By Topic

Internet Computing, IEEE

Issue 3 • Date May-June 2009

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1276 KB)  
    Freely Available from IEEE
  • CSDA e-Learning System [advertisement]

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (506 KB)  
    Freely Available from IEEE
  • Call for Papers

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (598 KB)  
    Freely Available from IEEE
  • Staring at Clouds

    Page(s): 4 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (617 KB)  
    Freely Available from IEEE
  • Reaping Deep Web Rewards Is a Matter of Semantics

    Page(s): 7 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (7292 KB)  
    Freely Available from IEEE
  • IPTV: Reinventing Television in the Internet Age

    Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1519 KB)  

    The paper discusses that IPTV isn't just about delivering digital television over Internet technology; it's about reinventing television to better achieve the goals Sarnoff first articulated decades ago. It's about developing a new medium that's greater than the sum of its parts. It's about creating a video- centric, next-generation Internet accessible on any device, be it mobile phone, computer, or HDTV, at any time and place the consumer chooses. It's about leveraging the Internet's power to better navigate the flood of content flowing our way. And it's about reinventing television advertising from being an unwelcome interruption to being useful, relevant information that can help make our lives more productive and fulfilling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Reliable IPTV Network

    Page(s): 15 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (573 KB)  

    Meeting IPTV's quality of service constraints (such as low latency and loss) requires designing the right combination of underlying IP-transport, restoration, and video and packet recovery methods. Carriers use link-based fast reroute (FRR) as the primary transport restoration method to achieve this goal. Although we can carefully tune the link weights in the IP routing protocol to avoid traffic overlap from FRR during single link failures, multiple failures can still cause path overlap in long-distance networks. By having FRR, IGP, and multicast protocols work in harmony and with appropriate link weight assignments, this approach can help minimize path overlap during multiple failures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile IPTV: Approaches, Challenges, Standards, and QoS Support

    Page(s): 23 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1500 KB)  

    IPTV is defined as multimedia services, such as TV, video, audio, text, graphics, and data, delivered over IP-based networks managed to support quality of service (QoS), quality of experience, security, interactivity, and reliability. Mobile IPTV extends those services to mobile networks. The authors discuss mobile IPTV standardization's status, related approaches in the field, and technical challenges to enhancing mobile IPTV services. Given the critical role of QoS in the technology's widespread adoption, the authors also propose an efficient signaling scheme to support QoS for seamless mobile IPTV services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standardization Activities for IPTV Set-Top Box Remote Management

    Page(s): 32 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (500 KB)  

    IPTV services are gaining widespread use, requiring service providers to have effective methods for remotely configuring and managing IPTV set-top boxes (STBs). Solutions for such remote management are becoming standards-based. This article examines published specifications and ongoing activities on IPTV STB remote management in four standards organizations: the Broadband Forum, the Digital Video Broadcasting Project, the Open IPTV Forum, and the Alliance for Telecommunication Industry Solutions IPTV Interoperability Forum. The authors compare the protocol and data model definitions, investigate interoperability test events, and comment on possible future directions for standardization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Channel-Change Times with the Real-Time Transport Protocol

    Page(s): 40 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1132 KB)  

    In a multicast IPTV distribution network, each channel is offered in a different multicast session, and the IP set-top box joins the respective session when the viewer tunes to a new channel. Due to delays associated with network components and encoding schemes, the time difference between the channel-change request and when the new channel shows up on the screen can be annoyingly large. This article examines the Real-Time Transport Protocol (RTP) in IPTV networks and describes how RTP and its control protocol can help reduce channel-change times. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building the Internet of Things Using RFID: The RFID Ecosystem Experience

    Page(s): 48 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1410 KB)  

    At the University of Washington, the RFID ecosystem creates a microcosm for the Internet of Things. The authors developed a suite of Web-based, user-level tools and applications designed to empower users by facilitating their understanding, management, and control of personal RFID data and privacy settings. They deployed these applications in the RFID ecosystem and conducted a four-week user study to measure trends in adoption and utilization of the tools and applications as well as users' qualitative reactions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fighting Phishing with Discriminative Keypoint Features

    Page(s): 56 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1732 KB)  

    Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on discriminative keypoint features in Web pages. Their invariant content descriptor, the Contrast Context Histogram (CCH), computes the similarity degree between suspicious and authentic pages. The results show that the proposed scheme achieves high accuracy and low error rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic-Based Solution for UBL Schema Interoperability

    Page(s): 64 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (604 KB)  

    The Universal Business Language (UBL) is an initiative to develop common business document schemas for interoperability. However, businesses operate in different industry, geopolitical, and regulatory contexts and have different rules and requirements for the information they exchange. So, several trading communities are tailoring UBL schemas to their needs, requiring that these schemas translate to each other. In this article, the authors describe how to enhance UBL with semantics-based translation mechanisms to maintain interoperability between documents conforming to different schema versions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Daios: Efficient Dynamic Web Service Invocation

    Page(s): 72 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (383 KB)  

    Systems based on the service-oriented architecture (SOA) paradigm must be able to bind to arbitrary Web services at runtime. However, current service frameworks are predominantly used through precompiled service-access components, which are invariably hard-wired to a specific service provider. The Dynamic and Asynchronous Invocation of Services framework is a message-based service framework that supports SOA implementation, allowing dynamic invocation of SOAP/WSDL-based and RESTful services. It abstracts from the target service's internals, decoupling clients from the services they use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Press [advertisement] for Sameer Seth

    Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (1439 KB)  
    Freely Available from IEEE
  • Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda

    Page(s): 82 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (14277 KB)  

    Autonomic computing is the solution proposed to cope with the complexity of today's computing environments. Self-management, an important element of autonomic computing, is also characteristic of single and multiagent systems, as well as systems based on service-oriented architectures. Combining these technologies can be profitable for all - in particular, for the development of autonomic computing systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scala and Lift Functional Recipes for the Web

    Page(s): 88 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1428 KB)  

    Today, there's significant interest in functional languages and frameworks that fit the Web better than imperative languages. We explore Scala, an OO-functional language on the Java virtual machine, and Lift, a framework implemented on Scala's functional features. The Scala language offers functional programming features and asynchronous message-passing concurrency alongside a statically typed model. Lift exploits this model to offer secure, higher-level abstractions to Web developers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Page(s): 93
    Save to Project icon | Request Permissions | PDF file iconPDF (1574 KB)  
    Freely Available from IEEE
  • Keys Don't Grow in Threes

    Page(s): 96 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (295 KB)  

    Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known protocols, some parameters must be specified, the most important of which are usually algorithm identifiers and key or hash-output lengths. The author reviews some recent key length recommendations and compares those to current usage. He raises some issues that come up once we start to do the updates called for by various cryptographic experts and authorities who've made recommendations on this topic - some of which call for widespread changes to occur in 2010. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing 2009–2010 Editorial Calendar

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (240 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (1025 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Michael Rabinovich
Department of Electrical Engineering and Computer Science
Case Western Reserve University