default search action
IEEE Internet Computing, Volume 17
Volume 17, Number 1, January - February 2013
- Oliver Spatscheck:
Layers of Success. 3-6 - Greg Goth:
Where It's At: Mapping Battle Highlights New Era of Revenue and Development Models. 7-9 - Alberto Conte, Michela Meo:
Sustainable Internet. 10-13 - Matteo Fiorani, Maurizio Casoni, Slavisa Aleksic:
Hybrid Optical Switching for an Energy-Efficient Internet Core. 14-22 - S. H. Shah Newaz, Ángel Cuevas, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi:
Improving Energy Saving in Time-Division Multiplexing Passive Optical Networks. 23-31 - Giuseppe Piro, Marco Miozzo, Giuseppe Forte, Nicola Baldo, Luigi Alfredo Grieco, Gennaro Boggia, Paolo Dini:
HetNets Powered by Renewable Energy Sources: Sustainable Next-Generation Cellular Networks. 32-39 - Kim Khoa Nguyen, Mohamed Cheriet, Mathieu Lemay, Michel Savoie, Bobby Ho:
Powering a Data Center Network via Renewable Energy: A Green Testbed. 40-49 - Maciej Malawski, Maciej Kuzniar, Piotr Wójcik, Marian Bubak:
How to Use Google App Engine for Free Computing. 50-59 - Aditya K. Sood, Rohit Bansal, Richard J. Enbody:
Cybercrime: Dissecting the State of Underground Enterprise. 60-68 - Benjamin Satzger, Waldemar Hummer, Christian Inzinger, Philipp Leitner, Schahram Dustdar:
Winds of Change: From Vendor Lock-In to the Meta Cloud. 69-73 - Maria Giatsoglou, Athena Vakali:
Capturing Social Data Evolution Using Graph Clustering. 74-79 - Tim Kraska:
Finding the Needle in the Big Data Systems Haystack. 84-86 - Hilarie Orman:
The Compleat Story of Phish. 87-91 - Kieron O'Hara:
Welcome to (and from) the Digital Citizen. 92-95 - Vinton G. Cerf:
Abstraction, Federation, and Scalability. 96-
Volume 17, Number 2, March - April 2013
- Vinton G. Cerf:
The Internet at Risk. 3-5 - Fred Douglis, Orran Krieger:
Virtualization. 6-9 - Jan Kasper Martinsen, Håkan Grahn, Anders Isberg:
Using Speculation to Enhance JavaScript Performance in Web Applications. 10-19 - Dmitry Drutskoy, Eric Keller, Jennifer Rexford:
Scalable Network Virtualization in Software-Defined Networks. 20-27 - Dan Williams, Hani Jamjoom, Hakim Weatherspoon:
Plug into the Supercloud. 28-34 - Wei-Shinn Ku, Haiquan Chen, Chih-Jye Wang, Chuan-Ming Liu:
Geo-Store: A Framework for Supporting Semantics-Enabled Location-Based Services. 35-43 - Juan Manuel Rodriguez, Marco Crasso, Cristian Mateos, Alejandro Zunino, Marcelo Campo:
Bottom-Up and Top-Down Cobol System Migration to Web Services. 44-51 - Kemafor Anyanwu, HyeongSik Kim, Padmashree Ravindra:
Algebraic Optimization for Processing Graph Pattern Queries in the Cloud. 52-61 - Yong Cui, Jiang Dong, Peng Wu, Jianping Wu, Chris Metz, Yiu L. Lee, Alain Durand:
Tunnel-Based IPv6 Transition. 62-68 - Paul Groth:
Transparency and Reliability in the Data Supply Chain. 69-71 - Chandra Krintz:
The AppScale Cloud Platform: Enabling Portable, Scalable Web Application Deployment. 72-75 - Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid R. Motahari Nezhad, Elisa Bertino, Schahram Dustdar:
Quality Control in Crowdsourcing Systems: Issues and Directions. 76-81 - Raffaele Bolla, Roberto Bruschi, Franco Davoli, Lorenzo Di Gregorio, Pasquale Donadio, Leonardo Fialho, Martin Collier, Alfio Lombardo, Diego Reforgiato Recupero, Tivadar Szemethy:
The Green Abstraction Layer: A Standard Power-Management Interface for Next-Generation Network Devices. 82-86 - Kieron O'Hara:
Social Machine Politics Are Here to Stay. 87-90 - Christophe Vetterli, Walter Brenner, Falk Uebernickel, Charles J. Petrie:
From Palaces to Yurts: Why Requirements Engineering Needs Design Thinking. 91-94 - Vinton G. Cerf:
Loose Couplings. 96
Volume 17, Number 3, May - June 2013
- Peter Mika:
Big Data Conferences, Here We Come! 3-5 - Steven J. Murdoch, Hal Roberts:
Internet Censorship and Control [Guest editors' introduction]. 6-9 - M. Christopher Riley:
Anarchy, State, or Utopia?: Checks and Balances in Internet Governance. 10-17 - Steven B. Roosa, Stephen Schultze:
Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model. 18-25 - Derek E. Bambauer:
Censorship v3.1. 26-33 - Masashi Crete-Nishihata, Ronald J. Deibert, Adam Senft:
Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls. 34-41 - King-wa Fu, Chung-hong Chan, Michael Chau:
Assessing Censorship on Microblogs in China: Discriminatory Keyword Analysis and the Real-Name Registration Policy. 42-50 - Byron J. Gao, David Buttler, David C. Anastasiu, Shuaiqiang Wang, Peng Zhang, Joey Jan:
User-Centric Organization of Search Results. 52-59 - Yuval Shavitt, Noa Zilberman:
On the Presence of Child Sex Abuse in BitTorrent Networks. 60-66 - Vangelis Koukis, Constantinos Venetsanopoulos, Nectarios Koziris:
~okeanos: Building a Cloud, Cluster by Cluster. 67-71 - Tim Kraska, Beth Trushkowsky:
The New Database Architectures. 72-75 - Qin Lv:
Detecting Misbehavior in Online Video Chat Services. 76-79 - Benoit Claise, John Parello:
EMAN: Energy-Management Activities at the IETF. 80-82 - Hilarie Orman:
Did You Want Privacy With That?: Personal Data Protection in Mobile Devices. 83-86 - Vinton G. Cerf:
Running AMOOC. 88
Volume 17, Number 4, July - August 2013
- Gustavo Rossi:
Web Modeling Languages Strike Back. 4-6 - Dror G. Feitelson, Eitan Frachtenberg, Kent L. Beck:
Development and Deployment at Facebook. 8-17 - Rafael Moreno-Vozmediano, Rubén S. Montero, Ignacio Martín Llorente:
Key Challenges in Cloud Computing: Enabling the Future Internet of Services. 18-25 - Salvador Ros, Roberto Hernández, Antonio Robles-Gómez, Agustín C. Caminero, Llanos Tobarra, Elio Sancristobal Ruiz:
Open Service-Oriented Platforms for Personal Learning Environments. 26-31 - Paul D. Clough, Mark Sanderson, Jiayu Tang, Tim Gollins, Amy Warner:
Examining the Limits of Crowdsourcing for Relevance Assessment. 32-38 - Alessio Gambi, Giovanni Toffetti, Cesare Pautasso, Mauro Pezzè:
Kriging Controllers for Cloud Applications. 40-47 - Soohong Daniel Park, Jaehoon Jeong, Choong Seon Hong:
DNS Configuration in IPv6: Approaches, Analysis, and Deployment Scenarios. 48-56 - Alejandra Garrido, Sergio Firmenich, Gustavo Rossi, Julián Grigera, Nuria Medina-Medina, Ivana Harari:
Personalized Web Accessibility using Client-Side Refactoring. 58-66 - Huan Liu:
Big Data Drives Cloud Adoption in Enterprise. 68-71 - Nigel Shadbolt, Kieron O'Hara:
Linked Data in Government. 72-77 - Fei Li, Michael Vögler, Sanjin Sehic, Soheil Qanbari, Stefan Nastic, Hong Linh Truong, Schahram Dustdar:
Web-Scale Service Delivery for Smart Cities. 78-83 - Susan Hares, Russ White:
Software-Defined Networks and the Interface to the Routing System (I2RS). 84-88 - Kieron O'Hara:
Are We Getting Privacy the Wrong Way Round? 89-92 - Charles J. Petrie:
Digital Shards. 93-94 - Vinton G. Cerf:
Cargo Cults and Information Technology Development. 96
Volume 17, Number 5, September - October 2013
- Fabian E. Bustamante:
Broadly Available Broadband. 3-5 - Geetika T. Lakshmanan, Rania Khalaf, Schahram Dustdar:
Dynamic Collective Work [Guest editors' introduction]. 6-9 - Claudio Di Ciccio, Massimo Mecella:
Mining Artful Processes from Knowledge Workers' Emails. 10-20 - Arno Scharl, Alexander Hubmann-Haidvogel, Marta Sabou, Albert Weichselbraun, Heinz-Peter Lang:
From Web Intelligence to Knowledge Co-Creation: A Platform for Analyzing and Supporting Stakeholder Communication. 21-29 - Hamid R. Motahari Nezhad, Susan Spence, Claudio Bartolini, Sven Graupner, Charles Bess, Marianne Hickey, Parag Mulendra Joshi, Roberto Mirizzi, Kivanc M. Ozonat, Maher Rahmouni:
Casebook: A Cloud-Based System of Engagement for Case Management. 30-38 - Margot Deruyck, Wout Joseph, Bart Lannoo, Didier Colle, Luc Martens:
Designing Energy-Efficient Wireless Access Networks: LTE and LTE-Advanced. 39-45 - Cristian Mateos, Marco Crasso, Alejandro Zunino, José Luis Ordiales Coscia:
Revising WSDL Documents: Why and How, Part 2. 46-53 - Reginald Cushing, Ganeshwara Herawan Hananda Putra, Spiros Koulouzis, Adam Belloum, Marian Bubak, Cees de Laat:
Distributed Computing on an Ensemble of Browsers. 54-61 - Wei Tan, M. Brian Blake, Iman Saleh, Schahram Dustdar:
Social-Network-Sourced Big Data Analytics. 62-69 - Abhishek Chandra, Jon B. Weissman, Benjamin Heintz:
Decentralized Edge Clouds. 70-73 - Kostas Pentikousis, Philippe Bertin:
Mobility Management in Infrastructure Networks. 74-79 - Mikkel Baun Kjærgaard:
Studying Sensing-Based Systems: Scaling to Human Crowds in the Real World. 80-84 - Daniela Florescu, Ghislain Fourny:
JSONiq: The History of a Query Language. 86-90 - Hilarie Orman:
Twelve Random Characters: Passwords in the Era of Massive Parallelism. 91-94 - Vinton G. Cerf:
Augmented Intelligence. 96
Volume 17, Number 6, November - December 2013
- David E. Boyle, David C. Yates, Eric M. Yeatman:
Urban Sensor Data Streams: London 2013. 1 - Michael N. Huhns:
A Robotic Web. 4-7 - Irene Celino, Spyros Kotoulas:
Smart Cities. 8-11 - Vassilis Kostakos, Timo Ojala, Tomi Juntunen:
Traffic in the Smart City: Exploring City-Wide Sensing for Traffic Control Center Augmentation. 22-29 - Helmut Prendinger, Kugamoorthy Gajananan, Ahmed Bayoumy Zaki, Ahmed Fares, Reinaert Molenaar, Daniel Urbano, Hans van Lint, Walid Gomaa:
Tokyo Virtual Living Lab: Designing Smart Cities Based on the 3D Internet. 30-38 - Djellel Eddine Difallah, Philippe Cudré-Mauroux, Sean A. McKenna:
Scalable Anomaly Detection for Smart City Infrastructure Networks. 39-47 - Eun-Kyu Lee, Chi-Cheng Peter Chu, Rajit Gadh:
Fine-Grained Access to Smart Building Energy Resources. 48-56 - Karim Benouaret, Raman Valliyur-Ramalingam, François Charoy:
CrowdSC: Building Smart Cities with Large-Scale Citizen Participation. 57-63 - Mona Singh, Munindar P. Singh:
Augmented Reality Interfaces. 66-70 - Paolo Ciccarese, Stian Soiland-Reyes, Tim Clark:
Web Annotation as a First-Class Object. 71-75 - Alessio Gambi, Waldemar Hummer, Hong Linh Truong, Schahram Dustdar:
Testing Elastic Computing Systems. 76-82 - David Meyer:
The Software-Defined-Networking Research Group. 84-87 - Kieron O'Hara:
The Many-Headed e-Monster. 88-92 - Charles J. Petrie:
The Age of DIY. 93-94 - Vinton G. Cerf:
Internet and the Other IP. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.