Skip to main content

Articles

Page 4 of 5

  1. Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Ba...

    Authors: Christian Senk
    Citation: Journal of Internet Services and Applications 2013 4:11
  2. With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and comp...

    Authors: Milad Daivandy, Denis Hünich, René Jäkel, Steffen Metzger, Ralph Müller-Pfefferkorn and Bernd Schuller
    Citation: Journal of Internet Services and Applications 2013 4:10
  3. “Pay only for what you use” principle underpins the charging policies of widely used cloud services that are on offer. Ideally for these services, consumers should be in a position to verify the charges billed...

    Authors: Ahmed Mihoob, Carlos Molina-Jimenez and Santosh Shrivastava
    Citation: Journal of Internet Services and Applications 2013 4:8
  4. Organizations face the ever growing challenge of providing security within their IT infrastructures. Static approaches to security, such as perimetral defense, have proven less than effective — and, therefore,...

    Authors: Kleber Stroeh, Edmundo Roberto Mauro Madeira and Siome Klein Goldenstein
    Citation: Journal of Internet Services and Applications 2013 4:7
  5. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...

    Authors: Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez
    Citation: Journal of Internet Services and Applications 2013 4:5
  6. Super-peer overlay provides an efficient way to run applications by exploring the heterogeneity of nodes in a Peer-to-Peer overlay network. Identifying nodes with high capacity as super-peers plays an importan...

    Authors: Meirong Liu, Erkki Harjula and Mika Ylianttila
    Citation: Journal of Internet Services and Applications 2013 4:4
  7. Network virtualization is a promising technique for building the Internet of the future since it enables the low cost introduction of new features into network elements. An open issue in such virtualization is...

    Authors: Gustavo P Alkmim, Daniel M Batista and Nelson LS da Fonseca
    Citation: Journal of Internet Services and Applications 2013 4:3
  8. The growing ubiquity of Internet and cloud computing is having significant impact on media-related industries. These industries are using the Internet and cloud as a medium to enable creation, search, manageme...

    Authors: Rajiv Ranjan, Karan Mitra and Dimitrios Georgakopoulos
    Citation: Journal of Internet Services and Applications 2013 4:2
  9. The wide variety of scientific user communities work with data since many years and thus have already a wide variety of data infrastructures in production today. The aim of this paper is thus not to create one...

    Authors: Morris Riedel, Peter Wittenburg, Johannes Reetz, Mark van de Sanden, Jedrzej Rybicki, Benedikt von St Vieth, Giuseppe Fiameni, Giacomo Mariani, Alberto Michelini, Claudio Cacciari, Willem Elbers, Daan Broeder, Robert Verkerk, Elena Erastova, Michael Lautenschlaeger, Reinhard Budig…
    Citation: Journal of Internet Services and Applications 2013 4:1
  10. Morlet continuous wavelet transform (MCWT) has been widely used to process non-stationary electro-encephalogram (EEG) data. Nowadays, the MCWT application for processing EEG data is time-sensitive and data-int...

    Authors: Ze Deng, Dan Chen, Yangyang Hu, Xiaoming Wu, Weizhou Peng and Xiaoli Li
    Citation: Journal of Internet Services and Applications 2012 3:71
  11. Future Internet technologies and the deployment of mobile and nomadic services enable complex communications networks, that have a highly dynamic behavior. This naturally engenders route-discovery problems und...

    Authors: Sandeep Bhadra and Afonso Ferreira
    Citation: Journal of Internet Services and Applications 2012 3:73
  12. Cycle sharing over the Internet has increased in popularity during the last decade, with increasingly powerful machines being made available to existing projects. In this paper, we present GiGi-MR, a framework...

    Authors: Fernando Costa, João Nuno Silva, Luís Veiga and Paulo Ferreira
    Citation: Journal of Internet Services and Applications 2012 3:72
  13. The massive increase in data volume with the development of computation capability has outmoded compute-intensive clusters for the analysis of large-scale datasets due to the network bottleneck caused by the l...

    Authors: Qiangju Xiao, Pengju Shang and Jun Wang
    Citation: Journal of Internet Services and Applications 2012 3:69
  14. Today there are many location technologies providing people or object location. However, location privacy must be ensured before providing widely disseminated location services. Privacy rules may depend not on...

    Authors: José Simão, Carlos Ribeiro, Paulo Ferreira and Luís Veiga
    Citation: Journal of Internet Services and Applications 2012 3:65
  15. In this paper, a distributed controller for a virtualized router is proposed. This controller enables the dynamic and automatic resource allocation between the different virtual routers (called slices) running...

    Authors: H. Mellah, O. Cherkaoui and Y. Lemieux
    Citation: Journal of Internet Services and Applications 2012 3:70
  16. Nowadays e-mail spam is not a novelty, but it is still an important rising problem with a big economic impact in society. Spammers manage to circumvent current spam filters and harm the communication system by...

