The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Internet Computing
1998, volume: 2, number: 2

  1. Charles J. Petrie
    Webword: Putting Mom on E-Mail. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:4-5 [Journal]
  2. Joseph Kiniry
    Wavelength Division Multiplexing: Ultra High Speed Fiber Optics. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:13-15 [Journal]
  3. Dan Connolly
    On the Architecture of the Web: Let a Thousand Flowers Bloom (Interview). [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:22-31 [Journal]
  4. Miroslav Benda
    Internate Architecture: Its Evolution from an Industry Perspective - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:32-35 [Journal]
  5. Paul Dreyfus
    The Second Wave: Netscape on Usability in the Services-Based Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:36-40 [Journal]
  6. Gary R. Voth, Charles Kindel, Jon Fujioka
    Distributed Application Development for Three-Tier Architectures: Microsoft on Windows DNA. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:41-45 [Journal]
  7. Cynthia McFall
    An Object Infrastructure for Internet Middleware: IBM on Component Broker. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:46-51 [Journal]
  8. Dave Rosenberg
    Bringing Java to the Enterprise: Oracle on Its Java Server Strategy. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:52-59 [Journal]
  9. Abhay Gupta, Chris Ferris, Yvonne Wilson, Katni Venkatasubramanian
    Implementing Java Computing: Sun on Architecture and Applications Development. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:60-64 [Journal]
  10. Cynthia S. Hood, Chuanyi Ji
    Intelligent Agents for Proactive Fault Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:65-72 [Journal]
  11. Yung-Kao Hsu, Stephen P. Seymour
    An Intranet Security Framework Based on Short-Lived Certificates. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:73-79 [Journal]
  12. Rohit Khare
    Seventh Heaven: The Transfer Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:80-82 [Journal]
  13. Israel Ben-Shaul, Gail E. Kaiser
    Collaborative Work: Coordinating Distributed Components over the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:83-86 [Journal]
  14. Brian Thomas
    Digital Toolbox: Palette's Plunder. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:87-89 [Journal]
  15. Michael N. Huhns, Munindar P. Singh
    Agents on the Web: Agent Jurisprudence. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:90-91 [Journal]
  16. Ted G. Lewis
    Wired Wired World: A Rose by Any Other (Domain) Name. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:92-93 [Journal]
  17. Robert E. Filman, Feniosky Peña-Mora
    Arachnoid Tourist: Spider on the Go. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:2, pp:94-95 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002