Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.00",
%%%     date            = "15 October 2019",
%%%     time            = "06:17:10 MDT",
%%%     filename        = "future-internet.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "16957 32954 187035 1749427",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX; bibliography; Future Internet",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        open-access journal Future Internet (CODEN
%%%                        none, ISSN 1999-5903), published by MDPI
%%%                        (Basel, Switzerland).
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        December 2009, and the journal appeared once
%%%                        in volume 1, quarterly in volumes 2--9, and
%%%                        since then, 12 times yearly.
%%%
%%%                        The journal has World-Wide Web sites at
%%%
%%%                            https://www.mdpi.com/1999-5903/
%%%                            https://www.mdpi.com/1999-5903/<VOLUME>/<NUMBER>/
%%%
%%%                        At version 1.00, the year coverage looked
%%%                        like this:
%%%
%%%                             2009 (   6)    2013 (  35)    2017 (  82)
%%%                             2010 (  32)    2014 (  36)    2018 ( 125)
%%%                             2011 (  21)    2015 (  30)    2019 ( 246)
%%%                             2012 (  61)    2016 (  55)
%%%
%%%                             Article:        729
%%%
%%%                             Total entries:  729
%%%
%%%                        Data for the bibliography has been collected
%%%                        primarily from the journal Web site.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume''.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
    "\ifx \undefined \k         \let \k = \c                  \fi" #
    "\ifx \undefined \TM        \def \TM {${}^{\sc TM}$}      \fi" #
    "\ifx \undefined \mathcal   \def \mathcal #1{{\cal #1}}   \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-FUTURE-INTERNET       = "Future Internet"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Hudson-Smith:2009:FI,
  author =       "Andrew Hudson-Smith",
  title =        "The Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  day =          "17",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/1",
  abstract =     "In 1995 technology analyst Gartner [1] developed a
                 hype cycle model for the adoption of technology. The
                 cycle comprises five stages from the initial technology
                 trigger through to a final plateau of productivity
                 along a with a peak of inflated expectations, a tough
                 of disillusionment and the slope of enlightenment. The
                 hype cycle is notable technique for plotting and
                 identifying waves of innovation and hype in technology
                 and digital communications. Yet, from where we stand,
                 we can see the waves of innovation becoming
                 increasingly shorter, the troughs less deep and the
                 peaks of expectations higher. The read-write
                 revolution, that is arguably known as Web 2.0, has
                 transformed our experience of using the Internet from a
                 source of information to a means of communication and
                 participation. It has introduced mirror worlds, the
                 cloud, wikitecture, social shaping, connected places,
                 folksonomies and many other terms that I am sure many
                 of us have used in recent grant applications and
                 papers. This is the here and now, all of these
                 technologies are past the technology trigger point and
                 rising up the peak of inflated expectations with a few
                 already heading towards the trough before becoming
                 mainstream and approaching mass adoption.",
  acknowledgement = ack-nhfb,
}

@Article{Wheeler:2009:LSM,
  author =       "Steve Wheeler",
  title =        "Learning Space Mashups: Combining {Web 2.0} Tools to
                 Create Collaborative and Reflective Learning Spaces",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "3--13",
  day =          "13",
  month =        jul,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010003",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/3",
  abstract =     "In this paper, Web 2.0 open content mashups or
                 combinations are explored. Two case studies of recent
                 initial teacher training programmes are reviewed where
                 blogs and wikis were blended to create new virtual
                 learning spaces. In two separate studies, students
                 offer their views about using these tools, and reflect
                 on the strengths and weaknesses of this approach. There
                 is also discussion about aggregation of content and a
                 theorization of how community and personal spaces can
                 create tension and conflict. A new `learning spaces'
                 model will be presented which aids visualization of the
                 processes, domains and territories that are brought
                 into play when content and Web 2.0 tools are mashed up
                 within the same space.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Data Mashups.",
}

@Article{Fiaidhi:2009:IMM,
  author =       "Jinan Fiaidhi and Sabah Mohammed and Lyle Chamarette
                 and David Thomas",
  title =        "Identifying Middlewares for Mashup Personal Learning
                 Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "14--27",
  day =          "05",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010014",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/14",
  abstract =     "The common understanding of e-learning has shifted
                 over the last decade from the traditional learning
                 objects portals to learning paradigms that enforces
                 constructivism, discovery learning and social
                 collaboration. Such type of learning takes place
                 outside the formal academic settings (e.g., seminars or
                 lectures) where a learning environment is created by
                 using some kind of web application mashup tools. The
                 use of these mashup tools moves the learning
                 environment further away from being a monolithic
                 platform towards providing an open set of learning
                 tools, an unrestricted number of actors, and an open
                 corpus of artifacts, either pre-existing or created by
                 the learning process - freely combinable and utilizable
                 by learners within their learning activities. However,
                 collaboration, mashup and contextualization can only be
                 supported through services, which can be created and
                 modified dynamically based on middlewares to suit the
                 current needs and situations of learners. This article
                 identifies middlewares suitable for creating effective
                 personal learning environment based on Web 2.0 mashup
                 tools. This article also proposed a general framework
                 for constructing such personal learning environments
                 based on Ambient Learning realized by learning agents
                 and the use of Enterprise Mashup servers.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Data Mashups.",
}

@Article{Batcheller:2009:MAG,
  author =       "James K. Batcheller and Bruce M. Gittings and Robert
                 I. Dunfey",
  title =        "A Method for Automating Geospatial Dataset Metadata",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "28--46",
  day =          "10",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010028",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/28",
  abstract =     "Metadata have long been recognised as crucial to
                 geospatial asset management and discovery, and yet
                 undertaking their creation remains an unenviable task
                 often to be avoided. This paper proposes a practical
                 approach designed to address such concerns, decomposing
                 various data creation, management, update and
                 documentation process steps that are subsequently
                 leveraged to contribute towards metadata record
                 completion. Using a customised utility embedded within
                 a common GIS application, metadata elements are
                 computationally derived from an imposed feature
                 metadata standard, dataset geometry, an integrated
                 storage protocol and pre-prepared content, and
                 instantiated within a common geospatial discovery
                 convention. Yielding 27 out of a 32 total metadata
                 elements (or 15 out of 17 mandatory elements) the
                 approach demonstrably lessens the burden of metadata
                 authorship. It also encourages improved geospatial
                 asset management whilst outlining core requisites for
                 developing a more open metadata strategy not bound to
                 any particular application domain.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Ebner:2009:CWM,
  author =       "Martin Ebner and Hermann Maurer",
  title =        "Can Weblogs and Microblogs Change Traditional
                 Scientific Writing?",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "47--58",
  day =          "18",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010047",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/47",
  abstract =     "This paper describes a follow-up Web 2.0 approach to a
                 technology enhanced master course for students of Graz
                 University of Technology. The lecture ``Social Aspects
                 of Information Technology'' has a long tradition for
                 using new didactical scenarios as well as modern
                 e-Learning technologies. After using a blogosphere one
                 year ago, this year microblog channels helped to expand
                 the traditional lecture. Students choose (on a
                 voluntary basis) whether they want to participate in a
                 blogging/microblogging group instead of using
                 conventional methods called Scientific
                 Writer/Scientific Reviewer. This study addresses the
                 question whether this method can change the learning
                 outcome into a more reflective one. Furthermore,
                 peer-reviewing groups judge the quality of essays and
                 blog contributions. In this paper we examine if
                 microblogging can be an appropriate technology for
                 assisting the process. This publication comes to the
                 conclusion that an amazing potential and a new way to
                 work with information is opened when using
                 microblogging. Students seem to be more engaged,
                 reflective and critical in as much as they presented
                 much more personal statements and opinions than years
                 before.",
  acknowledgement = ack-nhfb,
}

@Article{Beemer:2009:MLR,
  author =       "Brandon Beemer and Dawn Gregg",
  title =        "Mashups: a Literature Review and Classification
                 Framework",
  journal =      j-FUTURE-INTERNET,
  volume =       "1",
  number =       "1",
  pages =        "59--87",
  day =          "22",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi1010059",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:42 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/1/1/59",
  abstract =     "The evolution of the Web over the past few years has
                 fostered the growth of a handful of new technologies
                 (e.g. Blogs, Wiki's, Web Services). Recently web
                 mashups have emerged as the newest Web technology and
                 have gained lots of momentum and attention from both
                 academic and industry communities. Current mashup
                 literature focuses on a wide array of issues, which can
                 be partially explained by how new the topic is.
                 However, to date, mashup literature lacks an
                 articulation of the different subtopics of web mashup
                 research. This study presents a broad review of mashup
                 literature to help frame the 1subtopics in mashup
                 research.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Data Mashups.",
}

@Article{Beall:2010:MND,
  author =       "Jeffrey Beall",
  title =        "Metadata for Name Disambiguation and Collocation",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "1--15",
  day =          "05",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/1",
  abstract =     "Searching names of persons, families, and
                 organizations is often difficult in online databases
                 because different persons or organizations frequently
                 share the same name and because a single person's or
                 organization's name may appear in different forms in
                 various online documents. Databases and search engines
                 can use metadata as a tool to solve the problem of name
                 ambiguity and name variation in online databases. This
                 article describes the challenges names pose in
                 information retrieval and some emerging name metadata
                 databases that can help ameliorate the problems.
                 Effective name disambiguation and collocation increase
                 search precision and recall and can improve assessment
                 of scholarly work.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Priscoli:2010:FCA,
  author =       "Francesco Delli Priscoli",
  title =        "A Fully Cognitive Approach for Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "16--29",
  day =          "22",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010016",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/16",
  abstract =     "This paper deals with an autonomous cognitive network
                 management architecture which aims at achieving
                 inter-network (horizontal) and inter-layer (vertical)
                 cross-optimization. The proposed architecture is based
                 on the so-called Cognitive Managers transparently
                 embedded in properly selected network nodes. The core
                 of each Cognitive Manager are the so-called thinking
                 modules, which are in charge of taking consistent and
                 coordinated decisions according to a fully cognitive
                 approach. The thinking modules potentially avail of
                 information coming from both the transport and the
                 service/content layers of all networks and, based on
                 all this inter-layer and inter-network information,
                 take consistent and coordinated decisions impacting the
                 different layers, aiming at the overall inter-layer,
                 inter-network optimization.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Network Architectures.",
}

@Article{Fiore:2010:SRR,
  author =       "Ugo Fiore",
  title =        "Selective Redundancy Removal: a Framework for Data
                 Hiding",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "30--40",
  day =          "15",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010030",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/30",
  abstract =     "Data hiding techniques have so far concentrated on
                 adding or modifying irrelevant information in order to
                 hide a message. However, files in widespread use, such
                 as HTML documents, usually exhibit high redundancy
                 levels, caused by code-generation programs. Such
                 redundancy may be removed by means of optimization
                 software. Redundancy removal, if applied selectively,
                 enables information hiding. This work introduces
                 Selective Redundancy Removal (SRR) as a framework for
                 hiding data. An example application of the framework is
                 given in terms of hiding information in HTML documents.
                 Non-uniformity across documents may raise alarms.
                 Nevertheless, selective application of optimization
                 techniques might be due to the legitimate use of
                 optimization software not supporting all the
                 optimization methods, or configured to not use all of
                 them.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Fuchs:2010:TFW,
  author =       "Christian Fuchs and Wolfgang Hofkirchner and Matthias
                 Schafranek and Celina Raffl and Marisol Sandoval and
                 Robert Bichler",
  title =        "Theoretical Foundations of the {Web}: Cognition,
                 Communication, and Co-Operation. Towards an
                 Understanding of {Web 1.0, 2.0, 3.0}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "41--59",
  day =          "19",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010041",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/41",
  abstract =     "Currently, there is much talk of Web 2.0 and Social
                 Software. A common understanding of these notions is
                 not yet in existence. The question of what makes Social
                 Software social has thus far also remained
                 unacknowledged. In this paper we provide a theoretical
                 understanding of these notions by outlining a model of
                 the Web as a techno-social system that enhances human
                 cognition towards communication and co-operation.
                 According to this understanding, we identify three
                 qualities of the Web, namely Web 1.0 as a Web of
                 cognition, Web 2.0 as a Web of human communication, and
                 Web 3.0 as a Web of co-operation. We use the terms Web
                 1.0, Web 2.0, Web 3.0 not in a technical sense, but for
                 describing and characterizing the social dynamics and
                 information processes that are part of the Internet.",
  acknowledgement = ack-nhfb,
}

@Article{Benedetto:2010:DQE,
  author =       "Francesco Benedetto and Alberto Curcio and Gaetano
                 Giunta",
  title =        "Dynamic {QoS} Evaluation of Multimedia Contents in
                 Wireless Networks by ``Double-Boomerang''
                 Watermarking",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "60--73",
  day =          "08",
  month =        mar,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010060",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/60",
  abstract =     "This work presents a cooperative network-aware
                 processing of multimedia content for dynamic quality of
                 service management in wireless IP networks. Our
                 technique can be also used for quality control in UMTS
                 environments, exploiting the tracing watermarking
                 recently introduced in literature. In this work, we use
                 the transmitted video-sequences to monitor the QoS in a
                 videoconference call. The video-sequence of every
                 active user travels on the communication link, one time
                 as video (transparent mode), one time as watermark
                 (hidden mode) describing a boomerang trajectory. The
                 results obtained through our simulation trials confirm
                 the validity of such approach. In fact, the advantages
                 of distributing the management process are (i) an
                 easier and more precise localization of the cause of
                 QoS problems, (ii) a better knowledge of local
                 situations, (iii) a lower complexity for a single QoS
                 agent and (iv) an increase in possible actions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Ding:2010:MED,
  author =       "Lian Ding and Shaofeng Liu",
  title =        "Markup in Engineering Design: a Discourse",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "74--95",
  day =          "11",
  month =        mar,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010074",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/74",
  abstract =     "Today's engineering companies are facing unprecedented
                 competition in a global market place. There is now a
                 knowledge intensive shift towards whole product
                 lifecycle support, and collaborative environments. It
                 has become particularly important to capture
                 information, knowledge and experiences about previous
                 design and following stages during their product
                 lifecycle, so as to retrieve and reuse such information
                 in new and follow-on designs activities. Recently, with
                 the rapid development and adoption of digital
                 technologies, annotation and markup are becoming
                 important tools for information communication,
                 retrieval and management. Such techniques are being
                 increasingly applied to an array of applications and
                 different digital items, such as text documents, 2D
                 images and 3D models. This paper presents a
                 state-of-the-art review of recent research in markup
                 for engineering design, including a number of core
                 markup languages and main markup strategies. Their
                 applications and future utilization in engineering
                 design, including multi-viewpoint of product models,
                 capture of information and rationale across the whole
                 product lifecycle, integration of engineering design
                 processes, and engineering document management, are
                 comprehensively discussed.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Christin:2010:SWS,
  author =       "Delphine Christin and Parag S. Mogre and Matthias
                 Hollick",
  title =        "Survey on Wireless Sensor Network Technologies for
                 Industrial Automation: The Security and Quality of
                 Service Perspectives",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "2",
  pages =        "96--125",
  day =          "08",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2020096",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/2/96",
  abstract =     "Wireless Sensor Networks (WSNs) are gradually adopted
                 in the industrial world due to their advantages over
                 wired networks. In addition to saving cabling costs,
                 WSNs widen the realm of environments feasible for
                 monitoring. They thus add sensing and acting
                 capabilities to objects in the physical world and allow
                 for communication among these objects or with services
                 in the future Internet. However, the acceptance of WSNs
                 by the industrial automation community is impeded by
                 open issues, such as security guarantees and provision
                 of Quality of Service (QoS). To examine both of these
                 perspectives, we select and survey relevant WSN
                 technologies dedicated to industrial automation. We
                 determine QoS requirements and carry out a threat
                 analysis, which act as basis of our evaluation of the
                 current state-of-the-art. According to the results of
                 this evaluation, we identify and discuss open research
                 issues.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Maier:2010:QPT,
  author =       "Martin Maier and Navid Ghazisaidi",
  title =        "{QoS} Provisioning Techniques for Future
                 Fiber-Wireless {(FiWi)} Access Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "2",
  pages =        "126--155",
  day =          "29",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2020126",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/2/126",
  abstract =     "A plethora of enabling optical and wireless
                 access-metro network technologies have been emerging
                 that can be used to build future-proof bimodal
                 fiber-wireless (FiWi) networks. Hybrid FiWi networks
                 aim at providing wired and wireless quad-play services
                 over the same infrastructure simultaneously and hold
                 great promise to mitigate the digital divide and change
                 the way we live and work by replacing commuting with
                 teleworking. After overviewing enabling optical and
                 wireless network technologies and their QoS
                 provisioning techniques, we elaborate on enabling
                 radio-over-fiber (RoF) and radio-and-fiber (R\&F)
                 technologies. We describe and investigate new QoS
                 provisioning techniques for future FiWi networks,
                 ranging from traffic class mapping, scheduling, and
                 resource management to advanced aggregation techniques,
                 congestion control, and layer-2 path selection
                 algorithms.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Taswell:2010:DIM,
  author =       "Carl Taswell",
  title =        "A Distributed Infrastructure for Metadata about
                 Metadata: The {HDMM} Architectural Style and
                 {PORTAL-DOORS} System",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "2",
  pages =        "156--189",
  day =          "01",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2020156",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/2/156",
  abstract =     "Both the IRIS-DNS System and the PORTAL-DOORS System
                 share a common architectural style for pervasive
                 metadata networks that operate as distributed metadata
                 management systems with hierarchical authorities for
                 entity registering and attribute publishing.
                 Hierarchical control of metadata redistribution
                 throughout the registry-directory networks constitutes
                 an essential characteristic of this architectural style
                 called Hierarchically Distributed Mobile Metadata
                 (HDMM) with its focus on moving the metadata for who
                 what where as fast as possible from servers in response
                 to requests from clients. The novel concept of
                 multilevel metadata about metadata has also been
                 defined for the PORTAL-DOORS System with the use of
                 entity, record, infoset, representation and message
                 metadata. Other new features implemented include the
                 use of aliases, priorities and metaresources.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Ramstetter:2010:ASN,
  author =       "Jerry Rick Ramstetter and Yaling Yang and Danfeng
                 Yao",
  title =        "Applications and Security of Next-Generation,
                 User-Centric Wireless Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "190--211",
  day =          "28",
  month =        jul,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030190",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/190",
  abstract =     "Pervasive wireless systems have significantly improved
                 end-users' quality of life. As manufacturing costs
                 decrease, communications bandwidth increases, and
                 contextual information is made more readily available,
                 the role of next generation wireless systems in
                 facilitating users' daily activities will grow. Unique
                 security and privacy issues exist in these wireless,
                 context-aware, often decentralized systems. For
                 example, the pervasive nature of such systems allows
                 adversaries to launch stealthy attacks against them. In
                 this review paper, we survey several emergent personal
                 wireless systems and their applications. These systems
                 include mobile social networks, active implantable
                 medical devices, and consumer products. We explore each
                 system's usage of contextual information and provide
                 insight into its security vulnerabilities. Where
                 possible, we describe existing solutions for
                 defendingagainst these vulnerabilities. Finally, we
                 point out promising future research directions for
                 improving these systems' robustness and security",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Arkoulis:2010:MSC,
  author =       "Stamatios Arkoulis and Giannis F. Marias and Pantelis
                 A. Frangoudis and Jens Oberender and Alexandru Popescu
                 and Markus Fiedler and Hermann de Meer and George
                 C. Polyzos",
  title =        "Misbehavior Scenarios in Cognitive Radio Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "212--237",
  day =          "29",
  month =        jul,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030212",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/212",
  abstract =     "Recent advances in the fields of Cognitive Radio and
                 the proliferation of open spectrum access promise that
                 spectrum-agile wireless communication will be
                 widespread in the near future, and will bring
                 significant flexibility and potential utility
                 improvements for end users. With spectrum efficiency
                 being a key objective, most relevant research focuses
                 on smart coexistence mechanisms. However, wireless
                 nodes may behave selfishly and should be considered as
                 rational autonomous entities. Selfishness, pure malice
                 or even faulty equipment can lead to behavior that does
                 not conform to sharing protocols and etiquette. Thus,
                 there is a need to secure spectrum sharing mechanisms
                 against attacks in the various phases of the sharing
                 process. Identifying these attacks and possible
                 countermeasures is the focus of this work.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security for Next Generation Wireless
                 and Decentralized Systems.",
}

@Article{Granitzer:2010:OAS,
  author =       "Michael Granitzer and Vedran Sabol and Kow Weng Onn
                 and Dickson Lukose and Klaus Tochtermann",
  title =        "Ontology Alignment --- a Survey with Focus on Visually
                 Supported Semi-Automatic Techniques",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "238--258",
  day =          "04",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030238",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/238",
  abstract =     "Semantic technologies are of paramount importance to
                 the future Internet. The reuse and integration of
                 semantically described resources, such as data or
                 services, necessitates the bringing of ontologies into
                 mutual agreement. Ontology alignment deals with the
                 discovery of correspondences between concepts and
                 relations from different ontologies. Alignment provides
                 the key ingredient to semantic interoperability. This
                 paper gives an overview on the state of the art in the
                 field of visually supported semi-automatic alignment
                 techniques and presents recent trends and developments.
                 Particular attention is given to user interfaces and
                 visualization techniques supporting involvement of
                 humans in the alignment process. We derive and
                 summarize requirements for visual semi-automatic
                 alignment systems, provide an overview of existing
                 approaches, and discuss the possibilities for further
                 improvements and future research.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Metadata and Markup.",
}

@Article{Xie:2010:TFS,
  author =       "Iris Xie and Soohyung Joo",
  title =        "Tales from the Field: Search Strategies Applied in
                 {Web} Searching",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "259--281",
  day =          "06",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030259",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/259",
  abstract =     "In their web search processes users apply multiple
                 types of search strategies, which consist of different
                 search tactics. This paper identifies eight types of
                 information search strategies with associated cases
                 based on sequences of search tactics during the
                 information search process. Thirty-one participants
                 representing the general public were recruited for this
                 study. Search logs and verbal protocols offered rich
                 data for the identification of different types of
                 search strategies. Based on the findings, the authors
                 further discuss how to enhance web-based information
                 retrieval (IR) systems to support each type of search
                 strategy.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Information Behavior.",
}

@Article{Ho:2010:IVA,
  author =       "Yeh-Chin Ho and Yi-Bing Lin and Ren-Huang Liou and
                 Yuan-Kuang Tu",
  title =        "Implementing Value Added Applications in Next
                 Generation Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "282--294",
  day =          "06",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030282",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/282",
  abstract =     "One of the major issues in the future Internet is the
                 integration of telecom networks with the Internet. In
                 many countries, large Internet Service Providers (ISPs)
                 are also telecom operators that have been focusing on
                 providing Internet services through their telecom
                 networks with telecom-grade mechanisms. In this
                 article, we show that IP Multimedia Subsystem (IMS) is
                 a telecom-grade mechanism that addresses this important
                 issue. In Next Generation Network (NGN), IMS supports
                 IP-based multimedia services that can be accessed from
                 various wireless and wired access technologies through
                 fixed-mobile convergence. We show how to integrate
                 Internet Protocol Television (IPTV) with NGN/IMS to
                 offer enhanced IPTV services for subscribers with
                 set-top boxes or mobile phones. We specifically
                 describe the implementations of three services: weather
                 forecasts, short messages on TV screens and TV
                 shopping/food ordering for mobile users. Although these
                 services can be directly implemented in the Internet,
                 our commercial operation experiences indicate that the
                 NGN/IMS implementation has advantages in terms of
                 telecom-grade security, Quality of Service (QoS), and
                 flexible service creation.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Urushidani:2010:DRA,
  author =       "Shigeo Urushidani and Kensuke Fukuda and Michihiro
                 Koibuchi and Motonori Nakamura and Shunji Abe and
                 Yusheng Ji and Michihiro Aoki and Shigeki Yamada",
  title =        "Dynamic Resource Allocation and {QoS} Control
                 Capabilities of the {Japanese} Academic Backbone
                 Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "295--307",
  day =          "09",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030295",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/295",
  abstract =     "Dynamic resource control capabilities have become
                 increasingly important for academic networks that must
                 support big scientific research projects at the same
                 time as less data intensive research and educational
                 activities. This paper describes the dynamic resource
                 allocation and QoS control capabilities of the Japanese
                 academic backbone network, called SINET3, which
                 supports a variety of academic applications with a wide
                 range of network services. The article describes the
                 network architecture, networking technologies, resource
                 allocation, QoS control, and layer-1 bandwidth
                 on-demand services. It also details typical services
                 developed for scientific research, including the user
                 interface, resource control, and management functions,
                 and includes performance evaluations.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Mahfoudh:2010:EER,
  author =       "Saoucene Mahfoudh and Pascale Minet and Ichrak
                 Amdouni",
  title =        "Energy Efficient Routing and Node Activity Scheduling
                 in the {OCARI} Wireless Sensor Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "308--340",
  day =          "17",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030308",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/308",
  abstract =     "Sensor nodes are characterized by a small size, a low
                 cost, an advanced communication technology, but also a
                 limited amount of energy. Energy efficient strategies
                 are required in such networks to maximize network
                 lifetime. In this paper, we focus on a solution
                 integrating energy efficient routing and node activity
                 scheduling. The energy efficient routing we propose,
                 called EOLSR, selects the route and minimizes the
                 energy consumed by an end-to-end transmission, while
                 avoiding nodes with low residual energy. Simulation
                 results show that EOLSR outperforms the solution
                 selecting the route of minimum energy as well as the
                 solution based on node residual energy. Cross-layering
                 allows EOLSR to use information from the application
                 layer or the MAC layer to reduce its overhead and
                 increase network lifetime. Node activity scheduling is
                 based on the following observation: the sleep state is
                 the least power consuming state. So, to schedule node
                 active and sleeping periods, we propose SERENA that
                 colors all network nodes using a small number of
                 colors, such that two nodes with the same color can
                 transmit without interfering. The node color is mapped
                 into a time slot during which the node can transmit.
                 Consequently, each node is awake during its slot and
                 the slots of its one-hop neighbors, and sleeps in the
                 remaining time. We evaluate SERENA benefits obtained in
                 terms of bandwidth, delay and energy. We also show how
                 cross-layering with the application layer can improve
                 the end-to-end delays for data gathering
                 applications.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Networked Sensors and Actuators.",
}

@Article{Lux:2010:CGV,
  author =       "Mathias Lux and Arthur Pitman and Oge Marques",
  title =        "Can Global Visual Features Improve Tag Recommendation
                 for Image Annotation?",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "341--362",
  day =          "27",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030341",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/341",
  abstract =     "Recent advances in the fields of digital photography,
                 networking and computing, have made it easier than ever
                 for users to store and share photographs. However
                 without sufficient metadata, e.g., in the form of tags,
                 photos are difficult to find and organize. In this
                 paper, we describe a system that recommends tags for
                 image annotation. We postulate that the use of
                 low-level global visual features can improve the
                 quality of the tag recommendation process when compared
                 to a baseline statistical method based on tag
                 co-occurrence. We present results from experiments
                 conducted using photos and metadata sourced from the
                 Flickr photo website that suggest that the use of
                 visual features improves the mean average precision
                 (MAP) of the system and increases the system's ability
                 to suggest different tags, therefore justifying the
                 associated increase in complexity.",
  acknowledgement = ack-nhfb,
}

@Article{Topal:2010:TRA,
  author =       "Sebahattin Topal and Ismet Erkmen and Aydan M.
                 Erkmen",
  title =        "Towards the Robotic ``Avatar'': An Extensive Survey of
                 the Cooperation between and within Networked Mobile
                 Sensors",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "363--387",
  day =          "14",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030363",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/363",
  abstract =     "Cooperation between networked mobile sensors, wearable
                 and sycophant sensor networks with parasitically
                 sticking agents, and also having human beings involved
                 in the loop is the ``Avatarization'' within the robotic
                 research community, where all networks are connected
                 and where you can connect/disconnect at any time to
                 acquire data from a vast unstructured world. This paper
                 extensively surveys the networked robotic foundations
                 of this robotic biological ``Avatar'' that awaits us in
                 the future. Cooperation between networked mobile
                 sensors as well as cooperation of nodes within a
                 network are becoming more robust, fault tolerant and
                 enable adaptation of the networks to changing
                 environment conditions. In this paper, we survey and
                 comparatively discuss the current state of networked
                 robotics via their critical application areas and their
                 design characteristics. We conclude by discussing
                 future challenges.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Networked Sensors and Actuators.",
}

@Article{Do:2010:SQM,
  author =       "Viet Thi Minh Do and Lars Landmark and {\O}ivind
                 Kure",
  title =        "A Survey of {QoS} Multicast in Ad Hoc Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "388--416",
  day =          "14",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030388",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/388",
  abstract =     "This survey on Quality of Service (QoS) in multicast
                 ad hoc networks uses a framework based on the
                 mechanisms in three important elements: resource
                 estimations, multicast tree/mesh administration, and
                 multicast routing. Our contribution is an exploration
                 of the design space and an identification of areas that
                 have not been fully explored. We discuss the design
                 space of central mechanisms and classify proposed QoS
                 multicast schemes according to the mechanisms they
                 used. In addition, we summarize the scenarios used for
                 evaluating their performance. Furthermore, we identify
                 issues, mechanisms, and scenarios that have not been
                 fully investigated in existing works. The paper
                 provides a coherent understanding of design principles,
                 conceptual operation, and evaluated scenarios of
                 schemes designed for QoS multicast application in
                 mobile ad hoc networks (MANETs). It also outlines new
                 areas for future research in this field.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Pinart:2010:ATD,
  author =       "Carolina Pinart",
  title =        "Anticipation of Traffic Demands to Guarantee {QoS} in
                 {IP}\slash Optical Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "3",
  pages =        "417--430",
  day =          "21",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2030417",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/3/417",
  abstract =     "Traffic in the Internet backbone is expected to grow
                 above a few Tbit/s in 2020. To cope with this,
                 operators are moving to IP/optical network
                 architectures, where IP is the convergence layer for
                 all services. On the other hand, the quality of service
                 (QoS) requirements of future applications encompasses
                 the individualization of services and the assurance of
                 stricter quality parameters such as latency, jitter or
                 capacity. In other words, future optical networks will
                 not only transport more IP data, but they will also
                 have to offer differentiated QoS requirements to
                 services. Finally, some emerging applications, e.g.,
                 grid computing, need greater flexibility in the usage
                 of network resources, which involves establishing and
                 releasing connections as if they were virtualized
                 resources controlled by other elements or layers. In
                 this context, traffic-driven lightpath provisioning and
                 service-plane approaches arise as very interesting
                 candidate solutions to solve the main challenges
                 described above. This work reviews the concepts of
                 service-oriented and self-managed networks and relates
                 them to propose an integrated approach to assure QoS by
                 offering flow-aware networking in the sense that
                 traffic demands will be anticipated in a suitable way,
                 lightpaths will be established taking into account QoS
                 information (i.e., impairments) and complex services
                 will be decomposed into optical connections so that the
                 above techniques can be employed to assure QoS for any
                 service.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Kulatunga:2010:ENC,
  author =       "Chamil Kulatunga and Jesse Kielthy and Dmitri Botvich
                 and William Donnelly",
  title =        "Exploiting the In-Network Capabilities of Multicast to
                 Discover Proximate {IPTV} Channels",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "431--445",
  day =          "29",
  month =        sep,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040431",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/431",
  abstract =     "IPTV has become the next generation of television due,
                 in part, to its ability to support features that have
                 been lacking in conventional broadcasting-for example,
                 end-user interactivity, personalisation and
                 localisation. Providers are also searching for the most
                 efficient delivery methods to provide the greatest
                 amount of contents at the lowest cost. At present IPTV
                 uses IP multicast to deliver live TV channels in an
                 over-provisioned walled-garden network due to issues of
                 deploying multicast and QoS challenges in the public
                 Internet. However, IPTV is likely to shift into some
                 parts of the public Internet in the future as a managed
                 service. Multicast routing is performed on a
                 per-session destination-address basis so each router
                 maintains a table of all of the multicast addresses to
                 which the content is being forwarded. We exploit this
                 information to discover and join the in-progress
                 channels of geographically proximate users and to
                 create a new incentivised premium service in future
                 IPTV networks called ProxyTV. This approach is expected
                 to minimise network bandwidth requirements as it
                 enables ISPs to optimise bandwidth on their edge
                 networks. This becomes increasingly significant as TV
                 content consumes more and more bandwidth, especially
                 with the onset of HD and 3D capabilities. In this
                 paper, we have presented in detail the concept with the
                 results of a survey and an analysis of network traffic
                 to justify the proposed approach.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{So-In:2010:DRR,
  author =       "Chakchai So-In and Raj Jain and Abdel-Karim {Al
                 Tamimi}",
  title =        "Deficit Round {Robin} with Fragmentation Scheduling to
                 Achieve Generalized Weighted Fairness for Resource
                 Allocation in {IEEE 802.16e} Mobile {WiMAX} Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "446--468",
  day =          "12",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040446",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/446",
  abstract =     "Deficit Round Robin (DRR) is a fair packet-based
                 scheduling discipline commonly used in wired networks
                 where link capacities do not change with time. However,
                 in wireless networks, especially wireless broadband
                 networks, i.e., IEEE 802.16e Mobile WiMAX, there are
                 two main considerations violate the packet-based
                 service concept for DRR. First, the resources are
                 allocated per Mobile WiMAX frame. To achieve full frame
                 utilization, Mobile WiMAX allows packets to be
                 fragmented. Second, due to a high variation in wireless
                 channel conditions, the link/channel capacity can
                 change over time and location. Therefore, we introduce
                 a Deficit Round Robin with Fragmentation (DRRF) to
                 allocate resources per Mobile WiMAX frame in a fair
                 manner by allowing for varying link capacity and for
                 transmitting fragmented packets. Similar to DRR and
                 Generalized Processor Sharing (GPS), DRRF achieves
                 perfect fairness. DRRF results in a higher throughput
                 than DRR (80\% improvement) while causing less overhead
                 than GPS (8 times less than GPS). In addition, in
                 Mobile WiMAX, the quality of service (QoS) offered by
                 service providers is associated with the price paid.
                 This is similar to a cellular phone system; the users
                 may be required to pay air-time charges. Hence, we have
                 also formalized a Generalized Weighted Fairness (GWF)
                 criterion which equalizes a weighted sum of service
                 time units or slots, called temporal fairness, and
                 transmitted bytes, called throughput fairness, for
                 customers who are located in a poor channel condition
                 or at a further distance versus for those who are near
                 the base stations, or have a good channel condition. We
                 use DRRF to demonstrate the application of GWF. These
                 fairness criteria are used to satisfy basic
                 requirements for resource allocation, especially for
                 non real-time traffic. Therefore, we also extend DRRF
                 to support other QoS requirements, such as minimum
                 reserved traffic rate, maximum sustained traffic rate,
                 and traffic priority. For real-time traffic, i.e.,
                 video traffic, we compare the performance of DRRF with
                 deadline enforcement to that of Earliest Deadline First
                 (EDF). The results show that DRRF outperforms EDF
                 (higher achievable throughput under the promised delay
                 latency) and maintains fairness under an overload
                 scenario.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Mahfoudh:2010:NCC,
  author =       "Saoucene Mahfoudh and Gerard Chalhoub and Pascale
                 Minet and Michel Misson and Ichrak Amdouni",
  title =        "Node Coloring and Color Conflict Detection in Wireless
                 Sensor Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "469--504",
  day =          "13",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040469",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/469",
  abstract =     "In wireless sensor networks, energy efficiency is
                 mainly achieved by making nodes sleep. In this paper,
                 we present the combination of SERENA, a new node
                 activity scheduling algorithm based on node coloring,
                 with TDMA/CA, a collision avoidance MAC protocol. We
                 show that the combination of these two protocols
                 enables substantial bandwidth and energy benefits for
                 both general and data gathering applications. As a
                 first contribution, we prove that the three-hop node
                 coloring problem is NP-complete. As a second
                 contribution, the overhead induced by SERENA during
                 network coloring is reduced, making possible the use of
                 these protocols even in dense networks with limited
                 bandwidth. The third contribution of this paper is to
                 show that applying any slot assignment algorithm with
                 spatial reuse based on node neighborhood without taking
                 into account link quality can lead to poor performances
                 because of collisions. The use of good quality links
                 will prevent this phenomenon. The fourth contribution
                 consists of optimizing end-to-end delays for data
                 gathering applications, by means of cross-layering with
                 the application. However, color conflicts resulting
                 from topology changes, mobility and late node arrivals
                 can give rise to collisions. As a fifth contribution,
                 we show how the MAC layer can detect color conflicts,
                 and cope with them at the cost of a slightly reduced
                 throughput. Then, we discuss the tradeoff between
                 requesting SERENA to solve the color conflicts and
                 dealing with them at the MAC layer, our third
                 contribution. The combination of SERENA and TDMA/CA is
                 evaluated through simulations on realistic
                 topologies.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Networked Sensors and Actuators.",
}

@Article{Gottron:2010:SSM,
  author =       "Christian Gottron and Andr{\'e} K{\"o}nig and Ralf
                 Steinmetz",
  title =        "A Survey on Security in Mobile Peer-to-Peer
                 Architectures-Overlay-Based vs. Underlay-Based
                 Approaches",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "505--532",
  day =          "13",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040505",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/505",
  abstract =     "Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P)
                 networks share central characteristics such as their
                 distributed and decentralized nature. Combining both
                 networking paradigms results in a Mobile Peer-to-Peer
                 (MP2P) system that operates independently from a
                 preexisting infrastructure. Securing MP2P networks in
                 terms of availability and robustness as basic demands
                 in envisioned application scenarios like first
                 responder operations is a challenging task. In this
                 article, we present a survey of selected threats and of
                 state of the art countermeasures for MANETs and P2P
                 networks. Further, we discuss the efficiency of MANET
                 and P2P security mechanisms when applied in MP2P
                 networks.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Calegari:2010:OBI,
  author =       "Silvia Calegari and Gabriella Pasi",
  title =        "Ontology-Based Information Behaviour to Improve {Web}
                 Search",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "533--558",
  day =          "18",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040533",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/533",
  abstract =     "Web Search Engines provide a huge number of answers in
                 response to a user query, many of which are not
                 relevant, whereas some of the most relevant ones may
                 not be found. In the literature several approaches have
                 been proposed in order to help a user to find the
                 information relevant to his/her real needs on the Web.
                 To achieve this goal the individual Information
                 Behavior can been analyzed to 'keep' track of the
                 user's interests. Keeping information is a type of
                 Information Behavior, and in several works researchers
                 have referred to it as the study on what people do
                 during a search on the Web. Generally, the user's
                 actions (e.g., how the user moves from one Web page to
                 another, or her/his download of a document, etc.) are
                 recorded in Web logs. This paper reports on research
                 activities which aim to exploit the information
                 extracted from Web logs (or query logs) in personalized
                 user ontologies, with the objective to support the user
                 in the process of discovering Web information relevant
                 to her/his information needs. Personalized ontologies
                 are used to improve the quality of Web search by
                 applying two main techniques: query reformulation and
                 re-ranking of query evaluation results. In this paper
                 we analyze various methodologies presented in the
                 literature aimed at using personalized ontologies,
                 defined on the basis of the observation of Information
                 Behaviour to help the user in finding relevant
                 information.",
  acknowledgement = ack-nhfb,
}

@Article{Barradas:2010:ITA,
  author =       "Alvaro L. Barradas and Maria do Carmo R. Medeiros",
  title =        "An Intrinsic {TE} Approach for End-to-End {QoS}
                 Provisioning in {OBS} Networks Using Static
                 Load-Balanced Routing Strategies",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "559--586",
  day =          "22",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040559",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/559",
  abstract =     "Optical burst switching provides a feasible paradigm
                 for the next IP over optical backbones. However its
                 burst loss performance can be highly affected by burst
                 contention. In this paper we discuss traffic
                 engineering approaches for path selection with the
                 objective tominimize contention using only topological
                 information. The discussed strategies are based on
                 balancing the traffic across the network in order to
                 reduce congestion without incurring into link state
                 protocol penalties. The routing strategies are
                 evaluated by simulation on an optical burst switching
                 model specifically developed for the purpose with
                 OMNeT++. Results show that our strategies outperform
                 the traditionally used shortest path routing to an
                 extent that depends on the network connectivity.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Kolios:2010:LAS,
  author =       "Panayiotis Kolios and Vasilis Friderikos and Katerina
                 Papadaki",
  title =        "Look-Ahead Strategies Based on Store-Carry and Forward
                 Relaying for Energy Efficient Cellular Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "587--602",
  day =          "04",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040587",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/587",
  abstract =     "With the increasing availability of Internet type
                 services on mobile devices and the attractive flat rate
                 all-you-can-eat billing system, cellular
                 telecommunication networks are experiencing a
                 tremendous growth in data usage demand. However, there
                 are increasing concerns that current network deployment
                 trends (including more efficient radio access
                 techniques and increased spectrum allocation
                 strategies), will be unable to support the increased
                 Internet traffic in a sustainable way. The delay
                 tolerant nature of mobile Internet traffic allows for a
                 large degree of flexibility in optimizing network
                 performance to meet different design objectives and
                 it's a feature that has mostly gone unexplored by the
                 research community. In this paper, we introduce a novel
                 message forwarding mechanism in cellular networks that
                 benefits from the inherent delay tolerance of Internet
                 type services to provide flexible and adjustable
                 forwarding strategies for efficient network operation
                 while guaranteeing timely deliveries. By capitalizing
                 on the elasticity of message delivery deadlines and the
                 actual mobility of nodes inside the cell, considerable
                 performance gains can be achieved by physically
                 propagating information messages within the network.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Islam:2010:NEI,
  author =       "Salekul Islam and Jean-Charles Gr{\'e}goire",
  title =        "Network Edge Intelligence for the Emerging
                 Next-Generation {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "603--623",
  day =          "05",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040603",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/603",
  abstract =     "The success of the Content Delivery Networks (CDN) in
                 the recent years has demonstrated the increased
                 benefits of the deployment of some form of
                 ``intelligence'' within the network. Cloud computing,
                 on the other hand, has shown the benefits of economies
                 of scale and the use of a generic infrastructure to
                 support a variety of services. Following that trend, we
                 propose to move away from the smart terminal-dumb
                 network dichotomy to a model where some degree of
                 intelligence is put back into the network, specifically
                 at the edge, with the support of Cloud technology. In
                 this paper, we propose the deployment of an Edge Cloud,
                 which integrates a variety of user-side and server-side
                 services. On the user side, surrogate, an application
                 running on top of the Cloud, supports a virtual client.
                 The surrogate hides the underlying network
                 infrastructure from the user, thus allowing for
                 simpler, more easily managed terminals. Network side
                 services supporting delivery of and exploiting content
                 are also deployed on this infrastructure, giving the
                 Internet Service Providers (ISP) many opportunities to
                 become directly involved in content and service
                 delivery.",
  acknowledgement = ack-nhfb,
}

@Article{Graham:2010:BMM,
  author =       "Jim Graham and Greg Newman and Sunil Kumar and
                 Catherine Jarnevich and Nick Young and Alycia Crall and
                 Thomas J. Stohlgren and Paul Evangelista",
  title =        "Bringing Modeling to the Masses: a {Web} Based System
                 to Predict Potential Species Distributions",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "624--634",
  day =          "11",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040624",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/624",
  abstract =     "Predicting current and potential species distributions
                 and abundance is critical for managing invasive
                 species, preserving threatened and endangered species,
                 and conserving native species and habitats. Accurate
                 predictive models are needed at local, regional, and
                 national scales to guide field surveys, improve
                 monitoring, and set priorities for conservation and
                 restoration. Modeling capabilities, however, are often
                 limited by access to software and environmental data
                 required for predictions. To address these needs, we
                 built a comprehensive web-based system that: (1)
                 maintains a large database of field data; (2) provides
                 access to field data and a wealth of environmental
                 data; (3) accesses values in rasters representing
                 environmental characteristics; (4) runs statistical
                 spatial models; and (5) creates maps that predict the
                 potential species distribution. The system is available
                 online at www.niiss.org, and provides web-based tools
                 for stakeholders to create potential species
                 distribution models and maps under current and future
                 climate scenarios.",
  acknowledgement = ack-nhfb,
}

@Article{Kos:2010:CGS,
  author =       "Alexander Kos and Hans-J{\"u}rgen Himmler",
  title =        "{CWM Global Search} --- The {Internet} Search Engine
                 for Chemists and Biologists",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "635--644",
  day =          "03",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040635",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/635",
  abstract =     "CWM Global Search is a meta-search engine allowing
                 chemists and biologists to search the major chemical
                 and biological databases on the Internet, by structure,
                 synonyms, CAS Registry Numbers and free text. A
                 meta-search engine is a search tool that sends user
                 requests to several other search engines and/or
                 databases and aggregates the results into a single list
                 or displays them according to their source [1]. CWM
                 Global Search is a web application that has many of the
                 characteristics of desktop applications (also known as
                 Rich Internet Application, RIA), and it runs on both
                 Windows and Macintosh platforms. The application is one
                 of the first RIA for scientists. The application can be
                 started using the URL
                 http://cwmglobalsearch.com/gsweb.",
  acknowledgement = ack-nhfb,
}

@Article{Eichler:2010:SSW,
  author =       "Frederik Eichler and Wolfgang Reinhardt",
  title =        "Simplifying the Scientific Writing and Review Process
                 with {SciFlow}",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "645--661",
  day =          "06",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040645",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/645",
  abstract =     "Scientific writing is an essential part of a student's
                 and researcher's everyday life. In this paper we
                 investigate the particularities of scientific writing
                 and explore the features and limitations of existing
                 tools for scientific writing. Deriving from this
                 analysis and an online survey of the scientific writing
                 processes of students and researchers at the University
                 of Paderborn, we identify key principles to simplify
                 scientific writing and reviewing. Finally, we introduce
                 a novel approach to support scientific writing with a
                 tool called SciFlow that builds on these principles and
                 state of the art technologies like cloud computing.",
  acknowledgement = ack-nhfb,
}

@Article{Guthle:2010:IAD,
  author =       "Martin G{\"u}thle and Jochen K{\"o}gel and Stefan Wahl
                 and Matthias Kaschub and Christian M. Mueller",
  title =        "Improving Anomaly Detection for Text-Based Protocols
                 by Exploiting Message Structures",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "4",
  pages =        "662--669",
  day =          "21",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2040662",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:45 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/4/662",
  abstract =     "Service platforms using text-based protocols need to
                 be protected against attacks. Machine-learning
                 algorithms with pattern matching can be used to detect
                 even previously unknown attacks. In this paper, we
                 present an extension to known Support Vector Machine
                 (SVM) based anomaly detection algorithms for the
                 Session Initiation Protocol (SIP). Our contribution is
                 to extend the amount of different features used for
                 classification (feature space) by exploiting the
                 structure of SIP messages, which reduces the false
                 positive rate. Additionally, we show how combining our
                 approach with attribute reduction significantly
                 improves throughput.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Kinkelin:2011:UTS,
  author =       "Holger Kinkelin and Ralph Holz and Heiko Niedermayer
                 and Simon Mittelberger and Georg Carle",
  title =        "On Using {TPM} for Secure Identities in Future Home
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "1--13",
  day =          "07",
  month =        jan,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/1",
  abstract =     "Security should be integrated into future networks
                 from the beginning, not as an extension. Secure
                 identities and authentication schemes are an important
                 step to fulfill this quest. In this article, we argue
                 that home networks are a natural trust anchor for such
                 schemes. We describe our concept of home networks as a
                 universal point of reference for authentication, trust
                 and access control, and show that our scheme can be
                 applied to any next generation network. As home
                 networks are no safe place, we apply Trusted Computing
                 technology to prevent the abuse of identities, i.e.,
                 identity theft.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Hanka:2011:DPK,
  author =       "Oliver Hanka and Michael Eichhorn and Martin
                 Pfannenstein and J{\"o}rg Ebersp{\"a}cher and Eckehard
                 Steinbach",
  title =        "A Distributed Public Key Infrastructure Based on
                 Threshold Cryptography for the {HiiMap} Next Generation
                 {Internet} Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "14--30",
  day =          "01",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010014",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/14",
  abstract =     "In this article, a security extension for the HiiMap
                 Next Generation Internet Architecture is presented. We
                 regard a public key infrastructure which is integrated
                 into the mapping infrastructure of the
                 locator/identifier-split addressing scheme. The
                 security approach is based on Threshold Cryptography
                 which enables a sharing of keys among the mapping
                 servers. Hence, a more trustworthy and fair approach
                 for a Next Generation Internet Architecture as compared
                 to the state of the art approach is fostered.
                 Additionally, we give an evaluation based on IETF AAA
                 recommendations for security-related systems.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Rifa-Pous:2011:CEC,
  author =       "Helena Rif{\`a}-Pous and Jordi
                 Herrera-Joancomart{\'\i}",
  title =        "Computational and Energy Costs of Cryptographic
                 Algorithms on Handheld Devices",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "31--48",
  day =          "14",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010031",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/31",
  abstract =     "Networks are evolving toward a ubiquitous model in
                 which heterogeneous devices are interconnected.
                 Cryptographic algorithms are required for developing
                 security solutions that protect network activity.
                 However, the computational and energy limitations of
                 network devices jeopardize the actual implementation of
                 such mechanisms. In this paper, we perform a wide
                 analysis on the expenses of launching symmetric and
                 asymmetric cryptographic algorithms, hash chain
                 functions, elliptic curves cryptography and pairing
                 based cryptography on personal agendas, and compare
                 them with the costs of basic operating system
                 functions. Results show that although cryptographic
                 power costs are high and such operations shall be
                 restricted in time, they are not the main limiting
                 factor of the autonomy of a device.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue The Internet of Things.",
}

@Article{Petrie:2011:ECI,
  author =       "Charles Petrie",
  title =        "Enterprise Coordination on the {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "49--66",
  day =          "17",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010049",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/49",
  abstract =     "Enterprises are now connected internally and
                 externally to other Enterprises via the Internet in
                 ways that are increasingly difficult to manage,
                 especially as these interconnections become more
                 dynamic. Current methods of coordinating the effects of
                 change as they propagate through these networks of
                 connections are not likely to scale. What is needed is
                 a new paradigm for how the Internet supports such
                 coordination. Indeed, the Internet should and could
                 provide fundamental coordination functions that are
                 missing today. In this paper, we describe how such a
                 ``Coordinated Internet'' would work (this paper is an
                 expanded version of [1]). The key functionality of a
                 Coordinated Internet would be that the Internet
                 actively watches what people do (analogous to search
                 completion on desktops today), correlates these
                 activities, and actively notifies people when and how
                 their current tasks affect and are affected by the
                 activities of other people. This would be accomplished
                 by standard coordination functions implemented as a
                 common Internet layer that can be used as a utility by
                 more specialized applications. Such a Coordinated
                 Internet would revolutionize enterprise management, for
                 all enterprises, large and small, corporate and
                 personal. For example, static workflows would become
                 obsolete for all but the the most routine processes.
                 Some solutions provide existence proofs of such a
                 coordination substrate, such as the Redux solution in
                 concurrent engineering, which we describe herein.
                 However, foundational research remains to be done in
                 the new field of Coordination Engineering in order to
                 reach the goal of a future Internet in which
                 coordination functions are fundamental.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Mikoczy:2011:ECN,
  author =       "Eugen Mik{\'o}czy and Ivan Kotuliak and Oskar van
                 Deventer",
  title =        "Evolution of the Converged {NGN} Service Platforms
                 Towards Future Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "67--86",
  day =          "04",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010067",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/67",
  abstract =     "This article presents a comparison of main
                 characteristics of the Next Generation Networks (NGN)
                 and Future Generation Internet (FGI). The aim is to
                 discuss and compare two approaches to Future Networks
                 (FN) and services: the evolution of NGN, and the
                 revolutionary approach of a new FGI. We present both
                 frameworks from the services point of view as they are
                 delivered to the end-user, as well as from the
                 architectural point of view. We compare selected
                 properties of both approaches to explain commonalities
                 and differences. Their challenges are similar: managing
                 the quality of experience, mobility, security,
                 scalability and providing openness to applications.
                 Based on this comparison, we evaluate possible areas
                 for future convergence in the approach of the two
                 architectures to the Future Network concept. Our
                 analysis shows that despite their different
                 backgrounds, the internet's FGI and telco's NGN are not
                 that different after all. The convergence of the two
                 approaches therefore seems the only logical way
                 forward.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Network vs. Application Based Solutions
                 for NGN.",
}

@Article{Tonnies:2011:SOA,
  author =       "Sascha T{\"o}nnies and Benjamin K{\"o}hncke and
                 Patrick Hennig and Ingo Brunkhorst and Wolf-Tilo Balke",
  title =        "A Service Oriented Architecture for Personalized
                 Universal Media Access",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "87--116",
  day =          "01",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020087",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/87",
  abstract =     "Multimedia streaming means delivering continuous data
                 to a plethora of client devices. Besides the actual
                 data transport, this also needs a high degree of
                 content adaptation respecting the end users' needs
                 given by content preferences, transcoding constraints,
                 and device capabilities. Such adaptations can be
                 performed in many ways, usually on the media server.
                 However, when it comes to content editing, like mixing
                 in subtitles or picture-in-picture composition, relying
                 on third party service providers may be necessary. For
                 economic reasons this should be done in a
                 service-oriented way, because a lot of adaptation
                 modules can be reused within different adaptation
                 workflows. Although service-oriented architectures have
                 become widely accepted in the Web community, the
                 multimedia environment is still dominated by monolithic
                 systems. The main reason is the insufficient support
                 for working with continuous data: generally the
                 suitability of Web services for handling complex data
                 types and state-full applications is still limited. In
                 this paper we discuss extensions of Web service
                 frameworks, and present a first implementation of a
                 service-oriented framework for media streaming and
                 digital item adaptation. The focus lies on the
                 technical realization of the services. Our experimental
                 results show the practicality of the actual deployment
                 of service-oriented multimedia frameworks.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Network Architectures.",
}

@Article{Chay:2011:UOT,
  author =       "Sengtha Chay and Nophea Sasaki",
  title =        "Using Online Tools to Assess Public Responses to
                 Climate Change Mitigation Policies in {Japan}",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "117--129",
  day =          "01",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020117",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/117",
  abstract =     "As a member of the Annex 1 countries to the Kyoto
                 Protocol of the United Nations Framework Convention on
                 Climate Change, Japan is committed to reducing 6\% of
                 the greenhouse gas emissions. In order to achieve this
                 commitment, Japan has undertaken several major
                 mitigation measures, one of which is the domestic
                 measure that includes ecologically friendly lifestyle
                 programs, utilizing natural energy, participating in
                 local environmental activities, and amending
                 environmental laws. Mitigation policies could be
                 achieved if public responses were strong. As the
                 internet has increasingly become an online platform for
                 sharing environmental information, public responses to
                 the need for reducing greenhouse gas emissions may be
                 assessed using available online tools. We used Google
                 Insights for Search, Google AdWords Keyword Tool, and
                 Google Timeline View to assess public responses in
                 Japan based on the interest shown for five search terms
                 that define global climate change and its mitigation
                 policies. Data on online search interests from January
                 04, 2004 to July 18, 2010 were analyzed according to
                 locations and categories. Our study suggests that the
                 search interests for the five chosen search terms
                 dramatically increased, especially when new mitigation
                 policies were introduced or when climate change related
                 events were organized. Such a rapid increase indicates
                 that the Japanese public strongly responds to climate
                 change mitigation policies.",
  acknowledgement = ack-nhfb,
}

@Article{Glassey:2011:MIM,
  author =       "Olivier Glassey",
  title =        "Metadata For Identity Management of Population
                 Registers",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "130--143",
  day =          "18",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020130",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/130",
  abstract =     "A population register is an inventory of residents
                 within a country, with their characteristics (date of
                 birth, sex, marital status, etc.) and other
                 socio-economic data, such as occupation or education.
                 However, data on population are also stored in numerous
                 other public registers such as tax, land, building and
                 housing, military, foreigners, vehicles, etc.
                 Altogether they contain vast amounts of personal and
                 sensitive information. Access to public information is
                 granted by law in many countries, but this transparency
                 is generally subject to tensions with data protection
                 laws. This paper proposes a framework to analyze data
                 access (or protection) requirements, as well as a model
                 of metadata for data exchange.",
  acknowledgement = ack-nhfb,
}

@Article{Brown:2011:MPB,
  author =       "Katie Brown and Scott W. Campbell and Rich Ling",
  title =        "Mobile Phones Bridging the Digital Divide for Teens in
                 the {US}?",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "144--158",
  day =          "13",
  month =        may,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020144",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/144",
  abstract =     "In 2009, just 27\% of American teens with mobile
                 phones reported using their devices to access the
                 internet. However, teens from lower income families and
                 minority teens were significantly more likely to use
                 their phones to go online. Together, these surprising
                 trends suggest a potential narrowing of the digital
                 divide, offering internet access to those without other
                 means of going online. This is an important move, as,
                 in today's society, internet access is central to
                 active citizenship in general and teen citizenship in
                 particular. Yet the cost of this move toward equal
                 access is absorbed by those who can least afford it:
                 Teenagers from low income households. Using survey and
                 focus group data from a national study of ``Teens and
                 Mobile Phone Use'' (released by Pew and the University
                 of Michigan in 2010), this article helps identify and
                 explain this and other emergent trends for teen use (as
                 well as non-use) of the internet through mobile
                 phones.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Mugridge:2011:EWB,
  author =       "Rick Mugridge and Mark Utting and David Streader",
  title =        "Evolving {Web}-Based Test Automation into Agile
                 Business Specifications",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "159--174",
  day =          "03",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020159",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/159",
  abstract =     "Usually, test automation scripts for a web application
                 directly mirror the actions that the tester carries out
                 in the browser, but they tend to be verbose and
                 repetitive, making them expensive to maintain and
                 ineffective in an agile setting. Our research has
                 focussed on providing tool-support for business-level,
                 example-based specifications that are mapped to the
                 browser level for automatic verification. We provide
                 refactoring support for the evolution of existing
                 browser-level tests into business-level specifications.
                 As resulting business rule tables may be incomplete,
                 redundant or contradictory, our tool provides feedback
                 on coverage.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Agile Practices.",
}

@Article{Sempere:2011:ADV,
  author =       "Andrew Sempere",
  title =        "Architecture and Design for Virtual Conferences: a
                 Case Study",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "3",
  pages =        "175--184",
  day =          "06",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3030175",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/3/175",
  abstract =     "This paper presents a case study of the design issues
                 facing a large multi-format virtual conference. The
                 conference took place twice in two different years,
                 each time using an avatar-based 3D world with
                 spatialized audio including keynote, poster and social
                 sessions. Between year 1 and 2, major adjustments were
                 made to the architecture and design of the space,
                 leading to improvement in the nature of interaction
                 between the participants. While virtual meetings will
                 likely never supplant the effectiveness of face-to-face
                 meetings, this paper seeks to outline a few design
                 principles learned from this experience, which can be
                 applied generally to make computer mediated
                 collaboration more effective.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Virtual Worlds.",
}

@Article{Graham:2011:IDP,
  author =       "Roderick Graham and Danielle Taana Smith",
  title =        "{Internet} as Digital Practice: Examining Differences
                 in {African American} {Internet} Usage",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "3",
  pages =        "185--203",
  day =          "20",
  month =        jul,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3030185",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/3/185",
  abstract =     "This study assesses differences within the African
                 American population with respect to internet activity.
                 Using survey data, we find wide variations within the
                 population. While some segments of African Americans
                 are indeed less likely to perform certain activities on
                 the internet, we note that certain segments of the
                 African American population are reporting more internet
                 activity than other racial groups. These `haves' score
                 high not just in comparison to their African American
                 peers, but to the US American population as a whole. We
                 suggest a move away from the digital divide/digital
                 inequality models and a move towards thinking of
                 greater or lesser Information and Communication
                 Technology (ICT) usage as conditioned by the
                 instrumental needs of population groups. We term this a
                 digital practice model.",
  acknowledgement = ack-nhfb,
}

@Article{Schroth:2011:TTV,
  author =       "Olaf Schroth and Ellen Pond and Cam Campbell and Petr
                 Cizek and Stephen Bohus and Stephen R. J. Sheppard",
  title =        "Tool or Toy? {Virtual} Globes in Landscape Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "204--227",
  day =          "20",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040204",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/204",
  abstract =     "Virtual globes, i.e., geobrowsers that integrate
                 multi-scale and temporal data from various sources and
                 are based on a globe metaphor, have developed into
                 serious tools that practitioners and various
                 stakeholders in landscape and community planning have
                 started using. Although these tools originate from
                 Geographic Information Systems (GIS), they have become
                 a different, potentially interactive and public tool
                 set, with their own specific limitations and new
                 opportunities. Expectations regarding their utility as
                 planning and community engagement tools are high, but
                 are tempered by both technical limitations and ethical
                 issues [1,2]. Two grassroots campaigns and a
                 collaborative visioning process, the Kimberley Climate
                 Adaptation Project case study (British Columbia),
                 illustrate and broaden our understanding of the
                 potential benefits and limitations associated with the
                 use of virtual globes in participatory planning
                 initiatives. Based on observations, questionnaires and
                 in-depth interviews with stakeholders and community
                 members using an interactive 3D model of regional
                 climate change vulnerabilities, potential impacts, and
                 possible adaptation and mitigation scenarios in
                 Kimberley, the benefits and limitations of virtual
                 globes as a tool for participatory landscape planning
                 are discussed. The findings suggest that virtual globes
                 can facilitate access to geospatial information, raise
                 awareness, and provide a more representative virtual
                 landscape than static visualizations. However,
                 landscape is not equally representative at all scales,
                 and not all types of users seem to benefit equally from
                 the tool. The risks of misinterpretation can be managed
                 by integrating the application and interpretation of
                 virtual globes into face-to-face planning processes.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Paar:2011:LCM,
  author =       "Philip Paar and J{\"o}rg Rekittke",
  title =        "Low-Cost Mapping and Publishing Methods for Landscape
                 Architectural Analysis and Design in Slum-Upgrading
                 Projects",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "228--247",
  day =          "20",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040228",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/228",
  abstract =     "The research project ``Grassroots GIS'' focuses on the
                 development of low-cost mapping and publishing methods
                 for slums and slum-upgrading projects in Manila. In
                 this project smartphones, collaborative mapping and 3D
                 visualization applications are systematically employed
                 to support landscape architectural analysis and design
                 work in the context of urban poverty and urban informal
                 settlements. In this paper we focus on the description
                 of the developed methods and present preliminary
                 results of this work-in-progress.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Imhof:2011:NRK,
  author =       "Mark Imhof and Matthew Cox and Angela Fadersen and
                 Wayne Harvey and Sonia Thompson and David Rees and
                 Christopher Pettit",
  title =        "Natural Resource Knowledge and Information Management
                 via the {Victorian} Resources Online {Website}",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "248--280",
  day =          "09",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040248",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/248",
  abstract =     "Since 1997, the Victorian Resources Online (VRO)
                 website (http://www.dpi.vic.gov.au/vro) has been a key
                 means for the dissemination of landscape-based natural
                 resources information via the internet in Victoria,
                 Australia. The website currently consists of
                 approximately 11,000 web pages, including 1900 maps and
                 1000 downloadable documents. Information is provided at
                 a range of scales-from statewide and regional overviews
                 to more detailed catchment and sub-catchment levels. At
                 all these levels of generalisation, information is
                 arranged in an organisationally agnostic way around key
                 knowledge ``domains'' (e.g., soil, landform, water).
                 VRO represents a useful model for the effective
                 dissemination of a wide range of natural resources
                 information; relying on partnerships with key subject
                 matter experts and data custodians, including a
                 ``knowledge network'' of retired land resource
                 assessment specialists. In this paper, case studies are
                 presented that illustrate various approaches to
                 information and knowledge management with a focus on
                 presentation of spatially contexted soil and landscape
                 information at different levels of generalisation.
                 Examples are provided of adapting site-based
                 information into clickable maps that reveal
                 site-specific details, as well as ``spatialising'' data
                 from specialist internal databases to improve
                 accessibility to a wider audience. Legacy information
                 sources have also been consolidated and spatially
                 referenced. More recent incorporation of interactive
                 visualisation products (such as landscape panoramas,
                 videos and animations) is providing interactive rich
                 media content. Currently the site attracts an average
                 of 1190 user visits per day and user evaluation has
                 indicated a wide range of users, including students,
                 teachers, consultants, researchers and extension staff.
                 The wide range of uses for information and, in
                 particular, the benefits for natural resource
                 education, research and extension has also been
                 identified.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Parsons:2011:TDD,
  author =       "David Parsons and Ramesh Lal and Manfred Lange",
  title =        "Test Driven Development: Advancing Knowledge by
                 Conjecture and Confirmation",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "281--297",
  day =          "14",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040281",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/281",
  abstract =     "Test Driven Development (TDD) is a critical agile
                 software development practice that supports innovation
                 in short development cycles. However, TDD is one of the
                 most challenging agile practices to adopt because it
                 requires changes to work practices and skill sets. It
                 is therefore important to gain an understanding of TDD
                 through the experiences of those who have successfully
                 adopted this practice. We collaborated with an agile
                 team to provide this experience report on their
                 adoption of TDD, using observations and interviews
                 within the product development environment. This
                 article highlights a number of practices that underlie
                 successful development with TDD. To provide a
                 theoretical perspective that can help to explain how
                 TDD supports a positive philosophy of software
                 development, we have revised Northover et al.'s
                 conceptual framework, which is based on a four stage
                 model of agile development, to reinterpret Popper's
                 theory of conjecture and falsification in the context
                 of agile testing strategies. As a result of our
                 findings, we propose an analytical model for TDD in
                 agile software development which provides a theoretical
                 basis for further investigations into the role of TDD
                 and related practices.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Agile Practices.",
}

@Article{Li:2011:SOA,
  author =       "Haifeng Li and Bo Wu",
  title =        "A Service-Oriented Architecture for Proactive
                 Geospatial Information Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "298--318",
  day =          "19",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040298",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/298",
  abstract =     "The advances in sensor network, linked data, and
                 service-oriented computing has indicated a trend of
                 information technology, i.e., toward an open, flexible,
                 and distributed architecture. However, the existing
                 information technologies show a lack of effective
                 sharing, aggregation, and cooperation services to
                 handle the sensors, data, and processing resources to
                 fulfill user's complicated tasks in near real-time.
                 This paper presents a service-orientated architecture
                 for proactive geospatial information services (PGIS),
                 which integrates the sensors, data, processing, and
                 human services. PGIS is designed to organize,
                 aggregate, and co-operate services by composing small
                 scale services into service chains to meet the
                 complicated user requirements. It is a platform to
                 provide real-time or near real-time data collection,
                 storage, and processing capabilities. It is a flexible,
                 reusable, and scalable system to share and interoperate
                 geospatial data, information, and services. The
                 developed PGIS framework has been implemented and
                 preliminary experiments have been performed to verify
                 its performance. The results show that the basic
                 functions such as task analysis, managing sensors for
                 data acquisition, service composition, service chain
                 construction and execution are validated, and the
                 important properties of PGIS, including
                 interoperability, flexibility, and reusability, are
                 achieved.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Sharma:2011:OLO,
  author =       "Subhash Sharma and Christopher Pettit and Ian Bishop
                 and Pang Chan and Falak Sheth",
  title =        "An Online Landscape Object Library to Support
                 Interactive Landscape Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "319--343",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040319",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/319",
  abstract =     "Using landscape objects with geo-visualisation tools
                 to create 3D virtual environments is becoming one of
                 the most prominent communication techniques to
                 understand landscape form, function and processes.
                 Geo-visualisation tools can also provide useful
                 participatory planning support systems to explore
                 current and future environmental issues such as
                 biodiversity loss, crop failure, competing pressures on
                 water availability and land degradation. These issues
                 can be addressed by understanding them in the context
                 of their locality. In this paper we discuss some of the
                 technologies which facilitate our work on the issues of
                 sustainability and productivity, and ultimately support
                 for planning and decision-making. We demonstrate an
                 online Landscape Object Library application with a
                 suite of geo-visualisation tools to support landscape
                 planning. This suite includes: a GIS based Landscape
                 Constructor tool, a modified version of a 3D game
                 engine SIEVE (Spatial Information Exploration and
                 Visualisation Environment) and an interactive touch
                 table display. By integrating the Landscape Object
                 Library with this suite of geo-visualisation tools, we
                 believe we developed a tool that can support a
                 diversity of landscape planning activities. This is
                 illustrated by trial case studies in biolink design,
                 whole farm planning and renewable energy planning. We
                 conclude the paper with an evaluation of our Landscape
                 Object Library and the suite of geographical tools, and
                 outline some further research directions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Formosa:2011:SIS,
  author =       "Saviour Formosa and Vincent Magri and Julia Neuschmid
                 and Manfred Schrenk",
  title =        "Sharing Integrated Spatial and Thematic Data: The
                 {CRISOLA} Case for {Malta} and the {European Project
                 Plan4all} Process",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "344--361",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040344",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/344",
  abstract =     "Sharing data across diverse thematic disciplines is
                 only the next step in a series of hard-fought efforts
                 to ensure barrier-free data availability. The Plan4all
                 project is one such effort, focusing on the
                 interoperability and harmonisation of spatial planning
                 data as based on the INSPIRE protocols. The aims are to
                 support holistic planning and the development of a
                 European network of public and private actors as well
                 as Spatial Data Infrastructure (SDI). The Plan4all and
                 INSPIRE standards enable planners to publish and share
                 spatial planning data. The Malta case tackled the wider
                 scenario for sharing of data, through the investigation
                 of the availability, transformation and dissemination
                 of data using geoportals. The study is brought to the
                 fore with an analysis of the approaches taken to ensure
                 that data in the physical and social domains are
                 harmonised in an internationally-established process.
                 Through an analysis of the criminological theme, the
                 Plan4all process is integrated with the social and land
                 use themes as identified in the CRISOLA model. The
                 process serves as a basis for the need to view sharing
                 as one part of the datacycle rather than an end in
                 itself: without a solid protocol the foundations have
                 been laid for the implementation of the datasets in the
                 social and crime domains.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Lai:2011:OSE,
  author =       "Sabrina Lai and Corrado Zoppi",
  title =        "An Ontology of the Strategic Environmental Assessment
                 of City Masterplans",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "362--378",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040362",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/362",
  abstract =     "Following a discussion on the semantics of the term
                 ``ontology'', this paper discusses some key points
                 concerning the ontology of the Strategic Environmental
                 Assessment procedure applied to city Masterplans, using
                 sustainability as a reference point. It also assumes
                 the implementation of Guidelines of the Autonomous
                 Region of Sardinia as an experimental context, with the
                 objective of proposing the SEA ontology as an important
                 contribution to improve SEA's effectiveness.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Coltekin:2011:HQG,
  author =       "Arzu Coltekin and Tumasch Reichenbacher",
  title =        "High Quality Geographic Services and Bandwidth
                 Limitations",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "4",
  pages =        "379--396",
  day =          "20",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3040379",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/4/379",
  abstract =     "In this paper we provide a critical overview of the
                 state of the art in human-centric intelligent data
                 management approaches for geographic visualizations
                 when we are faced with bandwidth limitations. These
                 limitations often force us to rethink how we design
                 displays for geographic visualizations. We need ways to
                 reduce the amount of data to be visualized and
                 transmitted. This is partly because modern instruments
                 effortlessly produce large volumes of data and Web 2.0
                 further allows bottom-up creation of rich and diverse
                 content. Therefore, the amount of information we have
                 today for creating useful and usable cartographic
                 products is higher than ever before. However, how much
                 of it can we really use online? To answer this
                 question, we first calculate the bandwidth needs for
                 geographic data sets in terms of waiting times. The
                 calculations are based on various data volumes
                 estimated by scholars for different scenarios.
                 Documenting the waiting times clearly demonstrates the
                 magnitude of the problem. Following this, we summarize
                 the current hardware and software solutions, then the
                 current human-centric design approaches trying to
                 address the constraints such as various screen sizes
                 and information overload. We also discuss a limited set
                 of social issues touching upon the digital divide and
                 its implications. We hope that our systematic
                 documentation and critical review will help researchers
                 and practitioners in the field to better understand the
                 current state of the art.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Neis:2012:SNE,
  author =       "Pascal Neis and Dennis Zielstra and Alexander Zipf",
  title =        "The Street Network Evolution of Crowdsourced Maps:
                 {OpenStreetMap} in {Germany} 2007--2011",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "1--21",
  day =          "29",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/1",
  abstract =     "The OpenStreetMap (OSM) project is a prime example in
                 the field of Volunteered Geographic Information (VGI).
                 Worldwide, several hundred thousand people are
                 currently contributing information to the ``free''
                 geodatabase. However, the data contributions show a
                 geographically heterogeneous pattern around the globe.
                 Germany counts as one of the most active countries in
                 OSM; thus, the German street network has undergone an
                 extensive development in recent years. The question
                 that remains is this: How does the street network
                 perform in a relative comparison with a commercial
                 dataset? By means of a variety of studies, we show that
                 the difference between the OSM street network for car
                 navigation in Germany and a comparable proprietary
                 dataset was only 9\% in June 2011. The results of our
                 analysis regarding the entire street network showed
                 that OSM even exceeds the information provided by the
                 proprietary dataset by 27\%. Further analyses show on
                 what scale errors can be reckoned with in the topology
                 of the street network, and the completeness of turn
                 restrictions and street name information. In addition
                 to the analyses conducted over the past few years,
                 projections have additionally been made about the point
                 in time by which the OSM dataset for Germany can be
                 considered ``complete'' in relative comparison to a
                 commercial dataset.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Stenliden:2012:HCW,
  author =       "Linnea Stenliden and Mikael Jern",
  title =        "How Can We Study Learning with Geovisual Analytics
                 Applied to Statistics?",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "22--41",
  day =          "30",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010022",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/22",
  abstract =     "It is vital to understand what kind of processes for
                 learning that Geovisual Analytics creates, as certain
                 activities and conditions are produced when employing
                 Geovisual Anlytic tools in education. To understand
                 learning processes created by Geovisual Analytics,
                 first requires an understanding of the interactions
                 between the technology, the workplace where the
                 learning takes place, and learners' specific knowledge
                 formation. When studying these types of interaction it
                 demands a most critical consideration from theoretical
                 perspectives on research design and methods. This paper
                 first discusses common, and then a more uncommon,
                 theoretical approach used within the fields of learning
                 with multimedia environments and Geovisual Analytics,
                 the socio-cultural theoretical perspective. The paper
                 next advocates this constructivist theoretical and
                 empirical perspective when studying learning with
                 multiple representational Geovisual Analytic tools. To
                 illustrate, an outline of a study made within this
                 theoretical tradition is offered. The study is
                 conducted in an educational setting where the Open
                 Statistics eXplorer platform is used. Discussion of our
                 study results shows that the socio-cultural perspective
                 has much to offer in terms of what kind of
                 understanding can be reached in conducting this kind of
                 studies. Therefore, we argue that empirical research to
                 analyze how specific communities use various Geovisual
                 Analytics to evaluate information is best positioned in
                 a socio-cultural theoretical perspective.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Geovisual Analytics.",
}

@Article{Lowell:2012:EAS,
  author =       "Kim Lowell and Lindsay Smith and Ian Miller and
                 Christopher Pettit and Eloise Seymour",
  title =        "{Extension Activity Support System (EASY)}: a
                 {Web}-Based Prototype for Facilitating Farm
                 Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "42--64",
  day =          "04",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010042",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/42",
  abstract =     "In response to disparate advances in delivering
                 spatial information to support agricultural extension
                 activities, the Extension Activity Support System
                 (EASY) project was established to develop a vision
                 statement and conceptual design for such a system based
                 on a national needs assessment. Personnel from across
                 Australia were consulted and a review of existing farm
                 information/management software undertaken to ensure
                 that any system that is eventually produced from the
                 EASY vision will build on the strengths of existing
                 efforts. This paper reports on the collaborative
                 consultative process undertaken to create the EASY
                 vision as well as the conceptual technical design and
                 business models that could support a fully functional
                 spatially enabled online system.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet and Landscapes.",
}

@Article{Montenegro:2012:LUP,
  author =       "Nuno Montenegro and Jorge C. Gomes and Paulo Urbano
                 and Jos{\'e} P. Duarte",
  title =        "A Land Use Planning Ontology: {LBCS}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "65--82",
  day =          "06",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010065",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/65",
  abstract =     "Urban planning has a considerable impact on the
                 economic performance of cities and on the quality of
                 life of their populations. Efficiency at this level has
                 been hampered by the lack of integrated tools to
                 adequately describe urban space in order to formulate
                 appropriate design solutions. This paper describes an
                 ontology called LBCS-OWL2 specifically developed to
                 overcome this flaw, based on the Land Based
                 Classification Standards (LBCS), a comprehensive and
                 detailed land use standard to describe the different
                 dimensions of urban space. The goal is to provide
                 semantic and computer-readable land use descriptions of
                 geo-referenced spatial data. This will help to make
                 programming strategies available to those involved in
                 the urban development process. There are several
                 advantages to transferring a land use standard to an
                 OWL2 land use ontology: it is modular, it can be shared
                 and reused, it can be extended and data consistency
                 maintained, and it is ready for integration, thereby
                 supporting the interoperability of different urban
                 planning applications. This standard is used as a basic
                 structure for the ``City Information Modelling'' (CIM)
                 model developed within a larger research project called
                 City Induction, which aims to develop a tool for urban
                 planning and design.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Jurgenson:2012:WAM,
  author =       "Nathan Jurgenson",
  title =        "When Atoms Meet Bits: Social Media, the Mobile {Web}
                 and Augmented Revolution",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "83--91",
  day =          "23",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010083",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/83",
  abstract =     "The rise of mobile phones and social media may come to
                 be historically coupled with a growing atmosphere of
                 dissent that is enveloping much of the globe. The Arab
                 Spring, UK Riots, Occupy and many other protests and
                 so-called ``flash-mobs'' are all massive gatherings of
                 digitally-connected individuals in physical space; and
                 they have recently become the new normal. The primary
                 role of technology in producing this atmosphere has, in
                 part, been to effectively link the on and the offline.
                 The trend to view these as separate spaces, what I call
                 ``digital dualism'', is faulty. Instead, I argue that
                 the digital and physical enmesh to form an ``augmented
                 reality''. Linking the power of the digital-creating
                 and disseminating networked information-with the power
                 of the physical-occupying geographic space with
                 flesh-and-blood bodies-is an important part of why we
                 have this current flammable atmosphere of augmented
                 revolution.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Anisetti:2012:WSA,
  author =       "Marco Anisetti and Claudio A. Ardagna and Ernesto
                 Damiani and Fulvio Frati and Hausi A. M{\"u}ller and
                 Atousa Pahlevan",
  title =        "{Web} Service Assurance: The Notion and the Issues",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "92--109",
  day =          "14",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010092",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/92",
  abstract =     "Web service technology provides basic infrastructure
                 for deploying collaborative business processes. Web
                 Service security standards and protocols aim to provide
                 secure communication and conversation between service
                 providers and consumers. Still, for a client calling a
                 Web service it is difficult to ascertain that a
                 particular service instance satisfies-at execution
                 time-specific non-functional properties. In this paper
                 we introduce the notion of certified Web service
                 assurance, characterizing how service consumers can
                 specify the set of security properties that a service
                 should satisfy. Also, we illustrate a mechanism to
                 re-check non-functional properties when the execution
                 context changes. To this end, we introduce the concept
                 of context-aware certificate, and describe a dynamic,
                 context-aware service discovery environment.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Fehling:2012:PBD,
  author =       "Christoph Fehling and Frank Leymann and Jochen
                 R{\"u}tschlin and David Schumm",
  title =        "Pattern-Based Development and Management of Cloud
                 Applications",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "110--141",
  day =          "15",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010110",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/110",
  abstract =     "Cloud-based applications require a high degree of
                 automation regarding their IT resource management, for
                 example, to handle scalability or resource failures.
                 This automation is enabled by cloud providers offering
                 management interfaces accessed by applications without
                 human interaction. The properties of clouds, especially
                 pay-per-use billing and low availability of individual
                 resources, demand such a timely system management. We
                 call the automated steps to perform one of these
                 management tasks a ``management flow''. Because the
                 emerging behavior of the overall system is comprised of
                 many such management flows and is often hard to
                 predict, we propose defining abstract management flows,
                 describing common steps handling the management tasks.
                 These abstract management flows may then be refined for
                 each individual use case. We cover abstract management
                 flows describing how to make an application elastic,
                 resilient regarding IT resource failure, and how to
                 move application components between different runtime
                 environments. The requirements of these management
                 flows for handled applications are expressed using
                 architectural patterns that have to be implemented by
                 the applications. These dependencies result in abstract
                 management flows being interrelated with architectural
                 patterns in a uniform pattern catalog. We propose a
                 method by use of a catalog to guide application
                 managers during the refinement of abstract management
                 flows at the design stage of an application. Following
                 this method, runtime-specific management functionality
                 and management interfaces are used to obtain automated
                 management flows for a developed application.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Bunting:2012:PAE,
  author =       "Ben S. {Bunting, Jr.} and Jacob Hughes and Tim
                 Hetland",
  title =        "The Player as Author: Exploring the Effects of Mobile
                 Gaming and the Location-Aware Interface on
                 Storytelling",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "142--160",
  day =          "17",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010142",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/142",
  abstract =     "The mobile internet expands the immersive potential of
                 storytelling by introducing electronic games powered by
                 portable, location-aware interfaces. Mobile gaming has
                 become the latest iteration in a decades-long evolution
                 of electronic games that seek to empower the player not
                 just as an avatar in a gameworld but also as a
                 co-author of that gameworld, alongside the game's
                 original designers. Location-aware interfaces allow
                 players to implicate places in the physical world as
                 part of their gameworld (and vice versa) for the first
                 time. In addition to empowering the player as a
                 co-author in the process of constructing a compelling
                 gameworld, then, mobile games eschew linear narrative
                 structures in favor of a cooperative storytelling
                 process that is reliant in part on the player's
                 experience of place. While such an author-player
                 ``worldmaking'' approach to storytelling is not new,
                 mobile games evolve the process beyond what has yet
                 been possible within the technical and physical
                 constraints of the traditional video gaming format.
                 Location-aware interfaces allow mobile games to extend
                 the worldmaking process beyond the screen and into the
                 physical world, co-opting the player's sensory
                 experiences of real-world places as potential
                 storytelling tools. In our essay, we theorize the
                 unique storytelling potential of mobile games while
                 describing our experience attempting to harness that
                 potential through the design and implementation of our
                 hybrid-reality game University of Death.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Oie:2012:SNU,
  author =       "Kjetil Vaage {\O}ie",
  title =        "Sensing the News: User Experiences when Reading
                 Locative News",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "161--178",
  day =          "21",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010161",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/161",
  abstract =     "This article focuses on user experiences on reading
                 location-aware news on the mobile platform and aims to
                 explore what experiences this kind of locative
                 journalism generates and how such experiences change
                 the users' social interaction with news. We produced a
                 specially designed mobile application and tailored news
                 stories specific to this project called LocaNews in
                 order to explore participants' relation to the content
                 in this journalistic format. The result is generated
                 through a field study and a questionnaire of 32 people
                 to find out how they experience the news presented in
                 this format. The user participants' responses are
                 analyzed based on their news experiences,
                 contextualizing places and their social interaction
                 with the news within this form of journalism. Results
                 showed that the local, semi-local and non-local user
                 approaches the locative news in a different manner, but
                 that the average user found this kind of news more
                 interesting and more informative than ordinary news.
                 The participants also have a problem identifying this
                 as journalism, rather than an information service.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Sorschag:2012:FOI,
  author =       "Robert Sorschag",
  title =        "A Flexible Object-of-Interest Annotation Framework for
                 Online Video Portals",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "179--215",
  day =          "22",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010179",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/179",
  abstract =     "In this work, we address the use of object recognition
                 techniques to annotate what is shown where in online
                 video collections. These annotations are suitable to
                 retrieve specific video scenes for object related text
                 queries which is not possible with the manually
                 generated metadata that is used by current portals. We
                 are not the first to present object annotations that
                 are generated with content-based analysis methods.
                 However, the proposed framework possesses some
                 outstanding features that offer good prospects for its
                 application in real video portals. Firstly, it can be
                 easily used as background module in any video
                 environment. Secondly, it is not based on a fixed
                 analysis chain but on an extensive recognition
                 infrastructure that can be used with all kinds of
                 visual features, matching and machine learning
                 techniques. New recognition approaches can be
                 integrated into this infrastructure with low
                 development costs and a configuration of the used
                 recognition approaches can be performed even on a
                 running system. Thus, this framework might also benefit
                 from future advances in computer vision. Thirdly, we
                 present an automatic selection approach to support the
                 use of different recognition strategies for different
                 objects. Last but not least, visual analysis can be
                 performed efficiently on distributed, multi-processor
                 environments and a database schema is presented to
                 store the resulting video annotations as well as the
                 off-line generated low-level features in a compact
                 form. We achieve promising results in an annotation
                 case study and the instance search task of the TRECVID
                 2011 challenge.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Visual Information Retrieval.",
}

@Article{Exter:2012:UWT,
  author =       "Kristin Den Exter and Stephen Rowe and William Boyd
                 and David Lloyd",
  title =        "Using {Web 2.0} Technologies for Collaborative
                 Learning in Distance Education-Case Studies from an
                 {Australian} {University}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "216--237",
  day =          "07",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010216",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/216",
  abstract =     "This paper explores the use of Web 2.0 technologies
                 for collaborative learning in a higher education
                 context. A review of the literature exploring the
                 strengths and weaknesses of Web 2.0 technology is
                 presented, and a conceptual model of a Web 2.0
                 community of inquiry is introduced. Two Australian case
                 studies are described, with an ex-poste evaluation of
                 the use of Web 2.0 tools. Conclusions are drawn as to
                 the potential for the use of Web 2.0 tools for
                 collaborative e-learning in higher education. In
                 particular, design and integration of Web 2.0 tools
                 should be closely related to curriculum intent and
                 pedagogical requirements, care must be taken to provide
                 clear guidance on both expected student activity and
                 learning expectations, and there is a clear need to
                 develop, support and encourage strong interaction both
                 between teachers and students, and amongst the students
                 themselves.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Martin:2012:RW,
  author =       "Ludger Martin and Thomas Gottron",
  title =        "Readability and the {Web}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "238--252",
  day =          "12",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010238",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/238",
  abstract =     "Readability indices measure how easy or difficult it
                 is to read and comprehend a text. In this paper we look
                 at the relation between readability indices and web
                 documents from two different perspectives. On the one
                 hand we analyse how to reliably measure the readability
                 of web documents by applying content extraction
                 techniques and incorporating a bias correction. On the
                 other hand we investigate how web based corpus
                 statistics can be used to measure readability in a
                 novel and language independent way.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Garside:2012:SMS,
  author =       "Debbie Garside and Arjun Ponnusamy and Steve Chan and
                 Richard Picking",
  title =        "Secure Military Social Networking and Rapid
                 Sensemaking in Domain Specific Concept Systems:
                 Research Issues and Future Solutions",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "253--264",
  day =          "12",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010253",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/253",
  abstract =     "This paper identifies the need for a secure military
                 social networking site and the underlying research
                 issues linked to the successful development of such
                 sites. The paper further proposes a solution to the
                 most basic issues by identifying and tackling known
                 potential security threats to military personnel and
                 their families. The paper further defines the base
                 platform for this development to facilitate rapid
                 sensemaking to inform critical communications and rapid
                 decision making processes during abrupt governance and
                 eco-system change, and how the plethora of information
                 (termed as Big Data) on social networking sites can be
                 analysed and harnessed. Underlying architectural
                 issues, efficiency and complexity are explored and
                 their future development is considered.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Roche:2012:WBC,
  author =       "St{\'e}phane Roche and Boris Mericskay and Wided
                 Batita and Matthieu Bach and Mathieu Rondeau",
  title =        "{WikiGIS} Basic Concepts: {Web 2.0} for Geospatial
                 Collaboration",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "265--284",
  day =          "13",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010265",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/265",
  abstract =     "With the emergence of Web 2.0, new applications arise
                 and evolve into more interactive forms of collective
                 intelligence. These applications offer to both
                 professionals and citizens an open and expanded access
                 to geographic information. In this paper, we develop
                 the conceptual foundations of a new technology solution
                 called WikiGIS. WikiGIS's strength lies in its ability
                 to ensure the traceability of changes in
                 spatial-temporal geographic components (geometric
                 location and shape, graphics: iconography and
                 descriptive) generated by users. The final use case
                 highlights to what extent WikiGIS could be a relevant
                 and useful technological innovation in
                 Geocollaboration.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Mooney:2012:CHE,
  author =       "Peter Mooney and Padraig Corcoran",
  title =        "Characteristics of Heavily Edited Objects in
                 {OpenStreetMap}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "285--305",
  day =          "20",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010285",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/285",
  abstract =     "This paper describes the results of an analysis of the
                 OpenStreetMap (OSM) database for the United Kingdom
                 (UK) and Ireland (correct to April 2011). 15, 640 OSM
                 ways (polygons and polylines), resulting in 316, 949
                 unique versions of these objects, were extracted and
                 analysed from the OSM database for the UK and Ireland.
                 In our analysis we only considered ``heavily edited''
                 objects in OSM: objects which have been edited 15 or
                 more times. Our results show that there is no strong
                 relationship between increasing numbers of contributors
                 to a given object and the number of tags (metadata)
                 assigned to it. 87\% of contributions/edits to these
                 objects are performed by 11\% of the total 4128
                 contributors. In 79\% of edits additional spatial data
                 (nodes) are added to objects. The results in this paper
                 do not attempt to evaluate the OSM data as good/poor
                 quality but rather informs potential consumers of OSM
                 data that the data itself is changing over time. In
                 developing a better understanding of the
                 characteristics of ``heavily edited'' objects there may
                 be opportunities to use historical analysis in working
                 towards quality indicators for OSM in the future.",
  acknowledgement = ack-nhfb,
}

@Article{Goggin:2012:DIM,
  author =       "Gerard Goggin",
  title =        "Driving the {Internet}: Mobile {Internets}, Cars, and
                 the Social",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "306--321",
  day =          "20",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010306",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/306",
  abstract =     "This paper looks at the tandem technologies of cars
                 and the Internet, and the new ways that they are
                 assembling the social with the mobile Internet. My
                 argument is two-fold: firstly, the advent of mobile
                 Internet in cars brings together new, widely divergent
                 trajectories of Internet; secondly, such developments
                 have social implications that vary widely depending on
                 whether or not we recognize the broader technological
                 systems and infrastructures, media practices, flows,
                 and mobilities in which vehicular mobile Internets are
                 being created.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Nguyen:2012:BAS,
  author =       "Dinh Khoa Nguyen and Francesco Lelli and Mike P.
                 Papazoglou and Willem-Jan {Van den Heuvel}",
  title =        "Blueprinting Approach in Support of Cloud Computing",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "322--346",
  day =          "21",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010322",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/322",
  abstract =     "Current cloud service offerings, i.e.,
                 Software-as-a-service (SaaS), Platform-as-a-service
                 (PaaS) and Infrastructure-as-a-service (IaaS) offerings
                 are often provided as monolithic, one-size-fits-all
                 solutions and give little or no room for customization.
                 This limits the ability of Service-based Application
                 (SBA) developers to configure and syndicate offerings
                 from multiple SaaS, PaaS, and IaaS providers to address
                 their application requirements. Furthermore, combining
                 different independent cloud services necessitates a
                 uniform description format that facilitates the design,
                 customization, and composition. Cloud Blueprinting is a
                 novel approach that allows SBA developers to easily
                 design, configure and deploy virtual SBA payloads on
                 virtual machines and resource pools on the cloud. We
                 propose the Blueprint concept as a uniform abstract
                 description for cloud service offerings that may cross
                 different cloud computing layers, i.e., SaaS, PaaS and
                 IaaS. To support developers with the SBA design and
                 development in the cloud, this paper introduces a
                 formal Blueprint Template for unambiguously describing
                 a blueprint, as well as a Blueprint Lifecycle that
                 guides developers through the manipulation, composition
                 and deployment of different blueprints for an SBA.
                 Finally, the empirical evaluation of the blueprinting
                 approach within an EC's FP7 project is reported and an
                 associated blueprint prototype implementation is
                 presented.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Hanzl:2012:HGU,
  author =       "Ma{\l}gorzata Hanzl and Karol Dzik and Paulina
                 Kowalczyk and Krystian Kwieci{\'n}ski and Ewa
                 Stankiewicz and Agata L. Wierzbicka",
  title =        "Human Geomatics in Urban Design-Two Case Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "1",
  pages =        "347--361",
  day =          "22",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4010347",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:47 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/1/347",
  abstract =     "The mapping of different aspects of urban phenomena
                 and their relation to the physical cityscape has been
                 greatly extended by the use of geomatics. The tradition
                 to base reasoning on ` understanding the world ' dates
                 from the time of Aristotle. The extension plan for
                 Barcelona (Eixample), developed by Cerd{\`a}, which
                 opened the era of modern urban planning, was preceded
                 by analyses of rich data, describing both detailed
                 demographic issues and physical structures. The
                 contemporary, postmodernist city planning continues
                 this tradition, although a shift towards analyses of
                 more human-related issues can be observed, covering,
                 inter alia, citizens' perception, cultural differences
                 and patterns of human activities with regard to
                 distinct social groups. The change towards a more
                 human-related perspective and the inclusion of urban
                 morphology analyses are direct consequences of this
                 trend. The required data may be gathered within a
                 crowd-sourcing participation process. According to
                 communicative planning theory, communication with the
                 wider public is indispensable in order to achieve the
                 best results, and can be realized with the use of
                 sophisticated IT tools. Evidence-based reasoning may be
                 supported by images of significant aesthetic values,
                 which inspire immediate reactions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Nilsen:2012:CBP,
  author =       "Line Lundvoll Nilsen",
  title =        "Collaboration between Professionals: The Use of
                 Videoconferencing for Delivering E-Health",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "362--371",
  day =          "02",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020362",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/362",
  abstract =     "This article explores the ways in which collaboration
                 between professionals using videoconferencing affects
                 the e-health delivered to patients. In Norway, general
                 practitioners (GPs) and specialists routinely hold
                 videoconferences. Observations of 42 VC meetings, each
                 lasting from 5 to 40 min, were analysed in terms of the
                 interactions. In addition, five semi-structured,
                 face-to-face interviews were conducted, each lasting
                 from 20 to 70 minutes. Statements were selected to
                 illustrate the content of the interactions and how
                 collaborative work affects the delivery of healthcare.
                 Successful collaborative work provides practitioners
                 with a new way of thinking: exchanging information and
                 knowledge between levels of care in order to provide
                 the best treatment for patients locally. The regularity
                 makes the collaborative work a two-way achievement. GPs
                 receive decision support and second opinions, and
                 specialists receive information and opportunities to
                 follow up. How the professionals manage their work
                 (i.e., collaborating) may benefit their patients. The
                 regular use of videoconferencing will furnish
                 professionals with enhanced resources for the meeting
                 of patients' demands in the future. Regularly informing
                 one another and exchanging knowledge, benefits the
                 professionals by providing increased certainty with
                 regard to their medical decisions, and it benefits the
                 patients because they will feel satisfied with the
                 competence of the specialists where they live.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Kennedy:2012:SAP,
  author =       "Sean Kennedy and Owen Molloy and Robert Stewart and
                 Paul Jacob and Maria Maleshkova and Frank Doheny",
  title =        "A Semantically Automated Protocol Adapter for Mapping
                 {SOAP} {Web} Services to {RESTful} {HTTP} Format to
                 Enable the {Web} Infrastructure, Enhance {Web} Service
                 Interoperability and Ease {Web} Service Migration",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "372--395",
  day =          "11",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020372",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/372",
  abstract =     "Semantic Web Services (SWS) are Web Service (WS)
                 descriptions augmented with semantic information. SWS
                 enable intelligent reasoning and automation in areas
                 such as service discovery, composition, mediation,
                 ranking and invocation. This paper applies SWS to a
                 previous protocol adapter which, operating within
                 clearly defined constraints, maps SOAP Web Services to
                 RESTful HTTP format. However, in the previous adapter,
                 the configuration element is manual and the latency
                 implications are locally based. This paper applies SWS
                 technologies to automate the configuration element and
                 the latency tests are conducted in a more realistic
                 Internet based setting.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Zafiropoulos:2012:BCC,
  author =       "Kostas Zafiropoulos and Vasiliki Vrana and Dimitrios
                 Vagianos",
  title =        "Bloggers' Community Characteristics and Influence
                 within {Greek} Political Blogosphere",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "396--412",
  day =          "19",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020396",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/396",
  abstract =     "This paper investigates the properties of central or
                 core political blogs. They can be located as clusters
                 of blogs whose members have many incoming links. Other
                 blogs form clouds around them in the sense that they
                 link the core blogs. A case study records Greek
                 political blogs and their incoming links reported
                 through their blogrolls. The adjacency matrix from the
                 blogs' social network is analyzed and clusters are
                 located. Three of them, those with the larger numbers
                 of incoming links, may be considered to be central.
                 Next, four measures of influence are used to test the
                 influence of the central blogs. The findings suggest
                 that there are many kinds of central blogs, influential
                 and non-influential, and high influence does not always
                 involve high hyperlinking.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Government 2.0.",
}

@Article{Davies:2012:PEA,
  author =       "John N. Davies and Paul Comerford and Vic Grout",
  title =        "Principles of Eliminating Access Control Lists within
                 a Domain",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "413--429",
  day =          "19",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020413",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/413",
  abstract =     "The infrastructure of large networks is broken down
                 into areas that have a common security policy called a
                 domain. Security within a domain is commonly
                 implemented at all nodes. However this can have a
                 negative effect on performance since it introduces a
                 delay associated with packet filtering. When Access
                 Control Lists (ACLs) are used within a router for this
                 purpose then a significant overhead is introduced
                 associated with this process. It is likely that
                 identical checks are made at multiple points within a
                 domain prior to a packet reaching its destination.
                 Therefore by eliminating ACLs within a domain by
                 modifying the ingress/egress points with equivalent
                 functionality an improvement in the overall performance
                 can be obtained. This paper considers the effect of the
                 delays when using router operating systems offering
                 different levels of functionality. It considers factors
                 which contribute to the delay particularly due to ACLs
                 and by using theoretical principles modified by
                 practical calculation a model is created. Additionally
                 this paper provides an example of an optimized solution
                 which reduces the delay through network routers by
                 distributing the security rules to the ingress/egress
                 points of the domain without affecting the security
                 policy.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Fernandez:2012:SPW,
  author =       "Eduardo B. Fernandez and Ola Ajaj and Ingrid Buckley
                 and Nelly Delessy-Gassant and Keiko Hashizume and Maria
                 M. Larrondo-Petrie",
  title =        "A Survey of Patterns for {Web} Services Security and
                 Reliability Standards",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "430--450",
  day =          "20",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020430",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/430",
  abstract =     "An important aspect for the acceptance of
                 Service-Oriented Architectures is having convenient
                 ways to help designers build secure applications.
                 Numerous standards define ways to apply security in web
                 services. However, these standards are rather complex
                 and sometimes overlap, which makes them hard to use and
                 may produce inconsistencies. Representing them as
                 patterns makes them easier to understand, to compare to
                 other patterns, to discover inconsistencies, and to use
                 them to build secure web services applications.
                 Security patterns abstract the key aspects of a
                 security mechanism and can thus be applied by
                 non-experts. We survey here our work on security
                 patterns for web services and their standards and we
                 put them in perspective with respect to each other and
                 to more fundamental patterns. We also consider other
                 patterns for web services security. All the patterns
                 described here have been previously published, we only
                 show here one of them in detail as an illustration of
                 our style for writing patterns. Our main purpose here
                 is to enumerate them, show their use, and show how they
                 relate to each other.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Pollino:2012:COS,
  author =       "Maurizio Pollino and Grazia Fattoruso and Luigi {La
                 Porta} and Antonio Bruno {Della Rocca} and Valentina
                 James",
  title =        "Collaborative Open Source Geospatial Tools and Maps
                 Supporting the Response Planning to Disastrous
                 Earthquake Events",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "451--468",
  day =          "07",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020451",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/451",
  abstract =     "The latest improvements in geo-informatics offer new
                 opportunities in a wide range of territorial and
                 environmental applications. In this general framework,
                 a relevant issue is represented by earthquake early
                 warning and emergency management. This research work
                 presents the investigation and development of a simple
                 and innovative geospatial methodology and related
                 collaborative open source geospatial tools for
                 predicting and mapping the vulnerability to seismic
                 hazard in order to support the response planning to
                 disastrous events. The proposed geospatial methodology
                 and tools have been integrated into an open source
                 collaborative GIS system, designed and developed as an
                 integrated component of an earthquake early warning and
                 emergency management system.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Rosado:2012:SAM,
  author =       "David G. Rosado and Rafael G{\'o}mez and Daniel
                 Mellado and Eduardo Fern{\'a}ndez-Medina",
  title =        "Security Analysis in the Migration to Cloud
                 Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "469--487",
  day =          "08",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020469",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/469",
  abstract =     "Cloud computing is a new paradigm that combines
                 several computing concepts and technologies of the
                 Internet creating a platform for more agile and
                 cost-effective business applications and IT
                 infrastructure. The adoption of Cloud computing has
                 been increasing for some time and the maturity of the
                 market is steadily growing. Security is the question
                 most consistently raised as consumers look to move
                 their data and applications to the cloud. We justify
                 the importance and motivation of security in the
                 migration of legacy systems and we carry out an
                 analysis of different approaches related to security in
                 migration processes to cloud with the aim of finding
                 the needs, concerns, requirements, aspects,
                 opportunities and benefits of security in the migration
                 process of legacy systems.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{Muller:2012:DPM,
  author =       "Sebastian M{\"u}ller and Franziska Brecht and Benjamin
                 Fabian and Steffen Kunz and Dominik Kunze",
  title =        "Distributed Performance Measurement and Usability
                 Assessment of the {Tor} Anonymization Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "488--513",
  day =          "15",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020488",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/488",
  abstract =     "While the Internet increasingly permeates everyday
                 life of individuals around the world, it becomes
                 crucial to prevent unauthorized collection and abuse of
                 personalized information. Internet anonymization
                 software such as Tor is an important instrument to
                 protect online privacy. However, due to the performance
                 overhead caused by Tor, many Internet users refrain
                 from using it. This causes a negative impact on the
                 overall privacy provided by Tor, since it depends on
                 the size of the user community and availability of
                 shared resources. Detailed measurements about the
                 performance of Tor are crucial for solving this issue.
                 This paper presents comparative experiments on Tor
                 latency and throughput for surfing to 500 popular
                 websites from several locations around the world during
                 the period of 28 days. Furthermore, we compare these
                 measurements to critical latency thresholds gathered
                 from web usability research, including our own user
                 studies. Our results indicate that without massive
                 future optimizations of Tor performance, it is unlikely
                 that a larger part of Internet users would adopt it for
                 everyday usage. This leads to fewer resources available
                 to the Tor community than theoretically possible, and
                 increases the exposure of privacy-concerned
                 individuals. Furthermore, this could lead to an
                 adoption barrier of similar privacy-enhancing
                 technologies for a Future Internet.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{Nordfeldt:2012:YPV,
  author =       "Sam Nordfeldt and Carina Berter{\"o}",
  title =        "Young Patients' Views on the Open {Web 2.0} Childhood
                 Diabetes Patient Portal: a Qualitative Study",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "514--527",
  day =          "18",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020514",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/514",
  abstract =     "Little is known about the views of young patients
                 themselves on interactive Web portal services provided
                 by pediatric practitioners. We aimed to explore their
                 perceptions of a real-world diabetes portal that offers
                 facts and contact with peers and practitioners; e.g.,
                 discussion forums, blog tools, self-care and treatment
                 information, research updates and news from local
                 practitioners. Twelve young patients (ages 12-21,
                 median 15 years), one boyfriend, 7 mothers and one
                 father each wrote an essay on their experience from use
                 of the portal. Their essays underwent qualitative
                 content analysis. A major theme was ``Helping and
                 facilitating daily life with diabetes'', the portal was
                 perceived as a place where contents are interesting,
                 inspiring and may trigger users' curiosity. There were
                 three subthemes; ``Ease of use in my everyday life,''
                 which includes the perception that the portal was
                 perceived as smooth and easy to enter and navigate
                 whenever needed; that information was easy to
                 understand for different groups of users. ``Support via
                 an exchange of experience,'' includes the ability to
                 contact peers being regarded advantageous. Some said
                 that just reading others' experiences can be helpful in
                 terms of persevering; children could find peers in the
                 same age group. ``Evidence based information,''
                 includes the perception of the portal being a useful
                 and trustworthy source of facts on e.g., physical
                 activity, blood glucose, medical devices, emotional
                 wellbeing, food and nutrition, and other aspects that
                 impact living with diabetes. Young users expressed
                 positive perceptions towards the interactive web
                 portal. Such services seem to have great potential for
                 supporting young patients and significant others -
                 intergrading for confidence.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Zafiropoulos:2012:AAG,
  author =       "Kostas Zafiropoulos and Ioannis Karavasilis and
                 Vasiliki Vrana",
  title =        "Assessing the Adoption of e-Government Services by
                 Teachers in {Greece}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "528--544",
  day =          "21",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020528",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/528",
  abstract =     "Technological developments and governments'
                 understanding of what citizens need usually determine
                 the design of public online services. For successful
                 implementation of e-Government services, governments
                 have to place the user in the center of future
                 developments, understand what citizens need and measure
                 what increases citizens' willingness to adopt
                 e-government services. The paper uses the Technology
                 Acceptance Model (TAM), the extended TAM, the Diffusion
                 of Innovations (DOI) theory and the important
                 determinants of user acceptance perceived risk and
                 trust, in order to describe teachers' behavioral
                 intensions to adopt e-Government services. A model
                 containing trust and risk, along with cognitive, social
                 and intrinsic factors is used to study the intentions
                 of e-Government use by Greek primary and secondary
                 education teachers. Two hundred and thirty teachers
                 responded to an online survey. Findings reveal that
                 cognitive and intrinsic factors have significant
                 effects on intentions to use e-Government websites.",
  acknowledgement = ack-nhfb,
}

@Article{Farman:2012:IST,
  author =       "Jason Farman",
  title =        "Introduction to the Social Transformations from the
                 Mobile {Internet} Special Issue",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "545--550",
  day =          "23",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020545",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/545",
  abstract =     "The social transformations brought about by the mobile
                 internet are extensive. In discussing the broad range
                 of these transformations-positioned as a shift from
                 personal computing to pervasive computing-this
                 editorial elaborates on the key contributions addressed
                 by the articles in this special issue of Future
                 Internet. These articles touch on topics such as the
                 digital divide, the role of the mobile internet in
                 revolutions like the Arab Spring and the Occupy Wall
                 Street movement, the development of site-specific and
                 context-aware news, the incorporation of the internet
                 into existing technologies like the automobile, and the
                 utilization of the mobile internet to transform
                 everyday spaces into game spaces.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Social Transformations from the Mobile
                 Internet.",
}

@Article{Newell:2012:CSC,
  author =       "David A. Newell and Margaret M. Pembroke and William
                 E. Boyd",
  title =        "Crowd Sourcing for Conservation: {Web 2.0} a Powerful
                 Tool for Biologists",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "551--562",
  day =          "24",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020551",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/551",
  abstract =     "The advent and adoption of Web 2.0 technologies offers
                 a powerful approach to enhancing the capture of
                 information in natural resource ecology, notably
                 community knowledge of species distributions. Such
                 information has previously been collected using, for
                 example, postal surveys; these are typically
                 inefficient, with low response rates, high costs, and
                 requiring respondents to be spatially literate. Here we
                 describe an example, using the Google Maps Application
                 Programming Interface, to discuss the opportunities
                 such tools provide to conservation biology. Toad
                 Tracker was created as a prototype to demonstrate the
                 utility of this technology to document the distribution
                 of an invasive vertebrate pest species, the cane toad,
                 within Australia. While the technological aspects of
                 this tool are satisfactory, manager resistance towards
                 its use raises issues around the public nature of the
                 technology, the collaborative (non-expert) role in data
                 collection, and data ownership. We conclude in
                 suggesting that, for such tools to be accepted by
                 non-innovation adopters, work is required on both the
                 technological aspects and, importantly, a cultural
                 change is required to create an environment of
                 acceptance of the shifting relationship between
                 authority, expertise and knowledge.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Rotondo:2012:UCP,
  author =       "Francesco Rotondo",
  title =        "The {U-City} Paradigm: Opportunities and Risks for
                 E-Democracy in Collaborative Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "563--574",
  day =          "05",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020563",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/563",
  abstract =     "Volunteered Geographic Information (VGI) tools appear
                 to enhance the possibilities offered by a collaborative
                 approach to planning. The present paper analyzes both
                 the results of experiences of the author and of those
                 available in the literature, highlighting possible
                 advantages and disadvantages. After a brief
                 introduction to the meaning of e-democracy, the second
                 part focuses on the role of ICT in collaborative
                 planning, proceeding in the third part to an
                 illustration of an initial panorama of knowledge
                 gathered using ICT in such processes, while discussing
                 criticisms and opportunities. The fourth part discusses
                 the U-city paradigm as a driver of change in urban
                 planning participation processes. Research perspectives
                 are then outlined in the final part.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Goetz:2012:UCI,
  author =       "Marcus Goetz",
  title =        "Using Crowdsourced Indoor Geodata for the Creation of
                 a Three-Dimensional Indoor Routing {Web} Application",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "575--591",
  day =          "06",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020575",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/575",
  abstract =     "Routing services for outdoor areas are omnipresent and
                 also three-dimensional (3D) visualization is quite
                 common within this area. Recent research efforts are
                 now trying to adapt well known outdoor routing services
                 to complex indoor environments. However, most of the
                 current indoor routing systems only focus on
                 two-dimensional visualization, thus only one level can
                 be depicted. Especially multi-level routes therefore
                 lack visualization. Also, most of the (few) existing 3D
                 indoor routing services utilize proprietary software or
                 plugins, thus a widespread accessibility for those
                 services by using common computers or mobile devices is
                 not feasible. Therefore this paper describes the
                 development of a web-based 3D routing system based on a
                 new HTML extension. The visualization of rooms as well
                 as the computed routes is realized with XML3D. Since
                 this emerging technology is based on WebGL and will
                 likely be integrated into the HTML5 standard, the
                 developed system is already compatible with most common
                 browsers such as Google Chrome or Firefox. Another key
                 difference of the approach presented in this paper is
                 that all utilized data is actually crowdsourced geodata
                 from OpenStreetMap (OSM). Such data is collaboratively
                 collected by both amateurs and professionals and can be
                 used at no charge under the Open Data Commons Open
                 Database License (ODbL). Our research combines
                 user-generated geo content of the Web 2.0 with future
                 Internet technology for the provision of a ubiquitously
                 accessible 3D indoor routing application.",
  acknowledgement = ack-nhfb,
}

@Article{Garau:2012:FCP,
  author =       "Chiara Garau",
  title =        "Focus on Citizens: Public Engagement with Online and
                 Face-to-Face Participation --- a Case Study",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "592--606",
  day =          "15",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020592",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/592",
  abstract =     "The main objective of this paper is to focus on how an
                 integrated system based on Information Communication
                 Technology (ICT) and face-to-face communication can
                 increase participation in order to have a positive
                 effect on quality of life, plans and decisions, and to
                 discuss the many benefits which web-based public
                 participation can bring to the planning process through
                 a set of improvements to relations, quality and
                 structure of cities in general and in this case example
                 specifically. With the development of a transparent
                 support system for collaborative decision-making
                 processes, it is possible to identify a strategy for
                 addressing gaps to reach collaborative decisions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning.",
}

@Article{Le:2012:SHO,
  author =       "Quynh L{\^e} and Hoang Boi Nguyen and Tony Barnett",
  title =        "Smart Homes for Older People: Positive Aging in a
                 Digital World",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "2",
  pages =        "607--617",
  day =          "19",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4020607",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/2/607",
  abstract =     "Smart homes are homes with technologically advanced
                 systems to enable domestic task automation, easier
                 communication, and higher security. As an enabler of
                 health and well-being enhancement, smart homes have
                 been geared to accommodate people with special needs,
                 especially older people. This paper examines the
                 concept of ``smart home'' in a technologically driven
                 society and its multi-functional contribution to the
                 enhancement of older people's lives. Discussion then
                 focuses on the challenges in the use of smart homes
                 among older people such as accessibility and ethical
                 issues. Finally, some implications and recommendations
                 are provided.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Fernandez:2012:ISI,
  author =       "Eduardo B. Fernandez",
  title =        "Introduction to the Special Issue on Recent Advances
                 in {Web} Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "618--620",
  day =          "27",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030618",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/618",
  abstract =     "We have collected five papers describing different
                 aspects of web services and cloud computing. Cloud
                 computing is the next stage of application
                 interoperability and it is a logical extension of web
                 services, both approaches being a variety of
                 Service-Oriented Architecture. The papers cover
                 security, migration, certification, and application
                 development. Together, these papers provide a useful
                 panorama of some of the issues of these two
                 technologies.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Web Services.",
}

@Article{AbuKhousa:2012:HCO,
  author =       "Eman AbuKhousa and Nader Mohamed and Jameela
                 Al-Jaroodi",
  title =        "e-Health Cloud: Opportunities and Challenges",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "621--645",
  day =          "04",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030621",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/621",
  abstract =     "As the costs of healthcare services rise and
                 healthcare professionals are becoming scarce and hard
                 to find, it is imminent that healthcare organizations
                 consider adopting health information technology (HIT)
                 systems. HIT allows health organizations to streamline
                 many of their processes and provide services in a more
                 efficient and cost-effective manner. The latest
                 technological trends such as Cloud Computing (CC)
                 provide a strong infrastructure and offer a true
                 enabler for HIT services over the Internet. This can be
                 achieved on a pay-as-you-use model of the ``e-Health
                 Cloud'' to help the healthcare industry cope with
                 current and future demands yet keeping their costs to a
                 minimum. Despite its great potential, HIT as a CC model
                 has not been addressed extensively in the literature.
                 There are no apparent frameworks which clearly
                 encompass all viable schemes and interrelationships
                 between HIT and CC. Therefore, analyzing and comparing
                 the effectiveness of such schemes is important. In this
                 paper we introduce the concept of ``e-Health Cloud''
                 highlighting many of its constituents and proposing
                 building an e-health environment and elucidating many
                 of the challenges confronting the success of the
                 e-Health Cloud. We will also discuss different possible
                 solutions to address challenges such as security and
                 privacy.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Yerima:2012:AMB,
  author =       "Suleiman Y. Yerima and Gerard P. Parr and Sally I.
                 McClean and Philip J. Morrow",
  title =        "Adaptive Measurement-Based Policy-Driven {QoS}
                 Management with Fuzzy-Rule-based Resource Allocation",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "646--671",
  day =          "04",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030646",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/646",
  abstract =     "Fixed and wireless networks are increasingly
                 converging towards common connectivity with IP-based
                 core networks. Providing effective end-to-end resource
                 and QoS management in such complex heterogeneous
                 converged network scenarios requires unified, adaptive
                 and scalable solutions to integrate and co-ordinate
                 diverse QoS mechanisms of different access technologies
                 with IP-based QoS. Policy-Based Network Management
                 (PBNM) is one approach that could be employed to
                 address this challenge. Hence, a policy-based framework
                 for end-to-end QoS management in converged networks,
                 CNQF (Converged Networks QoS Management Framework) has
                 been proposed within our project. In this paper, the
                 CNQF architecture, a Java implementation of its
                 prototype and experimental validation of key elements
                 are discussed. We then present a fuzzy-based CNQF
                 resource management approach and study the performance
                 of our implementation with real traffic flows on an
                 experimental testbed. The results demonstrate the
                 efficacy of our resource-adaptive approach for
                 practical PBNM systems.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Denning:2012:SWC,
  author =       "Dorothy E. Denning",
  title =        "{Stuxnet}: What Has Changed?",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "672--687",
  day =          "16",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030672",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/672",
  abstract =     "This paper considers the impact of Stuxnet on
                 cyber-attacks and cyber-defense. It first reviews
                 trends in cyber-weapons and how Stuxnet fits into these
                 trends. Because Stuxnet targeted an industrial control
                 system in order to wreak physical damage, the focus is
                 on weapons that target systems of that type and produce
                 physical effects. The paper then examines the impact of
                 Stuxnet on various domains of action where
                 cyber-attacks play a role, including state-level
                 conflict, terrorism, activism, crime, and pranks. For
                 each domain, it considers the potential for new types
                 of cyber-attacks, especially attacks against industrial
                 control systems, and whether such attacks would be
                 consistent with other trends in the domain. Finally,
                 the paper considers the impact of Stuxnet on
                 cyber-defense.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Aftermath of Stuxnet.",
}

@Article{Nilsen:2012:TPV,
  author =       "Line Lundvoll Nilsen and Terje Solvoll",
  title =        "Traditional Practice vs. New Tools and Routines in
                 Stroke Treatment",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "688--699",
  day =          "06",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030688",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/688",
  abstract =     "In Norway, it is a national goal to provide more
                 patients with thrombolytic treatment. A referring
                 hospital and a specialist hospital have implemented
                 videoconferencing (VC) equipment to share knowledge and
                 discuss stroke patients, regarding thrombolytic
                 treatment. VC has only been used four times within the
                 19 months that the service has been available. The
                 objective in this article is to increase the
                 understanding of the contradiction between the need for
                 knowledge-sharing through VC technology, as well as the
                 reasons for low frequency of use when discussing stroke
                 patients. Semi-structured interviews were conducted
                 with 13 professionals. The results illustrate how the
                 technology per se is not the reason for the low
                 frequency use. Health care is shaped by behavior,
                 traditional rules, standards and division of labor. By
                 using cultural historical activity theory (CHAT) as a
                 framework, we illustrate the importance of
                 understanding the historic way of performing an
                 activity to be able to expand the treatment activity in
                 the future.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Prandini:2012:RRA,
  author =       "Marco Prandini and Marco Ramilli",
  title =        "Raising Risk Awareness on the Adoption of {Web 2.0}
                 Technologies in Decision Making Processes",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "700--718",
  day =          "09",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030700",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/700",
  abstract =     "In the recent past, the so-called ``Web 2.0'' became a
                 powerful tool for decision making processes.
                 Politicians and managers, seeking to improve
                 participation, embraced this technology as if it simply
                 were a new, enhanced version of the WorldWideWeb,
                 better suited to retrieve information, opinions and
                 feedbacks from the general public on subjects like
                 laws, acts and policies. This approach was often naive,
                 neglecting the less-obvious aspects of the technology,
                 and thus bringing on significant security problems.
                 This paper shows how, in the end, the result could
                 easily be the opposite of what was desired. Malicious
                 attackers, in fact, could quite easily exploit the
                 vulnerabilities in these systems to hijack the process
                 and lead to wrong decisions, also causing the public to
                 lose trust in the systems themselves.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Government 2.0.",
}

@Article{Zafiropoulos:2012:CPA,
  author =       "Kostas Zafiropoulos",
  title =        "Connectivity Practices and Activity of {Greek}
                 Political Blogs",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "719--736",
  day =          "14",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030719",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/719",
  abstract =     "This paper uses Social Network Analysis indexes to
                 study Greek political blogs. The indexes describe
                 bloggers' community recommendations, centrality and
                 bloggers' attempt to form spheres of influence. Five
                 Social Network Analysis indexes are used: incoming
                 links, normalized betweenness, outgoing links, number
                 of 1-cliques a blog belongs to, and size of blog's
                 ego-network. By recording 127 Greek political blogs,
                 the paper finds that there are two distinct blog
                 performance properties regarding connectivity: Only a
                 few blogs serve as authority blogs having many incoming
                 links and centrality, while a few others try to expand
                 their influence territory by having many outgoing links
                 and forming larger 1-cliques and ego-networks. Next,
                 the paper associates the proposed indexes with blogs'
                 and users' community activity. Authority blogs present
                 high blog activity and users' community activity, as
                 well. These are recorded by large numbers of posts and
                 comments to the blog posts, respectively. It is shown
                 that blogs, which strive to expand their network by
                 using many outgoing links are more likely to link to
                 the authority blogs. Content analysis reveals that
                 authority blogs provide news and information and
                 promote discussion to a much higher degree compared to
                 the overall Greek political blogosphere.",
  acknowledgement = ack-nhfb,
}

@Article{Loskyll:2012:CBO,
  author =       "Matthias Loskyll and Ines Heck and Jochen Schlick and
                 Michael Schwarz",
  title =        "Context-Based Orchestration for Control of
                 Resource-Efficient Manufacturing Processes",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "737--761",
  day =          "14",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030737",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/737",
  abstract =     "The increasing competition between manufacturers, the
                 shortening of innovation cycles and the growing
                 importance of resource-efficient manufacturing demand a
                 higher versatility of factory automation.
                 Service-oriented approaches depict a promising
                 possibility to realize new control architectures by
                 encapsulating the functionality of mechatronic devices
                 into services. An efficient discovery, context-based
                 selection and dynamic orchestration of these services
                 are the key features for the creation of highly
                 adaptable manufacturing processes. We describe a
                 semantic service discovery and ad-hoc orchestration
                 system, which is able to react to new process variants
                 and changed contextual information (e.g., failure of
                 field devices, requirements on the consumption of
                 resources). Because a standardized vocabulary,
                 especially for the description of mechatronic
                 functionalities, is still missing in the manufacturing
                 domain, the semantic description of services, processes
                 and manufacturing plants as well as the semantic
                 interpretation of contextual information play an
                 important part.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Subirats:2012:KRP,
  author =       "Laia Subirats and Luigi Ceccaroni and Felip
                 Miralles",
  title =        "Knowledge Representation for Prognosis of Health
                 Status in Rehabilitation",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "762--775",
  day =          "20",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030762",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/762",
  abstract =     "In this article, key points are discussed concerning
                 knowledge representation for clinical decision support
                 systems in the domain of physical medicine and
                 rehabilitation. Information models, classifications and
                 terminologies, such as the ``virtual medical record''
                 (vMR), the ``international classification of
                 functioning, disability and health'' (ICF), the
                 ``international classification of diseases'' (ICD) and
                 the ``systematized nomenclature of medicine-clinical
                 terms'' (SNOMED CT), are used for knowledge integration
                 and reasoning. A system is described that supports the
                 measuring of functioning status, diversity, prognosis
                 and similarity between patients in the post-acute
                 stage, thus helping health professionals' prescription
                 of recommendations.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Stojmenova:2012:AUC,
  author =       "Emilija Stojmenova and Bojan Imperl and Tomaz Zohar
                 and Dejan Dinevski",
  title =        "Adapted User-Centered Design: a Strategy for the
                 Higher User Acceptance of Innovative e-Health
                 Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "776--787",
  day =          "27",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030776",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/776",
  abstract =     "Being familiar with all the benefits of e-Health and
                 the strategic plan for the Slovenian health sector's
                 informatization, Telekom Slovenia and the Faculty of
                 Medicine from the University of Maribor, along with
                 other partners, have initiated an e-Health project. The
                 project group is developing various e-Health services
                 that are based on modern ICT (information and
                 communications technology) solutions and will be
                 available on several screens. In order to meet the
                 users' needs and expectations and, consequently,
                 achieve the high acceptance of e-Health services, the
                 user-centered design (UCD) approach was employed in the
                 e-Health project. However, during the research it was
                 found that conventional UCD methods are not completely
                 appropriate for older adults: the target population of
                 the e-Health services. That is why the selected UCD
                 methods were modified and adapted for older adults. The
                 modified UCD methods used in the research study are
                 presented in this paper. Using the results of the
                 adapted UCD methods, a prototype for a service named
                 MedReminder was developed. The prototype was evaluated
                 by a group of 12 study participants. The study
                 participants evaluated the MedReminder service as
                 acceptable with a good potential for a high adoption
                 rate among its target population, i.e., older adults.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future e-Health.",
}

@Article{Hunter:2012:TAE,
  author =       "Jane Hunter and Anna Gerber",
  title =        "Towards Annotopia-Enabling the Semantic
                 Interoperability of {Web}-Based Annotations",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "788--806",
  day =          "30",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030788",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/788",
  abstract =     "This paper describes the results of a collaborative
                 effort that has reconciled the Open Annotation
                 Collaboration (OAC) ontology and the Annotation
                 Ontology (AO) to produce a merged data model [the Open
                 Annotation (OA) data model] to describe Web-based
                 annotations-and hence facilitate the discovery, sharing
                 and re-use of such annotations. Using a number of case
                 studies that include digital scholarly editing, 3D
                 museum artifacts and sensor data streams, we evaluate
                 the OA model's capabilities. We also describe our
                 implementation of an online annotation server that
                 supports the storage, search and retrieval of
                 OA-compliant annotations across multiple applications
                 and disciplines. Finally we discuss outstanding problem
                 issues associated with the OA ontology, and the impact
                 that certain design decisions have had on the efficient
                 storage, indexing, search and retrieval of complex
                 structured annotations.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Schade:2012:SOI,
  author =       "Sven Schade and Frank Ostermann and Laura Spinsanti
                 and Werner Kuhn",
  title =        "Semantic Observation Integration",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "807--829",
  day =          "03",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030807",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/807",
  abstract =     "Although the integration of sensor-based information
                 into analysis and decision making has been a research
                 topic for many years, semantic interoperability has not
                 yet been reached. The advent of user-generated content
                 for the geospatial domain, Volunteered Geographic
                 Information (VGI), makes it even more difficult to
                 establish semantic integration. This paper proposes a
                 novel approach to integrating conventional sensor
                 information and VGI, which is exploited in the context
                 of detecting forest fires. In contrast to common
                 logic-based semantic descriptions, we present a formal
                 system using algebraic specifications to unambiguously
                 describe the processing steps from natural phenomena to
                 value-added information. A generic ontology of
                 observations is extended and profiled for forest fire
                 detection in order to illustrate how the sensing
                 process, and transformations between heterogeneous
                 sensing systems, can be represented as mathematical
                 functions and grouped into abstract data types. We
                 discuss the required ontological commitments and a
                 possible generalization.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Bouzidi:2012:SWA,
  author =       "Khalil Riad Bouzidi and Bruno Fies and Catherine
                 Faron-Zucker and Alain Zarli and Nhan Le Thanh",
  title =        "{Semantic Web} Approach to Ease Regulation Compliance
                 Checking in Construction Industry",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "830--851",
  day =          "11",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030830",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/830",
  abstract =     "Regulations in the Building Industry are becoming
                 increasingly complex and involve more than one
                 technical area, covering products, components and
                 project implementations. They also play an important
                 role in ensuring the quality of a building, and to
                 minimize its environmental impact. Control or
                 conformance checking are becoming more complex every
                 day, not only for industrials, but also for
                 organizations charged with assessing the conformity of
                 new products or processes. This paper will detail the
                 approach taken by the CSTB (Centre Scientifique et
                 Technique du B{\^a}timent) in order to simplify this
                 conformance control task. The approach and the proposed
                 solutions are based on semantic web technologies. For
                 this purpose, we first establish a domain-ontology,
                 which defines the main concepts involved and the
                 relationships, including one based on OWL (Web Ontology
                 Language) [1]. We rely on SBVR (Semantics of Business
                 Vocabulary and Business Rules) [2] and SPARQL (SPARQL
                 Protocol and RDF Query Language) [3] to reformulate the
                 regulatory requirements written in natural language,
                 respectively, in a controlled and formal language. We
                 then structure our control process based on expert
                 practices. Each elementary control step is defined as a
                 SPARQL query and assembled into complex control
                 processes ``on demand'', according to the component
                 tested and its semantic definition. Finally, we
                 represent in RDF (Resource Description Framework) [4]
                 the association between the SBVR rules and SPARQL
                 queries representing the same regulatory constraints.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Pileggi:2012:WSM,
  author =       "Salvatore F. Pileggi and Carlos Fernandez-Llatas and
                 Vicente Traver",
  title =        "When the Social Meets the Semantic: Social {Semantic
                 Web} or {Web} 2.5",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "3",
  pages =        "852--864",
  day =          "21",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4030852",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:48 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/3/852",
  abstract =     "The social trend is progressively becoming the key
                 feature of current Web understanding (Web 2.0). This
                 trend appears irrepressible as millions of users,
                 directly or indirectly connected through social
                 networks, are able to share and exchange any kind of
                 content, information, feeling or experience. Social
                 interactions radically changed the user approach.
                 Furthermore, the socialization of content around social
                 objects provides new unexplored commercial marketplaces
                 and business opportunities. On the other hand, the
                 progressive evolution of the web towards the Semantic
                 Web (or Web 3.0) provides a formal representation of
                 knowledge based on the meaning of data. When the social
                 meets semantics, the social intelligence can be formed
                 in the context of a semantic environment in which user
                 and community profiles as well as any kind of
                 interaction is semantically represented (Semantic
                 Social Web). This paper first provides a conceptual
                 analysis of the second and third version of the Web
                 model. That discussion is aimed at the definition of a
                 middle concept (Web 2.5) resulting in the convergence
                 and integration of key features from the current and
                 next generation Web. The Semantic Social Web (Web 2.5)
                 has a clear theoretical meaning, understood as the
                 bridge between the overused Web 2.0 and the not yet
                 mature Semantic Web (Web 3.0).",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Groza:2012:PDL,
  author =       "Adrian Groza and Ioan Alfred Letia",
  title =        "Plausible Description Logic Programs for Stream
                 Reasoning",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "865--881",
  day =          "17",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040865",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/865",
  abstract =     "Sensor networks are estimated to drive the formation
                 of the future Internet, with stream reasoning
                 responsible for analysing sensor data. Stream reasoning
                 is defined as real time logical reasoning on large,
                 noisy, heterogeneous data streams, aiming to support
                 the decision process of large numbers of concurrent
                 querying agents. In this research we exploited
                 non-monotonic rule-based systems for handling
                 inconsistent or incomplete information and also
                 ontologies to deal with heterogeneity. Data is
                 aggregated from distributed streams in real time and
                 plausible rules fire when new data is available. The
                 advantages of lazy evaluation on data streams were
                 investigated in this study, with the help of a
                 prototype developed in Haskell.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Gomes:2012:CDL,
  author =       "Rui Gomes and L{\'\i}gia Sousa",
  title =        "Contributions to the Development of Local e-Government
                 2.0",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "882--899",
  day =          "22",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040882",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/882",
  abstract =     "With the emergence of Web 2.0 (Blog, Wiki, RSS,
                 YouTube, Flickr, Podcast, Social Networks, and
                 Mashups), new ways of communicating, interacting and
                 being on the Web have arisen. These new communication
                 tools and strategies can radically change some specific
                 work processes in communities, such as the work
                 processes of an autarchy. Some authors emphasize the
                 advantages of using Web 2.0 tools in autarchies; thus,
                 we were interested in exploring the possibilities and
                 constraints of implementing these tools in our region
                 of Portugal, the Minho. Using a case study methodology,
                 we aimed to find out about the possibilities of
                 implementing Web 2.0 tools in autarchies through
                 exploring the interest and motivation of autarchic
                 collaborators in their use (our unit of analysis in
                 autarchies). Information was gathered with the help of
                 a questionnaire, the design of which was based on
                 previous exploratory interviews and applied to four
                 autarchic units in the Minho region. In each unit,
                 three different target-groups were surveyed
                 (Councilors, Information Systems (IS) Technicians, and
                 General Staff), so that we could triangulate the data.
                 Data analysis and results emphasized the interest and
                 motivation of the autarchies in using Web 2.0 tools, as
                 well as the main constraints that would be faced during
                 Web 2.0 implementation. It also allowed us to establish
                 some guidelines for adequate Web 2.0 implementation,
                 including an ``ideal'' profile of the person
                 responsible for the implementation process.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Government 2.0.",
}

@Article{Harrison:2012:COG,
  author =       "Teresa M. Harrison and Theresa A. Pardo and Meghan
                 Cook",
  title =        "Creating Open Government Ecosystems: a Research and
                 Development Agenda",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "900--928",
  day =          "23",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040900",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/900",
  abstract =     "In this paper, we propose to view the concept of open
                 government from the perspective of an ecosystem, a
                 metaphor often used by policy makers, scholars, and
                 technology gurus to convey a sense of the
                 interdependent social systems of actors, organizations,
                 material infrastructures, and symbolic resources that
                 can be created in technology-enabled,
                 information-intensive social systems. We use the
                 concept of an ecosystem to provide a framework for
                 considering the outcomes of a workshop organized to
                 generate a research and development agenda for open
                 government. The agenda was produced in discussions
                 among participants from the government (at the federal,
                 state, and local levels), academic and civil sector
                 communities at the Center for Technology in Government
                 (CTG) at the University at Albany, SUNY in April 2011.
                 The paper begins by discussing concepts central to
                 understanding what is meant by an ecosystem and some
                 principles that characterize its functioning. We then
                 apply this metaphor more directly to government,
                 proposing that policymakers engage in strategic
                 ecosystems thinking, which means being guided by the
                 goal of explicitly and purposefully constructing open
                 government ecosystems. From there, we present the
                 research agenda questions essential to the development
                 of this new view of government's interaction with users
                 and organizations. Our goal is to call attention to
                 some of the fundamental ways in which government must
                 change in order to evolve from outdated industrial
                 bureaucratic forms to information age networked and
                 interdependent systems.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Government 2.0.",
}

@Article{Hu:2012:SLP,
  author =       "Yuh-Jong Hu and Win-Nan Wu and Kua-Ping Cheng and
                 Ya-Ling Huang",
  title =        "Semantic Legal Policies for Data Exchange and
                 Protection across Super-Peer Domains in the Cloud",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "929--954",
  day =          "25",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040929",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/929",
  abstract =     "In semantic policy infrastructure, a Trusted Legal
                 Domain (TLD), designated as a Super-Peer Domain (SPD),
                 is a legal cage model used to circumscribe the legal
                 virtual boundary of data disclosure and usage in the
                 cloud. Semantic legal policies in compliance with the
                 law are enforced at the super-peer within an SPD to
                 enable Law-as-a-Service (LaaS) for cloud service
                 providers. In addition, cloud users could query
                 fragmented but protected outsourcing cloud data from a
                 law-aware super-peer, where each query is also
                 compliant with the law. Semantic legal policies are
                 logic-based formal policies, which are shown to be a
                 combination of OWL-DL ontologies and stratified Datalog
                 rules with negation, i.e., so-called non-monotonic
                 cq-programs, for policy representation and enforcement.
                 An agent at the super-peer is a unique law-aware
                 guardian that provides protected data integration
                 services for its peers within an SPD. Furthermore,
                 agents at the super-peers specify how law-compliant
                 legal policies are unified with each other to provide
                 protected data exchange services across SPDs in the
                 semantic data cloud.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Interoperability and Knowledge
                 Building.",
}

@Article{Davis:2012:SME,
  author =       "Jenny L. Davis",
  title =        "Social Media and Experiential Ambivalence",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "955--970",
  day =          "26",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040955",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/955",
  abstract =     "At once fearful and dependent, hopeful and
                 distrustful, our contemporary relationship with
                 technology is highly ambivalent. Using experiential
                 accounts from an ongoing Facebook-based qualitative
                 study (N = 231), I both diagnose and articulate this
                 ambivalence. I argue that technological ambivalence is
                 rooted primarily in the deeply embedded moral
                 prescription to lead a meaningful life, and a related
                 uncertainty about the role of new technologies in the
                 accomplishment of this task. On the one hand,
                 technology offers the potential to augment or even
                 enhance personal and public life. On the other hand,
                 technology looms with the potential to supplant or
                 replace real experience. I examine these polemic
                 potentialities in the context of personal experiences,
                 interpersonal relationships, and political activism. I
                 conclude by arguing that the pervasive integration and
                 non-optionality of technical systems amplifies utopian
                 hopes, dystopian fears, and ambivalent concerns in the
                 contemporary era.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Theorizing the Web 2012.",
}

@Article{Bencsath:2012:CSD,
  author =       "Boldizs{\'a}r Bencs{\'a}th and G{\'a}bor P{\'e}k and
                 Levente Butty{\'a}n and M{\'a}rk F{\'e}legyh{\'a}zi",
  title =        "The Cousins of {Stuxnet}: {Duqu}, {Flame}, and
                 {Gauss}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "971--1003",
  day =          "06",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040971",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/971",
  abstract =     "Stuxnet was the first targeted malware that received
                 worldwide attention for causing physical damage in an
                 industrial infrastructure seemingly isolated from the
                 onlineworld. Stuxnet was a powerful targeted
                 cyber-attack, and soon other malware samples were
                 discovered that belong to this family. In this paper,
                 we will first present our analysis of Duqu, an
                 information-collecting malware sharing striking
                 similarities with Stuxnet. We describe our
                 contributions in the investigation ranging from the
                 original detection of Duquvia finding the dropper file
                 to the design of a Duqu detector toolkit. We then
                 continue with the analysis of the Flame advanced
                 information-gathering malware. Flame is unique in the
                 sense that it used advanced cryptographic techniques to
                 masquerade as a legitimate proxy and we are currently
                 collecting intelligence information to be able to break
                 its very specialencryption mechanism. Besides
                 explaining the operation of these pieces of malware, we
                 also examine if and how they could have been detected
                 by vigilant system administrators manually or in a
                 semi-automated manner using available tools. Finally,
                 we discuss lessons that the community can learn from
                 these incidents. We focus on technical issues, and
                 avoid speculations on the origin of these threats and
                 other geopolitical questions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Aftermath of Stuxnet.",
}

@Article{Lord:2012:TSH,
  author =       "Phillip Lord and Simon Cockell and Robert Stevens",
  title =        "Three Steps to Heaven: Semantic Publishing in a Real
                 World Workflow",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1004--1015",
  day =          "08",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041004",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1004",
  abstract =     "Semantic publishing offers the promise of computable
                 papers, enriched visualisation and a realisation of the
                 linked data ideal. In reality, however, the publication
                 process contrives to prevent richer semantics while
                 culminating in a ``lumpen'' PDF. In this paper, we
                 discuss a web-first approach to publication, and
                 describe a three-tiered approach that integrates with
                 the existing authoring tooling. Critically, although it
                 adds limited semantics, it does provide value to all
                 the participants in the process: the author, the reader
                 and the machine.",
  acknowledgement = ack-nhfb,
}

@Article{Sarma:2012:STP,
  author =       "Amardeo Sarma and Joao Girao",
  title =        "Supporting Trust and Privacy with an Identity-Enabled
                 Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1016--1025",
  day =          "19",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041016",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1016",
  abstract =     "Cost reduction and a vastly increased potential to
                 create new services, such as via the proliferation of
                 the Cloud, have led to many more players and ``end
                 points''. With many of them being new entrants,
                 possibly short-lived, the question of how to handle
                 trust and privacy in this new context arises. In this
                 paper, we specifically look at the underlying
                 infrastructure that connects end-points served by these
                 players, which is an essential part of the overall
                 architecture to enable trust and privacy. We present an
                 enhanced architecture that allows real people, objects
                 and services to reliably interact via an infrastructure
                 providing assured levels of trust.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{George:2012:TMB,
  author =       "Mathew George and Klaus-Peter Fischer-Hellmann and
                 Martin Knahl and Udo Bleimann and Shirley Atkinson",
  title =        "Traceability in Model-Based Testing",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1026--1036",
  day =          "26",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041026",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1026",
  abstract =     "The growing complexities of software and the demand
                 for shorter time to market are two important challenges
                 that face today's IT industry. These challenges demand
                 the increase of both productivity and quality of
                 software. Model-based testing is a promising technique
                 for meeting these challenges. Traceability modeling is
                 a key issue and challenge in model-based testing.
                 Relationships between the different models will help to
                 navigate from one model to another, and trace back to
                 the respective requirements and the design model when
                 the test fails. In this paper, we present an approach
                 for bridging the gaps between the different models in
                 model-based testing. We propose relation definition
                 markup language (RDML) for defining the relationships
                 between models.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Antley:2012:TDA,
  author =       "Jeremy Antley",
  title =        "Textual Dualism and Augmented Reality in the {Russian}
                 Empire",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1037--1048",
  day =          "10",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041037",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1037",
  abstract =     "While the current focus on how digital technology
                 alters our conception of the self and its place in the
                 broader perceived reality yields fascinating insight
                 into modern issues, there is much to be gained by
                 analyzing the presence of dualist and augmented reality
                 discourses in a pre-digital era. This essay will
                 examine the ontological interplay of textual dualist
                 norms in the Russian and Soviet states of the 19th and
                 early 20th centuries and how those norms were
                 challenged by augmented claims embodied in rumors,
                 refrains, and the spelling of names. By utilizing the
                 informational concepts of mobility and asynchronicity,
                 three Russian historical vignettes --- the Emancipation
                 of the Serfs in 1861, the documentation of Jews in
                 Imperial Russia, and the attempts by Trotsky to realize
                 Soviet symchka --- demonstrate that not only are
                 dualist discourses prevalent in periods outside of the
                 contemporary, but also that the way in which those
                 conflicts framed themselves in the past directly
                 influences their deployment in today's digital world.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Theorizing the Web 2012.",
}

@Article{Wang:2012:VAS,
  author =       "Jue Wang and Keith J. Bennett and Edward A.
                 Guinness",
  title =        "Virtual Astronaut for Scientific Visualization--- a
                 Prototype for {Santa Maria Crater} on {Mars}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1049--1068",
  day =          "13",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041049",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1049",
  abstract =     "To support scientific visualization of
                 multiple-mission data from Mars, the Virtual Astronaut
                 (VA) creates an interactive virtual 3D environment
                 built on the Unity3D Game Engine. A prototype study was
                 conducted based on orbital and Opportunity Rover data
                 covering Santa Maria Crater in Meridiani Planum on
                 Mars. The VA at Santa Maria provides dynamic visual
                 representations of the imaging, compositional, and
                 mineralogical information. The VA lets one navigate
                 through the scene and provides geomorphic and geologic
                 contexts for the rover operations. User interactions
                 include in-situ observations visualization, feature
                 measurement, and an animation control of rover drives.
                 This paper covers our approach and implementation of
                 the VA system. A brief summary of the prototype system
                 functions and user feedback is also covered. Based on
                 external review and comments by the science community,
                 the prototype at Santa Maria has proven the VA to be an
                 effective tool for virtual geovisual analysis.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Geovisual Analytics.",
}

@Article{Sun:2012:WBG,
  author =       "Min Sun and Jing Li and Chaowei Yang and Gavin A.
                 Schmidt and Myra Bambacus and Robert Cahalan and
                 Qunying Huang and Chen Xu and Erik U. Noble and
                 Zhenlong Li",
  title =        "A {Web}-Based Geovisual Analytical System for Climate
                 Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1069--1085",
  day =          "14",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041069",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1069",
  abstract =     "Climate studies involve petabytes of spatiotemporal
                 datasets that are produced and archived at distributed
                 computing resources. Scientists need an intuitive and
                 convenient tool to explore the distributed
                 spatiotemporal data. Geovisual analytical tools have
                 the potential to provide such an intuitive and
                 convenient method for scientists to access climate
                 data, discover the relationships between various
                 climate parameters, and communicate the results across
                 different research communities. However, implementing a
                 geovisual analytical tool for complex climate data in a
                 distributed environment poses several challenges. This
                 paper reports our research and development of a
                 web-based geovisual analytical system to support the
                 analysis of climate data generated by climate model.
                 Using the ModelE developed by the NASA Goddard
                 Institute for Space Studies (GISS) as an example, we
                 demonstrate that the system is able to (1) manage large
                 volume datasets over the Internet; (2) visualize
                 2D/3D/4D spatiotemporal data; (3) broker various
                 spatiotemporal statistical analyses for climate
                 research; and (4) support interactive data analysis and
                 knowledge discovery. This research also provides an
                 example for managing, disseminating, and analyzing Big
                 Data in the 21st century.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Geovisual Analytics.",
}

@Article{Cap:2012:TCN,
  author =       "Clemens H. Cap",
  title =        "Towards Content Neutrality in {Wiki} Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1086--1104",
  day =          "19",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041086",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1086",
  abstract =     "The neutral point of view (NPOV) cornerstone of
                 Wikipedia (WP) is challenged for next generation
                 knowledge bases. A case is presented for content
                 neutrality as a new, every point of view (EPOV) guiding
                 principle. The architectural implications of content
                 neutrality are discussed and translated into novel
                 concepts of Wiki architectures. Guidelines for
                 implementing this architecture are presented. Although
                 NPOV is criticized, the contribution avoids ideological
                 controversy and focuses on the benefits of the novel
                 approach.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Selected Papers from ITA 11.",
}

@Article{Tomas-Gabarron:2013:OVT,
  author =       "Juan-Bautista Tomas-Gabarron and Esteban Egea-Lopez
                 and Joan Garcia-Haro",
  title =        "Optimization of Vehicular Trajectories under
                 {Gaussian} Noise Disturbances",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "1--20",
  day =          "27",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/1",
  abstract =     "Nowadays, research on Vehicular Technology aims at
                 automating every single mechanical element of vehicles,
                 in order to increase passengers' safety, reduce human
                 driving intervention and provide entertainment services
                 on board. Automatic trajectory tracing for vehicles
                 under especially risky circumstances is a field of
                 research that is currently gaining enormous attention.
                 In this paper, we show some results on how to develop
                 useful policies to execute maneuvers by a vehicle at
                 high speeds with the mathematical optimization of some
                 already established mobility conditions of the car. We
                 also study how the presence of Gaussian noise on
                 measurement sensors while maneuvering can disturb
                 motion and affect the final trajectories. Different
                 performance criteria for the optimization of such
                 maneuvers are presented, and an analysis is shown on
                 how path deviations can be minimized by using
                 trajectory smoothing techniques like the Kalman Filter.
                 We finalize the paper with a discussion on how
                 communications can be used to implement these
                 schemes.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Paltrinieri:2013:PIE,
  author =       "Roberta Paltrinieri and Piergiorgio Degli Esposti",
  title =        "Processes of Inclusion and Exclusion in the Sphere of
                 Prosumerism",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "21--33",
  day =          "10",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010021",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/21",
  abstract =     "The term prosumer, first introduced by Toffler in the
                 1980s, has been developed by sociologists in response
                 to Web 2.0 (the set of technologies that has
                 transformed a predominantly static web into the
                 collaborative medium initially envisaged by Tim
                 Berners-Lee). The phenomena is now understood as a
                 process involving the creation of meanings on the part
                 of the consumer, who re-appropriates spaces that were
                 dominated by institutionalized production, and this
                 extends to the exploitation of consumer creativity on
                 the production side. Recent consumption literature can
                 be re-interpreted through the prosumer lens in order to
                 understand whether prosumers are more creative or
                 alienated in their activities. The peculiar typology of
                 prosumption introduced by Web 2.0 leads us to analyze
                 social capital as a key element in value creation, and
                 to investigate its different online and offline forms.
                 Our analysis then discusses the digital divide and
                 critical consumerism as forms of empowerment
                 impairment.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Theorizing the Web 2012.",
}

@Article{Fritsch:2013:CPE,
  author =       "Lothar Fritsch",
  title =        "The Clean Privacy Ecosystem of the Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "34--45",
  day =          "14",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010034",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/34",
  abstract =     "This article speculates on the future of privacy and
                 electronic identities on the Internet. Based on a short
                 review of security models and the development of
                 privacy-enhancing technology, privacy and electronic
                 identities will be discussed as parts of a larger
                 context-an ecosystem of personal information and
                 electronic identities. The article argues for an
                 ecosystem view of personal information and electronic
                 identities, as both personal information and identity
                 information are basic required input for many
                 applications. Therefore, for both application owners
                 and users, a functioning ecosystem of personal
                 information and electronic identification is important.
                 For the future of the Internet, high-quality
                 information and controlled circulation of such
                 information is therefore argued as decisive for the
                 value of future Internet applications.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{Desmet:2013:GAM,
  author =       "Antoine Desmet and Erol Gelenbe",
  title =        "Graph and Analytical Models for Emergency Evacuation",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "46--55",
  day =          "21",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010046",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/46",
  abstract =     "Cyber-Physical-Human Systems (CPHS) combine sensing,
                 communication and control to obtain desirable outcomes
                 in physical environments for human beings, such as
                 buildings or vehicles. A particularly important
                 application area is emergency management. While recent
                 work on the design and optimisation of emergency
                 management schemes has relied essentially on discrete
                 event simulation, which is challenged by the
                 substantial amount of programming or reprogramming of
                 the simulation tools and by the scalability and the
                 computing time needed to obtain useful performance
                 estimates, this paper proposes an approach that offers
                 fast estimates based on graph models and probability
                 models. We show that graph models can offer insight
                 into the critical areas in an emergency evacuation and
                 that they can suggest locations where sensor systems
                 are particularly important and may require hardening.
                 On the other hand, we also show that analytical models
                 based on queueing theory can provide useful estimates
                 of evacuation times and for routing optimisation. The
                 results are illustrated with regard to the evacuation
                 of a real-life building.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Smith:2013:AAN,
  author =       "Danielle Taana Smith",
  title =        "{African Americans} and Network Disadvantage:
                 Enhancing Social Capital through Participation on
                 Social Networking Sites",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "56--66",
  day =          "06",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010056",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/56",
  abstract =     "This study examines the participation of African
                 Americans on social networking sites (SNS), and
                 evaluates the degree to which African Americans engage
                 in activities in the online environment to mitigate
                 social capital deficits. Prior literature suggests that
                 compared with whites, African Americans have less
                 social capital that can enhance their socio-economic
                 mobility. As such, my research question is: do African
                 Americans enhance their social capital through their
                 participation on SNS? I use nationally representative
                 data collected from the Pew Internet and American Life
                 Project to explore the research question. The results
                 suggest that the online environment is potentially a
                 space in which African Americans can lessen social
                 capital deficits.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Menth:2013:GLL,
  author =       "Michael Menth and Matthias Hartmann and Dominik
                 Klein",
  title =        "Global Locator, Local Locator, and Identifier Split
                 ({GLI}-Split)",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "67--94",
  day =          "11",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010067",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/67",
  abstract =     "The locator/identifier split is an approach for a new
                 addressing and routing architecture to make routing in
                 the core of the Internet more scalable. Based on this
                 principle, we developed the GLI-Split framework, which
                 separates the functionality of current IP addresses
                 into a stable identifier and two independent locators,
                 one for routing in the Internet core and one for edge
                 networks. This makes routing in the Internet more
                 stable and provides more flexibility for edge networks.
                 GLI-Split can be incrementally deployed and it is
                 backward-compatible with the IPv6 Internet. We describe
                 its architecture, compare it to other approaches,
                 present its benefits, and finally present a
                 proof-of-concept implementation of GLI-Split.",
  acknowledgement = ack-nhfb,
}

@Article{Multisilta:2013:SLW,
  author =       "Jari Multisilta and Arttu Perttula",
  title =        "Supporting Learning with Wireless Sensor Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "95--112",
  day =          "19",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010095",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/95",
  abstract =     "In this article, learning is studied in in situ
                 applications that involve sensors. The main questions
                 are how to conceptualize experiential learning
                 involving sensors and what kinds of learning
                 applications using sensors already exist or could be
                 designed. It is claimed that experiential learning,
                 context information and sensor data supports twenty
                 first century learning. The concepts of context,
                 technology-mediated experiences, shared felt
                 experiences and experiential learning theory will be
                 used to describe a framework for sensor-based mobile
                 learning environments. Several scenarios and case
                 examples using sensors and sensor data will be
                 presented, and they will be analyzed using the
                 framework. Finally, the article contributes to the
                 discussion concerning the role of technology-mediated
                 learning experiences and collective sensor data in
                 developing twenty first century learning by
                 characterizing what kinds of skills and competences are
                 supported in learning situations that involve
                 sensors.",
  acknowledgement = ack-nhfb,
}

@Article{Scholz:2013:CSF,
  author =       "Markus Scholz and Dawud Gordon and Leonardo Ramirez
                 and Stephan Sigg and Tobias Dyrks and Michael Beigl",
  title =        "A Concept for Support of Firefighter Frontline
                 Communication",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "113--127",
  day =          "16",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020113",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/113",
  abstract =     "In an indoor firefighter mission, coordination and
                 communication support are of the utmost importance. We
                 present our experience from over five years of research
                 with current firefighter support technology. In
                 contrast to some large scale emergency response
                 research, our work is focused on the frontline
                 interaction between teams of firefighters and the
                 incident commander on a single site. In this paper we
                 investigate the flaws in firefighter communication
                 systems. Frequent technical failures and the high
                 cognitive costs incurred by communicating impede
                 coordination. We then extract a list of requirements
                 for an assistant emergency management technology from
                 expert interviews. Thirdly, we provide a system concept
                 and explore challenges for building a novel firefighter
                 support system based on our previous work. The system
                 has three key features: robust ad-hoc network,
                 telemetry and text messaging, as well as implicit
                 interaction. The result would provide a complementary
                 mode of communication in addition to the current
                 trunked radio.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Gelenbe:2013:EQT,
  author =       "Erol Gelenbe and Ricardo Lent",
  title =        "Energy-{QoS} Trade-Offs in Mobile Service Selection",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "128--139",
  day =          "19",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020128",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/128",
  abstract =     "An attractive advantage of mobile networks is that
                 their users can gain easy access to different services.
                 In some cases, equivalent services could be fulfilled
                 by different providers, which brings the question of
                 how to rationally select the best provider among all
                 possibilities. In this paper, we investigate an answer
                 to this question from both quality-of-service (QoS) and
                 energy perspectives by formulating an optimisation
                 problem. We illustrate the theoretical results with
                 examples from experimental measurements of the
                 resulting energy and performance.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Managing Quality-of-Service and Security
                 in Mobile Heterogeneous Environments.",
}

@Article{Uto:2013:MRI,
  author =       "Nelson Uto",
  title =        "A Methodology for Retrieving Information from Malware
                 Encrypted Output Files: {Brazilian} Case Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "140--167",
  day =          "25",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020140",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/140",
  abstract =     "This article presents and explains a methodology based
                 on cryptanalytic and reverse engineering techniques
                 that can be employed to quickly recover information
                 from encrypted files generated by malware. The
                 objective of the methodology is to minimize the effort
                 with static and dynamic analysis, by using
                 cryptanalysis and related knowledge as much as
                 possible. In order to illustrate how it works, we
                 present three case studies, taken from a big Brazilian
                 company that was victimized by directed attacks focused
                 on stealing information from a special purpose hardware
                 they use in their environment.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Kolding:2013:QSP,
  author =       "Troels Kolding and Pawel Ochal and Niels Terp
                 Kjeldgaard J{\o}rgensen and Klaus Pedersen",
  title =        "{QoS} Self-Provisioning and Interference Management
                 for Co-Channel Deployed {3G} Femtocells",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "168--189",
  day =          "02",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020168",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/168",
  abstract =     "A highly efficient self-provisioning interference
                 management scheme is derived for 3G Home Node-Bs (HNB).
                 The proposed scheme comprises self-adjustment of the
                 HNB transmission parameters to meet the targeted QoS
                 (quality of service) requirements in terms of downlink
                 and uplink guaranteed minimum throughput and coverage.
                 This objective is achieved by means of an autonomous
                 HNB solution, where the transmit power of pilot and
                 data are adjusted separately, while also controlling
                 the uplink interference pollution towards the
                 macro-layer. The proposed scheme is evaluated by means
                 of extensive system level simulations and the results
                 show significant performance improvements in terms of
                 user throughput outage probability, power efficiency,
                 femtocell coverage, and impact on macro-layer
                 performance as compared to prior art baseline
                 techniques. The paper is concluded by also showing
                 corresponding measurements from live 3G high-speed
                 packet access (HSPA) HNB field-trials, confirming the
                 validity of major simulation results and assumptions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Managing Quality-of-Service and Security
                 in Mobile Heterogeneous Environments.",
}

@Article{Soderstrom:2013:DDY,
  author =       "Sylvia S{\"o}derstr{\"o}m",
  title =        "Digital Differentiation in Young People's {Internet}
                 Use --- Eliminating or Reproducing Disability
                 Stereotypes",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "190--204",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020190",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/190",
  abstract =     "Norwegian authorities' policy aims at securing an
                 information society for all, emphasizing the importance
                 of accessible and usable Information and Communication
                 Technology (ICT) for everyone. While the body of
                 research on young people's use of ICT is quite
                 comprehensive, research addressing digital
                 differentiation in young people with disabilities' use
                 of ICT is still in its early days. This article
                 investigates how young people with disabilities' use,
                 or non-use, of assistive ICT creates digital
                 differentiations. The investigation elaborates on how
                 the anticipations and stereotypes of disability
                 establish an authoritative definition of assistive ICT,
                 and the consequence this creates for the use of the Web
                 by young people with disabilities. The object of the
                 article is to provide enhanced insight into the field
                 of technology and disability by illuminating how
                 assistive ICT sometimes eliminates and sometimes
                 reproduces stereotypes and digital differentiations.
                 The investigation draws on a qualitative interview
                 study with 23 young Norwegians with disabilities, aged
                 15-20 years. I draw on a theoretical perspective to
                 analyze the findings of the study, which employs the
                 concept of identity multiplicity. The article's closing
                 discussion expands on technology's significance in
                 young people's negotiations of impairment and of
                 perceptions of disability.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Loukas:2013:RCT,
  author =       "George Loukas and Diane Gan and Tuan Vuong",
  title =        "A Review of Cyber Threats and Defence Approaches in
                 Emergency Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "205--236",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020205",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/205",
  abstract =     "Emergency planners, first responders and relief
                 workers increasingly rely on computational and
                 communication systems that support all aspects of
                 emergency management, from mitigation and preparedness
                 to response and recovery. Failure of these systems,
                 whether accidental or because of malicious action, can
                 have severe implications for emergency management.
                 Accidental failures have been extensively documented in
                 the past and significant effort has been put into the
                 development and introduction of more resilient
                 technologies. At the same time researchers have been
                 raising concerns about the potential of cyber attacks
                 to cause physical disasters or to maximise the impact
                 of one by intentionally impeding the work of the
                 emergency services. Here, we provide a review of
                 current research on the cyber threats to communication,
                 sensing, information management and vehicular
                 technologies used in emergency management. We emphasise
                 on open issues for research, which are the cyber
                 threats that have the potential to affect emergency
                 management severely and for which solutions have not
                 yet been proposed in the literature.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Ober:2013:SAB,
  author =       "Micha Ober and Stefan Katzenbeisser and Kay
                 Hamacher",
  title =        "Structure and Anonymity of the {Bitcoin} Transaction
                 Graph",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "237--250",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020237",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/237",
  abstract =     "The Bitcoin network of decentralized payment
                 transactions has attracted a lot of attention from both
                 Internet users and researchers in recent years. Bitcoin
                 utilizes a peer-to-peer network to issue anonymous
                 payment transactions between different users. In the
                 currently used Bitcoin clients, the full transaction
                 history is available at each node of the network to
                 prevent double spending without the need for a central
                 authority, forming a valuable source for empirical
                 research on network structure, network dynamics, and
                 the implied anonymity challenges, as well as guidance
                 on the future evolution of complex payment systems. We
                 found dynamical effects of which some increase
                 anonymity while others decrease it. Most importantly,
                 several parameters of the Bitcoin transaction graph
                 seem to have become stationary over the last 12-18
                 months. We discuss the implications.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Digital Cash: Design and Impacts.",
}

@Article{West:2013:REO,
  author =       "Rebecca J. West and Bhoomi K. Thakore",
  title =        "Racial Exclusion in the Online World",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "251--267",
  day =          "24",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020251",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/251",
  abstract =     "As the internet has become an integral part of
                 everyday life, it is understood that patterns of racial
                 stereotyping and discrimination found in the offline
                 world are often reproduced online. In our paper, we
                 examine two exclusionary practices in an online
                 environment for adult toy collectors: First, the
                 exclusion of non-white individuals who are expected to
                 form immediate friendships with other non-white
                 members; and second, the essentializing of racial
                 issues when concerns over the lack of racial diversity
                 in the toys are discussed. This dismissal is often
                 directly connected to non-white members' decisions to
                 no longer participate, resulting in a new form of
                 segregation within virtual space.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Sakellari:2013:ITB,
  author =       "Georgia Sakellari and Christina Morfopoulou and Erol
                 Gelenbe",
  title =        "Investigating the Tradeoffs between Power Consumption
                 and Quality of Service in a Backbone Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "268--281",
  day =          "24",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020268",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/268",
  abstract =     "Energy saving in networks has traditionally focussed
                 on reducing battery consumption through smart wireless
                 network design. Recently, researchers have turned their
                 attention to the energy cost and carbon emissions of
                 the backbone network that both fixed and mobile
                 communications depend on, proposing primarily
                 mechanisms that turn equipments OFF or put them into
                 deep sleep. This is an effective way of saving energy,
                 provided that the nodes can return to working condition
                 quickly, but it introduces increased delays and packet
                 losses that directly affect the quality of
                 communication experienced by the users. Here we
                 investigate the associated tradeoffs between power
                 consumption and quality of service in backbone networks
                 that employ deep sleep energy savings. We examine these
                 tradeoffs by conducting experiments on a real PC-based
                 network topology, where nodes are put into deep sleep
                 at random times and intervals, resulting in a
                 continuously changing network with reduced total power
                 consumption. The average power consumption, the packet
                 loss and the average delay of this network are examined
                 with respect to the average value of the ON rate and
                 the ON/OFF cycle of the nodes.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Managing Quality-of-Service and Security
                 in Mobile Heterogeneous Environments.",
}

@Article{Neis:2013:CVG,
  author =       "Pascal Neis and Dennis Zielstra and Alexander Zipf",
  title =        "Comparison of Volunteered Geographic Information Data
                 Contributions and Community Development for Selected
                 World Regions",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "282--300",
  day =          "03",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020282",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/282",
  abstract =     "Volunteered Geographic Information (VGI) projects and
                 their crowdsourced data have been the focus of a number
                 of scientific analyses and investigations in recent
                 years. Oftentimes the results show that the
                 collaboratively collected geodata of one of the most
                 popular VGI projects, OpenStreetMap (OSM), provides
                 good coverage in urban areas when considering
                 particular completeness factors. However, results can
                 potentially vary significantly for different world
                 regions. In this article, we conduct an analysis to
                 determine similarities and differences in data
                 contributions and community development in OSM between
                 12 selected urban areas of the world. Our findings
                 showed significantly different results in data
                 collection efforts and local OSM community sizes.
                 European cities provide quantitatively larger amounts
                 of geodata and number of contributors in OSM, resulting
                 in a better representation of the real world in the
                 dataset. Although the number of volunteers does not
                 necessarily correlate with the general population
                 density of the urban areas, similarities could be
                 detected while comparing the percentage of different
                 contributor groups and the number of changes they made
                 to the OSM project. Further analyses show that
                 socio-economic factors, such as income, can have an
                 impact on the number of active contributors and the
                 data provided in the analyzed areas. Furthermore, the
                 results showed significant data contributions by
                 members whose main territory of interest lies more than
                 one thousand kilometers from the tested areas.",
  acknowledgement = ack-nhfb,
}

@Article{Marganski:2013:VRV,
  author =       "Alison Marganski",
  title =        "Virtual Relationship Violence and Perspectives on
                 Punishment: Do Gender or Nationality Matter?",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "301--316",
  day =          "26",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030301",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/301",
  abstract =     "Given the increasingly popular use of socially
                 interactive technology (SIT), it is believed that the
                 way in which individuals communicate and experience
                 relationships has drastically been changing. For those
                 who partake in this electronic world, damaging
                 behaviors akin to those found in the real world have
                 emerged. Yet, we know little about the extent of these
                 behaviors in the context of romantic relationships,
                 especially from a gender or cultural standpoint.
                 Research on dating violence generally indicates that
                 women experience in-person victimization at higher
                 rates than men, although some research has called this
                 into question. It also suggests that some national
                 groups experience higher rates of violence than others.
                 However, research is almost non-existent when it comes
                 to exploring violence in the digital world. This study
                 investigated gender and nationality in (1) the nature
                 and extent of socially interactive intimate violence,
                 and (2) perceptions of the seriousness of virtual
                 relationship violence. Using a sample of students from
                 the United States and Poland, findings revealed that
                 socially interactive technology may serve as a new
                 avenue for aggressing against partners, as virtual
                 relationship violence was not uncommon and reflected
                 some patterns present in the real world. Some
                 unexpected patterns also emerged. The results of this
                 research signal a possible transferability of covert
                 intimate violence and highlight ways in which
                 inequalities may exist in our virtual worlds.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Imadali:2013:ESS,
  author =       "Sofiane Imadali and Athanasia Karanasiou and Alexandru
                 Petrescu and Ioannis Sifniadis and Eleftheria Velidou
                 and V{\'e}ronique V{\`e}que and Pantelis Angelidis",
  title =        "{eHealth} Service Support in Future {IPv6} Vehicular
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "317--335",
  day =          "27",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030317",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/317",
  abstract =     "Recent vehicular networking activities include novel
                 automotive applications, such as public vehicle to
                 vehicle/infrastructure (V2X), large scale deployments,
                 machine-to-machine (M2M) integration scenarios, and
                 more. The platform described in this paper focuses on
                 the integration of eHealth in a V2I setting. This is to
                 allow the use of Internet from a vehicular setting to
                 disseminate health-related information. From an eHealth
                 viewpoint, the use of remote healthcare solutions to
                 record and transmit a patient's vital signs is a
                 special telemedicine application that helps hospital
                 resident health professionals to optimally prepare the
                 patient's admittance. From the automotive perspective,
                 this is a typical vehicle-to-infrastructure (V2I)
                 communication scenario. This proposal provides an IPv6
                 vehicular platform, which integrates eHealth devices
                 and allows sending captured health-related data to a
                 personal health record (PHR) application server in the
                 IPv6 Internet. The collected data is viewed remotely by
                 a doctor and supports his diagnostic decision. In
                 particular, our work introduces the integration of
                 vehicular and eHealth testbeds, describes related work
                 and presents a lightweight auto-configuration method
                 based on a DHCPv6 extension to provide IPv6
                 connectivity with a few numbers of messages.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Gelenbe:2013:FRC,
  author =       "Erol Gelenbe and Fang-Jing Wu",
  title =        "Future Research on Cyber-Physical Emergency Management
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "336--354",
  day =          "27",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030336",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/336",
  abstract =     "Cyber-physical systems that include human beings and
                 vehicles in a built environment, such as a building or
                 a city, together with sensor networks and decision
                 support systems have attracted much attention. In
                 emergencies, which also include mobile searchers and
                 rescuers, the interactions among civilians and the
                 environment become much more diverse, and the
                 complexity of the emergency response also becomes much
                 greater. This paper surveys current research on
                 sensor-assisted evacuation and rescue systems and
                 discusses the related research issues concerning
                 communication protocols for sensor networks, as well as
                 several other important issues, such as the integrated
                 asynchronous control of large-scale emergency response
                 systems, knowledge discovery for rescue and prototyping
                 platforms. Then, we suggest directions for further
                 research.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Emergency Management, Communications and
                 the Internet.",
}

@Article{Kotenko:2013:DIH,
  author =       "Igor Kotenko and Olga Polubelova and Andrey Chechulin
                 and Igor Saenko",
  title =        "Design and Implementation of a Hybrid
                 Ontological-Relational Data Repository for {SIEM}
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "355--375",
  day =          "09",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030355",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/355",
  abstract =     "The technology of Security Information and Event
                 Management (SIEM) becomes one of the most important
                 research applications in the area of computer network
                 security. The overall functionality of SIEM systems
                 depends largely on the quality of solutions implemented
                 at the data storage level, which is purposed for the
                 representation of heterogeneous security events, their
                 storage in the data repository, and the extraction of
                 relevant data for analytical modules of SIEM systems.
                 The paper discusses the key issues of design and
                 implementation of a hybrid SIEM data repository, which
                 combines relational and ontological data
                 representations. Based on the analysis of existing SIEM
                 systems and standards, the ontological approach is
                 chosen as a core component of the repository, and an
                 example of the ontological data model for
                 vulnerabilities representation is outlined. The hybrid
                 architecture of the repository is proposed for
                 implementation in SIEM systems. Since the most of works
                 on the repositories of SIEM systems is based on the
                 relational data model, the paper focuses mainly on the
                 ontological part of the hybrid approach. To test the
                 repository we used the data model intended for attack
                 modeling and security evaluation, which includes both
                 ontological and relational dimensions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Chadwick:2013:IAP,
  author =       "Darren Chadwick and Caroline Wesson and Chris
                 Fullwood",
  title =        "{Internet} Access by People with Intellectual
                 Disabilities: Inequalities and Opportunities",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "376--397",
  day =          "17",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030376",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/376",
  abstract =     "This review gives an overview of the societal
                 inequalities faced by people with intellectual
                 disabilities, before focusing specifically on
                 challenges people face accessing the Internet. Current
                 access will be outlined along with the societal,
                 support and attitudinal factors that can hinder access.
                 Discussion of carer views of Internet use by people
                 with intellectual disabilities will be covered
                 incorporating consideration of the tension between
                 protection, self-determination and lifestyle issues and
                 gaining Internet access. We will address how impairment
                 related factors may impede access and subsequently
                 discuss how supports may be used to obfuscate
                 impairments and facilitate access. We will move on from
                 this to critically describe some of the potential
                 benefits the Internet could provide to people with
                 intellectual disabilities, including the potential for
                 self-expression, advocacy and developing friendships.
                 Finally, strategies to better include people with
                 intellectual disabilities online will be given along
                 with future research suggestions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Busanelli:2013:CNI,
  author =       "Stefano Busanelli and Filippo Rebecchi and Marco
                 Picone and Nicola Iotti and Gianluigi Ferrari",
  title =        "Cross-Network Information Dissemination in Vehicular
                 Ad hoc Networks {(VANETs)}: Experimental Results from a
                 {Smartphone}-Based Testbed",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "398--428",
  day =          "05",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030398",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/398",
  abstract =     "In this work, we present an innovative approach for
                 effective cross-network information dissemination, with
                 applications to vehicular ad hoc networks (VANETs). The
                 proposed approach, denoted as ``Cross-Network Effective
                 Traffic Alert Dissemination'' (X-NETAD), leverages on
                 the spontaneous formation of local WiFi (IEEE 802.11b)
                 VANETs, with direct connections between neighboring
                 vehicles, in order to disseminate, very quickly and
                 inexpensively, traffic alerts received from the
                 cellular network. The proposed communication
                 architecture has been implemented on Android
                 smartphones. The obtained experimental results show
                 that an effective cross-network information
                 dissemination service can entirely rely on
                 smartphone-based communications. This paves the way to
                 future Internet architectures, where vehicles will play
                 a key role as information destinations and sources.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Teets:2013:LRC,
  author =       "Michael Teets and Matthew Goldner",
  title =        "Libraries' Role in Curating and Exposing Big Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "429--438",
  day =          "20",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030429",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/429",
  abstract =     "This article examines how one data hub is working to
                 become a relevant and useful source in the Web of big
                 data and cloud computing. The focus is on OCLC's
                 WorldCat database of global library holdings and
                 includes work by other library organizations to expose
                 their data using big data concepts and standards.
                 Explanation is given of how OCLC has begun work on the
                 knowledge graph for this data and its active
                 involvement with Schema.org in working to make this
                 data useful throughout the Web.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Server Technologies in Cloud Computing
                 and Big Data.",
}

@Article{Gupta:2013:PLN,
  author =       "Smrati Gupta and M. A. V{\'a}zquez-Castro",
  title =        "Physical Layer Network Coding Based on Integer Forcing
                 Precoded Compute and Forward",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "3",
  pages =        "439--459",
  day =          "28",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5030439",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/3/439",
  abstract =     "In this paper, we address the implementation of
                 physical layer network coding (PNC) based on compute
                 and forward (CF) in relay networks. It is known that
                 the maximum achievable rates in CF-based transmission
                 is limited due to the channel approximations at the
                 relay. In this work, we propose the integer forcing
                 precoder (IFP), which bypasses this maximum rate
                 achievability limitation. Our precoder requires channel
                 state information (CSI) at the transmitter, but only
                 that of the channel between the transmitter and the
                 relay, which is a feasible assumption. The overall
                 contributions of this paper are three-fold. Firstly, we
                 propose an implementation of CF using IFP and prove
                 that this implementation achieves higher rates as
                 compared to traditional relaying schemes. Further, the
                 probability of error from the proposed scheme is shown
                 to have up to 2 dB of gain over the existent lattice
                 network coding-based implementation of CF. Secondly, we
                 analyze the two phases of transmission in the CF
                 scheme, thereby characterizing the end-to-end behavior
                 of the CF and not only one-phase behavior, as in
                 previous proposals. Finally, we develop decoders for
                 both the relay and the destination. We use a
                 generalization of Bezout's theorem to justify the
                 construction of these decoders. Further, we make an
                 analytical derivation of the end-to-end probability of
                 error for cubic lattices using the proposed scheme.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Mantere:2013:NTF,
  author =       "Matti Mantere and Mirko Sailio and Sami Noponen",
  title =        "Network Traffic Features for Anomaly Detection in
                 Specific Industrial Control System Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "460--473",
  day =          "25",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040460",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/460",
  abstract =     "The deterministic and restricted nature of industrial
                 control system networks sets them apart from more open
                 networks, such as local area networks in office
                 environments. This improves the usability of network
                 security, monitoring approaches that would be less
                 feasible in more open environments. One of such
                 approaches is machine learning based anomaly detection.
                 Without proper customization for the special
                 requirements of the industrial control system network
                 environment, many existing anomaly or misuse detection
                 systems will perform sub-optimally. A machine learning
                 based approach could reduce the amount of manual
                 customization required for different industrial control
                 system networks. In this paper we analyze a possible
                 set of features to be used in a machine learning based
                 anomaly detection system in the real world industrial
                 control system network environment under investigation.
                 The network under investigation is represented by
                 architectural drawing and results derived from network
                 trace analysis. The network trace is captured from a
                 live running industrial process control network and
                 includes both control data and the data flowing between
                 the control network and the office network. We limit
                 the investigation to the IP traffic in the traces.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Ogul:2013:PAM,
  author =       "Murat Ogul and Sel{\c{c}}uk Baktir",
  title =        "Practical Attacks on Mobile Cellular Networks and
                 Possible Countermeasures",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "474--489",
  day =          "30",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040474",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/474",
  abstract =     "Due to widespread adoption of mobile communications
                 devices and increasingly high throughput capacity of
                 cellular networks, Third-Generation (3G) and Long Term
                 Evolution (LTE) are becoming ever more popular.
                 Millions of smart phones with 3G capabilities are sold
                 every year and used for mostly browsing the Internet.
                 Hence, mobile operators have been heavily investing in
                 their packet switched networks to meet customer demand
                 and stay ahead in the market. The widespread use of
                 broadband mobile Internet bring along also some IP
                 based threats such as the Denial of Service (DoS)
                 attacks, botnets and malwares. In this paper, we
                 performed DoS and flooding attacks on 3G mobile
                 networks and measured their effect on the most critical
                 elements of a network such as the Radio Network
                 Controller (RNC) and the Serving GPRS Support Node
                 (SGSN) devices. We carried out our experiments on a
                 real mobile network, not just a simulation environment,
                 and hence our findings depict a realistic picture of
                 the vulnerabilities existent in 3G mobile networks. We
                 propose alternative solutions to avoid these
                 vulnerabilities and mitigate the issues raised.",
  acknowledgement = ack-nhfb,
}

@Article{Ziaimatin:2013:STD,
  author =       "Hasti Ziaimatin and Tudor Groza and Jane Hunter",
  title =        "Semantic and Time-Dependent Expertise Profiling Models
                 in Community-Driven Knowledge Curation Platforms",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "490--514",
  day =          "11",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040490",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/490",
  abstract =     "Online collaboration and web-based knowledge sharing
                 have gained momentum as major components of the Web 2.0
                 movement. Consequently, knowledge embedded in such
                 platforms is no longer static and continuously evolves
                 through experts' micro-contributions. Traditional
                 Information Retrieval and Social Network Analysis
                 techniques take a document-centric approach to
                 expertise modeling by creating a macro-perspective of
                 knowledge embedded in large corpus of static documents.
                 However, as knowledge in collaboration platforms
                 changes dynamically, the traditional macro-perspective
                 is insufficient for tracking the evolution of knowledge
                 and expertise. Hence, Expertise Profiling is presented
                 with major challenges in the context of dynamic and
                 evolving knowledge. In our previous study, we proposed
                 a comprehensive, domain-independent model for expertise
                 profiling in the context of evolving knowledge. In this
                 paper, we incorporate Language Modeling into our
                 methodology to enhance the accuracy of resulting
                 profiles. Evaluation results indicate a significant
                 improvement in the accuracy of profiles generated by
                 this approach. In addition, we present our profile
                 visualization tool, Profile Explorer, which serves as a
                 paradigm for exploring and analyzing time-dependent
                 expertise profiles in knowledge-bases where content
                 evolves overtime. Profile Explorer facilitates
                 comparative analysis of evolving expertise, independent
                 of the domain and the methodology used in creating
                 profiles.",
  acknowledgement = ack-nhfb,
}

@Article{Han:2013:MEO,
  author =       "Qing Han",
  title =        "Managing Emergencies Optimally Using a Random Neural
                 Network-Based Algorithm",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "515--534",
  day =          "16",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040515",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/515",
  abstract =     "Emergency rescues require that first responders
                 provide support to evacuate injured and other civilians
                 who are obstructed by the hazards. In this case, the
                 emergency personnel can take actions strategically in
                 order to rescue people maximally, efficiently and
                 quickly. The paper studies the effectiveness of a
                 random neural network (RNN)-based task assignment
                 algorithm involving optimally matching emergency
                 personnel and injured civilians, so that the emergency
                 personnel can aid trapped people to move towards
                 evacuation exits in real-time. The evaluations are run
                 on a decision support evacuation system using the
                 Distributed Building Evacuation Simulator (DBES)
                 multi-agent platform in various emergency scenarios.
                 The simulation results indicate that the RNN-based task
                 assignment algorithm provides a near-optimal solution
                 to resource allocation problems, which avoids resource
                 wastage and improves the efficiency of the emergency
                 rescue process.",
  acknowledgement = ack-nhfb,
}

@Article{Huang:2013:SSV,
  author =       "Jun Steed Huang and Oliver Yang and Funmilyo Lawal",
  title =        "Sending Safety Video over {WiMAX} in Vehicle
                 Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "535--567",
  day =          "31",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040535",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/535",
  abstract =     "This paper reports on the design of an OPNET
                 simulation platform to test the performance of sending
                 real-time safety video over VANET (Vehicular Adhoc
                 NETwork) using the WiMAX technology. To provide a more
                 realistic environment for streaming real-time video, a
                 video model was created based on the study of video
                 traffic traces captured from a realistic vehicular
                 camera, and different design considerations were taken
                 into account. A practical controller over real-time
                 streaming protocol is implemented to control data
                 traffic congestion for future road safety development.
                 Our driving video model was then integrated with the
                 WiMAX OPNET model along with a mobility model based on
                 real road maps. Using this simulation platform,
                 different mobility cases have been studied and the
                 performance evaluated in terms of end-to-end delay,
                 jitter and visual experience.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Vehicular Communications and
                 Networking.",
}

@Article{Jang:2013:CIS,
  author =       "S. Mo Jang and Yong Jin Park",
  title =        "The Citizen as Issue Specialists in a Changing Media
                 Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "568--579",
  day =          "13",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040568",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/568",
  abstract =     "Although recent research suggests that the selective
                 nature of new media helps foster issue specialists,
                 little empirical evidence has been documented, mostly
                 due to theoretical and methodological limitations.
                 Extending the concept of issue publics, the present
                 study proposes a method to estimate the degree to which
                 an individual is a specialist- or a generalist-type
                 citizen. Applying the method to the 2008 American
                 National Election Studies data, the study reveals
                 various characteristics of specialists and generalists.
                 The results indicate that specialist-type citizens are
                 positively associated with online news use, but
                 negatively associated with conventional news media,
                 such as television, newspaper, and radio. The
                 implications of the growth of specialists as well as
                 the validity of the proposed method are discussed.",
  acknowledgement = ack-nhfb,
}

@Article{Graham:2013:ISI,
  author =       "Roderick Graham",
  title =        "Introduction to the Special Issue on Inequality in the
                 Digital Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "580--584",
  day =          "26",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040580",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/580",
  abstract =     "The purpose of this special issue is to explore social
                 inequalities in the digital environment. The motivation
                 for this issue is derived from the disproportionate
                 focus on technological and economic aspects of the
                 Information Society to the detriment of sociological
                 and cultural aspects. The research presented here falls
                 along three dimensions of inequality. Two papers
                 explore the ways that race orders interaction online. A
                 second pair of papers explores the experiences of
                 technology users with physical and mental disabilities.
                 A final paper looks at gender, and the higher rates of
                 intimate partner violence experienced by women online.
                 Taken as a whole, these five papers highlight some of
                 the ways that the digital environment can reproduce or
                 mitigate inequalities that have been molded and
                 routinized in the physical environment.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Pileggi:2013:ASG,
  author =       "Salvatore F. Pileggi and Robert Amor",
  title =        "Addressing Semantic Geographic Information Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "585--590",
  day =          "26",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040585",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/585",
  abstract =     "The progressive consolidation of information
                 technologies on a large scale has been facilitating and
                 progressively increasing the production, collection,
                 and diffusion of geographic data, as well as
                 facilitating the integration of a large amount of
                 external information into geographic information
                 systems (GIS). Traditional GIS is transforming into a
                 consolidated information infrastructure. This
                 consolidated infrastructure is affecting more and more
                 aspects of internet computing and services. Most
                 popular systems (such as social networks, GPS, and
                 decision support systems) involve complex GIS and
                 significant amounts of information. As a web service,
                 GIS is affected by exactly the same problems that
                 affect the web as a whole. Therefore, next generation
                 GIS solutions have to address further methodological
                 and data engineering challenges in order to accommodate
                 new applications' extended requirements (in terms of
                 scale, interoperability, and complexity). The
                 conceptual and semantic modeling of GIS, as well as the
                 integration of semantics into current GIS, provide
                 highly expressive environments that are capable of
                 meeting the needs and requirements of a wide range of
                 applications.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Geographic Information System
                 (Semantic GIS).",
}

@Article{Jeong:2013:FAA,
  author =       "Sooman Jeong and Kisung Lee and Jungwoo Hwang and
                 Seongjin Lee and Youjip Won",
  title =        "Framework for Analyzing {Android} {I/O} Stack
                 Behavior: From Generating the Workload to Analyzing the
                 Trace",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "591--610",
  day =          "13",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040591",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/591",
  abstract =     "Abstract: The existing I/O workload generators and
                 trace capturing tools are not adaptable to generating
                 nor capturing the I/O requests of Android apps. The
                 Android platform needs proper tools to capture and
                 replay real world workload in the Android platform to
                 verify the result of benchmark tools. This paper
                 introduces Android Storage Performance Analysis Tool,
                 AndroStep, which is specifically designed for
                 characterizing and analyzing the behavior of the I/O
                 subsystem in Android based devices. The AndroStep
                 consists of Mobibench (workload generator), MOST
                 (Mobile Storage Analyzer), and Mobigen (workload
                 replayer). Mobibench is an Android app that generates a
                 filesystem as well as SQLite database operations.
                 Mobibench can also vary the number of concurrent
                 threads to examining the filesystem scalability to
                 support concurrency, e.g., metadata updates, journal
                 file creation/deletion. MOST captures the trace and
                 extracts key filesystem access characteristics such as
                 access pattern with respect to file types, ratio
                 between random vs. sequential access, ratio between
                 buffered vs. synchronous I/O, fraction of metadata
                 accesses, etc. MOST implements reverse mapping feature
                 (finding an inode for a given block) and retrospective
                 reverse mapping (finding an inode for a deleted file).
                 Mobigen is a trace capturing and replaying tool that is
                 specifically designed to perform the user experiment
                 without actual human intervention. Mobigen records the
                 system calls generated from the user behavior and
                 sanitizes the trace for replayable form. Mobigen can
                 replay this trace on different Android platforms or
                 with different I/O stack configurations. As an example
                 of using AndroStep, we analyzed the performances of
                 twelve Android smartphones and the SQLite performances
                 on five different filesystems. AndroStep makes
                 otherwise time consuming I/O stack analysis extremely
                 versatile. AndroStep makes a significant contribution
                 in terms of shedding light on internal behavior of the
                 Android I/O stack.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Mobile Engineering.",
}

@Article{Wan:2013:LEC,
  author =       "Liangtian Wan and Lutao Liu and Guangjie Han and Joel
                 J. P. C. Rodrigues",
  title =        "A Low Energy Consumption {DOA} Estimation Approach for
                 Conformal Array in Ultra-Wideband",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "4",
  pages =        "611--630",
  day =          "16",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5040611",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/4/611",
  abstract =     "Most direction-of-arrival (DOA) estimation approaches
                 for conformal array suffer from high computational
                 complexity, which cause high energy loss for the
                 direction finding system. Thus, a low energy
                 consumption DOA estimation algorithm for conformal
                 array antenna is proposed in this paper. The arbitrary
                 baseline direction finding algorithm is extended to
                 estimate DOA for a conformal array in ultra-wideband.
                 The rotation comparison method is adopted to solve the
                 ambiguity of direction finding. The virtual baseline
                 approach is used to construct the virtual elements.
                 Theoretically, the virtual elements can be extended in
                 the space flexibility. Four elements (both actual and
                 virtual elements) can be used to obtain a group of
                 solutions. The space angle estimation can be obtained
                 by using sub-array divided technique and matrix
                 inversion method. The stability of the proposed
                 algorithm can be guaranteed by averaging the angles
                 obtained by different sub-arrays. Finally, the
                 simulation results verify the effectiveness of the
                 proposed method with high DOA estimation accuracy and
                 relatively low computational complexity.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Green Communications and Networking.",
}

@Article{Hermann:2014:CIP,
  author =       "Steffen Hermann and Benjamin Fabian",
  title =        "A Comparison of {Internet} Protocol {(IPv6)} Security
                 Guidelines",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "1--60",
  day =          "10",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/1",
  abstract =     "The next generation of the Internet Protocol (IPv6) is
                 currently about to be introduced in many organizations.
                 However, its security features are still a very novel
                 area of expertise for many practitioners. This study
                 evaluates guidelines for secure deployment of IPv6,
                 published by the U.S. NIST and the German federal
                 agency BSI, for topicality, completeness and depth. The
                 later two are scores defined in this paper and are
                 based on the Requests for Comments relevant for IPv6
                 that were categorized, weighted and ranked for
                 importance using an expert survey. Both guides turn out
                 to be of practical value, but have a specific focus and
                 are directed towards different audiences. Moreover,
                 recommendations for possible improvements are
                 presented. Our results could also support strategic
                 management decisions on security priorities as well as
                 for the choice of security guidelines for IPv6
                 roll-outs.",
  acknowledgement = ack-nhfb,
}

@Article{Branchi:2014:AMS,
  author =       "Pablo E. Branchi and Carlos Fern{\'a}ndez-Valdivielso
                 and Ignacio R. Matias",
  title =        "Analysis Matrix for Smart Cities",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "61--75",
  day =          "22",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010061",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/61",
  abstract =     "The current digital revolution has ignited the
                 evolution of communications grids and the development
                 of new schemes for productive systems. Traditional
                 technologic scenarios have been challenged, and Smart
                 Cities have become the basis for urban competitiveness.
                 The citizen is the one who has the power to set new
                 scenarios, and that is why a definition of the way
                 people interact with their cities is needed, as is
                 commented in the first part of the article. At the same
                 time, a lack of clarity has been detected in the way of
                 describing what Smart Cities are, and the second part
                 will try to set the basis for that. For all before, the
                 information and communication technologies that manage
                 and transform 21st century cities must be reviewed,
                 analyzing their impact on new social behaviors that
                 shape the spaces and means of communication, as is
                 posed in the experimental section, setting the basis
                 for an analysis matrix to score the different elements
                 that affect a Smart City environment. So, as the better
                 way to evaluate what a Smart City is, there is a need
                 for a tool to score the different technologies on the
                 basis of their usefulness and consequences, considering
                 the impact of each application. For all of that, the
                 final section describes the main objective of this
                 article in practical scenarios, considering how the
                 technologies are used by citizens, who must be the main
                 concern of all urban development.",
  acknowledgement = ack-nhfb,
}

@Article{Neis:2014:RDF,
  author =       "Pascal Neis and Dennis Zielstra",
  title =        "Recent Developments and Future Trends in Volunteered
                 Geographic Information Research: The Case of
                 {OpenStreetMap}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "76--106",
  day =          "27",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010076",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/76",
  abstract =     "User-generated content (UGC) platforms on the Internet
                 have experienced a steep increase in data contributions
                 in recent years. The ubiquitous usage of
                 location-enabled devices, such as smartphones, allows
                 contributors to share their geographic information on a
                 number of selected online portals. The collected
                 information is oftentimes referred to as volunteered
                 geographic information (VGI). One of the most utilized,
                 analyzed and cited VGI-platforms, with an increasing
                 popularity over the past few years, is OpenStreetMap
                 (OSM), whose main goal it is to create a freely
                 available geographic database of the world. This paper
                 presents a comprehensive overview of the latest
                 developments in VGI research, focusing on its
                 collaboratively collected geodata and corresponding
                 contributor patterns. Additionally, trends in the realm
                 of OSM research are discussed, highlighting which
                 aspects need to be investigated more closely in the
                 near future.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Office:2014:ARF,
  author =       "Future Internet Editorial Office",
  title =        "Acknowledgement to Reviewers of Future {Internet} in
                 2013",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "107--108",
  day =          "24",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010107",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/107",
  abstract =     "The term ``crowdsourcing'' was initially introduced by
                 Howe in his article ``The Rise of Crowdsourcing'' [1].
                 During the last few years, crowdsourcing has become
                 popular among companies, institutions and universities,
                 as a crowd-centered modern ``tool'' for problem
                 solving. Crowdsourcing is mainly based on the idea of
                 an open-call publication of a problem, requesting the
                 response of the crowd for reaching the most appropriate
                 solution. The focus of this paper is on the role of
                 crowdsourcing in knowledge acquisition for planning
                 applications. The first part provides an introduction
                 to the origins of crowdsourcing in knowledge
                 generation. The second part elaborates on the concept
                 of crowdsourcing, while some indicative platforms
                 supporting the development of crowdsourcing
                 applications are also described. The third part focuses
                 on the integration of crowdsourcing with certain web
                 technologies and GIS (Geographic Information Systems),
                 for spatial planning applications, while in the fourth
                 part, a general framework of the rationale behind
                 crowdsourcing applications is presented. Finally, the
                 fifth part focuses on a range of case studies that
                 adopted several crowdsourcing techniques.",
  acknowledgement = ack-nhfb,
}

@Article{Papadopoulou:2014:CTK,
  author =       "Chrysaida-Aliki Papadopoulou and Maria Giaoutzi",
  title =        "Crowdsourcing as a Tool for Knowledge Acquisition in
                 Spatial Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "109--125",
  day =          "05",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010109",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/109",
  abstract =     "The term ``crowdsourcing'' was initially introduced by
                 Howe in his article ``The Rise of Crowdsourcing'' [1].
                 During the last few years, crowdsourcing has become
                 popular among companies, institutions and universities,
                 as a crowd-centered modern ``tool'' for problem
                 solving. Crowdsourcing is mainly based on the idea of
                 an open-call publication of a problem, requesting the
                 response of the crowd for reaching the most appropriate
                 solution. The focus of this paper is on the role of
                 crowdsourcing in knowledge acquisition for planning
                 applications. The first part provides an introduction
                 to the origins of crowdsourcing in knowledge
                 generation. The second part elaborates on the concept
                 of crowdsourcing, while some indicative platforms
                 supporting the development of crowdsourcing
                 applications are also described. The third part focuses
                 on the integration of crowdsourcing with certain web
                 technologies and GIS (Geographic Information Systems),
                 for spatial planning applications, while in the fourth
                 part, a general framework of the rationale behind
                 crowdsourcing applications is presented. Finally, the
                 fifth part focuses on a range of case studies that
                 adopted several crowdsourcing techniques.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Trinugroho:2014:IIP,
  author =       "Yohanes Baptista Dafferianto Trinugroho",
  title =        "Information Integration Platform for Patient-Centric
                 Healthcare Services: Design, Prototype and
                 Dependability Aspects",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "126--154",
  day =          "06",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010126",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/126",
  abstract =     "Technology innovations have pushed today's healthcare
                 sector to an unprecedented new level. Various portable
                 and wearable medical and fitness devices are being sold
                 in the consumer market to provide the self-empowerment
                 of a healthier lifestyle to society. Many vendors
                 provide additional cloud-based services for devices
                 they manufacture, enabling the users to visualize,
                 store and share the gathered information through the
                 Internet. However, most of these services are
                 integrated with the devices in a closed ``silo''
                 manner, where the devices can only be used with the
                 provided services. To tackle this issue, an information
                 integration platform (IIP) has been developed to
                 support communications between devices and
                 Internet-based services in an event-driven fashion by
                 adopting service-oriented architecture (SOA) principles
                 and a publish/subscribe messaging pattern. It follows
                 the ``Internet of Things'' (IoT) idea of connecting
                 everyday objects to various networks and to enable the
                 dissemination of the gathered information to the global
                 information space through the Internet. A
                 patient-centric healthcare service environment is
                 chosen as the target scenario for the deployment of the
                 platform, as this is a domain where IoT can have a
                 direct positive impact on quality of life enhancement.
                 This paper describes the developed platform, with
                 emphasis on dependability aspects, including
                 availability, scalability and security.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Toward people aware IoT.",
}

@Article{Lan:2014:NDE,
  author =       "Xiaoyu Lan and Liangtian Wan and Guangjie Han and Joel
                 J. P. C. Rodrigues",
  title =        "A Novel {DOA} Estimation Algorithm Using Array
                 Rotation Technique",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "155--170",
  day =          "17",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010155",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/155",
  abstract =     "The performance of traditional direction of arrival
                 (DOA) estimation algorithm based on uniform circular
                 array (UCA) is constrained by the array aperture.
                 Furthermore, the array requires more antenna elements
                 than targets, which will increase the size and weight
                 of the device and cause higher energy loss. In order to
                 solve these issues, a novel low energy algorithm
                 utilizing array base-line rotation for multiple targets
                 estimation is proposed. By rotating two elements and
                 setting a fixed time delay, even the number of elements
                 is selected to form a virtual UCA. Then, the received
                 data of signals will be sampled at multiple positions,
                 which improves the array elements utilization greatly.
                 2D-DOA estimation of the rotation array is accomplished
                 via multiple signal classification (MUSIC) algorithms.
                 Finally, the Cramer-Rao bound (CRB) is derived and
                 simulation results verified the effectiveness of the
                 proposed algorithm with high resolution and estimation
                 accuracy performance. Besides, because of the
                 significant reduction of array elements number, the
                 array antennas system is much simpler and less complex
                 than traditional array.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Green Communications and Networking.",
}

@Article{Motoyoshi:2014:MTF,
  author =       "Gen Motoyoshi and Kenji Leibnitz and Masayuki
                 Murata",
  title =        "Mobility Tolerant Firework Routing for Improving
                 Reachability in {MANETs}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "1",
  pages =        "171--189",
  day =          "24",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6010171",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/1/171",
  abstract =     "In this paper, we investigate our mobility-assisted
                 and adaptive broadcast routing mechanism, called
                 Mobility Tolerant Firework Routing (MTFR), which
                 utilizes the concept of potentials for routing and
                 improves node reachability, especially in situations
                 with high mobility, by including a broadcast mechanism.
                 We perform detailed evaluations by simulations in a
                 mobile environment and demonstrate the advantages of
                 MTFR over conventional potential-based routing. In
                 particular, we show that MTFR produces better
                 reachability in many aspects at the expense of a small
                 additional transmission delay and intermediate traffic
                 overhead, making MTFR a promising routing protocol and
                 feasible for future mobile Internet infrastructures.",
  acknowledgement = ack-nhfb,
}

@Article{Lallie:2014:PCM,
  author =       "Harjinder Singh Lallie",
  title =        "The Problems and Challenges of Managing Crowd Sourced
                 Audio-Visual Evidence",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "190--202",
  day =          "01",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020190",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/190",
  abstract =     "A number of recent incidents, such as the Stanley Cup
                 Riots, the uprisings in the Middle East and the London
                 riots have demonstrated the value of crowd sourced
                 audio-visual evidence wherein citizens submit
                 audio-visual footage captured on mobile phones and
                 other devices to aid governmental institutions,
                 responder agencies and law enforcement authorities to
                 confirm the authenticity of incidents and, in the case
                 of criminal activity, to identify perpetrators. The use
                 of such evidence can present a significant logistical
                 challenge to investigators, particularly because of the
                 potential size of data gathered through such mechanisms
                 and the added problems of time-lining disparate sources
                 of evidence and, subsequently, investigating the
                 incident(s). In this paper we explore this problem and,
                 in particular, outline the pressure points for an
                 investigator. We identify and explore a number of
                 particular problems related to the secure receipt of
                 the evidence, imaging, tagging and then time-lining the
                 evidence, and the problem of identifying duplicate and
                 near duplicate items of audio-visual evidence.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Contemporary and Future Digital
                 Forensics.",
}

@Article{Bi:2014:RDE,
  author =       "Huibo Bi",
  title =        "Routing Diverse Evacuees with the Cognitive Packet
                 Network Algorithm",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "203--222",
  day =          "17",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020203",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/203",
  abstract =     "Regarding mobility, health conditions and personal
                 preferences, evacuees can be categorized into different
                 classes in realistic environments. Previous emergency
                 navigation algorithms that direct evacuees with a
                 single decision rule cannot fulfil civilians' distinct
                 service requirements and increase the likelihood of
                 inducing destructive crowd behaviours, such as
                 clogging, pushing and trampling, due to diverse
                 mobility. This paper explores a distributed emergency
                 navigation algorithm that employs the cognitive packet
                 network concept to tailor different quality of service
                 needs to different categories of evacuees. In addition,
                 a congestion-aware algorithm is presented to predict
                 the future congestion degree of a path with respect to
                 the observed population density, arrival rate and
                 service rate of each route segment. Experiments are
                 implemented in a simulated environment populated with
                 autonomous agents. Results show that our algorithm can
                 increase the number of survivors while providing
                 improved quality of service.",
  acknowledgement = ack-nhfb,
}

@Article{Zoppi:2014:OAA,
  author =       "Corrado Zoppi and Sabrina Lai",
  title =        "An Ontology of the Appropriate Assessment of Municipal
                 Master Plans Related to {Sardinia} ({Italy})",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "223--241",
  day =          "23",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020223",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/223",
  abstract =     "This paper discusses some key points related to the
                 ontology of the ``appropriate assessment'' [1]
                 procedure concerning plans significantly affecting
                 Natura 2000 sites. We study this ontology by discussing
                 its implementation into the adjustment process of the
                 master plans of the regional municipalities of Sardinia
                 (Italy) to the Regional Landscape Plan (RLP) and put as
                 evidence some important general observations, coming
                 from the case study, concerning the utility and
                 effectiveness of the ontological conceptual framework
                 in order to help planners and decision-makers
                 understand and structure the assessment process of
                 plans.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Hare:2014:EMC,
  author =       "Jonathon S. Hare and David P. Dupplaw and Paul H.
                 Lewis and Wendy Hall and Kirk Martinez",
  title =        "Exploiting Multimedia in Creating and Analysing
                 Multimedia {Web} Archives",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "242--260",
  day =          "24",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020242",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/242",
  abstract =     "The data contained on the web and the social web are
                 inherently multimedia and consist of a mixture of
                 textual, visual and audio modalities. Community
                 memories embodied on the web and social web contain a
                 rich mixture of data from these modalities. In many
                 ways, the web is the greatest resource ever created by
                 human-kind. However, due to the dynamic and distributed
                 nature of the web, its content changes, appears and
                 disappears on a daily basis. Web archiving provides a
                 way of capturing snapshots of (parts of) the web for
                 preservation and future analysis. This paper provides
                 an overview of techniques we have developed within the
                 context of the EU funded ARCOMEM (ARchiving COmmunity
                 MEMories) project to allow multimedia web content to be
                 leveraged during the archival process and for
                 post-archival analysis. Through a set of use cases, we
                 explore several practical applications of multimedia
                 analytics within the realm of web archiving, web
                 archive analysis and multimedia data on the web in
                 general.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Archiving Community Memories.",
}

@Article{Latvakoski:2014:THA,
  author =       "Juhani Latvakoski and Mahdi {Ben Alaya} and Herve
                 Ganem and Bashar Jubeh and Antti Iivari and Jeremie
                 Leguay and Jaume Martin Bosch and Niclas Granqvist",
  title =        "Towards Horizontal Architecture for Autonomic {M2M}
                 Service Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "261--301",
  day =          "06",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020261",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/261",
  abstract =     "Today, increasing number of industrial application
                 cases rely on the Machine to Machine (M2M) services
                 exposed from physical devices. Such M2M services enable
                 interaction of physical world with the core processes
                 of company information systems. However, there are
                 grand challenges related to complexity and ``vertical
                 silos'' limiting the M2M market scale and
                 interoperability. It is here expected that horizontal
                 approach for the system architecture is required for
                 solving these challenges. Therefore, a set of
                 architectural principles and key enablers for the
                 horizontal architecture have been specified in this
                 work. A selected set of key enablers called as
                 autonomic M2M manager, M2M service capabilities, M2M
                 messaging system, M2M gateways towards energy
                 constrained M2M asset devices and creation of trust to
                 enable end-to-end security for M2M applications have
                 been developed. The developed key enablers have been
                 evaluated separately in different scenarios dealing
                 with smart metering, car sharing and electric bike
                 experiments. The evaluation results shows that the
                 provided architectural principles, and developed key
                 enablers establish a solid ground for future research
                 and seem to enable communication between objects and
                 applications, which are not initially been designed to
                 communicate together. The aim as the next step in this
                 research is to create a combined experimental system to
                 evaluate the system interoperability and performance in
                 a more detailed manner.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Toward people aware IoT.",
}

@Article{Braun:2014:SDN,
  author =       "Wolfgang Braun and Michael Menth",
  title =        "Software-Defined Networking Using {OpenFlow}:
                 Protocols, Applications and Architectural Design
                 Choices",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "302--336",
  day =          "12",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020302",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/302",
  abstract =     "We explain the notion of software-defined networking
                 (SDN), whose southbound interface may be implemented by
                 the OpenFlow protocol. We describe the operation of
                 OpenFlow and summarize the features of specification
                 versions 1.0-1.4. We give an overview of existing
                 SDN-based applications grouped by topic areas. Finally,
                 we point out architectural design choices for SDN using
                 OpenFlow and discuss their performance implications.",
  acknowledgement = ack-nhfb,
}

@Article{Zafiropoulos:2014:SFG,
  author =       "Kostas Zafiropoulos and Konstantinos Antoniadis and
                 Vasiliki Vrana",
  title =        "Sharing Followers in e-Government {Twitter} Accounts:
                 The Case of {Greece}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "337--358",
  day =          "14",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020337",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/337",
  abstract =     "The recent emergence of e-government and online social
                 media offers opportunities for governments to meet the
                 demands and expectations of citizens, to provide
                 value-added services and overcome barriers of reduced
                 public budgets. Twitter is the most popular
                 microblogging platform that can facilitate interaction
                 and engagement. It is widely used by government
                 agencies, public affairs practitioners, non-government
                 organizations, members of Parliament and politicians.
                 The paper aims to explore the use of Twitter by
                 government agencies in Greece and record Twitter
                 followers' preferences regarding which accounts they
                 follow. The paper records 27 Greek e-government Twitter
                 accounts and their 107,107 followers. It uses a data
                 mining technique, association rules and two
                 multivariate statistical methods, multidimensional
                 scaling and cluster analysis and proposes the use of a
                 similarity measure, suitable for describing Twitter
                 account proximity. In this way, the paper locates
                 accounts that share followers. Groups of Twitter
                 accounts are located, and their common orientation is
                 described. The analysis not only describes Twitter
                 account similarities and group formation, but to some
                 extent, the followers' preferences and habits of
                 obtaining information through Twitter, as well.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Open Government Meets Social Data.",
}

@Article{Copeland:2014:UPV,
  author =       "Andrea Copeland",
  title =        "The Use of Personal Value Estimations to Select Images
                 for Preservation in Public Library Digital Community
                 Collections",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "359--377",
  day =          "27",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020359",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/359",
  abstract =     "A considerable amount of information, particularly in
                 image form, is shared on the web through social
                 networking sites. If any of this content is worthy of
                 preservation, who decides what is to be preserved and
                 based on what criteria. This paper explores the
                 potential for public libraries to assume this role of
                 community digital repositories through the creation of
                 digital collections. Thirty public library users and
                 thirty librarians were solicited from the Indianapolis
                 metropolitan area to evaluate five images selected from
                 Flickr in terms of their value to public library
                 digital collections and their worthiness of long-term
                 preservation. Using a seven-point Likert scale,
                 participants assigned a value to each image in terms of
                 its importance to self, family and society.
                 Participants were then asked to explain the reasoning
                 behind their valuations. Public library users and
                 librarians had similar value estimations of the images
                 in the study. This is perhaps the most significant
                 finding of the study, given the importance of
                 collaboration and forming partnerships for building and
                 sustaining community collections and archives.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Archiving Community Memories.",
}

@Article{Mearns:2014:TMS,
  author =       "Graeme Mearns and Rebecca Simmonds and Ranald
                 Richardson and Mark Turner and Paul Watson and Paolo
                 Missier",
  title =        "Tweet My Street: a Cross-Disciplinary Collaboration
                 for the Analysis of Local {Twitter} Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "378--396",
  day =          "27",
  month =        may,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020378",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/378",
  abstract =     "Tweet My Street is a cross-disciplinary project
                 exploring the extent to which data derived from Twitter
                 can reveal more about spatial and temporal behaviours
                 and the meanings attached to these locally. This is
                 done with a longer-term view to supporting the
                 coproduction and delivery of local services, complaint
                 mechanisms and horizontal community support networks.
                 The project has involved the development of a web-based
                 software application capable of retrieving, storing and
                 visualising geo-located ``tweets'' (and associated
                 digital content) from Twitter's Firehose. This has been
                 piloted in Newcastle upon Tyne (UK) and has proven a
                 scalable tool that can aid the analysis of social media
                 data geographically. Beyond explaining efforts to
                 analyse pilot data via this software, this paper
                 elucidates three methodological challenges encountered
                 during early collaboration. These include issues
                 relating to ``proximity'' with subjects, ethics and
                 critical questions about scholars' digital
                 responsibilities during the neogeographic turn.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Scassa:2014:POG,
  author =       "Teresa Scassa",
  title =        "Privacy and Open Government",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "397--413",
  day =          "18",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020397",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/397",
  abstract =     "The public-oriented goals of the open government
                 movement promise increased transparency and
                 accountability of governments, enhanced citizen
                 engagement and participation, improved service
                 delivery, economic development and the stimulation of
                 innovation. In part, these goals are to be achieved by
                 making more and more government information public in
                 reusable formats and under open licences. This paper
                 identifies three broad privacy challenges raised by
                 open government. The first is how to balance privacy
                 with transparency and accountability in the context of
                 ``public'' personal information. The second challenge
                 flows from the disruption of traditional approaches to
                 privacy based on a collapse of the distinctions between
                 public and private sector actors. The third challenge
                 is that of the potential for open government data-even
                 if anonymized-to contribute to the big data environment
                 in which citizens and their activities are increasingly
                 monitored and profiled.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Open Government Meets Social Data.",
}

@Article{Roy:2014:ODO,
  author =       "Jeffrey Roy",
  title =        "Open Data and Open Governance in {Canada}: a Critical
                 Examination of New Opportunities and Old Tensions",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "414--432",
  day =          "27",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030414",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/414",
  abstract =     "As governments develop open data strategies, such
                 efforts reflect the advent of the Internet, the
                 digitization of government, and the emergence of
                 meta-data as a wider socio-economic and societal
                 transformational. Within this context the purpose of
                 this article is twofold. First, we seek to both situate
                 and examine the evolution and effectiveness of open
                 data strategies in the Canadian public sector, with a
                 particular focus on municipal governments that have led
                 this movement. Secondly, we delve more deeply into-if
                 and how, open data can facilitate more open and
                 innovative forms of governance enjoining an
                 outward-oriented public sector (across all government
                 levels) with an empowered and participative society.
                 This latter vantage point includes four main and
                 inter-related dimensions: (i) conceptualizing public
                 value and public engagement; (ii) media
                 relations-across traditional intermediaries and
                 channels and new social media; (iii) political culture
                 and the politics of privacy in an increasingly
                 data-centric world; and (iv) federated architectures
                 and the alignment of localized, sub-national, and
                 national strategies and governance mechanisms. This
                 article demonstrates how each of these dimensions
                 includes important determinants of not only open data's
                 immediate impacts but also its catalytic ability to
                 forge wider and collective innovation and more holistic
                 governance renewal.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Open Government Meets Social Data.",
}

@Article{Demidova:2014:AEF,
  author =       "Elena Demidova and Nicola Barbieri and Stefan Dietze
                 and Adam Funk and Helge Holzmann and Diana Maynard and
                 Nikolaos Papailiou and Wim Peters and Thomas Risse and
                 Dimitris Spiliotopoulos",
  title =        "Analysing and Enriching Focused {Semantic Web}
                 Archives for {Parliament} Applications",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "433--456",
  day =          "30",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030433",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/433",
  abstract =     "The web and the social web play an increasingly
                 important role as an information source for Members of
                 Parliament and their assistants, journalists, political
                 analysts and researchers. It provides important and
                 crucial background information, like reactions to
                 political events and comments made by the general
                 public. The case study presented in this paper is
                 driven by two European parliaments (the Greek and the
                 Austrian parliament) and targets an effective
                 exploration of political web archives. In this paper,
                 we describe semantic technologies deployed to ease the
                 exploration of the archived web and social web content
                 and present evaluation results.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Archiving Community Memories.",
}

@Article{Maynard:2014:SCA,
  author =       "Diana Maynard and Gerhard Gossen and Adam Funk and
                 Marco Fisichella",
  title =        "Should {I} Care about Your Opinion? {Detection} of
                 Opinion Interestingness and Dynamics in Social Media",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "457--481",
  day =          "13",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030457",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/457",
  abstract =     "In this paper, we describe a set of reusable text
                 processing components for extracting opinionated
                 information from social media, rating it for
                 interestingness, and for detecting opinion events. We
                 have developed applications in GATE to extract named
                 entities, terms and events and to detect opinions about
                 them, which are then used as the starting point for
                 opinion event detection. The opinions are then
                 aggregated over larger sections of text, to give some
                 overall sentiment about topics and documents, and also
                 some degree of information about interestingness based
                 on opinion diversity. We go beyond traditional opinion
                 mining techniques in a number of ways: by focusing on
                 specific opinion-target extraction related to key terms
                 and events, by examining and dealing with a number of
                 specific linguistic phenomena, by analysing and
                 visualising opinion dynamics over time, and by
                 aggregating the opinions in different ways for a more
                 flexible view of the information contained in the
                 documents.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Archiving Community Memories.",
}

@Article{Tsimpourla:2014:RDL,
  author =       "Clare Tsimpourla",
  title =        "{Rikki} Don't Lose That Number: Enumerated Human
                 Rights in a Society of Infinite Connections",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "482--497",
  day =          "19",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030482",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/482",
  abstract =     "The international Human Rights regime acknowledges a
                 certain number of rights. That number, albeit
                 increasing since its inception, does not seem able to
                 keep up with the pace of modern technology. Human
                 rights today are not only exercised in the tangible
                 world; they are also exercised on a daily basis in a
                 world of ubiquitous computing-as such they can be
                 easily breached with a mere click of a button. To make
                 matters worse, these rights are controlled largely by
                 multinational corporations that have little regard for
                 their value. In this paper we will attempt to explore
                 the difficulties the global human rights regime faces
                 today, the challenge that is its enforcement, and
                 whether it has come to a standstill in an age where
                 connections grow faster than the rule of law.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Digital Inequalities.",
}

@Article{Viscusi:2014:ASV,
  author =       "Gianluigi Viscusi and Marco Castelli and Carlo
                 Batini",
  title =        "Assessing Social Value in Open Data Initiatives: a
                 Framework",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "498--517",
  day =          "19",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030498",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/498",
  abstract =     "Open data initiatives are characterized, in several
                 countries, by a great extension of the number of data
                 sets made available for access by public
                 administrations, constituencies, businesses and other
                 actors, such as journalists, international institutions
                 and academics, to mention a few. However, most of the
                 open data sets rely on selection criteria, based on a
                 technology-driven perspective, rather than a focus on
                 the potential public and social value of data to be
                 published. Several experiences and reports confirm this
                 issue, such as those of the Open Data Census. However,
                 there are also relevant best practices. The goal of
                 this paper is to investigate the different dimensions
                 of a framework suitable to support public
                 administrations, as well as constituencies, in
                 assessing and benchmarking the social value of open
                 data initiatives. The framework is tested on three
                 initiatives, referring to three different countries,
                 Italy, the United Kingdom and Tunisia. The countries
                 have been selected to provide a focus on European and
                 Mediterranean countries, considering also the
                 difference in legal frameworks (civic law vs. common
                 law countries).",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Open Government Meets Social Data.",
}

@Article{Plachouras:2014:ACA,
  author =       "Vassilis Plachouras and Florent Carpentier and
                 Muhammad Faheem and Julien Masan{\`e}s and Thomas Risse
                 and Pierre Senellart and Patrick Siehndel and Yannis
                 Stavrakas",
  title =        "{ARCOMEM} Crawling Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "518--541",
  day =          "19",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030518",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/518",
  abstract =     "The World Wide Web is the largest information
                 repository available today. However, this information
                 is very volatile and Web archiving is essential to
                 preserve it for the future. Existing approaches to Web
                 archiving are based on simple definitions of the scope
                 of Web pages to crawl and are limited to basic
                 interactions with Web servers. The aim of the ARCOMEM
                 project is to overcome these limitations and to provide
                 flexible, adaptive and intelligent content acquisition,
                 relying on social media to create topical Web archives.
                 In this article, we focus on ARCOMEM's crawling
                 architecture. We introduce the overall architecture and
                 we describe its modules, such as the online analysis
                 module, which computes a priority for the Web pages to
                 be crawled, and the Application-Aware Helper which
                 takes into account the type of Web sites and
                 applications to extract structure from crawled content.
                 We also describe a large-scale distributed crawler that
                 has been developed, as well as the modifications we
                 have implemented to adapt Heritrix, an open source
                 crawler, to the needs of the project. Our experimental
                 results from real crawls show that ARCOMEM's crawling
                 architecture is effective in acquiring focused
                 information about a topic and leveraging the
                 information from social media.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Archiving Community Memories.",
}

@Article{Formosa:2014:NPR,
  author =       "Saviour Formosa",
  title =        "{NeoGeography} and Preparedness for Real-to-Virtual
                 World Knowledge Transfer: Conceptual Steps to
                 {Minecraft Malta}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "542--555",
  day =          "28",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030542",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/542",
  abstract =     "Societies have rapidly morphed into complex entities
                 that are creating accessibility, yet, at the same time,
                 they are developing new forms of neogeographic-poverty
                 related to information uptake. Those that have managed
                 to partake in the opportunities provided by the web
                 have new vistas to survive in, in contrast to the new
                 poor who have limited or no access to information. New
                 forms of data in spatial format are accessible to all,
                 however few realize the implications of such a
                 transitional change in wellbeing: Whether entire
                 societies or individuals. The different generations
                 taking up the information access can face different
                 levels of accessibility that may be limited by access
                 to online data, knowledge of usage of tools and the
                 understanding of the results, all within the limits on
                 the spaces they are familiar with. This paper reviews a
                 conceptual process underlining the initial steps of a
                 long-term project in the Maltese Islands that seeks to
                 create an online series of tools that bring the concept
                 of ``physical place'' to the different generations
                 through the management of a major project, the creation
                 of a 3D virtuality, employing scanning processes, GIS,
                 conversion aspects, and a small block-based Minecraft
                 engine.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Kaschesky:2014:DVF,
  author =       "Michael Kaschesky and Luigi Selmi",
  title =        "{7R} Data Value Framework for Open Data in Practice:
                 {Fusepool}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "556--583",
  day =          "08",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030556",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/556",
  abstract =     "Based on existing literature, this article makes a
                 case for open (government) data as supporting political
                 efficiency, socio-economic innovation and
                 administrative efficiency, but also finds a lack of
                 measurable impact. It attributes the lack of impact to
                 shortcomings regarding data access (must be efficient)
                 and data usefulness (must be effective). To address
                 these shortcomings, seven key activities that add value
                 to data are identified and are combined into the 7R
                 Data Value Framework, which is an applied methodology
                 for linked data to systematically address both
                 technical and social shortcomings. The 7R Data Value
                 Framework is then applied to the international Fusepool
                 project that develops a set of integrated software
                 components to ease the publishing of open data based on
                 linked data and associated best practices. Real-life
                 applications for the Dutch Parliament and the Libraries
                 of Free University of Berlin are presented, followed by
                 a concluding discussion.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Open Government Meets Social Data.",
}

@Article{Irons:2014:DFI,
  author =       "Alastair Irons and Harjinder Singh Lallie",
  title =        "Digital Forensics to Intelligent Forensics",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "3",
  pages =        "584--596",
  day =          "12",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6030584",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/3/584",
  abstract =     "In this paper we posit that current investigative
                 techniques-particularly as deployed by law enforcement,
                 are becoming unsuitable for most types of crime
                 investigation. The growth in cybercrime and the
                 complexities of the types of the cybercrime coupled
                 with the limitations in time and resources, both
                 computational and human, in addressing cybercrime put
                 an increasing strain on the ability of digital
                 investigators to apply the processes of digital
                 forensics and digital investigations to obtain timely
                 results. In order to combat the problems, there is a
                 need to enhance the use of the resources available and
                 move beyond the capabilities and constraints of the
                 forensic tools that are in current use. We argue that
                 more intelligent techniques are necessary and should be
                 used proactively. The paper makes the case for the need
                 for such tools and techniques, and investigates and
                 discusses the opportunities afforded by applying
                 principles and procedures of artificial intelligence to
                 digital forensics intelligence and to intelligent
                 forensics and suggests that by applying new techniques
                 to digital investigations there is the opportunity to
                 address the challenges of the larger and more complex
                 domains in which cybercrimes are taking place.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Contemporary and Future Digital
                 Forensics.",
}

@Article{Perger:2014:GGW,
  author =       "Christoph Perger and Ellsworth LeDrew and Linda See
                 and Steffen Fritz",
  title =        "Geography {Geo-Wiki} in the Classroom: Using
                 Crowdsourcing to Enhance Geographical Teaching",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "597--611",
  day =          "29",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040597",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/597",
  abstract =     "Geo-Wiki is a crowdsourcing tool used to derive
                 information, based on satellite imagery, to validate
                 and enhance global land cover. Around 5000 users are
                 registered, who contribute to different campaigns to
                 collect data across various domains (e.g., agriculture,
                 biomass, human impact, etc.). However, seeing the
                 Earth's surface from above does not provide all of the
                 necessary information for understanding what is
                 happening on the ground. Instead, we need to enhance
                 this experience with local knowledge or with additional
                 information, such as geo-located photographs of surface
                 features with annotation. The latest development in
                 enhancing Geo-Wiki in this context has been achieved
                 through collaboration with the University of Waterloo
                 to set up a separate branch called Geography Geo-Wiki
                 for use in undergraduate teaching. We provide the
                 pedagogical objectives for this branch and describe two
                 modules that we have introduced in first and third year
                 Physical Geography classes. The majority of the
                 feedback was positive and in, many cases, was part of
                 what the student liked best about the course. Future
                 plans include the development of additional assignments
                 for the study of environmental processes using Geo-Wiki
                 that would engage students in a manner that is very
                 different from that of conventional teaching.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Dalmau:2014:RDM,
  author =       "Francesc Valls Dalmau and Pilar Garcia-Almirall and
                 Ernest Redondo Dom{\'\i}nguez and David Fonseca
                 Escudero",
  title =        "From Raw Data to Meaningful Information: a
                 Representational Approach to Cadastral Databases in
                 Relation to Urban Planning",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "612--639",
  day =          "24",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040612",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/612",
  abstract =     "Digesting the data hose that cities are constantly
                 producing is complex; data is usually structured with
                 different criteria, which makes comparative analysis of
                 multiple cities challenging. However, the publicly
                 available data from the Spanish cadaster contains urban
                 information in a documented format with common
                 semantics for the whole territory, which makes these
                 analyses possible. This paper uses the information
                 about the 3D geometry of buildings, their use and their
                 year of construction, stored in cadastral databases, to
                 study the relation between the built environment (what
                 the city is) and the urban plan (what the city wants to
                 become), translating the concepts of the cadastral data
                 into the semantics of the urban plan. Different
                 representation techniques to better understand the city
                 from the pedestrians' point of view and to communicate
                 this information more effectively are also discussed.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Geographic Information System
                 (Semantic GIS).",
}

@Article{Batita:2014:TCF,
  author =       "Wided Batita and St{\'e}phane Roche and Yvan
                 B{\'e}dard and Claude Caron",
  title =        "Towards a Conceptual Framework for {WikiGIS}",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "640--672",
  day =          "29",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040640",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/640",
  abstract =     "As an emerging complex concept, GeoDesign requires an
                 innovative theoretical basis, tools, supports and
                 practices. For this reason, we propose a new concept,
                 ``WikiGIS'', designed to answer some dimensions of the
                 GeoDesign process. WikiGIS focuses on the needs of
                 GeoDesign, but we leave the door open for future
                 improvement when tested in other areas that may have
                 additional needs. WikiGIS is built on Web 2.0
                 technologies-and primarily on wiki-to manage the
                 tracking of participants' editing (i.e., managing the
                 contributions history). It also offers GIS functions
                 for geoprocessing and a design-based approach for
                 sketching proposals. One of the main strengths of
                 WikiGIS is its ability to manage the traceability of
                 contributions with an easy and dynamical access, data
                 quality and deltification. The core of this paper
                 consists of presenting a conceptual framework for
                 WikiGIS using UML diagrams. A user interface is
                 presented later to show how our WikiGIS proposal works.
                 This interface is simply a means to illustrate the
                 concepts underlying WikiGIS.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Antonio:2014:GDD,
  author =       "Amy Antonio and David Tuffley",
  title =        "The Gender Digital Divide in Developing Countries",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "673--687",
  day =          "31",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040673",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/673",
  abstract =     "Empirical studies clearly show that women in the
                 developing world have significantly lower technology
                 participation rates than men; a result of entrenched
                 socio-cultural attitudes about the role of women in
                 society. However, as studies are beginning to show,
                 when those women are able to engage with Internet
                 technology, a wide range of personal, family and
                 community benefits become possible. The key to these
                 benefits is on-line education, the access to which sets
                 up a positive feedback loop. This review gives an
                 overview of the digital divide, before focusing
                 specifically on the challenges women in developing
                 countries face in accessing the Internet. Current
                 gender disparities in Internet use will be outlined and
                 the barriers that potentially hinder women's access and
                 participation in the online world will be considered.
                 We will then look at the potential opportunities for
                 women's participation in a global digital society along
                 with a consideration of current initiatives that have
                 been developed to mitigate gender inequity in
                 developing countries. We will also consider a promising
                 avenue for future research.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Digital Inequalities.",
}

@Article{Risse:2014:AAS,
  author =       "Thomas Risse and Elena Demidova and Stefan Dietze and
                 Wim Peters and Nikolaos Papailiou and Katerina Doka and
                 Yannis Stavrakas and Vassilis Plachouras and Pierre
                 Senellart and Florent Carpentier and Amin Mantrach and
                 Bogdan Cautis and Patrick Siehndel and Dimitris
                 Spiliotopoulos",
  title =        "The {ARCOMEM} Architecture for Social- and
                 Semantic-Driven {Web} Archiving",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "688--716",
  day =          "04",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040688",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/688",
  abstract =     "The constantly growing amount ofWeb content and the
                 success of the SocialWeb lead to increasing needs for
                 Web archiving. These needs go beyond the pure
                 preservation of Web pages. Web archives are turning
                 into ``community memories'' that aim at building a
                 better understanding of the public view on, e.g.,
                 celebrities, court decisions and other events. Due to
                 the size of the Web, the traditional ``collect-all''
                 strategy is in many cases not the best method to build
                 Web archives. In this paper, we present the ARCOMEM
                 (From Future Internet 2014, 6 689 Collect-All Archives
                 to Community Memories) architecture and implementation
                 that uses semantic information, such as entities,
                 topics and events, complemented with information from
                 the Social Web to guide a novel Web crawler. The
                 resulting archives are automatically enriched with
                 semantic meta-information to ease the access and allow
                 retrieval based on conditions that involve high-level
                 concepts.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Archiving Community Memories.",
}

@Article{Hatlevik:2014:UMA,
  author =       "Ove Edvard Hatlevik and Karoline T{\o}mte",
  title =        "Using Multilevel Analysis to Examine the Relationship
                 between Upper Secondary Students {Internet} Safety
                 Awareness, Social Background and Academic Aspirations",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "717--734",
  day =          "14",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040717",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/717",
  abstract =     "Since 2009, most Norwegian students in upper secondary
                 have had access to their own personal computer at
                 school. Hence, with the increased access to technology,
                 the importance of online connectedness has increased
                 for adolescents' social interaction and communication.
                 It is, therefore, important to identify and understand
                 the concept of Internet safety among upper secondary
                 school students. A total of 4216 students from 238
                 classrooms in 23 upper secondary schools completed an
                 Internet safety assessment. The aim of the study was to
                 operationalize and measure Internet safety in a school
                 context, and to further examine the factors predicting
                 students' Internet safety awareness and responsibility.
                 Our analysis revealed substantial variation in Internet
                 safety awareness between schools, classrooms and
                 students. Overall, the findings indicate that students'
                 social backgrounds are determining for their
                 development and understanding of Internet safety
                 awareness.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Digital Inequalities.",
}

@Article{Somarakis:2014:PIT,
  author =       "Giorgos Somarakis and Anastasia Stratigea",
  title =        "Public Involvement in Taking Legislative Action as to
                 the Spatial Development of the Tourist Sector in
                 {Greece} --- The {``OpenGov''} Platform Experience",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "735--759",
  day =          "25",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040735",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/735",
  abstract =     "By the Aarhus Convention (1998) it is recognized the
                 right of citizens to get access to and influence
                 decision-making in respect to issues affecting the
                 state of the environment. More specifically, in Article
                 8 it is stated that public authorities are forced to
                 engage public participation when preparing regulations
                 or legally binding rules that have a significant
                 environmental impact. Towards this end, Information and
                 Communication Technologies (ICTs) and their
                 applications have considerably expanded the potential
                 of planners and decision makers to interact with
                 stakeholders and the public and engage them in
                 participatory processes through ICTs-enabled platforms.
                 The focus of the present paper is on the context of
                 public consultation in taking legislative action as to
                 the spatial development of the tourist sector in
                 Greece. It consists of three parts: the first part,
                 where the context of engaging the public in
                 governmental decision-making in Greece is discussed,
                 following the Open Government Partnership (OGP)
                 initiative; the second part, presenting the steps of
                 the ``OpenGov'' online platform, designed for gathering
                 public knowledge to further improve legislative efforts
                 and policy; and the third part, elaborating on the
                 experience gained by the use of the ``OpenGov''
                 platform for decision-making on the spatial development
                 of the tourist sector in Greece.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue NeoGeography and WikiPlanning 2014.",
}

@Article{Shepherd:2014:RRS,
  author =       "Lynsay A. Shepherd and Jacqueline Archibald and Robert
                 Ian Ferguson",
  title =        "Reducing Risky Security Behaviours: Utilising
                 Affective Feedback to Educate Users",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "760--772",
  day =          "27",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040760",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/760",
  abstract =     "Despite the number of tools created to help end-users
                 reduce risky security behaviours, users are still
                 falling victim to online attacks. This paper proposes a
                 browser extension utilising affective feedback to
                 provide warnings on detection of risky behaviour. The
                 paper provides an overview of behaviour considered to
                 be risky, explaining potential threats users may face
                 online. Existing tools developed to reduce risky
                 security behaviours in end-users have been compared,
                 discussing the success rates of various methodologies.
                 Ongoing research is described which attempts to educate
                 users regarding the risks and consequences of poor
                 security behaviour by providing the appropriate
                 feedback on the automatic recognition of risky
                 behaviour. The paper concludes that a solution
                 utilising a browser extension is a suitable method of
                 monitoring potentially risky security behaviour.
                 Ultimately, future work seeks to implement an affective
                 feedback mechanism within the browser extension with
                 the aim of improving security awareness.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Developments in Cybercrime and
                 Cybercrime Mitigation.",
}

@Article{Brainin:2014:ITO,
  author =       "Esther Brainin and Efrat Neter",
  title =        "Inside Technology: Opening the Black Box of Health ---
                 {Website} Configuration and Content Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "4",
  pages =        "773--799",
  day =          "10",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6040773",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:52 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/4/773",
  abstract =     "Given the existing divide related to Internet skills
                 and types of Internet use, it is safe to assume that a
                 large proportion of the population uses the Internet
                 for health purposes in a partially productive fashion.
                 We suggest that in addition to user characteristics,
                 another factor that inhibits productive Internet use,
                 and thus contributes to the existing gap, is related to
                 the ways in which the technology is configured. The
                 goal of this study was to explore the processes that
                 webmasters and content managers use for constructing
                 and producing, or selecting content, for health
                 websites. Interviews conducted with 23 website builders
                 and managers of websites that represent public and
                 non-public health organizations revealed that they do
                 not plan or conduct activities for content needs
                 elicitation, either in the design stage or on an
                 ongoing basis. Rather, these professionals rely on a
                 ``self-embodiment'' standard, whereby their and their
                 cohorts' expectations determine the quality and
                 functionality of the websites' structure and content.
                 Hence, target groups beyond their social sphere are
                 disregarded, and instead of new opportunities, new
                 cleavages are created. We recommended that government,
                 public and non-public stakeholders work to establish
                 construction standards, to ensure that health websites
                 meet the needs of varied end-user populations.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Digital Inequalities.",
}

@Article{Laurini:2015:GOG,
  author =       "Robert Laurini",
  title =        "Geographic Ontologies, Gazetteers and
                 Multilingualism",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "1",
  pages =        "1--23",
  day =          "05",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/1/1",
  abstract =     "Different languages imply different visions of space,
                 so that terminologies are different in geographic
                 ontologies. In addition to their geometric shapes,
                 geographic features have names, sometimes different in
                 diverse languages. In addition, the role of gazetteers,
                 as dictionaries of place names (toponyms), is to
                 maintain relations between place names and location.
                 The scope of geographic information retrieval is to
                 search for geographic information not against a
                 database, but against the whole Internet: but the
                 Internet stores information in different languages, and
                 it is of paramount importance not to remain stuck to a
                 unique language. In this paper, our first step is to
                 clarify the links between geographic objects as
                 computer representations of geographic features,
                 ontologies and gazetteers designed in various
                 languages. Then, we propose some inference rules for
                 matching not only types, but also relations in
                 geographic ontologies with the assistance of
                 gazetteers.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Geographic Information System
                 (Semantic GIS).",
}

@Article{Office:2015:ARF,
  author =       "Future Internet Editorial Office",
  title =        "Acknowledgement to Reviewers of {{\booktitle{Future
                 Internet}}} in 2014",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "1",
  pages =        "24--25",
  day =          "09",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7010024",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/1/24",
  abstract =     "The significance of approaches to technology-enhanced
                 learning (TEL) has increased rapidly during the last
                 few years. Nowadays in education different approaches
                 such as game-based learning, web-based learning,
                 video-based online courses, and many others are used on
                 a daily basis. However, what defines the success of
                 technology-enhanced learning approaches and how can
                 such approaches be developed in a structured way?
                 Furthermore, what different aspects have to be
                 considered while doing so? To answer these questions,
                 4567 publications were analyzed in this present
                 literature review in order to recognize the different
                 aspects of implementing technology-enhanced learning
                 approaches. Finally, 20 categories are defined in four
                 main areas that summarize all the aspects in the field
                 of technology-enhanced learning. Moreover, the study
                 also reveals research areas that are important but
                 hardly investigated in the observed journals of this
                 study.",
  acknowledgement = ack-nhfb,
}

@Article{Schweighofer:2015:ACW,
  author =       "Patrick Schweighofer and Martin Ebner",
  title =        "Aspects to Be Considered when Implementing
                 Technology-Enhanced Learning Approaches: a Literature
                 Review",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "1",
  pages =        "26--49",
  day =          "03",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7010026",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/1/26",
  abstract =     "The significance of approaches to technology-enhanced
                 learning (TEL) has increased rapidly during the last
                 few years. Nowadays in education different approaches
                 such as game-based learning, web-based learning,
                 video-based online courses, and many others are used on
                 a daily basis. However, what defines the success of
                 technology-enhanced learning approaches and how can
                 such approaches be developed in a structured way?
                 Furthermore, what different aspects have to be
                 considered while doing so? To answer these questions,
                 4567 publications were analyzed in this present
                 literature review in order to recognize the different
                 aspects of implementing technology-enhanced learning
                 approaches. Finally, 20 categories are defined in four
                 main areas that summarize all the aspects in the field
                 of technology-enhanced learning. Moreover, the study
                 also reveals research areas that are important but
                 hardly investigated in the observed journals of this
                 study.",
  acknowledgement = ack-nhfb,
}

@Article{Huang:2015:PDE,
  author =       "Yi-Ting Huang",
  title =        "Participatory Design to Enhance {ICT} Learning and
                 Community Attachment: a Case Study in Rural {Taiwan}",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "1",
  pages =        "50--66",
  day =          "02",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7010050",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/1/50",
  abstract =     "This study used observation and interviews with
                 participants in ``PunCar Action'' to understand how
                 participatory design methods can be applied to the
                 education of rural individuals in information and
                 communication technology (ICT). PunCar Action is a
                 volunteer program in which ICT educators tour the rural
                 communities of Taiwan, offering courses on the use of
                 digital technology. This paper makes three
                 contributions: First, we found that participatory
                 design is an excellent way to teach ICT and Web 2.0
                 skills, co-create community blogs, and sustain
                 intrinsic motivation to use Web applications. Second,
                 PunCar Action provides an innovative bottom-up
                 intergenerational ICT education model with high
                 penetrability capable of enhancing the confidence of
                 rural residents in the use of ICT. Third, the content
                 of basic courses was based on applications capable of
                 making the lives of elderly individuals more
                 convenient, and the advanced course was based on the
                 co-creation of community blogs aimed at reviving the
                 core functions of communities and expanding local
                 industry. Our research was conducted with the use of a
                 non-quantitative index to measure ICT learning
                 performance of participants from a rural community. The
                 results show that PunCar Action emphasizes
                 interpersonal communication and informational
                 applications and creates a collaborative process that
                 encourages rural residents to take action to close the
                 digital divide.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Digital Inequalities.",
}

@Article{Gan:2015:SNP,
  author =       "Diane Gan and Lily R. Jenkins",
  title =        "Social Networking Privacy --- Who's Stalking You?",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "1",
  pages =        "67--93",
  day =          "23",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7010067",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/1/67",
  abstract =     "This research investigates the privacy issues that
                 exist on social networking sites. It is reasonable to
                 assume that many Twitter users are unaware of the
                 dangers of uploading a tweet to their timeline which
                 can be seen by anyone. Enabling geo-location tagging on
                 tweets can result in personal information leakage,
                 which the user did not intend to be public and which
                 can seriously affect that user's privacy and anonymity
                 online. This research demonstrates that key information
                 can easily be retrieved using the starting point of a
                 single tweet with geo-location turned on. A series of
                 experiments have been undertaken to determine how much
                 information can be obtained about a particular
                 individual using only social networking sites and
                 freely available mining tools. The information gathered
                 enabled the target subjects to be identified on other
                 social networking sites such as Foursquare, Instagram,
                 LinkedIn, Facebook and Google+, where more personal
                 information was leaked. The tools used are discussed,
                 the results of the experiments are presented and the
                 privacy implications are examined.",
  acknowledgement = ack-nhfb,
}

@Article{Guillen:2015:IIS,
  author =       "Edward Guillen and Jeisson S{\'a}nchez and Rafael
                 Paez",
  title =        "Inefficiency of {IDS} Static Anomaly Detectors in
                 Real-World Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "94--109",
  day =          "06",
  month =        may,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020094",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/94",
  abstract =     "A wide range of IDS implementations with anomaly
                 detection modules have been deployed. In general, those
                 modules depend on intrusion knowledge databases, such
                 as Knowledge Discovery Dataset (KDD99), Center for
                 Applied Internet Data Analysis (CAIDA) or Community
                 Resource for Archiving Wireless Data at Dartmouth
                 (CRAWDAD), among others. Once the database is analyzed
                 and a machine learning method is employed to generate
                 detectors, some classes of new detectors are created.
                 Thereafter, detectors are supposed to be deployed in
                 real network environments in order to achieve detection
                 with good results for false positives and detection
                 rates. Since the traffic behavior is quite different
                 according to the user's network activities over
                 available services, restrictions and applications, it
                 is supposed that behavioral-based detectors are not
                 well suited to all kind of networks. This paper
                 presents the differences of detection results between
                 some network scenarios by applying traditional
                 detectors that were calculated with artificial neural
                 networks. The same detector is deployed in different
                 scenarios to measure the efficiency or inefficiency of
                 static training detectors.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet Security.",
}

@Article{Pahlevan:2015:DEC,
  author =       "Atousa Pahlevan and Jean-Luc Duprat and Alex Thomo and
                 Hausi M{\"u}ller",
  title =        "{Dynamis}: Effective Context-Aware {Web} Service
                 Selection Using Dynamic Attributes",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "110--139",
  day =          "12",
  month =        may,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020110",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/110",
  abstract =     "Quality web service discovery requires narrowing the
                 search space from an overwhelming set of services down
                 to the most relevant ones, while matching the
                 consumer's request. Today, the ranking of services only
                 considers static attributes or snapshots of current
                 attribute values, resulting in low-quality search
                 results. To satisfy the user's need for timely,
                 well-chosen web services, we ought to consider quality
                 of service attributes. The problem is that dynamic
                 attributes can be difficult to measure, frequently
                 fluctuate, are context-sensitive and depend on
                 environmental factors, such as network availability at
                 query time. In this paper, we propose the Dynamis
                 algorithm to address these challenges effectively.
                 Dynamis is based on well-established database
                 techniques, such as skyline and aggregation. We
                 illustrate our approach using observatory telescope web
                 services and experimentally evaluate it using stock
                 market data. In our evaluation, we show significant
                 improvement in service selection over existing
                 techniques.",
  acknowledgement = ack-nhfb,
}

@Article{Laneuville:2015:QAU,
  author =       "Odette Laneuville and Dorota Sikora",
  title =        "Quantitative Analysis of the Usage of a Pedagogical
                 Tool Combining Questions Listed as Learning Objectives
                 and Answers Provided as Online Videos",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "140--151",
  day =          "15",
  month =        may,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020140",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/140",
  abstract =     "To improve the learning of basic concepts in molecular
                 biology of an undergraduate science class, a
                 pedagogical tool was developed, consisting of learning
                 objectives listed at the end of each lecture and
                 answers to those objectives made available as videos
                 online. The aim of this study was to determine if the
                 pedagogical tool was used by students as instructed,
                 and to explore students' perception of its usefulness.
                 A combination of quantitative survey data and measures
                 of online viewing was used to evaluate the usage of the
                 pedagogical practice. A total of 77 short videos linked
                 to 11 lectures were made available to 71 students, and
                 64 completed the survey. Using online tracking tools, a
                 total of 7046 views were recorded. Survey data
                 indicated that most students (73.4\%) accessed all
                 videos, and the majority (98.4\%) found the videos to
                 be useful in assisting their learning. Interestingly,
                 approximately half of the students (53.1\%) always or
                 most of the time used the pedagogical tool as
                 recommended, and consistently answered the learning
                 objectives before watching the videos. While the
                 proposed pedagogical tool was used by the majority of
                 students outside the classroom, only half used it as
                 recommended limiting the impact on students'
                 involvement in the learning of the material presented
                 in class.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue eLearning.",
}

@Article{Yamashita:2015:RTH,
  author =       "Ryoma Yamashita and Kazumasa Takami",
  title =        "Receiver-Triggered Handshake Protocol for {DTN} in
                 Disaster Area",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "152--169",
  day =          "27",
  month =        may,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020152",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/152",
  abstract =     "When a disaster hits a wide area, communication
                 services for public use will be rendered unavailable.
                 This will make it difficult to confirm the safety of
                 people in the disaster area. A solution to this problem
                 is to form delay/disruption tolerant networks (DTN)
                 using mobile terminals of victims, those of rescuers,
                 who serve as information carriers, and terminals
                 (servers) in shelters. In this paper, we propose using
                 a receiver-triggered handshake protocol for
                 communication between these terminals. We have
                 developed the bundle layer protocol for this handshake
                 method. The proposed method has been implemented on a
                 network simulator to build an evaluation environment.
                 The disaster area has been modeled on an area around
                 Shinjuku Station in Tokyo. Victims are randomly
                 distributed in the area. We have compared the proposed
                 method with Epidemic Routing and Spray and Wait in
                 terms of the delivery rate at which messages reach
                 their destinations, and the length of time taken for
                 messages to reach their destinations. We have found
                 that the delivery rate of the three methods are, more
                 or less, the same, but that the proposed method is
                 superior to the other two methods in terms of storage
                 usage and battery consumption of terminals, and the
                 number of bundles generated in the network.",
  acknowledgement = ack-nhfb,
}

@Article{Smith:2015:OSP,
  author =       "Marlene A. Smith",
  title =        "Output from Statistical Predictive Models as Input to
                 {eLearning} Dashboards",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "170--183",
  day =          "02",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020170",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/170",
  abstract =     "We describe how statistical predictive models might
                 play an expanded role in educational analytics by
                 giving students automated, real-time information about
                 what their current performance means for eventual
                 success in eLearning environments. We discuss how an
                 online messaging system might tailor information to
                 individual students using predictive analytics. The
                 proposed system would be data-driven and quantitative;
                 e.g., a message might furnish the probability that a
                 student will successfully complete the certificate
                 requirements of a massive open online course. Repeated
                 messages would prod underperforming students and alert
                 instructors to those in need of intervention.
                 Administrators responsible for accreditation or
                 outcomes assessment would have ready documentation of
                 learning outcomes and actions taken to address
                 unsatisfactory student performance. The article's brief
                 introduction to statistical predictive models sets the
                 stage for a description of the messaging system.
                 Resources and methods needed to develop and implement
                 the system are discussed.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue eLearning.",
}

@Article{Knapp:2015:UEM,
  author =       "Herschel Knapp and Sanjog Pangarkar",
  title =        "Utilizing the {ECHO} Model in the Veterans Health
                 Affairs System: Guidelines for Setup, Operations and
                 Preliminary Findings",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "184--195",
  day =          "08",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020184",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/184",
  abstract =     "Background: In 2011, the Veterans Health
                 Administration (VHA) consulted with the Project ECHO
                 (Extension for Community Healthcare Outcomes) team at
                 the University of New Mexico, Albuquerque, to reproduce
                 their successful model within the VHA. Methods: The VHA
                 launched SCAN-ECHO (Specialty Care Access
                 Network-Extension for Community Healthcare Outcomes), a
                 multisite videoconferencing system to conduct live
                 clinical consultations between specialists at a VHA
                 Medical Center (hospital) and primary care providers
                 stationed at satellite VHA CBOCs (Community-Based
                 Outpatient Clinic). Results: Analysis of the first
                 three years rendered a mean attendee satisfaction of
                 89.53\% and a consultation satisfaction score of
                 88.10\%. About half of the SCAN-ECHO consultations
                 resulted in patients receiving their treatment from
                 their local primary care providers; the remaining half
                 were referred to the VHA Medical Center when the
                 treatment involved equipment or services not available
                 at the CBOCs (e.g., MRI, surgery). Conclusion: This
                 paper details the setup, operation logistics and
                 preliminary findings, suggesting that SCAN-ECHO is a
                 viable model for providing quality specialty clinical
                 consultation service, prompter access to care, reduced
                 commutes and continuing education. Additionally, the
                 use of a secured Internet-based videoconferencing
                 system that supports connectivity to multiple (mobile)
                 devices could expand the utilization of this service.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue eLearning.",
}

@Article{Davaasambuu:2015:SOH,
  author =       "Battulga Davaasambuu and Keping Yu and Takuro Sato",
  title =        "Self-Optimization of Handover Parameters for Long-Term
                 Evolution with Dual Wireless Mobile Relay Nodes",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "2",
  pages =        "196--213",
  day =          "11",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7020196",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:53 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/2/196",
  abstract =     "In recent years, train passengers have been
                 transferring increasing amounts of data using mobile
                 devices. Wireless networks with mobile relay nodes
                 support broadband wireless communications for
                 passengers of such vehicles using backhaul links.
                 However, the mobility management entity reuses the
                 handover of existing user equipment, resulting in the
                 handover of the Long-Term Evolution network being
                 unsuitable for user equipment within the cabins of
                 vehicles traveling at high speed. In this paper, we
                 propose a self-optimizing handover hysteresis scheme
                 with dual mobile relay nodes for wireless networks in
                 high-speed mobile environments. The proposed mechanism
                 tunes the hysteresis and cell individual offset
                 handover parameters based on the velocity of the
                 vehicle and the handover performance indicator, which
                 affects the handover triggering decision and
                 performance. The results of simulations conducted in
                 which the performance of the proposed scheme was
                 compared to that of an existing scheme show that the
                 proposed scheme can reduce the number of radio link
                 failures and service interruptions during handover
                 procedures.",
  acknowledgement = ack-nhfb,
}

@Article{Cheng:2015:TPA,
  author =       "Xiu-Zhi Cheng and Da-Rong Zhu and Shen Zhang and Ping
                 He",
  title =        "Tracking Positioning Algorithm for Direction of
                 Arrival Based on Direction Lock Loop",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "214--224",
  day =          "26",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030214",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/214",
  abstract =     "In order to solve the problem of poor real-time
                 performance, low accuracy and high computational
                 complexity in the traditional process of locating and
                 tracking of Direction of Arrival (DOA) of moving
                 targets, this paper proposes a DOA algorithm based on
                 the Direction Lock Loop (DILL) which adopts Lock Loop
                 structure to realize the estimation and location of DOA
                 and can adjust the direction automatically along with
                 the changes of a signal's angular variation to track
                 the position of the signal. Meanwhile, to reduce the
                 influence of nonlinearity and noise on its performance,
                 the UKF filter is designed for eliminating interference
                 of the estimated target signal to improve accuracy of
                 the signal tracking and stability of the system.
                 Simulation results prove that the algorithm can not
                 only get a high resolution DOA estimate signal, but can
                 also locate and track multiple mobile targets
                 effectively with enhanced accuracy, efficiency and
                 stability.",
  acknowledgement = ack-nhfb,
}

@Article{Aman:2015:EEP,
  author =       "Waqas Aman and Einar Snekkenes",
  title =        "{EDAS}: An Evaluation Prototype for Autonomic
                 Event-Driven Adaptive Security in the {Internet of
                 Things}",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "225--256",
  day =          "08",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030225",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/225",
  abstract =     "In Internet of Things (IoT), the main driving
                 technologies are considered to be tiny sensory objects.
                 These objects cannot host traditional preventive and
                 detective technologies to provide protection against
                 the increasing threat sophistication. Furthermore,
                 these solutions are limited to analyzing particular
                 contextual information, for instance network
                 information or files, and do not provide holistic
                 context for risk analysis and response. Analyzing a
                 part of a situation may lead to false alarms and later
                 to unnecessary and incorrect configurations. To
                 overcome these concerns, we proposed an event-driven
                 adaptive security (EDAS) model for IoT. EDAS aims to
                 observe security events (changes) generated by various
                 things in the monitored IoT environment, investigates
                 any intentional or unintentional risks associated with
                 the events and adapts to it autonomously. It correlates
                 different events in time and space to reduce any false
                 alarms and provides a mechanism to predict attacks
                 before they are realized. Risks are responded to
                 autonomically by utilizing a runtime adaptation
                 ontology. The mitigation action is chosen after
                 assessing essential information, such as the risk
                 faced, user preferences, device capabilities and
                 service requirements. Thus, it selects an optimal
                 mitigation action in a particular adverse situation.
                 The objective of this paper is to investigate EDAS
                 feasibility and its aptitude as a real-world prototype
                 in a remote patient monitoring context. It details how
                 EDAS can be a practical choice for IoT-eHealth in terms
                 of the security, design and implementation features it
                 offers as compared to traditional security controls. We
                 have explained the prototype's major components and
                 have highlighted the key technical challenges.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet Security.",
}

@Article{Zaidi:2015:VIS,
  author =       "Kamran Zaidi and Muttukrishnan Rajarajan",
  title =        "Vehicular {Internet}: Security \& Privacy Challenges
                 and Opportunities",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "257--275",
  day =          "24",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030257",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/257",
  abstract =     "The vehicular internet will drive the future of
                 vehicular technology and intelligent transportation
                 systems (ITS). Whether it is road safety, infotainment,
                 or driver-less cars, the vehicular internet will lay
                 the foundation for the future of road travel.
                 Governments and companies are pursuing driver-less
                 vehicles as they are considered to be more reliable
                 than humans and, therefore, safer. The vehicles today
                 are not just a means of transportation but are also
                 equipped with a wide range of sensors that provide
                 valuable data. If vehicles are enabled to share data
                 that they collect with other vehicles or authorities
                 for decision-making and safer driving, they thereby
                 form a vehicular network. However, there is a lot at
                 stake in vehicular networks if they are compromised.
                 With the stakes so high, it is imperative that the
                 vehicular networks are secured and made resilient to
                 any attack or attempt that may have serious
                 consequences. The vehicular internet can also be the
                 target of a cyber attack, which can be devastating. In
                 this paper, the opportunities that the vehicular
                 internet offers are presented and then various security
                 and privacy aspects are discussed and some solutions
                 are presented.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet Security.",
}

@Article{Floris:2015:SMR,
  author =       "Roberta Floris and Corrado Zoppi",
  title =        "Social Media-Related Geographic Information in the
                 Context of Strategic Environmental Assessment of
                 Municipal Masterplans: a Case Study Concerning
                 {Sardinia} (Italy)",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "276--293",
  day =          "07",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030276",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/276",
  abstract =     "This paper proposes a discussion concerning the use of
                 social media-related geographic information in the
                 context of the strategic environmental assessment (SEA)
                 of Sardinian Municipal masterplans (MMPs). We show that
                 this kind of information improves, substantially, the
                 SEA process since it provides planners, evaluators, and
                 the local communities with information retrieved from
                 social media that would have not been available
                 otherwise. This information integrates authoritative
                 data collection, which comes from official sources, and
                 enlightens tastes and preferences of the users of
                 services and infrastructure, and their expectations
                 concerning their spatial organization. A methodological
                 approach related to the collection of social
                 media-related geographic information is implemented and
                 discussed with reference to the urban context of the
                 city of Cagliari (Sardinia, Italy). The results are
                 very effective in terms of provision of information,
                 which may possibly increase the spatial knowledge
                 available for planning policy definition and
                 implementation. In this perspective, this kind of
                 information discloses opportunities for building
                 analytical scenarios related to urban and regional
                 planning and it offers useful suggestions for
                 sustainable development based on tourism strategies.",
  acknowledgement = ack-nhfb,
}

@Article{Tuffley:2015:EEO,
  author =       "David Tuffley and Amy Antonio",
  title =        "Enhancing Educational Opportunities with
                 Computer-Mediated Assessment Feedback",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "294--306",
  day =          "11",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030294",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/294",
  abstract =     "As internet technologies make their way into
                 developing areas, so too does the possibility of
                 education and training being delivered to the people
                 living in those previously unserved areas. The growing
                 catalogue of free, high quality courseware, when
                 combined with the newly acquired means of delivery,
                 creates the potential for millions of people in the
                 developing world to acquire a good education. Yet a
                 good education obviously requires more than simply
                 delivering information; students must also receive high
                 quality feedback on their assessments. They must be
                 told how their performance compares with the ideal, and
                 be shown how to close the gap between the two. However,
                 delivering high quality feedback is labor-intensive,
                 and therefore expensive, and has long been recognized
                 as a problematic issue by educators. This paper
                 outlines a case study that uses a Learning Management
                 System (LMS) to efficiently deliver detailed feedback
                 that is informed by the principles of best practice. We
                 make the case that the efficiencies of this method
                 allow for large-scale courses with thousands of
                 enrolments that are accessible to developing and
                 developed areas alike. We explore the question; is
                 computer-mediated feedback delivery efficient and
                 effective and might it be applied to large-scale
                 courses at low-cost?",
  acknowledgement = ack-nhfb,
}

@Article{Lu:2015:LJW,
  author =       "Cunbo Lu and Liangtian Wan",
  title =        "A Low-Jitter Wireless Transmission Based on Buffer
                 Management in Coding-Aware Routing",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "307--328",
  day =          "31",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030307",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/307",
  abstract =     "It is significant to reduce packet jitter for
                 real-time applications in a wireless network. Existing
                 coding-aware routing algorithms use the opportunistic
                 network coding (ONC) scheme in a packet coding
                 algorithm. The ONC scheme never delays packets to wait
                 for the arrival of a future coding opportunity. The
                 loss of some potential coding opportunities may degrade
                 the contribution of network coding to jitter
                 performance. In addition, most of the existing
                 coding-aware routing algorithms assume that all flows
                 participating in the network have equal rate. This is
                 unrealistic, since multi-rate environments often
                 appear. To overcome the above problem and expand
                 coding-aware routing to multi-rate scenarios, from the
                 view of data transmission, we present a low-jitter
                 wireless transmission algorithm based on buffer
                 management (BLJCAR), which decides packets in coding
                 node according to the queue-length based threshold
                 policy instead of the regular ONC policy as used in
                 existing coding-aware routing algorithms. BLJCAR is a
                 unified framework to merge the single rate case and
                 multiple rate case. Simulations results show that the
                 BLJCAR algorithm embedded in coding-aware routing
                 outperforms the traditional ONC policy in terms of
                 jitter, packet delivery delay, packet loss ratio and
                 network throughput in network congestion in any traffic
                 rates.",
  acknowledgement = ack-nhfb,
}

@Article{Li:2015:DRM,
  author =       "Hua Li and Huan Wang and Wenqing Yin and Yongwei Li
                 and Yan Qian and Fei Hu",
  title =        "Development of a Remote Monitoring System for Henhouse
                 Environment Based on {IoT} Technology",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "329--341",
  day =          "10",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030329",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/329",
  abstract =     "To monitor multiple environmental factors of henhouses
                 in modern chicken farms, a henhouse online monitoring
                 system based on wireless sensor network was developed
                 using wireless sensor technology and computer network
                 technology. Sensor data compensation and correction
                 were designed to be achieved using software and data
                 fitting methods, data reliable transmission achieved
                 using a data loss recovery strategy, and data missing
                 during monitoring addressed using a self-decision and
                 online filling method. Operation test of the system
                 showed that: The system was economic and reliable; it
                 enabled wireless monitoring and Web display of the
                 environmental factors of a henhouse; and the root mean
                 square errors (RMSEs) between the estimated values from
                 the self-decision and on-line filling method and
                 experimental values of the four environmental factors
                 were 0.1698, 3.0859, 77 and 0.094, respectively,
                 indicative of high estimation accuracy. The system can
                 provide support for modern management of henhouses and
                 can be transplanted to related monitoring scenarios in
                 the agricultural field.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet of Things.",
}

@Article{Singh:2015:EST,
  author =       "Dilraj Singh and Amardeep Singh",
  title =        "Enhanced Secure Trusted {AODV} {(ESTA)} Protocol to
                 Mitigate Blackhole Attack in Mobile Ad Hoc Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "342--362",
  day =          "23",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030342",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/342",
  abstract =     "The self-organizing nature of the Mobile Ad hoc
                 Networks (MANETs) provide a communication channel
                 anywhere, anytime without any pre-existing network
                 infrastructure. However, it is exposed to various
                 vulnerabilities that may be exploited by the malicious
                 nodes. One such malicious behavior is introduced by
                 blackhole nodes, which can be easily introduced in the
                 network and, in turn, such nodes try to crumble the
                 working of the network by dropping the maximum data
                 under transmission. In this paper, a new protocol is
                 proposed which is based on the widely used Ad hoc
                 On-Demand Distance Vector (AODV) protocol, Enhanced
                 Secure Trusted AODV (ESTA), which makes use of multiple
                 paths along with use of trust and asymmetric
                 cryptography to ensure data security. The results,
                 based on NS-3 simulation, reveal that the proposed
                 protocol is effectively able to counter the blackhole
                 nodes in three different scenarios.",
  acknowledgement = ack-nhfb,
}

@Article{Heller:2015:SID,
  author =       "Alfred Heller",
  title =        "The Sensing {Internet}--- a Discussion on Its Impact
                 on Rural Areas",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "363--371",
  day =          "28",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040363",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/363",
  abstract =     "This paper is based on the experience of introducing
                 wireless sensor networks (WSNs) into the building
                 industry in Denmark and in a rural area of Greenland.
                 There are very real advantages in the application of
                 the technology and its consequences for the life cycle
                 operation of the building sector. Sensor networks can
                 be seen as an important part of the Internet of Things
                 and may even constitute an Internet of Sensors, since
                 the communication layers can differ from the Internet
                 standards. The current paper describes the case for
                 application, followed by a discussion of the observed
                 adaptive advantages and consequences of the technology.
                 Essentially, WSNs constitute a highly sophisticated
                 technology that is more robust in a rural context due
                 to its extremely simple installation procedures (plug
                 and play) allowing the use of local less-skilled
                 labour, and the possibility of reconfiguring and
                 repurposing its use remotely.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet of Things.",
}

@Article{Boulos:2015:TIF,
  author =       "Maged N. Kamel Boulos and Abdulslam Yassine and
                 Shervin Shirmohammadi and Chakkrit Snae Namahoot and
                 Michael Br{\"u}ckner",
  title =        "Towards an ``{Internet of Food}'': Food Ontologies for
                 the {Internet of Things}",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "372--392",
  day =          "01",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040372",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/372",
  abstract =     "Automated food and drink recognition methods connect
                 to cloud-based lookup databases (e.g., food item
                 barcodes, previously identified food images, or
                 previously classified NIR (Near Infrared) spectra of
                 food and drink items databases) to match and identify a
                 scanned food or drink item, and report the results back
                 to the user. However, these methods remain of limited
                 value if we cannot further reason with the identified
                 food and drink items, ingredients and
                 quantities/portion sizes in a proposed meal in various
                 contexts; i.e., understand from a semantic perspective
                 their types, properties, and interrelationships in the
                 context of a given user's health condition and
                 preferences. In this paper, we review a number of
                 ``food ontologies'', such as the Food Products
                 Ontology/FOODpedia (by Kolchin and Zamula), Open Food
                 Facts (by Gigandet et al.), FoodWiki (Ontology-driven
                 Mobile Safe Food Consumption System by Celik),
                 FOODS-Diabetes Edition (A Food-Oriented Ontology-Driven
                 System by Snae Namahoot and Bruckner), and AGROVOC
                 multilingual agricultural thesaurus (by the UN Food and
                 Agriculture Organization-FAO). These food ontologies,
                 with appropriate modifications (or as a basis, to be
                 added to and further expanded) and together with other
                 relevant non-food ontologies (e.g., about
                 diet-sensitive disease conditions), can supplement the
                 aforementioned lookup databases to enable progression
                 from the mere automated identification of food and
                 drinks in our meals to a more useful application
                 whereby we can automatically reason with the identified
                 food and drink items and their details (quantities and
                 ingredients/bromatological composition) in order to
                 better assist users in making the correct, healthy food
                 and drink choices for their particular health
                 condition, age, body weight/BMI (Body Mass Index),
                 lifestyle and preferences, etc.",
  acknowledgement = ack-nhfb,
}

@Article{Fiore:2015:EIB,
  author =       "Ugo Fiore and Francesco Rossi",
  title =        "Embedding an Identity-Based Short Signature as a
                 Digital Watermark",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "393--404",
  day =          "23",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040393",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/393",
  abstract =     "Digital watermarking aims at protecting multimedia
                 content by hiding into it some data that can be used
                 for such purposes as, for example, intellectual
                 property protection or integrity control. Sometimes,
                 the owner of an image would prefer to not transmit,
                 publish, or hand to a cloud service the original image,
                 but rather an encrypted version of it. Encrypted images
                 allow for less embedding room with respect to their
                 unencrypted counterparts, as there is less spatial
                 correlation to leverage upon. An architecture for
                 embedding as payload the digital signature of an
                 encrypted image, by means of a reversible watermarking
                 technique, is presented in this work. A noteworthy
                 point is the use of an identity-based cryptosystem to
                 avoid certificate management and improve performance.
                 In addition, the use of IBS-1, a recently proposed
                 signature scheme, allows for a reduction in the size of
                 the signature.",
  acknowledgement = ack-nhfb,
}

@Article{Tian:2015:DTR,
  author =       "Bo Tian and Kecheng Liu and Yuanzhong Chen",
  title =        "Dynamical Trust and Reputation Computation Model for
                 {B2C} E-Commerce",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "405--428",
  day =          "27",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040405",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/405",
  abstract =     "Trust is one of the most important factors that
                 influence the successful application of network service
                 environments, such as e-commerce, wireless sensor
                 networks, and online social networks. Computation
                 models associated with trust and reputation have been
                 paid special attention in both computer societies and
                 service science in recent years. In this paper, a
                 dynamical computation model of reputation for B2C
                 e-commerce is proposed. Firstly, conceptions associated
                 with trust and reputation are introduced, and the
                 mathematical formula of trust for B2C e-commerce is
                 given. Then a dynamical computation model of reputation
                 is further proposed based on the conception of trust
                 and the relationship between trust and reputation. In
                 the proposed model, classical varying processes of
                 reputation of B2C e-commerce are discussed.
                 Furthermore, the iterative trust and reputation
                 computation models are formulated via a set of
                 difference equations based on the closed-loop feedback
                 mechanism. Finally, a group of numerical simulation
                 experiments are performed to illustrate the proposed
                 model of trust and reputation. Experimental results
                 show that the proposed model is effective in simulating
                 the dynamical processes of trust and reputation for B2C
                 e-commerce.",
  acknowledgement = ack-nhfb,
}

@Article{Freina:2015:SEI,
  author =       "Laura Freina and Rosa Bottino and Michela Ott and
                 Filippo Costa",
  title =        "Social Empowerment of Intellectually Impaired through
                 a Cloud Mobile System",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "429--444",
  day =          "17",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040429",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/429",
  abstract =     "There is not a unique definition of ``empowerment'',
                 nevertheless the idea that it involves, on the one
                 hand, people having control over their own lives and,
                 on the other, some social aspects seems to be a common
                 characteristic. Most authors recognize three levels of
                 empowerment: individual, group, and community level,
                 which are interconnected and changes at one level
                 influence the others. Enhancing individual competence
                 and self-esteem has a direct effect on the control of
                 one's own life and, in turn, on the social components
                 of empowerment. In this paper we present Smart Angel, a
                 project that aims at creating a network involving
                 families, caregivers, experts, and tutors, as well as
                 the final users and their friends, based on a mobile
                 cloud system in support of both everyday living and
                 urban mobility for people with medium-mild intellectual
                 disabilities, with particular attention to the Down
                 syndrome. The system can be seen as a tool to empower
                 its users to be more independent and therefore
                 increasing their possibility to have an active role in
                 their life and an active participation to the
                 community.",
  acknowledgement = ack-nhfb,
}

@Article{Buchanan:2015:FIW,
  author =       "William J. Buchanan and David Lanc and Elochukwu
                 Ukwandu and Lu Fan and Gordon Russell and Owen Lo",
  title =        "The Future {Internet}: a World of Secret Shares",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "445--464",
  day =          "24",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040445",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/445",
  abstract =     "The Public Key Infrastructure (PKI) is crumbling,
                 partially due to the lack of a strong understanding of
                 how encryption actually works, but also due to
                 weaknesses in its implementation. This paper outlines
                 an Internet storage technique using secret sharing
                 methods which could be used to overcome the problems
                 inherent with PKI, while supporting new types of
                 architectures incorporating such things as automated
                 failover and break-glass data recovery. The paper
                 outlines a novel architecture: SECRET, which supports a
                 robust cloud-based infrastructure with in-built privacy
                 and failover. In order to understand the performance
                 overhead of SECRET, the paper outlines a range of
                 experiments that investigate the overhead of this and
                 other secret share methods.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet Security.",
}

@Article{Gao:2015:DLB,
  author =       "Ren Gao and Juebo Wu",
  title =        "Dynamic Load Balancing Strategy for Cloud Computing
                 with Ant Colony Optimization",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "465--483",
  day =          "26",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040465",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/465",
  abstract =     "How to distribute and coordinate tasks in cloud
                 computing is a challenging issue, in order to get
                 optimal resource utilization and avoid overload. In
                 this paper, we present a novel approach on load
                 balancing via ant colony optimization (ACO), for
                 balancing the workload in a cloud computing platform
                 dynamically. Two strategies, forward-backward ant
                 mechanism and max-min rules, are introduced to quickly
                 find out the candidate nodes for load balancing. We
                 formulate pheromone initialization and pheromone update
                 according to physical resources under the cloud
                 computing environment, including pheromone evaporation,
                 incentive, and punishment rules, etc. Combined with
                 task execution prediction, we define the moving
                 probability of ants in two ways, that is, whether the
                 forward ant meets the backward ant, or not, in the
                 neighbor node, with the aim of accelerating searching
                 processes. Simulations illustrate that the proposed
                 strategy can not only provide dynamic load balancing
                 for cloud computing with less searching time, but can
                 also get high network performance under medium and
                 heavily loaded contexts.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet of Things.",
}

@Article{Kruger:2015:ITE,
  author =       "Dov Kruger and Sarah Inman and Zhiyu Ding and Yijin
                 Kang and Poornima Kuna and Yujie Liu and Xiakun Lu and
                 Stephen Oro and Yingzhu Wang",
  title =        "Improving Teacher Effectiveness: Designing Better
                 Assessment Tools in Learning Management Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "484--499",
  day =          "18",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040484",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/484",
  abstract =     "Current-generation assessment tools used in K-12 and
                 post-secondary education are limited in the type of
                 questions they support; this limitation makes it
                 difficult for instructors to navigate their assessment
                 engines. Furthermore, the question types tend to score
                 low on Bloom's Taxonomy. Dedicated learning management
                 systems (LMS) such as Blackboard, Moodle and Canvas are
                 somewhat better than informal tools as they offer more
                 question types and some randomization. Still, question
                 types in all the major LMS assessment engines are
                 limited. Additionally, LMSs place a heavy burden on
                 teachers to generate online assessments. In this study
                 we analyzed the top three LMS providers to identify
                 inefficiencies. These inefficiencies in LMS design,
                 point us to ways to ask better questions. Our findings
                 show that teachers have not adopted current tools
                 because they do not offer definitive improvements in
                 productivity. Therefore, we developed LiquiZ, a design
                 for a next-generation assessment engine that reduces
                 user effort and provides more advanced question types
                 that allow teachers to ask questions that can currently
                 only be asked in one-on-one demonstration. The initial
                 LiquiZ project is targeted toward STEM subjects, so the
                 question types are particularly advantageous in math or
                 science subjects.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue eLearning.",
}

@Article{Drogkaris:2015:HMA,
  author =       "Prokopios Drogkaris and Stefanos Gritzalis and
                 Christos Kalloniatis and Costas Lambrinoudakis",
  title =        "A Hierarchical Multitier Approach for Privacy Policies
                 in e-Government Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "500--515",
  day =          "21",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040500",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/500",
  abstract =     "The appeal of e-Government users to retain control
                 over their personal information, while making use of
                 advanced governmental electronic services through
                 interconnected and interoperable deployments, can be
                 assisted by the incorporation of privacy policy and
                 Preferences documents. This paper addresses the
                 formulation of light-weight and accurate privacy
                 policies, while preserving compliance with underlying
                 legal and regulatory framework. Through the
                 exploitation of existing governmental hierarchies, a
                 multitier approach is proposed able to support diverge
                 data needs and processing requests imposed by service
                 providers. The incorporation of this approach into
                 e-Government environments will reduce the
                 administrative workload, imposed by the inclusion of
                 privacy policy documents, and promote the
                 implementation and provision of user-centric and data
                 privacy aware electronic services.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet Security.",
}

@Article{Zhou:2015:ORR,
  author =       "Dan Zhou and Zhong Yao",
  title =        "Optimal Referral Reward Considering Customer's Budget
                 Constraint",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "516--529",
  day =          "21",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040516",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/516",
  abstract =     "Everyone likes Porsche but few can afford it. Budget
                 constraints always play a critical role in a customer's
                 decision-making. The literature disproportionally
                 focuses on how firms can induce customer valuations
                 toward the product, but does not address how to assess
                 the influence of budget constraints. We study these
                 questions in the context of a referral reward program
                 (RRP). RRP is a prominent marketing strategy that
                 utilizes recommendations passed from existing customers
                 to their friends and effectively stimulates word of
                 mouth (WoM). We build a stylized game-theoretical model
                 with a nested Stackelberg game involving three players:
                 a firm, an existing customer, and a potential customer
                 who is a friend of the existing customer. The budget is
                 the friend's private information. We show that RRPs
                 might be optimal when the friend has either a low or a
                 high valuation, but they work differently in each
                 situation because of the budget. Furthermore, there are
                 two budget thresholds, a fixed one and a variable one,
                 which limit a firm's ability to use rewards.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Computational Social Sciences:
                 Contagion, Collective Behaviors, and Networks.",
}

@Article{Chang:2016:PQF,
  author =       "Gary Chang and Chung-Chieh Lee",
  title =        "Priority Queues with Fractional Service for Tiered
                 Delay {QoS}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "1",
  day =          "29",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/1",
  abstract =     "Packet scheduling is key to quality of service (QoS)
                 capabilities of broadband wired and wireless networks.
                 In a heterogeneous traffic environment, a comprehensive
                 QoS packet scheduler must strike a balance between flow
                 fairness and access delay. Many advanced packet
                 scheduling solutions have targeted fair bandwidth
                 allocation while protecting delay-constrained traffic
                 by adding priority queue(s) on top of a fair bandwidth
                 scheduler. Priority queues are known to cause
                 performance uncertainties and, thus, various
                 modifications have been proposed. In this paper, we
                 present a packet queueing engine dubbed Fractional
                 Service Buffer (FSB), which, when coupled with a
                 configurable flow scheduler, can achieve desired QoS
                 objectives, such as fair throughputs and differentiated
                 delay guarantees. Key performance metrics, such as
                 delay limit and probability of delay limit violation,
                 are derived as a function of key FSB parameters for
                 each delay class in the packet queueing engine using
                 diffusion approximations. OPNET simulations verify
                 these analytical results.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Managing QoS and QoE Levels in Wired and
                 Wireless Data Networks.",
}

@Article{Wang:2016:DII,
  author =       "Yun Wang and William Chu and Sarah Fields and Colleen
                 Heinemann and Zach Reiter",
  title =        "Detection of Intelligent Intruders in Wireless Sensor
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "2",
  day =          "20",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010002",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/2",
  abstract =     "Most of the existing research works on the intrusion
                 detection problem in a wireless sensor network (WSN)
                 assume linear or random mobility patterns in
                 abstracting intruders' models in traversing the WSN
                 field. However, in real-life WSN applications, an
                 intruder is usually an intelligent mobile robot with
                 environment learning and detection avoidance capability
                 (i.e., the capability to avoid surrounding sensors).
                 Due to this, the literature results based on the linear
                 or random mobility models may not be applied to the
                 real-life WSN design and deployment for efficient and
                 effective intrusion detection in practice. This
                 motivates us to investigate the impact of intruder's
                 intelligence on the intrusion detection problem in a
                 WSN for various applications. To be specific, we
                 propose two intrusion algorithms, the pinball and
                 flood-fill algorithms, to mimic the intelligent motion
                 and behaviors of a mobile intruder in detecting and
                 circumventing nearby sensors for detection avoidance
                 while heading for its destination. The two proposed
                 algorithms are integrated into a WSN framework for
                 intrusion detection analysis in various circumstances.
                 Monte Carlo simulations are conducted, and the results
                 indicate that: (1) the performance of a WSN drastically
                 changes as a result of the intruder's intelligence in
                 avoiding sensor detections and intrusion algorithms;
                 (2) network parameters, including node density, sensing
                 range and communication range, play a crucial part in
                 the effectiveness of the intruder's intrusion
                 algorithms; and (3) it is imperative to integrate
                 intruder's intelligence in the WSN research for
                 intruder detection problems under various application
                 circumstances.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet of Things.",
}

@Article{Office:2016:ARF,
  author =       "Future Internet Editorial Office",
  title =        "Acknowledgement to Reviewers of {{\booktitle{Future
                 Internet}}} in 2015",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "3",
  day =          "22",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010003",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/3",
  abstract =     "In this paper, we address the problem of energy
                 conservation and optimization in residential
                 environments by providing users with useful information
                 to solicit a change in consumption behavior. Taking
                 care to highly limit the costs of installation and
                 management, our work proposes a Non-Intrusive Load
                 Monitoring (NILM) approach, which consists of
                 disaggregating the whole-house power consumption into
                 the individual portions associated to each device.
                 State of the art NILM algorithms need monitoring data
                 sampled at high frequency, thus requiring high costs
                 for data collection and management. In this paper, we
                 propose an NILM approach that relaxes the requirements
                 on monitoring data since it uses total active power
                 measurements gathered at low frequency (about 1 Hz).
                 The proposed approach is based on the use of Factorial
                 Hidden Markov Models (FHMM) in conjunction with context
                 information related to the user presence in the house
                 and the hourly utilization of appliances. Through a set
                 of tests, we investigated how the use of these
                 additional context-awareness features could improve
                 disaggregation results with respect to the basic FHMM
                 algorithm. The tests have been performed by using
                 Tracebase, an open dataset made of data gathered from
                 real home environments.",
  acknowledgement = ack-nhfb,
}

@Article{Paradiso:2016:CBE,
  author =       "Francesca Paradiso and Federica Paganelli and Dino
                 Giuli and Samuele Capobianco",
  title =        "Context-Based Energy Disaggregation in Smart Homes",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "4",
  day =          "27",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010004",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/4",
  abstract =     "In this paper, we address the problem of energy
                 conservation and optimization in residential
                 environments by providing users with useful information
                 to solicit a change in consumption behavior. Taking
                 care to highly limit the costs of installation and
                 management, our work proposes a Non-Intrusive Load
                 Monitoring (NILM) approach, which consists of
                 disaggregating the whole-house power consumption into
                 the individual portions associated to each device.
                 State of the art NILM algorithms need monitoring data
                 sampled at high frequency, thus requiring high costs
                 for data collection and management. In this paper, we
                 propose an NILM approach that relaxes the requirements
                 on monitoring data since it uses total active power
                 measurements gathered at low frequency (about 1 Hz).
                 The proposed approach is based on the use of Factorial
                 Hidden Markov Models (FHMM) in conjunction with context
                 information related to the user presence in the house
                 and the hourly utilization of appliances. Through a set
                 of tests, we investigated how the use of these
                 additional context-awareness features could improve
                 disaggregation results with respect to the basic FHMM
                 algorithm. The tests have been performed by using
                 Tracebase, an open dataset made of data gathered from
                 real home environments.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Ismail:2016:FST,
  author =       "Umar Mukhtar Ismail and Shareeful Islam and Moussa
                 Ouedraogo and Edgar Weippl",
  title =        "A Framework for Security Transparency in Cloud
                 Computing",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "5",
  day =          "17",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010005",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/5",
  abstract =     "Individuals and corporate users are persistently
                 considering cloud adoption due to its significant
                 benefits compared to traditional computing
                 environments. The data and applications in the cloud
                 are stored in an environment that is separated, managed
                 and maintained externally to the organisation.
                 Therefore, it is essential for cloud providers to
                 demonstrate and implement adequate security practices
                 to protect the data and processes put under their
                 stewardship. Security transparency in the cloud is
                 likely to become the core theme that underpins the
                 systematic disclosure of security designs and practices
                 that enhance customer confidence in using cloud service
                 and deployment models. In this paper, we present a
                 framework that enables a detailed analysis of security
                 transparency for cloud based systems. In particular, we
                 consider security transparency from three different
                 levels of abstraction, i.e., conceptual, organisation
                 and technical levels, and identify the relevant
                 concepts within these levels. This allows us to provide
                 an elaboration of the essential concepts at the core of
                 transparency and analyse the means for implementing
                 them from a technical perspective. Finally, an example
                 from a real world migration context is given to provide
                 a solid discussion on the applicability of the proposed
                 framework.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Ma:2016:MDR,
  author =       "Tinghuai Ma and Xichao Xu and Meili Tang and Yuanfeng
                 Jin and Wenhai Shen",
  title =        "{MHBase}: a Distributed Real-Time Query Scheme for
                 Meteorological Data Based on {HBase}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "6",
  day =          "01",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010006",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/6",
  abstract =     "Meteorological technology has evolved rapidly in
                 recent years to provide enormous, accurate and
                 personalized advantages in the public service. Large
                 volumes of observational data are generated gradually
                 by technologies such as geographical remote sensing,
                 meteorological radar satellite, etc. that makes data
                 analysis in weather forecasting more precise but also
                 poses a threat to the traditional method of data
                 storage. In this paper, we present MHBase,
                 Meteorological data based on HBase (Hadoop Database), a
                 distributed real-time query scheme for meteorological
                 data based on HBase. The calibrated data obtained from
                 terminal devices will be partitioned into HBase and
                 persisted to HDFS (the Hadoop Distributed File System).
                 We propose two algorithms (the Indexed Store and the
                 Indexed Retrieve Algorithms) to implement a secondary
                 index using HBase Coprocessors, which allow MHbase to
                 provide high performance data querying on columns other
                 than rowkey. Experimental results show that the
                 performance of MHBase can satisfy the basic demands of
                 meteorological business services.",
  acknowledgement = ack-nhfb,
}

@Article{Lischke:2016:ABN,
  author =       "Matthias Lischke and Benjamin Fabian",
  title =        "Analyzing the {Bitcoin} Network: The First Four
                 Years",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "1",
  pages =        "7",
  day =          "07",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8010007",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/1/7",
  abstract =     "In this explorative study, we examine the economy and
                 transaction network of the decentralized digital
                 currency Bitcoin during the first four years of its
                 existence. The objective is to develop insights into
                 the evolution of the Bitcoin economy during this
                 period. For this, we establish and analyze a novel
                 integrated dataset that enriches data from the Bitcoin
                 blockchain with off-network data such as business
                 categories and geo-locations. Our analyses reveal the
                 major Bitcoin businesses and markets. Our results also
                 give insights on the business distribution by countries
                 and how businesses evolve over time. We also show that
                 there is a gambling network that features many very
                 small transactions. Furthermore, regional differences
                 in the adoption and business distribution could be
                 found. In the network analysis, the small world
                 phenomenon is investigated and confirmed for several
                 subgraphs of the Bitcoin network.",
  acknowledgement = ack-nhfb,
}

@Article{Deng:2016:ELF,
  author =       "Zhi-An Deng and Di Wu and Yiran Zhou and Zhenyu Na",
  title =        "Enhanced Local {Fisher} Discriminant Analysis for
                 Indoor Positioning in Wireless Local Area Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "8",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020008",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/8",
  abstract =     "Feature extraction methods have been used to extract
                 location features for indoor positioning in wireless
                 local area networks. However, existing methods, such as
                 linear discriminant analysis and principal component
                 analysis, all suffer from the multimodal property of
                 signal distribution. This paper proposes a novel
                 method, based on enhanced local fisher discriminant
                 analysis (LFDA). First, LFDA is proposed to extract
                 discriminative location features. It maximizes
                 between-class separability while preserving
                 within-class local structure of signal space, thereby
                 guaranteeing maximal discriminative information
                 involved in positioning. Then, the generalization
                 ability of LFDA is further enhanced using signal
                 perturbation, which generates more number of
                 representative training samples. Experimental results
                 in realistic indoor environment show that, compared
                 with previous feature extraction methods, the proposed
                 method reduces the mean and standard deviation of
                 positing error by 23.9\% and 33.0\%, respectively.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Mobile Computing.",
}

@Article{Golbeck:2016:UPF,
  author =       "Jennifer Golbeck and Matthew Louis Mauriello",
  title =        "User Perception of {Facebook} App Data Access: a
                 Comparison of Methods and Privacy Concerns",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "9",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020009",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/9",
  abstract =     "Users share vast amounts of personal information
                 online, but are they fully aware of what information
                 they are sharing and with whom? In this paper, we
                 focused on Facebook apps and set out to understand how
                 concerned users are about privacy and how well-informed
                 they are about what personal data apps can access. We
                 found that initially, subjects were generally
                 under-informed about what data apps could access from
                 their profiles. After viewing additional information
                 about these permissions, subjects' concern about
                 privacy on Facebook increased. Subjects' understanding
                 of what data apps were able to access increased,
                 although even after receiving explicit information on
                 the topic, many subjects still did not fully understand
                 the extent to which apps could access their data.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Human-Computer Interaction and the
                 Social Web.",
}

@Article{Massa:2016:FEU,
  author =       "Daniele Massa and Lucio Davide Spano",
  title =        "{FaceMashup}: An End-User Development Tool for Social
                 Network Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "10",
  day =          "29",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020010",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/10",
  abstract =     "Every day, each active social network user produces
                 and shares texts, images and videos. While developers
                 can access such data through application programming
                 interfaces (APIs) for creating games, visualizations
                 and routines, end users have less control on such
                 information. Their access is mediated by the social
                 application features, which limits them in combining
                 sources, filtering results and performing actions on
                 groups of elements. In order to fill this gap, we
                 introduce FaceMashup, an end user development (EUD)
                 environment supporting the manipulation of the Facebook
                 graph. We describe the tool interface, documenting the
                 choices we made during the design iterations. Data
                 types are represented through widgets containing user
                 interface (UI) elements similar to those used in the
                 social network application. Widgets can be connected
                 with each other with the drag and drop of their inner
                 fields, and the application updates their content.
                 Finally, we report the results of a user-test on the
                 FaceMashup prototype, which shows a good acceptance of
                 the environment by end-users.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Human-Computer Interaction and the
                 Social Web.",
}

@Article{Golbeck:2016:EFA,
  author =       "Jennifer Golbeck and Carman Neustaedter",
  title =        "Environmental Factors Affecting Where People
                 Geocache",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "11",
  day =          "12",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020011",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/11",
  abstract =     "Outdoor leisure activities are important for public
                 health as well as family cohesiveness, yet
                 environmental factors may easily affect someone's
                 ability to participate in such activities. We explored
                 this with a focus on the social web-based treasure hunt
                 game called Geocaching. We collected data on all US and
                 Canadian geocaches from OpenCaching.com and conducted
                 an online survey with twenty geocachers as a follow-up
                 to our data analysis. Data analysis showed that
                 geocaches were more often found in areas that were
                 wealthier, better educated, younger, and more urban,
                 and had higher population density and better weather.
                 Survey results showed similar trends: Most people
                 actively thought about where they would cache and tried
                 to minimize risks, despite cache hiders thinking less
                 about these concerns. These results further emphasize
                 the importance of environmental factors when it comes
                 to participation in outdoor activities and leads to
                 Human-Computer Interaction design implications for
                 location-based online social activities.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Human-Computer Interaction and the
                 Social Web.",
}

@Article{Antoniadis:2016:MAP,
  author =       "Konstantinos Antoniadis and Kostas Zafiropoulos and
                 Vasiliki Vrana",
  title =        "A Method for Assessing the Performance of e-Government
                 {Twitter} Accounts",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "12",
  day =          "18",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020012",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/12",
  abstract =     "This paper introduces a method for assessing the
                 influence of Twitter accounts of central e-government
                 agencies. It first stresses the importance of activity
                 and popularity of the e-government accounts, and also
                 the importance of community formation among
                 followers-citizens, as the two main stages of
                 e-government adoption. The proposed approach combines
                 activity and popularity of the accounts and followers'
                 community characteristics in a ranking system, using an
                 idea originally introduced to measure blogosphere
                 authority. A Twitter Authority Index is produced. The
                 method is demonstrated through an extended example: 56
                 Twitter accounts of ministries of EU countries are
                 sorted according to their indexes in the proposed
                 ranking system. Detailed values for the ministries'
                 accounts and average values for the countries that the
                 ministries belong to are reported and commented.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Computational Social Sciences:
                 Contagion, Collective Behaviors, and Networks.",
}

@Article{Fernandez:2016:MSC,
  author =       "Eduardo B. Fernandez and Nobukazu Yoshioka and
                 Hironori Washizaki and Madiha H. Syed",
  title =        "Modeling and Security in Cloud Ecosystems",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "13",
  day =          "20",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020013",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/13",
  abstract =     "Clouds do not work in isolation but interact with
                 other clouds and with a variety of systems either
                 developed by the same provider or by external entities
                 with the purpose to interact with them; forming then an
                 ecosystem. A software ecosystem is a collection of
                 software systems that have been developed to coexist
                 and evolve together. The stakeholders of such a system
                 need a variety of models to give them a perspective of
                 the possibilities of the system, to evaluate specific
                 quality attributes, and to extend the system. A
                 powerful representation when building or using software
                 ecosystems is the use of architectural models, which
                 describe the structural aspects of such a system. These
                 models have value for security and compliance, are
                 useful to build new systems, can be used to define
                 service contracts, find where quality factors can be
                 monitored, and to plan further expansion. We have
                 described a cloud ecosystem in the form of a pattern
                 diagram where its components are patterns and reference
                 architectures. A pattern is an encapsulated solution to
                 a recurrent problem. We have recently expanded these
                 models to cover fog systems and containers. Fog
                 Computing is a highly-virtualized platform that
                 provides compute, storage, and networking services
                 between end devices and Cloud Computing Data Centers; a
                 Software Container provides an execution environment
                 for applications sharing a host operating system,
                 binaries, and libraries with other containers. We
                 intend to use this architecture to answer a variety of
                 questions about the security of this system as well as
                 a reference to design interacting combinations of
                 heterogeneous components. We defined a metamodel to
                 relate security concepts which is being expanded.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Heaberlin:2016:EWN,
  author =       "Bradi Heaberlin and Simon DeDeo",
  title =        "The Evolution of {Wikipedia}'s Norm Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "14",
  day =          "20",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020014",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/14",
  abstract =     "Social norms have traditionally been difficult to
                 quantify. In any particular society, their sheer number
                 and complex interdependencies often limit a
                 system-level analysis. One exception is that of the
                 network of norms that sustain the online Wikipedia
                 community. We study the fifteen-year evolution of this
                 network using the interconnected set of pages that
                 establish, describe, and interpret the community's
                 norms. Despite Wikipedia's reputation for ad hoc
                 governance, we find that its normative evolution is
                 highly conservative. The earliest users create norms
                 that both dominate the network and persist over time.
                 These core norms govern both content and interpersonal
                 interactions using abstract principles such as
                 neutrality, verifiability, and assume good faith. As
                 the network grows, norm neighborhoods decouple
                 topologically from each other, while increasing in
                 semantic coherence. Taken together, these results
                 suggest that the evolution of Wikipedia's norm network
                 is akin to bureaucratic systems that predate the
                 information age.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Computational Social Sciences:
                 Contagion, Collective Behaviors, and Networks.",
}

@Article{Okamoto:2016:RBI,
  author =       "Kazuaki Okamoto and Kazumasa Takami",
  title =        "Routing Based on Information about the Routes of
                 Fixed-Route Traveling Nodes and on Destination Areas
                 Aimed at Reducing the Load on the {DTN}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "15",
  day =          "27",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020015",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/15",
  abstract =     "In recent years, the interest in delay/disruption
                 tolerant networking (DTN) is growing as a means of
                 communication in times of disaster. To ensure that a
                 DTN works well in an emergency, it is desirable to
                 promote general use of the DTN, so that it will also be
                 used in normal times. Since the DTN uses mobile
                 terminals and vehicles, which are not dedicated network
                 devices, as relay nodes, the routing method should be
                 such that it does not impose a large processing load on
                 relay nodes. This paper considers use of a DTN for a
                 day-to-day service of delivering content to a specific
                 area and proposes a new routing method that is based on
                 information about the routes of fixed-route traveling
                 nodes, such as public transportation vehicles. The
                 destination of a bundle is specified not by a terminal
                 identifier, but by an area, which is identified by its
                 location information. This paper presents an
                 outbound-type bundle protocol, which is used by relay
                 nodes when they have received a forwarding-bundle
                 request from a sending terminal and try to determine
                 whether the bundle can reach its destination area.
                 Using simulation, the superiority of the proposed
                 routing was confirmed by comparing it to existing
                 routing methods in terms of the bundle arrival rate and
                 factors that affect the network load, such as the
                 number of bundle copies, the number of hops and the
                 maximum required buffer size.",
  acknowledgement = ack-nhfb,
}

@Article{Ibba:2016:DLC,
  author =       "Simona Ibba and Filippo Eros Pani",
  title =        "Digital Libraries: The Challenge of Integrating
                 {Instagram} with a Taxonomy for Content Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "16",
  day =          "10",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020016",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/16",
  abstract =     "Interoperability and social implication are two
                 current challenges in the digital library (DL) context.
                 To resolve the problem of interoperability, our work
                 aims to find a relationship between the main metadata
                 schemas. In particular, we want to formalize knowledge
                 through the creation of a metadata taxonomy built with
                 the analysis and the integration of existing schemas
                 associated with DLs. We developed a method to integrate
                 and combine Instagram metadata and hashtags. The final
                 result is a taxonomy, which provides innovative
                 metadata with respect to the classification of
                 resources, as images of Instagram and the
                 user-generated content, that play a primary role in the
                 context of modern DLs. The possibility of Instagram to
                 localize the photos inserted by users allows us to
                 interpret the most relevant and interesting informative
                 content for a specific user type and in a specific
                 location and to improve access, visibility and
                 searching of library content.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Human-Computer Interaction and the
                 Social Web.",
}

@Article{Premnath:2016:SPC,
  author =       "Sriram Nandha Premnath and Zygmunt J. Haas",
  title =        "Supporting Privacy of Computations in Mobile Big Data
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "17",
  day =          "10",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020017",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/17",
  abstract =     "Cloud computing systems enable clients to rent and
                 share computing resources of third party platforms, and
                 have gained widespread use in recent years. Numerous
                 varieties of mobile, small-scale devices such as
                 smartphones, red e-health devices, etc., across users,
                 are connected to one another through the massive
                 internetwork of vastly powerful servers on the cloud.
                 While mobile devices store ``private information'' of
                 users such as location, payment, health data, etc.,
                 they may also contribute ``semi-public information''
                 (which may include crowdsourced data such as transit,
                 traffic, nearby points of interests, etc.) for data
                 analytics. In such a scenario, a mobile device may seek
                 to obtain the result of a computation, which may depend
                 on its private inputs, crowdsourced data from other
                 mobile devices, and/or any ``public inputs'' from other
                 servers on the Internet. We demonstrate a new method of
                 delegating real-world computations of
                 resource-constrained mobile clients using an encrypted
                 program known as the garbled circuit. Using the garbled
                 version of a mobile client's inputs, a server in the
                 cloud executes the garbled circuit and returns the
                 resulting garbled outputs. Our system assures privacy
                 of the mobile client's input data and output of the
                 computation, and also enables the client to verify that
                 the evaluator actually performed the computation. We
                 analyze the complexity of our system. We measure the
                 time taken to construct the garbled circuit as well as
                 evaluate it for varying number of servers. Using
                 real-world data, we evaluate our system for a
                 practical, privacy preserving search application that
                 locates the nearest point of interest for the mobile
                 client to demonstrate feasibility.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Carrino:2016:IIT,
  author =       "Francesco Carrino and Elena Mugellini and Omar Abou
                 Khaled and Nabil Ouerhani and Juergen Ehrensberger",
  title =        "{iNUIT}: {Internet of Things} for Urban Innovation",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "18",
  day =          "11",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020018",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/18",
  abstract =     "Internet of Things (IoT) seems a viable way to enable
                 the Smart Cities of the future. iNUIT (Internet of
                 Things for Urban Innovation) is a multi-year research
                 program that aims to create an ecosystem that exploits
                 the variety of data coming from multiple sensors and
                 connected objects installed on the scale of a city, in
                 order to meet specific needs in terms of development of
                 new services (physical security, resource management,
                 etc.). Among the multiple research activities within
                 iNUIT, we present two projects: SmartCrowd and OpEc.
                 SmartCrowd aims at monitoring the crowd's movement
                 during large events. It focuses on real-time tracking
                 using sensors available in smartphones and on the use
                 of a crowd simulator to detect possible dangerous
                 scenarios. A proof-of-concept of the application has
                 been tested at the Pal{\'e}o Festival (Switzerland)
                 showing the feasibility of the approach. OpEc
                 (Optimisation de l'Eclairage public) aims at using IoT
                 to implement dynamic street light management and
                 control with the goal of reducing street light energy
                 consumption while guaranteeing the same level of
                 security of traditional illumination. The system has
                 been tested during two months in a street in St-Imier
                 (Switzerland) without interruption, validating its
                 stability and resulting in an overall energy saving of
                 about 56\%.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Lettieri:2016:CSS,
  author =       "Nicola Lettieri",
  title =        "Computational Social Science, the Evolution of Policy
                 Design and Rule Making in Smart Societies",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "19",
  day =          "12",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020019",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/19",
  abstract =     "In the last 20 years, the convergence of different
                 factors-the rise of the complexity of science, the
                 ``data deluge'' and the advances in information
                 technologies-triggered a paradigm shift in the way we
                 understand complex social systems and their evolution.
                 Beyond shedding new light onto social dynamics, the
                 emerging research area of Computational Social Science
                 (CSS) is providing a new rationale for a more
                 scientifically-grounded and effective policy design.
                 The paper discusses the opportunities potentially
                 deriving from the intersection between policy design
                 issues and CSS methods. After a general introduction to
                 the limits of traditional policy-making and a brief
                 review of the most promising CSS methodologies, the
                 work deals with way in which the insights potentially
                 offered by CSS can concretely flow in policy choices.
                 The attention is focused, to this end, on the legal
                 mechanisms regulating the formulation and the
                 evaluation of public policies. Our goal is two-fold:
                 sketch how the project of a ``smart society'' is
                 connected to the evolution of social sciences and
                 emphasize the need for change in the way in which
                 public policies are conceived of, designed and
                 implemented.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Pandey:2016:UFI,
  author =       "Pankaj Pandey and Einar Snekkenes",
  title =        "Using Financial Instruments to Transfer the
                 Information Security Risks",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "20",
  day =          "17",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020020",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/20",
  abstract =     "For many individuals and organizations,
                 cyber-insurance is the most practical and only way of
                 handling a major financial impact of an information
                 security event. However, the cyber-insurance market
                 suffers from the problem of information asymmetry, lack
                 of product diversity, illiquidity, high transaction
                 cost, and so on. On the other hand, in theory, capital
                 market-based financial instruments can provide a risk
                 transfer mechanism with the ability to absorb the
                 adverse impact of an information security event. Thus,
                 this article addresses the limitations in the
                 cyber-(re)insurance markets with a set of capital
                 market-based financial instruments. This article
                 presents a set of information security derivatives,
                 namely options, vanilla options, swap, and futures that
                 can be traded at an information security prediction
                 market. Furthermore, this article demonstrates the
                 usefulness of information security derivatives in a
                 given scenario and presents an evaluation of the same
                 in comparison with cyber-insurance. In our analysis, we
                 found that the information security derivatives can at
                 least be a partial solution to the problems in the
                 cyber-insurance markets. The information security
                 derivatives can be used as an effective tool for
                 information elicitation and aggregation, cyber risk
                 pricing, risk hedging, and strategic decision making
                 for information security risk management.",
  acknowledgement = ack-nhfb,
}

@Article{Lerman:2016:IVO,
  author =       "Kristina Lerman",
  title =        "Information Is Not a Virus, and Other Consequences of
                 Human Cognitive Limits",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "21",
  day =          "13",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020021",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/21",
  abstract =     "The many decisions that people make about what to pay
                 attention to online shape the spread of information in
                 online social networks. Due to the constraints of
                 available time and cognitive resources, the ease of
                 discovery strongly impacts how people allocate their
                 attention to social media content. As a consequence,
                 the position of information in an individual's social
                 feed, as well as explicit social signals about its
                 popularity, determine whether it will be seen, and the
                 likelihood that it will be shared with followers.
                 Accounting for these cognitive limits simplifies
                 mechanics of information diffusion in online social
                 networks and explains puzzling empirical observations:
                 (i) information generally fails to spread in social
                 media and (ii) highly connected people are less likely
                 to re-share information. Studies of information
                 diffusion on different social media platforms reviewed
                 here suggest that the interplay between human cognitive
                 limits and network structure differentiates the spread
                 of information from other social contagions, such as
                 the spread of a virus through a population.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Computational Social Sciences:
                 Contagion, Collective Behaviors, and Networks.",
}

@Article{Sanchez:2016:DES,
  author =       "Luis Enrique S{\'a}nchez and Antonio Santos-Olmo and
                 Esther {\'A}lvarez and Monica Huerta and Sara Camacho
                 and Eduardo Fern{\'a}ndez-Medina",
  title =        "Development of an Expert System for the Evaluation of
                 Students' Curricula on the Basis of Competencies",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "22",
  day =          "18",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020022",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/22",
  abstract =     "The concept of competence, which emerged during the
                 reform of computer engineering degrees, has not brought
                 benefits to companies when attempting to select the
                 most suitable candidates for their jobs. This article
                 aims to show some of the research that has been
                 conducted to determine why companies have not found
                 these skills useful and how both can be aligned.
                 Finally, we show the development of an Expert System
                 that will enable companies to select the most suitable
                 candidates for their jobs, considering personal and
                 social skills, along with technical knowledge. This
                 prototype will serve as a basis to align the
                 competencies defined in the curricula with professional
                 requirements, thus allowing a true alignment between
                 degree courses and the needs of professional
                 companies.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Fantacci:2016:CSS,
  author =       "Romano Fantacci and Dania Marabissi",
  title =        "Cognitive Spectrum Sharing: An Enabling Wireless
                 Communication Technology for a Wide Use of Smart
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "23",
  day =          "20",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020023",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/23",
  abstract =     "A smart city is an environment where a pervasive,
                 multi-service network is employed to provide citizens
                 improved living conditions as well as better public
                 safety and security. Advanced communication
                 technologies are essential to achieve this goal. In
                 particular, an efficient and reliable communication
                 network plays a crucial role in providing continue,
                 ubiquitous, and reliable interconnections among users,
                 smart devices, and applications. As a consequence,
                 wireless networking appears as the principal enabling
                 communication technology despite the necessity to face
                 severe challenges to satisfy the needs arising from a
                 smart environment, such as explosive data volume,
                 heterogeneous data traffic, and support of quality of
                 service constraints. An interesting approach for
                 meeting the growing data demand due to smart city
                 applications is to adopt suitable methodologies to
                 improve the usage of all potential spectrum resources.
                 Towards this goal, a very promising solution is
                 represented by the Cognitive Radio technology that
                 enables context-aware capability in order to pursue an
                 efficient use of the available communication resources
                 according to the surrounding environment conditions. In
                 this paper we provide a review of the characteristics,
                 challenges, and solutions of a smart city communication
                 architecture, based on the Cognitive Radio technology,
                 by focusing on two new network paradigms-namely,
                 Heterogeneous Network and Machines-to-Machines
                 communications-that are of special interest to
                 efficiently support smart city applications and
                 services.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Martini:2016:SOA,
  author =       "Barbara Martini and Federica Paganelli",
  title =        "A Service-Oriented Approach for Dynamic Chaining of
                 Virtual Network Functions over Multi-Provider
                 Software-Defined Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "24",
  day =          "01",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020024",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/24",
  abstract =     "Emerging technologies such as Software-Defined
                 Networks (SDN) and Network Function Virtualization
                 (NFV) promise to address cost reduction and flexibility
                 in network operation while enabling innovative network
                 service delivery models. However, operational network
                 service delivery solutions still need to be developed
                 that actually exploit these technologies, especially at
                 the multi-provider level. Indeed, the implementation of
                 network functions as software running over a
                 virtualized infrastructure and provisioned on a service
                 basis let one envisage an ecosystem of network services
                 that are dynamically and flexibly assembled by
                 orchestrating Virtual Network Functions even across
                 different provider domains, thereby coping with
                 changeable user and service requirements and context
                 conditions. In this paper we propose an approach that
                 adopts Service-Oriented Architecture (SOA)
                 technology-agnostic architectural guidelines in the
                 design of a solution for orchestrating and dynamically
                 chaining Virtual Network Functions. We discuss how SOA,
                 NFV, and SDN may complement each other in realizing
                 dynamic network function chaining through service
                 composition specification, service selection, service
                 delivery, and placement tasks. Then, we describe the
                 architecture of a SOA-inspired NFV orchestrator, which
                 leverages SDN-based network control capabilities to
                 address an effective delivery of elastic chains of
                 Virtual Network Functions. Preliminary results of
                 prototype implementation and testing activities are
                 also presented. The benefits for Network Service
                 Providers are also described that derive from the
                 adaptive network service provisioning in a
                 multi-provider environment through the orchestration of
                 computing and networking services to provide end users
                 with an enhanced service experience.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Garcia-Martinez:2016:MAE,
  author =       "Ant{\'o}n Garc{\'\i}a-Mart{\'\i}nez and Jos{\'e}
                 Rivas-Rangel and Jaime Rangel-Quintos and Jos{\'e}
                 Antonio Espinosa and Cecilio Barba and Carmen
                 De-Pablos-Heredero",
  title =        "A Methodological Approach to Evaluate Livestock
                 Innovations on Small-Scale Farms in Developing
                 Countries",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "25",
  day =          "03",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020025",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/25",
  abstract =     "The aim of the study was deepening the knowledge of
                 livestock innovations knowledge on small-scale farms in
                 developing countries. First, we developed a methodology
                 focused on identifying potential appropriate livestock
                 innovations for smallholders and grouped them in
                 innovation areas, defined as a set of well-organized
                 practices with a business purpose. Finally, a process
                 management program (PMP) was evaluated according to the
                 livestock innovation level and viability of the
                 small-scale farms. Logistic regression was used to
                 evaluate the impact of PMP on the economic viability of
                 the farm. Information from 1650 small-scale livestock
                 farms in Mexico was collected and the innovations were
                 grouped in five innovation areas: A1. Management, A2.
                 Feeding, A3. Genetic, A4. Reproduction and A5. Animal
                 Health. The resulting innovation level in the system
                 was low at 45.7\% and heterogeneous among areas. This
                 study shows the usefulness of the methodology described
                 and confirms that implementing a PMP allows improving
                 the viability an additional 21\%, due to a better
                 integration of processes, resulting in more efficient
                 management.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{Vovides:2016:ELU,
  author =       "Yianna Vovides and Sarah Inman",
  title =        "Elusive Learning-Using Learning Analytics to Support
                 Reflective Sensemaking of Ill-Structured Ethical
                 Problems: a Learner-Managed Dashboard Solution",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "26",
  day =          "11",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020026",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/26",
  abstract =     "Since the turn of the 21st century, we have seen a
                 surge of studies on the state of U.S. education
                 addressing issues such as cost, graduation rates,
                 retention, achievement, engagement, and curricular
                 outcomes. There is an expectation that graduates should
                 be able to enter the workplace equipped to take on
                 complex and ``messy'' or ill-structured problems as
                 part of their professional and everyday life. In the
                 context of online learning, we have identified two key
                 issues that are elusive (hard to capture and make
                 visible): learning with ill-structured problems and the
                 interaction of social and individual learning. We
                 believe that the intersection between learning and
                 analytics has the potential, in the long-term, to
                 minimize the elusiveness of deep learning. A proposed
                 analytics model is described in this article that is
                 meant to capture and also support further development
                 of a learner's reflective sensemaking.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue eLearning.",
}

@Article{Ye:2016:DSA,
  author =       "Ting Ye and Baowei Wang",
  title =        "Density Self-Adaptive Hybrid Clustering Routing
                 Protocol for Wireless Sensor Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "27",
  day =          "29",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030027",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/27",
  abstract =     "Energy efficiency is of major concern in wireless
                 sensor networks, especially in difficult node
                 deployment environments. Clustering is an effective
                 method to save energy consumption and prolong the
                 network lifetime. There are two kinds of clustering
                 methods in hierarchical routing protocols, namely
                 distributed control and centralized control. In the
                 distributed strategy, the algorithm has good
                 scalability, but it can easily lead to an uneven
                 distribution of cluster heads. When the centralized
                 strategy is used, the network is balanced and robust,
                 but the overhead of clustering is large and the network
                 latency is increased. In our proposed protocol, named
                 DAHC, a mixture algorithm of distributed and
                 centralized control is used to select a cluster head
                 (CH). Simultaneously, we propose a novel approach to
                 judge the cluster density and adjust according to the
                 preset threshold. The simulation results show that our
                 methods can evenly distribute the energy load on all
                 nodes, save the energy consumption of communication and
                 extend the network lifetime concurrently.",
  acknowledgement = ack-nhfb,
}

@Article{Strizhov:2016:SPS,
  author =       "Mikhail Strizhov and Zachary Osman and Indrajit Ray",
  title =        "Substring Position Search over Encrypted Cloud Data
                 Supporting Efficient Multi-User Setup",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "28",
  day =          "04",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030028",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/28",
  abstract =     "Existing Searchable Encryption (SE) solutions are able
                 to handle simple Boolean search queries, such as single
                 or multi-keyword queries, but cannot handle substring
                 search queries over encrypted data that also involve
                 identifying the position of the substring within the
                 document. These types of queries are relevant in areas
                 such as searching DNA data. In this paper, we propose a
                 tree-based Substring Position Searchable Symmetric
                 Encryption (SSP-SSE) to overcome the existing gap. Our
                 solution efficiently finds occurrences of a given
                 substring over encrypted cloud data. Specifically, our
                 construction uses the position heap tree data structure
                 and achieves asymptotic efficiency comparable to that
                 of an unencrypted position heap tree. Our encryption
                 takes O (k n) time, and the resulting ciphertext is of
                 size O (k n), where k is a security parameter and n is
                 the size of stored data. The search takes O (m 2 + o c
                 c) time and three rounds of communication, where m is
                 the length of the queried substring and o c c is the
                 number of occurrences of the substring in the document
                 collection. We prove that the proposed scheme is secure
                 against chosen-query attacks that involve an adaptive
                 adversary. Finally, we extend SSP-SSE to the multi-user
                 setting where an arbitrary group of cloud users can
                 submit substring queries to search the encrypted
                 data.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Haider:2016:WBD,
  author =       "Waqas Haider and Gideon Creech and Yi Xie and Jiankun
                 Hu",
  title =        "{Windows} Based Data Sets for Evaluation of Robustness
                 of Host Based Intrusion Detection Systems {(IDS)} to
                 Zero-Day and Stealth Attacks",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "29",
  day =          "05",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030029",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/29",
  abstract =     "The Windows Operating System (OS) is the most popular
                 desktop OS in the world, as it has the majority market
                 share of both servers and personal computing
                 necessities. However, as its default signature-based
                 security measures are ineffectual for detecting
                 zero-day and stealth attacks, it needs an intelligent
                 Host-based Intrusion Detection System (HIDS).
                 Unfortunately, a comprehensive data set that reflects
                 the modern Windows OS's normal and attack surfaces is
                 not publicly available. To fill this gap, in this paper
                 two open data sets generated by the cyber security
                 department of the Australian Defence Force Academy
                 (ADFA) are introduced, namely: Australian Defence Force
                 Academy Windows Data Set (ADFA-WD); and Australian
                 Defence Force Academy Windows Data Set with a Stealth
                 Attacks Addendum (ADFA-WD: SAA). Statistical analysis
                 results based on these data sets show that, due to the
                 low foot prints of modern attacks and high similarity
                 of normal and attacked data, both these data sets are
                 complex, and highly intelligent Host based Anomaly
                 Detection Systems (HADS) design will be required.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Cyber Warfare.",
}

@Article{Santos-Olmo:2016:ISC,
  author =       "Antonio Santos-Olmo and Luis Enrique S{\'a}nchez and
                 Ismael Caballero and Sara Camacho and Eduardo
                 Fernandez-Medina",
  title =        "The Importance of the Security Culture in {SMEs} as
                 Regards the Correct Management of the Security of Their
                 Assets",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "30",
  day =          "07",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030030",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/30",
  abstract =     "The information society is increasingly more dependent
                 on Information Security Management Systems (ISMSs), and
                 the availability of these kinds of systems is now vital
                 for the development of Small and Medium-Sized
                 Enterprises (SMEs). However, these companies require
                 ISMSs that have been adapted to their special features,
                 and which are optimized as regards the resources needed
                 to deploy and maintain them. This article shows how
                 important the security culture within ISMSs is for
                 SMEs, and how the concept of security culture has been
                 introduced into a security management methodology
                 (MARISMA is a Methodology for ``Information Security
                 Management System in SMEs'' developed by the Sicaman
                 Nuevas Tecnolog{\'\i}as Company, Research Group GSyA
                 and Alarcos of the University of Castilla-La Mancha.)
                 for SMEs. This model is currently being directly
                 applied to real cases, thus allowing a steady
                 improvement to be made to its implementation.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{DeDeo:2016:CCW,
  author =       "Simon DeDeo",
  title =        "Conflict and Computation on {Wikipedia}: a
                 Finite-State Machine Analysis of {Editor}
                 Interactions",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "31",
  day =          "08",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030031",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/31",
  abstract =     "What is the boundary between a vigorous argument and a
                 breakdown of relations? What drives a group of
                 individuals across it? Taking Wikipedia as a test case,
                 we use a hidden Markov model to approximate the
                 computational structure and social grammar of more than
                 a decade of cooperation and conflict among its editors.
                 Across a wide range of pages, we discover a bursty
                 war/peace structure where the systems can become
                 trapped, sometimes for months, in a computational
                 subspace associated with significantly higher levels of
                 conflict-tracking ``revert'' actions. Distinct patterns
                 of behavior characterize the lower-conflict subspace,
                 including tit-for-tat reversion. While a fraction of
                 the transitions between these subspaces are associated
                 with top-down actions taken by administrators, the
                 effects are weak. Surprisingly, we find no statistical
                 signal that transitions are associated with the
                 appearance of particularly anti-social users, and only
                 weak association with significant news events outside
                 the system. These findings are consistent with
                 transitions being driven by decentralized processes
                 with no clear locus of control. Models of belief
                 revision in the presence of a common resource for
                 information-sharing predict the existence of two
                 distinct phases: a disordered high-conflict phase, and
                 a frozen phase with spontaneously-broken symmetry. The
                 bistability we observe empirically may be a consequence
                 of editor turn-over, which drives the system to a
                 critical point between them.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Computational Social Sciences:
                 Contagion, Collective Behaviors, and Networks.",
}

@Article{Guidi:2016:CSI,
  author =       "Gabriele Guidi and Roberto Miniati and Matteo Mazzola
                 and Ernesto Iadanza",
  title =        "Case Study: {IBM Watson} Analytics Cloud Platform as
                 Analytics-as-a-Service System for Heart Failure Early
                 Detection",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "32",
  day =          "13",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030032",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/32",
  abstract =     "In the recent years the progress in technology and the
                 increasing availability of fast connections have
                 produced a migration of functionalities in Information
                 Technologies services, from static servers to
                 distributed technologies. This article describes the
                 main tools available on the market to perform Analytics
                 as a Service (AaaS) using a cloud platform. It is also
                 described a use case of IBM Watson Analytics, a cloud
                 system for data analytics, applied to the following
                 research scope: detecting the presence or absence of
                 Heart Failure disease using nothing more than the
                 electrocardiographic signal, in particular through the
                 analysis of Heart Rate Variability. The obtained
                 results are comparable with those coming from the
                 literature, in terms of accuracy and predictive power.
                 Advantages and drawbacks of cloud versus static
                 approaches are discussed in the last sections.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Florez:2016:ADC,
  author =       "Ang{\'e}lica Fl{\'o}rez and Lenin Serrano and Urbano
                 G{\'o}mez and Luis Su{\'a}rez and Alejandro Villarraga
                 and Hugo Rodr{\'\i}guez",
  title =        "Analysis of Dynamic Complexity of the Cyber Security
                 Ecosystem of {Colombia}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "33",
  day =          "19",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030033",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/33",
  abstract =     "This paper presents two proposals for the analysis of
                 the complexity of the Cyber security Ecosystem of
                 Colombia (CEC). This analysis shows the available
                 knowledge about entities engaged in cyber security in
                 Colombia and the relationships between them, which
                 allow an understanding of the synergy between the
                 different existing components. The complexity of the
                 CEC is detailed from the view of the Influence Diagram
                 of System Dynamics and the Domain Diagram of Software
                 Engineering. The resulting model makes cyber security
                 evident as a strategic component of national
                 security.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Merrick:2016:SGT,
  author =       "Kathryn Merrick and Medria Hardhienata and Kamran
                 Shafi and Jiankun Hu",
  title =        "A Survey of Game Theoretic Approaches to Modelling
                 Decision-Making in Information Warfare Scenarios",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "34",
  day =          "22",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030034",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/34",
  abstract =     "Our increasing dependence on information technologies
                 and autonomous systems has escalated international
                 concern for information- and cyber-security in the face
                 of politically, socially and religiously motivated
                 cyber-attacks. Information warfare tactics that
                 interfere with the flow of information can challenge
                 the survival of individuals and groups. It is
                 increasingly important that both humans and machines
                 can make decisions that ensure the trustworthiness of
                 information, communication and autonomous systems.
                 Subsequently, an important research direction is
                 concerned with modelling decision-making processes. One
                 approach to this involves modelling decision-making
                 scenarios as games using game theory. This paper
                 presents a survey of information warfare literature,
                 with the purpose of identifying games that model
                 different types of information warfare operations. Our
                 contribution is a systematic identification and
                 classification of information warfare games, as a basis
                 for modelling decision-making by humans and machines in
                 such scenarios. We also present a taxonomy of games
                 that map to information warfare and cyber crime
                 problems as a precursor to future research on
                 decision-making in such scenarios. We identify and
                 discuss open research questions including the role of
                 behavioural game theory in modelling human decision
                 making and the role of machine decision-making in
                 information warfare scenarios.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Cyber Warfare.",
}

@Article{Kou:2016:TVR,
  author =       "Weili Kou and Hui Li and Kailai Zhou",
  title =        "Turning Video Resource Management into Cloud
                 Computing",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "35",
  day =          "21",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030035",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/35",
  abstract =     "Big data makes cloud computing more and more popular
                 in various fields. Video resources are very useful and
                 important to education, security monitoring, and so on.
                 However, issues of their huge volumes, complex data
                 types, inefficient processing performance, weak
                 security, and long times for loading pose challenges in
                 video resource management. The Hadoop Distributed File
                 System (HDFS) is an open-source framework, which can
                 provide cloud-based platforms and presents an
                 opportunity for solving these problems. This paper
                 presents video resource management architecture based
                 on HDFS to provide a uniform framework and a five-layer
                 model for standardizing the current various algorithms
                 and applications. The architecture, basic model, and
                 key algorithms are designed for turning video resources
                 into a cloud computing environment. The design was
                 tested by establishing a simulation system prototype.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{Santos-Olmo:2016:AAR,
  author =       "Antonio Santos-Olmo and Luis Enrique S{\'a}nchez and
                 David G. Rosado and Eduardo Fern{\'a}ndez-Medina and
                 Mario Piattini",
  title =        "Applying the Action-Research Method to Develop a
                 Methodology to Reduce the Installation and Maintenance
                 Times of Information Security Management Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "36",
  day =          "22",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030036",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/36",
  abstract =     "Society is increasingly dependent on Information
                 Security Management Systems (ISMS), and having these
                 kind of systems has become vital for the development of
                 Small and Medium-Sized Enterprises (SMEs). However,
                 these companies require ISMS that have been adapted to
                 their special features and have been optimized as
                 regards the resources needed to deploy and maintain
                 them, with very low costs and short implementation
                 periods. This paper discusses the different cycles
                 carried out using the `Action Research (AR)' method,
                 which have allowed the development of a security
                 management methodology for SMEs that is able to
                 automate processes and reduce the implementation time
                 of the ISMS.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Boulos:2016:IWH,
  author =       "Maged N. Kamel Boulos and Dean M. Giustini and Steve
                 Wheeler",
  title =        "Instagram and {WhatsApp} in Health and Healthcare: An
                 Overview",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "37",
  day =          "26",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030037",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/37",
  abstract =     "Instagram and WhatsApp are two social media and
                 networking services introduced in 2010. They are
                 currently subsidiaries of Facebook, Inc., California,
                 USA. Using evidence from the published literature and
                 case reports indexed in PubMed and other sources, we
                 present an overview of the various applications of
                 Instagram and WhatsApp in health and healthcare. We
                 also briefly describe the main issues surrounding the
                 uses of these two apps in health and medicine.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue e-Health.",
}

@Article{Yang:2016:NQP,
  author =       "Weijun Yang and Yuanfeng Chen",
  title =        "A Novel {QoS} Provisioning Algorithm for Optimal
                 Multicast Routing in {WMNs}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "38",
  day =          "01",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030038",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/38",
  abstract =     "The problem of optimal multicast routing in Wireless
                 Mess Networks (WMNs) with Quality-of-Service (QoS)
                 provisioning, which is Non-Deterministic Polynomial
                 (NP)-complete, is studied in this paper. The existing
                 algorithms are not very efficient or effective. In
                 order to find an approximation optimal solution for
                 WMNs in feasible time from source to the set of
                 destination nodes, combining the previous deterministic
                 algorithm with the well-known Minimum Path Cost
                 Heuristic (MPH) algorithm, a novel multicast heuristic
                 approximation (NMHA) algorithm with QoS provisioning is
                 proposed in this paper to deal with it. The theoretical
                 validations for the proposed algorithm are presented to
                 show its performance and efficiency. After that, the
                 random static networks with different destination nodes
                 are evaluated. Simulations in these networks show that
                 the proposed algorithm can achieve the approximate
                 optimal solution with the approximation factor of 2(1 +
                 \epsilon)(1 - 1/ q) and the time complexity of O(qmn 2
                 \tau K-1).",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{Liu:2016:OBR,
  author =       "Xin Liu and Zhongfu Li and Shaohua Jiang",
  title =        "Ontology-Based Representation and Reasoning in
                 Building Construction Cost Estimation in {China}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "39",
  day =          "03",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030039",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/39",
  abstract =     "Cost estimation is one of the most critical tasks for
                 building construction project management. The existing
                 building construction cost estimation methods of many
                 countries, including China, require information from
                 several sources, including material, labor, and
                 equipment, and tend to be manual, time-consuming, and
                 error-prone. To solve these problems, a building
                 construction cost estimation model based on ontology
                 representation and reasoning is established, which
                 includes three major components, i.e., concept model
                 ontology, work item ontology, and construction
                 condition ontology. Using this model, the cost
                 estimation information is modeled into OWL axioms and
                 SWRL rules that leverage the semantically rich ontology
                 representation to reason about cost estimation. Based
                 on OWL axioms and SWRL rules, the cost estimation
                 information can be translated into a set of concept
                 models, work items, and construction conditions
                 associated with the specific construction conditions.
                 The proposed method is demonstrated in Prot{\'e}g{\'e}
                 3.4.8 through case studies based on the Measurement
                 Specifications of Building Construction and Decoration
                 Engineering taken from GB 50500-2013 (the Chinese
                 national mandatory specifications). Finally, this
                 research discusses the limitations of the proposed
                 method and future research directions. The proposed
                 method can help a building construction cost estimator
                 extract information more easily and quickly.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantic Computing and Knowledge
                 Building.",
}

@Article{Chinnachodteeranun:2016:SOS,
  author =       "Rassarin Chinnachodteeranun and Kiyoshi Honda",
  title =        "Sensor Observation Service {API} for Providing Gridded
                 Climate Data to Agricultural Applications",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "40",
  day =          "09",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030040",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/40",
  abstract =     "We developed a mechanism for seamlessly providing
                 weather data and long-term historical climate data from
                 a gridded data source through an international standard
                 web API, which was the Sensor Observation Service (SOS)
                 defined by the Open Geospatial Consortium (OGC). The
                 National Agriculture and Food Research Organization
                 (NARO) Japan has been providing gridded climate data
                 consisting of nine daily meteorological variables,
                 which are average, minimum, maximum of air temperature,
                 relative humidity, sunshine duration, solar radiant
                 exposure, downward longwave radiation, precipitation
                 and wind speed for 35 years covering Japan. The gridded
                 data structure is quite useful for spatial analysis,
                 such as developing crop suitability maps and monitoring
                 regional crop development. Individual farmers, however,
                 make decisions using historical climate information and
                 forecasts for an incoming cropping season of their
                 farms. In this regard, climate data at a point-based
                 structure are convenient for application development to
                 support farmers' decisions. Through the proposed
                 mechanism in this paper, the agricultural applications
                 and analysis can request point-based climate data from
                 a gridded data source through the standard API with no
                 need to deal with the complicated hierarchical data
                 structure of the gridded climate data source. Clients
                 can easily obtain data and metadata by only accessing
                 the service endpoint. The mechanism also provides
                 several web bindings and data encodings for the
                 clients' convenience. Caching, including the
                 pre-caching mechanism, was developed and evaluated to
                 secure an effective response time. The mechanism
                 enhances the accessibility and usability of the gridded
                 weather data source, as well as SOS API for
                 agricultural applications.",
  acknowledgement = ack-nhfb,
}

@Article{Diaz:2016:CAT,
  author =       "Paloma D{\'\i}az and John M. Carroll and Ignacio
                 Aedo",
  title =        "Coproduction as an Approach to Technology-Mediated
                 Citizen Participation in Emergency Management",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "41",
  day =          "10",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030041",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/41",
  abstract =     "Social and mobile computing open up new possibilities
                 for integrating citizens' information, knowledge, and
                 social capital in emergency management (EM). This
                 participation can improve the capacity of local
                 agencies to respond to unexpected events by involving
                 citizens not only as first line informants, but also as
                 first responders. This participation could contribute
                 to build resilient communities aware of the risks they
                 are threatened by and able to mobilize their social
                 capital to cope with them and, in turn, decrease the
                 impact of threats and hazards. However for this
                 participation to be possible organizations in charge of
                 EM need to realize that involving citizens does not
                 interfere with their protocols and that citizens are a
                 valuable asset that can contribute to the EM process
                 with specific skills and capabilities. In this paper we
                 discuss the design challenges of using social and
                 mobile computing to move to a more participatory EM
                 process that starts by empowering both citizens and
                 organizations in a coproduction service envisioned as a
                 partnership effort. As an example, we describe a case
                 study of a participatory design approach that involved
                 professional EM workers and decision makers in an
                 effort to understand the challenges of using
                 technology-based solutions to integrate citizen skills
                 and capabilities in their operation protocols. The case
                 study made it possible to identify specific roles that
                 citizens might play in a crisis or disaster and to
                 envision scenarios were technologies could be used to
                 integrate their skills into the EM process. In this way
                 the paper contributes to the roles and the scenarios of
                 theory-building about coproduction in EM services.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Mobile Computing.",
}

@Article{Francese:2016:SEP,
  author =       "Rita Francese and Michele Risi",
  title =        "Supporting Elderly People by Ad Hoc Generated Mobile
                 Applications Based on Vocal Interaction",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "42",
  day =          "25",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030042",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/42",
  abstract =     "Mobile devices can be exploited for enabling people to
                 interact with Internet of Things (IoT) services. The
                 MicroApp Generator [1] is a service-composition tool
                 for supporting the generation of mobile applications
                 directly on the mobile device. The user interacts with
                 the generated app by using the traditional touch-based
                 interaction. This kind of interaction often is not
                 suitable for elderly and special needs people that
                 cannot see or touch the screen. In this paper, we
                 extend the MicroApp Generator with an interaction
                 approach enabling a user to interact with the generated
                 app only by using his voice, which can be very useful
                 to let special needs people live at home. To this aim,
                 once the mobile app has been generated and executed,
                 the system analyses and describes the user interface,
                 listens to the user speech and performs the associated
                 actions. A preliminary analysis has been conducted to
                 assess the user experience of the proposed approach by
                 a sample composed of elderly users by using a
                 questionnaire as a research instrument.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Mobile Computing.",
}

@Article{Carta:2016:ISI,
  author =       "Salvatore Carta and Ludovico Boratto",
  title =        "Introduction to the Special Issue on Human-Computer
                 Interaction and the {Social Web}",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "43",
  day =          "01",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030043",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/43",
  abstract =     "Data is currently one of the most important assets for
                 companies in every field. The continuous growth in the
                 importance and volume of data has created a new
                 problem: it cannot be handled by traditional analysis
                 techniques. This problem was, therefore, solved through
                 the creation of a new paradigm: Big Data. However, Big
                 Data originated new issues related not only to the
                 volume or the variety of the data, but also to data
                 security and privacy. In order to obtain a full
                 perspective of the problem, we decided to carry out an
                 investigation with the objective of highlighting the
                 main issues regarding Big Data security, and also the
                 solutions proposed by the scientific community to solve
                 them. In this paper, we explain the results obtained
                 after applying a systematic mapping study to security
                 in the Big Data ecosystem. It is almost impossible to
                 carry out detailed research into the entire topic of
                 security, and the outcome of this research is,
                 therefore, a big picture of the main problems related
                 to security in a Big Data system, along with the
                 principal solutions to them proposed by the research
                 community.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Human-Computer Interaction and the
                 Social Web.",
}

@Article{Moreno:2016:MIB,
  author =       "Julio Moreno and Manuel A. Serrano and Eduardo
                 Fern{\'a}ndez-Medina",
  title =        "Main Issues in Big Data Security",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "44",
  day =          "01",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030044",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/44",
  abstract =     "Data is currently one of the most important assets for
                 companies in every field. The continuous growth in the
                 importance and volume of data has created a new
                 problem: it cannot be handled by traditional analysis
                 techniques. This problem was, therefore, solved through
                 the creation of a new paradigm: Big Data. However, Big
                 Data originated new issues related not only to the
                 volume or the variety of the data, but also to data
                 security and privacy. In order to obtain a full
                 perspective of the problem, we decided to carry out an
                 investigation with the objective of highlighting the
                 main issues regarding Big Data security, and also the
                 solutions proposed by the scientific community to solve
                 them. In this paper, we explain the results obtained
                 after applying a systematic mapping study to security
                 in the Big Data ecosystem. It is almost impossible to
                 carry out detailed research into the entire topic of
                 security, and the outcome of this research is,
                 therefore, a big picture of the main problems related
                 to security in a Big Data system, along with the
                 principal solutions to them proposed by the research
                 community.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Kosenkov:2016:CCN,
  author =       "Alexander Kosenkov",
  title =        "Cyber Conflicts as a New Global Threat",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "45",
  day =          "09",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030045",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/45",
  abstract =     "In this paper, an attempt is made to analyze the
                 potential threats and consequences of cyber conflicts
                 and, in particular, the risks of a global cyber
                 conflict. The material is based on a comprehensive
                 analysis of the nature of cyber conflict and its
                 elements from both technical and societal points of
                 view. The approach used in the paper considers the
                 societal component as an essential part of cyber
                 conflicts, allowing basics of cyber conflicts often
                 disregarded by researchers and the public to be
                 highlighted. Finally, the conclusion offers an
                 opportunity to consider cyber conflict as the most
                 advanced form of modern warfare, which imposes the most
                 serious threat and whose effect could be comparable to
                 weapons of mass destruction.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Cyber Warfare.",
}

@Article{Marti:2016:DED,
  author =       "Patrizia Marti and Carl Megens and Caroline Hummels",
  title =        "Data-Enabled Design for Social Change: Two Case
                 Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "46",
  day =          "23",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040046",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/46",
  abstract =     "Smartness in contemporary society implies the use of
                 massive data to improve the experience of people with
                 connected services and products. The use of big data to
                 collect information about people's behaviours opens a
                 new concept of ``user-centred design'' where users are
                 remotely monitored, observed and profiled. In this
                 paradigm, users are considered as sources of
                 information and their participation in the design
                 process is limited to a role of data generators. There
                 is a need to identify methodologies that actively
                 involve people and communities at the core of
                 ecosystems of interconnected products and services. Our
                 contribution to designing for social innovation in
                 ecosystems relies on developing new methods and
                 approaches to transform data-driven design using a
                 participatory and co-creative data-enabled design
                 approach. To this end, we present one of the methods we
                 have developed to design ``smart'' systems called
                 Experiential Design Landscapes (EDL), and two sample
                 projects, Social Stairs and [Y]our Perspective. Social
                 Stairs faces the topic of behaviour change mediated by
                 sensing technologies. [Y]our Perspective is a social
                 platform to sustain processes of deliberative
                 democracy. Both projects exemplify our approach to
                 data-enabled design as a social proactive participatory
                 design approach.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Deng:2016:RCM,
  author =       "Ziyun Deng and Lei Chen and Tingqing He and Tao
                 Meng",
  title =        "A Reliability Calculation Method for {Web} Service
                 Composition Using Fuzzy Reasoning Colored {Petri} Nets
                 and Its Application on Supercomputing Cloud Platform",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "47",
  day =          "27",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040047",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/47",
  abstract =     "In order to develop a Supercomputing Cloud Platform
                 (SCP) prototype system using Service-Oriented
                 Architecture (SOA) and Petri nets, we researched some
                 technologies for Web service composition. Specifically,
                 in this paper, we propose a reliability calculation
                 method for Web service compositions, which uses Fuzzy
                 Reasoning Colored Petri Net (FRCPN) to verify the Web
                 service compositions. We put forward a definition of
                 semantic threshold similarity for Web services and a
                 formal definition of FRCPN. We analyzed five kinds of
                 production rules in FRCPN, and applied our method to
                 the SCP prototype. We obtained the reliability value of
                 the end Web service as an indicator of the overall
                 reliability of the FRCPN. The method can test the
                 activity of FRCPN. Experimental results show that the
                 reliability of the Web service composition has a
                 correlation with the number of Web services and the
                 range of reliability transition values.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{Alti:2016:ASB,
  author =       "Adel Alti and Abderrahim Lakehal and S{\'e}bastien
                 Laborie and Philippe Roose",
  title =        "Autonomic Semantic-Based Context-Aware Platform for
                 Mobile Applications in Pervasive Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "48",
  day =          "29",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040048",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/48",
  abstract =     "Currently, the field of smart-* (home, city, health,
                 tourism, etc.) is naturally heterogeneous and
                 multimedia oriented. In such a domain, there is an
                 increasing usage of heterogeneous mobile devices, as
                 well as captors transmitting data (IoT). They are
                 highly connected and can be used for many different
                 services, such as to monitor, to analyze and to display
                 information to users. In this context, data management
                 and adaptation in real time are becoming a challenging
                 task. More precisely, at one time, it is necessary to
                 handle in a dynamic, intelligent and transparent
                 framework various data provided by multiple devices
                 with several modalities. This paper presents a
                 Kali-Smart platform, which is an autonomic
                 semantic-based context-aware platform. It is based on
                 semantic web technologies and a middleware providing
                 autonomy and reasoning facilities. Moreover, Kali-Smart
                 is generic and, as a consequence, offers to users a
                 flexible infrastructure where they can easily control
                 various interaction modalities of their own situations.
                 An experimental study has been made to evaluate the
                 performance and feasibility of the proposed platform.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Mobile Computing.",
}

@Article{Huckle:2016:SB,
  author =       "Steve Huckle and Martin White",
  title =        "Socialism and the Blockchain",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "49",
  day =          "18",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040049",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/49",
  abstract =     "Bitcoin (BTC) is often cited as Libertarian. However,
                 the technology underpinning Bitcoin, blockchain, has
                 properties that make it ideally suited to Socialist
                 paradigms. Current literature supports the Libertarian
                 viewpoint by focusing on the ability of Bitcoin to
                 bypass central authority and provide anonymity; rarely
                 is there an examination of blockchain technology's
                 capacity for decentralised transparency and
                 auditability in support of a Socialist model. This
                 paper conducts a review of the blockchain,
                 Libertarianism, and Socialist philosophies. It then
                 explores Socialist models of public ownership and looks
                 at the unique cooperative properties of blockchain that
                 make the technology ideal for supporting Socialist
                 societies. In summary, this paper argues that
                 blockchain technologies are not just a Libertarian
                 tool, they also enhance Socialist forms of
                 governance.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{Angelini:2016:SLL,
  author =       "Leonardo Angelini and Stefano Carrino and Omar Abou
                 Khaled and Susie Riva-Mossman and Elena Mugellini",
  title =        "Senior Living Lab: An Ecological Approach to {Foster}
                 Social Innovation in an Ageing Society",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "50",
  day =          "21",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040050",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/50",
  abstract =     "The Senior Living Lab (SLL) is a transdisciplinary
                 research platform created by four Universities that
                 aims at promoting ageing well at home through the
                 co-creation of innovative products, services and
                 practices with older adults. While most living labs for
                 ageing well are focused on Information and
                 Communication Technologies (ICTs), this social
                 laboratory adopts a transdisciplinary approach,
                 bringing together designers, economists, engineers and
                 healthcare professionals to develop multiple forms of
                 social innovation using participatory methods. The SLL
                 is based on an ecological approach, connecting
                 professionals and users in a cooperative network and
                 involving all of the stakeholders concerned with ageing
                 well, such as existing associations, business entities
                 and policy-makers. Three main themes for the co-design
                 of products and services were identified at the
                 beginning of the SLL conception, each sustained by a
                 major business partner: healthy nutrition to cope with
                 frailty, improved autonomous mobility to foster
                 independence and social communication to prevent
                 isolation. This article shows the innovative
                 transdisciplinary approach of the SLL and discusses the
                 particular challenges that emerged during the first
                 year of its creation, investigating the role of ICTs
                 when designing products and services for older
                 adults.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Ali:2016:OSD,
  author =       "Syed Mustafa Ali and Rachel Powers and Jeffrey Beorse
                 and Arif Noor and Farah Naureen and Naveed Anjum and
                 Muhammad Ishaq and Javariya Aamir and Richard Anderson",
  title =        "{ODK} Scan: Digitizing Data Collection and Impacting
                 Data Management Processes in {Pakistan}'s Tuberculosis
                 Control Program",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "51",
  day =          "24",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040051",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/51",
  abstract =     "The present grievous tuberculosis situation can be
                 improved by efficient case management and timely
                 follow-up evaluations. With the advent of digital
                 technology, this can be achieved through quick
                 summarization of the patient-centric data. The aim of
                 our study was to assess the effectiveness of the ODK
                 Scan paper-to-digital system during a testing period of
                 three months. A sequential, explanatory mixed-method
                 research approach was employed to elucidate technology
                 use. Training, smartphones, the application and
                 3G-enabled SIMs were provided to the four field
                 workers. At the beginning, baseline measures of the
                 data management aspects were recorded and compared with
                 endline measures to determine the impact of ODK Scan.
                 Additionally, at the end of the study, users' feedback
                 was collected regarding app usability, user interface
                 design and workflow changes. A total of 122 patients'
                 records were retrieved from the server and analysed in
                 terms of quality. It was found that ODK Scan recognized
                 99.2\% of multiple choice fill-in bubble responses and
                 79.4\% of numerical digit responses correctly. However,
                 the overall quality of the digital data was decreased
                 in comparison to manually entered data. Using ODK Scan,
                 a significant time reduction is observed in data
                 aggregation and data transfer activities, but data
                 verification and form-filling activities took more
                 time. Interviews revealed that field workers saw value
                 in using ODK Scan, but they were more concerned about
                 the time-consuming aspects of the use of ODK Scan.
                 Therefore, it is concluded that minimal disturbance in
                 the existing workflow, continuous feedback and value
                 additions are the important considerations for the
                 implementing organization to ensure technology adoption
                 and workflow improvements.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue e-Health.",
}

@Article{Hoang:2016:RHI,
  author =       "Xuan Dau Hoang and Hong Ky Pham",
  title =        "A Review on Hot-{IP} Finding Methods and Its
                 Application in Early {DDoS} Target Detection",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "52",
  day =          "25",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040052",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/52",
  abstract =     "On the high-speed connections of the Internet or
                 computer networks, the IP (Internet Protocol) packet
                 traffic passing through the network is extremely high,
                 and that makes it difficult for network monitoring and
                 attack detection applications. This paper reviews
                 methods to find the high-occurrence-frequency elements
                 in the data stream and applies the most efficient
                 methods to find Hot-IPs that are high-frequency IP
                 addresses of IP packets passing through the network.
                 Fast finding of Hot-IPs in the IP packet stream can be
                 effectively used in early detection of DDoS
                 (Distributed Denial of Service) attack targets and
                 spreading sources of network worms. Research results
                 show that the Count-Min method gives the best overall
                 performance for Hot-IP detection thanks to its low
                 computational complexity, low space requirement and
                 fast processing speed. We also propose an early
                 detection model of DDoS attack targets based on Hot-IP
                 finding, which can be deployed on the target network
                 routers.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Cyber Warfare.",
}

@Article{Zhu:2016:NMF,
  author =       "Zhiqin Zhu and Guanqiu Qi and Yi Chai and Yinong
                 Chen",
  title =        "A Novel Multi-Focus Image Fusion Method Based on
                 Stochastic Coordinate Coding and Local Density Peaks
                 Clustering",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "53",
  day =          "11",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040053",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/53",
  abstract =     "The multi-focus image fusion method is used in image
                 processing to generate all-focus images that have large
                 depth of field (DOF) based on original multi-focus
                 images. Different approaches have been used in the
                 spatial and transform domain to fuse multi-focus
                 images. As one of the most popular image processing
                 methods, dictionary-learning-based spare representation
                 achieves great performance in multi-focus image fusion.
                 Most of the existing dictionary-learning-based
                 multi-focus image fusion methods directly use the whole
                 source images for dictionary learning. However, it
                 incurs a high error rate and high computation cost in
                 dictionary learning process by using the whole source
                 images. This paper proposes a novel stochastic
                 coordinate coding-based image fusion framework
                 integrated with local density peaks. The proposed
                 multi-focus image fusion method consists of three
                 steps. First, source images are split into small image
                 patches, then the split image patches are classified
                 into a few groups by local density peaks clustering.
                 Next, the grouped image patches are used for
                 sub-dictionary learning by stochastic coordinate
                 coding. The trained sub-dictionaries are combined into
                 a dictionary for sparse representation. Finally, the
                 simultaneous orthogonal matching pursuit (SOMP)
                 algorithm is used to carry out sparse representation.
                 After the three steps, the obtained sparse coefficients
                 are fused following the max L1-norm rule. The fused
                 coefficients are inversely transformed to an image by
                 using the learned dictionary. The results and analyses
                 of comparison experiments demonstrate that fused images
                 of the proposed method have higher qualities than
                 existing state-of-the-art methods.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{He:2016:NFM,
  author =       "Jingsha He and Chengyue Chang and Peng He and Muhammad
                 Salman Pathan",
  title =        "Network Forensics Method Based on Evidence Graph and
                 Vulnerability Reasoning",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "54",
  day =          "10",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040054",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/54",
  abstract =     "As the Internet becomes larger in scale, more complex
                 in structure and more diversified in traffic, the
                 number of crimes that utilize computer technologies is
                 also increasing at a phenomenal rate. To react to the
                 increasing number of computer crimes, the field of
                 computer and network forensics has emerged. The general
                 purpose of network forensics is to find malicious users
                 or activities by gathering and dissecting firm
                 evidences about computer crimes, e.g., hacking.
                 However, due to the large volume of Internet traffic,
                 not all the traffic captured and analyzed is valuable
                 for investigation or confirmation. After analyzing some
                 existing network forensics methods to identify common
                 shortcomings, we propose in this paper a new network
                 forensics method that uses a combination of network
                 vulnerability and network evidence graph. In our
                 proposed method, we use vulnerability evidence and
                 reasoning algorithm to reconstruct attack scenarios and
                 then backtrack the network packets to find the original
                 evidences. Our proposed method can reconstruct attack
                 scenarios effectively and then identify multi-staged
                 attacks through evidential reasoning. Results of
                 experiments show that the evidence graph constructed
                 using our method is more complete and credible while
                 possessing the reasoning capability.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Cyber Warfare.",
}

@Article{Chinnachodteeranun:2016:DIW,
  author =       "Rassarin Chinnachodteeranun and Nguyen Duy Hung and
                 Kiyoshi Honda and Amor V. M. Ines and Eunjin Han",
  title =        "Designing and Implementing Weather Generators as {Web}
                 Services",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "4",
  pages =        "55",
  day =          "15",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8040055",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/4/55",
  abstract =     "Climate and weather realizations are essential inputs
                 for simulating crop growth and yields to analyze the
                 risks associated with future conditions. To simplify
                 the procedure of generating weather realizations and
                 make them available over the Internet, we implemented
                 novel mechanisms for providing weather generators as
                 web services, as well as a mechanism for sharing
                 identical weather realizations given a climatological
                 information. A web service for preparing long-term
                 climate data was implemented based on an international
                 standard, Sensor Observation Service (SOS). The weather
                 generator services, which are the core components of
                 the framework, analyze climatological data, and can
                 take seasonal climate forecasts as inputs for
                 generating weather realizations. The generated weather
                 realizations are encoded in a standard format, which
                 are ready for use to crop modeling. All outputs are
                 generated in SOS standard, which broadens the extent of
                 data sharing and interoperability with other sectoral
                 applications, e.g., water resources management. These
                 services facilitate the development of other
                 applications requiring input weather realizations, as
                 these can be obtained easily by just calling the
                 service. The workload of analysts related to data
                 preparation and handling of legacy weather generator
                 programs can be reduced. The architectural design and
                 implementation presented here can be used as a
                 prototype for constructing further services on top of
                 an interoperable sensor network system.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Lopez:2017:KTC,
  author =       "Lorena Isabel Barona L{\'o}pez and {\'A}ngel Leonardo
                 Valdivieso Caraguay and Marco Antonio Sotelo Monge and
                 Luis Javier Garc{\'\i}a Villalba",
  title =        "Key Technologies in the Context of Future Networks:
                 Operational and Management Requirements",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "1",
  day =          "22",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/1",
  abstract =     "The concept of Future Networks is based on the premise
                 that current infrastructures require enhanced control,
                 service customization, self-organization and
                 self-management capabilities to meet the new needs in a
                 connected society, especially of mobile users. In order
                 to provide a high-performance mobile system, three main
                 fields must be improved: radio, network, and operation
                 and management. In particular, operation and management
                 capabilities are intended to enable business agility
                 and operational sustainability, where the addition of
                 new services does not imply an excessive increase in
                 capital or operational expenditures. In this context, a
                 set of key-enabled technologies have emerged in order
                 to aid in this field. Concepts such as Software Defined
                 Network (SDN), Network Function Virtualization (NFV)
                 and Self-Organized Networks (SON) are pushing
                 traditional systems towards the next 5G network
                 generation.This paper presents an overview of the
                 current status of these promising technologies and
                 ongoing works to fulfill the operational and management
                 requirements of mobile infrastructures. This work also
                 details the use cases and the challenges, taking into
                 account not only SDN, NFV, cloud computing and SON but
                 also other paradigms.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Office:2017:ARF,
  author =       "Future Internet Editorial Office",
  title =        "Acknowledgement to Reviewers of {{\booktitle{Future
                 Internet}}} in 2016",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "2",
  day =          "12",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010002",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/2",
  abstract =     "The fifth generation mobile network, or 5G, moves
                 towards bringing solutions to deploying faster
                 networks, with hundreds of thousands of simultaneous
                 connections and massive data transfer. For this
                 purpose, several emerging technologies are implemented,
                 resulting in virtualization and self-organization of
                 most of their components, which raises important
                 challenges related to safety. In order to contribute to
                 their resolution, this paper proposes a novel
                 architecture for incident management on 5G. The
                 approach combines the conventional risk management
                 schemes with the Endsley Situational Awareness model,
                 thus improving effectiveness in different aspects,
                 among them the ability to adapt to complex and
                 dynamical monitoring environments, and countermeasure
                 tracking or the role of context when decision-making.
                 The proposal takes into account all layers for
                 information processing in 5G mobile networks, ranging
                 from infrastructure to the actuators responsible for
                 deploying corrective measures.",
  acknowledgement = ack-nhfb,
}

@Article{Lopez:2017:TIM,
  author =       "Lorena Isabel Barona L{\'o}pez and {\'A}ngel Leonardo
                 Valdivieso Caraguay and Jorge Maestre Vidal and Marco
                 Antonio Sotelo Monge and Luis Javier Garc{\'\i}a
                 Villalba",
  title =        "Towards Incidence Management in {5G} Based on
                 Situational Awareness",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "3",
  day =          "17",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010003",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/3",
  abstract =     "The fifth generation mobile network, or 5G, moves
                 towards bringing solutions to deploying faster
                 networks, with hundreds of thousands of simultaneous
                 connections and massive data transfer. For this
                 purpose, several emerging technologies are implemented,
                 resulting in virtualization and self-organization of
                 most of their components, which raises important
                 challenges related to safety. In order to contribute to
                 their resolution, this paper proposes a novel
                 architecture for incident management on 5G. The
                 approach combines the conventional risk management
                 schemes with the Endsley Situational Awareness model,
                 thus improving effectiveness in different aspects,
                 among them the ability to adapt to complex and
                 dynamical monitoring environments, and countermeasure
                 tracking or the role of context when decision-making.
                 The proposal takes into account all layers for
                 information processing in 5G mobile networks, ranging
                 from infrastructure to the actuators responsible for
                 deploying corrective measures.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Martelli:2017:PVN,
  author =       "Cristina Martelli",
  title =        "A Point of View on New Education for Smart
                 Citizenship",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "4",
  day =          "01",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010004",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/4",
  abstract =     "Smart cities and intelligent communities have an
                 ever-growing demand for specialized smart services,
                 applications, and research-driven innovation. Knowledge
                 of users' profiles, behavior, and preferences are a
                 potentially dangerous side effect of smart services.
                 Citizens are usually not aware of the knowledge bases
                 generated by the IT services they use: this dimension
                 of the contemporary and digital era sheds new light on
                 the elements concerning the concept of citizenship
                 itself, as it affects dimensions like freedom and
                 privacy. This paper addresses this issue from an
                 education system perspective, and advances a
                 non-technical methodology for being aware and
                 recognizing knowledge bases generated by user-service
                 interaction. Starting from narratives, developed in
                 natural language by unskilled smart service users about
                 their experience, the proposed method advances an
                 original methodology, which is identified in the
                 conceptual models derived from these narratives, a
                 bridge towards a deeper understanding of the
                 informative implications of their behavior. The
                 proposal; which is iterative and scalable; has been
                 tested on the field and some examples of lesson
                 contents are presented and discussed.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Ecosystemic Evolution Feeded by Smart
                 Systems.",
}

@Article{Park:2017:CMR,
  author =       "Kyungmo Park and Sanghyo Lee and Yonghan Ahn",
  title =        "{Construction Management Risk System (CMRS)} for
                 Construction Management {(CM)} Firms",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "5",
  day =          "10",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010005",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/5",
  abstract =     "After the global financial crisis of 2008, the need
                 for risk management arose because it was necessary to
                 minimize the losses in construction management (CM)
                 firms. This was caused by a decreased amount of orders
                 in the Korean CM market, which intensified order
                 competition between companies. However, research
                 results revealed that risks were not being
                 systematically managed owing to the absence of risk
                 management systems. Thus, it was concluded that it was
                 necessary to develop standard operating systems and
                 implement risk management systems in order to manage
                 risks effectively. Therefore, the purpose of this study
                 was to develop a construction risk management system
                 (CRMS) for systematically managing risks. For this
                 purpose, the field operation managers of CM firms were
                 interviewed and surveyed in order to define risk
                 factors. Upon this, a risk assessment priority analysis
                 was performed. Finally, a risk management system that
                 comprised seven modules and 20 sub-modules and was
                 capable of responding systematically to risks was
                 proposed. Furthermore, the effectiveness of this system
                 was verified through on-site inspection. This system
                 allows early response to risks, accountability
                 verification and immediate response to legal disputes
                 with clients by managing risk records.",
  acknowledgement = ack-nhfb,
}

@Article{Vidros:2017:ADO,
  author =       "Sokratis Vidros and Constantinos Kolias and Georgios
                 Kambourakis and Leman Akoglu",
  title =        "Automatic Detection of Online Recruitment Frauds:
                 Characteristics, Methods, and a Public Dataset",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "6",
  day =          "03",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010006",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/6",
  abstract =     "The critical process of hiring has relatively recently
                 been ported to the cloud. Specifically, the automated
                 systems responsible for completing the recruitment of
                 new employees in an online fashion, aim to make the
                 hiring process more immediate, accurate and
                 cost-efficient. However, the online exposure of such
                 traditional business procedures has introduced new
                 points of failure that may lead to privacy loss for
                 applicants and harm the reputation of organizations. So
                 far, the most common case of Online Recruitment Frauds
                 (ORF), is employment scam. Unlike relevant online fraud
                 problems, the tackling of ORF has not yet received the
                 proper attention, remaining largely unexplored until
                 now. Responding to this need, the work at hand defines
                 and describes the characteristics of this severe and
                 timely novel cyber security research topic. At the same
                 time, it contributes and evaluates the first to our
                 knowledge publicly available dataset of 17,880
                 annotated job ads, retrieved from the use of a
                 real-life system.",
  acknowledgement = ack-nhfb,
}

@Article{He:2017:APP,
  author =       "Jingsha He and Qi Xiao and Peng He and Muhammad Salman
                 Pathan",
  title =        "An Adaptive Privacy Protection Method for Smart Home
                 Environments Using Supervised Learning",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "7",
  day =          "05",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010007",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/7",
  abstract =     "In recent years, smart home technologies have started
                 to be widely used, bringing a great deal of convenience
                 to people's daily lives. At the same time, privacy
                 issues have become particularly prominent. Traditional
                 encryption methods can no longer meet the needs of
                 privacy protection in smart home applications, since
                 attacks can be launched even without the need for
                 access to the cipher. Rather, attacks can be
                 successfully realized through analyzing the frequency
                 of radio signals, as well as the timestamp series, so
                 that the daily activities of the residents in the smart
                 home can be learnt. Such types of attacks can achieve a
                 very high success rate, making them a great threat to
                 users' privacy. In this paper, we propose an adaptive
                 method based on sample data analysis and supervised
                 learning (SDASL), to hide the patterns of daily
                 routines of residents that would adapt to dynamically
                 changing network loads. Compared to some existing
                 solutions, our proposed method exhibits advantages such
                 as low energy consumption, low latency, strong
                 adaptability, and effective privacy protection.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Rametta:2017:DSN,
  author =       "Corrado Rametta and Giovanni Schembra",
  title =        "Designing a Softwarized Network Deployed on a Fleet of
                 Drones for Rural Zone Monitoring",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "8",
  day =          "20",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010008",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/8",
  abstract =     "In the last decade, the differences in the information
                 communication technology (ICT) infrastructures between
                 urban and rural areas have registered a tremendous
                 increase. ICT infrastructures could strongly help rural
                 communities where many operations are time consuming,
                 labor-intensive and expensive due to limited access and
                 large distances to cover. One of the most attractive
                 solutions, which is widely recognized as promising for
                 filling this gap, is the use of drone fleets. In this
                 context, this paper proposes a video monitoring
                 platform as a service (VMPaaS) for wide rural areas not
                 covered by Internet access. The platform is realized
                 with a Software-Defined Network (SDN)/Network Functions
                 Virtualization (NFV)-based flying ad-hoc network
                 (FANET), whose target is providing a flexible and
                 dynamic connectivity backbone, and a set of drones
                 equipped with high-resolution cameras, each
                 transmitting a video stream of a portion of the
                 considered area. After describing the architecture of
                 the proposed platform, service chains to realize the
                 video delivery service are described, and an analytical
                 model is defined to evaluate the computational load of
                 the platform nodes in such a way so as to allow the
                 network orchestrator to decide the backbone drones
                 where running the virtual functions, and the relative
                 resources to be allocated. Numerical analysis is
                 carried out in a case study.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Tian:2017:IRB,
  author =       "Hao Tian and Peifeng Liang",
  title =        "Improved Recommendations Based on Trust Relationships
                 in Social Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "9",
  day =          "21",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010009",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/9",
  abstract =     "In order to alleviate the pressure of information
                 overload and enhance consumer satisfaction,
                 personalization recommendation has become increasingly
                 popular in recent years. As a result, various
                 approaches for recommendation have been proposed in the
                 past few years. However, traditional recommendation
                 methods are still troubled with typical issues such as
                 cold start, sparsity, and low accuracy. To address
                 these problems, this paper proposed an improved
                 recommendation method based on trust relationships in
                 social networks to improve the performance of
                 recommendations. In particular, we define trust
                 relationship afresh and consider several representative
                 factors in the formalization of trust relationships. To
                 verify the proposed approach comprehensively, this
                 paper conducted experiments in three ways. The
                 experimental results show that our proposed approach
                 leads to a substantial increase in prediction accuracy
                 and is very helpful in dealing with cold start and
                 sparsity.",
  acknowledgement = ack-nhfb,
}

@Article{Chen:2017:DBS,
  author =       "Yongqun Chen and Huaibei Zhou and Ruoshan Kong and Li
                 Zhu and Huaqing Mao",
  title =        "Decentralized Blind Spectrum Selection in Cognitive
                 Radio Networks Considering Handoff Cost",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "10",
  day =          "31",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020010",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/10",
  abstract =     "Due to the spectrum varying nature of cognitive radio
                 networks, secondary users are required to perform
                 spectrum handoffs when the spectrum is occupied by
                 primary users, which will lead to a handoff delay. In
                 this paper, based on the multi-armed bandit framework
                 of medium access in decentralized cognitive radio
                 networks, we investigate blind spectrum selection
                 problem of secondary users whose sensing ability of
                 cognitive radio is limited and the channel statistics
                 are a priori unknown, taking the handoff delay as a
                 fixed handoff cost into consideration. In this
                 scenario, secondary users have to make the choice of
                 either staying foregoing spectrum with low availability
                 or handing off to another spectrum with higher
                 availability. We model the problem and investigate the
                 performance of three representative policies, i.e.,
                 \rho PRE, SL(K), k th-UCB1. The simulation results show
                 that, despite the inclusion of the fixed handoff cost,
                 these policies achieve the same asymptotic performance
                 as that without handoff cost. Moreover, through
                 comparison of these policies, we found the k th-UCB1
                 policy has better overall performance.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Context-Awareness of Mobile Systems.",
}

@Article{Guazzini:2017:PPP,
  author =       "Andrea Guazzini and Ay{\c{c}}a Sara{\c{c}} and Camillo
                 Donati and Annalisa Nardi and Daniele Vilone and
                 Patrizia Meringolo",
  title =        "Participation and Privacy Perception in Virtual
                 Environments: The Role of Sense of Community, Culture
                 and Gender between {Italian} and {Turkish}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "11",
  day =          "07",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020011",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/11",
  abstract =     "Advancements in information and communication
                 technologies have enhanced our possibilities to
                 communicate worldwide, eliminating borders and making
                 it possible to interact with people coming from other
                 cultures like never happened before. Such powerful
                 tools have brought us to reconsider our concept of
                 privacy and social involvement in order to make them
                 fit into this wider environment. It is possible to
                 claim that the information and communication
                 technologies (ICT) revolution is changing our world and
                 is having a core role as a mediating factor for social
                 movements (e.g., Arab spring) and political decisions
                 (e.g., Brexit), shaping the world in a faster and
                 shared brand new way. It is then interesting to explore
                 how the perception of this brand new environment (in
                 terms of social engagement, privacy perception and
                 sense of belonging to a community) differs even in
                 similar cultures separated by recent historical
                 reasons. Recent historical events may in effect have
                 shaped a different psychological representation of
                 Participation, Privacy and Sense of Community in ICT
                 environments, determining a different perception of
                 affordances and concerns of these complex behaviors.
                 The aim of this research is to examine the relation
                 between the constructs of Sense of Community,
                 Participation and Privacy compared with culture and
                 gender, considering the changes that have occurred in
                 the last few years with the introduction of the web
                 environment. A questionnaire, including ad hoc created
                 scales for Participation and Privacy, have been
                 administered to 180 participants from Turkey and Italy.
                 In order to highlight the cultural differences in the
                 perception of these two constructs, we have provided a
                 semantic differential to both sub-samples showing
                 interesting outcomes. The results are then discussed
                 while taking into account the recent history of both
                 countries in terms of the widespread of new
                 technologies, political actions and protest
                 movements.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Wang:2017:SEE,
  author =       "Xinhua Wang",
  title =        "Spectrum and Energy Efficiency of Uplink Massive
                 {MIMO} System with {D2D} Underlay",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "12",
  day =          "13",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020012",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/12",
  abstract =     "In this paper, both the spectrum efficiency (SE) and
                 the energy efficiency (EE) are investigated for an
                 uplink massive multiple-input multiple-output (MIMO)
                 system coexisting with an underlay device-to-device
                 (D2D) system. The outage probability and the achievable
                 rates of the cellular user equipments (CUEs) and the
                 D2D link are derived in closed-form, respectively.
                 Constrained by the SE of the D2D link and the CUEs, the
                 EE of the massive MIMO system is maximized by jointly
                 optimizing the transmit power of CUEs and the number of
                 BS antennas. An algorithm with low complexity is
                 proposed to solve the optimization problem. Performance
                 results are provided to validate our derived
                 closed-from results and verify the efficiency of our
                 proposed scheme.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Zhang:2017:FBI,
  author =       "Yunpeng Zhang and Chengyou Wang and Xiaoli Wang and
                 Min Wang",
  title =        "Feature-Based Image Watermarking Algorithm Using {SVD}
                 and {APBT} for Copyright Protection",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "13",
  day =          "19",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020013",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/13",
  abstract =     "Watermarking techniques can be applied in digital
                 images to maintain the authenticity and integrity for
                 copyright protection. In this paper, scale-invariant
                 feature transform (SIFT) is combined with local digital
                 watermarking and a digital watermarking algorithm based
                 on SIFT, singular value decomposition (SVD), and all
                 phase biorthogonal transform (APBT) is proposed. It
                 describes the generation process of the SIFT algorithm
                 in detail and obtains a series of scale-invariant
                 feature points. A large amount of candidate feature
                 points are selected to obtain the neighborhood which
                 can be used to embed the watermark. For these selected
                 feature points, block-based APBT is carried out on
                 their neighborhoods. Moreover, a coefficients matrix of
                 certain APBT coefficients is generated for SVD to embed
                 the encrypted watermark. Experimental results
                 demonstrate that the proposed watermarking algorithm
                 has stronger robustness than some previous schemes. In
                 addition, APBT-based digital watermarking algorithm has
                 good imperceptibility and is more robust to different
                 combinations of attacks, which can be applied for the
                 purpose of copyright protection.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Yu:2017:EEM,
  author =       "Qingyao Yu and Guangming Li and Xiaojie Hang and Kun
                 Fu and And Tianqi Li",
  title =        "An Energy Efficient {MAC} Protocol for Wireless
                 Passive Sensor Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "14",
  day =          "19",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020014",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/14",
  abstract =     "Medium Access Control (MAC) protocol is one of the key
                 network protocols that ensure Wireless Sensor Networks
                 (WSNs) maintain high performance during communication.
                 MAC protocol design plays an important role in
                 improving the performances of the whole network. First,
                 Wireless Passive Sensor Networks (WPSNs) and MAC
                 protocols are introduced in this paper. Second, some
                 existing MAC protocols are introduced. Sensor MAC
                 (S-MAC) protocol is analyzed and existing improved
                 backoff algorithms are introduced. A new MAC protocol
                 called Improved Sensor MAC (IS-MAC) is then proposed to
                 solve the problem that the contention window (CW)
                 during carrier sense is fixed in S-MAC protocol. IS-MAC
                 protocol is able to adjust CW in terms of network load,
                 so energy consumption can be decreased. Finally,
                 according to the simulation results on NS2, the
                 proposed protocol has better performance in terms of
                 throughput and energy consumption.",
  acknowledgement = ack-nhfb,
}

