scispace - formally typeset
Search or ask a question
Topic

Internet appliance

About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.


Papers
More filters
Proceedings ArticleDOI
Mark Yeary1, B. Swan, James F. Sweeney, C. Culp, L. Archer 
21 May 2001
TL;DR: The solution presented here to accomplish these goals is to include a miniature Web server in a remote-logging module, which is designed as part of the device; thus allowing data to be accessed more frequently, via the Internet.
Abstract: The current energy savings technology relies on conventional data logging systems, in which two major barriers exist. Foremost is the fact that retrieving the energy data is not convenient, and the cost of the data logging equipment is high. The solution presented here to accomplish these goals is to include a miniature Web server in a remote-logging module, which we designed as part of our device; thus allowing data to be accessed more frequently, via the Internet. As it currently stands, the state of California in the United States is experiencing power grid problems as residential and industrial energy demands increase. If an energy savings program is to be implemented, then an energy monitoring strategy must also devised. Our Internet appliance provides a solution, and this paper summarizes our implementation details and provides a computer screen-capture of the data being posted onto the Internet.

10 citations

Journal ArticleDOI
TL;DR: The development of the electronic Internet catalyzed a communications revolution that may compare with the invention of the printing press and has greatly expanded the ability to communicate with one another.
Abstract: The development of the electronic Internet catalyzed a communications revolution that may compare with the invention of the printing press. The Internet has greatly expanded our ability to communicate with one another. Currently, about 1 in 5 Americans have used the Internet. 1 Web addresses are becoming ubiquitous, even on television advertisements and highway billboards. We access the Internet for news, weather, factual information, financial investment, and interpersonal communication.

10 citations

Proceedings ArticleDOI
04 Dec 2006
TL;DR: The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger; (2) phishing or fraud via e-mails; and (3) fake Websites.
Abstract: Mounting popularity of the Internet has led to the birth of instant messaging, an up-and-coming form of Internet communication. Instant messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing Websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make instant messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger; (2) phishing or fraud via e-mails; and (3) fake Websites

10 citations

Journal ArticleDOI
TL;DR: This work describes a standards-based service architecture and its implementation that allows 2-2.5G endpoints to participate as active actors in realizing Internet services like presence and instant messaging without the endpoints themselves being connected to the Internet.
Abstract: The road to 4G runs through 3G, 2G and 2.5G networks. Until 3G is deployed ubiquitously, 2-2.5G networks and endpoints dominate. Because of their widespread deployment and adoption, these endpoints can help ease the transition to an all-Internet 3G/4G network. We describe a standards-based service architecture and its implementation that allows 2-2.5G endpoints to participate as active actors in realizing Internet services like presence and instant messaging without the endpoints themselves being connected to the Internet. Our architecture also demonstrates service migration, wherein a successful 2G service such as short messaging service morphs transparently into its Internet equivalent, an instant message. Our methodology conserves precious radio access bandwidth by offloading such data services from the bandwidth normally allocated to voice. Our approach, as embodied in the service architecture, is to leverage the best of the Internet protocols (SIP, XML) and technologies (instant messaging, presence) to provide a general framework for personalized service specification and execution.

10 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
81% related
Mobile device
58.6K papers, 942.8K citations
77% related
Information system
107.5K papers, 1.8M citations
76% related
Web page
50.3K papers, 975.1K citations
74% related
Mobile computing
51.3K papers, 1M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202215
20211
20202
201814
201770