Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACM Transactions on Internet Technology
ACM Press
 
   
 
Options:
 
  1-10 of 43 reviews Date Reviewed 
  On the profitability of bundling sale strategy for online service markets with network effects
Ye L., Wu W., Ma R., Lui J. ACM Transactions on Internet Technology 19(3): 1-32, 2019.  Type: Article

Online services are usually provided over the Internet and telecommunications infrastructure. The online services focused on in this paper include Microsoft Office 365 (Word, PowerPoint, Excel, Access) and Internet service provider (IS...

Nov 4 2019
   A game theoretic model for the formation of navigable small-world networks--the tradeoff between distance and reciprocity
Yang Z., Chen W. ACM Transactions on Internet Technology 18(4): 1-38, 2018.  Type: Article

The concept of small-world networks has been developed to help explain how real whole-world social networks manage to be “navigable.” By navigable I mean the ease with which any two people can be connected with seem...

Apr 25 2019
  Measuring moral acceptability in e-deliberation: a practical application of ethics by participation
Verdiesen I., Dignum V., Van Den Hoven J. ACM Transactions on Internet Technology 18(4): 1-20, 2018.  Type: Article

With the increasing ubiquity of the Internet comes the application of this technology to a wide variety of fields, including moral philosophy and political theory. The authors are particularly focused on deliberative democracy, that is...

Apr 1 2019
  Revisiting the risks of Bitcoin currency exchange closure
Moore T., Christin N., Szurdi J. ACM Transactions on Internet Technology 18(4): 1-18, 2018.  Type: Article

As someone who has written a few general articles on the topic of Bitcoin and cryptocurrencies, this review assignment was extremely interesting to me. Because of its specificity, it was interesting to delve into an aspect of currency ...

Mar 26 2019
  Context-driven and real-time provisioning of data-centric IoT services in the cloud
Taherkordi A., Eliassen F., Mcdonald M., Horn G. ACM Transactions on Internet Technology 19(1): 1-24, 2019.  Type: Article

The Internet of Things (IoT) and cloud computing infrastructure are synonymous in contemporary computing, insomuch as the phenomena relate to “big data.” It is quite evident that IoT would revolutionize the world. L...

Mar 21 2019
  Seamless virtual network for international business continuity in presence of intentional blocks
Fujikawa H., Yamaki H., Tsuruta S. ACM Transactions on Internet Technology 18(1): 1-21, 2017.  Type: Article

It is an accepted fact that international borders are vulnerable and permeable when it comes to information technology. This is why international businesses are wary of “discontinuity resulting from sudden serious degradation...

Jul 10 2018
  Architectural principles for cloud software
Pahl C., Jamshidi P., Zimmermann O. ACM Transactions on Internet Technology 18(2): 1-23, 2018.  Type: Article

What comes to mind first with cloud system architectures is the ubiquitous use of microservices, supported by total virtualization from hardware to middleware to applications: virtual machines, micro operating systems, containers, and ...

Jun 14 2018
  Internet of Things (IoT): smart and secure service delivery
Bertino E., Choo K., Georgakopolous D., Nepal S. ACM Transactions on Internet Technology 16(4): Article No. 22, 2016.  Type: Article

The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in ...

Mar 31 2017
  Towards anomalous diffusion sources detection in a large network
Zhang P., He J., Long G., Huang G., Zhang C. ACM Transactions on Internet Technology 16(1): 1-24, 2016.  Type: Article

The identification of diffusion sources in a network is an interesting and important problem. A solution to this problem may be used, for example, for solving security problems such as finding the source of false or malicious informati...

Apr 21 2016
  The effect of data caps upon ISP service tier design and users
Dai W., Jordan S. ACM Transactions on Internet Technology 15(2): 1-28, 2015.  Type: Article

Data caps are known as an effective tool to manage people’s data usage over cellular or Internet service provider (ISP) networks. Since many people control their data usage to avoid overage charges, there has been argument ar...

Nov 12 2015
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy