By Topic

IEEE Internet Computing

Issue 2 • March-April 2003

Filter Results

Displaying Results 1 - 14 of 14
  • News & Trends - Compromise ends wireless spectrum debate

    Publication Year: 2003, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (303 KB)
    Freely Available from IEEE
  • Guest editor's introduction - Ubiquitous mobile computing

    Publication Year: 2003, Page(s):16 - 17
    Cited by:  Papers (6)
    Request permission for commercial reuse | PDF file iconPDF (363 KB) | HTML iconHTML
    Freely Available from IEEE
  • Integrating wireless LAN and cellular data for the enterprise

    Publication Year: 2003, Page(s):25 - 33
    Cited by:  Papers (27)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    The Internet Roaming solution for corporate wireless data users integrates mobile networking across private WLANs, public WLANs, and cellular data networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attaching context-aware services to moving locations

    Publication Year: 2003, Page(s):43 - 51
    Cited by:  Papers (17)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB) | HTML iconHTML

    User information and communication resources - such as precise location information and direction, altitude, light, and humidity measurements (via sensors) - are becoming more available in end devices. This increasing range of information can enable context-aware informational services as well as linking digital objects to physical objects a user is observing. Thus, mobile users can obtain relevan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economics and the design of open systems

    Publication Year: 2003, Page(s):94 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic binding in mobile applications

    Publication Year: 2003, Page(s):34 - 42
    Cited by:  Papers (25)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    By separating binding concerns from application logic, the Colomba approach exploits metadata to let mobile applications adapt to dynamic environments. Colomba separates service logic from binding management. This permits developers to code, change, and reuse service components and binding strategies independently of each other. Administrators can express binding strategies at a high level of abst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet filtering in China

    Publication Year: 2003, Page(s):70 - 77
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB)

    We collected data on the methods, scope, and depth of selective barriers to Internet usage through networks in China. Tests conducted from May through November 2002 indicated at least four distinct and independently operable Internet filtering methods - Web server IP address, DNS server IP address, keyword, and DNS redirection with a quantifiable leap in filtering sophistication beginning in Septe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust method for soft IP handover

    Publication Year: 2003, Page(s):18 - 24
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB)

    Multimedia streaming over wireless networks - often called mobile multimedia streaming lets users access music, movie, and news services at any time, regardless of location. Given that multimedia streaming is a key goal of third-generation and future wireless networks, vendors will soon deploy streaming clients in advanced mobile terminals. Current mobile terminals, however, fail to adequately sup... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Web services for C and C++

    Publication Year: 2003, Page(s):53 - 61
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB)

    gSOAP is a platform-independent development environment for deploying efficient SOAP/XML Web services in C and C++.We implemented the traditional remote procedure calling (RPC stub-skeleton design for gSOAP, producing the RPC stub and skeleton routines for Web service applications at compile time. The RPC stub and skeleton routines are precompiled, which speeds encoding and decoding at runtime. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting mobile code in the world

    Publication Year: 2003, Page(s):78 - 82
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB)

    Proposed applications for mobile code systems include autonomous shopping agents, autonomic systems, distributed sensor network applications, and interstellar space networks. I argue the case for mobile code systems as the next-generation distributed programming paradigm and discuss the security problems that must be addressed before this vision is practically realizable. The security discussion w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role-based access control with X.509 attribute certificates

    Publication Year: 2003, Page(s):62 - 69
    Cited by:  Papers (73)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    We adapted the standard X.509 privilege management infrastructure to build an efficient role-based trust management system in which role assignments can be widely distributed among organizations, and an XML-based local policy determines which roles to trust and which privileges to grant. A simple Java API lets target applications easily incorporate the system. The Permis API has already proven its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable P2P search

    Publication Year: 2003, Page(s):83 - 87
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB)

    Although the traditional client-server model first established the Web's backbone, it tends to underuse the Internet's bandwidth and intensify the burden that dedicated servers face as their load increases.' Peer-to-peer computing relies on individual computers' computing power and storage capacity to better utilize bandwidth and distribute this load in a self-organizing manner. In P2P, nodes (or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The performance presumption [middleware evaluation]

    Publication Year: 2003, Page(s):88 - 90
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB)

    Middleware has a variety of qualities, such as size, cost, complexity, flexibility, and performance. For each application, different qualities are more important than others. Choosing the right middleware means first determining the qualities that matter most for your application, and then evaluating different types of middleware to see how well they meet your requirements. Sounds simple, straight... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Being and acting rational [agent design]

    Publication Year: 2003, Page(s):91 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB)

    Rationality alone is insufficient to specify agent design. Using economic theory, we can program agents to behave in ways that maximize their utility while responding to environmental changes. However, economic models for agents, although general in principle, are typically limited in practice because the value functions that are tractable essentially reduce an agent to acting selfishly. Building ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami