Content
February 2019, Volume 11, Issue 2
- 1-10 Vehicle Politeness in Driving Situations
by Jae-Gil Lee & Kwan Min Lee & Seoung-Ho Ryu - 1-12 Tooth-Marked Tongue Recognition Using Gradient-Weighted Class Activation Maps
by Yue Sun & Songmin Dai & Jide Li & Yin Zhang & Xiaoqiang Li - 1-12 Efficient Tensor Sensing for RF Tomographic Imaging on GPUs
by Da Xu & Tao Zhang - 1-12 Joint Optimal Power Allocation and Relay Selection Scheme in Energy Harvesting Two-Way Relaying Network
by Xin Song & Siyang Xu & Zhigang Xie & Xiuwei Han - 1-12 A Multi-Agent Architecture for Data Analysis
by Gianfranco Lombardo & Paolo Fornacciari & Monica Mordonini & Michele Tomaiuolo & Agostino Poggi - 1-12 Embedded Deep Learning for Ship Detection and Recognition
by Hongwei Zhao & Weishan Zhang & Haoyun Sun & Bing Xue - 1-13 Interoperability of the Time of Industry 4.0 and the Internet of Things
by Francesco Lelli - 1-13 A Fusion Load Disaggregation Method Based on Clustering Algorithm and Support Vector Regression Optimization for Low Sampling Data
by Quanbo Yuan & Huijuan Wang & Botao Wu & Yaodong Song & Hejia Wang - 1-14 Sentiment Analysis Based Requirement Evolution Prediction
by Lingling Zhao & Anping Zhao - 1-17 A Scheme to Design Community Detection Algorithms in Various Networks
by Haoye Lu & Amiya Nayak - 1-17 3D-CNN-Based Fused Feature Maps with LSTM Applied to Action Recognition
by Sheeraz Arif & Jing Wang & Tehseen Ul Hassan & Zesong Fei - 1-18 Autonomic Network Management and Cross-Layer Optimization in Software Defined Radio Environments
by Adamantia Stamou & Grigorios Kakkavas & Konstantinos Tsitseklis & Vasileios Karyotis & Symeon Papavassiliou - 1-19 Contribution of the Web of Things and of the Opportunistic Computing to the Smart Agriculture: A Practical Experiment
by Lionel Touseau & Nicolas Le Sommer - 1-19 Consistency Models of NoSQL Databases
by Miguel Diogo & Bruno Cabral & Jorge Bernardino - 1-20 Research on a Support System for Automatic Ship Navigation in Fairway
by Van Suong Nguyen - 1-20 BlackWatch: Increasing Attack Awareness within Web Applications
by Calum C. Hall & Lynsay A. Shepherd & Natalie Coull - 1-21 Minimum Viable Products for Internet of Things Applications: Common Pitfalls and Practices
by Anh Nguyen-Duc & Khan Khalid & Sohaib Shahid Bajwa & Tor Lønnestad - 1-22 Audio-Visual Genres and Polymediation in Successful Spanish YouTubers
by Lorenzo J. Torres Hortelano - 1-26 Percolation and Internet Science
by Franco Bagnoli & Emanuele Bellini & Emanuele Massaro & Raúl Rechtman - 1-31 Fog vs. Cloud Computing: Should I Stay or Should I Go?
by Flávia Pisani & Vanderson Martins do Rosario & Edson Borin - 1-40 A Mathematical Model for Efficient and Fair Resource Assignment in Multipath Transport
by Andreas Könsgen & Md. Shahabuddin & Amanpreet Singh & Anna Förster
January 2019, Volume 11, Issue 1
- 1-5 Acknowledgement to Reviewers of Future Internet in 2018
by Future Internet Editorial Office - 1-12 An Agent Based Model to Analyze the Bitcoin Mining Activity and a Comparison with the Gold Mining Industry
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-13 Adaptive Downward/Upward Routing Protocol for Mobile-Sensor Networks
by Jinpeng Wang & Gérard Chalhoub & Michel Misson - 1-13 An Explorative Model to Assess Individuals’ Phubbing Risk
by Andrea Guazzini & Mirko Duradoni & Ambra Capelli & Patrizia Meringolo - 1-14 Object Detection Network Based on Feature Fusion and Attention Mechanism
by Ying Zhang & Yimin Chen & Chen Huang & Mingke Gao - 1-15 Application of a Non-Immersive VR, IoT Based Approach to Help Moroccan Students Carry Out Practical Activities in a Personal Learning Style
by Mohamed Fahim & Brahim Ouchao & Abdeslam Jakimi & Lahcen El Bermi - 1-15 Joint Uplink and Downlink Resource Allocation for D2D Communications System
by Xin Song & Xiuwei Han & Yue Ni & Li Dong & Lei Qin - 1-16 Forward-Looking Element Recognition Based on the LSTM-CRF Model with the Integrity Algorithm
by Dong Xu & Ruping Ge & Zhihua Niu - 1-16 Simple and Efficient Computational Intelligence Strategies for Effective Collaborative Decisions
by Emelia Opoku Aboagye & Rajesh Kumar - 1-17 THBase: A Coprocessor-Based Scheme for Big Trajectory Data Management
by Jiwei Qin & Liangli Ma & Jinghua Niu - 1-17 Multi-Topology Routing Algorithms in SDN-Based Space Information Networks
by Xiangli Meng & Lingda Wu & Shaobo Yu - 1-17 ESCAPE: Evacuation Strategy through Clustering and Autonomous Operation in Public Safety Systems
by Georgios Fragkos & Pavlos Athanasios Apostolopoulos & Eirini Eleni Tsiropoulou - 1-17 Improved Arabic–Chinese Machine Translation with Linguistic Input Features
by Fares Aqlan & Xiaoping Fan & Abdullah Alqwbani & Akram Al-Mansoub - 1-20 A Crowdsensing Platform for Monitoring of Vehicular Emissions: A Smart City Perspective
by Marianne Silva & Gabriel Signoretti & Julio Oliveira & Ivanovitch Silva & Daniel G. Costa - 1-20 Smart System for Prediction of Accurate Surface Electromyography Signals Using an Artificial Neural Network
by Osama Dorgham & Ibrahim Al-Mherat & Jawdat Al-Shaer & Sulieman Bani-Ahmad & Stephen Laycock - 1-23 A Reinforcement Learning Based Intercell Interference Coordination in LTE Networks
by Djorwé Témoa & Anna Förster & Kolyang & Serge Doka Yamigno - 1-23 Surveying Human Habit Modeling and Mining Techniques in Smart Spaces
by Francesco Leotta & Massimo Mecella & Daniele Sora & Tiziana Catarci - 1-42 MAC Layer Protocols for Internet of Things: A Survey
by Luiz Oliveira & Joel J. P. C. Rodrigues & Sergei A. Kozlov & Ricardo A. L. Rabêlo & Victor Hugo C. de Albuquerque
December 2018, Volume 11, Issue 1
- 1-15 A Framework for Improving the Engagement of Medical Practitioners in an E-Training Platform for Tuberculosis Care and Prevention
by Syed Mustafa Ali & Ana Filomena Curralo & Maged N. Kamel Boulos & Sara Paiva - 1-15 Layer-Wise Compressive Training for Convolutional Neural Networks
by Matteo Grimaldi & Valerio Tenace & Andrea Calimera - 1-16 A Real Case of Implementation of the Future 5G City
by Dania Marabissi & Lorenzo Mucchi & Romano Fantacci & Maria Rita Spada & Fabio Massimiani & Andrea Fratini & Giorgio Cau & Jia Yunpeng & Lucio Fedele - 1-19 Broadening Understanding on Managing the Communication Infrastructure in Vehicular Networks: Customizing the Coverage Using the Delta Network
by Cristiano M. Silva & Lucas D. Silva & Leonardo A. L. Santos & João F. M. Sarubbi & Andreas Pitsillides - 1-19 Forecasting E-Commerce Products Prices by Combining an Autoregressive Integrated Moving Average (ARIMA) Model and Google Trends Data
by Salvatore Carta & Andrea Medda & Alessio Pili & Diego Reforgiato Recupero & Roberto Saia - 1-20 Harnessing machine learning for fiber-induced nonlinearity mitigation in long-haul coherent optical OFDM
by Elias Giacoumidis & Yi Lin & Jinlong Wei & Ivan Aldaya & Athanasios Tsokanos & Liam P. Barry - 1-22 Security Risk Analysis of LoRaWAN and Future Directions
by Ismail Butun & Nuno Pereira & Mikael Gidlund
November 2018, Volume 10, Issue 12
- 1-11 Video-Based Human Action Recognition Using Spatial Pyramid Pooling and 3D Densely Convolutional Networks
by Wanli Yang & Yimin Chen & Chen Huang & Mingke Gao - 1-11 A Bi-Directional LSTM-CNN Model with Attention for Aspect-Level Text Classification
by Yonghua Zhu & Xun Gao & Weilin Zhang & Shenkai Liu & Yuanyuan Zhang - 1-11 DSP-Based 40 GB/s Lane Rate Next-Generation Access Networks
by Jinlong Wei & Ji Zhou & Elias Giacoumidis & Paul A. Haigh & Jianming Tang - 1-12 Privacy and Security Issues in Online Social Networks
by Shaukat Ali & Naveed Islam & Azhar Rauf & Ikram Ud Din & Mohsen Guizani & Joel J. P. C. Rodrigues - 1-13 A Personalized Recommendation Algorithm Based on the User’s Implicit Feedback in E-Commerce
by Bo Wang & Feiyue Ye & Jialu Xu - 1-16 Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices
by Jithin R & Priya Chandran
December 2018, Volume 10, Issue 12
- 1-12 Bidirectional Recurrent Neural Network Approach for Arabic Named Entity Recognition
by Mohammed N. A. Ali & Guanzheng Tan & Aamir Hussain - 1-12 A Method for Filtering Pages by Similarity Degree based on Dynamic Programming
by Ziyun Deng & Tingqin He - 1-14 Personality and Reputation: A Complex Relationship in Virtual Environments
by Stefania Collodi & Sara Panerati & Enrico Imbimbo & Federica Stefanelli & Mirko Duradoni & Andrea Guazzini - 1-14 A Compact Printed Monopole Antenna for WiMAX/WLAN and UWB Applications
by Zubin Chen & Baijun Lu & Yanzhou Zhu & Hao Lv - 1-14 “Network Sentiment” Framework to Improve Security and Privacy for Smart Home
by Tommaso Pecorella & Laura Pierucci & Francesca Nizzi - 1-18 Exploiting JTAG and Its Mitigation in IOT: A Survey
by Gopal Vishwakarma & Wonjun Lee
November 2018, Volume 10, Issue 11
- 1-10 Intelligent Environment Monitoring System for University Laboratories
by Linbo Zhai & Wenwen Jiang - 1-12 Design and Implementation of a RFID Reader/Router in RFID-WSN Hybrid System
by Wusheng Ji & Li Li & Weiwei Zhou - 1-12 Chinese Text Classification Model Based on Deep Learning
by Yue Li & Xutao Wang & Pengjian Xu - 1-13 Neurologist Standard Classification of Facial Nerve Paralysis with Deep Neural Networks
by Anping Song & Zuoyu Wu & Xuehai Ding & Qian Hu & Xinyi Di - 1-13 Query Recommendation Using Hybrid Query Relevance
by Jialu Xu & Feiyue Ye - 1-15 Composting as a Service: A Real-World IoT Implementation
by Yannis Nikoloudakis & Spyridon Panagiotakis & Thrasivoulos Manios & Evangelos Markakis & Evangelos Pallis - 1-21 A Review of DSP-Based Enabling Technologies for Cloud Access Networks
by Roger Giddings & Xiao Duan & Ehab Al-Rawachy & Mingzhi Mao - 1-22 Quality of Experience in Cyber-Physical Social Systems Based on Reinforcement Learning and Game Theory
by Eirini Eleni Tsiropoulou & George Kousis & Athina Thanou & Ioanna Lykourentzou & Symeon Papavassiliou
October 2018, Volume 10, Issue 11
- 1-11 RFID Based Manufacturing Process of Cloud MES
by Chuang Wang & Xu’nan Chen & Abdel-Hamid Ali Soliman & Zhixiang Zhu - 1-21 Initial Coin Offerings and Agile Practices
by Simona Ibba & Andrea Pinna & Maria Ilaria Lunesu & Michele Marchesi & Roberto Tonelli - 1-27 An Integrated Platform for the Internet of Things Based on an Open Source Ecosystem
by YangQun Li
October 2018, Volume 10, Issue 10
- 1-18 The Optimization of Marine Diesel Engine Rotational Speed Control Process by Fuzzy Logic Control Based on Particle Swarm Optimization Algorithm
by Tien Anh Tran - 1-18 Agile Service Engineering in the Industrial Internet of Things
by Thomas Usländer & Thomas Batz - 1-18 An Environmentally Aware Scheme of Wireless Sensor Networks for Forest Fire Monitoring and Detection
by Yi-Han Xu & Qiu-Ya Sun & Yu-Tong Xiao - 1-19 A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems
by Isam A. Hussein & Basil H. Jasim & Ramzy S. Ali - 1-20 The Effect of Customer Participation Types on Online Recovery Satisfaction: A Mental Accounting Perspective
by Yu Zhang & Bingjia Shao - 1-22 Reframing HRI Design Opportunities for Social Robots: Lessons Learnt from a Service Robotics Case Study Approach Using UX for HRI
by Sara Khan & Claudio Germak - 1-37 Structured Data REST Protocol for End to End Data Mashup
by Prakash Narayan Hardaha & Shailendra Singh
September 2018, Volume 10, Issue 10
- 1-10 Influence of Crowd Participation Features on Mobile Edge Computing
by Peiyan Yuan & Xiaoxiao Pang & Xiaoyan Zhao - 1-10 Chinese Event Extraction Based on Attention and Semantic Features: A Bidirectional Circular Neural Network
by Yue Wu & Junyi Zhang - 1-14 Occlusion-Aware Unsupervised Learning of Monocular Depth, Optical Flow and Camera Pose with Geometric Constraints
by Qianru Teng & Yimin Chen & Chen Huang - 1-17 Proactive Caching at the Edge Leveraging Influential User Detection in Cellular D2D Networks
by Anwar Said & Syed Waqas Haider Shah & Hasan Farooq & Adnan Noor Mian & Ali Imran & Jon Crowcroft
August 2018, Volume 10, Issue 9
- 1-11 Using Noise Level to Detect Frame Repetition Forgery in Video Frame Rate Up-Conversion
by Yanli Li & Lala Mei & Ran Li & Changan Wu - 1-15 On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems
by Masoumeh Safkhani & Nasour Bagheri & Mahyar Shariat - 1-16 A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller
by Wentao Wang & Xuan Ke & Lingxia Wang
September 2018, Volume 10, Issue 9
- 1-10 Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers
by Samah Alshathri & Bogdan Ghita & Nathan Clarke - 1-12 Log Likelihood Ratio Based Relay Selection Scheme for Amplify and Forward Relaying with Three State Markov Channel
by Manish Sahajwani & Alok Jain & Radheyshyam Gamad - 1-17 Novel Cross-View Human Action Model Recognition Based on the Powerful View-Invariant Features Technique
by Sebastien Mambou & Ondrej Krejcar & Kamil Kuca & Ali Selamat - 1-17 v-Mapper: An Application-Aware Resource Consolidation Scheme for Cloud Data Centers
by Aaqif Afzaal Abbasi & Hai Jin - 1-19 Intelligent Communication in Wireless Sensor Networks
by Mostefa Bendjima & Mohammed Feham - 1-21 Predictive Power Management for Wind Powered Wireless Sensor Node
by Yin Wu & Bowen Li & Fuquan Zhang - 1-39 A Systematic Literature Review on Military Software Defined Networks
by Vasileios Gkioulos & Håkon Gunleifsen & Goitom Kahsay Weldehawaryat
August 2018, Volume 10, Issue 8
- 1-12 Motives for Instagram Use and Topics of Interest among Young Adults
by Yi-Ting Huang & Sheng-Fang Su - 1-14 A Fast and Lightweight Method with Feature Fusion and Multi-Context for Face Detection
by Lei Zhang & Xiaoli Zhi - 1-15 Joint AP Association and Bandwidth Allocation Optimization Algorithm in High-Dense WLANs
by Jianjun Lei & Jiarui Tao & Shanshan Yang - 1-15 SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
by Marcio Andrey Teixeira & Tara Salman & Maede Zolanvari & Raj Jain & Nader Meskin & Mohammed Samaka - 1-15 Queue Spillover Management in a Connected Vehicle Environment
by Chuanxiang Ren & Wenbo Zhang & Lingqiao Qin & Bo Sun - 1-16 A Hierarchical Mapping System for Flat Identifier to Locator Resolution Based on Active Degree
by Jianqiang Liu & Shuai Huo & Yi Wang - 1-18 Smart Collection of Real-Time Vehicular Mobility Traces
by Nisrine Ibadah & Khalid Minaoui & Mohammed Rziza & Mohammed Oumsis & César Benavente-Peces - 1-19 Predict and Forward: An Efficient Routing-Delivery Scheme Based on Node Profile in Opportunistic Networks
by Kanghuai Liu & Zhigang Chen & Jia Wu & Yutong Xiao & Heng Zhang - 1-30 Interactive 3D Exploration of RDF Graphs through Semantic Planes
by Fabio Viola & Luca Roffia & Francesco Antoniazzi & Alfredo D’Elia & Cristiano Aguzzi & Tullio Salmon Cinotti
July 2018, Volume 10, Issue 8
- 1-10 Multidiscipline Integrated Platform Based on Probabilistic Analysis for Manufacturing Engineering Processes
by Lijun Zhang & Kai Liu & Jian Liu - 1-14 A Watermark-Based In-Situ Access Control Model for Image Big Data
by Jinyi Guo & Wei Ren & Yi Ren & Tianqing Zhu - 1-15 Hybrid Approach with Improved Genetic Algorithm and Simulated Annealing for Thesis Sampling
by Shardrom Johnson & Jinwu Han & Yuanchen Liu & Li Chen & Xinlin Wu - 1-27 Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach
by Ludger Goeke & Nazila Gol Mohammadi & Maritta Heisel - 1-28 Internet of Nano-Things, Things and Everything: Future Growth Trends
by Mahdi H. Miraz & Maaruf Ali & Peter S. Excell & Richard Picking
July 2018, Volume 10, Issue 7
- 1-11 The GDPR beyond Privacy: Data-Driven Challenges for Social Scientists, Legislators and Policy-Makers
by Margherita Vestoso - 1-12 Towards Prediction of Immersive Virtual Reality Image Quality of Experience and Quality of Service
by Anil Kumar Karembai & Jeffrey Thompson & Patrick Seeling - 1-12 Dynamic Traffic Scheduling and Congestion Control across Data Centers Based on SDN
by Dong Sun & Kaixin Zhao & Yaming Fang & Jie Cui - 1-13 Performance Analysis of Hybrid Optical–Acoustic AUV Swarms for Marine Monitoring
by Chiara Lodovisi & Pierpaolo Loreti & Lorenzo Bracciale & Silvello Betti - 1-14 Personalised and Coordinated Demand-Responsive Feeder Transit Service Design: A Genetic Algorithms Approach
by Bo Sun & Ming Wei & Chunfeng Yang & Zhihuo Xu & Han Wang - 1-15 Enabling Trustworthy Multicast Wireless Services through D2D Communications in 5G Networks
by Sara Pizzi & Chiara Suraci & Leonardo Militano & Antonino Orsino & Antonella Molinaro & Antonio Iera & Giuseppe Araniti - 1-17 A Novel Two-Layered Reinforcement Learning for Task Offloading with Tradeoff between Physical Machine Utilization Rate and Delay
by Li Quan & Zhiliang Wang & Fuji Ren - 1-18 Network Measurement and Performance Analysis at Server Side
by Guang-Qian Peng & Guangtao Xue & Yi-Chao Chen
June 2018, Volume 10, Issue 7
- 1-14 Clock Recovery Challenges in DSP-Based Coherent Single-Mode and Multi-Mode Optical Systems
by Júlio César Medeiros Diniz & Francesco Da Ros & Darko Zibar - 1-17 Fuzzy Multi-Criteria Based Trust Management in Heterogeneous Federated Future Internet Testbeds
by Dimitrios Dechouniotis & Ioannis Dimolitsas & Konstantinos Papadakis-Vlachopapadopoulos & Symeon Papavassiliou - 1-19 Dynamic Cost-Aware Routing of Web Requests
by Gandhimathi Velusamy & Ricardo Lent - 1-20 Big Data Perspective and Challenges in Next Generation Networks
by Kashif Sultan & Hazrat Ali & Zhongshan Zhang
June 2018, Volume 10, Issue 6
- 1-9 A Privacy Preserving Framework for Worker’s Location in Spatial Crowdsourcing Based on Local Differential Privacy
by Jiazhu Dai & Keke Qiao - 1-10 Secure Inter-Frame Space Communications for Wireless LANs
by Il-Gu Lee - 1-12 On the Future of Legal Publishing Services in the Semantic Web
by Enrico Francesconi - 1-13 A Multiple Access Protocol Based on Gray Forecast for Satellite Network
by Chong Han & Zilong Li & Jian Zhou & Lijuan Sun & Siyu Chen - 1-14 A Driving Behavior Planning and Trajectory Generation Method for Autonomous Electric Bus
by Lingli Yu & Decheng Kong & Xiaoxin Yan - 1-15 Fairness and Trust in Virtual Environments: The Effects of Reputation
by Mirko Duradoni & Mario Paolucci & Franco Bagnoli & Andrea Guazzini - 1-15 StegNet: Mega Image Steganography Capacity with Deep Convolutional Network
by Pin Wu & Yang Yang & Xiaoqiang Li - 1-17 Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage
by Hongbin Yang & Shuxiong Jiang & Wenfeng Shen & Zhou Lei - 1-17 Simulating the Cost of Cooperation: A Recipe for Collaborative Problem-Solving
by Andrea Guazzini & Mirko Duradoni & Alessandro Lazzeri & Giorgio Gronchi - 1-18 A Novel Self-Adaptive VM Consolidation Strategy Using Dynamic Multi-Thresholds in IaaS Clouds
by Lei Xie & Shengbo Chen & Wenfeng Shen & Huaikou Miao - 1-33 A Tiered Control Plane Model for Service Function Chaining Isolation
by Håkon Gunleifsen & Vasileios Gkioulos & Thomas Kemmerich
May 2018, Volume 10, Issue 6
- 1-9 Studying Semi-TCP and Its Application in Marine Internet
by Liang Zhou & Sheng-Ming Jiang & Chen-Lin Xiong
April 2018, Volume 10, Issue 5
- 1-25 Ex Machina : Analytical platforms, Law and the Challenges of Computational Legal Science
by Nicola Lettieri & Antonio Altamura & Rosalba Giugno & Alfonso Guarino & Delfina Malandrino & Alfredo Pulvirenti & Francesco Vicidomini & Rocco Zaccagnino
May 2018, Volume 10, Issue 5
- 1-10 A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN
by Seyed Davoud Mousavi & Rasool Sadeghi & Mohamadreza Karimi & Erfan Karimian & Mohammad Reza Soltan Aghaei - 1-11 An EV Charging Scheduling Mechanism Based on Price Negotiation
by Baocheng Wang & Yafei Hu & Yu Xiao & Yi Li - 1-11 Botnet Detection Based On Machine Learning Techniques Using DNS Query Data
by Xuan Dau Hoang & Quynh Chi Nguyen - 1-18 MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers
by Jingsha He & Jianan Wu & Nafei Zhu & Muhammad Salman Pathan - 1-19 Route Availability as a Communication Quality Metric of a Mobile Ad Hoc Network
by Tamotsu Yashima & Kazumasa Takami - 1-20 Test Bed of Semantic Interaction of Smart Objects in the Web of Things
by Santiago Guerrero-Narváez & Miguel-Ángel Niño-Zambrano & Dalila-Jhoana Riobamba-Calvache & Gustavo-Adolfo Ramírez-González
April 2018, Volume 10, Issue 4
- 1-14 Replicas Strategy and Cache Optimization of Video Surveillance Systems Based on Cloud Storage
by Rongheng Li & Jian Zhang & Wenfeng Shen - 1-15 An Intelligent Content Prefix Classification Approach for Quality of Service Optimization in Information-Centric Networking
by Cutifa Safitri & Yoshihide Yamada & Sabariah Baharun & Shidrokh Goudarzi & Quang Ngoc Nguyen & Keping Yu & Takuro Sato - 1-16 Enhanced Matching Game for Decoupled Uplink Downlink Context-Aware Handover
by Asmae Ait Mansour & Nourddine Enneya & Mohamed Ouadou - 1-20 Development of a Social DTN for Message Communication between SNS Group Members
by Hidenori Takasuka & Koichi Hirai & Kazumasa Takami - 1-33 Dynamic Linked Data: A SPARQL Event Processing Architecture
by Luca Roffia & Paolo Azzoni & Cristiano Aguzzi & Fabio Viola & Francesco Antoniazzi & Tullio Salmon Cinotti
February 2018, Volume 10, Issue 3
- 1-18 SDN Based Collaborative Scheme for Mitigation of DDoS Attacks
by Sufian Hameed & Hassan Ahmed Khan - 1-21 Learning and Mining Player Motion Profiles in Physically Interactive Robogames
by Ewerton L. S. Oliveira & Davide Orrù & Luca Morreale & Tiago P. Nascimento & Andrea Bonarini
March 2018, Volume 10, Issue 3
- 1-3 Ecosystemic Evolution Fed by Smart Systems
by Dino Giuli - 1-9 Interference Management in Femtocells by the Adaptive Network Sensing Power Control Technique
by Tehseen Ul Hassan & Fei Gao & Babur Jalal & Sheeraz Arif - 1-13 TwinNet: A Double Sub-Network Framework for Detecting Universal Adversarial Perturbations
by Yibin Ruan & Jiazhu Dai - 1-14 How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0
by Virginia Pilloni - 1-15 Understanding How GitHub Supports Curation Repositories
by Yu Wu & Jessica Kropczynski & Raquel Prates & John M. Carroll - 1-15 Optimal Design of Demand-Responsive Feeder Transit Services with Passengers’ Multiple Time Windows and Satisfaction
by Bo Sun & Ming Wei & Senlai Zhu - 1-24 Security Awareness in Software-Defined Multi-Domain 5G Networks
by Jani Suomalainen & Kimmo Ahola & Mikko Majanen & Olli Mämmelä & Pekka Ruuska - 1-26 A Statistical Analysis of Industrial Penetration and Internet Intensity in Taiwan
by Chia-Lin Chang & Michael McAleer & Yu-Chieh Wu
January 2018, Volume 10, Issue 2
- 1-2 Announcing the 2018 Future Internet Travel Award for PhD Students
by Dino Giuli - 1-11 The Improved Adaptive Silence Period Algorithm over Time-Variant Channels in the Cognitive Radio System
by Jingbo Zhang & Zhenyang Sun & Shufang Zhang - 1-15 A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment
by Irshad Ahmed Abbasi & Adnan Shahid Khan - 1-17 Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications
by Pierpaolo Loreti & Lorenzo Bracciale & Alberto Caponi
February 2018, Volume 10, Issue 2
- 1-3 Security and Privacy in Wireless and Mobile Networks
by Georgios Kambourakis & Felix Gomez Marmol & Guojun Wang - 1-6 Robotics Construction Kits: From “Objects to Think with” to “Objects to Think and to Emote with”
by Antonella D’Amico & Domenico Guastella - 1-16 An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs
by Muhammad Salman Pathan & Nafei Zhu & Jingsha He & Zulfiqar Ali Zardari & Muhammad Qasim Memon & Muhammad Iftikhar Hussain - 1-16 Virtual Career Fairs: Perspectives from Norwegian Recruiters and Exhibitors
by Ådne Stenberg Vik & Bjørn Christian Nørbech & Debora Jeske - 1-16 Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough?
by Valentina Gatteschi & Fabrizio Lamberti & Claudio Demartini & Chiara Pranteda & Víctor Santamaría - 1-17 Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks
by Blerim Rexha & Gresa Shala & Valon Xhafa - 1-19 Smart Pedestrian Crossing Management at Traffic Light Junctions through a Fuzzy-Based Approach
by Giovanni Pau & Tiziana Campisi & Antonino Canale & Alessandro Severino & Mario Collotta & Giovanni Tesoriere
January 2018, Volume 10, Issue 1
- 1-3 Recent Advances on Cellular D2D Communications
by Boon-Chong Seet & Syed Faraz Hasan & Peter Han-Joo Chong - 1-5 Acknowledgement to Reviewers of Future Internet in 2017
by Future Internet Editorial Office - 1-14 A Decision Framework for Choosing Telecommunication Technologies in Limited-Resource Settings
by Suzana Brown & Alan Mickelson - 1-14 A Velocity-Aware Handover Trigger in Two-Tier Heterogeneous Networks
by Asmae Ait Mansour & Nourddine Enneya & Mohamed Ouadou - 1-15 An Anonymous Offline RFID Grouping-Proof Protocol
by Zhibin Zhou & Pin Liu & Qin Liu & Guojun Wang - 1-16 Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks
by Wenjuan Li & Weizhi Meng & Lam For Kwok - 1-18 Review of Latest Advances in 3GPP Standardization: D2D Communication in 5G Systems and Its Energy Consumption Models
by Marko Höyhtyä & Olli Apilo & Mika Lasanen - 1-23 Elastic Scheduling of Scientific Workflows under Deadline Constraints in Cloud Computing Environments
by Nazia Anwar & Huifang Deng - 1-30 A Virtual Learning Architecture Enhanced by Fog Computing and Big Data Streams
by Riccardo Pecori
December 2017, Volume 10, Issue 1
- 1-17 A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs
by Rezvan Almas Shehni & Karim Faez & Farshad Eshghi & Manoochehr Kelarestaghi
December 2017, Volume 9, Issue 4
- 1-13 Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications
by Francesco Chiti & Romano Fantacci & Laura Pierucci - 1-18 SCMC: An Efficient Scheme for Minimizing Energy in WSNs Using a Set Cover Approach
by Ahmed Redha Mahlous - 1-23 Approximate Networking for Universal Internet Access
by Junaid Qadir & Arjuna Sathiaseelan & Umar Bin Farooq & Muhammad Usama & Muhammad Ali Imran & Muhammad Shafique - 1-24 How 5G Wireless (and Concomitant Technologies) Will Revolutionize Healthcare?
by Siddique Latif & Junaid Qadir & Shahzad Farooq & Muhammad Ali Imran
October 2017, Volume 9, Issue 4
- 1-10 Signal Consensus in TSP of the Same Grid in Road Network
by Dongyuan Li & Chengshuai Li & Zidong Wang & Deqiang Wang & Jianping Xing & Bo Zhang - 1-11 Deep Classifiers-Based License Plate Detection, Localization and Recognition on GPU-Powered Mobile Platform
by Syed Tahir Hussain Rizvi & Denis Patti & Tomas Björklund & Gianpiero Cabodi & Gianluca Francini - 1-12 A Practical Resource Management Scheme for Cellular Underlaid D2D Networks
by Tae-Won Ban - 1-12 Collaborative Web Service Discovery and Recommendation Based on Social Link
by Lijun Duan & Hao Tian - 1-13 SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning
by Dalal Hanna & Prakash Veeraraghavan & Ben Soh - 1-14 Challenges When Using Jurimetrics in Brazil—A Survey of Courts
by Bruna Armonas Colombo & Pedro Buck & Vinicius Miana Bezerra - 1-16 IAACaaS: IoT Application-Scoped Access Control as a Service
by Álvaro Alonso & Federico Fernández & Lourdes Marco & Joaquín Salvachúa - 1-17 Exploring Data Model Relations in OpenStreetMap
by Hippolyte Pruvost & Peter Mooney - 1-18 An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing
by A S M Touhidul Hasan & Qingshan Jiang & Chengming Li - 1-20 A Design Space for Virtuality-Introduced Internet of Things
by Kota Gushima & Tatsuo Nakajima - 1-21 FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios
by Franco Mazzenga & Romeo Giuliano & Francesco Vatalaro - 1-25 An Integrated Dictionary-Learning Entropy-Based Medical Image Fusion Framework
by Guanqiu Qi & Jinchuan Wang & Qiong Zhang & Fancheng Zeng & Zhiqin Zhu
September 2017, Volume 9, Issue 4
- 1-12 Botnet Detection Technology Based on DNS
by Xingguo Li & Junfeng Wang & Xiaosong Zhang - 1-17 Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images
by Xiaoyan Yu & Chengyou Wang & Xiao Zhou - 1-20 Extensions and Enhancements to “the Secure Remote Update Protocol”
by Andrew John Poulter & Steven J. Johnson & Simon J. Cox - 1-21 Energy-Aware Adaptive Weighted Grid Clustering Algorithm for Renewable Wireless Sensor Networks
by Nelofar Aslam & Kewen Xia & Muhammad Tafseer Haider & Muhammad Usman Hadi - 1-21 Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
by Davy Preuveneers & Wouter Joosen - 1-22 TSKT-ORAM: A Two-Server k -ary Tree Oblivious RAM without Homomorphic Encryption
by Jinsheng Zhang & Qiumao Ma & Wensheng Zhang & Daji Qiao
November 2017, Volume 9, Issue 4
- 1-12 Efficient Traffic Engineering Strategies for Improving the Performance of TCP Friendly Rate Control Protocol
by Nalavala Ramanjaneya Reddy & Pakanati Chenna Reddy & Mokkala Padmavathamma - 1-12 Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission
by Fan Jiang & Honglin Wang & Hao Ren & Shuai Xu - 1-13 Understanding the Digital Marketing Environment with KPIs and Web Analytics
by José Ramón Saura & Pedro Palos-Sánchez & Luis Manuel Cerdá Suárez - 1-13 Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System
by Jingbo Zhang & Lili Cai & Shufang Zhang - 1-13 High-Performance Elastic Management for Cloud Containers Based on Predictive Message Scheduling
by Chengxin Yan & Ningjiang Chen & Zhang Shuo