By Topic

Internet Computing, IEEE

Issue 1 • Date Jan.-Feb. 2008

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2008 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (2575 KB)  
    Freely Available from IEEE
  • Infosec World

    Publication Year: 2008 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (4382 KB)  
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2008 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (350 KB)  
    Freely Available from IEEE
  • On Social Networking and Communication Paradigms

    Publication Year: 2008 , Page(s): 4 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (226 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The Net’s Going Green: Multipronged Approach Might Save Costs, Energy — and the Climate

    Publication Year: 2008 , Page(s): 7 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (309 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Interview with Rich Friedrich, Dave Cohen, and Alex Dreiling

    Publication Year: 2008 , Page(s): 10 - 13
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (722 KB) |  | HTML iconHTML  

    Dejan Milojicic discusses Web 2.0 and its implications for modern IT with three guests: Rich Friedrich, director of the Enterprise Systems and Service Lab in HP Labs; Dave Cohen, chief technology architect of Merrill Lynch; and Alex Dreiling, research program manager at SAP Labs in Brisbane. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crisis Management

    Publication Year: 2008 , Page(s): 14 - 17
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    Multiple recent disasters have put crisis management in the limelight. Consequently, many IT-related research efforts are under way to bring transformational changes to first responder and response organizations’ ability to contain and mitigate crises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Mesh Networks for Public Safety and Crisis Management Applications

    Publication Year: 2008 , Page(s): 18 - 25
    Cited by:  Papers (32)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (599 KB) |  | HTML iconHTML  

    Wireless mesh networks (WMNs) are multihop wireless networks with self-healing and self-configuring capabilities. These features, plus the ability to provide wireless broadband connectivity at a comparatively low cost, make WMNs a promising technology for a wide range of applications. While discussing the suitability of WMN technology for public safety and crisis management communication, this art... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive Software Environments for Supporting Disaster Responses

    Publication Year: 2008 , Page(s): 26 - 37
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1125 KB) |  | HTML iconHTML  

    In complex emergency scenarios, teams from various emergency-response organizations must collaborate. These teams include both first responders, such as police and fire departments, and those operators who coordinate the effort from operational centers. The Workpad architecture consists of a front- and a back-end layer. The front-end layer is composed of several front-end teams of first responders... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing

    Publication Year: 2008 , Page(s): 38 - 44
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1439 KB) |  | HTML iconHTML  

    In a crisis situation, toxic gas can be released into the air, blocking routes for emergency responders. Rescue workers must be able to compute the shortest and safest paths in the presence of toxic gas dispersions that move dynamically with changing wind speed and direction. To model this, the authors developed weather retriever software, which fetches weather details about a particular location ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Coordination of First Responders

    Publication Year: 2008 , Page(s): 45 - 47
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (455 KB) |  | HTML iconHTML  

    In a disaster scenario, first responders must be able to perform multiple functions in a coordinated way. At all levels of the task - from integrating heterogeneous systems to addressing response tasks and allocating resources - responders must be able to make decisions in a globally optimal fashion. Automated coordination mechanisms can help, but they still face several challenges that researcher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ancile: Pervasively Shared Situational Awareness

    Publication Year: 2008 , Page(s): 48 - 50
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (215 KB) |  | HTML iconHTML  

    Ancile is a distributed architecture for information sharing that satisfies the needs of tracking personnel and notifies them of events of interest in their vicinity. It was demonstrated to be effective in notifying soldiers to mortar rounds that were already in the air; the soldiers who would have been hit by the rounds had sufficient time to leave the impact area before impact. This article desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Adaptation of Access-Control Policies

    Publication Year: 2008 , Page(s): 51 - 54
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    Today, public-service delivery mechanisms such as hospitals, police, and fire departments rely on digital generation, storage, and analysis of vital information. To protect critical digital resources, these organizations employ access-control mechanisms, which define rules under which authorized users can access the resources they need to perform organizational tasks. Natural or man-made disasters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-Scale Workflow: Integrating Distributed Services

