By Topic

IEEE Internet Computing

Issue 1 • Date Jan.-Feb. 2010

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2730 KB)
    Freely Available from IEEE
  • Digital Editions [advertisement]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (327 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (310 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1009 KB)
    Freely Available from IEEE
  • It's All About the (Social) Network

    Publication Year: 2010, Page(s):4 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (425 KB) | HTML iconHTML
    Freely Available from IEEE
  • New Internet Economics Might Not Make It to the Edge [News & Trends]

    Publication Year: 2010, Page(s):7 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (545 KB) | HTML iconHTML
    Freely Available from IEEE
  • Internet predictions [Guest editor's introduction]

    Publication Year: 2010, Page(s):10 - 11
    Cited by:  Papers (6)
    Request permission for commercial reuse | PDF file iconPDF (1034 KB) | HTML iconHTML
    Freely Available from IEEE
  • Participatory sensing: applications and architecture [Internet Predictions]

    Publication Year: 2010, Page(s):12 - 42
    Cited by:  Papers (48)
    Request permission for commercial reuse | PDF file iconPDF (5687 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • IEEE Computer Society Career Center [advertisement]

    Publication Year: 2010, Page(s): 43
    Request permission for commercial reuse | PDF file iconPDF (780 KB)
    Freely Available from IEEE
  • Internet of Things Track 
  • Smart objects as building blocks for the Internet of things

    Publication Year: 2010, Page(s):44 - 51
    Cited by:  Papers (274)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3127 KB) | HTML iconHTML

    The combination of the Internet and emerging technologies such as nearfield communications, real-time localization, and embedded sensors lets us transform everyday objects into smart objects that can understand and react to their environment. Such objects are building blocks for the Internet of Things and enable novel computing applications. As a step toward design and architectural principles for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic mediation for standard-based B2B interoperability

    Publication Year: 2010, Page(s):52 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (801 KB) | HTML iconHTML

    A semantic-mediation architecture advances traditional approaches for standard-based business-to-business interoperability. The architecture formally models a business domain in a reference ontology and annotates domain message schemas to define public and proprietary reconciliation rule sets. Enterprises can use the rule sets to implement standard-based message interfaces and to translate message... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics for mitigating cybersecurity threats to networks

    Publication Year: 2010, Page(s):64 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB) | HTML iconHTML

    To achieve their full potential, networks must be secure as well as functional. With this in mind, the author identifies metrics designed to mitigate vulnerabilities to cyberattacks in networks that are key to the critical infrastructure of the US. He discusses both growth metrics - based on data obtained from the US National Institute of Standards and Technology and Department of Homeland Securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE CS Press [advertisement]

    Publication Year: 2010, Page(s): 72
    Request permission for commercial reuse | PDF file iconPDF (2047 KB)
    Freely Available from IEEE
  • VWRAP for virtual worlds interoperability [Standards]

    Publication Year: 2010, Page(s):73 - 77
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    The IETF has chartered a Virtual World Region Agent Protocol Working Group (VWRAP WG). This article briefly describes the history of virtual worlds, the architecture, protocols, and operation of Second Life (a currently prominent virtual world), and the emergence of standards efforts within the virtual world space. The authors detail the current efforts and timeline of the VWRAP WG. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composition as a service [Web-Scale Workflow]

    Publication Year: 2010, Page(s):78 - 82
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (738 KB) | HTML iconHTML

    Understanding reusable software and assets within and among multiple organizations' system infrastructures can be challenging. IT systems might be widely distributed, and interconnections can be complicated. Ever-evolving computing technologies reduce an organization's in-house expertise for reusing software, even when leveraging software systems within its own firewalls. As such, the on-demand in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing EIC Search

    Publication Year: 2010, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (244 KB)
    Freely Available from IEEE
  • Why didn't we spot that? [Practical Security]

    Publication Year: 2010, Page(s):84 - 87
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols themselves haven't been found to have security flaws. Marsh Ray and Steve Dispensa discovered a design flaw in the TLS protocol that affects all versions of the protocol up to and in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing for human experience: Semantics-empowered sensors, services, and social computing on the ubiquitous Web

    Publication Year: 2010, Page(s):88 - 91
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML Multimedia Media

    People are on the verge of an era in which the human experience can be enriched in ways they couldn't have imagined two decades ago. Rather than depending on a single technology, people progressed with several whose semantics-empowered convergence and integration will enable us to capture, understand, and reapply human knowledge and intellect. Such capabilities will consequently elevate our techno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenty of room outside the firm [Peering]

    Publication Year: 2010, Page(s):92 - 96
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    There are many ways to think about the future of computing, but to do so successfully requires looking at previous experience and predictions. The author's focus here is on computing rather than computers, though the increasing power of the latter facilitates the former. For example, the author have nothing to say about the future of multicore or parallel computing, except that beyond the Internet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial Calendar

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Computer Society Student Membership

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (10104 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami