Content
November 2017, Volume 9, Issue 4
- 1-14 Quality of Service Based NOMA Group D2D Communications
by Asim Anwar & Boon-Chong Seet & Xue Jun Li - 1-14 A Combinational Buffer Management Scheme in Mobile Opportunistic Network
by Peiyan Yuan & Hai Yu - 1-15 Network Intrusion Detection through Discriminative Feature Selection by Using Sparse Logistic Regression
by Reehan Ali Shah & Yuntao Qian & Dileep Kumar & Munwar Ali & Muhammad Bux Alvi - 1-15 Request Expectation Index Based Cache Replacement Algorithm for Streaming Content Delivery over ICN
by Haipeng Li & Hidenori Nakazato & Syed Hassan Ahmed - 1-15 Study of Mobility Enhancements for RPL in Convergecast Scenarios
by Jinpeng Wang & Gérard Chalhoub - 1-15 High Throughput and Acceptance Ratio Multipath Routing Algorithm in Cognitive Wireless Mesh Network
by Zhufang Kuang & Gongqiang Li & Junshan Tan & Zhigang Chen - 1-17 Throughput-Aware Cooperative Reinforcement Learning for Adaptive Resource Allocation in Device-to-Device Communication
by Muhidul Islam Khan & Muhammad Mahtab Alam & Yannick Le Moullec & Elias Yaacoub - 1-17 Creation and Staging of Android Theatre “Sayonara”towards Developing Highly Human-Like Robots
by Takenobu Chikaraishi & Yuichiro Yoshikawa & Kohei Ogawa & Oriza Hirata & Hiroshi Ishiguro - 1-21 Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network
by Zhen Hong & Zehua Wang & Wei Cai & Victor C. M. Leung - 1-22 A Comprehensive Survey on Real-Time Applications of WSN
by Ahmad Ali & Yu Ming & Sagnik Chakraborty & Saima Iram - 1-23 Proposed Fuzzy-NN Algorithm with LoRaCommunication Protocol for Clustered Irrigation Systems
by Sotirios Kontogiannis & George Kokkonis & Soultana Ellinidou & Stavros Valsamidis - 1-23 Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems
by Stylianos S. Mamais & George Theodorakopoulos - 1-23 An Ontology-Based Approach to Enable Knowledge Representation and Reasoning in Worker–Cobot Agile Manufacturing
by Ahmed R. Sadik & Bodo Urban - 1-26 A Framework for Cloud Based E-Government from the Perspective of Developing Countries
by Pusp Raj Joshi & Shareeful Islam & Syed Islam - 1-29 A Fast and Reliable Broadcast Service for LTE-Advanced Exploiting Multihop Device-to-Device Transmissions
by Giovanni Nardini & Giovanni Stea & Antonio Virdis
August 2017, Volume 9, Issue 3
- 1-9 Digital Pre-Distortion of Carrier Frequency Offset for Reliable Wi-Fi Enabled IoTs
by Il-Gu Lee - 1-15 Flow Shop Scheduling Problem and Solution in Cooperative Robotics—Case-Study: One Cobot in Cooperation with One Worker
by Ahmed R. Sadik & Bodo Urban - 1-16 A Robust Image Watermarking Scheme Based on SVD in the Spatial Domain
by Heng Zhang & Chengyou Wang & Xiao Zhou - 1-17 A Multimodal Perception Framework for Users Emotional State Assessment in Social Robotics
by Lorenzo Cominelli & Nicola Carbonaro & Daniele Mazzei & Roberto Garofalo & Alessandro Tognetti & Danilo De Rossi - 1-19 A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing
by Adrien Bonguet & Martine Bellaiche - 1-20 Multicell Interference Management in Device to Device Underlay Cellular Networks
by Georgios Katsinis & Eirini Eleni Tsiropoulou & Symeon Papavassiliou - 1-21 Cost-Aware IoT Extension of DISSECT-CF
by Andras Markus & Attila Kertesz & Gabor Kecskemeti
September 2017, Volume 9, Issue 3
- 1-2 Future Intelligent Systems and Networks
by Carmen De-Pablos-Heredero - 1-13 Local Path Planning of Driverless Car Navigation Based on Jump Point Search Method Under Urban Environment
by Kaijun Zhou & Lingli Yu & Ziwei Long & Siyao Mo - 1-14 ARAAC: A Rational Allocation Approach in Cloud Data Center Networks
by Ahmad Nahar Quttoum & Ayoub Alsarhan & Abidalrahman Moh’d - 1-17 Towards a New Digital Era: Observing Local E-Government Services Adoption in a Chinese Municipality
by Yao Yang - 1-20 Design for Children’s Playful Learning with Robots
by Maria Luce Lupetti & Yuan Yao & Haipeng Mi & Claudio Germak
June 2017, Volume 9, Issue 3
- 1-10 A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling
by Lingjun Liu & Zhonghua Xie & Cui Yang - 1-13 Security Enhancement for Data Migration in the Cloud
by Jean Raphael Ngnie Sighom & Pin Zhang & Lin You - 1-16 Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things
by Ashish Rauniyar & Mohammad Irfan & Oka Danil Saputra & Jin Woo Kim & Ah Ra Lee & Jae Min Jang & Soo Young Shin - 1-20 Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology
by Luisanna Cocco & Andrea Pinna & Michele Marchesi - 1-21 Cryptographic Key Management in Delay Tolerant Networks: A Survey
by Sofia Anna Menesidou & Vasilios Katos & Georgios Kambourakis - 1-28 A Security Framework for the Internet of Things in the Future Internet Architecture
by Xiruo Liu & Meiyuan Zhao & Sugang Li & Feixiong Zhang & Wade Trappe
July 2017, Volume 9, Issue 3
- 1-7 G-Networks with Adders
by Jean-Michel Fourneau & Erol Gelenbe - 1-9 Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs
by Il-Gu Lee - 1-13 An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings
by Ruchdee Binmad & Mingchu Li & Zhen Wang & Nakema Deonauth & Chettupally Anil Carie - 1-13 A Novel Hybrid-Copy Algorithm for Live Migration of Virtual Machine
by Zhou Lei & Exiong Sun & Shengbo Chen & Jiang Wu & Wenfeng Shen - 1-13 Visual Interface Evaluation for Wearables Datasets: Predicting the Subjective Augmented Vision Image QoE and QoS
by Brian Bauman & Patrick Seeling - 1-14 NB-IoT for D2D-Enhanced Content Uploading with Social Trustworthiness in 5G Systems †
by Leonardo Militano & Antonino Orsino & Giuseppe Araniti & Antonio Iera - 1-15 Study on a Quality Evaluation Method for College English Classroom Teaching
by Mao-hua Sun & Yuan-gang Li & Bing He - 1-16 Feasibility Study of a Socially Assistive Humanoid Robot for Guiding Elderly Individuals during Walking
by Chiara Piezzo & Kenji Suzuki - 1-16 User Modelling Validation over the Security Awareness of Digital Natives
by Vasileios Gkioulos & Gaute Wangen & Sokratis K. Katsikas - 1-16 Robust Image Embedded Watermarking Using DCT and Listless SPIHT
by J. L. Divya Shivani & Ranjan K. Senapati - 1-18 Combining Adaptive Holonic Control and ISA-95 Architectures to Self-Organize the Interaction in a Worker-Industrial Robot Cooperative Workcell
by Ahmed R. Sadik & Bodo Urban - 1-18 Azure-Based Smart Monitoring System for Anemia-Like Pallor
by Sohini Roychowdhury & Paul Hage & Joseph Vasquez - 1-25 Deducing Energy Consumer Behavior from Smart Meter Data
by Emad Ebeid & Rune Heick & Rune Hylsberg Jacobsen
May 2017, Volume 9, Issue 2
- 1-11 A Simple Approach to Dynamic Optimisation of Flexible Optical Networks with Practical Application
by Vic Grout - 1-13 Towards Rack Utilization in Internet Datacenters: An Approach Based on Dynamic Programming
by Haibao Chen & Yuyan Zhao & Chuxiong Yan - 1-21 Private and Secure Distribution of Targeted Advertisements to Mobile Phones
by Stylianos S. Mamais & George Theodorakopoulos
April 2017, Volume 9, Issue 2
- 1-11 Spectrum and Energy Efficiency of Uplink Massive MIMO System with D2D Underlay
by Xinhua Wang - 1-12 An Energy Efficient MAC Protocol for Wireless Passive Sensor Networks
by Qingyao Yu & Guangming Li & Xiaojie Hang & Kun Fu & And Tianqi Li - 1-15 Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection
by Yunpeng Zhang & Chengyou Wang & Xiaoli Wang & Min Wang - 1-19 Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish
by Andrea Guazzini & Ayça Saraç & Camillo Donati & Annalisa Nardi & Daniele Vilone & Patrizia Meringolo - 1-22 Assessing OpenStreetMap Data Using Intrinsic Quality Indicators: An Extension to the QGIS Processing Toolbox
by Sukhjit Singh Sehra & Jaiteg Singh & Hardeep Singh Rai
March 2017, Volume 9, Issue 2
- 1-8 Decentralized Blind Spectrum Selection in Cognitive Radio Networks Considering Handoff Cost
by Yongqun Chen & Huaibei Zhou & Ruoshan Kong & Li Zhu & Huaqing Mao
June 2017, Volume 9, Issue 2
- 1-11 Energy Efficient Power Allocation for the Uplink of Distributed Massive MIMO Systems
by Xinhua Wang & Yan Yang & Jinlu Sheng - 1-12 An Adaptive Back-Off Mechanism for Wireless Sensor Networks
by Peng Sun & Guangming Li & Fuqiang Wang - 1-13 A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics
by Weijun Wang & Ying Li & Yinghui Huang & Hui Liu & Tingting Zhang - 1-19 An Access Control Model for Preventing Virtual Machine Escape Attack
by Jiang Wu & Zhou Lei & Shengbo Chen & Wenfeng Shen
March 2017, Volume 9, Issue 1
- 1-9 Improved Recommendations Based on Trust Relationships in Social Networks
by Hao Tian & Peifeng Liang - 1-15 An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning
by Jingsha He & Qi Xiao & Peng He & Muhammad Salman Pathan - 1-19 Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
by Sokratis Vidros & Constantinos Kolias & Georgios Kambourakis & Leman Akoglu - 1-21 Designing a Softwarized Network Deployed on a Fleet of Drones for Rural Zone Monitoring
by Corrado Rametta & Giovanni Schembra
January 2017, Volume 9, Issue 1
- 1-2 Acknowledgement to Reviewers of Future Internet in 2016
by Future Internet Editorial Office - 1-14 Towards Incidence Management in 5G Based on Situational Awareness
by Lorena Isabel Barona López & Ángel Leonardo Valdivieso Caraguay & Jorge Maestre Vidal & Marco Antonio Sotelo Monge & Luis Javier García Villalba
February 2017, Volume 9, Issue 1
- 1-17 A Point of View on New Education for Smart Citizenship
by Cristina Martelli - 1-20 Construction Management Risk System (CMRS) for Construction Management (CM) Firms
by Kyungmo Park & Sanghyo Lee & Yonghan Ahn
December 2016, Volume 9, Issue 1
- 1-15 Key Technologies in the Context of Future Networks: Operational and Management Requirements
by Lorena Isabel Barona López & Ángel Leonardo Valdivieso Caraguay & Marco Antonio Sotelo Monge & Luis Javier García Villalba
September 2016, Volume 8, Issue 4
- 1-16 Data-Enabled Design for Social Change: Two Case Studies
by Patrizia Marti & Carl Megens & Caroline Hummels - 1-21 A Reliability Calculation Method for Web Service Composition Using Fuzzy Reasoning Colored Petri Nets and Its Application on Supercomputing Cloud Platform
by Ziyun Deng & Lei Chen & Tingqing He & Tao Meng - 1-26 Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments
by Adel Alti & Abderrahim Lakehal & Sébastien Laborie & Philippe Roose
December 2016, Volume 8, Issue 4
- 1-24 Designing and Implementing Weather Generators as Web Services
by Rassarin Chinnachodteeranun & Nguyen Duy Hung & Kiyoshi Honda & Amor V. M. Ines & Eunjin Han
October 2016, Volume 8, Issue 4
- 1-10 A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection
by Xuan Dau Hoang & Hong Ky Pham - 1-15 Socialism and the Blockchain
by Steve Huckle & Martin White - 1-17 ODK Scan: Digitizing Data Collection and Impacting Data Management Processes in Pakistan’s Tuberculosis Control Program
by Syed Mustafa Ali & Rachel Powers & Jeffrey Beorse & Arif Noor & Farah Naureen & Naveed Anjum & Muhammad Ishaq & Javariya Aamir & Richard Anderson - 1-19 Senior Living Lab: An Ecological Approach to Foster Social Innovation in an Ageing Society
by Leonardo Angelini & Stefano Carrino & Omar Abou Khaled & Susie Riva-Mossman & Elena Mugellini
November 2016, Volume 8, Issue 4
- 1-18 Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
by Jingsha He & Chengyue Chang & Peng He & Muhammad Salman Pathan - 1-18 A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering
by Zhiqin Zhu & Guanqiu Qi & Yi Chai & Yinong Chen
September 2016, Volume 8, Issue 3
- 1-2 Introduction to the Special Issue on Human–Computer Interaction and the Social Web
by Salvatore Carta & Ludovico Boratto - 1-9 Cyber Conflicts as a New Global Threat
by Alexander Kosenkov - 1-16 Main Issues in Big Data Security
by Julio Moreno & Manuel A. Serrano & Eduardo Fernández-Medina
June 2016, Volume 8, Issue 3
- 1-12 Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks
by Ting Ye & Baowei Wang
August 2016, Volume 8, Issue 3
- 1-14 A Novel QoS Provisioning Algorithm for Optimal Multicast Routing in WMNs
by Weijun Yang & Yuanfeng Chen - 1-14 Supporting Elderly People by Ad Hoc Generated Mobile Applications Based on Vocal Interaction
by Rita Francese & Michele Risi - 1-16 Sensor Observation Service API for Providing Gridded Climate Data to Agricultural Applications
by Rassarin Chinnachodteeranun & Kiyoshi Honda - 1-16 Coproduction as an Approach to Technology-Mediated Citizen Participation in Emergency Management
by Paloma Díaz & John M. Carroll & Ignacio Aedo - 1-22 Ontology-Based Representation and Reasoning in Building Construction Cost Estimation in China
by Xin Liu & Zhongfu Li & Shaohua Jiang
July 2016, Volume 8, Issue 3
- 1-8 Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks
by Waqas Haider & Gideon Creech & Yi Xie & Jiankun Hu - 1-10 Turning Video Resource Management into Cloud Computing
by Weili Kou & Hui Li & Kailai Zhou - 1-14 Instagram and WhatsApp in Health and Healthcare: An Overview
by Maged N. Kamel Boulos & Dean M. Giustini & Steve Wheeler - 1-16 Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection
by Gabriele Guidi & Roberto Miniati & Matteo Mazzola & Ernesto Iadanza - 1-22 Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia
by Angélica Flórez & Lenin Serrano & Urbano Gómez & Luis Suárez & Alejandro Villarraga & Hugo Rodríguez - 1-23 Conflict and Computation on Wikipedia: A Finite-State Machine Analysis of Editor Interactions
by Simon DeDeo - 1-24 Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
by Antonio Santos-Olmo & Luis Enrique Sánchez & David G. Rosado & Eduardo Fernández-Medina & Mario Piattini - 1-26 Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
by Mikhail Strizhov & Zachary Osman & Indrajit Ray - 1-27 The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets
by Antonio Santos-Olmo & Luis Enrique Sánchez & Ismael Caballero & Sara Camacho & Eduardo Fernandez-Medina - 1-29 A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
by Kathryn Merrick & Medria Hardhienata & Kamran Shafi & Jiankun Hu
June 2016, Volume 8, Issue 2
- 1-12 Elusive Learning—Using Learning Analytics to Support Reflective Sensemaking of Ill-Structured Ethical Problems: A Learner-Managed Dashboard Solution
by Yianna Vovides & Sarah Inman - 1-17 A Methodological Approach to Evaluate Livestock Innovations on Small-Scale Farms in Developing Countries
by Antón García-Martínez & José Rivas-Rangel & Jaime Rangel-Quintos & José Antonio Espinosa & Cecilio Barba & Carmen De-Pablos-Heredero - 1-21 A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks
by Barbara Martini & Federica Paganelli
March 2016, Volume 8, Issue 2
- 1-11 Enhanced Local Fisher Discriminant Analysis for Indoor Positioning in Wireless Local Area Network
by Zhi-An Deng & Di Wu & Yiran Zhou & Zhenyu Na - 1-14 User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns
by Jennifer Golbeck & Matthew Louis Mauriello - 1-17 FaceMashup: An End-User Development Tool for Social Network Data
by Daniele Massa & Lucio Davide Spano
April 2016, Volume 8, Issue 2
- 1-6 Environmental Factors Affecting Where People Geocache
by Jennifer Golbeck & Carman Neustaedter - 1-15 Modeling and Security in Cloud Ecosystems
by Eduardo B. Fernandez & Nobukazu Yoshioka & Hironori Washizaki & Madiha H. Syed - 1-18 A Method for Assessing the Performance of e-Government Twitter Accounts
by Konstantinos Antoniadis & Kostas Zafiropoulos & Vasiliki Vrana - 1-21 The Evolution of Wikipedia’s Norm Network
by Bradi Heaberlin & Simon DeDeo - 1-24 Routing Based on Information about the Routes of Fixed-Route Traveling Nodes and on Destination Areas Aimed at Reducing the Load on the DTN
by Kazuaki Okamoto & Kazumasa Takami
May 2016, Volume 8, Issue 2
- 1-11 Information Is Not a Virus, and Other Consequences of Human Cognitive Limits
by Kristina Lerman - 1-15 Digital Libraries: The Challenge of Integrating Instagram with a Taxonomy for Content Management
by Simona Ibba & Filippo Eros Pani - 1-17 Computational Social Science, the Evolution of Policy Design and Rule Making in Smart Societies
by Nicola Lettieri - 1-17 Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems
by Romano Fantacci & Dania Marabissi - 1-18 Development of an Expert System for the Evaluation of Students’ Curricula on the Basis of Competencies
by Luis Enrique Sánchez & Antonio Santos-Olmo & Esther Álvarez & Monica Huerta & Sara Camacho & Eduardo Fernández-Medina - 1-21 iNUIT: Internet of Things for Urban Innovation
by Francesco Carrino & Elena Mugellini & Omar Abou Khaled & Nabil Ouerhani & Juergen Ehrensberger - 1-25 Supporting Privacy of Computations in Mobile Big Data Systems
by Sriram Nandha Premnath & Zygmunt J. Haas - 1-62 Using Financial Instruments to Transfer the Information Security Risks
by Pankaj Pandey & Einar Snekkenes
March 2016, Volume 8, Issue 1
- 1-14 MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase
by Tinghuai Ma & Xichao Xu & Meili Tang & Yuanfeng Jin & Wenhai Shen - 1-40 Analyzing the Bitcoin Network: The First Four Years
by Matthias Lischke & Benjamin Fabian
February 2016, Volume 8, Issue 1
- 1-22 A Framework for Security Transparency in Cloud Computing
by Umar Mukhtar Ismail & Shareeful Islam & Moussa Ouedraogo & Edgar Weippl
January 2016, Volume 8, Issue 1
- 1-2 Acknowledgement to Reviewers of Future Internet in 2015
by Future Internet Editorial Office - 1-18 Detection of Intelligent Intruders in Wireless Sensor Networks
by Yun Wang & William Chu & Sarah Fields & Colleen Heinemann & Zach Reiter - 1-22 Context-Based Energy Disaggregation in Smart Homes
by Francesca Paradiso & Federica Paganelli & Dino Giuli & Samuele Capobianco
December 2015, Volume 8, Issue 1
- 1-15 Priority Queues with Fractional Service for Tiered Delay QoS
by Gary Chang & Chung-Chieh Lee
September 2015, Volume 7, Issue 4
- 1-9 The Sensing Internet—A Discussion on Its Impact on Rural Areas
by Alfred Heller
October 2015, Volume 7, Issue 4
- 1-12 Embedding an Identity-Based Short Signature as a Digital Watermark
by Ugo Fiore & Francesco Rossi - 1-21 Towards an “Internet of Food”: Food Ontologies for the Internet of Things
by Maged N. Kamel Boulos & Abdulslam Yassine & Shervin Shirmohammadi & Chakkrit Snae Namahoot & Michael Brückner - 1-24 Dynamical Trust and Reputation Computation Model for B2C E-Commerce
by Bo Tian & Kecheng Liu & Yuanzhong Chen
November 2015, Volume 7, Issue 4
- 1-16 Social Empowerment of Intellectually Impaired through a Cloud Mobile System
by Laura Freina & Rosa Bottino & Michela Ott & Filippo Costa - 1-19 Dynamic Load Balancing Strategy for Cloud Computing with Ant Colony Optimization
by Ren Gao & Juebo Wu - 1-20 The Future Internet: A World of Secret Shares
by William J. Buchanan & David Lanc & Elochukwu Ukwandu & Lu Fan & Gordon Russell & Owen Lo
December 2015, Volume 7, Issue 4
- 1-14 Optimal Referral Reward Considering Customer’s Budget Constraint
by Dan Zhou & Zhong Yao - 1-16 Improving Teacher Effectiveness: Designing Better Assessment Tools in Learning Management Systems
by Dov Kruger & Sarah Inman & Zhiyu Ding & Yijin Kang & Poornima Kuna & Yujie Liu & Xiakun Lu & Stephen Oro & Yingzhu Wang - 1-16 A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments
by Prokopios Drogkaris & Stefanos Gritzalis & Christos Kalloniatis & Costas Lambrinoudakis
June 2015, Volume 7, Issue 3
- 1-11 Tracking Positioning Algorithm for Direction of Arrival Based on Direction Lock Loop
by Xiu-Zhi Cheng & Da-Rong Zhu & Shen Zhang & Ping He
July 2015, Volume 7, Issue 3
- 1-19 Vehicular Internet: Security & Privacy Challenges and Opportunities
by Kamran Zaidi & Muttukrishnan Rajarajan - 1-32 EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things
by Waqas Aman & Einar Snekkenes
September 2015, Volume 7, Issue 3
- 1-13 Development of a Remote Monitoring System for Henhouse Environment Based on IoT Technology
by Hua Li & Huan Wang & Wenqing Yin & Yongwei Li & Yan Qian & Fei Hu - 1-21 Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
by Dilraj Singh & Amardeep Singh
August 2015, Volume 7, Issue 3
- 1-13 Enhancing Educational Opportunities with Computer-Mediated Assessment Feedback
by David Tuffley & Amy Antonio - 1-18 Social Media-Related Geographic Information in the Context of Strategic Environmental Assessment of Municipal Masterplans: A Case Study Concerning Sardinia (Italy)
by Roberta Floris & Corrado Zoppi - 1-22 A Low-Jitter Wireless Transmission Based on Buffer Management in Coding-Aware Routing
by Cunbo Lu & Liangtian Wan
June 2015, Volume 7, Issue 2
- 1-12 Utilizing the ECHO Model in the Veterans Health Affairs System: Guidelines for Setup, Operations and Preliminary Findings
by Herschel Knapp & Sanjog Pangarkar - 1-14 Output from Statistical Predictive Models as Input to eLearning Dashboards
by Marlene A. Smith - 1-18 Self-Optimization of Handover Parameters for Long-Term Evolution with Dual Wireless Mobile Relay Nodes
by Battulga Davaasambuu & Keping Yu & Takuro Sato
May 2015, Volume 7, Issue 2
- 1-12 Quantitative Analysis of the Usage of a Pedagogical Tool Combining Questions Listed as Learning Objectives and Answers Provided as Online Videos
by Odette Laneuville & Dorota Sikora - 1-16 Inefficiency of IDS Static Anomaly Detectors in Real-World Networks
by Edward Guillen & Jeisson Sánchez & Rafael Paez - 1-18 Receiver-Triggered Handshake Protocol for DTN in Disaster Area
by Ryoma Yamashita & Kazumasa Takami - 1-30 Dynamis: Effective Context-Aware Web Service Selection Using Dynamic Attributes
by Atousa Pahlevan & Jean-Luc Duprat & Alex Thomo & Hausi Müller
February 2015, Volume 7, Issue 1
- 1-24 Aspects to Be Considered when Implementing Technology-Enhanced Learning Approaches: A Literature Review
by Patrick Schweighofer & Martin Ebner
January 2015, Volume 7, Issue 1
- 1-2 Acknowledgement to Reviewers of Future Internet in 2014
by Future Internet Editorial Office - 1-23 Geographic Ontologies, Gazetteers and Multilingualism
by Robert Laurini
March 2015, Volume 7, Issue 1
- 1-17 Participatory Design to Enhance ICT Learning and Community Attachment: A Case Study in Rural Taiwan
by Yi-Ting Huang - 1-27 Social Networking Privacy—Who’s Stalking You?
by Diane Gan & Lily R. Jenkins
November 2014, Volume 6, Issue 4
- 1-13 Reducing Risky Security Behaviours: Utilising Affective Feedback to Educate Users
by Lynsay A. Shepherd & Jacqueline Archibald & Robert Ian Ferguson - 1-18 Using Multilevel Analysis to Examine the Relationship between Upper Secondary Students Internet Safety Awareness, Social Background and Academic Aspirations
by Ove Edvard Hatlevik & Karoline Tømte - 1-25 Public Involvement in Taking Legislative Action as to the Spatial Development of the Tourist Sector in Greece—The “OpenGov” Platform Experience
by Giorgos Somarakis & Anastasia Stratigea - 1-29 The ARCOMEM Architecture for Social- and Semantic-Driven Web Archiving
by Thomas Risse & Elena Demidova & Stefan Dietze & Wim Peters & Nikolaos Papailiou & Katerina Doka & Yannis Stavrakas & Vassilis Plachouras & Pierre Senellart & Florent Carpentier & Amin Mantrach & Bogdan Cautis & Patrick Siehndel & Dimitris Spiliotopoulos
September 2014, Volume 6, Issue 4
- 1-15 Geography Geo-Wiki in the Classroom: Using Crowdsourcing to Enhance Geographical Teaching
by Christoph Perger & Ellsworth LeDrew & Linda See & Steffen Fritz
December 2014, Volume 6, Issue 4
- 1-27 Inside Technology: Opening the Black Box of Health-Website Configuration and Content Management
by Esther Brainin & Efrat Neter
October 2014, Volume 6, Issue 4
- 1-15 The Gender Digital Divide in Developing Countries
by Amy Antonio & David Tuffley - 1-28 From Raw Data to Meaningful Information: A Representational Approach to Cadastral Databases in Relation to Urban Planning
by Francesc Valls Dalmau & Pilar Garcia-Almirall & Ernest Redondo Domínguez & David Fonseca Escudero - 1-33 Towards a Conceptual Framework for WikiGIS
by Wided Batita & Stéphane Roche & Yvan Bédard & Claude Caron
September 2014, Volume 6, Issue 3
- 1-13 Digital Forensics to Intelligent Forensics
by Alastair Irons & Harjinder Singh Lallie - 1-28 7R Data Value Framework for Open Data in Practice: Fusepool
by Michael Kaschesky & Luigi Selmi
July 2014, Volume 6, Issue 3
- 1-24 Analysing and Enriching Focused Semantic Web Archives for Parliament Applications
by Elena Demidova & Nicola Barbieri & Stefan Dietze & Adam Funk & Helge Holzmann & Diana Maynard & Nikolaos Papailiou & Wim Peters & Thomas Risse & Dimitris Spiliotopoulos
June 2014, Volume 6, Issue 3
August 2014, Volume 6, Issue 3
- 1-14 Neogeography and Preparedness for Real-to-Virtual World Knowledge Transfer: Conceptual Steps to Minecraft Malta
by Saviour Formosa - 1-16 Rikki Don’t Lose That Number : Enumerated Human Rights in a Society of Infinite Connections
by Clare Tsimpourla - 1-20 Assessing Social Value in Open Data Initiatives: A Framework
by Gianluigi Viscusi & Marco Castelli & Carlo Batini - 1-24 ARCOMEM Crawling Architecture
by Vassilis Plachouras & Florent Carpentier & Muhammad Faheem & Julien Masanès & Thomas Risse & Pierre Senellart & Patrick Siehndel & Yannis Stavrakas - 1-25 Should I Care about Your Opinion? Detection of Opinion Interestingness and Dynamics in Social Media
by Diana Maynard & Gerhard Gossen & Adam Funk & Marco Fisichella
May 2014, Volume 6, Issue 2
- 1-19 The Use of Personal Value Estimations to Select Images for Preservation in Public Library Digital Community Collections
by Andrea Copeland - 1-19 Tweet My Street: A Cross-Disciplinary Collaboration for the Analysis of Local Twitter Data
by Graeme Mearns & Rebecca Simmonds & Ranald Richardson & Mark Turner & Paul Watson & Paolo Missier - 1-22 Sharing Followers in e-Government Twitter Accounts: The Case of Greece
by Kostas Zafiropoulos & Konstantinos Antoniadis & Vasiliki Vrana - 1-35 Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices
by Wolfgang Braun & Michael Menth - 1-41 Towards Horizontal Architecture for Autonomic M2M Service Networks
by Juhani Latvakoski & Mahdi Ben Alaya & Herve Ganem & Bashar Jubeh & Antti Iivari & Jeremie Leguay & Jaume Martin Bosch & Niclas Granqvist
April 2014, Volume 6, Issue 2
- 1-13 The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence
by Harjinder Singh Lallie - 1-19 An Ontology of the Appropriate Assessment of Municipal Master Plans Related to Sardinia (Italy)
by Corrado Zoppi & Sabrina Lai - 1-19 Exploiting Multimedia in Creating and Analysing Multimedia Web Archives
by Jonathon S. Hare & David P. Dupplaw & Paul H. Lewis & Wendy Hall & Kirk Martinez - 1-20 Routing Diverse Evacuees with the Cognitive Packet Network Algorithm
by Huibo Bi
June 2014, Volume 6, Issue 2
- 1-17 Privacy and Open Government
by Teresa Scassa
February 2014, Volume 6, Issue 1
- 1-2 Acknowledgement to Reviewers of Future Internet in 2013
by Future Internet Editorial Office
March 2014, Volume 6, Issue 1
- 1-16 A Novel DOA Estimation Algorithm Using Array Rotation Technique
by Xiaoyu Lan & Liangtian Wan & Guangjie Han & Joel J. P. C. Rodrigues - 1-17 Crowdsourcing as a Tool for Knowledge Acquisition in Spatial Planning
by Chrysaida-Aliki Papadopoulou & Maria Giaoutzi - 1-19 Mobility Tolerant Firework Routing for Improving Reachability in MANETs
by Gen Motoyoshi & Kenji Leibnitz & Masayuki Murata - 1-29 Information Integration Platform for Patient-Centric Healthcare Services: Design, Prototype and Dependability Aspects
by Yohanes Baptista Dafferianto Trinugroho
January 2014, Volume 6, Issue 1
- 1-15 Analysis Matrix for Smart Cities
by Pablo E. Branchi & Carlos Fernández-Valdivielso & Ignacio R. Matias - 1-31 Recent Developments and Future Trends in Volunteered Geographic Information Research: The Case of OpenStreetMap
by Pascal Neis & Dennis Zielstra - 1-60 A Comparison of Internet Protocol (IPv6) Security Guidelines
by Steffen Hermann & Benjamin Fabian
October 2013, Volume 5, Issue 4
- 1-20 Managing Emergencies Optimally Using a Random Neural Network-Based Algorithm
by Qing Han - 1-25 Semantic and Time-Dependent Expertise Profiling Models in Community-Driven Knowledge Curation Platforms
by Hasti Ziaimatin & Tudor Groza & Jane Hunter - 1-33 Sending Safety Video over WiMAX in Vehicle Communications
by Jun Steed Huang & Oliver Yang & Funmilyo Lawal
September 2013, Volume 5, Issue 4
- 1-14 Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network
by Matti Mantere & Mirko Sailio & Sami Noponen - 1-16 Practical Attacks on Mobile Cellular Networks and Possible Countermeasures
by Murat Oğul & Selçuk Baktır
December 2013, Volume 5, Issue 4
- 1-20 Framework for Analyzing Android I/O Stack Behavior: From Generating the Workload to Analyzing the Trace
by Sooman Jeong & Kisung Lee & Jungwoo Hwang & Seongjin Lee & Youjip Won - 1-20 A Low Energy Consumption DOA Estimation Approach for Conformal Array in Ultra-Wideband
by Liangtian Wan & Lutao Liu & Guangjie Han & Joel J. P. C. Rodrigues
November 2013, Volume 5, Issue 4
- 1-5 Introduction to the Special Issue on Inequality in the Digital Environment
by Roderick Graham - 1-6 Addressing Semantic Geographic Information Systems
by Salvatore F. Pileggi & Robert Amor