By Topic

Internet Computing, IEEE

Issue 1 • Date Jan.-Feb. 2009

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (171 KB)  
    Freely Available from IEEE
  • CSDA and CSDP [advertisement]

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (279 KB)  
    Freely Available from IEEE
  • Call for Papers

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (146 KB)  
    Freely Available from IEEE
  • Protect Us from Ourselves

    Page(s): 4 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (183 KB)  
    Freely Available from IEEE
  • Network-Enabled Compulsory Education Getting Big Push

    Page(s): 7 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (196 KB)  
    Freely Available from IEEE
  • RFID Meets the Internet

    Page(s): 11 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (105 KB)  

    After several years of development, networked RFID is moving beyond the early adopter phase as more and more industry sectors are using this technology for increasingly diverse applications. Two main technological advances have made this possible: the wider availability of very low-cost and higher-range passive RFID tags that require no battery to operate, and the use of the Internet to interconnect standalone RFID systems and software through robust fixed- and mobile-communication networks. This special issue presents some recent work in RFID middleware, services, overlaying, and the network edge. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Infrastructure Design: A Case Study of Two Australian RFID Projects

    Page(s): 14 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (376 KB)  

    The design, implementation, and deployment of large-scale RFID infrastructures can occur only through innovative solutions that address RFID challenges at all levels, including device, data processing, and data integration. The authors present and discuss several design issues associated with two Australian national RFID projects, implemented based on the EPCglobal Network. Using practical experience gained from these projects, they identify several areas of improvement and research opportunities for future large-scale RFID implementations and deployments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transf-ID: Automatic ID and Data Capture for Rail Freight Asset Management

    Page(s): 22 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (484 KB)  

    Accurate tracing at the parts level can play a key role in easing and managing maintenance operations within the railway industry, the same way it streamlines freight operations on more traditional deployments. Transf-ID is an RFID-based tracking system for use in the rail freight industry that will identify cargo and rail vehicles but also mechanical parts that are frequently serviced. The system includes middleware as well as hardware components, combined in an end-to-end solution that translates tag scans into meaningful business events. All tagged items are scanned on the move at checkpoints, leading to valuable information regarding their traveled routes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

    Page(s): 31 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB)  

    RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the supply chain visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Page(s): 39
    Save to Project icon | Request Permissions | PDF file iconPDF (1578 KB)  
    Freely Available from IEEE
  • Reputation Bootstrapping for Trust Establishment among Web Services

    Page(s): 40 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (413 KB)  

    Reputation systems rely on past information to establish trust among unknown participants. Reputation bootstrapping - that is, assessing the reputations of newly deployed Web services (newcomers) - is a major issue in service-oriented environments because historical information often isn't present regarding newcomer behaviors. The authors examine different techniques for fairly and accurately bootstrapping newcomers' reputations in a service-oriented environment. They also present experimental results that evaluate the proposed techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Email Addressing: The Semantic Web Killer App?

    Page(s): 48 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB)  

    Email addresses, like telephone numbers, are opaque identifiers. They're often hard to remember, and, worse still, they change from time to time. Semantic email addressing (SEA) lets users send email to a semantically specified group of recipients. It provides all of the functionality of static email mailing lists, but because users can maintain their own profiles, they don't need to subscribe, unsubscribe, or change email addresses. Because of its targeted nature, SEA could help combat unintentional spam and preserve the privacy of email addresses and eve.n individual identities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load Balancing in IEEE 802.11 Networks

    Page(s): 56 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (379 KB)  

    Because wireless stations independently select which access points to camp on, the total wireless station traffic on all available IEEE 802.11 network APs might be unevenly distributed. This load-balancing problem can lead to overloading and network congestion. This survey examines the problem, along with state-of-the-art network- and wireless-station-based solutions. It also presents experimental results using off-the-shelf IEEE 802.11 devices. As the results show, effectively balancing AP traffic loads can increase overall system throughputs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career Center [Advertisement]

    Page(s): 65
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • The Good and the Bad of Top-Level Domains

    Page(s): 66 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (139 KB)  

    ICANN has recently announced an "open season" on top-level domains, to start some time in 2009. This will dramatically expand the namespace for Internet domain names, and will allow cities, industries, and companies to register specific top-level domains for themselves. What effect will that have on the companies involved, and on the Internet users? In this column, the author explores that question and gives his opinion on the answer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Not All Packets Are Equal, Part I: Streaming Video Coding and SLA Requirements

    Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (427 KB)  

    In this first part of a two-part article, the authors consider the network factors that impact the viewers' quality of experience (QoE) for IP-based video-streaming services such as IPTV. They describe the IP service-level requirements for a transported video service and explain MPEG encoding to help readers better understand the impact that packet loss has on viewers' QoE. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics-Empowered Social Computing

    Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (397 KB)  

    In this article, we discuss some of the challenges in marking-up or annotating UGC, a first step toward the realization of the social semantic Web. Using examples from real-world UGC, we show how domain knowledge can effectively complement statistical natural language processing techniques for metadata creation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CG&A Editor in Chief search

    Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (195 KB)  
    Freely Available from IEEE
  • Why Don't We Encrypt Our Email?

    Page(s): 82 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB)  

    Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly reviews the security features available in common mail user agents and considers what it is about those that causes us to almost universally ignore them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delivered Deliverables: The State of the Semantic Web, Part 1

    Page(s): 86 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (213 KB)  

    Tangible products have emerged from the semantic Web initiative. The author examines the progress that has been made in regard to specifications, tools, and applications coming that fall under the W3C's initiative. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perfect Disruption: The Paradigm Shift from Mental Agents to ORGs

    Page(s): 90 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (186 KB)  

    This paper examines how a "perfect disruption", brought on by changes to hardware, software, and applications, is causing a paradigm shift from mental agents to organizations of restricted generality (ORGs) as the foundation for implementing large-scale Internet applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Year's Integration Resolutions

    Page(s): 96 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (93 KB)  

    For many, it's customary at the start of a new year to make resolutions to try to help ensure that this year will be better than last year. This column presents some high-level resolutions you can make that can help improve your distributed systems and enterprise integration efforts for the New Year and beyond. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing 2009 Editorial Calendar

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (153 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (211 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Michael Rabinovich
Department of Electrical Engineering and Computer Science
Case Western Reserve University