


default search action
IEEE Internet Computing, Volume 14, 2010
Volume 14, Number 1, January/February 2010
- Fred Douglis
:
It's All About the (Social) Network. 4-6 - Greg Goth:
New Internet Economics Might Not Make It to the Edge. 7-9 - Vinton G. Cerf, Munindar P. Singh
:
Internet Predictions. 10-11 - Deborah Estrin, K. Mani Chandy, Robert Michael Young, Larry Smarr, Andrew M. Odlyzko, David D. Clark, Viviane Reding, Toru Ishida
, Sharad Sharma, Vinton G. Cerf, Urs Hölzle, Luiz André Barroso, Geoff Mulligan, Adrian Hooke, Chip Elliott:
Internet Predictions. 12-42 - Gerd Kortuem
, Fahim Kawsar, Vasughi Sundramoorthy, Daniel Fitton:
Smart Objects as Building Blocks for the Internet of Things. 44-51 - Marko Vujasinovic
, Nenad Ivezic, Boonserm Kulvatunyou, Edward Barkmeyer, Michele Missikoff, Francesco Taglino, Zoran Marjanovic, Igor Miletic:
Semantic Mediation for Standard-Based B2B Interoperability. 52-63 - Norman F. Schneidewind:
Metrics for Mitigating Cybersecurity Threats to Networks. 64-71 - Joshua Bell, Morgaine Dinova, David Levine:
VWRAP for Virtual Worlds Interoperability. 73-77 - M. Brian Blake
, Wei Tan, Florian Rosenberg:
Composition as a Service. 78-82 - Stephen Farrell:
Why Didn't We Spot That? 84-87 - Amit P. Sheth:
Computing for Human Experience: Semantics-Empowered Sensors, Services, and Social Computing on the Ubiquitous Web. 88-91 - Charles J. Petrie:
Plenty of Room Outside the Firm. 92-96
Volume 14, Number 2, March/April 2010
- Fred Douglis
:
Turnpikes or Freeways? 4-6 - Greg Goth:
Data Center Operators Face Energy Irony. 7-10 - Huan Liu, Philip S. Yu, Nitin Agarwal, Torsten Suel:
Guest Editors' Introduction: Social Computing in the Blogosphere. 12-14 - Hady Wirawan Lauw
, John C. Shafer, Rakesh Agrawal, Alexandros Ntoulas:
Homophily in the Digital World: A LiveJournal Case Study. 15-23 - Geetika T. Lakshmanan, Martin A. Oberhofer:
Knowledge Discovery in the Blogosphere: Approaches and Challenges. 24-32 - Brian Ulicny, Mieczyslaw M. Kokar, Christopher J. Matheus:
Metrics For Monitoring A Social-Political Blogosphere: A Malaysian Case Study. 34-44 - Matthias Kranz
, Paul Holleis, Albrecht Schmidt
:
Embedded Interaction: Interacting with the Internet of Things. 46-53 - Shun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen
:
Peer-to-Peer 3D Streaming. 54-61 - Mario Muñoz Organero
, Pedro J. Muñoz Merino
, Carlos Delgado Kloos:
Personalized Service-Oriented E-Learning Environments. 62-67 - Theo Zourzouvillys, Eric Rescorla:
An Introduction to Standards-Based VoIP: SIP, RTP, and Friends. 69-73 - Angus K. Y. Wong:
The Near-Me Area Network. 74-77 - Stephen Ruth:
Is E-Learning Really Working? The Trillion-Dollar Question. 78-82 - Onyeka Ezenwoye, M. Brian Blake
, Gargi Dasgupta, Seyed Masoud Sadjadi, Selim Kalayci
, Liana L. Fong:
Managing Faults for Distributed Workflows over Grids. 84-88 - Justin Sheehy
, Steve Vinoski:
Developing RESTful Web Services with Webmachine. 89-92 - Cristiano Castelfranchi:
Bye-Bye Agents? Not. 93-96
Volume 14, Number 3, May/June 2010
- Fred Douglis
:
Sinking or Swimming in the Sea of Data. 3-5 - Greg Goth:
Conflicting Policies Lead to Disharmonic Convergence. 6-8 - Piero Fraternali, Gustavo Rossi
, Fernando Sánchez-Figueroa
:
Rich Internet Applications. 9-12 - Anantharaman P. Narayana Iyer, Arijit Chatterjee, Jyoti Kishnani:
Compiler Transformations to Enable Synchronous Execution in an RIA Runtime. 13-23 - Santiago Meliá
, Jaime Gómez, Sandy Pérez, Oscar Díaz
:
Architectural and Technological Variability in Rich Internet Applications. 24-32 - Raymond Y. K. Lau
, Rachael Kwai Fun Ip, M. T. Chan, Ron Chi-Wai Kwok, Sharon W. M. Wong, Johnny C. F. So, Eva Y. W. Wong:
Podcasting: An Internet-Based Social Technology for Blended Learning. 33-41 - Marcos André Gonçalves
, Jussara M. Almeida, Luiz G. P. dos Santos, Alberto H. F. Laender, Virgílio A. F. Almeida:
On Popularity in the Blogosphere. 42-49 - Luciano Baresi
, Sam Guinea, Olivier Nano, George Spanoudakis:
Comprehensive Monitoring of BPEL Processes. 50-57 - Mustafa Jarrar
, Marios D. Dikaiakos:
Querying the Data Web: The MashQL Approach. 58-67 - Quan Z. Sheng
, Zakaria Maamar, Hamdi Yahyaoui
, Jamal Bentahar
, Khouloud Boukadi
:
Separating Operational and Control Behaviors: A New Approach to Web Services Modeling. 68-76 - Steve Hanna, Susan Thomson:
NEA: Public Health for the Network. 77-80 - Amit P. Sheth, Ajith Ranabahu:
Semantic Modeling for Cloud Computing, Part 1. 81-83 - Stephen Farrell:
Applications Directly Using Cryptography. 84-87 - David Pollak, Steve Vinoski:
A Chat Application in Lift. 88-91 - Charles J. Petrie:
Is Google Evil? 92-96
Volume 14, Number 4, July/August 2010
- Fred Douglis
:
As I Emerge from the Mobile Phone Dark Ages, I Look Around in Fear and Wonder. 4-6 - Greg Goth:
The Global Net Neutrality Debate: Back to Square One? 7-9 - Elisa Bertino, Andrea Maurino, Monica Scannapieco:
Guest Editors' Introduction: Data Quality in the Internet Era. 11-13 - Cinzia Cappiello
, Florian Daniel
, Maristella Matera
, Cesare Pautasso:
Information Quality in Mashups. 14-22 - Hanna Köpcke, Andreas Thor
, Erhard Rahm
:
Learning-Based Approaches for Matching Web Data Entities. 23-31 - Carlos Rodríguez
, Florian Daniel, Fabio Casati
, Cinzia Cappiello
:
Toward Uncertain Business Intelligence: The Case of Key Indicators. 32-40 - Chih-Lu Lin, Hung-Yu Kao
:
Blog Popularity Mining Using Social Interconnection Analysis. 41-49 - Pedro Reviriego
, José Alberto Hernández
, David Larrabeiti
, Juan Antonio Maestro
:
Burst Transmission for Energy-Efficient Ethernet. 50-57 - Avishai Wool
:
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. 58-65 - Dan Wing:
Network Address Translation: Extending the Internet Address Space. 66-70 - Willem-Jan van den Heuvel, Mike P. Papazoglou
:
Toward Business Transaction Management in Smart Service Networks. 71-75 - Stephen Ezell, Scott Andes:
ICT R&D Policies: An International Perspective. 76-80 - Amit P. Sheth, Ajith Ranabahu:
Semantic Modeling for Cloud Computing, Part 2. 81-84 - Aaron Bedra:
Getting Started with Google App Engine and Clojure. 85-88
Volume 14, Number 5, September - October 2010
- Fred Douglis
:
Closing the Open (Face) Book. 4-6 - Greg Goth:
Something's in the Air: Broadband Advances Depend on Wireless. 7-9 - Ling Liu, Weisong Shi:
Trust and Reputation Management. 10-13 - Kai Hwang, Deyi Li:
Trusted Cloud Computing with Secure Resources and Data Coloring. 14-22 - Marc Sánchez Artigas:
The Impact of Churn on Uncertainty Decay in P2P Reputation Systems. 23-30 - Tomasz Kaszuba, Albert Hupa, Adam Wierzbicki
