You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 9, Issue 3

September 2017 - 31 articles

Cover Story: The Internet of Things (IoT) is a recent trend that extends the boundaries of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center since much of the collected information will be exposed to a wide and often unknown audience. Some of the problems are due to the intrinsic characteristics of the IoT, while others arise as a result of the integration of the IoT and the Internet. Various adversaries may come in at different points to attack IoT systems.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (31)

  • Article
  • Open Access
49 Citations
12,210 Views
19 Pages

Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Deni...

  • Article
  • Open Access
9 Citations
7,424 Views
17 Pages

A Multimodal Perception Framework for Users Emotional State Assessment in Social Robotics

  • Lorenzo Cominelli,
  • Nicola Carbonaro,
  • Daniele Mazzei,
  • Roberto Garofalo,
  • Alessandro Tognetti and
  • Danilo De Rossi

In this work, we present an unobtrusive and non-invasive perception framework based on the synergy between two main acquisition systems: the Touch-Me Pad, consisting of two electronic patches for physiological signal extraction and processing; and th...

  • Article
  • Open Access
20 Citations
6,913 Views
15 Pages

A quality evaluation method is an important means and the main basis on which to evaluate the college English classroom teaching quality of teachers. To overcome the one-sided subjectivity and resulting imprecision of the traditional classroom teachi...

  • Article
  • Open Access
9 Citations
6,243 Views
13 Pages

As Augmented Reality (AR) applications become commonplace, the determination of a device operator’s subjective Quality of Experience (QoE) in addition to objective Quality of Service (QoS) metrics gains importance. Human subject experimentation is co...

  • Article
  • Open Access
4 Citations
44,213 Views
18 Pages

Azure-Based Smart Monitoring System for Anemia-Like Pallor

  • Sohini Roychowdhury,
  • Paul Hage and
  • Joseph Vasquez

Increasing costs of diagnostic healthcare have necessitated the development of hardware independent non-invasive Point of Care (POC) systems. Although anemia prevalence rates in global populations vary between 10% and 60% in various demographic group...

  • Article
  • Open Access
3 Citations
5,666 Views
9 Pages

The wireless local area network (WLAN) is one of the most popular wireless technologies offering connectivity today, and one of the candidates for the internet of things (IoTs). However, WLAN’s inefficiency in terms of complexity and relatively large...

  • Article
  • Open Access
27 Citations
7,702 Views
13 Pages

A Novel Hybrid-Copy Algorithm for Live Migration of Virtual Machine

  • Zhou Lei,
  • Exiong Sun,
  • Shengbo Chen,
  • Jiang Wu and
  • Wenfeng Shen

Live migration of virtual machines is an important approach for dynamic resource scheduling in cloud environment. The hybrid-copy algorithm is an excellent algorithm that combines the pre-copy algorithm with the post-copy algorithm to remedy the defe...

  • Article
  • Open Access
4 Citations
5,378 Views
13 Pages

An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings

  • Ruchdee Binmad,
  • Mingchu Li,
  • Zhen Wang,
  • Nakema Deonauth and
  • Chettupally Anil Carie

The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Tru...

  • Article
  • Open Access
7 Citations
8,558 Views
18 Pages

Self-Organization is a spontaneous trend which exists in nature among different organisms. Self-organization refers to the process where some form of an overall order arises in a group due to the local interaction among the members of this group. In...

  • Article
  • Open Access
20 Citations
6,639 Views
16 Pages

Robust Image Embedded Watermarking Using DCT and Listless SPIHT

  • J. L. Divya Shivani and
  • Ranjan K. Senapati

This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inve...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903