w/in this Title
ACM Transactions on Internet Technology
1-10 of 36 reviews
Internet of Things (IoT): smart and secure service delivery
Bertino E., Choo K., Georgakopolous D., Nepal S. ACM Transactions on Internet Technology 16(4): Article No. 22, 2016. Type: Article
The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in the coming y...
Mar 31 2017
Towards anomalous diffusion sources detection in a large network
Zhang P., He J., Long G., Huang G., Zhang C. ACM Transactions on Internet Technology 16(1): 1-24, 2016. Type: Article
The identification of diffusion sources in a network is an interesting and important problem. A solution to this problem may be used, for example, for solving security problems such as finding the source of false or malicious information being spr...
Apr 21 2016
The effect of data caps upon ISP service tier design and users
Dai W., Jordan S. ACM Transactions on Internet Technology 15(2): 1-28, 2015. Type: Article
Data caps are known as an effective tool to manage people’s data usage over cellular or Internet service provider (ISP) networks. Since many people control their data usage to avoid overage charges, there has been argument around the data ca...
Nov 12 2015
Cost-aware cloud bursting for enterprise applications
Guo T., Sharma U., Shenoy P., Wood T., Sahu S. ACM Transactions on Internet Technology 13(3): 1-24, 2014. Type: Article
Seagull, a system to optimally manage cloud bursting, is described in this paper; optimization is with respect to the number and size of virtual machine (VM) images and total data transfer. A performance evaluation of Seagull is also provided. The...
Oct 6 2014
Dissecting darknets: measurement and performance analysis
Chu X., Chen X., Jia A., Pouwelse J., Epema D. ACM Transactions on Internet Technology 13(3): 1-25, 2014. Type: Article
If you are old enough, you probably remember Napster, a music downloading service using peer-to-peer (P2P) technology. Before Napster, file sharing, or any network service for that matter, used the client-server model, where a server is responsibl...
Aug 22 2014
Exploiting and maintaining materialized views for XML keyword queries
Liu Z., Chen Y. ACM Transactions on Internet Technology 12(2): 1-27, 2012. Type: Article
The concept of Extensible Markup Language (XML) keyword searching is an interesting subset of query processing, as XML (along with its variants) has become the main web data representation format. This paper analyzes “how to efficiently eval...
Apr 17 2013
Minersoft: software retrieval in grid and cloud computing infrastructures
Dikaiakos M., Katsifodimos A., Pallis G. ACM Transactions on Internet Technology 12(1): 1-34, 2012. Type: Article
Commercial cloud providers such as Amazon and research grids such as Enabling Grids for E-Science (EGEE) are playing an increasingly important role in computing, especially in handling issues with big data. However, with hundreds of cloud and grid...
Oct 29 2012
One-time cookies: preventing session hijacking attacks with stateless authentication tokens
Dacosta I., Chakradeo S., Ahamad M., Traynor P. ACM Transactions on Internet Technology 12(1): 1-24, 2012. Type: Article
The Web generally uses protocols that are essentially stateless, but applications often depend on context and prior actions. Web 2.0 further complicates how we must deal with the gap between stateless protocols and some notion of session required ...
Oct 8 2012
Load balancing and range queries in P2P systems using P-Ring
Crainiceanu A., Linga P., Machanavajjhala A., Gehrke J., Shanmugasundaram J. ACM Transactions on Internet Technology 10(4): 1-30, 2011. Type: Article
P-Ring is a new peer-to-peer (P2P) index structure. This paper introduces and describes this fully distributed, fault-tolerant structure that provides load balancing and logarithmic search performance while supporting both equality and range queri...
Sep 23 2011
An online blog reading system by topic clustering and personalized ranking
Li X., Yan J., Fan W., Liu N., Yan S., Chen Z. ACM Transactions on Internet Technology 9(3): 1-26, 2009. Type: Article
The authors propose a personalized blog reader (PBR) system that helps bloggers find interesting posts. Their proposal includes an online incremental clustering algorithm that uses blog link and content information, and, for personalized blog rank...
Oct 19 2009
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.