Future Internet
2009 - 2025
Current editor(s): Ms. Grace You From MDPI Bibliographic data for series maintained by MDPI Indexing Manager (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 9, issue 4, 2017
- An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing pp. 1-18

- A S M Touhidul Hasan, Qingshan Jiang and Chengming Li
- SCMC: An Efficient Scheme for Minimizing Energy in WSNs Using a Set Cover Approach pp. 1-18

- Ahmed Redha Mahlous
- Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images pp. 1-17

- Xiaoyan Yu, Chengyou Wang and Xiao Zhou
- Exploring Data Model Relations in OpenStreetMap pp. 1-17

- Hippolyte Pruvost and Peter Mooney
- Throughput-Aware Cooperative Reinforcement Learning for Adaptive Resource Allocation in Device-to-Device Communication pp. 1-17

- Muhidul Islam Khan, Muhammad Mahtab Alam, Yannick Le Moullec and Elias Yaacoub
- Creation and Staging of Android Theatre “Sayonara”towards Developing Highly Human-Like Robots pp. 1-17

- Takenobu Chikaraishi, Yuichiro Yoshikawa, Kohei Ogawa, Oriza Hirata and Hiroshi Ishiguro
- IAACaaS: IoT Application-Scoped Access Control as a Service pp. 1-16

- Álvaro Alonso, Federico Fernández, Lourdes Marco and Joaquín Salvachúa
- A Fast and Reliable Broadcast Service for LTE-Advanced Exploiting Multihop Device-to-Device Transmissions pp. 1-29

- Giovanni Nardini, Giovanni Stea and Antonio Virdis
- A Framework for Cloud Based E-Government from the Perspective of Developing Countries pp. 1-26

- Pusp Raj Joshi, Shareeful Islam and Syed Islam
- Proposed Fuzzy-NN Algorithm with LoRaCommunication Protocol for Clustered Irrigation Systems pp. 1-23

- Sotirios Kontogiannis, George Kokkonis, Soultana Ellinidou and Stavros Valsamidis
- Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems pp. 1-23

- Stylianos S. Mamais and George Theodorakopoulos
- An Ontology-Based Approach to Enable Knowledge Representation and Reasoning in Worker–Cobot Agile Manufacturing pp. 1-23

- Ahmed R. Sadik and Bodo Urban
- Approximate Networking for Universal Internet Access pp. 1-23

- Junaid Qadir, Arjuna Sathiaseelan, Umar Bin Farooq, Muhammad Usama, Muhammad Ali Imran and Muhammad Shafique
- Deep Classifiers-Based License Plate Detection, Localization and Recognition on GPU-Powered Mobile Platform pp. 1-11

- Syed Tahir Hussain Rizvi, Denis Patti, Tomas Björklund, Gianpiero Cabodi and Gianluca Francini
- SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning pp. 1-13

- Dalal Hanna, Prakash Veeraraghavan and Ben Soh
- Understanding the Digital Marketing Environment with KPIs and Web Analytics pp. 1-13

- José Ramón Saura, Pedro Palos-Sánchez and Luis Manuel Cerdá Suárez
- Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System pp. 1-13

- Jingbo Zhang, Lili Cai and Shufang Zhang
- High-Performance Elastic Management for Cloud Containers Based on Predictive Message Scheduling pp. 1-13

- Chengxin Yan, Ningjiang Chen and Zhang Shuo
- Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications pp. 1-13

- Francesco Chiti, Romano Fantacci and Laura Pierucci
- Energy-Aware Adaptive Weighted Grid Clustering Algorithm for Renewable Wireless Sensor Networks pp. 1-21

- Nelofar Aslam, Kewen Xia, Muhammad Tafseer Haider and Muhammad Usman Hadi
- Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows pp. 1-21

- Davy Preuveneers and Wouter Joosen
- FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios pp. 1-21

- Franco Mazzenga, Romeo Giuliano and Francesco Vatalaro
- Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network pp. 1-21

- Zhen Hong, Zehua Wang, Wei Cai and Victor C. M. Leung
- Extensions and Enhancements to “the Secure Remote Update Protocol” pp. 1-20

- Andrew John Poulter, Steven J. Johnson and Simon J. Cox
- A Design Space for Virtuality-Introduced Internet of Things pp. 1-20

- Kota Gushima and Tatsuo Nakajima
- Network Intrusion Detection through Discriminative Feature Selection by Using Sparse Logistic Regression pp. 1-15

- Reehan Ali Shah, Yuntao Qian, Dileep Kumar, Munwar Ali and Muhammad Bux Alvi
- Request Expectation Index Based Cache Replacement Algorithm for Streaming Content Delivery over ICN pp. 1-15

- Haipeng Li, Hidenori Nakazato and Syed Hassan Ahmed
- Study of Mobility Enhancements for RPL in Convergecast Scenarios pp. 1-15

- Jinpeng Wang and Gérard Chalhoub
- High Throughput and Acceptance Ratio Multipath Routing Algorithm in Cognitive Wireless Mesh Network pp. 1-15

- Zhufang Kuang, Gongqiang Li, Junshan Tan and Zhigang Chen
- An Integrated Dictionary-Learning Entropy-Based Medical Image Fusion Framework pp. 1-25

- Guanqiu Qi, Jinchuan Wang, Qiong Zhang, Fancheng Zeng and Zhiqin Zhu
- Signal Consensus in TSP of the Same Grid in Road Network pp. 1-10

- Dongyuan Li, Chengshuai Li, Zidong Wang, Deqiang Wang, Jianping Xing and Bo Zhang
- How 5G Wireless (and Concomitant Technologies) Will Revolutionize Healthcare? pp. 1-24

- Siddique Latif, Junaid Qadir, Shahzad Farooq and Muhammad Ali Imran
- Botnet Detection Technology Based on DNS pp. 1-12

- Xingguo Li, Junfeng Wang and Xiaosong Zhang
- A Practical Resource Management Scheme for Cellular Underlaid D2D Networks pp. 1-12

- Tae-Won Ban
- Collaborative Web Service Discovery and Recommendation Based on Social Link pp. 1-12

- Lijun Duan and Hao Tian
- Efficient Traffic Engineering Strategies for Improving the Performance of TCP Friendly Rate Control Protocol pp. 1-12

- Nalavala Ramanjaneya Reddy, Pakanati Chenna Reddy and Mokkala Padmavathamma
- Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission pp. 1-12

- Fan Jiang, Honglin Wang, Hao Ren and Shuai Xu
- TSKT-ORAM: A Two-Server k -ary Tree Oblivious RAM without Homomorphic Encryption pp. 1-22

- Jinsheng Zhang, Qiumao Ma, Wensheng Zhang and Daji Qiao
- A Comprehensive Survey on Real-Time Applications of WSN pp. 1-22

- Ahmad Ali, Yu Ming, Sagnik Chakraborty and Saima Iram
- Challenges When Using Jurimetrics in Brazil—A Survey of Courts pp. 1-14

- Bruna Armonas Colombo, Pedro Buck and Vinicius Miana Bezerra
- Quality of Service Based NOMA Group D2D Communications pp. 1-14

- Asim Anwar, Boon-Chong Seet and Xue Jun Li
- A Combinational Buffer Management Scheme in Mobile Opportunistic Network pp. 1-14

- Peiyan Yuan and Hai Yu
Volume 9, issue 3, 2017
- Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs pp. 1-9

- Il-Gu Lee
- Digital Pre-Distortion of Carrier Frequency Offset for Reliable Wi-Fi Enabled IoTs pp. 1-9

- Il-Gu Lee
- Deducing Energy Consumer Behavior from Smart Meter Data pp. 1-25

- Emad Ebeid, Rune Heick and Rune Hylsberg Jacobsen
- A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling pp. 1-10

- Lingjun Liu, Zhonghua Xie and Cui Yang
- Study on a Quality Evaluation Method for College English Classroom Teaching pp. 1-15

- Mao-hua Sun, Yuan-gang Li and Bing He
- Flow Shop Scheduling Problem and Solution in Cooperative Robotics—Case-Study: One Cobot in Cooperation with One Worker pp. 1-15

- Ahmed R. Sadik and Bodo Urban
- Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology pp. 1-20

- Luisanna Cocco, Andrea Pinna and Michele Marchesi
- Multicell Interference Management in Device to Device Underlay Cellular Networks pp. 1-20

- Georgios Katsinis, Eirini Eleni Tsiropoulou and Symeon Papavassiliou
- Design for Children’s Playful Learning with Robots pp. 1-20

- Maria Luce Lupetti, Yuan Yao, Haipeng Mi and Claudio Germak
- G-Networks with Adders pp. 1-7

- Jean-Michel Fourneau and Erol Gelenbe
- Future Intelligent Systems and Networks pp. 1-2

- Carmen De-Pablos-Heredero
- NB-IoT for D2D-Enhanced Content Uploading with Social Trustworthiness in 5G Systems † pp. 1-14

- Leonardo Militano, Antonino Orsino, Giuseppe Araniti and Antonio Iera
- ARAAC: A Rational Allocation Approach in Cloud Data Center Networks pp. 1-14

- Ahmad Nahar Quttoum, Ayoub Alsarhan and Abidalrahman Moh’d
- A Security Framework for the Internet of Things in the Future Internet Architecture pp. 1-28

- Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe
- A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing pp. 1-19

- Adrien Bonguet and Martine Bellaiche
- Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things pp. 1-16

- Ashish Rauniyar, Mohammad Irfan, Oka Danil Saputra, Jin Woo Kim, Ah Ra Lee, Jae Min Jang and Soo Young Shin
- Feasibility Study of a Socially Assistive Humanoid Robot for Guiding Elderly Individuals during Walking pp. 1-16

- Chiara Piezzo and Kenji Suzuki
- User Modelling Validation over the Security Awareness of Digital Natives pp. 1-16

- Vasileios Gkioulos, Gaute Wangen and Sokratis K. Katsikas
- Robust Image Embedded Watermarking Using DCT and Listless SPIHT pp. 1-16

- J. L. Divya Shivani and Ranjan K. Senapati
- A Robust Image Watermarking Scheme Based on SVD in the Spatial Domain pp. 1-16

- Heng Zhang, Chengyou Wang and Xiao Zhou
- Combining Adaptive Holonic Control and ISA-95 Architectures to Self-Organize the Interaction in a Worker-Industrial Robot Cooperative Workcell pp. 1-18

- Ahmed R. Sadik and Bodo Urban
- Azure-Based Smart Monitoring System for Anemia-Like Pallor pp. 1-18

- Sohini Roychowdhury, Paul Hage and Joseph Vasquez
- A Multimodal Perception Framework for Users Emotional State Assessment in Social Robotics pp. 1-17

- Lorenzo Cominelli, Nicola Carbonaro, Daniele Mazzei, Roberto Garofalo, Alessandro Tognetti and Danilo De Rossi
- Towards a New Digital Era: Observing Local E-Government Services Adoption in a Chinese Municipality pp. 1-17

- Yao Yang
- Security Enhancement for Data Migration in the Cloud pp. 1-13

- Jean Raphael Ngnie Sighom, Pin Zhang and Lin You
- An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings pp. 1-13

- Ruchdee Binmad, Mingchu Li, Zhen Wang, Nakema Deonauth and Chettupally Anil Carie
- A Novel Hybrid-Copy Algorithm for Live Migration of Virtual Machine pp. 1-13

- Zhou Lei, Exiong Sun, Shengbo Chen, Jiang Wu and Wenfeng Shen
- Visual Interface Evaluation for Wearables Datasets: Predicting the Subjective Augmented Vision Image QoE and QoS pp. 1-13

- Brian Bauman and Patrick Seeling
- Local Path Planning of Driverless Car Navigation Based on Jump Point Search Method Under Urban Environment pp. 1-13

- Kaijun Zhou, Lingli Yu, Ziwei Long and Siyao Mo
- Cryptographic Key Management in Delay Tolerant Networks: A Survey pp. 1-21

- Sofia Anna Menesidou, Vasilios Katos and Georgios Kambourakis
- Cost-Aware IoT Extension of DISSECT-CF pp. 1-21

- Andras Markus, Attila Kertesz and Gabor Kecskemeti
Volume 9, issue 2, 2017
- An Energy Efficient MAC Protocol for Wireless Passive Sensor Networks pp. 1-12

- Qingyao Yu, Guangming Li, Xiaojie Hang, Kun Fu and And Tianqi Li
- An Adaptive Back-Off Mechanism for Wireless Sensor Networks pp. 1-12

- Peng Sun, Guangming Li and Fuqiang Wang
- Spectrum and Energy Efficiency of Uplink Massive MIMO System with D2D Underlay pp. 1-11

- Xinhua Wang
- A Simple Approach to Dynamic Optimisation of Flexible Optical Networks with Practical Application pp. 1-11

- Vic Grout
- Energy Efficient Power Allocation for the Uplink of Distributed Massive MIMO Systems pp. 1-11

- Xinhua Wang, Yan Yang and Jinlu Sheng
- Towards Rack Utilization in Internet Datacenters: An Approach Based on Dynamic Programming pp. 1-13

- Haibao Chen, Yuyan Zhao and Chuxiong Yan
- A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics pp. 1-13

- Weijun Wang, Ying Li, Yinghui Huang, Hui Liu and Tingting Zhang
- Assessing OpenStreetMap Data Using Intrinsic Quality Indicators: An Extension to the QGIS Processing Toolbox pp. 1-22

- Sukhjit Sehra, Jaiteg Singh and Hardeep Singh Rai
- Private and Secure Distribution of Targeted Advertisements to Mobile Phones pp. 1-21

- Stylianos S. Mamais and George Theodorakopoulos
- Decentralized Blind Spectrum Selection in Cognitive Radio Networks Considering Handoff Cost pp. 1-8

- Yongqun Chen, Huaibei Zhou, Ruoshan Kong, Li Zhu and Huaqing Mao
- Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection pp. 1-15

- Yunpeng Zhang, Chengyou Wang, Xiaoli Wang and Min Wang
- Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish pp. 1-19

- Andrea Guazzini, Ayça Saraç, Camillo Donati, Annalisa Nardi, Daniele Vilone and Patrizia Meringolo
- An Access Control Model for Preventing Virtual Machine Escape Attack pp. 1-19

- Jiang Wu, Zhou Lei, Shengbo Chen and Wenfeng Shen
Volume 9, issue 1, 2017
- Construction Management Risk System (CMRS) for Construction Management (CM) Firms pp. 1-20

- Kyungmo Park, Sanghyo Lee and Yonghan Ahn
- Key Technologies in the Context of Future Networks: Operational and Management Requirements pp. 1-15

- Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay, Marco Antonio Sotelo Monge and Luis Javier García Villalba
- An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning pp. 1-15

- Jingsha He, Qi Xiao, Peng He and Muhammad Salman Pathan
- A Point of View on New Education for Smart Citizenship pp. 1-17

- Cristina Martelli
- Improved Recommendations Based on Trust Relationships in Social Networks pp. 1-9

- Hao Tian and Peifeng Liang
- Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset pp. 1-19

- Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis and Leman Akoglu
- Acknowledgement to Reviewers of Future Internet in 2016 pp. 1-2

- Future Internet Editorial Office
- Towards Incidence Management in 5G Based on Situational Awareness pp. 1-14

- Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay, Jorge Maestre Vidal, Marco Antonio Sotelo Monge and Luis Javier García Villalba
- Designing a Softwarized Network Deployed on a Fleet of Drones for Rural Zone Monitoring pp. 1-21

- Corrado Rametta and Giovanni Schembra
| |