


default search action
IEEE Internet Computing, Volume 15
Volume 15, Number 1, January - February 2011
- Michael Rabinovich
:
Engineers or Scientists? 4-6 - Dejan S. Milojicic
:
Autograding in the Cloud: Interview with David O'Hallaron. 9-12 - Greg Goth:
Privacy Gets a New Round of Prominence. 13-15 - Geetika T. Lakshmanan, Francisco Curbera, Juliana Freire
, Amit P. Sheth:
Guest Editors' Introduction: Provenance in Web Applications. 17-21 - Hamid R. Motahari Nezhad, Boualem Benatallah
, Fabio Casati
, Régis Saint-Paul:
From Business Processes to Process Spaces. 22-30 - Yannis Theoharis, Irini Fundulaki, Grigoris Karvounarakis, Vassilis Christophides:
On Provenance of Queries on Semantic Web Data. 31-39 - Jun Zhao, Satya Sanket Sahoo
, Paolo Missier
, Amit P. Sheth, Carole A. Goble
:
Extending Semantic Provenance into the Web of Data. 40-48 - Christoph Ringelstein, Steffen Staab:
Papel: Provenance-Aware Policy Definition and Execution. 49-58 - Craig W. Thompson:
Next-Generation Virtual Worlds: Architecture, Status, and Directions. 60-65 - Blooma Mohan John
, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:
What Makes a High-Quality User-Generated Answer? 66-71 - Roger S. Barga, Dennis Gannon, Daniel A. Reed:
The Client and the Cloud: Democratizing Research Computing. 72-75 - Barry Leiba, Mike Thomas, Dave Crocker:
Author Domain Signing Practices (ADSP): Point and Counterpoint. 76-80 - Jakob Eriksson:
Privacy Is Dead: Long Live Surveillance Symmetry. 81-83 - Gregory Collins, Doug Beardsley:
The Snap Framework: A Web Toolkit for Haskell. 84-87 - Stephen Farrell:
Leaky or Guessable Session Identifiers. 88-91 - Oliver Spatscheck, Jacobus E. van der Merwe:
The Unpublicized Sea Change in the Internet. 92-95 - Vinton G. Cerf:
Open Source, Smart Grid, and Mobile Apps. 96
Volume 15, Number 2, March - April 2011
- M. Brian Blake
:
In Vivo Internet Computing: Bionic Web Surfing. 4-6 - Greg Goth:
Welcome to the Age of Antidiplomacy. 7-10 - Dejan S. Milojicic
, Ignacio Martín Llorente, Rubén S. Montero
:
OpenNebula: A Cloud Management Tool. 11-14 - Virgílio A. F. Almeida, Jussara M. Almeida:
Internet Workloads: Measurement, Characterization, and Modeling. 15-18 - Alexandru Iosup
, Dick H. J. Epema:
Grid Computing Workloads. 19-26 - Jeffrey Erman, Alexandre Gerber, Mohammad Taghi Hajiaghayi, Dan Pei
, Subhabrata Sen, Oliver Spatscheck:
To Cache or Not to Cache: The 3G Case. 27-34 - Yongmin Choi, John A. Silvester, Hyun-chul Kim:
Analyzing and Modeling Workload Characteristics in a Multiservice IP Network. 35-42 - Angélica Caro
, Coral Calero
, María Ángeles Moraga
:
Are Web Visibility and Data Quality Related Concepts? 43-49 - Ang Li, Xiaowei Yang, Srikanth Kandula, Ming Zhang:
Comparing Public-Cloud Providers. 50-53 - Ali C. Begen
, Tankut Akgul, Mark Baugher:
Watching Video over the Web: Part 1: Streaming Protocols. 54-63 - Kim Chang, Anthony C. K. Soong, Mitch Tseng, Zhixian Xiang:
Global Wireless Machine-to-Machine Standardization. 64-69 - Sekou L. Remy, M. Brian Blake
:
Distributed Service-Oriented Robotics. 70-74 - Stephen Ruth:
By the Numbers - A Researcher's Bonanza of ICT Policy-Level Information. 75-78 - Christian O'Flaherty:
Building a Better Internet in Latin America and the Caribbean. 79-81 - Eamonn O'Neill
:
The Future Is a Foreign Country: We'll Do Things Differently There. 82-85 - Steve Vinoski:
Process Bottlenecks within Erlang Web Applications. 86-89 - Zakaria Maamar
, Hakim Hacid, Michael N. Huhns:
Why Web Services Need Social Networks. 90-94 - Vinton G. Cerf:
Sherry Turkle: Alone Together. 95-96
Volume 15, Number 3, May - June 2011
- Maarten van Steen
:
Computer Science, Informatics, and the Networked World. 4-6 - Greg Goth:
Huge Growth for Video Telephony? Skeptics Wary of Predicted Data Crunch. 7-9 - Gail-Joon Ahn
, Mohamed Shehab
, Anna Cinzia Squicciarini
:
Security and Privacy in Social Networks. 10-12 - Danesh Irani, Steve Webb, Calton Pu, Kang Li:
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks. 13-19 - Carmen Ruiz Vicente, Dario Freni, Claudio Bettini
, Christian S. Jensen
:
Location-Related Privacy in Geo-Social Networks. 20-27 - Markus Huber
, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch
:
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. 28-34 - Na Li, Nan Zhang, Sajal K. Das
:
Preserving Relation Privacy in Online Social Network Data. 35-42 - Michael Atighetchi, Brett Benyo
, Abhimanyu Gosain, Robert MacIntyre, Partha P. Pal
, Virginia Travers, John A. Zinky:
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy. 43-50 - Torben Weis
, Arno Wacker:
Federating Websites with the Google Wave Protocol. 51-58 - Ali C. Begen
, Tankut Akgul, Mark Baugher:
Watching Video over the Web: Part 2: Applications, Standardization, and Open Issues. 59-63 - Schahram Dustdar
, Kamal Bhattacharya
:
The Social Compute Unit. 64-69 - Ian T. Foster
:
Globus Online: Accelerating and Democratizing Science through Cloud-Based Services. 70-73 - Nathaniel S. Borenstein, James Blake:
Cloud Computing Standards: Where's the Beef? 74-78 - Landon P. Cox:
Usefulness Is Not Trustworthiness. 79-80 - Michael Snoyman:
Warp: A Haskell Web Server. 81-85 - Stephen Farrell:
Security in the Wild. 86-91 - Joseph G. Davis:
From Crowdsourcing to Crowdservicing. 92-94 - Jim Gettys:
Bufferbloat: Dark Buffers in the Internet. 96
Volume 15, Number 4, July - August 2011
- Munindar P. Singh
:
Self-Renewing Applications. 3-5 - Greg Goth:
Software-Defined Networking Could Shake Up More than Packets. 6-9 - Chimezie Ogbuji, Karthik Gomadam, Charles J. Petrie:
Web Technology and Architecture for Personal Health Records. 10-13 - Florian Daniel
, Fabio Casati
, Patrícia Silveira, Monica Verga, Marco Nalin
:
Beyond Health Tracking: A Personal Health and Lifestyle Platform. 14-22 - Ronan Fox, James Cooley, Manfred Hauswirth:
Creating a Virtual Personal Health Record Using Mashups. 23-30 - Randike Gajanayake, Renato Iannella, Tony Sahama
:
Sharing with Care: An Information Accountability Perspective. 31-38 - Adam Belloum
, Márcia A. Inda
, Dmitry Vasunin, Vladimir Korkhov
, Zhiming Zhao
, Han Rauwerda
, Timo M. Breit, Marian Bubak
, Louis O. Hertzberger:
Collaborative e-Science Experiments and Scientific Workflows. 39-47 - Zakaria Maamar
, Pédro Bispo dos Santos, Leandro Krug Wives
, Youakim Badr
, Noura Faci, José Palazzo Moreira de Oliveira:
Using Social Networks for Web Services Discovery. 48-54 - Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen:
Security Issues in Online Social Networks. 56-63 - Siani Pearson
:
Toward Accountability in the Cloud. 64-69 - Samad S. Kolahi, Peng Li:
Evaluating IPv6 in Peer-to-Peer 802.11n Wireless LANs. 70-74 - Sascha D. Meinrath
, James W. Losey, Benjamin Lennett:
A Growing Digital Divide: Internet Freedom and the Negative Impact of Command-and-Control Networking. 75-79 - Schahram Dustdar
, Martin Gaedke
:
The Social Routing Principle. 80-83 - Jörg Ott
:
Me - Your ISP. 84-87 - Greg Wood:
IPv6: Making Room for the World on the Future Internet. 88-89 - Steve Vinoski:
Yaws: Yet Another Web Server. 90-94 - Vinton G. Cerf:
Secure Identities. 96
Volume 15, Number 5, September - October 2011
- J. D. Tygar:
Adversarial Machine Learning. 4-6 - Greg Goth:
Wi-Fi Making Big New Waves: "In-Room" High-Speed Uses to Get Big Boost from Wireless Mainstay. 7-10 - Craig W. Thompson:
Virtual World Architectures. 11-14 - Neil Katz, Thomas Cook, Robert Smart:
Extending Web Browsers with a Unity 3D-Based Virtual Worlds Viewer. 15-21 - Cristina Videira Lopes:
Hypergrid: Architecture and Protocol for Virtual World Interoperability. 22-29 - Toni Alatalo:
An Entity-Component Model for Extensible Virtual Worlds. 30-37 - Jonathan Kaplan, Nicole Yankelovich:
Open Wonderland: An Extensible Virtual World Architecture. 38-45 - Joshua Eno, Craig W. Thompson:
Virtual and Real-World Ontology Services. 46-52 - Anthony J. Rigby, Mark Melaney, Kenneth Rigby:
Accuracy in 3D Virtual Worlds Applications: Interactive 3D Modeling of the Refractory Linings of Copper Smelters. 53-55 - Austin Tate:
I-Room: Augmenting Virtual Worlds with Intelligent Systems. 56-61 - Jaehong Park, Ravi S. Sandhu, Yuan Cheng
:
A User-Activity-Centric Framework for Access Control in Online Social Networks. 62-65 - Schahram Dustdar
, Yike Guo, Benjamin Satzger, Hong Linh Truong:
Principles of Elastic Processes. 66-71 - Andrei Agapi, Ken Birman
, Robert M. Broberg, Chase Cotton, Thilo Kielmann
, Martin Millnert, Rick Payne, Robert Surton, Robbert van Renesse:
Routers for the Cloud: Can the Internet Achieve 5-Nines Availability? 72-77 - Lucy Lynch:
Inside the Identity Management Game. 78-82 - Nitya Narasimhan:
When the Shift Hits the (Television) Fan: A Growing Opportunity for Companion Devices. 83-86 - Dean Wampler:
Scala Web Frameworks: Looking Beyond Lift. 87-94 - Stephen Farrell:
Not Reinventing PKI until We Have Something Better. 95-98 - Charles J. Petrie:
Emergent Collectives. 99-102 - Vinton G. Cerf:
The Battle for Internet Openness. 104
Volume 15, Number 6, November - December 2011
- Amit P. Sheth:
Semantics Scales Up: Beyond Search in Web 3.0. 3-6 - Greg Goth:
Public Sector Clouds Beginning to Blossom: Efficiency, New Culture Trumping Security Fears. 7-9 - Sergio Ilarri
, Arantza Illarramendi, Eduardo Mena
, Amit P. Sheth:
Semantics in Location-Based Services [Guest editor's introduction]. 10-14 - Emanuele Della Valle, Irene Celino
, Daniele Dell'Aglio
, Ralph Grothmann, Florian Steinke
, Volker Tresp:
Semantic Traffic-Aware Routing Using the LarKC Platform. 15-23 - Alessandro Bozzon
, Marco Brambilla
, Stefano Ceri, Silvia Quarteroni:
A Framework for Integrating, Exploring, and Searching Location-Based Web Data. 24-31 - William Van Woensel, Sven Casteleyn
, Elien Paret, Olga De Troyer:
Mobile Querying of Online Semantic Web Data for Context-Aware Applications. 32-39 - David J. H. Burden:
A Semantic Approach to Virtual World Standards. 40-43 - María-Blanca Ibáñez-Espiga
, Carlos Delgado Kloos, Derick Leony, José Jesús García Rueda, David Maroto:
Learning a Foreign Language in a Mixed-Reality Environment. 44-47 - John Evans, Ali C. Begen
, Jason Greengrass, Clarence Filsfils:
Toward Lossless Video Transport. 48-57 - Mariano Rico
, Óscar Corcho
, Victor Mendez, José Manuél Gómez-Pérez:
A Semantically Enhanced UPnP Control Point for Sharing Multimedia Content. 58-64 - Catherine Welch:
Global Internet Freedom Policy: Evolution, Action, and Reaction. 65-69 - Tom Heath:
Linked Data - Welcome to the Data Network. 70-73 - Michael P. Papazoglou
, Willem-Jan van den Heuvel:
Blueprinting the Cloud. 74-79 - Jeremy A. Grant:
The National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy through Standards. 80-84 - Ajith Ranabahu, Paul E. Anderson, Amit P. Sheth:
The Cloud Agnostic e-Science Analysis Platform. 85-89 - Christine Satchell, Marcus Foth
:
Darkness and Disaster in the City. 90-93 - Karen Rose:
AfPIF: Growing Africa's Internet Infrastructure. 94-96 - Mark McGranaghan:
ClojureScript: Functional Programming for JavaScript Platforms. 97-102 - Vinton G. Cerf:
Natural Disasters and Electric Infrastructure. 103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.