You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 9, Issue 2

June 2017 - 13 articles

Cover Story: The figure depicts a decentralised system which allows mobile users to obtain personalised adverts on demand without exposing their consuming interests to untrusted parties. The architecture illustrates a multilayered approach which combines targeted advertising, anonymous broadcasting and social opportunistic networking in order to present promotional material directly to the user’s devices without them being connected to the internet. Great emphasis is given to the model’s robustness against malicious users who may infiltrate the opportunistic network to obtain user information or inject fake adverts. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
6 Citations
7,379 Views
13 Pages

A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics

  • Weijun Wang,
  • Ying Li,
  • Yinghui Huang,
  • Hui Liu and
  • Tingting Zhang

Analyzing people’s opinions, attitudes, sentiments, and emotions based on user-generated content (UGC) is feasible for identifying the psychological characteristics of social network users. However, most studies focus on identifying the sentiments ca...

  • Article
  • Open Access
8 Citations
6,960 Views
11 Pages

In this paper, an energy efficient power allocation scheme is proposed for a distributed massive multiple-input multiple-output (MIMO) system with a circular antenna array. Single-antenna users simultaneously transmit signal to the base station (BS)...

  • Article
  • Open Access
24 Citations
10,990 Views
19 Pages

An Access Control Model for Preventing Virtual Machine Escape Attack

  • Jiang Wu,
  • Zhou Lei,
  • Shengbo Chen and
  • Wenfeng Shen

With the rapid development of Internet, the traditional computing environment is making a big migration to the cloud-computing environment. However, cloud computing introduces a set of new security problems. Aiming at the virtual machine (VM) escape...

  • Article
  • Open Access
9 Citations
5,153 Views
12 Pages

Wireless sensor networks (WSNs) have been extensively applied in many domains such as smart homes and Internet of Things (IoT). As part of WSNs’ communication protocols, back-off mechanisms play an essential role in the deployment of wireless channel...

  • Article
  • Open Access
4,929 Views
11 Pages

This paper provides an initial introduction to, and definition of, the ‘Dynamically Powered Relays for a Flexible Optical Network’ (DPR-FON) problem for opto-electro-optical (OEO) regenerators used in optical networks. In such networks, optical trans...

  • Article
  • Open Access
2 Citations
5,013 Views
13 Pages

In the datacenter rented to Internet Service Providers (ISPs), the low utilization of racks can seriously affect ISPs’ benefit because the ISPs are charged by “rack per year” rather than servers. Based on our analysis about the utilization data from...

  • Article
  • Open Access
2 Citations
6,840 Views
21 Pages

Online Behavioural Advertising (OBA) enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms,...

  • Article
  • Open Access
80 Citations
12,613 Views
22 Pages

OpenStreetMap (OSM) is a recent emerging area in computational science. There are several unexplored issues in the quality assessment of OSM. Firstly, researchers are using various established assessment methods by comparing OSM with authoritative da...

  • Article
  • Open Access
20 Citations
7,954 Views
15 Pages

Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarki...

  • Article
  • Open Access
15 Citations
7,169 Views
12 Pages

An Energy Efficient MAC Protocol for Wireless Passive Sensor Networks

  • Qingyao Yu,
  • Guangming Li,
  • Xiaojie Hang,
  • Kun Fu and
  • And Tianqi Li

Medium Access Control (MAC) protocol is one of the key network protocols that ensure Wireless Sensor Networks (WSNs) maintain high performance during communication. MAC protocol design plays an important role in improving the performances of the whol...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903