You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 10, Issue 6

June 2018 - 12 articles

Cover Story: In this paper, a secure inter-frame space communication system design is proposed for WLANs to share the ISM bands with other radio systems that generate periodic radio signals. The proposed secure inter-frame communication system achieves functions well due to accurate radar detection and secure inter-frame space communication. The simulation results demonstrate that the proposed scheme significantly increases the receiver sensitivity and fully conforms to datagram protocols. View the paper here.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (12)

  • Article
  • Open Access
8 Citations
5,068 Views
17 Pages

Simulating the Cost of Cooperation: A Recipe for Collaborative Problem-Solving

  • Andrea Guazzini,
  • Mirko Duradoni,
  • Alessandro Lazzeri and
  • Giorgio Gronchi

Collective problem-solving and decision-making, along with other forms of collaboration online, are central phenomena within ICT. There had been several attempts to create a system able to go beyond the passive accumulation of data. However, those sy...

  • Article
  • Open Access
122 Citations
8,543 Views
15 Pages

Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image ste...

  • Article
  • Open Access
10 Citations
4,515 Views
9 Pages

With the development of the mobile Internet, location-based services are playing an important role in everyday life. As a new location-based service, Spatial Crowdsourcing (SC) involves collecting and analyzing environmental, social, and other spatio...

  • Article
  • Open Access
16 Citations
4,842 Views
18 Pages

With the rapid development of cloud computing, the demand for infrastructure resources in cloud data centers has further increased, which has already led to enormous amounts of energy costs. Virtual machine (VM) consolidation as one of the important...

  • Article
  • Open Access
20 Citations
5,705 Views
14 Pages

A framework of path planning for autonomous electric bus is presented. ArcGIS platform is utilized for map-building and global path planning. Firstly, a high-precision map is built based on GPS in ArcGIS for global planning. Then the global optimal p...

  • Article
  • Open Access
21 Citations
6,385 Views
15 Pages

Fairness and Trust in Virtual Environments: The Effects of Reputation

  • Mirko Duradoni,
  • Mario Paolucci,
  • Franco Bagnoli and
  • Andrea Guazzini

Reputation supports pro-social behaviors in a variety of social settings and across different ages. When re-encounters are possible, developing a positive reputation can be a valuable asset that will result in better outcomes. However, in real life,...

  • Article
  • Open Access
16 Citations
4,989 Views
17 Pages

Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infras...

  • Article
  • Open Access
7 Citations
5,854 Views
12 Pages

The development of the Semantic Web represents an essential precondition to the definition of new scenarios for the future Internet. This perspective is of particular interest in the legal information domain for the specialized nature of legal inform...

  • Article
  • Open Access
7 Citations
5,811 Views
33 Pages

A Tiered Control Plane Model for Service Function Chaining Isolation

  • Håkon Gunleifsen,
  • Vasileios Gkioulos and
  • Thomas Kemmerich

This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static truste...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903