By Topic

IEEE Internet Computing

Issue 3 • Date May-June 2001

Filter Results

Displaying Results 1 - 12 of 12
  • Integrating knowledge on the Web

    Publication Year: 2001, Page(s):32 - 39
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    The World Wide Web provides a ubiquitous medium for seamlessly integrating distributed applications, formats and content, making it well-suited for enterprise knowledge management. In this article, we discuss a framework for characterizing knowledge management technology. We identify the desirable attributes of a knowledge management system and describe how Web-centric approaches can support these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autoconfiguration for IP networking: enabling local communication

    Publication Year: 2001, Page(s):81 - 86
    Cited by:  Papers (28)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    IP hosts and network infrastructure have historically been difficult to configure, but emerging networking protocols promise to enable hosts to establish IP networks without prior configuration or network services. Even very simple devices with few computing resources will be able to communicate via standard protocols wherever they are attached. Current IETF (Internet Engineering Task Force) stand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medicine on the net from isolation to universal connectivity

    Publication Year: 2001, Page(s):40 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bringing health-care applications to the Internet

    Publication Year: 2001, Page(s):42 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    A United States study of health-care applications in relation to Internet capabilities found distinct, if not unique, requirements for the Internet's evolutionary development. Many health-related processes stand to be reshaped by the Internet. This paper presents a broad overview of the types of applications that the Internet can support in five areas: consumer health, clinical care, financial and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Careflow architecture. A case study in medical transcription

    Publication Year: 2001, Page(s):59 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    The Careflow architecture uses Java and CORBA to streamline transcription at many hospitals and clinics. In this article, I explore the evolution of this middleware solution for automating the archiving, versioning and routing of documents in transcription. After a brief overview of transcription, I explain the project's architectural goals and describe three successive versions that our team deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Philosophical agents

    Publication Year: 2001, Page(s):104 - 106
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Abstraction is the technique we use to deal with complexity. What is the proper kind and level of abstraction for complex software agents? We think it would be reasonable to endow agents with a philosophy. Then, by understanding their philosophies, we can use them more effectively. To endow agents with ethical principles, developers need an architecture that supports explicit goals, principles and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative surgical simulation over the Internet

    Publication Year: 2001, Page(s):65 - 73
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Co-Surgeon is an Internet-based tele-simulation surgery system. The system combines 3D surgery simulation with CSCW technology to enable surgeons to collaboratively simulate alternative treatment plans over the Internet. It enables multiple users in remote locations to manipulate 3D anatomical models and to simulate surgical operations while sharing a view of the simulation. In addition, the syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing health-care records over the Internet

    Publication Year: 2001, Page(s):49 - 58
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Presents a novel approach to sharing electronic health-care records that leverages the Internet and the World Wide Web, developed as part of two European Commission-funded projects, Synapses and SynEx. The approach provides an integrated view of patient data from heterogeneous, distributed information systems and presents it to users electronically. Synapses and SynEx illustrate a generic approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital steganography: hiding data within data

    Publication Year: 2001, Page(s):75 - 80
    Cited by:  Papers (84)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    Digital steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JXTA: a network programming environment

    Publication Year: 2001, Page(s):88 - 95
    Cited by:  Papers (125)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    JXTA technology, from Sun Microsystems, is a network programming and computing platform that is designed to solve a number of problems in modern distributed computing, especially in the area broadly referred to as peer-to-peer (P2P) computing or P2P networking. JXTA provides a network programming platform specifically designed to be the foundation for P2P systems. As a set of protocols, the techno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing XML documents with Author-X

    Publication Year: 2001, Page(s):21 - 31
    Cited by:  Papers (57)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Author-X is a Java-based system that addresses the security issues of access control and policy design for XML document administration. Author-X supports the specification of policies at varying granularity levels and the specification of user credentials as a way to enforce access control. Access control is available according to both push and pull document distribution policies, and document upd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bluetooth: technology for short-range wireless apps

    Publication Year: 2001, Page(s):96 - 103
    Cited by:  Papers (27)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    In 1998, five major companies (Ericsson, Nokia, IBM, Toshiba and Intel) formed a group to create a license-free technology for universal wireless connectivity in the handheld market. The result is Bluetooth, a technology named after a 10th-Century king who brought warring Viking tribes under a common rule. The Bluetooth specifications (currently in version 1.1) define a radiofrequency (RF) wireles... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami