Journal: Future Internet

Volume 8, Issue 4

46 -- 0Patrizia Marti, Carl Megens, Caroline Hummels. Data-Enabled Design for Social Change: Two Case Studies
47 -- 0Ziyun Deng, Lei Chen, Tingqin He, Tao Meng. A Reliability Calculation Method for Web Service Composition Using Fuzzy Reasoning Colored Petri Nets and Its Application on Supercomputing Cloud Platform
48 -- 0Adel Alti, Abderrahim Lakehal, Sébastien Laborie, Philippe Roose. Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments
49 -- 0Steve Huckle, Martin White. Socialism and the Blockchain
50 -- 0Leonardo Angelini, Stefano Carrino, Omar Abou Khaled, Susie Riva-Mossman, Elena Mugellini. Senior Living Lab: An Ecological Approach to Foster Social Innovation in an Ageing Society
51 -- 0Syed Mustafa Ali, Rachel Powers, Jeffrey Beorse, Arif Noor, Farah Naureen, Naveed Anjum, Muhammad Ishaq, Javariya Aamir, Richard Anderson. ODK Scan: Digitizing Data Collection and Impacting Data Management Processes in Pakistan's Tuberculosis Control Program
52 -- 0Xuan Dau Hoang, Pham Hong Ky. A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection
53 -- 0Zhiqin Zhu, Guanqiu Qi, Yi Chai, Yinong Chen. A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering
54 -- 0Jingsha He, Chengyue Chang, Peng He, Muhammad Salman Pathan. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
55 -- 0Rassarin Chinnachodteeranun, Nguyen Duy Hung, Kiyoshi Honda, Amor V. M. Ines, Eun Jin Han. Designing and Implementing Weather Generators as Web Services

Volume 8, Issue 3

27 -- 0Ting Ye, Baowei Wang. Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks
28 -- 0Mikhail Strizhov, Zachary Osman, Indrajit Ray. Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
29 -- 0Waqas Haider, Gideon Creech, Yi Xie, Jiankun Hu. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks
30 -- 0Antonio Santos-Olmo Parra, Luís Enrique Sanchez, Ismael Caballero, Sara Camacho, Eduardo Fernández-Medina. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets
31 -- 0Simon Dedeo. Conflict and Computation on Wikipedia: A Finite-State Machine Analysis of Editor Interactions
32 -- 0Gabriele Guidi, Roberto Miniati, Matteo Mazzola, Ernesto Iadanza. Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection
33 -- 0Angélica Flórez, Lenin Serrano, Urbano Gómez, Luis Suárez, Alejandro Villarraga, Hugo Rodríguez. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia
34 -- 0Kathryn E. Merrick, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
35 -- 0Weili Kou, Hui Li, Kailai Zhou. Turning Video Resource Management into Cloud Computing
36 -- 0Antonio Santos-Olmo Parra, Luís Enrique Sanchez, David G. Rosado, Eduardo Fernández-Medina, Mario Piattini. Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems
37 -- 0Maged N. Kamel Boulos, Dean M. Giustini, Steve Wheeler. Instagram and WhatsApp in Health and Healthcare: An Overview
38 -- 0Weijun Yang, Yuanfeng Chen. A Novel QoS Provisioning Algorithm for Optimal Multicast Routing in WMNs
39 -- 0Xin Liu, Zhongfu Li, Shaohua Jiang. Ontology-Based Representation and Reasoning in Building Construction Cost Estimation in China
40 -- 0Rassarin Chinnachodteeranun, Kiyoshi Honda. Sensor Observation Service API for Providing Gridded Climate Data to Agricultural Applications
41 -- 0Paloma Díaz, John M. Carroll, Ignacio Aedo. Coproduction as an Approach to Technology-Mediated Citizen Participation in Emergency Management
42 -- 0Rita Francese, Michele Risi. Supporting Elderly People by Ad Hoc Generated Mobile Applications Based on Vocal Interaction
43 -- 0Salvatore Carta, Ludovico Boratto. Introduction to the Special Issue on Human-Computer Interaction and the Social Web
44 -- 0Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina. Main Issues in Big Data Security
45 -- 0Alexander Kosenkov. Cyber Conflicts as a New Global Threat

Volume 8, Issue 2

8 -- 0Zhi-An Deng, Di Wu, Yiran Zhou, Zhenyu Na. Enhanced Local Fisher Discriminant Analysis for Indoor Positioning in Wireless Local Area Network
9 -- 0Jennifer Golbeck, Matthew Louis Mauriello. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns
10 -- 0Daniele Massa, Lucio Davide Spano. FaceMashup: An End-User Development Tool for Social Network Data
11 -- 0Jennifer Golbeck, Carman Neustaedter. Environmental Factors Affecting Where People Geocache
12 -- 0Konstantinos Antoniadis, Costas Zafiropoulos, Vasiliki Vrana. A Method for Assessing the Performance of e-Government Twitter Accounts
13 -- 0Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, Madiha H. Syed. Modeling and Security in Cloud Ecosystems
14 -- 0Bradi Heaberlin, Simon Dedeo. The Evolution of Wikipedia's Norm Network
15 -- 0Kazuaki Okamoto, Kazumasa Takami. Routing Based on Information about the Routes of Fixed-Route Traveling Nodes and on Destination Areas Aimed at Reducing the Load on the DTN
16 -- 0Simona Ibba, Filippo Eros Pani. Digital Libraries: The Challenge of Integrating Instagram with a Taxonomy for Content Management
17 -- 0Sriram Nandha Premnath, Zygmunt J. Haas. Supporting Privacy of Computations in Mobile Big Data Systems
18 -- 0Francesco Carrino, Elena Mugellini, Omar Abou Khaled, Nabil Ouerhani, Jürgen Ehrensberger. iNUIT: Internet of Things for Urban Innovation
19 -- 0Nicola Lettieri. Computational Social Science, the Evolution of Policy Design and Rule Making in Smart Societies
20 -- 0Pankaj Pandey, Einar Snekkenes. Using Financial Instruments to Transfer the Information Security Risks
21 -- 0Kristina Lerman. Information Is Not a Virus, and Other Consequences of Human Cognitive Limits
22 -- 0Luís Enrique Sanchez, Antonio Santos-Olmo Parra, Esther Álvarez, Monica Huerta, Sara Camacho, Eduardo Fernández-Medina. Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies
23 -- 0Romano Fantacci, Dania Marabissi. Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems
24 -- 0Barbara Martini, Federica Paganelli. A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks
25 -- 0Antón García Martinez, José Rivas-Rangel, Jaime Rangel-Quintos, Jose Antonio Espinosa, Cecilio Barba, Carmen de Pablos Heredero. A Methodological Approach to Evaluate Livestock Innovations on Small-Scale Farms in Developing Countries
26 -- 0Yianna Vovides, Sarah Inman. Elusive Learning - Using Learning Analytics to Support Reflective Sensemaking of Ill-Structured Ethical Problems: A Learner-Managed Dashboard Solution

Volume 8, Issue 1

1 -- 0Gary Chang, Chung-Chieh Lee. Priority Queues with Fractional Service for Tiered Delay QoS
2 -- 0Yun Wang, William Chu, Sarah Fields, Colleen Heinemann, Zach Reiter. Detection of Intelligent Intruders in Wireless Sensor Networks
4 -- 0Francesca Paradiso, Federica Paganelli, Dino Giuli, Samuele Capobianco. Context-Based Energy Disaggregation in Smart Homes
5 -- 0Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo, Edgar R. Weippl. A Framework for Security Transparency in Cloud Computing
6 -- 0Tinghuai Ma, Xichao Xu, Meili Tang, Yuanfeng Jin, Wenhai Shen. MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase
7 -- 0Matthias Lischke, Benjamin Fabian. Analyzing the Bitcoin Network: The First Four Years