Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 8, issue 4, 2016
- Designing and Implementing Weather Generators as Web Services pp. 1-24

- Rassarin Chinnachodteeranun, Nguyen Duy Hung, Kiyoshi Honda, Amor V. M. Ines and Eunjin Han
- A Reliability Calculation Method for Web Service Composition Using Fuzzy Reasoning Colored Petri Nets and Its Application on Supercomputing Cloud Platform pp. 1-21

- Ziyun Deng, Lei Chen, Tingqing He and Tao Meng
- Socialism and the Blockchain pp. 1-15

- Steve Huckle and Martin White
- Data-Enabled Design for Social Change: Two Case Studies pp. 1-16

- Patrizia Marti, Carl Megens and Caroline Hummels
- A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering pp. 1-18

- Zhiqin Zhu, Guanqiu Qi, Yi Chai and Yinong Chen
- Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning pp. 1-18

- Jingsha He, Chengyue Chang, Peng He and Muhammad Salman Pathan
- ODK Scan: Digitizing Data Collection and Impacting Data Management Processes in Pakistan’s Tuberculosis Control Program pp. 1-17

- Syed Mustafa Ali, Rachel Powers, Jeffrey Beorse, Arif Noor, Farah Naureen, Naveed Anjum, Muhammad Ishaq, Javariya Aamir and Richard Anderson
- Senior Living Lab: An Ecological Approach to Foster Social Innovation in an Ageing Society pp. 1-19

- Leonardo Angelini, Stefano Carrino, Omar Abou Khaled, Susie Riva-Mossman and Elena Mugellini
- Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments pp. 1-26

- Adel Alti, Abderrahim Lakehal, Sébastien Laborie and Philippe Roose
- A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection pp. 1-10

- Xuan Dau Hoang and Hong Ky Pham
Volume 8, issue 3, 2016
- Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks pp. 1-12

- Ting Ye and Baowei Wang
- Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems pp. 1-24

- Antonio Santos-Olmo, Luis Enrique Sánchez, David G. Rosado, Eduardo Fernández-Medina and Mario Piattini
- Introduction to the Special Issue on Human–Computer Interaction and the Social Web pp. 1-2

- Salvatore Carta and Ludovico Boratto
- Instagram and WhatsApp in Health and Healthcare: An Overview pp. 1-14

- Maged N. Kamel Boulos, Dean M. Giustini and Steve Wheeler
- A Novel QoS Provisioning Algorithm for Optimal Multicast Routing in WMNs pp. 1-14

- Weijun Yang and Yuanfeng Chen
- Supporting Elderly People by Ad Hoc Generated Mobile Applications Based on Vocal Interaction pp. 1-14

- Rita Francese and Michele Risi
- Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia pp. 1-22

- Angélica Flórez, Lenin Serrano, Urbano Gómez, Luis Suárez, Alejandro Villarraga and Hugo Rodríguez
- Ontology-Based Representation and Reasoning in Building Construction Cost Estimation in China pp. 1-22

- Xin Liu, Zhongfu Li and Shaohua Jiang
- Cyber Conflicts as a New Global Threat pp. 1-9

- Alexander Kosenkov
- Turning Video Resource Management into Cloud Computing pp. 1-10

- Weili Kou, Hui Li and Kailai Zhou
- Conflict and Computation on Wikipedia: A Finite-State Machine Analysis of Editor Interactions pp. 1-23

- Simon DeDeo
- Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks pp. 1-8

- Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu
- Case Study: IBM Watson Analytics Cloud Platform as Analytics-as-a-Service System for Heart Failure Early Detection pp. 1-16

- Gabriele Guidi, Roberto Miniati, Matteo Mazzola and Ernesto Iadanza
- Sensor Observation Service API for Providing Gridded Climate Data to Agricultural Applications pp. 1-16

- Rassarin Chinnachodteeranun and Kiyoshi Honda
- Coproduction as an Approach to Technology-Mediated Citizen Participation in Emergency Management pp. 1-16

- Paloma Díaz, John M. Carroll and Ignacio Aedo
- Main Issues in Big Data Security pp. 1-16

- Julio Moreno, Manuel A. Serrano and Eduardo Fernández-Medina
- A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios pp. 1-29

- Kathryn Merrick, Medria Hardhienata, Kamran Shafi and Jiankun Hu
- Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup pp. 1-26

- Mikhail Strizhov, Zachary Osman and Indrajit Ray
- The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets pp. 1-27

- Antonio Santos-Olmo, Luis Enrique Sánchez, Ismael Caballero, Sara Camacho and Eduardo Fernandez-Medina
Volume 8, issue 2, 2016
- Routing Based on Information about the Routes of Fixed-Route Traveling Nodes and on Destination Areas Aimed at Reducing the Load on the DTN pp. 1-24

- Kazuaki Okamoto and Kazumasa Takami
- Elusive Learning—Using Learning Analytics to Support Reflective Sensemaking of Ill-Structured Ethical Problems: A Learner-Managed Dashboard Solution pp. 1-12

- Yianna Vovides and Sarah Inman
- User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns pp. 1-14

- Jennifer Golbeck and Matthew Louis Mauriello
- Using Financial Instruments to Transfer the Information Security Risks pp. 1-62

- Pankaj Pandey and Einar Snekkenes
- Modeling and Security in Cloud Ecosystems pp. 1-15

- Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Madiha H. Syed
- Digital Libraries: The Challenge of Integrating Instagram with a Taxonomy for Content Management pp. 1-15

- Simona Ibba and Filippo Eros Pani
- Environmental Factors Affecting Where People Geocache pp. 1-6

- Jennifer Golbeck and Carman Neustaedter
- Supporting Privacy of Computations in Mobile Big Data Systems pp. 1-25

- Sriram Nandha Premnath and Zygmunt J. Haas
- Information Is Not a Virus, and Other Consequences of Human Cognitive Limits pp. 1-11

- Kristina Lerman
- Enhanced Local Fisher Discriminant Analysis for Indoor Positioning in Wireless Local Area Network pp. 1-11

- Zhi-An Deng, Di Wu, Yiran Zhou and Zhenyu Na
- The Evolution of Wikipedia’s Norm Network pp. 1-21

- Bradi Heaberlin and Simon DeDeo
- iNUIT: Internet of Things for Urban Innovation pp. 1-21

- Francesco Carrino, Elena Mugellini, Omar Abou Khaled, Nabil Ouerhani and Juergen Ehrensberger
- A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks pp. 1-21

- Barbara Martini and Federica Paganelli
- A Method for Assessing the Performance of e-Government Twitter Accounts pp. 1-18

- Konstantinos Antoniadis, Kostas Zafiropoulos and Vasiliki Vrana
- Development of an Expert System for the Evaluation of Students’ Curricula on the Basis of Competencies pp. 1-18

- Luis Enrique Sánchez, Antonio Santos-Olmo, Esther Álvarez, Monica Huerta, Sara Camacho and Eduardo Fernández-Medina
- FaceMashup: An End-User Development Tool for Social Network Data pp. 1-17

- Daniele Massa and Lucio Davide Spano
- Computational Social Science, the Evolution of Policy Design and Rule Making in Smart Societies pp. 1-17

- Nicola Lettieri
- Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems pp. 1-17

- Romano Fantacci and Dania Marabissi
- A Methodological Approach to Evaluate Livestock Innovations on Small-Scale Farms in Developing Countries pp. 1-17

- Antón García-Martínez, José Rivas-Rangel, Jaime Rangel-Quintos, José Antonio Espinosa, Cecilio Barba and Carmen De-Pablos-Heredero
Volume 8, issue 1, 2016
- Detection of Intelligent Intruders in Wireless Sensor Networks pp. 1-18

- Yun Wang, William Chu, Sarah Fields, Colleen Heinemann and Zach Reiter
- Analyzing the Bitcoin Network: The First Four Years pp. 1-40

- Matthias Lischke and Benjamin Fabian
- Priority Queues with Fractional Service for Tiered Delay QoS pp. 1-15

- Gary Chang and Chung-Chieh Lee
- Context-Based Energy Disaggregation in Smart Homes pp. 1-22

- Francesca Paradiso, Federica Paganelli, Dino Giuli and Samuele Capobianco
- A Framework for Security Transparency in Cloud Computing pp. 1-22

- Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo and Edgar Weippl
- Acknowledgement to Reviewers of Future Internet in 2015 pp. 1-2

- Future Internet Editorial Office
- MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase pp. 1-14

- Tinghuai Ma, Xichao Xu, Meili Tang, Yuanfeng Jin and Wenhai Shen
| |