Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 11, issue 12, 2019
- Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment pp. 1-15

- Zakariae Belghazi, Nabil Benamar, Adnane Addaim and Chaker Abdelaziz Kerrache
- SEO inside Newsrooms: Reports from the Field pp. 1-15

- Dimitrios Giomelakis, Christina Karypidou and Andreas Veglis
- Partial Pre-Emphasis for Pluggable 400 G Short-Reach Coherent Systems pp. 1-10

- Ahmad Abdo, Xueyang Li, Md Samiul Alam, Mahdi Parvizi, Naim Ben-Hamida, Claude D’Amours and David Plant
- Performance Analysis of On-Demand Scheduling with and without Network Coding in Wireless Broadcast pp. 1-24

- G. G. Md. Nawaz Ali, Victor C. S. Lee, Yuxuan Meng, Peter H. J. Chong and Jun Chen
- A Method of Node Layout of a Complex Network Based on Community Compression pp. 1-12

- Chengxiang Liu, Wei Xiong, Xitao Zhang and Zheng Liu
- Reinforcement Learning Based Query Routing Approach for P2P Systems pp. 1-12

- Fawaz Alanazi and Taoufik Yeferny
- Spectrum Management Schemes for Internet of Remote Things (IoRT) Devices in 5G Networks via GEO Satellite pp. 1-14

- Gbolahan Aiyetoro and Pius Owolawi
- Real-Time Stream Processing in Social Networks with RAM 3 S pp. 1-16

- Ilaria Bartolini and Marco Patella
- Research on Community Detection of Online Social Network Members Based on the Sparse Subspace Clustering Approach pp. 1-16

- Zihe Zhou and Bo Tian
- Blockchain: Current Challenges and Future Prospects/Applications pp. 1-16

- Spyros Makridakis and Klitos Christodoulou
- An Efficient Dynamic Load Balancing Scheme Based on Nash Bargaining in SDN pp. 1-18

- Guoyan Li, Kaixin Li, Yi Liu and Yuheng Pan
- A Review of Internet of Things Technologies for Ambient Assisted Living Environments pp. 1-23

- Rytis Maskeliūnas, Robertas Damaševičius and Sagiv Segal
- Acquiring Ontology Axioms through Mappings to Data Sources pp. 1-23

- Floriana Di Pinto, Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini and Riccardo Rosati
- Learning Dynamic Factors to Improve the Accuracy of Bus Arrival Time Prediction via a Recurrent Neural Network pp. 1-11

- Xin Zhou, Peixin Dong, Jianping Xing and Peijia Sun
- Dependable and Secure Voting Mechanism in Edge Computing pp. 1-11

- Pedro A.R.S. Costa and Marko Beko
- A Deep Ensemble Learning Method for Effort-Aware Just-In-Time Defect Prediction pp. 1-13

- Saleh Albahli
- A Novel Neural Network-Based Method for Medical Text Classification pp. 1-13

- Li Qing, Weng Linhong and Ding Xuehai
- The Missing Link to Computational Thinking pp. 1-13

- Michael Pollak and Martin Ebner
Volume 11, issue 11, 2019
- Roll Motion Prediction of Unmanned Surface Vehicle Based on Coupled CNN and LSTM pp. 1-15

- Wenjie Zhang, Pin Wu, Yan Peng and Dongke Liu
- High-Level Smart Decision Making of a Robot Based on Ontology in a Search and Rescue Scenario pp. 1-20

- Xiaolei Sun, Yu Zhang and Jing Chen
- A Context-Aware Conversational Agent in the Rehabilitation Domain pp. 1-20

- Thanassis Mavropoulos, Georgios Meditskos, Spyridon Symeonidis, Eleni Kamateri, Maria Rousi, Dimitris Tzimikas, Lefteris Papageorgiou, Christos Eleftheriadis, George Adamopoulos, Stefanos Vrochidis and Ioannis Kompatsiaris
- Research on Cooperative Communication Strategy and Intelligent Agent Directional Source Grouping Algorithms for Internet of Things pp. 1-20

- Yongyan Zou, Yanzhi Zhang and Xin Yi
- Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes pp. 1-20

- Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Dimitris Kavroudakis and Stefanos Gritzalis
- Multimedia Independent Multipath Routing Algorithms for Internet of Things Based on a Node Hidden Communication Model pp. 1-20

- Cong Wu and Jianhui Yang
- Academic Excellence, Website Quality, SEO Performance: Is there a Correlation? pp. 1-25

- Andreas Giannakoulopoulos, Nikos Konstantinou, Dimitris Koutsompolis, Minas Pergantis and Iraklis Varlamis
- Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics pp. 1-12

- Majid Ashouri, Fabian Lorig, Paul Davidsson and Romina Spalazzese
- Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets pp. 1-24

- Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris and Georgios Theodoridis
- Machine Learning-Based Patient Load Prediction and IoT Integrated Intelligent Patient Transfer Systems pp. 1-24

- Kambombo Mtonga, Santhi Kumaran, Chomora Mikeka, Kayalvizhi Jayavel and Jimmy Nsenga
- Feature Fusion Text Classification Model Combining CNN and BiGRU with Multi-Attention Mechanism pp. 1-24

- Jingren Zhang, Fang’ai Liu, Weizhi Xu and Hui Yu
- Integration of LTE 230 and LTE 1800 in Power Wireless Private Networks pp. 1-16

- Zhengyang Ding, Weiwei Miao, Mingxuan Zhang, Wei Li, Rui Liu, Jun Zou and Chen Xu
- Reputation-Based Trust Approaches in Named Data Networking pp. 1-17

- Ioanna Angeliki Kapetanidou, Christos-Alexandros Sarros and Vassilis Tsaoussidis
- Impacts of Video Display on Purchase Intention for Digital and Home Appliance Products—Empirical Study from China pp. 1-19

- Ruohong Hao, Bingjia Shao and Rong Ma
- Special Issue “New Perspectives in Intelligent Transportation Systems and Mobile Communications towards a Smart Cities Context” pp. 1-3

- Giovanni Pau, Alessandro Severino and Antonino Canale
- Operation Scheduling Optimization for Microgrids Considering Coordination of Their Components pp. 1-11

- Hirotaka Takano, Ryota Goto, Thin Zar Soe, Nguyen Duc Tuyen and Hiroshi Asano
- IoT Based Smart City Bus Stops pp. 1-11

- Miraal Kamal, Manal Atif, Hafsa Mujahid, Tamer Shanableh, A. R. Al-Ali and Ahmad Al Nabulsi
- Software Architecture for Mobile Cloud Computing Systems pp. 1-35

- Abdulrahman Alreshidi, Aakash Ahmad, Ahmed B. Altamimi, Khalid Sultan and Rashid Mehmood
- Fog Computing in IoT Smart Environments via Named Data Networking: A Study on Service Orchestration Mechanisms pp. 1-21

- Marica Amadeo, Giuseppe Ruggeri, Claudia Campolo, Antonella Molinaro, Valeria Loscrí and Carlos T. Calafate
- Predicting Rogue Content and Arabic Spammers on Twitter pp. 1-21

- Adel R. Alharbi and Amer Aljaedi
- FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing pp. 1-13

- Yuling Chen, Jinyi Guo, Changlou Li and Wei Ren
- Name-Based Security for Information-Centric Networking Architectures pp. 1-13

- Nikos Fotiou and George C. Polyzos
- Body-to-Body Cooperation in Internet of Medical Things: Toward Energy Efficiency Improvement pp. 1-13

- Dalal Abdulmohsin Hammood, Hasliza A. Rahim, Ahmed Alkhayyat and R. Badlishah Ahmad
- Wideband Spectrum Sensing Based on Reconfigurable Filter Bank in Cognitive Radio pp. 1-13

- Huan Wang, Bin Wu, Yuancheng Yao and Mingwei Qin
- Pedestrian Attribute Recognition with Graph Convolutional Network in Surveillance Scenarios pp. 1-13

- Xiangpeng Song, Hongbin Yang and Congcong Zhou
Volume 11, issue 10, 2019
- Joint Optimization of Pico-Base-Station Density and Transmit Power for an Energy-Efficient Heterogeneous Cellular Network pp. 1-11

- Jie Yang, Ziyu Pan, Hengfei Xu and Han Hu
- Partitioning Convolutional Neural Networks to Maximize the Inference Rate on Constrained IoT Devices pp. 1-30

- Fabíola Martins Campos de Oliveira and Edson Borin
- Adaptive Coherent Receiver Settings for Optimum Channel Spacing in Gridless Optical Networks pp. 1-13

- Ahmad Abdo, Sadok Aouini, Bilal Riaz, Naim Ben-Hamida and Claude D’Amours
- A Survey on LoRaWAN Architecture, Protocol and Technologies pp. 1-34

- Mehmet Ali Ertürk, Muhammed Ali Aydın, Muhammet Talha Büyükakkaşlar and Hayrettin Evirgen
- Beam Training for Millimeter-Wave Communication Based on Tabu Table Enhanced Rosenbrock Algorithm pp. 1-16

- Xiaoyu Li, Changyin Sun and Fan Jiang
- Assessing the Techno-Economic Benefits of Flexible Demand Resources Scheduling for Renewable Energy–Based Smart Microgrid Planning pp. 1-16

- Mark Kipngetich Kiptoo, Oludamilare Bode Adewuyi, Mohammed Elsayed Lotfy, Theophilus Amara, Keifa Vamba Konneh and Tomonobu Senjyu
- No-Reference Depth Map Quality Evaluation Model Based on Depth Map Edge Confidence Measurement in Immersive Video Applications pp. 1-18

- Safak Dogan, Nasser Haddad, Erhan Ekmekcioglu and Ahmet M. Kondoz
- Time and Power Allocation for Energy Efficiency Maximization in Wireless-Powered Full-Duplex Relay Systems pp. 1-18

- Xin Song, Yue Ni, Xiuwei Han, Lei Qin and Li Dong
- Threat Analysis for Smart Homes pp. 1-19

- Georgios Kavallieratos, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos and Stephen Wolthusen
- 5G V2X System-Level Architecture of 5GCAR Project pp. 1-26

- Massimo Condoluci, Laurent Gallo, Laurent Mussot, Apostolos Kousaridas, Panagiotis Spapis, Maliheh Mahlouji and Toktam Mahmoodi
- Blockchain and the Tokenization of the Individual: Societal Implications pp. 1-12

- Monique J. Morrow and Mehran Zarrebini
- Blockchain Technology for Intelligent Environments pp. 1-24

- Spyros Voulgaris, Nikos Fotiou, Vasilios A. Siris, George C. Polyzos, Mikael Jaatinen and Yannis Oikonomidis
- Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things pp. 1-24

- Johannes Kölsch, Christopher Heinz, Axel Ratzke and Christoph Grimm
- About Linda Again: How Narratives and Group Reasoning Can Influence Conjunction Fallacy pp. 1-14

- Camillo Donati, Andrea Guazzini, Giorgio Gronchi and Andrea Smorti
- Low Delay Inter-Packet Coding in Vehicular Networks pp. 1-22

- Irina Bocharova, Boris Kudryashov, Nikita Lyamin, Erik Frick, Maben Rabi and Alexey Vinel
- A Trustworthy Communication Hub for Cyber-Physical Systems pp. 1-38

- Juhani Latvakoski and Jouni Heikkinen
- Sensorial Network Framework Embedded in Ubiquitous Mobile Devices pp. 1-20

- Miroslav Behan, Ondrej Krejcar, Thabit Sabbah and Ali Selamat
Volume 11, issue 9, 2019
- A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains pp. 1-21

- Håkon Gunleifsen, Thomas Kemmerich and Vasileios Gkioulos
- ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing pp. 1-21

- Masky Mackita, Soo-Young Shin and Tae-Young Choe
- Evaluating the Degree of Uncertainty of Research Activities in Industry 4.0 pp. 1-21

- Sirio Cividino, Gianluca Egidi, Ilaria Zambon and Andrea Colantoni
- Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations pp. 1-21

- Wei Sun, Shiwei Wei, Huaping Guo and Hongbing Liu
- Ranking by Relevance and Citation Counts, a Comparative Study: Google Scholar, Microsoft Academic, WoS and Scopus pp. 1-21

- Cristòfol Rovira, Lluís Codina, Frederic Guerrero-Solé and Carlos Lopezosa
- SEO Practices: A Study about the Way News Websites Allow the Users to Comment on Their News Articles pp. 1-13

- Minos-Athanasios Karyotakis, Evangelos Lamprou, Matina Kiourexidou and Nikos Antonopoulos
- Deep Learning-Based Sentimental Analysis for Large-Scale Imbalanced Twitter Data pp. 1-13

- Nasir Jamal, Chen Xianqiao and Hamza Aldabbas
- Incorporating Background Checks with Sentiment Analysis to Identify Violence Risky Chinese Microblogs pp. 1-13

- Yun-Fei Jia, Shan Li and Renbiao Wu
- Vehicular Delay-Tolerant Networks with Image Recognition-Based Adaptive Array Antenna for Winter Road Surveillance in Local Areas pp. 1-13

- Noriki Uchida, Goshi Sato and Yoshitaka Shibata
- An Ontology-Based Recommender System with an Application to the Star Trek Television Franchise pp. 1-23

- Paul Sheridan, Mikael Onsjö, Claudia Becerra, Sergio Jimenez and George Dueñas
- Social Network Services Management and Risk of Doocing. Comment on Kim, S.; Park, H.; Choi, M.J. “Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations. Future Internet 2019, 11, 137” pp. 1-3

- Stefania Fantinelli and Michela Cortini
- A Framework for the Detection of Search and Rescue Patterns Using Shapelet Classification pp. 1-19

- Konstantinos Kapadais, Iraklis Varlamis, Christos Sardianos and Konstantinos Tserpes
- Enhancing the 3GPP V2X Architecture with Information-Centric Networking pp. 1-19

- Marica Amadeo, Claudia Campolo, Antonella Molinaro, Jerome Harri, Christian Esteve Rothenberg and Alexey Vinel
- Research on SWIM Services Dynamic Migration Method pp. 1-18

- Zhijun Wu, Shengyan Zhou, Liang Liu and Jin Lei
- Mobility-Enabled Edge Server Selection for Multi-User Composite Services pp. 1-17

- Wenming Zhang, Yiwen Zhang, Qilin Wu and Kai Peng
- Satellite Integration into 5G: Accent on First Over-The-Air Tests of an Edge Node Concept with Integrated Satellite Backhaul pp. 1-17

- Florian Völk, Konstantinos Liolis, Marius Corici, Joe Cahill, Robert T. Schwarz, Thomas Schlichter, Eric Troudt and Andreas Knopp
- RFID Based Embedded System for Sustainable Food Management in an IoT Network Paradigm pp. 1-16

- Raúl Parada, Alfonso Palazón, Carlos Monzo and Joan Melià-Seguí
- Sustainable Communication Systems: A Graph-Labeling Approach for Cellular Frequency Allocation in Densely-Populated Areas pp. 1-14

- Adebola Orogun, Oluwaseun Fadeyi and Ondrej Krejcar
- 25 Years of Bluetooth Technology pp. 1-24

- Sherali Zeadally, Farhan Siddiqui and Zubair Baig
- MU R-CNN: A Two-Dimensional Code Instance Segmentation Network Based on Deep Learning pp. 1-25

- Baoxi Yuan, Yang Li, Fan Jiang, Xiaojie Xu, Yingxia Guo, Jianhua Zhao, Deyue Zhang, Jianxin Guo and Xiaoli Shen
- An Improved Method for Named Entity Recognition and Its Application to CEMR pp. 1-15

- Ming Gao, Qifeng Xiao, Shaochun Wu and Kun Deng
- Dynamic Group Recommendation Based on the Attention Mechanism pp. 1-15

- Haiyan Xu, Yanhui Ding, Jing Sun, Kun Zhao and Yuanjian Chen
Volume 11, issue 8, 2019
- Social Emotional Opinion Decision with Newly Coined Words and Emoticon Polarity of Social Networks Services pp. 1-14

- Jin Sol Yang, Myung-Sook Ko and Kwang Sik Chung
- Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers pp. 1-14

- Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Tingting Yuan and Xiaoyong Li
- Mars to Earth Data Downloading: A Directory Synchronization Approach pp. 1-14

- Marco Bertolazzi and Carlo Caini
- A Systematic Analysis of Real-World Energy Blockchain Initiatives pp. 1-14

- Peter O’Donovan and Dominic T. J. O’Sullivan
- A Novel Task Caching and Migration Strategy in Multi-Access Edge Computing Based on the Genetic Algorithm pp. 1-14

- Lujie Tang, Bing Tang, Linyao Kang and Li Zhang
- Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications pp. 1-15

- Konstantinos Sgantzos and Ian Grigg
- Scheduling for Multi-User Multi-Input Multi-Output Wireless Networks with Priorities and Deadlines pp. 1-20

- Li-on Raviv and Amir Leshem
- A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System pp. 1-8

- Saumendra Sengupta, Chen-Fu Chiang, Bruno Andriamanalimanana, Jorge Novillo and Ali Tekeoglu
- Energy Efficient Communications for Reliable IoT Multicast 5G/Satellite Services pp. 1-13

- Francesco Chiti, Romano Fantacci and Laura Pierucci
- Research on Factors Affecting Solvers’ Participation Time in Online Crowdsourcing Contests pp. 1-13

- Keng Yang
- RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning pp. 1-13

- Yong Fang, Cheng Huang, Yijia Xu and Yang Li
- Impact of Modern Virtualization Methods on Timing Precision and Performance of High-Speed Applications pp. 1-23

- Veronika Kirova, Kirill Karpov, Eduard Siemens, Irina Zander, Oksana Vasylenko, Dmitry Kachan and Sergii Maksymov
- Combined Self-Attention Mechanism for Chinese Named Entity Recognition in Military pp. 1-11

- Fei Liao, Liangli Ma, Jingjing Pei and Linshan Tan
- Artificial Intelligence Imagery Analysis Fostering Big Data Analytics pp. 1-16

- Stefan Cremer and Claudia Loebbecke
- Software Defined Wireless Mesh Network Flat Distribution Control Plane pp. 1-17

- Hisham Elzain and Yang Wu
- An Image Feature-Based Method for Parking Lot Occupancy pp. 1-17

- Paula Tătulea, Florina Călin, Remus Brad, Lucian Brâncovean and Mircea Greavu
- Modeling of Cumulative QoE in On-Demand Video Services: Role of Memory Effect and Degree of Interest pp. 1-18

- Tho Nguyen Duc, Chanh Minh Tran, Phan Xuan Tan and Eiji Kamioka
- Quality of Experience (QoE)-Aware Fast Coding Unit Size Selection for HEVC Intra-Prediction pp. 1-18

- Buddhiprabha Erabadda, Thanuja Mallikarachchi, Chaminda Hewage and Anil Fernando
Volume 11, issue 7, 2019
- A Multi-Attention Network for Aspect-Level Sentiment Analysis pp. 1-13

- Qiuyue Zhang and Ran Lu
- Web Browser Network Based on a BA Model for a Web-Based Virtual World pp. 1-11

- Masaki Kohana, Shinji Sakamoto and Shusuke Okamoto
- Structuring Reference Architectures for the Industrial Internet of Things pp. 1-23

- Sebastian R. Bader, Maria Maleshkova and Steffen Lohmann
- Architecting Software for the Internet of Thing Based Systems pp. 1-30

- Abdulrahman Alreshidi and Aakash Ahmad
- Service Level Agreement Violations in Cloud Storage: Insurance and Compensation Sustainability pp. 1-26

- Loretta Mastroeni, Alessandro Mazzoccoli and Maurizio Naldi
- Automatic Addition of Fault-Tolerance in Presence of Unchangeable Environment Actions † pp. 1-34

- Mohammad Roohitavaf and Sandeep Kulkarni
- An Image Authentication Scheme Using Merkle Tree Mechanisms pp. 1-18

- Yi-Cheng Chen, Yueh-Peng Chou and Yung-Chen Chou
- Signatures of the Crypto-Currency Market Decoupling from the Forex pp. 1-18

- Stanisław Drożdż, Ludovico Minati, Paweł Oświȩcimka, Marek Stanuszek and Marcin Wa̧torek
- Maintaining the Sense of Agency in Semi-Autonomous Robot Conferencing pp. 1-17

- Kazuaki Tanaka, Kota Takenouchi, Kohei Ogawa, Yuichiro Yoshikawa, Shuichi Nishio and Hiroshi Ishiguro
- Town-Watching Workshop Using Disaster Information Tweeting and Mapping System pp. 1-17

- Keisuke Utsu, Shun Ueta, Sachi Tajima, Yoshitaka Kajita, Yuji Murakami and Osamu Uchida
- Platform Economy and Techno-Regulation—Experimenting with Reputation and Nudge pp. 1-17

- Nicola Lettieri, Alfonso Guarino, Delfina Malandrino and Rocco Zaccagnino
- A Dynamic Application-Partitioning Algorithm with Improved Offloading Mechanism for Fog Cloud Networks pp. 1-16

- Adeel Abro, Zhongliang Deng, Kamran Ali Memon, Asif Ali Laghari, Khalid Hussain Mohammadani and Noor ul Ain
- A Game Theoretic Interference Management Scheme in Full Duplex Cellular Systems under Infeasible QoS Requirements pp. 1-14

- Ali Y. Al-Zahrani
- Distributed Uniform Streaming Framework: An Elastic Fog Computing Platform for Event Stream Processing and Platform Transparency pp. 1-14

- Simon Vanneste, Jens de Hoog, Thomas Huybrechts, Stig Bosmans, Reinout Eyckerman, Muddsair Sharif, Siegfried Mercelis and Peter Hellinckx
- Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management pp. 1-22

- Abderahman Rejeb, John G. Keogh and Horst Treiblmaier
- Stacking-Based Ensemble Learning of Self-Media Data for Marketing Intention Detection pp. 1-12

- Yufeng Wang, Shuangrong Liu, Songqian Li, Jidong Duan, Zhihao Hou, Jia Yu and Kun Ma
- Implementation and Evaluation of Activity-Based Congestion Management Using P4 (P4-ABC) pp. 1-12

- Michael Menth, Habib Mostafaei, Daniel Merling and Marco Häberle
- Marine Internet for Internetworking in Oceans: A Tutorial pp. 1-25

- Shengming Jiang
- A Next-Generation Core Network Architecture for Mobile Networks pp. 1-25

- Andrea G. Forte, Wei Wang, Luca Veltri and Gianluigi Ferrari
- The Effects of the Floating Action Button on Quality of Experience pp. 1-10

- Jesenka Pibernik, Jurica Dolic, Hrvoje Abraham Milicevic and Bojan Kanizaj
- Crossing the Borders: Re-Use of Smart Learning Objects in Advanced Content Access Systems pp. 1-15

- Hamza Manzoor, Kamil Akhuseyinoglu, Jackson Wonderly, Peter Brusilovsky and Clifford A. Shaffer
- Improving Forensic Triage Efficiency through Cyber Threat Intelligence pp. 1-15

- Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis and Georgios Pangalos
- A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications pp. 1-20

- Stefano Busanelli, Simone Cirani, Lorenzo Melegari, Marco Picone, Mirco Rosa and Luca Veltri
Volume 11, issue 6, 2019
- Indoor Vehicles Geolocalization Using LoRaWAN pp. 1-15

- Pietro Manzoni, Carlos T. Calafate, Juan-Carlos Cano and Enrique Hernández-Orallo
- Survey and Perspectives of Vehicular Wi-Fi versus Sidelink Cellular-V2X in the 5G Era pp. 1-20

- Alessandro Bazzi, Giammarco Cecchini, Michele Menarini, Barbara M. Masini and Alberto Zanella
- A Choreography-Based and Collaborative Road Mobility System for L’Aquila City pp. 1-20

- Marco Autili, Amleto Di Salle, Francesco Gallo, Claudio Pompilio and Massimo Tivoli
- Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations pp. 1-20

- Sanghyun Kim, Hyunsun Park and Moon Jong Choi
- CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems pp. 1-25

- Pramod T. C., Thejas G. S., S. S. Iyengar and N. R. Sunitha
- Future Intelligent Systems and Networks pp. 1-2

- Carmen De-Pablos-Heredero
- Joint Location-Dependent Pricing and Request Mapping in ICN-Based Telco CDNs For 5G pp. 1-22

- Mingshuang Jin, Hongbin Luo, Shuai Gao and Bohao Feng
- Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications pp. 1-22

- Andrei Vladyko, Abdukodir Khakimov, Ammar Muthanna, Abdelhamied A. Ateya and Andrey Koucheryavy
- Developing Internet Online Procurement Frameworks for Construction Firms pp. 1-22

- Rafikullah Deraman, Chen Wang, Jeffrey Boon Hui Yap, Heng Li and Faizul Azli Mohd-Rahim
- Energy-Efficient Multi-User Routing in a Software-Defined Multi-Hop Wireless Network pp. 1-17

- Ziqi Liu, Gaochao Xu, Peng Liu, Xiaodong Fu and Yang Liu
- The Interaction Effect of Type of Message X YouTuber’s Media Metrics on Customers’ Responses and the Moderation of Conformity Intention pp. 1-17

- Melby Karina Zuniga Huertas and Tarcisio Duarte Coelho
- Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking pp. 1-18

- Meng Kuai and Xiaoyan Hong
- Dynamic Task Scheduling Algorithm with Deadline Constraint in Heterogeneous Volunteer Computing Platforms pp. 1-16

- Ling Xu, Jianzhong Qiao, Shukuan Lin and Wanting Zhang
- Vehicle Speed Estimation Based on 3D ConvNets and Non-Local Blocks pp. 1-16

- Huanan Dong, Ming Wen and Zhouwang Yang
- Digital Marketing Actions That Achieve a Better Attraction and Loyalty of Users: An Analytical Study pp. 1-16

- Juan José López García, David Lizcano, Célia Ramos and Nelson Matos
- Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model pp. 1-16

- Chien-Lung Hsu and Yi-Chuan Liao
- Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication pp. 1-16

- Dedi Gunawan and Masahiro Mambo
- The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment pp. 1-27

- Vatsala Nundloll, Barry Porter, Gordon S. Blair, Bridget Emmett, Jack Cosby, Davey L. Jones, Dave Chadwick, Ben Winterbourn, Philip Beattie, Graham Dean, Rory Shaw, Wayne Shelley, Mike Brown and Izhar Ullah
- Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era pp. 1-30

- Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone and Manuel Mazzara
- Time Series Irradiance Synthesizer for Optical GEO Satellite Downlinks in 5G Networks pp. 1-13

- Theodore T. Kapsis, Nikolaos K. Lyras, Charilaos I. Kourogiorgas and Athanasios D. Panagopoulos
Volume 11, issue 5, 2019
- Analysis of the Structure and Use of Digital Resources on the Websites of the Main Football Clubs in Europe pp. 1-12

- Santiago Tejedor, Laura Cervi and Gerard Gordon
- Enhancing IoT Data Dependability through a Blockchain Mirror Model pp. 1-9

- Alessandro Bellini, Emanuele Bellini, Monica Gherardelli and Franco Pirri
- Computational Social Science of Disasters: Opportunities and Challenges pp. 1-31

- Annetta Burger, Talha Oz, William G. Kennedy and Andrew T. Crooks
- Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment pp. 1-25

- Tri Hoang Vo, Woldemar Fuhrmann, Klaus-Peter Fischer-Hellmann and Steven Furnell
- Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms pp. 1-15

- Amer Al-Rahayfeh, Saleh Atiewi, Abdullah Abuhussein and Muder Almiani
- Guidelines towards Information-Driven Mobility Management pp. 1-15

- Rute C. Sofia
- The Next Generation Platform as A Service: Composition and Deployment of Platforms and Services pp. 1-20

- Angelos Mimidis-Kentis, Jose Soler, Paul Veitch, Adam Broadbent, Marco Mobilio, Oliviero Riganelli, Steven Van Rossem, Wouter Tavernier and Bessem Sayadi
- A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication pp. 1-13

- Adeel Abro, Zhongliang Deng and Kamran Ali Memon
- Substitute Seed Nodes Mining Algorithms for Influence Maximization in Multi-Social Networks pp. 1-13

- Xuli Rao, Jiaxu Zhao, Zhide Chen and Feng Lin
- Convolutional Two-Stream Network Using Multi-Facial Feature Fusion for Driver Fatigue Detection pp. 1-13

- Weihuang Liu, Jinhao Qian, Zengwei Yao, Xintao Jiao and Jiahui Pan
- A Yielding Protocol that Uses Inter-Vehicle Communication to Improve the Traffic of Vehicles on a Low-Priority Road at an Unsignalized Intersection pp. 1-23

- Hayato Yajima and Kazumasa Takami
- Real-Time Monitoring of Passenger’s Psychological Stress pp. 1-11

- Gaël Vila, Christelle Godin, Oumayma Sakri, Etienne Labyt, Audrey Vidal, Sylvie Charbonnier, Simon Ollander and Aurélie Campagne
- Characteristics of Cyberstalking Behavior, Consequences, and Coping Strategies: A Cross-Sectional Study in a Sample of Italian University Students pp. 1-11

- Tatiana Begotti and Daniela Acquadro Maran
- Evaluating Forwarding Protocols in Opportunistic Networks: Trends, Advances, Challenges and Best Practices pp. 1-26

- Vishnupriya Kuppusamy, Udaya Miriya Thanthrige, Asanga Udugama and Anna Förster
- An Extensible Automated Failure Localization Framework Using NetKAT, Felix, and SDN Traceroute pp. 1-27

- István Pelle and András Gulyás
- Intelligent Dynamic Data Offloading in a Competitive Mobile Edge Computing Market pp. 1-19

- Giorgos Mitsis, Pavlos Athanasios Apostolopoulos, Eirini Eleni Tsiropoulou and Symeon Papavassiliou
- Word Sense Disambiguation Using Cosine Similarity Collaborates with Word2vec and WordNet pp. 1-16

- Korawit Orkphol and Wu Yang
- Dynamic Lognormal Shadowing Framework for the Performance Evaluation of Next Generation Cellular Systems pp. 1-18

- Georgios A. Karagiannis and Athanasios D. Panagopoulos
- Combining Facial Expressions and Electroencephalography to Enhance Emotion Recognition pp. 1-17

- Yongrui Huang, Jianhao Yang, Siyu Liu and Jiahui Pan
Volume 11, issue 4, 2019
- A Smart Cities LoRaWAN Network Based on Autonomous Base Stations (BS) for Some Countries with Limited Internet Access pp. 1-12

- Pape Abdoulaye Barro, Marco Zennaro, Jules Degila and Ermanno Pietrosemoli
- A Method of Bus Network Optimization Based on Complex Network and Beidou Vehicle Location pp. 1-12

- Peixin Dong, Dongyuan Li, Jianping Xing, Haohui Duan and Yong Wu
- A Robust Security Architecture for SDN-Based 5G Networks pp. 1-14

- Jiaying Yao, Zhigeng Han, Muhammad Sohail and Liangmin Wang
- Epidemic Spreading in Urban Areas Using Agent-Based Transportation Models pp. 1-14

- Jürgen Hackl and Thibaut Dubernet
- Information Quality or Entities’ Interactivity? Understanding the Determinants of Social Network-Based Brand Community Participation pp. 1-15

- Haichuan Zhao
- An Improved Approach for Text Sentiment Classification Based on a Deep Neural Network via a Sentiment Attention Mechanism pp. 1-15

- Wenkuan Li, Peiyu Liu, Qiuyue Zhang and Wenfeng Liu
- Edge Computing: A Survey On the Hardware Requirements in the Internet of Things World pp. 1-25

- Maurizio Capra, Riccardo Peloso, Guido Masera, Massimo Ruo Roch and Maurizio Martina
- A Review of Machine Learning and IoT in Smart Transportation pp. 1-23

- Fotios Zantalis, Grigorios Koulouras, Sotiris Karabetsos and Dionisis Kandris
- Cyber Dating Abuse and Masculine Gender Norms in a Sample of Male Adults pp. 1-11

- Beatriz Villora, Santiago Yubero and Raúl Navarro
- Dynamic Gesture Recognition Based on MEMP Network pp. 1-11

- Xinyu Zhang and Xiaoqiang Li
- FollowMe: One Social Importance-Based Collaborative Scheme in MONs pp. 1-11

- Peiyan Yuan, Xiaoxiao Pang, Ping Liu and En Zhang
- Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies pp. 1-35

- Antonio Cilfone, Luca Davoli, Laura Belli and Gianluigi Ferrari
- Tax Fraud Detection through Neural Networks: An Application Using a Sample of Personal Income Taxpayers pp. 1-13

- César Pérez López, María Jesús Delgado Rodríguez and de Lucas Santos Sonia
- An Optimal Energy-Saving Strategy for Home Energy Management Systems with Bounded Customer Rationality pp. 1-16

- Guoying Lin, Yuyao Yang, Feng Pan, Sijian Zhang, Fen Wang and Shuai Fan
- Influence Maximization in Social Network Considering Memory Effect and Social Reinforcement Effect pp. 1-16

- Fei Wang, Zhenfang Zhu, Peiyu Liu and Peipei Wang
- Ant Colony Optimization Task Scheduling Algorithm for SWIM Based on Load Balancing pp. 1-18

- Gang Li and Zhijun Wu
- A Study on Join Operations in MongoDB Preserving Collections Data Models for Future Internet Applications pp. 1-17

- Antonio Celesti, Maria Fazio and Massimo Villari
- Social Engineering Attacks: A Survey pp. 1-17

- Fatima Salahdine and Naima Kaabouch
- Design of an Open Remote Electrocardiogram (ECG) Service pp. 1-19

- Augusto Ciuffoletti
Volume 11, issue 3, 2019
- IoH: A Platform for the Intelligence of Home with a Context Awareness and Ambient Intelligence Approach pp. 1-21

- Luis Gomes, Carlos Ramos, Aria Jozi, Bruno Serra, Lucas Paiva and Zita Vale
- Dynamic SDN Controller Load Balancing pp. 1-21

- Hadar Sufiev, Yoram Haddad, Leonid Barenboim and José Soler
- An Access Control Model for Preventing Virtual Machine Hopping Attack pp. 1-21

- Ying Dong and Zhou Lei
- Nonlinear Analysis of Built-in Sensor in Smart Device under the Condition of Voice Actuating pp. 1-13

- Ning Zhao, Yuhe Liu and Junjie Shen
- Worldwide Connectivity for the Internet of Things Through LoRaWAN pp. 1-11

- Lorenzo Vangelista and Marco Centenaro
- myDIG: Personalized Illicit Domain-Specific Knowledge Discovery with No Programming pp. 1-23

- Mayank Kejriwal and Pedro Szekely
- VNF Placement Optimization at the Edge and Cloud † pp. 1-23

- Aris Leivadeas, George Kesidis, Mohamed Ibnkahla and Ioannis Lambadaris
- A Game-Theoretic Analysis for Distributed Honeypots pp. 1-19

- Yang Li, Leyi Shi and Haijie Feng
- Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study pp. 1-18

- Samer Jaloudi
- Environmental-Based Speed Recommendation for Future Smart Cars pp. 1-18

- Ioannis Galanis, Iraklis Anagnostopoulos, Priyaa Gurunathan and Dona Burkard
- Topic-Specific Emotion Mining Model for Online Comments pp. 1-18

- Xiangfeng Luo and Yawen Yi
- A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs pp. 1-17

- Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain and Muhammad Qasim Memon
- Modeling of Information Operations Effects: Technological Systems Example pp. 1-17

- Alexander Geyda and Igor Lysenko
- Gamification vs. Privacy: Identifying and Analysing the Major Concerns pp. 1-17

- Aikaterini-Georgia Mavroeidi, Angeliki Kitsiou, Christos Kalloniatis and Stefanos Gritzalis
- Software-Defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges pp. 1-17

- Adnan Mahmood, Wei Emma Zhang and Quan Z. Sheng
- Hot Topic Community Discovery on Cross Social Networks pp. 1-16

- Xuan Wang, Bofeng Zhang and Furong Chang
- A Cache Placement Strategy with Energy Consumption Optimization in Information-Centric Networking pp. 1-16

- Xin Zheng, Gaocai Wang and Qifei Zhao
- Snack Texture Estimation System Using a Simple Equipment and Neural Network Model pp. 1-16

- Shigeru Kato, Naoki Wada, Ryuji Ito, Takaya Shiozaki, Yudai Nishiyama and Tomomichi Kagawa
- Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues pp. 1-16

- Hussain Aldawood and Geoffrey Skinner
- eHealth Integrity Model Based on Permissioned Blockchain pp. 1-14

- Tomasz Hyla and Jerzy Pejaś
- Experimental Study on the Utility and Future of Collaborative Consumption Platforms Offering Tourism Related Services pp. 1-12

- Joan-Francesc Fondevila-Gascón, Gaspar Berbel and Mònica Muñoz-González
- Cyber Security Threat Modeling for Supply Chain Organizational Environments pp. 1-25

- Abel Yeboah-Ofori and Shareeful Islam
- Open Data for Open Innovation: An Analysis of Literature Characteristics pp. 1-25

- Diego Corrales-Garay, Eva-María Mora-Valentín and Marta Ortiz- de-Urbina-Criado
- An Overview on Push-Based Communication Models for Information-Centric Networking pp. 1-10

- Rute C. Sofia and Paulo M. Mendes
- SAES: An Introduction to Self-Adapting Exploratory Structures pp. 1-9

- Giovanni Maria Sacco
- On the Need for a General REST-Security Framework pp. 1-33

- Luigi Lo Iacono, Hoai Viet Nguyen and Peter Leo Gorski
- Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges pp. 1-15

- Sergej Svorobej, Patricia Takako Endo, Malika Bendechache, Christos Filelis-Papadopoulos, Konstantinos M. Giannoutakis, George A. Gravvanis, Dimitrios Tzovaras, James Byrne and Theo Lynn
- Environmental Hazards: A Coverage Response Approach pp. 1-15

- Paul J. Croft
- Effectiveness of Segment Routing Technology in Reducing the Bandwidth and Cloud Resources Provisioning Times in Network Function Virtualization Architectures pp. 1-20

- Vincenzo Eramo, Francesco G. Lavacca, Tiziana Catena, Marco Polverini and Antonio Cianfrani
Volume 11, issue 2, 2019
- An Overview of Vehicular Communications pp. 1-12

- Fabio Arena and Giovanni Pau
- Important Factors for Improving Google Search Rank pp. 1-12

- Christos Ziakis, Maro Vlachopoulou, Theodosios Kyrkoudis and Makrina Karagkiozidou
- Tooth-Marked Tongue Recognition Using Gradient-Weighted Class Activation Maps pp. 1-12

- Yue Sun, Songmin Dai, Jide Li, Yin Zhang and Xiaoqiang Li
- Efficient Tensor Sensing for RF Tomographic Imaging on GPUs pp. 1-12

- Da Xu and Tao Zhang
- Joint Optimal Power Allocation and Relay Selection Scheme in Energy Harvesting Two-Way Relaying Network pp. 1-12

- Xin Song, Siyang Xu, Zhigang Xie and Xiuwei Han
- A Multi-Agent Architecture for Data Analysis pp. 1-12

- Gianfranco Lombardo, Paolo Fornacciari, Monica Mordonini, Michele Tomaiuolo and Agostino Poggi
- Embedded Deep Learning for Ship Detection and Recognition pp. 1-12

- Hongwei Zhao, Weishan Zhang, Haoyun Sun and Bing Xue
- Sentiment Analysis Based Requirement Evolution Prediction pp. 1-14

- Lingling Zhao and Anping Zhao
- Audio-Visual Genres and Polymediation in Successful Spanish YouTubers pp. 1-22

- Lorenzo J. Torres Hortelano
- Research on a Support System for Automatic Ship Navigation in Fairway pp. 1-20

- Nguyen Van Suong
- BlackWatch: Increasing Attack Awareness within Web Applications pp. 1-20

- Calum C. Hall, Lynsay A. Shepherd and Natalie Coull
- Fog vs. Cloud Computing: Should I Stay or Should I Go? pp. 1-31

- Flávia Pisani, Vanderson Martins do Rosario and Edson Borin
- A Spatial Prediction-Based Motion-Compensated Frame Rate Up-Conversion pp. 1-10

- Yanli Li, Wendan Ma and Yue Han
- Dual-Band Monopole Antenna for RFID Applications pp. 1-10

- Naser Ojaroudi Parchin, Haleh Jahanbakhsh Basherlou, Raed A. Abd-Alhameed and James M. Noras
- Vehicle Politeness in Driving Situations pp. 1-10

- Jae-Gil Lee, Kwan Min Lee and Seoung-Ho Ryu
- My Smartphone tattles: Considering Popularity of Messages in Opportunistic Data Dissemination pp. 1-25

- Asanga Udugama, Jens Dede, Anna Förster, Vishnupriya Kuppusamy, Koojana Kuladinithi, Andreas Timm-Giel and Zeynep Vatandas
- An Investigation into Healthcare-Data Patterns pp. 1-23

- Aaron Boddy, William Hurst, Michael Mackay, Abdennour El Rhalibi, Thar Baker and Casimiro A. Curbelo Montañez
- Interoperability of the Time of Industry 4.0 and the Internet of Things pp. 1-13

- Francesco Lelli
- A Fusion Load Disaggregation Method Based on Clustering Algorithm and Support Vector Regression Optimization for Low Sampling Data pp. 1-13

- Quanbo Yuan, Huijuan Wang, Botao Wu, Yaodong Song and Hejia Wang
- Minimum Viable Products for Internet of Things Applications: Common Pitfalls and Practices pp. 1-21

- Anh Nguyen-Duc, Khan Khalid, Sohaib Shahid Bajwa and Tor Lønnestad
- Autonomic Network Management and Cross-Layer Optimization in Software Defined Radio Environments pp. 1-18

- Adamantia Stamou, Grigorios Kakkavas, Konstantinos Tsitseklis, Vasileios Karyotis and Symeon Papavassiliou
- T-Move: A Light-Weight Protocol for Improved QoS in Content-Centric Networks with Producer Mobility pp. 1-17

- Swaroopa Korla and Shanti Chilukuri
- A Scheme to Design Community Detection Algorithms in Various Networks pp. 1-17

- Haoye Lu and Amiya Nayak
- 3D-CNN-Based Fused Feature Maps with LSTM Applied to Action Recognition pp. 1-17

- Sheeraz Arif, Jing Wang, Tehseen Ul Hassan and Zesong Fei
- A Mathematical Model for Efficient and Fair Resource Assignment in Multipath Transport pp. 1-40

- Andreas Könsgen, Md. Shahabuddin, Amanpreet Singh and Anna Förster
- Percolation and Internet Science pp. 1-26

- Franco Bagnoli, Emanuele Bellini, Emanuele Massaro and Raúl Rechtman
- Contribution of the Web of Things and of the Opportunistic Computing to the Smart Agriculture: A Practical Experiment pp. 1-19

- Lionel Touseau and Nicolas Le Sommer
- Consistency Models of NoSQL Databases pp. 1-19

- Miguel Diogo, Bruno Cabral and Jorge Bernardino
Volume 11, issue 1, 2019
- Object Detection Network Based on Feature Fusion and Attention Mechanism pp. 1-14

- Ying Zhang, Yimin Chen, Chen Huang and Mingke Gao
- Security Risk Analysis of LoRaWAN and Future Directions pp. 1-22

- Ismail Butun, Nuno Pereira and Mikael Gidlund
- An Agent Based Model to Analyze the Bitcoin Mining Activity and a Comparison with the Gold Mining Industry pp. 1-12

- Luisanna Cocco, Roberto Tonelli and Michele Marchesi
- Harnessing machine learning for fiber-induced nonlinearity mitigation in long-haul coherent optical OFDM pp. 1-20

- Elias Giacoumidis, Yi Lin, Jinlong Wei, Ivan Aldaya, Athanasios Tsokanos and Liam P. Barry
- A Crowdsensing Platform for Monitoring of Vehicular Emissions: A Smart City Perspective pp. 1-20

- Marianne Silva, Gabriel Signoretti, Julio Oliveira, Ivanovitch Silva and Daniel G. Costa
- Smart System for Prediction of Accurate Surface Electromyography Signals Using an Artificial Neural Network pp. 1-20

- Osama Dorgham, Ibrahim Al-Mherat, Jawdat Al-Shaer, Sulieman Bani-Ahmad and Stephen Laycock
- A Framework for Improving the Engagement of Medical Practitioners in an E-Training Platform for Tuberculosis Care and Prevention pp. 1-15

- Syed Mustafa Ali, Ana Filomena Curralo, Maged N. Kamel Boulos and Sara Paiva
- Layer-Wise Compressive Training for Convolutional Neural Networks pp. 1-15

- Matteo Grimaldi, Valerio Tenace and Andrea Calimera
- Application of a Non-Immersive VR, IoT Based Approach to Help Moroccan Students Carry Out Practical Activities in a Personal Learning Style pp. 1-15

- Mohamed Fahim, Brahim Ouchao, Abdeslam Jakimi and Lahcen El Bermi
- Joint Uplink and Downlink Resource Allocation for D2D Communications System pp. 1-15

- Xin Song, Xiuwei Han, Yue Ni, Li Dong and Lei Qin
- MAC Layer Protocols for Internet of Things: A Survey pp. 1-42

- Luiz Oliveira, Joel J. P. C. Rodrigues, Sergei A. Kozlov, Ricardo A. L. Rabêlo and Victor Hugo C. de Albuquerque
- Adaptive Downward/Upward Routing Protocol for Mobile-Sensor Networks pp. 1-13

- Jinpeng Wang, Gérard Chalhoub and Michel Misson
- An Explorative Model to Assess Individuals’ Phubbing Risk pp. 1-13

- Andrea Guazzini, Mirko Duradoni, Ambra Capelli and Patrizia Meringolo
- A Reinforcement Learning Based Intercell Interference Coordination in LTE Networks pp. 1-23

- Djorwé Témoa, Anna Förster, Kolyang and Serge Doka Yamigno
- Surveying Human Habit Modeling and Mining Techniques in Smart Spaces pp. 1-23

- Francesco Leotta, Massimo Mecella, Daniele Sora and Tiziana Catarci
- Broadening Understanding on Managing the Communication Infrastructure in Vehicular Networks: Customizing the Coverage Using the Delta Network pp. 1-19

- Cristiano M. Silva, Lucas D. Silva, Leonardo A. L. Santos, João F. M. Sarubbi and Andreas Pitsillides
- Forecasting E-Commerce Products Prices by Combining an Autoregressive Integrated Moving Average (ARIMA) Model and Google Trends Data pp. 1-19

- Salvatore Carta, Andrea Medda, Alessio Pili, Diego Reforgiato Recupero and Roberto Saia
- A Real Case of Implementation of the Future 5G City pp. 1-16

- Dania Marabissi, Lorenzo Mucchi, Romano Fantacci, Maria Rita Spada, Fabio Massimiani, Andrea Fratini, Giorgio Cau, Jia Yunpeng and Lucio Fedele
- Forward-Looking Element Recognition Based on the LSTM-CRF Model with the Integrity Algorithm pp. 1-16

- Dong Xu, Ruping Ge and Zhihua Niu
- Simple and Efficient Computational Intelligence Strategies for Effective Collaborative Decisions pp. 1-16

- Emelia Opoku Aboagye and Rajesh Kumar
- Acknowledgement to Reviewers of Future Internet in 2018 pp. 1-5

- Future Internet Editorial Office
- THBase: A Coprocessor-Based Scheme for Big Trajectory Data Management pp. 1-17

- Jiwei Qin, Liangli Ma and Jinghua Niu
- Multi-Topology Routing Algorithms in SDN-Based Space Information Networks pp. 1-17

- Xiangli Meng, Lingda Wu and Shaobo Yu
- ESCAPE: Evacuation Strategy through Clustering and Autonomous Operation in Public Safety Systems pp. 1-17

- Georgios Fragkos, Pavlos Athanasios Apostolopoulos and Eirini Eleni Tsiropoulou
- Improved Arabic–Chinese Machine Translation with Linguistic Input Features pp. 1-17

- Fares Aqlan, Xiaoping Fan, Abdullah Alqwbani and Akram Al-Mansoub
| |