callback( { "result":{ "query":":facetid:toc:\"db/journals/internet/internet18.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.05" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"82", "@dc":"82", "@oc":"82", "@id":"43462029", "text":":facetid:toc:db/journals/internet/internet18.bht" } }, "hits":{ "@total":"82", "@computed":"82", "@sent":"82", "@first":"0", "hit":[{ "@score":"1", "@id":"3745731", "info":{"authors":{"author":[{"@pid":"53/2189-1","text":"Li Li 0001"},{"@pid":"49/6719","text":"Wu Chou"},{"@pid":"141/2113","text":"Zhihong Qiu"},{"@pid":"90/443","text":"Tao Cai"}]},"title":"Who Is Calling Which Page on the Web?","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"26-33","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/0001CQC14","doi":"10.1109/MIC.2014.105","ee":"https://doi.org/10.1109/MIC.2014.105","url":"https://dblp.org/rec/journals/internet/0001CQC14"}, "url":"URL#3745731" }, { "@score":"1", "@id":"3745732", "info":{"authors":{"author":{"@pid":"a/VirgilioAlmeida","text":"Virgílio A. F. Almeida"}},"title":"The Evolution of Internet Governance: Lessons Learned from NETmundial.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"65-69","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Almeida14","doi":"10.1109/MIC.2014.98","ee":"https://doi.org/10.1109/MIC.2014.98","url":"https://dblp.org/rec/journals/internet/Almeida14"}, "url":"URL#3745732" }, { "@score":"1", "@id":"3745733", "info":{"authors":{"author":[{"@pid":"122/5489","text":"Marco Balduini"},{"@pid":"12/2920","text":"Alessandro Bozzon"},{"@pid":"91/4526","text":"Emanuele Della Valle"},{"@pid":"15/6040-2","text":"Yi Huang 0002"},{"@pid":"h/GeertJanHouben","text":"Geert-Jan Houben"}]},"title":"Recommending Venues Using Continuous Predictive Social Media Analytics.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"28-35","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/BalduiniBVHH14","doi":"10.1109/MIC.2014.84","ee":"https://doi.org/10.1109/MIC.2014.84","url":"https://dblp.org/rec/journals/internet/BalduiniBVHH14"}, "url":"URL#3745733" }, { "@score":"1", "@id":"3745734", "info":{"authors":{"author":[{"@pid":"153/3948","text":"Richard L. Barnes"},{"@pid":"42/9156","text":"Martin Thomson"}]},"title":"Browser-to-Browser Security Assurances for WebRTC.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"11-17","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/BarnesT14","doi":"10.1109/MIC.2014.106","ee":"https://doi.org/10.1109/MIC.2014.106","url":"https://dblp.org/rec/journals/internet/BarnesT14"}, "url":"URL#3745734" }, { "@score":"1", "@id":"3745735", "info":{"authors":{"author":{"@pid":"59/1025","text":"Karen Bartleson"}},"title":"Market-Driven Standards and the IEEE-SA.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"58-62","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Bartleson14","doi":"10.1109/MIC.2014.30","ee":"https://doi.org/10.1109/MIC.2014.30","url":"https://dblp.org/rec/journals/internet/Bartleson14"}, "url":"URL#3745735" }, { "@score":"1", "@id":"3745736", "info":{"authors":{"author":[{"@pid":"b/PaoloBellavista","text":"Paolo Bellavista"},{"@pid":"65/6908","text":"Carlo Giannelli"},{"@pid":"145/8141","text":"Luca Iannario"},{"@pid":"25/2371","text":"Laurent-Walter Goix"},{"@pid":"74/566","text":"Claudio Venezia"}]},"title":"Peer-to-Peer Content Sharing Based on Social Identities and Relationships.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"55-63","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/BellavistaGIGV14","doi":"10.1109/MIC.2013.127","ee":"https://doi.org/10.1109/MIC.2013.127","url":"https://dblp.org/rec/journals/internet/BellavistaGIGV14"}, "url":"URL#3745736" }, { "@score":"1", "@id":"3745737", "info":{"authors":{"author":[{"@pid":"98/2273","text":"Victoria Beltran"},{"@pid":"99/837","text":"Emmanuel Bertin"},{"@pid":"84/4327","text":"Noël Crespi"}]},"title":"User Identity for WebRTC Services: A Matter of Trust.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"18-25","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/BeltranBC14","doi":"10.1109/MIC.2014.128","ee":"https://doi.org/10.1109/MIC.2014.128","url":"https://dblp.org/rec/journals/internet/BeltranBC14"}, "url":"URL#3745737" }, { "@score":"1", "@id":"3745738", "info":{"authors":{"author":[{"@pid":"b/ABestavros","text":"Azer Bestavros"},{"@pid":"73/2727","text":"Orran Krieger"}]},"title":"Toward an Open Cloud Marketplace: Vision and First Steps.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"72-77","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/BestavrosK14","doi":"10.1109/MIC.2014.17","ee":"https://doi.org/10.1109/MIC.2014.17","url":"https://dblp.org/rec/journals/internet/BestavrosK14"}, "url":"URL#3745738" }, { "@score":"1", "@id":"3745739", "info":{"authors":{"author":[{"@pid":"71/3661","text":"Paolo Boldi"},{"@pid":"l/StefanoLeonardi","text":"Stefano Leonardi 0001"},{"@pid":"21/6419","text":"Cecilia Mascolo"},{"@pid":"v/MVazirgiannis","text":"Michalis Vazirgiannis"}]},"title":"Web and Social Graph Mining.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"9-10","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/BoldiLMV14","doi":"10.1109/MIC.2014.100","ee":"https://doi.org/10.1109/MIC.2014.100","url":"https://dblp.org/rec/journals/internet/BoldiLMV14"}, "url":"URL#3745739" }, { "@score":"1", "@id":"3745740", "info":{"authors":{"author":[{"@pid":"52/2830-2","text":"Wei Cai 0002"},{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Toward Gaming as a Service.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"12-18","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/CaiCL14","doi":"10.1109/MIC.2014.22","ee":"https://doi.org/10.1109/MIC.2014.22","url":"https://dblp.org/rec/journals/internet/CaiCL14"}, "url":"URL#3745740" }, { "@score":"1", "@id":"3745741", "info":{"authors":{"author":{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"}},"title":"Unfinished Business.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"88","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Cerf14","doi":"10.1109/MIC.2014.18","ee":"https://doi.org/10.1109/MIC.2014.18","url":"https://dblp.org/rec/journals/internet/Cerf14"}, "url":"URL#3745741" }, { "@score":"1", "@id":"3745742", "info":{"authors":{"author":{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"}},"title":"Instrument Thyself!","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"88","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Cerf14a","doi":"10.1109/MIC.2014.28","ee":"https://doi.org/10.1109/MIC.2014.28","url":"https://dblp.org/rec/journals/internet/Cerf14a"}, "url":"URL#3745742" }, { "@score":"1", "@id":"3745743", "info":{"authors":{"author":{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"}},"title":"Forty Years Ago...","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"88","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Cerf14b","doi":"10.1109/MIC.2014.68","ee":"https://doi.org/10.1109/MIC.2014.68","url":"https://dblp.org/rec/journals/internet/Cerf14b"}, "url":"URL#3745743" }, { "@score":"1", "@id":"3745744", "info":{"authors":{"author":{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"}},"title":"Bufferbloat and Other Internet Challenges.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"80","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Cerf14c","doi":"10.1109/MIC.2014.89","ee":"https://doi.org/10.1109/MIC.2014.89","url":"https://dblp.org/rec/journals/internet/Cerf14c"}, "url":"URL#3745744" }, { "@score":"1", "@id":"3745745", "info":{"authors":{"author":{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"}},"title":"Knocking Down Strawmen.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"88","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Cerf14d","doi":"10.1109/MIC.2014.115","ee":"https://doi.org/10.1109/MIC.2014.115","url":"https://dblp.org/rec/journals/internet/Cerf14d"}, "url":"URL#3745745" }, { "@score":"1", "@id":"3745746", "info":{"authors":{"author":[{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"},{"@pid":"132/9400","text":"Nii Narku Quaynor"}]},"title":"The Internet of Everyone.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"96","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/CerfQ14","doi":"10.1109/MIC.2014.60","ee":"https://doi.org/10.1109/MIC.2014.60","url":"https://dblp.org/rec/journals/internet/CerfQ14"}, "url":"URL#3745746" }, { "@score":"1", "@id":"3745747", "info":{"authors":{"author":[{"@pid":"44/7268","text":"Chao-Chih Chen"},{"@pid":"88/619","text":"Peng Sun"},{"@pid":"61/2443","text":"Lihua Yuan"},{"@pid":"65/1459","text":"David A. Maltz"},{"@pid":"47/4465","text":"Chen-Nee Chuah"},{"@pid":"m/PrasantMohapatra","text":"Prasant Mohapatra"}]},"title":"SWIM: A Switch Manager for Datacenter Networks.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"30-36","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/ChenSYMCM14","doi":"10.1109/MIC.2014.41","ee":"https://doi.org/10.1109/MIC.2014.41","url":"https://dblp.org/rec/journals/internet/ChenSYMCM14"}, "url":"URL#3745747" }, { "@score":"1", "@id":"3745748", "info":{"authors":{"author":[{"@pid":"c/MClaypool","text":"Mark Claypool"},{"@pid":"49/184","text":"Grenville Armitage"},{"@pid":"b/MBrianBlake","text":"M. Brian Blake"}]},"title":"Networked Games in the Midst of the Clouds [Guest editors' introduction].","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"8-11","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/ClaypoolAB14","doi":"10.1109/MIC.2014.56","ee":"https://doi.org/10.1109/MIC.2014.56","url":"https://dblp.org/rec/journals/internet/ClaypoolAB14"}, "url":"URL#3745748" }, { "@score":"1", "@id":"3745749", "info":{"authors":{"author":[{"@pid":"91/2346-1","text":"Yong Cui 0001"},{"@pid":"05/4187","text":"Qi Sun"},{"@pid":"181/2626-2","text":"Ke Xu 0002"},{"@pid":"80/4406","text":"Wendong Wang"},{"@pid":"145/8009","text":"Ted Lemon"}]},"title":"Configuring IPv4 over IPv6 Networks: Transitioning with DHCP.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"84-88","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/CuiSXWL14","doi":"10.1109/MIC.2014.49","ee":"https://doi.org/10.1109/MIC.2014.49","url":"https://dblp.org/rec/journals/internet/CuiSXWL14"}, "url":"URL#3745749" }, { "@score":"1", "@id":"3745750", "info":{"authors":{"author":[{"@pid":"150/1946","text":"Elkhan Dadashov"},{"@pid":"c/UgurCetintemel","text":"Ugur Çetintemel"},{"@pid":"26/6037","text":"Tim Kraska"}]},"title":"Putting Analytics on the Spot: Or How to Lower the Cost for Analytics.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"70-73","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/DadashovCK14","doi":"10.1109/MIC.2014.94","ee":"https://doi.org/10.1109/MIC.2014.94","url":"https://dblp.org/rec/journals/internet/DadashovCK14"}, "url":"URL#3745750" }, { "@score":"1", "@id":"3745751", "info":{"authors":{"author":[{"@pid":"51/1256","text":"Lieven Desmet"},{"@pid":"82/359","text":"Martin Johns"}]},"title":"Real-Time Communications Security on the Web.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"8-10","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/DesmetJ14","doi":"10.1109/MIC.2014.117","ee":"https://doi.org/10.1109/MIC.2014.117","url":"https://dblp.org/rec/journals/internet/DesmetJ14"}, "url":"URL#3745751" }, { "@score":"1", "@id":"3745752", "info":{"authors":{"author":{"@pid":"d/FredDouglis","text":"Fred Douglis"}},"title":"Web-Scale Datacenters.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"13-14","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Douglis14","doi":"10.1109/MIC.2014.79","ee":"https://doi.org/10.1109/MIC.2014.79","url":"https://dblp.org/rec/journals/internet/Douglis14"}, "url":"URL#3745752" }, { "@score":"1", "@id":"3745753", "info":{"authors":{"author":{"@pid":"78/2286","text":"Stephen Farrell"}},"title":"Why Pervasive Monitoring Is Bad.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"4-7","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Farrell14","doi":"10.1109/MIC.2014.80","ee":"https://doi.org/10.1109/MIC.2014.80","url":"https://dblp.org/rec/journals/internet/Farrell14"}, "url":"URL#3745753" }, { "@score":"1", "@id":"3745754", "info":{"authors":{"author":[{"@pid":"60/9080","text":"Christoph Fehling"},{"@pid":"l/FrankLeymann","text":"Frank Leymann"},{"@pid":"92/3430","text":"Ralph Retter"}]},"title":"Your Coffee Shop Uses Cloud Computing.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"52-59","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/FehlingLR14","doi":"10.1109/MIC.2014.101","ee":"https://doi.org/10.1109/MIC.2014.101","url":"https://dblp.org/rec/journals/internet/FehlingLR14"}, "url":"URL#3745754" }, { "@score":"1", "@id":"3745755", "info":{"authors":{"author":[{"@pid":"72/9035","text":"Luis López-Fernández"},{"@pid":"72/7280","text":"Micael Gallego"},{"@pid":"22/2887","text":"Boni García"},{"@pid":"121/5501","text":"David Fernández-López"},{"@pid":"133/4994","text":"Francisco Javier Lopez"}]},"title":"Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"34-40","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/FernandezGGFL14","doi":"10.1109/MIC.2014.102","ee":"https://doi.org/10.1109/MIC.2014.102","url":"https://dblp.org/rec/journals/internet/FernandezGGFL14"}, "url":"URL#3745755" }, { "@score":"1", "@id":"3745756", "info":{"authors":{"author":[{"@pid":"60/10684","text":"Oliver Gass"},{"@pid":"28/10656","text":"Hendrik Meth"},{"@pid":"34/590","text":"Alexander Maedche"}]},"title":"PaaS Characteristics for Productive Software Development: An Evaluation Framework.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"56-64","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/GassMM14","doi":"10.1109/MIC.2014.12","ee":"https://doi.org/10.1109/MIC.2014.12","url":"https://dblp.org/rec/journals/internet/GassMM14"}, "url":"URL#3745756" }, { "@score":"1", "@id":"3745757", "info":{"authors":{"author":{"@pid":"g/CaroleAGoble","text":"Carole A. Goble"}},"title":"Better Software, Better Research.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"4-8","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Goble14","doi":"10.1109/MIC.2014.88","ee":"https://doi.org/10.1109/MIC.2014.88","url":"https://dblp.org/rec/journals/internet/Goble14"}, "url":"URL#3745757" }, { "@score":"1", "@id":"3745758", "info":{"authors":{"author":[{"@pid":"69/4188","text":"Daniela Godoy"},{"@pid":"81/11485","text":"Gustavo Rodríguez"},{"@pid":"142/8484","text":"Franco Scavuzzo"}]},"title":"Leveraging Semantic Similarity for Folksonomy-Based Recommendation.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"48-55","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/GodoyRS14","doi":"10.1109/MIC.2013.26","ee":"https://doi.org/10.1109/MIC.2013.26","url":"https://dblp.org/rec/journals/internet/GodoyRS14"}, "url":"URL#3745758" }, { "@score":"1", "@id":"3745759", "info":{"authors":{"author":{"@pid":"g/TyroneGrandison","text":"Tyrone Grandison"}},"title":"Security and Privacy in Web 2.0 [Guest editor's introduction].","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"41-42","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Grandison14","doi":"10.1109/MIC.2014.119","ee":"https://doi.org/10.1109/MIC.2014.119","url":"https://dblp.org/rec/journals/internet/Grandison14"}, "url":"URL#3745759" }, { "@score":"1", "@id":"3745760", "info":{"authors":{"author":{"@pid":"42/2630","text":"Alasdair J. G. Gray"}},"title":"Dataset Descriptions for Linked Data Systems.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"66-69","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Gray14","doi":"10.1109/MIC.2014.66","ee":"https://doi.org/10.1109/MIC.2014.66","url":"https://dblp.org/rec/journals/internet/Gray14"}, "url":"URL#3745760" }, { "@score":"1", "@id":"3745761", "info":{"authors":{"author":[{"@pid":"72/6402","text":"Christophe Guéret"},{"@pid":"11/1151","text":"Victor de Boer"},{"@pid":"29/192","text":"Stefan Schlobach"}]},"title":"Let's "Downscale" Linked Data.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"70-73","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/GueretBS14","doi":"10.1109/MIC.2014.29","ee":"https://doi.org/10.1109/MIC.2014.29","url":"https://dblp.org/rec/journals/internet/GueretBS14"}, "url":"URL#3745761" }, { "@score":"1", "@id":"3745762", "info":{"authors":{"author":[{"@pid":"14/814","text":"JongWoo Ha"},{"@pid":"51/314","text":"Jung-Hyun Lee"},{"@pid":"73/3458-1","text":"SangKeun Lee 0001"}]},"title":"EPE: An Embedded Personalization Engine for Mobile Users.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"30-37","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/HaLL14","doi":"10.1109/MIC.2013.124","ee":"https://doi.org/10.1109/MIC.2013.124","url":"https://dblp.org/rec/journals/internet/HaLL14"}, "url":"URL#3745762" }, { "@score":"1", "@id":"3745763", "info":{"authors":{"author":[{"@pid":"92/1696-1","text":"Fei Hao 0001"},{"@pid":"51/247","text":"Stephen S. Yau"},{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"}]},"title":"Detecting k-Balanced Trusted Cliques in Signed Social Networks.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"24-31","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/HaoYMY14","doi":"10.1109/MIC.2014.25","ee":"https://doi.org/10.1109/MIC.2014.25","url":"https://dblp.org/rec/journals/internet/HaoYMY14"}, "url":"URL#3745763" }, { "@score":"1", "@id":"3745764", "info":{"authors":{"author":[{"@pid":"62/3150","text":"Amir Herzberg"},{"@pid":"94/7397","text":"Haya Schulmann"}]},"title":"Retrofitting Security into Network Protocols: The Case of DNSSEC.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"66-71","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/HerzbergS14","doi":"10.1109/MIC.2014.14","ee":"https://doi.org/10.1109/MIC.2014.14","url":"https://dblp.org/rec/journals/internet/HerzbergS14"}, "url":"URL#3745764" }, { "@score":"1", "@id":"3745765", "info":{"authors":{"author":[{"@pid":"18/1788","text":"Lin-Shung Huang"},{"@pid":"128/4621","text":"Shrikant Adhikarla"},{"@pid":"b/DanBoneh","text":"Dan Boneh"},{"@pid":"45/4319","text":"Collin Jackson"}]},"title":"An Experimental Study of TLS Forward Secrecy Deployments.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"43-51","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/HuangABJ14","doi":"10.1109/MIC.2014.86","ee":"https://doi.org/10.1109/MIC.2014.86","url":"https://dblp.org/rec/journals/internet/HuangABJ14"}, "url":"URL#3745765" }, { "@score":"1", "@id":"3745766", "info":{"authors":{"author":[{"@pid":"85/2489","text":"Alexandru Iosup"},{"@pid":"00/11359","text":"Ruud van de Bovenkamp"},{"@pid":"37/8026","text":"Siqi Shen"},{"@pid":"70/5638","text":"Adele Lu Jia"},{"@pid":"55/2512","text":"Fernando A. Kuipers"}]},"title":"Analyzing Implicit Social Networks in Multiplayer Online Games.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"36-44","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/IosupBSJK14","doi":"10.1109/MIC.2014.19","ee":"https://doi.org/10.1109/MIC.2014.19","url":"https://dblp.org/rec/journals/internet/IosupBSJK14"}, "url":"URL#3745766" }, { "@score":"1", "@id":"3745767", "info":{"authors":{"author":{"@pid":"00/5350","text":"Jeff Jaffe"}},"title":"Web at 25, W3C at 20: An Opportunity to Reflect and Look to the Future.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"74-78","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Jaffe14","doi":"10.1109/MIC.2014.78","ee":"https://doi.org/10.1109/MIC.2014.78","url":"https://dblp.org/rec/journals/internet/Jaffe14"}, "url":"URL#3745767" }, { "@score":"1", "@id":"3745768", "info":{"authors":{"author":[{"@pid":"04/1303","text":"Ejub Kajan"},{"@pid":"51/6922","text":"Noura Faci"},{"@pid":"11/6673","text":"Zakaria Maamar"},{"@pid":"22/5711","text":"Alfred Loo"},{"@pid":"145/8086","text":"Aldina Pljaskovic"},{"@pid":"s/QuanZSheng","text":"Quan Z. Sheng"}]},"title":"The Network-Based Business Process.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"63-69","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/KajanFMLPS14","doi":"10.1109/MIC.2014.35","ee":"https://doi.org/10.1109/MIC.2014.35","url":"https://dblp.org/rec/journals/internet/KajanFMLPS14"}, "url":"URL#3745768" }, { "@score":"1", "@id":"3745769", "info":{"authors":{"author":{"@pid":"k/DavidRKarger","text":"David R. Karger"}},"title":"The Semantic Web and End Users: What's Wrong and How to Fix It.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"64-70","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Karger14","doi":"10.1109/MIC.2014.124","ee":"https://doi.org/10.1109/MIC.2014.124","url":"https://dblp.org/rec/journals/internet/Karger14"}, "url":"URL#3745769" }, { "@score":"1", "@id":"3745770", "info":{"authors":{"author":{"@pid":"86/676","text":"Anne-Marie Kermarrec"}},"title":"Computer Science: Too Young to Fall into the Gender Gap.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"4-6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Kermarrec14","doi":"10.1109/MIC.2014.48","ee":"https://doi.org/10.1109/MIC.2014.48","url":"https://dblp.org/rec/journals/internet/Kermarrec14"}, "url":"URL#3745770" }, { "@score":"1", "@id":"3745771", "info":{"authors":{"author":{"@pid":"59/7433","text":"Eduardo Cuervo Laffaye"}},"title":"Toward an Ideal Mobile World: Opportunities and Challenges.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"74-78","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Laffaye14","doi":"10.1109/MIC.2014.99","ee":"https://doi.org/10.1109/MIC.2014.99","url":"https://dblp.org/rec/journals/internet/Laffaye14"}, "url":"URL#3745771" }, { "@score":"1", "@id":"3745772", "info":{"authors":{"author":{"@pid":"27/4397","text":"Eliot Lear"}},"title":"The Internet Assigned Numbers Authority Transition.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"62-65","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Lear14","doi":"10.1109/MIC.2014.77","ee":"https://doi.org/10.1109/MIC.2014.77","url":"https://dblp.org/rec/journals/internet/Lear14"}, "url":"URL#3745772" }, { "@score":"1", "@id":"3745773", "info":{"authors":{"author":[{"@pid":"l/JongHyoukLee","text":"Jong-Hyouk Lee"},{"@pid":"64/8332","text":"Kamal Deep Singh"},{"@pid":"42/6153","text":"Jean-Marie Bonnin"},{"@pid":"51/16","text":"Sangheon Pack"}]},"title":"Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"20-29","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/LeeSBP14","doi":"10.1109/MIC.2013.126","ee":"https://doi.org/10.1109/MIC.2013.126","url":"https://dblp.org/rec/journals/internet/LeeSBP14"}, "url":"URL#3745773" }, { "@score":"1", "@id":"3745774", "info":{"authors":{"author":[{"@pid":"66/4464","text":"Xavier León"},{"@pid":"139/6978-2","text":"Rahma Chaabouni 0002"},{"@pid":"69/1023","text":"Marc Sánchez Artigas"},{"@pid":"63/4811","text":"Pedro García López"}]},"title":"Smart Cloud Seeding for BitTorrent in Datacenters.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"47-54","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/LeonCAL14","doi":"10.1109/MIC.2014.43","ee":"https://doi.org/10.1109/MIC.2014.43","url":"https://dblp.org/rec/journals/internet/LeonCAL14"}, "url":"URL#3745774" }, { "@score":"1", "@id":"3745775", "info":{"authors":{"author":{"@pid":"m/AnirbanMahanti","text":"Anirban Mahanti"}},"title":"The Evolving Streaming Media Landscape.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"4-6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Mahanti14","doi":"10.1109/MIC.2014.16","ee":"https://doi.org/10.1109/MIC.2014.16","url":"https://dblp.org/rec/journals/internet/Mahanti14"}, "url":"URL#3745775" }, { "@score":"1", "@id":"3745776", "info":{"authors":{"author":[{"@pid":"m/AnirbanMahanti","text":"Anirban Mahanti"},{"@pid":"71/3761","text":"Subhabrata Sen"}]},"title":"High-Performance Mobile Internet.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"8-11","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/MahantiS14","doi":"10.1109/MIC.2014.8","ee":"https://doi.org/10.1109/MIC.2014.8","url":"https://dblp.org/rec/journals/internet/MahantiS14"}, "url":"URL#3745776" }, { "@score":"1", "@id":"3745777", "info":{"authors":{"author":[{"@pid":"52/7881","text":"Félix Gómez Mármol"},{"@pid":"36/6495","text":"Manuel Gil Pérez"},{"@pid":"p/GregorioMartinezPerez","text":"Gregorio Martínez Pérez"}]},"title":"Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"32-40","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/MarmolPP14","doi":"10.1109/MIC.2013.132","ee":"https://doi.org/10.1109/MIC.2013.132","url":"https://dblp.org/rec/journals/internet/MarmolPP14"}, "url":"URL#3745777" }, { "@score":"1", "@id":"3745778", "info":{"authors":{"author":{"@pid":"78/5985","text":"Emiliano Miluzzo"}},"title":"I'm Cloud 2.0, and I'm Not Just a Data Center.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"73-77","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Miluzzo14","doi":"10.1109/MIC.2014.53","ee":"https://doi.org/10.1109/MIC.2014.53","url":"https://dblp.org/rec/journals/internet/Miluzzo14"}, "url":"URL#3745778" }, { "@score":"1", "@id":"3745779", "info":{"authors":{"author":[{"@pid":"144/4955","text":"Debadatta Mishra"},{"@pid":"32/353","text":"Magda El Zarki"},{"@pid":"41/1019","text":"Aiman Erbad"},{"@pid":"80/4385","text":"Cheng-Hsin Hsu"},{"@pid":"66/1875","text":"Nalini Venkatasubramanian"}]},"title":"Clouds + Games: A Multifaceted Approach.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"20-27","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/MishraZEHV14","doi":"10.1109/MIC.2014.20","ee":"https://doi.org/10.1109/MIC.2014.20","url":"https://dblp.org/rec/journals/internet/MishraZEHV14"}, "url":"URL#3745779" }, { "@score":"1", "@id":"3745780", "info":{"authors":{"author":[{"@pid":"45/11250","text":"Pradeep K. Murukannaiah"},{"@pid":"s/MunindarPSingh","text":"Munindar P. Singh"}]},"title":"Understanding Location-Based User Experience.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"72-76","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/MurukannaiahS14","doi":"10.1109/MIC.2014.127","ee":"https://doi.org/10.1109/MIC.2014.127","url":"https://dblp.org/rec/journals/internet/MurukannaiahS14"}, "url":"URL#3745780" }, { "@score":"1", "@id":"3745781", "info":{"authors":{"author":{"@pid":"54/5541","text":"Mirco Musolesi"}},"title":"Big Mobile Data Mining: Good or Evil?","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"78-81","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Musolesi14","doi":"10.1109/MIC.2014.2","ee":"https://doi.org/10.1109/MIC.2014.2","url":"https://dblp.org/rec/journals/internet/Musolesi14"}, "url":"URL#3745781" }, { "@score":"1", "@id":"3745782", "info":{"authors":{"author":[{"@pid":"70/3231","text":"Kim Khoa Nguyen"},{"@pid":"69/4317","text":"Mohamed Cheriet"},{"@pid":"82/6513","text":"Yves Lemieux"}]},"title":"Virtual Slice Assignment in Large-Scale Cloud Interconnects.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"37-46","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/NguyenCL14","doi":"10.1109/MIC.2014.42","ee":"https://doi.org/10.1109/MIC.2014.42","url":"https://dblp.org/rec/journals/internet/NguyenCL14"}, "url":"URL#3745782" }, { "@score":"1", "@id":"3745783", "info":{"authors":{"author":[{"@pid":"56/9755","text":"Talal H. Noor"},{"@pid":"s/QuanZSheng","text":"Quan Z. Sheng"},{"@pid":"n/AnneHHNgu","text":"Anne H. H. Ngu"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"Analysis of Web-Scale Cloud Services.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"55-61","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/NoorSND14","doi":"10.1109/MIC.2014.64","ee":"https://doi.org/10.1109/MIC.2014.64","url":"https://dblp.org/rec/journals/internet/NoorSND14"}, "url":"URL#3745783" }, { "@score":"1", "@id":"3745784", "info":{"authors":{"author":{"@pid":"90/2568","text":"Kieron O'Hara"}},"title":"In Worship of an Echo.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"79-83","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/OHara14","doi":"10.1109/MIC.2014.71","ee":"https://doi.org/10.1109/MIC.2014.71","url":"https://dblp.org/rec/journals/internet/OHara14"}, "url":"URL#3745784" }, { "@score":"1", "@id":"3745785", "info":{"authors":{"author":{"@pid":"90/2568","text":"Kieron O'Hara"}},"title":"The Fridge's Brain Sure Ain't the Icebox.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"81-84","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/OHara14a","doi":"10.1109/MIC.2014.122","ee":"https://doi.org/10.1109/MIC.2014.122","url":"https://dblp.org/rec/journals/internet/OHara14a"}, "url":"URL#3745785" }, { "@score":"1", "@id":"3745786", "info":{"authors":{"author":[{"@pid":"12/6692","text":"Nir Ofek"},{"@pid":"56/5380","text":"Asaf Shabtai"}]},"title":"Dynamic Latent Expertise Mining in Social Networks.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"20-27","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/OfekS14","doi":"10.1109/MIC.2014.83","ee":"https://doi.org/10.1109/MIC.2014.83","url":"https://dblp.org/rec/journals/internet/OfekS14"}, "url":"URL#3745786" }, { "@score":"1", "@id":"3745787", "info":{"authors":{"author":{"@pid":"19/1165","text":"Rolf Oppliger"}},"title":"Certification Authorities Under Attack: A Plea for Certificate Legitimation.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"40-47","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Oppliger14","doi":"10.1109/MIC.2013.5","ee":"https://doi.org/10.1109/MIC.2013.5","url":"https://dblp.org/rec/journals/internet/Oppliger14"}, "url":"URL#3745787" }, { "@score":"1", "@id":"3745788", "info":{"authors":{"author":{"@pid":"13/767","text":"Hilarie Orman"}},"title":"Recent Parables in Cryptography.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"82-86","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Orman14","doi":"10.1109/MIC.2014.13","ee":"https://doi.org/10.1109/MIC.2014.13","url":"https://dblp.org/rec/journals/internet/Orman14"}, "url":"URL#3745788" }, { "@score":"1", "@id":"3745789", "info":{"authors":{"author":{"@pid":"13/767","text":"Hilarie Orman"}},"title":"Co-Evolution with Social Networks: Deception is Protection.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"90-94","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Orman14a","doi":"10.1109/MIC.2014.47","ee":"https://doi.org/10.1109/MIC.2014.47","url":"https://dblp.org/rec/journals/internet/Orman14a"}, "url":"URL#3745789" }, { "@score":"1", "@id":"3745790", "info":{"authors":{"author":{"@pid":"145/8005","text":"Charles L. Ortiz"}},"title":"The Road to Natural Conversational Speech Interfaces.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"74-78","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Ortiz14","doi":"10.1109/MIC.2014.36","ee":"https://doi.org/10.1109/MIC.2014.36","url":"https://dblp.org/rec/journals/internet/Ortiz14"}, "url":"URL#3745790" }, { "@score":"1", "@id":"3745791", "info":{"authors":{"author":[{"@pid":"88/11204","text":"Athanasios Papaoikonomou"},{"@pid":"75/1726","text":"Magdalini Kardara"},{"@pid":"76/2292","text":"Konstantinos Tserpes"},{"@pid":"02/5489","text":"Theodora A. Varvarigou"}]},"title":"Predicting Edge Signs in Social Networks Using Frequent Subgraph Discovery.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"36-43","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/PapaoikonomouKTV14","doi":"10.1109/MIC.2014.82","ee":"https://doi.org/10.1109/MIC.2014.82","url":"https://dblp.org/rec/journals/internet/PapaoikonomouKTV14"}, "url":"URL#3745791" }, { "@score":"1", "@id":"3745792", "info":{"authors":{"author":[{"@pid":"150/2020","text":"Abigail Paradise"},{"@pid":"13/3098","text":"Rami Puzis"},{"@pid":"56/5380","text":"Asaf Shabtai"}]},"title":"Anti-Reconnaissance Tools: Detecting Targeted Socialbots.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"11-19","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/ParadisePS14","doi":"10.1109/MIC.2014.81","ee":"https://doi.org/10.1109/MIC.2014.81","url":"https://dblp.org/rec/journals/internet/ParadisePS14"}, "url":"URL#3745792" }, { "@score":"1", "@id":"3745793", "info":{"authors":{"author":{"@pid":"04/2312","text":"Charles J. Petrie"}},"title":"Is the Internet a Thing?","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"84-86","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Petrie14","doi":"10.1109/MIC.2014.73","ee":"https://doi.org/10.1109/MIC.2014.73","url":"https://dblp.org/rec/journals/internet/Petrie14"}, "url":"URL#3745793" }, { "@score":"1", "@id":"3745794", "info":{"authors":{"author":{"@pid":"04/2312","text":"Charles Petrie"}},"title":"The Failure of HealthCare.gov Exposes Silicon Valley Secrets.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"85-86","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Petrie14a","doi":"10.1109/MIC.2014.121","ee":"https://doi.org/10.1109/MIC.2014.121","url":"https://dblp.org/rec/journals/internet/Petrie14a"}, "url":"URL#3745794" }, { "@score":"1", "@id":"3745795", "info":{"authors":{"author":[{"@pid":"73/6817","text":"Helmut Prendinger"},{"@pid":"41/3562","text":"João Oliveira"},{"@pid":"145/8197","text":"Joao Catarino"},{"@pid":"23/11456","text":"Marconi Madruga Filho"},{"@pid":"58/5094","text":"Rui Prada"}]},"title":"iCO2: A Networked Game for Collecting Large-Scale Eco-Driving Behavior Data.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"28-35","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/PrendingerOCFP14","doi":"10.1109/MIC.2014.21","ee":"https://doi.org/10.1109/MIC.2014.21","url":"https://dblp.org/rec/journals/internet/PrendingerOCFP14"}, "url":"URL#3745795" }, { "@score":"1", "@id":"3745796", "info":{"authors":{"author":[{"@pid":"131/7277","text":"Soheil Qanbari"},{"@pid":"87/3534-2","text":"Fei Li 0002"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"Toward Portable Cloud Manufacturing Services.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"77-80","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/QanbariLD14","doi":"10.1109/MIC.2014.125","ee":"https://doi.org/10.1109/MIC.2014.125","url":"https://dblp.org/rec/journals/internet/QanbariLD14"}, "url":"URL#3745796" }, { "@score":"1", "@id":"3745797", "info":{"authors":{"author":{"@pid":"r/MRabinovich","text":"Michael Rabinovich"}},"title":"The Reproducibility versus Debuggability of Research.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"4-6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Rabinovich14","doi":"10.1109/MIC.2014.123","ee":"https://doi.org/10.1109/MIC.2014.123","url":"https://dblp.org/rec/journals/internet/Rabinovich14"}, "url":"URL#3745797" }, { "@score":"1", "@id":"3745798", "info":{"authors":{"author":[{"@pid":"125/8619","text":"Nikolai Samteladze"},{"@pid":"96/878","text":"Ken Christensen 0001"}]},"title":"DELTA++: Reducing the Size of Android Application Updates.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"50-57","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/SamteladzeC14","doi":"10.1109/MIC.2013.82","ee":"https://doi.org/10.1109/MIC.2013.82","url":"https://dblp.org/rec/journals/internet/SamteladzeC14"}, "url":"URL#3745798" }, { "@score":"1", "@id":"3745799", "info":{"authors":{"author":[{"@pid":"43/10102","text":"Lorenz Schwittmann"},{"@pid":"20/9386","text":"Matthäus Wander"},{"@pid":"124/6873","text":"Christopher Boelmann"},{"@pid":"39/6057","text":"Torben Weis"}]},"title":"Privacy Preservation in Decentralized Online Social Networks.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"16-23","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/SchwittmannWBW14","doi":"10.1109/MIC.2013.131","ee":"https://doi.org/10.1109/MIC.2013.131","url":"https://dblp.org/rec/journals/internet/SchwittmannWBW14"}, "url":"URL#3745799" }, { "@score":"1", "@id":"3745800", "info":{"authors":{"author":[{"@pid":"74/5590","text":"Rahul Singh"},{"@pid":"88/8903","text":"Prateek Sharma"},{"@pid":"28/760-1","text":"David E. Irwin 0001"},{"@pid":"s/PrashantJShenoy","text":"Prashant J. Shenoy"},{"@pid":"r/KKRamakrishnan","text":"K. K. Ramakrishnan"}]},"title":"Here Today, Gone Tomorrow: Exploiting Transient Servers in Datacenters.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"22-29","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/SinghSISR14","doi":"10.1109/MIC.2014.40","ee":"https://doi.org/10.1109/MIC.2014.40","url":"https://dblp.org/rec/journals/internet/SinghSISR14"}, "url":"URL#3745800" }, { "@score":"1", "@id":"3745801", "info":{"authors":{"author":[{"@pid":"15/601","text":"Patrick Stuedi"},{"@pid":"79/2797","text":"Iqbal Mohomed"},{"@pid":"b/MBalakrishnan","text":"Mahesh Balakrishnan 0001"},{"@pid":"91/584","text":"Zhuoqing Morley Mao"},{"@pid":"85/4250","text":"Venugopalan Ramasubramanian"},{"@pid":"06/965","text":"Doug Terry"},{"@pid":"76/4863","text":"Ted Wobber"}]},"title":"Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"44-51","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/StuediMBMRTW14","doi":"10.1109/MIC.2013.130","ee":"https://doi.org/10.1109/MIC.2013.130","url":"https://dblp.org/rec/journals/internet/StuediMBMRTW14"}, "url":"URL#3745801" }, { "@score":"1", "@id":"3745802", "info":{"authors":{"author":[{"@pid":"42/5410","text":"Kazutoshi Sumiya"},{"@pid":"50/916","text":"Daisuke Kitayama"},{"@pid":"27/3475","text":"Naiwala P. Chandrasiri"}]},"title":"Inferred Information Retrieval with User Operations on Digital Maps.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"70-73","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/SumiyaKC14","doi":"10.1109/MIC.2014.72","ee":"https://doi.org/10.1109/MIC.2014.72","url":"https://dblp.org/rec/journals/internet/SumiyaKC14"}, "url":"URL#3745802" }, { "@score":"1", "@id":"3745803", "info":{"authors":{"author":[{"@pid":"14/7263","text":"Pankaj R. Telang"},{"@pid":"118/4007","text":"Anup K. Kalia"},{"@pid":"s/MunindarPSingh","text":"Munindar P. Singh"}]},"title":"Engineering Service Engagements via Commitments.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"46-54","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/TelangKS14","doi":"10.1109/MIC.2013.86","ee":"https://doi.org/10.1109/MIC.2013.86","url":"https://dblp.org/rec/journals/internet/TelangKS14"}, "url":"URL#3745803" }, { "@score":"1", "@id":"3745804", "info":{"authors":{"author":[{"@pid":"60/6503","text":"F. Javier Rivas Tocado"},{"@pid":"09/6796","text":"Almudena Díaz-Zayas"},{"@pid":"95/1885","text":"Pedro Merino Gómez"}]},"title":"Characterizing Traffic Performance in Cellular Networks.","venue":"IEEE Internet Comput.","volume":"18","number":"1","pages":"12-19","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/TocadoDG14","doi":"10.1109/MIC.2013.125","ee":"https://doi.org/10.1109/MIC.2013.125","url":"https://dblp.org/rec/journals/internet/TocadoDG14"}, "url":"URL#3745804" }, { "@score":"1", "@id":"3745805", "info":{"authors":{"author":[{"@pid":"56/5974","text":"Brian Trammell"},{"@pid":"24/5400","text":"Joe Hildebrand"}]},"title":"Evolving Transport in the Internet.","venue":"IEEE Internet Comput.","volume":"18","number":"5","pages":"60-64","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/TrammellH14","doi":"10.1109/MIC.2014.91","ee":"https://doi.org/10.1109/MIC.2014.91","url":"https://dblp.org/rec/journals/internet/TrammellH14"}, "url":"URL#3745805" }, { "@score":"1", "@id":"3745806", "info":{"authors":{"author":[{"@pid":"87/3960","text":"Wei-Tek Tsai"},{"@pid":"06/241-1","text":"Wenjun Wu 0001"},{"@pid":"h/MichaelNHuhns","text":"Michael N. Huhns"}]},"title":"Cloud-Based Software Crowdsourcing.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"78-83","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Tsai0H14","doi":"10.1109/MIC.2014.46","ee":"https://doi.org/10.1109/MIC.2014.46","url":"https://dblp.org/rec/journals/internet/Tsai0H14"}, "url":"URL#3745806" }, { "@score":"1", "@id":"3745807", "info":{"authors":{"author":{"@pid":"10/9921","text":"Sean Turner"}},"title":"Transport Layer Security.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"60-63","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/Turner14","doi":"10.1109/MIC.2014.126","ee":"https://doi.org/10.1109/MIC.2014.126","url":"https://dblp.org/rec/journals/internet/Turner14"}, "url":"URL#3745807" }, { "@score":"1", "@id":"3745808", "info":{"authors":{"author":[{"@pid":"84/7882","text":"Pinghui Wang"},{"@pid":"45/2682","text":"Wenbo He"},{"@pid":"130/3810","text":"Junzhou Zhao"}]},"title":"A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"10-15","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/WangHZ14","doi":"10.1109/MIC.2013.128","ee":"https://doi.org/10.1109/MIC.2013.128","url":"https://dblp.org/rec/journals/internet/WangHZ14"}, "url":"URL#3745808" }, { "@score":"1", "@id":"3745809", "info":{"authors":{"author":[{"@pid":"07/7968","text":"Andrew G. West"},{"@pid":"94/1554","text":"Adam J. Aviv"}]},"title":"Measuring Privacy Disclosures in URL Query Strings.","venue":"IEEE Internet Comput.","volume":"18","number":"6","pages":"52-59","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/WestA14","doi":"10.1109/MIC.2014.104","ee":"https://doi.org/10.1109/MIC.2014.104","url":"https://dblp.org/rec/journals/internet/WestA14"}, "url":"URL#3745809" }, { "@score":"1", "@id":"3745810", "info":{"authors":{"author":[{"@pid":"11/9511","text":"Yuehai Xu"},{"@pid":"90/939","text":"Eitan Frachtenberg"},{"@pid":"08/237-1","text":"Song Jiang 0001"},{"@pid":"62/11514","text":"Mike Paleczny"}]},"title":"Characterizing Facebook's Memcached Workload.","venue":"IEEE Internet Comput.","volume":"18","number":"2","pages":"41-49","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/XuFJP14","doi":"10.1109/MIC.2013.80","ee":"https://doi.org/10.1109/MIC.2013.80","url":"https://dblp.org/rec/journals/internet/XuFJP14"}, "url":"URL#3745810" }, { "@score":"1", "@id":"3745811", "info":{"authors":{"author":[{"@pid":"38/8412","text":"Yunjing Xu"},{"@pid":"72/11211","text":"Zachary Musgrave"},{"@pid":"n/BrianDNoble","text":"Brian Noble"},{"@pid":"359/0958","text":"Michael D. Bailey"}]},"title":"Workload-Aware Provisioning in Public Clouds.","venue":"IEEE Internet Comput.","volume":"18","number":"4","pages":"15-21","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/XuMNB14","doi":"10.1109/MIC.2014.38","ee":"https://doi.org/10.1109/MIC.2014.38","url":"https://dblp.org/rec/journals/internet/XuMNB14"}, "url":"URL#3745811" }, { "@score":"1", "@id":"3745812", "info":{"authors":{"author":[{"@pid":"68/7938","text":"Kejiang Ye"},{"@pid":"54/6252-1","text":"Zhaohui Wu 0001"},{"@pid":"60/6545","text":"Bing Bing Zhou"},{"@pid":"67/5160-2","text":"Xiaohong Jiang 0002"},{"@pid":"82/4206-8","text":"Chen Wang 0008"},{"@pid":"z/AlbertYZomaya","text":"Albert Y. Zomaya"}]},"title":"Virt-B: Towards Performance Benchmarking of Virtual Machine Systems.","venue":"IEEE Internet Comput.","volume":"18","number":"3","pages":"64-72","year":"2014","type":"Journal Articles","access":"closed","key":"journals/internet/YeWZJWZ14","doi":"10.1109/MIC.2013.104","ee":"https://doi.org/10.1109/MIC.2013.104","url":"https://dblp.org/rec/journals/internet/YeWZJWZ14"}, "url":"URL#3745812" } ] } } } )