


default search action
Future Internet, Volume 8
Volume 8, Number 1, March 2016
- Gary Chang, Chung-Chieh Lee:
Priority Queues with Fractional Service for Tiered Delay QoS. 1 - Yun Wang, William Chu, Sarah Fields, Colleen Heinemann, Zach Reiter:
Detection of Intelligent Intruders in Wireless Sensor Networks. 2 - Francesca Paradiso
, Federica Paganelli
, Dino Giuli, Samuele Capobianco
:
Context-Based Energy Disaggregation in Smart Homes. 4 - Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo, Edgar R. Weippl
:
A Framework for Security Transparency in Cloud Computing. 5 - Tinghuai Ma
, Xichao Xu, Meili Tang, Yuanfeng Jin, Wenhai Shen:
MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase. 6 - Matthias Lischke, Benjamin Fabian
:
Analyzing the Bitcoin Network: The First Four Years. 7
Volume 8, Number 2, June 2016
- Zhi-An Deng, Di Wu, Yiran Zhou, Zhenyu Na:
Enhanced Local Fisher Discriminant Analysis for Indoor Positioning in Wireless Local Area Network. 8 - Jennifer Golbeck, Matthew Louis Mauriello
:
User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns. 9 - Daniele Massa, Lucio Davide Spano
:
FaceMashup: An End-User Development Tool for Social Network Data. 10 - Jennifer Golbeck, Carman Neustaedter:
Environmental Factors Affecting Where People Geocache. 11 - Konstantinos Antoniadis, Costas Zafiropoulos
, Vasiliki Vrana:
A Method for Assessing the Performance of e-Government Twitter Accounts. 12 - Eduardo B. Fernández
, Nobukazu Yoshioka
, Hironori Washizaki
, Madiha H. Syed:
Modeling and Security in Cloud Ecosystems. 13 - Bradi Heaberlin, Simon DeDeo:
The Evolution of Wikipedia's Norm Network. 14 - Kazuaki Okamoto, Kazumasa Takami
:
Routing Based on Information about the Routes of Fixed-Route Traveling Nodes and on Destination Areas Aimed at Reducing the Load on the DTN. 15 - Simona Ibba
, Filippo Eros Pani:
Digital Libraries: The Challenge of Integrating Instagram with a Taxonomy for Content Management. 16 - Sriram Nandha Premnath, Zygmunt J. Haas:
Supporting Privacy of Computations in Mobile Big Data Systems. 17 - Francesco Carrino, Elena Mugellini
, Omar Abou Khaled
, Nabil Ouerhani
, Jürgen Ehrensberger:
iNUIT: Internet of Things for Urban Innovation. 18 - Nicola Lettieri
:
Computational Social Science, the Evolution of Policy Design and Rule Making in Smart Societies. 19 - Pankaj Pandey, Einar Snekkenes:
Using Financial Instruments to Transfer the Information Security Risks. 20 - Kristina Lerman
:
Information Is Not a Virus, and Other Consequences of Human Cognitive Limits. 21 - Luis Enrique Sánchez
, Antonio Santos-Olmo
, Esther Álvarez, Monica Huerta
, Sara Camacho, Eduardo Fernández-Medina
:
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies. 22 - Romano Fantacci
, Dania Marabissi
:
Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems. 23 - Barbara Martini
, Federica Paganelli
:
A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks. 24 - Antón García Martínez
, José Rivas-Rangel, Jaime Rangel-Quintos
, Jose Antonio Espinosa, Cecilio Barba
, Carmen de Pablos Heredero
:
A Methodological Approach to Evaluate Livestock Innovations on Small-Scale Farms in Developing Countries. 25 - Yianna Vovides, Sarah Inman:
Elusive Learning - Using Learning Analytics to Support Reflective Sensemaking of Ill-Structured Ethical Problems: A Learner-Managed Dashboard Solution. 26
Volume 8, Number 3, September 2016
- Ting Ye, Baowei Wang:
Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks. 27 - Mikhail Strizhov, Zachary Osman, Indrajit Ray:
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup. 28 - Waqas Haider, Gideon Creech, Yi Xie
, Jiankun Hu
:
Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks. 29 - Antonio Santos-Olmo
, Luis Enrique Sánchez
, Ismael Caballero, Sara Camacho, Eduardo Fernández-Medina
:
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets. 30 - Simon DeDeo:
Conflict and Computation on Wikipedia: A Finite-State Machine Analysis of Editor Interactions. 31 - Gabriele Guidi, Roberto Miniati, Matteo Mazzola, Ernesto Iadanza
:
Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection. 32 - Angélica Flórez
, Lenin Serrano
, Urbano Gómez
, Luis Suárez
, Alejandro Villarraga
, Hugo Rodríguez
:
Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia. 33 - Kathryn E. Merrick
, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu
:
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios. 34 - Weili Kou, Hui Li, Kailai Zhou:
Turning Video Resource Management into Cloud Computing. 35 - Antonio Santos-Olmo
, Luis Enrique Sánchez
, David Garcia Rosado
, Eduardo Fernández-Medina
, Mario Piattini
:
Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems. 36 - Maged N. Kamel Boulos
, Dean M. Giustini
, Steve Wheeler:
Instagram and WhatsApp in Health and Healthcare: An Overview. 37 - Weijun Yang
, Yuanfeng Chen
:
A Novel QoS Provisioning Algorithm for Optimal Multicast Routing in WMNs. 38 - Xin Liu
, Zhongfu Li, Shaohua Jiang:
Ontology-Based Representation and Reasoning in Building Construction Cost Estimation in China. 39 - Rassarin Chinnachodteeranun, Kiyoshi Honda:
Sensor Observation Service API for Providing Gridded Climate Data to Agricultural Applications. 40 - Paloma Díaz
, John M. Carroll
, Ignacio Aedo
:
Coproduction as an Approach to Technology-Mediated Citizen Participation in Emergency Management. 41 - Rita Francese, Michele Risi
:
Supporting Elderly People by Ad Hoc Generated Mobile Applications Based on Vocal Interaction. 42 - Salvatore Carta, Ludovico Boratto
:
Introduction to the Special Issue on Human-Computer Interaction and the Social Web. 43 - Julio Moreno
, Manuel A. Serrano
, Eduardo Fernández-Medina
:
Main Issues in Big Data Security. 44 - Alexander Kosenkov:
Cyber Conflicts as a New Global Threat. 45
Volume 8, Number 4, December 2016
- Patrizia Marti
, Carl Megens, Caroline Hummels:
Data-Enabled Design for Social Change: Two Case Studies. 46 - Ziyun Deng, Lei Chen, Tingqin He, Tao Meng:
A Reliability Calculation Method for Web Service Composition Using Fuzzy Reasoning Colored Petri Nets and Its Application on Supercomputing Cloud Platform. 47 - Adel Alti
, Abderrahim Lakehal, Sébastien Laborie
, Philippe Roose:
Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments. 48 - Steve Huckle
, Martin White
:
Socialism and the Blockchain. 49 - Leonardo Angelini
, Stefano Carrino, Omar Abou Khaled
, Susie Riva-Mossman
, Elena Mugellini
:
Senior Living Lab: An Ecological Approach to Foster Social Innovation in an Ageing Society. 50 - Syed Mustafa Ali
, Rachel Powers, Jeffrey Beorse, Arif Noor, Farah Naureen, Naveed Anjum, Muhammad Ishaq, Javariya Aamir, Richard Anderson:
ODK Scan: Digitizing Data Collection and Impacting Data Management Processes in Pakistan's Tuberculosis Control Program. 51 - Xuan Dau Hoang
, Pham Hong Ky:
A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection. 52 - Zhiqin Zhu
, Guanqiu Qi
, Yi Chai
, Yinong Chen
:
A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering. 53 - Jingsha He, Chengyue Chang
, Peng He, Muhammad Salman Pathan
:
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. 54 - Rassarin Chinnachodteeranun, Nguyen Duy Hung
, Kiyoshi Honda, Amor V. M. Ines, Eun Jin Han
:
Designing and Implementing Weather Generators as Web Services. 55

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.