By Topic

IEEE Internet Computing

Issue 4 • Date July-Aug. 2006

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1620 KB)
    Freely Available from IEEE
  • Inside Front Cover

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (680 KB)
    Freely Available from IEEE
  • Calls for Papers

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (719 KB)
    Freely Available from IEEE
  • From the Editor in Chief: Looking Backward

    Publication Year: 2006, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (319 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (240 KB) | HTML iconHTML
    Freely Available from IEEE
  • Arab Internet Investments in "Mid-Boom"

    Publication Year: 2006, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (202 KB) | HTML iconHTML
    Freely Available from IEEE
  • From the Newsstand

    Publication Year: 2006, Page(s):11 - 14
    Request permission for commercial reuse | PDF file iconPDF (336 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction: Distributed Data Mining--Framework and Implementations

    Publication Year: 2006, Page(s):15 - 17
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    It is now possible to gather and store incredible volumes of data, creating opportunities for large-scale data-driven knowledge discovery. Data mining technology has emerged as a means of performing this discovery, and the added dimension of distributed data mining increases this process's complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Data Mining in Peer-to-Peer Networks

    Publication Year: 2006, Page(s):18 - 26
    Cited by:  Papers (79)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Peer-to-peer (P2P) networks are gaining popularity in many applications such as file sharing, e-commerce, and social networking, many of which deal with rich, distributed data sources that can benefit from data mining. P2P networks are, in fact, well-suited to distributed data mining (DDM), which deals with the problem of data analysis in environments with distributed data, computing nodes, and us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Text with Pimiento

    Publication Year: 2006, Page(s):27 - 35
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    To perform analysis, decision-making, and knowledge management tasks, information systems use an increasing amount of unstructured information in the form of text. This data influx, in turn, has spawned a need to improve the text-mining technologies required for information retrieval, filtering, and classification. This article compares some of the options available. In particular, the authors foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anteater: A Service-Oriented Architecture for High-Performance Data Mining

    Publication Year: 2006, Page(s):36 - 43
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Data mining focuses on extracting useful information from large volumes of data, and thus has been the center of much attention in recent years. Building scalable, extensible, and easy-to-use data mining systems, however, has proved to be difficult. In response, the authors developed Anteater, a service-oriented architecture for data mining that relies on Web services to achieve extensibility and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-Oriented Distributed Data Mining

    Publication Year: 2006, Page(s):44 - 54
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1787 KB) | HTML iconHTML

    Data mining research currently faces two great challenges: how to embrace data mining services with just-in-time and autonomous properties and how to mine distributed and privacy-protected data. To address these problems, the authors adopt the business process execution language for Web services in a service-oriented distributed data mining (DDM) platform to choreograph DDM component services and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management

    Publication Year: 2006, Page(s):55 - 63
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (670 KB) | HTML iconHTML

    Although Web services provide abstractions for simplifying integration at lower levels of the interaction stacks, they don't yet help simplify integration at higher abstraction levels such as business-level interaction protocols. Using a model-driven framework for Web services life-cycle management, the authors help facilitate the scalable development and maintenance of service-oriented applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybercrimes against Consumers: Could Biometric Technology Be the Solution?

    Publication Year: 2006, Page(s):64 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1911 KB) | HTML iconHTML

    Although information technology's positive impacts on businesses and individuals are substantial, cybercrime continues to represent one of the greatest threats in the digital world. Advances in biometric technology's capabilities hold promise for solving this problem by offering users greater protection, but more legislative and social-policy work is needed to help realize the technology's full po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When TCP Breaks: Delay- and Disruption- Tolerant Networking

    Publication Year: 2006, Page(s):72 - 78
    Cited by:  Papers (48)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    The authors give an overview of current work on delay- and disruption-tolerant networking and review the overall architecture proposed by the Internet Research Task Force's Delay Tolerant Networking Research Group. Their approach to networking makes no assumption that nodes will have end-to-end connectivity, which could be missing with extremely high-latency connections, if the nodes are only in c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replacing the Whois Protocol: IRIS and the IETF's CRISP Working Group

    Publication Year: 2006, Page(s):79 - 84
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    The Nicname/Whois protocol has served well, but it remains unchanged since it was first published in the early 1980s, despite great change in the infrastructure and administration of the Internet. There is now more diversity with domain names and IP networks and associated contacts, as well as among the users submitting queries via Whois. The protocol is now so fragmented in terms of information f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Digital Library Packages for Institutions

    Publication Year: 2006, Page(s): 85
    Request permission for commercial reuse | PDF file iconPDF (375 KB)
    Freely Available from IEEE
  • The Internet Experience: Getting Conceptual about Interface Design

    Publication Year: 2006, Page(s):86 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    In previous papers, we discussed the importance of tasks in user interface design and the need to focus on how users think about their tasks when they're using an application. It's time to get more detailed about what this means and contemplate how designers can use these general considerations as the foundation for designs and interfaces. Using iTunes and CD Spin Doctor as examples, the author ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Integration with Ruby

    Publication Year: 2006, Page(s):91 - 95
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    If you need to glue together multiple technologies, such as databases, Lightweight Directory Access Protocol (LDAP), XML, messaging, Remote Procedure Calls (RPCs), and distributed objects, the Ruby programming language might be the answer to help you do it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industrial Semantics and Magic

    Publication Year: 2006, Page(s):96 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    It's time for academic research in semantics to be industrially relevant. Yes, industry generally adapts slowly to new ideas, but the problem is compounded by academics' confusion about the issues they're solving - and those that industry would like solved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing 2006 Editorial Calendar

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (346 KB)
    Freely Available from IEEE
  • Back Cover

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1536 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami