Skip to content

Advertisement

Articles

Page 1 of 4

  1. Content type: Research

    Decades went by since Mark Weiser published his influential work on the computer of the 21st century. Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industr...

    Authors: Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu and Jie Liu

    Citation: Journal of Internet Services and Applications 2018 9:24

    Published on:

  2. Content type: Research

    The imbalance between the quantity of supply and demand in public transport systems causes a series of disruptions in large metropolises. While extremely crowded vehicles are uncomfortable for passengers, virt...

    Authors: Carlos Caminha, Vasco Furtado, Vládia Pinheiro and Caio Ponte

    Citation: Journal of Internet Services and Applications 2018 9:22

    Published on:

  3. Content type: Research

    Online social networks are major hubs of communications that are used to share information by societies worldwide. However, the ability to freely communicate on these platforms is increasingly restricted in co...

    Authors: Michael Nekrasov, Danny Iland, Miriam Metzger, Lisa Parks and Elizabeth Belding

    Citation: Journal of Internet Services and Applications 2018 9:21

    Published on:

  4. Content type: Research

    The identification of power groups that act within the political structure is a tool for citizens and also a challenging research topic as an unstable and complex force of interests system. This paper presents...

    Authors: Letícia Verona, Jonice Oliveira, José Vitor da Cunha Hisse and Maria Luiza Machado Campos

    Citation: Journal of Internet Services and Applications 2018 9:23

    Published on:

  5. Content type: Research

    Tie strength allows to classify social relationships and identify different types of them. For instance, social relationships can be classified as persistent and similar based respectively on the regularity wi...

    Authors: Jeancarlo C. Leão, Michele A. Brandão, Pedro O. S. Vaz de Melo and Alberto H. F. Laender

    Citation: Journal of Internet Services and Applications 2018 9:20

    Published on:

  6. Content type: Research

    Although major advances have been made in protection of cloud platforms against malicious attacks, little has been done regarding the protection of these platforms against insider threats. This paper looks int...

    Authors: Carlos Eduardo Da Silva, Thomás Diniz, Nelio Cacho and Rogério de Lemos

    Citation: Journal of Internet Services and Applications 2018 9:19

    Published on:

  7. Content type: Research

    This paper proposes an analysis of political homophily among Twitter users during the 2016 American Presidential Election. We collected 4.9 million tweets of 18,450 users and their contact network from August ...

    Authors: Josemar A. Caetano, Hélder S. Lima, Mateus F. Santos and Humberto T. Marques-Neto

    Citation: Journal of Internet Services and Applications 2018 9:18

    Published on:

  8. Content type: Research

    This article examines organization and governance of commercially influenced Open Source Software development communities by presenting a multiple-case study of six contemporary, hybrid OSS projects. The findi...

    Authors: Hanna Mäenpää, Simo Mäkinen, Terhi Kilamo, Tommi Mikkonen, Tomi Männistö and Paavo Ritala

    Citation: Journal of Internet Services and Applications 2018 9:17

    Published on:

  9. Content type: Research

    Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling the exchang...

    Authors: Karima Velasquez, David Perez Abreu, Marcio R. M. Assis, Carlos Senna, Diego F. Aranha, Luiz F. Bittencourt, Nuno Laranjeiro, Marilia Curado, Marco Vieira, Edmundo Monteiro and Edmundo Madeira

    Citation: Journal of Internet Services and Applications 2018 9:14

    Published on:

  10. Content type: Research

    The weaknesses of the Internet led to the creation of a new network paradigm – network virtualization. Virtualization is a very successful technique for sharing and reusing resources, which results in higher e...

    Authors: Vianney Kengne Tchendji, Yannick Florian Yankam and Jean Frédéric Myoupo

    Citation: Journal of Internet Services and Applications 2018 9:13

    Published on:

  11. Content type: Research

    Machine Learning (ML) has been enjoying an unprecedented surge in applications that solve problems and enable automation in diverse domains. Primarily, this is due to the explosion in the availability of data,...

    Authors: Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano and Oscar M. Caicedo

    Citation: Journal of Internet Services and Applications 2018 9:16

    Published on:

  12. Content type: Research

    Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distribut...

    Authors: Edmilson P. da Costa Júnior, Carlos Eduardo da Silva, Marcos Pinheiro and Silvio Sampaio

    Citation: Journal of Internet Services and Applications 2018 9:12

    Published on:

  13. Content type: Research

    The Debian project is one of the largest free software undertakings worldwide. It is geographically distributed, and participation in the project is done on a voluntary basis, without a single formal employee ...

    Authors: Gunnar Wolf and Víctor González Quiroga

    Citation: Journal of Internet Services and Applications 2018 9:11

    Published on:

  14. Content type: Research

    In this paper, we study the “Session Reconstruction” problem which is the reconstruction of user interactions from recorded request/response logs of a session. The reconstruction is especially useful when the ...

    Authors: Salman Hooshmand, Gregor V. Bochmann, Guy-Vincent Jourdan, Russell Couturier and Iosif-Viorel Onut

    Citation: Journal of Internet Services and Applications 2018 9:9

    Published on:

  15. Content type: Editorial

    The Internet of Services and Things is characterized as a distributed computing environment that will be populated by a large number of software services and things. Within this context, software systems will ...

    Authors: Marco Autili, Dimitra Giannakopoulou and Massimo Tivoli

    Citation: Journal of Internet Services and Applications 2018 9:10

    Published on:

  16. Content type: Research

    The use of cloud computing has become common due to advantages such as low cost and sizing of computing resources according to demand. However, it also raises security and privacy concerns, because critical da...

    Authors: Leandro V. Silva, Pedro Barbosa, Rodolfo Marinho and Andrey Brito

    Citation: Journal of Internet Services and Applications 2018 9:6

    Published on:

  17. Content type: Research

    This paper describes EZ-AG, a structure-free protocol for duplicate insensitive data aggregation in MANETs. The key idea in EZ-AG is to introduce a token that performs a self-repelling random walk in the netwo...

    Authors: V. Kulathumani, M. Nakagawa and A. Arora

    Citation: Journal of Internet Services and Applications 2018 9:5

    Published on:

  18. Content type: Research

    There are several educational resources distributed in different repositories that address to a wide range of subjects and different educational goals. The proper choice of these educational resources is a cha...

    Authors: Crystiam Kelle Pereira, Fernanda Campos, Victor Ströele, José Maria N. David and Regina Braga

    Citation: Journal of Internet Services and Applications 2018 9:7

    Published on:

  19. Content type: Research

    Foundations function as a vital institutional support infrastructure for many of the most successful open-source projects, but the different roles played by these support entities are understudied in Free/Libr...

    Authors: Juho Lindman and Imed Hammouda

    Citation: Journal of Internet Services and Applications 2018 9:8

    Published on:

  20. Content type: Research

    IP lookup is a core operation in packet forwarding, which is implemented using a Longest Prefix Matching (LPM) algorithm to find the next hop for an input address. This work proposes and evaluates the use of p...

    Authors: Alexandre Lucchesi, André C. Drummond and George Teodoro

    Citation: Journal of Internet Services and Applications 2018 9:3

    Published on:

  21. Content type: Research

    The literature regarding attacks in Networked Control Systems (NCS) indicates that covert and accurate attacks must be designed based on an accurate knowledge about the model of the attacked system. In this co...

    Authors: Alan O. de Sá, Luiz F. R. da Costa Carmo and Raphael C. S. Machado

    Citation: Journal of Internet Services and Applications 2018 9:2

    Published on:

  22. Content type: Research

    Connecting multiple and heterogeneous hardware devices to solve problems raises some challenges, especially in terms of interoperability and communications management. A distributed solution may offer many adv...

    Authors: Thiago W. B. Silva, Daniel C. Morais, Halamo G. R. Andrade, Antonio M. N. Lima, Elmar U. K. Melcher and Alisson V. Brito

    Citation: Journal of Internet Services and Applications 2018 9:4

    Published on:

  23. Content type: Research

    Cloud computing is a ubiquitous paradigm responsible for a fundamental change in the way distributed computing is performed. The possibility to outsource the installation, maintenance and scalability of server...

    Authors: Pedro G. M. R. Alves and Diego F. Aranha

    Citation: Journal of Internet Services and Applications 2018 9:1

    Published on:

  24. Content type: Research

    Conceptually, tuple spaces are shared memory objects that provide operations to store and retrieve ordered sets of data, called tuples. Tuples stored in a tuple space are accessed by the contents of their fiel...

    Authors: Edson Floriano, Eduardo Alchieri, Diego F. Aranha and Priscila Solis

    Citation: Journal of Internet Services and Applications 2017 8:19

    Published on:

  25. Content type: Research

    The fifth generation (5G) cellular infrastructure is envisaged as a dense and heterogeneous deployment of small cells overlapping with existing macrocells in the Radio Access Network (RAN). Densification and h...

    Authors: Marcelo A. Marotta, Maicon Kist, Juliano A. Wickboldt, Lisandro Z. Granville, Juergen Rochol and Cristiano B. Both

    Citation: Journal of Internet Services and Applications 2017 8:18

    Published on:

  26. Content type: Research

    A smart environment is equipped with numerous devices (i.e., sensors, actuators) that are possibly distributed over different locations (e.g., rooms of a smart building). These devices are automatically contro...

    Authors: Adja Ndeye Sylla, Maxime Louvel and Eric Rutten

    Citation: Journal of Internet Services and Applications 2017 8:16

    Published on:

  27. Content type: Research

    Online discussion in form of written comments is a core component of many social media platforms. It has attracted increasing attention from academia, mainly because theories from social sciences can be explor...

    Authors: Pablo Aragón, Vicenç Gómez, David García and Andreas Kaltenbrunner

    Citation: Journal of Internet Services and Applications 2017 8:15

    Published on:

  28. Content type: Research

    Internet of Things technologies and applications are evolving and continuously gaining traction in all fields and environments, including homes, cities, services, industry and commercial enterprises. However, ...

    Authors: Marco Brambilla, Eric Umuhoza and Roberto Acerbis

    Citation: Journal of Internet Services and Applications 2017 8:14

    Published on:

  29. Content type: Research

    The majority of fatal car crashes are caused by reckless driving. With the sophistication of vehicle instrumentation, reckless maneuvers, such as abrupt turns, acceleration, and deceleration, can now be accura...

    Authors: Igor Vasconcelos, Rafael Oliveira Vasconcelos, Bruno Olivieri, Marcos Roriz, Markus Endler and Methanias Colaço Junior

    Citation: Journal of Internet Services and Applications 2017 8:13

    Published on:

  30. Content type: Research

    Release management in large-scale software development projects requires significant communication and coordination. It is particularly challenging in Free and Open Source Software (FOSS) ecosystems, in which ...

    Authors: Germán Poo-Caamaño, Eric Knauss, Leif Singer and Daniel M. German

    Citation: Journal of Internet Services and Applications 2017 8:12

    Published on:

  31. Content type: Research

    The license adopted by an open source software is associated with its success in terms of attractiveness and maintenance of an active ecosystem of users, bug reporters, developers, and sponsors because what ca...

    Authors: Carlos Denner dos Santos Jr

    Citation: Journal of Internet Services and Applications 2017 8:11

    Published on:

  32. Content type: Research

    The tremendous increase in global industrial activity has resulted in high utilization of natural energy resources and increase in global warming over the last few decades. Meanwhile, computing has become a po...

    Authors: Junaid Shuja, Raja Wasim Ahmad, Abdullah Gani, Abdelmuttlib Ibrahim Abdalla Ahmed, Aisha Siddiqa, Kashif Nisar, Samee U. Khan and Albert Y. Zomaya

    Citation: Journal of Internet Services and Applications 2017 8:9

    Published on:

  33. Content type: Research

    Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process that applicants need to go through to apply for cybe...

    Authors: Daniel Woods, Ioannis Agrafiotis, Jason R. C. Nurse and Sadie Creese

    Citation: Journal of Internet Services and Applications 2017 8:8

    Published on:

  34. Content type: Research

    In the last decade, many approaches to automated service composition have been proposed. However, most of them do not fully exploit the opportunities offered by the Internet of Services (IoS). In this article,...

    Authors: Antonio Bucchiarone, Annapaola Marconi, Marco Pistore and Heorhi Raik

    Citation: Journal of Internet Services and Applications 2017 8:6

    Published on:

  35. Content type: Research

    Concurrent programming puts demands on software debugging and testing, as concurrent software may exhibit problems not present in sequential software, e.g., deadlocks and race conditions. In aiming to increase...

    Authors: Sara Abbaspour Asadollah, Daniel Sundmark, Sigrid Eldh and Hans Hansson

    Citation: Journal of Internet Services and Applications 2017 8:4

    Published on:

  36. Content type: Research

    Existing Web session tracking techniques mainly work on huge web server log files, which limit their dynamicity and capability. We present a collaborative method for session tracking to identify direct and ind...

    Authors: Hassan Artail, Ammar El Halabi, Ali Hachem and Louay Al-Akhrass

    Citation: Journal of Internet Services and Applications 2017 8:2

    Published on:

  37. Content type: Research

    In recent years, the hegemony of traditional relational database management systems (RDBMSs) has declined in favour of non-relational databases (NoSQL). These database technologies are better adapted to meet t...

    Authors: Vincent Reniers, Ansar Rafique, Dimitri Van Landuyt and Wouter Joosen

    Citation: Journal of Internet Services and Applications 2017 8:1

    Published on:

  38. Content type: Research

    Unreliable failure detectors are a basic building block of reliable distributed systems. Failure detectors are used to monitor processes of any application and provide process state information. This work pres...

    Authors: Rogério C. Turchetti, Elias P. Duarte Jr., Luciana Arantes and Pierre Sens

    Citation: Journal of Internet Services and Applications 2016 7:9

    Published on:

  39. Content type: Research

    While many systems have to provide 24 × 7 services with no acceptable downtime, they have to be able to cope with changes in their execution environment and in the requirements that they must comply, in which ...

    Authors: Rafael Oliveira Vasconcelos, Igor Vasconcelos and Markus Endler

    Citation: Journal of Internet Services and Applications 2016 7:8

    Published on:

  40. Content type: Research

    Recent Big Data research typically emphasizes on the need to address the challenges stemming from the volume, velocity, variety and veracity aspects. However, another cross-cutting property of Big Data is vola...

    Authors: Efthymia Tsamoura, Anastasios Gounaris and Yannis Manolopoulos

    Citation: Journal of Internet Services and Applications 2016 7:7

    Published on:

  41. Content type: Research

    Features such as elasticity, scalability, universal access, low entry cost, and flexible billing motivate consumers to migrate their core businesses to the cloud. However, in doing so there are challenges abou...

    Authors: Dereje Yimam and Eduardo B. Fernandez

    Citation: Journal of Internet Services and Applications 2016 7:5

    Published on:

  42. Content type: Research

    Wireless communication plays a critical role in determining the lifetime of Internet-of-Things (IoT) systems. Data aggregation approaches have been widely used to enhance the performance of IoT applications. S...

    Authors: Gowri Sankar Ramachandran, José Proença, Wilfried Daniels, Mario Pickavet, Dimitri Staessens, Christophe Huygens, Wouter Joosen and Danny Hughes

    Citation: Journal of Internet Services and Applications 2016 7:4

    Published on:

  43. Content type: Editorial

    During the last few years, there has been a growing interest around the development of new ideas envisioning the opportunities of combining Internet and Services. The “Future Internet” (FI) concept has been in...

    Authors: Marco Autili, Massimo Tivoli and Alfredo Goldman

    Citation: Journal of Internet Services and Applications 2016 7:3

    Published on:

2017 Journal Metrics

  • Speed
    72 days from submission to first decision
    227 days from submission to acceptance
    19 days from acceptance to publication

    Citation Impact
    1.963 - Source Normalized Impact per Paper (SNIP)
    0.401 - SCImago Journal Rank (SJR)
    3.25 - CiteScore

    Usage 
    144,973 downloads

    Social Media Impact
    200 mentions

  • This journal is indexed by

    • Scopus
    • Emerging Sources Citation Index
    • EI-Compendex
    • Summon by ProQuest
    • SCImago
    • EBSCO Discovery Dervice
    • Academic OneFile
    • OCLC
    • Summon by ProQuest
    • INSPEC
    • DOAJ
    • DBLP
    • Google Scholar

Latest Tweets

Associated Societies

The Journal of Internet Services and Applications is an international journal sponsored by:

Brazilian Internet Steering Committee


National Computer Network Lab


Brazilian Computer Society.


Advertisement