Journal: IEEE Internet Computing

Volume 13, Issue 6

4 -- 5Fred Douglis. Phone + Internet Cafe = Secure Banking? You Betcha
6 -- 8Greg Goth. Municipal Wireless Gets New Emphasis: Rethinking the Infrastructure Cloud
9 -- 0Cécile Germain-Renaud, Omer F. Rana. The Convergence of Clouds, Grids, and Autonomics
10 -- 13Barry Leiba. Guest Editor s Introduction: Unwanted Traffic: Finding and Defending against Denial of Service, Spam, and Other Internet Flotsam
14 -- 21Mat Ford, Leslie Daigle. Addressing Unwanted Traffic on the Internet: A Community Response
22 -- 30Jayaraj Poroor, Bharat Jayaraman. DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts
31 -- 38Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre. Demystifying Cluster-Based Fault-Tolerant Firewalls
39 -- 47Kevin Feeney, David Lewis, Declan O Sullivan. Service-Oriented Policy Management for Web-Application Frameworks
48 -- 55Alexandros Batzios, Pericles A. Mitkas. db4OWL: An Alternative Approach to Organizing and Storing Semantic Data
56 -- 64Zeljko Obrenovic, Dragan Gasevic. Mashing Up Oil and Water: Combining Heterogeneous Services for Diverse Users
65 -- 73Paul W. P. J. Grefen, Rik Eshuis, Nikolay Mehandjiev, Giorgos Kouvas, Georg Weichhart. Internet-Based Support for Process-Oriented Instant Virtual Enterprises
74 -- 81Gregor Broll, Enrico Rukzio, Massimo Paolucci, Matthias Wagner, Albrecht Schmidt, Heinrich Hussmann. Perci: Pervasive Service Interaction with the Internet of Things
82 -- 87Alex McMahon, Stephen Farrell. Delay- and Disruption-Tolerant Networking
88 -- 91Daniel Castro, Scott Andes. The World Is Digital
93 -- 96Charles J. Petrie. Practical Web Services

Volume 13, Issue 5

4 -- 6Barry Leiba. Having One s Head in the Cloud
7 -- 9Greg Goth. Traffic Intelligence Companies Monitor Censorship Efforts
10 -- 13Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, Athena Vakali. Cloud Computing: Distributed Internet Computing for IT and Scientific Research
14 -- 22Borja Sotomayor, Rubén S. Montero, Ignacio Martín Llorente, Ian T. Foster. Virtual Infrastructure Management in Private and Hybrid Clouds
24 -- 33Alexandre di Costanzo, Marcos Dias de Assunção, Rajkumar Buyya. Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure
34 -- 42John Erickson, Michael Rhodes, Susan Spence, David Banks, James Rutherford, Edwin Simpson, Guillaume Belrose, Russell Perry. Content-Centered Collaboration Spaces in the Cloud
43 -- 51Katarzyna Keahey, Maurício O. Tsugawa, Andréa M. Matsunaga, José A. B. Fortes. Sky Computing
52 -- 59Juan C. Dueñas, José L. Ruiz, Félix Cuadrado, Boni García, Hugo A. Parada G.. System Virtualization Tools for Software Development
60 -- 70Federica Mandreoli, Riccardo Martoglia, Wilma Penzo, Simona Sassatelli. Data-Sharing P2P Networks with Semantic Approximation Capabilities
72 -- 80Qinyuan Feng, Kai Hwang, Yafei Dai. Rainbow Product Ranking for Upgrading E-Commerce
81 -- 85Preethi Natarajan, Fred Baker, Paul D. Amer, Jonathan T. Leighton. SCTP: What, Why, and How
86 -- 90Iman Saleh, Gregory Kulczycki, M. Brian Blake. Demystifying Data-Centric Web Services
91 -- 93Stephen Farrell. API Keys to the Kingdom
94 -- 96Charles J. Petrie. The Semantics of Semantics

Volume 13, Issue 4

4 -- 5Fred Douglis. Information Overload, 140 Characters at a Time
6 -- 10Greg Goth. Unique Identifier Quandary Exemplifies Health Net Obstacles
11 -- 17Qing Li, Rynson W. H. Lau, Benjamin W. Wah, Helen Ashman, Elvis Wai Chung Leung, Frederick W. B. Li, Victor Lee. Guest Editors Introduction: Emerging Internet Technologies for E-Learning
18 -- 25Stefaan Ternier, Katrien Verbert, Gonzalo Parra, Bram Vandeputte, Joris Klerkx, Erik Duval, Vicente Ordonez, Xavier Ochoa. The Ariadne Infrastructure for Managing and Storing Metadata
26 -- 33Wen-Chih Chang, Te-Hua Wang, Freya H. Lin, Hsuan-Che Yang. Game-Based Learning with Ubiquitous Technologies
34 -- 41Tiffany Ya Tang, Gordon I. McCalla. A Multidimensional Paper Recommender: Experiments and Evaluations
42 -- 51Michael Mackay, Christopher Edwards. A Managed IPv6 Transitioning Architecture for Large Network Deployments
52 -- 58Alberto Bartoli, Giorgio Davanzo, Eric Medvet. The Reaction Time to Web Site Defacements
59 -- 67Marko Grobelnik, Dunja Mladenic, Blaz Fortuna. Semantic Technology for Capturing Communication Inside an Organization
68 -- 73Michael Hausenblas. Exploiting Linked Data to Build Web Applications
74 -- 78Stephen Ruth. Green IT
82 -- 86Al Morton. Performance Metrics for All
87 -- 92Amit Sheth. Citizen Sensing, Social Signals, and Enriching Human Experience
93 -- 96Dave Bryson, Steve Vinoski. Build Your Next Web Application with Erlang

Volume 13, Issue 3

4 -- 6Fred Douglis. Staring at Clouds
7 -- 10Greg Goth. Reaping Deep Web Rewards Is a Matter of Semantics
11 -- 14Greg Thompson, Yih-Farn Robin Chen. IPTV: Reinventing Television in the Internet Age
15 -- 22Robert D. Doverspike, Guangzhi Li, Kostas N. Oikonomou, K. K. Ramakrishnan, Rakesh K. Sinha, Dongmei Wang, Chris Chase. Designing a Reliable IPTV Network
23 -- 31Soohong Park, Seong-Ho Jeong. Mobile IPTV: Approaches, Challenges, Standards, and QoS Support
32 -- 39Jun Shan Wey, Joachim Lüken, Jürgen Heiles. Standardization Activities for IPTV Set-Top Box Remote Management
40 -- 47Ali C. Begen, Neil Glazebrook, William Ver Steeg. Reducing Channel-Change Times with the Real-Time Transport Protocol
48 -- 55Evan Welbourne, Leilani Battle, Garrett Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, Gaetano Borriello. Building the Internet of Things Using RFID: The RFID Ecosystem Experience
56 -- 63Kuan-Ta Chen, Jau-Yuan Chen, Chun-Rong Huang, Chu-Song Chen. Fighting Phishing with Discriminative Keypoint Features
64 -- 71Yalin Yarimagan, Asuman Dogac. A Semantic-Based Solution for UBL Schema Interoperability
72 -- 80Philipp Leitner, Florian Rosenberg, Schahram Dustdar. Daios: Efficient Dynamic Web Service Invocation
82 -- 87Frances M. T. Brazier, Jeffrey O. Kephart, H. Van Dyke Parunak, Michael N. Huhns. Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda
88 -- 92Debasish Ghosh, Steve Vinoski. Scala and Lift—Functional Recipes for the Web
94 -- 96Stephen Farrell. Keys Don t Grow in Threes

Volume 13, Issue 2

4 -- 6Fred Douglis. Unease of Use
7 -- 9Greg Goth. Governments Experiment with New Fiber Network Models
11 -- 15Asit Dan, Priya Narasimhan. Dependable Service- Oriented Computing
16 -- 25Kwei-Jay Lin, Mark Panahi, Yue Zhang 0001, Jing Zhang, Soo Ho Chang. Building Accountability Middleware to Support Dependable SOA
26 -- 34Jianwei Yin, Hanwei Chen, ShuiGuang Deng, Zhaohui Wu, Calton Pu. A Dependable ESB Framework for Service Integration
36 -- 43Frédéric Thiesse, Christian Floerkemeier, Mark Harrison, Florian Michahelles, Christof Roduner. Technology, Standards, and Real-World Deployments of the EPC Network
44 -- 50Dezhi Wu, Michael Bieber, Starr Roxanne Hiltz. Asynchronous Participatory Exams: Internet Innovation for Engaging Students
51 -- 59Matthias Trier, Annette Bobrik. Social Search: Exploring and Searching Social Architectures in Digital Networks
60 -- 68Claudia Canali, Michele Colajanni, Riccardo Lancellotti. Performance Evolution of Mobile Web-Based Services
69 -- 73Daniel Castro, Rob Atkinson. Ten Ideas for Policymakers to Drive Digital Progress
74 -- 82Jason Greengrass, John Evans, Ali C. Begen. Not All Packets Are Equal, Part 2: The Impact of Network Packet Loss on Video Quality
83 -- 87Rob Weir. OpenDocument Format: The Standard for Office Documents
88 -- 91M. Brian Blake. Knowledge Discovery in Services
92 -- 98Murat Karakaya, Ibrahim Korpeoglu, Özgür Ulusoy. Free Riding in Peer-to-Peer Networks
99 -- 101Jim Miller. One More Take on Identity
102 -- 104Steve Vinoski. Welcome to The Functional Web

Volume 13, Issue 1

4 -- 6Fred Douglis. Protect Us from Ourselves
7 -- 10Greg Goth. Network-Enabled Compulsory Education Getting Big Push
11 -- 13George Roussos, Sastry Duri, Craig W. Thompson. RFID Meets the Internet
14 -- 21John P. T. Mo, Quan Z. Sheng, Xue Li, Sherali Zeadally. RFID Infrastructure Design: A Case Study of Two Australian RFID Projects
22 -- 30Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos. Transf-ID: Automatic ID and Data Capture for Rail Freight Asset Management
31 -- 38Alexander Ilic, Thomas Andersen, Florian Michahelles. Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis
40 -- 47Zaki Malik, Athman Bouguettaya. Reputation Bootstrapping for Trust Establishment among Web Services
48 -- 55Michael Kassoff, Charles J. Petrie, Lee-Ming Zen, Michael R. Genesereth. Semantic Email Addressing: The Semantic Web Killer App?
56 -- 64Li-Hsing Yen, Tse-Tsung Yeh, Kuang-Hui Chi. Load Balancing in IEEE 802.11 Networks
66 -- 69Barry Leiba. The Good and the Bad of Top-Level Domains
70 -- 75Jason Greengrass, John Evans, Ali C. Begen. Not All Packets Are Equal, Part I: Streaming Video Coding and SLA Requirements
76 -- 80Amit Sheth, Meenakshi Nagarajan. Semantics-Empowered Social Computing
82 -- 85Stephen Farrell. Why Don t We Encrypt Our Email?
86 -- 89Danny Ayers. Delivered Deliverables: The State of the Semantic Web, Part 1
90 -- 93Carl Hewitt. Perfect Disruption: The Paradigm Shift from Mental Agents to ORGs
96 -- 95Steve Vinoski. New Year s Integration Resolutions