Content
November 2019, Volume 11, Issue 11
- 1-13 Name-Based Security for Information-Centric Networking Architectures
by Nikos Fotiou & George C. Polyzos - 1-13 Body-to-Body Cooperation in Internet of Medical Things: Toward Energy Efficiency Improvement
by Dalal Abdulmohsin Hammood & Hasliza A. Rahim & Ahmed Alkhayyat & R. Badlishah Ahmad - 1-13 Wideband Spectrum Sensing Based on Reconfigurable Filter Bank in Cognitive Radio
by Huan Wang & Bin Wu & Yuancheng Yao & Mingwei Qin - 1-13 Pedestrian Attribute Recognition with Graph Convolutional Network in Surveillance Scenarios
by Xiangpeng Song & Hongbin Yang & Congcong Zhou - 1-15 Roll Motion Prediction of Unmanned Surface Vehicle Based on Coupled CNN and LSTM
by Wenjie Zhang & Pin Wu & Yan Peng & Dongke Liu - 1-17 Reputation-Based Trust Approaches in Named Data Networking
by Ioanna Angeliki Kapetanidou & Christos-Alexandros Sarros & Vassilis Tsaoussidis - 1-20 A Context-Aware Conversational Agent in the Rehabilitation Domain
by Thanassis Mavropoulos & Georgios Meditskos & Spyridon Symeonidis & Eleni Kamateri & Maria Rousi & Dimitris Tzimikas & Lefteris Papageorgiou & Christos Eleftheriadis & George Adamopoulos & Stefanos Vrochidis & Ioannis Kompatsiaris - 1-20 Research on Cooperative Communication Strategy and Intelligent Agent Directional Source Grouping Algorithms for Internet of Things
by Yongyan Zou & Yanzhi Zhang & Xin Yi - 1-20 Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes
by Katerina Vgena & Angeliki Kitsiou & Christos Kalloniatis & Dimitris Kavroudakis & Stefanos Gritzalis - 1-20 Multimedia Independent Multipath Routing Algorithms for Internet of Things Based on a Node Hidden Communication Model
by Cong Wu & Jianhui Yang - 1-24 Machine Learning-Based Patient Load Prediction and IoT Integrated Intelligent Patient Transfer Systems
by Kambombo Mtonga & Santhi Kumaran & Chomora Mikeka & Kayalvizhi Jayavel & Jimmy Nsenga - 1-24 Feature Fusion Text Classification Model Combining CNN and BiGRU with Multi-Attention Mechanism
by Jingren Zhang & Fang’ai Liu & Weizhi Xu & Hui Yu - 1-25 Academic Excellence, Website Quality, SEO Performance: Is there a Correlation?
by Andreas Giannakoulopoulos & Nikos Konstantinou & Dimitris Koutsompolis & Minas Pergantis & Iraklis Varlamis - 1-35 Software Architecture for Mobile Cloud Computing Systems
by Abdulrahman Alreshidi & Aakash Ahmad & Ahmed B. Altamimi & Khalid Sultan & Rashid Mehmood
October 2019, Volume 11, Issue 11
- 1-3 Special Issue “New Perspectives in Intelligent Transportation Systems and Mobile Communications towards a Smart Cities Context”
by Giovanni Pau & Alessandro Severino & Antonino Canale - 1-11 Operation Scheduling Optimization for Microgrids Considering Coordination of Their Components
by Hirotaka Takano & Ryota Goto & Thin Zar Soe & Nguyen Duc Tuyen & Hiroshi Asano - 1-11 IoT Based Smart City Bus Stops
by Miraal Kamal & Manal Atif & Hafsa Mujahid & Tamer Shanableh & A. R. Al-Ali & Ahmad Al Nabulsi - 1-13 FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing
by Yuling Chen & Jinyi Guo & Changlou Li & Wei Ren - 1-16 Integration of LTE 230 and LTE 1800 in Power Wireless Private Networks
by Zhengyang Ding & Weiwei Miao & Mingxuan Zhang & Wei Li & Rui Liu & Jun Zou & Chen Xu - 1-19 Impacts of Video Display on Purchase Intention for Digital and Home Appliance Products—Empirical Study from China
by Ruohong Hao & Bingjia Shao & Rong Ma - 1-20 High-Level Smart Decision Making of a Robot Based on Ontology in a Search and Rescue Scenario
by Xiaolei Sun & Yu Zhang & Jing Chen - 1-21 Fog Computing in IoT Smart Environments via Named Data Networking: A Study on Service Orchestration Mechanisms
by Marica Amadeo & Giuseppe Ruggeri & Claudia Campolo & Antonella Molinaro & Valeria Loscrí & Carlos T. Calafate - 1-21 Predicting Rogue Content and Arabic Spammers on Twitter
by Adel R. Alharbi & Amer Aljaedi - 1-24 Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
by Georgios Spathoulas & Nikolaos Giachoudis & Georgios-Paraskevas Damiris & Georgios Theodoridis
October 2019, Volume 11, Issue 10
- 1-12 Blockchain and the Tokenization of the Individual: Societal Implications
by Monique J. Morrow & Mehran Zarrebini - 1-14 About Linda Again: How Narratives and Group Reasoning Can Influence Conjunction Fallacy
by Camillo Donati & Andrea Guazzini & Giorgio Gronchi & Andrea Smorti - 1-16 Beam Training for Millimeter-Wave Communication Based on Tabu Table Enhanced Rosenbrock Algorithm
by Xiaoyu Li & Changyin Sun & Fan Jiang - 1-16 Assessing the Techno-Economic Benefits of Flexible Demand Resources Scheduling for Renewable Energy–Based Smart Microgrid Planning
by Mark Kipngetich Kiptoo & Oludamilare Bode Adewuyi & Mohammed Elsayed Lotfy & Theophilus Amara & Keifa Vamba Konneh & Tomonobu Senjyu - 1-20 Sensorial Network Framework Embedded in Ubiquitous Mobile Devices
by Miroslav Behan & Ondrej Krejcar & Thabit Sabbah & Ali Selamat - 1-22 Low Delay Inter-Packet Coding in Vehicular Networks
by Irina Bocharova & Boris Kudryashov & Nikita Lyamin & Erik Frick & Maben Rabi & Alexey Vinel - 1-24 Blockchain Technology for Intelligent Environments
by Spyros Voulgaris & Nikos Fotiou & Vasilios A. Siris & George C. Polyzos & Mikael Jaatinen & Yannis Oikonomidis - 1-24 Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things
by Johannes Kölsch & Christopher Heinz & Axel Ratzke & Christoph Grimm - 1-26 5G V2X System-Level Architecture of 5GCAR Project
by Massimo Condoluci & Laurent Gallo & Laurent Mussot & Apostolos Kousaridas & Panagiotis Spapis & Maliheh Mahlouji & Toktam Mahmoodi - 1-34 A Survey on LoRaWAN Architecture, Protocol and Technologies
by Mehmet Ali Ertürk & Muhammed Ali Aydın & Muhammet Talha Büyükakkaşlar & Hayrettin Evirgen - 1-38 A Trustworthy Communication Hub for Cyber-Physical Systems
by Juhani Latvakoski & Jouni Heikkinen
September 2019, Volume 11, Issue 10
- 1-11 Joint Optimization of Pico-Base-Station Density and Transmit Power for an Energy-Efficient Heterogeneous Cellular Network
by Jie Yang & Ziyu Pan & Hengfei Xu & Han Hu - 1-13 Adaptive Coherent Receiver Settings for Optimum Channel Spacing in Gridless Optical Networks
by Ahmad Abdo & Sadok Aouini & Bilal Riaz & Naim Ben-Hamida & Claude D’Amours - 1-18 No-Reference Depth Map Quality Evaluation Model Based on Depth Map Edge Confidence Measurement in Immersive Video Applications
by Safak Dogan & Nasser Haddad & Erhan Ekmekcioglu & Ahmet M. Kondoz - 1-18 Time and Power Allocation for Energy Efficiency Maximization in Wireless-Powered Full-Duplex Relay Systems
by Xin Song & Yue Ni & Xiuwei Han & Lei Qin & Li Dong - 1-19 Threat Analysis for Smart Homes
by Georgios Kavallieratos & Nabin Chowdhury & Sokratis Katsikas & Vasileios Gkioulos & Stephen Wolthusen - 1-30 Partitioning Convolutional Neural Networks to Maximize the Inference Rate on Constrained IoT Devices
by Fabíola Martins Campos de Oliveira & Edson Borin
August 2019, Volume 11, Issue 9
- 1-13 SEO Practices: A Study about the Way News Websites Allow the Users to Comment on Their News Articles
by Minos-Athanasios Karyotakis & Evangelos Lamprou & Matina Kiourexidou & Nikos Antonopoulos - 1-14 Sustainable Communication Systems: A Graph-Labeling Approach for Cellular Frequency Allocation in Densely-Populated Areas
by Adebola Orogun & Oluwaseun Fadeyi & Ondrej Krejcar - 1-15 An Improved Method for Named Entity Recognition and Its Application to CEMR
by Ming Gao & Qifeng Xiao & Shaochun Wu & Kun Deng - 1-17 Mobility-Enabled Edge Server Selection for Multi-User Composite Services
by Wenming Zhang & Yiwen Zhang & Qilin Wu & Kai Peng - 1-18 Research on SWIM Services Dynamic Migration Method
by Zhijun Wu & Shengyan Zhou & Liang Liu & Jin Lei - 1-21 A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
by Håkon Gunleifsen & Thomas Kemmerich & Vasileios Gkioulos - 1-23 An Ontology-Based Recommender System with an Application to the Star Trek Television Franchise
by Paul Sheridan & Mikael Onsjö & Claudia Becerra & Sergio Jimenez & George Dueñas
September 2019, Volume 11, Issue 9
- 1-3 Social Network Services Management and Risk of Doocing. Comment on Kim, S.; Park, H.; Choi, M.J. “Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations. Future Internet 2019, 11, 137”
by Stefania Fantinelli & Michela Cortini - 1-13 Deep Learning-Based Sentimental Analysis for Large-Scale Imbalanced Twitter Data
by Nasir Jamal & Chen Xianqiao & Hamza Aldabbas - 1-13 Incorporating Background Checks with Sentiment Analysis to Identify Violence Risky Chinese Microblogs
by Yun-Fei Jia & Shan Li & Renbiao Wu - 1-13 Vehicular Delay-Tolerant Networks with Image Recognition-Based Adaptive Array Antenna for Winter Road Surveillance in Local Areas
by Noriki Uchida & Goshi Sato & Yoshitaka Shibata - 1-15 Dynamic Group Recommendation Based on the Attention Mechanism
by Haiyan Xu & Yanhui Ding & Jing Sun & Kun Zhao & Yuanjian Chen - 1-16 RFID Based Embedded System for Sustainable Food Management in an IoT Network Paradigm
by Raúl Parada & Alfonso Palazón & Carlos Monzo & Joan Melià-Seguí - 1-17 Satellite Integration into 5G: Accent on First Over-The-Air Tests of an Edge Node Concept with Integrated Satellite Backhaul
by Florian Völk & Konstantinos Liolis & Marius Corici & Joe Cahill & Robert T. Schwarz & Thomas Schlichter & Eric Troudt & Andreas Knopp - 1-19 A Framework for the Detection of Search and Rescue Patterns Using Shapelet Classification
by Konstantinos Kapadais & Iraklis Varlamis & Christos Sardianos & Konstantinos Tserpes - 1-19 Enhancing the 3GPP V2X Architecture with Information-Centric Networking
by Marica Amadeo & Claudia Campolo & Antonella Molinaro & Jerome Harri & Christian Esteve Rothenberg & Alexey Vinel - 1-21 ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing
by Masky Mackita & Soo-Young Shin & Tae-Young Choe - 1-21 Evaluating the Degree of Uncertainty of Research Activities in Industry 4.0
by Sirio Cividino & Gianluca Egidi & Ilaria Zambon & Andrea Colantoni - 1-21 Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations
by Wei Sun & Shiwei Wei & Huaping Guo & Hongbing Liu - 1-21 Ranking by Relevance and Citation Counts, a Comparative Study: Google Scholar, Microsoft Academic, WoS and Scopus
by Cristòfol Rovira & Lluís Codina & Frederic Guerrero-Solé & Carlos Lopezosa - 1-24 25 Years of Bluetooth Technology
by Sherali Zeadally & Farhan Siddiqui & Zubair Baig - 1-25 MU R-CNN: A Two-Dimensional Code Instance Segmentation Network Based on Deep Learning
by Baoxi Yuan & Yang Li & Fan Jiang & Xiaojie Xu & Yingxia Guo & Jianhua Zhao & Deyue Zhang & Jianxin Guo & Xiaoli Shen
July 2019, Volume 11, Issue 8
- 1-8 A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System
by Saumendra Sengupta & Chen-Fu Chiang & Bruno Andriamanalimanana & Jorge Novillo & Ali Tekeoglu - 1-13 Energy Efficient Communications for Reliable IoT Multicast 5G/Satellite Services
by Francesco Chiti & Romano Fantacci & Laura Pierucci - 1-14 Social Emotional Opinion Decision with Newly Coined Words and Emoticon Polarity of Social Networks Services
by Jin Sol Yang & Myung-Sook Ko & Kwang Sik Chung - 1-14 Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers
by Jie Yuan & Erxia Li & Chaoqun Kang & Fangyuan Chang & Tingting Yuan & Xiaoyong Li - 1-17 Software Defined Wireless Mesh Network Flat Distribution Control Plane
by Hisham Elzain & Yang Wu
August 2019, Volume 11, Issue 8
- 1-11 Combined Self-Attention Mechanism for Chinese Named Entity Recognition in Military
by Fei Liao & Liangli Ma & Jingjing Pei & Linshan Tan - 1-13 Research on Factors Affecting Solvers’ Participation Time in Online Crowdsourcing Contests
by Keng Yang - 1-13 RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
by Yong Fang & Cheng Huang & Yijia Xu & Yang Li - 1-14 Mars to Earth Data Downloading: A Directory Synchronization Approach
by Marco Bertolazzi & Carlo Caini - 1-14 A Systematic Analysis of Real-World Energy Blockchain Initiatives
by Peter O’Donovan & Dominic T. J. O’Sullivan - 1-14 A Novel Task Caching and Migration Strategy in Multi-Access Edge Computing Based on the Genetic Algorithm
by Lujie Tang & Bing Tang & Linyao Kang & Li Zhang - 1-15 Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications
by Konstantinos Sgantzos & Ian Grigg - 1-16 Artificial Intelligence Imagery Analysis Fostering Big Data Analytics
by Stefan Cremer & Claudia Loebbecke - 1-17 An Image Feature-Based Method for Parking Lot Occupancy
by Paula Tătulea & Florina Călin & Remus Brad & Lucian Brâncovean & Mircea Greavu - 1-18 Modeling of Cumulative QoE in On-Demand Video Services: Role of Memory Effect and Degree of Interest
by Tho Nguyen Duc & Chanh Minh Tran & Phan Xuan Tan & Eiji Kamioka - 1-18 Quality of Experience (QoE)-Aware Fast Coding Unit Size Selection for HEVC Intra-Prediction
by Buddhiprabha Erabadda & Thanuja Mallikarachchi & Chaminda Hewage & Anil Fernando - 1-20 Scheduling for Multi-User Multi-Input Multi-Output Wireless Networks with Priorities and Deadlines
by Li-on Raviv & Amir Leshem - 1-23 Impact of Modern Virtualization Methods on Timing Precision and Performance of High-Speed Applications
by Veronika Kirova & Kirill Karpov & Eduard Siemens & Irina Zander & Oksana Vasylenko & Dmitry Kachan & Sergii Maksymov
June 2019, Volume 11, Issue 7
- 1-16 A Dynamic Application-Partitioning Algorithm with Improved Offloading Mechanism for Fog Cloud Networks
by Adeel Abro & Zhongliang Deng & Kamran Ali Memon & Asif Ali Laghari & Khalid Hussain Mohammadani & Noor ul Ain - 1-26 Service Level Agreement Violations in Cloud Storage: Insurance and Compensation Sustainability
by Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi
July 2019, Volume 11, Issue 7
- 1-10 The Effects of the Floating Action Button on Quality of Experience
by Jesenka Pibernik & Jurica Dolic & Hrvoje Abraham Milicevic & Bojan Kanizaj - 1-11 Web Browser Network Based on a BA Model for a Web-Based Virtual World
by Masaki Kohana & Shinji Sakamoto & Shusuke Okamoto - 1-12 Stacking-Based Ensemble Learning of Self-Media Data for Marketing Intention Detection
by Yufeng Wang & Shuangrong Liu & Songqian Li & Jidong Duan & Zhihao Hou & Jia Yu & Kun Ma - 1-12 Implementation and Evaluation of Activity-Based Congestion Management Using P4 (P4-ABC)
by Michael Menth & Habib Mostafaei & Daniel Merling & Marco Häberle - 1-13 A Multi-Attention Network for Aspect-Level Sentiment Analysis
by Qiuyue Zhang & Ran Lu - 1-14 A Game Theoretic Interference Management Scheme in Full Duplex Cellular Systems under Infeasible QoS Requirements
by Ali Y. Al-Zahrani - 1-14 Distributed Uniform Streaming Framework: An Elastic Fog Computing Platform for Event Stream Processing and Platform Transparency
by Simon Vanneste & Jens de Hoog & Thomas Huybrechts & Stig Bosmans & Reinout Eyckerman & Muddsair Sharif & Siegfried Mercelis & Peter Hellinckx - 1-15 Crossing the Borders: Re-Use of Smart Learning Objects in Advanced Content Access Systems
by Hamza Manzoor & Kamil Akhuseyinoglu & Jackson Wonderly & Peter Brusilovsky & Clifford A. Shaffer - 1-15 Improving Forensic Triage Efficiency through Cyber Threat Intelligence
by Nikolaos Serketzis & Vasilios Katos & Christos Ilioudis & Dimitrios Baltatzis & Georgios Pangalos - 1-17 Maintaining the Sense of Agency in Semi-Autonomous Robot Conferencing
by Kazuaki Tanaka & Kota Takenouchi & Kohei Ogawa & Yuichiro Yoshikawa & Shuichi Nishio & Hiroshi Ishiguro - 1-17 Town-Watching Workshop Using Disaster Information Tweeting and Mapping System
by Keisuke Utsu & Shun Ueta & Sachi Tajima & Yoshitaka Kajita & Yuji Murakami & Osamu Uchida - 1-17 Platform Economy and Techno-Regulation—Experimenting with Reputation and Nudge
