NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases
Peer reviewed Peer reviewed
Angeles, Rebecca – Internet Research, 2001
This study seeks a practical understanding of the business, organizational, and technical components of and implementation guidelines needed to effectively deploy extranets. It aims to establish a basic conceptual framework for understanding extranet implementation guidelines. Provides a specific case using VF Playwear, Inc.'s HealthTexbtob.com, a…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Computer Oriented Programs
Peer reviewed Peer reviewed
Thornburg, David D. – Internet Research, 1995
Explains the passing of the information age and discusses its successor and the paradigm for the immediate future; i.e., the communication age. The importance of the communication age to elementary and secondary education is outlined, and the emerging wide-bandwidth Internet technology is discussed. (Author/LRW)
Descriptors: Computer Mediated Communication, Computer Networks, Educational Change, Elementary Secondary Education
Peer reviewed Peer reviewed
Chou, David C. – Internet Research, 1998
Moving corporate systems onto an intranet will increase the data traffic within the corporate network, which necessitates a high-quality management process to the intranet. Discusses costs and benefits of adopting an intranet, tool availability and selection criteria, and management issues for developing an intranet. (Author/AEF)
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Kiani, G. Reza – Internet Research, 1998
Addresses the opportunities offered by the Web to marketers. Considers the Web as a two-way communication model in which four different communication states can take place. Suggests the necessity of new concepts and models for marketers to manage their Web sites, and presents opportunities supporting the marketers' objectives in the new…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations
Peer reviewed Peer reviewed
Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Rice-Lively, Mary Lynn – Internet Research, 1994
Describes an ethnographic study of the electronic community comprised of masters and doctoral students involved in a seminar on networking. Ethnographic research facilitated observation and description of the networked learning community. The exploration of the cultural meaning of class events led to enhanced understanding of online education and…
Descriptors: Computer Mediated Communication, Computer Networks, Electronic Classrooms, Ethnography