


default search action
Future Internet, Volume 10
Volume 10, Number 1, January 2018
- Rezvan Almas Shehni, Karim Faez
, Farshad Eshghi
, Manoochehr Kelarestaghi
:
A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs. 1 - Zhibin Zhou
, Pin Liu, Qin Liu, Guojun Wang:
An Anonymous Offline RFID Grouping-Proof Protocol. 2 - Marko Höyhtyä, Olli Apilo
, Mika Lasanen:
Review of Latest Advances in 3GPP Standardization: D2D Communication in 5G Systems and Its Energy Consumption Models. 3 - Riccardo Pecori
:
A Virtual Learning Architecture Enhanced by Fog Computing and Big Data Streams. 4 - Nazia Anwar, Huifang Deng:
Elastic Scheduling of Scientific Workflows under Deadline Constraints in Cloud Computing Environments. 5 - Wenjuan Li
, Weizhi Meng
, Lam For Kwok
:
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. 6 - Suzana Brown
, Alan Rolf Mickelson
:
A Decision Framework for Choosing Telecommunication Technologies in Limited-Resource Settings. 8 - Asmae Ait Mansour
, Nourddine Enneya, Mohamed Ouadou:
A Velocity-Aware Handover Trigger in Two-Tier Heterogeneous Networks. 9 - Boon-Chong Seet
, Syed Faraz Hasan
, Peter Han Joo Chong:
Recent Advances on Cellular D2D Communications. 10
Volume 10, Number 2, February 2018
- Dino Giuli:
Announcing the 2018 Future Internet Travel Award for PhD Students. 11 - Jingbo Zhang
, Zhenyang Sun, Shufang Zhang:
The Improved Adaptive Silence Period Algorithm over Time-Variant Channels in the Cognitive Radio System. 12 - Pierpaolo Loreti
, Lorenzo Bracciale
, Alberto Caponi:
Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications. 13 - Irshad Ahmed Abbasi
, Adnan Shahid Khan
:
A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment. 14 - Giovanni Pau
, Tiziana Campisi
, Antonino Canale
, Alessandro Severino
, Mario Collotta
, Giovanni Tesoriere
:
Smart Pedestrian Crossing Management at Traffic Light Junctions through a Fuzzy-Based Approach. 15 - Muhammad Salman Pathan
, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon
, Muhammad Iftikhar Hussain
:
An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs. 16 - Blerim Rexha
, Gresa Shala, Valon Xhafa:
Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks. 17 - Georgios Kambourakis
, Félix Gómez Mármol, Guojun Wang:
Security and Privacy in Wireless and Mobile Networks. 18 - Ådne Stenberg Vik, Bjørn Christian Nørbech, Debora Jeske
:
Virtual Career Fairs: Perspectives from Norwegian Recruiters and Exhibitors. 19 - Valentina Gatteschi
, Fabrizio Lamberti
, Claudio Giovanni Demartini, Chiara Pranteda, Victor Santamaria:
Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough? 20 - Robotics Construction Kits: From "Objects to Think with" to "Objects to Think and to Emote with". 21
Volume 10, Number 3, March 2018
- Ewerton Lopes Silva de Oliveira
, Davide Orrù, Luca Morreale
, Tiago P. Nascimento
, Andrea Bonarini
:
Learning and Mining Player Motion Profiles in Physically Interactive Robogames. 22 - Sufian Hameed
, Hassan Ahmed Khan:
SDN Based Collaborative Scheme for Mitigation of DDoS Attacks. 23 - Virginia Pilloni
:
How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0. 24 - Tehseen Ul Hassan
, Fei Gao, Babur Jalal
, Sheeraz Arif:
Interference Management in Femtocells by the Adaptive Network Sensing Power Control Technique. 25 - Yibin Ruan, Jiazhu Dai:
TwinNet: A Double Sub-Network Framework for Detecting Universal Adversarial Perturbations. 26 - Jani Suomalainen
, Kimmo Ahola
, Mikko Majanen, Olli Mämmelä, Pekka Ruuska:
Security Awareness in Software-Defined Multi-Domain 5G Networks. 27 - Dino Giuli:
Ecosystemic Evolution Fed by Smart Systems. 28 - Yu Wu, Jessica Kropczynski
, Raquel O. Prates, John M. Carroll
:
Understanding How GitHub Supports Curation Repositories. 29 - Bo Sun, Ming Wei, Senlai Zhu:
Optimal Design of Demand-Responsive Feeder Transit Services with Passengers' Multiple Time Windows and Satisfaction. 30 - Chia-Lin Chang
, Michael McAleer
, Yu-Chieh Wu:
A Statistical Analysis of Industrial Penetration and Internet Intensity in Taiwan. 31
Volume 10, Number 4, April 2018
- Hidenori Takasuka, Koichi Hirai, Kazumasa Takami
:
Development of a Social DTN for Message Communication between SNS Group Members. 32 - Cutifa Safitri
, Yoshihide Yamada, Sabariah Baharun, Shidrokh Goudarzi
, Quang Ngoc Nguyen
, Keping Yu
, Takuro Sato:
An Intelligent Content Prefix Classification Approach for Quality of Service Optimization in Information-Centric Networking. 33 - Rongheng Li, Jian Zhang, Wenfeng Shen:
Replicas Strategy and Cache Optimization of Video Surveillance Systems Based on Cloud Storage. 34 - Asmae Ait Mansour
, Nourddine Enneya, Mohamed Ouadou:
Enhanced Matching Game for Decoupled Uplink Downlink Context-Aware Handover. 35 - Luca Roffia
, Paolo Azzoni
, Cristiano Aguzzi
, Fabio Viola
, Francesco Antoniazzi
, Tullio Salmon Cinotti
:
Dynamic Linked Data: A SPARQL Event Processing Architecture. 36
Volume 10, Number 5, May 2018
- Nicola Lettieri
, Antonio Altamura, Rosalba Giugno
, Alfonso Guarino, Delfina Malandrino
, Alfredo Pulvirenti, Francesco Vicidomini, Rocco Zaccagnino
:
Ex Machina: Analytical platforms, Law and the Challenges of Computational Legal Science. 37 - Jingsha He, Jianan Wu
, Nafei Zhu, Muhammad Salman Pathan
:
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers. 38 - Seyed Davoud Mousavi, Rasool Sadeghi, Mohamadreza Karimi
, Erfan Karimian, Mohammadreza Soltanaghaei:
A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN. 39 - Baocheng Wang, Yafei Hu, Yu Xiao, Yi Li:
An EV Charging Scheduling Mechanism Based on Price Negotiation. 40 - Tamotsu Yashima, Kazumasa Takami:
Route Availability as a Communication Quality Metric of a Mobile Ad Hoc Network. 41 - Santiago Guerrero-Narváez, Miguel Angel Niño Zambrano
, Dalila-Jhoana Riobamba-Calvache, Gustavo-Adolfo Ramírez-González
:
Test Bed of Semantic Interaction of Smart Objects in the Web of Things. 42 - Xuan Dau Hoang
, Quynh Chi Nguyen:
Botnet Detection Based On Machine Learning Techniques Using DNS Query Data. 43
Volume 10, Number 6, June 2018
- Liang Zhou
, Shengming Jiang
, Chenlin Xiong:
Studying Semi-TCP and Its Application in Marine Internet. 44 - Chong Han
, Zilong Li, Jian Zhou, Lijuan Sun, Siyu Chen:
A Multiple Access Protocol Based on Gray Forecast for Satellite Network. 45 - Håkon Gunleifsen
, Vasileios Gkioulos, Thomas Kemmerich:
A Tiered Control Plane Model for Service Function Chaining Isolation. 46 - Il-Gu Lee:
Secure Inter-Frame Space Communications for Wireless LANs. 47 - Enrico Francesconi
:
On the Future of Legal Publishing Services in the Semantic Web. 48 - Hongbin Yang, Shuxiong Jiang
, Wenfeng Shen, Zhou Lei:
Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage. 49 - Mirko Duradoni
, Mario Paolucci
, Franco Bagnoli, Andrea Guazzini
:
Fairness and Trust in Virtual Environments: The Effects of Reputation. 50 - Lingli Yu
, Decheng Kong, Xiaoxin Yan:
A Driving Behavior Planning and Trajectory Generation Method for Autonomous Electric Bus. 51 - Lei Xie, Shengbo Chen, Wenfeng Shen, Huaikou Miao:
A Novel Self-Adaptive VM Consolidation Strategy Using Dynamic Multi-Thresholds in IaaS Clouds. 52 - Jiazhu Dai, Keke Qiao:
A Privacy Preserving Framework for Worker's Location in Spatial Crowdsourcing Based on Local Differential Privacy. 53 - Pin Wu
, Yang Yang
, Xiaoqiang Li
:
StegNet: Mega Image Steganography Capacity with Deep Convolutional Network. 54 - Andrea Guazzini
, Mirko Duradoni
, Alessandro Lazzeri
, Giorgio Gronchi
:
Simulating the Cost of Cooperation: A Recipe for Collaborative Problem-Solving. 55
Volume 10, Number 7, July 2018
- Kashif Sultan
, Hazrat Ali
, Zhongshan Zhang
:
Big Data Perspective and Challenges in Next Generation Networks. 56 - Gandhimathi Velusamy, Ricardo Lent
:
Dynamic Cost-Aware Routing of Web Requests. 57 - Dimitrios Dechouniotis
, Ioannis Dimolitsas, Konstantinos Papadakis-Vlachopapadopoulos, Symeon Papavassiliou
:
Fuzzy Multi-Criteria Based Trust Management in Heterogeneous Federated Future Internet Testbeds. 58 - Júlio César Medeiros Diniz
, Francesco Da Ros
, Darko Zibar
:
Clock Recovery Challenges in DSP-Based Coherent Single-Mode and Multi-Mode Optical Systems. 59 - Li Quan, Zhiliang Wang, Fuji Ren:
A Novel Two-Layered Reinforcement Learning for Task Offloading with Tradeoff between Physical Machine Utilization Rate and Delay. 60 - Bo Sun, Ming Wei, Chunfeng Yang, Zhihuo Xu, Han Wang:
Personalised and Coordinated Demand-Responsive Feeder Transit Service Design: A Genetic Algorithms Approach. 61 - Margherita Vestoso
:
The GDPR beyond Privacy: Data-Driven Challenges for Social Scientists, Legislators and Policy-Makers. 62 - Anil Kumar Karembai
, Jeffrey Thompson, Patrick Seeling
:
Towards Prediction of Immersive Virtual Reality Image Quality of Experience and Quality of Service. 63 - Dong Sun, Kaixin Zhao, Yaming Fang, Jie Cui
:
Dynamic Traffic Scheduling and Congestion Control across Data Centers Based on SDN. 64 - Chiara Lodovisi
, Pierpaolo Loreti
, Lorenzo Bracciale
, Silvello Betti:
Performance Analysis of Hybrid Optical-Acoustic AUV Swarms for Marine Monitoring. 65 - Sara Pizzi, Chiara Suraci, Leonardo Militano
, Antonino Orsino
, Antonella Molinaro
, Antonio Iera
, Giuseppe Araniti
:
Enabling Trustworthy Multicast Wireless Services through D2D Communications in 5G Networks. 66 - Guang-Qian Peng
, Guangtao Xue, Yi-Chao Chen:
Network Measurement and Performance Analysis at Server Side. 67
Volume 10, Number 8, August 2018
- Mahdi H. Miraz
, Maaruf Ali
, Peter S. Excell, Richard Picking:
Internet of Nano-Things, Things and Everything: Future Growth Trends. 68 - Jinyi Guo, Wei Ren
, Yi Ren, Tianqing Zhu:
A Watermark-Based In-Situ Access Control Model for Image Big Data. 69 - Lijun Zhang
, Kai Liu, Jian Liu:
Multidiscipline Integrated Platform Based on Probabilistic Analysis for Manufacturing Engineering Processes. 70 - Shardrom Johnson, Jinwu Han, Yuanchen Liu, Li Chen, Xinlin Wu:
Hybrid Approach with Improved Genetic Algorithm and Simulated Annealing for Thesis Sampling. 71 - Ludger Goeke, Nazila Gol Mohammadi
, Maritta Heisel:
Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach. 72 - Jianjun Lei, Jiarui Tao, Shanshan Yang:
Joint AP Association and Bandwidth Allocation Optimization Algorithm in High-Dense WLANs. 73 - Kanghuai Liu
, Zhigang Chen, Jia Wu
, Yutong Xiao
, Heng Zhang:
Predict and Forward: An Efficient Routing-Delivery Scheme Based on Node Profile in Opportunistic Networks. 74 - Jianqiang Liu
, Shuai Huo, Yi Wang:
A Hierarchical Mapping System for Flat Identifier to Locator Resolution Based on Active Degree. 75 - Marcio Andrey Teixeira
, Tara Salman
, Maede Zolanvari, Raj Jain
, Nader Meskin, Mohammed Samaka:
SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach. 76 - Yi-Ting Huang
, Sheng-Fang Su:
Motives for Instagram Use and Topics of Interest among Young Adults. 77 - Nisrine Ibadah
, Khalid Minaoui
, Mohammed Rziza
, Mohammed Oumsis
, César Benavente-Peces
:
Smart Collection of Real-Time Vehicular Mobility Traces. 78 - Chuanxiang Ren, Wenbo Zhang, Lingqiao Qin
, Bo Sun:
Queue Spillover Management in a Connected Vehicle Environment. 79 - Lei Zhang, Xiaoli Zhi:
A Fast and Lightweight Method with Feature Fusion and Multi-Context for Face Detection. 80 - Fabio Viola
, Luca Roffia
, Francesco Antoniazzi
, Alfredo D'Elia
, Cristiano Aguzzi
, Tullio Salmon Cinotti
:
Interactive 3D Exploration of RDF Graphs through Semantic Planes. 81
Volume 10, Number 9, September 2018
- Masoumeh Safkhani
, Nasour Bagheri
, Mahyar Shariat
:
On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems. 82 - Wentao Wang, Xuan Ke, Lingxia Wang:
A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller. 83 - Yanli Li, Lala Mei, Ran Li
, Chang-an Wu:
Using Noise Level to Detect Frame Repetition Forgery in Video Frame Rate Up-Conversion. 84 - Yin Wu
, Bowen Li, Fuquan Zhang:
Predictive Power Management for Wind Powered Wireless Sensor Node. 85 - Samah Alshathri
, Bogdan V. Ghita
, Nathan L. Clarke
:
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers. 86 - Manish Sahajwani
, Alok Jain, Radheshyam Gamad
:
Log Likelihood Ratio Based Relay Selection Scheme for Amplify and Forward Relaying with Three State Markov Channel. 87 - Vasileios Gkioulos, Håkon Gunleifsen
, Goitom K. Weldehawaryat
:
A Systematic Literature Review on Military Software Defined Networks. 88 - Sebastien Mambou
, Ondrej Krejcar
, Kamil Kuca
, Ali Selamat
:
Novel Cross-View Human Action Model Recognition Based on the Powerful View-Invariant Features Technique. 89 - Aaqif Afzaal Abbasi
, Hai Jin
:
v-Mapper: An Application-Aware Resource Consolidation Scheme for Cloud Data Centers. 90 - Mostefa Bendjima, Mohammed Feham:
Intelligent Communication in Wireless Sensor Networks. 91
Volume 10, Number 10, October 2018
- Qianru Teng, Yimin Chen, Chen Huang:
Occlusion-Aware Unsupervised Learning of Monocular Depth, Optical Flow and Camera Pose with Geometric Constraints. 92 - Anwar Said
, Syed Waqas Haider Shah
, Hasan Farooq
, Adnan Noor Mian, Ali Imran, Jon Crowcroft:
Proactive Caching at the Edge Leveraging Influential User Detection in Cellular D2D Networks. 93 - Peiyan Yuan
, Xiaoxiao Pang, Xiaoyan Zhao:
Influence of Crowd Participation Features on Mobile Edge Computing. 94 - Yue Wu, Junyi Zhang:
Chinese Event Extraction Based on Attention and Semantic Features: A Bidirectional Circular Neural Network. 95 - Isam A. Hussein, Basil H. Jasim
, Ramzy S. Ali
:
A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems. 96 - Yu Zhang
, Bingjia Shao:
The Effect of Customer Participation Types on Online Recovery Satisfaction: A Mental Accounting Perspective. 97 - Prakash Narayan Hardaha, Shailendra Singh
:
Structured Data REST Protocol for End to End Data Mashup. 98 - Tien Anh Tran
:
The Optimization of Marine Diesel Engine Rotational Speed Control Process by Fuzzy Logic Control Based on Particle Swarm Optimization Algorithm. 99 - Thomas Usländer
, Thomas Batz:
Agile Service Engineering in the Industrial Internet of Things. 100 - Sara Khan, Claudio Germak:
Reframing HRI Design Opportunities for Social Robots: Lessons Learnt from a Service Robotics Case Study Approach Using UX for HRI. 101 - Yi-Han Xu, Qiu-Ya Sun, Yu-Tong Xiao:
An Environmentally Aware Scheme of Wireless Sensor Networks for Forest Fire Monitoring and Detection. 102
Volume 10, Number 11, November 2018
- Simona Ibba, Andrea Pinna
, Maria Ilaria Lunesu
, Michele Marchesi, Roberto Tonelli
:
Initial Coin Offerings and Agile Practices. 103 - Chuang Wang, Xu'nan Chen, Abdel-Hamid Ali Soliman
, Zhixiang Zhu:
RFID Based Manufacturing Process of Cloud MES. 104 - Yangqun Li
:
An Integrated Platform for the Internet of Things Based on an Open Source Ecosystem. 105 - Wusheng Ji, Li Li, Weiwei Zhou:
Design and Implementation of a RFID Reader/Router in RFID-WSN Hybrid System. 106 - Yannis Nikoloudakis
, Spyridon Panagiotakis
, Thrasyvoulos Manios
, Evangelos K. Markakis, Evangelos Pallis
:
Composting as a Service: A Real-World IoT Implementation. 107 - Eirini-Eleni Tsiropoulou
, George Kousis, Athina Thanou, Ioanna Lykourentzou
, Symeon Papavassiliou
:
Quality of Experience in Cyber-Physical Social Systems Based on Reinforcement Learning and Game Theory. 108 - Roger Philip Giddings
, Xiao Duan, Ehab Al-Rawachy, Mingzhi Mao:
A Review of DSP-Based Enabling Technologies for Cloud Access Networks. 109 - Linbo Zhai, Wenwen Jiang
:
Intelligent Environment Monitoring System for University Laboratories. 110 - Anping Song, Zuoyu Wu, Xuehai Ding, Qian Hu, Xinyi Di:
Neurologist Standard Classification of Facial Nerve Paralysis with Deep Neural Networks. 111 - Jialu Xu, Feiyue Ye:
Query Recommendation Using Hybrid Query Relevance. 112 - Yue Li
, Xutao Wang, Pengjian Xu:
Chinese Text Classification Model Based on Deep Learning. 113
Volume 10, Number 12, December 2018
- Shaukat Ali, Naveed Islam
, Azhar Rauf, Ikram Ud Din
, Mohsen Guizani, Joel J. P. C. Rodrigues
:
Privacy and Security Issues in Online Social Networks. 114 - Wanli Yang, Yimin Chen, Chen Huang, Ming-ke Gao:
Video-Based Human Action Recognition Using Spatial Pyramid Pooling and 3D Densely Convolutional Networks. 115 - Yonghua Zhu, Xun Gao, Weilin Zhang, Shenkai Liu, Yuanyuan Zhang:
A Bi-Directional LSTM-CNN Model with Attention for Aspect-Level Text Classification. 116 - Bo Wang, Feiyue Ye, Jialu Xu:
A Personalized Recommendation Algorithm Based on the User's Implicit Feedback in E-Commerce. 117 - Jinlong Wei
, Ji Zhou, Elias G. Giacoumidis, Paul Anthony Haigh
, Jianming Tang
:
DSP-Based 40 GB/s Lane Rate Next-Generation Access Networks. 118 - Jithin R
, Priya Chandran
:
Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices. 119 - Stefania Collodi, Sara Panerati
, Enrico Imbimbo
, Federica Stefanelli, Mirko Duradoni
, Andrea Guazzini
:
Personality and Reputation: A Complex Relationship in Virtual Environments. 120 - Gopal Vishwakarma
, Wonjun Lee:
Exploiting JTAG and Its Mitigation in IOT: A Survey. 121 - Zubin Chen, Baijun Lu, Yanzhou Zhu, Hao Lv:
A Compact Printed Monopole Antenna for WiMAX/WLAN and UWB Applications. 122 - Mohammed N. A. Ali, Guanzheng Tan, Aamir Hussain
:
Bidirectional Recurrent Neural Network Approach for Arabic Named Entity Recognition. 123 - Ziyun Deng, Tingqin He
:
A Method for Filtering Pages by Similarity Degree based on Dynamic Programming. 124 - Tommaso Pecorella
, Laura Pierucci
, Francesca Nizzi
:
"Network Sentiment" Framework to Improve Security and Privacy for Smart Home. 125

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.