Skip to main content

Advertisement

Articles

Page 3 of 5

  1. Network virtualization has become increasingly prominent in recent years. It enables the creation of network infrastructures that are specifically tailored to the needs of distinct network applications and sup...

    Authors: Leonardo Richter Bays, Rodrigo Ruas Oliveira, Marinho Pilla Barcellos, Luciano Paschoal Gaspary and Edmundo Roberto Mauro Madeira

    Citation: Journal of Internet Services and Applications 2015 6:1

    Content type: Research

    Published on:

  2. Hybrid cloud deployment offers flexibility in trade-offs between the cost-savings/scalability of the public cloud and control over data resources provided at a private premise. However, this flexibility comes ...

    Authors: Nima Kaviani, Eric Wohlstadter and Rodger Lea

    Citation: Journal of Internet Services and Applications 2014 5:14

    Content type: Research

    Published on:

  3. Imagine a network of entities, being it replica servers aiming to minimize the probability of data loss, players of online team-based games and tournaments, or companies that look into co-branding opportunitie...

    Authors: Anna Chmielowiec, Spyros Voulgaris and Maarten van Steen

    Citation: Journal of Internet Services and Applications 2014 5:12

    Content type: Research

    Published on:

  4. Recent years have seen the massive migration of enterprise applications to the cloud. One of the challenges posed by cloud applications is Quality-of-Service (QoS) management, which is the problem of allocatin...

    Authors: Danilo Ardagna, Giuliano Casale, Michele Ciavotta, Juan F Pérez and Weikun Wang

    Citation: Journal of Internet Services and Applications 2014 5:11

    Content type: Research

    Published on:

  5. A human computation system can be viewed as a distributed system in which the processors are humans, called workers. Such systems harness the cognitive power of a group of workers connected to the Internet to ...

    Authors: Lesandro Ponciano, Francisco Brasileiro, Nazareno Andrade and Lívia Sampaio

    Citation: Journal of Internet Services and Applications 2014 5:10

    Content type: Research

    Published on:

  6. Social media platforms have democratized the process of web content creation allowing mere consumers to become creators and distributors of content. But this has also contributed to an explosive growth of info...

    Authors: Alexandru Tatar, Marcelo Dias de Amorim, Serge Fdida and Panayotis Antoniadis

    Citation: Journal of Internet Services and Applications 2014 5:8

    Content type: Research Article

    Published on:

  7. Execution of critical services traditionally requires multiple distinct replicas, supported by independent networks and hardware. To operate properly, these services often depend on the correctness of a fracti...

    Authors: Filipe Araujo, Serhiy Boychenko, Raul Barbosa and António Casimiro

    Citation: Journal of Internet Services and Applications 2014 5:7

    Content type: Research Article

    Published on:

  8. Healthcare concerns have become diverse, ranging from acute and chronic conditions to lifestyle, wellbeing and the prevention of illness. Increasingly, individuals are taking responsibility for monitoring thei...

    Authors: Jatinder Singh and Jean M Bacon

    Citation: Journal of Internet Services and Applications 2014 5:6

    Content type: Research

    Published on:

  9. Broadcast is one of the core building blocks of many services deployed on ad-hoc wireless networks, such as Mobile Ad-Hoc Networks (MANETs) or Wireless Sensor Networks (WSNs). Most broadcast protocols are howe...

    Authors: Christopher Winstanley, Rajiv Ramdhany, François Taïani, Barry Porter and Hugo Miranda

    Citation: Journal of Internet Services and Applications 2014 5:5

    Content type: Research

    Published on:

  10. Applications such as Facebook, Twitter and Foursquare have brought the mass adoption of personal short messages, distributed in (soft) real-time on the Internet to a large number of users. These messages are c...

    Authors: Pedro Alves and Paulo Ferreira

    Citation: Journal of Internet Services and Applications 2014 5:4

    Content type: Research

    Published on:

  11. Student authentication in online learning environments is an increasingly challenging issue due to the inherent absence of physical interaction with online users and potential security threats to online examin...

    Authors: Abrar Ullah, Hannan Xiao, Trevor Barker and Mariana Lilley

    Citation: Journal of Internet Services and Applications 2014 5:2

    Content type: Research

    Published on:

  12. Software-as-a-Service (SaaS) is a type of cloud computing in which a tenant rents access to a shared, typically web-based application hosted by a provider. Access control for SaaS should enable the tenant to c...

    Authors: Maarten Decat, Bert Lagaisse and Wouter Joosen

    Citation: Journal of Internet Services and Applications 2014 5:1

    Content type: Research

    Published on:

  13. Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming mu...

    Authors: Yongning Tang, Guang Cheng, James T Yu and Bin Zhang

    Citation: Journal of Internet Services and Applications 2013 4:20

    Content type: Research

    Published on:

  14. A challenging task in Web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied ...

    Authors: Yanik Ngoko, Alfredo Goldman and Dejan Milojicic

    Citation: Journal of Internet Services and Applications 2013 4:19

    Content type: Research

    Published on:

  15. Volunteer Computing systems (VC) harness computing resources of machines from around the world to perform distributed independent tasks. Existing infrastructures follow a master/worker model, with a centralize...

    Authors: Fernando Costa, Luís Veiga and Paulo Ferreira

    Citation: Journal of Internet Services and Applications 2013 4:18

    Content type: Research

    Published on:

  16. With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating t...

    Authors: Khalid Elgazzar, Ali Ejaz and Hossam S Hassanein

    Citation: Journal of Internet Services and Applications 2013 4:17

    Content type: Research

    Published on:

  17. Applications such as transportation management and logistics, emergency response, environmental monitoring and mobile workforce management employ mobile networks as a means of enabling communication and coordi...

    Authors: Lincoln David, Rafael Vasconcelos, Lucas Alves, Rafael André and Markus Endler

    Citation: Journal of Internet Services and Applications 2013 4:16

    Content type: Research

    Published on:

  18. This paper presents an investigation into the application of advanced feedback control strategies to provide better web servers quality of service (QoS). Based on differentiated service strategies, fuzzy logic...

    Authors: Malik Loudini, Sawsen Rezig and Yahia Salhi

    Citation: Journal of Internet Services and Applications 2013 4:15

    Content type: Research

    Published on:

  19. Real-time group communication is an indispensable part of many interactive multimedia applications over the internet. In scenarios that involve large group sizes, sporadic sources, high user churns, and random...

    Authors: Vincent Wing-Hei Luk, Albert Kai-Sun Wong, Chin-Tau Lea and Robin Wentao Ouyang

    Citation: Journal of Internet Services and Applications 2013 4:14

    Content type: Research

    Published on:

  20. Cookies represent an important element of HTTP providing state management to an otherwise stateless protocol. HTTP cookies currently in use are governed by the same origin policy that directs Web browsers to a...

    Authors: Paul Rabinovich

    Citation: Journal of Internet Services and Applications 2013 4:13

    Content type: Research

    Published on:

  21. Today, there is a growing need for organizations to continuously analyze and process large waves of incoming data from the Internet. Such data processing schemes are often governed by complex dataflow systems,...

    Authors: Sérgio Esteves, João Nuno Silva and Luís Veiga

    Citation: Journal of Internet Services and Applications 2013 4:12

    Content type: Research

    Published on:

  22. Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Ba...

    Authors: Christian Senk

    Citation: Journal of Internet Services and Applications 2013 4:11

    Content type: Research

    Published on:

  23. With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and comp...

    Authors: Milad Daivandy, Denis Hünich, René Jäkel, Steffen Metzger, Ralph Müller-Pfefferkorn and Bernd Schuller

    Citation: Journal of Internet Services and Applications 2013 4:10

    Content type: Research

    Published on:

  24. “Pay only for what you use” principle underpins the charging policies of widely used cloud services that are on offer. Ideally for these services, consumers should be in a position to verify the charges billed...

    Authors: Ahmed Mihoob, Carlos Molina-Jimenez and Santosh Shrivastava

    Citation: Journal of Internet Services and Applications 2013 4:8

    Content type: Research

    Published on:

  25. Organizations face the ever growing challenge of providing security within their IT infrastructures. Static approaches to security, such as perimetral defense, have proven less than effective — and, therefore,...

    Authors: Kleber Stroeh, Edmundo Roberto Mauro Madeira and Siome Klein Goldenstein

    Citation: Journal of Internet Services and Applications 2013 4:7

    Content type: Research

    Published on:

  26. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...

    Authors: Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez

    Citation: Journal of Internet Services and Applications 2013 4:5

    Content type: Research

    Published on:

  27. Super-peer overlay provides an efficient way to run applications by exploring the heterogeneity of nodes in a Peer-to-Peer overlay network. Identifying nodes with high capacity as super-peers plays an importan...

    Authors: Meirong Liu, Erkki Harjula and Mika Ylianttila

    Citation: Journal of Internet Services and Applications 2013 4:4

    Content type: Research

    Published on:

  28. Network virtualization is a promising technique for building the Internet of the future since it enables the low cost introduction of new features into network elements. An open issue in such virtualization is...

    Authors: Gustavo P Alkmim, Daniel M Batista and Nelson LS da Fonseca

    Citation: Journal of Internet Services and Applications 2013 4:3

    Content type: Research

    Published on:

  29. The growing ubiquity of Internet and cloud computing is having significant impact on media-related industries. These industries are using the Internet and cloud as a medium to enable creation, search, manageme...

    Authors: Rajiv Ranjan, Karan Mitra and Dimitrios Georgakopoulos

    Citation: Journal of Internet Services and Applications 2013 4:2

    Content type: Research

    Published on:

  30. The wide variety of scientific user communities work with data since many years and thus have already a wide variety of data infrastructures in production today. The aim of this paper is thus not to create one...

    Authors: Morris Riedel, Peter Wittenburg, Johannes Reetz, Mark van de Sanden, Jedrzej Rybicki, Benedikt von St Vieth, Giuseppe Fiameni, Giacomo Mariani, Alberto Michelini, Claudio Cacciari, Willem Elbers, Daan Broeder, Robert Verkerk, Elena Erastova, Michael Lautenschlaeger, Reinhard Budig…

    Citation: Journal of Internet Services and Applications 2013 4:1

    Content type: Research

    Published on:

  31. Morlet continuous wavelet transform (MCWT) has been widely used to process non-stationary electro-encephalogram (EEG) data. Nowadays, the MCWT application for processing EEG data is time-sensitive and data-int...

    Authors: Ze Deng, Dan Chen, Yangyang Hu, Xiaoming Wu, Weizhou Peng and Xiaoli Li

    Citation: Journal of Internet Services and Applications 2012 3:71

    Content type: SI: Data Intensive Computing

    Published on:

  32. Future Internet technologies and the deployment of mobile and nomadic services enable complex communications networks, that have a highly dynamic behavior. This naturally engenders route-discovery problems und...

    Authors: Sandeep Bhadra and Afonso Ferreira

    Citation: Journal of Internet Services and Applications 2012 3:73

    Content type: Original Paper

    Published on:

  33. Cycle sharing over the Internet has increased in popularity during the last decade, with increasingly powerful machines being made available to existing projects. In this paper, we present GiGi-MR, a framework...

    Authors: Fernando Costa, João Nuno Silva, Luís Veiga and Paulo Ferreira

    Citation: Journal of Internet Services and Applications 2012 3:72

    Content type: SI: Data Intensive Computing

    Published on:

  34. The massive increase in data volume with the development of computation capability has outmoded compute-intensive clusters for the analysis of large-scale datasets due to the network bottleneck caused by the l...

    Authors: Qiangju Xiao, Pengju Shang and Jun Wang

    Citation: Journal of Internet Services and Applications 2012 3:69

    Content type: SI: Data Intensive Computing

    Published on:

  35. Today there are many location technologies providing people or object location. However, location privacy must be ensured before providing widely disseminated location services. Privacy rules may depend not on...

    Authors: José Simão, Carlos Ribeiro, Paulo Ferreira and Luís Veiga

    Citation: Journal of Internet Services and Applications 2012 3:65

    Content type: SI: Middleware ’10 best workshop papers

    Published on:

  36. In this paper, a distributed controller for a virtualized router is proposed. This controller enables the dynamic and automatic resource allocation between the different virtual routers (called slices) running...

    Authors: H. Mellah, O. Cherkaoui and Y. Lemieux

    Citation: Journal of Internet Services and Applications 2012 3:70

    Content type: SI: Network Virtualization

    Published on:

  37. Nowadays e-mail spam is not a novelty, but it is still an important rising problem with a big economic impact in society. Spammers manage to circumvent current spam filters and harm the communication system by...

    Authors: Tiago A. Almeida and Akebo Yamakami

    Citation: Journal of Internet Services and Applications 2012 3:67

    Content type: Original Paper

    Published on:

  38. In many situations, searching the web is synonymous to information seeking. Currently, web search engines are the most popular vehicle via which people get access to the web. Their popularity is partially due ...

    Authors: Ioannis Papadakis, Michalis Stefanidakis, Sofia Stamou and Ioannis Andreou

    Citation: Journal of Internet Services and Applications 2012 3:68

    Content type: Original Paper

    Published on:

  39. Runtime reconfigurable component models provide several attractions with regard to the management of wireless sensor network (WSN) applications operating in dynamic environments and under evolving application ...

    Authors: Klaas Thoelen, Danny Hughes, Nelson Matthys, Lei Fang, Simon Dobson, Yizhou Qiang, Wei Bai, Ka Lok Man, Sheng-Uei Guan, Davy Preuveneers, Sam Michiels, Christophe Huygens and Wouter Joosen

    Citation: Journal of Internet Services and Applications 2012 3:64

    Content type: SI: Middleware ’10 best workshop papers

    Published on:

  40. Within modern internet infrastructure including networks that are ubiquitous, there is often a need for delegatable communication between nodes without compromising the confidentiality of information. In pract...

    Authors: Wei-Chuen Yau, Raphael C. -W. Phan, Swee-Huay Heng and Bok-Min Goi

    Citation: Journal of Internet Services and Applications 2012 3:63

    Content type: Original Paper

    Published on:

  41. The use of Web services in enterprise applications is quickly increasing. In a Web services environment, providers supply a set of services for consumers. However, although Web services are being used in busin...

    Authors: Nuno Laranjeiro, Marco Vieira and Henrique Madeira

    Citation: Journal of Internet Services and Applications 2012 3:62

    Content type: Original Paper

    Published on:

  42. With the increasing use of autonomic computing technologies, a Java Enterprise Edition (JEE) application server is implemented with more and more adaptive computations for self-managing the Middleware as well ...

    Authors: Ying Zhang, Gang Huang, Xuanzhe Liu and Hong Mei

    Citation: Journal of Internet Services and Applications 2012 3:60

    Content type: SI: Middleware ’10 best workshop papers

    Published on:

  43. One main issue associated with the efficient and effective use of heterogeneous resources in a grid system is the scheduling. Scheduling in a grid system involves a number of challenging issues mainly due to t...

    Authors: Fábio Favarim, Joni da Silva Fraga and Lau Cheuk Lung

    Citation: Journal of Internet Services and Applications 2012 3:56

    Content type: Original Paper

    Published on:

Annual Journal Metrics

  • Speed
    93 days to first decision for reviewed manuscripts only
    71 days to first decision for all manuscripts
    175 days from submission to acceptance
    67 days from acceptance to publication

    Citation Impact
    1.544 - Source Normalized Impact per Paper (SNIP)
    0.397 - SCImago Journal Rank (SJR)
    3.24 - CiteScore

    Usage 
    16,4608 downloads
    208 Altmetric mentions

  • This journal is indexed by

    • Scopus
    • Emerging Sources Citation Index
    • EI-Compendex
    • Summon by ProQuest
    • SCImago
    • EBSCO Discovery Dervice
    • Academic OneFile
    • OCLC
    • Summon by ProQuest
    • INSPEC
    • DOAJ
    • DBLP
    • Google Scholar

Latest Tweets

Associated Societies

The Journal of Internet Services and Applications is an international journal sponsored by:

Brazilian Internet Steering Committee


National Computer Network Lab


Brazilian Computer Society.


Advertisement