[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 15 Jan 2025Bibliometrics
Skip Table Of Content Section
article
opinion
Closing the Open (Face) Book

Editor in Chief Fred Douglis discusses the pros and cons of removing a social network presence.

discussion
Something's in the Air: Broadband Advances Depend on Wireless

As the worldwide demand for faster Internet connections continues, regulatory agencies are pushing for more radio spectrum. Wireless broadband networks are expected to deliver great advances in ubiquitous connection and speed very quickly in both the US ...

opinion
Trust and Reputation Management

Trust and reputation management research is highly interdisciplinary, involving researchers from networking and communication, data management and information systems, e-commerce and service computing, artificial intelligence, and game theory, as well ...

research-article
Trusted Cloud Computing with Secure Resources and Data Coloring

Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-...

research-article
The Impact of Churn on Uncertainty Decay in P2P Reputation Systems

Reputation systems rely on historical information to account for uncertainty about users' intention to cooperate, but accumulating experience over long time periods is challenging in many situations. In peer-to-peer (P2P) systems, this operation is ...

research-article
Advanced Feedback Management for Internet Auction Reputation Systems

Electronic auction reputation systems have improved in recent years. However, most don't rely on user feedback but are still bound to old-fashioned comment counting while substantial information embedded in those comments is omitted. The authors' system ...

research-article
A Formal-Semantics-Based Calculus of Trust

Building trust models based on a well-defined semantics of trust is important so that we can avoid misinterpretation, misuse, or inconsistent use of trust in Internet-based distributed computing. The authors present an approach to a formal-semantics-...

research-article
Revising WSDL Documents: Why and How

Although Web service technologies promote reuse, Web Services Description Language (WSDL) documents that are supposed to describe the API that services offer often fail to do so properly. Therefore, finding services, understanding what they do, and ...

research-article
Agropedia: Humanization of Agricultural Knowledge

Due to a lack of precise and exact terms of reference, the Internet features very little content related to agriculture. Agropedia, one of the world's first agricultural knowledge repositories built from semantic, collaborative, and social networking ...

research-article
A Survey of First-Person Shooter Gaming Traffic on the Internet

As online games become significant contributors to Internet traffic, practitioners must look to measure and understand game traffic in order to provision for it. Despite gaming's significant implications for the Internet, no general framework exists for ...

research-article
Cloud Computing: The New Frontier of Internet Computing

Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies and raises issues in the architecture, design, and implementation of existing networks and data centers. The relevant research has just ...

research-article
Incentive Mechanisms in P2P Media Streaming Systems

Free riding, whereby a peer utilizes network resources but doesn't contribute services, could have a huge impact on the efficacy of streaming systems, leading to scalability issues and service degradation. BitTorrent-like tit-for-tat mechanisms can't ...

research-article
Secure/Multipurpose Internet Mail Extensions

S/MIME is the standard, widely available protocol for sending and receiving protected MIME data. It provides authentication, message integrity and non-repudiation of origin (using digital signatures), and data confidentiality (using encryption). Here, ...

research-article
Clojure Templating Libraries: Fleet and Enlive

When building Web applications in a functional programming language, it pays to choose a templating system that works well with the functional model. This article explores the consequences of an unwise choice and describes two Clojure-based templating ...

research-article
Is Europe Leading the Way to the Future Internet?

The Internet is ready for a makeover, a need that becomes more urgent with each passing day. Although the Internet is a global infrastructure and a platform for business, discussions about the future Internet remain largely regional. The approaches in ...

opinion
Trust and the Internet

The Internet is ready for a makeover, a need that becomes more urgent with each passing day. Although the Internet is a global infrastructure and a platform for business, discussions about the future Internet remain largely regional. The approaches in ...

article
Agropedia: Humanization of Agricultural Knowledge: Web Extra
Page Sup1

Due to a lack of precise and exact terms of reference, the Internet features very little content related to agriculture. Agropedia, one of the world's first agricultural knowledge repositories built from semantic, collaborative, and social networking ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.