IEEE Internet Computing

Issue 3 • May-Jun 2004

Filter Results

Displaying Results 1 - 22 of 22
  • Dynamic discovery and coordination of agent-based semantic Web services

    Publication Year: 2004, Page(s):66 - 73
    Cited by:  Papers (83)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    We describe about dynamic discovery and coordination of agent-based semantic Web services. Matchmaking and brokering are multiagent coordination mechanisms for Web services. Both have performance trade-offs, but the Web Ontology Language for Semantic Web Services (OWL-S) can handle extensions that address some of the shortcomings. We focus on the broker, analyzing both its interaction protocol and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The latest in VPNs: part II

    Publication Year: 2004, Page(s):60 - 65
    Cited by:  Papers (15)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    We describe the lastest in VPN. Virtual private networks (VPNs) can be configured and operated across a network provider's shared network infrastructure. The layer-2 VPN (L2VPN) is generating much interest and activity in the industry; it's defined as a VPN that transports native L2 frames across a shared IP network. Network providers will be able to reduce infrastructure and operation costs by ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile code paradigms and security issues

    Publication Year: 2004, Page(s):54 - 59
    Cited by:  Papers (10)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Programs are no longer constrained to execute on the nodes where they reside, and many systems therefore support code mobility. Although mobile code has yet to fully realize its promise of increased system flexibility, scalability, and reliability, the marketplace has embraced mobile code implementations such as Java.Jini, PostScript, and .NET. Several mobile code paradigms exist, and mobile code ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous decentralized community communication for information dissemination

    Publication Year: 2004, Page(s):29 - 36
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    To meet the increasing demand for real-time content delivery, the proposed autonomous decentralized community communication system offers an efficient information dissemination infrastructure with a decentralized architecture. ADCC's aim is to help end-user communities communicate and exchange information efficiently; to meet this goal, the system uses an application-level multicast technique that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DBMS[me] [life-time records]

    Publication Year: 2004, Page(s):85 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    The article is concerned with time and the deluge of data that we can expect to collect and view. We examine this from the perspective of a subproblem, a database management system that records a person's life in its entirety - referred to here as DBMS[me] and E-me (that is, a database of me or an electronic model of me). Challenges for the DBMS[me] are to augment human memory by recording all dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disseminating information to mobile clients using publish-subscribe

    Publication Year: 2004, Page(s):46 - 53
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Providing an up-to-date view on dynamically changing data presents difficulties. While several different data-dissemination platforms address the problem, client mobility is still a major challenge. Volatile wireless connections and resource limitations void the attempt to apply the same mechanisms that work in fixed-wired networks. The Rebeca publish-subscribe middleware implementation introduces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data dissemination on the web

    Publication Year: 2004, Page(s):27 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elsewhere in Computer Society

    Publication Year: 2004, Page(s):15 - 18
    Request permission for commercial reuse | PDF file iconPDF (393 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dermi: a new distributed hash table-based middleware framework

    Publication Year: 2004, Page(s):74 - 84
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    We disscus about Dermi: a new distributed hash table-based middleware framework. Decentralized event remote method invocation (Dermi) is a peer-to-peer (P2P), decentralized event-based object middleware framework built on top of a structured overlay network. Using an event-notification service as the principal building block, Dermi makes three innovative contributions: P2P call abstractions, distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web caching in broadcast mobile wireless environments

    Publication Year: 2004, Page(s):37 - 44
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Effectively exploiting available communication bandwidth and client resources is vital in wireless mobile environments. One technique for doing so is client-side data caching, which helps reduce latency and conserve network resources. The SliCache generic self-tunable cache-replacement policy addresses these issues by using intelligent slicing of the cache space and novel methods for selecting whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More Web services notifications

    Publication Year: 2004, Page(s):90 - 93
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    We describe Web Service (WS) specifications that define facilities and approaches required to support notification-based and event-driven systems. WS-Notification is actually a family of documents. WS-notification addresses event-driven systems. The WS-base notification document's main contribution is two-fold; defining the notification-producer interface (supported by applications that accept not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling flexible queries with guarantees in P2P systems

    Publication Year: 2004, Page(s):19 - 26
    Cited by:  Papers (81)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    The Squid peer-to-peer information discovery system supports flexible queries using partial keywords, wildcards, and ranges. It is built on a structured overlay and uses data lookup protocols to guarantee that all existing data elements that match a query are found efficiently. Its main innovation is a dimension-reducing indexing scheme that effectively maps multidimensional information space to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demanding Internet enterprise

    Publication Year: 2004, Page(s):13 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    As corporate belts have tightened during the past two years, executives have begun pursuing a new idea in applications delivery and system design - a more cost-effective model for software deployment known as enterprise on demand. Some say it will be bigger than client-server: a killer enterprise application for the Internet. The enterprise on demand's summits case study based program suggests tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and availability of Internet data centers

    Publication Year: 2004, Page(s):94 - 96
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    We use an Internet data center (IDC) as a motivating example to discuss how performance and availability are interrelated. IDCs provide the means for geographically distributed Internet users to tap into other computers and applications. IDC users pay for the services they obtain, so they want them to be delivered according to established service-level agreements (SLAs). These agreements indicate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Days of miracle and wonder

    Publication Year: 2004, Page(s):4 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing - May/June 2004

    Publication Year: 2004, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1010 KB)
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (511 KB)
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2004, Page(s):7 - 8
    Request permission for commercial reuse | PDF file iconPDF (355 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Internet Computing 2004 Editorial Calendar - Announcement

    Publication Year: 2004, Page(s): 97
    Request permission for commercial reuse | PDF file iconPDF (491 KB)
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 98
    Request permission for commercial reuse | PDF file iconPDF (248 KB)
    Freely Available from IEEE
  • Calls for papers

    Publication Year: 2004, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami