Journal: IEEE Internet Computing

Volume 15, Issue 6

3 -- 6Amit P. Sheth. Semantics Scales Up: Beyond Search in Web 3.0
7 -- 9Greg Goth. Public Sector Clouds Beginning to Blossom: Efficiency, New Culture Trumping Security Fears
10 -- 14Sergio Ilarri, Arantza Illarramendi, Eduardo Mena, Amit P. Sheth. Semantics in Location-Based Services [Guest editor's introduction]
15 -- 23Emanuele Della Valle, Irene Celino, Daniele Dell'Aglio, Ralph Grothmann, Florian Steinke, Volker Tresp. Semantic Traffic-Aware Routing Using the LarKC Platform
24 -- 31Alessandro Bozzon, Marco Brambilla, Stefano Ceri, Silvia Quarteroni. A Framework for Integrating, Exploring, and Searching Location-Based Web Data
32 -- 39William Van Woensel, Sven Casteleyn, Elien Paret, Olga De Troyer. Mobile Querying of Online Semantic Web Data for Context-Aware Applications
40 -- 43David J. H. Burden. A Semantic Approach to Virtual World Standards
44 -- 47María Blanca Ibáñez, Carlos Delgado Kloos, Derick Leony, José Jesús García Rueda, David Maroto. Learning a Foreign Language in a Mixed-Reality Environment
48 -- 57John Evans, Ali C. Begen, Jason Greengrass, Clarence Filsfils. Toward Lossless Video Transport
58 -- 64Mariano Rico, Óscar Corcho, Victor Mendez, José Manuél Gómez-Pérez. A Semantically Enhanced UPnP Control Point for Sharing Multimedia Content
65 -- 69Catherine Welch. Global Internet Freedom Policy: Evolution, Action, and Reaction
70 -- 73Tom Heath. Linked Data - Welcome to the Data Network
74 -- 79Michael P. Papazoglou, Willem-Jan van den Heuvel. Blueprinting the Cloud
80 -- 84Jeremy A. Grant. The National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy through Standards
85 -- 89Ajith Ranabahu, Paul Anderson, Amit P. Sheth. The Cloud Agnostic e-Science Analysis Platform
90 -- 93Christine Satchell, Marcus Foth. Darkness and Disaster in the City
94 -- 96Karen Rose. AfPIF: Growing Africa's Internet Infrastructure
97 -- 102Mark McGranaghan. ClojureScript: Functional Programming for JavaScript Platforms
103 -- 0Vinton G. Cerf. Natural Disasters and Electric Infrastructure

Volume 15, Issue 5

4 -- 6J. D. Tygar. Adversarial Machine Learning
7 -- 10Greg Goth. Wi-Fi Making Big New Waves: "In-Room" High-Speed Uses to Get Big Boost from Wireless Mainstay
11 -- 14Craig W. Thompson. Virtual World Architectures
15 -- 21Neil Katz, Thomas Cook, Robert Smart. Extending Web Browsers with a Unity 3D-Based Virtual Worlds Viewer
22 -- 29Cristina Videira Lopes. Hypergrid: Architecture and Protocol for Virtual World Interoperability
30 -- 37Toni Alatalo. An Entity-Component Model for Extensible Virtual Worlds
38 -- 45Jonathan Kaplan, Nicole Yankelovich. Open Wonderland: An Extensible Virtual World Architecture
46 -- 52Joshua Eno, Craig W. Thompson. Virtual and Real-World Ontology Services
53 -- 55Anthony J. Rigby, Mark Melaney, Kenneth Rigby. Accuracy in 3D Virtual Worlds Applications: Interactive 3D Modeling of the Refractory Linings of Copper Smelters
56 -- 61Austin Tate. I-Room: Augmenting Virtual Worlds with Intelligent Systems
62 -- 65Jaehong Park, Ravi S. Sandhu, Yuan Cheng. A User-Activity-Centric Framework for Access Control in Online Social Networks
66 -- 71Schahram Dustdar, Yike Guo, Benjamin Satzger, Hong Linh Truong. Principles of Elastic Processes
72 -- 77Andrei Agapi, Ken Birman, Robert M. Broberg, Chase Cotton, Thilo Kielmann, Martin Millnert, Rick Payne, Robert Surton, Robbert van Renesse. Routers for the Cloud: Can the Internet Achieve 5-Nines Availability?
78 -- 82Lucy Lynch. Inside the Identity Management Game
83 -- 86Nitya Narasimhan. When the Shift Hits the (Television) Fan: A Growing Opportunity for Companion Devices
87 -- 94Dean Wampler. Scala Web Frameworks: Looking Beyond Lift
95 -- 98Stephen Farrell. Not Reinventing PKI until We Have Something Better
99 -- 102Charles J. Petrie. Emergent Collectives
104 -- 0Vinton G. Cerf. The Battle for Internet Openness

Volume 15, Issue 4

3 -- 5Munindar P. Singh. Self-Renewing Applications
6 -- 9Greg Goth. Software-Defined Networking Could Shake Up More than Packets
10 -- 13Chimezie Ogbuji, Karthik Gomadam, Charles J. Petrie. Web Technology and Architecture for Personal Health Records
14 -- 22Florian Daniel, Fabio Casati, Patrícia Silveira, Monica Verga, Marco Nalin. Beyond Health Tracking: A Personal Health and Lifestyle Platform
23 -- 30Ronan Fox, James Cooley, Manfred Hauswirth. Creating a Virtual Personal Health Record Using Mashups
31 -- 38Randike Gajanayake, Renato Iannella, Tony Sahama. Sharing with Care: An Information Accountability Perspective
39 -- 47Adam Belloum, Márcia A. Inda, Dmitry Vasunin, Vladimir Korkhov, Zhiming Zhao, Han Rauwerda, Timo M. Breit, Marian Bubak, Louis O. Hertzberger. Collaborative e-Science Experiments and Scientific Workflows
48 -- 54Zakaria Maamar, Pédro Bispo dos Santos, Leandro Krug Wives, Youakim Badr, Noura Faci, José Palazzo Moreira de Oliveira. Using Social Networks for Web Services Discovery
56 -- 63Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen. Security Issues in Online Social Networks
64 -- 69Siani Pearson. Toward Accountability in the Cloud
70 -- 74Samad S. Kolahi, Peng Li. Evaluating IPv6 in Peer-to-Peer 802.11n Wireless LANs
75 -- 79Sascha D. Meinrath, James W. Losey, Benjamin Lennett. A Growing Digital Divide: Internet Freedom and the Negative Impact of Command-and-Control Networking
80 -- 83Schahram Dustdar, Martin Gaedke. The Social Routing Principle
84 -- 87Jörg Ott. Me - Your ISP
88 -- 89Greg Wood. IPv6: Making Room for the World on the Future Internet
90 -- 94Steve Vinoski. Yaws: Yet Another Web Server
96 -- 0Vinton G. Cerf. Secure Identities

Volume 15, Issue 3

4 -- 6Maarten van Steen. Computer Science, Informatics, and the Networked World
7 -- 9Greg Goth. Huge Growth for Video Telephony? Skeptics Wary of Predicted Data Crunch
10 -- 12Gail-Joon Ahn, Mohamed Shehab, Anna Cinzia Squicciarini. Security and Privacy in Social Networks
13 -- 19Danesh Irani, Steve Webb, Calton Pu, Kang Li. Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks
20 -- 27Carmen Ruiz Vicente, Dario Freni, Claudio Bettini, Christian S. Jensen. Location-Related Privacy in Geo-Social Networks
28 -- 34Markus Huber, Martin Mulazzani, Edgar Weippl, Gerhard Kitzler, Sigrun Goluch. Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam
35 -- 42Na Li, Nan Zhang, Sajal K. Das. Preserving Relation Privacy in Online Social Network Data
43 -- 50Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha Pratim Pal, Virginia Travers, John A. Zinky. Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy
51 -- 58Torben Weis, Arno Wacker. Federating Websites with the Google Wave Protocol
59 -- 63Ali C. Begen, Tankut Akgul, Mark Baugher. Watching Video over the Web: Part 2: Applications, Standardization, and Open Issues
64 -- 69Schahram Dustdar, Kamal Bhattacharya. The Social Compute Unit
70 -- 73Ian T. Foster. Globus Online: Accelerating and Democratizing Science through Cloud-Based Services
74 -- 78Nathaniel S. Borenstein, James Blake. Cloud Computing Standards: Where s the Beef?
79 -- 80Landon P. Cox. Usefulness Is Not Trustworthiness
81 -- 85Michael Snoyman. Warp: A Haskell Web Server
86 -- 91Stephen Farrell. Security in the Wild
92 -- 94Joseph G. Davis. From Crowdsourcing to Crowdservicing
96 -- 0Jim Gettys. Bufferbloat: Dark Buffers in the Internet

Volume 15, Issue 2

4 -- 6M. Brian Blake. In Vivo Internet Computing: Bionic Web Surfing
7 -- 10Greg Goth. Welcome to the Age of Antidiplomacy
11 -- 14Dejan S. Milojicic, Ignacio Martín Llorente, Rubén S. Montero. OpenNebula: A Cloud Management Tool
15 -- 18Virgílio A. F. Almeida, Jussara M. Almeida. Internet Workloads: Measurement, Characterization, and Modeling
19 -- 26Alexandru Iosup, Dick H. J. Epema. Grid Computing Workloads
27 -- 34Jeffrey Erman, Alexandre Gerber, Mohammad Taghi Hajiaghayi, Dan Pei, Subhabrata Sen, Oliver Spatscheck. To Cache or Not to Cache: The 3G Case
35 -- 42Yongmin Choi, John A. Silvester, Hyun-Chul Kim. Analyzing and Modeling Workload Characteristics in a Multiservice IP Network
43 -- 49Angelica Caro, Coral Calero, Maria Ángeles Moraga. Are Web Visibility and Data Quality Related Concepts?
50 -- 53Ang Li, Xiaowei Yang, Srikanth Kandula, Ming Zhang. Comparing Public-Cloud Providers
54 -- 63Ali C. Begen, Tankut Akgul, Mark Baugher. Watching Video over the Web: Part 1: Streaming Protocols
64 -- 69Kim Chang, Anthony Soong, Mitch Tseng, Zhixian Xiang. Global Wireless Machine-to-Machine Standardization
70 -- 74Sekou L. Remy, M. Brian Blake. Distributed Service-Oriented Robotics
75 -- 78Stephen Ruth. By the Numbers - A Researcher s Bonanza of ICT Policy-Level Information
82 -- 85Eamonn O Neill. The Future Is a Foreign Country: We ll Do Things Differently There
86 -- 89Steve Vinoski. Process Bottlenecks within Erlang Web Applications
90 -- 94Zakaria Maamar, Hakim Hacid, Michael N. Huhns. Why Web Services Need Social Networks
95 -- 96Vinton G. Cerf. Sherry Turkle: Alone Together

Volume 15, Issue 1

4 -- 6Michael Rabinovich. Engineers or Scientists?
9 -- 12Dejan S. Milojicic. Autograding in the Cloud: Interview with David O Hallaron
13 -- 15Greg Goth. Privacy Gets a New Round of Prominence
17 -- 21Geetika T. Lakshmanan, Francisco Curbera, Juliana Freire, Amit P. Sheth. Guest Editors Introduction: Provenance in Web Applications
22 -- 30Hamid R. Motahari Nezhad, Boualem Benatallah, Fabio Casati, Régis Saint-Paul. From Business Processes to Process Spaces
31 -- 39Yannis Theoharis, Irini Fundulaki, Grigoris Karvounarakis, Vassilis Christophides. On Provenance of Queries on Semantic Web Data
40 -- 48Jun Zhao, Satya Sanket Sahoo, Paolo Missier, Amit P. Sheth, Carole A. Goble. Extending Semantic Provenance into the Web of Data
49 -- 58Christoph Ringelstein, Steffen Staab. Papel: Provenance-Aware Policy Definition and Execution
60 -- 65Craig W. Thompson. Next-Generation Virtual Worlds: Architecture, Status, and Directions
66 -- 71Blooma Mohan John, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh. What Makes a High-Quality User-Generated Answer?
72 -- 75Roger S. Barga, Dennis Gannon, Daniel A. Reed. The Client and the Cloud: Democratizing Research Computing
76 -- 80Barry Leiba, Mike Thomas, Dave Crocker. Author Domain Signing Practices (ADSP): Point and Counterpoint
81 -- 83Jakob Eriksson. Privacy Is Dead: Long Live Surveillance Symmetry
88 -- 91Stephen Farrell. Leaky or Guessable Session Identifiers
92 -- 95Oliver Spatscheck, Jacobus E. van der Merwe. The Unpublicized Sea Change in the Internet
96 -- 0Vinton G. Cerf. Open Source, Smart Grid, and Mobile Apps