:
Advanced Feedback Management for Internet Auction Reputation Systems. 31-37 - Jingwei Huang
, David M. Nicol:
A Formal-Semantics-Based Calculus of Trust. 38-46 - Marco Crasso, Juan Manuel Rodriguez
, Alejandro Zunino
, Marcelo Campo
:
Revising WSDL Documents: Why and How. 48-56 - Nagaraju Pappu, Runa Sarkar, Tadinada Vankata Prabhakar:
Agropedia: Humanization of Agricultural Knowledge. 57-59 - Saurabh Ratti, Behnoosh Hariri, Shervin Shirmohammadi
:
A Survey of First-Person Shooter Gaming Traffic on the Internet. 60-69 - George Pallis
:
Cloud Computing: The New Frontier of Internet Computing. 70-73 - Xiao Su
, Suchreet K. Dhaliwal:
Incentive Mechanisms in P2P Media Streaming Systems. 74-81 - Sean Turner:
Secure/Multipurpose Internet Mail Extensions. 82-86 - Glenn Vanderburg:
Clojure Templating Libraries: Fleet and Enlive. 87-90 - Lutz Heuser, Dan Woods:
Is Europe Leading the Way to the Future Internet? 91-94 - Vinton G. Cerf:
Trust and the Internet. 95
Volume 14, Number 6, November - December 2010
- Fred Douglis
:
Thanks for the Fish ... but I'm Drowning! 4-6 - Greg Goth:
Medicine to Go: Is Mobile Imaging a Miracle or a Mess? 7-9 - Sonia Bergamaschi
, Francesco Guerra
, Barry Leiba:
Guest Editors' Introduction: Information Overload. 10-13 - Stefano Ceri, Adnan Abid, Mamoun Abu Helou
, Davide Francesco Barbieri, Alessandro Bozzon
, Daniele Braga, Marco Brambilla
, Alessandro Campi
, Francesco Corcoglioniti
, Emanuele Della Valle, Davide Eynard, Piero Fraternali, Michael Grossniklaus
, Davide Martinenghi
, Stefania Ronchi, Marco Tagliasacchi, Salvatore Vadacca:
Search Computing: Managing Complex Search Queries. 14-22 - Ana Belén Barragáns-Martínez
, Marta Rey-López, Enrique Costa-Montenegro
, Fernando A. Mikic-Fonte
, Juan C. Burguillo-Rial
, Ana Peleteiro-Ramallo:
Exploiting Social Tagging in a Web 2.0 Recommender System. 23-30 - Marcos Báez
, Aliaksandr Birukou
, Fabio Casati
, Maurizio Marchese
:
Addressing Information Overload in the Scientific Community. 31-38 - Elena Simperl
, Ian Thurlow, Paul Warren, Frank Dengler, John Davies, Marko Grobelnik, Dunja Mladenic
, José Manuél Gómez-Pérez, Carlos Ruiz Moreno:
Overcoming Information Overload in the Enterprise: The Active Approach. 39-46 - Jussara M. Almeida, Marcos André Gonçalves
, Flavio V. D. de Figueiredo, Henrique Pinto, Fabiano Muniz Belém:
On the Quality of Information for Web 2.0 Services. 47-55 - Karen Rose:
Africa Shifts Focus from Infrastructure to Interconnection. 56-58 - Stephen Ruth:
Bumps on the Road to the National Broadband Plan. 59-63 - Brian Cooper:
The Prickly Side of Building Clouds. 64-67 - J. D. Falk, Murray S. Kucherawy:
Battling Spam: The Evolution of Mail Feedback Loops. 68-71 - Yi Wei, M. Brian Blake
:
Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. 72-75 - Cecilia Mascolo:
The Power of Mobile Computing in a Social Era. 76-79 - Stefan Tilkov, Steve Vinoski:
Node.js: Using JavaScript to Build High-Performance Network Programs. 80-83 - Amit P. Sheth, Christopher Thomas, Pankaj Mehra
:
Continuous Semantics to Analyze Real-Time Data. 84-89 - Paul Hofmann, Dan Woods:
Cloud Computing: The Limits of Public Clouds for Business Applications. 90-93 - Vinton G. Cerf:
2012 Isn't the End of the World. 96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.