By Topic

IEEE Internet Computing

Issue 4 • Date July-Aug. 1997

Filter Results

Displaying Results 1 - 17 of 17
  • What's An Agent ... And What's So Intelligent About It?

    Publication Year: 1997, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-Based Agents: Applications And Infrastructure

    Publication Year: 1997, Page(s):8 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattie Maes On Sofware Agents: Humanizing The Global Computer

    Publication Year: 1997, Page(s):10 - 19
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2032 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China: One Country - Two Internet Systems?

    Publication Year: 1997, Page(s):100 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating the Internet: agents as user surrogates

    Publication Year: 1997, Page(s):34 - 38
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    The explosion of the World Wide Web as a global information network brings with it a number of related challenges for automation. First, nontechnical users should be able to benefit from the information available on the Web without being overwhelmed by technical detail. Second, users should be freed from mundane and repetitive browsing tasks. Third, and most critical, information from the Web shou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arachnoid agent, at your service

    Publication Year: 1997, Page(s):31 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    One amusing thing about the Web is that it gives AI programs something “real” to work with. That is, it allows a purely software system to deal with a nonartificial world. The article presents WWW page addresses for information on software agents. A brief overview is given of each site with a description of the type of information to be found there. Agent theory and agent applications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the Web

    Publication Year: 1997, Page(s):91 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    For the past year (1996-7), the browser war between Netscape and Microsoft has made Internet news headlines, with each company offering new and better features. But the competition for “more features” leaves an important area of network software behind: security. In fact, packing software with features is the best way to complicate its security. And even if software companies made secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bringing up Java

    Publication Year: 1997, Page(s):112, 110 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Java will be big time-even if Microsoft hijacks it. In any event, the computer industry has no choice but to adjust to the inevitability of Java. However, Java and Java technologies like JavaBeans and IIOP (the Internet version of CORBA for Java) are still works in progress. They are half-roasted and inadequate for the task facing developers. When Java and its supporting technologies mature, the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital toolbox. Controlling interests [MIME]

    Publication Year: 1997, Page(s):97 - 99
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Lately, I've been sifting through the murky world of electronic mail file attachments-specifically, how MIME (Multipurpose Internet Mail Extensions) is creating a cross-platform standard to make sending and receiving files via e-mail increasingly painless, but e-mail is really just the beginning of MIME's usefulness. Today's World Wide Web browser is where the action is headed, and MIME is nested ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AGENT TCL: targeting the needs of mobile computers

    Publication Year: 1997, Page(s):58 - 67
    Cited by:  Papers (78)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    Mobile computers have become increasingly popular as users discover the benefits of having their electronic work available at all times. Using Internet resources from a mobile platform, however, is a major challenge. Mobile computers do not have a permanent network connection and are often disconnected for long periods. When the computer is connected, the connection is often prone to sudden failur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Apache HTTP Server Project

    Publication Year: 1997, Page(s):88 - 90
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Most reports of Internet collaboration refer to small scale operations among a few authors or designers. However, several projects have shown that the Internet can also be the locus for large scale collaboration. In these projects, contributors from around the world combine their individual forces and develop a product that rivals those of multibillion dollar corporations. The Apache HTTP Server P... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XPECT: a framework for electronic commerce

    Publication Year: 1997, Page(s):40 - 48
    Cited by:  Papers (20)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    Electronic commerce is emerging as one of the most important applications on the Internet, with the potential to revolutionize the whole structure of retail merchandising and shopping. There is already a need for an information technology infrastructure that goes well beyond the simple capabilities offered by the current development environments for Internet applications. For electronic commerce t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hands-on look at Java mobile agents

    Publication Year: 1997, Page(s):21 - 30
    Cited by:  Papers (52)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    What are the benefits and drawbacks of current Java mobile agent systems? The authors installed and evaluated three leading systems available for download from the Web: General Magic's Odyssey, IBM's Aglets, and ObjectSpace's Voyager-and looked at issues such as ease of installation, feature set, documentation, and cost. We also discuss new capabilities of Java 1.1 that show promise as simple yet ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML: a door to automated Web applications

    Publication Year: 1997, Page(s):78 - 87
    Cited by:  Papers (29)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    In Japanese culture, your meishi conveys your place in the company, even in society, as well as your name, phone number, and e-mail address. That is to say, in Japan, business cards matter. They convey complex metadata about the people who carry them. Like people, Web pages come in an abundance of shapes and sizes (and sounds). What makes them machine interpretable-and therefore a new medium for c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PLANGENT: an approach to making mobile agents intelligent

    Publication Year: 1997, Page(s):50 - 57
    Cited by:  Papers (33)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Network environments give computer users the option of employing distributed information and services to complete a task. However, gathering information and using services distributed in networks requires knowing exactly what kinds of information and services are required for a task, where they are, and how they can be obtained or utilized. Tracking down the answers to these questions can be diffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware: any client, any server

    Publication Year: 1997, Page(s):94 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    The Internet and enterprise intranets are all about middleware. Middleware is the center of the client/server architecture. All major vendors focus on it. After all, “occupy the center” is a good chess strategy. However, unlike chess, the Internet develops as a multi-player game, and occupying the center is a collaborative exercise in which the winners are determined by the Internet's ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A security model for Aglets

    Publication Year: 1997, Page(s):68 - 77
    Cited by:  Papers (94)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be weighed against the very real security threats they pose. These threats originate not just in malicious agents but in malicious hosts as well. For example, if there is no mechanism to prevent attacks, a host can implant its own tasks into an agent or modify the agent's state. This can lead in turn ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami