


default search action
IEEE Internet Computing, Volume 13, 2009
Volume 13, Number 1, January - February 2009
- Fred Douglis

:
Protect Us from Ourselves. 4-6 - Greg Goth:

Network-Enabled Compulsory Education Getting Big Push. 7-10 - George Roussos

, Sastry Duri, Craig W. Thompson:
RFID Meets the Internet. 11-13 - John P. T. Mo

, Quan Z. Sheng
, Xue Li
, Sherali Zeadally:
RFID Infrastructure Design: A Case Study of Two Australian RFID Projects. 14-21 - Jorge González Fernández, Juan Carlos Yelmo García

, Yod Samuel Martín García, Jorge de Gracia Santos:
Transf-ID: Automatic ID and Data Capture for Rail Freight Asset Management. 22-30 - Alexander Ilic, Thomas Andersen, Florian Michahelles:

Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis. 31-38 - Zaki Malik

, Athman Bouguettaya
:
Reputation Bootstrapping for Trust Establishment among Web Services. 40-47 - Michael Kassoff, Charles J. Petrie, Lee-Ming Zen, Michael R. Genesereth:

Semantic Email Addressing: The Semantic Web Killer App? 48-55 - Li-Hsing Yen, Tse-Tsung Yeh, Kuang-Hui Chi:

Load Balancing in IEEE 802.11 Networks. 56-64 - Barry Leiba:

The Good and the Bad of Top-Level Domains. 66-69 - Jason Greengrass, John Evans, Ali C. Begen

:
Not All Packets Are Equal, Part I: Streaming Video Coding and SLA Requirements. 70-75 - Amit P. Sheth, Meenakshi Nagarajan:

Semantics-Empowered Social Computing. 76-80 - Stephen Farrell:

Why Don't We Encrypt Our Email? 82-85 - Danny Ayers:

Delivered Deliverables: The State of the Semantic Web, Part 1. 86-89 - Carl Hewitt:

Perfect Disruption: The Paradigm Shift from Mental Agents to ORGs. 90-93 - Steve Vinoski:

New Year's Integration Resolutions. 96-95
Volume 13, Number 2, March - April 2009
- Fred Douglis

:
Unease of Use. 4-6 - Greg Goth:

Governments Experiment with New Fiber Network Models. 7-9 - Asit Dan, Priya Narasimhan:

Dependable Service- Oriented Computing. 11-15 - Kwei-Jay Lin, Mark Panahi, Yue Zhang, Jing Zhang, Soo-Ho Chang:

Building Accountability Middleware to Support Dependable SOA. 16-25 - Jianwei Yin, Hanwei Chen, ShuiGuang Deng

, Zhaohui Wu, Calton Pu:
A Dependable ESB Framework for Service Integration. 26-34 - Frédéric Thiesse, Christian Floerkemeier, Mark Harrison, Florian Michahelles, Christof Roduner:

Technology, Standards, and Real-World Deployments of the EPC Network. 36-43 - Dezhi Wu, Michael Bieber, Starr Roxanne Hiltz:

Asynchronous Participatory Exams: Internet Innovation for Engaging Students. 44-50 - Matthias Trier, Annette Bobrik:

Social Search: Exploring and Searching Social Architectures in Digital Networks. 51-59 - Claudia Canali

, Michele Colajanni
, Riccardo Lancellotti
:
Performance Evolution of Mobile Web-Based Services. 60-68 - Daniel Castro, Rob Atkinson:

Ten Ideas for Policymakers to Drive Digital Progress. 69-73 - Jason Greengrass, John Evans, Ali C. Begen

:
Not All Packets Are Equal, Part 2: The Impact of Network Packet Loss on Video Quality. 74-82 - Rob Weir:

OpenDocument Format: The Standard for Office Documents. 83-87 - M. Brian Blake

:
Knowledge Discovery in Services. 88-91 - Murat Karakaya

, Ibrahim Korpeoglu
, Özgür Ulusoy
:
Free Riding in Peer-to-Peer Networks. 92-98 - Jim Miller:

One More Take on Identity. 99-101 - Steve Vinoski:

