Volume 12,
Number 1,
January - February 2008
- Fred Douglis:
On Social Networking and Communication Paradigms.
4-6
- Greg Goth:
The Net's Going Green: Multipronged Approach Might Save Costs, Energy - and the Climate.
7-9
- Dejan S. Milojicic:
Interview with Rich Friedrich, Dave Cohen, Alex Dreiling.
10-13
- Sharad Mehrotra, Taieb Znati, Craig W. Thompson:
Crisis Management.
14-17
- Marius Portmann, Asad Amir Pirzada:
Wireless Mesh Networks for Public Safety and Crisis Management Applications.
18-25
- Tiziana Catarci, Massimiliano de Leoni, Andrea Marrella, Massimo Mecella, Berardino Salvatore, Guido Vetere, Schahram Dustdar, Lukasz Juszczyk, Atif Manzoor, Hong Linh Truong:
Pervasive Software Environments for Supporting Disaster Responses.
26-37
- Pavan Kumar Chitumalla, Douglas Harris, Bhavani M. Thuraisingham, Latifur Khan:
Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing.
38-44
- Joseph B. Kopena, Evan Sultanik, Robert N. Lass, Duc N. Nguyen, Christopher Dugan, Pragnesh Jay Modi, William C. Regli:
Distributed Coordination of First Responders.
45-47
- Fernando Maymi, Manuel Rodriguez-Martinez, Yi Qian, Paul C. Manz:
Ancile: Pervasively Shared Situational Awareness.
48-50
- Arjmand Samuel, Arif Ghafoor, Elisa Bertino:
Context-Aware Adaptation of Access-Control Policies.
51-54
- M. Brian Blake, Michael N. Huhns:
Web-Scale Workflow: Integrating Distributed Services.
55-59
- Kwei-Jay Lin:
E-Commerce Technology: Back to a Prominent Future.
60-65
- Michael R. Kelley:
The Spectrum Auction: Big Money and Lots of Unanswered Questions.
66-70
- Barry Leiba:
An Introduction to Internet Standards.
71-74
- Christoph Bussler:
Is Semantic Web Technology Taking the Wrong Turn?
75-79
- Danny Ayers:
Graph Farming.
80-83
- Steve Vinoski:
Serendipitous Reuse.
84-87
- Adel Hendaoui, Moez Limayem, Craig W. Thompson:
3D Social Virtual Worlds: Research Issues and Challenges.
88-92
- Stephen Farrell:
Security Boundaries.
93-96
Volume 12,
Number 2,
March - April 2008
- Fred Douglis:
Not-so-Secret Identities.
4-6
- Greg Goth:
Redefining the Server as Home Networks Emerge.
7-9
- Matei Ripeanu, Munindar P. Singh, Sudharshan S. Vazhkudai:
Virtual Organizations [Guest Editors' Introduction].
10-12
- Alvaro Arenas, Michael Wilson, Shirley Crompton, Dana Cojocarasu, Tobias Mahler, Lutz Schubert:
Bridging the Gap between Legal and Technical Contracts.
13-19
- Massimo Coppola, Yvon Jégou, Brian Matthews, Christine Morin, Luis Pablo Prieto, Oscar David Sánchez, Erica Y. Yang, Haiyan Yu:
Virtual Organization Support within a Grid-Wide Operating System.
20-28
- Li Qi, Hai Jin, Ian T. Foster, Jarek Gawor:
Provisioning for Dynamic Instantiation of Community Services.
29-36
- Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino:
Policy Mapper: Administering Location-Based Access-Control Policies.
38-45
- Payal Chakravarty, Munindar P. Singh:
Incorporating Events into Cross-Organizational Business Processes.
46-53
- Michael Hecker, Tharam S. Dillon, Elizabeth Chang:
Privacy Ontology Support for E-Commerce.
54-61
- Krithi Ramamritham, Saurabh Sahni, Malathy Baru, Chaitra Bahuman, Arun Chandran, Manjiri Joshi, Anil Bahuman:
The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries.
62-70
- Michael Calabrese:
Broadcast to Broadband: Unlicensed Access to Unused TV Channels?
71-75
- Patricia Beatty, Scott Dick, James Miller:
Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards.
76-80
- Amit P. Sheth, Matthew Perry:
Traveling the Semantic Web through Space, Time, and Theme.
81-86
- Steve Vinoski:
Demystifying RESTful Data Coupling.
87-90
- Jim Miller:
Is Anybody Home?
91-93
- Charles J. Petrie:
Collective Work.
96-95
Volume 12,
Number 3,
May - June 2008
- Fred Douglis:
The Eye of the Beholder: Whence IC?
3-5
- Greg Goth:
Should We Stop Trusting Trust?
6-9
- Elizabeth F. Churchill, Les Nelson, Diana K. Smetters:
Useful Computer Security.
10-12
- Bryan D. Payne, W. Keith Edwards:
A Brief Introduction to Usable Security.
13-21
- Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov:
Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs.
22-30
- Sean Bechhofer, Yeliz Yesilada, Robert Stevens, Simon Jupp, Bernard Horan:
Using Ontologies and Vocabularies for Dynamic Linking.
32-39
- Hechmi Khlifi, Jean-Charles Grégoire:
IMS Application Servers: Roles, Requirements, and Implementation Technologies.
40-51
- Avraham Leff, James T. Rayfield:
WebRB: A Different Way to Write Web Applications.
52-61
- Daniel Schall, Hong Linh Truong, Schahram Dustdar:
Unifying Human and Software Services in Web-Scale Collaborations.
62-68
- Yun Wan, Vaishali Kumar, Amina Bukhari:
Will the Overseas Expansion of Facebook Succeed?
69-73
- Eyhab Al-Masri, Qusay H. Mahmoud:
Discovering Web Services in Search Engines.
74-77
- Josh Eno, Craig W. Thompson:
Generating Synthetic Data to Match Data Mining Patterns.
78-82
- Steve Vinoski:
Multilanguage Programming.
83-85
- Daniel J. Weitzner:
Net Neutrality... Seriously this Time.
86-89
- Stephen Farrell:
Portable Storage and Data Loss.
90-93
- Charles J. Petrie, Christoph Bussler:
The Myth of Open Web Services: The Rise of the Service Parks.
96-95
Volume 12,
Number 4,
July - August 2008
- Dejan S. Milojicic:
Computing Now: Peer-Review Rigor Meets Social Networks.
3-5
- Greg Goth:
Accessibility Advances Could Portend New Mass Technologies.
6-8
- Samuel Madden, Philip Levis:
Mesh Networking Research and Technology for Multihop Wireless Networks.
9-11
- Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Kristof Fodor, Gahng-Seop Ahn:
The Rise of People-Centric Sensing.
12-21
- Johnathan Ishmael, Sara Bury, Dimitrios P. Pezaros, Nicholas J. P. Race:
Deploying Rural Community Wireless Mesh Networks.
22-29
- Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy:
Securing Wireless Mesh Networks.
30-36
- Jonathan W. Hui, David E. Culler:
Extending IP to Low-Power, Wireless Personal Area Networks.
37-45
- Satya Sanket Sahoo, Amit P. Sheth, Cory A. Henson:
Semantic Provenance for eScience: Managing the Deluge of Scientific Data.
46-54
- Yan Wang, Kwei-Jay Lin:
Reputation-Oriented Trustworthy Computing in E-Commerce Environments.
55-59
- P. Radha Krishna, Kamalakar Karlapalem:
Electronic Contracts.
60-68
- Loa Andersson, Stewart Bryant:
The IETF Multiprotocol Label Switching Standard: The MPLS Transport Profile Case.
69-73
- Robert A. Joyce:
Pornography and the Internet.
74-77
- Amit P. Sheth, Cory A. Henson, Satya Sanket Sahoo:
Semantic Sensor Web.
78-83
- Paul Hofmann:
ERP is Dead, Long Live ERP.
84-88
- Steve Vinoski:
Convenience Over Correctness.
89-92
- Jim Miller:
Who Are You? The Trade-Off between Information Utility and Privacy.
93-96
Volume 12,
Number 5,
September - October 2008
- Fred Douglis:
Ideas Ahead of Their Time.
4-6
- Dejan S. Milojicic:
Cloud Computing: Interview with Russ Daniels and Franco Travostino.
7-9
- Greg Goth:
ICANN's TLD Plans Are Defined, Not Yet Refined.
10-12
- Djamal Benslimane, Schahram Dustdar, Amit P. Sheth:
Services Mashups: The New Generation of Web Applications.
13-15
- Daniele Braga, Stefano Ceri, Florian Daniel, Davide Martinenghi:
Mashing Up Search Services.
16-23
- Florian Rosenberg, Francisco Curbera, Matthew J. Duftler, Rania Khalaf:
Composing RESTful Services and Collaborative Workflows: A Lightweight Approach.
24-31
- E. Michael Maximilien, Ajith Ranabahu, Karthik Gomadam:
An Online Platform for Web APIs and Service Mashups.
32-43
- Jin Yu, Boualem Benatallah, Fabio Casati, Florian Daniel:
Understanding Mashup Development.
44-52
- Chun Ouyang, Marcello La Rosa, Arthur H. M. ter Hofstede, Marlon Dumas, Katherine Shortland:
Toward Web-Scale Workflows for Film Production.
53-61
- M. Brian Blake, Michael F. Nowlan:
Taming Web Services from the Wild.
62-69
- Dietmar Tutsch, Gilbert Babin, Peter Kropf:
Application-Layer Traffic Analysis of a Peer-to-Peer System.
70-77
- Yuan-Cheng Lai:
DCCP: Transport Protocol with Congestion Control and Unreliability.
78-83
- Stephen Farrell:
Password Policy Purgatory.
84-87
- Tom Heath:
How Will We Interact with the Web of Data?
88-91
- Steve Vinoski:
RPC and REST: Dilemma, Disruption, and Displacement.
92-95
- Carl Hewitt:
ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing.
96-99
- Craig W. Thompson, Fran Hagstrom:
Modeling Healthcare Logistics in a Virtual World.
100-104
Volume 12,
Number 6,
November - December 2008
- Fred Douglis:
Full Stream Ahead.
3-5
- Greg Goth:
Traffic Management Becoming High-Priority Problem.
6-8
- Frank Olken, Le Gruenwald:
Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement.
9-12
- Yijian Bai, Hetal Thakkar, Haixun Wang, Carlo Zaniolo:
Time-Stamp Management and Query Execution in Data Stream Management Systems.
13-21
- Jin Li, Kristin Tufte, David Maier, Vassilis Papadimos:
AdaptWID: An Adaptive, Memory-Efficient Window Aggregation Implementation.
22-29
- Julie Letchner, Christopher Ré, Magdalena Balazinska, Matthai Philipose:
Challenges for Event Queries over Markovian Streams.
30-36
- Jing Gao, Bolin Ding, Wei Fan, Jiawei Han, Philip S. Yu:
Classifying Data Streams with Skewed Class Distributions and Concept Drifts.
37-49
- Geetika T. Lakshmanan, Ying Li, Robert E. Strom:
Placement Strategies for Internet-Scale Data Stream Systems.
50-60
- Wei Tan, Ian T. Foster, Ravi K. Madduri:
Combining the Power of Taverna and caGrid: Scientific Workflows that Enable Web-Scale Collaboration.
61-68
- Vlado Stankovski, Martin Swain, Valentin Kravtsov, Thomas Niessen, Dennis Wegener, M. Rohm, Jernej Trnkoczy, Michael May, Jürgen Franke, Assaf Schuster, Werner Dubitzky:
Digging Deep into the Data Mine with DataMiningGrid.
69-76
- Ya-Chin Sung, Yi-Bing Lin:
IPsec-Based VoIP Performance in WLAN Environments.
77-82
- Jorge Contreras, Russell Housley:
IP Squared: Internet Standards and Intellectual Property.
83-86
- Stephen Ruth, Imran Chaudhry:
Telework: A Productivity Paradox?
87-90
- Jim Miller:
Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy.
91-93
- Steve Vinoski:
RESTful Web Services Development Checklist.
96-95
Copyright © Mon Mar 15 04:02:48 2010
by Michael Ley (ley@uni-trier.de)