


default search action
IEEE Internet Computing, Volume 22
Volume 22, Number 1, January / February 2018
- Amit P. Sheth, Biplav Srivastava, Florian Michahelles:

IoT-Enhanced Human Experience. 4-7 - Shirin Enshaeifar, Payam M. Barnaghi

, Severin Skillman, Andreas Markides, Tarek Elsaleh
, Sahr Thomas Acton, Ramin Nilforooshan, Helen Rostill:
The Internet of Things for Dementia Care. 8-17 - Edward Curry

, Souleiman Hasan
, Christos Kouroupetroglou, Willem Fabritius, Umair ul Hassan, Wassim Derguech:
Internet of Things Enhanced User Experience for Smart Water and Energy Management. 18-28 - Carles Gomez

, Andrés Arcia-Moret, Jon Crowcroft:
TCP in the Internet of Things: From Ostracism to Prominence. 29-41 - Chih Wei Ling, Anwitaman Datta

, Jun Xu:
A Case for Distributed Multilevel Storage Infrastructure for Visual Surveillance in Intelligent Transportation Networks. 42-51 - Yue Sun, Ziming Zhu, Zhong Fan:

Distributed Caching in Wireless Cellular Networks Incorporating Parallel Processing. 52-61 - Philipp Sommer, Branislav Kusy

, Philip Valencia, Ross Dungavell
, Raja Jurdak
:
Delay-Tolerant Networking for Long-Term Animal Tracking. 62-72 - Shreyas Sen, Jinkyu Koo, Saurabh Bagchi:

TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices. 74-81 - Robbert van Renesse, Hakim Weatherspoon, Zhiming Shen, Weijia Song:

The Supercloud: Applying Internet Design Principles to Interconnecting Clouds. 82-86 - Hilarie Orman:

From Whom?: SMTP Headers Hold the Clues. 87-95 - Srinivasan Keshav:

Paradoxes of Internet Architecture. 96-102 - Vinton G. Cerf:

Shields up! 104-105
Volume 22, Number 2, March / April 2018
- Marjan Gusev

, Schahram Dustdar
:
Going Back to the Roots - The Evolution of Edge Computing, An IoT Perspective. 5-15 - Nirav Ajmeri

, Hui Guo
, Pradeep K. Murukannaiah
, Munindar P. Singh
:
Designing Ethical Personal Agents. 16-22 - Hilarie Orman:

Blockchain: the Emperors New PKI? 23-28 - Arun Iyengar, Ashish Kundu, George Pallis:

Healthcare Informatics and Privacy. 29-31 - Feng Chen, Xiaoqian Jiang, Shuang Wang, Lisa M. Schilling, Daniella Meeker, Toan Ong, Michael E. Matheny

, Jason N. Doctor, Lucila Ohno-Machado, Jaideep Vaidya:
Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage. 32-41 - Sagar Sharma, Keke Chen, Amit P. Sheth:

Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems. 42-51 - Sonia Chiasson, Yomna Abdelaziz, Farah Chanchary:

Privacy Concerns Amidst OBA and the Need for Alternative Models. 52-61 - Bryan Dosono, Jordan Hayes, Yang Wang:

Toward Accessible Authentication: Learning from People with Visual Impairments. 62-70 - Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Noman Mohammed:

Secure Count Query on Encrypted Genomic Data: A Survey. 71-82 - Stuart E. Middleton

, Symeon Papadopoulos, Yiannis Kompatsiaris:
Social Computing for Verifying Social Media Content in Breaking News. 83-89 - Virgílio A. F. Almeida, Danilo Doneda, Eduardo Moreira da Costa:

Humane Smart Cities: The Need for Governance. 91-95 - Brian Trammell, Jean-Pierre Smith, Adrian Perrig

:
Adding Path Awareness to the Internet Architecture. 96-102 - Vinton G. Cerf:

Internet and Jurisdiction. 104-
Volume 22, Number 3, May / June 2018
- Bo Yu, Fan Bai, Falko Dressler

:
Connected and Autonomous Vehicles. 4-5 - Juan Boubeta-Puig

, Enrique Moguel
, Fernando Sánchez-Figueroa, Juan Hernández
, Juan Carlos Preciado
:
An Autonomous UAV Architecture for Remote Sensing and Intelligent Decision-making. 6-15 - Antonio Mateus de Sousa, Francisco R. C. Araújo

, Leobino N. Sampaio:
A Link-Stability-Based Interest-Forwarding Strategy For Vehicular Named Data Networks. 16-26 - Ruben Verborgh, Michel Dumontier

:
A Web API Ecosystem through Feature-Based Reuse. 29-37 - Jagmohan Chauhan, Mohamed Ali Kâafar

, Anirban Mahanti:
The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass. 38-47 - Paul Grefen, Stefanie Rinderle-Ma

, Schahram Dustdar
, Walid Fdhila
, Jan Mendling, Stefan Schulte
:
Charting Process-Based Collaboration Support in Agile Business Networks: Aligning the Need for a Dynamic Internet of Processes from Industry and Research Perspectives. 48-57 - Jon Crowcroft, Adrià Gascón:

Analytics without Tears or Is There a Way for Data to Be Anonymized and Yet Still Useful? 58-64 - George Pallis, Demetris Trihinas, Athanasios Tryfonos, Marios D. Dikaiakos:

DevOps as a Service: Pushing the Boundaries of Microservice Adoption. 65-71 - Jimmy Lin:

Scale Up or Scale Out for Graph Processing? 72-78 - Vinton G. Cerf:

The Autonomous Vehicle and Its Temptations. 79-80
Volume 22, Number 4, July / August 2018
- M. Brian Blake:

Crowdsharing Idle Processor Time. 4-5 - Zsolt István, David Sidler, Gustavo Alonso:

Active Pages 20 Years Later: Active Storage for the Cloud. 6-14 - Mingqiang Li, Runhui Li, Patrick P. C. Lee

:
Relieving Both Storage and Recovery Burdens in Big Data Clusters with R-STAIR Codes. 15-26 - Andrew Paverd

, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Grondahl
, N. Asokan
, Ahmad-Reza Sadeghi:
OmniShare: Encrypted Cloud Storage for the Multi-Device Era. 27-36 - Gorka Gallardo, Josune Hernantes

, Nicolás Serrano
:
Designing SaaS for Enterprise Adoption Based on Task, Company, and Value-Chain Context. 37-45 - Xiuquan Qiao, Pei Ren

, Schahram Dustdar
, Junliang Chen:
A New Era for Web AR with Mobile Edge Computing. 46-55 - Komal Gilani

, Jaeho Kim, JaeSeung Song
, Dale Seed, Chonggang Wang:
Semantic Enablement in IoT Service Layers - Standard Progress and Challenges. 56-63 - Vinton G. Cerf:

Oscillation. 64-
Volume 22, Number 5, September / October 2018
- Patrick C. K. Hung, M. Brian Blake:

Reflecting on Two Decades of Services Computing. 3-7 - Erwin Van Eyk, Lucian Toader, Sacheendra Talluri, Laurens Versluis, Alexandru Uta, Alexandru Iosup:

Serverless is More: From PaaS to Present Cloud Computing. 8-17 - Semih Salihoglu, M. Tamer Özsu

:
Response to "Scale Up or Scale Out for Graph Processing". 18-24 - Michael Fagan, Mohammad Maifi Hasan Khan:

To Follow or Not to Follow: A Study of User Motivations around Cybersecurity Advice. 25-34 - Michail Tsikerdekis:

Real-Time Identity-Deception Detection Techniques for Social Media: Optimizations and Challenges. 35-45 - Maria G. Koziri, Panos K. Papadopoulos, Nikos Tziritas, Thanasis Loukopoulos, Samee U. Khan

, Albert Y. Zomaya
:
Efficient Cloud Provisioning for Video Transcoding: Review, Open Challenges and Future Opportunities. 46-55 - Xutong Zuo, Yong Cui, Mowei Wang, Tianxiao Wang, Xin Wang:

Low-Latency Networking: Architecture, Techniques, and Opportunities. 56-63 - Vinton G. Cerf:

On Routing and Forwarding. 64-
Volume 22, Number 6, November - December 2018
- Schahram Dustdar

, Elias P. Duarte Jr.:
Network Neutrality and Its Impact on Innovation. 5-7 - Henning Schulzrinne

:
Network Neutrality Is About Money, Not Packets. 8-17 - Davide Andreoletti, Silvia Giordano

, Cristina Rottondi, Massimo Tornatore
, Giacomo Verticale
:
To be Neutral or Not Neutral? The In-Network Caching Dilemma. 18-26 - Marcio Barbosa de Carvalho, Vinicius Garcez Schaurich, Lisandro Zambenedetti Granville

:
Considering Jurisdiction When Assessing End-to-End Network Neutrality. 27-34 - Pavel Kucherbaev, Alessandro Bozzon

, Geert-Jan Houben:
Human-Aided Bots. 36-43 - Hui Guo, Nirav Ajmeri

, Munindar P. Singh
:
Teaching Crowdsourcing: An Experience Report. 44-52 - Pankaj R. Telang, Anup K. Kalia, Maja Vukovic, Rahul Pandita, Munindar P. Singh

:
A Conceptual Framework for Engineering Chatbots. 54-59 - Ankur Bhatia, Michael Gerndt, Jorge Cardoso

:
Efficient Failure Diagnosis of OpenStack Using Tempest. 61-70

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














