scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2005"


Journal ArticleDOI
TL;DR: A survey and comparison of various Structured and Unstructured P2P overlay networks is presented, categorize the various schemes into these two groups in the design spectrum, and discusses the application-level network performance of each group.
Abstract: Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution, and application-level multicast applications. These P2P overlay networks attempt to provide a long list of features, such as: selection of nearby peers, redundant storage, efficient search/location of data items, data permanence or guarantees, hierarchical naming, trust and authentication, and anonymity. P2P networks potentially offer an efficient routing architecture that is self-organizing, massively scalable, and robust in the wide-area, combining fault tolerance, load balancing, and explicit notion of locality. In this article we present a survey and comparison of various Structured and Unstructured P2P overlay networks. We categorize the various schemes into these two groups in the design spectrum, and discuss the application-level network performance of each group.

1,638 citations


Journal ArticleDOI
TL;DR: The main features and statistics of the developed system, Virtual Computational Chemistry Laboratory, allowing the computational chemist to perform a comprehensive series of molecular indices/properties calculations and data analysis are reviewed.
Abstract: Internet technology offers an excellent opportunity for the development of tools by the cooperative effort of various groups and institutions. We have developed a multi-platform software system, Virtual Computational Chemistry Laboratory, http://www.vcclab.org, allowing the computational chemist to perform a comprehensive series of molecular indices/properties calculations and data analysis. The implemented software is based on a three-tier architecture that is one of the standard technologies to provide client-server services on the Internet. The developed software includes several popular programs, including the indices generation program, DRAGON, a 3D structure generator, CORINA, a program to predict lipophilicity and aqueous solubility of chemicals, ALOGPS and others. All these programs are running at the host institutes located in five countries over Europe. In this article we review the main features and statistics of the developed system that can be used as a prototype for academic and industry models.

1,377 citations


Journal ArticleDOI
TL;DR: In this article, the authors focus on how the Internet has impacted the process of collaborative innovation and suggest that firms can use these capabilities to engage customers in collaborative product innovation through a variety of Internet-based mechanisms.

1,334 citations


Journal ArticleDOI
Peter Dahlgren1
TL;DR: In this paper, the structural, representational, and interactional dimensions of the public sphere are discussed, with a focus on the role of the Internet in the destabilization of political communication systems.
Abstract: The theme of the Internet and the public sphere now has a permanent place on research agendas and in intellectual inquiry; it is entering the mainstream of political communication studies. The first part of this presentation briefly pulls together key elements in the public sphere perspective, underscoring three main analytic dimensions: the structural, the representational, and the interactional. Then the discussion addresses some central themes in the current difficulties facing democracy, refracted through the lens of the public sphere perspective. In particular, the destabilization of political communication systems is seen as a context for understanding the role of the Internet: It enters into, as well as contributes to, this destabilization. At the same time, the notion of destabilization can also embody a positive sense, pointing to dispersions of older patterns that may have outlived their utility. Further, the discussion takes up obvious positive consequences that follow from the Internet, for ex...

1,315 citations


Book ChapterDOI
06 Jul 2005
TL;DR: AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications that provides a modular and expressive formal language for specifying protocols and their security properties.
Abstract: AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.

1,278 citations


01 Aug 2005
TL;DR: This document introduces extensions to Mobile IPv6 and IPv6 Neighbour Discovery to allow for local mobility handling and defines an Experimental Protocol for the Internet community.
Abstract: This document introduces extensions to Mobile IPv6 and IPv6 Neighbour Discovery to allow for local mobility handling. Hierarchical mobility management for Mobile IPv6 is designed to reduce the amount of signalling between the Mobile Node, its Correspondent Nodes, and its Home Agent. The Mobility Anchor Point (MAP) described in this document can also be used to improve the performance of Mobile IPv6 in terms of handover speed. This memo defines an Experimental Protocol for the Internet community.

1,231 citations


Journal ArticleDOI
TL;DR: Results from a series of social network studies of media use reveal that those more strongly tied used more media to communicate than weak ties, and that media use within groups conformed to a unidimensional scale, leading to a number of implications regarding media and Internet connectivity.
Abstract: This paper explores the impact of communication media and the Internet on connectivity between people. Results from a series of social network studies of media use are used as background for exploration of these impacts. These studies explored the use of all available media among members of an academic research group and among distance learners. Asking about media use as well as about the strength of the tie between communicating pairs revealed that those more strongly tied used more media to communicate than weak ties, and that media use within groups conformed to a unidimensional scale, showing a configuration of different tiers of media use supporting social networks of different ties strengths. These results lead to a number of implications regarding media and Internet connectivity, including: how media use can be added to characteristics of social network ties; how introducing a medium can create latent tie connectivity among group members that provides the technical means for activating weak ties, a...

1,079 citations


Journal ArticleDOI
TL;DR: The Internet architecture has proven its worth by the vast array of applications it now supports and the wide variety of network technologies over which it currently runs.
Abstract: The Internet architecture has proven its worth by the vast array of applications it now supports and the wide variety of network technologies over which it currently runs. Most current Internet research involves either empirical measurement studies or incremental modifications that can be deployed without major architectural changes. Easy access to virtual testbeds could foster a renaissance in applied architectural research that extends beyond these incrementally deployable designs.

1,043 citations


Journal ArticleDOI
TL;DR: In this paper, the authors show that while perceived usefulness contributes to consumer adoption of Internet devices, what contributes even more is their "fun" attribute (a hedonic aspect), and some consumers are more visually oriented than others and are likely to adopt these devices even more than those who are less visually oriented.

953 citations


Journal ArticleDOI
TL;DR: An overview of the nature and concepts of trust from multi-disciplinary perspectives is provided, and a framework of trust-inducing interface design features articulated from the existing literature is presented.

950 citations


Journal ArticleDOI
TL;DR: A survey of the current state of the art in off-the-shelf and proprietary solutions to build wireless mesh networks and the challenges of designing a high-performance, scalable, and cost-effective wireless mesh network are addressed.
Abstract: In spite of the massive efforts in researching and developing mobile ad hoc networks in the last decade, this type of network has not yet witnessed mass market deployment. The low commercial penetration of products based on ad hoc networking technology could be explained by noting that the ongoing research is mainly focused on implementing military or specialized civilian applications. On the other hand, users are interested in general-purpose applications where high bandwidth and open access to the Internet are consolidated and cheap commodities. To turn mobile ad hoc networks into a commodity, we should move to more pragmatic "opportunistic ad hoc networking" in which multihop ad hoc networks are not isolated self-configured networks, but rather emerge as a flexible and low-cost extension of wired infrastructure networks coexisting with them. Indeed, a new class of networks is emerging from this view: mesh networks. This article provides an overview of mesh networking technology. In particular, starting from commercial case studies we describe the core building blocks and distinct features on which wireless mesh networks should be based. We provide a survey of the current state of the art in off-the-shelf and proprietary solutions to build wireless mesh networks. Finally, we address the challenges of designing a high-performance, scalable, and cost-effective wireless mesh network.

Patent
22 Dec 2005
TL;DR: In this paper, a comprehensive system effectuates global electronic commerce on the Internet across frontiers of nations, cultures, and languages, and a shopping cart allows Buyers to select a product for purchase in an interactive way that encourages completion of the purchase.
Abstract: A comprehensive system effectuates global electronic commerce on the Internet across frontiers of nations, cultures, and languages. Referral Websites serving various locales offer Buyers the opportunity to view products for purchase. A Buyer selects categories of products for viewing by using drop-down menus that organize products into a clear taxonomy that can be expressed across all languages. Having selected a category of products for viewing, a Buyer receives, from a multi-version relational database, a version of marketing information about each product. The version is one automatically sent from the database to match the Buyer's language, culture, and nationality, as deduced from the use of a particular Referral Website. A shopping cart allows Buyers to select a product for purchase in an interactive way that encourages completion of the purchase. Products can be offered with custom options and in wholesale quantities. Personalized Web pages allow comprehensive customer service after a sale.

Journal ArticleDOI
TL;DR: Although it is unlikely to supplant the role of trusted peers and adults, the internet has found an important place among adolescents' repertory of health information sources.

Proceedings ArticleDOI
03 Jan 2005
TL;DR: This paper introduces a novel approach for declaring information object related access restrictions, based on a valid XML encoding, and shows, how the access restrictions can be declared using XACML and Xpath.
Abstract: Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous information objects, which is the base for more advanced use like in electronic commerce. But, the access to these information objects is not always unrestricted. The owner of the information objects may control access due to different reasons. This paper introduces a novel approach for declaring information object related access restrictions, based on a valid XML encoding. The paper shows, how the access restrictions can be declared using XACML and Xpath. Based on the specified 'fine grained' policies, multiple policies can be applicable. If these policies declare positive and negative permissions for the same subject, policy inconsistencies exist. The paper also focuses on specifying the ground of policy inconsistencies and how to solve them.

Book
16 Nov 2005
TL;DR: This renowned text places readers squarely in the classroom while providing a framework that teaches them to apply what they learn about computers, multimedia, Internet, distance learning, and audio/visual technologies to the 21st century classroom instruction.
Abstract: With its hallmark ASSURE technology integration model and classroom cases, this renowned text places readers squarely in the classroom while providing a framework that teaches them to apply what they learn about computers, multimedia, Internet, distance learning, and audio/visual technologies to the 21st century classroom instruction.

Journal ArticleDOI
TL;DR: A theoretical model is proposed and tested that considers an individual's perceptions of privacy and how it relates to his or her behavioral intention to make an online transaction and the results suggested strong support for the model.

Journal ArticleDOI
TL;DR: The approach adopted by the Service Infrastructure for Real-Time Embedded Networked Applications project is outlined, as well as the business advantages this approach is expected to provide.
Abstract: This paper outlines opportunities and challenges in the development of next-generation embedded devices, applications, and services, resulting from their increasing intelligence - it plots envisioned future directions for intelligent device networking based on service-oriented high-level protocols, in particular as regards the industrial automation sector - and outlines the approach adopted by the Service Infrastructure for Real-Time Embedded Networked Applications project, as well as the business advantages this approach is expected to provide.

Journal ArticleDOI
TL;DR: Research on Internet addiction has shown that users can become addicted to it, and has been shown to lead to consequences such as failing school, family, and relationship problems.
Abstract: As computer and Internet use become a staple of everyday life, the potential for overuse is introduced, which may lead to addiction. Research on Internet addiction has shown that users can become addicted to it. Addiction to the Internet shares some of the negative aspects of substance addiction and has been shown to lead to consequences such as failing school, family, and relationship problems.

Proceedings ArticleDOI
24 Apr 2005
TL;DR: MoteLab accelerates application deployment by streamlining access to a large, fixed network of real sensor network devices; it accelerates debugging and development by automating data logging, allowing the performance of sensor network software to be evaluated offline.
Abstract: As wireless sensor networks have emerged as a exciting new area of research in computer science, many of the logistical challenges facing those who wish to develop, deploy, and debug applications on realistic large-scale sensor networks have gone unmet. Manually reprogramming nodes, deploying them into the physical environment, and instrumenting them for data gathering is tedious and time-consuming. To address this need we have developed MoteLab, a Web-based sensor network testbed. MoteLab consists of a set of permanently-deployed sensor network nodes connected to a central server which handles re programming and data logging while providing a Web interface for creating and scheduling jobs on the testbed. MoteLab accelerates application deployment by streamlining access to a large, fixed network of real sensor network devices; it accelerates debugging and development by automating data logging, allowing the performance of sensor network software to be evaluated offline Additionally, by providing a Web interface MoteLab allows both local and remote users access to the testbed, and its scheduling and quota system ensure fair sharing. We have developed and deployed MoteLab at Harvard and found ft invaluable for both research and teaching. The MoteLab source is freely available, easy to install, and already in use at several other research institutions. We expect that widespread use of MoteLab will accelerate and improve wireless sensor network research.


Journal ArticleDOI
TL;DR: This study was an attempt to replicate common findings in the literature and provide more evidence for the existence of Internet addiction among students--a population considered to be especially vulnerable.
Abstract: Over the last few years, there has been increased interest in the addictive potential of the Internet. The current study was an attempt to replicate common findings in the literature and provide more evidence for the existence of Internet addiction among students—a population considered to be especially vulnerable. A total of 371 British students responded to the questionnaire, which included the Pathological Internet Use (PIU) scale, the General Health Questionnaire (GHQ-12), a self-esteem scale, and two measures of disinhibition. Results showed that 18.3% of the sample were considered to be pathological Internet users, whose excessive use of the Internet was causing academic, social, and interpersonal problems. Other results showed that pathological Internet users had lower self-esteem and were more socially disinhibited. However, there was no significant difference in GHQ scores. These results are discussed in relation to the methodological shortcomings of research in the area as a whole.

Journal ArticleDOI
TL;DR: In this article, the authors explore the research on the social effects of Internet addiction and suggest that maladaptive patterns of Internet use constitute behavioral addiction, and discuss current and projected treatments of internet addiction, suggests future research agendas, and provides implications for educational psychologists.
Abstract: Research indicates that maladaptive patterns of Internet use constitute behavioral addiction. This article explores the research on the social effects of Internet addiction. There are four major sections. The Introduction section overviews the field and introduces definitions, terminology, and assessments. The second section reviews research findings and focuses on several key factors related to Internet addiction, including Internet use and time, identifiable problems, gender differences, psychosocial variables, and computer attitudes. The third section considers the addictive potential of the Internet in terms of the Internet, its users, and the interaction of the two. The fourth section addresses current and projected treatments of Internet addiction, suggests future research agendas, and provides implications for educational psychologists.

Journal ArticleDOI
TL;DR: It is found that small world search strategies using a contact’s position in physical space or in an organizational hierarchy relative to the target can effectively be used to locate most individuals, but in the online student network, where the data is incomplete and hierarchical structures are not well defined, local search strategies are less effective.

Patent
24 Mar 2005
TL;DR: The Shared Internet Storage Resource (SISR) as mentioned in this paper provides Internet-based file storage, retrieval, access, control, and manipulation for a user by providing an easy-to-use user interface.
Abstract: The Shared Internet Storage Resource provides Internet-based file storage, retrieval, access, control, and manipulation for a user. Additionally, an easy-to-use user interface is provided both for a browser or stand-alone application. The entire method provides means by which users can establish, use, and maintain files on the Internet in a manner remote from their local computers yet in a manner that is similar to the file manipulation used on their local computers. A high capacity or other storage system is attached to the Internet via an optional internal network that also serves to generate and direct metadata regarding the stored files. A web server using a CGI, Java®-based, or other interface transmits and retrieves TCP/IP packets or other Internet information through a load balancer/firewall by using XML to wrap the data packets. File instructions may be transmitted over the Internet to the Shared Resource System. The user's account may be password protected so that only the user may access his or her files. On the user's side, a stand-alone client application or JavaScript object interpreted through a browser provide two means by which the XML or other markup language data stream may be received and put to use by the user. Internet-to-Internet file transfers may be effected by directly downloading to the user's account space.

Proceedings ArticleDOI
15 Nov 2005
TL;DR: This work proposes a novel method for traffic classification and application identification using an unsupervised machine learning technique that uses feature selection to find an optimal feature set and determine the influence of different features in traffic flows.
Abstract: The dynamic classification and identification of network applications responsible for network traffic flows offers substantial benefits to a number of key areas in IP network engineering, management and surveillance. Currently such classifications rely on selected packet header fields (e.g. port numbers) or application layer protocol decoding. These methods have a number of shortfalls e.g. many applications can use unpredictable port numbers and protocol decoding requires a high amount of computing resources or is simply infeasible in case protocols are unknown or encrypted. We propose a novel method for traffic classification and application identification using an unsupervised machine learning technique. Flows are automatically classified based on statistical flow characteristics. We evaluate the efficiency of our approach using data from several traffic traces collected at different locations of the Internet. We use feature selection to find an optimal feature set and determine the influence of different features

Journal ArticleDOI
TL;DR: Patterns of internet use for health information among those with and without stigmatized illnesses are examined to suggest that the internet may be a valuable health communication and education tool for populations who are affected by stigmatized conditions.

Journal ArticleDOI
TL;DR: In this paper, the authors integrated research on social skill and self-presentation into the recently introduced cognitive-behavioral theory of generalized problematic Internet use, which predicted that individuals who lack selfpresentational skill are especially likely to prefer online social interaction over face-to-face communication.
Abstract: This study integrates research on social skill and self-presentation into the recently introduced cognitive-behavioral theory of generalized problematic Internet use. The model proposed and tested here predicted that individuals who lack self-presentational skill are especially likely to prefer online social interaction over face-to-face communication. Further, the model predicted that a preference for online social interaction fosters compulsive Internet use, which results in negative outcomes. Participants in this study completed measures of social skill, preference for online social interaction, compulsive Internet use, and negative outcomes associated with Internet use. Structural equation modeling analysis techniques tested the proposed model. The analysis indicated a good fit between the hypothesized model and the current data.

Journal ArticleDOI
TL;DR: Internet-based applications and their resulting multitier distributed architectures have changed the focus of design for large-scale Internet computing.
Abstract: Internet-based applications and their resulting multitier distributed architectures have changed the focus of design for large-scale Internet computing. Internet server applications execute in a horizontally scalable topology across hundreds or thousands of commodity servers in Internet data centers. Increasing scale and power density significantly impacts the data center's thermal properties. Effective thermal management is essential to the robustness of mission-critical applications. Internet service architectures can address multisystem resource management as well as thermal management within data centers.

Journal ArticleDOI
TL;DR: In this paper, the authors investigate how often adolescents engage in internet-based identity experiments, with what motives they engage in such experiments and which self-presentational strategies they use while experimenting with their identity.
Abstract: The aim of this article is to investigate how often adolescents engage in internet-based identity experiments, with what motives they engage in such experiments and which self-presentational strategies they use while experimenting with their identity. Six hundred nine to 18-year-olds completed a questionnaire in their classroom. Of the adolescents who used the internet for chat or Instant Messaging, 50 percent indicated that they had engaged in internet-based identity experiments. The most important motive for such experiments was self-exploration (to investigate how others react), followed by social compensation (to overcome shyness) and social facilitation (to facilitate relationship formation). Age, gender and introversion were significant predictors of the frequency with which adolescents engaged in internet-based identity experiments, their motives for such experiments, and their self-presentational strategies.

Journal ArticleDOI
TL;DR: This article aims to make recent results of this process accessible beyond Internet specialists to the broader scientific community and to clarify several sources of basic methodological differences that are relevant beyond either the Internet or the two specific approaches focused on here (i.e., scale-free networks and highly optimized tolerance networks).
Abstract: The search for unifying properties of complex networks is popular, challenging, and important. For modeling approaches that focus on robustness and fragility as unifying concepts, the Internet is an especially attractive case study, mainly because its applications are ubiquitous and pervasive, and widely available expositions exist at every level of detail. Nevertheless, alternative approaches to modeling the Internet often make extremely different assumptions and derive opposite conclusions about fundamental properties of one and the same system. Fortunately, a detailed understanding of Internet technology combined with a unique ability to measure the network means that these differences can be understood thoroughly and resolved unambiguously. This article aims to make recent results of this process accessible beyond Internet specialists to the broader scientific community and to clarify several sources of basic methodological differences that are relevant beyond either the Internet or the two specific approaches focused on here (i.e., scale-free networks and highly optimized tolerance networks).