IEEE Internet Computing

Issue 6 • Nov.-Dec. 2006

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1410 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (2414 KB)
    Freely Available from IEEE
  • IEEE Internet Computing--Call for Papers

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (323 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (615 KB)
    Freely Available from IEEE
  • From the Editor in Chief: Define--Valedictory

    Publication Year: 2006, Page(s):4 - 7
    Request permission for commercial reuse | PDF file iconPDF (294 KB) | HTML iconHTML
    Freely Available from IEEE
  • VoIP Security Gets More Visible

    Publication Year: 2006, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (201 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Distributed Systems Online - Information

    Publication Year: 2006, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (320 KB)
    Freely Available from IEEE
  • From the Newsstand

    Publication Year: 2006, Page(s):12 - 15
    Request permission for commercial reuse | PDF file iconPDF (317 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reliable Asynchronous Message Delivery for Mobile Agents

    Publication Year: 2006, Page(s):16 - 25
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1109 KB) | HTML iconHTML

    Agents' mobility makes it difficult for them to deliver messages reliably, but a new system could change that. To asynchronously deliver messages to a mobile agent, the reliable asynchronous message delivery (RAMD) protocol places a "blackboard" in each region server for sharing information. RAMD also relates message delivery with a mobile agent's migration, thus addressing the tracking and messag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing MOM Flexibility with Portable Rule Bases

    Publication Year: 2006, Page(s):26 - 32
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Message-oriented middleware (MOM) provides an effective integration mechanism for distributed systems, but it must change frequently to adapt to evolving business demands. Content-based routing (CBR) can increase the flexibility of MOM-based deployments. Although centralized CBR improves a messaging solution's maintainability, it limits scalability and robustness. This article proposes an alternat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilayer Peer-to-Peer Framework for Distributed Synchronous Collaboration

    Publication Year: 2006, Page(s):33 - 41
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    Although interest in Web-based multiuser interaction is growing, classical server-based multiuser systems are becoming saturated. Consequently, the peer-to-peer (P2P) paradigm is receiving significant attention as an alternative. The authors propose a multilayer P2P framework for developing distributed synchronous collaborative systems using asynchronous P2P platforms. They've used the framework t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent Multiple-Issue Negotiation for Internet-Based Services

    Publication Year: 2006, Page(s):42 - 49
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Negotiation is a technique for reaching a mutually beneficial agreement among autonomous entities. In an Internet-based services context, multiple entities are negotiating simultaneously. The concurrent negotiation protocol extends existing negotiation protocols, letting both service requestors and service providers manage several negotiation processes in parallel. Colored Petri nets, which have g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive DAD: A Fast Address-Acquisition Strategy for Mobile IPv6 Networks

    Publication Year: 2006, Page(s):50 - 55
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    The increasing number of Wi-Fi-compatible mobile devices highlights various wireless access challenges, including the need for smooth hand offs between Internet attachment points in mobile IPv6 networks. To confirm address uniqueness in a new domain, mobile nodes must run duplicate address detection (DAD), which is a time-consuming process. The Proactive DAD approach uses topology information and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Integrity Checks for Remote Web Resources

    Publication Year: 2006, Page(s):56 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (990 KB) | HTML iconHTML

    Existing tools for automatically detecting Web site defacement compare monitored Web resources with uncorrupted copies of the content kept in a safe place. This can be an expensive and difficult task, especially when working with dynamic resources. In contrast, the Goldrake tool uses sensors and alarms to automatically monitor remote Web resources' integrity. Such a framework could help designers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SEOnline Software Engineering Online Information [advertisement]

    Publication Year: 2006, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (409 KB)
    Freely Available from IEEE
  • E-Governance in Antarctica: Internet Technology's Role in Administering a Global Commons

    Publication Year: 2006, Page(s):64 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Internet technology is enabling the governance of geographic areas that were once considered beyond human control. Nowhere on Earth is this more evident than in Antarctica, which is a global commons currently governed under the terms of the Antarctic Treaty. With current concerns over global warming and Antarctica's importance as an environmental barometer, the use of Internet technology is increa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shopbots: A Syntactic Present, A Semantic Future

    Publication Year: 2006, Page(s):69 - 75
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Despite high expectations, shopbots have yet to significantly facilitate a richer, more satisfying online shopping experience for users. By taking advantage of semantic Web and Web services technologies, however, researchers can overcome current technological limitations and finally realize the shopbot's significant potential View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Shortest Path to the Future Web

    Publication Year: 2006, Page(s):76 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    This column's title could suggest that there is only one best path forward for the Web. The path begins with document metadata and travels through the world of microformats and embedded data. A waypoint is a semantic Web that leverages these approaches, along with those offered by an environment more capable of managing first-class data directly. This is only one path, however, and it probably isn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability Testing: A Journey, Not a Destination

    Publication Year: 2006, Page(s):80 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1302 KB) | HTML iconHTML

    Usability testing for interfaces can fit into a design project in several ways. The author looks at how good testing techniques can make projects run better and faster, and produce an improved result. The primary point is that there's no incompatibility between usability testing and a rational product process. We can think of usability testing as simply another aspect of quality assurance, and can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In Search of Manageable Identity Systems

    Publication Year: 2006, Page(s):84 - 86
    Cited by:  Papers (1)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB) | HTML iconHTML

    Efforts to design and successfully deploy network-based identity-management systems have been unsuccessful. One possible new approach is visible when comparing Internet identity protocol designs with systems used in financial services. Keeping the risks in mind, we should embrace systems that help reduce the uncertainty associated with online transactions. Neither the composite nor unitary approac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Message Queuing Protocol

    Publication Year: 2006, Page(s):87 - 89
    Cited by:  Papers (70)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    The advanced message queuing protocol (AMQP) working group's goal is to create an open standard for an interoperable enterprise-scale asynchronous messaging protocol. AMQP is finally addressing the lack of enterprise messaging interoperability standards. This relatively simple yet compellingly powerful enterprise messaging protocol is thus poised to open up a bright new era for enterprise messagin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing 2006 Annual Index, Volume 10

    Publication Year: 2006, Page(s):90 - 95
    Request permission for commercial reuse | PDF file iconPDF (576 KB)
    Freely Available from IEEE
  • Out of Context

    Publication Year: 2006, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (2574 KB)
    Freely Available from IEEE
  • Silver Bullet Security Podcast Series [advertisement]

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1237 KB)
    Freely Available from IEEE
  • IEEE Internet Computing 2007 Editorial Calendar

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (392 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami