Descriptor
Computer Networks | 16 |
Information Networks | 9 |
Computer Mediated… | 8 |
Internet | 8 |
Computer System Design | 6 |
Information Technology | 6 |
Online Systems | 5 |
Computer Security | 4 |
Higher Education | 4 |
Users (Information) | 4 |
Business | 3 |
More ▼ |
Source
Internet Research | 16 |
Author
Angeles, Rebecca | 1 |
Arickx, Frans | 1 |
Atkinson, Chris | 1 |
Bouras, C. | 1 |
Broeckhove, Jan | 1 |
Bruce, Harry | 1 |
Callison, Richard | 1 |
Choi, Y. K. | 1 |
Claessens, Joris | 1 |
Diaz, Claudia | 1 |
Dobson, Malcolm | 1 |
More ▼ |
Publication Type
Journal Articles | 16 |
Reports - Research | 16 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Australia | 1 |
United Kingdom (Scotland) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Stuer, Gunther; Broeckhove, Jan; Arickx, Frans – Internet Research, 2003
Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…
Descriptors: Computer Networks, Computer Simulation, Computer System Design, Design Requirements

Wang, Shouhong – Internet Research, 2000
Shifting between different linkages of the partners for satisfying a need is the major characteristic of the virtual organization, and meta-management beyond the individual organizational level must be applied in order to optimize the benefit for the entire organizational network. Presents a meta-management support framework based on the…
Descriptors: Administration, Business, Computer Networks, Information Technology

Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design

Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases

Angeles, Rebecca – Internet Research, 2001
This study seeks a practical understanding of the business, organizational, and technical components of and implementation guidelines needed to effectively deploy extranets. It aims to establish a basic conceptual framework for understanding extranet implementation guidelines. Provides a specific case using VF Playwear, Inc.'s HealthTexbtob.com, a…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Computer Oriented Programs

Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks

Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks

Bouras, C.; Ganos, P.; Karaliotas, A. – Internet Research, 2003
The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…
Descriptors: Computer Networks, Computer System Design, Design Requirements, Information Networks

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Marshall, Ian M.; Logan, Graham; Callison, Richard; Dobson, Malcolm – Internet Research, 1996
TayNet is a local service provider established to support the development of businesses in Tayside (Scotland) by providing local access to the Internet. This article discusses the network's hardware and software components, evaluates the pilot phase, provides performance and connection statistics for 45 audit participants, and describes technical…
Descriptors: Access to Information, Business, Computer Networks, Foreign Countries

Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Schiller, Nancy – Internet Research, 1994
Reports on an electronic survey designed to document what academic library and computing services staff are doing to instruct users about the Internet and to determine whether they are working together or apart. The results suggest emerging service patterns, possible relationships, and ways to improve Internet training. (Contains nine references.)…
Descriptors: Academic Libraries, Computer Networks, Educational Cooperation, Higher Education

Rice-Lively, Mary Lynn – Internet Research, 1994
Describes an ethnographic study of the electronic community comprised of masters and doctoral students involved in a seminar on networking. Ethnographic research facilitated observation and description of the networked learning community. The exploration of the cultural meaning of class events led to enhanced understanding of online education and…
Descriptors: Computer Mediated Communication, Computer Networks, Electronic Classrooms, Ethnography

Bruce, Harry – Internet Research, 1994
Describes a pilot study examining how Australian academics are using the Australian Academic and Research Network. Ten tables provide details on network services used in relation to academic role, importance of services used and relationship to academic work, and specific applications for e-mail, remote login, news groups and FTP (file transfer…
Descriptors: Administration, College Faculty, Computer Networks, Electronic Mail
Previous Page | Next Page ยป
Pages: 1 | 2