By Topic

IEEE Internet Computing

Issue 6 • Date Nov.-Dec. 2012

Filter Results

Displaying Results 1 - 23 of 23
  • Front Cover

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2938 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (299 KB)
    Freely Available from IEEE
  • Jobs Board [Advertisement]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (628 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (884 KB)
    Freely Available from IEEE
  • From Stone Knives and Bearskins to Mobile and Cloud Computing

    Publication Year: 2012, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (1220 KB) | HTML iconHTML
    Freely Available from IEEE
  • Next-Generation Wi-Fi: As Fast as We'll Need?

    Publication Year: 2012, Page(s):7 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (829 KB) | HTML iconHTML
    Freely Available from IEEE
  • Corporate Affiliate Program [Advertisement]

    Publication Year: 2012, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (913 KB)
    Freely Available from IEEE
  • Future Internet Protocols

    Publication Year: 2012, Page(s):11 - 13
    Request permission for commercial reuse | PDF file iconPDF (733 KB) | HTML iconHTML
    Freely Available from IEEE
  • Designing a Deployable Internet: The Locator/Identifier Separation Protocol

    Publication Year: 2012, Page(s):14 - 21
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2115 KB) | HTML iconHTML

    The Internet was designed to interconnect a few hundreds networks, but now has more than a billion hosts. The scalability issues associated with this growth have driven both academia and industry to review the current architecture in the light of the Locator/Identifier Split paradigm. However, changing the routing and addressing architecture of the Internet in an incrementally deployable manner im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 Deployment and Spam Challenges

    Publication Year: 2012, Page(s):22 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2143 KB) | HTML iconHTML

    Spam has posed a serious problem for users of email since its infancy. Today, automated strategies are required to deal with the massive amount of spam traffic. IPv4 networks offer a variety of solutions to reduce spam, but IPv6 networks' large address space and use of temporary addresses - both of which are particularly vulnerable to spam attacks - makes dealing with spam and the use of automated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • All-Weather Transport Essentials

    Publication Year: 2012, Page(s):30 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3336 KB) | HTML iconHTML

    Since the original design of TCP and UDP, the world has changed, and with it, the Internet. Here, the authors argue that transport protocol architectures, most notably TCP's, must be updated to meet the needs of today's Internet. Their optimistic approach favors normal operation at the expense of overhead when dealing with corner cases and advocates leaving certain policies to the application inst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Cloud Deployment of a MapReduce Architecture

    Publication Year: 2012, Page(s):40 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1832 KB) | HTML iconHTML

    Cloud-based MapReduce services process large datasets in the cloud, significantly reducing users' infrastructure requirements. Almost all of these services are cloud-vendor-specific and thus internally designed within their own cloud infrastructures, resulting in two important limitations. First, cloud vendors don't let developers see and evaluate how the MapReduce architecture is managed internal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Zero-Carbon Network: Converging Cloud Computing and Network Virtualization

    Publication Year: 2012, Page(s):51 - 59
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2612 KB) | HTML iconHTML

    Reducing greenhouse gas (GHG) emissions is one of the most challenging research topics in ICT because of people's overwhelming use of electronic devices. Current solutions focus mainly on efficient power consumption at the micro level; few consider large-scale energy-management strategies. The low-carbon, nationwide GreenStar Network in Canada uses network and server virtualization techniques to m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud-Based Desktop Services for Thin Clients

    Publication Year: 2012, Page(s):60 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1644 KB) | HTML iconHTML

    Cloud computing and ubiquitous network availability have renewed people's interest in the thin client concept. By executing applications in virtual desktops on cloud servers, users can access any application from any location with any device. For this to be a successful alternative to traditional offline applications, however, researchers must overcome important challenges. The thin client protoco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linked Data in Drug Discovery

    Publication Year: 2012, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML Multimedia Media

    Drug discovery presents many challenges, but several linked data initiatives are under way to address the huge increase in the amount of data available from chemistry, biology, and drug discovery in the past two decades. This Web extra provides a list of relevant resources for linked data in drug discovery. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming Directives for Elastic Computing

    Publication Year: 2012, Page(s):72 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB) | HTML iconHTML Multimedia Media

    Enabling and controlling the elasticity of cloud computing applications is challenging. The developer must deal with daunting tasks using low-level code to implement strategies trading off costs versus quality of service. Programming directives can substantially reduce this overhead by delegating control of elasticity to middleware systems while allowing developers to focus on defining suitable st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Legislator's Dilemma

    Publication Year: 2012, Page(s):78 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Drafting and passing federal laws aimed at curbing online copyright violations or discouraging hacking into private databases has proven difficult enough, but a greater challenge looms: top cybersecurity officials worry that major infrastructure elements such as financial, electrical, and water systems could be taken down if cybersecurity legislation continues to be deferred. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How the Open Web Platform Is Transforming Industry

    Publication Year: 2012, Page(s):82 - 86
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB) | HTML iconHTML

    The World Wide Web has expanded from a collection of documents to a platform for rich, interactive, distributed applications that can run on any device, anywhere. In this article, the authors discuss HTML5 and other key technologies that make up this Open Web Platform, and how together they are transforming industry and society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Nitrogen Erlang Web Framework

    Publication Year: 2012, Page(s):87 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1118 KB) | HTML iconHTML

    Nitrogen is a popular open source Erlang Web framework that supplies developers with a rich set of features for building websites. It uses an event-driven model, letting Erlang developers use regular language features to write client-side elements as well as server-side code for handling webpage events. It also lets developers easily write interactive Web applications that use AJAX or long-polling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • No, You Cannot Predict Elections with Twitter

    Publication Year: 2012, Page(s):91 - 94
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (918 KB) | HTML iconHTML
    Freely Available from IEEE
  • Things and the Net

    Publication Year: 2012, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (4835 KB) | HTML iconHTML
    Freely Available from IEEE
  • 2013 Editorial Calendar

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (528 KB)
    Freely Available from IEEE
  • Digital Magazines [Advertisement]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1155 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami