By Topic

IEEE Internet Computing

Issue 6 • Date Nov.-Dec. 2001

Filter Results

Displaying Results 1 - 14 of 14
  • Peering at peer-to-peer computing

    Publication Year: 2001, Page(s):4 - 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB)

    How would you like to share files with another user without having to explicitly place them in a designated external location? The recent successes of (and controversies surrounding) Napster, Gnutella, and FreeNet have drawn attention to peer-to-peer computing, which allows precisely such interactions between information and service providers and their customers. The author takes a brief look at p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):83 - 86
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Subject index

    Publication Year: 2001, Page(s):86 - 93
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Balancing security and liberty

    Publication Year: 2001, Page(s): 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling access to XML documents

    Publication Year: 2001, Page(s):18 - 28
    Cited by:  Papers (16)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    Access control techniques for XML provide a simple way to protect confidential information at the same granularity level provided by XML schemas. In this article, we describe our approach to these problems and the design guidelines that led to our current implementation of an access control system for XML information View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet traffic measurement

    Publication Year: 2001, Page(s):70 - 74
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB)

    The Internet's evolution over the past 30 years (1971-2001), has been accompanied by the development of various network applications. These applications range from early text-based utilities such as file transfer and remote login to the more recent advent of the Web, electronic commerce, and multimedia streaming. For most users, the Internet is simply a connection to these applications. They are s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-independent task-focused recommendation

    Publication Year: 2001, Page(s):40 - 47
    Cited by:  Papers (29)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB)

    A technique that correlates database items to a task adds content-independent context to a recommender system based solely on user interest ratings. In this article, we present a task-focused approach to recommendation that is entirely independent of the type of content involved. The approach leverages robust, high-performance, commercial software. We have implemented it in a live movie recommenda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML and data integration

    Publication Year: 2001, Page(s):75 - 76
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB)

    XML is rapidly becoming a standard for data representation and exchange. It provides a common format for expressing both data structures and contents. As such, it can help in integrating structured, semistructured, and unstructured data over the Web. Still, it is well recognized that XML alone cannot provide a comprehensive solution to the articulated problem of data integration. There are still s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCTP: new transport protocol for TCP/IP

    Publication Year: 2001, Page(s):64 - 69
    Cited by:  Papers (43)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB)

    For the past 20 years (1980-2000), applications and end users of the TCP/IP suite have employed one of two protocols: the transmission control protocol or the user datagram protocol. Yet some applications already require greater functionality than what either TCP or UDP has to offer, and future applications might require even more. To extend transport layer functionality, the Internet Engineering ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inferring user interest

    Publication Year: 2001, Page(s):32 - 39
    Cited by:  Papers (23)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB)

    As the World Wide Web continues to grow, people find it impossible to access even a small portion of the information generated in a day from Usenet news, e-mail, and Web postings. Automated filters help us to prioritize and access only the information in which we're interested. Because opinions differ about the importance or relevance of information, people need personalized filters. Implicit indi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probability and agents

    Publication Year: 2001, Page(s):77 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB)

    To make sense of the information that agents gather from the Web, they need to reason about it. If the information is precise and correct, they can use engines such as theorem provers to reason logically and derive correct conclusions. Unfortunately, the information is often imprecise and uncertain, which means they will need a probabilistic approach. More than 150 years ago, George Boole presente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy risks in recommender systems

    Publication Year: 2001, Page(s):54 - 63
    Cited by:  Papers (28)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Recommender system users who rate items across disjoint domains face a privacy risk analogous to the one that occurs with statistical database queries View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalization and privacy

    Publication Year: 2001, Page(s):29 - 31
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB)

    Personalization has been a hot topic or nearly a decade now, and many new products and advanced algorithms have emerged in that time. Several companies now sell tools such as recommender systems, which take input about users and products and generate recommendations about which products the users will like best. At their best, recommenders can be wonderful tools for users, helping them sort throug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The virtual world gets physical: perspectives on personalization

    Publication Year: 2001, Page(s):48 - 53
    Cited by:  Papers (3)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    MusicFX and GroupCast illustrate some benefits possible from extending the personalization of electronic content in the virtual world to applications in the physical world. Utilizing individual preferences in the physical world, particularly in public spaces, infringes on people's privacy more than it does in the virtual world, where it is easier to maintain different addresses and aliases that ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami