default search action
IEEE Internet Computing, Volume 18
Volume 18, Number 1, January - February 2014
- Anirban Mahanti:
The Evolving Streaming Media Landscape. 4-6 - Anirban Mahanti, Subhabrata Sen:
High-Performance Mobile Internet. 8-11 - F. Javier Rivas Tocado, Almudena Díaz-Zayas, Pedro Merino Gómez:
Characterizing Traffic Performance in Cellular Networks. 12-19 - Jong-Hyouk Lee, Kamal Deep Singh, Jean-Marie Bonnin, Sangheon Pack:
Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach. 20-29 - JongWoo Ha, Jung-Hyun Lee, SangKeun Lee:
EPE: An Embedded Personalization Engine for Mobile Users. 30-37 - Rolf Oppliger:
Certification Authorities Under Attack: A Plea for Certificate Legitimation. 40-47 - Daniela Godoy, Gustavo Rodríguez, Franco Scavuzzo:
Leveraging Semantic Similarity for Folksonomy-Based Recommendation. 48-55 - Oliver Gass, Hendrik Meth, Alexander Maedche:
PaaS Characteristics for Productive Software Development: An Evaluation Framework. 56-64 - Amir Herzberg, Haya Schulmann:
Retrofitting Security into Network Protocols: The Case of DNSSEC. 66-71 - Azer Bestavros, Orran Krieger:
Toward an Open Cloud Marketplace: Vision and First Steps. 72-77 - Mirco Musolesi:
Big Mobile Data Mining: Good or Evil? 78-81 - Hilarie Orman:
Recent Parables in Cryptography. 82-86 - Vinton G. Cerf:
Unfinished Business. 88
Volume 18, Number 2, March - April 2014
- Pinghui Wang, Wenbo He, Junzhou Zhao:
A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare. 10-15 - Lorenz Schwittmann, Matthäus Wander, Christopher Boelmann, Torben Weis:
Privacy Preservation in Decentralized Online Social Networks. 16-23 - Fei Hao, Stephen S. Yau, Geyong Min, Laurence T. Yang:
Detecting k-Balanced Trusted Cliques in Signed Social Networks. 24-31 - Félix Gómez Mármol, Manuel Gil Pérez, Gregorio Martínez Pérez:
Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach. 32-40 - Yuehai Xu, Eitan Frachtenberg, Song Jiang, Mike Paleczny:
Characterizing Facebook's Memcached Workload. 41-49 - Nikolai Samteladze, Ken Christensen:
DELTA++: Reducing the Size of Android Application Updates. 50-57 - Karen Bartleson:
Market-Driven Standards and the IEEE-SA. 58-62 - Ejub Kajan, Noura Faci, Zakaria Maamar, Alfred Loo, Aldina Pljaskovic, Quan Z. Sheng:
The Network-Based Business Process. 63-69 - Christophe Guéret, Victor de Boer, Stefan Schlobach:
Let's "Downscale" Linked Data. 70-73 - Charles L. Ortiz:
The Road to Natural Conversational Speech Interfaces. 74-78 - Vinton G. Cerf:
Instrument Thyself! 88
Volume 18, Number 3, May - June 2014
- Anne-Marie Kermarrec:
Computer Science: Too Young to Fall into the Gender Gap. 4-6 - Mark Claypool, Grenville Armitage, M. Brian Blake:
Networked Games in the Midst of the Clouds [Guest editors' introduction]. 8-11 - Wei Cai, Min Chen, Victor C. M. Leung:
Toward Gaming as a Service. 12-18 - Debadatta Mishra, Magda El Zarki, Aiman Erbad, Cheng-Hsin Hsu, Nalini Venkatasubramanian:
Clouds + Games: A Multifaceted Approach. 20-27 - Helmut Prendinger, João Oliveira, Joao Catarino, Marconi Madruga Filho, Rui Prada:
iCO2: A Networked Game for Collecting Large-Scale Eco-Driving Behavior Data. 28-35 - Alexandru Iosup, Ruud van de Bovenkamp, Siqi Shen, Adele Lu Jia, Fernando A. Kuipers:
Analyzing Implicit Social Networks in Multiplayer Online Games. 36-44 - Pankaj R. Telang, Anup K. Kalia, Munindar P. Singh:
Engineering Service Engagements via Commitments. 46-54 - Paolo Bellavista, Carlo Giannelli, Luca Iannario, Laurent-Walter Goix, Claudio Venezia:
Peer-to-Peer Content Sharing Based on Social Identities and Relationships. 55-63 - Kejiang Ye, Zhaohui Wu, Bing Bing Zhou, Xiaohong Jiang, Chen Wang, Albert Y. Zomaya:
Virt-B: Towards Performance Benchmarking of Virtual Machine Systems. 64-72 - Emiliano Miluzzo:
I'm Cloud 2.0, and I'm Not Just a Data Center. 73-77 - Wei-Tek Tsai, Wenjun Wu, Michael N. Huhns:
Cloud-Based Software Crowdsourcing. 78-83 - Yong Cui, Qi Sun, Ke Xu, Wendong Wang, Ted Lemon:
Configuring IPv4 over IPv6 Networks: Transitioning with DHCP. 84-88 - Hilarie Orman:
Co-Evolution with Social Networks: Deception is Protection. 90-94 - Vinton G. Cerf, Nii Narku Quaynor:
The Internet of Everyone. 96
Volume 18, Number 4, July - August 2014
- Stephen Farrell:
Why Pervasive Monitoring Is Bad. 4-7 - Fred Douglis:
Web-Scale Datacenters. 13-14 - Yunjing Xu, Zachary Musgrave, Brian Noble, Michael D. Bailey:
Workload-Aware Provisioning in Public Clouds. 15-21 - Rahul Singh, Prateek Sharma, David E. Irwin, Prashant J. Shenoy, K. K. Ramakrishnan:
Here Today, Gone Tomorrow: Exploiting Transient Servers in Datacenters. 22-29 - Chao-Chih Chen, Peng Sun, Lihua Yuan, David A. Maltz, Chen-Nee Chuah, Prasant Mohapatra:
SWIM: A Switch Manager for Datacenter Networks. 30-36 - Kim Khoa Nguyen, Mohamed Cheriet, Yves Lemieux:
Virtual Slice Assignment in Large-Scale Cloud Interconnects. 37-46 - Xavier León, Rahma Chaabouni, Marc Sánchez Artigas, Pedro García López:
Smart Cloud Seeding for BitTorrent in Datacenters. 47-54 - Talal H. Noor, Quan Z. Sheng, Anne H. H. Ngu, Schahram Dustdar:
Analysis of Web-Scale Cloud Services. 55-61 - Eliot Lear:
The Internet Assigned Numbers Authority Transition. 62-65 - Alasdair J. G. Gray:
Dataset Descriptions for Linked Data Systems. 66-69 - Kazutoshi Sumiya, Daisuke Kitayama, Naiwala P. Chandrasiri:
Inferred Information Retrieval with User Operations on Digital Maps. 70-73 - Jeff Jaffe:
Web at 25, W3C at 20: An Opportunity to Reflect and Look to the Future. 74-78 - Kieron O'Hara:
In Worship of an Echo. 79-83 - Charles J. Petrie:
Is the Internet a Thing? 84-86 - Vinton G. Cerf:
Forty Years Ago... 88
Volume 18, Number 5, September - October 2014
- Carole A. Goble:
Better Software, Better Research. 4-8 - Paolo Boldi, Stefano Leonardi, Cecilia Mascolo, Michalis Vazirgiannis:
Web and Social Graph Mining. 9-10 - Abigail Paradise, Rami Puzis, Asaf Shabtai:
Anti-Reconnaissance Tools: Detecting Targeted Socialbots. 11-19 - Nir Ofek, Asaf Shabtai:
Dynamic Latent Expertise Mining in Social Networks. 20-27 - Marco Balduini, Alessandro Bozzon, Emanuele Della Valle, Yi Huang, Geert-Jan Houben:
Recommending Venues Using Continuous Predictive Social Media Analytics. 28-35 - Athanasios Papaoikonomou, Magdalini Kardara, Konstantinos Tserpes, Theodora A. Varvarigou:
Predicting Edge Signs in Social Networks Using Frequent Subgraph Discovery. 36-43 - Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan, Zhuoqing Morley Mao, Venugopalan Ramasubramanian, Doug Terry, Ted Wobber:
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones. 44-51 - Christoph Fehling, Frank Leymann, Ralph Retter:
Your Coffee Shop Uses Cloud Computing. 52-59 - Brian Trammell, Joe Hildebrand:
Evolving Transport in the Internet. 60-64 - Virgílio A. F. Almeida:
The Evolution of Internet Governance: Lessons Learned from NETmundial. 65-69 - Elkhan Dadashov, Ugur Çetintemel, Tim Kraska:
Putting Analytics on the Spot: Or How to Lower the Cost for Analytics. 70-73 - Eduardo Cuervo Laffaye:
Toward an Ideal Mobile World: Opportunities and Challenges. 74-78 - Vinton G. Cerf:
Bufferbloat and Other Internet Challenges. 80
Volume 18, Number 6, November - December 2014
- Michael Rabinovich:
The Reproducibility versus Debuggability of Research. 4-6 - Lieven Desmet, Martin Johns:
Real-Time Communications Security on the Web. 8-10 - Richard L. Barnes, Martin Thomson:
Browser-to-Browser Security Assurances for WebRTC. 11-17 - Victoria Beltran, Emmanuel Bertin, Noël Crespi:
User Identity for WebRTC Services: A Matter of Trust. 18-25 - Li Li, Wu Chou, Zhihong Qiu, Tao Cai:
Who Is Calling Which Page on the Web? 26-33 - Luis López-Fernández, Micael Gallego, Boni García, David Fernández-López, Francisco Javier Lopez:
Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento. 34-40 - Tyrone Grandison:
Security and Privacy in Web 2.0 [Guest editor's introduction]. 41-42 - Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh, Collin Jackson:
An Experimental Study of TLS Forward Secrecy Deployments. 43-51 - Andrew G. West, Adam J. Aviv:
Measuring Privacy Disclosures in URL Query Strings. 52-59 - Sean Turner:
Transport Layer Security. 60-63 - David R. Karger:
The Semantic Web and End Users: What's Wrong and How to Fix It. 64-70 - Pradeep K. Murukannaiah, Munindar P. Singh:
Understanding Location-Based User Experience. 72-76 - Soheil Qanbari, Fei Li, Schahram Dustdar:
Toward Portable Cloud Manufacturing Services. 77-80 - Kieron O'Hara:
The Fridge's Brain Sure Ain't the Icebox. 81-84 - Charles Petrie:
The Failure of HealthCare.gov Exposes Silicon Valley Secrets. 85-86 - Vinton G. Cerf:
Knocking Down Strawmen. 88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.