Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 10, issue 12, 2018
- Privacy and Security Issues in Online Social Networks pp. 1-12

- Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani and Joel J. P. C. Rodrigues
- Bidirectional Recurrent Neural Network Approach for Arabic Named Entity Recognition pp. 1-12

- Mohammed N. A. Ali, Guanzheng Tan and Aamir Hussain
- A Method for Filtering Pages by Similarity Degree based on Dynamic Programming pp. 1-12

- Ziyun Deng and Tingqin He
- Video-Based Human Action Recognition Using Spatial Pyramid Pooling and 3D Densely Convolutional Networks pp. 1-11

- Wanli Yang, Yimin Chen, Chen Huang and Mingke Gao
- A Bi-Directional LSTM-CNN Model with Attention for Aspect-Level Text Classification pp. 1-11

- Yonghua Zhu, Xun Gao, Weilin Zhang, Shenkai Liu and Yuanyuan Zhang
- DSP-Based 40 GB/s Lane Rate Next-Generation Access Networks pp. 1-11

- Jinlong Wei, Ji Zhou, Elias Giacoumidis, Paul A. Haigh and Jianming Tang
- Personality and Reputation: A Complex Relationship in Virtual Environments pp. 1-14

- Stefania Collodi, Sara Panerati, Enrico Imbimbo, Federica Stefanelli, Mirko Duradoni and Andrea Guazzini
- A Compact Printed Monopole Antenna for WiMAX/WLAN and UWB Applications pp. 1-14

- Zubin Chen, Baijun Lu, Yanzhou Zhu and Hao Lv
- “Network Sentiment” Framework to Improve Security and Privacy for Smart Home pp. 1-14

- Tommaso Pecorella, Laura Pierucci and Francesca Nizzi
- A Personalized Recommendation Algorithm Based on the User’s Implicit Feedback in E-Commerce pp. 1-13

- Bo Wang, Feiyue Ye and Jialu Xu
- Exploiting JTAG and Its Mitigation in IOT: A Survey pp. 1-18

- Gopal Vishwakarma and Wonjun Lee
- Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices pp. 1-16

- Jithin R and Priya Chandran
Volume 10, issue 11, 2018
- Composting as a Service: A Real-World IoT Implementation pp. 1-15

- Yannis Nikoloudakis, Spyridon Panagiotakis, Thrasivoulos Manios, Evangelos Markakis and Evangelos Pallis
- An Integrated Platform for the Internet of Things Based on an Open Source Ecosystem pp. 1-27

- YangQun Li
- Intelligent Environment Monitoring System for University Laboratories pp. 1-10

- Linbo Zhai and Wenwen Jiang
- RFID Based Manufacturing Process of Cloud MES pp. 1-11

- Chuang Wang, Xu’nan Chen, Abdel-Hamid Ali Soliman and Zhixiang Zhu
- Design and Implementation of a RFID Reader/Router in RFID-WSN Hybrid System pp. 1-12

- Wusheng Ji, Li Li and Weiwei Zhou
- Chinese Text Classification Model Based on Deep Learning pp. 1-12

- Yue Li, Xutao Wang and Pengjian Xu
- Initial Coin Offerings and Agile Practices pp. 1-21

- Simona Ibba, Andrea Pinna, Maria Ilaria Lunesu, Michele Marchesi and Roberto Tonelli
- A Review of DSP-Based Enabling Technologies for Cloud Access Networks pp. 1-21

- Roger Giddings, Xiao Duan, Ehab Al-Rawachy and Mingzhi Mao
- Quality of Experience in Cyber-Physical Social Systems Based on Reinforcement Learning and Game Theory pp. 1-22

- Eirini Eleni Tsiropoulou, George Kousis, Athina Thanou, Ioanna Lykourentzou and Symeon Papavassiliou
- Neurologist Standard Classification of Facial Nerve Paralysis with Deep Neural Networks pp. 1-13

- Anping Song, Zuoyu Wu, Xuehai Ding, Qian Hu and Xinyi Di
- Query Recommendation Using Hybrid Query Relevance pp. 1-13

- Jialu Xu and Feiyue Ye
Volume 10, issue 10, 2018
- A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems pp. 1-19

- Isam A. Hussein, Basil H. Jasim and Ramzy S. Ali
- Influence of Crowd Participation Features on Mobile Edge Computing pp. 1-10

- Peiyan Yuan, Xiaoxiao Pang and Xiaoyan Zhao
- Chinese Event Extraction Based on Attention and Semantic Features: A Bidirectional Circular Neural Network pp. 1-10

- Yue Wu and Junyi Zhang
- The Effect of Customer Participation Types on Online Recovery Satisfaction: A Mental Accounting Perspective pp. 1-20

- Yu Zhang and Bingjia Shao
- Proactive Caching at the Edge Leveraging Influential User Detection in Cellular D2D Networks pp. 1-17

- Anwar Said, Syed Waqas Haider Shah, Hasan Farooq, Adnan Noor Mian, Ali Imran and Jon Crowcroft
- Agile Service Engineering in the Industrial Internet of Things pp. 1-18

- Thomas Usländer and Thomas Batz
- An Environmentally Aware Scheme of Wireless Sensor Networks for Forest Fire Monitoring and Detection pp. 1-18

- Yi-Han Xu, Qiu-Ya Sun and Yu-Tong Xiao
- The Optimization of Marine Diesel Engine Rotational Speed Control Process by Fuzzy Logic Control Based on Particle Swarm Optimization Algorithm pp. 1-18

- Tien Anh Tran
- Occlusion-Aware Unsupervised Learning of Monocular Depth, Optical Flow and Camera Pose with Geometric Constraints pp. 1-14

- Qianru Teng, Yimin Chen and Chen Huang
- Reframing HRI Design Opportunities for Social Robots: Lessons Learnt from a Service Robotics Case Study Approach Using UX for HRI pp. 1-22

- Sara Khan and Claudio Germak
- Structured Data REST Protocol for End to End Data Mashup pp. 1-37

- Prakash Narayan Hardaha and Shailendra Singh
Volume 10, issue 9, 2018
- Predictive Power Management for Wind Powered Wireless Sensor Node pp. 1-21

- Yin Wu, Bowen Li and Fuquan Zhang
- Using Noise Level to Detect Frame Repetition Forgery in Video Frame Rate Up-Conversion pp. 1-11

- Yanli Li, Lala Mei, Ran Li and Changan Wu
- A Systematic Literature Review on Military Software Defined Networks pp. 1-39

- Vasileios Gkioulos, Håkon Gunleifsen and Goitom Kahsay Weldehawaryat
- Log Likelihood Ratio Based Relay Selection Scheme for Amplify and Forward Relaying with Three State Markov Channel pp. 1-12

- Manish Sahajwani, Alok Jain and Radheyshyam Gamad
- Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers pp. 1-10

- Samah Alshathri, Bogdan Ghita and Nathan Clarke
- Intelligent Communication in Wireless Sensor Networks pp. 1-19

- Mostefa Bendjima and Mohammed Feham
- Novel Cross-View Human Action Model Recognition Based on the Powerful View-Invariant Features Technique pp. 1-17

- Sebastien Mambou, Ondrej Krejcar, Kamil Kuca and Ali Selamat
- v-Mapper: An Application-Aware Resource Consolidation Scheme for Cloud Data Centers pp. 1-17

- Aaqif Afzaal Abbasi and Hai Jin
- A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller pp. 1-16

- Wentao Wang, Xuan Ke and Lingxia Wang
- On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems pp. 1-15

- Masoumeh Safkhani, Nasour Bagheri and Mahyar Shariat
Volume 10, issue 8, 2018
- Motives for Instagram Use and Topics of Interest among Young Adults pp. 1-12

- Yi-Ting Huang and Sheng-Fang Su
- A Watermark-Based In-Situ Access Control Model for Image Big Data pp. 1-14

- Jinyi Guo, Wei Ren, Yi Ren and Tianqing Zhu
- A Fast and Lightweight Method with Feature Fusion and Multi-Context for Face Detection pp. 1-14

- Lei Zhang and Xiaoli Zhi
- Hybrid Approach with Improved Genetic Algorithm and Simulated Annealing for Thesis Sampling pp. 1-15

- Shardrom Johnson, Jinwu Han, Yuanchen Liu, Li Chen and Xinlin Wu
- Joint AP Association and Bandwidth Allocation Optimization Algorithm in High-Dense WLANs pp. 1-15

- Jianjun Lei, Jiarui Tao and Shanshan Yang
- SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach pp. 1-15

- Marcio Andrey Teixeira, Tara Salman, Maede Zolanvari, Raj Jain, Nader Meskin and Mohammed Samaka
- Queue Spillover Management in a Connected Vehicle Environment pp. 1-15

- Chuanxiang Ren, Wenbo Zhang, Lingqiao Qin and Bo Sun
- Multidiscipline Integrated Platform Based on Probabilistic Analysis for Manufacturing Engineering Processes pp. 1-10

- Lijun Zhang, Kai Liu and Jian Liu
- Interactive 3D Exploration of RDF Graphs through Semantic Planes pp. 1-30

- Fabio Viola, Luca Roffia, Francesco Antoniazzi, Alfredo D’Elia, Cristiano Aguzzi and Tullio Salmon Cinotti
- Smart Collection of Real-Time Vehicular Mobility Traces pp. 1-18

- Nisrine Ibadah, Khalid Minaoui, Mohammed Rziza, Mohammed Oumsis and César Benavente-Peces
- A Hierarchical Mapping System for Flat Identifier to Locator Resolution Based on Active Degree pp. 1-16

- Jianqiang Liu, Shuai Huo and Yi Wang
- Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach pp. 1-27

- Ludger Goeke, Nazila Gol Mohammadi and Maritta Heisel
- Internet of Nano-Things, Things and Everything: Future Growth Trends pp. 1-28

- Mahdi H. Miraz, Maaruf Ali, Peter S. Excell and Richard Picking
- Predict and Forward: An Efficient Routing-Delivery Scheme Based on Node Profile in Opportunistic Networks pp. 1-19

- Kanghuai Liu, Zhigang Chen, Jia Wu, Yutong Xiao and Heng Zhang
Volume 10, issue 7, 2018
- Big Data Perspective and Challenges in Next Generation Networks pp. 1-20

- Kashif Sultan, Hazrat Ali and Zhongshan Zhang
- Enabling Trustworthy Multicast Wireless Services through D2D Communications in 5G Networks pp. 1-15

- Sara Pizzi, Chiara Suraci, Leonardo Militano, Antonino Orsino, Antonella Molinaro, Antonio Iera and Giuseppe Araniti
- Network Measurement and Performance Analysis at Server Side pp. 1-18

- Guang-Qian Peng, Guangtao Xue and Yi-Chao Chen
- Fuzzy Multi-Criteria Based Trust Management in Heterogeneous Federated Future Internet Testbeds pp. 1-17

- Dimitrios Dechouniotis, Ioannis Dimolitsas, Konstantinos Papadakis-Vlachopapadopoulos and Symeon Papavassiliou
- A Novel Two-Layered Reinforcement Learning for Task Offloading with Tradeoff between Physical Machine Utilization Rate and Delay pp. 1-17

- Li Quan, Zhiliang Wang and Fuji Ren
- Dynamic Cost-Aware Routing of Web Requests pp. 1-19

- Gandhimathi Velusamy and Ricardo Lent
- Towards Prediction of Immersive Virtual Reality Image Quality of Experience and Quality of Service pp. 1-12

- Anil Kumar Karembai, Jeffrey Thompson and Patrick Seeling
- Dynamic Traffic Scheduling and Congestion Control across Data Centers Based on SDN pp. 1-12

- Dong Sun, Kaixin Zhao, Yaming Fang and Jie Cui
- The GDPR beyond Privacy: Data-Driven Challenges for Social Scientists, Legislators and Policy-Makers pp. 1-11

- Margherita Vestoso
- Clock Recovery Challenges in DSP-Based Coherent Single-Mode and Multi-Mode Optical Systems pp. 1-14

- Júlio César Medeiros Diniz, Francesco Da Ros and Darko Zibar
- Personalised and Coordinated Demand-Responsive Feeder Transit Service Design: A Genetic Algorithms Approach pp. 1-14

- Bo Sun, Ming Wei, Chunfeng Yang, Zhihuo Xu and Han Wang
- Performance Analysis of Hybrid Optical–Acoustic AUV Swarms for Marine Monitoring pp. 1-13

- Chiara Lodovisi, Pierpaolo Loreti, Lorenzo Bracciale and Silvello Betti
Volume 10, issue 6, 2018
- Fairness and Trust in Virtual Environments: The Effects of Reputation pp. 1-15

- Mirko Duradoni, Mario Paolucci, Franco Bagnoli and Andrea Guazzini
- StegNet: Mega Image Steganography Capacity with Deep Convolutional Network pp. 1-15

- Pin Wu, Yang Yang and Xiaoqiang Li
- A Tiered Control Plane Model for Service Function Chaining Isolation pp. 1-33

- Håkon Gunleifsen, Vasileios Gkioulos and Thomas Kemmerich
- Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage pp. 1-17

- Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
- Simulating the Cost of Cooperation: A Recipe for Collaborative Problem-Solving pp. 1-17

- Andrea Guazzini, Mirko Duradoni, Alessandro Lazzeri and Giorgio Gronchi
- A Novel Self-Adaptive VM Consolidation Strategy Using Dynamic Multi-Thresholds in IaaS Clouds pp. 1-18

- Lei Xie, Shengbo Chen, Wenfeng Shen and Huaikou Miao
- Studying Semi-TCP and Its Application in Marine Internet pp. 1-9

- Liang Zhou, Sheng-Ming Jiang and Chen-Lin Xiong
- A Privacy Preserving Framework for Worker’s Location in Spatial Crowdsourcing Based on Local Differential Privacy pp. 1-9

- Jiazhu Dai and Keke Qiao
- Secure Inter-Frame Space Communications for Wireless LANs pp. 1-10

- Il-Gu Lee
- On the Future of Legal Publishing Services in the Semantic Web pp. 1-12

- Enrico Francesconi
- A Driving Behavior Planning and Trajectory Generation Method for Autonomous Electric Bus pp. 1-14

- Lingli Yu, Decheng Kong and Xiaoxin Yan
- A Multiple Access Protocol Based on Gray Forecast for Satellite Network pp. 1-13

- Chong Han, Zilong Li, Jian Zhou, Lijuan Sun and Siyu Chen
Volume 10, issue 5, 2018
- An EV Charging Scheduling Mechanism Based on Price Negotiation pp. 1-11

- Baocheng Wang, Yafei Hu, Yu Xiao and Yi Li
- Botnet Detection Based On Machine Learning Techniques Using DNS Query Data pp. 1-11

- Xuan Dau Hoang and Quynh Chi Nguyen
- A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN pp. 1-10

- Seyed Davoud Mousavi, Rasool Sadeghi, Mohamadreza Karimi, Erfan Karimian and Mohammad Reza Soltan Aghaei
- Ex Machina: Analytical platforms, Law and the Challenges of Computational Legal Science pp. 1-25

- Nicola Lettieri, Antonio Altamura, Rosalba Giugno, Alfonso Guarino, Delfina Malandrino, Alfredo Pulvirenti, Francesco Vicidomini and Rocco Zaccagnino
- Route Availability as a Communication Quality Metric of a Mobile Ad Hoc Network pp. 1-19

- Tamotsu Yashima and Kazumasa Takami
- MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers pp. 1-18

- Jingsha He, Jianan Wu, Nafei Zhu and Muhammad Salman Pathan
- Test Bed of Semantic Interaction of Smart Objects in the Web of Things pp. 1-20

- Santiago Guerrero-Narváez, Miguel-Ángel Niño-Zambrano, Dalila-Jhoana Riobamba-Calvache and Gustavo-Adolfo Ramírez-González
Volume 10, issue 4, 2018
- Replicas Strategy and Cache Optimization of Video Surveillance Systems Based on Cloud Storage pp. 1-14

- Rongheng Li, Jian Zhang and Wenfeng Shen
- An Intelligent Content Prefix Classification Approach for Quality of Service Optimization in Information-Centric Networking pp. 1-15

- Cutifa Safitri, Yoshihide Yamada, Sabariah Baharun, Shidrokh Goudarzi, Quang Ngoc Nguyen, Keping Yu and Takuro Sato
- Development of a Social DTN for Message Communication between SNS Group Members pp. 1-20

- Hidenori Takasuka, Koichi Hirai and Kazumasa Takami
- Enhanced Matching Game for Decoupled Uplink Downlink Context-Aware Handover pp. 1-16

- Asmae Ait Mansour, Nourddine Enneya and Mohamed Ouadou
- Dynamic Linked Data: A SPARQL Event Processing Architecture pp. 1-33

- Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti
Volume 10, issue 3, 2018
- How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0 pp. 1-14

- Virginia Pilloni
- TwinNet: A Double Sub-Network Framework for Detecting Universal Adversarial Perturbations pp. 1-13

- Yibin Ruan and Jiazhu Dai
- Learning and Mining Player Motion Profiles in Physically Interactive Robogames pp. 1-21

- Ewerton L. S. Oliveira, Davide Orrù, Luca Morreale, Tiago P. Nascimento and Andrea Bonarini
- Security Awareness in Software-Defined Multi-Domain 5G Networks pp. 1-24

- Jani Suomalainen, Kimmo Ahola, Mikko Majanen, Olli Mämmelä and Pekka Ruuska
- Interference Management in Femtocells by the Adaptive Network Sensing Power Control Technique pp. 1-9

- Tehseen Ul Hassan, Fei Gao, Babur Jalal and Sheeraz Arif
- A Statistical Analysis of Industrial Penetration and Internet Intensity in Taiwan pp. 1-26

- Chia-Lin Chang, Michael McAleer and Yu-Chieh Wu
- Ecosystemic Evolution Fed by Smart Systems pp. 1-3

- Dino Giuli
- Understanding How GitHub Supports Curation Repositories pp. 1-15

- Yu Wu, Jessica Kropczynski, Raquel Prates and John M. Carroll
- Optimal Design of Demand-Responsive Feeder Transit Services with Passengers’ Multiple Time Windows and Satisfaction pp. 1-15

- Bo Sun, Ming Wei and Senlai Zhu
- SDN Based Collaborative Scheme for Mitigation of DDoS Attacks pp. 1-18

- Sufian Hameed and Hassan Ahmed Khan
Volume 10, issue 2, 2018
- Smart Pedestrian Crossing Management at Traffic Light Junctions through a Fuzzy-Based Approach pp. 1-19

- Giovanni Pau, Tiziana Campisi, Antonino Canale, Alessandro Severino, Mario Collotta and Giovanni Tesoriere
- Security and Privacy in Wireless and Mobile Networks pp. 1-3

- Georgios Kambourakis, Felix Gomez Marmol and Guojun Wang
- A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment pp. 1-15

- Irshad Ahmed Abbasi and Adnan Shahid Khan
- Robotics Construction Kits: From “Objects to Think with” to “Objects to Think and to Emote with” pp. 1-6

- Antonella D’Amico and Domenico Guastella
- An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs pp. 1-16

- Muhammad Salman Pathan, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon and Muhammad Iftikhar Hussain
- Virtual Career Fairs: Perspectives from Norwegian Recruiters and Exhibitors pp. 1-16

- Ådne Stenberg Vik, Bjørn Christian Nørbech and Debora Jeske
- Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough? pp. 1-16

- Valentina Gatteschi, Fabrizio Lamberti, Claudio Demartini, Chiara Pranteda and Víctor Santamaría
- Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications pp. 1-17

- Pierpaolo Loreti, Lorenzo Bracciale and Alberto Caponi
- Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks pp. 1-17

- Blerim Rexha, Gresa Shala and Valon Xhafa
- Announcing the 2018 Future Internet Travel Award for PhD Students pp. 1-2

- Dino Giuli
- The Improved Adaptive Silence Period Algorithm over Time-Variant Channels in the Cognitive Radio System pp. 1-11

- Jingbo Zhang, Zhenyang Sun and Shufang Zhang
Volume 10, issue 1, 2018
- Recent Advances on Cellular D2D Communications pp. 1-3

- Boon-Chong Seet, Syed Faraz Hasan and Peter Han-Joo Chong
- An Anonymous Offline RFID Grouping-Proof Protocol pp. 1-15

- Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang
- Acknowledgement to Reviewers of Future Internet in 2017 pp. 1-5

- Future Internet Editorial Office
- Review of Latest Advances in 3GPP Standardization: D2D Communication in 5G Systems and Its Energy Consumption Models pp. 1-18

- Marko Höyhtyä, Olli Apilo and Mika Lasanen
- Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks pp. 1-16

- Wenjuan Li, Weizhi Meng and Lam For Kwok
- A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs pp. 1-17

- Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi
- A Decision Framework for Choosing Telecommunication Technologies in Limited-Resource Settings pp. 1-14

- Suzana Brown and Alan Mickelson
- A Velocity-Aware Handover Trigger in Two-Tier Heterogeneous Networks pp. 1-14

- Asmae Ait Mansour, Nourddine Enneya and Mohamed Ouadou
- Elastic Scheduling of Scientific Workflows under Deadline Constraints in Cloud Computing Environments pp. 1-23

- Nazia Anwar and Huifang Deng
- A Virtual Learning Architecture Enhanced by Fog Computing and Big Data Streams pp. 1-30

- Riccardo Pecori
| |