by Nicola Lettieri & Alfonso Guarino & Delfina Malandrino & Rocco Zaccagnino - 1-18 An Image Authentication Scheme Using Merkle Tree Mechanisms
by Yi-Cheng Chen & Yueh-Peng Chou & Yung-Chen Chou - 1-18 Signatures of the Crypto-Currency Market Decoupling from the Forex
by Stanisław Drożdż & Ludovico Minati & Paweł Oświȩcimka & Marek Stanuszek & Marcin Wa̧torek - 1-20 A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications
by Stefano Busanelli & Simone Cirani & Lorenzo Melegari & Marco Picone & Mirco Rosa & Luca Veltri - 1-22 Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management
by Abderahman Rejeb & John G. Keogh & Horst Treiblmaier - 1-23 Structuring Reference Architectures for the Industrial Internet of Things
by Sebastian R. Bader & Maria Maleshkova & Steffen Lohmann - 1-25 Marine Internet for Internetworking in Oceans: A Tutorial
by Shengming Jiang - 1-25 A Next-Generation Core Network Architecture for Mobile Networks
by Andrea G. Forte & Wei Wang & Luca Veltri & Gianluigi Ferrari - 1-30 Architecting Software for the Internet of Thing Based Systems
by Abdulrahman Alreshidi & Aakash Ahmad - 1-34 Automatic Addition of Fault-Tolerance in Presence of Unchangeable Environment Actions †
by Mohammad Roohitavaf & Sandeep Kulkarni
June 2019, Volume 11, Issue 6
- 1-2 Future Intelligent Systems and Networks
by Carmen De-Pablos-Heredero - 1-13 Time Series Irradiance Synthesizer for Optical GEO Satellite Downlinks in 5G Networks
by Theodore T. Kapsis & Nikolaos K. Lyras & Charilaos I. Kourogiorgas & Athanasios D. Panagopoulos - 1-16 Digital Marketing Actions That Achieve a Better Attraction and Loyalty of Users: An Analytical Study
by Juan José López García & David Lizcano & Celia MQ Ramos & Nelson Matos - 1-16 Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model
by Chien-Lung Hsu & Yi-Chuan Liao - 1-16 Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication
by Dedi Gunawan & Masahiro Mambo - 1-17 Energy-Efficient Multi-User Routing in a Software-Defined Multi-Hop Wireless Network
by Ziqi Liu & Gaochao Xu & Peng Liu & Xiaodong Fu & Yang Liu - 1-17 The Interaction Effect of Type of Message X YouTuber’s Media Metrics on Customers’ Responses and the Moderation of Conformity Intention
by Melby Karina Zuniga Huertas & Tarcisio Duarte Coelho - 1-18 Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking
by Meng Kuai & Xiaoyan Hong - 1-20 A Choreography-Based and Collaborative Road Mobility System for L’Aquila City
by Marco Autili & Amleto Di Salle & Francesco Gallo & Claudio Pompilio & Massimo Tivoli - 1-20 Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations
by Sanghyun Kim & Hyunsun Park & Moon Jong Choi - 1-22 Joint Location-Dependent Pricing and Request Mapping in ICN-Based Telco CDNs For 5G
by Mingshuang Jin & Hongbin Luo & Shuai Gao & Bohao Feng - 1-22 Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications
by Andrei Vladyko & Abdukodir Khakimov & Ammar Muthanna & Abdelhamied A. Ateya & Andrey Koucheryavy - 1-22 Developing Internet Online Procurement Frameworks for Construction Firms
by Rafikullah Deraman & Chen Wang & Jeffrey Boon Hui Yap & Heng Li & Faizul Azli Mohd-Rahim - 1-25 CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems
by Pramod T. C. & Thejas G. S. & S. S. Iyengar & N. R. Sunitha - 1-27 The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment
by Vatsala Nundloll & Barry Porter & Gordon S. Blair & Bridget Emmett & Jack Cosby & Davey L. Jones & Dave Chadwick & Ben Winterbourn & Philip Beattie & Graham Dean & Rory Shaw & Wayne Shelley & Mike Brown & Izhar Ullah - 1-30 Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
by Michele De Donno & Alberto Giaretta & Nicola Dragoni & Antonio Bucchiarone & Manuel Mazzara
May 2019, Volume 11, Issue 6
- 1-15 Indoor Vehicles Geolocalization Using LoRaWAN
by Pietro Manzoni & Carlos T. Calafate & Juan-Carlos Cano & Enrique Hernández-Orallo - 1-16 Dynamic Task Scheduling Algorithm with Deadline Constraint in Heterogeneous Volunteer Computing Platforms
by Ling Xu & Jianzhong Qiao & Shukuan Lin & Wanting Zhang - 1-16 Vehicle Speed Estimation Based on 3D ConvNets and Non-Local Blocks
by Huanan Dong & Ming Wen & Zhouwang Yang - 1-20 Survey and Perspectives of Vehicular Wi-Fi versus Sidelink Cellular-V2X in the 5G Era
by Alessandro Bazzi & Giammarco Cecchini & Michele Menarini & Barbara M. Masini & Alberto Zanella
April 2019, Volume 11, Issue 5
- 1-11 Real-Time Monitoring of Passenger’s Psychological Stress
by Gaël Vila & Christelle Godin & Oumayma Sakri & Etienne Labyt & Audrey Vidal & Sylvie Charbonnier & Simon Ollander & Aurélie Campagne - 1-12 Analysis of the Structure and Use of Digital Resources on the Websites of the Main Football Clubs in Europe
by Santiago Tejedor & Laura Cervi & Gerard Gordon - 1-31 Computational Social Science of Disasters: Opportunities and Challenges
by Annetta Burger & Talha Oz & William G. Kennedy & Andrew T. Crooks
May 2019, Volume 11, Issue 5
- 1-9 Enhancing IoT Data Dependability through a Blockchain Mirror Model
by Alessandro Bellini & Emanuele Bellini & Monica Gherardelli & Franco Pirri - 1-11 Characteristics of Cyberstalking Behavior, Consequences, and Coping Strategies: A Cross-Sectional Study in a Sample of Italian University Students
by Tatiana Begotti & Daniela Acquadro Maran - 1-13 A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication
by Adeel Abro & Zhongliang Deng & Kamran Ali Memon - 1-13 Substitute Seed Nodes Mining Algorithms for Influence Maximization in Multi-Social Networks
by Xuli Rao & Jiaxu Zhao & Zhide Chen & Feng Lin - 1-13 Convolutional Two-Stream Network Using Multi-Facial Feature Fusion for Driver Fatigue Detection
by Weihuang Liu & Jinhao Qian & Zengwei Yao & Xintao Jiao & Jiahui Pan - 1-15 Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms
by Amer Al-Rahayfeh & Saleh Atiewi & Abdullah Abuhussein & Muder Almiani - 1-15 Guidelines towards Information-Driven Mobility Management
by Rute C. Sofia - 1-16 Word Sense Disambiguation Using Cosine Similarity Collaborates with Word2vec and WordNet
by Korawit Orkphol & Wu Yang - 1-17 Combining Facial Expressions and Electroencephalography to Enhance Emotion Recognition
by Yongrui Huang & Jianhao Yang & Siyu Liu & Jiahui Pan - 1-18 Dynamic Lognormal Shadowing Framework for the Performance Evaluation of Next Generation Cellular Systems
by Georgios A. Karagiannis & Athanasios D. Panagopoulos - 1-19 Intelligent Dynamic Data Offloading in a Competitive Mobile Edge Computing Market
by Giorgos Mitsis & Pavlos Athanasios Apostolopoulos & Eirini Eleni Tsiropoulou & Symeon Papavassiliou - 1-20 The Next Generation Platform as A Service: Composition and Deployment of Platforms and Services
by Angelos Mimidis-Kentis & Jose Soler & Paul Veitch & Adam Broadbent & Marco Mobilio & Oliviero Riganelli & Steven Van Rossem & Wouter Tavernier & Bessem Sayadi - 1-23 A Yielding Protocol that Uses Inter-Vehicle Communication to Improve the Traffic of Vehicles on a Low-Priority Road at an Unsignalized Intersection
by Hayato Yajima & Kazumasa Takami - 1-25 Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment
by Tri Hoang Vo & Woldemar Fuhrmann & Klaus-Peter Fischer-Hellmann & Steven Furnell - 1-26 Evaluating Forwarding Protocols in Opportunistic Networks: Trends, Advances, Challenges and Best Practices
by Vishnupriya Kuppusamy & Udaya Miriya Thanthrige & Asanga Udugama & Anna Förster - 1-27 An Extensible Automated Failure Localization Framework Using NetKAT, Felix, and SDN Traceroute
by István Pelle & András Gulyás
April 2019, Volume 11, Issue 4
- 1-11 Dynamic Gesture Recognition Based on MEMP Network
by Xinyu Zhang & Xiaoqiang Li - 1-11 FollowMe: One Social Importance-Based Collaborative Scheme in MONs
by Peiyan Yuan & Xiaoxiao Pang & Ping Liu & En Zhang - 1-12 A Smart Cities LoRaWAN Network Based on Autonomous Base Stations (BS) for Some Countries with Limited Internet Access
by Pape Abdoulaye Barro & Marco Zennaro & Jules Degila & Ermanno Pietrosemoli - 1-12 A Method of Bus Network Optimization Based on Complex Network and Beidou Vehicle Location
by Peixin Dong & Dongyuan Li & Jianping Xing & Haohui Duan & Yong Wu - 1-14 Epidemic Spreading in Urban Areas Using Agent-Based Transportation Models
by Jürgen Hackl & Thibaut Dubernet - 1-15 Information Quality or Entities’ Interactivity? Understanding the Determinants of Social Network-Based Brand Community Participation
by Haichuan Zhao - 1-15 An Improved Approach for Text Sentiment Classification Based on a Deep Neural Network via a Sentiment Attention Mechanism
by Wenkuan Li & Peiyu Liu & Qiuyue Zhang & Wenfeng Liu - 1-16 An Optimal Energy-Saving Strategy for Home Energy Management Systems with Bounded Customer Rationality
by Guoying Lin & Yuyao Yang & Feng Pan & Sijian Zhang & Fen Wang & Shuai Fan - 1-16 Influence Maximization in Social Network Considering Memory Effect and Social Reinforcement Effect
by Fei Wang & Zhenfang Zhu & Peiyu Liu & Peipei Wang - 1-17 Social Engineering Attacks: A Survey
by Fatima Salahdine & Naima Kaabouch - 1-18 Ant Colony Optimization Task Scheduling Algorithm for SWIM Based on Load Balancing
by Gang Li & Zhijun Wu - 1-19 Design of an Open Remote Electrocardiogram (ECG) Service
by Augusto Ciuffoletti - 1-23 A Review of Machine Learning and IoT in Smart Transportation
by Fotios Zantalis & Grigorios Koulouras & Sotiris Karabetsos & Dionisis Kandris - 1-25 Edge Computing: A Survey On the Hardware Requirements in the Internet of Things World
by Maurizio Capra & Riccardo Peloso & Guido Masera & Massimo Ruo Roch & Maurizio Martina - 1-35 Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies
by Antonio Cilfone & Luca Davoli & Laura Belli & Gianluigi Ferrari
March 2019, Volume 11, Issue 4
- 1-11 Cyber Dating Abuse and Masculine Gender Norms in a Sample of Male Adults
by Beatriz Villora & Santiago Yubero & Raúl Navarro - 1-13 Tax Fraud Detection through Neural Networks: An Application Using a Sample of Personal Income Taxpayers
by César Pérez López & María Jesús Delgado Rodríguez & Sonia de Lucas Santos - 1-14 A Robust Security Architecture for SDN-Based 5G Networks
by Jiaying Yao & Zhigeng Han & Muhammad Sohail & Liangmin Wang - 1-17 A Study on Join Operations in MongoDB Preserving Collections Data Models for Future Internet Applications
by Antonio Celesti & Maria Fazio & Massimo Villari
March 2019, Volume 11, Issue 3
- 1-10 An Overview on Push-Based Communication Models for Information-Centric Networking
by Rute C. Sofia & Paulo M. Mendes - 1-11 Worldwide Connectivity for the Internet of Things Through LoRaWAN
by Lorenzo Vangelista & Marco Centenaro - 1-12 Experimental Study on the Utility and Future of Collaborative Consumption Platforms Offering Tourism Related Services
by Joan-Francesc Fondevila-Gascón & Gaspar Berbel & Mònica Muñoz-González - 1-13 Nonlinear Analysis of Built-in Sensor in Smart Device under the Condition of Voice Actuating
by Ning Zhao & Yuhe Liu & Junjie Shen - 1-14 eHealth Integrity Model Based on Permissioned Blockchain
by Tomasz Hyla & Jerzy Pejaś - 1-15 Environmental Hazards: A Coverage Response Approach
by Paul J. Croft - 1-16 Hot Topic Community Discovery on Cross Social Networks
by Xuan Wang & Bofeng Zhang & Furong Chang - 1-16 A Cache Placement Strategy with Energy Consumption Optimization in Information-Centric Networking
by Xin Zheng & Gaocai Wang & Qifei Zhao - 1-16 Snack Texture Estimation System Using a Simple Equipment and Neural Network Model
by Shigeru Kato & Naoki Wada & Ryuji Ito & Takaya Shiozaki & Yudai Nishiyama & Tomomichi Kagawa - 1-16 Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues
by Hussain Aldawood & Geoffrey Skinner - 1-17 A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs
by Zulfiqar Ali Zardari & Jingsha He & Nafei Zhu & Khalid Hussain Mohammadani & Muhammad Salman Pathan & Muhammad Iftikhar Hussain & Muhammad Qasim Memon - 1-17 Modeling of Information Operations Effects: Technological Systems Example
by Alexander Geyda & Igor Lysenko - 1-17 Gamification vs. Privacy: Identifying and Analysing the Major Concerns
by Aikaterini-Georgia Mavroeidi & Angeliki Kitsiou & Christos Kalloniatis & Stefanos Gritzalis - 1-17 Software-Defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges
by Adnan Mahmood & Wei Emma Zhang & Quan Z. Sheng - 1-18 Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study
by Samer Jaloudi - 1-18 Environmental-Based Speed Recommendation for Future Smart Cars
by Ioannis Galanis & Iraklis Anagnostopoulos & Priyaa Gurunathan & Dona Burkard - 1-18 Topic-Specific Emotion Mining Model for Online Comments
by Xiangfeng Luo & Yawen Yi - 1-19 A Game-Theoretic Analysis for Distributed Honeypots
by Yang Li & Leyi Shi & Haijie Feng - 1-20 Effectiveness of Segment Routing Technology in Reducing the Bandwidth and Cloud Resources Provisioning Times in Network Function Virtualization Architectures
by Vincenzo Eramo & Francesco G. Lavacca & Tiziana Catena & Marco Polverini & Antonio Cianfrani - 1-21 IoH: A Platform for the Intelligence of Home with a Context Awareness and Ambient Intelligence Approach
by Luis Gomes & Carlos Ramos & Aria Jozi & Bruno Serra & Lucas Paiva & Zita Vale - 1-21 Dynamic SDN Controller Load Balancing
by Hadar Sufiev & Yoram Haddad & Leonid Barenboim & José Soler - 1-21 An Access Control Model for Preventing Virtual Machine Hopping Attack
by Ying Dong & Zhou Lei - 1-23 myDIG: Personalized Illicit Domain-Specific Knowledge Discovery with No Programming
by Mayank Kejriwal & Pedro Szekely - 1-23 VNF Placement Optimization at the Edge and Cloud †
by Aris Leivadeas & George Kesidis & Mohamed Ibnkahla & Ioannis Lambadaris - 1-25 Cyber Security Threat Modeling for Supply Chain Organizational Environments
by Abel Yeboah-Ofori & Shareeful Islam - 1-25 Open Data for Open Innovation: An Analysis of Literature Characteristics
by Diego Corrales-Garay & Eva-María Mora-Valentín & Marta Ortiz-de-Urbina-Criado
February 2019, Volume 11, Issue 3
- 1-9 SAES: An Introduction to Self-Adapting Exploratory Structures
by Giovanni Maria Sacco - 1-15 Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges
by Sergej Svorobej & Patricia Takako Endo & Malika Bendechache & Christos Filelis-Papadopoulos & Konstantinos M. Giannoutakis & George A. Gravvanis & Dimitrios Tzovaras & James Byrne & Theo Lynn - 1-33 On the Need for a General REST-Security Framework
by Luigi Lo Iacono & Hoai Viet Nguyen & Peter Leo Gorski
January 2019, Volume 11, Issue 2
- 1-10 A Spatial Prediction-Based Motion-Compensated Frame Rate Up-Conversion
by Yanli Li & Wendan Ma & Yue Han - 1-10 Dual-Band Monopole Antenna for RFID Applications
by Naser Ojaroudi Parchin & Haleh Jahanbakhsh Basherlou & Raed A. Abd-Alhameed & James M. Noras - 1-12 An Overview of Vehicular Communications
by Fabio Arena & Giovanni Pau - 1-12 Important Factors for Improving Google Search Rank
by Christos Ziakis & Maro Vlachopoulou & Theodosios Kyrkoudis & Makrina Karagkiozidou - 1-17 T-Move: A Light-Weight Protocol for Improved QoS in Content-Centric Networks with Producer Mobility
by Swaroopa Korla & Shanti Chilukuri - 1-23 An Investigation into Healthcare-Data Patterns
by Aaron Boddy & William Hurst & Michael Mackay & Abdennour El Rhalibi & Thar Baker & Casimiro A. Curbelo Montañez - 1-25 My Smartphone tattles: Considering Popularity of Messages in Opportunistic Data Dissemination
by Asanga Udugama & Jens Dede & Anna Förster & Vishnupriya Kuppusamy & Koojana Kuladinithi & Andreas Timm-Giel & Zeynep Vatandas