By Topic

Internet Computing, IEEE

Issue 3 • Date May-June 2006

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1520 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (657 KB)  
    Freely Available from IEEE
  • IEEE Internet Computing - Call for Papers

    Publication Year: 2006 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (308 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (805 KB)  
    Freely Available from IEEE
  • Net neutrality's unpublicized achilles' heel [Internet services]

    Publication Year: 2006 , Page(s): 4 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    Recent comments from telecommunications executives medicating that the might start charging bandwidth-intensive service providers to transport their content have raised objections from those companies, and from law makers. Even in peering situations, the peers have to pay for the capacity to interconnect themselves to various peers at various access points, public or private. There is a cost to achieving full connectivity purely by peering, and some ISPs would mix peering with transit to achieve a reasonable cost profile. Interconnection has a cost and the choice of achieving it is a business decision. However passionate the public discussion might be, bandwidth providers and content providers will be dancing an elaborate minuet to maximize both camps' market opportunities View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Distributed Systems Online - Information

    Publication Year: 2006 , Page(s): 7
    Save to Project icon | Request Permissions | PDF file iconPDF (552 KB)  
    Freely Available from IEEE
  • From the Newsstand

    Publication Year: 2006 , Page(s): 8 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (328 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2006 , Page(s): 12
    Save to Project icon | Request Permissions | PDF file iconPDF (190 KB)  
    Freely Available from IEEE
  • Guest Editors' Introduction: Application-Level QoS

    Publication Year: 2006 , Page(s): 13 - 15
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (360 KB) |  | HTML iconHTML  

    Application-level quality of service (QoS) is the Achilles' heel of services offered overthe Internet. The articles in this special issue cover various aspects of this complex problem, while exposing the challenges we have yet to overcome. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing end-to-end QoS in distributed embedded applications

    Publication Year: 2006 , Page(s): 16 - 23
    Cited by:  Papers (1)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    Maintaining end-to-end quality of service (QoS) is a challenge in distributed real time embedded systems due to dynamically changing network environments and resource requirements. The authors' middleware QoS management approach encapsulates QoS behaviors as software components. Using the Corba component model, they build these specialized QoS components and combine them to produce a comprehensive management system that maintains QoS. The authors illustrate the approach by building a real-world medium-scale system with these components. Using this example, they demonstrate the reusability of each component in different contexts View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing QoS in selfish overlay networks

    Publication Year: 2006 , Page(s): 24 - 31
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1083 KB) |  | HTML iconHTML  

    A routing overlay network is an application-layer overlay on the existing Internet routing substrate that allows an alternative routing service. Recent studies have suggested that such networks might contain selfish nodes, which develop their strategies by considering only their own objectives. Extremely selfish nodes, called free-riders, might even refuse to share their resources with the network, thus making overlay service unavailable to the nodes that depend on them. The authors use a game-theoretic approach to evaluate the selfish-node mechanism and increase quality of service (QoS) by detecting and excluding free-riders View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS assessment via stochastic analysis

    Publication Year: 2006 , Page(s): 32 - 42
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (505 KB) |  | HTML iconHTML  

    Using a stochastic modeling approach based on the Unified Modeling Language and enriched with annotations that conform to the UML profile for schedulability performance, and time, the authors propose a method for assessing quality of service (QoS) in fault-tolerant (FT) distributed systems. From the UML system specification, they produce a generalized stochastic Petri net (GSPN) performance model for assessing an FT application's QoS via stochastic analysis. The ArgoSPE tool provides support for the proposed technique, helping to automatically produce the GSPN model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability prediction for service-oriented computing environments

    Publication Year: 2006 , Page(s): 43 - 49
    Cited by:  Papers (30)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    A key issue in the development of service-oriented computing applications is the dynamic and efficient prediction of their overall quality to appropriately drive the selection and assembly of services. This article focuses on the reliability quality measure and presents an implementation of a reliability prediction methodology that respects SOC's decentralization and autonomy principles. Despite the focus on reliability, you can extend the architecture to the prediction of other quality measures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming model alternatives for disconnected business applications

    Publication Year: 2006 , Page(s): 50 - 57
    Cited by:  Papers (3)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    In connected environments, various programming models exist to facilitate the development of business applications with critical properties such as persistence, data sharing, transactions, and security. In disconnected environments, the programming models must address other issues as well, such as how to merge the work performed while disconnected from other concurrent work. Among existing programming models, a transparent model that uses a method-replay approach is particularly promising. A comparison of programming model semantics suggests that method replay is superior to other approaches. We evaluate via three criteria: conflict footprint size, client-server application divergence, and transactional semantics View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Web services: a new agent-based framework

    Publication Year: 2006 , Page(s): 58 - 65
    Cited by:  Papers (19)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (448 KB) |  | HTML iconHTML  

    Mobile devices and server applications often run on different platforms, which can make integration problematic. Web services might offer a solution, but they typically include XML protocols that are too "heavy" for mobile devices. In this article, we describe agent-based mobile services framework. It uses wireless portal networks and eliminates XML processing on mobile clients. It also offers dynamic service selection and rapid application development and deployment for Web service providers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Municipal Wi-Fi: big wave or wipeout?

    Publication Year: 2006 , Page(s): 66 - 71
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    This article describes some contemporary cases, explores the perspectives of municipalities, providers, and legislators, and examines some examples that could synchronize the various stake-holders' positions. We focus here mostly on US cases. Deployment of wireless services to cities and towns has become a topic of considerable controversy. At the center of the debate is the decision by municipalities to offer low-cost service to citizens who would normally be excluded from the Internet. This "digital divide" justification often pits large cities against incumbent telecommunications providers. Legislation at the national and state levels has been somewhat favorable to the providers so far, but this bias might be shifting as more large providers join, rather than oppose, municipal wireless projects View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoid XML schema wildcards for Web service interfaces

    Publication Year: 2006 , Page(s): 72 - 79
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    Developers risk negative side effects when they attempt to make Web services interfaces extensible without understanding the context in which various mechanisms are applied. Given the overuse and misapplication of the HTML example, developers often litter their interfaces with XML Schema wildcards. This increases complexity and results in ambiguous interface definitions. A more appropriate versioning strategy for Web services development can help developers avoid these problems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Transition to IPv6, Part 1: 4over6 for the China Education and Research Network

    Publication Year: 2006 , Page(s): 80 - 85
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (445 KB) |  | HTML iconHTML  

    Researchers at the Tsinghua University in Beijing propose a mechanism for letting IPv4 networks communicate with each other across an IPv6 backbone via a Border- Gateway Protocol (BGP)-based control plane for advertising tunnels and lPv4 network prefixes. They've deployed a prototype implementation on the native lPv6 China Education and Research Network 2 (CERNet2) backbone as the major part of the China Next-Generation Internet (CNGI) project, using current packet-encapsulation technology and an extension of BGP, and the IETF is currently considering their 4over6 mechanism as well View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Celebrates Two 60-Year Anniversaries

    Publication Year: 2006 , Page(s): 86
    Save to Project icon | Request Permissions | PDF file iconPDF (280 KB)  
    Freely Available from IEEE
  • Toward a grid-based DBMS

    Publication Year: 2006 , Page(s): 87 - 90
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1668 KB) |  | HTML iconHTML  

    The relational database management system (DBMS) community has been progressing toward using specialized grids. EMC/Acxiom's data grid architecture and MySQL Cluster's grid architecture couple the main memories of PCs with redundancy to implement persistence. In a data grid architecture at its base level is a grid abstract machine, which consists of a collection of typed nodes. The grid abstract machine provides redundant storage in case a node fails. It might also provide interfaces that group nodes into enclaves. This grouping could be based on attributes such as assignment, node type, size, capabilities, physical location, and who owns it. This departs from traditional database implementations, which were tuned to small numbers of processors and in which most algorithms for relational operators and most indices were tuned to disk-block transfers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scripting JAX-WS [JavaScript]

    Publication Year: 2006 , Page(s): 91 - 94
    Cited by:  Patents (14)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (425 KB) |  | HTML iconHTML  

    If you need to glue together multiple technologies, such as databases, lightweight directory access protocol (LDAP), XML messaging, remote procedure calls (RPCs), and distributed objects, the Ruby programming language might be the answer to help you do it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • It's the programming, stupid [semantic Web]

    Publication Year: 2006
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    It's time for academic research in semantics to be industrially relevant. Industry adapts slowly to new ideas, with large companies following start-ups' new technologies. Academics are confused about the problem they're solving, as well as the problems that industry solved. Some of this confusion concerns the difference between static semantics and process descriptions. Investigating real industry problems offers academics a vast and challenging array of research problems. The incentive problem, however, is that academics get rewarded for interesting theoretical, rather than practical, advances unless they start companies. So, we need new mechanisms for bringing the industrial and academic communities together and new incentives for both. The SWS (semantic Web services) challenge is only a start View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back inside cover]

    Publication Year: 2006 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (402 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (343 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami