Skip to main content

Articles

20 result(s) within Volume 4 of Journal of Internet Services and Applications

Page 1 of 1

  1. Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming mu...

    Authors: Yongning Tang, Guang Cheng, James T Yu and Bin Zhang
    Citation: Journal of Internet Services and Applications 2013 4:20
  2. A challenging task in Web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied ...

    Authors: Yanik Ngoko, Alfredo Goldman and Dejan Milojicic
    Citation: Journal of Internet Services and Applications 2013 4:19
  3. Volunteer Computing systems (VC) harness computing resources of machines from around the world to perform distributed independent tasks. Existing infrastructures follow a master/worker model, with a centralize...

    Authors: Fernando Costa, Luís Veiga and Paulo Ferreira
    Citation: Journal of Internet Services and Applications 2013 4:18
  4. With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating t...

    Authors: Khalid Elgazzar, Ali Ejaz and Hossam S Hassanein
    Citation: Journal of Internet Services and Applications 2013 4:17
  5. Applications such as transportation management and logistics, emergency response, environmental monitoring and mobile workforce management employ mobile networks as a means of enabling communication and coordi...

    Authors: Lincoln David, Rafael Vasconcelos, Lucas Alves, Rafael André and Markus Endler
    Citation: Journal of Internet Services and Applications 2013 4:16
  6. This paper presents an investigation into the application of advanced feedback control strategies to provide better web servers quality of service (QoS). Based on differentiated service strategies, fuzzy logic...

    Authors: Malik Loudini, Sawsen Rezig and Yahia Salhi
    Citation: Journal of Internet Services and Applications 2013 4:15
  7. Real-time group communication is an indispensable part of many interactive multimedia applications over the internet. In scenarios that involve large group sizes, sporadic sources, high user churns, and random...

    Authors: Vincent Wing-Hei Luk, Albert Kai-Sun Wong, Chin-Tau Lea and Robin Wentao Ouyang
    Citation: Journal of Internet Services and Applications 2013 4:14
  8. Cookies represent an important element of HTTP providing state management to an otherwise stateless protocol. HTTP cookies currently in use are governed by the same origin policy that directs Web browsers to a...

    Authors: Paul Rabinovich
    Citation: Journal of Internet Services and Applications 2013 4:13
  9. Today, there is a growing need for organizations to continuously analyze and process large waves of incoming data from the Internet. Such data processing schemes are often governed by complex dataflow systems,...

    Authors: Sérgio Esteves, João Nuno Silva and Luís Veiga
    Citation: Journal of Internet Services and Applications 2013 4:12
  10. Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Ba...

    Authors: Christian Senk
    Citation: Journal of Internet Services and Applications 2013 4:11
  11. With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and comp...

    Authors: Milad Daivandy, Denis Hünich, René Jäkel, Steffen Metzger, Ralph Müller-Pfefferkorn and Bernd Schuller
    Citation: Journal of Internet Services and Applications 2013 4:10
  12. “Pay only for what you use” principle underpins the charging policies of widely used cloud services that are on offer. Ideally for these services, consumers should be in a position to verify the charges billed...

    Authors: Ahmed Mihoob, Carlos Molina-Jimenez and Santosh Shrivastava
    Citation: Journal of Internet Services and Applications 2013 4:8
  13. Organizations face the ever growing challenge of providing security within their IT infrastructures. Static approaches to security, such as perimetral defense, have proven less than effective — and, therefore,...

    Authors: Kleber Stroeh, Edmundo Roberto Mauro Madeira and Siome Klein Goldenstein
    Citation: Journal of Internet Services and Applications 2013 4:7
  14. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...

    Authors: Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez
    Citation: Journal of Internet Services and Applications 2013 4:5
  15. Super-peer overlay provides an efficient way to run applications by exploring the heterogeneity of nodes in a Peer-to-Peer overlay network. Identifying nodes with high capacity as super-peers plays an importan...

    Authors: Meirong Liu, Erkki Harjula and Mika Ylianttila
    Citation: Journal of Internet Services and Applications 2013 4:4
  16. Network virtualization is a promising technique for building the Internet of the future since it enables the low cost introduction of new features into network elements. An open issue in such virtualization is...

    Authors: Gustavo P Alkmim, Daniel M Batista and Nelson LS da Fonseca
    Citation: Journal of Internet Services and Applications 2013 4:3
  17. The growing ubiquity of Internet and cloud computing is having significant impact on media-related industries. These industries are using the Internet and cloud as a medium to enable creation, search, manageme...

    Authors: Rajiv Ranjan, Karan Mitra and Dimitrios Georgakopoulos
    Citation: Journal of Internet Services and Applications 2013 4:2
  18. The wide variety of scientific user communities work with data since many years and thus have already a wide variety of data infrastructures in production today. The aim of this paper is thus not to create one...

    Authors: Morris Riedel, Peter Wittenburg, Johannes Reetz, Mark van de Sanden, Jedrzej Rybicki, Benedikt von St Vieth, Giuseppe Fiameni, Giacomo Mariani, Alberto Michelini, Claudio Cacciari, Willem Elbers, Daan Broeder, Robert Verkerk, Elena Erastova, Michael Lautenschlaeger, Reinhard Budig…
    Citation: Journal of Internet Services and Applications 2013 4:1

Annual Journal Metrics

  • Not applicable

  • This journal is indexed by

    • Scopus
    • Emerging Sources Citation Index
    • EI-Compendex
    • Summon by ProQuest
    • SCImago
    • EBSCO Discovery Dervice
    • Academic OneFile
    • OCLC
    • Summon by ProQuest
    • INSPEC
    • DOAJ
    • DBLP
    • Google Scholar

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline

Associated Societies

The Journal of Internet Services and Applications is an international journal sponsored by:

Brazilian Internet Steering Committee


National Computer Network Lab


Brazilian Computer Society.