By Topic

IEEE Internet Computing

Issue 3 • May-June 2010

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1872 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (317 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (867 KB)
    Freely Available from IEEE
  • Sinking or Swimming in the Sea of Data

    Publication Year: 2010, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (388 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conflicting Policies Lead to Disharmonic Convergence

    Publication Year: 2010, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (476 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rich Internet Applications

    Publication Year: 2010, Page(s):9 - 12
    Cited by:  Papers (29)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    Modern Web solutions resemble desktop applications, enabling sophisticated user interactions, client-side processing, asynchronous communications, and multimedia. A pure HTTP/HTML architecture fails to support these required capabilities in several respects. The "network as platform computing" idea, strengthened by Web 2.0's emergence, has accentuated HTML/HTTP's limits. This is the reason why man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compiler Transformations to Enable Synchronous Execution in an RIA Runtime

    Publication Year: 2010, Page(s):13 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1233 KB) | HTML iconHTML

    Rich Internet applications (RIAs) provide an immersive experience that blends the Internet's expansive reach with the desktop computer's rich performance. Client applications typically connect to the server using asynchronous communication protocols, which lets users interact with the application without getting blocked due to server response latency. Although this programming model enables high u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural and Technological Variability in Rich Internet Applications

    Publication Year: 2010, Page(s):24 - 32
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1766 KB) | HTML iconHTML

    The advent of rich Internet applications (RIAs) has evolved into an authentic technological revolution, providing Web information systems with advanced requirements similar to desktop applications. At the same time, RIAs have multiplied the possible architectural and technological options, complicating development and increasing risks. The real challenge is selecting the right alternatives among t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Podcasting: An Internet-Based Social Technology for Blended Learning

    Publication Year: 2010, Page(s):33 - 41
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1509 KB) | HTML iconHTML

    Podcasting has the potential to enhance learning by giving students mobile access to course materials anytime, anywhere. In particular, integrating podcasting, electronic learning (e-learning), and traditional face-to-face teaching into a blended learning (b-learning) environment can help create a push-pull educational exchange that increases student learning satisfaction. The authors' empirical s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Popularity in the Blogosphere

    Publication Year: 2010, Page(s):42 - 49
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1006 KB) | HTML iconHTML

    The blogosphere's more outgoing and informal social nature provides an opportunity to exploit more socially oriented features, such as credibility and popularity, for searching, recommendation, and other tasks. In this article, the authors present evidence that blog popularity in particular has been underexploited by current search engines, including specialized ones, and that a low correlation ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive Monitoring of BPEL Processes

    Publication Year: 2010, Page(s):50 - 57
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1763 KB) | HTML iconHTML

    Service-oriented systems' distributed ownership has led to an increasing focus on runtime management solutions. Service-oriented systems can change greatly after deployment, hampering their quality and reliability. Their service bindings can change, and providers can modify the internals of their services. Monitoring is critical for these systems to keep track of behavior and discover whether anom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying the Data Web: The MashQL Approach

    Publication Year: 2010, Page(s):58 - 67
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2703 KB) | HTML iconHTML

    MashQL, a novel query formulation language for querying and mashing up structured data on the Web, doesn't require users to know the queried data's structure or the data itself to adhere to a schema. In this article, the authors address the fact that being a language, not merely an interface (and simultaneously schema-free), MashQL faces a particular set of challenges. In particular, the authors p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating Operational and Control Behaviors: A New Approach to Web Services Modeling

    Publication Year: 2010, Page(s):68 - 76
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1887 KB) | HTML iconHTML

    The ability to develop flexible business applications is one of the ultimate objectives behind the use of Web services. Before taking part in such applications, each Web service should be modeled so that service engineers can monitor its execution and identify and address design problems early on. The authors propose a novel approach for modeling Web services that distinguishes operational behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NEA: Public Health for the Network

    Publication Year: 2010, Page(s):77 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1185 KB) | HTML iconHTML

    Network Endpoint Assessment (NEA) is a set of protocols allowing an enterprise to automatically check a device's compliance with security policy when it attaches to the network. Compliance checks might specify, for example, that critical security patches and antivirus software are installed and up-to-date. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Modeling for Cloud Computing, Part 1

    Publication Year: 2010, Page(s):81 - 83
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Cloud computing has lately become the attention grabber in both academia and industry. The promise of seemingly unlimited, readily available utility-type computing has opened many doors previously considered difficult, if not impossible, to open. The cloud computing landscape, however, is still evolving, and we must overcome many challenges to foster widespread adoption of clouds. The main challen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications Directly Using Cryptography

    Publication Year: 2010, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Chat Application in Lift

    Publication Year: 2010, Page(s):88 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    The article discusses how to build a multiuser, realtime chat application in Lift and discuss Scala's language features that make Lift possible. The application provides a single chat server that takes chat messages and redistributes the messages out to all listeners. Lift's Comet implementation uses a single HTTP connection to poll for changes to an arbitrary number of components on the page. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Google Evil?

    Publication Year: 2010, Page(s):92 - 96
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    Google was the first really, really good search engine and keeps on bringing other useful tools for free. Here's the really good thing about Google: it depends on Internet open standards. Its business model depends on their openness, rather than capturing them. Google is built on top of those standards. It isn't in Google's interest to engender the kind of mistrust that Microsoft has among Silicon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial Calendar

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (238 KB)
    Freely Available from IEEE
  • IEEE Computer Society Jobs Board [advertisement]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1086 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami