By Topic

IEEE Internet Computing

Issue 1 • Date Jan.-Feb. 2009

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • CSDA and CSDP [advertisement]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Protect Us from Ourselves

    Publication Year: 2009, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (183 KB) | HTML iconHTML
    Freely Available from IEEE
  • Network-Enabled Compulsory Education Getting Big Push

    Publication Year: 2009, Page(s):7 - 10
    Request permission for commercial reuse | PDF file iconPDF (196 KB) | HTML iconHTML
    Freely Available from IEEE
  • RFID Meets the Internet

    Publication Year: 2009, Page(s):11 - 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    After several years of development, networked RFID is moving beyond the early adopter phase as more and more industry sectors are using this technology for increasingly diverse applications. Two main technological advances have made this possible: the wider availability of very low-cost and higher-range passive RFID tags that require no battery to operate, and the use of the Internet to interconne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Infrastructure Design: A Case Study of Two Australian RFID Projects

    Publication Year: 2009, Page(s):14 - 21
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    The design, implementation, and deployment of large-scale RFID infrastructures can occur only through innovative solutions that address RFID challenges at all levels, including device, data processing, and data integration. The authors present and discuss several design issues associated with two Australian national RFID projects, implemented based on the EPCglobal Network. Using practical experie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Meets the Internet 
  • Transf-ID: Automatic ID and Data Capture for Rail Freight Asset Management

    Publication Year: 2009, Page(s):22 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB) | HTML iconHTML

    Accurate tracing at the parts level can play a key role in easing and managing maintenance operations within the railway industry, the same way it streamlines freight operations on more traditional deployments. Transf-ID is an RFID-based tracking system for use in the rail freight industry that will identify cargo and rail vehicles but also mechanical parts that are frequently serviced. The system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

    Publication Year: 2009, Page(s):31 - 38
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the supply chain visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Publication Year: 2009, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (1578 KB)
    Freely Available from IEEE
  • Reputation Bootstrapping for Trust Establishment among Web Services

    Publication Year: 2009, Page(s):40 - 47
    Cited by:  Papers (75)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Reputation systems rely on past information to establish trust among unknown participants. Reputation bootstrapping - that is, assessing the reputations of newly deployed Web services (newcomers) - is a major issue in service-oriented environments because historical information often isn't present regarding newcomer behaviors. The authors examine different techniques for fairly and accurately boot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Email Addressing: The Semantic Web Killer App?

    Publication Year: 2009, Page(s):48 - 55
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Email addresses, like telephone numbers, are opaque identifiers. They're often hard to remember, and, worse still, they change from time to time. Semantic email addressing (SEA) lets users send email to a semantically specified group of recipients. It provides all of the functionality of static email mailing lists, but because users can maintain their own profiles, they don't need to subscribe, un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load Balancing in IEEE 802.11 Networks

    Publication Year: 2009, Page(s):56 - 64
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Because wireless stations independently select which access points to camp on, the total wireless station traffic on all available IEEE 802.11 network APs might be unevenly distributed. This load-balancing problem can lead to overloading and network congestion. This survey examines the problem, along with state-of-the-art network- and wireless-station-based solutions. It also presents experimental... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career Center [Advertisement]

    Publication Year: 2009, Page(s): 65
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • The Good and the Bad of Top-Level Domains

    Publication Year: 2009, Page(s):66 - 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    ICANN has recently announced an "open season" on top-level domains, to start some time in 2009. This will dramatically expand the namespace for Internet domain names, and will allow cities, industries, and companies to register specific top-level domains for themselves. What effect will that have on the companies involved, and on the Internet users? In this column, the author explores that questio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Not All Packets Are Equal, Part I: Streaming Video Coding and SLA Requirements

    Publication Year: 2009, Page(s):70 - 75
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    In this first part of a two-part article, the authors consider the network factors that impact the viewers' quality of experience (QoE) for IP-based video-streaming services such as IPTV. They describe the IP service-level requirements for a transported video service and explain MPEG encoding to help readers better understand the impact that packet loss has on viewers' QoE. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics-Empowered Social Computing

    Publication Year: 2009, Page(s):76 - 80
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    In this article, we discuss some of the challenges in marking-up or annotating UGC, a first step toward the realization of the social semantic Web. Using examples from real-world UGC, we show how domain knowledge can effectively complement statistical natural language processing techniques for metadata creation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CG&A Editor in Chief search

    Publication Year: 2009, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • Why Don't We Encrypt Our Email?

    Publication Year: 2009, Page(s):82 - 85
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly reviews the security features available in common mail user agents and considers what it is about those that causes us to almost universally ignore them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delivered Deliverables: The State of the Semantic Web, Part 1

    Publication Year: 2009, Page(s):86 - 89
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Tangible products have emerged from the semantic Web initiative. The author examines the progress that has been made in regard to specifications, tools, and applications coming that fall under the W3C's initiative. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perfect Disruption: The Paradigm Shift from Mental Agents to ORGs

    Publication Year: 2009, Page(s):90 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    This paper examines how a "perfect disruption", brought on by changes to hardware, software, and applications, is causing a paradigm shift from mental agents to organizations of restricted generality (ORGs) as the foundation for implementing large-scale Internet applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Year's Integration Resolutions

    Publication Year: 2009, Page(s):96 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    For many, it's customary at the start of a new year to make resolutions to try to help ensure that this year will be better than last year. This column presents some high-level resolutions you can make that can help improve your distributed systems and enterprise integration efforts for the New Year and beyond. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing 2009 Editorial Calendar

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami