scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2003"


Journal ArticleDOI
Jeffrey O. Kephart1, David M. Chess1
TL;DR: A 2001 IBM manifesto noted the almost impossible difficulty of managing current and planned computing systems, which require integrating several heterogeneous environments into corporate-wide computing systems that extend into the Internet.
Abstract: A 2001 IBM manifesto observed that a looming software complexity crisis -caused by applications and environments that number into the tens of millions of lines of code - threatened to halt progress in computing. The manifesto noted the almost impossible difficulty of managing current and planned computing systems, which require integrating several heterogeneous environments into corporate-wide computing systems that extend into the Internet. Autonomic computing, perhaps the most attractive approach to solving this problem, creates systems that can manage themselves when given high-level objectives from administrators. Systems manage themselves according to an administrator's goals. New components integrate as effortlessly as a new cell establishes itself in the human body. These ideas are not science fiction, but elements of the grand challenge to create self-managing computing systems.

6,527 citations


Book
01 Jan 2003
TL;DR: In this paper, Sherry Turkle uses Internet MUDs (multi-user domains, or in older gaming parlance multi-user dungeons) as a launching pad for explorations of software design, user interfaces, simulation, artificial intelligence, artificial life, agents, virtual reality, and the on-line way of life.
Abstract: From the Publisher: A Question of Identity Life on the Screen is a fascinating and wide-ranging investigation of the impact of computers and networking on society, peoples' perceptions of themselves, and the individual's relationship to machines. Sherry Turkle, a Professor of the Sociology of Science at MIT and a licensed psychologist, uses Internet MUDs (multi-user domains, or in older gaming parlance multi-user dungeons) as a launching pad for explorations of software design, user interfaces, simulation, artificial intelligence, artificial life, agents, "bots," virtual reality, and "the on-line way of life." Turkle's discussion of postmodernism is particularly enlightening. She shows how postmodern concepts in art, architecture, and ethics are related to concrete topics much closer to home, for example AI research (Minsky's "Society of Mind") and even MUDs (exemplified by students with X-window terminals who are doing homework in one window and simultaneously playing out several different roles in the same MUD in other windows). Those of you who have (like me) been turned off by the shallow, pretentious, meaningless paintings and sculptures that litter our museums of modern art may have a different perspective after hearing what Turkle has to say. This is a psychoanalytical book, not a technical one. However, software developers and engineers will find it highly accessible because of the depth of the author's technical understanding and credibility. Unlike most other authors in this genre, Turkle does not constantly jar the technically-literate reader with blatant errors or bogus assertions about how things work. Although I personally don't have time or patience for MUDs,view most of AI as snake-oil, and abhor postmodern architecture, I thought the time spent reading this book was an extremely good investment.

4,965 citations


Proceedings ArticleDOI
Kevin Fall1
25 Aug 2003
TL;DR: This work proposes a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources.
Abstract: The highly successful architecture and protocols of today's Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. To achieve interoperability between them, we propose a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources. The architecture operates as an overlay above the transport layers of the networks it interconnects, and provides key services such as in-network data storage and retransmission, interoperable naming, authenticated forwarding and a coarse-grained class of service.

3,511 citations


Journal ArticleDOI
TL;DR: In this paper, the authors show that some factors are better indicators of social connections than others, and that these indicators vary between user populations, and provide potential applications in automatically inferring real world connections and discovering, labeling, and characterizing communities.

2,578 citations


Journal ArticleDOI
TL;DR: Online feedback mechanisms harness the bidirectional communication capabilities of the Internet to engineer large-scale, word-of-mouth networks as discussed by the authors, which has potentially important implications for a wide range of management activities such as brand building, customer acquisition and retention, product development and quality assurance.
Abstract: Online feedback mechanisms harness the bidirectional communication capabilities of the Internet to engineer large-scale, word-of-mouth networks. Best known so far as a technology for building trust and fostering cooperation in online marketplaces, such as eBay, these mechanisms are poised to have a much wider impact on organizations. Their growing popularity has potentially important implications for a wide range of management activities such as brand building, customer acquisition and retention, product development, and quality assurance. This paper surveys our progress in understanding the new possibilities and challenges that these mechanisms represent. It discusses some important dimensions in which Internet-based feedback mechanisms differ from traditional word-of-mouth networks and surveys the most important issues related to their design, evaluation, and use. It provides an overview of relevant work in game theory and economics on the topic of reputation. It discusses how this body of work is being extended and combined with insights from computer science, management science, sociology, and psychology to take into consideration the special properties of online environments. Finally, it identifies opportunities that this new area presents for operations research/management science (OR/MS) research.

2,519 citations


Journal ArticleDOI

2,372 citations


Journal ArticleDOI
TL;DR: The Vienna RNA secondary structure server provides a web interface to the most frequently used functions of the Vienna RNA software package for the analysis of RNA secondary structures.
Abstract: The Vienna RNA secondary structure server provides a web interface to the most frequently used functions of the Vienna RNA software package for the analysis of RNA secondary structures. It currently offers prediction of secondary structure from a single sequence, prediction of the consensus secondary structure for a set of aligned sequences and the design of sequences that will fold into a predefined structure. All three services can be accessed via the Vienna RNA web server at http://rna.tbi.univie.ac.at/.

2,236 citations


Posted Content
TL;DR: The principles of the complex organization and evolution of networks, natural and artificial, are discussed in this paper, which is addressed to all involved researchers and students, and the ideas are presented in a clear and a pedagogical way, with minimal mathematics, so even students without a deep knowledge of mathematics and statistical physics can rely on this as a reference.
Abstract: Only recently did mankind realise that it resides in a world of networks. The Internet and World Wide Web are changing our life. Our physical existence is based on various biological networks. We have recently learned that the term "network" turns out to be a central notion in our time, and the consequent explosion of interest in networks is a social and cultural phenomenon. The principles of the complex organization and evolution of networks, natural and artificial, are the topic of this book, which is written by physicists and is addressed to all involved researchers and students. The aim of the text is to understand networks and the basic principles of their structural organization and evolution. The ideas are presented in a clear and a pedagogical way, with minimal mathematics, so even students without a deep knowledge of mathematics and statistical physics will be able to rely on this as a reference. Special attention is given to real networks, both natural and artifical. Collected empirical data and numerous real applications of existing theories are discussed in detail, as well as the topical problems of communication networks. Available in OSO: http://www.oxfordscholarship.com/oso/public/content/physics/9780198515906/toc.html

1,906 citations


Journal ArticleDOI
TL;DR: This work identifies three fundamental principles that would underlie a delay-tolerant networking (DTN) architecture and describes the main structural elements of that architecture, centered on a new end-to-end overlay network protocol called Bundling.
Abstract: Increasingly, network applications must communicate with counterparts across disparate networking environments characterized by significantly different sets of physical and operational constraints; wide variations in transmission latency are particularly troublesome. The proposed Interplanetary Internet, which must encompass both terrestrial and interplanetary links, is an extreme case. An architecture based on a "least common denominator" protocol that can operate successfully and (where required) reliably in multiple disparate environments would simplify the development and deployment of such applications. The Internet protocols are ill suited for this purpose. We identify three fundamental principles that would underlie a delay-tolerant networking (DTN) architecture and describe the main structural elements of that architecture, centered on a new end-to-end overlay network protocol called Bundling. We also examine Internet infrastructure adaptations that might yield comparable performance but conclude that the simplicity of the DTN architecture promises easier deployment and extension.

1,419 citations


Book
01 Mar 2003
TL;DR: The aim of the text is to understand networks and the basic principles of their structural organization and evolution, so even students without a deep knowledge of mathematics and statistical physics will be able to rely on this as a reference.
Abstract: Only recently did mankind realise that it resides in a world of networks. The Internet and World Wide Web are changing our life. Our physical existence is based on various biological networks. We have recently learned that the term "network" turns out to be a central notion in our time, and the consequent explosion of interest in networks is a social and cultural phenomenon. The principles of the complex organization and evolution of networks, natural and artificial, are the topic of this book, which is written by physicists and is addressed to all involved researchers and students. The aim of the text is to understand networks and the basic principles of their structural organization and evolution. The ideas are presented in a clear and a pedagogical way, with minimal mathematics, so even students without a deep knowledge of mathematics and statistical physics will be able to rely on this as a reference. Special attention is given to real networks, both natural and artifical. Collected empirical data and numerous real applications of existing theories are discussed in detail, as well as the topical problems of communication networks. Available in OSO: http://www.oxfordscholarship.com/oso/public/content/physics/9780198515906/toc.html

1,388 citations


Journal ArticleDOI
TL;DR: The motives of 141 contributors to a large Open Source Software project (the Linux kernel) was explored with an Internet-based questionnaire study and activities in these teams were particularly determined by participants’ evaluation of the team goals as well as by their perceived indispensability and self-efficacy.

Journal ArticleDOI
TL;DR: In this paper, the authors examined the nature of perceived risks associated with Internet shopping and the relationship between types of risk perceived by Internet shoppers and their online patronage behaviors within a perceived risk theoretical framework.

01 Dec 2003
TL;DR: The proposals in this document are experimental and while they may be deployed in the current Internet, they do not represent a consensus that this is the best method for high-speed congestion control.
Abstract: The proposals in this document are experimental. While they may be deployed in the current Internet, they do not represent a consensus that this is the best method for high-speed congestion control. In particular, we note that alternative experimental proposals are likely to be forthcoming, and it is not well understood how the proposals in this document will interact with such alternative proposals.

Journal ArticleDOI
TL;DR: “perceived credibility” is introduced as a new factor that reflects the user's security and privacy concerns in the acceptance of Internet banking and demonstrates the significant effect of computer self‐efficacy on behavioral intention through perceived ease of use, perceived usefulness, and perceived credibility.
Abstract: The explosion of Internet usage and the huge funding initiatives in electronic banking have drawn the attention of researchers towards Internet banking. In the past, the conventional focus of Internet banking research has been on technological development, but this is now shifting to user‐focused research. Although millions of dollars have been spent on building Internet banking systems, reports have shown that potential users may not use the systems in spite of their availability. This points out the need for research to identify the factors that determine acceptance of Internet banking by the users. According to the technology acceptance model (TAM), perceived ease of use and perceived usefulness constructs are believed to be fundamental in determining the acceptance and use of various IT. These beliefs may however not fully explain the user's behavior toward newly emerging IT, such as Internet banking. Using the technology acceptance model (TAM) as a theoretical framework, this study introduces “perceived credibility” as a new factor that reflects the user's security and privacy concerns in the acceptance of Internet banking. It also examines the effect of computer self‐efficacy on the intention to use Internet banking. Based on a sample of 123 users from a telephone interview, the results strongly support the extended TAM in predicting the intention of users to adopt Internet banking. It also demonstrates the significant effect of computer self‐efficacy on behavioral intention through perceived ease of use, perceived usefulness, and perceived credibility.

Journal ArticleDOI
14 May 2003-JAMA
TL;DR: Although many people use the Internet for health information, use is not as common as is sometimes reported and effects on actual health care utilization are also less substantial than some have claimed.
Abstract: ContextThe Internet has attracted considerable attention as a means to improve health and health care delivery, but it is not clear how prevalent Internet use for health care really is or what impact it has on health care utilization Available estimates of use and impact vary widely Without accurate estimates of use and effects, it is difficult to focus policy discussions or design appropriate policy activitiesObjectivesTo measure the extent of Internet use for health care among a representative sample of the US population, to examine the prevalence of e-mail use for health care, and to examine the effects that Internet and e-mail use has on users' knowledge about health care matters and their use of the health care systemDesign, Setting, and ParticipantsSurvey conducted in December 2001 and January 2002 among a sample drawn from a research panel of more than 60 000 US households developed and maintained by Knowledge Networks Responses were analyzed from 4764 individuals aged 21 years or older who were self-reported Internet usersMain Outcome MeasuresSelf-reported rates in the past year of Internet and e-mail use to obtain information related to health, contact health care professionals, and obtain prescriptions; perceived effects of Internet and e-mail use on health care useResultsApproximately 40% of respondents with Internet access reported using the Internet to look for advice or information about health or health care in 2001 Six percent reported using e-mail to contact a physician or other health care professional About one third of those using the Internet for health reported that using the Internet affected a decision about health or their health care, but very few reported impacts on measurable health care utilization; 94% said that Internet use had no effect on the number of physician visits they had and 93% said it had no effect on the number of telephone contacts Five percent or less reported use of the Internet to obtain prescriptions or purchase pharmaceutical productsConclusionsAlthough many people use the Internet for health information, use is not as common as is sometimes reported Effects on actual health care utilization are also less substantial than some have claimed Discussions of the role of the Internet in health care and the development of policies that might influence this role should not presume that use of the Internet for health information is universal or that the Internet strongly influences health care utilization

Journal ArticleDOI
TL;DR: Googless architecture features clusters of more than 15,000 commodity-class PCs with fault tolerant software that achieves superior performance at a fraction of the cost of a system built from fewer, but more expensive, high-end servers.
Abstract: Amenable to extensive parallelization, Google's web search application lets different queries run on different processors and, by partitioning the overall index, also lets a single query use multiple processors. to handle this workload, Googless architecture features clusters of more than 15,000 commodity-class PCs with fault tolerant software. This architecture achieves superior performance at a fraction of the cost of a system built from fewer, but more expensive, high-end servers.

Journal ArticleDOI
TL;DR: This research identifies a number of key factors related to trust in the B2C context and proposes a framework based on a series of underpinning relationships among these factors, which complement the previous findings on e-commerce and shed light on how to establish a trust relationship on the World Wide Web.

Journal ArticleDOI
TL;DR: The e3-value approach methodology shows how to model business requirements and improve business–IT alignment, in sophisticated multi-actor value constellations that are common in electronic commerce.
Abstract: Innovative e-commerce ideas are characterised by commercial products yet unknown to the market, enabled by information technology such as the Internet and technologies on top of it. How to develop such products is hardly known. We propose an interdisciplinary approach, e3-value, to explore an innovative e-commerce idea with the aim of understanding such an idea thoroughly and evaluating it for potential profitability. Our methodology exploits a requirements engineering way of working, but employs concepts and terminology from business science, marketing and axiology. It shows how to model business requirements and improve business---IT alignment, in sophisticated multi-actor value constellations that are common in electronic commerce. In addition to the e3-value approach methodology, we also present the action research-based development of our methodology, by using one of the longitudinal projects we carried out in the field of online news article provisioning.

Proceedings ArticleDOI
25 Aug 2003
TL;DR: This paper examines the somewhat controversial subject of energy consumption of networking devices in the Internet, motivated by data collected by the U.S. Department of Commerce, and discusses the impact on network protocols of saving energy by putting network interfaces and other router & switch components to sleep.
Abstract: In this paper we examine the somewhat controversial subject of energy consumption of networking devices in the Internet, motivated by data collected by the U.S. Department of Commerce. We discuss the impact on network protocols of saving energy by putting network interfaces and other router & switch components to sleep. Using sample packet traces, we first show that it is indeed reasonable to do this and then we discuss the changes that may need to be made to current Internet protocols to support a more aggressive strategy for sleeping. Since this is a position paper, we do not present results but rather suggest interesting directions for core networking research. The impact of saving energy is huge, particularly in the developing world where energy is a precious resource whose scarcity hinders widespread Internet deployment.

Journal ArticleDOI
TL;DR: A technology acceptance model for wireless Internet via mobile devices (TAM for wirelessInternet), a conceptual framework to explain the factors influencing user acceptance of WIMD, is developed and 12 propositions are developed to promote and facilitate future empirical research relating to WIMd.
Abstract: Wireless Internet via mobile devices (WIMD) is leading the world into another spectrum of communications and means of conducting day‐to‐day business and life activities. Full bloom of wireless Internet services depends on user acceptance, as well as technology improvement. This paper develops a technology acceptance model for wireless Internet via mobile devices (TAM for wireless Internet), a conceptual framework to explain the factors influencing user acceptance of WIMD. By revising the technology acceptance model (TAM) to represent some unique features of the wireless system under study, TAM for wireless Internet proposes that constructs such as individual differences, technology complexity, facilitating conditions, social influences, and wireless trust environment determine user‐perceived short and long‐term usefulness, and ease of using WIMD. These, in turn, determine user intention and willingness to adopt WIMD. Twelve propositions are developed to promote and facilitate future empirical research relating to WIMD.

