Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.45",
%%%     date            = "27 April 2024",
%%%     time            = "07:31:16 MST",
%%%     filename        = "future-internet.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "28368 98971 557691 5324652",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX; bibliography; Future Internet",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        open-access journal Future Internet (CODEN
%%%                        none, ISSN 1999-5903), published by MDPI
%%%                        (Basel, Switzerland).
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        December 2009, and the journal appeared once
%%%                        in volume 1, quarterly in volumes 2--9, and
%%%                        since then, 12 times yearly.
%%%
%%%                        The journal has World-Wide Web sites at
%%%
%%%                            https://www.mdpi.com/journal/futureinternet
%%%                            https://www.mdpi.com/1999-5903/
%%%                            https://www.mdpi.com/1999-5903/<VOLUME>
%%%                            https://www.mdpi.com/1999-5903/<VOLUME>/<NUMBER>/
%%%
%%%                        At version 1.45, the year coverage looked
%%%                        like this:
%%%
%%%                             2009 (   6)    2015 (  30)    2021 ( 313)
%%%                             2010 (  32)    2016 (  55)    2022 ( 327)
%%%                             2011 (  21)    2017 (  82)    2023 ( 360)
%%%                             2012 (  61)    2018 ( 125)    2024 ( 120)
%%%                             2013 (  35)    2019 ( 246)
%%%                             2014 (  36)    2020 ( 219)
%%%
%%%                             Article:       2068
%%%
%%%                             Total entries: 2068
%%%
%%%                        Data for the bibliography has been collected
%%%                        primarily from the journal Web site.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume''.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
    "\ifx \undefined \k         \let \k = \c                  \fi" #
    "\ifx \undefined \TM        \def \TM {${}^{\sc TM}$}      \fi" #
    "\ifx \undefined \mathcal   \def \mathcal #1{{\cal #1}}   \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-FUTURE-INTERNET       = "Future Internet"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Hudson-Smith:2009:FI,
  author =       "Andrew Hudson-Smith",
  title =        "The Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  day =          "17",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010001",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/1",
  abstract =     "In 1995 technology analyst Gartner [1] developed a
                 hype cycle model for the adoption of technology. The
                 cycle comprises five stages from the initial technology
                 trigger through to a final plateau of productivity
                 along a with a peak of inflated expectations, a tough
                 of disillusionment and the slope of enlightenment. The
                 hype cycle is notable technique for plotting and
                 identifying waves of innovation and hype in technology
                 and digital communications. Yet, from where we stand,
                 we can see the waves of innovation becoming
                 increasingly shorter, the troughs less deep and the
                 peaks of expectations higher. The read-write
                 revolution, that is arguably known as Web 2.0, has
                 transformed our experience of using the Internet from a
                 source of information to a means of communication and
                 participation. It has introduced mirror worlds, the
                 cloud, wikitecture, social shaping, connected places,
                 folksonomies and many other terms that I am sure many
                 of us have used in recent grant applications and
                 papers. This is the here and now, all of these
                 technologies are past the technology trigger point and
                 rising up the peak of inflated expectations with a few
                 already heading towards the trough before becoming
                 mainstream and approaching mass adoption.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Wheeler:2009:LSM,
  author =       "Steve Wheeler",
  title =        "Learning Space Mashups: Combining {Web 2.0} Tools to
                 Create Collaborative and Reflective Learning Spaces",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "3--13",
  day =          "13",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010003",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/3",
  abstract =     "In this paper, Web 2.0 open content mashups or
                 combinations are explored. Two case studies of recent
                 initial teacher training programmes are reviewed where
                 blogs and wikis were blended to create new virtual
                 learning spaces. In two separate studies, students
                 offer their views about using these tools, and reflect
                 on the strengths and weaknesses of this approach. There
                 is also discussion about aggregation of content and a
                 theorization of how community and personal spaces can
                 create tension and conflict. A new `learning spaces'
                 model will be presented which aids visualization of the
                 processes, domains and territories that are brought
                 into play when content and Web 2.0 tools are mashed up
                 within the same space.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Data Mashups.",
}

@Article{Fiaidhi:2009:IMM,
  author =       "Jinan Fiaidhi and Sabah Mohammed and Lyle Chamarette
                 and David Thomas",
  title =        "Identifying Middlewares for Mashup Personal Learning
                 Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "14--27",
  day =          "05",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010014",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/14",
  abstract =     "The common understanding of e-learning has shifted
                 over the last decade from the traditional learning
                 objects portals to learning paradigms that enforces
                 constructivism, discovery learning and social
                 collaboration. Such type of learning takes place
                 outside the formal academic settings (e.g., seminars or
                 lectures) where a learning environment is created by
                 using some kind of web application mashup tools. The
                 use of these mashup tools moves the learning
                 environment further away from being a monolithic
                 platform towards providing an open set of learning
                 tools, an unrestricted number of actors, and an open
                 corpus of artifacts, either pre-existing or created by
                 the learning process - freely combinable and utilizable
                 by learners within their learning activities. However,
                 collaboration, mashup and contextualization can only be
                 supported through services, which can be created and
                 modified dynamically based on middlewares to suit the
                 current needs and situations of learners. This article
                 identifies middlewares suitable for creating effective
                 personal learning environment based on Web 2.0 mashup
                 tools. This article also proposed a general framework
                 for constructing such personal learning environments
                 based on Ambient Learning realized by learning agents
                 and the use of Enterprise Mashup servers.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Data Mashups.",
}

@Article{Batcheller:2009:MAG,
  author =       "James K. Batcheller and Bruce M. Gittings and Robert
                 I. Dunfey",
  title =        "A Method for Automating Geospatial Dataset Metadata",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "28--46",
  day =          "10",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010028",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/28",
  abstract =     "Metadata have long been recognised as crucial to
                 geospatial asset management and discovery, and yet
                 undertaking their creation remains an unenviable task
                 often to be avoided. This paper proposes a practical
                 approach designed to address such concerns, decomposing
                 various data creation, management, update and
                 documentation process steps that are subsequently
                 leveraged to contribute towards metadata record
                 completion. Using a customised utility embedded within
                 a common GIS application, metadata elements are
                 computationally derived from an imposed feature
                 metadata standard, dataset geometry, an integrated
                 storage protocol and pre-prepared content, and
                 instantiated within a common geospatial discovery
                 convention. Yielding 27 out of a 32 total metadata
                 elements (or 15 out of 17 mandatory elements) the
                 approach demonstrably lessens the burden of metadata
                 authorship. It also encourages improved geospatial
                 asset management whilst outlining core requisites for
                 developing a more open metadata strategy not bound to
                 any particular application domain.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Ebner:2009:CWM,
  author =       "Martin Ebner and Hermann Maurer",
  title =        "Can Weblogs and Microblogs Change Traditional
                 Scientific Writing?",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "47--58",
  day =          "18",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010047",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/47",
  abstract =     "This paper describes a follow-up Web 2.0 approach to a
                 technology enhanced master course for students of Graz
                 University of Technology. The lecture ``Social Aspects
                 of Information Technology'' has a long tradition for
                 using new didactical scenarios as well as modern
                 e-Learning technologies. After using a blogosphere one
                 year ago, this year microblog channels helped to expand
                 the traditional lecture. Students choose (on a
                 voluntary basis) whether they want to participate in a
                 blogging/microblogging group instead of using
                 conventional methods called Scientific
                 Writer/Scientific Reviewer. This study addresses the
                 question whether this method can change the learning
                 outcome into a more reflective one. Furthermore,
                 peer-reviewing groups judge the quality of essays and
                 blog contributions. In this paper we examine if
                 microblogging can be an appropriate technology for
                 assisting the process. This publication comes to the
                 conclusion that an amazing potential and a new way to
                 work with information is opened when using
                 microblogging. Students seem to be more engaged,
                 reflective and critical in as much as they presented
                 much more personal statements and opinions than years
                 before.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Beemer:2009:MLR,
  author =       "Brandon Beemer and Dawn Gregg",
  title =        "Mashups: a Literature Review and Classification
                 Framework",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "59--87",
  day =          "22",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010059",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/59",
  abstract =     "The evolution of the Web over the past few years has
                 fostered the growth of a handful of new technologies
                 (e.g. Blogs, Wiki's, Web Services). Recently web
                 mashups have emerged as the newest Web technology and
                 have gained lots of momentum and attention from both
                 academic and industry communities. Current mashup
                 literature focuses on a wide array of issues, which can
                 be partially explained by how new the topic is.
                 However, to date, mashup literature lacks an
                 articulation of the different subtopics of web mashup
                 research. This study presents a broad review of mashup
                 literature to help frame the 1subtopics in mashup
                 research.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Data Mashups.",
}

@Article{Beall:2010:MND,
  author =       "Jeffrey Beall",
  title =        "Metadata for Name Disambiguation and Collocation",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "1--15",
  day =          "05",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010001",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/1",
  abstract =     "Searching names of persons, families, and
                 organizations is often difficult in online databases
                 because different persons or organizations frequently
                 share the same name and because a single person's or
                 organization's name may appear in different forms in
                 various online documents. Databases and search engines
                 can use metadata as a tool to solve the problem of name
                 ambiguity and name variation in online databases. This
                 article describes the challenges names pose in
                 information retrieval and some emerging name metadata
                 databases that can help ameliorate the problems.
                 Effective name disambiguation and collocation increase
                 search precision and recall and can improve assessment
                 of scholarly work.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Priscoli:2010:FCA,
  author =       "Francesco Delli Priscoli",
  title =        "A Fully Cognitive Approach for Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "16--29",
  day =          "22",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010016",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/16",
  abstract =     "This paper deals with an autonomous cognitive network
                 management architecture which aims at achieving
                 inter-network (horizontal) and inter-layer (vertical)
                 cross-optimization. The proposed architecture is based
                 on the so-called Cognitive Managers transparently
                 embedded in properly selected network nodes. The core
                 of each Cognitive Manager are the so-called thinking
                 modules, which are in charge of taking consistent and
                 coordinated decisions according to a fully cognitive
                 approach. The thinking modules potentially avail of
                 information coming from both the transport and the
                 service/content layers of all networks and, based on
                 all this inter-layer and inter-network information,
                 take consistent and coordinated decisions impacting the
                 different layers, aiming at the overall inter-layer,
                 inter-network optimization.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future Network Architectures.",
}

@Article{Fiore:2010:SRR,
  author =       "Ugo Fiore",
  title =        "Selective Redundancy Removal: a Framework for Data
                 Hiding",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "30--40",
  day =          "15",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010030",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/30",
  abstract =     "Data hiding techniques have so far concentrated on
                 adding or modifying irrelevant information in order to
                 hide a message. However, files in widespread use, such
                 as HTML documents, usually exhibit high redundancy
                 levels, caused by code-generation programs. Such
                 redundancy may be removed by means of optimization
                 software. Redundancy removal, if applied selectively,
                 enables information hiding. This work introduces
                 Selective Redundancy Removal (SRR) as a framework for
                 hiding data. An example application of the framework is
                 given in terms of hiding information in HTML documents.
                 Non-uniformity across documents may raise alarms.
                 Nevertheless, selective application of optimization
                 techniques might be due to the legitimate use of
                 optimization software not supporting all the
                 optimization methods, or configured to not use all of
                 them.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Fuchs:2010:TFW,
  author =       "Christian Fuchs and Wolfgang Hofkirchner and Matthias
                 Schafranek and Celina Raffl and Marisol Sandoval and
                 Robert Bichler",
  title =        "Theoretical Foundations of the {Web}: Cognition,
                 Communication, and Co-Operation. Towards an
                 Understanding of {Web 1.0, 2.0, 3.0}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "41--59",
  day =          "19",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010041",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/41",
  abstract =     "Currently, there is much talk of Web 2.0 and Social
                 Software. A common understanding of these notions is
                 not yet in existence. The question of what makes Social
                 Software social has thus far also remained
                 unacknowledged. In this paper we provide a theoretical
                 understanding of these notions by outlining a model of
                 the Web as a techno-social system that enhances human
                 cognition towards communication and co-operation.
                 According to this understanding, we identify three
                 qualities of the Web, namely Web 1.0 as a Web of
                 cognition, Web 2.0 as a Web of human communication, and
                 Web 3.0 as a Web of co-operation. We use the terms Web
                 1.0, Web 2.0, Web 3.0 not in a technical sense, but for
                 describing and characterizing the social dynamics and
                 information processes that are part of the Internet.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Benedetto:2010:DQE,
  author =       "Francesco Benedetto and Alberto Curcio and Gaetano
                 Giunta",
  title =        "Dynamic {QoS} Evaluation of Multimedia Contents in
                 Wireless Networks by ``Double-Boomerang''
                 Watermarking",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "60--73",
  day =          "08",
  month =        mar,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010060",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/60",
  abstract =     "This work presents a cooperative network-aware
                 processing of multimedia content for dynamic quality of
                 service management in wireless IP networks. Our
                 technique can be also used for quality control in UMTS
                 environments, exploiting the tracing watermarking
                 recently introduced in literature. In this work, we use
                 the transmitted video-sequences to monitor the QoS in a
                 videoconference call. The video-sequence of every
                 active user travels on the communication link, one time
                 as video (transparent mode), one time as watermark
                 (hidden mode) describing a boomerang trajectory. The
                 results obtained through our simulation trials confirm
                 the validity of such approach. In fact, the advantages
                 of distributing the management process are (i) an
                 easier and more precise localization of the cause of
                 QoS problems, (ii) a better knowledge of local
                 situations, (iii) a lower complexity for a single QoS
                 agent and (iv) an increase in possible actions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Ding:2010:MED,
  author =       "Lian Ding and Shaofeng Liu",
  title =        "Markup in Engineering Design: a Discourse",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "74--95",
  day =          "11",
  month =        mar,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010074",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/74",
  abstract =     "Today's engineering companies are facing unprecedented
                 competition in a global market place. There is now a
                 knowledge intensive shift towards whole product
                 lifecycle support, and collaborative environments. It
                 has become particularly important to capture
                 information, knowledge and experiences about previous
                 design and following stages during their product
                 lifecycle, so as to retrieve and reuse such information
                 in new and follow-on designs activities. Recently, with
                 the rapid development and adoption of digital
                 technologies, annotation and markup are becoming
                 important tools for information communication,
                 retrieval and management. Such techniques are being
                 increasingly applied to an array of applications and
                 different digital items, such as text documents, 2D
                 images and 3D models. This paper presents a
                 state-of-the-art review of recent research in markup
                 for engineering design, including a number of core
                 markup languages and main markup strategies. Their
                 applications and future utilization in engineering
                 design, including multi-viewpoint of product models,
                 capture of information and rationale across the whole
                 product lifecycle, integration of engineering design
                 processes, and engineering document management, are
                 comprehensively discussed.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Christin:2010:SWS,
  author =       "Delphine Christin and Parag S. Mogre and Matthias
                 Hollick",
  title =        "Survey on Wireless Sensor Network Technologies for
                 Industrial Automation: The Security and Quality of
                 Service Perspectives",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "2",
  pages =        "96--125",
  day =          "08",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2020096",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/2/96",
  abstract =     "Wireless Sensor Networks (WSNs) are gradually adopted
                 in the industrial world due to their advantages over
                 wired networks. In addition to saving cabling costs,
                 WSNs widen the realm of environments feasible for
                 monitoring. They thus add sensing and acting
                 capabilities to objects in the physical world and allow
                 for communication among these objects or with services
                 in the future Internet. However, the acceptance of WSNs
                 by the industrial automation community is impeded by
                 open issues, such as security guarantees and provision
                 of Quality of Service (QoS). To examine both of these
                 perspectives, we select and survey relevant WSN
                 technologies dedicated to industrial automation. We
                 determine QoS requirements and carry out a threat
                 analysis, which act as basis of our evaluation of the
                 current state-of-the-art. According to the results of
                 this evaluation, we identify and discuss open research
                 issues.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Maier:2010:QPT,
  author =       "Martin Maier and Navid Ghazisaidi",
  title =        "{QoS} Provisioning Techniques for Future
                 Fiber-Wireless {(FiWi)} Access Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "2",
  pages =        "126--155",
  day =          "29",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2020126",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/2/126",
  abstract =     "A plethora of enabling optical and wireless
                 access-metro network technologies have been emerging
                 that can be used to build future-proof bimodal
                 fiber-wireless (FiWi) networks. Hybrid FiWi networks
                 aim at providing wired and wireless quad-play services
                 over the same infrastructure simultaneously and hold
                 great promise to mitigate the digital divide and change
                 the way we live and work by replacing commuting with
                 teleworking. After overviewing enabling optical and
                 wireless network technologies and their QoS
                 provisioning techniques, we elaborate on enabling
                 radio-over-fiber (RoF) and radio-and-fiber (R\&F)
                 technologies. We describe and investigate new QoS
                 provisioning techniques for future FiWi networks,
                 ranging from traffic class mapping, scheduling, and
                 resource management to advanced aggregation techniques,
                 congestion control, and layer-2 path selection
                 algorithms.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Taswell:2010:DIM,
  author =       "Carl Taswell",
  title =        "A Distributed Infrastructure for Metadata about
                 Metadata: The {HDMM} Architectural Style and
                 {PORTAL-DOORS} System",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "2",
  pages =        "156--189",
  day =          "01",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2020156",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/2/156",
  abstract =     "Both the IRIS-DNS System and the PORTAL-DOORS System
                 share a common architectural style for pervasive
                 metadata networks that operate as distributed metadata
                 management systems with hierarchical authorities for
                 entity registering and attribute publishing.
                 Hierarchical control of metadata redistribution
                 throughout the registry-directory networks constitutes
                 an essential characteristic of this architectural style
                 called Hierarchically Distributed Mobile Metadata
                 (HDMM) with its focus on moving the metadata for who
                 what where as fast as possible from servers in response
                 to requests from clients. The novel concept of
                 multilevel metadata about metadata has also been
                 defined for the PORTAL-DOORS System with the use of
                 entity, record, infoset, representation and message
                 metadata. Other new features implemented include the
                 use of aliases, priorities and metaresources.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Ramstetter:2010:ASN,
  author =       "Jerry Rick Ramstetter and Yaling Yang and Danfeng
                 Yao",
  title =        "Applications and Security of Next-Generation,
                 User-Centric Wireless Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "190--211",
  day =          "28",
  month =        jul,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030190",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/190",
  abstract =     "Pervasive wireless systems have significantly improved
                 end-users' quality of life. As manufacturing costs
                 decrease, communications bandwidth increases, and
                 contextual information is made more readily available,
                 the role of next generation wireless systems in
                 facilitating users' daily activities will grow. Unique
                 security and privacy issues exist in these wireless,
                 context-aware, often decentralized systems. For
                 example, the pervasive nature of such systems allows
                 adversaries to launch stealthy attacks against them. In
                 this review paper, we survey several emergent personal
                 wireless systems and their applications. These systems
                 include mobile social networks, active implantable
                 medical devices, and consumer products. We explore each
                 system's usage of contextual information and provide
                 insight into its security vulnerabilities. Where
                 possible, we describe existing solutions for
                 defendingagainst these vulnerabilities. Finally, we
                 point out promising future research directions for
                 improving these systems' robustness and security",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Arkoulis:2010:MSC,
  author =       "Stamatios Arkoulis and Giannis F. Marias and Pantelis
                 A. Frangoudis and Jens Oberender and Alexandru Popescu
                 and Markus Fiedler and Hermann de Meer and George C.
                 Polyzos",
  title =        "Misbehavior Scenarios in Cognitive Radio Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "212--237",
  day =          "29",
  month =        jul,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030212",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/212",
  abstract =     "Recent advances in the fields of Cognitive Radio and
                 the proliferation of open spectrum access promise that
                 spectrum-agile wireless communication will be
                 widespread in the near future, and will bring
                 significant flexibility and potential utility
                 improvements for end users. With spectrum efficiency
                 being a key objective, most relevant research focuses
                 on smart coexistence mechanisms. However, wireless
                 nodes may behave selfishly and should be considered as
                 rational autonomous entities. Selfishness, pure malice
                 or even faulty equipment can lead to behavior that does
                 not conform to sharing protocols and etiquette. Thus,
                 there is a need to secure spectrum sharing mechanisms
                 against attacks in the various phases of the sharing
                 process. Identifying these attacks and possible
                 countermeasures is the focus of this work.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Granitzer:2010:OAS,
  author =       "Michael Granitzer and Vedran Sabol and Kow Weng Onn
                 and Dickson Lukose and Klaus Tochtermann",
  title =        "Ontology Alignment --- a Survey with Focus on Visually
                 Supported Semi-Automatic Techniques",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "238--258",
  day =          "04",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030238",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/238",
  abstract =     "Semantic technologies are of paramount importance to
                 the future Internet. The reuse and integration of
                 semantically described resources, such as data or
                 services, necessitates the bringing of ontologies into
                 mutual agreement. Ontology alignment deals with the
                 discovery of correspondences between concepts and
                 relations from different ontologies. Alignment provides
                 the key ingredient to semantic interoperability. This
                 paper gives an overview on the state of the art in the
                 field of visually supported semi-automatic alignment
                 techniques and presents recent trends and developments.
                 Particular attention is given to user interfaces and
                 visualization techniques supporting involvement of
                 humans in the alignment process. We derive and
                 summarize requirements for visual semi-automatic
                 alignment systems, provide an overview of existing
                 approaches, and discuss the possibilities for further
                 improvements and future research.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Xie:2010:TFS,
  author =       "Iris Xie and Soohyung Joo",
  title =        "Tales from the Field: Search Strategies Applied in
                 {Web} Searching",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "259--281",
  day =          "06",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030259",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/259",
  abstract =     "In their web search processes users apply multiple
                 types of search strategies, which consist of different
                 search tactics. This paper identifies eight types of
                 information search strategies with associated cases
                 based on sequences of search tactics during the
                 information search process. Thirty-one participants
                 representing the general public were recruited for this
                 study. Search logs and verbal protocols offered rich
                 data for the identification of different types of
                 search strategies. Based on the findings, the authors
                 further discuss how to enhance web-based information
                 retrieval (IR) systems to support each type of search
                 strategy.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Information Behavior.",
}

@Article{Ho:2010:IVA,
  author =       "Yeh-Chin Ho and Yi-Bing Lin and Ren-Huang Liou and
                 Yuan-Kuang Tu",
  title =        "Implementing Value Added Applications in Next
                 Generation Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "282--294",
  day =          "06",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030282",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/282",
  abstract =     "One of the major issues in the future Internet is the
                 integration of telecom networks with the Internet. In
                 many countries, large Internet Service Providers (ISPs)
                 are also telecom operators that have been focusing on
                 providing Internet services through their telecom
                 networks with telecom-grade mechanisms. In this
                 article, we show that IP Multimedia Subsystem (IMS) is
                 a telecom-grade mechanism that addresses this important
                 issue. In Next Generation Network (NGN), IMS supports
                 IP-based multimedia services that can be accessed from
                 various wireless and wired access technologies through
                 fixed-mobile convergence. We show how to integrate
                 Internet Protocol Television (IPTV) with NGN/IMS to
                 offer enhanced IPTV services for subscribers with
                 set-top boxes or mobile phones. We specifically
                 describe the implementations of three services: weather
                 forecasts, short messages on TV screens and TV
                 shopping/food ordering for mobile users. Although these
                 services can be directly implemented in the Internet,
                 our commercial operation experiences indicate that the
                 NGN/IMS implementation has advantages in terms of
                 telecom-grade security, Quality of Service (QoS), and
                 flexible service creation.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Urushidani:2010:DRA,
  author =       "Shigeo Urushidani and Kensuke Fukuda and Michihiro
                 Koibuchi and Motonori Nakamura and Shunji Abe and
                 Yusheng Ji and Michihiro Aoki and Shigeki Yamada",
  title =        "Dynamic Resource Allocation and {QoS} Control
                 Capabilities of the {Japanese} Academic Backbone
                 Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "295--307",
  day =          "09",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030295",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/295",
  abstract =     "Dynamic resource control capabilities have become
                 increasingly important for academic networks that must
                 support big scientific research projects at the same
                 time as less data intensive research and educational
                 activities. This paper describes the dynamic resource
                 allocation and QoS control capabilities of the Japanese
                 academic backbone network, called SINET3, which
                 supports a variety of academic applications with a wide
                 range of network services. The article describes the
                 network architecture, networking technologies, resource
                 allocation, QoS control, and layer-1 bandwidth
                 on-demand services. It also details typical services
                 developed for scientific research, including the user
                 interface, resource control, and management functions,
                 and includes performance evaluations.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Mahfoudh:2010:EER,
  author =       "Saoucene Mahfoudh and Pascale Minet and Ichrak
                 Amdouni",
  title =        "Energy Efficient Routing and Node Activity Scheduling
                 in the {OCARI} Wireless Sensor Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "308--340",
  day =          "17",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030308",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/308",
  abstract =     "Sensor nodes are characterized by a small size, a low
                 cost, an advanced communication technology, but also a
                 limited amount of energy. Energy efficient strategies
                 are required in such networks to maximize network
                 lifetime. In this paper, we focus on a solution
                 integrating energy efficient routing and node activity
                 scheduling. The energy efficient routing we propose,
                 called EOLSR, selects the route and minimizes the
                 energy consumed by an end-to-end transmission, while
                 avoiding nodes with low residual energy. Simulation
                 results show that EOLSR outperforms the solution
                 selecting the route of minimum energy as well as the
                 solution based on node residual energy. Cross-layering
                 allows EOLSR to use information from the application
                 layer or the MAC layer to reduce its overhead and
                 increase network lifetime. Node activity scheduling is
                 based on the following observation: the sleep state is
                 the least power consuming state. So, to schedule node
                 active and sleeping periods, we propose SERENA that
                 colors all network nodes using a small number of
                 colors, such that two nodes with the same color can
                 transmit without interfering. The node color is mapped
                 into a time slot during which the node can transmit.
                 Consequently, each node is awake during its slot and
                 the slots of its one-hop neighbors, and sleeps in the
                 remaining time. We evaluate SERENA benefits obtained in
                 terms of bandwidth, delay and energy. We also show how
                 cross-layering with the application layer can improve
                 the end-to-end delays for data gathering
                 applications.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Networked Sensors and Actuators.",
}

@Article{Lux:2010:CGV,
  author =       "Mathias Lux and Arthur Pitman and Oge Marques",
  title =        "Can Global Visual Features Improve Tag Recommendation
                 for Image Annotation?",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "341--362",
  day =          "27",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030341",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/341",
  abstract =     "Recent advances in the fields of digital photography,
                 networking and computing, have made it easier than ever
                 for users to store and share photographs. However
                 without sufficient metadata, e.g., in the form of tags,
                 photos are difficult to find and organize. In this
                 paper, we describe a system that recommends tags for
                 image annotation. We postulate that the use of
                 low-level global visual features can improve the
                 quality of the tag recommendation process when compared
                 to a baseline statistical method based on tag
                 co-occurrence. We present results from experiments
                 conducted using photos and metadata sourced from the
                 Flickr photo website that suggest that the use of
                 visual features improves the mean average precision
                 (MAP) of the system and increases the system's ability
                 to suggest different tags, therefore justifying the
                 associated increase in complexity.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Topal:2010:TRA,
  author =       "Sebahattin Topal and Ismet Erkmen and Aydan M.
                 Erkmen",
  title =        "Towards the Robotic ``Avatar'': An Extensive Survey of
                 the Cooperation between and within Networked Mobile
                 Sensors",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "363--387",
  day =          "14",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030363",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/363",
  abstract =     "Cooperation between networked mobile sensors, wearable
                 and sycophant sensor networks with parasitically
                 sticking agents, and also having human beings involved
                 in the loop is the ``Avatarization'' within the robotic
                 research community, where all networks are connected
                 and where you can connect/disconnect at any time to
                 acquire data from a vast unstructured world. This paper
                 extensively surveys the networked robotic foundations
                 of this robotic biological ``Avatar'' that awaits us in
                 the future. Cooperation between networked mobile
                 sensors as well as cooperation of nodes within a
                 network are becoming more robust, fault tolerant and
                 enable adaptation of the networks to changing
                 environment conditions. In this paper, we survey and
                 comparatively discuss the current state of networked
                 robotics via their critical application areas and their
                 design characteristics. We conclude by discussing
                 future challenges.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Networked Sensors and Actuators.",
}

@Article{Do:2010:SQM,
  author =       "Viet Thi Minh Do and Lars Landmark and {\O}ivind
                 Kure",
  title =        "A Survey of {QoS} Multicast in Ad Hoc Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "388--416",
  day =          "14",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030388",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/388",
  abstract =     "This survey on Quality of Service (QoS) in multicast
                 ad hoc networks uses a framework based on the
                 mechanisms in three important elements: resource
                 estimations, multicast tree/mesh administration, and
                 multicast routing. Our contribution is an exploration
                 of the design space and an identification of areas that
                 have not been fully explored. We discuss the design
                 space of central mechanisms and classify proposed QoS
                 multicast schemes according to the mechanisms they
                 used. In addition, we summarize the scenarios used for
                 evaluating their performance. Furthermore, we identify
                 issues, mechanisms, and scenarios that have not been
                 fully investigated in existing works. The paper
                 provides a coherent understanding of design principles,
                 conceptual operation, and evaluated scenarios of
                 schemes designed for QoS multicast application in
                 mobile ad hoc networks (MANETs). It also outlines new
                 areas for future research in this field.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Pinart:2010:ATD,
  author =       "Carolina Pinart",
  title =        "Anticipation of Traffic Demands to Guarantee {QoS} in
                 {IP}\slash Optical Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "417--430",
  day =          "21",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030417",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/417",
  abstract =     "Traffic in the Internet backbone is expected to grow
                 above a few Tbit/s in 2020. To cope with this,
                 operators are moving to IP/optical network
                 architectures, where IP is the convergence layer for
                 all services. On the other hand, the quality of service
                 (QoS) requirements of future applications encompasses
                 the individualization of services and the assurance of
                 stricter quality parameters such as latency, jitter or
                 capacity. In other words, future optical networks will
                 not only transport more IP data, but they will also
                 have to offer differentiated QoS requirements to
                 services. Finally, some emerging applications, e.g.,
                 grid computing, need greater flexibility in the usage
                 of network resources, which involves establishing and
                 releasing connections as if they were virtualized
                 resources controlled by other elements or layers. In
                 this context, traffic-driven lightpath provisioning and
                 service-plane approaches arise as very interesting
                 candidate solutions to solve the main challenges
                 described above. This work reviews the concepts of
                 service-oriented and self-managed networks and relates
                 them to propose an integrated approach to assure QoS by
                 offering flow-aware networking in the sense that
                 traffic demands will be anticipated in a suitable way,
                 lightpaths will be established taking into account QoS
                 information (i.e., impairments) and complex services
                 will be decomposed into optical connections so that the
                 above techniques can be employed to assure QoS for any
                 service.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Kulatunga:2010:ENC,
  author =       "Chamil Kulatunga and Jesse Kielthy and Dmitri Botvich
                 and William Donnelly",
  title =        "Exploiting the In-Network Capabilities of Multicast to
                 Discover Proximate {IPTV} Channels",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "431--445",
  day =          "29",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040431",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/431",
  abstract =     "IPTV has become the next generation of television due,
                 in part, to its ability to support features that have
                 been lacking in conventional broadcasting-for example,
                 end-user interactivity, personalisation and
                 localisation. Providers are also searching for the most
                 efficient delivery methods to provide the greatest
                 amount of contents at the lowest cost. At present IPTV
                 uses IP multicast to deliver live TV channels in an
                 over-provisioned walled-garden network due to issues of
                 deploying multicast and QoS challenges in the public
                 Internet. However, IPTV is likely to shift into some
                 parts of the public Internet in the future as a managed
                 service. Multicast routing is performed on a
                 per-session destination-address basis so each router
                 maintains a table of all of the multicast addresses to
                 which the content is being forwarded. We exploit this
                 information to discover and join the in-progress
                 channels of geographically proximate users and to
                 create a new incentivised premium service in future
                 IPTV networks called ProxyTV. This approach is expected
                 to minimise network bandwidth requirements as it
                 enables ISPs to optimise bandwidth on their edge
                 networks. This becomes increasingly significant as TV
                 content consumes more and more bandwidth, especially
                 with the onset of HD and 3D capabilities. In this
                 paper, we have presented in detail the concept with the
                 results of a survey and an analysis of network traffic
                 to justify the proposed approach.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{So-In:2010:DRR,
  author =       "Chakchai So-In and Raj Jain and Abdel-Karim {Al
                 Tamimi}",
  title =        "Deficit Round {Robin} with Fragmentation Scheduling to
                 Achieve Generalized Weighted Fairness for Resource
                 Allocation in {IEEE 802.16e} Mobile {WiMAX} Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "446--468",
  day =          "12",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040446",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/446",
  abstract =     "Deficit Round Robin (DRR) is a fair packet-based
                 scheduling discipline commonly used in wired networks
                 where link capacities do not change with time. However,
                 in wireless networks, especially wireless broadband
                 networks, i.e., IEEE 802.16e Mobile WiMAX, there are
                 two main considerations violate the packet-based
                 service concept for DRR. First, the resources are
                 allocated per Mobile WiMAX frame. To achieve full frame
                 utilization, Mobile WiMAX allows packets to be
                 fragmented. Second, due to a high variation in wireless
                 channel conditions, the link/channel capacity can
                 change over time and location. Therefore, we introduce
                 a Deficit Round Robin with Fragmentation (DRRF) to
                 allocate resources per Mobile WiMAX frame in a fair
                 manner by allowing for varying link capacity and for
                 transmitting fragmented packets. Similar to DRR and
                 Generalized Processor Sharing (GPS), DRRF achieves
                 perfect fairness. DRRF results in a higher throughput
                 than DRR (80\% improvement) while causing less overhead
                 than GPS (8 times less than GPS). In addition, in
                 Mobile WiMAX, the quality of service (QoS) offered by
                 service providers is associated with the price paid.
                 This is similar to a cellular phone system; the users
                 may be required to pay air-time charges. Hence, we have
                 also formalized a Generalized Weighted Fairness (GWF)
                 criterion which equalizes a weighted sum of service
                 time units or slots, called temporal fairness, and
                 transmitted bytes, called throughput fairness, for
                 customers who are located in a poor channel condition
                 or at a further distance versus for those who are near
                 the base stations, or have a good channel condition. We
                 use DRRF to demonstrate the application of GWF. These
                 fairness criteria are used to satisfy basic
                 requirements for resource allocation, especially for
                 non real-time traffic. Therefore, we also extend DRRF
                 to support other QoS requirements, such as minimum
                 reserved traffic rate, maximum sustained traffic rate,
                 and traffic priority. For real-time traffic, i.e.,
                 video traffic, we compare the performance of DRRF with
                 deadline enforcement to that of Earliest Deadline First
                 (EDF). The results show that DRRF outperforms EDF
                 (higher achievable throughput under the promised delay
                 latency) and maintains fairness under an overload
                 scenario.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Mahfoudh:2010:NCC,
  author =       "Saoucene Mahfoudh and Gerard Chalhoub and Pascale
                 Minet and Michel Misson and Ichrak Amdouni",
  title =        "Node Coloring and Color Conflict Detection in Wireless
                 Sensor Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "469--504",
  day =          "13",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040469",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/469",
  abstract =     "In wireless sensor networks, energy efficiency is
                 mainly achieved by making nodes sleep. In this paper,
                 we present the combination of SERENA, a new node
                 activity scheduling algorithm based on node coloring,
                 with TDMA/CA, a collision avoidance MAC protocol. We
                 show that the combination of these two protocols
                 enables substantial bandwidth and energy benefits for
                 both general and data gathering applications. As a
                 first contribution, we prove that the three-hop node
                 coloring problem is NP-complete. As a second
                 contribution, the overhead induced by SERENA during
                 network coloring is reduced, making possible the use of
                 these protocols even in dense networks with limited
                 bandwidth. The third contribution of this paper is to
                 show that applying any slot assignment algorithm with
                 spatial reuse based on node neighborhood without taking
                 into account link quality can lead to poor performances
                 because of collisions. The use of good quality links
                 will prevent this phenomenon. The fourth contribution
                 consists of optimizing end-to-end delays for data
                 gathering applications, by means of cross-layering with
                 the application. However, color conflicts resulting
                 from topology changes, mobility and late node arrivals
                 can give rise to collisions. As a fifth contribution,
                 we show how the MAC layer can detect color conflicts,
                 and cope with them at the cost of a slightly reduced
                 throughput. Then, we discuss the tradeoff between
                 requesting SERENA to solve the color conflicts and
                 dealing with them at the MAC layer, our third
                 contribution. The combination of SERENA and TDMA/CA is
                 evaluated through simulations on realistic
                 topologies.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Networked Sensors and Actuators.",
}

@Article{Gottron:2010:SSM,
  author =       "Christian Gottron and Andr{\'e} K{\"o}nig and Ralf
                 Steinmetz",
  title =        "A Survey on Security in Mobile Peer-to-Peer
                 Architectures-Overlay-Based vs. Underlay-Based
                 Approaches",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "505--532",
  day =          "13",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040505",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/505",
  abstract =     "Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P)
                 networks share central characteristics such as their
                 distributed and decentralized nature. Combining both
                 networking paradigms results in a Mobile Peer-to-Peer
                 (MP2P) system that operates independently from a
                 preexisting infrastructure. Securing MP2P networks in
                 terms of availability and robustness as basic demands
                 in envisioned application scenarios like first
                 responder operations is a challenging task. In this
                 article, we present a survey of selected threats and of
                 state of the art countermeasures for MANETs and P2P
                 networks. Further, we discuss the efficiency of MANET
                 and P2P security mechanisms when applied in MP2P
                 networks.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Calegari:2010:OBI,
  author =       "Silvia Calegari and Gabriella Pasi",
  title =        "Ontology-Based Information Behaviour to Improve {Web}
                 Search",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "533--558",
  day =          "18",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040533",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/533",
  abstract =     "Web Search Engines provide a huge number of answers in
                 response to a user query, many of which are not
                 relevant, whereas some of the most relevant ones may
                 not be found. In the literature several approaches have
                 been proposed in order to help a user to find the
                 information relevant to his/her real needs on the Web.
                 To achieve this goal the individual Information
                 Behavior can been analyzed to 'keep' track of the
                 user's interests. Keeping information is a type of
                 Information Behavior, and in several works researchers
                 have referred to it as the study on what people do
                 during a search on the Web. Generally, the user's
                 actions (e.g., how the user moves from one Web page to
                 another, or her/his download of a document, etc.) are
                 recorded in Web logs. This paper reports on research
                 activities which aim to exploit the information
                 extracted from Web logs (or query logs) in personalized
                 user ontologies, with the objective to support the user
                 in the process of discovering Web information relevant
                 to her/his information needs. Personalized ontologies
                 are used to improve the quality of Web search by
                 applying two main techniques: query reformulation and
                 re-ranking of query evaluation results. In this paper
                 we analyze various methodologies presented in the
                 literature aimed at using personalized ontologies,
                 defined on the basis of the observation of Information
                 Behaviour to help the user in finding relevant
                 information.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Barradas:2010:ITA,
  author =       "Alvaro L. Barradas and Maria do Carmo R. Medeiros",
  title =        "An Intrinsic {TE} Approach for End-to-End {QoS}
                 Provisioning in {OBS} Networks Using Static
                 Load-Balanced Routing Strategies",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "559--586",
  day =          "22",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040559",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/559",
  abstract =     "Optical burst switching provides a feasible paradigm
                 for the next IP over optical backbones. However its
                 burst loss performance can be highly affected by burst
                 contention. In this paper we discuss traffic
                 engineering approaches for path selection with the
                 objective tominimize contention using only topological
                 information. The discussed strategies are based on
                 balancing the traffic across the network in order to
                 reduce congestion without incurring into link state
                 protocol penalties. The routing strategies are
                 evaluated by simulation on an optical burst switching
                 model specifically developed for the purpose with
                 OMNeT++. Results show that our strategies outperform
                 the traditionally used shortest path routing to an
                 extent that depends on the network connectivity.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Kolios:2010:LAS,
  author =       "Panayiotis Kolios and Vasilis Friderikos and Katerina
                 Papadaki",
  title =        "Look-Ahead Strategies Based on Store-Carry and Forward
                 Relaying for Energy Efficient Cellular Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "587--602",
  day =          "04",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040587",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/587",
  abstract =     "With the increasing availability of Internet type
                 services on mobile devices and the attractive flat rate
                 all-you-can-eat billing system, cellular
                 telecommunication networks are experiencing a
                 tremendous growth in data usage demand. However, there
                 are increasing concerns that current network deployment
                 trends (including more efficient radio access
                 techniques and increased spectrum allocation
                 strategies), will be unable to support the increased
                 Internet traffic in a sustainable way. The delay
                 tolerant nature of mobile Internet traffic allows for a
                 large degree of flexibility in optimizing network
                 performance to meet different design objectives and
                 it's a feature that has mostly gone unexplored by the
                 research community. In this paper, we introduce a novel
                 message forwarding mechanism in cellular networks that
                 benefits from the inherent delay tolerance of Internet
                 type services to provide flexible and adjustable
                 forwarding strategies for efficient network operation
                 while guaranteeing timely deliveries. By capitalizing
                 on the elasticity of message delivery deadlines and the
                 actual mobility of nodes inside the cell, considerable
                 performance gains can be achieved by physically
                 propagating information messages within the network.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Islam:2010:NEI,
  author =       "Salekul Islam and Jean-Charles Gr{\'e}goire",
  title =        "Network Edge Intelligence for the Emerging
                 Next-Generation {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "603--623",
  day =          "05",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040603",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/603",
  abstract =     "The success of the Content Delivery Networks (CDN) in
                 the recent years has demonstrated the increased
                 benefits of the deployment of some form of
                 ``intelligence'' within the network. Cloud computing,
                 on the other hand, has shown the benefits of economies
                 of scale and the use of a generic infrastructure to
                 support a variety of services. Following that trend, we
                 propose to move away from the smart terminal-dumb
                 network dichotomy to a model where some degree of
                 intelligence is put back into the network, specifically
                 at the edge, with the support of Cloud technology. In
                 this paper, we propose the deployment of an Edge Cloud,
                 which integrates a variety of user-side and server-side
                 services. On the user side, surrogate, an application
                 running on top of the Cloud, supports a virtual client.
                 The surrogate hides the underlying network
                 infrastructure from the user, thus allowing for
                 simpler, more easily managed terminals. Network side
                 services supporting delivery of and exploiting content
                 are also deployed on this infrastructure, giving the
                 Internet Service Providers (ISP) many opportunities to
                 become directly involved in content and service
                 delivery.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Graham:2010:BMM,
  author =       "Jim Graham and Greg Newman and Sunil Kumar and
                 Catherine Jarnevich and Nick Young and Alycia Crall and
                 Thomas J. Stohlgren and Paul Evangelista",
  title =        "Bringing Modeling to the Masses: a {Web} Based System
                 to Predict Potential Species Distributions",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "624--634",
  day =          "11",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040624",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/624",
  abstract =     "Predicting current and potential species distributions
                 and abundance is critical for managing invasive
                 species, preserving threatened and endangered species,
                 and conserving native species and habitats. Accurate
                 predictive models are needed at local, regional, and
                 national scales to guide field surveys, improve
                 monitoring, and set priorities for conservation and
                 restoration. Modeling capabilities, however, are often
                 limited by access to software and environmental data
                 required for predictions. To address these needs, we
                 built a comprehensive web-based system that: (1)
                 maintains a large database of field data; (2) provides
                 access to field data and a wealth of environmental
                 data; (3) accesses values in rasters representing
                 environmental characteristics; (4) runs statistical
                 spatial models; and (5) creates maps that predict the
                 potential species distribution. The system is available
                 online at www.niiss.org, and provides web-based tools
                 for stakeholders to create potential species
                 distribution models and maps under current and future
                 climate scenarios.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Kos:2010:CGS,
  author =       "Alexander Kos and Hans-J{\"u}rgen Himmler",
  title =        "{CWM Global Search} --- The {Internet} Search Engine
                 for Chemists and Biologists",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "635--644",
  day =          "03",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040635",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/635",
  abstract =     "CWM Global Search is a meta-search engine allowing
                 chemists and biologists to search the major chemical
                 and biological databases on the Internet, by structure,
                 synonyms, CAS Registry Numbers and free text. A
                 meta-search engine is a search tool that sends user
                 requests to several other search engines and/or
                 databases and aggregates the results into a single list
                 or displays them according to their source [1]. CWM
                 Global Search is a web application that has many of the
                 characteristics of desktop applications (also known as
                 Rich Internet Application, RIA), and it runs on both
                 Windows and Macintosh platforms. The application is one
                 of the first RIA for scientists. The application can be
                 started using the URL
                 http://cwmglobalsearch.com/gsweb.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Eichler:2010:SSW,
  author =       "Frederik Eichler and Wolfgang Reinhardt",
  title =        "Simplifying the Scientific Writing and Review Process
                 with {SciFlow}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "645--661",
  day =          "06",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040645",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/645",
  abstract =     "Scientific writing is an essential part of a student's
                 and researcher's everyday life. In this paper we
                 investigate the particularities of scientific writing
                 and explore the features and limitations of existing
                 tools for scientific writing. Deriving from this
                 analysis and an online survey of the scientific writing
                 processes of students and researchers at the University
                 of Paderborn, we identify key principles to simplify
                 scientific writing and reviewing. Finally, we introduce
                 a novel approach to support scientific writing with a
                 tool called SciFlow that builds on these principles and
                 state of the art technologies like cloud computing.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Guthle:2010:IAD,
  author =       "Martin G{\"u}thle and Jochen K{\"o}gel and Stefan Wahl
                 and Matthias Kaschub and Christian M. Mueller",
  title =        "Improving Anomaly Detection for Text-Based Protocols
                 by Exploiting Message Structures",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "662--669",
  day =          "21",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040662",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/662",
  abstract =     "Service platforms using text-based protocols need to
                 be protected against attacks. Machine-learning
                 algorithms with pattern matching can be used to detect
                 even previously unknown attacks. In this paper, we
                 present an extension to known Support Vector Machine
                 (SVM) based anomaly detection algorithms for the
                 Session Initiation Protocol (SIP). Our contribution is
                 to extend the amount of different features used for
                 classification (feature space) by exploiting the
                 structure of SIP messages, which reduces the false
                 positive rate. Additionally, we show how combining our
                 approach with attribute reduction significantly
                 improves throughput.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Kinkelin:2011:UTS,
  author =       "Holger Kinkelin and Ralph Holz and Heiko Niedermayer
                 and Simon Mittelberger and Georg Carle",
  title =        "On Using {TPM} for Secure Identities in Future Home
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "1--13",
  day =          "07",
  month =        jan,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010001",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/1",
  abstract =     "Security should be integrated into future networks
                 from the beginning, not as an extension. Secure
                 identities and authentication schemes are an important
                 step to fulfill this quest. In this article, we argue
                 that home networks are a natural trust anchor for such
                 schemes. We describe our concept of home networks as a
                 universal point of reference for authentication, trust
                 and access control, and show that our scheme can be
                 applied to any next generation network. As home
                 networks are no safe place, we apply Trusted Computing
                 technology to prevent the abuse of identities, i.e.,
                 identity theft.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Hanka:2011:DPK,
  author =       "Oliver Hanka and Michael Eichhorn and Martin
                 Pfannenstein and J{\"o}rg Ebersp{\"a}cher and Eckehard
                 Steinbach",
  title =        "A Distributed Public Key Infrastructure Based on
                 Threshold Cryptography for the {HiiMap} Next Generation
                 {Internet} Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "14--30",
  day =          "01",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010014",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/14",
  abstract =     "In this article, a security extension for the HiiMap
                 Next Generation Internet Architecture is presented. We
                 regard a public key infrastructure which is integrated
                 into the mapping infrastructure of the
                 locator/identifier-split addressing scheme. The
                 security approach is based on Threshold Cryptography
                 which enables a sharing of keys among the mapping
                 servers. Hence, a more trustworthy and fair approach
                 for a Next Generation Internet Architecture as compared
                 to the state of the art approach is fostered.
                 Additionally, we give an evaluation based on IETF AAA
                 recommendations for security-related systems.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Rifa-Pous:2011:CEC,
  author =       "Helena Rif{\`a}-Pous and Jordi
                 Herrera-Joancomart{\'\i}",
  title =        "Computational and Energy Costs of Cryptographic
                 Algorithms on Handheld Devices",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "31--48",
  day =          "14",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010031",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/31",
  abstract =     "Networks are evolving toward a ubiquitous model in
                 which heterogeneous devices are interconnected.
                 Cryptographic algorithms are required for developing
                 security solutions that protect network activity.
                 However, the computational and energy limitations of
                 network devices jeopardize the actual implementation of
                 such mechanisms. In this paper, we perform a wide
                 analysis on the expenses of launching symmetric and
                 asymmetric cryptographic algorithms, hash chain
                 functions, elliptic curves cryptography and pairing
                 based cryptography on personal agendas, and compare
                 them with the costs of basic operating system
                 functions. Results show that although cryptographic
                 power costs are high and such operations shall be
                 restricted in time, they are not the main limiting
                 factor of the autonomy of a device.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue The Internet of Things.",
}

@Article{Petrie:2011:ECI,
  author =       "Charles Petrie",
  title =        "Enterprise Coordination on the {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "49--66",
  day =          "17",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010049",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/49",
  abstract =     "Enterprises are now connected internally and
                 externally to other Enterprises via the Internet in
                 ways that are increasingly difficult to manage,
                 especially as these interconnections become more
                 dynamic. Current methods of coordinating the effects of
                 change as they propagate through these networks of
                 connections are not likely to scale. What is needed is
                 a new paradigm for how the Internet supports such
                 coordination. Indeed, the Internet should and could
                 provide fundamental coordination functions that are
                 missing today. In this paper, we describe how such a
                 ``Coordinated Internet'' would work (this paper is an
                 expanded version of [1]). The key functionality of a
                 Coordinated Internet would be that the Internet
                 actively watches what people do (analogous to search
                 completion on desktops today), correlates these
                 activities, and actively notifies people when and how
                 their current tasks affect and are affected by the
                 activities of other people. This would be accomplished
                 by standard coordination functions implemented as a
                 common Internet layer that can be used as a utility by
                 more specialized applications. Such a Coordinated
                 Internet would revolutionize enterprise management, for
                 all enterprises, large and small, corporate and
                 personal. For example, static workflows would become
                 obsolete for all but the the most routine processes.
                 Some solutions provide existence proofs of such a
                 coordination substrate, such as the Redux solution in
                 concurrent engineering, which we describe herein.
                 However, foundational research remains to be done in
                 the new field of Coordination Engineering in order to
                 reach the goal of a future Internet in which
                 coordination functions are fundamental.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Mikoczy:2011:ECN,
  author =       "Eugen Mik{\'o}czy and Ivan Kotuliak and Oskar van
                 Deventer",
  title =        "Evolution of the Converged {NGN} Service Platforms
                 Towards Future Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "67--86",
  day =          "04",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010067",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/67",
  abstract =     "This article presents a comparison of main
                 characteristics of the Next Generation Networks (NGN)
                 and Future Generation Internet (FGI). The aim is to
                 discuss and compare two approaches to Future Networks
                 (FN) and services: the evolution of NGN, and the
                 revolutionary approach of a new FGI. We present both
                 frameworks from the services point of view as they are
                 delivered to the end-user, as well as from the
                 architectural point of view. We compare selected
                 properties of both approaches to explain commonalities
                 and differences. Their challenges are similar: managing
                 the quality of experience, mobility, security,
                 scalability and providing openness to applications.
                 Based on this comparison, we evaluate possible areas
                 for future convergence in the approach of the two
                 architectures to the Future Network concept. Our
                 analysis shows that despite their different
                 backgrounds, the internet's FGI and telco's NGN are not
                 that different after all. The convergence of the two
                 approaches therefore seems the only logical way
                 forward.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Tonnies:2011:SOA,
  author =       "Sascha T{\"o}nnies and Benjamin K{\"o}hncke and
                 Patrick Hennig and Ingo Brunkhorst and Wolf-Tilo
                 Balke",
  title =        "A Service Oriented Architecture for Personalized
                 Universal Media Access",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "87--116",
  day =          "01",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020087",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/87",
  abstract =     "Multimedia streaming means delivering continuous data
                 to a plethora of client devices. Besides the actual
                 data transport, this also needs a high degree of
                 content adaptation respecting the end users' needs
                 given by content preferences, transcoding constraints,
                 and device capabilities. Such adaptations can be
                 performed in many ways, usually on the media server.
                 However, when it comes to content editing, like mixing
                 in subtitles or picture-in-picture composition, relying
                 on third party service providers may be necessary. For
                 economic reasons this should be done in a
                 service-oriented way, because a lot of adaptation
                 modules can be reused within different adaptation
                 workflows. Although service-oriented architectures have
                 become widely accepted in the Web community, the
                 multimedia environment is still dominated by monolithic
                 systems. The main reason is the insufficient support
                 for working with continuous data: generally the
                 suitability of Web services for handling complex data
                 types and state-full applications is still limited. In
                 this paper we discuss extensions of Web service
                 frameworks, and present a first implementation of a
                 service-oriented framework for media streaming and
                 digital item adaptation. The focus lies on the
                 technical realization of the services. Our experimental
                 results show the practicality of the actual deployment
                 of service-oriented multimedia frameworks.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future Network Architectures.",
}

@Article{Chay:2011:UOT,
  author =       "Sengtha Chay and Nophea Sasaki",
  title =        "Using Online Tools to Assess Public Responses to
                 Climate Change Mitigation Policies in {Japan}",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "117--129",
  day =          "01",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020117",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/117",
  abstract =     "As a member of the Annex 1 countries to the Kyoto
                 Protocol of the United Nations Framework Convention on
                 Climate Change, Japan is committed to reducing 6\% of
                 the greenhouse gas emissions. In order to achieve this
                 commitment, Japan has undertaken several major
                 mitigation measures, one of which is the domestic
                 measure that includes ecologically friendly lifestyle
                 programs, utilizing natural energy, participating in
                 local environmental activities, and amending
                 environmental laws. Mitigation policies could be
                 achieved if public responses were strong. As the
                 internet has increasingly become an online platform for
                 sharing environmental information, public responses to
                 the need for reducing greenhouse gas emissions may be
                 assessed using available online tools. We used Google
                 Insights for Search, Google AdWords Keyword Tool, and
                 Google Timeline View to assess public responses in
                 Japan based on the interest shown for five search terms
                 that define global climate change and its mitigation
                 policies. Data on online search interests from January
                 04, 2004 to July 18, 2010 were analyzed according to
                 locations and categories. Our study suggests that the
                 search interests for the five chosen search terms
                 dramatically increased, especially when new mitigation
                 policies were introduced or when climate change related
                 events were organized. Such a rapid increase indicates
                 that the Japanese public strongly responds to climate
                 change mitigation policies.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Glassey:2011:MIM,
  author =       "Olivier Glassey",
  title =        "Metadata For Identity Management of Population
                 Registers",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "130--143",
  day =          "18",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020130",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/130",
  abstract =     "A population register is an inventory of residents
                 within a country, with their characteristics (date of
                 birth, sex, marital status, etc.) and other
                 socio-economic data, such as occupation or education.
                 However, data on population are also stored in numerous
                 other public registers such as tax, land, building and
                 housing, military, foreigners, vehicles, etc.
                 Altogether they contain vast amounts of personal and
                 sensitive information. Access to public information is
                 granted by law in many countries, but this transparency
                 is generally subject to tensions with data protection
                 laws. This paper proposes a framework to analyze data
                 access (or protection) requirements, as well as a model
                 of metadata for data exchange.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Brown:2011:MPB,
  author =       "Katie Brown and Scott W. Campbell and Rich Ling",
  title =        "Mobile Phones Bridging the Digital Divide for Teens in
                 the {US}?",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "144--158",
  day =          "13",
  month =        may,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020144",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/144",
  abstract =     "In 2009, just 27\% of American teens with mobile
                 phones reported using their devices to access the
                 internet. However, teens from lower income families and
                 minority teens were significantly more likely to use
                 their phones to go online. Together, these surprising
                 trends suggest a potential narrowing of the digital
                 divide, offering internet access to those without other
                 means of going online. This is an important move, as,
                 in today's society, internet access is central to
                 active citizenship in general and teen citizenship in
                 particular. Yet the cost of this move toward equal
                 access is absorbed by those who can least afford it:
                 Teenagers from low income households. Using survey and
                 focus group data from a national study of ``Teens and
                 Mobile Phone Use'' (released by Pew and the University
                 of Michigan in 2010), this article helps identify and
                 explain this and other emergent trends for teen use (as
                 well as non-use) of the internet through mobile
                 phones.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Mugridge:2011:EWB,
  author =       "Rick Mugridge and Mark Utting and David Streader",
  title =        "Evolving {Web}-Based Test Automation into Agile
                 Business Specifications",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "159--174",
  day =          "03",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020159",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/159",
  abstract =     "Usually, test automation scripts for a web application
                 directly mirror the actions that the tester carries out
                 in the browser, but they tend to be verbose and
                 repetitive, making them expensive to maintain and
                 ineffective in an agile setting. Our research has
                 focussed on providing tool-support for business-level,
                 example-based specifications that are mapped to the
                 browser level for automatic verification. We provide
                 refactoring support for the evolution of existing
                 browser-level tests into business-level specifications.
                 As resulting business rule tables may be incomplete,
                 redundant or contradictory, our tool provides feedback
                 on coverage.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Agile Practices.",
}

@Article{Sempere:2011:ADV,
  author =       "Andrew Sempere",
  title =        "Architecture and Design for Virtual Conferences: a
                 Case Study",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "3",
  pages =        "175--184",
  day =          "06",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3030175",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/3/175",
  abstract =     "This paper presents a case study of the design issues
                 facing a large multi-format virtual conference. The
                 conference took place twice in two different years,
                 each time using an avatar-based 3D world with
                 spatialized audio including keynote, poster and social
                 sessions. Between year 1 and 2, major adjustments were
                 made to the architecture and design of the space,
                 leading to improvement in the nature of interaction
                 between the participants. While virtual meetings will
                 likely never supplant the effectiveness of face-to-face
                 meetings, this paper seeks to outline a few design
                 principles learned from this experience, which can be
                 applied generally to make computer mediated
                 collaboration more effective.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Virtual Worlds.",
}

@Article{Graham:2011:IDP,
  author =       "Roderick Graham and Danielle Taana Smith",
  title =        "{Internet} as Digital Practice: Examining Differences
                 in {African American} {Internet} Usage",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "3",
  pages =        "185--203",
  day =          "20",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3030185",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/3/185",
  abstract =     "This study assesses differences within the African
                 American population with respect to internet activity.
                 Using survey data, we find wide variations within the
                 population. While some segments of African Americans
                 are indeed less likely to perform certain activities on
                 the internet, we note that certain segments of the
                 African American population are reporting more internet
                 activity than other racial groups. These `haves' score
                 high not just in comparison to their African American
                 peers, but to the US American population as a whole. We
                 suggest a move away from the digital divide/digital
                 inequality models and a move towards thinking of
                 greater or lesser Information and Communication
                 Technology (ICT) usage as conditioned by the
                 instrumental needs of population groups. We term this a
                 digital practice model.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Schroth:2011:TTV,
  author =       "Olaf Schroth and Ellen Pond and Cam Campbell and Petr
                 Cizek and Stephen Bohus and Stephen R. J. Sheppard",
  title =        "Tool or Toy? {Virtual} Globes in Landscape Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "204--227",
  day =          "20",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040204",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/204",
  abstract =     "Virtual globes, i.e., geobrowsers that integrate
                 multi-scale and temporal data from various sources and
                 are based on a globe metaphor, have developed into
                 serious tools that practitioners and various
                 stakeholders in landscape and community planning have
                 started using. Although these tools originate from
                 Geographic Information Systems (GIS), they have become
                 a different, potentially interactive and public tool
                 set, with their own specific limitations and new
                 opportunities. Expectations regarding their utility as
                 planning and community engagement tools are high, but
                 are tempered by both technical limitations and ethical
                 issues [1,2]. Two grassroots campaigns and a
                 collaborative visioning process, the Kimberley Climate
                 Adaptation Project case study (British Columbia),
                 illustrate and broaden our understanding of the
                 potential benefits and limitations associated with the
                 use of virtual globes in participatory planning
                 initiatives. Based on observations, questionnaires and
                 in-depth interviews with stakeholders and community
                 members using an interactive 3D model of regional
                 climate change vulnerabilities, potential impacts, and
                 possible adaptation and mitigation scenarios in
                 Kimberley, the benefits and limitations of virtual
                 globes as a tool for participatory landscape planning
                 are discussed. The findings suggest that virtual globes
                 can facilitate access to geospatial information, raise
                 awareness, and provide a more representative virtual
                 landscape than static visualizations. However,
                 landscape is not equally representative at all scales,
                 and not all types of users seem to benefit equally from
                 the tool. The risks of misinterpretation can be managed
                 by integrating the application and interpretation of
                 virtual globes into face-to-face planning processes.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Paar:2011:LCM,
  author =       "Philip Paar and J{\"o}rg Rekittke",
  title =        "Low-Cost Mapping and Publishing Methods for Landscape
                 Architectural Analysis and Design in Slum-Upgrading
                 Projects",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "228--247",
  day =          "20",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040228",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/228",
  abstract =     "The research project ``Grassroots GIS'' focuses on the
                 development of low-cost mapping and publishing methods
                 for slums and slum-upgrading projects in Manila. In
                 this project smartphones, collaborative mapping and 3D
                 visualization applications are systematically employed
                 to support landscape architectural analysis and design
                 work in the context of urban poverty and urban informal
                 settlements. In this paper we focus on the description
                 of the developed methods and present preliminary
                 results of this work-in-progress.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Imhof:2011:NRK,
  author =       "Mark Imhof and Matthew Cox and Angela Fadersen and
                 Wayne Harvey and Sonia Thompson and David Rees and
                 Christopher Pettit",
  title =        "Natural Resource Knowledge and Information Management
                 via the {Victorian} Resources Online {Website}",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "248--280",
  day =          "09",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040248",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/248",
  abstract =     "Since 1997, the Victorian Resources Online (VRO)
                 website (http://www.dpi.vic.gov.au/vro) has been a key
                 means for the dissemination of landscape-based natural
                 resources information via the internet in Victoria,
                 Australia. The website currently consists of
                 approximately 11,000 web pages, including 1900 maps and
                 1000 downloadable documents. Information is provided at
                 a range of scales-from statewide and regional overviews
                 to more detailed catchment and sub-catchment levels. At
                 all these levels of generalisation, information is
                 arranged in an organisationally agnostic way around key
                 knowledge ``domains'' (e.g., soil, landform, water).
                 VRO represents a useful model for the effective
                 dissemination of a wide range of natural resources
                 information; relying on partnerships with key subject
                 matter experts and data custodians, including a
                 ``knowledge network'' of retired land resource
                 assessment specialists. In this paper, case studies are
                 presented that illustrate various approaches to
                 information and knowledge management with a focus on
                 presentation of spatially contexted soil and landscape
                 information at different levels of generalisation.
                 Examples are provided of adapting site-based
                 information into clickable maps that reveal
                 site-specific details, as well as ``spatialising'' data
                 from specialist internal databases to improve
                 accessibility to a wider audience. Legacy information
                 sources have also been consolidated and spatially
                 referenced. More recent incorporation of interactive
                 visualisation products (such as landscape panoramas,
                 videos and animations) is providing interactive rich
                 media content. Currently the site attracts an average
                 of 1190 user visits per day and user evaluation has
                 indicated a wide range of users, including students,
                 teachers, consultants, researchers and extension staff.
                 The wide range of uses for information and, in
                 particular, the benefits for natural resource
                 education, research and extension has also been
                 identified.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Parsons:2011:TDD,
  author =       "David Parsons and Ramesh Lal and Manfred Lange",
  title =        "Test Driven Development: Advancing Knowledge by
                 Conjecture and Confirmation",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "281--297",
  day =          "14",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040281",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/281",
  abstract =     "Test Driven Development (TDD) is a critical agile
                 software development practice that supports innovation
                 in short development cycles. However, TDD is one of the
                 most challenging agile practices to adopt because it
                 requires changes to work practices and skill sets. It
                 is therefore important to gain an understanding of TDD
                 through the experiences of those who have successfully
                 adopted this practice. We collaborated with an agile
                 team to provide this experience report on their
                 adoption of TDD, using observations and interviews
                 within the product development environment. This
                 article highlights a number of practices that underlie
                 successful development with TDD. To provide a
                 theoretical perspective that can help to explain how
                 TDD supports a positive philosophy of software
                 development, we have revised Northover et al.'s
                 conceptual framework, which is based on a four stage
                 model of agile development, to reinterpret Popper's
                 theory of conjecture and falsification in the context
                 of agile testing strategies. As a result of our
                 findings, we propose an analytical model for TDD in
                 agile software development which provides a theoretical
                 basis for further investigations into the role of TDD
                 and related practices.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Agile Practices.",
}

@Article{Li:2011:SOA,
  author =       "Haifeng Li and Bo Wu",
  title =        "A Service-Oriented Architecture for Proactive
                 Geospatial Information Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "298--318",
  day =          "19",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040298",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/298",
  abstract =     "The advances in sensor network, linked data, and
                 service-oriented computing has indicated a trend of
                 information technology, i.e., toward an open, flexible,
                 and distributed architecture. However, the existing
                 information technologies show a lack of effective
                 sharing, aggregation, and cooperation services to
                 handle the sensors, data, and processing resources to
                 fulfill user's complicated tasks in near real-time.
                 This paper presents a service-orientated architecture
                 for proactive geospatial information services (PGIS),
                 which integrates the sensors, data, processing, and
                 human services. PGIS is designed to organize,
                 aggregate, and co-operate services by composing small
                 scale services into service chains to meet the
                 complicated user requirements. It is a platform to
                 provide real-time or near real-time data collection,
                 storage, and processing capabilities. It is a flexible,
                 reusable, and scalable system to share and interoperate
                 geospatial data, information, and services. The
                 developed PGIS framework has been implemented and
                 preliminary experiments have been performed to verify
                 its performance. The results show that the basic
                 functions such as task analysis, managing sensors for
                 data acquisition, service composition, service chain
                 construction and execution are validated, and the
                 important properties of PGIS, including
                 interoperability, flexibility, and reusability, are
                 achieved.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Sharma:2011:OLO,
  author =       "Subhash Sharma and Christopher Pettit and Ian Bishop
                 and Pang Chan and Falak Sheth",
  title =        "An Online Landscape Object Library to Support
                 Interactive Landscape Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "319--343",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040319",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/319",
  abstract =     "Using landscape objects with geo-visualisation tools
                 to create 3D virtual environments is becoming one of
                 the most prominent communication techniques to
                 understand landscape form, function and processes.
                 Geo-visualisation tools can also provide useful
                 participatory planning support systems to explore
                 current and future environmental issues such as
                 biodiversity loss, crop failure, competing pressures on
                 water availability and land degradation. These issues
                 can be addressed by understanding them in the context
                 of their locality. In this paper we discuss some of the
                 technologies which facilitate our work on the issues of
                 sustainability and productivity, and ultimately support
                 for planning and decision-making. We demonstrate an
                 online Landscape Object Library application with a
                 suite of geo-visualisation tools to support landscape
                 planning. This suite includes: a GIS based Landscape
                 Constructor tool, a modified version of a 3D game
                 engine SIEVE (Spatial Information Exploration and
                 Visualisation Environment) and an interactive touch
                 table display. By integrating the Landscape Object
                 Library with this suite of geo-visualisation tools, we
                 believe we developed a tool that can support a
                 diversity of landscape planning activities. This is
                 illustrated by trial case studies in biolink design,
                 whole farm planning and renewable energy planning. We
                 conclude the paper with an evaluation of our Landscape
                 Object Library and the suite of geographical tools, and
                 outline some further research directions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Formosa:2011:SIS,
  author =       "Saviour Formosa and Vincent Magri and Julia Neuschmid
                 and Manfred Schrenk",
  title =        "Sharing Integrated Spatial and Thematic Data: The
                 {CRISOLA} Case for {Malta} and the {European Project
                 Plan4all} Process",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "344--361",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040344",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/344",
  abstract =     "Sharing data across diverse thematic disciplines is
                 only the next step in a series of hard-fought efforts
                 to ensure barrier-free data availability. The Plan4all
                 project is one such effort, focusing on the
                 interoperability and harmonisation of spatial planning
                 data as based on the INSPIRE protocols. The aims are to
                 support holistic planning and the development of a
                 European network of public and private actors as well
                 as Spatial Data Infrastructure (SDI). The Plan4all and
                 INSPIRE standards enable planners to publish and share
                 spatial planning data. The Malta case tackled the wider
                 scenario for sharing of data, through the investigation
                 of the availability, transformation and dissemination
                 of data using geoportals. The study is brought to the
                 fore with an analysis of the approaches taken to ensure
                 that data in the physical and social domains are
                 harmonised in an internationally-established process.
                 Through an analysis of the criminological theme, the
                 Plan4all process is integrated with the social and land
                 use themes as identified in the CRISOLA model. The
                 process serves as a basis for the need to view sharing
                 as one part of the datacycle rather than an end in
                 itself: without a solid protocol the foundations have
                 been laid for the implementation of the datasets in the
                 social and crime domains.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Lai:2011:OSE,
  author =       "Sabrina Lai and Corrado Zoppi",
  title =        "An Ontology of the Strategic Environmental Assessment
                 of City Masterplans",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "362--378",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040362",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/362",
  abstract =     "Following a discussion on the semantics of the term
                 ``ontology'', this paper discusses some key points
                 concerning the ontology of the Strategic Environmental
                 Assessment procedure applied to city Masterplans, using
                 sustainability as a reference point. It also assumes
                 the implementation of Guidelines of the Autonomous
                 Region of Sardinia as an experimental context, with the
                 objective of proposing the SEA ontology as an important
                 contribution to improve SEA's effectiveness.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Coltekin:2011:HQG,
  author =       "Arzu Coltekin and Tumasch Reichenbacher",
  title =        "High Quality Geographic Services and Bandwidth
                 Limitations",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "379--396",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040379",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/379",
  abstract =     "In this paper we provide a critical overview of the
                 state of the art in human-centric intelligent data
                 management approaches for geographic visualizations
                 when we are faced with bandwidth limitations. These
                 limitations often force us to rethink how we design
                 displays for geographic visualizations. We need ways to
                 reduce the amount of data to be visualized and
                 transmitted. This is partly because modern instruments
                 effortlessly produce large volumes of data and Web 2.0
                 further allows bottom-up creation of rich and diverse
                 content. Therefore, the amount of information we have
                 today for creating useful and usable cartographic
                 products is higher than ever before. However, how much
                 of it can we really use online? To answer this
                 question, we first calculate the bandwidth needs for
                 geographic data sets in terms of waiting times. The
                 calculations are based on various data volumes
                 estimated by scholars for different scenarios.
                 Documenting the waiting times clearly demonstrates the
                 magnitude of the problem. Following this, we summarize
                 the current hardware and software solutions, then the
                 current human-centric design approaches trying to
                 address the constraints such as various screen sizes
                 and information overload. We also discuss a limited set
                 of social issues touching upon the digital divide and
                 its implications. We hope that our systematic
                 documentation and critical review will help researchers
                 and practitioners in the field to better understand the
                 current state of the art.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Neis:2012:SNE,
  author =       "Pascal Neis and Dennis Zielstra and Alexander Zipf",
  title =        "The Street Network Evolution of Crowdsourced Maps:
                 {OpenStreetMap} in {Germany} 2007--2011",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "1--21",
  day =          "29",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010001",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/1",
  abstract =     "The OpenStreetMap (OSM) project is a prime example in
                 the field of Volunteered Geographic Information (VGI).
                 Worldwide, several hundred thousand people are
                 currently contributing information to the ``free''
                 geodatabase. However, the data contributions show a
                 geographically heterogeneous pattern around the globe.
                 Germany counts as one of the most active countries in
                 OSM; thus, the German street network has undergone an
                 extensive development in recent years. The question
                 that remains is this: How does the street network
                 perform in a relative comparison with a commercial
                 dataset? By means of a variety of studies, we show that
                 the difference between the OSM street network for car
                 navigation in Germany and a comparable proprietary
                 dataset was only 9\% in June 2011. The results of our
                 analysis regarding the entire street network showed
                 that OSM even exceeds the information provided by the
                 proprietary dataset by 27\%. Further analyses show on
                 what scale errors can be reckoned with in the topology
                 of the street network, and the completeness of turn
                 restrictions and street name information. In addition
                 to the analyses conducted over the past few years,
                 projections have additionally been made about the point
                 in time by which the OSM dataset for Germany can be
                 considered ``complete'' in relative comparison to a
                 commercial dataset.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Stenliden:2012:HCW,
  author =       "Linnea Stenliden and Mikael Jern",
  title =        "How Can We Study Learning with Geovisual Analytics
                 Applied to Statistics?",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "22--41",
  day =          "30",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010022",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/22",
  abstract =     "It is vital to understand what kind of processes for
                 learning that Geovisual Analytics creates, as certain
                 activities and conditions are produced when employing
                 Geovisual Anlytic tools in education. To understand
                 learning processes created by Geovisual Analytics,
                 first requires an understanding of the interactions
                 between the technology, the workplace where the
                 learning takes place, and learners' specific knowledge
                 formation. When studying these types of interaction it
                 demands a most critical consideration from theoretical
                 perspectives on research design and methods. This paper
                 first discusses common, and then a more uncommon,
                 theoretical approach used within the fields of learning
                 with multimedia environments and Geovisual Analytics,
                 the socio-cultural theoretical perspective. The paper
                 next advocates this constructivist theoretical and
                 empirical perspective when studying learning with
                 multiple representational Geovisual Analytic tools. To
                 illustrate, an outline of a study made within this
                 theoretical tradition is offered. The study is
                 conducted in an educational setting where the Open
                 Statistics eXplorer platform is used. Discussion of our
                 study results shows that the socio-cultural perspective
                 has much to offer in terms of what kind of
                 understanding can be reached in conducting this kind of
                 studies. Therefore, we argue that empirical research to
                 analyze how specific communities use various Geovisual
                 Analytics to evaluate information is best positioned in
                 a socio-cultural theoretical perspective.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Geovisual Analytics.",
}

@Article{Lowell:2012:EAS,
  author =       "Kim Lowell and Lindsay Smith and Ian Miller and
                 Christopher Pettit and Eloise Seymour",
  title =        "{Extension Activity Support System (EASY)}: a
                 {Web}-Based Prototype for Facilitating Farm
                 Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "42--64",
  day =          "04",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010042",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/42",
  abstract =     "In response to disparate advances in delivering
                 spatial information to support agricultural extension
                 activities, the Extension Activity Support System
                 (EASY) project was established to develop a vision
                 statement and conceptual design for such a system based
                 on a national needs assessment. Personnel from across
                 Australia were consulted and a review of existing farm
                 information/management software undertaken to ensure
                 that any system that is eventually produced from the
                 EASY vision will build on the strengths of existing
                 efforts. This paper reports on the collaborative
                 consultative process undertaken to create the EASY
                 vision as well as the conceptual technical design and
                 business models that could support a fully functional
                 spatially enabled online system.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Montenegro:2012:LUP,
  author =       "Nuno Montenegro and Jorge C. Gomes and Paulo Urbano
                 and Jos{\'e} P. Duarte",
  title =        "A Land Use Planning Ontology: {LBCS}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "65--82",
  day =          "06",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010065",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/65",
  abstract =     "Urban planning has a considerable impact on the
                 economic performance of cities and on the quality of
                 life of their populations. Efficiency at this level has
                 been hampered by the lack of integrated tools to
                 adequately describe urban space in order to formulate
                 appropriate design solutions. This paper describes an
                 ontology called LBCS-OWL2 specifically developed to
                 overcome this flaw, based on the Land Based
                 Classification Standards (LBCS), a comprehensive and
                 detailed land use standard to describe the different
                 dimensions of urban space. The goal is to provide
                 semantic and computer-readable land use descriptions of
                 geo-referenced spatial data. This will help to make
                 programming strategies available to those involved in
                 the urban development process. There are several
                 advantages to transferring a land use standard to an
                 OWL2 land use ontology: it is modular, it can be shared
                 and reused, it can be extended and data consistency
                 maintained, and it is ready for integration, thereby
                 supporting the interoperability of different urban
                 planning applications. This standard is used as a basic
                 structure for the ``City Information Modelling'' (CIM)
                 model developed within a larger research project called
                 City Induction, which aims to develop a tool for urban
                 planning and design.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Jurgenson:2012:WAM,
  author =       "Nathan Jurgenson",
  title =        "When Atoms Meet Bits: Social Media, the Mobile {Web}
                 and Augmented Revolution",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "83--91",
  day =          "23",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010083",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/83",
  abstract =     "The rise of mobile phones and social media may come to
                 be historically coupled with a growing atmosphere of
                 dissent that is enveloping much of the globe. The Arab
                 Spring, UK Riots, Occupy and many other protests and
                 so-called ``flash-mobs'' are all massive gatherings of
                 digitally-connected individuals in physical space; and
                 they have recently become the new normal. The primary
                 role of technology in producing this atmosphere has, in
                 part, been to effectively link the on and the offline.
                 The trend to view these as separate spaces, what I call
                 ``digital dualism'', is faulty. Instead, I argue that
                 the digital and physical enmesh to form an ``augmented
                 reality''. Linking the power of the digital-creating
                 and disseminating networked information-with the power
                 of the physical-occupying geographic space with
                 flesh-and-blood bodies-is an important part of why we
                 have this current flammable atmosphere of augmented
                 revolution.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Anisetti:2012:WSA,
  author =       "Marco Anisetti and Claudio A. Ardagna and Ernesto
                 Damiani and Fulvio Frati and Hausi A. M{\"u}ller and
                 Atousa Pahlevan",
  title =        "{Web} Service Assurance: The Notion and the Issues",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "92--109",
  day =          "14",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010092",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/92",
  abstract =     "Web service technology provides basic infrastructure
                 for deploying collaborative business processes. Web
                 Service security standards and protocols aim to provide
                 secure communication and conversation between service
                 providers and consumers. Still, for a client calling a
                 Web service it is difficult to ascertain that a
                 particular service instance satisfies-at execution
                 time-specific non-functional properties. In this paper
                 we introduce the notion of certified Web service
                 assurance, characterizing how service consumers can
                 specify the set of security properties that a service
                 should satisfy. Also, we illustrate a mechanism to
                 re-check non-functional properties when the execution
                 context changes. To this end, we introduce the concept
                 of context-aware certificate, and describe a dynamic,
                 context-aware service discovery environment.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Fehling:2012:PBD,
  author =       "Christoph Fehling and Frank Leymann and Jochen
                 R{\"u}tschlin and David Schumm",
  title =        "Pattern-Based Development and Management of Cloud
                 Applications",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "110--141",
  day =          "15",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010110",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/110",
  abstract =     "Cloud-based applications require a high degree of
                 automation regarding their IT resource management, for
                 example, to handle scalability or resource failures.
                 This automation is enabled by cloud providers offering
                 management interfaces accessed by applications without
                 human interaction. The properties of clouds, especially
                 pay-per-use billing and low availability of individual
                 resources, demand such a timely system management. We
                 call the automated steps to perform one of these
                 management tasks a ``management flow''. Because the
                 emerging behavior of the overall system is comprised of
                 many such management flows and is often hard to
                 predict, we propose defining abstract management flows,
                 describing common steps handling the management tasks.
                 These abstract management flows may then be refined for
                 each individual use case. We cover abstract management
                 flows describing how to make an application elastic,
                 resilient regarding IT resource failure, and how to
                 move application components between different runtime
                 environments. The requirements of these management
                 flows for handled applications are expressed using
                 architectural patterns that have to be implemented by
                 the applications. These dependencies result in abstract
                 management flows being interrelated with architectural
                 patterns in a uniform pattern catalog. We propose a
                 method by use of a catalog to guide application
                 managers during the refinement of abstract management
                 flows at the design stage of an application. Following
                 this method, runtime-specific management functionality
                 and management interfaces are used to obtain automated
                 management flows for a developed application.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Bunting:2012:PAE,
  author =       "Ben S. {Bunting, Jr.} and Jacob Hughes and Tim
                 Hetland",
  title =        "The Player as Author: Exploring the Effects of Mobile
                 Gaming and the Location-Aware Interface on
                 Storytelling",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "142--160",
  day =          "17",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010142",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/142",
  abstract =     "The mobile internet expands the immersive potential of
                 storytelling by introducing electronic games powered by
                 portable, location-aware interfaces. Mobile gaming has
                 become the latest iteration in a decades-long evolution
                 of electronic games that seek to empower the player not
                 just as an avatar in a gameworld but also as a
                 co-author of that gameworld, alongside the game's
                 original designers. Location-aware interfaces allow
                 players to implicate places in the physical world as
                 part of their gameworld (and vice versa) for the first
                 time. In addition to empowering the player as a
                 co-author in the process of constructing a compelling
                 gameworld, then, mobile games eschew linear narrative
                 structures in favor of a cooperative storytelling
                 process that is reliant in part on the player's
                 experience of place. While such an author-player
                 ``worldmaking'' approach to storytelling is not new,
                 mobile games evolve the process beyond what has yet
                 been possible within the technical and physical
                 constraints of the traditional video gaming format.
                 Location-aware interfaces allow mobile games to extend
                 the worldmaking process beyond the screen and into the
                 physical world, co-opting the player's sensory
                 experiences of real-world places as potential
                 storytelling tools. In our essay, we theorize the
                 unique storytelling potential of mobile games while
                 describing our experience attempting to harness that
                 potential through the design and implementation of our
                 hybrid-reality game University of Death.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Oie:2012:SNU,
  author =       "Kjetil Vaage {\O}ie",
  title =        "Sensing the News: User Experiences when Reading
                 Locative News",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "161--178",
  day =          "21",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010161",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/161",
  abstract =     "This article focuses on user experiences on reading
                 location-aware news on the mobile platform and aims to
                 explore what experiences this kind of locative
                 journalism generates and how such experiences change
                 the users' social interaction with news. We produced a
                 specially designed mobile application and tailored news
                 stories specific to this project called LocaNews in
                 order to explore participants' relation to the content
                 in this journalistic format. The result is generated
                 through a field study and a questionnaire of 32 people
                 to find out how they experience the news presented in
                 this format. The user participants' responses are
                 analyzed based on their news experiences,
                 contextualizing places and their social interaction
                 with the news within this form of journalism. Results
                 showed that the local, semi-local and non-local user
                 approaches the locative news in a different manner, but
                 that the average user found this kind of news more
                 interesting and more informative than ordinary news.
                 The participants also have a problem identifying this
                 as journalism, rather than an information service.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Sorschag:2012:FOI,
  author =       "Robert Sorschag",
  title =        "A Flexible Object-of-Interest Annotation Framework for
                 Online Video Portals",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "179--215",
  day =          "22",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010179",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/179",
  abstract =     "In this work, we address the use of object recognition
                 techniques to annotate what is shown where in online
                 video collections. These annotations are suitable to
                 retrieve specific video scenes for object related text
                 queries which is not possible with the manually
                 generated metadata that is used by current portals. We
                 are not the first to present object annotations that
                 are generated with content-based analysis methods.
                 However, the proposed framework possesses some
                 outstanding features that offer good prospects for its
                 application in real video portals. Firstly, it can be
                 easily used as background module in any video
                 environment. Secondly, it is not based on a fixed
                 analysis chain but on an extensive recognition
                 infrastructure that can be used with all kinds of
                 visual features, matching and machine learning
                 techniques. New recognition approaches can be
                 integrated into this infrastructure with low
                 development costs and a configuration of the used
                 recognition approaches can be performed even on a
                 running system. Thus, this framework might also benefit
                 from future advances in computer vision. Thirdly, we
                 present an automatic selection approach to support the
                 use of different recognition strategies for different
                 objects. Last but not least, visual analysis can be
                 performed efficiently on distributed, multi-processor
                 environments and a database schema is presented to
                 store the resulting video annotations as well as the
                 off-line generated low-level features in a compact
                 form. We achieve promising results in an annotation
                 case study and the instance search task of the TRECVID
                 2011 challenge.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Visual Information Retrieval.",
}

@Article{Exter:2012:UWT,
  author =       "Kristin Den Exter and Stephen Rowe and William Boyd
                 and David Lloyd",
  title =        "Using {Web 2.0} Technologies for Collaborative
                 Learning in Distance Education-Case Studies from an
                 {Australian} {University}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "216--237",
  day =          "07",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010216",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/216",
  abstract =     "This paper explores the use of Web 2.0 technologies
                 for collaborative learning in a higher education
                 context. A review of the literature exploring the
                 strengths and weaknesses of Web 2.0 technology is
                 presented, and a conceptual model of a Web 2.0
                 community of inquiry is introduced. Two Australian case
                 studies are described, with an ex-poste evaluation of
                 the use of Web 2.0 tools. Conclusions are drawn as to
                 the potential for the use of Web 2.0 tools for
                 collaborative e-learning in higher education. In
                 particular, design and integration of Web 2.0 tools
                 should be closely related to curriculum intent and
                 pedagogical requirements, care must be taken to provide
                 clear guidance on both expected student activity and
                 learning expectations, and there is a clear need to
                 develop, support and encourage strong interaction both
                 between teachers and students, and amongst the students
                 themselves.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Martin:2012:RW,
  author =       "Ludger Martin and Thomas Gottron",
  title =        "Readability and the {Web}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "238--252",
  day =          "12",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010238",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/238",
  abstract =     "Readability indices measure how easy or difficult it
                 is to read and comprehend a text. In this paper we look
                 at the relation between readability indices and web
                 documents from two different perspectives. On the one
                 hand we analyse how to reliably measure the readability
                 of web documents by applying content extraction
                 techniques and incorporating a bias correction. On the
                 other hand we investigate how web based corpus
                 statistics can be used to measure readability in a
                 novel and language independent way.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Garside:2012:SMS,
  author =       "Debbie Garside and Arjun Ponnusamy and Steve Chan and
                 Richard Picking",
  title =        "Secure Military Social Networking and Rapid
                 Sensemaking in Domain Specific Concept Systems:
                 Research Issues and Future Solutions",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "253--264",
  day =          "12",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010253",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/253",
  abstract =     "This paper identifies the need for a secure military
                 social networking site and the underlying research
                 issues linked to the successful development of such
                 sites. The paper further proposes a solution to the
                 most basic issues by identifying and tackling known
                 potential security threats to military personnel and
                 their families. The paper further defines the base
                 platform for this development to facilitate rapid
                 sensemaking to inform critical communications and rapid
                 decision making processes during abrupt governance and
                 eco-system change, and how the plethora of information
                 (termed as Big Data) on social networking sites can be
                 analysed and harnessed. Underlying architectural
                 issues, efficiency and complexity are explored and
                 their future development is considered.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Roche:2012:WBC,
  author =       "St{\'e}phane Roche and Boris Mericskay and Wided
                 Batita and Matthieu Bach and Mathieu Rondeau",
  title =        "{WikiGIS} Basic Concepts: {Web 2.0} for Geospatial
                 Collaboration",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "265--284",
  day =          "13",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010265",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/265",
  abstract =     "With the emergence of Web 2.0, new applications arise
                 and evolve into more interactive forms of collective
                 intelligence. These applications offer to both
                 professionals and citizens an open and expanded access
                 to geographic information. In this paper, we develop
                 the conceptual foundations of a new technology solution
                 called WikiGIS. WikiGIS's strength lies in its ability
                 to ensure the traceability of changes in
                 spatial-temporal geographic components (geometric
                 location and shape, graphics: iconography and
                 descriptive) generated by users. The final use case
                 highlights to what extent WikiGIS could be a relevant
                 and useful technological innovation in
                 Geocollaboration.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Mooney:2012:CHE,
  author =       "Peter Mooney and Padraig Corcoran",
  title =        "Characteristics of Heavily Edited Objects in
                 {OpenStreetMap}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "285--305",
  day =          "20",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010285",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/285",
  abstract =     "This paper describes the results of an analysis of the
                 OpenStreetMap (OSM) database for the United Kingdom
                 (UK) and Ireland (correct to April 2011). 15, 640 OSM
                 ways (polygons and polylines), resulting in 316, 949
                 unique versions of these objects, were extracted and
                 analysed from the OSM database for the UK and Ireland.
                 In our analysis we only considered ``heavily edited''
                 objects in OSM: objects which have been edited 15 or
                 more times. Our results show that there is no strong
                 relationship between increasing numbers of contributors
                 to a given object and the number of tags (metadata)
                 assigned to it. 87\% of contributions/edits to these
                 objects are performed by 11\% of the total 4128
                 contributors. In 79\% of edits additional spatial data
                 (nodes) are added to objects. The results in this paper
                 do not attempt to evaluate the OSM data as good/poor
                 quality but rather informs potential consumers of OSM
                 data that the data itself is changing over time. In
                 developing a better understanding of the
                 characteristics of ``heavily edited'' objects there may
                 be opportunities to use historical analysis in working
                 towards quality indicators for OSM in the future.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Goggin:2012:DIM,
  author =       "Gerard Goggin",
  title =        "Driving the {Internet}: Mobile {Internets}, Cars, and
                 the Social",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "306--321",
  day =          "20",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010306",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/306",
  abstract =     "This paper looks at the tandem technologies of cars
                 and the Internet, and the new ways that they are
                 assembling the social with the mobile Internet. My
                 argument is two-fold: firstly, the advent of mobile
                 Internet in cars brings together new, widely divergent
                 trajectories of Internet; secondly, such developments
                 have social implications that vary widely depending on
                 whether or not we recognize the broader technological
                 systems and infrastructures, media practices, flows,
                 and mobilities in which vehicular mobile Internets are
                 being created.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Nguyen:2012:BAS,
  author =       "Dinh Khoa Nguyen and Francesco Lelli and Mike P.
                 Papazoglou and Willem-Jan {Van den Heuvel}",
  title =        "Blueprinting Approach in Support of Cloud Computing",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "322--346",
  day =          "21",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010322",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/322",
  abstract =     "Current cloud service offerings, i.e.,
                 Software-as-a-service (SaaS), Platform-as-a-service
                 (PaaS) and Infrastructure-as-a-service (IaaS) offerings
                 are often provided as monolithic, one-size-fits-all
                 solutions and give little or no room for customization.
                 This limits the ability of Service-based Application
                 (SBA) developers to configure and syndicate offerings
                 from multiple SaaS, PaaS, and IaaS providers to address
                 their application requirements. Furthermore, combining
                 different independent cloud services necessitates a
                 uniform description format that facilitates the design,
                 customization, and composition. Cloud Blueprinting is a
                 novel approach that allows SBA developers to easily
                 design, configure and deploy virtual SBA payloads on
                 virtual machines and resource pools on the cloud. We
                 propose the Blueprint concept as a uniform abstract
                 description for cloud service offerings that may cross
                 different cloud computing layers, i.e., SaaS, PaaS and
                 IaaS. To support developers with the SBA design and
                 development in the cloud, this paper introduces a
                 formal Blueprint Template for unambiguously describing
                 a blueprint, as well as a Blueprint Lifecycle that
                 guides developers through the manipulation, composition
                 and deployment of different blueprints for an SBA.
                 Finally, the empirical evaluation of the blueprinting
                 approach within an EC's FP7 project is reported and an
                 associated blueprint prototype implementation is
                 presented.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Hanzl:2012:HGU,
  author =       "Ma{\l}gorzata Hanzl and Karol Dzik and Paulina
                 Kowalczyk and Krystian Kwieci{\'n}ski and Ewa
                 Stankiewicz and Agata L. Wierzbicka",
  title =        "Human Geomatics in Urban Design-Two Case Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "347--361",
  day =          "22",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010347",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/347",
  abstract =     "The mapping of different aspects of urban phenomena
                 and their relation to the physical cityscape has been
                 greatly extended by the use of geomatics. The tradition
                 to base reasoning on ` understanding the world ' dates
                 from the time of Aristotle. The extension plan for
                 Barcelona (Eixample), developed by Cerd{\`a}, which
                 opened the era of modern urban planning, was preceded
                 by analyses of rich data, describing both detailed
                 demographic issues and physical structures. The
                 contemporary, postmodernist city planning continues
                 this tradition, although a shift towards analyses of
                 more human-related issues can be observed, covering,
                 inter alia, citizens' perception, cultural differences
                 and patterns of human activities with regard to
                 distinct social groups. The change towards a more
                 human-related perspective and the inclusion of urban
                 morphology analyses are direct consequences of this
                 trend. The required data may be gathered within a
                 crowd-sourcing participation process. According to
                 communicative planning theory, communication with the
                 wider public is indispensable in order to achieve the
                 best results, and can be realized with the use of
                 sophisticated IT tools. Evidence-based reasoning may be
                 supported by images of significant aesthetic values,
                 which inspire immediate reactions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Nilsen:2012:CBP,
  author =       "Line Lundvoll Nilsen",
  title =        "Collaboration between Professionals: The Use of
                 Videoconferencing for Delivering E-Health",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "362--371",
  day =          "02",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020362",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/362",
  abstract =     "This article explores the ways in which collaboration
                 between professionals using videoconferencing affects
                 the e-health delivered to patients. In Norway, general
                 practitioners (GPs) and specialists routinely hold
                 videoconferences. Observations of 42 VC meetings, each
                 lasting from 5 to 40 min, were analysed in terms of the
                 interactions. In addition, five semi-structured,
                 face-to-face interviews were conducted, each lasting
                 from 20 to 70 minutes. Statements were selected to
                 illustrate the content of the interactions and how
                 collaborative work affects the delivery of healthcare.
                 Successful collaborative work provides practitioners
                 with a new way of thinking: exchanging information and
                 knowledge between levels of care in order to provide
                 the best treatment for patients locally. The regularity
                 makes the collaborative work a two-way achievement. GPs
                 receive decision support and second opinions, and
                 specialists receive information and opportunities to
                 follow up. How the professionals manage their work
                 (i.e., collaborating) may benefit their patients. The
                 regular use of videoconferencing will furnish
                 professionals with enhanced resources for the meeting
                 of patients' demands in the future. Regularly informing
                 one another and exchanging knowledge, benefits the
                 professionals by providing increased certainty with
                 regard to their medical decisions, and it benefits the
                 patients because they will feel satisfied with the
                 competence of the specialists where they live.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Kennedy:2012:SAP,
  author =       "Sean Kennedy and Owen Molloy and Robert Stewart and
                 Paul Jacob and Maria Maleshkova and Frank Doheny",
  title =        "A Semantically Automated Protocol Adapter for Mapping
                 {SOAP} {Web} Services to {RESTful} {HTTP} Format to
                 Enable the {Web} Infrastructure, Enhance {Web} Service
                 Interoperability and Ease {Web} Service Migration",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "372--395",
  day =          "11",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020372",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/372",
  abstract =     "Semantic Web Services (SWS) are Web Service (WS)
                 descriptions augmented with semantic information. SWS
                 enable intelligent reasoning and automation in areas
                 such as service discovery, composition, mediation,
                 ranking and invocation. This paper applies SWS to a
                 previous protocol adapter which, operating within
                 clearly defined constraints, maps SOAP Web Services to
                 RESTful HTTP format. However, in the previous adapter,
                 the configuration element is manual and the latency
                 implications are locally based. This paper applies SWS
                 technologies to automate the configuration element and
                 the latency tests are conducted in a more realistic
                 Internet based setting.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Zafiropoulos:2012:BCC,
  author =       "Kostas Zafiropoulos and Vasiliki Vrana and Dimitrios
                 Vagianos",
  title =        "Bloggers' Community Characteristics and Influence
                 within {Greek} Political Blogosphere",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "396--412",
  day =          "19",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020396",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/396",
  abstract =     "This paper investigates the properties of central or
                 core political blogs. They can be located as clusters
                 of blogs whose members have many incoming links. Other
                 blogs form clouds around them in the sense that they
                 link the core blogs. A case study records Greek
                 political blogs and their incoming links reported
                 through their blogrolls. The adjacency matrix from the
                 blogs' social network is analyzed and clusters are
                 located. Three of them, those with the larger numbers
                 of incoming links, may be considered to be central.
                 Next, four measures of influence are used to test the
                 influence of the central blogs. The findings suggest
                 that there are many kinds of central blogs, influential
                 and non-influential, and high influence does not always
                 involve high hyperlinking.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Government 2.0.",
}

@Article{Davies:2012:PEA,
  author =       "John N. Davies and Paul Comerford and Vic Grout",
  title =        "Principles of Eliminating Access Control Lists within
                 a Domain",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "413--429",
  day =          "19",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020413",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/413",
  abstract =     "The infrastructure of large networks is broken down
                 into areas that have a common security policy called a
                 domain. Security within a domain is commonly
                 implemented at all nodes. However this can have a
                 negative effect on performance since it introduces a
                 delay associated with packet filtering. When Access
                 Control Lists (ACLs) are used within a router for this
                 purpose then a significant overhead is introduced
                 associated with this process. It is likely that
                 identical checks are made at multiple points within a
                 domain prior to a packet reaching its destination.
                 Therefore by eliminating ACLs within a domain by
                 modifying the ingress/egress points with equivalent
                 functionality an improvement in the overall performance
                 can be obtained. This paper considers the effect of the
                 delays when using router operating systems offering
                 different levels of functionality. It considers factors
                 which contribute to the delay particularly due to ACLs
                 and by using theoretical principles modified by
                 practical calculation a model is created. Additionally
                 this paper provides an example of an optimized solution
                 which reduces the delay through network routers by
                 distributing the security rules to the ingress/egress
                 points of the domain without affecting the security
                 policy.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Fernandez:2012:SPW,
  author =       "Eduardo B. Fernandez and Ola Ajaj and Ingrid Buckley
                 and Nelly Delessy-Gassant and Keiko Hashizume and Maria
                 M. Larrondo-Petrie",
  title =        "A Survey of Patterns for {Web} Services Security and
                 Reliability Standards",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "430--450",
  day =          "20",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020430",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/430",
  abstract =     "An important aspect for the acceptance of
                 Service-Oriented Architectures is having convenient
                 ways to help designers build secure applications.
                 Numerous standards define ways to apply security in web
                 services. However, these standards are rather complex
                 and sometimes overlap, which makes them hard to use and
                 may produce inconsistencies. Representing them as
                 patterns makes them easier to understand, to compare to
                 other patterns, to discover inconsistencies, and to use
                 them to build secure web services applications.
                 Security patterns abstract the key aspects of a
                 security mechanism and can thus be applied by
                 non-experts. We survey here our work on security
                 patterns for web services and their standards and we
                 put them in perspective with respect to each other and
                 to more fundamental patterns. We also consider other
                 patterns for web services security. All the patterns
                 described here have been previously published, we only
                 show here one of them in detail as an illustration of
                 our style for writing patterns. Our main purpose here
                 is to enumerate them, show their use, and show how they
                 relate to each other.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Pollino:2012:COS,
  author =       "Maurizio Pollino and Grazia Fattoruso and Luigi {La
                 Porta} and Antonio Bruno {Della Rocca} and Valentina
                 James",
  title =        "Collaborative Open Source Geospatial Tools and Maps
                 Supporting the Response Planning to Disastrous
                 Earthquake Events",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "451--468",
  day =          "07",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020451",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/451",
  abstract =     "The latest improvements in geo-informatics offer new
                 opportunities in a wide range of territorial and
                 environmental applications. In this general framework,
                 a relevant issue is represented by earthquake early
                 warning and emergency management. This research work
                 presents the investigation and development of a simple
                 and innovative geospatial methodology and related
                 collaborative open source geospatial tools for
                 predicting and mapping the vulnerability to seismic
                 hazard in order to support the response planning to
                 disastrous events. The proposed geospatial methodology
                 and tools have been integrated into an open source
                 collaborative GIS system, designed and developed as an
                 integrated component of an earthquake early warning and
                 emergency management system.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Rosado:2012:SAM,
  author =       "David G. Rosado and Rafael G{\'o}mez and Daniel
                 Mellado and Eduardo Fern{\'a}ndez-Medina",
  title =        "Security Analysis in the Migration to Cloud
                 Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "469--487",
  day =          "08",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020469",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/469",
  abstract =     "Cloud computing is a new paradigm that combines
                 several computing concepts and technologies of the
                 Internet creating a platform for more agile and
                 cost-effective business applications and IT
                 infrastructure. The adoption of Cloud computing has
                 been increasing for some time and the maturity of the
                 market is steadily growing. Security is the question
                 most consistently raised as consumers look to move
                 their data and applications to the cloud. We justify
                 the importance and motivation of security in the
                 migration of legacy systems and we carry out an
                 analysis of different approaches related to security in
                 migration processes to cloud with the aim of finding
                 the needs, concerns, requirements, aspects,
                 opportunities and benefits of security in the migration
                 process of legacy systems.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Muller:2012:DPM,
  author =       "Sebastian M{\"u}ller and Franziska Brecht and Benjamin
                 Fabian and Steffen Kunz and Dominik Kunze",
  title =        "Distributed Performance Measurement and Usability
                 Assessment of the {Tor} Anonymization Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "488--513",
  day =          "15",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020488",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/488",
  abstract =     "While the Internet increasingly permeates everyday
                 life of individuals around the world, it becomes
                 crucial to prevent unauthorized collection and abuse of
                 personalized information. Internet anonymization
                 software such as Tor is an important instrument to
                 protect online privacy. However, due to the performance
                 overhead caused by Tor, many Internet users refrain
                 from using it. This causes a negative impact on the
                 overall privacy provided by Tor, since it depends on
                 the size of the user community and availability of
                 shared resources. Detailed measurements about the
                 performance of Tor are crucial for solving this issue.
                 This paper presents comparative experiments on Tor
                 latency and throughput for surfing to 500 popular
                 websites from several locations around the world during
                 the period of 28 days. Furthermore, we compare these
                 measurements to critical latency thresholds gathered
                 from web usability research, including our own user
                 studies. Our results indicate that without massive
                 future optimizations of Tor performance, it is unlikely
                 that a larger part of Internet users would adopt it for
                 everyday usage. This leads to fewer resources available
                 to the Tor community than theoretically possible, and
                 increases the exposure of privacy-concerned
                 individuals. Furthermore, this could lead to an
                 adoption barrier of similar privacy-enhancing
                 technologies for a Future Internet.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{Nordfeldt:2012:YPV,
  author =       "Sam Nordfeldt and Carina Berter{\"o}",
  title =        "Young Patients' Views on the Open {Web 2.0} Childhood
                 Diabetes Patient Portal: a Qualitative Study",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "514--527",
  day =          "18",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020514",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/514",
  abstract =     "Little is known about the views of young patients
                 themselves on interactive Web portal services provided
                 by pediatric practitioners. We aimed to explore their
                 perceptions of a real-world diabetes portal that offers
                 facts and contact with peers and practitioners; e.g.,
                 discussion forums, blog tools, self-care and treatment
                 information, research updates and news from local
                 practitioners. Twelve young patients (ages 12-21,
                 median 15 years), one boyfriend, 7 mothers and one
                 father each wrote an essay on their experience from use
                 of the portal. Their essays underwent qualitative
                 content analysis. A major theme was ``Helping and
                 facilitating daily life with diabetes'', the portal was
                 perceived as a place where contents are interesting,
                 inspiring and may trigger users' curiosity. There were
                 three subthemes; ``Ease of use in my everyday life,''
                 which includes the perception that the portal was
                 perceived as smooth and easy to enter and navigate
                 whenever needed; that information was easy to
                 understand for different groups of users. ``Support via
                 an exchange of experience,'' includes the ability to
                 contact peers being regarded advantageous. Some said
                 that just reading others' experiences can be helpful in
                 terms of persevering; children could find peers in the
                 same age group. ``Evidence based information,''
                 includes the perception of the portal being a useful
                 and trustworthy source of facts on e.g., physical
                 activity, blood glucose, medical devices, emotional
                 wellbeing, food and nutrition, and other aspects that
                 impact living with diabetes. Young users expressed
                 positive perceptions towards the interactive web
                 portal. Such services seem to have great potential for
                 supporting young patients and significant others -
                 intergrading for confidence.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Zafiropoulos:2012:AAG,
  author =       "Kostas Zafiropoulos and Ioannis Karavasilis and
                 Vasiliki Vrana",
  title =        "Assessing the Adoption of e-Government Services by
                 Teachers in {Greece}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "528--544",
  day =          "21",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020528",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/528",
  abstract =     "Technological developments and governments'
                 understanding of what citizens need usually determine
                 the design of public online services. For successful
                 implementation of e-Government services, governments
                 have to place the user in the center of future
                 developments, understand what citizens need and measure
                 what increases citizens' willingness to adopt
                 e-government services. The paper uses the Technology
                 Acceptance Model (TAM), the extended TAM, the Diffusion
                 of Innovations (DOI) theory and the important
                 determinants of user acceptance perceived risk and
                 trust, in order to describe teachers' behavioral
                 intensions to adopt e-Government services. A model
                 containing trust and risk, along with cognitive, social
                 and intrinsic factors is used to study the intentions
                 of e-Government use by Greek primary and secondary
                 education teachers. Two hundred and thirty teachers
                 responded to an online survey. Findings reveal that
                 cognitive and intrinsic factors have significant
                 effects on intentions to use e-Government websites.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Farman:2012:IST,
  author =       "Jason Farman",
  title =        "Introduction to the Social Transformations from the
                 Mobile {Internet} Special Issue",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "545--550",
  day =          "23",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020545",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/545",
  abstract =     "The social transformations brought about by the mobile
                 internet are extensive. In discussing the broad range
                 of these transformations-positioned as a shift from
                 personal computing to pervasive computing-this
                 editorial elaborates on the key contributions addressed
                 by the articles in this special issue of Future
                 Internet. These articles touch on topics such as the
                 digital divide, the role of the mobile internet in
                 revolutions like the Arab Spring and the Occupy Wall
                 Street movement, the development of site-specific and
                 context-aware news, the incorporation of the internet
                 into existing technologies like the automobile, and the
                 utilization of the mobile internet to transform
                 everyday spaces into game spaces.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Newell:2012:CSC,
  author =       "David A. Newell and Margaret M. Pembroke and William
                 E. Boyd",
  title =        "Crowd Sourcing for Conservation: {Web 2.0} a Powerful
                 Tool for Biologists",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "551--562",
  day =          "24",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020551",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/551",
  abstract =     "The advent and adoption of Web 2.0 technologies offers
                 a powerful approach to enhancing the capture of
                 information in natural resource ecology, notably
                 community knowledge of species distributions. Such
                 information has previously been collected using, for
                 example, postal surveys; these are typically
                 inefficient, with low response rates, high costs, and
                 requiring respondents to be spatially literate. Here we
                 describe an example, using the Google Maps Application
                 Programming Interface, to discuss the opportunities
                 such tools provide to conservation biology. Toad
                 Tracker was created as a prototype to demonstrate the
                 utility of this technology to document the distribution
                 of an invasive vertebrate pest species, the cane toad,
                 within Australia. While the technological aspects of
                 this tool are satisfactory, manager resistance towards
                 its use raises issues around the public nature of the
                 technology, the collaborative (non-expert) role in data
                 collection, and data ownership. We conclude in
                 suggesting that, for such tools to be accepted by
                 non-innovation adopters, work is required on both the
                 technological aspects and, importantly, a cultural
                 change is required to create an environment of
                 acceptance of the shifting relationship between
                 authority, expertise and knowledge.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Rotondo:2012:UCP,
  author =       "Francesco Rotondo",
  title =        "The {U-City} Paradigm: Opportunities and Risks for
                 E-Democracy in Collaborative Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "563--574",
  day =          "05",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020563",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/563",
  abstract =     "Volunteered Geographic Information (VGI) tools appear
                 to enhance the possibilities offered by a collaborative
                 approach to planning. The present paper analyzes both
                 the results of experiences of the author and of those
                 available in the literature, highlighting possible
                 advantages and disadvantages. After a brief
                 introduction to the meaning of e-democracy, the second
                 part focuses on the role of ICT in collaborative
                 planning, proceeding in the third part to an
                 illustration of an initial panorama of knowledge
                 gathered using ICT in such processes, while discussing
                 criticisms and opportunities. The fourth part discusses
                 the U-city paradigm as a driver of change in urban
                 planning participation processes. Research perspectives
                 are then outlined in the final part.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Goetz:2012:UCI,
  author =       "Marcus Goetz",
  title =        "Using Crowdsourced Indoor Geodata for the Creation of
                 a Three-Dimensional Indoor Routing {Web} Application",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "575--591",
  day =          "06",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020575",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/575",
  abstract =     "Routing services for outdoor areas are omnipresent and
                 also three-dimensional (3D) visualization is quite
                 common within this area. Recent research efforts are
                 now trying to adapt well known outdoor routing services
                 to complex indoor environments. However, most of the
                 current indoor routing systems only focus on
                 two-dimensional visualization, thus only one level can
                 be depicted. Especially multi-level routes therefore
                 lack visualization. Also, most of the (few) existing 3D
                 indoor routing services utilize proprietary software or
                 plugins, thus a widespread accessibility for those
                 services by using common computers or mobile devices is
                 not feasible. Therefore this paper describes the
                 development of a web-based 3D routing system based on a
                 new HTML extension. The visualization of rooms as well
                 as the computed routes is realized with XML3D. Since
                 this emerging technology is based on WebGL and will
                 likely be integrated into the HTML5 standard, the
                 developed system is already compatible with most common
                 browsers such as Google Chrome or Firefox. Another key
                 difference of the approach presented in this paper is
                 that all utilized data is actually crowdsourced geodata
                 from OpenStreetMap (OSM). Such data is collaboratively
                 collected by both amateurs and professionals and can be
                 used at no charge under the Open Data Commons Open
                 Database License (ODbL). Our research combines
                 user-generated geo content of the Web 2.0 with future
                 Internet technology for the provision of a ubiquitously
                 accessible 3D indoor routing application.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Garau:2012:FCP,
  author =       "Chiara Garau",
  title =        "Focus on Citizens: Public Engagement with Online and
                 Face-to-Face Participation --- a Case Study",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "592--606",
  day =          "15",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020592",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/592",
  abstract =     "The main objective of this paper is to focus on how an
                 integrated system based on Information Communication
                 Technology (ICT) and face-to-face communication can
                 increase participation in order to have a positive
                 effect on quality of life, plans and decisions, and to
                 discuss the many benefits which web-based public
                 participation can bring to the planning process through
                 a set of improvements to relations, quality and
                 structure of cities in general and in this case example
                 specifically. With the development of a transparent
                 support system for collaborative decision-making
                 processes, it is possible to identify a strategy for
                 addressing gaps to reach collaborative decisions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Le:2012:SHO,
  author =       "Quynh L{\^e} and Hoang Boi Nguyen and Tony Barnett",
  title =        "Smart Homes for Older People: Positive Aging in a
                 Digital World",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "607--617",
  day =          "19",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020607",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/607",
  abstract =     "Smart homes are homes with technologically advanced
                 systems to enable domestic task automation, easier
                 communication, and higher security. As an enabler of
                 health and well-being enhancement, smart homes have
                 been geared to accommodate people with special needs,
                 especially older people. This paper examines the
                 concept of ``smart home'' in a technologically driven
                 society and its multi-functional contribution to the
                 enhancement of older people's lives. Discussion then
                 focuses on the challenges in the use of smart homes
                 among older people such as accessibility and ethical
                 issues. Finally, some implications and recommendations
                 are provided.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Fernandez:2012:ISI,
  author =       "Eduardo B. Fernandez",
  title =        "Introduction to the Special Issue on Recent Advances
                 in {Web} Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "618--620",
  day =          "27",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030618",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/618",
  abstract =     "We have collected five papers describing different
                 aspects of web services and cloud computing. Cloud
                 computing is the next stage of application
                 interoperability and it is a logical extension of web
                 services, both approaches being a variety of
                 Service-Oriented Architecture. The papers cover
                 security, migration, certification, and application
                 development. Together, these papers provide a useful
                 panorama of some of the issues of these two
                 technologies.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{AbuKhousa:2012:HCO,
  author =       "Eman AbuKhousa and Nader Mohamed and Jameela
                 Al-Jaroodi",
  title =        "e-Health Cloud: Opportunities and Challenges",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "621--645",
  day =          "04",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030621",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/621",
  abstract =     "As the costs of healthcare services rise and
                 healthcare professionals are becoming scarce and hard
                 to find, it is imminent that healthcare organizations
                 consider adopting health information technology (HIT)
                 systems. HIT allows health organizations to streamline
                 many of their processes and provide services in a more
                 efficient and cost-effective manner. The latest
                 technological trends such as Cloud Computing (CC)
                 provide a strong infrastructure and offer a true
                 enabler for HIT services over the Internet. This can be
                 achieved on a pay-as-you-use model of the ``e-Health
                 Cloud'' to help the healthcare industry cope with
                 current and future demands yet keeping their costs to a
                 minimum. Despite its great potential, HIT as a CC model
                 has not been addressed extensively in the literature.
                 There are no apparent frameworks which clearly
                 encompass all viable schemes and interrelationships
                 between HIT and CC. Therefore, analyzing and comparing
                 the effectiveness of such schemes is important. In this
                 paper we introduce the concept of ``e-Health Cloud''
                 highlighting many of its constituents and proposing
                 building an e-health environment and elucidating many
                 of the challenges confronting the success of the
                 e-Health Cloud. We will also discuss different possible
                 solutions to address challenges such as security and
                 privacy.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Yerima:2012:AMB,
  author =       "Suleiman Y. Yerima and Gerard P. Parr and Sally I.
                 McClean and Philip J. Morrow",
  title =        "Adaptive Measurement-Based Policy-Driven {QoS}
                 Management with Fuzzy-Rule-based Resource Allocation",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "646--671",
  day =          "04",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030646",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/646",
  abstract =     "Fixed and wireless networks are increasingly
                 converging towards common connectivity with IP-based
                 core networks. Providing effective end-to-end resource
                 and QoS management in such complex heterogeneous
                 converged network scenarios requires unified, adaptive
                 and scalable solutions to integrate and co-ordinate
                 diverse QoS mechanisms of different access technologies
                 with IP-based QoS. Policy-Based Network Management
                 (PBNM) is one approach that could be employed to
                 address this challenge. Hence, a policy-based framework
                 for end-to-end QoS management in converged networks,
                 CNQF (Converged Networks QoS Management Framework) has
                 been proposed within our project. In this paper, the
                 CNQF architecture, a Java implementation of its
                 prototype and experimental validation of key elements
                 are discussed. We then present a fuzzy-based CNQF
                 resource management approach and study the performance
                 of our implementation with real traffic flows on an
                 experimental testbed. The results demonstrate the
                 efficacy of our resource-adaptive approach for
                 practical PBNM systems.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Denning:2012:SWC,
  author =       "Dorothy E. Denning",
  title =        "{Stuxnet}: What Has Changed?",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "672--687",
  day =          "16",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030672",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/672",
  abstract =     "This paper considers the impact of Stuxnet on
                 cyber-attacks and cyber-defense. It first reviews
                 trends in cyber-weapons and how Stuxnet fits into these
                 trends. Because Stuxnet targeted an industrial control
                 system in order to wreak physical damage, the focus is
                 on weapons that target systems of that type and produce
                 physical effects. The paper then examines the impact of
                 Stuxnet on various domains of action where
                 cyber-attacks play a role, including state-level
                 conflict, terrorism, activism, crime, and pranks. For
                 each domain, it considers the potential for new types
                 of cyber-attacks, especially attacks against industrial
                 control systems, and whether such attacks would be
                 consistent with other trends in the domain. Finally,
                 the paper considers the impact of Stuxnet on
                 cyber-defense.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Aftermath of Stuxnet.",
}

@Article{Nilsen:2012:TPV,
  author =       "Line Lundvoll Nilsen and Terje Solvoll",
  title =        "Traditional Practice vs. New Tools and Routines in
                 Stroke Treatment",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "688--699",
  day =          "06",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030688",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/688",
  abstract =     "In Norway, it is a national goal to provide more
                 patients with thrombolytic treatment. A referring
                 hospital and a specialist hospital have implemented
                 videoconferencing (VC) equipment to share knowledge and
                 discuss stroke patients, regarding thrombolytic
                 treatment. VC has only been used four times within the
                 19 months that the service has been available. The
                 objective in this article is to increase the
                 understanding of the contradiction between the need for
                 knowledge-sharing through VC technology, as well as the
                 reasons for low frequency of use when discussing stroke
                 patients. Semi-structured interviews were conducted
                 with 13 professionals. The results illustrate how the
                 technology per se is not the reason for the low
                 frequency use. Health care is shaped by behavior,
                 traditional rules, standards and division of labor. By
                 using cultural historical activity theory (CHAT) as a
                 framework, we illustrate the importance of
                 understanding the historic way of performing an
                 activity to be able to expand the treatment activity in
                 the future.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Prandini:2012:RRA,
  author =       "Marco Prandini and Marco Ramilli",
  title =        "Raising Risk Awareness on the Adoption of {Web 2.0}
                 Technologies in Decision Making Processes",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "700--718",
  day =          "09",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030700",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/700",
  abstract =     "In the recent past, the so-called ``Web 2.0'' became a
                 powerful tool for decision making processes.
                 Politicians and managers, seeking to improve
                 participation, embraced this technology as if it simply
                 were a new, enhanced version of the WorldWideWeb,
                 better suited to retrieve information, opinions and
                 feedbacks from the general public on subjects like
                 laws, acts and policies. This approach was often naive,
                 neglecting the less-obvious aspects of the technology,
                 and thus bringing on significant security problems.
                 This paper shows how, in the end, the result could
                 easily be the opposite of what was desired. Malicious
                 attackers, in fact, could quite easily exploit the
                 vulnerabilities in these systems to hijack the process
                 and lead to wrong decisions, also causing the public to
                 lose trust in the systems themselves.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Government 2.0.",
}

@Article{Zafiropoulos:2012:CPA,
  author =       "Kostas Zafiropoulos",
  title =        "Connectivity Practices and Activity of {Greek}
                 Political Blogs",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "719--736",
  day =          "14",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030719",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/719",
  abstract =     "This paper uses Social Network Analysis indexes to
                 study Greek political blogs. The indexes describe
                 bloggers' community recommendations, centrality and
                 bloggers' attempt to form spheres of influence. Five
                 Social Network Analysis indexes are used: incoming
                 links, normalized betweenness, outgoing links, number
                 of 1-cliques a blog belongs to, and size of blog's
                 ego-network. By recording 127 Greek political blogs,
                 the paper finds that there are two distinct blog
                 performance properties regarding connectivity: Only a
                 few blogs serve as authority blogs having many incoming
                 links and centrality, while a few others try to expand
                 their influence territory by having many outgoing links
                 and forming larger 1-cliques and ego-networks. Next,
                 the paper associates the proposed indexes with blogs'
                 and users' community activity. Authority blogs present
                 high blog activity and users' community activity, as
                 well. These are recorded by large numbers of posts and
                 comments to the blog posts, respectively. It is shown
                 that blogs, which strive to expand their network by
                 using many outgoing links are more likely to link to
                 the authority blogs. Content analysis reveals that
                 authority blogs provide news and information and
                 promote discussion to a much higher degree compared to
                 the overall Greek political blogosphere.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Loskyll:2012:CBO,
  author =       "Matthias Loskyll and Ines Heck and Jochen Schlick and
                 Michael Schwarz",
  title =        "Context-Based Orchestration for Control of
                 Resource-Efficient Manufacturing Processes",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "737--761",
  day =          "14",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030737",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/737",
  abstract =     "The increasing competition between manufacturers, the
                 shortening of innovation cycles and the growing
                 importance of resource-efficient manufacturing demand a
                 higher versatility of factory automation.
                 Service-oriented approaches depict a promising
                 possibility to realize new control architectures by
                 encapsulating the functionality of mechatronic devices
                 into services. An efficient discovery, context-based
                 selection and dynamic orchestration of these services
                 are the key features for the creation of highly
                 adaptable manufacturing processes. We describe a
                 semantic service discovery and ad-hoc orchestration
                 system, which is able to react to new process variants
                 and changed contextual information (e.g., failure of
                 field devices, requirements on the consumption of
                 resources). Because a standardized vocabulary,
                 especially for the description of mechatronic
                 functionalities, is still missing in the manufacturing
                 domain, the semantic description of services, processes
                 and manufacturing plants as well as the semantic
                 interpretation of contextual information play an
                 important part.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Subirats:2012:KRP,
  author =       "Laia Subirats and Luigi Ceccaroni and Felip Miralles",
  title =        "Knowledge Representation for Prognosis of Health
                 Status in Rehabilitation",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "762--775",
  day =          "20",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030762",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/762",
  abstract =     "In this article, key points are discussed concerning
                 knowledge representation for clinical decision support
                 systems in the domain of physical medicine and
                 rehabilitation. Information models, classifications and
                 terminologies, such as the ``virtual medical record''
                 (vMR), the ``international classification of
                 functioning, disability and health'' (ICF), the
                 ``international classification of diseases'' (ICD) and
                 the ``systematized nomenclature of medicine-clinical
                 terms'' (SNOMED CT), are used for knowledge integration
                 and reasoning. A system is described that supports the
                 measuring of functioning status, diversity, prognosis
                 and similarity between patients in the post-acute
                 stage, thus helping health professionals' prescription
                 of recommendations.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Stojmenova:2012:AUC,
  author =       "Emilija Stojmenova and Bojan Imperl and Tomaz Zohar
                 and Dejan Dinevski",
  title =        "Adapted User-Centered Design: a Strategy for the
                 Higher User Acceptance of Innovative e-Health
                 Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "776--787",
  day =          "27",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030776",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/776",
  abstract =     "Being familiar with all the benefits of e-Health and
                 the strategic plan for the Slovenian health sector's
                 informatization, Telekom Slovenia and the Faculty of
                 Medicine from the University of Maribor, along with
                 other partners, have initiated an e-Health project. The
                 project group is developing various e-Health services
                 that are based on modern ICT (information and
                 communications technology) solutions and will be
                 available on several screens. In order to meet the
                 users' needs and expectations and, consequently,
                 achieve the high acceptance of e-Health services, the
                 user-centered design (UCD) approach was employed in the
                 e-Health project. However, during the research it was
                 found that conventional UCD methods are not completely
                 appropriate for older adults: the target population of
                 the e-Health services. That is why the selected UCD
                 methods were modified and adapted for older adults. The
                 modified UCD methods used in the research study are
                 presented in this paper. Using the results of the
                 adapted UCD methods, a prototype for a service named
                 MedReminder was developed. The prototype was evaluated
                 by a group of 12 study participants. The study
                 participants evaluated the MedReminder service as
                 acceptable with a good potential for a high adoption
                 rate among its target population, i.e., older adults.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Future e-Health.",
}

@Article{Hunter:2012:TAE,
  author =       "Jane Hunter and Anna Gerber",
  title =        "Towards Annotopia-Enabling the Semantic
                 Interoperability of {Web}-Based Annotations",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "788--806",
  day =          "30",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030788",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/788",
  abstract =     "This paper describes the results of a collaborative
                 effort that has reconciled the Open Annotation
                 Collaboration (OAC) ontology and the Annotation
                 Ontology (AO) to produce a merged data model [the Open
                 Annotation (OA) data model] to describe Web-based
                 annotations-and hence facilitate the discovery, sharing
                 and re-use of such annotations. Using a number of case
                 studies that include digital scholarly editing, 3D
                 museum artifacts and sensor data streams, we evaluate
                 the OA model's capabilities. We also describe our
                 implementation of an online annotation server that
                 supports the storage, search and retrieval of
                 OA-compliant annotations across multiple applications
                 and disciplines. Finally we discuss outstanding problem
                 issues associated with the OA ontology, and the impact
                 that certain design decisions have had on the efficient
                 storage, indexing, search and retrieval of complex
                 structured annotations.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Schade:2012:SOI,
  author =       "Sven Schade and Frank Ostermann and Laura Spinsanti
                 and Werner Kuhn",
  title =        "Semantic Observation Integration",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "807--829",
  day =          "03",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030807",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/807",
  abstract =     "Although the integration of sensor-based information
                 into analysis and decision making has been a research
                 topic for many years, semantic interoperability has not
                 yet been reached. The advent of user-generated content
                 for the geospatial domain, Volunteered Geographic
                 Information (VGI), makes it even more difficult to
                 establish semantic integration. This paper proposes a
                 novel approach to integrating conventional sensor
                 information and VGI, which is exploited in the context
                 of detecting forest fires. In contrast to common
                 logic-based semantic descriptions, we present a formal
                 system using algebraic specifications to unambiguously
                 describe the processing steps from natural phenomena to
                 value-added information. A generic ontology of
                 observations is extended and profiled for forest fire
                 detection in order to illustrate how the sensing
                 process, and transformations between heterogeneous
                 sensing systems, can be represented as mathematical
                 functions and grouped into abstract data types. We
                 discuss the required ontological commitments and a
                 possible generalization.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Bouzidi:2012:SWA,
  author =       "Khalil Riad Bouzidi and Bruno Fies and Catherine
                 Faron-Zucker and Alain Zarli and Nhan Le Thanh",
  title =        "{Semantic Web} Approach to Ease Regulation Compliance
                 Checking in Construction Industry",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "830--851",
  day =          "11",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030830",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/830",
  abstract =     "Regulations in the Building Industry are becoming
                 increasingly complex and involve more than one
                 technical area, covering products, components and
                 project implementations. They also play an important
                 role in ensuring the quality of a building, and to
                 minimize its environmental impact. Control or
                 conformance checking are becoming more complex every
                 day, not only for industrials, but also for
                 organizations charged with assessing the conformity of
                 new products or processes. This paper will detail the
                 approach taken by the CSTB (Centre Scientifique et
                 Technique du B{\^a}timent) in order to simplify this
                 conformance control task. The approach and the proposed
                 solutions are based on semantic web technologies. For
                 this purpose, we first establish a domain-ontology,
                 which defines the main concepts involved and the
                 relationships, including one based on OWL (Web Ontology
                 Language) [1]. We rely on SBVR (Semantics of Business
                 Vocabulary and Business Rules) [2] and SPARQL (SPARQL
                 Protocol and RDF Query Language) [3] to reformulate the
                 regulatory requirements written in natural language,
                 respectively, in a controlled and formal language. We
                 then structure our control process based on expert
                 practices. Each elementary control step is defined as a
                 SPARQL query and assembled into complex control
                 processes ``on demand'', according to the component
                 tested and its semantic definition. Finally, we
                 represent in RDF (Resource Description Framework) [4]
                 the association between the SBVR rules and SPARQL
                 queries representing the same regulatory constraints.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Pileggi:2012:WSM,
  author =       "Salvatore F. Pileggi and Carlos Fernandez-Llatas and
                 Vicente Traver",
  title =        "When the Social Meets the Semantic: Social {Semantic
                 Web} or {Web} 2.5",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "852--864",
  day =          "21",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030852",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/852",
  abstract =     "The social trend is progressively becoming the key
                 feature of current Web understanding (Web 2.0). This
                 trend appears irrepressible as millions of users,
                 directly or indirectly connected through social
                 networks, are able to share and exchange any kind of
                 content, information, feeling or experience. Social
                 interactions radically changed the user approach.
                 Furthermore, the socialization of content around social
                 objects provides new unexplored commercial marketplaces
                 and business opportunities. On the other hand, the
                 progressive evolution of the web towards the Semantic
                 Web (or Web 3.0) provides a formal representation of
                 knowledge based on the meaning of data. When the social
                 meets semantics, the social intelligence can be formed
                 in the context of a semantic environment in which user
                 and community profiles as well as any kind of
                 interaction is semantically represented (Semantic
                 Social Web). This paper first provides a conceptual
                 analysis of the second and third version of the Web
                 model. That discussion is aimed at the definition of a
                 middle concept (Web 2.5) resulting in the convergence
                 and integration of key features from the current and
                 next generation Web. The Semantic Social Web (Web 2.5)
                 has a clear theoretical meaning, understood as the
                 bridge between the overused Web 2.0 and the not yet
                 mature Semantic Web (Web 3.0).",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Groza:2012:PDL,
  author =       "Adrian Groza and Ioan Alfred Letia",
  title =        "Plausible Description Logic Programs for Stream
                 Reasoning",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "865--881",
  day =          "17",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040865",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/865",
  abstract =     "Sensor networks are estimated to drive the formation
                 of the future Internet, with stream reasoning
                 responsible for analysing sensor data. Stream reasoning
                 is defined as real time logical reasoning on large,
                 noisy, heterogeneous data streams, aiming to support
                 the decision process of large numbers of concurrent
                 querying agents. In this research we exploited
                 non-monotonic rule-based systems for handling
                 inconsistent or incomplete information and also
                 ontologies to deal with heterogeneity. Data is
                 aggregated from distributed streams in real time and
                 plausible rules fire when new data is available. The
                 advantages of lazy evaluation on data streams were
                 investigated in this study, with the help of a
                 prototype developed in Haskell.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Gomes:2012:CDL,
  author =       "Rui Gomes and L{\'\i}gia Sousa",
  title =        "Contributions to the Development of Local e-Government
                 2.0",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "882--899",
  day =          "22",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040882",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/882",
  abstract =     "With the emergence of Web 2.0 (Blog, Wiki, RSS,
                 YouTube, Flickr, Podcast, Social Networks, and
                 Mashups), new ways of communicating, interacting and
                 being on the Web have arisen. These new communication
                 tools and strategies can radically change some specific
                 work processes in communities, such as the work
                 processes of an autarchy. Some authors emphasize the
                 advantages of using Web 2.0 tools in autarchies; thus,
                 we were interested in exploring the possibilities and
                 constraints of implementing these tools in our region
                 of Portugal, the Minho. Using a case study methodology,
                 we aimed to find out about the possibilities of
                 implementing Web 2.0 tools in autarchies through
                 exploring the interest and motivation of autarchic
                 collaborators in their use (our unit of analysis in
                 autarchies). Information was gathered with the help of
                 a questionnaire, the design of which was based on
                 previous exploratory interviews and applied to four
                 autarchic units in the Minho region. In each unit,
                 three different target-groups were surveyed
                 (Councilors, Information Systems (IS) Technicians, and
                 General Staff), so that we could triangulate the data.
                 Data analysis and results emphasized the interest and
                 motivation of the autarchies in using Web 2.0 tools, as
                 well as the main constraints that would be faced during
                 Web 2.0 implementation. It also allowed us to establish
                 some guidelines for adequate Web 2.0 implementation,
                 including an ``ideal'' profile of the person
                 responsible for the implementation process.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Government 2.0.",
}

@Article{Harrison:2012:COG,
  author =       "Teresa M. Harrison and Theresa A. Pardo and Meghan
                 Cook",
  title =        "Creating Open Government Ecosystems: a Research and
                 Development Agenda",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "900--928",
  day =          "23",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040900",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/900",
  abstract =     "In this paper, we propose to view the concept of open
                 government from the perspective of an ecosystem, a
                 metaphor often used by policy makers, scholars, and
                 technology gurus to convey a sense of the
                 interdependent social systems of actors, organizations,
                 material infrastructures, and symbolic resources that
                 can be created in technology-enabled,
                 information-intensive social systems. We use the
                 concept of an ecosystem to provide a framework for
                 considering the outcomes of a workshop organized to
                 generate a research and development agenda for open
                 government. The agenda was produced in discussions
                 among participants from the government (at the federal,
                 state, and local levels), academic and civil sector
                 communities at the Center for Technology in Government
                 (CTG) at the University at Albany, SUNY in April 2011.
                 The paper begins by discussing concepts central to
                 understanding what is meant by an ecosystem and some
                 principles that characterize its functioning. We then
                 apply this metaphor more directly to government,
                 proposing that policymakers engage in strategic
                 ecosystems thinking, which means being guided by the
                 goal of explicitly and purposefully constructing open
                 government ecosystems. From there, we present the
                 research agenda questions essential to the development
                 of this new view of government's interaction with users
                 and organizations. Our goal is to call attention to
                 some of the fundamental ways in which government must
                 change in order to evolve from outdated industrial
                 bureaucratic forms to information age networked and
                 interdependent systems.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Government 2.0.",
}

@Article{Hu:2012:SLP,
  author =       "Yuh-Jong Hu and Win-Nan Wu and Kua-Ping Cheng and
                 Ya-Ling Huang",
  title =        "Semantic Legal Policies for Data Exchange and
                 Protection across Super-Peer Domains in the Cloud",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "929--954",
  day =          "25",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040929",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/929",
  abstract =     "In semantic policy infrastructure, a Trusted Legal
                 Domain (TLD), designated as a Super-Peer Domain (SPD),
                 is a legal cage model used to circumscribe the legal
                 virtual boundary of data disclosure and usage in the
                 cloud. Semantic legal policies in compliance with the
                 law are enforced at the super-peer within an SPD to
                 enable Law-as-a-Service (LaaS) for cloud service
                 providers. In addition, cloud users could query
                 fragmented but protected outsourcing cloud data from a
                 law-aware super-peer, where each query is also
                 compliant with the law. Semantic legal policies are
                 logic-based formal policies, which are shown to be a
                 combination of OWL-DL ontologies and stratified Datalog
                 rules with negation, i.e., so-called non-monotonic
                 cq-programs, for policy representation and enforcement.
                 An agent at the super-peer is a unique law-aware
                 guardian that provides protected data integration
                 services for its peers within an SPD. Furthermore,
                 agents at the super-peers specify how law-compliant
                 legal policies are unified with each other to provide
                 protected data exchange services across SPDs in the
                 semantic data cloud.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Davis:2012:SME,
  author =       "Jenny L. Davis",
  title =        "Social Media and Experiential Ambivalence",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "955--970",
  day =          "26",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040955",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/955",
  abstract =     "At once fearful and dependent, hopeful and
                 distrustful, our contemporary relationship with
                 technology is highly ambivalent. Using experiential
                 accounts from an ongoing Facebook-based qualitative
                 study (N = 231), I both diagnose and articulate this
                 ambivalence. I argue that technological ambivalence is
                 rooted primarily in the deeply embedded moral
                 prescription to lead a meaningful life, and a related
                 uncertainty about the role of new technologies in the
                 accomplishment of this task. On the one hand,
                 technology offers the potential to augment or even
                 enhance personal and public life. On the other hand,
                 technology looms with the potential to supplant or
                 replace real experience. I examine these polemic
                 potentialities in the context of personal experiences,
                 interpersonal relationships, and political activism. I
                 conclude by arguing that the pervasive integration and
                 non-optionality of technical systems amplifies utopian
                 hopes, dystopian fears, and ambivalent concerns in the
                 contemporary era.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Theorizing the Web 2012.",
}

@Article{Bencsath:2012:CSD,
  author =       "Boldizs{\'a}r Bencs{\'a}th and G{\'a}bor P{\'e}k and
                 Levente Butty{\'a}n and M{\'a}rk F{\'e}legyh{\'a}zi",
  title =        "The Cousins of {Stuxnet}: {Duqu}, {Flame}, and
                 {Gauss}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "971--1003",
  day =          "06",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040971",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/971",
  abstract =     "Stuxnet was the first targeted malware that received
                 worldwide attention for causing physical damage in an
                 industrial infrastructure seemingly isolated from the
                 onlineworld. Stuxnet was a powerful targeted
                 cyber-attack, and soon other malware samples were
                 discovered that belong to this family. In this paper,
                 we will first present our analysis of Duqu, an
                 information-collecting malware sharing striking
                 similarities with Stuxnet. We describe our
                 contributions in the investigation ranging from the
                 original detection of Duquvia finding the dropper file
                 to the design of a Duqu detector toolkit. We then
                 continue with the analysis of the Flame advanced
                 information-gathering malware. Flame is unique in the
                 sense that it used advanced cryptographic techniques to
                 masquerade as a legitimate proxy and we are currently
                 collecting intelligence information to be able to break
                 its very specialencryption mechanism. Besides
                 explaining the operation of these pieces of malware, we
                 also examine if and how they could have been detected
                 by vigilant system administrators manually or in a
                 semi-automated manner using available tools. Finally,
                 we discuss lessons that the community can learn from
                 these incidents. We focus on technical issues, and
                 avoid speculations on the origin of these threats and
                 other geopolitical questions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Aftermath of Stuxnet.",
}

@Article{Lord:2012:TSH,
  author =       "Phillip Lord and Simon Cockell and Robert Stevens",
  title =        "Three Steps to Heaven: Semantic Publishing in a Real
                 World Workflow",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1004--1015",
  day =          "08",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041004",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1004",
  abstract =     "Semantic publishing offers the promise of computable
                 papers, enriched visualisation and a realisation of the
                 linked data ideal. In reality, however, the publication
                 process contrives to prevent richer semantics while
                 culminating in a ``lumpen'' PDF. In this paper, we
                 discuss a web-first approach to publication, and
                 describe a three-tiered approach that integrates with
                 the existing authoring tooling. Critically, although it
                 adds limited semantics, it does provide value to all
                 the participants in the process: the author, the reader
                 and the machine.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Sarma:2012:STP,
  author =       "Amardeo Sarma and Joao Girao",
  title =        "Supporting Trust and Privacy with an Identity-Enabled
                 Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1016--1025",
  day =          "19",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041016",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1016",
  abstract =     "Cost reduction and a vastly increased potential to
                 create new services, such as via the proliferation of
                 the Cloud, have led to many more players and ``end
                 points''. With many of them being new entrants,
                 possibly short-lived, the question of how to handle
                 trust and privacy in this new context arises. In this
                 paper, we specifically look at the underlying
                 infrastructure that connects end-points served by these
                 players, which is an essential part of the overall
                 architecture to enable trust and privacy. We present an
                 enhanced architecture that allows real people, objects
                 and services to reliably interact via an infrastructure
                 providing assured levels of trust.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{George:2012:TMB,
  author =       "Mathew George and Klaus-Peter Fischer-Hellmann and
                 Martin Knahl and Udo Bleimann and Shirley Atkinson",
  title =        "Traceability in Model-Based Testing",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1026--1036",
  day =          "26",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041026",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1026",
  abstract =     "The growing complexities of software and the demand
                 for shorter time to market are two important challenges
                 that face today's IT industry. These challenges demand
                 the increase of both productivity and quality of
                 software. Model-based testing is a promising technique
                 for meeting these challenges. Traceability modeling is
                 a key issue and challenge in model-based testing.
                 Relationships between the different models will help to
                 navigate from one model to another, and trace back to
                 the respective requirements and the design model when
                 the test fails. In this paper, we present an approach
                 for bridging the gaps between the different models in
                 model-based testing. We propose relation definition
                 markup language (RDML) for defining the relationships
                 between models.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Antley:2012:TDA,
  author =       "Jeremy Antley",
  title =        "Textual Dualism and Augmented Reality in the {Russian}
                 Empire",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1037--1048",
  day =          "10",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041037",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1037",
  abstract =     "While the current focus on how digital technology
                 alters our conception of the self and its place in the
                 broader perceived reality yields fascinating insight
                 into modern issues, there is much to be gained by
                 analyzing the presence of dualist and augmented reality
                 discourses in a pre-digital era. This essay will
                 examine the ontological interplay of textual dualist
                 norms in the Russian and Soviet states of the 19th and
                 early 20th centuries and how those norms were
                 challenged by augmented claims embodied in rumors,
                 refrains, and the spelling of names. By utilizing the
                 informational concepts of mobility and asynchronicity,
                 three Russian historical vignettes --- the Emancipation
                 of the Serfs in 1861, the documentation of Jews in
                 Imperial Russia, and the attempts by Trotsky to realize
                 Soviet symchka --- demonstrate that not only are
                 dualist discourses prevalent in periods outside of the
                 contemporary, but also that the way in which those
                 conflicts framed themselves in the past directly
                 influences their deployment in today's digital world.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Theorizing the Web 2012.",
}

@Article{Wang:2012:VAS,
  author =       "Jue Wang and Keith J. Bennett and Edward A. Guinness",
  title =        "Virtual Astronaut for Scientific Visualization--- a
                 Prototype for {Santa Maria Crater} on {Mars}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1049--1068",
  day =          "13",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041049",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1049",
  abstract =     "To support scientific visualization of
                 multiple-mission data from Mars, the Virtual Astronaut
                 (VA) creates an interactive virtual 3D environment
                 built on the Unity3D Game Engine. A prototype study was
                 conducted based on orbital and Opportunity Rover data
                 covering Santa Maria Crater in Meridiani Planum on
                 Mars. The VA at Santa Maria provides dynamic visual
                 representations of the imaging, compositional, and
                 mineralogical information. The VA lets one navigate
                 through the scene and provides geomorphic and geologic
                 contexts for the rover operations. User interactions
                 include in-situ observations visualization, feature
                 measurement, and an animation control of rover drives.
                 This paper covers our approach and implementation of
                 the VA system. A brief summary of the prototype system
                 functions and user feedback is also covered. Based on
                 external review and comments by the science community,
                 the prototype at Santa Maria has proven the VA to be an
                 effective tool for virtual geovisual analysis.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Geovisual Analytics.",
}

@Article{Sun:2012:WBG,
  author =       "Min Sun and Jing Li and Chaowei Yang and Gavin A.
                 Schmidt and Myra Bambacus and Robert Cahalan and
                 Qunying Huang and Chen Xu and Erik U. Noble and
                 Zhenlong Li",
  title =        "A {Web}-Based Geovisual Analytical System for Climate
                 Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1069--1085",
  day =          "14",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041069",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1069",
  abstract =     "Climate studies involve petabytes of spatiotemporal
                 datasets that are produced and archived at distributed
                 computing resources. Scientists need an intuitive and
                 convenient tool to explore the distributed
                 spatiotemporal data. Geovisual analytical tools have
                 the potential to provide such an intuitive and
                 convenient method for scientists to access climate
                 data, discover the relationships between various
                 climate parameters, and communicate the results across
                 different research communities. However, implementing a
                 geovisual analytical tool for complex climate data in a
                 distributed environment poses several challenges. This
                 paper reports our research and development of a
                 web-based geovisual analytical system to support the
                 analysis of climate data generated by climate model.
                 Using the ModelE developed by the NASA Goddard
                 Institute for Space Studies (GISS) as an example, we
                 demonstrate that the system is able to (1) manage large
                 volume datasets over the Internet; (2) visualize
                 2D/3D/4D spatiotemporal data; (3) broker various
                 spatiotemporal statistical analyses for climate
                 research; and (4) support interactive data analysis and
                 knowledge discovery. This research also provides an
                 example for managing, disseminating, and analyzing Big
                 Data in the 21st century.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Geovisual Analytics.",
}

@Article{Cap:2012:TCN,
  author =       "Clemens H. Cap",
  title =        "Towards Content Neutrality in {Wiki} Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1086--1104",
  day =          "19",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041086",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1086",
  abstract =     "The neutral point of view (NPOV) cornerstone of
                 Wikipedia (WP) is challenged for next generation
                 knowledge bases. A case is presented for content
                 neutrality as a new, every point of view (EPOV) guiding
                 principle. The architectural implications of content
                 neutrality are discussed and translated into novel
                 concepts of Wiki architectures. Guidelines for
                 implementing this architecture are presented. Although
                 NPOV is criticized, the contribution avoids ideological
                 controversy and focuses on the benefits of the novel
                 approach.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Tomas-Gabarron:2013:OVT,
  author =       "Juan-Bautista Tomas-Gabarron and Esteban Egea-Lopez
                 and Joan Garcia-Haro",
  title =        "Optimization of Vehicular Trajectories under
                 {Gaussian} Noise Disturbances",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "1--20",
  day =          "27",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010001",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/1",
  abstract =     "Nowadays, research on Vehicular Technology aims at
                 automating every single mechanical element of vehicles,
                 in order to increase passengers' safety, reduce human
                 driving intervention and provide entertainment services
                 on board. Automatic trajectory tracing for vehicles
                 under especially risky circumstances is a field of
                 research that is currently gaining enormous attention.
                 In this paper, we show some results on how to develop
                 useful policies to execute maneuvers by a vehicle at
                 high speeds with the mathematical optimization of some
                 already established mobility conditions of the car. We
                 also study how the presence of Gaussian noise on
                 measurement sensors while maneuvering can disturb
                 motion and affect the final trajectories. Different
                 performance criteria for the optimization of such
                 maneuvers are presented, and an analysis is shown on
                 how path deviations can be minimized by using
                 trajectory smoothing techniques like the Kalman Filter.
                 We finalize the paper with a discussion on how
                 communications can be used to implement these
                 schemes.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Paltrinieri:2013:PIE,
  author =       "Roberta Paltrinieri and Piergiorgio Degli Esposti",
  title =        "Processes of Inclusion and Exclusion in the Sphere of
                 Prosumerism",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "21--33",
  day =          "10",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010021",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/21",
  abstract =     "The term prosumer, first introduced by Toffler in the
                 1980s, has been developed by sociologists in response
                 to Web 2.0 (the set of technologies that has
                 transformed a predominantly static web into the
                 collaborative medium initially envisaged by Tim
                 Berners-Lee). The phenomena is now understood as a
                 process involving the creation of meanings on the part
                 of the consumer, who re-appropriates spaces that were
                 dominated by institutionalized production, and this
                 extends to the exploitation of consumer creativity on
                 the production side. Recent consumption literature can
                 be re-interpreted through the prosumer lens in order to
                 understand whether prosumers are more creative or
                 alienated in their activities. The peculiar typology of
                 prosumption introduced by Web 2.0 leads us to analyze
                 social capital as a key element in value creation, and
                 to investigate its different online and offline forms.
                 Our analysis then discusses the digital divide and
                 critical consumerism as forms of empowerment
                 impairment.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Theorizing the Web 2012.",
}

@Article{Fritsch:2013:CPE,
  author =       "Lothar Fritsch",
  title =        "The Clean Privacy Ecosystem of the Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "34--45",
  day =          "14",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010034",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/34",
  abstract =     "This article speculates on the future of privacy and
                 electronic identities on the Internet. Based on a short
                 review of security models and the development of
                 privacy-enhancing technology, privacy and electronic
                 identities will be discussed as parts of a larger
                 context-an ecosystem of personal information and
                 electronic identities. The article argues for an
                 ecosystem view of personal information and electronic
                 identities, as both personal information and identity
                 information are basic required input for many
                 applications. Therefore, for both application owners
                 and users, a functioning ecosystem of personal
                 information and electronic identification is important.
                 For the future of the Internet, high-quality
                 information and controlled circulation of such
                 information is therefore argued as decisive for the
                 value of future Internet applications.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{Desmet:2013:GAM,
  author =       "Antoine Desmet and Erol Gelenbe",
  title =        "Graph and Analytical Models for Emergency Evacuation",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "46--55",
  day =          "21",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010046",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/46",
  abstract =     "Cyber-Physical-Human Systems (CPHS) combine sensing,
                 communication and control to obtain desirable outcomes
                 in physical environments for human beings, such as
                 buildings or vehicles. A particularly important
                 application area is emergency management. While recent
                 work on the design and optimisation of emergency
                 management schemes has relied essentially on discrete
                 event simulation, which is challenged by the
                 substantial amount of programming or reprogramming of
                 the simulation tools and by the scalability and the
                 computing time needed to obtain useful performance
                 estimates, this paper proposes an approach that offers
                 fast estimates based on graph models and probability
                 models. We show that graph models can offer insight
                 into the critical areas in an emergency evacuation and
                 that they can suggest locations where sensor systems
                 are particularly important and may require hardening.
                 On the other hand, we also show that analytical models
                 based on queueing theory can provide useful estimates
                 of evacuation times and for routing optimisation. The
                 results are illustrated with regard to the evacuation
                 of a real-life building.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Smith:2013:AAN,
  author =       "Danielle Taana Smith",
  title =        "{African Americans} and Network Disadvantage:
                 Enhancing Social Capital through Participation on
                 Social Networking Sites",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "56--66",
  day =          "06",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010056",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/56",
  abstract =     "This study examines the participation of African
                 Americans on social networking sites (SNS), and
                 evaluates the degree to which African Americans engage
                 in activities in the online environment to mitigate
                 social capital deficits. Prior literature suggests that
                 compared with whites, African Americans have less
                 social capital that can enhance their socio-economic
                 mobility. As such, my research question is: do African
                 Americans enhance their social capital through their
                 participation on SNS? I use nationally representative
                 data collected from the Pew Internet and American Life
                 Project to explore the research question. The results
                 suggest that the online environment is potentially a
                 space in which African Americans can lessen social
                 capital deficits.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Menth:2013:GLL,
  author =       "Michael Menth and Matthias Hartmann and Dominik
                 Klein",
  title =        "Global Locator, Local Locator, and Identifier Split
                 ({GLI}-Split)",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "67--94",
  day =          "11",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010067",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/67",
  abstract =     "The locator/identifier split is an approach for a new
                 addressing and routing architecture to make routing in
                 the core of the Internet more scalable. Based on this
                 principle, we developed the GLI-Split framework, which
                 separates the functionality of current IP addresses
                 into a stable identifier and two independent locators,
                 one for routing in the Internet core and one for edge
                 networks. This makes routing in the Internet more
                 stable and provides more flexibility for edge networks.
                 GLI-Split can be incrementally deployed and it is
                 backward-compatible with the IPv6 Internet. We describe
                 its architecture, compare it to other approaches,
                 present its benefits, and finally present a
                 proof-of-concept implementation of GLI-Split.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Multisilta:2013:SLW,
  author =       "Jari Multisilta and Arttu Perttula",
  title =        "Supporting Learning with Wireless Sensor Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "95--112",
  day =          "19",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010095",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/95",
  abstract =     "In this article, learning is studied in in situ
                 applications that involve sensors. The main questions
                 are how to conceptualize experiential learning
                 involving sensors and what kinds of learning
                 applications using sensors already exist or could be
                 designed. It is claimed that experiential learning,
                 context information and sensor data supports twenty
                 first century learning. The concepts of context,
                 technology-mediated experiences, shared felt
                 experiences and experiential learning theory will be
                 used to describe a framework for sensor-based mobile
                 learning environments. Several scenarios and case
                 examples using sensors and sensor data will be
                 presented, and they will be analyzed using the
                 framework. Finally, the article contributes to the
                 discussion concerning the role of technology-mediated
                 learning experiences and collective sensor data in
                 developing twenty first century learning by
                 characterizing what kinds of skills and competences are
                 supported in learning situations that involve
                 sensors.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Scholz:2013:CSF,
  author =       "Markus Scholz and Dawud Gordon and Leonardo Ramirez
                 and Stephan Sigg and Tobias Dyrks and Michael Beigl",
  title =        "A Concept for Support of Firefighter Frontline
                 Communication",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "113--127",
  day =          "16",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020113",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/113",
  abstract =     "In an indoor firefighter mission, coordination and
                 communication support are of the utmost importance. We
                 present our experience from over five years of research
                 with current firefighter support technology. In
                 contrast to some large scale emergency response
                 research, our work is focused on the frontline
                 interaction between teams of firefighters and the
                 incident commander on a single site. In this paper we
                 investigate the flaws in firefighter communication
                 systems. Frequent technical failures and the high
                 cognitive costs incurred by communicating impede
                 coordination. We then extract a list of requirements
                 for an assistant emergency management technology from
                 expert interviews. Thirdly, we provide a system concept
                 and explore challenges for building a novel firefighter
                 support system based on our previous work. The system
                 has three key features: robust ad-hoc network,
                 telemetry and text messaging, as well as implicit
                 interaction. The result would provide a complementary
                 mode of communication in addition to the current
                 trunked radio.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Gelenbe:2013:EQT,
  author =       "Erol Gelenbe and Ricardo Lent",
  title =        "Energy-{QoS} Trade-Offs in Mobile Service Selection",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "128--139",
  day =          "19",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020128",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/128",
  abstract =     "An attractive advantage of mobile networks is that
                 their users can gain easy access to different services.
                 In some cases, equivalent services could be fulfilled
                 by different providers, which brings the question of
                 how to rationally select the best provider among all
                 possibilities. In this paper, we investigate an answer
                 to this question from both quality-of-service (QoS) and
                 energy perspectives by formulating an optimisation
                 problem. We illustrate the theoretical results with
                 examples from experimental measurements of the
                 resulting energy and performance.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Managing Quality-of-Service and Security
                 in Mobile Heterogeneous Environments.",
}

@Article{Uto:2013:MRI,
  author =       "Nelson Uto",
  title =        "A Methodology for Retrieving Information from Malware
                 Encrypted Output Files: {Brazilian} Case Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "140--167",
  day =          "25",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020140",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/140",
  abstract =     "This article presents and explains a methodology based
                 on cryptanalytic and reverse engineering techniques
                 that can be employed to quickly recover information
                 from encrypted files generated by malware. The
                 objective of the methodology is to minimize the effort
                 with static and dynamic analysis, by using
                 cryptanalysis and related knowledge as much as
                 possible. In order to illustrate how it works, we
                 present three case studies, taken from a big Brazilian
                 company that was victimized by directed attacks focused
                 on stealing information from a special purpose hardware
                 they use in their environment.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Kolding:2013:QSP,
  author =       "Troels Kolding and Pawel Ochal and Niels Terp
                 Kjeldgaard J{\o}rgensen and Klaus Pedersen",
  title =        "{QoS} Self-Provisioning and Interference Management
                 for Co-Channel Deployed {3G} Femtocells",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "168--189",
  day =          "02",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020168",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/168",
  abstract =     "A highly efficient self-provisioning interference
                 management scheme is derived for 3G Home Node-Bs (HNB).
                 The proposed scheme comprises self-adjustment of the
                 HNB transmission parameters to meet the targeted QoS
                 (quality of service) requirements in terms of downlink
                 and uplink guaranteed minimum throughput and coverage.
                 This objective is achieved by means of an autonomous
                 HNB solution, where the transmit power of pilot and
                 data are adjusted separately, while also controlling
                 the uplink interference pollution towards the
                 macro-layer. The proposed scheme is evaluated by means
                 of extensive system level simulations and the results
                 show significant performance improvements in terms of
                 user throughput outage probability, power efficiency,
                 femtocell coverage, and impact on macro-layer
                 performance as compared to prior art baseline
                 techniques. The paper is concluded by also showing
                 corresponding measurements from live 3G high-speed
                 packet access (HSPA) HNB field-trials, confirming the
                 validity of major simulation results and assumptions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Managing Quality-of-Service and Security
                 in Mobile Heterogeneous Environments.",
}

@Article{Soderstrom:2013:DDY,
  author =       "Sylvia S{\"o}derstr{\"o}m",
  title =        "Digital Differentiation in Young People's {Internet}
                 Use --- Eliminating or Reproducing Disability
                 Stereotypes",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "190--204",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020190",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/190",
  abstract =     "Norwegian authorities' policy aims at securing an
                 information society for all, emphasizing the importance
                 of accessible and usable Information and Communication
                 Technology (ICT) for everyone. While the body of
                 research on young people's use of ICT is quite
                 comprehensive, research addressing digital
                 differentiation in young people with disabilities' use
                 of ICT is still in its early days. This article
                 investigates how young people with disabilities' use,
                 or non-use, of assistive ICT creates digital
                 differentiations. The investigation elaborates on how
                 the anticipations and stereotypes of disability
                 establish an authoritative definition of assistive ICT,
                 and the consequence this creates for the use of the Web
                 by young people with disabilities. The object of the
                 article is to provide enhanced insight into the field
                 of technology and disability by illuminating how
                 assistive ICT sometimes eliminates and sometimes
                 reproduces stereotypes and digital differentiations.
                 The investigation draws on a qualitative interview
                 study with 23 young Norwegians with disabilities, aged
                 15-20 years. I draw on a theoretical perspective to
                 analyze the findings of the study, which employs the
                 concept of identity multiplicity. The article's closing
                 discussion expands on technology's significance in
                 young people's negotiations of impairment and of
                 perceptions of disability.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Loukas:2013:RCT,
  author =       "George Loukas and Diane Gan and Tuan Vuong",
  title =        "A Review of Cyber Threats and Defence Approaches in
                 Emergency Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "205--236",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020205",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/205",
  abstract =     "Emergency planners, first responders and relief
                 workers increasingly rely on computational and
                 communication systems that support all aspects of
                 emergency management, from mitigation and preparedness
                 to response and recovery. Failure of these systems,
                 whether accidental or because of malicious action, can
                 have severe implications for emergency management.
                 Accidental failures have been extensively documented in
                 the past and significant effort has been put into the
                 development and introduction of more resilient
                 technologies. At the same time researchers have been
                 raising concerns about the potential of cyber attacks
                 to cause physical disasters or to maximise the impact
                 of one by intentionally impeding the work of the
                 emergency services. Here, we provide a review of
                 current research on the cyber threats to communication,
                 sensing, information management and vehicular
                 technologies used in emergency management. We emphasise
                 on open issues for research, which are the cyber
                 threats that have the potential to affect emergency
                 management severely and for which solutions have not
                 yet been proposed in the literature.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Ober:2013:SAB,
  author =       "Micha Ober and Stefan Katzenbeisser and Kay Hamacher",
  title =        "Structure and Anonymity of the {Bitcoin} Transaction
                 Graph",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "237--250",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020237",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/237",
  abstract =     "The Bitcoin network of decentralized payment
                 transactions has attracted a lot of attention from both
                 Internet users and researchers in recent years. Bitcoin
                 utilizes a peer-to-peer network to issue anonymous
                 payment transactions between different users. In the
                 currently used Bitcoin clients, the full transaction
                 history is available at each node of the network to
                 prevent double spending without the need for a central
                 authority, forming a valuable source for empirical
                 research on network structure, network dynamics, and
                 the implied anonymity challenges, as well as guidance
                 on the future evolution of complex payment systems. We
                 found dynamical effects of which some increase
                 anonymity while others decrease it. Most importantly,
                 several parameters of the Bitcoin transaction graph
                 seem to have become stationary over the last 12-18
                 months. We discuss the implications.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Digital Cash: Design and Impacts.",
}

@Article{West:2013:REO,
  author =       "Rebecca J. West and Bhoomi K. Thakore",
  title =        "Racial Exclusion in the Online World",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "251--267",
  day =          "24",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020251",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/251",
  abstract =     "As the internet has become an integral part of
                 everyday life, it is understood that patterns of racial
                 stereotyping and discrimination found in the offline
                 world are often reproduced online. In our paper, we
                 examine two exclusionary practices in an online
                 environment for adult toy collectors: First, the
                 exclusion of non-white individuals who are expected to
                 form immediate friendships with other non-white
                 members; and second, the essentializing of racial
                 issues when concerns over the lack of racial diversity
                 in the toys are discussed. This dismissal is often
                 directly connected to non-white members' decisions to
                 no longer participate, resulting in a new form of
                 segregation within virtual space.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Sakellari:2013:ITB,
  author =       "Georgia Sakellari and Christina Morfopoulou and Erol
                 Gelenbe",
  title =        "Investigating the Tradeoffs between Power Consumption
                 and Quality of Service in a Backbone Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "268--281",
  day =          "24",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020268",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/268",
  abstract =     "Energy saving in networks has traditionally focussed
                 on reducing battery consumption through smart wireless
                 network design. Recently, researchers have turned their
                 attention to the energy cost and carbon emissions of
                 the backbone network that both fixed and mobile
                 communications depend on, proposing primarily
                 mechanisms that turn equipments OFF or put them into
                 deep sleep. This is an effective way of saving energy,
                 provided that the nodes can return to working condition
                 quickly, but it introduces increased delays and packet
                 losses that directly affect the quality of
                 communication experienced by the users. Here we
                 investigate the associated tradeoffs between power
                 consumption and quality of service in backbone networks
                 that employ deep sleep energy savings. We examine these
                 tradeoffs by conducting experiments on a real PC-based
                 network topology, where nodes are put into deep sleep
                 at random times and intervals, resulting in a
                 continuously changing network with reduced total power
                 consumption. The average power consumption, the packet
                 loss and the average delay of this network are examined
                 with respect to the average value of the ON rate and
                 the ON/OFF cycle of the nodes.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Managing Quality-of-Service and Security
                 in Mobile Heterogeneous Environments.",
}

@Article{Neis:2013:CVG,
  author =       "Pascal Neis and Dennis Zielstra and Alexander Zipf",
  title =        "Comparison of Volunteered Geographic Information Data
                 Contributions and Community Development for Selected
                 World Regions",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "282--300",
  day =          "03",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020282",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/282",
  abstract =     "Volunteered Geographic Information (VGI) projects and
                 their crowdsourced data have been the focus of a number
                 of scientific analyses and investigations in recent
                 years. Oftentimes the results show that the
                 collaboratively collected geodata of one of the most
                 popular VGI projects, OpenStreetMap (OSM), provides
                 good coverage in urban areas when considering
                 particular completeness factors. However, results can
                 potentially vary significantly for different world
                 regions. In this article, we conduct an analysis to
                 determine similarities and differences in data
                 contributions and community development in OSM between
                 12 selected urban areas of the world. Our findings
                 showed significantly different results in data
                 collection efforts and local OSM community sizes.
                 European cities provide quantitatively larger amounts
                 of geodata and number of contributors in OSM, resulting
                 in a better representation of the real world in the
                 dataset. Although the number of volunteers does not
                 necessarily correlate with the general population
                 density of the urban areas, similarities could be
                 detected while comparing the percentage of different
                 contributor groups and the number of changes they made
                 to the OSM project. Further analyses show that
                 socio-economic factors, such as income, can have an
                 impact on the number of active contributors and the
                 data provided in the analyzed areas. Furthermore, the
                 results showed significant data contributions by
                 members whose main territory of interest lies more than
                 one thousand kilometers from the tested areas.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Marganski:2013:VRV,
  author =       "Alison Marganski",
  title =        "Virtual Relationship Violence and Perspectives on
                 Punishment: Do Gender or Nationality Matter?",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "301--316",
  day =          "26",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030301",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/301",
  abstract =     "Given the increasingly popular use of socially
                 interactive technology (SIT), it is believed that the
                 way in which individuals communicate and experience
                 relationships has drastically been changing. For those
                 who partake in this electronic world, damaging
                 behaviors akin to those found in the real world have
                 emerged. Yet, we know little about the extent of these
                 behaviors in the context of romantic relationships,
                 especially from a gender or cultural standpoint.
                 Research on dating violence generally indicates that
                 women experience in-person victimization at higher
                 rates than men, although some research has called this
                 into question. It also suggests that some national
                 groups experience higher rates of violence than others.
                 However, research is almost non-existent when it comes
                 to exploring violence in the digital world. This study
                 investigated gender and nationality in (1) the nature
                 and extent of socially interactive intimate violence,
                 and (2) perceptions of the seriousness of virtual
                 relationship violence. Using a sample of students from
                 the United States and Poland, findings revealed that
                 socially interactive technology may serve as a new
                 avenue for aggressing against partners, as virtual
                 relationship violence was not uncommon and reflected
                 some patterns present in the real world. Some
                 unexpected patterns also emerged. The results of this
                 research signal a possible transferability of covert
                 intimate violence and highlight ways in which
                 inequalities may exist in our virtual worlds.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Imadali:2013:ESS,
  author =       "Sofiane Imadali and Athanasia Karanasiou and Alexandru
                 Petrescu and Ioannis Sifniadis and Eleftheria Velidou
                 and V{\'e}ronique V{\`e}que and Pantelis Angelidis",
  title =        "{eHealth} Service Support in Future {IPv6} Vehicular
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "317--335",
  day =          "27",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030317",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/317",
  abstract =     "Recent vehicular networking activities include novel
                 automotive applications, such as public vehicle to
                 vehicle/infrastructure (V2X), large scale deployments,
                 machine-to-machine (M2M) integration scenarios, and
                 more. The platform described in this paper focuses on
                 the integration of eHealth in a V2I setting. This is to
                 allow the use of Internet from a vehicular setting to
                 disseminate health-related information. From an eHealth
                 viewpoint, the use of remote healthcare solutions to
                 record and transmit a patient's vital signs is a
                 special telemedicine application that helps hospital
                 resident health professionals to optimally prepare the
                 patient's admittance. From the automotive perspective,
                 this is a typical vehicle-to-infrastructure (V2I)
                 communication scenario. This proposal provides an IPv6
                 vehicular platform, which integrates eHealth devices
                 and allows sending captured health-related data to a
                 personal health record (PHR) application server in the
                 IPv6 Internet. The collected data is viewed remotely by
                 a doctor and supports his diagnostic decision. In
                 particular, our work introduces the integration of
                 vehicular and eHealth testbeds, describes related work
                 and presents a lightweight auto-configuration method
                 based on a DHCPv6 extension to provide IPv6
                 connectivity with a few numbers of messages.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Gelenbe:2013:FRC,
  author =       "Erol Gelenbe and Fang-Jing Wu",
  title =        "Future Research on Cyber-Physical Emergency Management
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "336--354",
  day =          "27",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030336",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/336",
  abstract =     "Cyber-physical systems that include human beings and
                 vehicles in a built environment, such as a building or
                 a city, together with sensor networks and decision
                 support systems have attracted much attention. In
                 emergencies, which also include mobile searchers and
                 rescuers, the interactions among civilians and the
                 environment become much more diverse, and the
                 complexity of the emergency response also becomes much
                 greater. This paper surveys current research on
                 sensor-assisted evacuation and rescue systems and
                 discusses the related research issues concerning
                 communication protocols for sensor networks, as well as
                 several other important issues, such as the integrated
                 asynchronous control of large-scale emergency response
                 systems, knowledge discovery for rescue and prototyping
                 platforms. Then, we suggest directions for further
                 research.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Kotenko:2013:DIH,
  author =       "Igor Kotenko and Olga Polubelova and Andrey Chechulin
                 and Igor Saenko",
  title =        "Design and Implementation of a Hybrid
                 Ontological-Relational Data Repository for {SIEM}
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "355--375",
  day =          "09",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030355",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/355",
  abstract =     "The technology of Security Information and Event
                 Management (SIEM) becomes one of the most important
                 research applications in the area of computer network
                 security. The overall functionality of SIEM systems
                 depends largely on the quality of solutions implemented
                 at the data storage level, which is purposed for the
                 representation of heterogeneous security events, their
                 storage in the data repository, and the extraction of
                 relevant data for analytical modules of SIEM systems.
                 The paper discusses the key issues of design and
                 implementation of a hybrid SIEM data repository, which
                 combines relational and ontological data
                 representations. Based on the analysis of existing SIEM
                 systems and standards, the ontological approach is
                 chosen as a core component of the repository, and an
                 example of the ontological data model for
                 vulnerabilities representation is outlined. The hybrid
                 architecture of the repository is proposed for
                 implementation in SIEM systems. Since the most of works
                 on the repositories of SIEM systems is based on the
                 relational data model, the paper focuses mainly on the
                 ontological part of the hybrid approach. To test the
                 repository we used the data model intended for attack
                 modeling and security evaluation, which includes both
                 ontological and relational dimensions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Chadwick:2013:IAP,
  author =       "Darren Chadwick and Caroline Wesson and Chris
                 Fullwood",
  title =        "{Internet} Access by People with Intellectual
                 Disabilities: Inequalities and Opportunities",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "376--397",
  day =          "17",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030376",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/376",
  abstract =     "This review gives an overview of the societal
                 inequalities faced by people with intellectual
                 disabilities, before focusing specifically on
                 challenges people face accessing the Internet. Current
                 access will be outlined along with the societal,
                 support and attitudinal factors that can hinder access.
                 Discussion of carer views of Internet use by people
                 with intellectual disabilities will be covered
                 incorporating consideration of the tension between
                 protection, self-determination and lifestyle issues and
                 gaining Internet access. We will address how impairment
                 related factors may impede access and subsequently
                 discuss how supports may be used to obfuscate
                 impairments and facilitate access. We will move on from
                 this to critically describe some of the potential
                 benefits the Internet could provide to people with
                 intellectual disabilities, including the potential for
                 self-expression, advocacy and developing friendships.
                 Finally, strategies to better include people with
                 intellectual disabilities online will be given along
                 with future research suggestions.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Busanelli:2013:CNI,
  author =       "Stefano Busanelli and Filippo Rebecchi and Marco
                 Picone and Nicola Iotti and Gianluigi Ferrari",
  title =        "Cross-Network Information Dissemination in Vehicular
                 Ad hoc Networks {(VANETs)}: Experimental Results from a
                 {Smartphone}-Based Testbed",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "398--428",
  day =          "05",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030398",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/398",
  abstract =     "In this work, we present an innovative approach for
                 effective cross-network information dissemination, with
                 applications to vehicular ad hoc networks (VANETs). The
                 proposed approach, denoted as ``Cross-Network Effective
                 Traffic Alert Dissemination'' (X-NETAD), leverages on
                 the spontaneous formation of local WiFi (IEEE 802.11b)
                 VANETs, with direct connections between neighboring
                 vehicles, in order to disseminate, very quickly and
                 inexpensively, traffic alerts received from the
                 cellular network. The proposed communication
                 architecture has been implemented on Android
                 smartphones. The obtained experimental results show
                 that an effective cross-network information
                 dissemination service can entirely rely on
                 smartphone-based communications. This paves the way to
                 future Internet architectures, where vehicles will play
                 a key role as information destinations and sources.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Teets:2013:LRC,
  author =       "Michael Teets and Matthew Goldner",
  title =        "Libraries' Role in Curating and Exposing Big Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "429--438",
  day =          "20",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030429",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/429",
  abstract =     "This article examines how one data hub is working to
                 become a relevant and useful source in the Web of big
                 data and cloud computing. The focus is on OCLC's
                 WorldCat database of global library holdings and
                 includes work by other library organizations to expose
                 their data using big data concepts and standards.
                 Explanation is given of how OCLC has begun work on the
                 knowledge graph for this data and its active
                 involvement with Schema.org in working to make this
                 data useful throughout the Web.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Server Technologies in Cloud Computing
                 and Big Data.",
}

@Article{Gupta:2013:PLN,
  author =       "Smrati Gupta and M. A. V{\'a}zquez-Castro",
  title =        "Physical Layer Network Coding Based on Integer Forcing
                 Precoded Compute and Forward",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "439--459",
  day =          "28",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030439",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/439",
  abstract =     "In this paper, we address the implementation of
                 physical layer network coding (PNC) based on compute
                 and forward (CF) in relay networks. It is known that
                 the maximum achievable rates in CF-based transmission
                 is limited due to the channel approximations at the
                 relay. In this work, we propose the integer forcing
                 precoder (IFP), which bypasses this maximum rate
                 achievability limitation. Our precoder requires channel
                 state information (CSI) at the transmitter, but only
                 that of the channel between the transmitter and the
                 relay, which is a feasible assumption. The overall
                 contributions of this paper are three-fold. Firstly, we
                 propose an implementation of CF using IFP and prove
                 that this implementation achieves higher rates as
                 compared to traditional relaying schemes. Further, the
                 probability of error from the proposed scheme is shown
                 to have up to 2 dB of gain over the existent lattice
                 network coding-based implementation of CF. Secondly, we
                 analyze the two phases of transmission in the CF
                 scheme, thereby characterizing the end-to-end behavior
                 of the CF and not only one-phase behavior, as in
                 previous proposals. Finally, we develop decoders for
                 both the relay and the destination. We use a
                 generalization of Bezout's theorem to justify the
                 construction of these decoders. Further, we make an
                 analytical derivation of the end-to-end probability of
                 error for cubic lattices using the proposed scheme.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Mantere:2013:NTF,
  author =       "Matti Mantere and Mirko Sailio and Sami Noponen",
  title =        "Network Traffic Features for Anomaly Detection in
                 Specific Industrial Control System Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "460--473",
  day =          "25",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040460",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/460",
  abstract =     "The deterministic and restricted nature of industrial
                 control system networks sets them apart from more open
                 networks, such as local area networks in office
                 environments. This improves the usability of network
                 security, monitoring approaches that would be less
                 feasible in more open environments. One of such
                 approaches is machine learning based anomaly detection.
                 Without proper customization for the special
                 requirements of the industrial control system network
                 environment, many existing anomaly or misuse detection
                 systems will perform sub-optimally. A machine learning
                 based approach could reduce the amount of manual
                 customization required for different industrial control
                 system networks. In this paper we analyze a possible
                 set of features to be used in a machine learning based
                 anomaly detection system in the real world industrial
                 control system network environment under investigation.
                 The network under investigation is represented by
                 architectural drawing and results derived from network
                 trace analysis. The network trace is captured from a
                 live running industrial process control network and
                 includes both control data and the data flowing between
                 the control network and the office network. We limit
                 the investigation to the IP traffic in the traces.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Ogul:2013:PAM,
  author =       "Murat Ogul and Sel{\c{c}}uk Baktir",
  title =        "Practical Attacks on Mobile Cellular Networks and
                 Possible Countermeasures",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "474--489",
  day =          "30",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040474",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/474",
  abstract =     "Due to widespread adoption of mobile communications
                 devices and increasingly high throughput capacity of
                 cellular networks, Third-Generation (3G) and Long Term
                 Evolution (LTE) are becoming ever more popular.
                 Millions of smart phones with 3G capabilities are sold
                 every year and used for mostly browsing the Internet.
                 Hence, mobile operators have been heavily investing in
                 their packet switched networks to meet customer demand
                 and stay ahead in the market. The widespread use of
                 broadband mobile Internet bring along also some IP
                 based threats such as the Denial of Service (DoS)
                 attacks, botnets and malwares. In this paper, we
                 performed DoS and flooding attacks on 3G mobile
                 networks and measured their effect on the most critical
                 elements of a network such as the Radio Network
                 Controller (RNC) and the Serving GPRS Support Node
                 (SGSN) devices. We carried out our experiments on a
                 real mobile network, not just a simulation environment,
                 and hence our findings depict a realistic picture of
                 the vulnerabilities existent in 3G mobile networks. We
                 propose alternative solutions to avoid these
                 vulnerabilities and mitigate the issues raised.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Ziaimatin:2013:STD,
  author =       "Hasti Ziaimatin and Tudor Groza and Jane Hunter",
  title =        "Semantic and Time-Dependent Expertise Profiling Models
                 in Community-Driven Knowledge Curation Platforms",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "490--514",
  day =          "11",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040490",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/490",
  abstract =     "Online collaboration and web-based knowledge sharing
                 have gained momentum as major components of the Web 2.0
                 movement. Consequently, knowledge embedded in such
                 platforms is no longer static and continuously evolves
                 through experts' micro-contributions. Traditional
                 Information Retrieval and Social Network Analysis
                 techniques take a document-centric approach to
                 expertise modeling by creating a macro-perspective of
                 knowledge embedded in large corpus of static documents.
                 However, as knowledge in collaboration platforms
                 changes dynamically, the traditional macro-perspective
                 is insufficient for tracking the evolution of knowledge
                 and expertise. Hence, Expertise Profiling is presented
                 with major challenges in the context of dynamic and
                 evolving knowledge. In our previous study, we proposed
                 a comprehensive, domain-independent model for expertise
                 profiling in the context of evolving knowledge. In this
                 paper, we incorporate Language Modeling into our
                 methodology to enhance the accuracy of resulting
                 profiles. Evaluation results indicate a significant
                 improvement in the accuracy of profiles generated by
                 this approach. In addition, we present our profile
                 visualization tool, Profile Explorer, which serves as a
                 paradigm for exploring and analyzing time-dependent
                 expertise profiles in knowledge-bases where content
                 evolves overtime. Profile Explorer facilitates
                 comparative analysis of evolving expertise, independent
                 of the domain and the methodology used in creating
                 profiles.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Han:2013:MEO,
  author =       "Qing Han",
  title =        "Managing Emergencies Optimally Using a Random Neural
                 Network-Based Algorithm",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "515--534",
  day =          "16",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040515",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/515",
  abstract =     "Emergency rescues require that first responders
                 provide support to evacuate injured and other civilians
                 who are obstructed by the hazards. In this case, the
                 emergency personnel can take actions strategically in
                 order to rescue people maximally, efficiently and
                 quickly. The paper studies the effectiveness of a
                 random neural network (RNN)-based task assignment
                 algorithm involving optimally matching emergency
                 personnel and injured civilians, so that the emergency
                 personnel can aid trapped people to move towards
                 evacuation exits in real-time. The evaluations are run
                 on a decision support evacuation system using the
                 Distributed Building Evacuation Simulator (DBES)
                 multi-agent platform in various emergency scenarios.
                 The simulation results indicate that the RNN-based task
                 assignment algorithm provides a near-optimal solution
                 to resource allocation problems, which avoids resource
                 wastage and improves the efficiency of the emergency
                 rescue process.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Huang:2013:SSV,
  author =       "Jun Steed Huang and Oliver Yang and Funmilyo Lawal",
  title =        "Sending Safety Video over {WiMAX} in Vehicle
                 Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "535--567",
  day =          "31",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040535",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/535",
  abstract =     "This paper reports on the design of an OPNET
                 simulation platform to test the performance of sending
                 real-time safety video over VANET (Vehicular Adhoc
                 NETwork) using the WiMAX technology. To provide a more
                 realistic environment for streaming real-time video, a
                 video model was created based on the study of video
                 traffic traces captured from a realistic vehicular
                 camera, and different design considerations were taken
                 into account. A practical controller over real-time
                 streaming protocol is implemented to control data
                 traffic congestion for future road safety development.
                 Our driving video model was then integrated with the
                 WiMAX OPNET model along with a mobility model based on
                 real road maps. Using this simulation platform,
                 different mobility cases have been studied and the
                 performance evaluated in terms of end-to-end delay,
                 jitter and visual experience.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Jang:2013:CIS,
  author =       "S. Mo Jang and Yong Jin Park",
  title =        "The Citizen as Issue Specialists in a Changing Media
                 Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "568--579",
  day =          "13",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040568",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/568",
  abstract =     "Although recent research suggests that the selective
                 nature of new media helps foster issue specialists,
                 little empirical evidence has been documented, mostly
                 due to theoretical and methodological limitations.
                 Extending the concept of issue publics, the present
                 study proposes a method to estimate the degree to which
                 an individual is a specialist- or a generalist-type
                 citizen. Applying the method to the 2008 American
                 National Election Studies data, the study reveals
                 various characteristics of specialists and generalists.
                 The results indicate that specialist-type citizens are
                 positively associated with online news use, but
                 negatively associated with conventional news media,
                 such as television, newspaper, and radio. The
                 implications of the growth of specialists as well as
                 the validity of the proposed method are discussed.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Graham:2013:ISI,
  author =       "Roderick Graham",
  title =        "Introduction to the Special Issue on Inequality in the
                 Digital Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "580--584",
  day =          "26",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040580",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/580",
  abstract =     "The purpose of this special issue is to explore social
                 inequalities in the digital environment. The motivation
                 for this issue is derived from the disproportionate
                 focus on technological and economic aspects of the
                 Information Society to the detriment of sociological
                 and cultural aspects. The research presented here falls
                 along three dimensions of inequality. Two papers
                 explore the ways that race orders interaction online. A
                 second pair of papers explores the experiences of
                 technology users with physical and mental disabilities.
                 A final paper looks at gender, and the higher rates of
                 intimate partner violence experienced by women online.
                 Taken as a whole, these five papers highlight some of
                 the ways that the digital environment can reproduce or
                 mitigate inequalities that have been molded and
                 routinized in the physical environment.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Pileggi:2013:ASG,
  author =       "Salvatore F. Pileggi and Robert Amor",
  title =        "Addressing Semantic Geographic Information Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "585--590",
  day =          "26",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040585",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/585",
  abstract =     "The progressive consolidation of information
                 technologies on a large scale has been facilitating and
                 progressively increasing the production, collection,
                 and diffusion of geographic data, as well as
                 facilitating the integration of a large amount of
                 external information into geographic information
                 systems (GIS). Traditional GIS is transforming into a
                 consolidated information infrastructure. This
                 consolidated infrastructure is affecting more and more
                 aspects of internet computing and services. Most
                 popular systems (such as social networks, GPS, and
                 decision support systems) involve complex GIS and
                 significant amounts of information. As a web service,
                 GIS is affected by exactly the same problems that
                 affect the web as a whole. Therefore, next generation
                 GIS solutions have to address further methodological
                 and data engineering challenges in order to accommodate
                 new applications' extended requirements (in terms of
                 scale, interoperability, and complexity). The
                 conceptual and semantic modeling of GIS, as well as the
                 integration of semantics into current GIS, provide
                 highly expressive environments that are capable of
                 meeting the needs and requirements of a wide range of
                 applications.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Semantic Geographic Information System
                 (Semantic GIS).",
}

@Article{Jeong:2013:FAA,
  author =       "Sooman Jeong and Kisung Lee and Jungwoo Hwang and
                 Seongjin Lee and Youjip Won",
  title =        "Framework for Analyzing {Android} {I/O} Stack
                 Behavior: From Generating the Workload to Analyzing the
                 Trace",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "591--610",
  day =          "13",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040591",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/591",
  abstract =     "Abstract: The existing I/O workload generators and
                 trace capturing tools are not adaptable to generating
                 nor capturing the I/O requests of Android apps. The
                 Android platform needs proper tools to capture and
                 replay real world workload in the Android platform to
                 verify the result of benchmark tools. This paper
                 introduces Android Storage Performance Analysis Tool,
                 AndroStep, which is specifically designed for
                 characterizing and analyzing the behavior of the I/O
                 subsystem in Android based devices. The AndroStep
                 consists of Mobibench (workload generator), MOST
                 (Mobile Storage Analyzer), and Mobigen (workload
                 replayer). Mobibench is an Android app that generates a
                 filesystem as well as SQLite database operations.
                 Mobibench can also vary the number of concurrent
                 threads to examining the filesystem scalability to
                 support concurrency, e.g., metadata updates, journal
                 file creation/deletion. MOST captures the trace and
                 extracts key filesystem access characteristics such as
                 access pattern with respect to file types, ratio
                 between random vs. sequential access, ratio between
                 buffered vs. synchronous I/O, fraction of metadata
                 accesses, etc. MOST implements reverse mapping feature
                 (finding an inode for a given block) and retrospective
                 reverse mapping (finding an inode for a deleted file).
                 Mobigen is a trace capturing and replaying tool that is
                 specifically designed to perform the user experiment
                 without actual human intervention. Mobigen records the
                 system calls generated from the user behavior and
                 sanitizes the trace for replayable form. Mobigen can
                 replay this trace on different Android platforms or
                 with different I/O stack configurations. As an example
                 of using AndroStep, we analyzed the performances of
                 twelve Android smartphones and the SQLite performances
                 on five different filesystems. AndroStep makes
                 otherwise time consuming I/O stack analysis extremely
                 versatile. AndroStep makes a significant contribution
                 in terms of shedding light on internal behavior of the
                 Android I/O stack.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Mobile Engineering.",
}

@Article{Wan:2013:LEC,
  author =       "Liangtian Wan and Lutao Liu and Guangjie Han and Joel
                 J. P. C. Rodrigues",
  title =        "A Low Energy Consumption {DOA} Estimation Approach for
                 Conformal Array in Ultra-Wideband",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "611--630",
  day =          "16",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040611",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/611",
  abstract =     "Most direction-of-arrival (DOA) estimation approaches
                 for conformal array suffer from high computational
                 complexity, which cause high energy loss for the
                 direction finding system. Thus, a low energy
                 consumption DOA estimation algorithm for conformal
                 array antenna is proposed in this paper. The arbitrary
                 baseline direction finding algorithm is extended to
                 estimate DOA for a conformal array in ultra-wideband.
                 The rotation comparison method is adopted to solve the
                 ambiguity of direction finding. The virtual baseline
                 approach is used to construct the virtual elements.
                 Theoretically, the virtual elements can be extended in
                 the space flexibility. Four elements (both actual and
                 virtual elements) can be used to obtain a group of
                 solutions. The space angle estimation can be obtained
                 by using sub-array divided technique and matrix
                 inversion method. The stability of the proposed
                 algorithm can be guaranteed by averaging the angles
                 obtained by different sub-arrays. Finally, the
                 simulation results verify the effectiveness of the
                 proposed method with high DOA estimation accuracy and
                 relatively low computational complexity.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Green Communications and Networking.",
}

@Article{Hermann:2014:CIP,
  author =       "Steffen Hermann and Benjamin Fabian",
  title =        "A Comparison of {Internet} Protocol {(IPv6)} Security
                 Guidelines",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "1--60",
  day =          "10",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010001",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/1",
  abstract =     "The next generation of the Internet Protocol (IPv6) is
                 currently about to be introduced in many organizations.
                 However, its security features are still a very novel
                 area of expertise for many practitioners. This study
                 evaluates guidelines for secure deployment of IPv6,
                 published by the U.S. NIST and the German federal
                 agency BSI, for topicality, completeness and depth. The
                 later two are scores defined in this paper and are
                 based on the Requests for Comments relevant for IPv6
                 that were categorized, weighted and ranked for
                 importance using an expert survey. Both guides turn out
                 to be of practical value, but have a specific focus and
                 are directed towards different audiences. Moreover,
                 recommendations for possible improvements are
                 presented. Our results could also support strategic
                 management decisions on security priorities as well as
                 for the choice of security guidelines for IPv6
                 roll-outs.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Branchi:2014:AMS,
  author =       "Pablo E. Branchi and Carlos Fern{\'a}ndez-Valdivielso
                 and Ignacio R. Matias",
  title =        "Analysis Matrix for Smart Cities",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "61--75",
  day =          "22",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010061",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/61",
  abstract =     "The current digital revolution has ignited the
                 evolution of communications grids and the development
                 of new schemes for productive systems. Traditional
                 technologic scenarios have been challenged, and Smart
                 Cities have become the basis for urban competitiveness.
                 The citizen is the one who has the power to set new
                 scenarios, and that is why a definition of the way
                 people interact with their cities is needed, as is
                 commented in the first part of the article. At the same
                 time, a lack of clarity has been detected in the way of
                 describing what Smart Cities are, and the second part
                 will try to set the basis for that. For all before, the
                 information and communication technologies that manage
                 and transform 21st century cities must be reviewed,
                 analyzing their impact on new social behaviors that
                 shape the spaces and means of communication, as is
                 posed in the experimental section, setting the basis
                 for an analysis matrix to score the different elements
                 that affect a Smart City environment. So, as the better
                 way to evaluate what a Smart City is, there is a need
                 for a tool to score the different technologies on the
                 basis of their usefulness and consequences, considering
                 the impact of each application. For all of that, the
                 final section describes the main objective of this
                 article in practical scenarios, considering how the
                 technologies are used by citizens, who must be the main
                 concern of all urban development.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Neis:2014:RDF,
  author =       "Pascal Neis and Dennis Zielstra",
  title =        "Recent Developments and Future Trends in Volunteered
                 Geographic Information Research: The Case of
                 {OpenStreetMap}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "76--106",
  day =          "27",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010076",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/76",
  abstract =     "User-generated content (UGC) platforms on the Internet
                 have experienced a steep increase in data contributions
                 in recent years. The ubiquitous usage of
                 location-enabled devices, such as smartphones, allows
                 contributors to share their geographic information on a
                 number of selected online portals. The collected
                 information is oftentimes referred to as volunteered
                 geographic information (VGI). One of the most utilized,
                 analyzed and cited VGI-platforms, with an increasing
                 popularity over the past few years, is OpenStreetMap
                 (OSM), whose main goal it is to create a freely
                 available geographic database of the world. This paper
                 presents a comprehensive overview of the latest
                 developments in VGI research, focusing on its
                 collaboratively collected geodata and corresponding
                 contributor patterns. Additionally, trends in the realm
                 of OSM research are discussed, highlighting which
                 aspects need to be investigated more closely in the
                 near future.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Office:2014:ARF,
  author =       "Future Internet Editorial Office",
  title =        "Acknowledgement to Reviewers of Future {Internet} in
                 2013",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "107--108",
  day =          "24",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010107",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/107",
  abstract =     "The term ``crowdsourcing'' was initially introduced by
                 Howe in his article ``The Rise of Crowdsourcing'' [1].
                 During the last few years, crowdsourcing has become
                 popular among companies, institutions and universities,
                 as a crowd-centered modern ``tool'' for problem
                 solving. Crowdsourcing is mainly based on the idea of
                 an open-call publication of a problem, requesting the
                 response of the crowd for reaching the most appropriate
                 solution. The focus of this paper is on the role of
                 crowdsourcing in knowledge acquisition for planning
                 applications. The first part provides an introduction
                 to the origins of crowdsourcing in knowledge
                 generation. The second part elaborates on the concept
                 of crowdsourcing, while some indicative platforms
                 supporting the development of crowdsourcing
                 applications are also described. The third part focuses
                 on the integration of crowdsourcing with certain web
                 technologies and GIS (Geographic Information Systems),
                 for spatial planning applications, while in the fourth
                 part, a general framework of the rationale behind
                 crowdsourcing applications is presented. Finally, the
                 fifth part focuses on a range of case studies that
                 adopted several crowdsourcing techniques.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
}

@Article{Papadopoulou:2014:CTK,
  author =       "Chrysaida-Aliki Papadopoulou and Maria Giaoutzi",
  title =        "Crowdsourcing as a Tool for Knowledge Acquisition in
                 Spatial Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "109--125",
  day =          "05",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010109",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/109",
  abstract =     "The term ``crowdsourcing'' was initially introduced by
                 Howe in his article ``The Rise of Crowdsourcing'' [1].
                 During the last few years, crowdsourcing has become
                 popular among companies, institutions and universities,
                 as a crowd-centered modern ``tool'' for problem
                 solving. Crowdsourcing is mainly based on the idea of
                 an open-call publication of a problem, requesting the
                 response of the crowd for reaching the most appropriate
                 solution. The focus of this paper is on the role of
                 crowdsourcing in knowledge acquisition for planning
                 applications. The first part provides an introduction
                 to the origins of crowdsourcing in knowledge
                 generation. The second part elaborates on the concept
                 of crowdsourcing, while some indicative platforms
                 supporting the development of crowdsourcing
                 applications are also described. The third part focuses
                 on the integration of crowdsourcing with certain web
                 technologies and GIS (Geographic Information Systems),
                 for spatial planning applications, while in the fourth
                 part, a general framework of the rationale behind
                 crowdsourcing applications is presented. Finally, the
                 fifth part focuses on a range of case studies that
                 adopted several crowdsourcing techniques.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Trinugroho:2014:IIP,
  author =       "Yohanes Baptista Dafferianto Trinugroho",
  title =        "Information Integration Platform for Patient-Centric
                 Healthcare Services: Design, Prototype and
                 Dependability Aspects",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "126--154",
  day =          "06",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010126",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/126",
  abstract =     "Technology innovations have pushed today's healthcare
                 sector to an unprecedented new level. Various portable
                 and wearable medical and fitness devices are being sold
                 in the consumer market to provide the self-empowerment
                 of a healthier lifestyle to society. Many vendors
                 provide additional cloud-based services for devices
                 they manufacture, enabling the users to visualize,
                 store and share the gathered information through the
                 Internet. However, most of these services are
                 integrated with the devices in a closed ``silo''
                 manner, where the devices can only be used with the
                 provided services. To tackle this issue, an information
                 integration platform (IIP) has been developed to
                 support communications between devices and
                 Internet-based services in an event-driven fashion by
                 adopting service-oriented architecture (SOA) principles
                 and a publish/subscribe messaging pattern. It follows
                 the ``Internet of Things'' (IoT) idea of connecting
                 everyday objects to various networks and to enable the
                 dissemination of the gathered information to the global
                 information space through the Internet. A
                 patient-centric healthcare service environment is
                 chosen as the target scenario for the deployment of the
                 platform, as this is a domain where IoT can have a
                 direct positive impact on quality of life enhancement.
                 This paper describes the developed platform, with
                 emphasis on dependability aspects, including
                 availability, scalability and security.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Toward people aware IoT.",
}

@Article{Lan:2014:NDE,
  author =       "Xiaoyu Lan and Liangtian Wan and Guangjie Han and Joel
                 J. P. C. Rodrigues",
  title =        "A Novel {DOA} Estimation Algorithm Using Array
                 Rotation Technique",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",