


default search action
ACM Transactions on Internet Technology, Volume 22
Volume 22, Number 1, February 2022
- Gaurav Singal

, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha, Deepak Garg
, Neeraj Kumar
:
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. 1:1-1:27 - Iram Bibi

, Adnan Akhunzada
, Jahanzaib Malik
, Muhammad Khurram Khan
, Muhammad Dawood:
Secure Distributed Mobile Volunteer Computing with Android. 2:1-2:21 - Chen Chen, Lei Liu, Shaohua Wan, Xiaozhe Hui, Qingqi Pei:

Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction. 3:1-3:18 - Weiwei Lin, Tiansheng Huang, Xin Li

, Fang Shi, Xiumin Wang, Ching-Hsien Hsu:
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme. 4:1-4:23 - Nan Jiang

, Debin Huang, Jing Chen, Jie Wen, Heng Zhang, Honglong Chen:
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV. 5:1-5:23 - Muhammad Junaid, Adnan Sohail, Fadi M. Al-Turjman

, Rashid Ali:
Agile Support Vector Machine for Energy-efficient Resource Allocation in IoT-oriented Cloud using PSO. 6:1-6:35 - Afiya Ayman, Amutheezan Sivagnanam

, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles. 7:1-7:29 - Laura Verde, Nadia Brancati, Giuseppe De Pietro, Maria Frucci, Giovanna Sannino

:
A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments. 8:1-8:16 - Rahul Kumar

, Ankur Gupta
, Harkirat Singh Arora
, Balasubramanian Raman
:
IBRDM: An Intelligent Framework for Brain Tumor Classification Using Radiomics- and DWT-based Fusion of MRI Sequences. 9:1-9:30 - Yanchen Qiao

, Weizhe Zhang, Xiaojiang Du, Mohsen Guizani:
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security. 10:1-10:22 - David J. Major, Danny Yuxing Huang, Marshini Chetty, Nick Feamster:

Alexa, Who Am I Speaking To?: Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa. 11:1-11:22 - Marwa Daaji

, Ali Ouni, Mohamed Mohsen Gammoudi
, Salah Bouktif, Mohamed Wiem Mkaouer
:
Multi-criteria Web Services Selection: Balancing the Quality of Design and Quality of Service. 12:1-12:31 - Sajib Mistry

, Lie Qu, Athman Bouguettaya:
Layer-based Composite Reputation Bootstrapping. 13:1-13:28 - Ghazale Amel Zendehdel

, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova
, Erik J. Scheme:
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices. 14:1-14:31 - Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hsiang Lu, George K. Thiruvathukal:

Automated Discovery of Network Cameras in Heterogeneous Web Pages. 15:1-15:25 - Menatalla Abououf, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Ernesto Damiani:

Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model. 16:1-16:28 - Ovidiu Dan

, Vaibhav Parikh, Brian D. Davison
:
IP Geolocation through Reverse DNS. 17:1-17:29 - Di Zhang, Feng Xu, Chi-Man Pun, Yang Yang, Rushi Lan

, Liejun Wang, Yujie Li, Hao Gao
:
Virtual Reality Aided High-Quality 3D Reconstruction by Remote Drones. 18:1-18:20 - Zakaria Benomar

, Francesco Longo
, Giovanni Merlino
, Antonio Puliafito:
Cloud-based Network Virtualization in IoT with OpenStack. 19:1-19:26 - Jingjing Wang, Wenjun Jiang

, Kenli Li, Guojun Wang, Keqin Li:
Incremental Group-Level Popularity Prediction in Online Social Networks. 20:1-20:26 - Alessio Pagani, Zhuangkun Wei

, Ricardo Silva, Weisi Guo:
Neural Network Approximation of Graph Fourier Transform for Sparse Sampling of Networked Dynamics. 21:1-21:18 - Zhenyu Fan, Wang Yang, Fan Wu

, Jing Cao, Weisong Shi:
Serving at the Edge: An Edge Computing Service Architecture Based on ICN. 22:1-22:27 - Mengmeng Ge

, Jin-Hee Cho, Dong Seong Kim
, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. 24:1-24:31 - Florian Meier

, Alexander Bazo, David Elsweiler:
Using Social Media Data to Analyse Issue Engagement During the 2017 German Federal Election. 25:1-25:25 - Cosmin Avasalcai

, Christos Tsigkanos
, Schahram Dustdar
:
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability. 26:1-26:21 - Onuralp Ulusoy

, Pinar Yolum:
PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy. 27:1-27:32 - Ashima Yadav, Dinesh Kumar Vishwakarma

:
A Language-independent Network to Analyze the Impact of COVID-19 on the World via Sentiment Analysis. 28:1-28:30
Volume 22, Number 2, May 2022
- Yali Yuan, Chencheng Liang, Xu Chen, Thar Baker

, Xiaoming Fu:
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks. 29:1-29:20 - Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee

, Jaime Lloret:
DADC: A Novel Duty-cycling Scheme for IEEE 802.15.4 Cluster-tree-based IoT Applications. 30:1-30:26 - Jianfeng Lu, Zhao Zhang, Jiangtao Wang

, Ruixuan Li, Shaohua Wan:
A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing. 31:1-31:29 - Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis

, Francesco Palmieri, Raffaele Pizzolante:
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments. 32:1-32:21 - Hongyang Yan, Nan Jiang, Kang Li, Yilei Wang, Guoyu Yang:

Collusion-free for Cloud Verification toward the View of Game Theory. 33:1-33:21 - Wei Liang

, Songyou Xie, Dafang Zhang, Xiong Li
, Kuan-Ching Li
:
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning. 34:1-34:20 - Mohammad Shorfuzzaman, M. Shamim Hossain:

Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development. 35:1-35:26 - Gunasekaran Manogaran, Bharat S. Rawal, Houbing Song

, Huihui Wang
, Chinghsien Hsu, Vijayalakshmi Saravanan, Seifedine Nimer Kadry, P. Mohamed Shakeel:
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning. 36:1-36:19 - Kamran Ahmad Awan

, Ikram Ud Din
, Abeer S. Almogren, Neeraj Kumar
, Ahmad Almogren:
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things. 37:1-37:28 - Zhihan Lv, Ranran Lou, Amit Kumar Singh, Qingjun Wang:

Transfer Learning-powered Resource Optimization for Green Computing in 5G-Aided Industrial Internet of Things. 38:1-38:16
- Gunasekaran Manogaran, Hassan Qudrat-Ullah, Qin Xin, Latifur Khan:

Guest Editorial Introduction for the Special Section on Deep Learning Algorithms and Systems for Enhancing Security in Cloud Services. 39e:1-39e:5 - Lea Dujic Rodic, Tomislav Zupanovic, Toni Perkovic

, Petar Solic
, Joel J. P. C. Rodrigues:
Machine Learning and Soil Humidity Sensing: Signal Strength Approach. 39:1-39:21 - Farhan Ullah

, Muhammad Rashid Naeem
, Abdullah S. Bajahzar
, Fadi Al-Turjman
:
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification. 40:1-40:17 - Bharat S. Rawal, Poongodi M, Gunasekaran Manogaran, Mounir Hamdi:

Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform. 41:1-41:20 - Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed

, Awais Ahmad, Gwanggil Jeon:
Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data. 42:1-42:21 - Derui Wang, Sheng Wen, Alireza Jolfaei

, Mohammad Sayad Haghighi
, Surya Nepal
, Yang Xiang
:
On the Neural Backdoor of Federated Generative Models in Edge Computing. 43:1-43:21 - Huijie Yang, Jian Shen

, Tianqi Zhou, Sai Ji, Pandi Vijayakumar:
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs. 44:1-44:19 - Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab:

Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing. 45:1-45:24 - Christos L. Stergiou, Konstantinos E. Psannis

, Brij B. Gupta
:
InFeMo: Flexible Big Data Management Through a Federated Cloud System. 46:1-46:22 - Yasser D. Al-Otaibi:

A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications. 47:1-47:17 - Tu N. Nguyen, Sherali Zeadally:

Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions. 48:1-48:15 - Xiao Zheng, Mingchu Li, Syed Bilal Hussain Shah, Dinh-Thuan Do

, Yuanfang Chen, Constandinos X. Mavromoustakis, George Mastorakis, Evangelos Pallis:
Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing. 49:1-49:15 - Xiongtao Zhang, Xiaomin Zhu, Ji Wang, Weidong Bao, Laurence T. Yang:

DANCE: Distributed Generative Adversarial Networks with Communication Compression. 50:1-50:32
- Rui Zhang, Libing Wu, Shuqin Cao

, Xinrong Hu, Shan Xue
, Dan Wu, Qingan Li:
Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV. 51:1-51:24 - Tingmin Wu

, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal
, Yang Xiang
:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. 52:1-52:27 - Igor Ivkic

, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber
:
A Security Cost Modelling Framework for Cyber-Physical Systems. 53:1-53:31 - Heesuk Son, Dongman Lee:

An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments. 54:1-54:25
Volume 22, Number 3, August 2022
- M. Shamim Hossain, Changsheng Xu, Josu Bilbao

, Md. Abdur Rahman
, Abdulmotaleb El-Saddik, Mohamed Bin Zayed:
Special Section on Edge-AI for Connected Living. 55e:1-55e:3 - Prayag Tiwari

, Amit Kumar Jaiswal, Sahil Garg, Ilsun You
:
SANTM: Efficient Self-attention-driven Network for Text Matching. 55:1-55:21 - Songwen Pei, Yusheng Wu, Jin Guo, Meikang Qiu

:
Neural Network Pruning by Recurrent Weights for Finance Market. 56:1-56:23 - Mohammad Saidur Rahman, Ibrahim Khalil

, Xun Yi, Mohammed Atiquzzaman
, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. 57:1-57:25 - Chaonan Shen, Kai Zhang, Jinshan Tang:

A COVID-19 Detection Algorithm Using Deep Features and Discrete Social Learning Particle Swarm Optimization for Edge Computing Devices. 58:1-58:17 - Yi Liu

, Ruihui Zhao, Jiawen Kang
, Abdulsalam Yassine, Dusit Niyato, Jialiang Peng:
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things. 59:1-59:22 - Guihong Chen, Xi Liu, Mohammad Shorfuzzaman, Ali Karime

, Yonghua Wang, Yuanhang Qi:
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs. 60:1-60:17 - K. Shankar

, Eswaran Perumal, Mohamed Elhoseny
, Fatma Taher, B. B. Gupta
, Ahmed A. Abd El-Latif
:
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities. 61:1-61:14 - Min Chen

, Ke Shen, Rui Wang, Yiming Miao, Yingying Jiang, Kai Hwang, Yixue Hao
, Guangming Tao, Long Hu, Zhongchun Liu:
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring. 62:1-62:16
- Kaijian Xia, Wenbing Zhao, Alireza Jolfaei, M. Tamer Özsu:

Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence. 63e:1-63e:2 - Zhihan Lv

, Ranran Lou, Haibin Lv:
Edge Computing to Solve Security Issues for Infectious Disease Intelligence Prevention. 63:1-63:20 - Yizhang Jiang

, Xiaoqing Gu
, Lei Hua
, Kang Li
, Yuwen Tao
, Bo Li
:
Forecasting Trend of Coronavirus Disease 2019 using Multi-Task Weighted TSK Fuzzy System. 64:1-64:24 - Tongguang Ni

, Jiaqun Zhu
, Jia Qu
, Jing Xue
:
Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis. 65:1-65:21
- Changda Wang, Xiaowei Li, Elisa Bertino:

Network Temperature: A Novel Statistical Index for Networks Measurement and Management. 66:1-66:20 - Haipeng Chen

, Andrew Duncklee, Sushil Jajodia
, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. 67:1-67:24 - Bo Gu

, Mamoun Alazab
, Ziqi Lin
, Xu Zhang
, Jun Huang
:
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks. 68:1-68:17 - Lanyu Xu

, Arun Iyengar, Weisong Shi:
NLUBroker: A QoE-driven Broker System for Natural Language Understanding Services. 69:1-69:29 - Trinh Viet Doan

, Roland van Rijswijk-Deij
, Oliver Hohlfeld
, Vaibhav Bajpai
:
An Empirical View on Consolidation of the Web. 70:1-70:30 - Md. Arafat Hossain

, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir
, Steve Versteeg:
Extracting Formats of Service Messages with Varying Payloads. 71:1-71:31 - Genoveva Vargas-Solar

, Maysaa Khalil
, Javier A. Espinosa-Oviedo
, José-Luis Zechinelli-Martini
:
GREENHOME: A Household Energy Consumption and CO2 Footprint Metering Environment. 72:1-72:31 - Niki Pavlopoulou

, Edward Curry
:
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things. 73:1-73:30 - Jacopo Soldani

, Marco Cameriero
, Giulio Paparelli
, Antonio Brogi
:
Modelling and Analysing Replica- and Fault-aware Management of Horizontally Scalable Applications. 74:1-74:32 - Minxian Xu

, Chenghao Song, Huaming Wu
, Sukhpal Singh Gill
, Kejiang Ye, Chengzhong Xu
:
esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments. 75:1-75:24 - Roberto Yus

, Georgios Bouloukakis, Sharad Mehrotra, Nalini Venkatasubramanian:
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces. 76:1-76:33 - Enrico Tedeschi

, Tor-Arne S. Nordmo
, Dag Johansen
, Håvard D. Johansen
:
On Optimizing Transaction Fees in Bitcoin using AI: Investigation on Miners Inclusion Pattern. 77:1-77:28 - Ilir Murturi

, Schahram Dustdar
:
DECENT: A Decentralized Configurator for Controlling Elasticity in Dynamic Edge Networks. 78:1-78:21 - Tu Le

, Danny Yuxing Huang
, Noah J. Apthorpe
, Yuan Tian
:
SkillBot: Identifying Risky Content for Children in Alexa Skills. 79:1-79:31 - Hyungjune Shin

, Dongyoung Koo
, Junbeom Hur
:
Secure and Efficient Hybrid Data Deduplication in Edge Computing. 80:1-80:25
Volume 22, Number 4, November 2022
- Ching-Hsien Hsu

, Amir Hossein Alavi
, Mianxiong Dong
:
Introduction to the Special Section on Cyber Security in Internet of Vehicles. 81:1-81:6 - Haibo Yi

, Ruinan Chi, Xin Huang, Xuejun Cai, Zhe Nie:
Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions. 82:1-82:15 - Xiao Song, Kai Chen

, Xiaoxiang Ren, Haitao Yuan:
Pedestrian Trajectory Prediction in Heterogeneous Traffic using Facial Keypoints-based Convolutional Encoder-decoder Network. 83:1-83:14 - Chandrasekar Ravi, Anmol Tigga

, G. Thippa Reddy
, Saqib Hakak, Mamoun Alazab
:
Driver Identification Using Optimized Deep Learning Model in Smart Transportation. 84:1-84:17 - Yangfan Liang

, Yining Liu
, Brij B. Gupta
:
PPRP: Preserving-Privacy Route Planning Scheme in VANETs. 85:1-85:18 - Mohamad Ali Mehrabi

, Alireza Jolfaei
:
Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles. 86:1-86:16 - Xiaojie Wang, Laisen Nie, Zhaolong Ning

, Lei Guo, Guoyin Wang, Xinbo Gao, Neeraj Kumar
:
Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles. 87:1-87:20 - Hui Tian

, Fang Peng, Hanyu Quan, Chin-Chen Chang:
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data. 88:1-88:24 - Ramesh Sekaran

, Fadi M. Al-Turjman
, Rizwan Patan
, Velmani Ramasamy
:
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN). 89:1-89:18 - Gunasekaran Manogaran, Bharat S. Rawal

, Vijayalakshmi Saravanan
, Priyan Malarvizhi Kumar, Qin Xin
, P. Mohamed Shakeel:
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication. 90:1-90:20 - Ao Zhou

, Xiao Ma, Siyi Gao, Shangguang Wang:
Providing Reliable Service for Parked-vehicle-assisted Mobile Edge Computing. 91:1-91:24 - Si Young Jang

, Sung Kyu Park
, Jin-Hee Cho
, Dongman Lee
:
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks. 92:1-92:24 - Mathias Fischer, Winfried Lamersdorf, Jörg Liebeherr, Max Mühlhäuser:

Introduction to the Special Section on Recent Advances in Networks and Distributed Systems. 93:1-93:3 - Kurian Polachan

, Chandramani Singh, Tamma V. Prabhakar:
Decentralized Dynamic Scheduling of TCPS Flows and a Simulator for Time-sensitive Networking. 94:1-94:30 - Yevhenii Shudrenko

, Daniel Plöger, Koojana Kuladinithi
, Andreas Timm-Giel
:
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks. 95:1-95:29 - Thiago Pereira da Silva

, Thaís Vasconcelos Batista, Frederico Lopes, Aluizio Rocha Neto, Flávia Coimbra Delicato, Paulo F. Pires, Atslands Rego da Rocha
:
Fog Computing Platforms for Smart City Applications: A Survey. 96:1-96:32 - Christoph Döpmann

, Felix Fiedler
, Sergio Lucia
, Florian Tschorsch
:
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges. 97:1-97:30 - Chao Wu

, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, Kenichi Tayama:
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience. 98:1-98:25 - Andrei Ciortea

, Xiaomin Zhu
, Calton Pu
, Munindar P. Singh
:
Introduction to the Special Issue on Multiagent Systems and Services in the Internet of Things. 99:1-99:3 - Pierre Rust, Gauthier Picard

, Fano Ramparany:
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments. 100:1-100:31 - Alessandro Ricci

, Angelo Croatti
, Stefano Mariani
, Sara Montagna
, Marco Picone
:
Web of Digital Twins. 101:1-101:30 - Haoyu Ren

, Darko Anicic, Thomas A. Runkler:
Towards Semantic Management of On-Device Applications in Industrial IoT. 102:1-102:30 - Lina Barakat

, Phillip Taylor, Nathan Griffiths, Simon Miles
:
A Reputation-based Framework for Honest Provenance Reporting. 103:1-103:31 - Timotheus Kampik

, Adnane Mansour
, Olivier Boissier
, Sabrina Kirrane
, Julian A. Padget
, Terry R. Payne
, Munindar P. Singh
, Valentina Tamma
, Antoine Zimmermann
:
Governance of Autonomous Agents on the Web: Challenges and Opportunities. 104:1-104:31 - Vicente García-Díaz, Jerry Chun-Wei Lin

, Juan Antonio Morente-Molinera:
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities. 105:1-105:2 - Suresh Chavhan, Deepak Gupta

, Sarada Prasad Gochhayat, B. N. Chandana, Ashish Khanna, K. Shankar
, Joel J. P. C. Rodrigues:
Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities. 106:1-106:18 - Zhuoqun Xia

, Lingxuan Zeng
, Ke Gu
, Xiong Li
, Weijia Jia
:
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs. 107:1-107:28 - Michell Boerger

, Philipp Lämmel
, Nikolay Tcholtchev
, Manfred Hauswirth
:
Enabling Short-Term Energy Flexibility Markets Through Blockchain. 108:1-108:25 - Long Chen

, Mianyang Yao
, Yalan Wu
, Jigang Wu
:
EECDN: Energy-efficient Cooperative DNN Edge Inference in Wireless Sensor Networks. 109:1-109:30 - Sandeep Kumar Sood

, Keshav Singh Rawat
, Dheeraj Kumar
:
Emerging Trends of ICT in Airborne Disease Prevention. 110:1-110:18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














