By Topic

IEEE Internet Computing

Issue 5 • Sept.-Oct. 2010

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3205 KB)
    Freely Available from IEEE
  • IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (4353 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1530 KB)
    Freely Available from IEEE
  • Closing the Open (Face) Book

    Publication Year: 2010, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (1374 KB) | HTML iconHTML
    Freely Available from IEEE
  • Something's in the Air: Broadband Advances Depend on Wireless

    Publication Year: 2010, Page(s):7 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (703 KB) | HTML iconHTML
    Freely Available from IEEE
  • Trust and Reputation Management

    Publication Year: 2010, Page(s):10 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (1248 KB) | HTML iconHTML
    Freely Available from IEEE
  • Trusted Cloud Computing with Secure Resources and Data Coloring

    Publication Year: 2010, Page(s):14 - 22
    Cited by:  Papers (74)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1892 KB) | HTML iconHTML

    Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data colo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impact of Churn on Uncertainty Decay in P2P Reputation Systems

    Publication Year: 2010, Page(s):23 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Reputation systems rely on historical information to account for uncertainty about users' intention to cooperate, but accumulating experience over long time periods is challenging in many situations. In peer-to-peer (P2P) systems, this operation is particularly hard due to churn-the continuous process of node arrival and departure. Key issues here include how churn impacts newcomers' perceptions a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Feedback Management for Internet Auction Reputation Systems

    Publication Year: 2010, Page(s):31 - 37
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Electronic auction reputation systems have improved in recent years. However, most don't rely on user feedback but are still bound to old-fashioned comment counting while substantial information embedded in those comments is omitted. The authors' system manages and learns from user feedback and considers auctions' context, possible types of complaints, and the structure of connections between thos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust & Reputation Management 
  • A Formal-Semantics-Based Calculus of Trust

    Publication Year: 2010, Page(s):38 - 46
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1556 KB) | HTML iconHTML

    Building trust models based on a well-defined semantics of trust is important so that we can avoid misinterpretation, misuse, or inconsistent use of trust in Internet-based distributed computing. The authors present an approach to a formal-semantics-based calculus of trust, from conceptualization to logical formalization, from logic model to quantification of uncertainties, and from quantified tru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing call for papers for track articles

    Publication Year: 2010, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Revising WSDL Documents: Why and How

    Publication Year: 2010, Page(s):48 - 56
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB) | HTML iconHTML

    Although Web service technologies promote reuse, Web Services Description Language (WSDL) documents that are supposed to describe the API that services offer often fail to do so properly. Therefore, finding services, understanding what they do, and reusing them are challenging tasks. The authors describe the most common errors they've found in real WSDL documents, explain how these errors impact s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agropedia: Humanization of Agricultural Knowledge

    Publication Year: 2010, Page(s):57 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Due to a lack of precise and exact terms of reference, the Internet features very little content related to agriculture. Agropedia, one of the world's first agricultural knowledge repositories built from semantic, collaborative, and social networking metaphors, bridges this gap via agricultural knowledge models. Creating vibrant and diverse communities requires careful planning as well as an open,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of First-Person Shooter Gaming Traffic on the Internet

    Publication Year: 2010, Page(s):60 - 69
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (15716 KB) | HTML iconHTML Multimedia Media

    As online games become significant contributors to Internet traffic, practitioners must look to measure and understand game traffic in order to provision for it. Despite gaming's significant implications for the Internet, no general framework exists for validating various and sometimes contradicting game traffic models. Practitioners must therefore find and study dozens of reports and papers, some... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing: The New Frontier of Internet Computing

    Publication Year: 2010, Page(s):70 - 73
    Cited by:  Papers (85)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies and raises issues in the architecture, design, and implementation of existing networks and data centers. The relevant research has just recently gained momentum, and the space of potential ideas and solutions is still far from being widely explored. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incentive Mechanisms in P2P Media Streaming Systems

    Publication Year: 2010, Page(s):74 - 81
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1456 KB) | HTML iconHTML

    Free riding, whereby a peer utilizes network resources but doesn't contribute services, could have a huge impact on the efficacy of peer-to-peer media streaming systems, leading to scalability issues and service degradation. Here, the authors categorize, analyze, and compare a range of incentive mechanisms proposed for P2P streaming systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure/Multipurpose Internet Mail Extensions

    Publication Year: 2010, Page(s):82 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3685 KB) | HTML iconHTML

    S/MIME is the standard, widely available protocol for sending and receiving protected MIME data. It provides authentication, message integrity and nonrepudiation of origin (using digital signatures), and data confidentiality (using encryption). Here, the author looks at the collection of standards that make up S/MIME, including its history, protocol, and future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clojure Templating Libraries: Fleet and Enlive

    Publication Year: 2010, Page(s):87 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Last issue, Aaron Bedra wrote about Compojure, a Clojure-based Web framework. Here, I follow up on his article, delving into one particular aspect of Web development using Clojure and Compojure: templating. On a recent project, I had the pleasure of working with Bedra, using Compojure. I had done Clojure programming before, but that project was the first time I had used it for Web development. One... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Europe Leading the Way to the Future Internet?

    Publication Year: 2010, Page(s):91 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    In this article, we briefly review US and European approaches to addressing the future Internet's core infrastructure problems. We believe these differences are worth exploring, both to determine their respective strengths and weaknesses and, perhaps most importantly, to spur discussion and increase public awareness of the future Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and the Internet

    Publication Year: 2010, Page(s): 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (805 KB) | HTML iconHTML
    Freely Available from IEEE
  • Editorial Calendar

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (244 KB)
    Freely Available from IEEE
  • IEEE Computer Society Jobs Board [advertisement]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (643 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami