Content
February 2020, Volume 12, Issue 3
- 1-14 Language Cognition and Pronunciation Training Using Applications
by Ming Sung Kan & Atsushi Ito - 1-17 BASN—Learning Steganography with a Binary Attention Mechanism
by Pin Wu & Xuting Chang & Yang Yang & Xiaoqiang Li
January 2020, Volume 12, Issue 2
- 1-12 Well-Being and Social Media: A Systematic Review of Bergen Addiction Scales
by Mirko Duradoni & Federico Innocenti & Andrea Guazzini - 1-17 MCCM: An Approach for Connectivity and Coverage Maximization
by Alia Ghaddar & Monah Bou Hatoum & Ghassan Fadlallah & Hamid Mcheick - 1-18 Adaptive Pre/Post-Compensation of Cascade Filters in Coherent Optical Transponders
by Ahmad Abdo & Claude D’Amours - 1-27 A Review of Advanced Algebraic Approaches Enabling Network Tomography for Future Network Infrastructures
by Grigorios Kakkavas & Despoina Gkatzioura & Vasileios Karyotis & Symeon Papavassiliou - 1-27 Mobility, Citizens, Innovation and Technology in Digital and Smart Cities
by Thays A. Oliveira & Yuri B. Gabrich & Helena Ramalhinho & Miquel Oliver & Miri W. Cohen & Luiz S. Ochi & Serigne Gueye & Fábio Protti & Alysson A. Pinto & Diógenes V. M. Ferreira & Igor M. Coelho & Vitor N. Coelho - 1-27 A Rule-Based Language and Verification Framework of Dynamic Service Composition
by Willy Kengne Kungne & Georges-Edouard Kouamou & Claude Tangha
February 2020, Volume 12, Issue 2
- 1-2 Information-Centric Networking (ICN)
by Nikos Fotiou - 1-3 Global Trends and Advances Towards a Smarter Grid and Smart Cities
by Om P. Malik - 1-12 A Novel Low-Complexity Fault Diagnosis Algorithm for Energy Internet in Smart Cities
by Jiong Wang & Hua Zhang & Dongliang Lin & Huibin Feng & Tao Wang & Hongyan Zhang & Xiaoding Wang - 1-12 A Methodology Based on Computational Patterns for Offloading of Big Data Applications on Cloud-Edge Platforms
by Beniamino Di Martino & Salvatore Venticinque & Antonio Esposito & Salvatore D’Angelo - 1-12 RFID RSS Fingerprinting System for Wearable Human Activity Recognition
by Wafa Shuaieb & George Oguntala & Ali AlAbdullah & Huthaifa Obeidat & Rameez Asif & Raed A. Abd-Alhameed & Mohammed S. Bin-Melha & Chakib Kara-Zaïtri - 1-13 Unsteady Multi-Element Time Series Analysis and Prediction Based on Spatial-Temporal Attention and Error Forecast Fusion
by Xiaofan Wang & Lingyu Xu - 1-13 Know Your Customer (KYC) Implementation with Smart Contracts on a Privacy-Oriented Decentralized Architecture
by Nikolaos Kapsoulis & Alexandros Psychas & Georgios Palaiokrassas & Achilleas Marinakis & Antonios Litke & Theodora Varvarigou - 1-14 A Survey on Troll Detection
by Michele Tomaiuolo & Gianfranco Lombardo & Monica Mordonini & Stefano Cagnoni & Agostino Poggi - 1-14 Data Exchange in Cluster Structure for Longevity of IoT
by Soobin Jeon - 1-14 Hierarchical Gated Recurrent Unit with Semantic Attention for Event Prediction
by Zichun Su & Jialin Jiang - 1-15 Latent Structure Matching for Knowledge Transfer in Reinforcement Learning
by Yi Zhou & Fenglei Yang - 1-16 A Blockchain based PKI Validation System based on Rare Events Management
by Maurizio Talamo & Franco Arcieri & Andrea Dimitri & Christian H. Schunck - 1-18 Intelligent Thermal Comfort Controlling System for Buildings Based on IoT and AI
by Yafei Zhao & Paolo Vincenzo Genovese & Zhixing Li - 1-19 Cognitive Training for the Treatment of Addictions Mediated by Information and Communication Technologies (ICT)
by Sandra Restrepo & Dubis Rincón & Edwin Sepulveda - 1-20 EAOA: Energy-Aware Grid-Based 3D-Obstacle Avoidance in Coverage Path Planning for UAVs
by Alia Ghaddar & Ahmad Merei - 1-23 A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices
by Miao Yu & Jianwei Zhuge & Ming Cao & Zhiwei Shi & Lin Jiang - 1-30 Strategies of Success for Social Networks: Mermaids and Temporal Evolution
by Massimo Marchiori & Lino Possamai
January 2020, Volume 12, Issue 1
- 1-3 Software Defined Networking (SDN) and Network Function Virtualization (NFV)
by Symeon Papavassiliou - 1-8 Acknowledgement to Reviewers of Future Internet in 2019
by Future Internet Editorial Office - 1-11 Geocentric Spherical Surfaces Emulating the Geostationary Orbit at Any Latitude with Zenith Links
by Emilio Matricciani - 1-13 Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
by Zhijun Wu & Yun Zhang & Enzhong Xu - 1-15 Study on Bridge Displacement Monitoring Algorithms Based on Multi-Targets Tracking
by Jiajia Wang & Guangming Li - 1-15 Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
by Zhijun Wu & Rong Li & Panpan Yin & Changliang Li - 1-16 Mitigating Webshell Attacks through Machine Learning Techniques
by You Guo & Hector Marco-Gisbert & Paul Keir - 1-16 Twitter-Based Safety Confirmation System for Disaster Situations
by Keisuke Utsu & Mariko Abe & Shuji Nishikawa & Osamu Uchida - 1-17 Long-Range Wireless Radio Technologies: A Survey
by Brandon Foubert & Nathalie Mitton - 1-19 An Architecture for Biometric Electronic Identification Document System Based on Blockchain †
by Rafael Páez & Manuel Pérez & Gustavo Ramírez & Juan Montes & Lucas Bouvarel - 1-21 WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications
by Asfund Ausaf & Mohammad Zubair Khan & Muhammad Awais Javed & Ali Kashif Bashir - 1-22 A Novel Resource Allocation Scheme in NOMA-Based Cellular Network with D2D Communications
by Jingpu Wang & Xin Song & Yatao Ma
December 2019, Volume 12, Issue 1
- 1-2 Search Engine Optimization
by Andreas Veglis & Dimitrios Giomelakis - 1-13 Coverage and Energy Efficiency Analysis for Two-Tier Heterogeneous Cellular Networks Based on Matérn Hard-Core Process
by Jie Yang & Ziyu Pan & Lihong Guo - 1-13 An Adaptive Differential Protection and Fast Auto-Closing System for 10 kV Distribution Networks Based on 4G LTE Wireless Communication
by Wen An & Jun Jie Ma & Hong Yang Zhou & Hong Shan Chen & Xu Jun & Xu Jian - 1-14 Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems
by Samuel Yankson & Mahdi Ghamkhari - 1-16 Decoupling-Based Channel Access Mechanism for Improving Throughput and Fairness in Dense Multi-Rate WLANs
by Jianjun Lei & Ying Wang & Hong Yun - 1-16 5G Cross-Border Operation for Connected and Automated Mobility: Challenges and Solutions
by Apostolos Kousaridas & Andreas Schimpe & Sebastian Euler & Xavier Vilajosana & Mikael Fallgren & Giada Landi & Francesca Moscatelli & Sokratis Barmpounakis & Francisco Vázquez-Gallego & Roshan Sedar & Rodrigo Silva & Laurent Dizambourg & Stefan Wendt & Maciej Muehleisen & Kurt Eckert & Jérôme Härri & Jesus Alonso-Zarate
December 2019, Volume 11, Issue 12
- 1-10 Partial Pre-Emphasis for Pluggable 400 G Short-Reach Coherent Systems
by Ahmad Abdo & Xueyang Li & Md Samiul Alam & Mahdi Parvizi & Naim Ben-Hamida & Claude D’Amours & David Plant - 1-11 Dependable and Secure Voting Mechanism in Edge Computing
by Pedro A.R.S. Costa & Marko Beko - 1-12 A Method of Node Layout of a Complex Network Based on Community Compression
by Chengxiang Liu & Wei Xiong & Xitao Zhang & Zheng Liu - 1-12 Reinforcement Learning Based Query Routing Approach for P2P Systems
by Fawaz Alanazi & Taoufik Yeferny - 1-13 A Novel Neural Network-Based Method for Medical Text Classification
by Li Qing & Weng Linhong & Ding Xuehai - 1-13 The Missing Link to Computational Thinking
by Michael Pollak & Martin Ebner - 1-14 Spectrum Management Schemes for Internet of Remote Things (IoRT) Devices in 5G Networks via GEO Satellite
by Gbolahan Aiyetoro & Pius Owolawi - 1-15 Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment
by Zakariae Belghazi & Nabil Benamar & Adnane Addaim & Chaker Abdelaziz Kerrache - 1-15 SEO inside Newsrooms: Reports from the Field
by Dimitrios Giomelakis & Christina Karypidou & Andreas Veglis - 1-16 Research on Community Detection of Online Social Network Members Based on the Sparse Subspace Clustering Approach
by Zihe Zhou & Bo Tian - 1-16 Blockchain: Current Challenges and Future Prospects/Applications
by Spyros Makridakis & Klitos Christodoulou - 1-18 An Efficient Dynamic Load Balancing Scheme Based on Nash Bargaining in SDN
by Guoyan Li & Kaixin Li & Yi Liu & Yuheng Pan - 1-23 A Review of Internet of Things Technologies for Ambient Assisted Living Environments
by Rytis Maskeliūnas & Robertas Damaševičius & Sagiv Segal - 1-23 Acquiring Ontology Axioms through Mappings to Data Sources
by Floriana Di Pinto & Giuseppe De Giacomo & Domenico Lembo & Maurizio Lenzerini & Riccardo Rosati
November 2019, Volume 11, Issue 12
- 1-11 Learning Dynamic Factors to Improve the Accuracy of Bus Arrival Time Prediction via a Recurrent Neural Network
by Xin Zhou & Peixin Dong & Jianping Xing & Peijia Sun - 1-13 A Deep Ensemble Learning Method for Effort-Aware Just-In-Time Defect Prediction
by Saleh Albahli - 1-16 Real-Time Stream Processing in Social Networks with RAM 3 S
by Ilaria Bartolini & Marco Patella - 1-24 Performance Analysis of On-Demand Scheduling with and without Network Coding in Wireless Broadcast
by G. G. Md. Nawaz Ali & Victor C. S. Lee & Yuxuan Meng & Peter H. J. Chong & Jun Chen
November 2019, Volume 11, Issue 11
- 1-12 Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics
by Majid Ashouri & Fabian Lorig & Paul Davidsson & Romina Spalazzese - 1-13 Name-Based Security for Information-Centric Networking Architectures
by Nikos Fotiou & George C. Polyzos - 1-13 Body-to-Body Cooperation in Internet of Medical Things: Toward Energy Efficiency Improvement
by Dalal Abdulmohsin Hammood & Hasliza A. Rahim & Ahmed Alkhayyat & R. Badlishah Ahmad - 1-13 Wideband Spectrum Sensing Based on Reconfigurable Filter Bank in Cognitive Radio
by Huan Wang & Bin Wu & Yuancheng Yao & Mingwei Qin - 1-13 Pedestrian Attribute Recognition with Graph Convolutional Network in Surveillance Scenarios
by Xiangpeng Song & Hongbin Yang & Congcong Zhou - 1-15 Roll Motion Prediction of Unmanned Surface Vehicle Based on Coupled CNN and LSTM
by Wenjie Zhang & Pin Wu & Yan Peng & Dongke Liu - 1-17 Reputation-Based Trust Approaches in Named Data Networking
by Ioanna Angeliki Kapetanidou & Christos-Alexandros Sarros & Vassilis Tsaoussidis - 1-20 A Context-Aware Conversational Agent in the Rehabilitation Domain
by Thanassis Mavropoulos & Georgios Meditskos & Spyridon Symeonidis & Eleni Kamateri & Maria Rousi & Dimitris Tzimikas & Lefteris Papageorgiou & Christos Eleftheriadis & George Adamopoulos & Stefanos Vrochidis & Ioannis Kompatsiaris - 1-20 Research on Cooperative Communication Strategy and Intelligent Agent Directional Source Grouping Algorithms for Internet of Things
by Yongyan Zou & Yanzhi Zhang & Xin Yi - 1-20 Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes
by Katerina Vgena & Angeliki Kitsiou & Christos Kalloniatis & Dimitris Kavroudakis & Stefanos Gritzalis - 1-20 Multimedia Independent Multipath Routing Algorithms for Internet of Things Based on a Node Hidden Communication Model
by Cong Wu & Jianhui Yang - 1-24 Machine Learning-Based Patient Load Prediction and IoT Integrated Intelligent Patient Transfer Systems
by Kambombo Mtonga & Santhi Kumaran & Chomora Mikeka & Kayalvizhi Jayavel & Jimmy Nsenga - 1-24 Feature Fusion Text Classification Model Combining CNN and BiGRU with Multi-Attention Mechanism
by Jingren Zhang & Fang’ai Liu & Weizhi Xu & Hui Yu - 1-25 Academic Excellence, Website Quality, SEO Performance: Is there a Correlation?
by Andreas Giannakoulopoulos & Nikos Konstantinou & Dimitris Koutsompolis & Minas Pergantis & Iraklis Varlamis - 1-35 Software Architecture for Mobile Cloud Computing Systems
by Abdulrahman Alreshidi & Aakash Ahmad & Ahmed B. Altamimi & Khalid Sultan & Rashid Mehmood
October 2019, Volume 11, Issue 11
- 1-3 Special Issue “New Perspectives in Intelligent Transportation Systems and Mobile Communications towards a Smart Cities Context”
by Giovanni Pau & Alessandro Severino & Antonino Canale - 1-11 Operation Scheduling Optimization for Microgrids Considering Coordination of Their Components
by Hirotaka Takano & Ryota Goto & Thin Zar Soe & Nguyen Duc Tuyen & Hiroshi Asano - 1-11 IoT Based Smart City Bus Stops
by Miraal Kamal & Manal Atif & Hafsa Mujahid & Tamer Shanableh & A. R. Al-Ali & Ahmad Al Nabulsi - 1-13 FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing
by Yuling Chen & Jinyi Guo & Changlou Li & Wei Ren - 1-16 Integration of LTE 230 and LTE 1800 in Power Wireless Private Networks
by Zhengyang Ding & Weiwei Miao & Mingxuan Zhang & Wei Li & Rui Liu & Jun Zou & Chen Xu - 1-19 Impacts of Video Display on Purchase Intention for Digital and Home Appliance Products—Empirical Study from China
by Ruohong Hao & Bingjia Shao & Rong Ma - 1-20 High-Level Smart Decision Making of a Robot Based on Ontology in a Search and Rescue Scenario
by Xiaolei Sun & Yu Zhang & Jing Chen - 1-21 Fog Computing in IoT Smart Environments via Named Data Networking: A Study on Service Orchestration Mechanisms
by Marica Amadeo & Giuseppe Ruggeri & Claudia Campolo & Antonella Molinaro & Valeria Loscrí & Carlos T. Calafate - 1-21 Predicting Rogue Content and Arabic Spammers on Twitter
by Adel R. Alharbi & Amer Aljaedi - 1-24 Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
by Georgios Spathoulas & Nikolaos Giachoudis & Georgios-Paraskevas Damiris & Georgios Theodoridis
October 2019, Volume 11, Issue 10
- 1-12 Blockchain and the Tokenization of the Individual: Societal Implications
by Monique J. Morrow & Mehran Zarrebini - 1-14 About Linda Again: How Narratives and Group Reasoning Can Influence Conjunction Fallacy
by Camillo Donati & Andrea Guazzini & Giorgio Gronchi & Andrea Smorti - 1-16 Beam Training for Millimeter-Wave Communication Based on Tabu Table Enhanced Rosenbrock Algorithm
by Xiaoyu Li & Changyin Sun & Fan Jiang - 1-16 Assessing the Techno-Economic Benefits of Flexible Demand Resources Scheduling for Renewable Energy–Based Smart Microgrid Planning
by Mark Kipngetich Kiptoo & Oludamilare Bode Adewuyi & Mohammed Elsayed Lotfy & Theophilus Amara & Keifa Vamba Konneh & Tomonobu Senjyu - 1-20 Sensorial Network Framework Embedded in Ubiquitous Mobile Devices
by Miroslav Behan & Ondrej Krejcar & Thabit Sabbah & Ali Selamat - 1-22 Low Delay Inter-Packet Coding in Vehicular Networks
by Irina Bocharova & Boris Kudryashov & Nikita Lyamin & Erik Frick & Maben Rabi & Alexey Vinel - 1-24 Blockchain Technology for Intelligent Environments
by Spyros Voulgaris & Nikos Fotiou & Vasilios A. Siris & George C. Polyzos & Mikael Jaatinen & Yannis Oikonomidis - 1-24 Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things
by Johannes Kölsch & Christopher Heinz & Axel Ratzke & Christoph Grimm - 1-26 5G V2X System-Level Architecture of 5GCAR Project
by Massimo Condoluci & Laurent Gallo & Laurent Mussot & Apostolos Kousaridas & Panagiotis Spapis & Maliheh Mahlouji & Toktam Mahmoodi - 1-34 A Survey on LoRaWAN Architecture, Protocol and Technologies
by Mehmet Ali Ertürk & Muhammed Ali Aydın & Muhammet Talha Büyükakkaşlar & Hayrettin Evirgen - 1-38 A Trustworthy Communication Hub for Cyber-Physical Systems
by Juhani Latvakoski & Jouni Heikkinen
September 2019, Volume 11, Issue 10
- 1-11 Joint Optimization of Pico-Base-Station Density and Transmit Power for an Energy-Efficient Heterogeneous Cellular Network
by Jie Yang & Ziyu Pan & Hengfei Xu & Han Hu - 1-13 Adaptive Coherent Receiver Settings for Optimum Channel Spacing in Gridless Optical Networks
by Ahmad Abdo & Sadok Aouini & Bilal Riaz & Naim Ben-Hamida & Claude D’Amours - 1-18 No-Reference Depth Map Quality Evaluation Model Based on Depth Map Edge Confidence Measurement in Immersive Video Applications
by Safak Dogan & Nasser Haddad & Erhan Ekmekcioglu & Ahmet M. Kondoz - 1-18 Time and Power Allocation for Energy Efficiency Maximization in Wireless-Powered Full-Duplex Relay Systems
by Xin Song & Yue Ni & Xiuwei Han & Lei Qin & Li Dong - 1-19 Threat Analysis for Smart Homes
by Georgios Kavallieratos & Nabin Chowdhury & Sokratis Katsikas & Vasileios Gkioulos & Stephen Wolthusen - 1-30 Partitioning Convolutional Neural Networks to Maximize the Inference Rate on Constrained IoT Devices
by Fabíola Martins Campos de Oliveira & Edson Borin
August 2019, Volume 11, Issue 9
- 1-13 SEO Practices: A Study about the Way News Websites Allow the Users to Comment on Their News Articles
by Minos-Athanasios Karyotakis & Evangelos Lamprou & Matina Kiourexidou & Nikos Antonopoulos - 1-14 Sustainable Communication Systems: A Graph-Labeling Approach for Cellular Frequency Allocation in Densely-Populated Areas
by Adebola Orogun & Oluwaseun Fadeyi & Ondrej Krejcar - 1-15 An Improved Method for Named Entity Recognition and Its Application to CEMR
by Ming Gao & Qifeng Xiao & Shaochun Wu & Kun Deng - 1-17 Mobility-Enabled Edge Server Selection for Multi-User Composite Services
by Wenming Zhang & Yiwen Zhang & Qilin Wu & Kai Peng - 1-18 Research on SWIM Services Dynamic Migration Method
by Zhijun Wu & Shengyan Zhou & Liang Liu & Jin Lei - 1-21 A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
by Håkon Gunleifsen & Thomas Kemmerich & Vasileios Gkioulos - 1-23 An Ontology-Based Recommender System with an Application to the Star Trek Television Franchise
by Paul Sheridan & Mikael Onsjö & Claudia Becerra & Sergio Jimenez & George Dueñas
September 2019, Volume 11, Issue 9
- 1-3 Social Network Services Management and Risk of Doocing. Comment on Kim, S.; Park, H.; Choi, M.J. “Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations. Future Internet 2019, 11, 137”
by Stefania Fantinelli & Michela Cortini - 1-13 Deep Learning-Based Sentimental Analysis for Large-Scale Imbalanced Twitter Data
by Nasir Jamal & Chen Xianqiao & Hamza Aldabbas - 1-13 Incorporating Background Checks with Sentiment Analysis to Identify Violence Risky Chinese Microblogs
by Yun-Fei Jia & Shan Li & Renbiao Wu - 1-13 Vehicular Delay-Tolerant Networks with Image Recognition-Based Adaptive Array Antenna for Winter Road Surveillance in Local Areas
by Noriki Uchida & Goshi Sato & Yoshitaka Shibata - 1-15 Dynamic Group Recommendation Based on the Attention Mechanism
by Haiyan Xu & Yanhui Ding & Jing Sun & Kun Zhao & Yuanjian Chen - 1-16 RFID Based Embedded System for Sustainable Food Management in an IoT Network Paradigm
by Raúl Parada & Alfonso Palazón & Carlos Monzo & Joan Melià-Seguí - 1-17 Satellite Integration into 5G: Accent on First Over-The-Air Tests of an Edge Node Concept with Integrated Satellite Backhaul
by Florian Völk & Konstantinos Liolis & Marius Corici & Joe Cahill & Robert T. Schwarz & Thomas Schlichter & Eric Troudt & Andreas Knopp - 1-19 A Framework for the Detection of Search and Rescue Patterns Using Shapelet Classification
by Konstantinos Kapadais & Iraklis Varlamis & Christos Sardianos & Konstantinos Tserpes - 1-19 Enhancing the 3GPP V2X Architecture with Information-Centric Networking
by Marica Amadeo & Claudia Campolo & Antonella Molinaro & Jerome Harri & Christian Esteve Rothenberg & Alexey Vinel - 1-21 ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing
by Masky Mackita & Soo-Young Shin & Tae-Young Choe - 1-21 Evaluating the Degree of Uncertainty of Research Activities in Industry 4.0
by Sirio Cividino & Gianluca Egidi & Ilaria Zambon & Andrea Colantoni - 1-21 Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations
by Wei Sun & Shiwei Wei & Huaping Guo & Hongbing Liu - 1-21 Ranking by Relevance and Citation Counts, a Comparative Study: Google Scholar, Microsoft Academic, WoS and Scopus
by Cristòfol Rovira & Lluís Codina & Frederic Guerrero-Solé & Carlos Lopezosa - 1-24 25 Years of Bluetooth Technology
by Sherali Zeadally & Farhan Siddiqui & Zubair Baig - 1-25 MU R-CNN: A Two-Dimensional Code Instance Segmentation Network Based on Deep Learning
by Baoxi Yuan & Yang Li & Fan Jiang & Xiaojie Xu & Yingxia Guo & Jianhua Zhao & Deyue Zhang & Jianxin Guo & Xiaoli Shen
July 2019, Volume 11, Issue 8
- 1-8 A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System
by Saumendra Sengupta & Chen-Fu Chiang & Bruno Andriamanalimanana & Jorge Novillo & Ali Tekeoglu - 1-13 Energy Efficient Communications for Reliable IoT Multicast 5G/Satellite Services
by Francesco Chiti & Romano Fantacci & Laura Pierucci - 1-14 Social Emotional Opinion Decision with Newly Coined Words and Emoticon Polarity of Social Networks Services
by Jin Sol Yang & Myung-Sook Ko & Kwang Sik Chung - 1-14 Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers
by Jie Yuan & Erxia Li & Chaoqun Kang & Fangyuan Chang & Tingting Yuan & Xiaoyong Li - 1-17 Software Defined Wireless Mesh Network Flat Distribution Control Plane
by Hisham Elzain & Yang Wu
August 2019, Volume 11, Issue 8
- 1-11 Combined Self-Attention Mechanism for Chinese Named Entity Recognition in Military
by Fei Liao & Liangli Ma & Jingjing Pei & Linshan Tan - 1-13 Research on Factors Affecting Solvers’ Participation Time in Online Crowdsourcing Contests
by Keng Yang - 1-13 RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
by Yong Fang & Cheng Huang & Yijia Xu & Yang Li - 1-14 Mars to Earth Data Downloading: A Directory Synchronization Approach
by Marco Bertolazzi & Carlo Caini - 1-14 A Systematic Analysis of Real-World Energy Blockchain Initiatives
by Peter O’Donovan & Dominic T. J. O’Sullivan - 1-14 A Novel Task Caching and Migration Strategy in Multi-Access Edge Computing Based on the Genetic Algorithm
by Lujie Tang & Bing Tang & Linyao Kang & Li Zhang - 1-15 Artificial Intelligence Implementations on the Blockchain. Use Cases and Future Applications
by Konstantinos Sgantzos & Ian Grigg - 1-16 Artificial Intelligence Imagery Analysis Fostering Big Data Analytics
by Stefan Cremer & Claudia Loebbecke - 1-17 An Image Feature-Based Method for Parking Lot Occupancy
by Paula Tătulea & Florina Călin & Remus Brad & Lucian Brâncovean & Mircea Greavu - 1-18 Modeling of Cumulative QoE in On-Demand Video Services: Role of Memory Effect and Degree of Interest
by Tho Nguyen Duc & Chanh Minh Tran & Phan Xuan Tan & Eiji Kamioka - 1-18 Quality of Experience (QoE)-Aware Fast Coding Unit Size Selection for HEVC Intra-Prediction
by Buddhiprabha Erabadda & Thanuja Mallikarachchi & Chaminda Hewage & Anil Fernando - 1-20 Scheduling for Multi-User Multi-Input Multi-Output Wireless Networks with Priorities and Deadlines
by Li-on Raviv & Amir Leshem - 1-23 Impact of Modern Virtualization Methods on Timing Precision and Performance of High-Speed Applications
by Veronika Kirova & Kirill Karpov & Eduard Siemens & Irina Zander & Oksana Vasylenko & Dmitry Kachan & Sergii Maksymov
June 2019, Volume 11, Issue 7
- 1-16 A Dynamic Application-Partitioning Algorithm with Improved Offloading Mechanism for Fog Cloud Networks
by Adeel Abro & Zhongliang Deng & Kamran Ali Memon & Asif Ali Laghari & Khalid Hussain Mohammadani & Noor ul Ain - 1-26 Service Level Agreement Violations in Cloud Storage: Insurance and Compensation Sustainability
by Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi
July 2019, Volume 11, Issue 7
- 1-10 The Effects of the Floating Action Button on Quality of Experience
by Jesenka Pibernik & Jurica Dolic & Hrvoje Abraham Milicevic & Bojan Kanizaj - 1-11 Web Browser Network Based on a BA Model for a Web-Based Virtual World
by Masaki Kohana & Shinji Sakamoto & Shusuke Okamoto - 1-12 Stacking-Based Ensemble Learning of Self-Media Data for Marketing Intention Detection