Welcome to "The Functional Web". 102-104
Volume 13, Number 3, May - June 2009
- Fred Douglis

:
Staring at Clouds. 4-6 - Greg Goth:

Reaping Deep Web Rewards Is a Matter of Semantics. 7-10 - Greg Thompson, Yih-Farn Robin Chen:

IPTV: Reinventing Television in the Internet Age. 11-14 - Robert D. Doverspike, Guangzhi Li, Kostas N. Oikonomou, K. K. Ramakrishnan

, Rakesh K. Sinha, Dongmei Wang, Chris Chase:
Designing a Reliable IPTV Network. 15-22 - Soohong Park, Seong-Ho Jeong:

Mobile IPTV: Approaches, Challenges, Standards, and QoS Support. 23-31 - Jun Shan Wey

, Joachim Lüken, Jürgen Heiles:
Standardization Activities for IPTV Set-Top Box Remote Management. 32-39 - Ali C. Begen

, Neil Glazebrook, William Ver Steeg:
Reducing Channel-Change Times with the Real-Time Transport Protocol. 40-47 - Evan Welbourne, Leilani Battle, Garrett Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, Gaetano Borriello:

Building the Internet of Things Using RFID: The RFID Ecosystem Experience. 48-55 - Kuan-Ta Chen, Jau-Yuan Chen, Chun-Rong Huang

, Chu-Song Chen:
Fighting Phishing with Discriminative Keypoint Features. 56-63 - Yalin Yarimagan, Asuman Dogac

:
A Semantic-Based Solution for UBL Schema Interoperability. 64-71 - Philipp Leitner

, Florian Rosenberg, Schahram Dustdar
:
Daios: Efficient Dynamic Web Service Invocation. 72-80 - Frances M. T. Brazier, Jeffrey O. Kephart, H. Van Dyke Parunak, Michael N. Huhns:

Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda. 82-87 - Debasish Ghosh, Steve Vinoski:

Scala and Lift—Functional Recipes for the Web. 88-92 - Stephen Farrell:

Keys Don't Grow in Threes. 94-96
Volume 13, Number 4, July - August 2009
- Fred Douglis

:
Information Overload, 140 Characters at a Time. 4-5 - Greg Goth:

Unique Identifier Quandary Exemplifies Health Net Obstacles. 6-10 - Qing Li

, Rynson W. H. Lau
, Benjamin W. Wah, Helen Ashman
, Elvis Wai Chung Leung, Frederick W. B. Li
, Victor C. S. Lee
:
Guest Editors' Introduction: Emerging Internet Technologies for E-Learning. 11-17 - Stefaan Ternier, Katrien Verbert

, Gonzalo Parra, Bram Vandeputte, Joris Klerkx, Erik Duval, Vicente Ordonez
, Xavier Ochoa
:
The Ariadne Infrastructure for Managing and Storing Metadata. 18-25 - Wen-Chih Chang, Te-Hua Wang, Freya H. Lin, Hsuan-Che Yang

:
Game-Based Learning with Ubiquitous Technologies. 26-33 - Tiffany Ya Tang, Gordon I. McCalla:

A Multidimensional Paper Recommender: Experiments and Evaluations. 34-41 - Michael Mackay, Christopher Edwards:

A Managed IPv6 Transitioning Architecture for Large Network Deployments. 42-51 - Alberto Bartoli

, Giorgio Davanzo, Eric Medvet
:
The Reaction Time to Web Site Defacements. 52-58 - Marko Grobelnik, Dunja Mladenic

, Blaz Fortuna:
Semantic Technology for Capturing Communication Inside an Organization. 59-67 - Michael Hausenblas

:
Exploiting Linked Data to Build Web Applications. 68-73 - Stephen Ruth:

Green IT. 74-78 - Al Morton:

Performance Metrics for All. 82-86 - Amit P. Sheth:

Citizen Sensing, Social Signals, and Enriching Human Experience. 87-92 - Dave Bryson, Steve Vinoski:

Build Your Next Web Application with Erlang. 93-96
Volume 13, Number 5, September - October 2009
- Barry Leiba:

Having One's Head in the Cloud. 4-6 - Greg Goth:

Traffic Intelligence Companies Monitor Censorship Efforts. 7-9 - Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra

, George Pallis
, Athena Vakali
:
Cloud Computing: Distributed Internet Computing for IT and Scientific Research. 10-13 - Borja Sotomayor, Rubén S. Montero

, Ignacio Martín Llorente
, Ian T. Foster
:
Virtual Infrastructure Management in Private and Hybrid Clouds. 14-22 - Alexandre di Costanzo, Marcos Dias de Assunção

, Rajkumar Buyya:
Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure. 24-33 - John S. Erickson

, Michael Rhodes, Susan Spence, David Banks, James Rutherford, Edwin Simpson, Guillaume Belrose, Russell Perry:
Content-Centered Collaboration Spaces in the Cloud. 34-42 - Katarzyna Keahey, Maurício O. Tsugawa, Andréa M. Matsunaga, José A. B. Fortes:

Sky Computing. 43-51 - Juan C. Dueñas, José L. Ruiz, Félix Cuadrado

, Boni García
, Hugo A. Parada G.
:
System Virtualization Tools for Software Development. 52-59 - Federica Mandreoli

, Riccardo Martoglia
, Wilma Penzo, Simona Sassatelli:
Data-Sharing P2P Networks with Semantic Approximation Capabilities. 60-70 - Qinyuan Feng, Kai Hwang, Yafei Dai:

Rainbow Product Ranking for Upgrading E-Commerce. 72-80 - Preethi Natarajan, Fred Baker, Paul D. Amer, Jonathan T. Leighton:

SCTP: What, Why, and How. 81-85 - Iman Saleh, Gregory Kulczycki, M. Brian Blake

:
Demystifying Data-Centric Web Services. 86-90 - Stephen Farrell:

API Keys to the Kingdom. 91-93 - Charles J. Petrie:

The Semantics of "Semantics". 94-96
Volume 13, Number 6, November - December 2009
- Fred Douglis

:
Phone + Internet Cafe = Secure Banking? You Betcha. 4-5 - Greg Goth:

Municipal Wireless Gets New Emphasis: Rethinking the Infrastructure Cloud. 6-8 - Cécile Germain-Renaud, Omer F. Rana

:
The Convergence of Clouds, Grids, and Autonomics. 9 - Barry Leiba:

Guest Editor's Introduction: Unwanted Traffic: Finding and Defending against Denial of Service, Spam, and Other Internet Flotsam. 10-13 - Mat Ford, Leslie Daigle:

Addressing Unwanted Traffic on the Internet: A Community Response. 14-21 - Jayaraj Poroor, Bharat Jayaraman:

DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts. 22-30 - Pablo Neira Ayuso, Rafael M. Gasca

, Laurent Lefèvre:
Demystifying Cluster-Based Fault-Tolerant Firewalls. 31-38 - Kevin Feeney, David Lewis

, Declan O'Sullivan
:
Service-Oriented Policy Management for Web-Application Frameworks. 39-47 - Alexandros Batzios, Pericles A. Mitkas:

db4OWL: An Alternative Approach to Organizing and Storing Semantic Data. 48-55 - Zeljko Obrenovic, Dragan Gasevic:

Mashing Up Oil and Water: Combining Heterogeneous Services for Diverse Users. 56-64 - Paul W. P. J. Grefen, Rik Eshuis

, Nikolay Mehandjiev, Giorgos Kouvas
, Georg Weichhart
:
Internet-Based Support for Process-Oriented Instant Virtual Enterprises. 65-73 - Gregor Broll, Enrico Rukzio, Massimo Paolucci, Matthias Wagner, Albrecht Schmidt

, Heinrich Hussmann:
Perci: Pervasive Service Interaction with the Internet of Things. 74-81 - Alex McMahon, Stephen Farrell:

Delay- and Disruption-Tolerant Networking. 82-87 - Daniel Castro, Scott Andes:

The World Is Digital. 88-91 - Charles J. Petrie:

Practical Web Services. 93-96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














