Skip to Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 9, Issue 2

2017 June - 13 articles

Cover Story: The figure depicts a decentralised system which allows mobile users to obtain personalised adverts on demand without exposing their consuming interests to untrusted parties. The architecture illustrates a multilayered approach which combines targeted advertising, anonymous broadcasting and social opportunistic networking in order to present promotional material directly to the user’s devices without them being connected to the internet. Great emphasis is given to the model’s robustness against malicious users who may infiltrate the opportunistic network to obtain user information or inject fake adverts. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
7 Citations
7,517 Views
13 Pages

A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics

  • Weijun Wang,
  • Ying Li,
  • Yinghui Huang,
  • Hui Liu and
  • Tingting Zhang

Analyzing people’s opinions, attitudes, sentiments, and emotions based on user-generated content (UGC) is feasible for identifying the psychological characteristics of social network users. However, most studies focus on identifying the sentiments ca...

  • Article
  • Open Access
8 Citations
7,012 Views
11 Pages

In this paper, an energy efficient power allocation scheme is proposed for a distributed massive multiple-input multiple-output (MIMO) system with a circular antenna array. Single-antenna users simultaneously transmit signal to the base station (BS)...

  • Article
  • Open Access
24 Citations
11,210 Views
19 Pages

An Access Control Model for Preventing Virtual Machine Escape Attack

  • Jiang Wu,
  • Zhou Lei,
  • Shengbo Chen and
  • Wenfeng Shen

With the rapid development of Internet, the traditional computing environment is making a big migration to the cloud-computing environment. However, cloud computing introduces a set of new security problems. Aiming at the virtual machine (VM) escape...

  • Article
  • Open Access
9 Citations
5,200 Views
12 Pages

Wireless sensor networks (WSNs) have been extensively applied in many domains such as smart homes and Internet of Things (IoT). As part of WSNs’ communication protocols, back-off mechanisms play an essential role in the deployment of wireless channel...

  • Article
  • Open Access
4,968 Views
11 Pages

This paper provides an initial introduction to, and definition of, the ‘Dynamically Powered Relays for a Flexible Optical Network’ (DPR-FON) problem for opto-electro-optical (OEO) regenerators used in optical networks. In such networks, optical trans...

  • Article
  • Open Access
2 Citations
5,074 Views
13 Pages

In the datacenter rented to Internet Service Providers (ISPs), the low utilization of racks can seriously affect ISPs’ benefit because the ISPs are charged by “rack per year” rather than servers. Based on our analysis about the utilization data from...

  • Article
  • Open Access
2 Citations
6,917 Views
21 Pages

Online Behavioural Advertising (OBA) enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms,...

  • Article
  • Open Access
80 Citations
12,825 Views
22 Pages

OpenStreetMap (OSM) is a recent emerging area in computational science. There are several unexplored issues in the quality assessment of OSM. Firstly, researchers are using various established assessment methods by comparing OSM with authoritative da...

  • Article
  • Open Access
20 Citations
8,111 Views
15 Pages

Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarki...

  • Article
  • Open Access
15 Citations
7,237 Views
12 Pages

An Energy Efficient MAC Protocol for Wireless Passive Sensor Networks

  • Qingyao Yu,
  • Guangming Li,
  • Xiaojie Hang,
  • Kun Fu and
  • And Tianqi Li

Medium Access Control (MAC) protocol is one of the key network protocols that ensure Wireless Sensor Networks (WSNs) maintain high performance during communication. MAC protocol design plays an important role in improving the performances of the whol...

  • Article
  • Open Access
2 Citations
7,780 Views
11 Pages

In this paper, both the spectrum efficiency (SE) and the energy efficiency (EE) are investigated for an uplink massive multiple-input multiple-output (MIMO) system coexisting with an underlay device-to-device (D2D) system. The outage probability and...

  • Article
  • Open Access
4 Citations
7,763 Views
19 Pages

Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish

  • Andrea Guazzini,
  • Ayça Saraç,
  • Camillo Donati,
  • Annalisa Nardi,
  • Daniele Vilone and
  • Patrizia Meringolo

Advancements in information and communication technologies have enhanced our possibilities to communicate worldwide, eliminating borders and making it possible to interact with people coming from other cultures like never happened before. Such powerf...

  • Article
  • Open Access
4 Citations
5,437 Views
8 Pages

Decentralized Blind Spectrum Selection in Cognitive Radio Networks Considering Handoff Cost

  • Yongqun Chen,
  • Huaibei Zhou,
  • Ruoshan Kong,
  • Li Zhu and
  • Huaqing Mao

Due to the spectrum varying nature of cognitive radio networks, secondary users are required to perform spectrum handoffs when the spectrum is occupied by primary users, which will lead to a handoff delay. In this paper, based on the multi-armed band...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903