by Yufeng Wang & Shuangrong Liu & Songqian Li & Jidong Duan & Zhihao Hou & Jia Yu & Kun Ma - 1-12 Implementation and Evaluation of Activity-Based Congestion Management Using P4 (P4-ABC)
by Michael Menth & Habib Mostafaei & Daniel Merling & Marco Häberle - 1-13 A Multi-Attention Network for Aspect-Level Sentiment Analysis
by Qiuyue Zhang & Ran Lu - 1-14 A Game Theoretic Interference Management Scheme in Full Duplex Cellular Systems under Infeasible QoS Requirements
by Ali Y. Al-Zahrani - 1-14 Distributed Uniform Streaming Framework: An Elastic Fog Computing Platform for Event Stream Processing and Platform Transparency
by Simon Vanneste & Jens de Hoog & Thomas Huybrechts & Stig Bosmans & Reinout Eyckerman & Muddsair Sharif & Siegfried Mercelis & Peter Hellinckx - 1-15 Crossing the Borders: Re-Use of Smart Learning Objects in Advanced Content Access Systems
by Hamza Manzoor & Kamil Akhuseyinoglu & Jackson Wonderly & Peter Brusilovsky & Clifford A. Shaffer - 1-15 Improving Forensic Triage Efficiency through Cyber Threat Intelligence
by Nikolaos Serketzis & Vasilios Katos & Christos Ilioudis & Dimitrios Baltatzis & Georgios Pangalos - 1-17 Maintaining the Sense of Agency in Semi-Autonomous Robot Conferencing
by Kazuaki Tanaka & Kota Takenouchi & Kohei Ogawa & Yuichiro Yoshikawa & Shuichi Nishio & Hiroshi Ishiguro - 1-17 Town-Watching Workshop Using Disaster Information Tweeting and Mapping System
by Keisuke Utsu & Shun Ueta & Sachi Tajima & Yoshitaka Kajita & Yuji Murakami & Osamu Uchida - 1-17 Platform Economy and Techno-Regulation—Experimenting with Reputation and Nudge
by Nicola Lettieri & Alfonso Guarino & Delfina Malandrino & Rocco Zaccagnino - 1-18 An Image Authentication Scheme Using Merkle Tree Mechanisms
by Yi-Cheng Chen & Yueh-Peng Chou & Yung-Chen Chou - 1-18 Signatures of the Crypto-Currency Market Decoupling from the Forex
by Stanisław Drożdż & Ludovico Minati & Paweł Oświȩcimka & Marek Stanuszek & Marcin Wa̧torek - 1-20 A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications
by Stefano Busanelli & Simone Cirani & Lorenzo Melegari & Marco Picone & Mirco Rosa & Luca Veltri - 1-22 Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management
by Abderahman Rejeb & John G. Keogh & Horst Treiblmaier - 1-23 Structuring Reference Architectures for the Industrial Internet of Things
by Sebastian R. Bader & Maria Maleshkova & Steffen Lohmann - 1-25 Marine Internet for Internetworking in Oceans: A Tutorial
by Shengming Jiang - 1-25 A Next-Generation Core Network Architecture for Mobile Networks
by Andrea G. Forte & Wei Wang & Luca Veltri & Gianluigi Ferrari - 1-30 Architecting Software for the Internet of Thing Based Systems
by Abdulrahman Alreshidi & Aakash Ahmad - 1-34 Automatic Addition of Fault-Tolerance in Presence of Unchangeable Environment Actions †
by Mohammad Roohitavaf & Sandeep Kulkarni
June 2019, Volume 11, Issue 6
- 1-2 Future Intelligent Systems and Networks
by Carmen De-Pablos-Heredero - 1-13 Time Series Irradiance Synthesizer for Optical GEO Satellite Downlinks in 5G Networks
by Theodore T. Kapsis & Nikolaos K. Lyras & Charilaos I. Kourogiorgas & Athanasios D. Panagopoulos - 1-16 Digital Marketing Actions That Achieve a Better Attraction and Loyalty of Users: An Analytical Study
by Juan José López García & David Lizcano & Celia MQ Ramos & Nelson Matos - 1-16 Bridging User Perception and Stickiness in Business Microblog Contexts: A Moderated Mediation Model
by Chien-Lung Hsu & Yi-Chuan Liao - 1-16 Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication
by Dedi Gunawan & Masahiro Mambo - 1-17 Energy-Efficient Multi-User Routing in a Software-Defined Multi-Hop Wireless Network
by Ziqi Liu & Gaochao Xu & Peng Liu & Xiaodong Fu & Yang Liu - 1-17 The Interaction Effect of Type of Message X YouTuber’s Media Metrics on Customers’ Responses and the Moderation of Conformity Intention
by Melby Karina Zuniga Huertas & Tarcisio Duarte Coelho - 1-18 Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking
by Meng Kuai & Xiaoyan Hong - 1-20 A Choreography-Based and Collaborative Road Mobility System for L’Aquila City
by Marco Autili & Amleto Di Salle & Francesco Gallo & Claudio Pompilio & Massimo Tivoli - 1-20 Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations
by Sanghyun Kim & Hyunsun Park & Moon Jong Choi - 1-22 Joint Location-Dependent Pricing and Request Mapping in ICN-Based Telco CDNs For 5G
by Mingshuang Jin & Hongbin Luo & Shuai Gao & Bohao Feng - 1-22 Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications
by Andrei Vladyko & Abdukodir Khakimov & Ammar Muthanna & Abdelhamied A. Ateya & Andrey Koucheryavy - 1-22 Developing Internet Online Procurement Frameworks for Construction Firms
by Rafikullah Deraman & Chen Wang & Jeffrey Boon Hui Yap & Heng Li & Faizul Azli Mohd-Rahim - 1-25 CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems
by Pramod T. C. & Thejas G. S. & S. S. Iyengar & N. R. Sunitha - 1-27 The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment
by Vatsala Nundloll & Barry Porter & Gordon S. Blair & Bridget Emmett & Jack Cosby & Davey L. Jones & Dave Chadwick & Ben Winterbourn & Philip Beattie & Graham Dean & Rory Shaw & Wayne Shelley & Mike Brown & Izhar Ullah - 1-30 Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
by Michele De Donno & Alberto Giaretta & Nicola Dragoni & Antonio Bucchiarone & Manuel Mazzara
May 2019, Volume 11, Issue 6
- 1-15 Indoor Vehicles Geolocalization Using LoRaWAN
by Pietro Manzoni & Carlos T. Calafate & Juan-Carlos Cano & Enrique Hernández-Orallo - 1-16 Dynamic Task Scheduling Algorithm with Deadline Constraint in Heterogeneous Volunteer Computing Platforms
by Ling Xu & Jianzhong Qiao & Shukuan Lin & Wanting Zhang - 1-16 Vehicle Speed Estimation Based on 3D ConvNets and Non-Local Blocks
by Huanan Dong & Ming Wen & Zhouwang Yang - 1-20 Survey and Perspectives of Vehicular Wi-Fi versus Sidelink Cellular-V2X in the 5G Era
by Alessandro Bazzi & Giammarco Cecchini & Michele Menarini & Barbara M. Masini & Alberto Zanella
April 2019, Volume 11, Issue 5
- 1-11 Real-Time Monitoring of Passenger’s Psychological Stress
by Gaël Vila & Christelle Godin & Oumayma Sakri & Etienne Labyt & Audrey Vidal & Sylvie Charbonnier & Simon Ollander & Aurélie Campagne - 1-12 Analysis of the Structure and Use of Digital Resources on the Websites of the Main Football Clubs in Europe
by Santiago Tejedor & Laura Cervi & Gerard Gordon - 1-31 Computational Social Science of Disasters: Opportunities and Challenges
by Annetta Burger & Talha Oz & William G. Kennedy & Andrew T. Crooks
May 2019, Volume 11, Issue 5
- 1-9 Enhancing IoT Data Dependability through a Blockchain Mirror Model
by Alessandro Bellini & Emanuele Bellini & Monica Gherardelli & Franco Pirri - 1-11 Characteristics of Cyberstalking Behavior, Consequences, and Coping Strategies: A Cross-Sectional Study in a Sample of Italian University Students
by Tatiana Begotti & Daniela Acquadro Maran - 1-13 A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication
by Adeel Abro & Zhongliang Deng & Kamran Ali Memon - 1-13 Substitute Seed Nodes Mining Algorithms for Influence Maximization in Multi-Social Networks
by Xuli Rao & Jiaxu Zhao & Zhide Chen & Feng Lin - 1-13 Convolutional Two-Stream Network Using Multi-Facial Feature Fusion for Driver Fatigue Detection
by Weihuang Liu & Jinhao Qian & Zengwei Yao & Xintao Jiao & Jiahui Pan - 1-15 Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms
by Amer Al-Rahayfeh & Saleh Atiewi & Abdullah Abuhussein & Muder Almiani - 1-15 Guidelines towards Information-Driven Mobility Management
by Rute C. Sofia - 1-16 Word Sense Disambiguation Using Cosine Similarity Collaborates with Word2vec and WordNet
by Korawit Orkphol & Wu Yang - 1-17 Combining Facial Expressions and Electroencephalography to Enhance Emotion Recognition
by Yongrui Huang & Jianhao Yang & Siyu Liu & Jiahui Pan