default search action
ACM Transactions on Internet Technology, Volume 21
Volume 21, Number 1, February 2021
Visions Paper
- Paolo Boldi, Georgios Gousios:
Fine-Grained Network Analysis for Modern Software Ecosystems. 1:1-1:14
- Liwei Huang, Yutao Ma
, Yanbo Liu, Keqing He:
DAN-SNR: A Deep Attentive Network for Social-aware Next Point-of-interest Recommendation. 2:1-2:27 - Wensheng Gan, Jerry Chun-Wei Lin
, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu:
Beyond Frequency: Utility Mining with Varied Item-specific Minimum Utility. 3:1-3:32
- Sabah Mohammed, Jinan Fiaidhi, Carlos Ramos
, Tai-Hoon Kim, Wai-Chi Fang, Tarek F. Abdelzaher:
Blockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of ThingsBlockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of Things. 11-55 - Yongjun Ren, Jian Qi, Yepeng Liu
, Jin Wang, Gwang-Jun Kim:
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator. 5:1-5:19 - Honghao Gao, Wanqiu Huang, Yucong Duan:
The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments: A QoS Prediction Perspective. 6:1-6:23 - Xiaolong Xu
, Dawei Zhu, Xiaoxian Yang, Shuo Wang, Lianyong Qi, Wanchun Dou:
Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain. 7:1-7:17 - Junho Kim, Mucheol Kim:
Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection. 8:1-8:16 - Shuiguang Deng
, Guanjie Cheng, Hailiang Zhao
, Honghao Gao, Jianwei Yin:
Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce. 9:1-9:19 - Liang Chen, Jiaying Peng, Yang Liu
, Jintang Li, Fenfang Xie, Zibin Zheng
:
Phishing Scams Detection in Ethereum Transaction Network. 10:1-10:16 - Lichen Cheng
, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. 11:1-11:19 - Zhitao Guan, Naiyu Wang, Xunfeng Fan, Xueyan Liu, Longfei Wu, Shaohua Wan
:
Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach. 12:1-12:17 - Qun Song, Yuhao Chen, Yan Zhong, Kun Lan, Simon Fong
, Rui Tang:
A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology. 13:1-13:24 - Junho Jeong
, Donghyo Kim, Sun-Young Ihm, Yangsun Lee
, Yunsik Son
:
Multilateral Personal Portfolio Authentication System Based on Hyperledger Fabric. 14:1-14:17 - You Sun, Rui Xue, Rui Zhang, Qianqian Su, Sheng Gao
:
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain. 15:1-15:24
- Mahmoud Barhamgi, Michael N. Huhns, Charith Perera, Pinar Yolum:
Introduction to the Special Section on Human-centered Security, Privacy, and Trust in the Internet of Things. 16:1-16:3 - Zheng Yan
, Li Peng, Wei Feng, Laurence T. Yang
:
Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking. 17:1-17:28 - Amit Kumar Singh
, Sriti Thakur, Alireza Jolfaei
, Gautam Srivastava
, Mohamed Elhoseny
, Anand Mohan:
Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents. 18:1-18:20 - Cong Peng
, Jianhua Chen, Pandi Vijayakumar, Neeraj Kumar
, Debiao He
:
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. 19:1-19:23 - Elie Chicha, Bechara al Bouna, Mohamed Nassar
, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja
:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. 20:1-20:25 - Yekta Said Can
, Cem Ersoy
:
Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring. 21:1-21:17 - Edy Hourany
, Bachir Habib, Camille Fountaine, Abdallah Makhoul, Benoît Piranda, Julien Bourgeois:
PROLISEAN: A New Security Protocol for Programmable Matter. 22:1-22:29 - Faiza Loukil
, Chirine Ghedira Guégan
, Khouloud Boukadi
, Aïcha-Nabila Benharkat, Elhadj Benkhelifa:
Data Privacy Based on IoT Device Behavior Control Using Blockchain. 23:1-23:20 - Kaixi Hu
, Lin Li
, Jianquan Liu, Daniel Sun
:
DuroNet: A Dual-robust Enhanced Spatial-temporal Learning Network for Urban Crime Prediction. 24:1-24:24 - Vikram Mehta, Daniel Gooch
, Arosha K. Bandara
, Blaine A. Price, Bashar Nuseibeh
:
Privacy Care: A Tangible Interaction Framework for Privacy Management. 25:1-25:32 - Tanusree Sharma, Hunter A. Dyer, Masooda N. Bashir
:
Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective. 26:1-26:24
Volume 21, Number 2, June 2021
- Xuanzhe Liu, Shangguang Wang
, Yun Ma, Ying Zhang, Qiaozhu Mei, Yunxin Liu, Gang Huang:
Operating Systems for Resource-adaptive Intelligent Software: Challenges and Opportunities. 27:1-27:19
- Francesco Piccialli, Nik Bessis
, Gwanggil Jeon, Calton Pu:
Introduction to the Special Section on Data Science for Cyber-Physical Systems. 28e:1-28e:7 - Zhihan Lv
, Amit Kumar Singh
:
Big Data Analysis of Internet of Things System. 28:1-28:15 - Muhammad Tanveer
, S. Sharma, Khan Muhammad
:
Large-Scale Least Squares Twin SVMs. 29:1-29:19 - Claudio Savaglio
, Giancarlo Fortino:
A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing. 30:1-30:22 - Kuljeet Kaur, Sahil Garg, Georges Kaddoum, Neeraj Kumar
:
Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems. 31:1-31:24 - Chun-Wei Tsai
, Zhi-Yan Fang:
An Effective Hyperparameter Optimization Algorithm for DNN to Predict Passengers at a Metro Station. 32:1-32:24 - Pin Ni
, Yuming Li, Gangmin Li
, Victor I. Chang
:
A Hybrid Siamese Neural Network for Natural Language Inference in Cyber-Physical Systems. 33:1-33:25 - Chen Zhang
, Zhuo Tang, Kenli Li, Jianzhong Yang, Li Yang:
A Polishing Robot Force Control System Based on Time Series Data in Industrial Internet of Things. 34:1-34:22 - Yuyu Yin
, Haoran Xu, Tingting Liang, Manman Chen, Honghao Gao, Antonella Longo
:
Leveraging Data Augmentation for Service QoS Prediction in Cyber-physical Systems. 35:1-35:25 - Martin Garriga
, Koen Aarns, Christos Tsigkanos
, Damian A. Tamburri
, Willem-Jan van den Heuvel:
DataOps for Cyber-Physical Systems Governance: The Airport Passenger Flow Case. 36:1-36:25 - Iris Weiß, Birgit Vogel-Heuser, Emanuel Trunzer, Simon Kruppa:
Product Quality Monitoring in Hydraulic Presses Using a Minimal Sample of Sensor and Actuator Data. 37:1-37:23
- Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh
, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. 38e:1-38e:3 - Laizhong Cui, Zhe Xiao, Jiahao Wang, Fei Chen
, Yi Pan, Hua Dai, Jing Qin
:
Improving Vaccine Safety Using Blockchain. 38:1-38:24 - Truc D. T. Nguyen
, My T. Thai:
A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels. 39:1-39:22 - Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. 40:1-40:21 - Jun Feng
, Laurence T. Yang
, Yuxiang Zhu, Nicholaus J. Gati, Yijun Mo:
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems. 41:1-41:17 - Ye Luo, Zehai Su, Wei Zheng, Zhaobin Chen, Fuqin Wang, Zhemin Zhang, Jinjun Chen:
A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems. 42:1-42:21 - Hao Wang, Shenglan Ma, Chaonian Guo, Yulei Wu
, Hong-Ning Dai
, Di Wu:
Blockchain-Based Power Energy Trading Management. 43:1-43:16 - Michal Król, Alberto Sonnino, Mustafa Al-Bassam, Argyrios G. Tasiopoulos, Etienne Rivière, Ioannis Psaras:
Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks. 44:1-44:27
- Bin Cao, Jiawei Wu, Sichao Wang, Honghao Gao, Jing Fan, Shuiguang Deng, Jianwei Yin, Xuan Liu
:
Unsupervised Derivation of Keyword Summary for Short Texts. 45:1-45:23 - Vandana Bharti
, Bhaskar Biswas, Kaushal Kumar Shukla
:
A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security. 46:1-46:28 - Shijie Hao, Tao Chen
, Yang Wang, Yanrong Guo, Meng Wang:
Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer's Disease Study. 47:1-47:16 - Yuanpeng Zhang
, Yizhang Jiang, Lianyong Qi, Md. Zakirul Alam Bhuiyan, Pengjiang Qian:
Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection. 48:1-48:21 - Jimmy Ming-Tai Wu
, Gautam Srivastava
, Jerry Chun-Wei Lin
, Qian Teng:
A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments. 49:1-49:26 - Bjarne Pfitzner
, Nico Steckhan, Bert Arnrich:
Federated Learning in a Medical Context: A Systematic Literature Review. 50:1-50:31 - Karam Bou Chaaya, Richard Chbeir, Mansour Naser Alraja
, Philippe Arnould, Charith Perera, Mahmoud Barhamgi, Djamal Benslimane:
δ-Risk: Toward Context-aware Multi-objective Privacy Management in Connected Environments. 51:1-51:31 - Abhinav Kumar
, Sanjay Kumar Singh
, K. Lakshmanan, Sonal Saxena, Sameer Shrivastava:
A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images. 52:1-52:22
Volume 21, Number 3, August 2021
- Amit Kumar Singh, Q. M. Jonathan Wu, Ali Al-Haj, Calton Pu:
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare. 53:1-53:4 - Mohammed Al-Khafajiy
, Safa Otoum
, Thar Baker
, Muhammad Asim
, Zakaria Maamar
, Moayad Aloqaily
, Mark Taylor, Martin Randles
:
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. 54:1-54:23 - Zhihan Lv
, Francesco Piccialli
:
The Security of Medical Data on Internet Based on Differential Privacy Technology. 55:1-55:18 - Tao Wang, Zhigao Zheng
, Ali Kashif Bashir
, Alireza Jolfaei
, Yanyan Xu:
FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification. 56:1-56:15 - Zijie Yue
, Shuai Ding
, Lei Zhao, Youtao Zhang, Zehong Cao
, Mohammad Tanveer
, Alireza Jolfaei
, Xi Zheng
:
Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework. 57:1-57:21 - Kaijian Xia, Xiang Wu, Yaqing Mao, Huanhuan Wang:
Secure DNA Motif-Finding Method Based on Sampling Candidate Pruning. 58:1-58:19 - Bharat Richhariya, Mohammad Tanveer:
An Efficient Angle-based Universum Least Squares Twin Support Vector Machine for Classification. 59:1-59:24 - Tae-Yeun Kim
, Sung-Hwan Kim
, Hoon Ko
:
Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System. 60:1-60:17 - Cong Peng
, Debiao He
, Jianhua Chen, Neeraj Kumar
, Muhammad Khurram Khan
:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. 61:1-61:24 - Somanka Maiti, Ashish Kumar, Smriti Jain, Gaurav Bhatnagar
:
A Novel Image Inpainting Framework Using Regression. 62:1-62:16 - Haolun Li, Chi-Man Pun
, Feng Xu, Longsheng Pan, Rui Zong, Hao Gao
, Huimin Lu:
A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis. 63:1-63:22
- Wei Wei, Ammar Rayes, Wei Wang
, Yiduo Mei:
Special Section on AI-Empowered Internet of Things for Smart Cities. 64:1-64:3 - Mohamad Ali Mehrabi
, Naila Mukhtar, Alireza Jolfaei
:
Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms. 65:1-65:20 - Prateek Garg
, Anirudh Srinivasan Chakravarthy
, Murari Mandal
, Pratik Narang
, Vinay Chamola
, Mohsen Guizani:
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities. 66:1-66:18 - Guangwei Gao, Dong Zhu, Huimin Lu, Yi Yu, Heyou Chang, Dong Yue:
Robust Facial Image Super-Resolution by Kernel Locality-Constrained Coupled-Layer Regression. 67:1-67:15 - Francesco Piccialli
, Fabio Giampaolo
, Edoardo Prezioso, Danilo Crisci, Salvatore Cuomo
:
Predictive Analytics for Smart Parking: A Deep Learning Approach in Forecasting of IoT Data. 68:1-68:21 - Feiran Huang
, Chaozhuo Li, Boyu Gao, Yun Liu, Sattam Alotaibi, Hao Chen:
Deep Attentive Multimodal Network Representation Learning for Social Media Images. 69:1-69:17 - David K. Y. Chiu, Tao Xu, Iker Gondra
:
Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications. 70:1-70:17 - Liangtian Wan
, Mingyue Zhang, Lu Sun, Xianpeng Wang
:
Machine Learning Empowered IoT for Intelligent Vehicle Location in Smart Cities. 71:1-71:25 - Laha Ale
, Ning Zhang, Scott A. King
, Jose Guardiola:
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities. 72:1-72:21 - Celestine Iwendi
, Saif Ur Rehman, Abdul Rehman Javed
, Suleman Khan, Gautam Srivastava
:
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. 73:1-73:22 - He-Xuan Hu, Wen-Jie Mao, Zhen-Zhou Lin, Qiang Hu, Ye Zhang
:
Multimodal Brain Tumor Segmentation Based on an Intelligent UNET-LSTM Algorithm in Smart Hospitals. 74:1-74:14
- Qianmu Li, Shunmei Meng, Xiaonan Sang, Hanrui Zhang, Shoujin Wang
, Ali Kashif Bashir
, Keping Yu
, Usman Tariq
:
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing. 75:1-75:33 - Wu Chen, Yong Yu, Keke Gai
, Jiamou Liu, Kim-Kwang Raymond Choo
:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. 76:1-76:17 - Mehedi Masud
, Parminder Singh
, Gurjot Singh Gaba, Avinash Kaur
, Roobaea Alroobaea
, Mubarak Alrashoud, Salman Ali AlQahtani
:
CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson's Disease. 77:1-77:18 - Shehzad Ashraf Chaudhry
, Azeem Irshad
, Khalid Yahya
, Neeraj Kumar
, Mamoun Alazab
, Yousaf Bin Zikria
:
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. 78:1-78:19 - Lucia Cascone
, Aniello Castiglione
, Michele Nappi, Fabio Narducci
, Ignazio Passero:
Waiting for Tactile: Robotic and Virtual Experiences in the Fog. 79:1-79:19 - Liang Tan, Na Shi
, Keping Yu
, Moayad Aloqaily
, Yaser Jararweh:
A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things. 80:1-80:20
Volume 21, Number 4, November 2021
- Safa Otoum
, Burak Kantarci, Hussein T. Mouftah:
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures. 81:1-81:22 - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei
:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. 82:1-82:16 - Zhihan Lv
, Dongliang Chen
, Amit Kumar Singh
:
Big Data Processing on Volunteer Computing. 83:1-83:20 - Bin Yuan
, Chen Lin, Deqing Zou, Laurence Tianruo Yang
, Hai Jin:
Detecting Malicious Switches for a Secure Software-defined Tactile Internet. 84:1-84:23 - Mehedi Masud
, M. Shamim Hossain, Hesham Alhumyani, Sultan S. Alshamrani, Omar Cheikhrouhou, Saleh Ibrahim
, Ghulam Muhammad, Amr Ezz El-Din Rashed, B. B. Gupta
:
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images. 85:1-85:17 - Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim Tafazolli:
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System. 86:1-86:21 - Ismaeel Al Ridhawi
, Moayad Aloqaily
, Yaser Jararweh
:
An Incentive-based Mechanism for Volunteer Computing Using Blockchain. 87:1-87:22 - Di Wu, Wei Shi
, Xiangyu Ma
:
A Novel Real-time Anti-spam Framework. 88:1-88:27 - Jimmy Ming-Tai Wu, Qian Teng, Gautam Srivastava, Matin Pirouz, Jerry Chun-Wei Lin
:
The Efficient Mining of Skyline Patterns from a Volunteer Computing Network. 89:1-89:20 - Yan-Chun Chen, Ren-Hung Hwang
, Mu-Yen Chen
, Chih-Chin Wen, Chih-Ping Hsu:
Screw Slot Quality Inspection System Based on Tactile Network. 90:1-90:17
- Huimin Lu, Liao Wu
, Giancarlo Fortino, Schahram Dustdar
:
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks. 91e:1-91e:3 - Zhiyang Lin, Jihua Zhu, Zutao Jiang, Yujie Li, Yaochen Li, Zhongyu Li:
Merging Grid Maps in Diverse Resolutions by the Context-based Descriptor. 91:1-91:21 - Zhihan Lv
, Liang Qiao
, Qingjun Wang:
Cognitive Robotics on 5G Networks. 92:1-92:18 - Xin Jin, Yuwei Duan, Ying Zhang, Yating Huang, Mengdong Li, Ming Mao, Amit Kumar Singh
, Yujie Li:
Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security. 93:1-93:15 - Rushi Lan, Jing Wang, Wenming Huang, Zhenrong Deng, Xiyan Sun, Zhuo Chen, Xiaonan Luo:
Chinese Emotional Dialogue Response Generation via Reinforcement Learning. 94:1-94:17 - Song Deng, Fulin Chen, Xia Dong, Guangwei Gao, Xindong Wu:
Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition. 95:1-95:28 - Buddhadeb Pradhan, Nirmal Baran Hui
, Diptendu Sinha Roy, Gautam Srivastava, Jerry Chun-Wei Lin
:
Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots. 96:1-96:15 - Min Chen, Wenjing Xiao, Long Hu, Yujun Ma
, Yin Zhang, Guangming Tao:
Cognitive Wearable Robotics for Autism Perception Enhancement. 97:1-97:16 - Wenpeng Lu
, Rui Yu, Shoujin Wang
, Can Wang
, Ping Jian, Heyan Huang:
Sentence Semantic Matching Based on 3D CNN for Human-Robot Language Interaction. 98:1-98:24
- Zhihan Lv
, Liang Qiao
, Amit Kumar Singh, Qingjun Wang:
AI-empowered IoT Security for Smart Cities. 99:1-99:21 - Ramesh Sekaran
, Rizwan Patan
, Fadi Al-Turjman
:
A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET. 100:1-100:15 - Huniya Shahid, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak
, Ikram Ud Din
, Neeraj Kumar
, Carsten Maple:
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things. 101:1-101:26 - Li Kuang, Jianbo Zheng
, Kemu Li, Honghao Gao:
Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities. 102:1-102:24 - Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb
, Carsten Maple, Mohammad Hammoudeh
, Paulo André Lima de Castro
, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. 103:1-103:30 - Zhihan Lv
, Liang Qiao
, Sahil Verma
, Kavita
:
AI-enabled IoT-Edge Data Analytics for Connected Living. 104:1-104:20 - V. Gomathy
, K. Janarthanan, Fadi Al-Turjman
, Ramachandran Sitharthan, M. Rajesh
, Krishnasamy Vengatesan
, T. Priya Reshma:
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation. 105:1-105:10 - Wei Wang
, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar
, Wei Wei:
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction. 106:1-106:13
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.