default search action
IEEE Internet Computing, Volume 13, 2009
Volume 13, Number 1, January - February 2009
- Fred Douglis:
Protect Us from Ourselves. 4-6 - Greg Goth:
Network-Enabled Compulsory Education Getting Big Push. 7-10 - George Roussos, Sastry Duri, Craig W. Thompson:
RFID Meets the Internet. 11-13 - John P. T. Mo, Quan Z. Sheng, Xue Li, Sherali Zeadally:
RFID Infrastructure Design: A Case Study of Two Australian RFID Projects. 14-21 - Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos:
Transf-ID: Automatic ID and Data Capture for Rail Freight Asset Management. 22-30 - Alexander Ilic, Thomas Andersen, Florian Michahelles:
Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis. 31-38 - Zaki Malik, Athman Bouguettaya:
Reputation Bootstrapping for Trust Establishment among Web Services. 40-47 - Michael Kassoff, Charles J. Petrie, Lee-Ming Zen, Michael R. Genesereth:
Semantic Email Addressing: The Semantic Web Killer App? 48-55 - Li-Hsing Yen, Tse-Tsung Yeh, Kuang-Hui Chi:
Load Balancing in IEEE 802.11 Networks. 56-64 - Barry Leiba:
The Good and the Bad of Top-Level Domains. 66-69 - Jason Greengrass, John Evans, Ali C. Begen:
Not All Packets Are Equal, Part I: Streaming Video Coding and SLA Requirements. 70-75 - Amit P. Sheth, Meenakshi Nagarajan:
Semantics-Empowered Social Computing. 76-80 - Stephen Farrell:
Why Don't We Encrypt Our Email? 82-85 - Danny Ayers:
Delivered Deliverables: The State of the Semantic Web, Part 1. 86-89 - Carl Hewitt:
Perfect Disruption: The Paradigm Shift from Mental Agents to ORGs. 90-93 - Steve Vinoski:
New Year's Integration Resolutions. 96-95
Volume 13, Number 2, March - April 2009
- Fred Douglis:
Unease of Use. 4-6 - Greg Goth:
Governments Experiment with New Fiber Network Models. 7-9 - Asit Dan, Priya Narasimhan:
Dependable Service- Oriented Computing. 11-15 - Kwei-Jay Lin, Mark Panahi, Yue Zhang, Jing Zhang, Soo-Ho Chang:
Building Accountability Middleware to Support Dependable SOA. 16-25 - Jianwei Yin, Hanwei Chen, ShuiGuang Deng, Zhaohui Wu, Calton Pu:
A Dependable ESB Framework for Service Integration. 26-34 - Frédéric Thiesse, Christian Floerkemeier, Mark Harrison, Florian Michahelles, Christof Roduner:
Technology, Standards, and Real-World Deployments of the EPC Network. 36-43 - Dezhi Wu, Michael Bieber, Starr Roxanne Hiltz:
Asynchronous Participatory Exams: Internet Innovation for Engaging Students. 44-50 - Matthias Trier, Annette Bobrik:
Social Search: Exploring and Searching Social Architectures in Digital Networks. 51-59 - Claudia Canali, Michele Colajanni, Riccardo Lancellotti:
Performance Evolution of Mobile Web-Based Services. 60-68 - Daniel Castro, Rob Atkinson:
Ten Ideas for Policymakers to Drive Digital Progress. 69-73 - Jason Greengrass, John Evans, Ali C. Begen:
Not All Packets Are Equal, Part 2: The Impact of Network Packet Loss on Video Quality. 74-82 - Rob Weir:
OpenDocument Format: The Standard for Office Documents. 83-87 - M. Brian Blake:
Knowledge Discovery in Services. 88-91 - Murat Karakaya, Ibrahim Korpeoglu, Özgür Ulusoy:
Free Riding in Peer-to-Peer Networks. 92-98 - Jim Miller:
One More Take on Identity. 99-101 - Steve Vinoski:
Welcome to "The Functional Web". 102-104
Volume 13, Number 3, May - June 2009
- Fred Douglis:
Staring at Clouds. 4-6 - Greg Goth:
Reaping Deep Web Rewards Is a Matter of Semantics. 7-10 - Greg Thompson, Yih-Farn Robin Chen:
IPTV: Reinventing Television in the Internet Age. 11-14 - Robert D. Doverspike, Guangzhi Li, Kostas N. Oikonomou, K. K. Ramakrishnan, Rakesh K. Sinha, Dongmei Wang, Chris Chase:
Designing a Reliable IPTV Network. 15-22 - Soohong Park, Seong-Ho Jeong:
Mobile IPTV: Approaches, Challenges, Standards, and QoS Support. 23-31 - Jun Shan Wey, Joachim Lüken, Jürgen Heiles:
Standardization Activities for IPTV Set-Top Box Remote Management. 32-39 - Ali C. Begen, Neil Glazebrook, William Ver Steeg:
Reducing Channel-Change Times with the Real-Time Transport Protocol. 40-47 - Evan Welbourne, Leilani Battle, Garrett Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, Gaetano Borriello:
Building the Internet of Things Using RFID: The RFID Ecosystem Experience. 48-55 - Kuan-Ta Chen, Jau-Yuan Chen, Chun-Rong Huang, Chu-Song Chen:
Fighting Phishing with Discriminative Keypoint Features. 56-63 - Yalin Yarimagan, Asuman Dogac:
A Semantic-Based Solution for UBL Schema Interoperability. 64-71 - Philipp Leitner, Florian Rosenberg, Schahram Dustdar:
Daios: Efficient Dynamic Web Service Invocation. 72-80 - Frances M. T. Brazier, Jeffrey O. Kephart, H. Van Dyke Parunak, Michael N. Huhns:
Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda. 82-87 - Debasish Ghosh, Steve Vinoski:
Scala and Lift—Functional Recipes for the Web. 88-92 - Stephen Farrell:
Keys Don't Grow in Threes. 94-96
Volume 13, Number 4, July - August 2009
- Fred Douglis:
Information Overload, 140 Characters at a Time. 4-5 - Greg Goth:
Unique Identifier Quandary Exemplifies Health Net Obstacles. 6-10 - Qing Li, Rynson W. H. Lau, Benjamin W. Wah, Helen Ashman, Elvis Wai Chung Leung, Frederick W. B. Li, Victor C. S. Lee:
Guest Editors' Introduction: Emerging Internet Technologies for E-Learning. 11-17 - Stefaan Ternier, Katrien Verbert, Gonzalo Parra, Bram Vandeputte, Joris Klerkx, Erik Duval, Vicente Ordonez, Xavier Ochoa:
The Ariadne Infrastructure for Managing and Storing Metadata. 18-25 - Wen-Chih Chang, Te-Hua Wang, Freya H. Lin, Hsuan-Che Yang:
Game-Based Learning with Ubiquitous Technologies. 26-33 - Tiffany Ya Tang, Gordon I. McCalla:
A Multidimensional Paper Recommender: Experiments and Evaluations. 34-41 - Michael Mackay, Christopher Edwards:
A Managed IPv6 Transitioning Architecture for Large Network Deployments. 42-51 - Alberto Bartoli, Giorgio Davanzo, Eric Medvet:
The Reaction Time to Web Site Defacements. 52-58 - Marko Grobelnik, Dunja Mladenic, Blaz Fortuna:
Semantic Technology for Capturing Communication Inside an Organization. 59-67 - Michael Hausenblas:
Exploiting Linked Data to Build Web Applications. 68-73 - Stephen Ruth:
Green IT. 74-78 - Al Morton:
Performance Metrics for All. 82-86 - Amit P. Sheth:
Citizen Sensing, Social Signals, and Enriching Human Experience. 87-92 - Dave Bryson, Steve Vinoski:
Build Your Next Web Application with Erlang. 93-96
Volume 13, Number 5, September - October 2009
- Barry Leiba:
Having One's Head in the Cloud. 4-6 - Greg Goth:
Traffic Intelligence Companies Monitor Censorship Efforts. 7-9 - Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, Athena Vakali:
Cloud Computing: Distributed Internet Computing for IT and Scientific Research. 10-13 - Borja Sotomayor, Rubén S. Montero, Ignacio Martín Llorente, Ian T. Foster:
Virtual Infrastructure Management in Private and Hybrid Clouds. 14-22 - Alexandre di Costanzo, Marcos Dias de Assunção, Rajkumar Buyya:
Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure. 24-33 - John S. Erickson, Michael Rhodes, Susan Spence, David Banks, James Rutherford, Edwin Simpson, Guillaume Belrose, Russell Perry:
Content-Centered Collaboration Spaces in the Cloud. 34-42 - Katarzyna Keahey, Maurício O. Tsugawa, Andréa M. Matsunaga, José A. B. Fortes:
Sky Computing. 43-51 - Juan C. Dueñas, José L. Ruiz, Félix Cuadrado, Boni García, Hugo A. Parada G.:
System Virtualization Tools for Software Development. 52-59 - Federica Mandreoli, Riccardo Martoglia, Wilma Penzo, Simona Sassatelli:
Data-Sharing P2P Networks with Semantic Approximation Capabilities. 60-70 - Qinyuan Feng, Kai Hwang, Yafei Dai:
Rainbow Product Ranking for Upgrading E-Commerce. 72-80 - Preethi Natarajan, Fred Baker, Paul D. Amer, Jonathan T. Leighton:
SCTP: What, Why, and How. 81-85 - Iman Saleh, Gregory Kulczycki, M. Brian Blake:
Demystifying Data-Centric Web Services. 86-90 - Stephen Farrell:
API Keys to the Kingdom. 91-93 - Charles J. Petrie:
The Semantics of "Semantics". 94-96
Volume 13, Number 6, November - December 2009
- Fred Douglis:
Phone + Internet Cafe = Secure Banking? You Betcha. 4-5 - Greg Goth:
Municipal Wireless Gets New Emphasis: Rethinking the Infrastructure Cloud. 6-8 - Cécile Germain-Renaud, Omer F. Rana:
The Convergence of Clouds, Grids, and Autonomics. 9 - Barry Leiba:
Guest Editor's Introduction: Unwanted Traffic: Finding and Defending against Denial of Service, Spam, and Other Internet Flotsam. 10-13 - Mat Ford, Leslie Daigle:
Addressing Unwanted Traffic on the Internet: A Community Response. 14-21 - Jayaraj Poroor, Bharat Jayaraman:
DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts. 22-30 - Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre:
Demystifying Cluster-Based Fault-Tolerant Firewalls. 31-38 - Kevin Feeney, David Lewis, Declan O'Sullivan:
Service-Oriented Policy Management for Web-Application Frameworks. 39-47 - Alexandros Batzios, Pericles A. Mitkas:
db4OWL: An Alternative Approach to Organizing and Storing Semantic Data. 48-55 - Zeljko Obrenovic, Dragan Gasevic:
Mashing Up Oil and Water: Combining Heterogeneous Services for Diverse Users. 56-64 - Paul W. P. J. Grefen, Rik Eshuis, Nikolay Mehandjiev, Giorgos Kouvas, Georg Weichhart:
Internet-Based Support for Process-Oriented Instant Virtual Enterprises. 65-73 - Gregor Broll, Enrico Rukzio, Massimo Paolucci, Matthias Wagner, Albrecht Schmidt, Heinrich Hussmann:
Perci: Pervasive Service Interaction with the Internet of Things. 74-81 - Alex McMahon, Stephen Farrell:
Delay- and Disruption-Tolerant Networking. 82-87 - Daniel Castro, Scott Andes:
The World Is Digital. 88-91 - Charles J. Petrie:
Practical Web Services. 93-96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.