![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IEEE Internet Computing, Volume 18
Volume 18, Number 1, January - February 2014
- Anirban Mahanti:
The Evolving Streaming Media Landscape. 4-6 - Anirban Mahanti, Subhabrata Sen:
High-Performance Mobile Internet. 8-11 - F. Javier Rivas Tocado
, Almudena Díaz-Zayas
, Pedro Merino Gómez
:
Characterizing Traffic Performance in Cellular Networks. 12-19 - Jong-Hyouk Lee, Kamal Deep Singh, Jean-Marie Bonnin, Sangheon Pack
:
Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach. 20-29 - JongWoo Ha, Jung-Hyun Lee, SangKeun Lee:
EPE: An Embedded Personalization Engine for Mobile Users. 30-37 - Rolf Oppliger:
Certification Authorities Under Attack: A Plea for Certificate Legitimation. 40-47 - Daniela Godoy
, Gustavo Rodríguez, Franco Scavuzzo:
Leveraging Semantic Similarity for Folksonomy-Based Recommendation. 48-55 - Oliver Gass, Hendrik Meth, Alexander Maedche
:
PaaS Characteristics for Productive Software Development: An Evaluation Framework. 56-64 - Amir Herzberg
, Haya Schulmann:
Retrofitting Security into Network Protocols: The Case of DNSSEC. 66-71 - Azer Bestavros
, Orran Krieger:
Toward an Open Cloud Marketplace: Vision and First Steps. 72-77 - Mirco Musolesi
:
Big Mobile Data Mining: Good or Evil? 78-81 - Hilarie Orman:
Recent Parables in Cryptography. 82-86 - Vinton G. Cerf:
Unfinished Business. 88
Volume 18, Number 2, March - April 2014
- Pinghui Wang, Wenbo He, Junzhou Zhao:
A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare. 10-15 - Lorenz Schwittmann, Matthäus Wander, Christopher Boelmann, Torben Weis
:
Privacy Preservation in Decentralized Online Social Networks. 16-23 - Fei Hao
, Stephen S. Yau, Geyong Min
, Laurence T. Yang:
Detecting k-Balanced Trusted Cliques in Signed Social Networks. 24-31 - Félix Gómez Mármol
, Manuel Gil Pérez
, Gregorio Martínez Pérez:
Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach. 32-40 - Yuehai Xu, Eitan Frachtenberg
, Song Jiang, Mike Paleczny:
Characterizing Facebook's Memcached Workload. 41-49 - Nikolai Samteladze, Ken Christensen:
DELTA++: Reducing the Size of Android Application Updates. 50-57 - Karen Bartleson:
Market-Driven Standards and the IEEE-SA. 58-62 - Ejub Kajan
, Noura Faci, Zakaria Maamar
, Alfred Loo, Aldina Pljaskovic
, Quan Z. Sheng
:
The Network-Based Business Process. 63-69 - Christophe Guéret
, Victor de Boer
, Stefan Schlobach
:
Let's "Downscale" Linked Data. 70-73 - Charles L. Ortiz:
The Road to Natural Conversational Speech Interfaces. 74-78 - Vinton G. Cerf:
Instrument Thyself! 88
Volume 18, Number 3, May - June 2014
- Anne-Marie Kermarrec
:
Computer Science: Too Young to Fall into the Gender Gap. 4-6 - Mark Claypool, Grenville Armitage, M. Brian Blake:
Networked Games in the Midst of the Clouds [Guest editors' introduction]. 8-11 - Wei Cai, Min Chen, Victor C. M. Leung
:
Toward Gaming as a Service. 12-18 - Debadatta Mishra, Magda El Zarki, Aiman Erbad
, Cheng-Hsin Hsu, Nalini Venkatasubramanian:
Clouds + Games: A Multifaceted Approach. 20-27 - Helmut Prendinger, João Oliveira, Joao Catarino, Marconi Madruga Filho, Rui Prada
:
iCO2: A Networked Game for Collecting Large-Scale Eco-Driving Behavior Data. 28-35 - Alexandru Iosup
, Ruud van de Bovenkamp, Siqi Shen, Adele Lu Jia, Fernando A. Kuipers:
Analyzing Implicit Social Networks in Multiplayer Online Games. 36-44 - Pankaj R. Telang, Anup K. Kalia, Munindar P. Singh
:
Engineering Service Engagements via Commitments. 46-54 - Paolo Bellavista
, Carlo Giannelli
, Luca Iannario, Laurent-Walter Goix, Claudio Venezia:
Peer-to-Peer Content Sharing Based on Social Identities and Relationships. 55-63 - Kejiang Ye, Zhaohui Wu, Bing Bing Zhou
, Xiaohong Jiang, Chen Wang
, Albert Y. Zomaya
:
Virt-B: Towards Performance Benchmarking of Virtual Machine Systems. 64-72 - Emiliano Miluzzo:
I'm Cloud 2.0, and I'm Not Just a Data Center. 73-77 - Wei-Tek Tsai, Wenjun Wu, Michael N. Huhns:
Cloud-Based Software Crowdsourcing. 78-83 - Yong Cui, Qi Sun, Ke Xu, Wendong Wang, Ted Lemon:
Configuring IPv4 over IPv6 Networks: Transitioning with DHCP. 84-88 - Hilarie Orman:
Co-Evolution with Social Networks: Deception is Protection. 90-94 - Vinton G. Cerf, Nii Narku Quaynor:
The Internet of Everyone. 96
Volume 18, Number 4, July - August 2014
- Stephen Farrell:
Why Pervasive Monitoring Is Bad. 4-7 - Fred Douglis
:
Web-Scale Datacenters. 13-14 - Yunjing Xu, Zachary Musgrave, Brian Noble, Michael D. Bailey:
Workload-Aware Provisioning in Public Clouds. 15-21 - Rahul Singh, Prateek Sharma, David E. Irwin, Prashant J. Shenoy
, K. K. Ramakrishnan
:
Here Today, Gone Tomorrow: Exploiting Transient Servers in Datacenters. 22-29 - Chao-Chih Chen, Peng Sun, Lihua Yuan, David A. Maltz, Chen-Nee Chuah
, Prasant Mohapatra:
SWIM: A Switch Manager for Datacenter Networks. 30-36 - Kim Khoa Nguyen
, Mohamed Cheriet, Yves Lemieux:
Virtual Slice Assignment in Large-Scale Cloud Interconnects. 37-46 - Xavier León, Rahma Chaabouni, Marc Sánchez Artigas, Pedro García López:
Smart Cloud Seeding for BitTorrent in Datacenters. 47-54 - Talal H. Noor, Quan Z. Sheng
, Anne H. H. Ngu, Schahram Dustdar
:
Analysis of Web-Scale Cloud Services. 55-61 - Eliot Lear:
The Internet Assigned Numbers Authority Transition. 62-65 - Alasdair J. G. Gray
:
Dataset Descriptions for Linked Data Systems. 66-69 - Kazutoshi Sumiya, Daisuke Kitayama, Naiwala P. Chandrasiri:
Inferred Information Retrieval with User Operations on Digital Maps. 70-73 - Jeff Jaffe:
Web at 25, W3C at 20: An Opportunity to Reflect and Look to the Future. 74-78 - Kieron O'Hara
:
In Worship of an Echo. 79-83 - Charles J. Petrie:
Is the Internet a Thing? 84-86 - Vinton G. Cerf:
Forty Years Ago... 88
Volume 18, Number 5, September - October 2014
- Carole A. Goble
:
Better Software, Better Research. 4-8 - Paolo Boldi
, Stefano Leonardi, Cecilia Mascolo
, Michalis Vazirgiannis:
Web and Social Graph Mining. 9-10 - Abigail Paradise, Rami Puzis
, Asaf Shabtai:
Anti-Reconnaissance Tools: Detecting Targeted Socialbots. 11-19 - Nir Ofek, Asaf Shabtai:
Dynamic Latent Expertise Mining in Social Networks. 20-27 - Marco Balduini, Alessandro Bozzon
, Emanuele Della Valle, Yi Huang, Geert-Jan Houben:
Recommending Venues Using Continuous Predictive Social Media Analytics. 28-35 - Athanasios Papaoikonomou, Magdalini Kardara, Konstantinos Tserpes
, Theodora A. Varvarigou:
Predicting Edge Signs in Social Networks Using Frequent Subgraph Discovery. 36-43 - Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan, Zhuoqing Morley Mao, Venugopalan Ramasubramanian, Doug Terry, Ted Wobber:
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones. 44-51 - Christoph Fehling, Frank Leymann
, Ralph Retter:
Your Coffee Shop Uses Cloud Computing. 52-59 - Brian Trammell, Joe Hildebrand:
Evolving Transport in the Internet. 60-64 - Virgílio A. F. Almeida:
The Evolution of Internet Governance: Lessons Learned from NETmundial. 65-69 - Elkhan Dadashov, Ugur Çetintemel, Tim Kraska:
Putting Analytics on the Spot: Or How to Lower the Cost for Analytics. 70-73 - Eduardo Cuervo Laffaye:
Toward an Ideal Mobile World: Opportunities and Challenges. 74-78 - Vinton G. Cerf:
Bufferbloat and Other Internet Challenges. 80
Volume 18, Number 6, November - December 2014
- Michael Rabinovich
:
The Reproducibility versus Debuggability of Research. 4-6 - Lieven Desmet
, Martin Johns
:
Real-Time Communications Security on the Web. 8-10 - Richard L. Barnes, Martin Thomson:
Browser-to-Browser Security Assurances for WebRTC. 11-17 - Victoria Beltran, Emmanuel Bertin, Noël Crespi:
User Identity for WebRTC Services: A Matter of Trust. 18-25 - Li Li, Wu Chou, Zhihong Qiu, Tao Cai:
Who Is Calling Which Page on the Web? 26-33 - Luis López-Fernández, Micael Gallego
, Boni García
, David Fernández-López, Francisco Javier Lopez:
Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento. 34-40 - Tyrone Grandison
:
Security and Privacy in Web 2.0 [Guest editor's introduction]. 41-42 - Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh, Collin Jackson:
An Experimental Study of TLS Forward Secrecy Deployments. 43-51 - Andrew G. West
, Adam J. Aviv:
Measuring Privacy Disclosures in URL Query Strings. 52-59 - Sean Turner:
Transport Layer Security. 60-63 - David R. Karger
:
The Semantic Web and End Users: What's Wrong and How to Fix It. 64-70 - Pradeep K. Murukannaiah
, Munindar P. Singh
:
Understanding Location-Based User Experience. 72-76 - Soheil Qanbari, Fei Li, Schahram Dustdar
:
Toward Portable Cloud Manufacturing Services. 77-80 - Kieron O'Hara
:
The Fridge's Brain Sure Ain't the Icebox. 81-84 - Charles Petrie:
The Failure of HealthCare.gov Exposes Silicon Valley Secrets. 85-86 - Vinton G. Cerf:
Knocking Down Strawmen. 88
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.