By Topic

IEEE Internet Computing

Issue 5 • Date Sept.-Oct. 2005

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1335 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (699 KB)
    Freely Available from IEEE
  • The Agora Internet

    Publication Year: 2005, Page(s):4 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    The Internet's evolution has paralleled, in a rather compressed timeframe, the evolution ofsocial interactions. Back in the hunter-gatherer days, the Internet was primarily a social venue. Then it had its agricultural revolution and was opened to commerce. If we are to have an "agora Internet" that continues to attract ordinary consumers, we must make it a safe place to shop. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Governance debate enters new phase

    Publication Year: 2005, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A recent report, from the United Nations' working group on Internet governance (WGIG) suggests that the debate over the topic might be entering a more placid period. Notably, the reports recommendations don't include immediate and draconian changes to the current architecture or oversight mechanism. On the other hand, those at the highest levels of oversight don't expect the status quo to last for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From the Newsstand

    Publication Year: 2005, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Review of Internet-related stories in IEEE, Computer Society, and trade press. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Social Networks and Social Networking

    Publication Year: 2005, Page(s):14 - 19
    Cited by:  Papers (28)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    This issue's theme includes three articles on research activities that have drawn on ideas from social networking to drive innovative designs. The focus covers the design, development, and study of social technologies at the level of individuals, groups, and organizations. Although the tools described here are all intended for individuals, each article highlights how new technologies and technical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using egocentric networks to understand communication

    Publication Year: 2005, Page(s):20 - 28
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB) | HTML iconHTML

    Social-network analysis generally helps researchers understand how groups of people interact. In this article the author uses small-scale egocentric social networks, based on volitional, explicit connections, to understand how people manage their personal and group communications. Two research projects using this approach show that such networks can give researchers important insight into the peop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social networks as health feedback displays

    Publication Year: 2005, Page(s):29 - 37
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    Social networks have thus far served primarily as analytic tools for social scientists. By leveraging pervasive computing, this new research transforms social-network models into behavioral feedback displays. These ambient displays, which reflect data on remote and face-to-face interaction gathered by wireless sensor networks, were intended to raise awareness of social connectedness as a dynamic a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P3 systems: putting the place back into social networks

    Publication Year: 2005, Page(s):38 - 46
    Cited by:  Papers (18)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The availability of technologies enables a new class of location-aware information systems that link people-to-people-to-geographical-places (P3 systems). P3 systems can strengthen the relationship between social networks and physical places. They can also help individuals leverage location information to make new social ties and coordinate interactions that reinforce existing ties. Using the P3 s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical middleware for massively multiplayer online games

    Publication Year: 2005, Page(s):47 - 54
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    A massively multiplayer online game (MMOG) lets thousands of players interact simultaneously within a virtual world via the Internet. Middleware plays an important role in the development of next-generation MMOGs, which must be built on platforms that address not only the service aspect, but also code maintainability and development for programmers. The authors' compact, high-performance message-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Java-AWT thin-client applications for limited devices

    Publication Year: 2005, Page(s):55 - 63
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    Developing software for personal wireless devices (PWDs) requires new methods and tools that address the restrictions introduced by these devices' mobile nature. The thin-client applications for limited devices (TCPTE) framework supports the development of thin-client applications for mobile devices with limited resources. Using TCPTE, we can execute Java applications on a server and display their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML document indexes: a classification

    Publication Year: 2005, Page(s):64 - 71
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    XML's increasing diffusion makes efficient XML query processing and indexing all the more critical. Given the semistructured nature of XML documents, however, general query processing techniques won't work. Researchers have proposed several specialized indexing methods that offer query processors efficient access to XML documents, although none are yet fully implemented in commercial products. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semantic Web services architecture

    Publication Year: 2005, Page(s):72 - 81
    Cited by:  Papers (76)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    The semantic Web services initiative architecture (SWSA) committee has created a set of architectural and protocol abstractions that serve as a foundation for semantic Web service technologies. This article summarizes the committee's findings, emphasizing its review of requirements gathered from several different environments. We also identify the scope and potential requirements for a semantic We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming XML with Jabber/XMPP

    Publication Year: 2005, Page(s):82 - 89
    Cited by:  Papers (21)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Jabber is an open alternative to closed instant messaging (IM) and presence services. At its core is the extensible messaging and presence protocol (XMPP), which defines how to stream XML content and is being used to build not only a large open IM network but also a wide range of XML applications. This article provides an overview of Jabber/XMPP protocols and technologies, as well as an introducti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The user experience [Internet]

    Publication Year: 2005, Page(s):90 - 92
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In this article the author provides perspective on user experience, usability and user-centered design. User experience is a broad collection of user-centric issues that cut through the full extent of a project. The author points out new developments in the user experience world that are opening up new opportunities for research and projects. The author also discusses how good user experience proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RPC under fire

    Publication Year: 2005, Page(s):93 - 95
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Although many successful distributed systems have been built using RPC, we have known for a while that it's imperfect, even fundamentally flawed, because it ignores the all-too-real possibility of partial failures by attempting to make the network appear to be just another part of the local environment. A partial failure occurs in a distributed system when a remote application or the network itsel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pragmatic semantic unification

    Publication Year: 2005, Page(s):96 - 97
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    The term unification is meaningful only with respect to applications. A term's meaning, or semantics, is evident in its use - if the application is successful, the terms have been used correctly. Unifying academic ontologies is unification in a vacuum. The only way to know if we have done it correctly is to test whether the applications associated with the terms interoperate successfully - a notio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami