Content
May 2018, Volume 10, Issue 5
- 1-20 Test Bed of Semantic Interaction of Smart Objects in the Web of Things
by Santiago Guerrero-Narváez & Miguel-Ángel Niño-Zambrano & Dalila-Jhoana Riobamba-Calvache & Gustavo-Adolfo Ramírez-González
April 2018, Volume 10, Issue 4
- 1-14 Replicas Strategy and Cache Optimization of Video Surveillance Systems Based on Cloud Storage
by Rongheng Li & Jian Zhang & Wenfeng Shen - 1-15 An Intelligent Content Prefix Classification Approach for Quality of Service Optimization in Information-Centric Networking
by Cutifa Safitri & Yoshihide Yamada & Sabariah Baharun & Shidrokh Goudarzi & Quang Ngoc Nguyen & Keping Yu & Takuro Sato - 1-16 Enhanced Matching Game for Decoupled Uplink Downlink Context-Aware Handover
by Asmae Ait Mansour & Nourddine Enneya & Mohamed Ouadou - 1-20 Development of a Social DTN for Message Communication between SNS Group Members
by Hidenori Takasuka & Koichi Hirai & Kazumasa Takami - 1-33 Dynamic Linked Data: A SPARQL Event Processing Architecture
by Luca Roffia & Paolo Azzoni & Cristiano Aguzzi & Fabio Viola & Francesco Antoniazzi & Tullio Salmon Cinotti
February 2018, Volume 10, Issue 3
- 1-18 SDN Based Collaborative Scheme for Mitigation of DDoS Attacks
by Sufian Hameed & Hassan Ahmed Khan - 1-21 Learning and Mining Player Motion Profiles in Physically Interactive Robogames
by Ewerton L. S. Oliveira & Davide Orrù & Luca Morreale & Tiago P. Nascimento & Andrea Bonarini
March 2018, Volume 10, Issue 3
- 1-3 Ecosystemic Evolution Fed by Smart Systems
by Dino Giuli - 1-9 Interference Management in Femtocells by the Adaptive Network Sensing Power Control Technique
by Tehseen Ul Hassan & Fei Gao & Babur Jalal & Sheeraz Arif - 1-13 TwinNet: A Double Sub-Network Framework for Detecting Universal Adversarial Perturbations
by Yibin Ruan & Jiazhu Dai - 1-14 How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0
by Virginia Pilloni - 1-15 Understanding How GitHub Supports Curation Repositories
by Yu Wu & Jessica Kropczynski & Raquel Prates & John M. Carroll - 1-15 Optimal Design of Demand-Responsive Feeder Transit Services with Passengers’ Multiple Time Windows and Satisfaction
by Bo Sun & Ming Wei & Senlai Zhu - 1-24 Security Awareness in Software-Defined Multi-Domain 5G Networks
by Jani Suomalainen & Kimmo Ahola & Mikko Majanen & Olli Mämmelä & Pekka Ruuska - 1-26 A Statistical Analysis of Industrial Penetration and Internet Intensity in Taiwan
by Chia-Lin Chang & Michael McAleer & Yu-Chieh Wu
January 2018, Volume 10, Issue 2
- 1-2 Announcing the 2018 Future Internet Travel Award for PhD Students
by Dino Giuli - 1-11 The Improved Adaptive Silence Period Algorithm over Time-Variant Channels in the Cognitive Radio System
by Jingbo Zhang & Zhenyang Sun & Shufang Zhang - 1-15 A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment
by Irshad Ahmed Abbasi & Adnan Shahid Khan - 1-17 Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications
by Pierpaolo Loreti & Lorenzo Bracciale & Alberto Caponi
February 2018, Volume 10, Issue 2
- 1-3 Security and Privacy in Wireless and Mobile Networks
by Georgios Kambourakis & Felix Gomez Marmol & Guojun Wang - 1-6 Robotics Construction Kits: From “Objects to Think with” to “Objects to Think and to Emote with”
by Antonella D’Amico & Domenico Guastella - 1-16 An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs
by Muhammad Salman Pathan & Nafei Zhu & Jingsha He & Zulfiqar Ali Zardari & Muhammad Qasim Memon & Muhammad Iftikhar Hussain - 1-16 Virtual Career Fairs: Perspectives from Norwegian Recruiters and Exhibitors
by Ådne Stenberg Vik & Bjørn Christian Nørbech & Debora Jeske - 1-16 Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough?
by Valentina Gatteschi & Fabrizio Lamberti & Claudio Demartini & Chiara Pranteda & Víctor Santamaría - 1-17 Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks
by Blerim Rexha & Gresa Shala & Valon Xhafa - 1-19 Smart Pedestrian Crossing Management at Traffic Light Junctions through a Fuzzy-Based Approach
by Giovanni Pau & Tiziana Campisi & Antonino Canale & Alessandro Severino & Mario Collotta & Giovanni Tesoriere
January 2018, Volume 10, Issue 1
- 1-3 Recent Advances on Cellular D2D Communications
by Boon-Chong Seet & Syed Faraz Hasan & Peter Han-Joo Chong - 1-5 Acknowledgement to Reviewers of Future Internet in 2017
by Future Internet Editorial Office - 1-14 A Decision Framework for Choosing Telecommunication Technologies in Limited-Resource Settings
by Suzana Brown & Alan Mickelson - 1-14 A Velocity-Aware Handover Trigger in Two-Tier Heterogeneous Networks
by Asmae Ait Mansour & Nourddine Enneya & Mohamed Ouadou - 1-15 An Anonymous Offline RFID Grouping-Proof Protocol
by Zhibin Zhou & Pin Liu & Qin Liu & Guojun Wang - 1-16 Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks
by Wenjuan Li & Weizhi Meng & Lam For Kwok - 1-18 Review of Latest Advances in 3GPP Standardization: D2D Communication in 5G Systems and Its Energy Consumption Models
by Marko Höyhtyä & Olli Apilo & Mika Lasanen - 1-23 Elastic Scheduling of Scientific Workflows under Deadline Constraints in Cloud Computing Environments
by Nazia Anwar & Huifang Deng - 1-30 A Virtual Learning Architecture Enhanced by Fog Computing and Big Data Streams
by Riccardo Pecori
December 2017, Volume 10, Issue 1
- 1-17 A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs
by Rezvan Almas Shehni & Karim Faez & Farshad Eshghi & Manoochehr Kelarestaghi
December 2017, Volume 9, Issue 4
- 1-13 Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications
by Francesco Chiti & Romano Fantacci & Laura Pierucci - 1-18 SCMC: An Efficient Scheme for Minimizing Energy in WSNs Using a Set Cover Approach
by Ahmed Redha Mahlous - 1-23 Approximate Networking for Universal Internet Access
by Junaid Qadir & Arjuna Sathiaseelan & Umar Bin Farooq & Muhammad Usama & Muhammad Ali Imran & Muhammad Shafique - 1-24 How 5G Wireless (and Concomitant Technologies) Will Revolutionize Healthcare?
by Siddique Latif & Junaid Qadir & Shahzad Farooq & Muhammad Ali Imran
October 2017, Volume 9, Issue 4
- 1-10 Signal Consensus in TSP of the Same Grid in Road Network
by Dongyuan Li & Chengshuai Li & Zidong Wang & Deqiang Wang & Jianping Xing & Bo Zhang - 1-11 Deep Classifiers-Based License Plate Detection, Localization and Recognition on GPU-Powered Mobile Platform
by Syed Tahir Hussain Rizvi & Denis Patti & Tomas Björklund & Gianpiero Cabodi & Gianluca Francini - 1-12 A Practical Resource Management Scheme for Cellular Underlaid D2D Networks
by Tae-Won Ban - 1-12 Collaborative Web Service Discovery and Recommendation Based on Social Link
by Lijun Duan & Hao Tian - 1-13 SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning
by Dalal Hanna & Prakash Veeraraghavan & Ben Soh - 1-14 Challenges When Using Jurimetrics in Brazil—A Survey of Courts
by Bruna Armonas Colombo & Pedro Buck & Vinicius Miana Bezerra - 1-16 IAACaaS: IoT Application-Scoped Access Control as a Service
by Álvaro Alonso & Federico Fernández & Lourdes Marco & Joaquín Salvachúa - 1-17 Exploring Data Model Relations in OpenStreetMap
by Hippolyte Pruvost & Peter Mooney - 1-18 An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing
by A S M Touhidul Hasan & Qingshan Jiang & Chengming Li - 1-20 A Design Space for Virtuality-Introduced Internet of Things
by Kota Gushima & Tatsuo Nakajima - 1-21 FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios
by Franco Mazzenga & Romeo Giuliano & Francesco Vatalaro - 1-25 An Integrated Dictionary-Learning Entropy-Based Medical Image Fusion Framework
by Guanqiu Qi & Jinchuan Wang & Qiong Zhang & Fancheng Zeng & Zhiqin Zhu
September 2017, Volume 9, Issue 4
- 1-12 Botnet Detection Technology Based on DNS
by Xingguo Li & Junfeng Wang & Xiaosong Zhang - 1-17 Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images
by Xiaoyan Yu & Chengyou Wang & Xiao Zhou - 1-20 Extensions and Enhancements to “the Secure Remote Update Protocol”
by Andrew John Poulter & Steven J. Johnson & Simon J. Cox - 1-21 Energy-Aware Adaptive Weighted Grid Clustering Algorithm for Renewable Wireless Sensor Networks
by Nelofar Aslam & Kewen Xia & Muhammad Tafseer Haider & Muhammad Usman Hadi - 1-21 Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
by Davy Preuveneers & Wouter Joosen - 1-22 TSKT-ORAM: A Two-Server k -ary Tree Oblivious RAM without Homomorphic Encryption
by Jinsheng Zhang & Qiumao Ma & Wensheng Zhang & Daji Qiao
November 2017, Volume 9, Issue 4
- 1-12 Efficient Traffic Engineering Strategies for Improving the Performance of TCP Friendly Rate Control Protocol
by Nalavala Ramanjaneya Reddy & Pakanati Chenna Reddy & Mokkala Padmavathamma - 1-12 Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission
by Fan Jiang & Honglin Wang & Hao Ren & Shuai Xu - 1-13 Understanding the Digital Marketing Environment with KPIs and Web Analytics
by José Ramón Saura & Pedro Palos-Sánchez & Luis Manuel Cerdá Suárez - 1-13 Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System
by Jingbo Zhang & Lili Cai & Shufang Zhang - 1-13 High-Performance Elastic Management for Cloud Containers Based on Predictive Message Scheduling
by Chengxin Yan & Ningjiang Chen & Zhang Shuo - 1-14 Quality of Service Based NOMA Group D2D Communications
by Asim Anwar & Boon-Chong Seet & Xue Jun Li - 1-14 A Combinational Buffer Management Scheme in Mobile Opportunistic Network
by Peiyan Yuan & Hai Yu - 1-15 Network Intrusion Detection through Discriminative Feature Selection by Using Sparse Logistic Regression
by Reehan Ali Shah & Yuntao Qian & Dileep Kumar & Munwar Ali & Muhammad Bux Alvi - 1-15 Request Expectation Index Based Cache Replacement Algorithm for Streaming Content Delivery over ICN
by Haipeng Li & Hidenori Nakazato & Syed Hassan Ahmed - 1-15 Study of Mobility Enhancements for RPL in Convergecast Scenarios
by Jinpeng Wang & Gérard Chalhoub - 1-15 High Throughput and Acceptance Ratio Multipath Routing Algorithm in Cognitive Wireless Mesh Network
by Zhufang Kuang & Gongqiang Li & Junshan Tan & Zhigang Chen - 1-17 Throughput-Aware Cooperative Reinforcement Learning for Adaptive Resource Allocation in Device-to-Device Communication
by Muhidul Islam Khan & Muhammad Mahtab Alam & Yannick Le Moullec & Elias Yaacoub - 1-17 Creation and Staging of Android Theatre “Sayonara”towards Developing Highly Human-Like Robots
by Takenobu Chikaraishi & Yuichiro Yoshikawa & Kohei Ogawa & Oriza Hirata & Hiroshi Ishiguro - 1-21 Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network
by Zhen Hong & Zehua Wang & Wei Cai & Victor C. M. Leung - 1-22 A Comprehensive Survey on Real-Time Applications of WSN
by Ahmad Ali & Yu Ming & Sagnik Chakraborty & Saima Iram - 1-23 Proposed Fuzzy-NN Algorithm with LoRaCommunication Protocol for Clustered Irrigation Systems
by Sotirios Kontogiannis & George Kokkonis & Soultana Ellinidou & Stavros Valsamidis - 1-23 Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems
by Stylianos S. Mamais & George Theodorakopoulos - 1-23 An Ontology-Based Approach to Enable Knowledge Representation and Reasoning in Worker–Cobot Agile Manufacturing
by Ahmed R. Sadik & Bodo Urban - 1-26 A Framework for Cloud Based E-Government from the Perspective of Developing Countries
by Pusp Raj Joshi & Shareeful Islam & Syed Islam - 1-29 A Fast and Reliable Broadcast Service for LTE-Advanced Exploiting Multihop Device-to-Device Transmissions
by Giovanni Nardini & Giovanni Stea & Antonio Virdis
August 2017, Volume 9, Issue 3
- 1-9 Digital Pre-Distortion of Carrier Frequency Offset for Reliable Wi-Fi Enabled IoTs
by Il-Gu Lee - 1-15 Flow Shop Scheduling Problem and Solution in Cooperative Robotics—Case-Study: One Cobot in Cooperation with One Worker
by Ahmed R. Sadik & Bodo Urban - 1-16 A Robust Image Watermarking Scheme Based on SVD in the Spatial Domain
by Heng Zhang & Chengyou Wang & Xiao Zhou - 1-17 A Multimodal Perception Framework for Users Emotional State Assessment in Social Robotics
by Lorenzo Cominelli & Nicola Carbonaro & Daniele Mazzei & Roberto Garofalo & Alessandro Tognetti & Danilo De Rossi - 1-19 A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing
by Adrien Bonguet & Martine Bellaiche - 1-20 Multicell Interference Management in Device to Device Underlay Cellular Networks
by Georgios Katsinis & Eirini Eleni Tsiropoulou & Symeon Papavassiliou - 1-21 Cost-Aware IoT Extension of DISSECT-CF
by Andras Markus & Attila Kertesz & Gabor Kecskemeti
September 2017, Volume 9, Issue 3
- 1-2 Future Intelligent Systems and Networks
by Carmen De-Pablos-Heredero - 1-13 Local Path Planning of Driverless Car Navigation Based on Jump Point Search Method Under Urban Environment
by Kaijun Zhou & Lingli Yu & Ziwei Long & Siyao Mo - 1-14 ARAAC: A Rational Allocation Approach in Cloud Data Center Networks
by Ahmad Nahar Quttoum & Ayoub Alsarhan & Abidalrahman Moh’d - 1-17 Towards a New Digital Era: Observing Local E-Government Services Adoption in a Chinese Municipality
by Yao Yang - 1-20 Design for Children’s Playful Learning with Robots
by Maria Luce Lupetti & Yuan Yao & Haipeng Mi & Claudio Germak
June 2017, Volume 9, Issue 3
- 1-10 A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling
by Lingjun Liu & Zhonghua Xie & Cui Yang - 1-13 Security Enhancement for Data Migration in the Cloud
by Jean Raphael Ngnie Sighom & Pin Zhang & Lin You - 1-16 Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things
by Ashish Rauniyar & Mohammad Irfan & Oka Danil Saputra & Jin Woo Kim & Ah Ra Lee & Jae Min Jang & Soo Young Shin - 1-20 Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology
by Luisanna Cocco & Andrea Pinna & Michele Marchesi - 1-21 Cryptographic Key Management in Delay Tolerant Networks: A Survey
by Sofia Anna Menesidou & Vasilios Katos & Georgios Kambourakis - 1-28 A Security Framework for the Internet of Things in the Future Internet Architecture
by Xiruo Liu & Meiyuan Zhao & Sugang Li & Feixiong Zhang & Wade Trappe
July 2017, Volume 9, Issue 3
- 1-7 G-Networks with Adders
by Jean-Michel Fourneau & Erol Gelenbe - 1-9 Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs
by Il-Gu Lee - 1-13 An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings
by Ruchdee Binmad & Mingchu Li & Zhen Wang & Nakema Deonauth & Chettupally Anil Carie - 1-13 A Novel Hybrid-Copy Algorithm for Live Migration of Virtual Machine
by Zhou Lei & Exiong Sun & Shengbo Chen & Jiang Wu & Wenfeng Shen - 1-13 Visual Interface Evaluation for Wearables Datasets: Predicting the Subjective Augmented Vision Image QoE and QoS
by Brian Bauman & Patrick Seeling - 1-14 NB-IoT for D2D-Enhanced Content Uploading with Social Trustworthiness in 5G Systems †
by Leonardo Militano & Antonino Orsino & Giuseppe Araniti & Antonio Iera - 1-15 Study on a Quality Evaluation Method for College English Classroom Teaching
by Mao-hua Sun & Yuan-gang Li & Bing He - 1-16 Feasibility Study of a Socially Assistive Humanoid Robot for Guiding Elderly Individuals during Walking
by Chiara Piezzo & Kenji Suzuki - 1-16 User Modelling Validation over the Security Awareness of Digital Natives
by Vasileios Gkioulos & Gaute Wangen & Sokratis K. Katsikas - 1-16 Robust Image Embedded Watermarking Using DCT and Listless SPIHT
by J. L. Divya Shivani & Ranjan K. Senapati - 1-18 Combining Adaptive Holonic Control and ISA-95 Architectures to Self-Organize the Interaction in a Worker-Industrial Robot Cooperative Workcell
by Ahmed R. Sadik & Bodo Urban - 1-18 Azure-Based Smart Monitoring System for Anemia-Like Pallor
by Sohini Roychowdhury & Paul Hage & Joseph Vasquez - 1-25 Deducing Energy Consumer Behavior from Smart Meter Data
by Emad Ebeid & Rune Heick & Rune Hylsberg Jacobsen
May 2017, Volume 9, Issue 2
- 1-11 A Simple Approach to Dynamic Optimisation of Flexible Optical Networks with Practical Application
by Vic Grout - 1-13 Towards Rack Utilization in Internet Datacenters: An Approach Based on Dynamic Programming
by Haibao Chen & Yuyan Zhao & Chuxiong Yan - 1-21 Private and Secure Distribution of Targeted Advertisements to Mobile Phones
by Stylianos S. Mamais & George Theodorakopoulos
April 2017, Volume 9, Issue 2
- 1-11 Spectrum and Energy Efficiency of Uplink Massive MIMO System with D2D Underlay
by Xinhua Wang - 1-12 An Energy Efficient MAC Protocol for Wireless Passive Sensor Networks
by Qingyao Yu & Guangming Li & Xiaojie Hang & Kun Fu & And Tianqi Li - 1-15 Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection
by Yunpeng Zhang & Chengyou Wang & Xiaoli Wang & Min Wang - 1-19 Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish
by Andrea Guazzini & Ayça Saraç & Camillo Donati & Annalisa Nardi & Daniele Vilone & Patrizia Meringolo - 1-22 Assessing OpenStreetMap Data Using Intrinsic Quality Indicators: An Extension to the QGIS Processing Toolbox
by Sukhjit Singh Sehra & Jaiteg Singh & Hardeep Singh Rai
March 2017, Volume 9, Issue 2
- 1-8 Decentralized Blind Spectrum Selection in Cognitive Radio Networks Considering Handoff Cost
by Yongqun Chen & Huaibei Zhou & Ruoshan Kong & Li Zhu & Huaqing Mao
June 2017, Volume 9, Issue 2
- 1-11 Energy Efficient Power Allocation for the Uplink of Distributed Massive MIMO Systems
by Xinhua Wang & Yan Yang & Jinlu Sheng - 1-12 An Adaptive Back-Off Mechanism for Wireless Sensor Networks
by Peng Sun & Guangming Li & Fuqiang Wang - 1-13 A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics
by Weijun Wang & Ying Li & Yinghui Huang & Hui Liu & Tingting Zhang - 1-19 An Access Control Model for Preventing Virtual Machine Escape Attack
by Jiang Wu & Zhou Lei & Shengbo Chen & Wenfeng Shen
March 2017, Volume 9, Issue 1
- 1-9 Improved Recommendations Based on Trust Relationships in Social Networks
by Hao Tian & Peifeng Liang - 1-15 An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning
by Jingsha He & Qi Xiao & Peng He & Muhammad Salman Pathan - 1-19 Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
by Sokratis Vidros & Constantinos Kolias & Georgios Kambourakis & Leman Akoglu - 1-21 Designing a Softwarized Network Deployed on a Fleet of Drones for Rural Zone Monitoring
by Corrado Rametta & Giovanni Schembra
January 2017, Volume 9, Issue 1
- 1-2 Acknowledgement to Reviewers of Future Internet in 2016
by Future Internet Editorial Office - 1-14 Towards Incidence Management in 5G Based on Situational Awareness
by Lorena Isabel Barona López & Ángel Leonardo Valdivieso Caraguay & Jorge Maestre Vidal & Marco Antonio Sotelo Monge & Luis Javier García Villalba
February 2017, Volume 9, Issue 1
- 1-17 A Point of View on New Education for Smart Citizenship
by Cristina Martelli - 1-20 Construction Management Risk System (CMRS) for Construction Management (CM) Firms
by Kyungmo Park & Sanghyo Lee & Yonghan Ahn
December 2016, Volume 9, Issue 1
- 1-15 Key Technologies in the Context of Future Networks: Operational and Management Requirements
by Lorena Isabel Barona López & Ángel Leonardo Valdivieso Caraguay & Marco Antonio Sotelo Monge & Luis Javier García Villalba
September 2016, Volume 8, Issue 4
- 1-16 Data-Enabled Design for Social Change: Two Case Studies
by Patrizia Marti & Carl Megens & Caroline Hummels - 1-21 A Reliability Calculation Method for Web Service Composition Using Fuzzy Reasoning Colored Petri Nets and Its Application on Supercomputing Cloud Platform
by Ziyun Deng & Lei Chen & Tingqing He & Tao Meng - 1-26 Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments
by Adel Alti & Abderrahim Lakehal & Sébastien Laborie & Philippe Roose
December 2016, Volume 8, Issue 4
- 1-24 Designing and Implementing Weather Generators as Web Services
by Rassarin Chinnachodteeranun & Nguyen Duy Hung & Kiyoshi Honda & Amor V. M. Ines & Eunjin Han
October 2016, Volume 8, Issue 4
- 1-10 A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection
by Xuan Dau Hoang & Hong Ky Pham - 1-15 Socialism and the Blockchain
by Steve Huckle & Martin White - 1-17 ODK Scan: Digitizing Data Collection and Impacting Data Management Processes in Pakistan’s Tuberculosis Control Program
by Syed Mustafa Ali & Rachel Powers & Jeffrey Beorse & Arif Noor & Farah Naureen & Naveed Anjum & Muhammad Ishaq & Javariya Aamir & Richard Anderson - 1-19 Senior Living Lab: An Ecological Approach to Foster Social Innovation in an Ageing Society
by Leonardo Angelini & Stefano Carrino & Omar Abou Khaled & Susie Riva-Mossman & Elena Mugellini
November 2016, Volume 8, Issue 4
- 1-18 Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
by Jingsha He & Chengyue Chang & Peng He & Muhammad Salman Pathan - 1-18 A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering
by Zhiqin Zhu & Guanqiu Qi & Yi Chai & Yinong Chen
September 2016, Volume 8, Issue 3
- 1-2 Introduction to the Special Issue on Human–Computer Interaction and the Social Web
by Salvatore Carta & Ludovico Boratto - 1-9 Cyber Conflicts as a New Global Threat
by Alexander Kosenkov - 1-16 Main Issues in Big Data Security
by Julio Moreno & Manuel A. Serrano & Eduardo Fernández-Medina
June 2016, Volume 8, Issue 3
- 1-12 Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks
by Ting Ye & Baowei Wang
August 2016, Volume 8, Issue 3
- 1-14 A Novel QoS Provisioning Algorithm for Optimal Multicast Routing in WMNs
by Weijun Yang & Yuanfeng Chen - 1-14 Supporting Elderly People by Ad Hoc Generated Mobile Applications Based on Vocal Interaction
by Rita Francese & Michele Risi - 1-16 Sensor Observation Service API for Providing Gridded Climate Data to Agricultural Applications
by Rassarin Chinnachodteeranun & Kiyoshi Honda - 1-16 Coproduction as an Approach to Technology-Mediated Citizen Participation in Emergency Management
by Paloma Díaz & John M. Carroll & Ignacio Aedo - 1-22 Ontology-Based Representation and Reasoning in Building Construction Cost Estimation in China
by Xin Liu & Zhongfu Li & Shaohua Jiang
July 2016, Volume 8, Issue 3
- 1-8 Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks
by Waqas Haider & Gideon Creech & Yi Xie & Jiankun Hu - 1-10 Turning Video Resource Management into Cloud Computing
by Weili Kou & Hui Li & Kailai Zhou - 1-14 Instagram and WhatsApp in Health and Healthcare: An Overview
by Maged N. Kamel Boulos & Dean M. Giustini & Steve Wheeler - 1-16 Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection
by Gabriele Guidi & Roberto Miniati & Matteo Mazzola & Ernesto Iadanza - 1-22 Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia
by Angélica Flórez & Lenin Serrano & Urbano Gómez & Luis Suárez & Alejandro Villarraga & Hugo Rodríguez - 1-23 Conflict and Computation on Wikipedia: A Finite-State Machine Analysis of Editor Interactions
by Simon DeDeo - 1-24 Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
by Antonio Santos-Olmo & Luis Enrique Sánchez & David G. Rosado & Eduardo Fernández-Medina & Mario Piattini - 1-26 Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
by Mikhail Strizhov & Zachary Osman & Indrajit Ray - 1-27 The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets
by Antonio Santos-Olmo & Luis Enrique Sánchez & Ismael Caballero & Sara Camacho & Eduardo Fernandez-Medina - 1-29 A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
by Kathryn Merrick & Medria Hardhienata & Kamran Shafi & Jiankun Hu
June 2016, Volume 8, Issue 2
- 1-12 Elusive Learning—Using Learning Analytics to Support Reflective Sensemaking of Ill-Structured Ethical Problems: A Learner-Managed Dashboard Solution
by Yianna Vovides & Sarah Inman - 1-17 A Methodological Approach to Evaluate Livestock Innovations on Small-Scale Farms in Developing Countries
by Antón García-Martínez & José Rivas-Rangel & Jaime Rangel-Quintos & José Antonio Espinosa & Cecilio Barba & Carmen De-Pablos-Heredero - 1-21 A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks
by Barbara Martini & Federica Paganelli
March 2016, Volume 8, Issue 2
- 1-11 Enhanced Local Fisher Discriminant Analysis for Indoor Positioning in Wireless Local Area Network
by Zhi-An Deng & Di Wu & Yiran Zhou & Zhenyu Na - 1-14 User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns
by Jennifer Golbeck & Matthew Louis Mauriello - 1-17 FaceMashup: An End-User Development Tool for Social Network Data
by Daniele Massa & Lucio Davide Spano
April 2016, Volume 8, Issue 2
- 1-6 Environmental Factors Affecting Where People Geocache
by Jennifer Golbeck & Carman Neustaedter - 1-15 Modeling and Security in Cloud Ecosystems
by Eduardo B. Fernandez & Nobukazu Yoshioka & Hironori Washizaki & Madiha H. Syed - 1-18 A Method for Assessing the Performance of e-Government Twitter Accounts
by Konstantinos Antoniadis & Kostas Zafiropoulos & Vasiliki Vrana - 1-21 The Evolution of Wikipedia’s Norm Network
by Bradi Heaberlin & Simon DeDeo - 1-24 Routing Based on Information about the Routes of Fixed-Route Traveling Nodes and on Destination Areas Aimed at Reducing the Load on the DTN
by Kazuaki Okamoto & Kazumasa Takami
May 2016, Volume 8, Issue 2
- 1-11 Information Is Not a Virus, and Other Consequences of Human Cognitive Limits
by Kristina Lerman - 1-15 Digital Libraries: The Challenge of Integrating Instagram with a Taxonomy for Content Management
by Simona Ibba & Filippo Eros Pani - 1-17 Computational Social Science, the Evolution of Policy Design and Rule Making in Smart Societies
by Nicola Lettieri - 1-17 Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems
by Romano Fantacci & Dania Marabissi - 1-18 Development of an Expert System for the Evaluation of Students’ Curricula on the Basis of Competencies
by Luis Enrique Sánchez & Antonio Santos-Olmo & Esther Álvarez & Monica Huerta & Sara Camacho & Eduardo Fernández-Medina - 1-21 iNUIT: Internet of Things for Urban Innovation
by Francesco Carrino & Elena Mugellini & Omar Abou Khaled & Nabil Ouerhani & Juergen Ehrensberger - 1-25 Supporting Privacy of Computations in Mobile Big Data Systems
by Sriram Nandha Premnath & Zygmunt J. Haas - 1-62 Using Financial Instruments to Transfer the Information Security Risks
by Pankaj Pandey & Einar Snekkenes
March 2016, Volume 8, Issue 1
- 1-14 MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase
by Tinghuai Ma & Xichao Xu & Meili Tang & Yuanfeng Jin & Wenhai Shen - 1-40 Analyzing the Bitcoin Network: The First Four Years
by Matthias Lischke & Benjamin Fabian
February 2016, Volume 8, Issue 1
- 1-22 A Framework for Security Transparency in Cloud Computing
by Umar Mukhtar Ismail & Shareeful Islam & Moussa Ouedraogo & Edgar Weippl
January 2016, Volume 8, Issue 1
- 1-2 Acknowledgement to Reviewers of Future Internet in 2015
by Future Internet Editorial Office - 1-18 Detection of Intelligent Intruders in Wireless Sensor Networks
by Yun Wang & William Chu & Sarah Fields & Colleen Heinemann & Zach Reiter - 1-22 Context-Based Energy Disaggregation in Smart Homes
by Francesca Paradiso & Federica Paganelli & Dino Giuli & Samuele Capobianco
December 2015, Volume 8, Issue 1
- 1-15 Priority Queues with Fractional Service for Tiered Delay QoS
by Gary Chang & Chung-Chieh Lee
September 2015, Volume 7, Issue 4
- 1-9 The Sensing Internet—A Discussion on Its Impact on Rural Areas
by Alfred Heller
October 2015, Volume 7, Issue 4
- 1-12 Embedding an Identity-Based Short Signature as a Digital Watermark
by Ugo Fiore & Francesco Rossi - 1-21 Towards an “Internet of Food”: Food Ontologies for the Internet of Things
by Maged N. Kamel Boulos & Abdulslam Yassine & Shervin Shirmohammadi & Chakkrit Snae Namahoot & Michael Brückner - 1-24 Dynamical Trust and Reputation Computation Model for B2C E-Commerce
by Bo Tian & Kecheng Liu & Yuanzhong Chen
November 2015, Volume 7, Issue 4
- 1-16 Social Empowerment of Intellectually Impaired through a Cloud Mobile System
by Laura Freina & Rosa Bottino & Michela Ott & Filippo Costa - 1-19 Dynamic Load Balancing Strategy for Cloud Computing with Ant Colony Optimization
by Ren Gao & Juebo Wu - 1-20 The Future Internet: A World of Secret Shares
by William J. Buchanan & David Lanc & Elochukwu Ukwandu & Lu Fan & Gordon Russell & Owen Lo
December 2015, Volume 7, Issue 4
- 1-14 Optimal Referral Reward Considering Customer’s Budget Constraint
by Dan Zhou & Zhong Yao - 1-16 Improving Teacher Effectiveness: Designing Better Assessment Tools in Learning Management Systems
by Dov Kruger & Sarah Inman & Zhiyu Ding & Yijin Kang & Poornima Kuna & Yujie Liu & Xiakun Lu & Stephen Oro & Yingzhu Wang - 1-16 A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments
by Prokopios Drogkaris & Stefanos Gritzalis & Christos Kalloniatis & Costas Lambrinoudakis
June 2015, Volume 7, Issue 3
- 1-11 Tracking Positioning Algorithm for Direction of Arrival Based on Direction Lock Loop
by Xiu-Zhi Cheng & Da-Rong Zhu & Shen Zhang & Ping He