By Topic

IEEE Internet Computing

Issue 4 • July-Aug. 2010

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2644 KB)
    Freely Available from IEEE
  • Raise your standards [advertisement]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (5786 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (322 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1165 KB)
    Freely Available from IEEE
  • As I Emerge from the Mobile Phone Dark Ages, I Look Around in Fear and Wonder

    Publication Year: 2010, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (521 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Global Net Neutrality Debate: Back to Square One?

    Publication Year: 2010, Page(s):7 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (478 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE CS Press [advertisement]

    Publication Year: 2010, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (1296 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction: Data Quality in the Internet Era

    Publication Year: 2010, Page(s):11 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (882 KB) | HTML iconHTML
    Freely Available from IEEE
  • Information Quality in Mashups

    Publication Year: 2010, Page(s):14 - 22
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2897 KB) | HTML iconHTML

    Modern Web 2.0 applications are characterized by high user involvement: users receive support for creating content and annotations as well as "composing" applications using content and functions from third parties. This latter phenomenon is known as Web mashups and is gaining popularity even with users who have few programming skills, raising a set of peculiar information quality issues. Assessing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning-Based Approaches for Matching Web Data Entities

    Publication Year: 2010, Page(s):23 - 31
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (15822 KB) | HTML iconHTML

    Entity matching is a key task for data integration and especially challenging for Web data. Effective entity matching typically requires combining several match techniques and finding suitable configuration parameters, such as similarity thresholds. The authors investigate to what degree machine learning helps semi-automatically determine suitable match strategies with a limited amount of manual t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Uncertain Business Intelligence: The Case of Key Indicators

    Publication Year: 2010, Page(s):32 - 40
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1427 KB) | HTML iconHTML

    Enterprises widely use decision support systems and, in particular, business intelligence techniques for monitoring and analyzing operations to understand areas in which the business isn't performing well. These tools often aren't suitable in scenarios involving Web-enabled, intercompany cooperation and IT outsourcing, however. The authors analyze how these scenarios impact information quality in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blog Popularity Mining Using Social Interconnection Analysis

    Publication Year: 2010, Page(s):41 - 49
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (738 KB) | HTML iconHTML

    Analyzing interconnections among blog communities reveals blogger behaviors that could help in assessing blog quality. A new approach to ranking blogs uses a social blog network model based on blogs' interconnection structure and a popularity ranking method, called BRank. Experiments show that the proposed method can discriminate blogs with various degrees of popularity in the blogosphere. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burst Transmission for Energy-Efficient Ethernet

    Publication Year: 2010, Page(s):50 - 57
    Cited by:  Papers (23)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (797 KB) | HTML iconHTML

    The proposed Energy-Efficient Ethernet (EEE) standard reduces energy consumption by defining two operation modes for transmitters and receivers: active and low power. Burst transmission can provide additional energy savings when EEE is used. Collecting data frames into large-sized data bursts for back-to-back transmission maximizes the time an EEE device spends in low power, thus making its consum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese

    Publication Year: 2010, Page(s):58 - 65
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1098 KB) | HTML iconHTML

    The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point Firewall-1 rule sets. In general, that survey indicated that corporate firewalls often enforced poorly written rule sets. This article revisits the first survey. In addition to being larger, the current study includes configurations from two major vendors. It also introduces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Address Translation: Extending the Internet Address Space

    Publication Year: 2010, Page(s):66 - 70
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1263 KB) | HTML iconHTML

    Network Address Translation (NAT) and Network Address and Port Translation (NAPT) are widely used to separate networks and share IPv4 addresses. They're valuable tools for network administrators and help with the imminent exhaustion of IPv4 address space and the transition to IPv6. This article surveys recent standardization efforts in this area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Business Transaction Management in Smart Service Networks

    Publication Year: 2010, Page(s):71 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    This article proposes a novel business transaction model for smart(er) service networks, which will leverage pooling real-time information from software services and sensor networks to more effectively manage fine-grained tenets of service based applications, such as critical business data, local and aggregated QoS, and associated key performance indicators (KPIs). This will guarantee a continuous... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT R&D Policies: An International Perspective

    Publication Year: 2010, Page(s):76 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1133 KB) | HTML iconHTML Multimedia Media

    Information and communication technology (ICT) is a crucial driver of economic growth. This has made ICT R&D vital to sustaining ICT as an engine of global growth. Although the US still performs the most ICT R&D globally, competition has intensified as US ICT R&D investment as a percentage of GDP has fallen noticeably - and has been surpassed by competitors - in the past decade. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Modeling for Cloud Computing, Part 2

    Publication Year: 2010, Page(s):81 - 84
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (534 KB) | HTML iconHTML

    This article discusses the areas in which semantic models can support cloud computing. Semantic models are helpful in three aspects of cloud computing. The first is functional and nonfunctional definitions. The ability to define application functionality and quality-of-service details in a platform-agnostic manner can immensely benefit the cloud community. The second aspect is data modeling. Seman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting Started with Google App Engine and Clojure

    Publication Year: 2010, Page(s):85 - 88
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Over the past two years (2008-2010), Clojure (http:// clojure.org) has made quite a splash in two areas: functional programming and the Java Virtual Machine (JVM). Clojure is a Lisp implementation on the JVM, offering its users significant elegance, simplicity, and power. Although Clojure is a fairly young language, it's extremely well thought out and mature, with a vibrant community of talented a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial Calendar

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE
  • IEEE Computer Society Jobs Board [advertisement]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (642 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami