By Topic

IEEE Internet Computing

Issue 3 • Date May-June 2014

Filter Results

Displaying Results 1 - 23 of 23
  • Membership Matters [advertisement]

    Publication Year: 2014, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (627 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (716 KB)
    Freely Available from IEEE
  • Computer Science: Too Young to Fall into the Gender Gap

    Publication Year: 2014, Page(s):4 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (325 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Cloud Computing [advertisement]

    Publication Year: 2014, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (430 KB)
    Freely Available from IEEE
  • Networked Games in the Midst of the Clouds [Guest editors' introduction]

    Publication Year: 2014, Page(s):8 - 11
    Request permission for commercial reuse | PDF file iconPDF (368 KB) | HTML iconHTML
    Freely Available from IEEE
  • Toward Gaming as a Service

    Publication Year: 2014, Page(s):12 - 18
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (906 KB) | HTML iconHTML

    Gaming as a service (GaaS) is a future trend in the game industry. The authors survey existing platforms that provide cloud gaming services and classify them into three architectural frameworks to analyze their pros and cons and identify research directions. They also examine the features of different game genres to determine the impact they have on systematic design for cloud gaming services. Fin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Magazines [advertisement]

    Publication Year: 2014, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (1992 KB)
    Freely Available from IEEE
  • Clouds + Games: A Multifaceted Approach

    Publication Year: 2014, Page(s):20 - 27
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1837 KB) | HTML iconHTML

    The computer game landscape is changing: people play games on multiple computing devices with heterogeneous form-factors, capability, and connectivity. Providing high playability on such devices concurrently is difficult. To enhance the gaming experience, designers could leverage abundant and elastic cloud resources, but current cloud platforms aren't optimized for highly interactive games. Existi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • iCO2: A Networked Game for Collecting Large-Scale Eco-Driving Behavior Data

    Publication Year: 2014, Page(s):28 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2374 KB) | HTML iconHTML

    iCO2 is a networked game that aims to collect human driving behavior data at scale and help researchers better understand how people apply eco-driving practices. iCO2 is an integrated multiplatform game that can be accessed via Web client on Facebook and iPad clients, and supports a shared traffic experience among its users. Here, the authors describe iCO2 and disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Implicit Social Networks in Multiplayer Online Games

    Publication Year: 2014, Page(s):36 - 44
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Understanding the social structures that people implicitly form when playing networked games helps developers create innovative gaming services to benefit both players and operators. But how can we extract and analyze this implicit social structure? The authors' proposed formalism suggests various ways to map interactions to social structure. Applying this formalism to real-world data collected fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Think You Know Software? Prove It! [advertisement]

    Publication Year: 2014, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (1288 KB)
    Freely Available from IEEE
  • Engineering Service Engagements via Commitments

    Publication Year: 2014, Page(s):46 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (966 KB) | HTML iconHTML Multimedia Media

    A service engagement describes how two or more independent parties interact with each other. Traditional approaches specify these interactions as message sequence charts (MSCs), hiding underlying business relationships and, consequently, complicating modification. Comma is a commitment-based approach that produces a business model drawn from an extensible pattern library and yields flexible MSCs. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-Peer Content Sharing Based on Social Identities and Relationships

    Publication Year: 2014, Page(s):55 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB) | HTML iconHTML

    Mass-market users exploit remote storage solutions and centralized online social network (OSN) services to share user-generated content. Although these solutions are widely adopted, they introduce several issues related to user content/metadata migration on server-side components managed by third-party providers. The authors propose a middleware solution to support social-driven peer-to-peer conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virt-B: Towards Performance Benchmarking of Virtual Machine Systems

    Publication Year: 2014, Page(s):64 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1114 KB) | HTML iconHTML

    Modern cloud computing environments often use virtualization technology to implement resource sharing. However, virtualization incurs performance overheads due to the additional hypervisor layer placed between virtual machines (VMs) and hardware resources. Understanding VM performance is crucial for running applications efficiently and for further improving VM techniques. Unfortunately, existing b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I'm Cloud 2.0, and I'm Not Just a Data Center

    Publication Year: 2014, Page(s):73 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1011 KB) | HTML iconHTML

    Cloud service providers invest significant effort into designing, building, and empowering cloud infrastructures to deliver a growing number of services in a scalable and cost-efficient fashion. At the same time, technology advances are commoditizing small devices with powerful compute, storage, and communication capabilities at unprecedented scale. What if such devices could extend the boundaries... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud-Based Software Crowdsourcing

    Publication Year: 2014, Page(s):78 - 83
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1286 KB) | HTML iconHTML

    In addition to providing large-scale, highly available computational resources, clouds also enable a new methodology for software development via crowdsourcing, in which crowd participants either collaborate or compete to contribute software. Using a crowd to develop software is predicted to take its place alongside established methodologies, such as agile, scrum, pair programming, service-oriente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuring IPv4 over IPv6 Networks: Transitioning with DHCP

    Publication Year: 2014, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1509 KB) | HTML iconHTML

    To transition to IPv6, ISPs must determine how to configure IPv4 over IPv6 networks using the Dynamic Host Configuration Protocol (DHCP). However, multifarious requirements result in various solutions. The authors sort out the requirements for configuring an IPv4 node in IPv6 networks, survey IETF standardization efforts, and give recommendations on this topic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Take the CS Library wherever you go! [advertisement]

    Publication Year: 2014, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (3174 KB)
    Freely Available from IEEE
  • Co-Evolution with Social Networks: Deception is Protection

    Publication Year: 2014, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4639 KB) | HTML iconHTML

    To counterbalance the insatiable demand for information that drives social networks, individuals need technology that can help ensure security and privacy. However, we must also recognize the overwhelming need that humans have for human contact. For social networks and humans to be symbiotic, we must develop protection mechanisms that are technological realizations of compartmented information, le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet of Everyone

    Publication Year: 2014, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (332 KB) | HTML iconHTML
    Freely Available from IEEE
  • Focus on Your Job Search [advertisement]

    Publication Year: 2014, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (549 KB)
    Freely Available from IEEE
  • Software Engineering for the 21st Century [advertisement]

    Publication Year: 2014, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1516 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami