By Topic

Internet Computing, IEEE

Issue 2 • Date Mar/Apr 2000

Filter Results

Displaying Results 1 - 12 of 12
  • Collaborative Web computing environment: an infrastructure for scientific computation

    Page(s): 27 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB)  

    A collaborative Web computing environment (CWCE) supports massively distributed computations by providing an access-control mechanism to guarantee fair use of resources and an adaptive load-distribution mechanism to improve computing performance. Our proposed object-allocation mechanism and load-distribution policy can enhance the performance and efficiency of CWCE while avoiding the deep-seated deadlock and starvation problems. Performance evaluations show that the load-distribution policy performs reasonably well in both computation efficiency and job service quality View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can XForm transform the Web? Transcending the Web as GUI.II

    Page(s): 103 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (88 KB)  

    Designing completely abstract user interfaces for the Web requires addressing three separable aspects: presentation, logic and data. Our virtual assistant needs to know how to: prompt the user; do so in a specific order; and recognize spoken or typed entries. The first layer, presentation, addresses rendition of interactors, whether as GUI widgets, voice prompts, or paper blanks. Second, the logical layer governs the order of form field fill-in, multipage and sequenced forms, and scripting for input validation. Finally, the data layer adds more structure and coherency to existing text string-only values by applying richer schemas (types). This kind of coordinated evolution is precisely the mission of the World Wide Web Consortium, whose XForms working group is tackling these interdependent issues. While XHTML brought existing HTML 4.0 usage into XML compliance, XForms was specifically chartered to innovate solutions to support handheld, television, and desktop browsers; deploy richer user interfaces to meet the needs of business, consumer, and device-control applications; improve internationalization; and decouple presentation, logic, and data. The paper considers whether XForm can transform the Web View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agents on the net

    Page(s): 46 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (384 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain Name eXchange: a mobile-agent-based shared registry system

    Page(s): 59 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (64 KB)  

    DNX is a platform-independent system designed to extend Core's proposed Shared Registry System for managing domain names. DNX aims to provide several value-added services to the market, including intelligent registration View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource bounded searches in an information marketplace

    Page(s): 49 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (196 KB)  

    Over the past five years, we have been developing a Web-based, resource-bounded, information-gathering agent-called BIG, for Bounded Information Gathering-to support a human decision process. Although its techniques are general enough to apply to a wide range of domains, BIG specifically helps clients pick software packages. For example, a client can instruct BIG to recommend a database package for Windows 98 and specify constraints on both the search process and the product characteristics. BIG will then formulate a plan, locate and extract relevant information from both structured and unstructured documents, and return a recommendation to the client, along with supporting data. Our focus is on a recently developed capability, namely, to schedule information-gathering activity in a way that controls the money spent on acquiring information from sites that charge a fee for access. This capability supports an information marketplace on the Web, which we feel will eventually supersede (but obviously not completely replace) the current model of free information access supported by advertising fees View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building dynamic agent organizations in cyberspace

    Page(s): 65 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (132 KB)  

    The Karma-Teamcore framework focuses on rapidly integrating distributed, heterogeneous agents and tasking them via an abstract team-oriented program. The framework provides wrappers that encapsulate general teamwork reasoning and automatically generate the necessary coordination for robust execution of this abstract program. We describe the Karma-Teamcore framework and present an example of its successful application, namely, the simulated evacuation of civilians stranded in a hostile area View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetChaser: agent support for personal mobility

    Page(s): 74 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (180 KB)  

    The paper discusses NetChaser, a mobile agent-based infrastructure for supporting personal mobility in accessing Internet information services. It exploits agents' ability to assist users by following them when they change working terminals View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance Web site design techniques

    Page(s): 17 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (128 KB)  

    This article presents techniques for designing Web sites that need to handle large request volumes and provide high availability. The authors present new techniques they developed for keeping cached dynamic data current and synchronizing caches with underlying databases. Many of these techniques were deployed at the official Web site for the 1998 Olympic Winter Games View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP protection and restoration

    Page(s): 97 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    Protection and restoration together connote an additional layer of reliability, availability and integrity wherever they are applied. Protection ensures that the desired service will not be permanently disrupted in the event of a component failure. Restoration ensures the desired service will be returned following a component failure. For many years, IP has provided a form of protection and restoration by enabling packets to be dynamically rerouted around link or node failures. Coupled with TCP's reliable transport service, it is easy to see how TCP/IP based networking has achieved a reputation for robustness. The temporal dimension to this IP rerouting mechanism could, however, limit its usefulness for applications with real-time service-level requirements. It takes an IP network some time (usually tens of seconds) to detect a failure, propagate the information to other routers around the network, and then have each router compute a new path. The paper considers how efforts are under way in the research and vendor communities to develop faster and more robust protection and restoration mechanisms for IP networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-commerce trust metrics and models

    Page(s): 36 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    Traditional models of trust between vendors and buyers fall short of requirements for an electronic marketplace, where anonymous transactions cross territorial and legal boundaries as well as traditional value-chain structures. Alternative quantifications of trust may offer better evaluations of transaction risk in this environment. This article introduces a notion of quantifiable trust and then develops models that can use these metrics to verify e-commerce transactions in ways that might be able to satisfy the requirements of mutual trust. The article uses two examples in illustrating these concepts: one for an e-commerce printing enterprise and the other for Internet stock trading View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomad: mobile agent system for an Internet-based auction house

    Page(s): 80 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (92 KB)  

    The paper discusses Nomad, a mobile agent system integrated with eAuctionHouse, a next-generation Internet auction server. With the Nomad system, mobile agents travel to the eAuctionHouse site and participate in auctions on the user's behalf. Users can create agents using Java or can automatically generate agents from Nomad's template agent library View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JATLite: a Java agent infrastructure with message routing

    Page(s): 87 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (88 KB)  

    The paper discusses JATLite, a tool for creating agent systems. It includes a message router that supports message buffering, allowing agents to fail and recover. Message buffering also supports a name-and-password mechanism that lets agents move freely between hosts View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Michael Rabinovich
Department of Electrical Engineering and Computer Science
Case Western Reserve University