default search action
IEEE Distributed Systems Online, Volume 4, 2003
Volume 4, Number 1, 2003
- Doug Lea, Steve Vinoski:
IEEE Internet Computing: Guest Editors' Introduction - Middleware for Web Services. - Ravi S. Sandhu:
IEEE Internet Computing: Security Track - Good Enough Security. - Ashton Applewhite:
News: From T-Shirts to Pinstripes: P2P Gets Some Respect. - Greg Linden, Brent Smith, Jeremy York:
Industry Report: Amazon.com Recommendations: Item-to-Item Collaborative Filtering. - Meg McGinity:
In Brief: Live and e-Learn? - Dharmendra Lingaiah:
Book Review: Telecom Foundations (A review of Telecommunications Essentials by Lillian Goleniewski). - Alan S. Abrahams:
Book Review: Seeing the Woods for the Decision Trees (A review of Data Mining with SQL Server 2000 by Claude Seidman). - Mat Hugo Jiménez Pérez:
Book Review: Network+ Certification: A Good Starting Point (A review of Network+ Certification Training Kit by Microsoft).
Volume 4, Number 2, 2003
- Alexandre Denis, Christian Pérez, Thierry Priol, André Ribes:
Parallel Programming: Parallel CORBA Objects for Programming Computational Grids. - Simson L. Garfinkel, Abhi Shelat:
IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. - Michael H. Lutz, Phillip A. Laplante:
IEEE Software: Real-Time Systems - C# and the .NET Framework: Ready for Real Time? - Greg Goth:
NEWS: Will the White House Take on Wi-Fi? - Mark Billinghurst, Adrian David Cheok, Simon Prince, Hirokazu Kato:
IEEE Computer Graphics & Applications: Projects in VR - Real World Teleconferencing. - Meg McGinity:
In Brief: Bullies Get Technical. - Maksim Kim:
Building Web-Integrated Database Applications (A review of Web Database Applications with PHP & MySQL by Hugh E. Williams and David Lane). - Bruno Rossi:
ASN.1's Best Secrets (A review of ASN.1: Communication Between Heterogeneous Systems by Olivier Dubuisson).
Volume 4, Number 3, 2003
- Mahadev Satyanarayanan:
IEEE Pervasive Computing: From The Editor In Chief - Privacy: The Achilles Heel Of Pervasive Computing. - IEEE Pervasive Computing: Works In Progress - Security, Privacy, and Health.
- Greg Goth:
News - Oh, Say Should You G? - Vincent M. Stanford:
IEEE Pervasive Computing: Applications - Pervasive Computing Puts Food On the Table. - Terry Costlow:
In Brief - Hotels Go Wireless. - Dale A. Stirling:
Book Reviews - A Thorough Look at Internet Robots (A review of Beyond Webcams: An Introduction to Online Robots, Ken Goldberg and Roland Siegwart, eds.). - Héctor Zenil:
How to Secure Your Enterprise (A review of Securing Business Information: Strategies to Protect the Enterprise and Its Network by F. Christian Byrnes and Dale Kutnick). - George Semeczko:
A J2EE Reference for Your Library (A review of J2EE: The Complete Reference by Jim Keogh). - Vladimir G. Ivanovíc:
The Power of Events (A review of The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems by David Luckham).
Volume 4, Number 4, 2003
- IEEE Internet Computing: Guest Editors' Introduction - Ubiquitous Mobile Computing.
- IT Professional - Microsoft Outlook Web Access: Blessing or Bane to Security?
- IEEE Internet Computing: Peer To Peer - Economics and the Design of Open Systems.
- News - Data-Storing DNA.
- IEEE Internet Computing: Toward Integration - The Performance Presumption.
- Computing In Science & Engineering: Web Computing - Java and Grande Applications.
- IN BRIEF - Canning Spam.
- Book Reviews - Learning About WDM (A review of IP Over WDM by Kevin H. Liu).
- pH: A Language for Implicit Parallel Programming (A review of Implicit Parallel Programming in pH by Rishiyur S. Nikhil & Arvind).
- A Datamart Development Handbook - (A review of Data Warehousing: Using the Wal-Mart Model by Paul Westerman).
Volume 4, Number 5, 2003
- Christopher Metz:
IEEE Internet Computing: Guest Editor'S Introduction - Moving Toward an IPv6 Future. - Sanjay Patil, Eric Newcomer:
IEEE Internet Computing: Spotlight - ebXML and Web Services. - Adam Stone:
News - Internet Invasion--Is the Web Secure? - Steve Vinoski:
IEEE Internet Computing: Toward Integration - It's Just a Mapping Problem. - Terry Costlow:
IN BRIEF - Idle PCs Might be Key to Smallpox Cure. - Frank Nack:
IEEE Multimedia: Media Impact - Migrating from Mobile Telephony to Multipurpose Gadgets. - Rita Puzmanova:
Book Reviews - Delivering Voice over IP and Multimedia with Session Initiation Protocol (A review of Internet Communications Using SIP by Henry Sinnreich and Alan B. Johnston). - Juan Pablo Villa:
Dial 911 for Ross (A review of Security Engineering by Ross J. Anderson). - Hector Zenil Chavez:
How to Develop Enterprise-Secure Java Applications Learning Risks (A review of Hacking Exposed J2EE and Java, Developing Secure Applications with Java Technology by Art Taylor, Brian Buege, and Randy Layman).
Volume 4, Number 6, 2003
- Gregory D. Abowd:
IEEE Pervasive Computing: Introduction - The Human Experience. - Laurianne McLaughlin:
NEws - Virginia Draws a New Line on Spam. - Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing. - Vincent M. Stanford:
IEEE Pervasive Computing: Applications - Pervasive Computing Goes the Last Hundred Feet with RFID Systems. - Terry Costlow:
In Brief - Piracy, Advertising Groups Target Spyware. - Bill Hilf:
Book Reviews - The Persuasive Power of Computers (A review of Persuasive Technology: Using Computers to Change What we Think and Do by B.J. Fogg). - Dharmendra Lingaiah:
Data Dependency and Optimization (A review of Optimizing Compilers for Modern Architecture by Randy Allen and Ken Kennedy).
Volume 4, Number 7, 2003
- Domenico Talia, Paolo Trunfio:
IEEE Internet Computing: Peer To Peer - Toward a Synergy Between P2P and Grids. - Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing. - Mohan Kumar:
Education - Pervasive Computing Education. - Adam Stone:
IN BRIEF - Curbing War Drivers. - Fred Douglis, Ian T. Foster:
IEEE Internet Computing: Guest Editors' Introduction - The Grid Grows Up. - William T. Polk, Nelson E. Hastings, Ambarish Malpani:
IEEE Internet Computing: Security Track - Public Key Infrastructures that Satisfy Security Goals. - Laurianne McLaughlin:
News - Net Access Through Powerlines: The New Buzz in Broadband. - Tony Barake:
BOOK REVIEWS - The Enterprise Goes to School (A review of Wireless Java Programming for Enterprise Applications: Mobile Devices Go Corporate by Dan Harkey, Shan Appajodu, and Mike Larkin). - Donald Morgan:
Ant Book Full of Practical Advice (A review of Java Development with Ant by Eric Hatcher and Steve Loughran).
Volume 4, Number 8, 2003
- Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing. - Steve Vinoski:
IEEE Internet Computing: Toward Integration - Invocation Styles. - Danna Voth:
In Brief - "Where Are You?" Watches. - Angela Davids:
Spam Debate Simmers During Congressional Recess. - Edward C. Epp:
IEEE Pervasive Computing: Identity Management Relationship Management: Secure Collaboration in a Ubiquitous Environment. - Seth J. Teller, Jiawen Chen, Hari Balakrishnan:
IEEE Computer Graphics & Applications: Projects In VR Pervasive Pose-Aware Applications and Infrastructure. - Meg McGinity:
News - RFID: Not Your Father's Bar Code. - Wojciech Zalech:
Book Reviews - What Hides Behind the Internet-HTTP Protocol (A review of HTTP: The Definitive Guide by David Gourley and Brian Totty, with Marjorie Sayer, Sailu Reddy and Anshu Aggarwal). - George Semeczko:
Unleashing the Power of JSP. - Dharmendra Lingaiah:
OFDM Wireless Communications (A review of OFDM for Wireless Multimedia Communications by Richard Van Nee and Ramjee Prasad).
Volume 4, Number 9, 2003
- Felix C. Gärtner, Levente Buttyán, Klaus Kursawe:
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. - Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda:
Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. - Jeff Heflin, Michael N. Huhns:
IEEE Internet Computing: Guest Editors' Introduction - The Zen of the Web. - Laurianne McLaughlin:
News - VoIP Draws New Scrutiny from FBI, State Regulators. - Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing. - Ariel Pashtan, Shriram Kollipara, Michael Pearce:
IEEE Internet Computing: Industry Report - Adapting Content for Wireless Web Services. - Terry Costlow:
In Brief - Intelligent Mail Idea Raising Opponents' Ire. - Tim Bond:
Book Reviews - Cooking with XSLT (A review of XSLT Cookbook by Sal Mangano). - Mat Hugo Jiménez Pérez:
A Concise and Simple Approach for LDAP Beginners (A review of LDAP Programming, Management, and Integration by Clayton Donley).
Volume 4, Number 10, 2003
- Panos K. Chrysanthis, Morris Sloman, Arkady B. Zaslavsky:
Guest Editors' Introduction - Mobile Data Management. - Dik Lun Lee, Ka Kit Hoi, Wing Sing Wong, Jianliang Xu:
Mobile Data Management - Web Browsing on Small Displays. - Kenneth P. Birman:
IEEE Internet Computing: Peer To Peer - The League of SuperNets. - Greg Goth:
News - Web Services Easing Toward the Mainstream. - Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing. - Keith I. Farkas, Guerney D. H. Hunt:
IEEE Pervasive Computing - New Products. - Meg Shannon:
In Brief - Interactive Posters Pump Up Advertising. - Min Cai:
Book Reviews - Distributed Computing Basics (A review of Distributed Computing: Principles and Applications by M.L. Liu). - Juan M. Estévez-Tapiador:
Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). - Andreas A. Veglis:
Harvesting the Power of Google (A review of Google Hacks: 100 Industrial-Strength Tips & Tools by Tara Calishain and Rael Dornfes).
Volume 4, Number 11, 2003
- Matthew Denny, Michael J. Franklin, Paul C. Castro, Apratim Purakayastha:
Mobile Data Management (Part 2) - The Design of a Scalable Discovery Service for Moving Networked Resources. - Abhishek Ghose, Jens Grossklags, John Chuang:
Resilient Data-Centric Storage in Wireless Sensor Networks. - Paul Francis:
IEEE Internet Computing: Peer To Peer Is the Internet Going NUTSS? - Michael N. Huhns:
IEEE Internet Computing: Agents On The Web - The Sentient Web. - Terry Costlow:
In Brief - Portability Lets Telemarketers Target Cell Phones. - Alan S. Abrahams:
Book Reviews - Jumpstart Your Web Development Project (A review of Developing Web Information Systems: From Strategy to Implementation by Richard Vidgen, David Avison, Bob Wood, and Trevor Wood-Harper). - Rita Puzmanova:
Internet for the Mobile World (A review of The Wireless Mobile Internet: Architectures, Protocols and Services by Abbas Jamalipour). - George Semeczko:
Advanced E-Business (A review of E-Business Applications: Technologies for Tomorrow's Solutions, Jorge Gaso's and Klaus-Dieter Thoben, eds.).
Volume 4, Number 12, 2003
- Jussi Myllymaki, James H. Kaufman:
Mobile Data Management (Part 3) - DynaMark: Benchmarking Dynamic Spatial Indexing for Location-Based Services. - Ratul kr. Majumdar, Krithi Ramamritham, Ming Xiong:
Exploiting User Mobility Patterns for Adaptive Location Management. - Adam Stone:
News - Wireless Mesh Networks Making Gains. - Duncan A. Buell, Ravi S. Sandhu:
IEEE Internet Computing: Guest Editors' Introduction - Identity Management. - Niek J. E. Wijngaards:
Distributed Wisdom - Are You in Control of Your Own Computer? - Angela Davids:
In Brief - Congress Approves First Federal Antispam Legislation. - Keith I. Farkas, Guerney D. H. Hunt:
IEEE Pervasive Computing - New Products. - Richard Staehli:
Book Reviews - Evaluating Voice over IP (A review of Implementing Voice over IP by Bhumip Khasnabish). - Joe Kushner:
Technology and Business Terms in Detail (A review of Dictionary of E-Business: A Definitive Guide to Technology and Business Terms, second edition by Francis Botto).
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.