By Topic

IEEE Internet Computing

Issue 4 • Date July-Aug. 2004

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (889 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (479 KB)
    Freely Available from IEEE
  • Not free, but relatively inexpensive [academic publishing]

    Publication Year: 2004, Page(s):4 - 6
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The author discusses how this Internet technology is destroying the economics of academic publishing. He was concerned that coverage of politics and news was concentrated in the hands of a few unscrupulous newspaper publishers. Printing technology (including inexpensive paper manufacturing) has taken "things with words" from precious works of art to fish wrappers. Print has made words cheap (thoug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Third wire or third rail? [Broadband Internet access]

    Publication Year: 2004, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Promising to deliver broadband Internet access over the same lines that deliver electricity sounds almost too good to be true - fast network access available to business and residential users anywhere in the electricity - equipped world. North American broadband-over-power-line (BPL) and European power-line-communications (PLC) proponents claim the technology appears to provide the long-awaited "t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving security and privacy

    Publication Year: 2004, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    At the "Computers, Freedom, and Privacy (CFP) Conference held in Berkeley, California, the spotlight was on the twin weights of national security and personal liberty - with technology the fulcrum on which all turns. It highlights included sessions devoted to the new international cybercrime treaty, a global crusade to spread technology to underdeveloped nations, laws meant to block illegal sites ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elsewhere

    Publication Year: 2004, Page(s):12 - 15
    Request permission for commercial reuse | PDF file iconPDF (368 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized Web views for multilingual Web sources

    Publication Year: 2004, Page(s):16 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    When browsing information on large Web sites, users often receive too much irrelevant information. The WWW information collection, collaging, and programming (Wiccap) system lets ordinary users build personalized Web views, which let them see only the information they want - and in the way they prefer. It provides a set of GUI tools, including a mapping wizard, extraction agent, and presentation t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Wireless Grids--Distributed Resource Sharing by Mobile, Nomadic, and Fixed Devices

    Publication Year: 2004, Page(s):24 - 31
    Cited by:  Papers (70)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Wireless grids, a new type of resource-sharing network, connect sensors, mobile phones, and other edge devices with each other and with wired grids. Ad hoc distributed resource sharing allows these devices to offer new resources and locations of use for grid computing. This article places wireless grids in context, explains their basic requirements, and provides an example implementation that uses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating wireless sensor networks with the grid

    Publication Year: 2004, Page(s):32 - 39
    Cited by:  Papers (77)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    Integrating wireless sensor networks with the traditional wired grid poses several challenges. The technical challenges center on the development of sensors and sensor network infrastructure, including the need to comply with emerging APIs for grid and Web services. Process-driven challenges, which center on the development and adoption of new business models and applications, are driving this tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware services for P2P computing in wireless grid networks

    Publication Year: 2004, Page(s):40 - 46
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Advances in network architecture are changing application and service delivery. The wireless industry, for example, now talks of service grids - collections of separate wireless services collated from across the network. However, with current limitations in mobile device capabilities, a scalable and efficient middleware platform is essential. The authors' new middleware architecture, called scalab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2004, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A look at native IPv6 multicast

    Publication Year: 2004, Page(s):48 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    IP multicast offers a bandwidth-efficient means for transmitting packets to multiple hosts for applications that require multiparty communications. Coupled with IPv6's larger address space, its inherent multicast support enables current and future Internet-ready devices to support multiparty applications such as videoconferencing, P2P gaming, and data feeds. IP multicast is applicable to IPv4 and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability in peer-to-peer systems

    Publication Year: 2004, Page(s):54 - 61
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Server-centric architectures such as the Web's suffer from well-known problems related to application size and increasing user requests. Peer-to-peer systems can help address some of the key challenges, but this survey of several current P2P systems shows that dependability remains an open issue. To perform in Internet-scale applications, P2P systems must address the four major properties of depen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent UML notation for multiagent system design

    Publication Year: 2004, Page(s):63 - 71
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    From the earliest days of multiagent system development, the need has existed for both a methodology and a modeling notation that assist in design. The agent UML community has responded by developing the AUML notation - a UML profile dedicated to agents that tries to simplify the transition from software engineering to multiagent system engineering. The idea behind AUML is to exploit UML extension... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile code daemons for networks of embedded systems

    Publication Year: 2004, Page(s):72 - 79
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Originally implemented to support wireless sensor networks, the lightweight mobile code daemons works on wired networks as well. The mobile code daemon we present is based on a core network protocol called the remote execution and action protocol (REAP), which is responsible for passing messages between nodes within our network. The authors have implemented them to run on multiple operating system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dark matter revisited

    Publication Year: 2004, Page(s):81 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    During the past 20 years, we've produced myriad toolkits aimed at simplifying distributed programming and integration, including many proprietary or homegrown-based approaches and many others based on well-known approaches such as distributed computing environment (DCE), CORBA, J2EE, and Web services. It's not only distributed computing and integration's inherent difficulties that make these tool-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS in grid computing

    Publication Year: 2004, Page(s):85 - 87
    Cited by:  Papers (28)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Grid computing is already a mainstream paradigm for resource-intensive scientific applications, but it also promises to become the future model for enterprise applications. The grid enables resource sharing and dynamic allocation of computational resources, thus increasing access to distributed data, promoting operational flexibility and collaboration, and allowing service providers to scale effic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami