Volume 4,
Number 1,
2003
- Doug Lea, Steve Vinoski:
IEEE Internet Computing: Guest Editors' Introduction - Middleware for Web Services.
- Ravi S. Sandhu:
IEEE Internet Computing: Security Track - Good Enough Security.
- Ashton Applewhite:
News: From T-Shirts to Pinstripes: P2P Gets Some Respect.
- Greg Linden, Brent Smith, Jeremy York:
Industry Report: Amazon.com Recommendations: Item-to-Item Collaborative Filtering.
- Meg McGinity:
In Brief: Live and e-Learn?
- Dharmendra Lingaiah:
Book Review: Telecom Foundations (A review of Telecommunications Essentials by Lillian Goleniewski).
- Alan S. Abrahams:
Book Review: Seeing the Woods for the Decision Trees (A review of Data Mining with SQL Server 2000 by Claude Seidman).
- Mat Hugo Jiménez Pérez:
Book Review: Network+ Certification: A Good Starting Point (A review of Network+ Certification Training Kit by Microsoft).
Volume 4,
Number 2,
2003
Volume 4,
Number 3,
2003
- Mahadev Satyanarayanan:
IEEE Pervasive Computing: From The Editor In Chief - Privacy: The Achilles Heel Of Pervasive Computing.
- IEEE Pervasive Computing: Works In Progress - Security, Privacy, and Health.
- Greg Goth:
News - Oh, Say Should You G?
- Vincent M. Stanford:
IEEE Pervasive Computing: Applications - Pervasive Computing Puts Food On the Table.
- Terry Costlow:
In Brief - Hotels Go Wireless.
- Dale A. Stirling:
Book Reviews - A Thorough Look at Internet Robots (A review of Beyond Webcams: An Introduction to Online Robots, Ken Goldberg and Roland Siegwart, eds.).
- Héctor Zenil:
How to Secure Your Enterprise (A review of Securing Business Information: Strategies to Protect the Enterprise and Its Network by F. Christian Byrnes and Dale Kutnick).
- George Semeczko:
A J2EE Reference for Your Library (A review of J2EE: The Complete Reference by Jim Keogh).
- Vladimir G. Ivanovíc:
The Power of Events (A review of The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems by David Luckham).
Volume 4,
Number 4,
2003
- IEEE Internet Computing: Guest Editors' Introduction - Ubiquitous Mobile Computing.
- IT Professional - Microsoft Outlook Web Access: Blessing or Bane to Security?
- IEEE Internet Computing: Peer To Peer - Economics and the Design of Open Systems.
- News - Data-Storing DNA.
- IEEE Internet Computing: Toward Integration - The Performance Presumption.
- Computing In Science & Engineering: Web Computing - Java and Grande Applications.
- IN BRIEF - Canning Spam.
- Book Reviews - Learning About WDM (A review of IP Over WDM by Kevin H. Liu).
- pH: A Language for Implicit Parallel Programming (A review of Implicit Parallel Programming in pH by Rishiyur S. Nikhil & Arvind).
- A Datamart Development Handbook - (A review of Data Warehousing: Using the Wal-Mart Model by Paul Westerman).
Volume 4,
Number 5,
2003
- Christopher Metz:
IEEE Internet Computing: Guest Editor'S Introduction - Moving Toward an IPv6 Future.
- Sanjay Patil, Eric Newcomer:
IEEE Internet Computing: Spotlight - ebXML and Web Services.
- Guruduth Banavar:
Works In Progress - Middleware Works in Progress Papers.
- Adam Stone:
News - Internet Invasion--Is the Web Secure?
- Steve Vinoski:
IEEE Internet Computing: Toward Integration - It's Just a Mapping Problem.
- Terry Costlow:
IN BRIEF - Idle PCs Might be Key to Smallpox Cure.
- Frank Nack:
IEEE Multimedia: Media Impact - Migrating from Mobile Telephony to Multipurpose Gadgets.
- Rita Puzmanova:
Book Reviews - Delivering Voice over IP and Multimedia with Session Initiation Protocol (A review of Internet Communications Using SIP by Henry Sinnreich and Alan B. Johnston).
- Juan Pablo Villa:
Dial 911 for Ross (A review of Security Engineering by Ross J. Anderson).
- Hector Zenil Chavez:
How to Develop Enterprise-Secure Java Applications Learning Risks (A review of Hacking Exposed J2EE and Java, Developing Secure Applications with Java Technology by Art Taylor, Brian Buege, and Randy Layman).
Volume 4,
Number 6,
2003
- Gregory D. Abowd:
IEEE Pervasive Computing: Introduction - The Human Experience.
- Guruduth Banavar:
Works In Progress - Middleware Works in Progress Papers.
- Laurianne McLaughlin:
NEws - Virginia Draws a New Line on Spam.
- Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing.
- Vincent M. Stanford:
IEEE Pervasive Computing: Applications - Pervasive Computing Goes the Last Hundred Feet with RFID Systems.
- Terry Costlow:
In Brief - Piracy, Advertising Groups Target Spyware.
- Bill Hilf:
Book Reviews - The Persuasive Power of Computers (A review of Persuasive Technology: Using Computers to Change What we Think and Do by B.J. Fogg).
- Dharmendra Lingaiah:
Data Dependency and Optimization (A review of Optimizing Compilers for Modern Architecture by Randy Allen and Ken Kennedy).
Volume 4,
Number 7,
2003
Volume 4,
Number 8,
2003
- Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing.
- Steve Vinoski:
IEEE Internet Computing: Toward Integration - Invocation Styles.
- Danna Voth:
In Brief - "Where Are You?" Watches.
- Angela Davids:
Spam Debate Simmers During Congressional Recess.
- Edward C. Epp:
IEEE Pervasive Computing: Identity Management Relationship Management: Secure Collaboration in a Ubiquitous Environment.
- Seth J. Teller, Jiawen Chen, Hari Balakrishnan:
IEEE Computer Graphics & Applications: Projects In VR Pervasive Pose-Aware Applications and Infrastructure.
- Meg McGinity:
News - RFID: Not Your Father's Bar Code.
- Wojciech Zalech:
Book Reviews - What Hides Behind the Internet-HTTP Protocol (A review of HTTP: The Definitive Guide by David Gourley and Brian Totty, with Marjorie Sayer, Sailu Reddy and Anshu Aggarwal).
- George Semeczko:
Unleashing the Power of JSP.
- Dharmendra Lingaiah:
OFDM Wireless Communications (A review of OFDM for Wireless Multimedia Communications by Richard Van Nee and Ramjee Prasad).
Volume 4,
Number 9,
2003
- Felix C. Gärtner, Levente Buttyán, Klaus Kursawe:
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.
- Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda:
Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks.
- Jeff Heflin, Michael N. Huhns:
IEEE Internet Computing: Guest Editors' Introduction - The Zen of the Web.
- Laurianne McLaughlin:
News - VoIP Draws New Scrutiny from FBI, State Regulators.
- Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing.
- Ariel Pashtan, Shriram Kollipara, Michael Pearce:
IEEE Internet Computing: Industry Report - Adapting Content for Wireless Web Services.
- Terry Costlow:
In Brief - Intelligent Mail Idea Raising Opponents' Ire.
- Tim Bond:
Book Reviews - Cooking with XSLT (A review of XSLT Cookbook by Sal Mangano).
- Mat Hugo Jiménez Pérez:
A Concise and Simple Approach for LDAP Beginners (A review of LDAP Programming, Management, and Integration by Clayton Donley).
Volume 4,
Number 10,
2003
- Panos K. Chrysanthis, Morris Sloman, Arkady B. Zaslavsky:
Guest Editors' Introduction - Mobile Data Management.
- Dik Lun Lee, Ka Kit Hoi, Wing Sing Wong, Jianliang Xu:
Mobile Data Management - Web Browsing on Small Displays.
- Kenneth P. Birman:
IEEE Internet Computing: Peer To Peer - The League of SuperNets.
- Greg Goth:
News - Web Services Easing Toward the Mainstream.
- Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
IEEE Pervasive Computing: Spotlight - Challenges in Location-Aware Computing.
- Keith I. Farkas, Guerney D. H. Hunt:
IEEE Pervasive Computing - New Products.
- Meg Shannon:
In Brief - Interactive Posters Pump Up Advertising.
- Min Cai:
Book Reviews - Distributed Computing Basics (A review of Distributed Computing: Principles and Applications by M.L. Liu).
- Juan M. Estévez-Tapiador:
Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin).
- Andreas A. Veglis:
Harvesting the Power of Google (A review of Google Hacks: 100 Industrial-Strength Tips & Tools by Tara Calishain and Rael Dornfes).
Volume 4,
Number 11,
2003
- Matthew Denny, Michael J. Franklin, Paul Castro, Apratim Purakayastha:
Mobile Data Management (Part 2) - The Design of a Scalable Discovery Service for Moving Networked Resources.
- Abhishek Ghose, Jens Grossklags, John Chuang:
Resilient Data-Centric Storage in Wireless Sensor Networks.
- Paul Francis:
IEEE Internet Computing: Peer To Peer Is the Internet Going NUTSS?
- Michael N. Huhns:
IEEE Internet Computing: Agents On The Web - The Sentient Web.
- Terry Costlow:
In Brief - Portability Lets Telemarketers Target Cell Phones.
- Alan S. Abrahams:
Book Reviews - Jumpstart Your Web Development Project (A review of Developing Web Information Systems: From Strategy to Implementation by Richard Vidgen, David Avison, Bob Wood, and Trevor Wood-Harper).
- Rita Puzmanova:
Internet for the Mobile World (A review of The Wireless Mobile Internet: Architectures, Protocols and Services by Abbas Jamalipour).
- George Semeczko:
Advanced E-Business (A review of E-Business Applications: Technologies for Tomorrow's Solutions, Jorge Gaso's and Klaus-Dieter Thoben, eds.).
Volume 4,
Number 12,
2003
Copyright © Fri Mar 12 17:26:57 2010
by Michael Ley (ley@uni-trier.de)