By Topic

IEEE Internet Computing

Early Access Articles

Early Access articles are made available in advance of the final electronic or print versions. Early Access articles are peer reviewed but may not be fully edited. They are fully citable from the moment they appear in IEEE Xplore.

Filter Results

Displaying Results 1 - 14 of 14
  • Relieving Both Storage and Recovery Burdens in Big Data Clusters with R-STAIR Codes

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB)

    Enterprise storage clusters increasingly adopt erasure coding to protect stored data against transient and permanent failures. Existing erasure code designs not only introduce extra parity information in a storage-inefficient manner, but also consume substantial cross-rack recovery bandwidth. To relieve both storage and recovery burdens of erasure coding, we adapt our previously proposed STAIR cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nowcasting of Earthquake Consequences using Big Social Data

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB)

    Messages posted to social media in the aftermath of a natural disaster are not only useful for detecting the event itself. More importantly, mining such deliberately dropped digital traces allows a precise situational awareness, from which disaster's consequences on population and infrastructures can be timely estimated. Yet, to date, the automatic assessment of damage has received little attentio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the (in)effectiveness of the Share/Tweet button: A study in the context of idea management for civic participation

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB)

    The authors study the practice of promoting idea campaigns in social networks via the well-known Share/Tweet button. They analyze data about 53 civic participation initiatives collected from IdeaScale, one of the leading online idea management platforms today, and unveil a considerable misconception about the effectiveness of the practice. The article highlights open challenges and suggests a set ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-based Indoor Navigation Services

    Publication Year: 2016, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    The advances of smartphone technology in recent years is leading to the uptake of a new class of Internet-based Indoor Navigation (IIN) services, which might soon diminish the need of Satellite-based technologies in urban environments. IIN services rely on geolocation databases that store indoor models comprising of floor-maps and points-of-interest along with wireless, light and magnetic signals ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social media interaction and analytics for enhanced educational experiences

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2112 KB)

    In this paper we present an innovative system based on social media and high quality multimedia content delivery designed to enhance the educational experiences of students in cultural centers and museums. The system brings together students that are viewing an educational movie with a panel of experts that may be geographically dispersed, and engages them in an exciting social media experience vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for Defending from Buffer Overflow Vulnerability Security Exploits

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB)

    Recent reports reveal that majority of security violations are caused by weaknesses in code. Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications were proposed to tackle the vulnerability they either fail to address the large scope of the problem or have limitations preventing their use and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with Semantic Heterogeneity Issues on the Web

    Publication Year: 2016, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1129 KB)

    The Semantic Web is an extension of the traditional Web in which meaning of information is well defined, thus allowing a better interaction between people and computers. To accomplish its goals, mechanisms are required to make explicit the semantics of Web resources, to be automatically processed by software agents (this semantics being described by means of online ontologies). Nevertheless, issue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for Defending from Buffer Overflow Vulnerability Security Exploits

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Recent reports reveal that majority of security violations are caused by weaknesses in code. Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications were proposed to tackle the vulnerability they either fail to address the large scope of the problem or have limitations preventing their use and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incentive Mechanisms in P2P Media Streaming Systems

    Publication Year: 2010, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB)

    This paper highlights the need to curb free-riding in P2P media streaming systems and discusses the mechanisms by which this could be accomplished. Free riding, whereby a peer utilizes network resources, but does not contribute services could have a huge impact on the efficacy of blue streaming systems, leading to scalability issues and service degradation. We discuss why BitTorrent-like tit-for-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What makes a high quality user-generated answer?

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB)

    Community-driven Question Answering (CQA) services on the Internet enable users to share content in the form of questions and answers. Nonetheless, questions usually attract multiple answers of varying quality from the user community. For this reason, the purpose of this paper is to identify high quality answers from a group of candidate answers obtained from semantically similar questions that ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Popularity in the Blogosphere

    Publication Year: 2010, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1275 KB)

    The more outgoing and informal social nature of the blogosphere opens the opportunity for exploiting more socially-oriented features, such as credibility and popularity, for searching, recommendation, and other tasks. In this article, we provide evidence that one of these features, namely blog popularity, has been underexploited by current search engines, including specialized ones, and that there... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facing Architectural and Technological Variability of Rich Internet Applications

    Publication Year: 2010, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB)

    The advent of Rich Internet Applications has involved an authentic technological revolution providing Web users with advanced requirements similar to desktop applications. At the same time, RIAs have multiplied the possible architectural and technological alternatives complicating development and increasing risks. The real challenge is to select the right alternatives among the existing RIA variab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive Monitoring of BPEL Processes

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB)

    The distributed ownership of Service Oriented Systems has led to an increasing focus on run-time management solutions. Service Oriented Systems can heavily change after deployment, hampering their quality and reliability. They can change their service bindings, or providers can modify the internals of their services. Monitoring is critical for these systems, to keep track of the behavior and find ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating Operational and Control Behaviors: A New Approach to Web Services Modeling

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB)

    Developing flexible business applications is one of the ultimate objectives behind the use of Web services. Before taking part in such applications (sometimes critical), each Web service should be modeled so that its execution can be monitored and design problems can be early identified and addressed. In this article, we propose a novel approach for modeling Web services by distinguishing two type... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami