By Topic

IEEE Internet Computing

Issue 1 • Date Jan.-Feb. 2012

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2208 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (390 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1930 KB)
    Freely Available from IEEE
  • Trusted Identities in Cyberspace

    Publication Year: 2012, Page(s):3 - 6
    Request permission for commercial reuse | PDF file iconPDF (2270 KB) | HTML iconHTML
    Freely Available from IEEE
  • Digging Deeper into Text Mining: Academics and Agencies Look Toward Unstructured Data

    Publication Year: 2012, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    In an effort to help government officials anticipate significant events such as political unrest, disease outbreaks, or natural disasters, the US government's Intelligence Advanced Research Projects Agency is launching a mass dataset mining effort, hoping to develop technologies that can mine disparate sources such as blogs, search engine results, Internet traffic, webcams, and many others. Resear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Internet-Scale Data Management

    Publication Year: 2012, Page(s):10 - 12
    Request permission for commercial reuse | PDF file iconPDF (981 KB) | HTML iconHTML
    Freely Available from IEEE
  • PNUTS in Flight: Web-Scale Data Serving at Yahoo

    Publication Year: 2012, Page(s):13 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1058 KB) | HTML iconHTML

    Data management for stateful Web applications is extremely challenging. Applications must scale as they grow in popularity, serve their content with low latency on a global scale, and be highly available, even in the face of hardware failures. This need has generated a new class of Internet-scale data management systems. Yahoo has more than 100 user-facing applications and numerous internal platfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying Heterogeneous Datasets on the Linked Data Web: Challenges, Approaches, and Trends

    Publication Year: 2012, Page(s):24 - 33
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1375 KB) | HTML iconHTML

    The growing number of datasets published on the Web as linked data brings both opportunities for high data availability and challenges inherent to querying data in a semantically heterogeneous and distributed environment. Approaches used for querying siloed databases fail at Web-scale because users don't have an a priori understanding of all the available datasets. This article investigates the ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiterm Keyword Search in NoSQL Systems

    Publication Year: 2012, Page(s):34 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1203 KB) | HTML iconHTML

    Distributed NoSQL systems aim to provide high availability for large volumes of data but lack the inherent support of complex queries often required by overlying applications. Common solutions based on inverted lists for single terms perform poorly in large-scale distributed settings. The authors thus propose a multiterm indexing technique that can store the inverted lists of combinations of terms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Execution of Continuous Aggregation Queries over Web Data

    Publication Year: 2012, Page(s):43 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2355 KB) | HTML iconHTML

    Data delivered over the Internet is increasingly being used to provide dynamic and personalized user experiences. Queries over fast-changing data from distributed data sources are executed to create content to be delivered to users. Because these queries require data from multiple sources, they're executed at intermediate proxies or data aggregators. The authors discuss various techniques for exec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Web Services to Consume and Produce Large Datasets

    Publication Year: 2012, Page(s):52 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1610 KB) | HTML iconHTML

    Service-oriented architectures and Web services are well-established paradigms for developing distributed applications. However, Web services face problems when accessing, moving, and processing large datasets. To address this problem, the authors present ProxyWS, which uses myriad protocols to transport large amounts of data. ProxyWS undertakes data transfers on behalf of legacy Web services and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is the Browser the Side for Templating?

    Publication Year: 2012, Page(s):61 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1590 KB) | HTML iconHTML

    Browser-side templating (BST) is a valid alternative for Web development, even when it comes to building accessible applications. BST processes templates in the browser using a JavaScript-coded engine, providing significant performance improvements and making model-view separation a reality. However, it also has significant drawbacks. BST's dependence on JavaScript affects its accessibility and hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Challenges for the Public Cloud

    Publication Year: 2012, Page(s):69 - 73
    Cited by:  Papers (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and motivate further investigation of security solutions for a trustworthy public cloud environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OAuth Web Authorization Protocol

    Publication Year: 2012, Page(s):74 - 77
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as blogs, photo sharing, and social networks have become widely popular. OAuth, a new protocol for establishing identity management standards across services, provides an alternative to sharing our usernames and passwords, and exposing ourselves to attacks on our online dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emergent Middleware: Tackling the Interoperability Problem

    Publication Year: 2012, Page(s):78 - 82
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1388 KB) | HTML iconHTML

    Are we facing a second software crisis, brought about by increasing complexity in distributed systems? When faced with extreme heterogeneity, we must rethink solutions to traditional systems problems. Here, the authors advocate a new style of emergent middleware to tackle the interoperability problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process Mining Put into Context

    Publication Year: 2012, Page(s):82 - 86
    Cited by:  Papers (10)
    Request permission for commercial reuse | PDF file iconPDF (540 KB) | HTML iconHTML
    Freely Available from IEEE
  • Changing the World

    Publication Year: 2012, Page(s):87 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Steve Jobs' world-changing innovations at Apple are usually considered to be his marriage of art and technology. Here, the author argues that the major changes in our world resulted from clever business models, especially those that created ecosystems in which other parties could participate. Moreover, we have Jobs to thank for a major world-changing technology: Wi-Fi. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wriaki, a Webmachine Application

    Publication Year: 2012, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1748 KB) | HTML iconHTML

    Webmachine is a Web toolkit unlike any other. Whereas typical Web frameworks focus on programming language first, sprinkling pieces of HTTP into the mix where convenient, Webmachine puts HTTP semantics front and center. In doing so, it handles much of the HTTP "heavy lifting" for applications, and helps them perform as good Web citizens that work well with other Web components such as caches, prox... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defense against the Dark Arts

    Publication Year: 2012, Page(s): 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Programmers must understand the mechanisms of malware attacks if they're to defend against them. Some believe programmers should also be taught and even practice both attacks and defense under controlled conditions. The notion of practicing attacks and writing malware is controversial. Further development of forensic tools and learning to use them will complement a curriculum designed to prepare p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2012-2013 Editorial Calendar

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (2928 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (3019 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami