Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACM Transactions on Internet Technology
ACM Press
 
   
 
Options:
 
  1-10 of 36 reviews Date Reviewed 
  Internet of Things (IoT): smart and secure service delivery
Bertino E., Choo K., Georgakopolous D., Nepal S.  ACM Transactions on Internet Technology 16(4): Article No. 22, 2016. Type: Article

The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in the coming y...

Mar 31 2017
  Towards anomalous diffusion sources detection in a large network
Zhang P., He J., Long G., Huang G., Zhang C.  ACM Transactions on Internet Technology 16(1): 1-24, 2016. Type: Article

The identification of diffusion sources in a network is an interesting and important problem. A solution to this problem may be used, for example, for solving security problems such as finding the source of false or malicious information being spr...

Apr 21 2016
  The effect of data caps upon ISP service tier design and users
Dai W., Jordan S.  ACM Transactions on Internet Technology 15(2): 1-28, 2015. Type: Article

Data caps are known as an effective tool to manage people’s data usage over cellular or Internet service provider (ISP) networks. Since many people control their data usage to avoid overage charges, there has been argument around the data ca...

Nov 12 2015
  Cost-aware cloud bursting for enterprise applications
Guo T., Sharma U., Shenoy P., Wood T., Sahu S.  ACM Transactions on Internet Technology 13(3): 1-24, 2014. Type: Article

Seagull, a system to optimally manage cloud bursting, is described in this paper; optimization is with respect to the number and size of virtual machine (VM) images and total data transfer. A performance evaluation of Seagull is also provided. The...

Oct 6 2014
  Dissecting darknets: measurement and performance analysis
Chu X., Chen X., Jia A., Pouwelse J., Epema D.  ACM Transactions on Internet Technology 13(3): 1-25, 2014. Type: Article

If you are old enough, you probably remember Napster, a music downloading service using peer-to-peer (P2P) technology. Before Napster, file sharing, or any network service for that matter, used the client-server model, where a server is responsibl...

Aug 22 2014
  Exploiting and maintaining materialized views for XML keyword queries
Liu Z., Chen Y.  ACM Transactions on Internet Technology 12(2): 1-27, 2012. Type: Article

The concept of Extensible Markup Language (XML) keyword searching is an interesting subset of query processing, as XML (along with its variants) has become the main web data representation format. This paper analyzes “how to efficiently eval...

Apr 17 2013
  Minersoft: software retrieval in grid and cloud computing infrastructures
Dikaiakos M., Katsifodimos A., Pallis G.  ACM Transactions on Internet Technology 12(1): 1-34, 2012. Type: Article

Commercial cloud providers such as Amazon and research grids such as Enabling Grids for E-Science (EGEE) are playing an increasingly important role in computing, especially in handling issues with big data. However, with hundreds of cloud and grid...

Oct 29 2012
   One-time cookies: preventing session hijacking attacks with stateless authentication tokens
Dacosta I., Chakradeo S., Ahamad M., Traynor P.  ACM Transactions on Internet Technology 12(1): 1-24, 2012. Type: Article

The Web generally uses protocols that are essentially stateless, but applications often depend on context and prior actions. Web 2.0 further complicates how we must deal with the gap between stateless protocols and some notion of session required ...

Oct 8 2012
  Load balancing and range queries in P2P systems using P-Ring
Crainiceanu A., Linga P., Machanavajjhala A., Gehrke J., Shanmugasundaram J.  ACM Transactions on Internet Technology 10(4): 1-30, 2011. Type: Article

P-Ring is a new peer-to-peer (P2P) index structure. This paper introduces and describes this fully distributed, fault-tolerant structure that provides load balancing and logarithmic search performance while supporting both equality and range queri...

Sep 23 2011
  An online blog reading system by topic clustering and personalized ranking
Li X., Yan J., Fan W., Liu N., Yan S., Chen Z.  ACM Transactions on Internet Technology 9(3): 1-26, 2009. Type: Article

The authors propose a personalized blog reader (PBR) system that helps bloggers find interesting posts. Their proposal includes an online incremental clustering algorithm that uses blog link and content information, and, for personalized blog rank...

Oct 19 2009
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy