


default search action
ACM Transactions on Internet Technology (TOIT), Volume 10
Volume 10, Number 1, February 2010
- David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis:
A market-based bandwidth charging framework. 1:1-1:30 - Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Semantic integrity in large-scale online simulations. 2:1-2:24 - Tzu-Chi Huang, Sherali Zeadally, Naveen K. Chilamkurti, Ce-Kuen Shieh:
A programmable network address translator: Design, implementation, and performance. 3:1-3:37 - HweeHwa Pang
, Jialie Shen, Ramayya Krishnan:
Privacy-preserving similarity-based text retrieval. 4:1-4:39
Volume 10, Number 2, May 2010
- Teh-Chung Chen, Scott Dick, James Miller:
Detecting visually similar Web pages: Application to phishing detection. 5:1-5:38 - Chuan Yue, Haining Wang:
BogusBiter: A transparent protection against phishing attacks. 6:1-6:31 - Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti
, Lorrie Faith Cranor
, Jason I. Hong
:
Teaching Johnny not to fall for phish. 7:1-7:31 - Ugur Kuter, Jennifer Golbeck:
Using probabilistic confidence models for trust inference in Web-based social networks. 8:1-8:23
Volume 10, Number 3, October 2010
- Moheeb Abu Rajab, Fabian Monrose, Niels Provos:
Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing. 9:1-9:21 - Alberto Bartoli
, Giorgio Davanzo, Eric Medvet
:
A Framework for Large-Scale Detection of Web Site Defacements. 10:1-10:37 - Ilya Gluhovsky:
Forecasting Click-Through Rates Based on Sponsored Search Advertiser Bids and Intermediate Variable Regression. 11:1-11:28 - Scott Jordan, Arijit Ghosh:
A Framework for Classification of Traffic Management Practices as Reasonable or Unreasonable. 12:1-12:23
Volume 10, Number 4, March 2011
- Haifeng Shen, Chengzheng Sun:
Achieving Data Consistency by Contextualization in Web-Based Collaborative Applications. 13:1-13:37 - Neil Hurley
, Mi Zhang:
Novelty and Diversity in Top-N Recommendation - Analysis and Evaluation. 14:1-14:30 - Mark R. Meiss, Filippo Menczer, Alessandro Vespignani
:
Properties and Evolution of Internet Traffic Networks from Anonymized Flow Data. 15:1-15:23 - Adina Crainiceanu, Prakash Linga, Ashwin Machanavajjhala, Johannes Gehrke, Jayavel Shanmugasundaram:
Load Balancing and Range Queries in P2P Systems Using P-Ring. 16:1-16:30

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.