By Topic

IEEE Internet Computing

Issue 3 • Date May-June 2006

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1520 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (657 KB)
    Freely Available from IEEE
  • IEEE Internet Computing - Call for Papers

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (805 KB)
    Freely Available from IEEE
  • Net neutrality's unpublicized achilles' heel [Internet services]

    Publication Year: 2006, Page(s):4 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Recent comments from telecommunications executives medicating that the might start charging bandwidth-intensive service providers to transport their content have raised objections from those companies, and from law makers. Even in peering situations, the peers have to pay for the capacity to interconnect themselves to various peers at various access points, public or private. There is a cost to ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Distributed Systems Online - Information

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (552 KB)
    Freely Available from IEEE
  • From the Newsstand

    Publication Year: 2006, Page(s):8 - 11
    Request permission for commercial reuse | PDF file iconPDF (328 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2006, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction: Application-Level QoS

    Publication Year: 2006, Page(s):13 - 15
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Application-level quality of service (QoS) is the Achilles' heel of services offered overthe Internet. The articles in this special issue cover various aspects of this complex problem, while exposing the challenges we have yet to overcome. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing end-to-end QoS in distributed embedded applications

    Publication Year: 2006, Page(s):16 - 23
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Maintaining end-to-end quality of service (QoS) is a challenge in distributed real time embedded systems due to dynamically changing network environments and resource requirements. The authors' middleware QoS management approach encapsulates QoS behaviors as software components. Using the Corba component model, they build these specialized QoS components and combine them to produce a comprehensive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing QoS in selfish overlay networks

    Publication Year: 2006, Page(s):24 - 31
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1083 KB) | HTML iconHTML

    A routing overlay network is an application-layer overlay on the existing Internet routing substrate that allows an alternative routing service. Recent studies have suggested that such networks might contain selfish nodes, which develop their strategies by considering only their own objectives. Extremely selfish nodes, called free-riders, might even refuse to share their resources with the network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS assessment via stochastic analysis

    Publication Year: 2006, Page(s):32 - 42
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Using a stochastic modeling approach based on the Unified Modeling Language and enriched with annotations that conform to the UML profile for schedulability performance, and time, the authors propose a method for assessing quality of service (QoS) in fault-tolerant (FT) distributed systems. From the UML system specification, they produce a generalized stochastic Petri net (GSPN) performance model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability prediction for service-oriented computing environments

    Publication Year: 2006, Page(s):43 - 49
    Cited by:  Papers (39)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    A key issue in the development of service-oriented computing applications is the dynamic and efficient prediction of their overall quality to appropriately drive the selection and assembly of services. This article focuses on the reliability quality measure and presents an implementation of a reliability prediction methodology that respects SOC's decentralization and autonomy principles. Despite t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming model alternatives for disconnected business applications

    Publication Year: 2006, Page(s):50 - 57
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    In connected environments, various programming models exist to facilitate the development of business applications with critical properties such as persistence, data sharing, transactions, and security. In disconnected environments, the programming models must address other issues as well, such as how to merge the work performed while disconnected from other concurrent work. Among existing program... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Web services: a new agent-based framework

    Publication Year: 2006, Page(s):58 - 65
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Mobile devices and server applications often run on different platforms, which can make integration problematic. Web services might offer a solution, but they typically include XML protocols that are too "heavy" for mobile devices. In this article, we describe agent-based mobile services framework. It uses wireless portal networks and eliminates XML processing on mobile clients. It also offers dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Municipal Wi-Fi: big wave or wipeout?

    Publication Year: 2006, Page(s):66 - 71
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    This article describes some contemporary cases, explores the perspectives of municipalities, providers, and legislators, and examines some examples that could synchronize the various stake-holders' positions. We focus here mostly on US cases. Deployment of wireless services to cities and towns has become a topic of considerable controversy. At the center of the debate is the decision by municipali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoid XML schema wildcards for Web service interfaces

    Publication Year: 2006, Page(s):72 - 79
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Developers risk negative side effects when they attempt to make Web services interfaces extensible without understanding the context in which various mechanisms are applied. Given the overuse and misapplication of the HTML example, developers often litter their interfaces with XML Schema wildcards. This increases complexity and results in ambiguous interface definitions. A more appropriate version... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Transition to IPv6, Part 1: 4over6 for the China Education and Research Network

    Publication Year: 2006, Page(s):80 - 85
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Researchers at the Tsinghua University in Beijing propose a mechanism for letting IPv4 networks communicate with each other across an IPv6 backbone via a Border- Gateway Protocol (BGP)-based control plane for advertising tunnels and lPv4 network prefixes. They've deployed a prototype implementation on the native lPv6 China Education and Research Network 2 (CERNet2) backbone as the major part of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Celebrates Two 60-Year Anniversaries

    Publication Year: 2006, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (280 KB)
    Freely Available from IEEE
  • Toward a grid-based DBMS

    Publication Year: 2006, Page(s):87 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1668 KB) | HTML iconHTML

    The relational database management system (DBMS) community has been progressing toward using specialized grids. EMC/Acxiom's data grid architecture and MySQL Cluster's grid architecture couple the main memories of PCs with redundancy to implement persistence. In a data grid architecture at its base level is a grid abstract machine, which consists of a collection of typed nodes. The grid abstract m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scripting JAX-WS [JavaScript]

    Publication Year: 2006, Page(s):91 - 94
    Cited by:  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    If you need to glue together multiple technologies, such as databases, lightweight directory access protocol (LDAP), XML messaging, remote procedure calls (RPCs), and distributed objects, the Ruby programming language might be the answer to help you do it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • It's the programming, stupid [semantic Web]

    Publication Year: 2006
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    It's time for academic research in semantics to be industrially relevant. Industry adapts slowly to new ideas, with large companies following start-ups' new technologies. Academics are confused about the problem they're solving, as well as the problems that industry solved. Some of this confusion concerns the difference between static semantics and process descriptions. Investigating real industry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back inside cover]

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (402 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (343 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami