By Topic

Internet Computing, IEEE

Issue 4 • Date July-Aug. 2010

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (2644 KB)  
    Freely Available from IEEE
  • Raise your standards [advertisement]

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (5786 KB)  
    Freely Available from IEEE
  • Call for Papers

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (322 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1165 KB)  
    Freely Available from IEEE
  • As I Emerge from the Mobile Phone Dark Ages, I Look Around in Fear and Wonder

    Page(s): 4 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (521 KB)  
    Freely Available from IEEE
  • The Global Net Neutrality Debate: Back to Square One?

    Page(s): 7 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (478 KB)  
    Freely Available from IEEE
  • IEEE CS Press [advertisement]

    Page(s): 10
    Save to Project icon | Request Permissions | PDF file iconPDF (1296 KB)  
    Freely Available from IEEE
  • Guest Editors' Introduction: Data Quality in the Internet Era

    Page(s): 11 - 13
    Save to Project icon | Request Permissions | PDF file iconPDF (882 KB)  
    Freely Available from IEEE
  • Information Quality in Mashups

    Page(s): 14 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2897 KB)  

    Modern Web 2.0 applications are characterized by high user involvement: users receive support for creating content and annotations as well as "composing" applications using content and functions from third parties. This latter phenomenon is known as Web mashups and is gaining popularity even with users who have few programming skills, raising a set of peculiar information quality issues. Assessing a mashup's quality, especially the information it provides, requires understanding how the mashup has been developed, how its components look alike, and how quality propagates from basic components to the final mashup application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning-Based Approaches for Matching Web Data Entities

    Page(s): 23 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (15822 KB)  

    Entity matching is a key task for data integration and especially challenging for Web data. Effective entity matching typically requires combining several match techniques and finding suitable configuration parameters, such as similarity thresholds. The authors investigate to what degree machine learning helps semi-automatically determine suitable match strategies with a limited amount of manual training effort. They use a new framework, Fever, to evaluate several learning-based approaches for matching different sets of Web data entities. In particular, they study different approaches for training-data selection and how much training is needed to find effective combined match strategies and configurations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Uncertain Business Intelligence: The Case of Key Indicators

    Page(s): 32 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1427 KB)  

    Enterprises widely use decision support systems and, in particular, business intelligence techniques for monitoring and analyzing operations to understand areas in which the business isn't performing well. These tools often aren't suitable in scenarios involving Web-enabled, intercompany cooperation and IT outsourcing, however. The authors analyze how these scenarios impact information quality in business intelligence applications and lead to nontrivial research challenges. They describe the idea of uncertain events and key indicators and present a model to express and store uncertainty and a tool to compute and visualize uncertain key indicators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blog Popularity Mining Using Social Interconnection Analysis

    Page(s): 41 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (738 KB)  

    Analyzing interconnections among blog communities reveals blogger behaviors that could help in assessing blog quality. A new approach to ranking blogs uses a social blog network model based on blogs' interconnection structure and a popularity ranking method, called BRank. Experiments show that the proposed method can discriminate blogs with various degrees of popularity in the blogosphere. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burst Transmission for Energy-Efficient Ethernet

    Page(s): 50 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (797 KB)  

    The proposed Energy-Efficient Ethernet (EEE) standard reduces energy consumption by defining two operation modes for transmitters and receivers: active and low power. Burst transmission can provide additional energy savings when EEE is used. Collecting data frames into large-sized data bursts for back-to-back transmission maximizes the time an EEE device spends in low power, thus making its consumption nearly proportional to its traffic load. An initial evaluation shows that the additional savings in the scenarios considered range from 5 to 70 percent for conventional users and approximately 50 percent for large data centers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese

    Page(s): 58 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1098 KB)  

    The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point Firewall-1 rule sets. In general, that survey indicated that corporate firewalls often enforced poorly written rule sets. This article revisits the first survey. In addition to being larger, the current study includes configurations from two major vendors. It also introduces a firewall complexity. The study's findings validate the 2004 study's main observations: firewalls are (still) poorly configured, and a rule -set's complexity is (still) positively correlated with the number of detected configuration errors. However, unlike the 2004 study, the current study doesn't suggest that later software versions have fewer errors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Address Translation: Extending the Internet Address Space

    Page(s): 66 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1263 KB)  

    Network Address Translation (NAT) and Network Address and Port Translation (NAPT) are widely used to separate networks and share IPv4 addresses. They're valuable tools for network administrators and help with the imminent exhaustion of IPv4 address space and the transition to IPv6. This article surveys recent standardization efforts in this area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Business Transaction Management in Smart Service Networks

    Page(s): 71 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (514 KB)  

    This article proposes a novel business transaction model for smart(er) service networks, which will leverage pooling real-time information from software services and sensor networks to more effectively manage fine-grained tenets of service based applications, such as critical business data, local and aggregated QoS, and associated key performance indicators (KPIs). This will guarantee a continuous and cohesive information flow, correlation of end-to-end process properties, and termination and accuracy of interacting business processes driven by service application integration logic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT R&D Policies: An International Perspective

    Page(s): 76 - 80
    Multimedia
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1133 KB)  

    Information and communication technology (ICT) is a crucial driver of economic growth. This has made ICT R&D vital to sustaining ICT as an engine of global growth. Although the US still performs the most ICT R&D globally, competition has intensified as US ICT R&D investment as a percentage of GDP has fallen noticeably - and has been surpassed by competitors - in the past decade. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Modeling for Cloud Computing, Part 2

    Page(s): 81 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (534 KB)  

    This article discusses the areas in which semantic models can support cloud computing. Semantic models are helpful in three aspects of cloud computing. The first is functional and nonfunctional definitions. The ability to define application functionality and quality-of-service details in a platform-agnostic manner can immensely benefit the cloud community. The second aspect is data modeling. Semantic modeling of data to provide a platform-independent data representation would be a major advantage in the cloud space. The third aspect is service description enhancement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting Started with Google App Engine and Clojure

    Page(s): 85 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB)  

    Over the past two years (2008-2010), Clojure (http:// clojure.org) has made quite a splash in two areas: functional programming and the Java Virtual Machine (JVM). Clojure is a Lisp implementation on the JVM, offering its users significant elegance, simplicity, and power. Although Clojure is a fairly young language, it's extremely well thought out and mature, with a vibrant community of talented and friendly people using and contributing to it. If you're targeting the JVM as your platform, you're doing yourself a disservice by not considering Clojure as an option. That being said, beauty is in the eye of the beholder, and you must decide for yourself. So, let's take a look at Compojure, a Web framework built on the Clojure language, and see how to create and deploy a Compojure application on the Google App Engine platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editorial Calendar

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (241 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Jobs Board [advertisement]

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (642 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Michael Rabinovich
Department of Electrical Engineering and Computer Science
Case Western Reserve University