Next Issue
Previous Issue

Table of Contents

Future Internet, Volume 5, Issue 3 (September 2013), Pages 301-459

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Readerexternal link to open them.
View options order results:
result details:
Displaying articles 1-8
Export citation of selected articles as:

Research

Jump to: Review

Open AccessArticle Virtual Relationship Violence and Perspectives on Punishment: Do Gender or Nationality Matter?
Future Internet 2013, 5(3), 301-316; doi:10.3390/fi5030301
Received: 11 March 2013 / Revised: 17 May 2013 / Accepted: 6 June 2013 / Published: 26 June 2013
Cited by 2 | PDF Full-text (246 KB) | HTML Full-text | XML Full-text
Abstract
Given the increasingly popular use of socially interactive technology (SIT), it is believed that the way in which individuals communicate and experience relationships has drastically been changing. For those who partake in this electronic world, damaging behaviors akin to those found in the
[...] Read more.
Given the increasingly popular use of socially interactive technology (SIT), it is believed that the way in which individuals communicate and experience relationships has drastically been changing. For those who partake in this electronic world, damaging behaviors akin to those found in the real world have emerged. Yet, we know little about the extent of these behaviors in the context of romantic relationships, especially from a gender or cultural standpoint. Research on dating violence generally indicates that women experience in-person victimization at higher rates than men, although some research has called this into question. It also suggests that some national groups experience higher rates of violence than others. However, research is almost non-existent when it comes to exploring violence in the digital world. This study investigated gender and nationality in (1) the nature and extent of socially interactive intimate violence, and (2) perceptions of the seriousness of virtual relationship violence. Using a sample of students from the United States and Poland, findings revealed that socially interactive technology may serve as a new avenue for aggressing against partners, as virtual relationship violence was not uncommon and reflected some patterns present in the real world. Some unexpected patterns also emerged. The results of this research signal a possible transferability of covert intimate violence and highlight ways in which inequalities may exist in our virtual worlds. Full article
(This article belongs to the Special Issue Inequality in the Digital Environment)
Open AccessArticle eHealth Service Support in Future IPv6 Vehicular Networks
Future Internet 2013, 5(3), 317-335; doi:10.3390/fi5030317
Received: 1 March 2013 / Revised: 7 May 2013 / Accepted: 5 June 2013 / Published: 27 June 2013
PDF Full-text (2931 KB) | HTML Full-text | XML Full-text
Abstract
Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X), large scale deployments, machine-to-machine (M2M) integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to
[...] Read more.
Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X), large scale deployments, machine-to-machine (M2M) integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I) communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR) application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Open AccessArticle Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
Future Internet 2013, 5(3), 355-375; doi:10.3390/fi5030355
Received: 26 April 2013 / Revised: 10 June 2013 / Accepted: 17 June 2013 / Published: 9 July 2013
Cited by 1 | PDF Full-text (1006 KB) | HTML Full-text | XML Full-text
Abstract
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level,
[...] Read more.
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data repository, and the extraction of relevant data for analytical modules of SIEM systems. The paper discusses the key issues of design and implementation of a hybrid SIEM data repository, which combines relational and ontological data representations. Based on the analysis of existing SIEM systems and standards, the ontological approach is chosen as a core component of the repository, and an example of the ontological data model for vulnerabilities representation is outlined. The hybrid architecture of the repository is proposed for implementation in SIEM systems. Since the most of works on the repositories of SIEM systems is based on the relational data model, the paper focuses mainly on the ontological part of the hybrid approach. To test the repository we used the data model intended for attack modeling and security evaluation, which includes both ontological and relational dimensions. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Figures

Open AccessArticle Cross-Network Information Dissemination in Vehicular Ad hoc Networks (VANETs): Experimental Results from a Smartphone-Based Testbed
Future Internet 2013, 5(3), 398-428; doi:10.3390/fi5030398
Received: 1 March 2013 / Revised: 14 June 2013 / Accepted: 5 July 2013 / Published: 5 August 2013
Cited by 7 | PDF Full-text (5641 KB) | HTML Full-text | XML Full-text
Abstract
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs,
[...] Read more.
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, with direct connections between neighboring vehicles, in order to disseminate, very quickly and inexpensively, traffic alerts received from the cellular network. The proposed communication architecture has been implemented on Android smartphones. The obtained experimental results show that an effective cross-network information dissemination service can entirely rely on smartphone-based communications. This paves the way to future Internet architectures, where vehicles will play a key role as information destinations and sources. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Open AccessArticle Libraries’ Role in Curating and Exposing Big Data
Future Internet 2013, 5(3), 429-438; doi:10.3390/fi5030429
Received: 21 March 2013 / Revised: 16 May 2013 / Accepted: 12 July 2013 / Published: 20 August 2013
Cited by 2 | PDF Full-text (267 KB) | HTML Full-text | XML Full-text
Abstract
This article examines how one data hub is working to become a relevant and useful source in the Web of big data and cloud computing. The focus is on OCLC’s WorldCat database of global library holdings and includes work by other library organizations
[...] Read more.
This article examines how one data hub is working to become a relevant and useful source in the Web of big data and cloud computing. The focus is on OCLC’s WorldCat database of global library holdings and includes work by other library organizations to expose their data using big data concepts and standards. Explanation is given of how OCLC has begun work on the knowledge graph for this data and its active involvement with Schema.org in working to make this data useful throughout the Web. Full article
(This article belongs to the Special Issue Server Technologies in Cloud Computing and Big Data)
Open AccessArticle Physical Layer Network Coding Based on Integer Forcing Precoded Compute and Forward
Future Internet 2013, 5(3), 439-459; doi:10.3390/fi5030439
Received: 2 July 2013 / Revised: 19 July 2013 / Accepted: 5 August 2013 / Published: 28 August 2013
Cited by 2 | PDF Full-text (338 KB) | HTML Full-text | XML Full-text
Abstract
In this paper, we address the implementation of physical layer network coding (PNC) based on compute and forward (CF) in relay networks. It is known that the maximum achievable rates in CF-based transmission is limited due to the channel approximations at the relay.
[...] Read more.
In this paper, we address the implementation of physical layer network coding (PNC) based on compute and forward (CF) in relay networks. It is known that the maximum achievable rates in CF-based transmission is limited due to the channel approximations at the relay. In this work, we propose the integer forcing precoder (IFP), which bypasses this maximum rate achievability limitation. Our precoder requires channel state information (CSI) at the transmitter, but only that of the channel between the transmitter and the relay, which is a feasible assumption. The overall contributions of this paper are three-fold. Firstly, we propose an implementation of CF using IFP and prove that this implementation achieves higher rates as compared to traditional relaying schemes. Further, the probability of error from the proposed scheme is shown to have up to 2 dB of gain over the existent lattice network coding-based implementation of CF. Secondly, we analyze the two phases of transmission in the CF scheme, thereby characterizing the end-to-end behavior of the CF and not only one-phase behavior, as in previous proposals. Finally, we develop decoders for both the relay and the destination. We use a generalization of Bezout’s theorem to justify the construction of these decoders. Further, we make an analytical derivation of the end-to-end probability of error for cubic lattices using the proposed scheme. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)

Review

Jump to: Research

Open AccessReview Future Research on Cyber-Physical Emergency Management Systems
Future Internet 2013, 5(3), 336-354; doi:10.3390/fi5030336
Received: 15 April 2013 / Accepted: 17 June 2013 / Published: 27 June 2013
Cited by 22 | PDF Full-text (183 KB) | HTML Full-text | XML Full-text
Abstract
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among
[...] Read more.
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among civilians and the environment become much more diverse, and the complexity of the emergency response also becomes much greater. This paper surveys current research on sensor-assisted evacuation and rescue systems and discusses the related research issues concerning communication protocols for sensor networks, as well as several other important issues, such as the integrated asynchronous control of large-scale emergency response systems, knowledge discovery for rescue and prototyping platforms. Then, we suggest directions for further research. Full article
(This article belongs to the Special Issue Emergency Management, Communications and the Internet)
Open AccessReview Internet Access by People with Intellectual Disabilities: Inequalities and Opportunities
Future Internet 2013, 5(3), 376-397; doi:10.3390/fi5030376
Received: 15 March 2013 / Revised: 11 May 2013 / Accepted: 19 June 2013 / Published: 17 July 2013
Cited by 13 | PDF Full-text (234 KB) | HTML Full-text | XML Full-text
Abstract
This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion
[...] Read more.
This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion of carer views of Internet use by people with intellectual disabilities will be covered incorporating consideration of the tension between protection, self-determination and lifestyle issues and gaining Internet access. We will address how impairment related factors may impede access and subsequently discuss how supports may be used to obfuscate impairments and facilitate access. We will move on from this to critically describe some of the potential benefits the Internet could provide to people with intellectual disabilities, including the potential for self-expression, advocacy and developing friendships. Finally, strategies to better include people with intellectual disabilities online will be given along with future research suggestions. Full article
(This article belongs to the Special Issue Inequality in the Digital Environment)

Journal Contact

MDPI AG
Future Internet Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
futureinternet@mdpi.com
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to Future Internet
Back to Top