Volume 16 Issue 1 • Jan.-Feb. 2012
Filter Results
-
[Front cover]
Publication Year: 2012, Page(s): c1|
PDF (2208 KB)
-
[Front cover]
Publication Year: 2012, Page(s): c2|
PDF (390 KB)
-
Contents
Publication Year: 2012, Page(s):1 - 2|
PDF (1930 KB)
-
Trusted Identities in Cyberspace
Publication Year: 2012, Page(s):3 - 6 -
Digging Deeper into Text Mining: Academics and Agencies Look Toward Unstructured Data
Publication Year: 2012, Page(s):7 - 9In an effort to help government officials anticipate significant events such as political unrest, disease outbreaks, or natural disasters, the US government's Intelligence Advanced Research Projects Agency is launching a mass dataset mining effort, hoping to develop technologies that can mine disparate sources such as blogs, search engine results, Internet traffic, webcams, and many others. Resear... View full abstract»
-
Guest Editors' Introduction: Internet-Scale Data Management
Publication Year: 2012, Page(s):10 - 12 -
PNUTS in Flight: Web-Scale Data Serving at Yahoo
Publication Year: 2012, Page(s):13 - 23
Cited by: Papers (5)Data management for stateful Web applications is extremely challenging. Applications must scale as they grow in popularity, serve their content with low latency on a global scale, and be highly available, even in the face of hardware failures. This need has generated a new class of Internet-scale data management systems. Yahoo has more than 100 user-facing applications and numerous internal platfo... View full abstract»
-
Querying Heterogeneous Datasets on the Linked Data Web: Challenges, Approaches, and Trends
Publication Year: 2012, Page(s):24 - 33
Cited by: Papers (27)The growing number of datasets published on the Web as linked data brings both opportunities for high data availability and challenges inherent to querying data in a semantically heterogeneous and distributed environment. Approaches used for querying siloed databases fail at Web-scale because users don't have an a priori understanding of all the available datasets. This article investigates the ma... View full abstract»
-
Multiterm Keyword Search in NoSQL Systems
Publication Year: 2012, Page(s):34 - 42
Cited by: Papers (5)Distributed NoSQL systems aim to provide high availability for large volumes of data but lack the inherent support of complex queries often required by overlying applications. Common solutions based on inverted lists for single terms perform poorly in large-scale distributed settings. The authors thus propose a multiterm indexing technique that can store the inverted lists of combinations of terms... View full abstract»
-
Scalable Execution of Continuous Aggregation Queries over Web Data
Publication Year: 2012, Page(s):43 - 51
Cited by: Papers (1)Data delivered over the Internet is increasingly being used to provide dynamic and personalized user experiences. Queries over fast-changing data from distributed data sources are executed to create content to be delivered to users. Because these queries require data from multiple sources, they're executed at intermediate proxies or data aggregators. The authors discuss various techniques for exec... View full abstract»
-
Enabling Web Services to Consume and Produce Large Datasets
Publication Year: 2012, Page(s):52 - 60
Cited by: Papers (6)Service-oriented architectures and Web services are well-established paradigms for developing distributed applications. However, Web services face problems when accessing, moving, and processing large datasets. To address this problem, the authors present ProxyWS, which uses myriad protocols to transport large amounts of data. ProxyWS undertakes data transfers on behalf of legacy Web services and ... View full abstract»
-
Is the Browser the Side for Templating?
Publication Year: 2012, Page(s):61 - 68
Cited by: Papers (1)Browser-side templating (BST) is a valid alternative for Web development, even when it comes to building accessible applications. BST processes templates in the browser using a JavaScript-coded engine, providing significant performance improvements and making model-view separation a reality. However, it also has significant drawbacks. BST's dependence on JavaScript affects its accessibility and hi... View full abstract»
-
Security Challenges for the Public Cloud
Publication Year: 2012, Page(s):69 - 73
Cited by: Papers (172)Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and motivate further investigation of security solutions for a trustworthy public cloud environment. View full abstract»
-
OAuth Web Authorization Protocol
Publication Year: 2012, Page(s):74 - 77
Cited by: Papers (27)Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as blogs, photo sharing, and social networks have become widely popular. OAuth, a new protocol for establishing identity management standards across services, provides an alternative to sharing our usernames and passwords, and exposing ourselves to attacks on our online dat... View full abstract»
-
Emergent Middleware: Tackling the Interoperability Problem
Publication Year: 2012, Page(s):78 - 82
Cited by: Papers (4)Are we facing a second software crisis, brought about by increasing complexity in distributed systems? When faced with extreme heterogeneity, we must rethink solutions to traditional systems problems. Here, the authors advocate a new style of emergent middleware to tackle the interoperability problem. View full abstract»
-
-
Changing the World
Publication Year: 2012, Page(s):87 - 89Steve Jobs' world-changing innovations at Apple are usually considered to be his marriage of art and technology. Here, the author argues that the major changes in our world resulted from clever business models, especially those that created ecosystems in which other parties could participate. Moreover, we have Jobs to thank for a major world-changing technology: Wi-Fi. View full abstract»
-
Wriaki, a Webmachine Application
Publication Year: 2012, Page(s):90 - 94Webmachine is a Web toolkit unlike any other. Whereas typical Web frameworks focus on programming language first, sprinkling pieces of HTTP into the mix where convenient, Webmachine puts HTTP semantics front and center. In doing so, it handles much of the HTTP "heavy lifting" for applications, and helps them perform as good Web citizens that work well with other Web components such as caches, prox... View full abstract»
-
Defense against the Dark Arts
Publication Year: 2012, Page(s): 96
Cited by: Papers (1)Programmers must understand the mechanisms of malware attacks if they're to defend against them. Some believe programmers should also be taught and even practice both attacks and defense under controlled conditions. The notion of practicing attacks and writing malware is controversial. Further development of forensic tools and learning to use them will complement a curriculum designed to prepare p... View full abstract»
-
2012-2013 Editorial Calendar
Publication Year: 2012, Page(s): c3|
PDF (2928 KB)
-
[Advertisement - Back cover]
Publication Year: 2012, Page(s): c4|
PDF (3019 KB)
Aims & Scope
This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.
Meet Our Editors
Editor-in-Chief
M. Brian Blake
University of Miami