    Authors: Tiago A. Almeida and Akebo Yamakami
    Citation: Journal of Internet Services and Applications 2012 3:67
  17. In many situations, searching the web is synonymous to information seeking. Currently, web search engines are the most popular vehicle via which people get access to the web. Their popularity is partially due ...

    Authors: Ioannis Papadakis, Michalis Stefanidakis, Sofia Stamou and Ioannis Andreou
    Citation: Journal of Internet Services and Applications 2012 3:68
  18. Runtime reconfigurable component models provide several attractions with regard to the management of wireless sensor network (WSN) applications operating in dynamic environments and under evolving application ...

    Authors: Klaas Thoelen, Danny Hughes, Nelson Matthys, Lei Fang, Simon Dobson, Yizhou Qiang, Wei Bai, Ka Lok Man, Sheng-Uei Guan, Davy Preuveneers, Sam Michiels, Christophe Huygens and Wouter Joosen
    Citation: Journal of Internet Services and Applications 2012 3:64
  19. Within modern internet infrastructure including networks that are ubiquitous, there is often a need for delegatable communication between nodes without compromising the confidentiality of information. In pract...

    Authors: Wei-Chuen Yau, Raphael C. -W. Phan, Swee-Huay Heng and Bok-Min Goi
    Citation: Journal of Internet Services and Applications 2012 3:63
  20. With the growth, ready availability and affordability of wireless technologies, proactive context-aware recommendations are a potential solution to overcome the information overload and the common limitations ...

    Authors: Kam Fung Yeung, Yanyan Yang and David Ndzi
    Citation: Journal of Internet Services and Applications 2012 3:61
  21. The use of Web services in enterprise applications is quickly increasing. In a Web services environment, providers supply a set of services for consumers. However, although Web services are being used in busin...

    Authors: Nuno Laranjeiro, Marco Vieira and Henrique Madeira
    Citation: Journal of Internet Services and Applications 2012 3:62
  22. With the increasing use of autonomic computing technologies, a Java Enterprise Edition (JEE) application server is implemented with more and more adaptive computations for self-managing the Middleware as well ...

    Authors: Ying Zhang, Gang Huang, Xuanzhe Liu and Hong Mei
    Citation: Journal of Internet Services and Applications 2012 3:60
  23. Data interoperability is one of the main problems of system interoperability. Indeed, it is estimated that the cost of data interoperability ranges in the billions of dollars every year. The traditional approa...

    Authors: Massimo Paolucci and Berrand Souville
    Citation: Journal of Internet Services and Applications 2012 3:59
  24. In this paper, we address the role of middleware in enabling robust and resilient cyber-physical systems (CPSs) of the future. In particular, we will focus on how adaptation services can be used to improve dep...

    Authors: Grit Denker, Nikil Dutt, Sharad Mehrotra, Mark-Oliver Stehr, Carolyn Talcott and Nalini Venkatasubramanian
    Citation: Journal of Internet Services and Applications 2012 3:57
  25. One main issue associated with the efficient and effective use of heterogeneous resources in a grid system is the scheduling. Scheduling in a grid system involves a number of challenging issues mainly due to t...

    Authors: Fábio Favarim, Joni da Silva Fraga and Lau Cheuk Lung
    Citation: Journal of Internet Services and Applications 2012 3:56
  26. Key concepts of reliable distributed computing developed during the 1980s and 1990s (e.g., transactions, replication) influenced the standards based middleware such as CORBA and Java EE. This middleware has ev...

    Authors: Mark Little, Santosh Shrivastava and Stuart Wheater
    Citation: Journal of Internet Services and Applications 2011 3:55
  27. Cloud computing is by far the most cost-effective technology for hosting Internet-scale services and applications. The MapReduce model, in particular, is largely used nowadays in Cloud infrastructures to meet ...

    Authors: Raouf Boutaba, Lu Cheng and Qi Zhang
    Citation: Journal of Internet Services and Applications 2011 3:54
  28. Cloud computing offers a number of benefits, such as elasticity with the perception of unlimited resources, self-service, on-demand, automation, etc. However, these benefits create new requirements for managem...

    Authors: Nigel Cook, Dejan Milojicic and Vanish Talwar
    Citation: Journal of Internet Services and Applications 2011 3:53
  29. Highly complex distributed systems (HCDSs) are characterized by a large number of mission-critical, heterogeneous inter-dependent subsystems executing concurrently with diverse—often conflicting—quality-of-ser...

    Authors: Jules White, Brian Dougherty, Richard Schantz, Douglas C. Schmidt, Adam Porter and Angelo Corsaro
    Citation: Journal of Internet Services and Applications 2011 3:51
  30. In this paper, we explore the integration of evolutionary computation into the development and run-time support of dynamically-adaptable, high-assurance middleware. The open-ended nature of the evolutionary pr...

    Authors: Philip K. McKinley, Betty H. C. Cheng, Andres J. Ramirez and Adam C. Jensen
    Citation: Journal of Internet Services and Applications 2011 3:49
  31. Coordinating the networks needed for modern scientific data collection and control presents a significant challenge: they are typically power- and resource-constrained, operating in noisy and hostile environme...

    Authors: Alan Dearle and Simon Dobson
    Citation: Journal of Internet Services and Applications 2011 3:52
  32. The exposure of business applications to the web has considerably increased the variability of its workload patterns and volumes as the number of users/customers often grows and shrinks at various rates and ti...

    Authors: Basem Suleiman, Sherif Sakr, Ross Jeffery and Anna Liu
    Citation: Journal of Internet Services and Applications 2011 3:50
  33. Contemporary middleware must facilitate the customization of a built-in services framework, such that non-functional requirements emerging from the engineering process are met. This must be achieved by facilit...

    Authors: Wouter Joosen, Bert Lagaisse, Eddy Truyen and Koen Handekyn
    Citation: Journal of Internet Services and Applications 2011 3:47
  34. This paper considers mission assurance for critical cloud applications, a set of applications with growing importance to governments and military organizations. Specifically, we consider applications in which ...

    Authors: Roy H. Campbell, Mirko Montanari and Reza Farivar
    Citation: Journal of Internet Services and Applications 2011 3:44
  35. What is a highly complex distributed system in the future era? What are the needs that may drive the development of such systems? And what is their life cycle? Is there any new challenge for Software Engineeri...

    Authors: Marco Autili, Paola Inverardi, Patrizio Pelliccione and Massimo Tivoli
    Citation: Journal of Internet Services and Applications 2011 3:48
  36. In modern distributed computing, applications are rarely built directly atop operating system facilities, e.g., sockets. Higher-level middleware abstractions and systems are often employed to simplify the program...

    Authors: Luca Mottola and Gian Pietro Picco
    Citation: Journal of Internet Services and Applications 2011 3:46
  37. Social computing broadly refers to supporting social behaviours using computational systems. In the last decade, the advent of Web 2.0 and its social networking services, wikis, blogs, and social bookmarking h...

    Authors: Licia Capra and Daniele Quercia
    Citation: Journal of Internet Services and Applications 2011 3:45
  38. Many modern distributed systems are required to scale in terms of their support for processes, resources, and users. Moreover, a system is often also required to operate across the Internet and across differen...

    Authors: Maarten van Steen, Guillaume Pierre and Spyros Voulgaris
    Citation: Journal of Internet Services and Applications 2011 3:43
  39. Programming languages have long impacted the development of distributed systems. While much middleware and distributed systems code continues to be developed today using mainstream languages such as Java and C...

    Authors: Debasish Ghosh, Justin Sheehy, Kresten Krab Thorup and Steve Vinoski
    Citation: Journal of Internet Services and Applications 2011 3:42
  40. We analyzed how reliability will be improved by adopting inter-domain multi-path and multi-homing routing when the structure in the Internet changes. We identified the properties of the ideal network structure...

    Authors: Hiroshi Fujinoki and Andrew Hauck
    Citation: Journal of Internet Services and Applications 2011 2:39
  41. The vision of millions of users launching tens of millions of applications running on millions of globally scattered servers presents a new challenge for Cloud Providers: how to assign so many virtual applicat...

    Authors: Caroline Shouraboura and Pavel Bleher
    Citation: Journal of Internet Services and Applications 2011 2:37
  42. Cloud computing has drawn much attention in recent years. One of its service models, called infrastructure as a service (IaaS), provides users with infrastructure services such as computation and data storage,...

    Authors: Dongwan Shin, Hakan Akkan, William Claycomb and Kwanjoong Kim
    Citation: Journal of Internet Services and Applications 2011 2:35
  43. Authors: Valérie Issarny, Nikolaos Georgantas, Sara Hachem, Apostolos Zarras, Panos Vassiliadis, Marco Autili, Marco Aurélio Gerosa and Amira Ben Hamida
    Citation: Journal of Internet Services and Applications 2011 2:29

    The original article was published in Journal of Internet Services and Applications 2011 2:s13174-011-0021-3

Annual Journal Metrics

  • Not applicable

  • This journal is indexed by

    • Scopus
    • Emerging Sources Citation Index
    • EI-Compendex
    • Summon by ProQuest
    • SCImago
    • EBSCO Discovery Dervice
    • Academic OneFile
    • OCLC
    • Summon by ProQuest
    • INSPEC
    • DOAJ
    • DBLP
    • Google Scholar

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline

Associated Societies

The Journal of Internet Services and Applications is an international journal sponsored by:

Brazilian Internet Steering Committee


National Computer Network Lab


Brazilian Computer Society.