By Topic

IEEE Internet Computing

Issue 3 • Date May-June 2009

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1276 KB)
    Freely Available from IEEE
  • CSDA e-Learning System [advertisement]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (598 KB)
    Freely Available from IEEE
  • Staring at Clouds

    Publication Year: 2009, Page(s):4 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (617 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reaping Deep Web Rewards Is a Matter of Semantics

    Publication Year: 2009, Page(s):7 - 10
    Request permission for commercial reuse | PDF file iconPDF (7292 KB) | HTML iconHTML
    Freely Available from IEEE
  • IPTV: Reinventing Television in the Internet Age

    Publication Year: 2009, Page(s):11 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1519 KB) | HTML iconHTML

    The paper discusses that IPTV isn't just about delivering digital television over Internet technology; it's about reinventing television to better achieve the goals Sarnoff first articulated decades ago. It's about developing a new medium that's greater than the sum of its parts. It's about creating a video- centric, next-generation Internet accessible on any device, be it mobile phone, computer, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Reliable IPTV Network

    Publication Year: 2009, Page(s):15 - 22
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Meeting IPTV's quality of service constraints (such as low latency and loss) requires designing the right combination of underlying IP-transport, restoration, and video and packet recovery methods. Carriers use link-based fast reroute (FRR) as the primary transport restoration method to achieve this goal. Although we can carefully tune the link weights in the IP routing protocol to avoid traffic o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile IPTV: Approaches, Challenges, Standards, and QoS Support

    Publication Year: 2009, Page(s):23 - 31
    Cited by:  Papers (45)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1500 KB) | HTML iconHTML

    IPTV is defined as multimedia services, such as TV, video, audio, text, graphics, and data, delivered over IP-based networks managed to support quality of service (QoS), quality of experience, security, interactivity, and reliability. Mobile IPTV extends those services to mobile networks. The authors discuss mobile IPTV standardization's status, related approaches in the field, and technical chall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standardization Activities for IPTV Set-Top Box Remote Management

    Publication Year: 2009, Page(s):32 - 39
    Cited by:  Papers (14)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    IPTV services are gaining widespread use, requiring service providers to have effective methods for remotely configuring and managing IPTV set-top boxes (STBs). Solutions for such remote management are becoming standards-based. This article examines published specifications and ongoing activities on IPTV STB remote management in four standards organizations: the Broadband Forum, the Digital Video ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Channel-Change Times with the Real-Time Transport Protocol

    Publication Year: 2009, Page(s):40 - 47
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1132 KB) | HTML iconHTML

    In a multicast IPTV distribution network, each channel is offered in a different multicast session, and the IP set-top box joins the respective session when the viewer tunes to a new channel. Due to delays associated with network components and encoding schemes, the time difference between the channel-change request and when the new channel shows up on the screen can be annoyingly large. This arti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building the Internet of Things Using RFID: The RFID Ecosystem Experience

    Publication Year: 2009, Page(s):48 - 55
    Cited by:  Papers (192)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1410 KB) | HTML iconHTML

    At the University of Washington, the RFID ecosystem creates a microcosm for the Internet of Things. The authors developed a suite of Web-based, user-level tools and applications designed to empower users by facilitating their understanding, management, and control of personal RFID data and privacy settings. They deployed these applications in the RFID ecosystem and conducted a four-week user study... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fighting Phishing with Discriminative Keypoint Features

    Publication Year: 2009, Page(s):56 - 63
    Cited by:  Papers (20)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1732 KB) | HTML iconHTML

    Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on discriminative keypoint features in Web pages. Their invariant content descriptor, the Contrast Context Histogram (CCH), computes the similarit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic-Based Solution for UBL Schema Interoperability

    Publication Year: 2009, Page(s):64 - 71
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    The Universal Business Language (UBL) is an initiative to develop common business document schemas for interoperability. However, businesses operate in different industry, geopolitical, and regulatory contexts and have different rules and requirements for the information they exchange. So, several trading communities are tailoring UBL schemas to their needs, requiring that these schemas translate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Daios: Efficient Dynamic Web Service Invocation

    Publication Year: 2009, Page(s):72 - 80
    Cited by:  Papers (31)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Systems based on the service-oriented architecture (SOA) paradigm must be able to bind to arbitrary Web services at runtime. However, current service frameworks are predominantly used through precompiled service-access components, which are invariably hard-wired to a specific service provider. The Dynamic and Asynchronous Invocation of Services framework is a message-based service framework that s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Press [advertisement] for Sameer Seth

    Publication Year: 2009, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (1439 KB)
    Freely Available from IEEE
  • Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda

    Publication Year: 2009, Page(s):82 - 87
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (14277 KB) | HTML iconHTML

    Autonomic computing is the solution proposed to cope with the complexity of today's computing environments. Self-management, an important element of autonomic computing, is also characteristic of single and multiagent systems, as well as systems based on service-oriented architectures. Combining these technologies can be profitable for all - in particular, for the development of autonomic computin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scala and Lift Functional Recipes for the Web

    Publication Year: 2009, Page(s):88 - 92
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1428 KB) | HTML iconHTML

    Today, there's significant interest in functional languages and frameworks that fit the Web better than imperative languages. We explore Scala, an OO-functional language on the Java virtual machine, and Lift, a framework implemented on Scala's functional features. The Scala language offers functional programming features and asynchronous message-passing concurrency alongside a statically typed mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Publication Year: 2009, Page(s): 93
    Request permission for commercial reuse | PDF file iconPDF (1574 KB)
    Freely Available from IEEE
  • Keys Don't Grow in Threes

    Publication Year: 2009, Page(s):96 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known protocols, some parameters must be specified, the most important of which are usually algorithm identifiers and key or hash-output lengths. The author reviews some recent key le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing 2009–2010 Editorial Calendar

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1025 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami