Prediction 106:1--106:13
Gaurav Singal and
Vijay Laxmi and
Manoj Singh Gaur and
D. Vijay Rao and
Riti Kushwaha and
Deepak Garg and
Neeraj Kumar QoS-aware Mesh-based Multicast Routing
Protocols in Edge Ad Hoc Networks:
Concepts and Challenges . . . . . . . . 1:1--1:27
Iram Bibi and
Adnan Akhunzada and
Jahanzaib Malik and
Muhammad Khurram Khan and
Muhammad Dawood Secure Distributed Mobile Volunteer
Computing with Android . . . . . . . . . 2:1--2:21
Chen Chen and
Lei Liu and
Shaohua Wan and
Xiaozhe Hui and
Qingqi Pei Data Dissemination for Industry 4.0
Applications in Internet of Vehicles
Based on Short-term Traffic Prediction 3:1--3:18
Weiwei Lin and
Tiansheng Huang and
Xin Li and
Fang Shi and
Xiumin Wang and
Ching-Hsien Hsu Energy-Efficient Computation Offloading
for UAV-Assisted MEC: a Two-Stage
Optimization Scheme . . . . . . . . . . 4:1--4:23
Nan Jiang and
Debin Huang and
Jing Chen and
Jie Wen and
Heng Zhang and
Honglong Chen Semi-Direct Monocular Visual-Inertial
Odometry Using Point and Line Features
for IoV . . . . . . . . . . . . . . . . 5:1--5:23
Muhammad Junaid and
Adnan Sohail and
Fadi Al Turjman and
Rashid Ali Agile Support Vector Machine for
Energy-efficient Resource Allocation in
IoT-oriented Cloud using PSO . . . . . . 6:1--6:35
Afiya Ayman and
Amutheezan Sivagnanam and
Michael Wilbur and
Philip Pugliese and
Abhishek Dubey and
Aron Laszka Data-Driven Prediction and Optimization
of Energy Use for Transit Fleets of
Electric and ICE Vehicles . . . . . . . 7:1--7:29
Laura Verde and
Nadia Brancati and
Giuseppe De Pietro and
Maria Frucci and
Giovanna Sannino A Deep Learning Approach for Voice
Disorder Detection for Smart Connected
Living Environments . . . . . . . . . . 8:1--8:16
Rahul Kumar and
Ankur Gupta and
Harkirat Singh Arora and
Balasubramanian Raman IBRDM: an Intelligent Framework for
Brain Tumor Classification Using
Radiomics- and DWT-based Fusion of MRI
Sequences . . . . . . . . . . . . . . . 9:1--9:30
Yanchen Qiao and
Weizhe Zhang and
Xiaojiang Du and
Mohsen Guizani Malware Classification Based on
Multilayer Perception and Word2Vec for
IoT Security . . . . . . . . . . . . . . 10:1--10:22
David Major and
Danny Yuxing Huang and
Marshini Chetty and
Nick Feamster Alexa, Who Am I Speaking To?:
Understanding Users' Ability to Identify
Third-Party Apps on Amazon Alexa . . . . 11:1--11:22
Marwa Daaji and
Ali Ouni and
Mohamed Mohsen Gammoudi and
Salah Bouktif and
Mohamed Wiem Mkaouer Multi-criteria Web Services Selection:
Balancing the Quality of Design and
Quality of Service . . . . . . . . . . . 12:1--12:31
Sajib Mistry and
Lie Qu and
Athman Bouguettaya Layer-based Composite Reputation
Bootstrapping . . . . . . . . . . . . . 13:1--13:28
Ghazale Amel Zendehdel and
Ratinder Kaur and
Inderpreet Chopra and
Natalia Stakhanova and
Erik Scheme Automated Security Assessment Framework
for Wearable BLE-enabled Health
Monitoring Devices . . . . . . . . . . . 14:1--14:31
Ryan Dailey and
Aniesh Chawla and
Andrew Liu and
Sripath Mishra and
Ling Zhang and
Josh Majors and
Yung-Hsiang Lu and
George K. Thiruvathukal Automated Discovery of Network Cameras
in Heterogeneous Web Pages . . . . . . . 15:1--15:25
Menatalla Abououf and
Shakti Singh and
Hadi Otrok and
Rabeb Mizouni and
Ernesto Damiani Machine Learning in Mobile Crowd
Sourcing: a Behavior-Based Recruitment
Model . . . . . . . . . . . . . . . . . 16:1--16:28
Ovidiu Dan and
Vaibhav Parikh and
Brian D. Davison IP Geolocation through Reverse DNS . . . 17:1--17:29
Di Zhang and
Feng Xu and
Chi-Man Pun and
Yang Yang and
Rushi Lan and
Liejun Wang and
Yujie Li and
Hao Gao Virtual Reality Aided High-Quality $3$D
Reconstruction by Remote Drones . . . . 18:1--18:20
Zakaria Benomar and
Francesco Longo and
Giovanni Merlino and
Antonio Puliafito Cloud-based Network Virtualization in
IoT with OpenStack . . . . . . . . . . . 19:1--19:26
Jingjing Wang and
Wenjun Jiang and
Kenli Li and
Guojun Wang and
Keqin Li Incremental Group-Level Popularity
Prediction in Online Social Networks . . 20:1--20:26
Alessio Pagani and
Zhuangkun Wei and
Ricardo Silva and
Weisi Guo Neural Network Approximation of Graph
Fourier Transform for Sparse Sampling of
Networked Dynamics . . . . . . . . . . . 21:1--21:18
Zhenyu Fan and
Wang Yang and
Fan Wu and
Jing Cao and
Weisong Shi Serving at the Edge: an Edge Computing
Service Architecture Based on ICN . . . 22:1--22:27
Mengmeng Ge and
Jin-Hee Cho and
Dongseong Kim and
Gaurav Dixit and
Ing-Ray Chen Proactive Defense for
Internet-of-things: Moving Target
Defense With Cyberdeception . . . . . . 24:1--24:31
Florian Meier and
Alexander Bazo and
David Elsweiler Using Social Media Data to Analyse Issue
Engagement During the 2017 German
Federal Election . . . . . . . . . . . . 25:1--25:25
Cosmin Avasalcai and
Christos Tsigkanos and
Schahram Dustdar Adaptive Management of Volatile Edge
Systems at Runtime With Satisfiability 26:1--26:21
Onuralp Ulusoy and
Pinar Yolum PANOLA: a Personal Assistant for
Supporting Users in Preserving Privacy 27:1--27:32
Ashima Yadav and
Dinesh Kumar Vishwakarma A Language-independent Network to
Analyze the Impact of COVID-19 on the
World via Sentiment Analysis . . . . . . 28:1--28:30
Yali Yuan and
Chencheng Liang and
Xu Chen and
Thar Baker and
Xiaoming Fu Adaptive Fuzzy Game-Based
Energy-Efficient Localization in $3$D
Underwater Sensor Networks . . . . . . . 29:1--29:20
Nikumani Choudhury and
Rakesh Matam and
Mithun Mukherjee and
Jaime Lloret DADC: a Novel Duty-cycling Scheme for
IEEE 802.15.4 Cluster-tree-based IoT
Applications . . . . . . . . . . . . . . 30:1--30:26
Jianfeng Lu and
Zhao Zhang and
Jiangtao Wang and
Ruixuan Li and
Shaohua Wan A Green Stackelberg-game Incentive
Mechanism for Multi-service Exchange in
Mobile Crowdsensing . . . . . . . . . . 31:1--31:29
Bruno Carpentieri and
Arcangelo Castiglione and
Alfredo De Santis and
Francesco Palmieri and
Raffaele Pizzolante Privacy-preserving Secure Media
Streaming for Multi-user Smart
Environments . . . . . . . . . . . . . . 32:1--32:21
Hongyang Yan and
Nan Jiang and
Kang Li and
Yilei Wang and
Guoyu Yang Collusion-free for Cloud Verification
toward the View of Game Theory . . . . . 33:1--33:21
Wei Liang and
Songyou Xie and
Dafang Zhang and
Xiong Li and
Kuan-ching Li A Mutual Security Authentication Method
for RFID-PUF Circuit Based on Deep
Learning . . . . . . . . . . . . . . . . 34:1--34:20
Mohammad Shorfuzzaman and
M. Shamim Hossain Predictive Analytics of Energy Usage by
IoT-Based Smart Home Appliances for
Green Urban Development . . . . . . . . 35:1--35:26
Gunasekaran Manogaran and
Bharat S. Rawal and
Houbing Song and
Huihui Wang and
Chinghsien Hsu and
Vijayalakshmi Saravanan and
Seifedine Nimer Kadry and
P. Mohamed Shakeel Optimal Energy-Centric Resource
Allocation and Offloading Scheme for
Green Internet of Things Using Machine
Learning . . . . . . . . . . . . . . . . 36:1--36:19
Kamran Ahmad Awan and
Ikram Ud Din and
Abeer Almogren and
Neeraj Kumar and
Ahmad Almogren A Taxonomy of Multimedia-based Graphical
User Authentication for Green Internet
of Things . . . . . . . . . . . . . . . 37:1--37:28
Zhihan Lv and
Ranran Lou and
Amit Kumar Singh and
Qingjun Wang Transfer Learning-powered Resource
Optimization for Green Computing in
5G-Aided Industrial Internet of Things 38:1--38:16
Gunasekaran Manogaran and
Hassan Qudrat-Ullah and
Qin Xin and
Latifur Khan Guest Editorial Introduction for the
Special Section on Deep Learning
Algorithms and Systems for Enhancing
Security in Cloud Services . . . . . . . 39e:1--39e:5
Lea Duji\'c Rodi\'c and
Tomislav Zupanovi\'c and
Toni Perkovi\'c and
Petar Soli\'c and
Joel J. P. C. Rodrigues Machine Learning and Soil Humidity
Sensing: Signal Strength Approach . . . 39:1--39:21
Farhan Ullah and
Muhammad Rashid Naeem and
Abdullah S. Bajahzar and
Fadi Al-Turjman IoT-based Cloud Service for Secured
Android Markets using PDG-based Deep
Learning Classification . . . . . . . . 40:1--40:17
Bharat S. Rawal and
Poongodi M. and
Gunasekaran Manogaran and
Mounir Hamdi Multi-Tier Stack of Block Chain with
Proxy Re-Encryption Method Scheme on the
Internet of Things Platform . . . . . . 41:1--41:20
Syed Atif Moqurrab and
Adeel Anjum and
Abid Khan and
Mansoor Ahmed and
Awais Ahmad and
Gwanggil Jeon Deep-Confidentiality: an IoT-Enabled
Privacy-Preserving Framework for
Unstructured Big Biomedical Data . . . . 42:1--42:21
Derui Wang and
Sheng Wen and
Alireza Jolfaei and
Mohammad Sayad Haghighi and
Surya Nepal and
Yang Xiang On the Neural Backdoor of Federated
Generative Models in Edge Computing . . 43:1--43:21
Huijie Yang and
Jian Shen and
Tianqi Zhou and
Sai Ji and
Pandi Vijayakumar A Flexible and Privacy-Preserving
Collaborative Filtering Scheme in Cloud
Computing for VANETs . . . . . . . . . . 44:1--44:19
Xindi Ma and
Jianfeng Ma and
Saru Kumari and
Fushan Wei and
Mohammad Shojafar and
Mamoun Alazab Privacy-Preserving Distributed
Multi-Task Learning against Inference
Attack in Cloud Computing . . . . . . . 45:1--45:24
Christos L. Stergiou and
Konstantinos E. Psannis and
Brij B. Gupta InFeMo: Flexible Big Data Management
Through a Federated Cloud System . . . . 46:1--46:22
Yasser D. Al-Otaibi A Shared Two-way Cybersecurity Model for
Enhancing Cloud Service Sharing for
Distributed User Applications . . . . . 47:1--47:17
Tu N. Nguyen and
Sherali Zeadally Mobile Crowd-sensing Applications: Data
Redundancies, Challenges, and Solutions 48:1--48:15
Xiao Zheng and
Mingchu Li and
Syed Bilal Hussain Shah and
Dinh-Thuan Do and
Yuanfang Chen and
Constandinos X. Mavromoustakis and
George Mastorakis and
Evangelos Pallis Enhancing Security-Problem-Based Deep
Learning in Mobile Edge Computing . . . 49:1--49:15
Xiongtao Zhang and
Xiaomin Zhu and
Ji Wang and
Weidong Bao and
Laurence T. Yang DANCE: Distributed Generative
Adversarial Networks with Communication
Compression . . . . . . . . . . . . . . 50:1--50:32
Rui Zhang and
Libing Wu and
Shuqin Cao and
Xinrong Hu and
Shan Xue and
Dan Wu and
Qingan Li Task Offloading with Task Classification
and Offloading Nodes Selection for
MEC-Enabled IoV . . . . . . . . . . . . 51:1--51:24
Tingmin Wu and
Wanlun Ma and
Sheng Wen and
Xin Xia and
Cecile Paris and
Surya Nepal and
Yang Xiang Analysis of Trending Topics and
Text-based Channels of Information
Delivery in Cybersecurity . . . . . . . 52:1--52:27
Igor Ivki\'c and
Patrizia Sailer and
Antonios Gouglidis and
Andreas Mauthe and
Markus Tauber A Security Cost Modelling Framework for
Cyber-Physical Systems . . . . . . . . . 53:1--53:31
Heesuk Son and
Dongman Lee An Efficient Interaction Protocol
Inference Scheme for Incompatible
Updates in IoT Environments . . . . . . 54:1--54:25
M. Shamim Hossain and
Changsheng Xu and
Josu Bilbao and
Md. Abdur Rahman and
Abdulmotaleb El Saddik and
Mohamed Bin Zayed Special Section on Edge-AI for Connected
Living . . . . . . . . . . . . . . . . . 55:1--55:??
Prayag Tiwari and
Amit Kumar Jaiswal and
Sahil Garg and
Ilsun You SANTM: Efficient Self-attention-driven
Network for Text Matching . . . . . . . 55:1--55:??
Songwen Pei and
Yusheng Wu and
Jin Guo and
Meikang Qiu Neural Network Pruning by Recurrent
Weights for Finance Market . . . . . . . 56:1--56:??
Mohammad Saidur Rahman and
Ibrahim Khalil and
Xun Yi and
Mohammed Atiquzzaman and
Elisa Bertino A Lossless Data-Hiding based IoT Data
Authenticity Model in Edge-AI for
Connected Living . . . . . . . . . . . . 57:1--57:??
Chaonan Shen and
Kai Zhang and
Jinshan Tang A COVID-19 Detection Algorithm Using
Deep Features and Discrete Social
Learning Particle Swarm Optimization for
Edge Computing Devices . . . . . . . . . 58:1--58:??
Yi Liu and
Ruihui Zhao and
Jiawen Kang and
Abdulsalam Yassine and
Dusit Niyato and
Jialiang Peng Towards Communication-Efficient and
Attack-Resistant Federated Edge Learning
for Industrial Internet of Things . . . 59:1--59:??
Guihong Chen and
Xi Liu and
Mohammad Shorfuzzaman and
Ali Karime and
Yonghua Wang and
Yuanhang Qi MEC-Based Jamming-Aided
Anti-Eavesdropping with Deep
Reinforcement Learning for WBANs . . . . 60:1--60:??
K. Shankar and
Eswaran Perumal and
Mohamed Elhoseny and
Fatma Taher and
B. B. Gupta and
Ahmed A. Abd El-Latif Synergic Deep Learning for Smart Health
Diagnosis of COVID-19 for Connected
Living and Smart Cities . . . . . . . . 61:1--61:??
Min Chen and
Ke Shen and
Rui Wang and
Yiming Miao and
Yingying Jiang and
Kai Hwang and
Yixue Hao and
Guangming Tao and
Long Hu and
Zhongchun Liu Negative Information Measurement at AI
Edge: a New Perspective for Mental
Health Monitoring . . . . . . . . . . . 62:1--62:??
Kaijian Xia and
Wenbing Zhao and
Alireza Jolfaei and
Tamer Ozsu Introduction To The Special Section On
Edge/Fog Computing For Infectious
Disease Intelligence . . . . . . . . . . 63:1--63:??
Zhihan Lv and
Ranran Lou and
Haibin Lv Edge Computing to Solve Security Issues
for Infectious Disease Intelligence
Prevention . . . . . . . . . . . . . . . 63:1--63:??
Yizhang Jiang and
Xiaoqing Gu and
Lei Hua and
Kang Li and
Yuwen Tao and
Bo Li Forecasting Trend of Coronavirus Disease
2019 using Multi-Task Weighted TSK Fuzzy
System . . . . . . . . . . . . . . . . . 64:1--64:??
Tongguang Ni and
Jiaqun Zhu and
Jia Qu and
Jing Xue Labeling Privacy Protection SVM Using
Privileged Information for COVID-19
Diagnosis . . . . . . . . . . . . . . . 65:1--65:??
Changda Wang and
Xiaowei Li and
Elisa Bertino Network Temperature: a Novel Statistical
Index for Networks Measurement and
Management . . . . . . . . . . . . . . . 66:1--66:??
Haipeng Chen and
Andrew Duncklee and
Sushil Jajodia and
Rui Liu and
Sean Mcnamara and
V. S. Subrahmanian PCAM: a Data-driven Probabilistic
Cyber-alert Management Framework . . . . 67:1--67:??
Bo Gu and
Mamoun Alazab and
Ziqi Lin and
Xu Zhang and
Jun Huang AI-Enabled Task Offloading for Improving
Quality of Computational Experience in
Ultra Dense Networks . . . . . . . . . . 68:1--68:??
Lanyu Xu and
Arun Iyengar and
Weisong Shi NLUBroker: a QoE-driven Broker System
for Natural Language Understanding
Services . . . . . . . . . . . . . . . . 69:1--69:??
Trinh Viet Doan and
Roland van Rijswijk-Deij and
Oliver Hohlfeld and
Vaibhav Bajpai An Empirical View on Consolidation of
the Web . . . . . . . . . . . . . . . . 70:1--70:??
Md Arafat Hossain and
Jun Han and
Jean-Guy Schneider and
Jiaojiao Jiang and
Muhammad Ashad Kabir and
Steve Versteeg Extracting Formats of Service Messages
with Varying Payloads . . . . . . . . . 71:1--71:??
Genoveva Vargas-Solar and
Maysaa Khalil and
Javier A. Espinosa-Oviedo and
José-Luis Zechinelli-Martini GREENHOME: a Household Energy
Consumption and CO$_2$ Footprint
Metering Environment . . . . . . . . . . 72:1--72:??
Niki Pavlopoulou and
Edward Curry PoSSUM: an Entity-centric
Publish/Subscribe System for Diverse
Summarization in Internet of Things . . 73:1--73:??
Jacopo Soldani and
Marco Cameriero and
Giulio Paparelli and
Antonio Brogi Modelling and Analysing Replica- and
Fault-aware Management of Horizontally
Scalable Applications . . . . . . . . . 74:1--74:??
Minxian Xu and
Chenghao Song and
Huaming Wu and
Sukhpal Singh Gill and
Kejiang Ye and
Chengzhong Xu esDNN: Deep Neural Network Based
Multivariate Workload Prediction in
Cloud Computing Environments . . . . . . 75:1--75:??
Roberto Yus and
Georgios Bouloukakis and
Sharad Mehrotra and
Nalini Venkatasubramanian The SemIoTic Ecosystem: a Semantic
Bridge between IoT Devices and Smart
Spaces . . . . . . . . . . . . . . . . . 76:1--76:??
Enrico Tedeschi and
Tor-Arne S. Nordmo and
Dag Johansen and
Håvard D. Johansen On Optimizing Transaction Fees in
Bitcoin using AI: Investigation on
Miners Inclusion Pattern . . . . . . . . 77:1--77:??
Ilir Murturi and
Schahram Dustdar DECENT: a Decentralized Configurator for
Controlling Elasticity in Dynamic Edge
Networks . . . . . . . . . . . . . . . . 78:1--78:??
Tu Le and
Danny Yuxing Huang and
Noah Apthorpe and
Yuan Tian SkillBot: Identifying Risky Content for
Children in Alexa Skills . . . . . . . . 79:1--79:??
Hyungjune Shin and
Dongyoung Koo and
Junbeom Hur Secure and Efficient Hybrid Data
Deduplication in Edge Computing . . . . 80:1--80:??
Ching-Hsien Hsu and
Amir H. Alavi and
Mianxiong Dong Introduction to the Special Section on
Cyber Security in Internet of Vehicles 81:1--81:??
Haibo Yi and
Ruinan Chi and
Xin Huang and
Xuejun Cai and
Zhe Nie Improving Security of Internet of
Vehicles Based on Post-quantum
Signatures with Systolic Divisions . . . 82:1--82:??
Song Xiao and
Kai Chen and
Xiaoxiang Ren and
Haitao Yuan Pedestrian Trajectory Prediction in
Heterogeneous Traffic using Facial
Keypoints-based Convolutional
Encoder-decoder Network . . . . . . . . 83:1--83:??
Chandrasekar Ravi and
Anmol Tigga and
G. Thippa Reddy and
Saqib Hakak and
Mamoun Alazab Driver Identification Using Optimized
Deep Learning Model in Smart
Transportation . . . . . . . . . . . . . 84:1--84:??
Yangfan Liang and
Yining Liu and
Brij B. Gupta PPRP: Preserving-Privacy Route Planning
Scheme in VANETs . . . . . . . . . . . . 85:1--85:??
Mohamad Ali Mehrabi and
Alireza Jolfaei Efficient Cryptographic Hardware for
Safety Message Verification in Internet
of Connected Vehicles . . . . . . . . . 86:1--86:??
Xiaojie Wang and
Laisen Nie and
Zhaolong Ning and
Lei Guo and
Guoyin Wang and
Xinbo Gao and
Neeraj Kumar Deep Learning-Based Network Traffic
Prediction for Secure Backbone Networks
in Internet of Vehicles . . . . . . . . 87:1--87:??
Hui Tian and
Fang Peng and
Hanyu Quan and
Chin-Chen Chang Identity-Based Public Auditing for Cloud
Storage of Internet-of-Vehicles Data . . 88:1--88:??
Ramesh Sekaran and
Fadi Al-Turjman and
Rizwan Patan and
Velmani Ramasamy Tripartite Transmitting Methodology for
Intermittently Connected Mobile Network
(ICMN) . . . . . . . . . . . . . . . . . 89:1--89:??
Gunasekaran Manogaran and
Bharat S. Rawal and
Vijayalakshmi Saravanan and
Priyan M. K. and
Qin Xin and
P. Shakeel Token-Based Authorization and
Authentication for Secure Internet of
Vehicles Communication . . . . . . . . . 90:1--90:??
Ao Zhou and
Xiao Ma and
Siyi Gao and
Shangguang Wang Providing Reliable Service for
Parked-vehicle-assisted Mobile Edge
Computing . . . . . . . . . . . . . . . 91:1--91:??
Si Young Jang and
Sung Kyu Park and
Jin Hee Cho and
Dongman Lee CARES: Context-Aware Trust Estimation
for Realtime Crowdsensing Services in
Vehicular Edge Networks . . . . . . . . 92:1--92:??
Mathias Fischer and
Winfried Lamersdorf and
Jörg Liebeherr and
Max Mühlhäuser Introduction to the Special Section on
Recent Advances in Networks and
Distributed Systems . . . . . . . . . . 93:1--93:??
Kurian Polachan and
Chandramani Singh and
T. V. Prabhakar Decentralized Dynamic Scheduling of TCPS
Flows and a Simulator for Time-sensitive
Networking . . . . . . . . . . . . . . . 94:1--94:??
Yevhenii Shudrenko and
Daniel Plöger and
Koojana Kuladinithi and
Andreas Timm-Giel A Novel Approach to Enhance the
End-to-End Quality of Service for
Avionic Wireless Sensor Networks . . . . 95:1--95:??
Thiago Pereira Da Silva and
Thais Batista and
Frederico Lopes and
Aluizio Rocha Neto and
Flávia C. Delicato and
Paulo F. Pires and
Atslands R. Da Rocha Fog Computing Platforms for Smart City
Applications: a Survey . . . . . . . . . 96:1--96:??
Christoph Döpmann and
Felix Fiedler and
Sergio Lucia and
Florian Tschorsch Optimization-Based Predictive Congestion
Control for the Tor Network:
Opportunities and Challenges . . . . . . 97:1--97:??
Chao Wu and
Shingo Horiuchi and
Kenji Murase and
Hiroaki Kikushima and
Kenichi Tayama An Intent-driven DaaS Management
Framework to Enhance User Quality of
Experience . . . . . . . . . . . . . . . 98:1--98:??
Andrei Ciortea and
Xiaomin Zhu and
Calton Pu and
Munindar P. Singh Introduction to the Special Issue on
Multiagent Systems and Services in the
Internet of Things . . . . . . . . . . . 99:1--99:??
Pierre Rust and
Gauthier Picard and
Fano Ramparany Resilient Distributed Constraint
Reasoning to Autonomously Configure and
Adapt IoT Environments . . . . . . . . . 100:1--100:??
Alessandro Ricci and
Angelo Croatti and
Stefano Mariani and
Sara Montagna and
Marco Picone Web of Digital Twins . . . . . . . . . . 101:1--101:??
Haoyu Ren and
Darko Anicic and
Thomas A. Runkler Towards Semantic Management of On-Device
Applications in Industrial IoT . . . . . 102:1--102:??
Lina Barakat and
Phillip Taylor and
Nathan Griffiths and
Simon Miles A Reputation-based Framework for Honest
Provenance Reporting . . . . . . . . . . 103:1--103:??
Timotheus Kampik and
Adnane Mansour and
Olivier Boissier and
Sabrina Kirrane and
Julian Padget and
Terry R. Payne and
Munindar P. Singh and
Valentina Tamma and
Antoine Zimmermann Governance of Autonomous Agents on the
Web: Challenges and Opportunities . . . 104:1--104:??
Vicente GarcÍa-DÍaz and
Jerry Chun-Wei Lin and
Juan Antonio Morente Molinera Introduction to the Special Section on
Edge Computing AI-IoT Integrated Energy
Efficient Intelligent Transportation
System for Smart Cities . . . . . . . . 105:1--105:??
Suresh Chavhan and
Deepak Gupta and
Sarada Prasad Gochhayat and
Chandana B. N. and
Ashish Khanna and
K. Shankar and
Joel J. P. C. Rodrigues Edge Computing AI-IoT Integrated
Energy-efficient Intelligent
Transportation System for Smart Cities 106:1--106:??
Zhuoqun Xia and
Lingxuan Zeng and
Ke Gu and
Xiong Li and
Weijia Jia Conditional Identity Privacy-preserving
Authentication Scheme Based on
Cooperation of Multiple Fog Servers
under Fog Computing-based IoVs . . . . . 107:1--107:??
Michell Boerger and
Philipp Lämmel and
Nikolay Tcholtchev and
Manfred Hauswirth Enabling Short-Term Energy Flexibility
Markets Through Blockchain . . . . . . . 108:1--108:??
Long Chen and
Mianyang Yao and
Yalan Wu and
Jigang Wu EECDN: Energy-efficient Cooperative DNN
Edge Inference in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 109:1--109:??
Sandeep Kumar Sood and
Keshav Singh Rawat and
Dheeraj Kumar Emerging Trends of ICT in Airborne
Disease Prevention . . . . . . . . . . . 110:1--110:??
Pankaj Mishra and
Ahmed Moustafa and
Takayuki Ito Real-time Pricing-based Resource
Allocation in Open Market Environments 1:1--1:??
Jianwei Hao and
Piyush Subedi and
Lakshmish Ramaswamy and
In Kee Kim Reaching for the Sky: Maximizing Deep
Learning Inference Throughput on Edge
Devices with AI Multi-Tenancy . . . . . 2:1--2:??
Rongjunchen Zhang and
Tingmin Wu and
Sheng Wen and
Surya Nepal and
Cecile Paris and
Yang Xiang SAM: Multi-turn Response Selection Based
on Semantic Awareness Matching . . . . . 3:1--3:??
Sharon Hirsch and
Slava Novgorodov and
Ido Guy and
Alexander Nus The Tip of the Buyer: Extracting Product
Tips from Reviews . . . . . . . . . . . 4:1--4:??
Carlos Hernández-Castro and
David F. Barrero and
Maria Dolores R-Moreno Breaking CaptchaStar Using the BASECASS
Methodology . . . . . . . . . . . . . . 5:1--5:??
Luigi Asprino and
Enrico Daga and
Aldo Gangemi and
Paul Mulholland Knowledge Graph Construction with a
Façade: a Unified Method to Access
Heterogeneous Data Sources on the Web 6:1--6:??
Weiwei Fang and
Wenyuan Xu and
Chongchong Yu and
Neal. N. Xiong Joint Architecture Design and Workload
Partitioning for DNN Inference on
Industrial IoT Clusters . . . . . . . . 7:1--7:??
Iulia Paun and
Yashar Moshfeghi and
Nikos Ntarmos White Box: On the Prediction of
Collaborative Filtering Recommendation
Systems' Performance . . . . . . . . . . 8:1--8:??
Yuanjun Dai and
An Wang and
Yang Guo and
Songqing Chen Elastically Augmenting the Control-path
Throughput in SDN to Deal with Internet
DDoS Attacks . . . . . . . . . . . . . . 9:1--9:??
Feijie Wu and
Ho Yin Yuen and
Henry Chan and
Victor C. M. Leung and
Wei Cai Facilitating Serverless Match-based
Online Games with Novel Blockchain
Technologies . . . . . . . . . . . . . . 10:1--10:??
Massimo La Morgia and
Alessandro Mei and
Francesco Sassi and
Julinda Stefa The Doge of Wall Street: Analysis and
Detection of Pump and Dump
Cryptocurrency Manipulations . . . . . . 11:1--11:??
Man Zeng and
Dandan Li and
Pei Zhang and
Kun Xie and
Xiaohong Huang Federated Route Leak Detection in
Inter-domain Routing with Privacy
Guarantee . . . . . . . . . . . . . . . 12:1--12:??
Gonul Ayci and
Murat Sensoy and
Arzucan Özgür and
Pinar Yolum Uncertainty-Aware Personal Assistant for
Making Personalized Privacy Decisions 13:1--13:??
Andrea De Salve and
Luca Franceschi and
Andrea Lisi and
Paolo Mori and
Laura Ricci L2DART: a Trust Management System
Integrating Blockchain and Off-Chain
Computation . . . . . . . . . . . . . . 14:1--14:??
Wenzhao Zhang and
Yuxuan Zhang and
Hongchang Fan and
Yi Gao and
Wei Dong A Low-code Development Framework for
Cloud-native Edge Systems . . . . . . . 15:1--15:??
Gregorius Satia Budhi and
Raymond Chiong A Multi-type Classifier Ensemble for
Detecting Fake Reviews Through
Textual-based Feature Extraction . . . . 16:1--16:??
Chong Zhang and
Qiang Guo and
Luoyi Fu and
Jiaxin Ding and
Xinde Cao and
Fei Long and
Xinbing Wang and
Chenghu Zhou Finding the Source in Networks: an
Approach Based on Structural Entropy . . 17:1--17:??
Habib Mostafaei and
Shafi Afridi SDN-enabled Resource Provisioning
Framework for Geo-Distributed Streaming
Analytics . . . . . . . . . . . . . . . 18:1--18:??
Martino Trevisan and
Francesca Soro and
Marco Mellia and
Idilio Drago and
Ricardo Morla Attacking DoH and ECH: Does Server Name
Encryption Protect Users' Privacy? . . . 19:1--19:??
Sidharth Sharma and
Aniruddha Kushwaha and
Mohammad Alizadeh and
George Varghese and
Ashwin Gumaste Tuneman: Customizing Networks to
Guarantee Application Bandwidth and
Latency . . . . . . . . . . . . . . . . 20:1--20:??
Bolin Zhang and
Zhiying Tu and
Shaoshi Hang and
Dianhui Chu and
Xiaofei Xu Conco-ERNIE: Complex User Intent Detect
Model for Smart Healthcare Cognitive Bot 21:1--21:??
Romain Fouquet and
Pierre Laperdrix and
Romain Rouvoy Breaking Bad: Quantifying the Addiction
of Web Elements to JavaScript . . . . . 22:1--22:??
Yu-Jhen Wang and
Anthony J. T. Lee Movie Account Recommendation on
Instagram . . . . . . . . . . . . . . . 23:1--23:??
Quan Z. Sheng and
Arun Kumar Sangaiah and
Ankit Chaudhary Guest Editors' Introduction for Special
Issue on Applications of Computational
Linguistics in Multimedia IoT Services 24:1--24:??
Mu-Yen Chen and
Yi-Wei Lai and
Jiunn-Woei Lian Using Deep Learning Models to Detect
Fake News about COVID-19 . . . . . . . . 25:1--25:??
Yucheng Dong and
Qin Ran and
Xiangrui Chao and
Congcong Li and
Shui Yu Personalized Individual Semantics
Learning to Support a Large-Scale
Linguistic Consensus Process . . . . . . 26:1--26:??
Yazhou Zhang and
Dan Ma and
Prayag Tiwari and
Chen Zhang and
Mehedi Masud and
Mohammad Shorfuzzaman and
Dawei Song Stance-level Sarcasm Detection with BERT
and Stance-centered Graph Attention
Networks . . . . . . . . . . . . . . . . 27:1--27:??
Yi-Bing Lin and
Yuan-Fu Liao and
Sin-Horng Chen and
Shaw-Hwa Hwang and
Yih-Ru Wang VoiceTalk: Multimedia-IoT Applications
for Mixing Mandarin, Taiwanese, and
English . . . . . . . . . . . . . . . . 28:1--28:??
Pedro Victor Borges and
Chantal Taconet and
Sophie Chabridon and
Denis Conan and
Everton Cavalcante and
Thais Batista Taming Internet of Things Application
Development with the IoTvar Middleware 29:1--29:??
Hucheng Wang and
Zhi Wang and
Lei Zhang and
Xiaonan Luo and
Xinheng Wang A Highly Stable Fusion Positioning
System of Smartphone under NLoS Acoustic
Indoor Environment . . . . . . . . . . . 30:1--30:??
Arvind Kumar Gangwar and
Sandeep Kumar Concept Drift in Software Defect
Prediction: a Method for Detecting and
Handling the Drift . . . . . . . . . . . 31:1--31:??
Jing Chen and
Wenjun Jiang and
Jie Wu and
Kenli Li and
Keqin Li Dynamic Personalized POI Sequence
Recommendation with Fine-Grained
Contexts . . . . . . . . . . . . . . . . 32:1--32:??
Luca Muscariello and
Michele Papalini and
Olivier Roques and
Mauro Sardara and
Arthur Tran Van Securing Scalable Real-time Multiparty
Communications with Hybrid
Information-centric Networking . . . . . 33:1--33:??
Yibin Xu and
Jianhua Shao and
Tijs Slaats and
Boris Düdder MWPoW+: a Strong Consensus Protocol for
Intra-Shard Consensus in Blockchain
Sharding . . . . . . . . . . . . . . . . 34:1--34:??
Li Yang and
Xi Li and
Zhuoru Ma and
Lu Li and
Neal Xiong and
Jianfeng Ma IRGA: an Intelligent Implicit Real-time
Gait Authentication System in
Heterogeneous Complex Scenarios . . . . 35:1--35:??
Shancang Li and
Surya Nepal and
Theo Tryfonas and
Hongwei Li Blockchain-based Zero Trust
Cybersecurity in the Internet of Things 36:1--36:??
Ying Li and
Yaxin Yu and
Xingwei Wang Three-tier Storage Framework Based on
TBchain and IPFS for Protecting IoT
Security and Privacy . . . . . . . . . . 37:1--37:??
Keke Gai and
Yufeng She and
Liehuang Zhu and
Kim-Kwang Raymond Choo and
Zhiguo Wan A Blockchain-Based Access Control Scheme
for Zero Trust Cross-Organizational Data
Sharing . . . . . . . . . . . . . . . . 38:1--38:??
Mohammad Wazid and
Prosanta Gope BACKM-EHA: a Novel Blockchain-enabled
Security Solution for IoMT-based
E-healthcare Applications . . . . . . . 39:1--39:??
Fuchen Ma and
Meng Ren and
Fu Ying and
Wanting Sun and
Houbing Song and
Heyuan Shi and
Yu Jiang and
Huizhong Li V-Gas: Generating High Gas Consumption
Inputs to Avoid Out-of-Gas Vulnerability 40:1--40:??
Zhenyu Li and
Yong Ding and
Honghao Gao and
Bo Qu and
Yujue Wang and
Jun Li A Highly Compatible Verification
Framework with Minimal Upgrades to
Secure an Existing Edge Network . . . . 41:1--41:??
Jin Wang and
Jiahao Chen and
Neal Xiong and
Osama Alfarraj and
Amr Tolba and
Yongjun Ren S-BDS: an Effective Blockchain-based
Data Storage Scheme in Zero-Trust IoT 42:1--42:??
Amjad Alsirhani and
Muhammad Ali Khan and
Abdullah Alomari and
Sauda Maryam and
Aiman Younas and
Muddesar Iqbal and
Muhammad Hameed Siqqidi and
Amjad Ali Securing Low-Power Blockchain-enabled
IoT Devices against Energy Depletion
Attack . . . . . . . . . . . . . . . . . 43:1--43:??
Fan Wang and
Guangshun Li and
Yilei Wang and
Wajid Rafique and
Mohammad R. Khosravi and
Guanfeng Liu and
Yuwen Liu and
Lianyong Qi Privacy-Aware Traffic Flow Prediction
Based on Multi-Party Sensor Data with
Zero Trust in Smart City . . . . . . . . 44:1--44:??
Luca Gioacchini and
Luca Vassio and
Marco Mellia and
Idilio Drago and
Zied Ben Houidi and
Dario Rossi i-DarkVec: Incremental Embeddings for
Darknet Traffic Analysis . . . . . . . . 45:1--45:??
Mohammed Bahutair and
Athman Bouguettaya An End-to-end Trust Management Framework
for Crowdsourced IoT Services . . . . . 46:1--46:??
Keke Chen and
Yuechun Gu and
Sagar Sharma DisguisedNets: Secure Image Outsourcing
for Confidential Model Training in
Clouds . . . . . . . . . . . . . . . . . 47:1--47:??
Hossein Chegini and
Fernando Beltran and
Aniket Mahanti Designing and Developing a Weed
Detection Model for California Thistle 48:1--48:??
Gautam Srivastava and
Jerry Chun-Wei Lin and
Calton Pu and
Yudong Zhang Special Section on ``Advances in
Cyber-Manufacturing: Architectures,
Challenges, & Future Research
Directions'' . . . . . . . . . . . . . . 49:1--49:??
Xiuwen Fu and
Pasquale Pace and
Gianluca Aloi and
Antonio Guerrieri and
Wenfeng Li and
Giancarlo Fortino Tolerance Analysis of
Cyber-Manufacturing Systems to Cascading
Failures . . . . . . . . . . . . . . . . 50:1--50:??
Yirui Wu and
Hao Cao and
Guoqiang Yang and
Tong Lu and
Shaohua Wan Digital Twin of Intelligent Small
Surface Defect Detection with
Cyber-manufacturing Systems . . . . . . 51:1--51:??
Lizhen Deng and
Guoxia Xu and
Jiaqi Pi and
Hu Zhu and
Xiaokang Zhou Unpaired Self-supervised Learning for
Industrial Cyber-Manufacturing Spectrum
Blind Deconvolution . . . . . . . . . . 52:1--52:??
Jan Pennekamp and
Markus Dahlmanns and
Frederik Fuhrmann and
Timo Heutmann and
Alexander Kreppein and
Dennis Grunert and
Christoph Lange and
Robert H. Schmitt and
Klaus Wehrle Offering Two-way Privacy for Evolved
Purchase Inquiries . . . . . . . . . . . 53:1--53:??
Usman Ahmed and
Jerry Chun-Wei Lin and
Gautam Srivastava Exploring the Potential of Cyber
Manufacturing System in the Digital Age 54:1--54:??
Pei-Cheng Song and
Jeng-Shyang Pan and
Han-Chieh Chao and
Shu-Chuan Chu Collaborative Hotspot Data Collection
with Drones and 5G Edge Computing in
Smart City . . . . . . . . . . . . . . . 55:1--55:??
Wenzhao Zhang and
Yi Gao and
Wei Dong Providing Realtime Support for
Containerized Edge Services . . . . . . 56:1--56:??
Loredana Caruccio and
Gaetano Cimino and
Stefano Cirillo and
Domenico Desiato and
Giuseppe Polese and
Genoveffa Tortora Malicious Account Identification in
Social Network Platforms . . . . . . . . 57:1--57:??
Fanyi Yang and
Huifang Ma and
Cairui Yan and
Zhixin Li and
Liang Chang Polarized Communities Search via
Co-guided Random Walk in Attributed
Signed Networks . . . . . . . . . . . . 58:1--58:??
Wenhua Xiao and
Xudong Fang and
Bixin Liu and
Ji Wang and
Xiaomin Zhu UNION: Fault-tolerant Cooperative
Computing in Opportunistic Mobile Edge
Cloud . . . . . . . . . . . . . . . . . 59:1--59:??
Zhiyi Song and
Dipankar Chaki and
Abdallah Lakhdari and
Athman Bouguettaya Positional Encoding-based Resident
Identification in Multi-resident Smart
Homes . . . . . . . . . . . . . . . . . 1:1--1:??
Bofeng Pan and
Natalia Stakhanova and
Zhongwen Zhu EtherShield: Time-interval Analysis for
Detection of Malicious Behavior on
Ethereum . . . . . . . . . . . . . . . . 2:1--2:??
Chao Dong and
Fang Wang and
Dan Feng DxHash: a Memory-saving Consistent
Hashing Algorithm . . . . . . . . . . . 3:1--3:??
Jiashu Wu and
Hao Dai and
Kenneth B. Kent and
Jerome Yen and
Chengzhong Xu and
Yang Wang Open Set Dandelion Network for IoT
Intrusion Detection . . . . . . . . . . 4:1--4:??
Xuezheng Yang and
Zhiwen Zeng and
Anfeng Liu and
Neal N. Xiong and
Shaobo Zhang ADTO: a Trust Active Detecting-based
Task Offloading Scheme in Edge Computing
for Internet of Things . . . . . . . . . 5:1--5:??
Yi-Cheng Chen and
Wang-Chien Lee A Novel Cross-Domain Recommendation with
Evolution Learning . . . . . . . . . . . 6:1--6:??
Anuj Sachan and
Neetesh Kumar SDN-enabled Quantized LQR for Smart
Traffic Light Controller to Optimize
Congestion . . . . . . . . . . . . . . . 7:1--7:??
Wen Li and
Lingfeng Bao and
Jiachi Chen and
John Grundy and
Xin Xia and
Xiaohu Yang Market Manipulation of Cryptocurrencies:
Evidence from Social Media and
Transaction Data . . . . . . . . . . . . 8:1--8:??
Fabien Charmet and
Tomohiro Morikawa and
Akira Tanaka and
Takeshi Takahashi VORTEX: Visual phishing detectiOns aRe
Through EXplanations . . . . . . . . . . 9:1--9:??
Yanming Chen and
Tong Luo and
Weiwei Fang and
Neal. N. Xiong EdgeCI: Distributed Workload Assignment
and Model Partitioning for CNN Inference
on Edge Clusters . . . . . . . . . . . . 10:1--10:??
Zichen Wang and
Xiangshan Gao and
Cong Wang and
Peng Cheng and
Jiming Chen Efficient Vertical Federated Unlearning
via Fast Retraining . . . . . . . . . . 11:1--11:??
Mohan Baruwal Chhetri and
Shahroz Tariq and
Ronal Singh and
Fatemeh Jalalvand and
Cecile Paris and
Surya Nepal Towards Human-AI Teaming to Mitigate
Alert Fatigue in Security Operations
Centres . . . . . . . . . . . . . . . . 12:1--12:??
Ali Akbar Vali and
Sadoon Azizi and
Mohammad Shojafar RESP: a Recursive Clustering Approach
for Edge Server Placement in Mobile Edge
Computing . . . . . . . . . . . . . . . 13:1--13:??
Sepehr Saryazdi and
Balsam Alkouz and
Athman Bouguettaya and
Abdallah Lakhdari Using Reinforcement Learning and Error
Models for Drone Precise Landing . . . . 14:1--14:??
Aswani Aguru and
Suresh Erukala OTI-IoT: a Blockchain-based Operational
Threat Intelligence Framework for
Multi-vector DDoS Attacks . . . . . . . 15:1--15:??
Mohammed Jasim and
Nazli Siasi Local Load Migration in High-Capacity
Fog Computing . . . . . . . . . . . . . 16:1--16:??
Rundong Gan and
Le Wang and
Liang Xue and
Xiaodong Lin Exposing Stealthy Wash Trading on
Automated Market Maker Exchanges . . . . 17:1--17:??
Jia Liu and
Jian Wang and
Guosheng Zhao Conscious Task Recommendation via
Cognitive Reasoning Computing in Mobile
Crowd Sensing . . . . . . . . . . . . . 18:1--18:??
Jian Wang and
Delei Zhao and
Guosheng Zhao Malicious Participants and Fake Task
Detection Incorporating Gaussian Bias 19:1--19:??
Hassan A. Shafei and
Chiu C. Tan Enhancing Alexa Skill Testing Through
Improved Utterance Discovery . . . . . . 20:1--20:??
Sidharth Sharma and
Admela Jukan and
Aashi Malik and
Ashwin Gumaste A Network Calculus Model for SFC
Realization and Traffic Bounds
Estimation in Data Centers . . . . . . . 21:1--21:??
Zelin Wan and
Jin-Hee Cho and
Mu Zhu and
Ahmed Anwar and
Charles Kamhoua and
Munindar Singh Optimizing Effectiveness and Defense of
Drone Surveillance Missions via Honey
Drones . . . . . . . . . . . . . . . . . 22:1--22:??
Keyang Yu and
Qi Li and
Dong Chen and
Liting Hu Safeguarding User-Centric Privacy in
Smart Homes . . . . . . . . . . . . . . 23:1--23:??
Simon Mayer and
Arne Broering and
Kimberly Garcia and
Konstantinos Fysarakis and
Beatriz Soret Introduction to the Special Issue on
Distributed Intelligence on the Internet 24:1--24:??
Wenjun Zhang and
Xiaoli Liu and
Sasu Tarkoma FedGK: Communication-Efficient Federated
Learning through Group-Guided Knowledge
Distillation . . . . . . . . . . . . . . 25:1--25:??
Vidushi Agarwal and
Shruti Mishra and
Sujata Pal Towards a Sustainable Blockchain: a
Peer-to-Peer Federated Learning based
Approach . . . . . . . . . . . . . . . . 26:1--26:??
Akrit Mudvari and
Antero Vainio and
Iason Ofeidis and
Sasu Tarkoma and
Leandros Tassiulas Adaptive Compression-Aware Split
Learning and Inference for Enhanced
Network Efficiency . . . . . . . . . . . 27:1--27:??
Arturo Barriga and
José A. Barriga and
Miguel A. Pérez-Toledano and
Pedro J. Clemente Model-Driven Development Towards
Distributed Intelligent Systems . . . . 28:1--28:??
Mingyuan Zang and
Changgang Zheng and
Tomasz Koziak and
Noa Zilberman and
Lars Dittmann Federated In-Network Machine Learning
for Privacy-Preserving IoT Traffic
Analysis . . . . . . . . . . . . . . . . 29:1--29:??
Shuming Fan and
Hongjian Shi and
Chenpei Wang and
Ruhui Ma and
Xiaoming Wang RFL-LSU: a Robust Federated Learning
Approach with Localized Stepwise Updates 30:1--30:??
Ahmad Esmaeili and
Julia Rayz and
Eric Matson Hybrid Algorithm Selection and
Hyperparameter Tuning on Distribute
Machine Learning Resources: Hierarchical
Agent-based Approach . . . . . . . . . . 31:1--31:??
Jaideep Vaidya Editorial . . . . . . . . . . . . . . . 1:1--1:??
Sheik Mohammad Mostakim Fattah and
Athman Bouguettaya Signature-based IaaS Performance Change
Detection . . . . . . . . . . . . . . . 2:1--2:??
Dimitris Mouris and
Nektarios Georgios Tsoutsos Masquerade: Verifiable Multi-Party
Aggregation with Secure Multiplicative
Commitments . . . . . . . . . . . . . . 3:1--3:??
Jiajun Wang and
Pengfei Lin and
Xingjian Ding and
Jianxiong Guo and
Zhiqing Tang and
Deying Li and
Weili Wu Online Worker Scheduling for Maximizing
Long-Term Utility in Crowdsourcing with
Unknown Quality . . . . . . . . . . . . 4:1--4:??
Saeed Mirpour Marzuni and
Adel Toosi and
Abdorreza Savadi and
Mahmud Naghibzadeh and
David Taniar Optimizing Geo-Distributed Data
Processing with Resource Heterogeneity
over the Internet . . . . . . . . . . . 5:1--5:??
Peikun Ni and
Barbara Guidi and
Andrea Michienzi and
Jianming Zhu Relieving Overexposure in Information
Diffusion Through a Budget Multi-stage
Allocation . . . . . . . . . . . . . . . 6:1--6:??
Jiamin Lin and
Balsam Alkouz and
Athman Bouguettaya and
Amani Abu Safia Dynamic and Immersive Framework for
Drone Delivery Services in Skyway
Networks . . . . . . . . . . . . . . . . 7:1--7:??
Jiamei Lv and
Yuxiang Lin and
Mingxin Hou and
Yeming Li and
Yi Gao and
Wei Dong Accurate Bandwidth and Delay Prediction
for 5G Cellular Networks . . . . . . . . 8:1--8:??
Phu Nguyen and
Huu-Ha Nguyen and
Phu Phung and
Hong-Linh Truong and
Thomas Cheung Advanced Context-Sensitive Access
Management for Edge-Driven IoT Data
Sharing as a Service . . . . . . . . . . 9:1--9:??
Ying Li and
Xingwei Wang and
Haodong Li and
Praveen Kumar Donta and
Min Huang and
Schahram Dustdar Communication-Efficient Federated
Learning for Heterogeneous Clients . . . 10:1--10:??
Boyu Fan and
Xiang Su and
Sasu Tarkoma and
Pan Hui HeLoRA: LoRA-heterogeneous Federated
Fine-tuning for Foundation Models . . . 11:1--11:??
Kaijie Gong and
Ruiqi Yang and
Haoyu Li and
Yi Gao and
Wei Dong Optimizing WebAssembly Bytecode for IoT
Devices Using Deep Reinforcement
Learning . . . . . . . . . . . . . . . . 12:1--12:??