Journal ArticleDOI
TL;DR: This article addresses the issue of cross-layer networking, where the physical and MAC layer knowledge of the wireless medium is shared with higher layers, in order to provide efficient methods of allocating network resources and applications over the Internet.
Abstract: As the cellular and PCS world collides with wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This article highlights some of the past accomplishments and promising research avenues for an important topic in the creation of future wireless networks. We address the issue of cross-layer networking, where the physical and MAC layer knowledge of the wireless medium is shared with higher layers, in order to provide efficient methods of allocating network resources and applications over the Internet. In essence, future networks will need to provide "impedance matching" of the instantaneous radio channel conditions and capacity needs with the traffic and congestion conditions found over the packet-based world of the Internet. Furthermore, such matching will need to be coordinated with a wide range of particular applications and user expectations, making the topic of cross-layer networking increasingly important for the evolving wireless buildout.

Journal ArticleDOI
TL;DR: It is illustrated that consumers read on-line articulations mainly to save decision-making time and make better buying decisions, and structural equation modeling shows that their motives for retrieving on-lines articulations strongly influence their behavior.
Abstract: The Internet makes it possible for consumers to obtain electronic word of mouth from other consumers. Customer comments articulated via the Internet are available to a vast number of other customers, and therefore can be expected to have a significant impact on the success of goods and services. This paper derives several motives that explain why customers retrieve other customers' on-line articulations from Web-based consumer opinion platforms. The relevance of these motives and their impact on consumer buying and communication behavior are tested in a large-scale empirical study. The results illustrate that consumers read on-line articulations mainly to save decision-making time and make better buying decisions. Structural equation modeling shows that their motives for retrieving on-line articulations strongly influence their behavior.

Journal ArticleDOI
E. Gustafsson1, A. Jonsson1
TL;DR: The concept of being always best connected is described, the user experience and business relationships in an ABC environment are discussed, and the different aspects of an ABC solution that will broaden the technology and business base of 3G are outlined.
Abstract: Over the last few years, we have experienced a variety of access technologies being deployed. While 2G cellular systems evolve into 3G systems such as UMTS or cdma2000, providing worldwide coverage, wireless LAN solutions have been extensively deployed to provide hotspot high-bandwidth Internet access in airports, hotels, and conference centers. At the same time, fixed access such as DSL and cable modem tied to wireless LANs appear in home and office environments. The always best connected (ABC) concept allows a person connectivity to applications using the devices and access technologies that best suit his or her needs, thereby combining the features of access technologies such as DSL, Bluetooth, and WLAN with cellular systems to provide an enhanced user experience for 2.5G, 3G, and beyond. An always best connected scenario, where a person is allowed to choose the best available access networks and devices at any point in time, generates great complexity and a number of requirements, not only for the technical solutions, but also in terms of business relationships between operators and service providers, and in subscription handling. This article describes the concept of being always best connected, discusses the user experience and business relationships in an ABC environment, and outlines the different aspects of an ABC solution that will broaden the technology and business base of 3G.

Journal ArticleDOI
TL;DR: In this article, survey and ethnographic data from a "wired suburb" near Toronto show that high-speed, always-on access to the Internet, coupled with a local online discussion group, transforms and enhances neighboring.
Abstract: What is the Internet doing to local community? Analysts have debated about whether the Internet is weakening community by leading people away from meaningful in-person contact; transforming community by creating new forms of community online; or enhancing community by adding a new means of connecting with existing relationships. They have been especially concerned that the globe-spanning capabilities of the Internet can limit local involvements. Survey and ethnographic data from a “wired suburb” near Toronto show that high-speed, always-on access to the Internet, coupled with a local online discussion group, transforms and enhances neighboring. The Internet especially supports increased contact with weaker ties. In comparison to nonwired residents of the same suburb, more neighbors are known and chatted with, and they are more geographically dispersed around the suburb. Not only did the Internet support neighboring, it also facilitated discussion and mobilization around local issues.

Journal ArticleDOI
TL;DR: The results support the current hypothesis that that individuals’ preference for online, rather than face-to-face, social interaction plays an important role in the development of negative consequences associated with problematic Internet use.
Abstract: The model introduced and tested in the current study suggests that lonely and depressed individuals may develop a preference for online social interaction, which, in turn, leads to negative outcomes associated with their Internet use. Participants completed measures of preference for online social interaction, depression, loneliness, problematic Internet use, and negative outcomes resulting from their Internet use.Results indicated that psychosocial health predicted levels of preference for online social interaction, which, in turn, predicted negative outcomes associated with problematic Internet use. In addition, the results indicated that the influence of psychosocial distress on negative outcomes due to Internet use is mediated by preference for online socialization and other symptoms of problematic Internet use.T he results support the current hypothesis that that individuals’ preference for online, rather than face-to-face, social interaction plays an important role in the development of negative con...

Book
01 Jan 2003
TL;DR: From low choice to high choice, the impact of cable TV and internet on news exposure, political knowledge, and turnout was studied in this article, showing that greater media choice affects total news consumption and average turnout.
Abstract: 1. Introduction 2. Conditional political learning Part I. The Participatory Effects of Media Choice: 3. Broadcast television, political knowledge, and turnout 4. From low choice to high choice: the impact of cable tv and internet on news exposure, political knowledge, and turnout 5. From low choice to high choice: does greater media choice affect total news consumption and average turnout? Part II. The Political Effects of Media Choice: 6. Broadcast television, partisanship, and the incumbency advantage 7. Partisan polarization in the high-choice media environment 8. Divided by choice: audience fragmentation and political inequality in the post-broadcast media environment.

Journal ArticleDOI
TL;DR: Investigation of the impact of customer perceptions of security control on e-commerce acceptance indicated that perceptions of nonrepudiation, privacy protection, and data integrity have a significant impact on trust in e- commerce.
Abstract: The number of Internet users has increased dramatically,but many are reluctant to provide sensitive personal information to Web sites because they do not trust e-commerce securityThis paper investigates the impact of customer perceptions of security control on e-commerce acceptance Trust is examined as the mediating factor of the relationship, using Internet banking as the research domain because bank customers are generally concerned about processing sensitive information like financial information A Web survey of Internet banking users collected 502 cases Statistical analyses, using structural equation modeling, indicated that perceptions of nonrepudiation, privacy protection, and data integrity have a significant impact on trust in e-commerce Trust also has a significant impact on e-commerce acceptance Implications and further research directions are presented

Book
02 Jun 2003
TL;DR: This volume provides an overview of design principles and major space-time coding techniques starting from MIMO system information theory capacity bounds and channel models, while endeavouring to pave the way towards complex areas such as applications of space time codes and their performance evaluation in wide-band wireless channels.
Abstract: From the Publisher: "Space-Time Coding provides an introduction to the subject and its application to wireless communication systems. With the integration of Internet and multimedia applications in next generation wireless communications, the demand for wide-band high data rate communication services is growing. Space-time coding is based on introducing joint correlation in transmitted signals in both space and time domains. This volume provides an overview of design principles and major space-time coding techniques starting from MIMO system information theory capacity bounds and channel models, while endeavouring to pave the way towards complex areas such as applications of space time codes and their performance evaluation in wide-band wireless channels." Written in a highly accessible format, Space-Time Coding is intended for postgraduate students, practicing engineers and researchers. The reader will have some familiarity with basic digital communications, matrix analysis and probability theory.

Journal ArticleDOI
TL;DR: Quality criteria for electronic survey design and use based on an investigation of recent electronic survey literature are presented and suggest how the use of some criteria may conflict and what researchers may experience when conducting electronic surveys in an online culture in which people are not tolerant of intrusions into online lives.
Abstract: Using the Internet to conduct quantitative research presents challenges not found in conventional research. Paper-based survey quality criteria cannot be completely adapted to electronic formats. Electronic surveys have distinctive technological, demographic, and response characteristics that affect their design, use, and implementation. Survey design, participant privacy and confidentiality, sampling and subject solicitation, distribution methods and response rates, and survey piloting are critical methodological components that must be addressed. In this article, quality criteria for electronic survey design and use based on an investigation of recent electronic survey literature are presented. The application of these criteria to reach a hard-to-involve online population-nonpublic participants of online communities (also known as "lurkers")-and survey them on their community participation, a topic not salient to the purpose of their online communities is demonstrated in a case study. The results show t...

01 Jan 2003
TL;DR: In this article, the authors argue that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed.
Abstract: This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports both researchers that want to develop new services, and clients that want to use them. This dual use, in turn, suggests four design principles that are not widely supported in existing testbeds: services should be able to run continuously and access a slice of the overlay's resources, control over resources should be distributed, overlay management services should be unbundled and run in their own slices, and APIs should be designed to promote application development. We believe a testbed that supports these design principles will facilitate the emergence of a new service-oriented network architecture. Towards this end, the paper also briefly describes PlanetLab, an overlay network being designed with these four principles in mind.