By Topic

IEEE Internet Computing

Issue 1 • Jan.-Feb. 2003

Filter Results

Displaying Results 1 - 16 of 16
  • Securing the internet against attack

    Publication Year: 2003, Page(s):8 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ITU expands internet training

    Publication Year: 2003, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eDNA: the ultimate cyber-sleuth tool?

    Publication Year: 2003, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware for web services

    Publication Year: 2003, Page(s):28 - 29
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service discovery 101

    Publication Year: 2003, Page(s):69 - 71
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    A key aspect of the service-oriented architecture approach for middleware is that services advertise themselves using directory or lookup services so that prospective clients can find them. The service location and discovery abstractions required to support this are not much different from those we use to conduct business with other people. As a result, we can gain insights into how distributed se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The latest in virtual private networks: part I

    Publication Year: 2003, Page(s):87 - 91
    Cited by:  Papers (23)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB)

    Virtual private networks (VPNs) are discrete network entities configured and operated over a shared network infrastructure. An intranet is a VPN in which all the sites (the customer locations that are part of a VPN) belong to a single organization. An extranet is a VPN with two or more organizations wishing to share (some) information. In the business world, VPNs let corporate locations share info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Good-enough security

    Publication Year: 2003, Page(s):66 - 68
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Today, security is a major concern at the top corporate, government, and academic levels, and security problems in cyberspace are unlikely to disappear or be solved any time soon. Indeed, new problems and requirements are likely to emerge, and we can anticipate continued interest in the field. The author discusses user friendly security and considers business-driven security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable filtering of XML data for Web services

    Publication Year: 2003, Page(s):49 - 57
    Cited by:  Papers (12)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    As the Web gains prevalence as an application-to-application communication medium, organizations are deploying more Web service applications to provide standardized, programmatic application functionality over the Internet. The paper considers how scalable content-based routing architectures for Web applications can handle the growing number of XML messages associated with Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating business transactions on the Web

    Publication Year: 2003, Page(s):30 - 39
    Cited by:  Papers (23)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB)

    The Organization for the Advancement of Structured Information Standards (OASIS) has developed the business transaction protocol (BTP) to meet the requirements of Web-based long-running collaborative business applications. BTP is designed to support interactions that cross application and administrative boundaries, thus requiring extended transactional support beyond classical ACID. We examine the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Language bindings to XML

    Publication Year: 2003, Page(s):19 - 27
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB)

    By preserving application semantics, XML bindings improve program specification, verification, and optimization. We compare two standard binding solutions - namely, the Simple API for XML (SAX) and the Document Object Model (DOM) API - and two novel approaches: Sun's JAXB architecture and our Strathclyde Novel Architecture for Querying XML (SNAQue). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing mobile wireless applications

    Publication Year: 2003, Page(s):81 - 86
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB)

    The deck-of-cards metaphor underlies nearly all content developed for mobile wireless technologies. Standard, high-level application-development technologies, which are available for most major hardware platforms, ease this development task because they are optimized for the severe restrictions on a mobile device's screen size, processing power, and battery life. We discuss three major application... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Massive deliberation [Web agents]

    Publication Year: 2003, Page(s):72 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Agents are proliferating on the Web, making it conceivable that their collective reasoning ability might someday be harnessed for robust decision-making. The hope is that massive deliberation power can soon help solve problems that require knowledge, reasoning, and intelligence. Until recently, working individually or in small groups, agents across the Web could barely communicate and could only r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic QoS control

    Publication Year: 2003, Page(s):92 - 95
    Cited by:  Papers (21)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB)

    User sessions, usually consisting of sequences of consecutive requests from customers, comprise most of an e-commerce site's workload. These requests execute e-business functions such as browse, search, register, login, add to shopping cart, and pay. Once we properly understand and characterize a workload, we must assess its effect on the site's quality of service (QoS), which is defined in terms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructure for e-government Web services

    Publication Year: 2003, Page(s):58 - 65
    Cited by:  Papers (59)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB)

    In efforts to use information and communication technologies for the civil and political conduct of government, many countries have begun supporting e-government initiatives. The ultimate goal is to improve government-citizen interactions through an infrastructure built around the "life experience" of citizens. To facilitate the use of welfare applications and expeditiously satisfy citizens' needs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Self-Serv environment for Web services composition

    Publication Year: 2003, Page(s):40 - 48
    Cited by:  Papers (248)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB)

    Self-Serv aims to enable the declarative composition of new services from existing ones, the multiattribute dynamic selection of services within a composition, and peer-to-peer orchestration of composite service executions. Self-Serv adopts the principle that every service, whether elementary or composite, should provide a programmatic interface based on SOAP and the Web Service Definition Languag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Amazon.com recommendations: item-to-item collaborative filtering

    Publication Year: 2003, Page(s):76 - 80
    Cited by:  Papers (1035)  |  Patents (99)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB)

    Recommendation algorithms are best known for their use on e-commerce Web sites, where they use input about a customer's interests to generate a list of recommended items. Many applications use only the items that customers purchase and explicitly rate to represent their interests, but they can also use other attributes, including items viewed, demographic data, subject interests, and favorite arti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami