Skip to main content

Advertisement

Articles

Page 3 of 5

  1. Content type: Research

    Imagine a network of entities, being it replica servers aiming to minimize the probability of data loss, players of online team-based games and tournaments, or companies that look into co-branding opportunitie...

    Authors: Anna Chmielowiec, Spyros Voulgaris and Maarten van Steen

    Citation: Journal of Internet Services and Applications 2014 5:12

    Published on:

  2. Content type: Research

    Recent years have seen the massive migration of enterprise applications to the cloud. One of the challenges posed by cloud applications is Quality-of-Service (QoS) management, which is the problem of allocatin...

    Authors: Danilo Ardagna, Giuliano Casale, Michele Ciavotta, Juan F Pérez and Weikun Wang

    Citation: Journal of Internet Services and Applications 2014 5:11

    Published on:

  3. Content type: Research

    A human computation system can be viewed as a distributed system in which the processors are humans, called workers. Such systems harness the cognitive power of a group of workers connected to the Internet to ...

    Authors: Lesandro Ponciano, Francisco Brasileiro, Nazareno Andrade and Lívia Sampaio

    Citation: Journal of Internet Services and Applications 2014 5:10

    Published on:

  4. Content type: Research Article

    Social media platforms have democratized the process of web content creation allowing mere consumers to become creators and distributors of content. But this has also contributed to an explosive growth of info...

    Authors: Alexandru Tatar, Marcelo Dias de Amorim, Serge Fdida and Panayotis Antoniadis

    Citation: Journal of Internet Services and Applications 2014 5:8

    Published on:

  5. Content type: Research Article

    Execution of critical services traditionally requires multiple distinct replicas, supported by independent networks and hardware. To operate properly, these services often depend on the correctness of a fracti...

    Authors: Filipe Araujo, Serhiy Boychenko, Raul Barbosa and António Casimiro

    Citation: Journal of Internet Services and Applications 2014 5:7

    Published on:

  6. Content type: Research

    Healthcare concerns have become diverse, ranging from acute and chronic conditions to lifestyle, wellbeing and the prevention of illness. Increasingly, individuals are taking responsibility for monitoring thei...

    Authors: Jatinder Singh and Jean M Bacon

    Citation: Journal of Internet Services and Applications 2014 5:6

    Published on:

  7. Content type: Research

    Broadcast is one of the core building blocks of many services deployed on ad-hoc wireless networks, such as Mobile Ad-Hoc Networks (MANETs) or Wireless Sensor Networks (WSNs). Most broadcast protocols are howe...

    Authors: Christopher Winstanley, Rajiv Ramdhany, François Taïani, Barry Porter and Hugo Miranda

    Citation: Journal of Internet Services and Applications 2014 5:5

    Published on:

  8. Content type: Research

    Applications such as Facebook, Twitter and Foursquare have brought the mass adoption of personal short messages, distributed in (soft) real-time on the Internet to a large number of users. These messages are c...

    Authors: Pedro Alves and Paulo Ferreira

    Citation: Journal of Internet Services and Applications 2014 5:4

    Published on:

  9. Content type: Research

    Student authentication in online learning environments is an increasingly challenging issue due to the inherent absence of physical interaction with online users and potential security threats to online examin...

    Authors: Abrar Ullah, Hannan Xiao, Trevor Barker and Mariana Lilley

    Citation: Journal of Internet Services and Applications 2014 5:2

    Published on:

  10. Content type: Research

    Software-as-a-Service (SaaS) is a type of cloud computing in which a tenant rents access to a shared, typically web-based application hosted by a provider. Access control for SaaS should enable the tenant to c...

    Authors: Maarten Decat, Bert Lagaisse and Wouter Joosen

    Citation: Journal of Internet Services and Applications 2014 5:1

    Published on:

  11. Content type: Research

    Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming mu...

    Authors: Yongning Tang, Guang Cheng, James T Yu and Bin Zhang

    Citation: Journal of Internet Services and Applications 2013 4:20

    Published on:

  12. Content type: Research

    A challenging task in Web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied ...

    Authors: Yanik Ngoko, Alfredo Goldman and Dejan Milojicic

    Citation: Journal of Internet Services and Applications 2013 4:19

    Published on:

  13. Content type: Research

    Volunteer Computing systems (VC) harness computing resources of machines from around the world to perform distributed independent tasks. Existing infrastructures follow a master/worker model, with a centralize...

    Authors: Fernando Costa, Luís Veiga and Paulo Ferreira

    Citation: Journal of Internet Services and Applications 2013 4:18

    Published on:

  14. Content type: Research

    With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating t...

    Authors: Khalid Elgazzar, Ali Ejaz and Hossam S Hassanein

    Citation: Journal of Internet Services and Applications 2013 4:17

    Published on:

  15. Content type: Research

    Applications such as transportation management and logistics, emergency response, environmental monitoring and mobile workforce management employ mobile networks as a means of enabling communication and coordi...

    Authors: Lincoln David, Rafael Vasconcelos, Lucas Alves, Rafael André and Markus Endler

    Citation: Journal of Internet Services and Applications 2013 4:16

    Published on:

  16. Content type: Research

    This paper presents an investigation into the application of advanced feedback control strategies to provide better web servers quality of service (QoS). Based on differentiated service strategies, fuzzy logic...

    Authors: Malik Loudini, Sawsen Rezig and Yahia Salhi

    Citation: Journal of Internet Services and Applications 2013 4:15

    Published on:

  17. Content type: Research

    Real-time group communication is an indispensable part of many interactive multimedia applications over the internet. In scenarios that involve large group sizes, sporadic sources, high user churns, and random...

    Authors: Vincent Wing-Hei Luk, Albert Kai-Sun Wong, Chin-Tau Lea and Robin Wentao Ouyang

    Citation: Journal of Internet Services and Applications 2013 4:14

    Published on:

  18. Content type: Research

    Cookies represent an important element of HTTP providing state management to an otherwise stateless protocol. HTTP cookies currently in use are governed by the same origin policy that directs Web browsers to a...

    Authors: Paul Rabinovich

    Citation: Journal of Internet Services and Applications 2013 4:13

    Published on:

  19. Content type: Research

    Today, there is a growing need for organizations to continuously analyze and process large waves of incoming data from the Internet. Such data processing schemes are often governed by complex dataflow systems,...

    Authors: Sérgio Esteves, João Nuno Silva and Luís Veiga

    Citation: Journal of Internet Services and Applications 2013 4:12

    Published on:

  20. Content type: Research

    Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Ba...

    Authors: Christian Senk

    Citation: Journal of Internet Services and Applications 2013 4:11

    Published on:

  21. Content type: Research

    With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and comp...

    Authors: Milad Daivandy, Denis Hünich, René Jäkel, Steffen Metzger, Ralph Müller-Pfefferkorn and Bernd Schuller

    Citation: Journal of Internet Services and Applications 2013 4:10

    Published on:

  22. Content type: Research

    “Pay only for what you use” principle underpins the charging policies of widely used cloud services that are on offer. Ideally for these services, consumers should be in a position to verify the charges billed...

    Authors: Ahmed Mihoob, Carlos Molina-Jimenez and Santosh Shrivastava

    Citation: Journal of Internet Services and Applications 2013 4:8

    Published on:

  23. Content type: Research

    Organizations face the ever growing challenge of providing security within their IT infrastructures. Static approaches to security, such as perimetral defense, have proven less than effective — and, therefore,...

    Authors: Kleber Stroeh, Edmundo Roberto Mauro Madeira and Siome Klein Goldenstein

    Citation: Journal of Internet Services and Applications 2013 4:7

    Published on:

  24. Content type: Research

    Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...

    Authors: Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez

    Citation: Journal of Internet Services and Applications 2013 4:5

    Published on:

  25. Content type: Research

    Super-peer overlay provides an efficient way to run applications by exploring the heterogeneity of nodes in a Peer-to-Peer overlay network. Identifying nodes with high capacity as super-peers plays an importan...

    Authors: Meirong Liu, Erkki Harjula and Mika Ylianttila

    Citation: Journal of Internet Services and Applications 2013 4:4

    Published on:

  26. Content type: Research

    Network virtualization is a promising technique for building the Internet of the future since it enables the low cost introduction of new features into network elements. An open issue in such virtualization is...

    Authors: Gustavo P Alkmim, Daniel M Batista and Nelson LS da Fonseca

    Citation: Journal of Internet Services and Applications 2013 4:3

    Published on:

  27. Content type: Research

    The growing ubiquity of Internet and cloud computing is having significant impact on media-related industries. These industries are using the Internet and cloud as a medium to enable creation, search, manageme...

    Authors: Rajiv Ranjan, Karan Mitra and Dimitrios Georgakopoulos

    Citation: Journal of Internet Services and Applications 2013 4:2

    Published on:

  28. Content type: Research

    The wide variety of scientific user communities work with data since many years and thus have already a wide variety of data infrastructures in production today. The aim of this paper is thus not to create one...

    Authors: Morris Riedel, Peter Wittenburg, Johannes Reetz, Mark van de Sanden, Jedrzej Rybicki, Benedikt von St Vieth, Giuseppe Fiameni, Giacomo Mariani, Alberto Michelini, Claudio Cacciari, Willem Elbers, Daan Broeder, Robert Verkerk, Elena Erastova, Michael Lautenschlaeger, Reinhard Budig…

    Citation: Journal of Internet Services and Applications 2013 4:1

    Published on:

  29. Content type: SI: Data Intensive Computing

    Morlet continuous wavelet transform (MCWT) has been widely used to process non-stationary electro-encephalogram (EEG) data. Nowadays, the MCWT application for processing EEG data is time-sensitive and data-int...

    Authors: Ze Deng, Dan Chen, Yangyang Hu, Xiaoming Wu, Weizhou Peng and Xiaoli Li

    Citation: Journal of Internet Services and Applications 2012 3:71

    Published on:

  30. Content type: Original Paper

    Future Internet technologies and the deployment of mobile and nomadic services enable complex communications networks, that have a highly dynamic behavior. This naturally engenders route-discovery problems und...

    Authors: Sandeep Bhadra and Afonso Ferreira

    Citation: Journal of Internet Services and Applications 2012 3:73

    Published on:

  31. Content type: SI: Data Intensive Computing

    Cycle sharing over the Internet has increased in popularity during the last decade, with increasingly powerful machines being made available to existing projects. In this paper, we present GiGi-MR, a framework...

    Authors: Fernando Costa, João Nuno Silva, Luís Veiga and Paulo Ferreira

    Citation: Journal of Internet Services and Applications 2012 3:72

    Published on:

  32. Content type: SI: Data Intensive Computing

    The massive increase in data volume with the development of computation capability has outmoded compute-intensive clusters for the analysis of large-scale datasets due to the network bottleneck caused by the l...

    Authors: Qiangju Xiao, Pengju Shang and Jun Wang

    Citation: Journal of Internet Services and Applications 2012 3:69

    Published on:

  33. Content type: SI: Middleware ’10 best workshop papers

    Today there are many location technologies providing people or object location. However, location privacy must be ensured before providing widely disseminated location services. Privacy rules may depend not on...

    Authors: José Simão, Carlos Ribeiro, Paulo Ferreira and Luís Veiga

    Citation: Journal of Internet Services and Applications 2012 3:65

    Published on:

  34. Content type: SI: Network Virtualization

    In this paper, a distributed controller for a virtualized router is proposed. This controller enables the dynamic and automatic resource allocation between the different virtual routers (called slices) running...

    Authors: H. Mellah, O. Cherkaoui and Y. Lemieux

    Citation: Journal of Internet Services and Applications 2012 3:70

    Published on:

  35. Content type: Original Paper

    Nowadays e-mail spam is not a novelty, but it is still an important rising problem with a big economic impact in society. Spammers manage to circumvent current spam filters and harm the communication system by...

    Authors: Tiago A. Almeida and Akebo Yamakami

    Citation: Journal of Internet Services and Applications 2012 3:67

    Published on:

  36. Content type: Original Paper

    In many situations, searching the web is synonymous to information seeking. Currently, web search engines are the most popular vehicle via which people get access to the web. Their popularity is partially due ...

    Authors: Ioannis Papadakis, Michalis Stefanidakis, Sofia Stamou and Ioannis Andreou

    Citation: Journal of Internet Services and Applications 2012 3:68

    Published on:

  37. Content type: SI: Middleware ’10 best workshop papers

    Runtime reconfigurable component models provide several attractions with regard to the management of wireless sensor network (WSN) applications operating in dynamic environments and under evolving application ...

    Authors: Klaas Thoelen, Danny Hughes, Nelson Matthys, Lei Fang, Simon Dobson, Yizhou Qiang, Wei Bai, Ka Lok Man, Sheng-Uei Guan, Davy Preuveneers, Sam Michiels, Christophe Huygens and Wouter Joosen

    Citation: Journal of Internet Services and Applications 2012 3:64

    Published on:

  38. Content type: Original Paper

    Within modern internet infrastructure including networks that are ubiquitous, there is often a need for delegatable communication between nodes without compromising the confidentiality of information. In pract...

    Authors: Wei-Chuen Yau, Raphael C. -W. Phan, Swee-Huay Heng and Bok-Min Goi

    Citation: Journal of Internet Services and Applications 2012 3:63

    Published on:

  39. Content type: Original Paper

    With the growth, ready availability and affordability of wireless technologies, proactive context-aware recommendations are a potential solution to overcome the information overload and the common limitations ...

    Authors: Kam Fung Yeung, Yanyan Yang and David Ndzi

    Citation: Journal of Internet Services and Applications 2012 3:61

    Published on:

  40. Content type: Original Paper

    The use of Web services in enterprise applications is quickly increasing. In a Web services environment, providers supply a set of services for consumers. However, although Web services are being used in busin...

    Authors: Nuno Laranjeiro, Marco Vieira and Henrique Madeira

    Citation: Journal of Internet Services and Applications 2012 3:62

    Published on:

  41. Content type: SI: Middleware ’10 best workshop papers

    With the increasing use of autonomic computing technologies, a Java Enterprise Edition (JEE) application server is implemented with more and more adaptive computations for self-managing the Middleware as well ...

    Authors: Ying Zhang, Gang Huang, Xuanzhe Liu and Hong Mei

    Citation: Journal of Internet Services and Applications 2012 3:60

    Published on:

  42. Content type: Original Paper

    One main issue associated with the efficient and effective use of heterogeneous resources in a grid system is the scheduling. Scheduling in a grid system involves a number of challenging issues mainly due to t...

    Authors: Fábio Favarim, Joni da Silva Fraga and Lau Cheuk Lung

    Citation: Journal of Internet Services and Applications 2012 3:56

    Published on:

  43. Content type: Original Paper

    The exposure of business applications to the web has considerably increased the variability of its workload patterns and volumes as the number of users/customers often grows and shrinks at various rates and ti...

    Authors: Basem Suleiman, Sherif Sakr, Ross Jeffery and Anna Liu

    Citation: Journal of Internet Services and Applications 2011 3:50

    Published on:

Annual Journal Metrics

  • Speed
    93 days to first decision for reviewed manuscripts only
    71 days to first decision for all manuscripts
    175 days from submission to acceptance
    67 days from acceptance to publication

    Citation Impact
    1.544 - Source Normalized Impact per Paper (SNIP)
    0.397 - SCImago Journal Rank (SJR)
    3.24 - CiteScore

    Usage 
    16,4608 downloads
    208 Altmetric mentions

  • This journal is indexed by

    • Scopus
    • Emerging Sources Citation Index
    • EI-Compendex
    • Summon by ProQuest
    • SCImago
    • EBSCO Discovery Dervice
    • Academic OneFile
    • OCLC
    • Summon by ProQuest
    • INSPEC
    • DOAJ
    • DBLP
    • Google Scholar

Latest Tweets

Associated Societies

The Journal of Internet Services and Applications is an international journal sponsored by:

Brazilian Internet Steering Committee


National Computer Network Lab


Brazilian Computer Society.


Advertisement