Journal: IEEE Internet Computing

Volume 18, Issue 6

4 -- 6Michael Rabinovich. The Reproducibility versus Debuggability of Research
8 -- 10Lieven Desmet, Martin Johns. Real-Time Communications Security on the Web
11 -- 17Richard L. Barnes, Martin Thomson. Browser-to-Browser Security Assurances for WebRTC
18 -- 25Victoria Beltran, Emmanuel Bertin, Noël Crespi. User Identity for WebRTC Services: A Matter of Trust
26 -- 33Li Li 0001, Wu Chou, Zhihong Qiu, Tao Cai. Who Is Calling Which Page on the Web?
34 -- 40Luis Lopez Fernandez, Micael Gallego, Boni Garcia, David Fernández-López, Francisco-Javier Lopez. Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento
41 -- 42Tyrone Grandison. Security and Privacy in Web 2.0 [Guest editor's introduction]
43 -- 51Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh, Collin Jackson. An Experimental Study of TLS Forward Secrecy Deployments
52 -- 59Andrew G. West, Adam J. Aviv. Measuring Privacy Disclosures in URL Query Strings
60 -- 63Sean Turner. Transport Layer Security
64 -- 70David R. Karger. The Semantic Web and End Users: What's Wrong and How to Fix It
72 -- 76Pradeep K. Murukannaiah, Munindar P. Singh. Understanding Location-Based User Experience
77 -- 80Soheil Qanbari, Fei Li, Schahram Dustdar. Toward Portable Cloud Manufacturing Services
81 -- 84Kieron O'Hara. The Fridge's Brain Sure Ain't the Icebox
85 -- 86Charles Petrie. The Failure of HealthCare.gov Exposes Silicon Valley Secrets
88 -- 0Vinton G. Cerf. Knocking Down Strawmen

Volume 18, Issue 5

4 -- 8Carole A. Goble. Better Software, Better Research
9 -- 10Paolo Boldi, Stefano Leonardi, Cecilia Mascolo, Michalis Vazirgiannis. Web and Social Graph Mining
11 -- 19Abigail Paradise, Rami Puzis, Asaf Shabtai. Anti-Reconnaissance Tools: Detecting Targeted Socialbots
20 -- 27Nir Ofek, Asaf Shabtai. Dynamic Latent Expertise Mining in Social Networks
28 -- 35Marco Balduini, Alessandro Bozzon, Emanuele Della Valle, Yi Huang, Geert-Jan Houben. Recommending Venues Using Continuous Predictive Social Media Analytics
36 -- 43Athanasios Papaoikonomou, Magdalini Kardara, Konstantinos Tserpes, Theodora A. Varvarigou. Predicting Edge Signs in Social Networks Using Frequent Subgraph Discovery
44 -- 51Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan, Zhuoqing Morley Mao, Venugopalan Ramasubramanian, Doug Terry, Ted Wobber. Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones
52 -- 59Christoph Fehling, Frank Leymann, Ralph Retter. Your Coffee Shop Uses Cloud Computing
60 -- 64Brian Trammell, Joe Hildebrand. Evolving Transport in the Internet
65 -- 69Virgílio A. F. Almeida. The Evolution of Internet Governance: Lessons Learned from NETmundial
70 -- 73Elkhan Dadashov, Ugur Çetintemel, Tim Kraska. Putting Analytics on the Spot: Or How to Lower the Cost for Analytics
74 -- 78Eduardo Cuervo Laffaye. Toward an Ideal Mobile World: Opportunities and Challenges
80 -- 0Vinton G. Cerf. Bufferbloat and Other Internet Challenges

Volume 18, Issue 4

4 -- 7Stephen Farrell. Why Pervasive Monitoring Is Bad
13 -- 14Fred Douglis. Web-Scale Datacenters
15 -- 21Yunjing Xu, Zachary Musgrave, Brian Noble, Michael Bailey. Workload-Aware Provisioning in Public Clouds
22 -- 29Rahul Singh, Prateek Sharma, David E. Irwin, Prashant J. Shenoy, K. K. Ramakrishnan. Here Today, Gone Tomorrow: Exploiting Transient Servers in Datacenters
30 -- 36Chao-Chih Chen, Peng Sun, Lihua Yuan, David A. Maltz, Chen-Nee Chuah, Prasant Mohapatra. SWIM: A Switch Manager for Datacenter Networks
37 -- 46Kim Khoa Nguyen, Mohamed Cheriet, Yves Lemieux. Virtual Slice Assignment in Large-Scale Cloud Interconnects
47 -- 54Xavier León, Rahma Chaabouni, Marc Sánchez Artigas, Pedro García López. Smart Cloud Seeding for BitTorrent in Datacenters
55 -- 61Talal H. Noor, Quan Z. Sheng, Anne H. H. Ngu, Schahram Dustdar. Analysis of Web-Scale Cloud Services
62 -- 65Eliot Lear. The Internet Assigned Numbers Authority Transition
66 -- 69Alasdair J. G. Gray. Dataset Descriptions for Linked Data Systems
70 -- 73Kazutoshi Sumiya, Daisuke Kitayama, Naiwala P. Chandrasiri. Inferred Information Retrieval with User Operations on Digital Maps
74 -- 78Jeff Jaffe. Web at 25, W3C at 20: An Opportunity to Reflect and Look to the Future
79 -- 83Kieron O'Hara. In Worship of an Echo
84 -- 86Charles J. Petrie. Is the Internet a Thing?
88 -- 0Vinton G. Cerf. Forty Years Ago..

Volume 18, Issue 3

4 -- 6Anne-Marie Kermarrec. Computer Science: Too Young to Fall into the Gender Gap
8 -- 11Mark Claypool, Grenville Armitage, M. Brian Blake. Networked Games in the Midst of the Clouds [Guest editors' introduction]
12 -- 18Wei Cai, Min Chen, Victor C. M. Leung. Toward Gaming as a Service
20 -- 27Debadatta Mishra, Magda El Zarki, Aiman Erbad, Cheng-Hsin Hsu, Nalini Venkatasubramanian. Clouds + Games: A Multifaceted Approach
28 -- 35Helmut Prendinger, Joao Oliveira, Joao Catarino, Marconi Madruga Filho, Rui Prada. iCO2: A Networked Game for Collecting Large-Scale Eco-Driving Behavior Data
36 -- 44Alexandru Iosup, Ruud van de Bovenkamp, Siqi Shen, Adele Lu Jia, Fernando A. Kuipers. Analyzing Implicit Social Networks in Multiplayer Online Games
46 -- 54Pankaj R. Telang, Anup K. Kalia, Munindar P. Singh. Engineering Service Engagements via Commitments
55 -- 63Paolo Bellavista, Carlo Giannelli, Luca Iannario, Laurent-Walter Goix, Claudio Venezia. Peer-to-Peer Content Sharing Based on Social Identities and Relationships
64 -- 72Kejiang Ye, Zhaohui Wu, Bing Bing Zhou, Xiaohong Jiang, Chen Wang, Albert Y. Zomaya. Virt-B: Towards Performance Benchmarking of Virtual Machine Systems
73 -- 77Emiliano Miluzzo. I'm Cloud 2.0, and I'm Not Just a Data Center
78 -- 83Wei-Tek Tsai, Wenjun Wu 0001, Michael N. Huhns. Cloud-Based Software Crowdsourcing
84 -- 88Yong Cui, Qi Sun, Ke Xu, Wendong Wang, Ted Lemon. Configuring IPv4 over IPv6 Networks: Transitioning with DHCP
90 -- 94Hilarie Orman. Co-Evolution with Social Networks: Deception is Protection
96 -- 0Vinton G. Cerf, Nii Quaynor. The Internet of Everyone

Volume 18, Issue 2

10 -- 15Pinghui Wang, Wenbo He, Junzhou Zhao. A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare
16 -- 23Lorenz Schwittmann, Matthäus Wander, Christopher Boelmann, Torben Weis. Privacy Preservation in Decentralized Online Social Networks
24 -- 31Fei Hao, Stephen S. Yau, Geyong Min, Laurence T. Yang. Detecting k-Balanced Trusted Cliques in Signed Social Networks
32 -- 40Félix Gómez Mármol, Manuel Gil Pérez, Gregorio Martínez Pérez. Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach
41 -- 49Yuehai Xu, Eitan Frachtenberg, Song Jiang, Mike Paleczny. Characterizing Facebook's Memcached Workload
50 -- 57Nikolai Samteladze, Ken Christensen. DELTA++: Reducing the Size of Android Application Updates
58 -- 62Karen Bartleson. Market-Driven Standards and the IEEE-SA
63 -- 69Ejub Kajan, Noura Faci, Zakaria Maamar, Alfred Loo, Aldina Pljaskovic, Quan Z. Sheng. The Network-Based Business Process
70 -- 73Christophe Guéret, Victor de Boer, Stefan Schlobach. Let's "Downscale" Linked Data
74 -- 78Charles L. Ortiz. The Road to Natural Conversational Speech Interfaces
88 -- 0Vinton G. Cerf. Instrument Thyself!

Volume 18, Issue 1

4 -- 6Anirban Mahanti. The Evolving Streaming Media Landscape
8 -- 11Anirban Mahanti, Subhabrata Sen. High-Performance Mobile Internet
12 -- 19F. Javier Rivas Tocado, Almudena Diaz-Zayas, Pedro Merino Gómez. Characterizing Traffic Performance in Cellular Networks
20 -- 29Jong-Hyouk Lee, Kamal Deep Singh, Jean-Marie Bonnin, Sangheon Pack. Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach
30 -- 37JongWoo Ha, Jung-Hyun Lee, SangKeun Lee. EPE: An Embedded Personalization Engine for Mobile Users
40 -- 47Rolf Oppliger. Certification Authorities Under Attack: A Plea for Certificate Legitimation
48 -- 55Daniela Godoy, Gustavo Rodriguez, Franco Scavuzzo. Leveraging Semantic Similarity for Folksonomy-Based Recommendation
56 -- 64Oliver Gass, Hendrik Meth, Alexander Maedche. PaaS Characteristics for Productive Software Development: An Evaluation Framework
66 -- 71Amir Herzberg, Haya Shulman. Retrofitting Security into Network Protocols: The Case of DNSSEC
72 -- 77Azer Bestavros, Orran Krieger. Toward an Open Cloud Marketplace: Vision and First Steps
78 -- 81Mirco Musolesi. Big Mobile Data Mining: Good or Evil?
82 -- 86Hilarie Orman. Recent Parables in Cryptography
88 -- 0Vinton G. Cerf. Unfinished Business