default search action
IEEE Internet Computing, Volume 12, 2008
Volume 12, Number 1, January - February 2008
- Fred Douglis:
On Social Networking and Communication Paradigms. 4-6 - Greg Goth:
The Net's Going Green: Multipronged Approach Might Save Costs, Energy - and the Climate. 7-9 - Dejan S. Milojicic:
Interview with Rich Friedrich, Dave Cohen, Alex Dreiling. 10-13 - Sharad Mehrotra, Taieb Znati, Craig W. Thompson:
Crisis Management. 14-17 - Marius Portmann, Asad Amir Pirzada:
Wireless Mesh Networks for Public Safety and Crisis Management Applications. 18-25 - Tiziana Catarci, Massimiliano de Leoni, Andrea Marrella, Massimo Mecella, Berardino Salvatore, Guido Vetere, Schahram Dustdar, Lukasz Juszczyk, Atif Manzoor, Hong Linh Truong:
Pervasive Software Environments for Supporting Disaster Responses. 26-37 - Pavan Kumar Chitumalla, Douglas Harris, Bhavani Thuraisingham, Latifur Khan:
Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing. 38-44 - Joseph B. Kopena, Evan Sultanik, Robert N. Lass, Duc N. Nguyen, Christopher Dugan, Pragnesh Jay Modi, William C. Regli:
Distributed Coordination of First Responders. 45-47 - Fernando Maymi, Manuel Rodríguez-Martínez, Yi Qian, Paul C. Manz:
Ancile: Pervasively Shared Situational Awareness. 48-50 - Arjmand Samuel, Arif Ghafoor, Elisa Bertino:
Context-Aware Adaptation of Access-Control Policies. 51-54 - M. Brian Blake, Michael N. Huhns:
Web-Scale Workflow: Integrating Distributed Services. 55-59 - Kwei-Jay Lin:
E-Commerce Technology: Back to a Prominent Future. 60-65 - Michael R. Kelley:
The Spectrum Auction: Big Money and Lots of Unanswered Questions. 66-70 - Barry Leiba:
An Introduction to Internet Standards. 71-74 - Christoph Bussler:
Is Semantic Web Technology Taking the Wrong Turn? 75-79 - Danny Ayers:
Graph Farming. 80-83 - Steve Vinoski:
Serendipitous Reuse. 84-87 - Adel Hendaoui, Moez Limayem, Craig W. Thompson:
3D Social Virtual Worlds: Research Issues and Challenges. 88-92 - Stephen Farrell:
Security Boundaries. 93-96
Volume 12, Number 2, March - April 2008
- Fred Douglis:
Not-so-Secret Identities. 4-6 - Greg Goth:
Redefining the Server as Home Networks Emerge. 7-9 - Matei Ripeanu, Munindar P. Singh, Sudharshan S. Vazhkudai:
Virtual Organizations [Guest Editors' Introduction]. 10-12 - Alvaro Arenas, Michael D. Wilson, Shirley Y. Crompton, Dana Cojocarasu, Tobias Mahler, Lutz Schubert:
Bridging the Gap between Legal and Technical Contracts. 13-19 - Massimo Coppola, Yvon Jégou, Brian Matthews, Christine Morin, Luis Pablo Prieto, Oscar David Sánchez, Erica Y. Yang, Haiyan Yu:
Virtual Organization Support within a Grid-Wide Operating System. 20-28 - Li Qi, Hai Jin, Ian T. Foster, Jarek Gawor:
Provisioning for Dynamic Instantiation of Community Services. 29-36 - Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino:
Policy Mapper: Administering Location-Based Access-Control Policies. 38-45 - Payal Chakravarty, Munindar P. Singh:
Incorporating Events into Cross-Organizational Business Processes. 46-53 - Michael Hecker, Tharam S. Dillon, Elizabeth Chang:
Privacy Ontology Support for E-Commerce. 54-61 - Krithi Ramamritham, Saurabh Sahni, Malathy Baru, Chaitra Bahuman, Arun Chandran, Manjiri Joshi, Anil Bahuman:
The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries. 62-70 - Michael Calabrese:
Broadcast to Broadband: Unlicensed Access to Unused TV Channels? 71-75 - Patricia Beatty, Scott Dick, James Miller:
Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards. 76-80 - Amit P. Sheth, Matthew Perry:
Traveling the Semantic Web through Space, Time, and Theme. 81-86 - Steve Vinoski:
Demystifying RESTful Data Coupling. 87-90 - Jim Miller:
Is Anybody Home? 91-93 - Charles J. Petrie:
Collective Work. 96-95
Volume 12, Number 3, May - June 2008
- Fred Douglis:
The Eye of the Beholder: Whence IC? 3-5 - Greg Goth:
Should We Stop Trusting Trust? 6-9 - Elizabeth F. Churchill, Les Nelson, Diana K. Smetters:
Useful Computer Security. 10-12 - Bryan D. Payne, W. Keith Edwards:
A Brief Introduction to Usable Security. 13-21 - Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov:
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. 22-30 - Sean Bechhofer, Yeliz Yesilada, Robert Stevens, Simon Jupp, Bernard Horan:
Using Ontologies and Vocabularies for Dynamic Linking. 32-39 - Hechmi Khlifi, Jean-Charles Grégoire:
IMS Application Servers: Roles, Requirements, and Implementation Technologies. 40-51 - Avraham Leff, James T. Rayfield:
WebRB: A Different Way to Write Web Applications. 52-61 - Daniel Schall, Hong Linh Truong, Schahram Dustdar:
Unifying Human and Software Services in Web-Scale Collaborations. 62-68 - Yun Wan, Vaishali Kumar, Amina Bukhari:
Will the Overseas Expansion of Facebook Succeed? 69-73 - Eyhab Al-Masri, Qusay H. Mahmoud:
Discovering Web Services in Search Engines. 74-77 - Josh Eno, Craig W. Thompson:
Generating Synthetic Data to Match Data Mining Patterns. 78-82 - Steve Vinoski:
Multilanguage Programming. 83-85 - Daniel J. Weitzner:
Net Neutrality... Seriously this Time. 86-89 - Stephen Farrell:
Portable Storage and Data Loss. 90-93 - Charles J. Petrie, Christoph Bussler:
The Myth of Open Web Services: The Rise of the Service Parks. 96-95
Volume 12, Number 4, July - August 2008
- Dejan S. Milojicic:
Computing Now: Peer-Review Rigor Meets Social Networks. 3-5 - Greg Goth:
Accessibility Advances Could Portend New Mass Technologies. 6-8 - Samuel Madden, Philip Alexander Levis:
Mesh Networking Research and Technology for Multihop Wireless Networks. 9-11 - Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Kristóf Fodor, Gahng-Seop Ahn:
The Rise of People-Centric Sensing. 12-21 - Johnathan Ishmael, Sara Bury, Dimitrios P. Pezaros, Nicholas J. P. Race:
Deploying Rural Community Wireless Mesh Networks. 22-29 - Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy:
Securing Wireless Mesh Networks. 30-36 - Jonathan W. Hui, David E. Culler:
Extending IP to Low-Power, Wireless Personal Area Networks. 37-45 - Satya Sanket Sahoo, Amit P. Sheth, Cory A. Henson:
Semantic Provenance for eScience: Managing the Deluge of Scientific Data. 46-54 - Yan Wang, Kwei-Jay Lin:
Reputation-Oriented Trustworthy Computing in E-Commerce Environments. 55-59 - P. Radha Krishna, Kamalakar Karlapalem:
Electronic Contracts. 60-68 - Loa Andersson, Stewart Bryant:
The IETF Multiprotocol Label Switching Standard: The MPLS Transport Profile Case. 69-73 - Robert A. Joyce:
Pornography and the Internet. 74-77 - Amit P. Sheth, Cory A. Henson, Satya Sanket Sahoo:
Semantic Sensor Web. 78-83 - Paul Hofmann:
ERP is Dead, Long Live ERP. 84-88 - Steve Vinoski:
Convenience Over Correctness. 89-92 - Jim Miller:
Who Are You? The Trade-Off between Information Utility and Privacy. 93-96
Volume 12, Number 5, September - October 2008
- Fred Douglis:
Ideas Ahead of Their Time. 4-6 - Dejan S. Milojicic:
Cloud Computing: Interview with Russ Daniels and Franco Travostino. 7-9 - Greg Goth:
ICANN's TLD Plans Are Defined, Not Yet Refined. 10-12 - Djamal Benslimane, Schahram Dustdar, Amit P. Sheth:
Services Mashups: The New Generation of Web Applications. 13-15 - Daniele Braga, Stefano Ceri, Florian Daniel, Davide Martinenghi:
Mashing Up Search Services. 16-23 - Florian Rosenberg, Francisco Curbera, Matthew J. Duftler, Rania Khalaf:
Composing RESTful Services and Collaborative Workflows: A Lightweight Approach. 24-31 - E. Michael Maximilien, Ajith Ranabahu, Karthik Gomadam:
An Online Platform for Web APIs and Service Mashups. 32-43 - Jin Yu, Boualem Benatallah, Fabio Casati, Florian Daniel:
Understanding Mashup Development. 44-52 - Chun Ouyang, Marcello La Rosa, Arthur H. M. ter Hofstede, Marlon Dumas, Katherine Shortland:
Toward Web-Scale Workflows for Film Production. 53-61 - M. Brian Blake, Michael F. Nowlan:
Taming Web Services from the Wild. 62-69 - Dietmar Tutsch, Gilbert Babin, Peter G. Kropf:
Application-Layer Traffic Analysis of a Peer-to-Peer System. 70-77 - Yuan-Cheng Lai:
DCCP: Transport Protocol with Congestion Control and Unreliability. 78-83 - Stephen Farrell:
Password Policy Purgatory. 84-87 - Tom Heath:
How Will We Interact with the Web of Data? 88-91 - Steve Vinoski:
RPC and REST: Dilemma, Disruption, and Displacement. 92-95 - Carl Hewitt:
ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing. 96-99 - Craig W. Thompson, Fran Hagstrom:
Modeling Healthcare Logistics in a Virtual World. 100-104
Volume 12, Number 6, November - December 2008
- Fred Douglis:
Full Stream Ahead. 3-5 - Greg Goth:
Traffic Management Becoming High-Priority Problem. 6-8 - Frank Olken, Le Gruenwald:
Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement. 9-12 - Yijian Bai, Hetal Thakkar, Haixun Wang, Carlo Zaniolo:
Time-Stamp Management and Query Execution in Data Stream Management Systems. 13-21 - Jin Li, Kristin Tufte, David Maier, Vassilis Papadimos:
AdaptWID: An Adaptive, Memory-Efficient Window Aggregation Implementation. 22-29 - Julie Letchner, Christopher Ré, Magdalena Balazinska, Matthai Philipose:
Challenges for Event Queries over Markovian Streams. 30-36 - Jing Gao, Bolin Ding, Wei Fan, Jiawei Han, Philip S. Yu:
Classifying Data Streams with Skewed Class Distributions and Concept Drifts. 37-49 - Geetika T. Lakshmanan, Ying Li, Robert E. Strom:
Placement Strategies for Internet-Scale Data Stream Systems. 50-60 - Wei Tan, Ian T. Foster, Ravi K. Madduri:
Combining the Power of Taverna and caGrid: Scientific Workflows that Enable Web-Scale Collaboration. 61-68 - Vlado Stankovski, Martin T. Swain, Valentin Kravtsov, Thomas Niessen, Dennis Wegener, M. Rohm, Jernej Trnkoczy, Michael May, Jürgen Franke, Assaf Schuster, Werner Dubitzky:
Digging Deep into the Data Mine with DataMiningGrid. 69-76 - Ya-Chin Sung, Yi-Bing Lin:
IPsec-Based VoIP Performance in WLAN Environments. 77-82 - Jorge Contreras, Russell Housley:
IP Squared: Internet Standards and Intellectual Property. 83-86 - Stephen Ruth, Imran Chaudhry:
Telework: A Productivity Paradox? 87-90 - Jim Miller:
Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy. 91-93 - Steve Vinoski:
RESTful Web Services Development Checklist. 96-95
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.