    Publication Year: 2008 , Page(s): 55 - 59
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    Modular applications, components, and services are all ways of describing the product of an organization's efforts to embody its capabilities in autonomous software modules. In fact, the integration of services using well-established workflow paradigms could amplify an organization's capabilities with the creation of a full-blown, inter-organizational system of systems. This is the essence of Web-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Commerce Technology: Back to a Prominent Future

    Publication Year: 2008 , Page(s): 60 - 65
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    E-commerce is a big business with a growing market size and has been a major driving force in the IT industry for the past decade. Companies now need to provide online shopping or marketing Web presence to allow for direct customer connections. In this article, the author reviews some primary e-commerce technologies, including auctions, negotiation, recommender systems, automated shopping, and tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Spectrum Auction: Big Money and Lots of Unanswered Questions

    Publication Year: 2008 , Page(s): 66 - 70
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    Since 1994, the US Federal Communications Commission has conducted 82 auctions of radio-frequency spectrum. Of these, 14 have been for microwave spectrum (above 1,000 MHz), which can be used for fixed and mobile broadband services. Often postponed, the upcoming 700-MHz auction is finally scheduled to begin on 24 January 2008. On the block will be the largest amount of mobile, broadband UHF spectru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Introduction to Internet Standards

    Publication Year: 2008 , Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (550 KB) |  | HTML iconHTML  

    Internet standards allow hardware and software from different sources to interoperate, and we can do virtually nothing on the internet without them. Here, Standards' new department editor discusses Internet standards in general, giving a brief overview of why they're necessary. He then delves into specific standards for email that aim to reduce spammers' ability to lie about who sent an email mess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Semantic Web Technology Taking the Wrong Turn?

    Publication Year: 2008 , Page(s): 75 - 79
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1149 KB) |  | HTML iconHTML  

    Developers create semantic Web technologies (SWTs) not only to overcome the syntactic, semantic data heterogeneity problem at design time but also to support uniform agreements on the meaning of data and processes at run time. As defined in the landmark article in the space, the greatest promises of the semantic Web and SWTs are: seamless interactions among agents (people and services) based on re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph Farming

    Publication Year: 2008 , Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    The Giant Global Graph is an excellent perspective on how we can consider diverse pieces of Web infrastructure as a conceptual whole. The Web, when augmented with RDF's graph model, provides an interconnected system. The resources on the semantic Web are interconnected through logical predicates, but this layer exists on top of the coupling offered by the link, as built into the Web since day one.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Serendipitous Reuse

    Publication Year: 2008 , Page(s): 84 - 87
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (433 KB) |  | HTML iconHTML  

    Enterprise integration is a way that encourages the development of beneficial applications. Enterprise architects tend to favor practices and approaches based on a service-oriented architecture (SOA). Many approaches to connecting software systems, including but not limited to Corba, many Java-based integration systems, and .NET, generally follow the best practices of SOA. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Social Virtual Worlds: Research Issues and Challenges

    Publication Year: 2008 , Page(s): 88 - 92
    Cited by:  Papers (41)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    Today's social virtual worlds (SVW) are beginning to realize Stephenson's vision of the metaverse: a future massive network of interconnected digital worlds. Tens of millions of people already use these kinds of environments to communicate, collaborate, and do business. Big companies are also moving into these digital realms. Thus, in a context in which the Web is becoming increasingly social, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Boundaries

    Publication Year: 2008 , Page(s): 93 - 96
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (504 KB) |  | HTML iconHTML  

    Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. In this inaugural column on practical security, boundaries from smaller to larger are discussed and a couple of vulnerabilities are described. A potential path forward to tackling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career [advertisement]

    Publication Year: 2008 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (4382 KB)  
    Freely Available from IEEE
  • CTIA Wireless

    Publication Year: 2008 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (2575 KB)  
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami