By Topic

IEEE Internet Computing

Issue 2 • Date Mar.-Apr. 2014

Filter Results

Displaying Results 1 - 19 of 19
  • Building Internet of Things Software (March-April 2015)

    Publication Year: 2014, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1027 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (601 KB)
    Freely Available from IEEE
  • Rediscovering Distributed Systems

    Publication Year: 2014, Page(s):3 - 6
    Request permission for commercial reuse | PDF file iconPDF (4405 KB) | HTML iconHTML
    Freely Available from IEEE
  • Identity, Privacy, and Deception in Social Networks

    Publication Year: 2014, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (872 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare

    Publication Year: 2014, Page(s):10 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Despite recent efforts to characterize online social network (OSN) structures and activities, user behavior across different OSNs has received little attention. Yet such information could provide insight into issues relating to personal privacy protection. For instance, many Foursquare users reveal their Facebook and Twitter accounts to the public. The authors' in-depth measurement study examines ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Preservation in Decentralized Online Social Networks

    Publication Year: 2014, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB) | HTML iconHTML

    The housing of personal data on large online social networks arouses concerns from privacy advocates and leery users. Researchers have proposed decentralized architectures to create online social networks with technically imposed privacy preservation. This survey of several approaches discusses their privacy benefits, architecture, and suitability for mobile devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting k-Balanced Trusted Cliques in Signed Social Networks

    Publication Year: 2014, Page(s):24 - 31
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2548 KB) | HTML iconHTML

    k-Clique detection enables computer scientists and sociologists to analyze social networks' latent structure and thus understand their structural and functional properties. However, the existing k-clique-detection approaches are not applicable to signed social networks directly because of positive and negative links. The authors' approach to detecting k-balanced trusted cliques in such networks ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach

    Publication Year: 2014, Page(s):32 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1358 KB) | HTML iconHTML

    Social network users can report other users' content as inappropriate by arguing that it encroaches on their privacy rights. Blindly accepting such reports as real evidence of something offensive poses substantial risks; malicious users might report harmless content just to compromise that material. The large number of users who flag content as offensive makes moderation difficult for human admini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing Facebook's Memcached Workload

    Publication Year: 2014, Page(s):41 - 49
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1509 KB) | HTML iconHTML

    Memcached is one of the world's largest key-value deployments. This article analyzes the Memcached workload at Facebook, looking at server-side performance, request composition, caching efficacy, and key locality. The observations presented here lead to several design insights and new research directions for key-value caches, such as the relative inadequacy of the least recently used (LRU) replace... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DELTA++: Reducing the Size of Android Application Updates

    Publication Year: 2014, Page(s):50 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    This method of creating and deploying update patches improves on Google Smart Application Update by first unpacking the Android Application Package and then compressing its elements individually. The smartphone user can then download a smaller patch. Experiments show that performance yields 49 percent more reduction relative to Google's solution, increasing the savings in cellular network bandwidt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Market-Driven Standards and the IEEE-SA

    Publication Year: 2014, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    The OpenStand paradigm for standardization is an open, collective movement that radically improves the way people around the globe develop, deploy, and embrace technologies for the benefit of humanity. This article explores how IEEE Standards Association (IEEE-SA) processes align with the OpenStand principles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Network-Based Business Process

    Publication Year: 2014, Page(s):63 - 69
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2115 KB) | HTML iconHTML

    Tremendous effort and resources go into achieving enterprise agility. Business processes are the primary entity concerned with these efforts and resources because they constitute the know-how of any enterprise. Processes can be structured or unstructured; the former are well formed, often repetitive, and call for intense coordination among stakeholders. The latter are loosely defined and call for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Let's "Downscale" Linked Data

    Publication Year: 2014, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Open data policies and linked data publication are powerful tools for increasing transparency, participatory governance, and accountability. The linked data community proudly emphasizes the economic and societal impact such technology shows. But a closer look proves that the design and deployment of these technologies leave out most of the world's population. The good news is that it will take sma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Road to Natural Conversational Speech Interfaces

    Publication Year: 2014, Page(s):74 - 78
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    To realize truly conversational speech interfaces for applications such as virtual personal assistants, a number of technical challenges must be addressed. This article presents a brief overview of the relevant research literature, which will allow user interface developers to temper their assessments of this technology for a particular application with a realistic appreciation of the challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Information Spring

    Publication Year: 2014, Page(s):79 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (626 KB) | HTML iconHTML
    Freely Available from IEEE
  • When ISPs Become Copyright Police

    Publication Year: 2014, Page(s):84 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (301 KB) | HTML iconHTML
    Freely Available from IEEE
  • Instrument Thyself!

    Publication Year: 2014, Page(s):88 - C3
    Request permission for commercial reuse | PDF file iconPDF (838 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conferences in the palm of your hand [advertisement]

    Publication Year: 2014, Page(s): 88
    Request permission for commercial reuse | PDF file iconPDF (648 KB)
    Freely Available from IEEE
  • Software Experts Summit: Software Engineering for the 21st Century

    Publication Year: 2014, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1519 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami