


default search action
IEEE Internet Computing, Volume 12, 2008
Volume 12, Number 1, January - February 2008
- Fred Douglis

:
On Social Networking and Communication Paradigms. 4-6 - Greg Goth:

The Net's Going Green: Multipronged Approach Might Save Costs, Energy - and the Climate. 7-9 - Dejan S. Milojicic

:
Interview with Rich Friedrich, Dave Cohen, Alex Dreiling. 10-13 - Sharad Mehrotra, Taieb Znati, Craig W. Thompson:

Crisis Management. 14-17 - Marius Portmann

, Asad Amir Pirzada:
Wireless Mesh Networks for Public Safety and Crisis Management Applications. 18-25 - Tiziana Catarci

, Massimiliano de Leoni
, Andrea Marrella
, Massimo Mecella
, Berardino Salvatore, Guido Vetere, Schahram Dustdar
, Lukasz Juszczyk, Atif Manzoor, Hong Linh Truong
:
Pervasive Software Environments for Supporting Disaster Responses. 26-37 - Pavan Kumar Chitumalla, Douglas Harris, Bhavani Thuraisingham, Latifur Khan

:
Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing. 38-44 - Joseph B. Kopena, Evan Sultanik, Robert N. Lass, Duc N. Nguyen, Christopher Dugan, Pragnesh Jay Modi, William C. Regli:

Distributed Coordination of First Responders. 45-47 - Fernando Maymi, Manuel Rodríguez-Martínez, Yi Qian, Paul C. Manz:

Ancile: Pervasively Shared Situational Awareness. 48-50 - Arjmand Samuel, Arif Ghafoor, Elisa Bertino:

Context-Aware Adaptation of Access-Control Policies. 51-54 - M. Brian Blake

, Michael N. Huhns:
Web-Scale Workflow: Integrating Distributed Services. 55-59 - Kwei-Jay Lin:

E-Commerce Technology: Back to a Prominent Future. 60-65 - Michael R. Kelley:

The Spectrum Auction: Big Money and Lots of Unanswered Questions. 66-70 - Barry Leiba:

An Introduction to Internet Standards. 71-74 - Christoph Bussler:

Is Semantic Web Technology Taking the Wrong Turn? 75-79 - Danny Ayers:

Graph Farming. 80-83 - Steve Vinoski:

Serendipitous Reuse. 84-87 - Adel Hendaoui, Moez Limayem, Craig W. Thompson:

3D Social Virtual Worlds: Research Issues and Challenges. 88-92 - Stephen Farrell:

Security Boundaries. 93-96 
Volume 12, Number 2, March - April 2008
- Fred Douglis

:
Not-so-Secret Identities. 4-6 - Greg Goth:

Redefining the Server as Home Networks Emerge. 7-9 - Matei Ripeanu, Munindar P. Singh

, Sudharshan S. Vazhkudai:
Virtual Organizations [Guest Editors' Introduction]. 10-12 - Alvaro Arenas

, Michael D. Wilson
, Shirley Y. Crompton, Dana Cojocarasu, Tobias Mahler, Lutz Schubert
:
Bridging the Gap between Legal and Technical Contracts. 13-19 - Massimo Coppola, Yvon Jégou, Brian Matthews

, Christine Morin, Luis Pablo Prieto
, Oscar David Sánchez, Erica Y. Yang, Haiyan Yu:
Virtual Organization Support within a Grid-Wide Operating System. 20-28 - Li Qi, Hai Jin, Ian T. Foster

, Jarek Gawor:
Provisioning for Dynamic Instantiation of Community Services. 29-36 - Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino:

Policy Mapper: Administering Location-Based Access-Control Policies. 38-45 - Payal Chakravarty, Munindar P. Singh

:
Incorporating Events into Cross-Organizational Business Processes. 46-53 - Michael Hecker, Tharam S. Dillon, Elizabeth Chang

:
Privacy Ontology Support for E-Commerce. 54-61 - Krithi Ramamritham, Saurabh Sahni, Malathy Baru, Chaitra Bahuman, Arun Chandran, Manjiri Joshi, Anil Bahuman:

The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries. 62-70 - Michael Calabrese:

Broadcast to Broadband: Unlicensed Access to Unused TV Channels? 71-75 - Patricia Beatty, Scott Dick, James Miller:

Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards. 76-80 - Amit P. Sheth, Matthew Perry:

Traveling the Semantic Web through Space, Time, and Theme. 81-86 - Steve Vinoski:

Demystifying RESTful Data Coupling. 87-90 - Jim Miller:

Is Anybody Home? 91-93 - Charles J. Petrie:

Collective Work. 96-95 
Volume 12, Number 3, May - June 2008
- Fred Douglis

:
The Eye of the Beholder: Whence IC? 3-5 - Greg Goth:

Should We Stop Trusting Trust? 6-9 - Elizabeth F. Churchill, Les Nelson, Diana K. Smetters:

Useful Computer Security. 10-12 - Bryan D. Payne, W. Keith Edwards:

A Brief Introduction to Usable Security. 13-21 - Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov:

Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs. 22-30 - Sean Bechhofer

, Yeliz Yesilada
, Robert Stevens, Simon Jupp
, Bernard Horan:
Using Ontologies and Vocabularies for Dynamic Linking. 32-39 - Hechmi Khlifi, Jean-Charles Grégoire:

IMS Application Servers: Roles, Requirements, and Implementation Technologies. 40-51 - Avraham Leff, James T. Rayfield:

WebRB: A Different Way to Write Web Applications. 52-61 - Daniel Schall, Hong Linh Truong

, Schahram Dustdar
:
Unifying Human and Software Services in Web-Scale Collaborations. 62-68 - Yun Wan

, Vaishali Kumar, Amina Bukhari:
Will the Overseas Expansion of Facebook Succeed? 69-73 - Eyhab Al-Masri, Qusay H. Mahmoud

:
Discovering Web Services in Search Engines. 74-77 - Josh Eno, Craig W. Thompson:

Generating Synthetic Data to Match Data Mining Patterns. 78-82 - Steve Vinoski:

Multilanguage Programming. 83-85 - Daniel J. Weitzner:

Net Neutrality... Seriously this Time. 86-89 - Stephen Farrell:

Portable Storage and Data Loss. 90-93 - Charles J. Petrie, Christoph Bussler:

The Myth of Open Web Services: The Rise of the Service Parks. 96-95 
Volume 12, Number 4, July - August 2008
- Dejan S. Milojicic

:
Computing Now: Peer-Review Rigor Meets Social Networks. 3-5 - Greg Goth:

Accessibility Advances Could Portend New Mass Technologies. 6-8 - Samuel Madden, Philip Alexander Levis:

Mesh Networking Research and Technology for Multihop Wireless Networks. 9-11 - Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi

, Kristóf Fodor, Gahng-Seop Ahn:
The Rise of People-Centric Sensing. 12-21 - Johnathan Ishmael, Sara Bury, Dimitrios P. Pezaros

, Nicholas J. P. Race
:
Deploying Rural Community Wireless Mesh Networks. 22-29 - Steve Glass, Marius Portmann

, Vallipuram Muthukkumarasamy:
Securing Wireless Mesh Networks. 30-36 - Jonathan W. Hui, David E. Culler:

Extending IP to Low-Power, Wireless Personal Area Networks. 37-45 - Satya Sanket Sahoo

, Amit P. Sheth, Cory A. Henson:
Semantic Provenance for eScience: Managing the Deluge of Scientific Data. 46-54 - Yan Wang

, Kwei-Jay Lin:
Reputation-Oriented Trustworthy Computing in E-Commerce Environments. 55-59 - P. Radha Krishna, Kamalakar Karlapalem:

Electronic Contracts. 60-68 - Loa Andersson, Stewart Bryant:

The IETF Multiprotocol Label Switching Standard: The MPLS Transport Profile Case. 69-73 - Robert A. Joyce:

Pornography and the Internet. 74-77 - Amit P. Sheth, Cory A. Henson, Satya Sanket Sahoo

:
Semantic Sensor Web. 78-83 - Paul Hofmann:

ERP is Dead, Long Live ERP. 84-88 - Steve Vinoski:

Convenience Over Correctness. 89-92 - Jim Miller:

Who Are You? The Trade-Off between Information Utility and Privacy. 93-96 
Volume 12, Number 5, September - October 2008
- Fred Douglis

:
Ideas Ahead of Their Time. 4-6 - Dejan S. Milojicic

:
Cloud Computing: Interview with Russ Daniels and Franco Travostino. 7-9 - Greg Goth:

ICANN's TLD Plans Are Defined, Not Yet Refined. 10-12 - Djamal Benslimane, Schahram Dustdar

, Amit P. Sheth:
Services Mashups: The New Generation of Web Applications. 13-15 - Daniele Braga, Stefano Ceri, Florian Daniel

, Davide Martinenghi
:
Mashing Up Search Services. 16-23 - Florian Rosenberg, Francisco Curbera, Matthew J. Duftler, Rania Khalaf:

Composing RESTful Services and Collaborative Workflows: A Lightweight Approach. 24-31 - E. Michael Maximilien, Ajith Ranabahu, Karthik Gomadam:

An Online Platform for Web APIs and Service Mashups. 32-43 - Jin Yu, Boualem Benatallah

, Fabio Casati, Florian Daniel
:
Understanding Mashup Development. 44-52 - Chun Ouyang, Marcello La Rosa

, Arthur H. M. ter Hofstede
, Marlon Dumas
, Katherine Shortland:
Toward Web-Scale Workflows for Film Production. 53-61 - M. Brian Blake

, Michael F. Nowlan:
Taming Web Services from the Wild. 62-69 - Dietmar Tutsch, Gilbert Babin, Peter G. Kropf

:
Application-Layer Traffic Analysis of a Peer-to-Peer System. 70-77 - Yuan-Cheng Lai:

DCCP: Transport Protocol with Congestion Control and Unreliability. 78-83 - Stephen Farrell:

Password Policy Purgatory. 84-87 - Tom Heath:

How Will We Interact with the Web of Data? 88-91 - Steve Vinoski:

RPC and REST: Dilemma, Disruption, and Displacement. 92-95 - Carl Hewitt:

ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing. 96-99 - Craig W. Thompson, Fran Hagstrom:

Modeling Healthcare Logistics in a Virtual World. 100-104 
Volume 12, Number 6, November - December 2008
- Fred Douglis

:
Full Stream Ahead. 3-5 - Greg Goth:

Traffic Management Becoming High-Priority Problem. 6-8 - Frank Olken, Le Gruenwald:

Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement. 9-12 - Yijian Bai, Hetal Thakkar, Haixun Wang, Carlo Zaniolo:

Time-Stamp Management and Query Execution in Data Stream Management Systems. 13-21 - Jin Li, Kristin Tufte, David Maier, Vassilis Papadimos:

AdaptWID: An Adaptive, Memory-Efficient Window Aggregation Implementation. 22-29 - Julie Letchner, Christopher Ré, Magdalena Balazinska, Matthai Philipose:

Challenges for Event Queries over Markovian Streams. 30-36 - Jing Gao, Bolin Ding, Wei Fan, Jiawei Han, Philip S. Yu:

Classifying Data Streams with Skewed Class Distributions and Concept Drifts. 37-49 - Geetika T. Lakshmanan, Ying Li, Robert E. Strom:

Placement Strategies for Internet-Scale Data Stream Systems. 50-60 - Wei Tan, Ian T. Foster, Ravi K. Madduri

:
Combining the Power of Taverna and caGrid: Scientific Workflows that Enable Web-Scale Collaboration. 61-68 - Vlado Stankovski

, Martin T. Swain, Valentin Kravtsov, Thomas Niessen, Dennis Wegener, M. Rohm, Jernej Trnkoczy, Michael May, Jürgen Franke, Assaf Schuster, Werner Dubitzky:
Digging Deep into the Data Mine with DataMiningGrid. 69-76 - Ya-Chin Sung, Yi-Bing Lin:

IPsec-Based VoIP Performance in WLAN Environments. 77-82 - Jorge Contreras, Russell Housley:

IP Squared: Internet Standards and Intellectual Property. 83-86 - Stephen Ruth, Imran Chaudhry:

Telework: A Productivity Paradox? 87-90 - Jim Miller:

Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy. 91-93 - Steve Vinoski:

RESTful Web Services Development Checklist. 96-95 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














