


default search action
IEEE Internet Computing, Volume 20
Volume 20, Number 1, January - February 2016
- M. Brian Blake:

Professions for Web 10.0. 4-6 - Arpita Ghosh, Ashish Goel:

Internet Economics [Guest editors' introduction]. 8-10 - Steven Tadelis:

The Economics of Reputation and Feedback Systems in E-Commerce Marketplaces. 12-19 - Siddhartha Banerjee, Ramesh Johari, Zhengyuan Zhou:

The Importance of Exploration in Online Marketplaces. 20-26 - Nitish Korula, Vahab S. Mirrokni, Hamid Nazerzadeh:

Optimizing Display Advertising Markets: Challenges and Directions. 28-35 - Ian A. Kash, Peter B. Key:

Pricing the Cloud. 36-43 - Robert Brzoza-Woch, Piotr Nawrocki

:
FPGA-Based Web Services - Infinite Potential or a Road to Nowhere? 44-51 - Miguel Coronado, Carlos Angel Iglesias

:
Task Automation Services: Automation for the Masses. 52-58 - Shivkumar Kalyanaraman:

Back to the Future: Lessons for Internet of Energy Networks. 60-65 - Zhuoqing Morley Mao:

Diagnosing Mobile Apps' Quality of Experience: Challenges and Promising Directions. 66-69 - Ewa Deelman, Karan Vahi, Mats Rynge

, Gideon Juve, Rajiv Mayani, Rafael Ferreira da Silva
:
Pegasus in the Cloud: Science Automation through Workflow Technologies. 70-76 - Jimmy Lin, Charles L. A. Clarke, Gaurav Baruah:

Searching from Mars. 78-82 - Hilarie Orman:

Both Sides Now: Thinking about Cloud Security. 83-87 - Vinton G. Cerf:

The Fragmentation of the Internet. 88-
Volume 20, Number 2, March - April 2016
- M. Brian Blake:

Reflecting on Software Engineering Research for Internet Computing. 4-6 - Alejandro Figueroa

, John Atkinson
:
Ensembling Classifiers for Detecting User Intentions behind Web Queries. 8-16 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:

A Look at the Third-Party Identity Management Landscape. 18-25 - Xiuquan Qiao, Junliang Chen, Wei Tan, Schahram Dustdar

:
Service Provisioning in Content-Centric Networking: Challenges, Opportunities, and Promising Directions. 26-33 - Spiros Koulouzis

, Adam Belloum
, Marian Bubak
, Pablo Lamata
, Daniel Nolte, Dmitry Vasyunin, Cees de Laat:
Distributed Data Management Service for VPH Applications. 34-41 - Guillermo Indalecio Fernández, Fernando Gomez-Folgar, Antonio J. García-Loureiro

:
GWMEP: Task-Manageras-a-Service in Apache CloudStack. 42-49 - Pavel Kucherbaev, Florian Daniel

, Stefano Tranquillini, Maurizio Marchese
:
Crowdsourcing Processes: A Survey of Approaches and Opportunities. 50-56 - Johannes M. Schleicher, Michael Vögler, Schahram Dustdar

, Christian Inzinger
:
Enabling a Smart City Application Ecosystem: Requirements and Architectural Aspects. 58-65 - Silvery Fu, Jiangchuan Liu, Xiaowen Chu

, Yueming Hu:
Toward a Standard Interface for Cloud Providers: The Container as the Narrow Waist. 66-71 - Pradeep K. Murukannaiah, Nirav Ajmeri

, Munindar P. Singh
:
Engineering Privacy in Social Applications. 72-76 - Wouter Beek

, Laurens Rietveld, Stefan Schlobach
, Frank van Harmelen
:
LOD Laundromat: Why the Semantic Web Needs Centralization (Even If We Don't Like It). 78-81 - Virgílio A. F. Almeida, Danilo Doneda, Yasodara Cordova:

Whither Social Media Governance? 82-84 - Kieron O'Hara

:
The Seven Veils of Privacy. 86-91 - Charles Petrie:

The Proper Use of the Internet: Digital Private Property. 92-94 - Vinton G. Cerf:

Our Fragile Power Grid. 96-
Volume 20, Number 3, May - June 2016
- M. Brian Blake:

Spanning Web Capabilities over Clouds. 4-6 - Robin Chen, Fred Douglis

:
Cloud Storage [Guest editoris' introduction]. 7-9 - Raúl Gracia Tinedo, Pedro García López, Marc Sánchez Artigas, Josep Sampé, Yosef Moatti, Eran Rom, Dalit Naor, Ramon Nou

, Toni Cortes
, William Oppermann, Pietro Michiardi:
IOStack: Software-Defined Object Storage. 10-18 - Matthew Malensek, Sangmi Lee Pallickara, Shrideep Pallickara:

Minerva: Proactive Disk Scheduling for QoS in Multitier, Multitenant Cloud Environments. 19-27 - Yue Cheng, M. Safdar Iqbal, Aayush Gupta, Ali Raza Butt

:
Provider versus Tenant Pricing Games for Hybrid Object Stores in the Cloud. 28-35 - Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:

MetaSync: Coordinating Storage across Multiple File Synchronization Services. 36-44 - Mingqiang Li, Chuan Qin, Jingwei Li

, Patrick P. C. Lee
:
CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal. 45-53 - Nitesh Mor, Ben Zhang, John Kolb, Douglas S. Chan, Nikhil Goyal, Nicholas Sun, Ken Lutz, Eric Allman, John Wawrzynek, Edward A. Lee, John Kubiatowicz:

Toward a Global Data Infrastructure. 54-62 - Kala Fleming, Peninah Waweru, Muuo Wambua, Elizabeth Ondula, Lianna Samuel:

Toward Quantified Small-Scale Farms in Africa. 63-67 - Robert J. Hall:

An Internet of Drones. 68-73 - Ingo Weber

, Surya Nepal
, Liming Zhu
:
Developing Dependable and Secure Cloud Applications. 74-79 - Xiaoming Fu

:
Signaling in IP-Based Networks: Retrospect and Prospect. 80-88 - Hilarie Orman:

The Power (Energy) of Cryptography. 90-94 - Vinton G. Cerf:

Practical Solutions: Basic and Applied Research, Science, Engineering, and Design. 95-96
Volume 20, Number 4, July - August 2016
- M. Brian Blake:

Customizing and Sizing the Internet for IoT Devices. 4-5 - Michael Rabinovich

, Mark Allman:
Measuring the Internet. 6-8 - Alok Tongaonkar:

A Look at the Mobile App Identification Landscape. 9-15 - Osvaldo L. H. M. Fonseca, Elverton C. Fazzion, Ítalo S. Cunha, Pedro Henrique B. Las-Casas, Dorgival O. Guedes

, Wagner Meira Jr., Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. Chaves:
Measuring, Characterizing, and Avoiding Spam Traffic Costs. 16-24 - Glauber D. Gonçalves, Idilio Drago

, Ana Paula Couto da Silva
, Alex Borges Vieira, Jussara M. Almeida:
The Impact of Content Sharing on Cloud Storage Bandwidth Consumption. 26-35 - Justin P. Rohrer

, Blake LaFever, Robert Beverly:
Empirical Study of Router IPv6 Interface Address Distributions. 36-45 - Salvatore Pontarelli, Pedro Reviriego

:
Cuckoo Cache: A Technique to Improve Flow Monitoring Throughput. 46-53 - Lanshan Zhang, Linhui Sun, Wendong Wang, Ye Tian:

KaaS: A Standard Framework Proposal on Video Skimming. 54-59 - Danilo Doneda, Virgílio A. F. Almeida:

What Is Algorithm Governance? 60-63 - Wei Tan, Yushun Fan, Ahmed Ghoneim

, M. Anwar Hossain
, Schahram Dustdar
:
From the Service-Oriented Architecture to the Web API Economy. 64-68 - Robert St. Amant, David L. Roberts:

Natural Interaction for Bot Detection. 69-73 - Amit P. Sheth, Pavan Kapanipathi:

Semantic Filtering for Social Data. 74-78 - Linnet Taylor:

From Zero to Hero: How Zero-Rating Became a Debate about Human Rights. 79-83 - Charles Petrie:

Emergent Collectives Redux: The Sharing Economy. 84-86 - Vinton G. Cerf:

On Risk. 87-88
Volume 20, Number 5, September - October 2016
- M. Brian Blake:

On Pikachu and Security and Privacy. 4 - Alvaro A. Cárdenas, Bruno Crispo:

Cyber-Physical Security and Privacy [Guest editors' introduction]. 6-8 - Samuel Litchfield, David Formby

, Jonathan D. Rogers
, A. P. Sakis Meliopoulos, Raheem A. Beyah
:
Rethinking the Honeypot for Cyber-Physical Systems. 9-17 - Mahdi Jamei, Emma M. Stewart, Sean Peisert

, Anna Scaglione
, Chuck McParland, Ciaran M. Roberts, Alex McEachern:
Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security. 18-27 - Jun Ho Huh, Rakesh B. Bobba

, Tom Markham, David M. Nicol, Julie Hull, Alexander Chernoguzov, Himanshu Khurana, Kevin Staggs, Jingwei Huang
:
Next-Generation Access Control for Distributed Control Systems. 28-37 - Sridhar Adepu, Siddhant Shrivastava

, Aditya Mathur:
Argus: An Orthogonal Defense Framework to Protect Public Infrastructure against Cyber-Physical Attacks. 38-45 - Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:

Direct Resource Hijacking in Android. 46-56 - Francisco Ibarra, Olga Korovina, Marcos Báez

, Fabio Casati
, Maurizio Marchese
, Luca Cernuzzi
, Galina A. Barysheva:
Tools Enabling Online Contributions by Older Adults. 58-65 - Haihang Zhou, Jianguo Yao, Xue Liu, Haibing Guan:

Enabling Energy Storage in Internet Datacenters: Requirements, Standards, and Opportunities. 66-70 - Philip A. Bernstein, Sergey Bykov:

Developing Cloud Services Using the Orleans Virtual Actor Model. 71-75 - Tien-Dung Cao

, Hanh Huu Hoang, Hiep Xuan Huynh, Binh-Minh Nguyen
, Tran Vu Pham, Minh-Triet Tran, Vu The Tran, Hong Linh Truong:
IoT Services for Solving Critical Problems in Vietnam: A Research Landscape and Directions. 76-81 - Jimmy Lin, Kareem El Gebaly:

The Future of Big Data Is ... JavaScript? 82-88 - Hilarie Orman:

Evil Offspring - Ransomware and Crypto Technology. 89-94 - Vinton G. Cerf:

Internet Collisions. 95-96
Volume 20, Number 6, November - December 2016
- Marco Avvenuti, Stefano Cresci

, Andrea Marchetti
, Carlo Meletti
, Maurizio Tesconi
:
Predictability or Early Warning: Using Social Media in Modern Emergency Response. 4-6 - Kaustubh Joshi, Theophilus Benson:

Network Function Virtualization. 7-9 - Chengwei Wang, Oliver Spatscheck, Vijay Gopalakrishnan, Yang Xu, David L. Applegate:

Toward High-Performance and Scalable Network Functions Virtualization. 10-20 - Freddy Chong Tat Chua, Julie Ward, Ying Zhang, Puneet Sharma, Bernardo A. Huberman:

Stringer: Balancing Latency and Resource Usage in Service Function Chain Provisioning. 22-31 - Kim Khoa Nguyen, Mohamed Cheriet:

Virtual Edge-Based Smart Community Network Management. 32-41 - Ali C. Begen

:
Spending "Quality"' Time with the Web Video. 42-48 - Virgílio A. F. Almeida, Danilo Doneda, Carolina Rossini:

How Do App Stores Challenge the Global Internet Governance Ecosystem? 49-51 - Bengt Ahlgren, Markus Hidell, Edith C. H. Ngai:

Internet of Things for Smart Cities: Interoperability and Open Data. 52-56 - Christopher J. Hazard, Munindar P. Singh

:
Privacy Risks in Intelligent User Interfaces. 57-61 - Ian Horrocks

, Martin Giese, Evgeny Kharlamov, Arild Waaler:
Using Semantic Technology to Tame the Data Variety Challenge. 62-66 - Johannes M. Schleicher, Michael Vögler, Schahram Dustdar

, Christian Inzinger:
Application Architecture for the Internet of Cities: Blueprints for Future Smart City Applications. 68-75 - Charles Petrie:

Protect Data, Not Algorithms. 76-77 - Vinton G. Cerf:

"Ethics". 79-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














