By Topic

Internet Computing, IEEE

Issue 2 • Date March-April 2012

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2012 , Page(s): c1
    Request Permissions | PDF file iconPDF (1525 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012 , Page(s): c2
    Request Permissions | PDF file iconPDF (555 KB)  
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2012 , Page(s): 1
    Request Permissions | PDF file iconPDF (383 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2012 , Page(s): 2 - 3
    Request Permissions | PDF file iconPDF (1444 KB)  
    Freely Available from IEEE
  • Privacy Problems in the Online World

    Publication Year: 2012 , Page(s): 4 - 6
    Cited by:  Papers (1)
    Request Permissions | PDF file iconPDF (608 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The End of IPv4 is Nearly Here — Really

    Publication Year: 2012 , Page(s): 7 - 11
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2662 KB) |  | HTML iconHTML  

    Winston Churchill has been quoted often when some momentous world event occurs, but not often in the context of the Internet. But his 1942 observation that the tide of war shifting in Great Britain's favor marked "perhaps, the end of the beginning" could aptly describe the state of Internet addressing. By any empirical measure, 2011 signified the "end of the beginning" in the shift from IPv4 addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Computing: Beyond Search and Location-Based Services

    Publication Year: 2012 , Page(s): 12 - 16
    Cited by:  Papers (2)
    Request Permissions | PDF file iconPDF (578 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Augmenting Mobile Search Engines to Leverage Context Awareness

    Publication Year: 2012 , Page(s): 17 - 25
    Cited by:  Papers (3)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2264 KB) |  | HTML iconHTML  

    Mobile phones are becoming the chosen platforms for web access, with a forecast that over the coming decade more users will connect to the internet through mobile than conventional desktop computers. Internet search is likely going to remain one of the major ways to find information and services on the web. In order to provide satisfactory usability, mobile searches will have to take into consider... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Perception: Converting Sensory Observations to Abstractions

    Publication Year: 2012 , Page(s): 26 - 34
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2788 KB) |  | HTML iconHTML  

    An abstraction is a representation of an environment derived from sensor observation data. Generating an abstraction requires inferring explanations from an incomplete set of observations (often from the Web) and updating these explanations on the basis of new information. This process must be fast and efficient. The authors' approach overcomes these challenges to systematically derive abstraction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging Communications and the Physical World

    Publication Year: 2012 , Page(s): 35 - 43
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2154 KB) |  | HTML iconHTML  

    Sense Everything, Control Everything (SECE) is an event-driven system that lets nontechnical users create services that combine communication, location, social networks, presence, calendaring, and physical devices such as sensors and actuators. SECE combines information from multiple sources to personalize services and adapt them to changes in the user's context and preferences. Events trigger ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAPTCHA Design: Color, Usability, and Security

    Publication Year: 2012 , Page(s): 44 - 51
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1909 KB) |  | HTML iconHTML  

    Most user interfaces use color, which can greatly enhance their design. Because the use of color is typically a usability issue, it rarely causes security failures. However, using color when designing CAPTCHAs, a standard security technology that many commercial websites apply widely, can have an impact on usability and interesting but critical implications for security. Here, the authors examine ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Antiphishing through Phishing Target Discovery

    Publication Year: 2012 , Page(s): 52 - 61
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3047 KB) |  | HTML iconHTML  

    Phishing attacks are growing in both volume and sophistication. The antiphishing method described here collects webpages with either a direct or indirect association with a given suspicious webpage. This enables the discovery of a webpage's so-called "parasitic" community and then ultimately its phishing target - that is, the page with the strongest parasitic relationship to the suspicious webpage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CoAP: An Application Protocol for Billions of Tiny Internet Nodes

    Publication Year: 2012 , Page(s): 62 - 67
    Cited by:  Papers (19)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1910 KB) |  | HTML iconHTML  

    The Constrained Application Protocol (CoAP) is a transfer protocol for constrained nodes and networks, such as those that will form the Internet of Things. Much like its older and heavier cousin HTTP, CoAP uses the REST architectural style. Based on UDP and unencumbered by historical baggage, however, CoAP aims to achieve its modest goals with considerably less complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Linked Data Strategy for Global Identity

    Publication Year: 2012 , Page(s): 68 - 71
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (816 KB) |  | HTML iconHTML  

    The Web's promise for planet-scale data integration depends on solving the thorny problem of identity: given one or more possible identifiers, how can we determine whether they refer to the same or different things? Here, the authors discuss various ways to deal with the identity problem in the context of linked data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible Social Workflows: Collaborations as Human Architecture

    Publication Year: 2012 , Page(s): 72 - 77
    Cited by:  Papers (2)
    Request Permissions | PDF file iconPDF (2017 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Clouds Meet Agents: Toward Intelligent Cloud Services

    Publication Year: 2012 , Page(s): 78 - 81
    Cited by:  Papers (9)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (591 KB) |  | HTML iconHTML  

    Cloud computing systems provide large-scale infrastructures for high-performance computing that can adapt to user and application needs. Multi-agent systems (MASs) comprise interacting agents capable of intelligent behavior. Integrating these two technologies could enable high-performance, complex systems and intelligent applications, making clouds more flexible and autonomic and providing MASs wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Import-Export Paradigm for High-Quality College Courses: An Answer to Tuition's Through-the-Roof Cost Spiral?

    Publication Year: 2012 , Page(s): 82 - 86
    Request Permissions | Click to expandAbstract | PDF file iconPDF (630 KB) |  | HTML iconHTML  

    Three new free Stanford online courses drew 300,000 applicants in the fall semester of 2011. Might very high-quality courses with the best streaming lectures, student aids, exams, quizzes, mentoring, and so on facilitate an import export approach to e-learning? Here, the author examines a significant and increasingly troubling problem - the university structure's inability to achieve unit cost red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emergent Properties, Human Rights, and the Internet

    Publication Year: 2012 , Page(s): 87 - 88
    Request Permissions | Click to expandAbstract | PDF file iconPDF (439 KB) |  | HTML iconHTML  

    The Internet is an artifact, but its uses represent emergent properties of large numbers of users discovering ways in which to interact and share information that couldn't necessarily have been predicted from the basic Internet design. The net has become a vital part of our society, but whether access to it should be a "human right" is controversial. There can be no question, however, that it has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2012-2013 Editorial Calendar

    Publication Year: 2012 , Page(s): c3
    Request Permissions | PDF file iconPDF (2930 KB)  
    Freely Available from IEEE
  • Advertisement - Computer

    Publication Year: 2012 , Page(s): c4
    Request Permissions | PDF file iconPDF (2780 KB)  
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami