By Topic

IEEE Internet Computing

Issue 3 • Date May-June 2005

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1520 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (816 KB)
    Freely Available from IEEE
  • From the Editor in Chief: Patent Pending

    Publication Year: 2005, Page(s):4 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    I’ve always believed that one of the keys to success is knowing the rules of the game. Finding the rules fair but being unhappy with the effect is called result mongering. Much of the legal fighting over intellectual property today seems more about achieving particular results than optimizing the overall economy. The details of IP law are worked out in the political process, a space where tho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Municipal wireless networks open new access and old debates

    Publication Year: 2005, Page(s):8 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Around the world, ever-increasing numbers of government agencies are either deploying 802.11 wireless networks for public and administrative uses or studying how to do so. However, the booming popularity of municipal wireless networks has also amplified an ongoing public policy dispute, especially in the US. The author discuss the new access supports and the old debates of municipal wireless netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From the Newsstand

    Publication Year: 2005, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Review of Internet-related stories in IEEE, Computer Society, and trade press. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Information Discovery--Needles and Haystacks

    Publication Year: 2005, Page(s):16 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    For thousands of years, people have realized the importance of archiving and finding information. With the advent of computers, it became possible to store large amounts of information in electronic form -- and finding useful needles in the resulting haystacks has since become one of the most important problems in information management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search adaptations and the challenges of the Web

    Publication Year: 2005, Page(s):19 - 26
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Search has become a hot topic in Internet computing, with rival search engines battling to become the de facto Web portal, harnessing search algorithms to wade through information on a scale undreamed of by early information retrieval (IR) pioneers. This article examines how search has matured from its roots in specialized IR systems to become a key foundation of the Web. The authors describe new ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping the semantics of Web text and links

    Publication Year: 2005, Page(s):27 - 36
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1656 KB) | HTML iconHTML

    Search engines use content and links to search, rank, cluster, and classify Web pages. These information discovery applications use similarity measures derived from this data to estimate relatedness between pages. However, little research exists on the relationships between similarity measures or between such measures and semantic similarity. The author analyzes and visualizes similarity relations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranking complex relationships on the semantic Web

    Publication Year: 2005, Page(s):37 - 44
    Cited by:  Papers (46)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Industry and academia are both focusing their attention on information retrieval over semantic metadata extracted from the Web, and it is increasingly possible to analyze such metadata to discover interesting relationships. However, just as document ranking is a critical component in today's search engines, the ranking of complex relationships would be an important component in tomorrow's semantic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective replication for content management environments

    Publication Year: 2005, Page(s):45 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Content management applications typically depend on information stored in both relational database tables and operating system files. Often, content providers replicate all or parts of the available database data and associated files to increase application availability, address resource constraints and costs, or better support geographically dispersed and mobile users. This article presents a sol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An e-service infrastructure for power distribution

    Publication Year: 2005, Page(s):52 - 59
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Delivering Web services based on data collected from distributed networks of smart devices presents several business and data-integration challenges for providers. Enterprise users need a scalable, standards-based mechanism that lets them run services without becoming experts in the technical aspects of service delivery. The Inside software infrastructure attempts to provide such a solution. Insid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How BPEL and SOA are changing Web services development

    Publication Year: 2005, Page(s):60 - 67
    Cited by:  Papers (58)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    As the use of Web services grows, organizations are increasingly choosing the Business Process Execution Language for modeling business processes within the Web services architecture. In addition to orchestrating organizations' Web services, BPEL's strengths include asynchronous message handling, reliability, and recovery. By developing Web services with BPEL in mind, organizations can implement a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiprotocol label switching and IP. Part I. MPLS VPNs over IP tunnels

    Publication Year: 2005, Page(s):68 - 72
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Multiprotocol label switching (MPLS) is a tunneling technology used in many service provider networks. The most popular MPLS-enabled application in use today is the MPLS virtual private network, MPLS VPNs were developed to operate over MPLS networks, but they can also run over native IP networks. This offers providers flexibility in network-deployment choices, improved routing system scalability, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving from business to technology with service-based processes

    Publication Year: 2005, Page(s):73 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    In most organizations, business process realizations must be aligned with existing systems, which can impose specific requirements. Currently, however, there is no way to track the alignment between business processes and corresponding technical implementations. The authors' proposed framework offers a systematic way to classify and assess technical realizations of business processes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure electronic data interchange over the Internet

    Publication Year: 2005, Page(s):82 - 89
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    The electronic data interchange over the Internet (EDI-INT) standards provide a secure means of transporting EDI and XML business documents over the Internet. EDI-INT includes different implementation protocols that work over the Internet's three major transports - SMTP, HTTP, and FTP. Each uses secure multipurpose Internet mail extensions (S/MIME), digital signatures, encryption, and message-rece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WS-Addressing metadata [Web services]

    Publication Year: 2005, Page(s):90 - 93
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Any Web services endpoint, or more generally, virtually any distributed systems endpoint, incorporates various forms of metadata. EPRs do not support multiport services, which are common within multiprotocol enterprise systems. EPRs do not help with service availability issues, given that they could contain only a single service address. In this article, the author reviews these concerns and explo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable access to scientific data

    Publication Year: 2005, Page(s):94 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    The author use a simple analytic model to analyze the scalability of an infrastructure that generates high-level data products derived from raw data and then delivers them in response to user requests. He also discusses the concept of metadata and how it generally facilitates access to scientific data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (320 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami