Library Catalogue
E-Books
E-Databases
E-Databases (Password Protected)
Teacher Resources
Reference Desk
Online Resources
Magazine/Journals
Media Center
Holy Quran
New Books List
 
 
IEEE Internet Computing (May/June) (Vol. 12, No. 3) ISSN: 1089-7801
 

Table of Contents


All Systems Go
The Eye of the Beholder: Whence IC?
Fred Douglis, IBM T.J. Watson Research Center ,pp. 3-5

News & Trends

Should We Stop Trusting Trust? Greg Gothpp. 6-9

Guest Editors' Introduction

Useful Computer Security  Elizabeth Churchill, Yahoo! Research pp. 10-12

Useful Computer Security

A Brief Introduction to Usable Security Bryan D. Payne,  pp. 13-21

Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs
Kirstie Hawkey, University of British Columbia pp. 22-30

Web Ontologies
Using Ontologies and Vocabularies for Dynamic Linking Sean Bechhofer, pp. 32-39

Multimedia System Architectures
IMS Application Servers: Roles, Requirements, and Implementation Technologies Hechmi 40-51

Web Application Development
WebRB: A Different Way to Write Web Applications Avraham Leff,  pp. 52-61

Web-Scale Workflow Track
Unifying Human and Software Services in Web-Scale Collaborations Daniel Schall,  pp. 62-68

E-Commerce Track
Will the Overseas Expansion of Facebook Succeed? Yun Wan,  pp. 69-73

Standards
Discovering Web Services in Search Engines Eyhab Al-Masri pp. 74-77

Architectural Perspectives
Generating Synthetic Data to Match Data Mining Patterns  Josh Eno, Pp. 78-82

Toward Integration
Multilanguage Programming Steve Vinoski, Verivue pp. 83-85

Technology & Society

Net Neutrality... Seriously this Time Daniel J. Weitzner pp. 86-89

Practical Security

Portable Storage and Data Loss Stephen Farrell, Trinity College Dublin pp. 90-93
Peering

The Myth of Open Web Services: The Rise of the Service Parks Charles Petrie, pp. 96, 94-95