Publisher: IEEE Computer Society, Institute of Electrical and Electronics Engineers


Edited for users and developers. Focuses on Internet-based computer applications and enabling technologies in complex, multidisciplinary projects. Addresses Internet services for engineers, scientists, and other professionals, based on the World Wide Web, intelligent agents, and similar technologies. Carries reviewed articles and lively departments that emphasize current practice, case studies, and real-world solutions.

  • Impact factor
    Show impact factor history
    Impact factor
  • 5-year impact
  • Cited half-life
  • Immediacy index
  • Eigenfactor
  • Article influence
  • Website
    IEEE Internet Computing Magazine website
  • Other titles
    IEEE internet computing, Institute of Electrical and Electronics Engineers internet computing, Internet computing
  • ISSN
  • OCLC
  • Material type
    Periodical, Internet resource
  • Document type
    Journal / Magazine / Newspaper, Internet Resource

Publisher details

Institute of Electrical and Electronics Engineers

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Author's pre-print on Author's personal website, employers website or publicly accessible server
    • Author's post-print on Author's server or Institutional server
    • Author's pre-print must be removed upon publication of final version and replaced with either full citation to IEEE work with a Digital Object Identifier or link to article abstract in IEEE Xplore or replaced with Authors post-print
    • Author's pre-print must be accompanied with set-phrase, once submitted to IEEE for publication ("This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible")
    • Author's pre-print must be accompanied with set-phrase, when accepted by IEEE for publication ("(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.")
    • IEEE must be informed as to the electronic address of the pre-print
    • If funding rules apply authors may post Author's post-print version in funder's designated repository
    • Author's Post-print - Publisher copyright and source must be acknowledged with citation (see above set statement)
    • Author's Post-print - Must link to publisher version with DOI
    • Publisher's version/PDF cannot be used
    • Publisher copyright and source must be acknowledged
  • Classification
    ‚Äč green

Publications in this journal

  • IEEE Internet Computing 01/2015;
  • [Show abstract] [Hide abstract]
    ABSTRACT: The OASIS standard Devices Profile for Web Services (DPWS) enables the use of Web services for service-oriented and event-driven Internet of Things (IoT) applications. DPWS has been proven to be an appropriate technology for implementing services on resource-constrained devices. However, the performance of these services has not been well investigated to realize DPWS features such as dynamic discovery and eventing mechanisms for IoT scenarios. Moreover, DPWS introduces considerable overhead due to the use of Simple Object Access Protocol (SOAP) envelopes in exchange messages. We extend the DPWS standard by using a Representational State Transfer (REST) proxy to tackle these problems, creating RESTful Web APIs to pave the way for developers to invest more in this technology.
    IEEE Internet Computing 12/2014;
  • IEEE Internet Computing 11/2014; 18(6).
  • [Show abstract] [Hide abstract]
    ABSTRACT: As modern datacenter networks (DCNs) grow to support hundreds of thousands of servers and beyond, managing network equipment -- such as routers, firewalls, and load balancers -- becomes increasingly complex. Network attributes such as IP address allocations and BGP neighbor relations are scattered among various network engineering groups, which makes troubleshooting the network a cumbersome task. In addition, network vendor diversity leads to an explosion of vendor-specific management systems or single-use automation scripts, limiting network scalability while increasing the time required to perform management tasks. In this article, the authors propose a unified network management system, Switch Manager (SWIM), to cope with the growth by standardizing the language for describing network attributes and unifying the interface for executing management actions on the network equipment.
    IEEE Internet Computing 07/2014; 18(4):30-36.
  • Web 2.0 Security and Privacy (W2SP) Workshop; 05/2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: Memcached is one of the world's largest key-value deployments. This article analyzes the Memcached workload at Facebook, looking at server-side performance, request composition, caching efficacy, and key locality. The observations presented here lead to several design insights and new research directions for key-value caches, such as the relative inadequacy of the least recently used (LRU) replacement policy.
    IEEE Internet Computing 03/2014; 18(2):41-49.
  • IEEE Internet Computing 03/2014; 18(2):63-69.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: To satisfy requirements such as scalability and availability, many of today's applications are distributed systems. But because designing and implementing such systems is inherently difficult, developers are increasingly turning to decades of distributed systems research for guidance. This article briefly explores important areas of distributed systems research along with some classic papers distributed systems developers will find useful.
    IEEE Internet Computing 03/2014; 18(2):3-6.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Gaming as a service (GaaS) is a future trend in the game industry. The authors survey existing platforms that provide cloud gaming services and classify them into three architectural frameworks to analyze their pros and cons and identify research directions. They also examine the features of different game genres to determine the impact they have on systematic design for cloud gaming services. Finally, they provide a vision on GaaS provisioning for mobile devices.
    IEEE Internet Computing 01/2014; 18(3):12-18.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Application platforms in the cloud, also known as platform as a service (PaaS), let developers rapidly implement and deploy Web-based applications. PaaS includes several characteristics that are assumed to positively affect development productivity. Marketing for PaaS usually emphasizes this advantage, but few vendors provide guidance about their products' limitations. The authors' study asked Web application developers about the PaaS characteristics that they perceive as either beneficial or limiting for their own work. Based on these answers, the authors developed an evaluation framework to assess commercial PaaS solutions with regard to their development characteristics. They applied this framework to three commercial products and identified several design choices that either benefit or hinder developer productivity.
    IEEE Internet Computing 01/2014; 18(1):56-64.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Mobile devices are increasingly used for social networking applications, which share data between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. Although decentralized designs for such applications can provide privacy, these designs are difficult to achieve on current devices due to constraints on connectivity, energy, and bandwidth. Contrail is a communication platform that allows decentralized social networks to overcome these challenges. In Contrail, users install content filters that express their interests on their friends' devices; they subsequently receive new data generated by their friends that match the filters. Both data and filters are exchanged between devices via cloud-based relays in encrypted form, giving the cloud no visibility into either. In addition to providing privacy, Contrail enables applications that are highly efficient in terms of both energy and bandwidth.
    IEEE Internet Computing 01/2014; 18(5):44-51.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The characterization of traffic performance in cellular networks from the user viewpoint is a costly process involving a large range of protocols and parameters with complex dependencies. Dealing with this challenge requires cross-layer measurements and correlated analysis. The characterization methodology proposed here supports the collection of key information for troubleshooting IP communications problems and correlating them with propagation issues, such as cell changes or link outages, and resource allocation problems at specific geographical locations. The methodology is based on a monitoring and recording tool for smartphones and a correlation tool chain. With the results obtained from the methodology's deployment, mobile operators, services providers, and mobile developers could gain access to real user experiences and specific users' data to improve radio coverage, adapt services, and customize mobile applications and protocols based on IP to cope with mobility issues in cellular networks.
    IEEE Internet Computing 01/2014; 18(1):12-19.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This special issue focuses on new risks and growing concerns centered around identity, privacy, and deception in the context of Internet-enabled social networks. The four articles in this issue address a range of issues in social networks and can serve as a reference point for this exciting area. Topics include privacy pattern discovery across different social networks, privacy guarantees of decentralized social network architectures, trust pattern discovery, and minimization of offensive content.
    IEEE Internet Computing 01/2014; 18(2):7-9.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This special issue presents recent results on Web and social graph mining, both at the methodological level and on the application side. The goal is to allow researchers to share their experience in this new and multifaceted field, and to help industry in its efforts to provide users with new social networking applications. The articles presented here focus on methods and algorithms for mining, as well as applications of the identified techniques.
    IEEE Internet Computing 01/2014; 18(5):9-10.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Internet governance is a key global policy issue in the world today. The growing global dependence on the Internet increases the importance of its governance processes. In this article, the author discusses a few lessons learned from the process of preparing and running the NETmundial meeting, which discussed Internet governance principles and a roadmap for the future Internet ecosystem.
    IEEE Internet Computing 01/2014; 18(5):65-69.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Understanding the social structures that people implicitly form when playing networked games helps developers create innovative gaming services to benefit both players and operators. But how can we extract and analyze this implicit social structure? The authors' proposed formalism suggests various ways to map interactions to social structure. Applying this formalism to real-world data collected from three game genres reveals the implications of the mappings on in-game and gaming-related services, ranging from network and socially aware player matchmaking to an investigation of social network robustness against player departure.
    IEEE Internet Computing 01/2014; 18(3):36-44.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Increasingly, application and service providers collect data through sensors embedded in smartphones, such as GPS receivers, while mobile operators collect them through the cellular infrastructure. This information is extremely valuable for marketing applications, but also has an incredible potential to benefit society as a whole. At the same time, mobile data are highly personal, so privacy concerns are increasingly at the center of the public debate. Moreover, data aren't just used for understanding the past and the present, but also for predicting our future behavior, activities, and emotional states. So, should we be worried about the privacy of our mobile future? Are big mobile data mining technologies good or evil? This article aims to add elements to this ongoing debate.
    IEEE Internet Computing 01/2014; 18(1):78-81.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The increasing use of mobile devices has resulted in an explosion in mobile Internet traffic. To cope with this growth, mobile network architectures are becoming flatter, and IP mobility support protocols must evolve along with them. The authors propose an IP mobility support protocol that doesn't rely on a single mobility anchor, but rather uses distributed mobility anchors to overcome existing protocols' limitations while providing selective data offloading. They highlight their protocol's main features and strengths through qualitative comparisons and simulations.
    IEEE Internet Computing 01/2014; 18(1):20-29.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Advanced attackers use online social networks to extract useful information about the target organization, including its members and their connections, affiliations, and positions. Socialbots are artificial, machine-operated, social network profiles that connect to real members of an organization, greatly increasing the amount of information an attacker can collect. To connect socialbots, attackers can employ several strategies. The authors' approach hunts socialbots using a carefully chosen monitoring strategy by intelligently selecting organization member profiles and monitoring their activity. Their results demonstrate their method's efficacy--specifically, when attackers know the defense strategy being deployed, the attack they will most likely use is randomly sprayed friend requests, which eventually lead to a low number of connections.
    IEEE Internet Computing 01/2014; 18(5):11-19.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This column critically examines the hypothesis that the Internet is responsible for creating echo chambers, in which groups can seal themselves off from heterodox opinion, via filtering and recommendation technology. Echo chambers are held responsible by many for political polarization, and the growth of extremism, yet the evidence doesn't seem to support this view. Echo chambers certainly exist, and can be detrimental to deliberation and discussion, but equally have a role to play in group formation, solidarity, and identity. The case for intervening in Internet governance to suppress echo chambers is not proven.
    IEEE Internet Computing 01/2014; 18(4):79-83.