@Article{Sehra:2017:AOD,
  author =       "Sukhjit Singh Sehra and Jaiteg Singh and Hardeep Singh
                 Rai",
  title =        "Assessing {OpenStreetMap} Data Using Intrinsic Quality
                 Indicators: An Extension to the {QGIS} Processing
                 Toolbox",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "15",
  day =          "21",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020015",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/15",
  abstract =     "OpenStreetMap (OSM) is a recent emerging area in
                 computational science. There are several unexplored
                 issues in the quality assessment of OSM. Firstly,
                 researchers are using various established assessment
                 methods by comparing OSM with authoritative dataset.
                 However, these methods are unsuitable to assess OSM
                 data quality in the case of the non-availability of
                 authoritative data. In such a scenario, the intrinsic
                 quality indicators can be used to assess the quality.
                 Secondly, a framework for data assessment specific to
                 different geographic information system (GIS) domains
                 is not available. In this light, the current study
                 presents an extension of the Quantum GIS (QGIS)
                 processing toolbox by using existing functionalities
                 and writing new scripts to handle spatial data. This
                 would enable researchers to assess the completeness of
                 spatial data using intrinsic indicators. The study also
                 proposed a heuristic approach to test the road
                 navigability of OSM data. The developed models are
                 applied on Punjab (India) OSM data. The results suggest
                 that the OSM project in Punjab (India) is progressing
                 at a slow peace, and contributors' motivation is
                 required to enhance the fitness of data. It is
                 concluded that the scripts developed to provide an
                 intuitive method to assess the OSM data based on
                 quality indicators can be easily utilized for
                 evaluating the fitness-of-use of the data of any
                 region.",
  acknowledgement = ack-nhfb,
}

@Article{Mamais:2017:PSD,
  author =       "Stylianos S. Mamais and George Theodorakopoulos",
  title =        "Private and Secure Distribution of Targeted
                 Advertisements to Mobile Phones",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "16",
  day =          "01",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020016",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/16",
  abstract =     "Online Behavioural Advertising (OBA) enables promotion
                 companies to effectively target users with ads that
                 best satisfy their purchasing needs. This is highly
                 beneficial for both vendors and publishers who are the
                 owners of the advertising platforms, such as websites
                 and app developers, but at the same time creates a
                 serious privacy threat for users who expose their
                 consumer interests. In this paper, we categorize the
                 available ad-distribution methods and identify their
                 limitations in terms of security, privacy, targeting
                 effectiveness and practicality. We contribute our own
                 system, which utilizes opportunistic networking in
                 order to distribute targeted adverts within a social
                 network. We improve upon previous work by eliminating
                 the need for trust among the users (network nodes)
                 while at the same time achieving low memory and
                 bandwidth overhead, which are inherent problems of many
                 opportunistic networks. Our protocol accomplishes this
                 by identifying similarities between the consumer
                 interests of users and then allows them to share access
                 to the same adverts, which need to be downloaded only
                 once. Although the same ads may be viewed by multiple
                 users, privacy is preserved as the users do not learn
                 each other's advertising interests. An additional
                 contribution is that malicious users cannot alter the
                 ads in order to spread malicious content, and also,
                 they cannot launch impersonation attacks.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Chen:2017:TRU,
  author =       "Haibao Chen and Yuyan Zhao and Chuxiong Yan",
  title =        "Towards Rack Utilization in {Internet} Datacenters: An
                 Approach Based on Dynamic Programming",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "17",
  day =          "06",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020017",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/17",
  abstract =     "In the datacenter rented to Internet Service Providers
                 (ISPs), the low utilization of racks can seriously
                 affect ISPs' benefit because the ISPs are charged by
                 ``rack per year'' rather than servers. Based on our
                 analysis about the utilization data from production
                 systems, we find that the over-provisioning of power
                 results in low power utilization, which potentially
                 decreases rack utilization as well as the ISPs'
                 benefit. To improve the rack utilization, maximizing
                 the number of servers in racks is an effective way. In
                 this paper, we propose a server placement algorithm to
                 minimize the power fragment in a rack. The experimental
                 results show that it can save more than 50\% leasing
                 cost (rack utilization improvement) in evaluation.",
  acknowledgement = ack-nhfb,
}

@Article{Grout:2017:SAD,
  author =       "Vic Grout",
  title =        "A Simple Approach to Dynamic Optimisation of Flexible
                 Optical Networks with Practical Application",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "18",
  day =          "23",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020018",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/18",
  abstract =     "This paper provides an initial introduction to, and
                 definition of, the `Dynamically Powered Relays for a
                 Flexible Optical Network' (DPR-FON) problem for
                 opto-electro-optical (OEO) regenerators used in optical
                 networks. In such networks, optical transmission
                 parameters can be varied dynamically as traffic
                 patterns change. This will provide different
                 bandwidths, but also change the regeneration limits as
                 a result. To support this flexibility, OEOs (`relays')
                 may be switched on and off as required, thus saving
                 power. DPR-FON is shown to be NP-complete;
                 consequently, solving such a dynamic problem in
                 real-time requires a fast heuristic capable of
                 delivering an acceptable approximation to the optimal
                 configuration with low complexity. In this paper, just
                 such an algorithm is developed, implemented, and
                 evaluated against more computationally-demanding
                 alternatives for two known cases. A number of
                 real-world extensions are considered as the paper
                 develops, combining to produce the `Generalised
                 Dynamically Powered Relays for a Flexible Optical
                 Network' (GDPR-FON) problem. This, too, is analysed and
                 an associated fast heuristic proposed, along with an
                 exploration of the further research that is required.",
  acknowledgement = ack-nhfb,
}

@Article{Sun:2017:ABM,
  author =       "Peng Sun and Guangming Li and Fuqiang Wang",
  title =        "An Adaptive Back-Off Mechanism for Wireless Sensor
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "19",
  day =          "01",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020019",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/19",
  abstract =     "Wireless sensor networks (WSNs) have been extensively
                 applied in many domains such as smart homes and
                 Internet of Things (IoT). As part of WSNs'
                 communication protocols, back-off mechanisms play an
                 essential role in the deployment of wireless channels
                 for network nodes and have been at the core of ensuring
                 effective communication. The performance of many
                 back-off algorithms is excellent in light or middle
                 load networks. However, it degrades dramatically in
                 heavy load networks. In this paper, we propose an
                 adaptive contention window medium access control (MAC)
                 protocol to improve the throughput performance under
                 heavy load. By using the number of historical
                 collisions as the parameter in the back-off mechanism
                 to reflect the channel status, the size of the
                 contention window is adjusted automatically, and the
                 throughput of network is then improved. Simulation
                 results show that our optimized MAC protocol has higher
                 throughput and energy efficiency.",
  acknowledgement = ack-nhfb,
}

@Article{Wu:2017:ACM,
  author =       "Jiang Wu and Zhou Lei and Shengbo Chen and Wenfeng
                 Shen",
  title =        "An Access Control Model for Preventing Virtual Machine
                 Escape Attack",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "20",
  day =          "02",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020020",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/20",
  abstract =     "With the rapid development of Internet, the
                 traditional computing environment is making a big
                 migration to the cloud-computing environment. However,
                 cloud computing introduces a set of new security
                 problems. Aiming at the virtual machine (VM) escape
                 attack, we study the traditional attack model and
                 attack scenarios in the cloud-computing environment. In
                 addition, we propose an access control model that can
                 prevent virtual machine escape (PVME) by adapting the
                 BLP (Bell-La Padula) model (an access control model
                 developed by D. Bell and J. LaPadula). Finally, the
                 PVME model has been implemented on full virtualization
                 architecture. The experimental results show that the
                 PVME module can effectively prevent virtual machine
                 escape while only incurring 4\% to 8\% time overhead.",
  acknowledgement = ack-nhfb,
}

@Article{Wang:2017:EEP,
  author =       "Xinhua Wang and Yan Yang and Jinlu Sheng",
  title =        "Energy Efficient Power Allocation for the Uplink of
                 Distributed Massive {MIMO} Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "21",
  day =          "09",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020021",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/21",
  abstract =     "In this paper, an energy efficient power allocation
                 scheme is proposed for a distributed massive
                 multiple-input multiple-output (MIMO) system with a
                 circular antenna array. Single-antenna users
                 simultaneously transmit signal to the base station (BS)
                 with a large number of distributed antennas. The tight
                 approximation of the energy efficiency (EE) is derived
                 in closed form expressions. Through jointly optimizing
                 the power allocation and the antenna number of BS, an
                 NP-hard problem is formulated to maximize the EE. The
                 equal power allocation is proved to be optimal given
                 the total transmit power and the number of antennas.
                 Finally, the optimal antenna number is determined by
                 one dimension search. It is noteworthy that the NP-hard
                 problem is solved by one dimension search. Simulation
                 results validate the accuracy and the low-complexity of
                 our proposed scheme.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Wang:2017:MIM,
  author =       "Weijun Wang and Ying Li and Yinghui Huang and Hui Liu
                 and Tingting Zhang",
  title =        "A Method for Identifying the Mood States of Social
                 Network Users Based on Cyber Psychometrics",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "22",
  day =          "16",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020022",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/22",
  abstract =     "Analyzing people's opinions, attitudes, sentiments,
                 and emotions based on user-generated content (UGC) is
                 feasible for identifying the psychological
                 characteristics of social network users. However, most
                 studies focus on identifying the sentiments carried in
                 the micro-blogging text and there is no ideal
                 calculation method for users' real emotional states. In
                 this study, the Profile of Mood State (POMS) is used to
                 characterize users' real mood states and a regression
                 model is built based on cyber psychometrics and a
                 multitask method. Features of users' online behavior
                 are selected through structured statistics and
                 unstructured text. Results of the correlation analysis
                 of different features demonstrate that users' real mood
                 states are not only characterized by the messages
                 expressed through texts, but also correlate with
                 statistical features of online behavior. The
                 sentiment-related features in different timespans
                 indicate different correlations with the real mood
                 state. The comparison among various regression
                 algorithms suggests that the multitask learning method
                 outperforms other algorithms in root-mean-square error
                 and error ratio. Therefore, this cyber psychometrics
                 method based on multitask learning that integrates
                 structural features and temporal emotional information
                 could effectively obtain users' real mood states and
                 could be applied in further psychological measurements
                 and predictions.",
  acknowledgement = ack-nhfb,
}

@Article{Liu:2017:NIT,
  author =       "Lingjun Liu and Zhonghua Xie and Cui Yang",
  title =        "A Novel Iterative Thresholding Algorithm Based on
                 Plug-and-Play Priors for Compressive Sampling",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "24",
  day =          "24",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030024",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/24",
  abstract =     "We propose a novel fast iterative thresholding
                 algorithm for image compressive sampling (CS) recovery
                 using three existing denoisers-i.e., TV (total
                 variation), wavelet, and BM3D (block-matching and 3D
                 filtering) denoisers. Through the use of the recently
                 introduced plug-and-play prior approach, we turn these
                 denoisers into CS solvers. Thus, our method can jointly
                 utilize the global and nonlocal sparsity of images. The
                 former is captured by TV and wavelet denoisers for
                 maintaining the entire consistency; while the latter is
                 characterized by the BM3D denoiser to preserve details
                 by exploiting image self-similarity. This composite
                 constraint problem is then solved with the fast
                 composite splitting technique. Experimental results
                 show that our algorithm outperforms several excellent
                 CS techniques.",
  acknowledgement = ack-nhfb,
}

@Article{Cocco:2017:BBC,
  author =       "Luisanna Cocco and Andrea Pinna and Michele
                 Marchesi",
  title =        "Banking on Blockchain: Costs Savings Thanks to the
                 Blockchain Technology",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "25",
  day =          "27",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030025",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/25",
  abstract =     "This paper looks at the challenges and opportunities
                 of implementing blockchain technology across banking,
                 providing food for thought about the potentialities of
                 this disruptive technology. The blockchain technology
                 can optimize the global financial infrastructure,
                 achieving sustainable development, using more efficient
                 systems than at present. In fact, many banks are
                 currently focusing on blockchain technology to promote
                 economic growth and accelerate the development of green
                 technologies. In order to understand the potential of
                 blockchain technology to support the financial system,
                 we studied the actual performance of the Bitcoin
                 system, also highlighting its major limitations, such
                 as the significant energy consumption due to the high
                 computing power required, and the high cost of
                 hardware. We estimated the electrical power and the
                 hash rate of the Bitcoin network, over time, and, in
                 order to evaluate the efficiency of the Bitcoin system
                 in its actual operation, we defined three quantities:
                 ``economic efficiency'', ``operational efficiency'',
                 and ``efficient service''. The obtained results show
                 that by overcoming the disadvantages of the Bitcoin
                 system, and therefore of blockchain technology, we
                 could be able to handle financial processes in a more
                 efficient way than under the current system.",
  acknowledgement = ack-nhfb,
}

@Article{Menesidou:2017:CKM,
  author =       "Sofia Anna Menesidou and Vasilios Katos and Georgios
                 Kambourakis",
  title =        "Cryptographic Key Management in Delay Tolerant
                 Networks: a Survey",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "26",
  day =          "27",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030026",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/26",
  abstract =     "Since their appearance at the dawn of the second
                 millennium, Delay or Disruption Tolerant Networks
                 (DTNs) have gradually evolved, spurring the development
                 of a variety of methods and protocols for making them
                 more secure and resilient. In this context, perhaps,
                 the most challenging problem to deal with is that of
                 cryptographic key management. To the best of our
                 knowledge, the work at hand is the first to survey the
                 relevant literature and classify the various so far
                 proposed key management approaches in such a restricted
                 and harsh environment. Towards this goal, we have
                 grouped the surveyed key management methods into three
                 major categories depending on whether the particular
                 method copes with (a) security initialization, (b) key
                 establishment, and (c) key revocation. We have
                 attempted to provide a concise but fairly complete
                 evaluation of the proposed up-to-date methods in a
                 generalized way with the aim of offering a central
                 reference point for future research.",
  acknowledgement = ack-nhfb,
}

@Article{Liu:2017:SFI,
  author =       "Xiruo Liu and Meiyuan Zhao and Sugang Li and Feixiong
                 Zhang and Wade Trappe",
  title =        "A Security Framework for the {Internet of Things} in
                 the Future {Internet} Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "27",
  day =          "28",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030027",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/27",
  abstract =     "The Internet of Things (IoT) is a recent trend that
                 extends the boundary of the Internet to include a wide
                 variety of computing devices. Connecting many
                 stand-alone IoT systems through the Internet introduces
                 many challenges, with security being front-and-center
                 since much of the collected information will be exposed
                 to a wide and often unknown audience. Unfortunately,
                 due to the intrinsic capability limits of low-end IoT
                 devices, which account for a majority of the IoT end
                 hosts, many traditional security methods cannot be
                 applied to secure IoT systems, which open a door for
                 attacks and exploits directed both against IoT services
                 and the broader Internet. This paper addresses this
                 issue by introducing a unified IoT framework based on
                 the MobilityFirst future Internet architecture that
                 explicitly focuses on supporting security for the IoT.
                 Our design integrates local IoT systems into the global
                 Internet without losing usability, interoperability and
                 security protection. Specifically, we introduced an IoT
                 middleware layer that connects heterogeneous hardware
                 in local IoT systems to the global MobilityFirst
                 network. We propose an IoT name resolution service
                 (IoT-NRS) as a core component of the middleware layer,
                 and develop a lightweight keying protocol that
                 establishes trust between an IoT device and the
                 IoT-NRS.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue IoT Security and Privacy.",
}

@Article{Rauniyar:2017:DDR,
  author =       "Ashish Rauniyar and Mohammad Irfan and Oka Danil
                 Saputra and Jin Woo Kim and Ah Ra Lee and Jae Min Jang
                 and Soo Young Shin",
  title =        "Design and Development of a Real-Time Monitoring
                 System for Multiple Lead-Acid Batteries Based on
                 {Internet of Things}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "28",
  day =          "29",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030028",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/csharp.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/28",
  abstract =     "In this paper, real-time monitoring of multiple
                 lead-acid batteries based on Internet of things is
                 proposed and evaluated. Our proposed system monitors
                 and stores parameters that provide an indication of the
                 lead acid battery's acid level, state of charge,
                 voltage, current, and the remaining charge capacity in
                 a real-time scenario. To monitor these lead-acid
                 battery parameters, we have developed a data
                 acquisition system by building an embedded system,
                 i.e., dedicated hardware and software. The wireless
                 local area network is used as the backbone network. The
                 information collected from all the connected battery
                 clients in the system is analyzed in an asynchronous
                 transmission control protocol/user datagram
                 protocol-based C\# server program running on a personal
                 computer (server) to determine important parameters
                 like the state of charge of the individual battery, and
                 if required, appropriate action can be taken in advance
                 to prevent excessive impairment to the battery.
                 Further, data are also displayed on an Android mobile
                 device and are stored in an SQL server database. We
                 have developed a real prototype to devise an end
                 product for our proposed system.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Ebeid:2017:DEC,
  author =       "Emad Ebeid and Rune Heick and Rune Hylsberg
                 Jacobsen",
  title =        "Deducing Energy Consumer Behavior from Smart Meter
                 Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "29",
  day =          "06",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030029",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/29",
  abstract =     "The ongoing upgrade of electricity meters to smart
                 ones has opened a new market of intelligent services to
                 analyze the recorded meter data. This paper introduces
                 an open architecture and a unified framework for
                 deducing user behavior from its smart main electricity
                 meter data and presenting the results in a natural
                 language. The framework allows a fast exploration and
                 integration of a variety of machine learning algorithms
                 combined with data recovery mechanisms for improving
                 the recognition's accuracy. Consequently, the framework
                 generates natural language reports of the user's
                 behavior from the recognized home appliances. The
                 framework uses open standard interfaces for exchanging
                 data. The framework has been validated through
                 comprehensive experiments that are related to an
                 European Smart Grid project.",
  acknowledgement = ack-nhfb,
}

@Article{Piezzo:2017:FSS,
  author =       "Chiara Piezzo and Kenji Suzuki",
  title =        "Feasibility Study of a Socially Assistive Humanoid
                 Robot for Guiding Elderly Individuals during Walking",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "30",
  day =          "08",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030030",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/30",
  abstract =     "The impact of the world-wide ageing population has
                 commenced with respect to society in developed
                 countries. Several researchers focused on exploring new
                 methods to improve the quality of life of elderly
                 individuals by allowing them to remain independent and
                 healthy to the maximum possible extent. For example,
                 new walking aids are designed to allow elderly
                 individuals to remain mobile in a safe manner because
                 the importance of walking is well-known. The aim of the
                 present study involves designing a humanoid robot guide
                 as a walking trainer for elderly individuals. It is
                 hypothesized that the same service robot provides an
                 assistive and social contribution with respect to
                 interaction between elderly users by motivating them to
                 walk more and simultaneously provides assistance, such
                 as physical assistance and gait monitoring, while
                 walking. This study includes a detailed statement of
                 the research problem as well as a literature review of
                 existing studies related to walking companion robots. A
                 user-centred design approach is adopted to report the
                 results of the current first feasibility study by using
                 a commercially available humanoid robot known as Pepper
                 developed by Softbank-Aldebaran. A quantitative
                 questionnaire was used to investigate all elements that
                 assess intrinsic motivation in users while performing a
                 given activity. Conversely, basic gait data were
                 acquired through a video analysis to test the
                 capability of the robot to modify the gait of human
                 users. The results in terms of the feedback received
                 from elderly subjects and the literature review improve
                 the design of the walking trainer for elderly
                 individuals.",
  acknowledgement = ack-nhfb,
}

@Article{Militano:2017:NID,
  author =       "Leonardo Militano and Antonino Orsino and Giuseppe
                 Araniti and Antonio Iera",
  title =        "{NB-IoT} for {D2D}-Enhanced Content Uploading with
                 Social Trustworthiness in {5G} Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "31",
  day =          "08",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030031",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/31",
  abstract =     "Future fifth-generation (5G) cellular systems are set
                 to give a strong boost to the large-scale deployment of
                 Internet of things (IoT). In the view of a future
                 converged 5G-IoT infrastructure, cellular IoT solutions
                 such as narrowband IoT (NB-IoT) and device-to-device
                 (D2D) communications are key technologies for
                 supporting IoT scenarios and applications. However,
                 some open issues still need careful investigation. An
                 example is the risk of threats to privacy and security
                 when IoT mobile services rely on D2D communications. To
                 guarantee efficient and secure connections to IoT
                 services involving exchange of sensitive data,
                 reputation-based mechanisms to identify and avoid
                 malicious devices are fast gaining ground. In order to
                 tackle the presence of malicious nodes in the network,
                 this paper introduces reliability and reputation
                 notions to model the level of trust among devices
                 engaged in an opportunistic hop-by-hop D2D-based
                 content uploading scheme. To this end, social awareness
                 of devices is considered as a means to enhance the
                 identification of trustworthy nodes. A performance
                 evaluation study shows that the negative effects due to
                 malicious nodes can be drastically reduced by adopting
                 the proposed solution. The performance metrics that
                 proved to benefit from the proposed solution are data
                 loss, energy consumption, and content uploading time.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Gkioulos:2017:UMV,
  author =       "Vasileios Gkioulos and Gaute Wangen and Sokratis K.
                 Katsikas",
  title =        "User Modelling Validation over the Security Awareness
                 of Digital Natives",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "32",
  day =          "10",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030032",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/32",
  abstract =     "Young generations make extensive use of mobile
                 devices, such as smart-phones, tablets and laptops, for
                 a variety of daily tasks with potentially critical
                 impact, while the number of security breaches via
                 portable devices increases exponentially. A plethora of
                 security risks associated with these devices are
                 induced by design shortcomings and vulnerabilities
                 related to user behavior. Therefore, deploying suitable
                 risk treatments requires the investigation of how
                 security experts perceive the digital natives (young
                 people, born in the digital era), when utilizing their
                 user behavior models in the design and analysis of
                 related systems. In this article, we present the
                 results of a survey performed across a multinational
                 sample of security professionals, in comparison to our
                 earlier study over the security awareness of digital
                 natives. Through this study, we seek to identify
                 divergences between user behavior and the conceptual
                 user-models that security experts utilise in their
                 professional tasks. Our results indicate that the
                 experts understanding over the user behaviour does not
                 follow a solidified user-model, while influences from
                 personal perceptions and randomness are also
                 noticeable.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Shivani:2017:RIE,
  author =       "J. L. Divya Shivani and Ranjan K. Senapati",
  title =        "Robust Image Embedded Watermarking Using {DCT} and
                 Listless {SPIHT}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "33",
  day =          "12",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030033",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/33",
  abstract =     "This paper presents a DCT-based (DCT: discrete cosine
                 transform) listless set partitioning in hierarchical
                 trees (SPIHT) digital watermarking technique that is
                 robust against several common attacks such as cropping,
                 filtering, sharpening, noise, inversion, contrast
                 manipulation, and compression. The proposed technique
                 is made further robust by the incorporation of the
                 Chinese remainder theorem (CRT) encryption technique.
                 Our scheme is compared with the recently proposed
                 CRT-based DCT technique, CRT-based spatial domain
                 watermarking, and DCT-based inter block correlation
                 techniques. Extensive simulation experiments show
                 better robustness in common image manipulations and, at
                 the same time, the proposed technique successfully
                 makes the watermark perceptually invisible. A better
                 Tamper Assessment Function (TAF) value of 2-15\% and a
                 better Normalized Correlation (NC) is achieved compared
                 to some of the above techniques. In particular, the
                 proposed technique shows better robustness on
                 compression attacks at moderate to higher compression
                 ratios. It is possible to maintain the imperceptibility
                 and low TAF for various values by doubling the capacity
                 of the watermark.",
  acknowledgement = ack-nhfb,
}

@Article{Fourneau:2017:GNA,
  author =       "Jean-Michel Fourneau and Erol Gelenbe",
  title =        "{G}-Networks with Adders",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "34",
  day =          "10",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030034",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/34",
  abstract =     "Abstract: Queueing networks are used to model the
                 performance of the Internet, of manufacturing and
                 job-shop systems, supply chains, and other networked
                 systems in transportation or emergency management.
                 Composed of service stations where customers receive
                 service, and then move to another service station till
                 they leave the network, queueing networks are based on
                 probabilistic assumptions concerning service times and
                 customer movement that represent the variability of
                 system workloads. Subject to restrictive assumptions
                 regarding external arrivals, Markovian movement of
                 customers, and service time distributions, such
                 networks can be solved efficiently with ``product form
                 solutions'' that reduce the need for software
                 simulators requiring lengthy computations. G-networks
                 generalise these models to include the effect of
                 ``signals'' that re-route customer traffic, or negative
                 customers that reject service requests, and also have a
                 convenient product form solution. This paper extends
                 G-networks by including a new type of signal, that we
                 call an ``Adder'', which probabilistically changes the
                 queue length at the service center that it visits,
                 acting as a load regulator. We show that this
                 generalisation of G-networks has a product form
                 solution.",
  acknowledgement = ack-nhfb,
}

@Article{Sadik:2017:CAH,
  author =       "Ahmed R. Sadik and Bodo Urban",
  title =        "Combining Adaptive Holonic Control and {ISA-95}
                 Architectures to Self-Organize the Interaction in a
                 Worker-Industrial Robot Cooperative Workcell",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "35",
  day =          "14",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030035",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/35",
  abstract =     "Self-Organization is a spontaneous trend which exists
                 in nature among different organisms. Self-organization
                 refers to the process where some form of an overall
                 order arises in a group due to the local interaction
                 among the members of this group. In manufacturing, a
                 similar definition of a Reconfigurable Manufacturing
                 System (RMS) can be found. RMS is a system where the
                 production components and functions can be modified,
                 rearranged and/or interchanged in a timely and
                 cost-effective manner to quickly respond to the
                 production requirements. The definition of the RMS
                 concept implies that the self-organization is an
                 important key factor to fulfil that concept. A case
                 study where a cooperation among a variable number of
                 Industrial Robots (IRs) and workers is studied to show
                 the importance of the research problem. The goal of the
                 paper is to offer a suitable generic control and
                 interaction architecture solution model, which obtains
                 the self-organization from the RMS point of view.
                 Ultimately, applying the proposed solution concept to
                 the case study.",
  acknowledgement = ack-nhfb,
}

@Article{Binmad:2017:EFR,
  author =       "Ruchdee Binmad and Mingchu Li and Zhen Wang and Nakema
                 Deonauth and Chettupally Anil Carie",
  title =        "An Extended Framework for Recovering From Trust
                 Breakdowns in Online Community Settings",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "36",
  day =          "17",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030036",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/36",
  abstract =     "The violation of trust as a result of interactions
                 that do not proceed as expected gives rise to the
                 question as to whether broken trust can possibly be
                 recovered. Clearly, trust recovery is more complex than
                 trust initialization and maintenance. Trust recovery
                 requires a more complex mechanism to explore different
                 factors that cause the decline of trust and identify
                 the affected individuals of trust violation both
                 directly and indirectly. In this study, an extended
                 framework for recovering trust is presented. Aside from
                 evaluating whether there is potential for recovery
                 based on the outcome of a forgiveness mechanism after a
                 trust violation, encouraging cooperation between
                 interacting parties after a trust violation through
                 incentive mechanisms is also important. Furthermore, a
                 number of experiments are conducted to validate the
                 applicability of the framework and the findings show
                 that the e-marketplace incorporating our proposed
                 framework results in improved efficiency of trading,
                 especially in long-term interactions.",
  acknowledgement = ack-nhfb,
}

@Article{Lei:2017:NHC,
  author =       "Zhou Lei and Exiong Sun and Shengbo Chen and Jiang Wu
                 and Wenfeng Shen",
  title =        "A Novel Hybrid-Copy Algorithm for Live Migration of
                 Virtual Machine",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "37",
  day =          "18",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030037",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/37",
  abstract =     "Live migration of virtual machines is an important
                 approach for dynamic resource scheduling in cloud
                 environment. The hybrid-copy algorithm is an excellent
                 algorithm that combines the pre-copy algorithm with the
                 post-copy algorithm to remedy the defects of the
                 pre-copy algorithm and the post-copy algorithm.
                 Currently, the hybrid-copy algorithm only copies all
                 memory pages once in advance. In a write-intensive
                 workload, copy memory pages once may be enough.
                 However, more iterative copy rounds can significantly
                 reduce the page faults in a read-intensive workload. In
                 this paper, we propose a new parameter to decide the
                 appropriate time to stop the iterative copy phase based
                 on real-time situation. We use a Markov model to
                 forecast the memory access pattern. Based on the
                 predicted results and the analysis of the actual
                 situation, the memory page transfer order would be
                 adjusted to reduce the invalid transfers. The novel
                 hybrid-copy algorithm is implemented on the Xen
                 platform. The experimental results demonstrate that our
                 mechanism has good performance both on read-intensive
                 workloads and write-intensive workloads.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Computing for Real Time
                 Intelligent Systems.",
}

@Article{Lee:2017:IAO,
  author =       "Il-Gu Lee",
  title =        "Interference-Aware Opportunistic Dynamic Energy Saving
                 Mechanism for Wi-Fi Enabled {IoTs}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "38",
  day =          "18",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030038",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/38",
  abstract =     "The wireless local area network (WLAN) is one of the
                 most popular wireless technologies offering
                 connectivity today, and one of the candidates for the
                 internet of things (IoTs). However, WLAN's inefficiency
                 in terms of complexity and relatively large power
                 consumption compared with other wireless standards has
                 been reported as a major barrier for IoTs applications.
                 This paper proposes an interference-aware opportunistic
                 dynamic energy saving mechanism to improve energy
                 efficiency for Wi-Fi enabled IoTs. The proposed scheme
                 optimizes operating clock frequencies adaptively for
                 signal processing when the mobile station transmits
                 packets in partial sub-channels. Evaluation results
                 demonstrate that the proposed scheme improves energy
                 efficiency by approximately 34\%.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Roychowdhury:2017:ABS,
  author =       "Sohini Roychowdhury and Paul Hage and Joseph
                 Vasquez",
  title =        "{Azure}-Based Smart Monitoring System for Anemia-Like
                 Pallor",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "39",
  day =          "26",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030039",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/39",
  abstract =     "Increasing costs of diagnostic healthcare have
                 necessitated the development of hardware independent
                 non-invasive Point of Care (POC) systems. Although
                 anemia prevalence rates in global populations vary
                 between 10\% and 60\% in various demographic groups,
                 smart monitoring systems have not yet been developed
                 for screening and tracking anemia-like pallor. In this
                 work, we present two cloud platform-hosted POC
                 applications that are directed towards smart monitoring
                 of anemia-like pallor through eye and tongue pallor
                 site images. The applications consist of a front-end
                 graphical user interface (GUI) module and two different
                 back-end image processing and machine learning modules.
                 Both applications are hosted on a browser accessible
                 tomcat server ported to an Azure Virtual Machine (VM).
                 We observe that the first application spatially
                 segments regions of interest from pallor site images
                 with higher pallor classification accuracy and
                 relatively longer processing times when compared to the
                 lesser accurate yet faster second application. Also,
                 both applications achieve 65\%-98\% accuracy in
                 separating normal images from images with pallor or
                 abnormalities. The optimized front-end module is
                 significantly light-weight with a run-through time
                 ratio of 10-5 with respect to the back-end modules.
                 Thus, the proposed applications are portable and
                 hardware independent, allowing for their use in pallor
                 monitoring and screening tasks.",
  acknowledgement = ack-nhfb,
}

@Article{Bauman:2017:VIE,
  author =       "Brian Bauman and Patrick Seeling",
  title =        "Visual Interface Evaluation for Wearables Datasets:
                 Predicting the Subjective Augmented Vision Image {QoE}
                 and {QoS}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "40",
  day =          "28",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030040",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/40",
  abstract =     "As Augmented Reality (AR) applications become
                 commonplace, the determination of a device operator's
                 subjective Quality of Experience (QoE) in addition to
                 objective Quality of Service (QoS) metrics gains
                 importance. Human subject experimentation is common for
                 QoE relationship determinations due to the subjective
                 nature of the QoE. In AR scenarios, the overlay of
                 displayed content with the real world adds to the
                 complexity. We employ Electroencephalography (EEG)
                 measurements as the solution to the inherent
                 subjectivity and situationality of AR content display
                 overlaid with the real world. Specifically, we evaluate
                 prediction performance for traditional image display
                 (AR) and spherical/immersive image display (SAR) for
                 the QoE and underlying QoS levels. Our approach
                 utilizing a four-position EEG wearable achieves high
                 levels of accuracy. Our detailed evaluation of the
                 available data indicates that less sensors would
                 perform almost as well and could be integrated into
                 future wearable devices. Additionally, we make our
                 Visual Interface Evaluation for Wearables (VIEW)
                 datasets from human subject experimentation publicly
                 available and describe their utilization.",
  acknowledgement = ack-nhfb,
}

@Article{Sun:2017:SQE,
  author =       "Mao-hua Sun and Yuan-gang Li and Bing He",
  title =        "Study on a Quality Evaluation Method for College
                 {English} Classroom Teaching",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "41",
  day =          "30",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030041",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/41",
  abstract =     "A quality evaluation method is an important means and
                 the main basis on which to evaluate the college English
                 classroom teaching quality of teachers. To overcome the
                 one-sided subjectivity and resulting imprecision of the
                 traditional classroom teaching quality evaluation
                 method, a scientific and reasonable quality evaluation
                 index system for college English classroom teaching is
                 constructed. The fuzzy comprehensive evaluation method
                 and the analytic hierarchy process method are combined
                 to propose an improved multi-level fuzzy comprehensive
                 evaluation model for obtaining a new college English
                 classroom teaching quality evaluation method. In the
                 proposed method, according to the fuzzy characteristics
                 of a college English classroom teaching quality
                 evaluation, the fuzzy comprehensive evaluation method
                 is used to transform the qualitative evaluation indexes
                 into limited quantitative evaluation indexes, then a
                 judgment matrix is constructed to determine the weights
                 among different levels by using the analytic hierarchy
                 process method. Additionally, the college English
                 classroom teaching quality is evaluated in detail.
                 Finally, an actual case of college English classroom
                 teaching is used to verify the effectiveness of the
                 college English classroom teaching quality evaluation
                 method. The results show that the proposed college
                 English classroom teaching method can overcome the
                 subjectivity and randomness shortcomings of the
                 traditional classroom teaching quality evaluation
                 methods, and improve the reliability, accuracy, and
                 objectivity of fuzzy comprehensive evaluation. It is an
                 effective method to evaluate college English classroom
                 teaching quality.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue u- and e- Service, Science and
                 Technology.",
}

@Article{Cominelli:2017:MPF,
  author =       "Lorenzo Cominelli and Nicola Carbonaro and Daniele
                 Mazzei and Roberto Garofalo and Alessandro Tognetti and
                 Danilo {De Rossi}",
  title =        "A Multimodal Perception Framework for Users Emotional
                 State Assessment in Social Robotics",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "42",
  day =          "01",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030042",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/42",
  abstract =     "In this work, we present an unobtrusive and
                 non-invasive perception framework based on the synergy
                 between two main acquisition systems: the Touch-Me Pad,
                 consisting of two electronic patches for physiological
                 signal extraction and processing; and the Scene
                 Analyzer, a visual-auditory perception system
                 specifically designed for the detection of social and
                 emotional cues. It will be explained how the
                 information extracted by this specific kind of
                 framework is particularly suitable for social robotics
                 applications and how the system has been conceived in
                 order to be used in human-robot interaction
                 scenarios.",
  acknowledgement = ack-nhfb,
}

@Article{Bonguet:2017:SDS,
  author =       "Adrien Bonguet and Martine Bellaiche",
  title =        "A Survey of Denial-of-Service and Distributed Denial
                 of Service Attacks and Defenses in Cloud Computing",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "43",
  day =          "05",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030043",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/43",
  abstract =     "Cloud Computing is a computing model that allows
                 ubiquitous, convenient and on-demand access to a shared
                 pool of highly configurable resources (e.g., networks,
                 servers, storage, applications and services).
                 Denial-of-Service (DoS) and Distributed
                 Denial-of-Service (DDoS) attacks are serious threats to
                 the Cloud services' availability due to numerous new
                 vulnerabilities introduced by the nature of the Cloud,
                 such as multi-tenancy and resource sharing. In this
                 paper, new types of DoS and DDoS attacks in Cloud
                 Computing are explored, especially the XML-DoS and
                 HTTP-DoS attacks, and some possible detection and
                 mitigation techniques are examined. This survey also
                 provides an overview of the existing defense solutions
                 and investigates the experiments and metrics that are
                 usually designed and used to evaluate their
                 performance, which is helpful for the future research
                 in the domain.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Katsinis:2017:MIM,
  author =       "Georgios Katsinis and Eirini Eleni Tsiropoulou and
                 Symeon Papavassiliou",
  title =        "Multicell Interference Management in Device to Device
                 Underlay Cellular Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "44",
  day =          "07",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030044",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/44",
  abstract =     "In this paper, the problem of interference mitigation
                 in a multicell Device to Device (D2D) underlay cellular
                 network is addressed. In this type of network
                 architectures, cellular users and D2D users share
                 common Resource Blocks (RBs). Though such paradigms
                 allow potential increase in the number of supported
                 users, the latter comes at the cost of interference
                 increase that in turn calls for the design of efficient
                 interference mitigation methodologies. To treat this
                 problem efficiently, we propose a two step approach,
                 where the first step concerns the efficient RB
                 allocation to the users and the second one the
                 transmission power allocation. Specifically, the RB
                 allocation problem is formulated as a bilateral
                 symmetric interaction game. This assures the existence
                 of a Nash Equilibrium (NE) point of the game, while a
                 distributed algorithm, which converges to it, is
                 devised. The power allocation problem is formulated as
                 a linear programming problem per RB, and the
                 equivalency between this problem and the total power
                 minimization problem is shown. Finally, the operational
                 effectiveness of the proposed approach is evaluated via
                 numerical simulations, while its superiority against
                 state of the art approaches existing in the recent
                 literature is shown in terms of increased number of
                 supported users, interference reduction and power
                 minimization.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Zhang:2017:RIW,
  author =       "Heng Zhang and Chengyou Wang and Xiao Zhou",
  title =        "A Robust Image Watermarking Scheme Based on {SVD} in
                 the Spatial Domain",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "45",
  day =          "07",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030045",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/45",
  abstract =     "With the development of image processing technology,
                 the copyright protection of digital images has become
                 an urgent problem to be solved. As an effective method,
                 the robust digital watermarking technique emerges at a
                 historic moment. Currently, most robust watermarking
                 schemes are performed in the transform domains, such as
                 the discrete cosine transform (DCT) and singular value
                 decomposition (SVD). Compared with spatial domain
                 watermarking schemes, these methods have achieved good
                 performance, such as better robustness and higher
                 security. However, the computational complexity
                 increases with the use of forward and reverse
                 transforms. In this paper, we analyze the SVD-based
                 watermarking scheme and its impact on the spatial
                 domain. Based on this analysis and the mathematical
                 characteristics of SVD, we present a robust image
                 watermarking scheme where a binary watermark is
                 embedded into the largest singular value of each image
                 block in the spatial domain. Several experiments are
                 conducted to verify the performance of the proposed
                 watermarking scheme. The experimental results show that
                 compared with the existing SVD domain watermarking
                 schemes, our proposed method has maintained good
                 robustness against various attacks. Moreover, it avoids
                 the false positive problem existing in traditional
                 SVD-based watermarking schemes and has lower
                 computational complexity.",
  acknowledgement = ack-nhfb,
}

@Article{Lee:2017:DPD,
  author =       "Il-Gu Lee",
  title =        "Digital Pre-Distortion of Carrier Frequency Offset for
                 Reliable Wi-Fi Enabled {IoTs}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "46",
  day =          "09",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030046",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/46",
  abstract =     "The Internet of Things (IoTs) will change the
                 requirements for wireless connectivity significantly,
                 mainly with regard to service coverage, data rate, and
                 energy efficiency. Therefore, to improve robustness and
                 reliability, WiFi-enabled IoT devices have been
                 developed to use narrowband communication. However,
                 narrowband transmission in WiFi such as IEEE 802.11ah
                 causes relatively higher frequency error due to the
                 reduced subcarrier space, which is larger than legacy
                 wireless local area networks (WLANs) in 2.4/5 GHz
                 frequencies. In a direct conversion receiver, this
                 error degrades the signal quality due to the presence
                 of direct current (DC) offset cancellation circuits. In
                 this paper, a digital carrier frequency offset (CFO)
                 predistortion scheme is proposed for a reliable
                 communication link in dense networks. Evaluation
                 results demonstrate that the proposed scheme can
                 improve received signal quality in terms of packet
                 error rate and error vector magnitude.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Markus:2017:CAI,
  author =       "Andras Markus and Attila Kertesz and Gabor
                 Kecskemeti",
  title =        "Cost-Aware {IoT} Extension of {DISSECT-CF}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "47",
  day =          "14",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030047",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/47",
  abstract =     "In the age of the Internet of Things (IoT), more and
                 more sensors, actuators and smart devices get connected
                 to the network. Application providers often combine
                 this connectivity with novel scenarios involving cloud
                 computing. Before implementing changes in these
                 large-scale systems, an in-depth analysis is often
                 required to identify governance models, bottleneck
                 situations, costs and unexpected behaviours.
                 Distributed systems simulators help in such analysis,
                 but they are often problematic to apply in this newly
                 emerging domain. For example, most simulators are
                 either too detailed (e.g., need extensive knowledge on
                 networking), or not extensible enough to support the
                 new scenarios. To overcome these issues, we discuss our
                 IoT cost analysis oriented extension of DIScrete event
                 baSed Energy Consumption simulaTor for Clouds and
                 Federations (DISSECT-CF). Thus, we present an in-depth
                 analysis of IoT and cloud related pricing models of the
                 most widely used commercial providers. Then, we show
                 how the fundamental properties (e.g., data production
                 frequency) of IoT entities could be linked to the
                 identified pricing models. To allow the adoption of
                 unforeseen scenarios and pricing schemes, we present a
                 declarative modelling language to describe these links.
                 Finally, we validate our extensions by analysing the
                 effects of various identified pricing models through
                 five scenarios coming from the field of weather
                 forecasting.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Sadik:2017:FSS,
  author =       "Ahmed R. Sadik and Bodo Urban",
  title =        "Flow Shop Scheduling Problem and Solution in
                 Cooperative Robotics-Case-Study: One Cobot in
                 Cooperation with One Worker",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "48",
  day =          "16",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030048",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/48",
  abstract =     "This research combines between two different
                 manufacturing concepts. On the one hand, flow shop
                 scheduling is a well-known problem in production
                 systems. The problem appears when a group of jobs
                 shares the same processing sequence on two or more
                 machines sequentially. Flow shop scheduling tries to
                 find the appropriate solution to optimize the sequence
                 order of this group of jobs over the existing machines.
                 The goal of flow shop scheduling is to obtain the
                 continuity of the flow of the jobs over the machines.
                 This can be obtained by minimizing the delays between
                 two consequent jobs, therefore the overall makespan can
                 be minimized. On the other hand, collaborative robotics
                 is a relatively recent approach in production where a
                 collaborative robot (cobot) is capable of a close
                 proximity cooperation with the human worker to increase
                 the manufacturing agility and flexibility. The simplest
                 case-study of a collaborative workcell is one cobot in
                 cooperation with one worker. This collaborative
                 workcell can be seen as a special case of the shop flow
                 scheduling problem, where the required time from the
                 worker to perform a specific job is unknown and
                 variable. Therefore, during this research, we implement
                 an intelligent control solution which can optimize the
                 flow shop scheduling problem over the previously
                 mentioned case-study.",
  acknowledgement = ack-nhfb,
}

@Article{De-Pablos-Heredero:2017:FIS,
  author =       "Carmen De-Pablos-Heredero",
  title =        "Future Intelligent Systems and Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "49",
  day =          "02",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030049",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/49",
  abstract =     "The expansion of telecommunication technologies
                 touches almost all aspects life that we are living
                 nowadays. Indeed, such technologies have emerged as a
                 fourth essential utility alongside the traditional
                 utilities of electricity, water, and gas. In this
                 context, Cloud Data Center Networks (cloud-DCNs) have
                 been proposed as a promising way to cope with such a
                 high-tech era and with any expected trends in future
                 computing networks. Resources of cloud-DCNs are leased
                 to the interested users in the form of services, such
                 services come in different models that vary between
                 software, platform, and infrastructure. The leasing
                 process of any service model starts with the users
                 (i.e., service tenants). A tenant asks for the service
                 resources, and the cloud-provider allocates the
                 resources with a charge that follows a predefined cost
                 policy. Cloud resources are limited, and those cloud
                 providers have profit objectives to be satisfied. Thus,
                 to comply with the aforementioned promise, the limited
                 resources need to be carefully allocated. Existing
                 allocation proposals in the literature dealt with this
                 problem in varying ways. However, none proposes a
                 win-win allocation model that satisfies both the
                 providers and tenants. This work proposes A Rational
                 Allocation Approach in Cloud Data Center Networks
                 (ARAAC) that efficiently allocates the available cloud
                 resources, in a way that allows for a win-win
                 environment to satisfy both parties: the providers and
                 tenants. To do so, ARAAC deploys the Second Best-Price
                 (SBP) mechanism along with a behavioral-based
                 reputation model. The reputation is built according to
                 the tenants' utilization history throughout their
                 previous service allocations. The reputation records
                 along with the adoption of the SBP mechanism allows for
                 a locally free-equilibrium approach that allocates the
                 available cloud-DCN resources in an efficient and fair
                 manner. In ARAAC, through an auction scenario, tenants
                 with positive reputation records are awarded by having
                 the required resources allocated at prices that are
                 lower than what they have offered. Compared to other
                 benchmark models, simulation results show that ARAAC
                 can efficiently adapt the behavior of those rational
                 service-tenants to provide for better use of the cloud
                 resources, with an increase in the providers'
                 profits.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Intelligent Systems and
                 Networks.",
}

@Article{Quttoum:2017:ARA,
  author =       "Ahmad Nahar Quttoum and Ayoub Alsarhan and
                 Abidalrahman Moh'd",
  title =        "{ARAAC}: a Rational Allocation Approach in Cloud Data
                 Center Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "50",
  day =          "06",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030050",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/50",
  abstract =     "The expansion of telecommunication technologies
                 touches almost all aspects life that we are living
                 nowadays. Indeed, such technologies have emerged as a
                 fourth essential utility alongside the traditional
                 utilities of electricity, water, and gas. In this
                 context, Cloud Data Center Networks (cloud-DCNs) have
                 been proposed as a promising way to cope with such a
                 high-tech era and with any expected trends in future
                 computing networks. Resources of cloud-DCNs are leased
                 to the interested users in the form of services, such
                 services come in different models that vary between
                 software, platform, and infrastructure. The leasing
                 process of any service model starts with the users
                 (i.e., service tenants). A tenant asks for the service
                 resources, and the cloud-provider allocates the
                 resources with a charge that follows a predefined cost
                 policy. Cloud resources are limited, and those cloud
                 providers have profit objectives to be satisfied. Thus,
                 to comply with the aforementioned promise, the limited
                 resources need to be carefully allocated. Existing
                 allocation proposals in the literature dealt with this
                 problem in varying ways. However, none proposes a
                 win-win allocation model that satisfies both the
                 providers and tenants. This work proposes A Rational
                 Allocation Approach in Cloud Data Center Networks
                 (ARAAC) that efficiently allocates the available cloud
                 resources, in a way that allows for a win-win
                 environment to satisfy both parties: the providers and
                 tenants. To do so, ARAAC deploys the Second Best-Price
                 (SBP) mechanism along with a behavioral-based
                 reputation model. The reputation is built according to
                 the tenants' utilization history throughout their
                 previous service allocations. The reputation records
                 along with the adoption of the SBP mechanism allows for
                 a locally free-equilibrium approach that allocates the
                 available cloud-DCN resources in an efficient and fair
                 manner. In ARAAC, through an auction scenario, tenants
                 with positive reputation records are awarded by having
                 the required resources allocated at prices that are
                 lower than what they have offered. Compared to other
                 benchmark models, simulation results show that ARAAC
                 can efficiently adapt the behavior of those rational
                 service-tenants to provide for better use of the cloud
                 resources, with an increase in the providers'
                 profits.",
  acknowledgement = ack-nhfb,
}

@Article{Zhou:2017:LPP,
  author =       "Kaijun Zhou and Lingli Yu and Ziwei Long and Siyao
                 Mo",
  title =        "Local Path Planning of Driverless Car Navigation Based
                 on Jump Point Search Method Under Urban Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "51",
  day =          "12",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030051",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/51",
  abstract =     "The Jump Point Search (JPS) algorithm is adopted for
                 local path planning of the driverless car under urban
                 environment, and it is a fast search method applied in
                 path planning. Firstly, a vector Geographic Information
                 System (GIS) map, including Global Positioning System
                 (GPS) position, direction, and lane information, is
                 built for global path planning. Secondly, the GIS map
                 database is utilized in global path planning for the
                 driverless car. Then, the JPS algorithm is adopted to
                 avoid the front obstacle, and to find an optimal local
                 path for the driverless car in the urban environment.
                 Finally, 125 different simulation experiments in the
                 urban environment demonstrate that JPS can search out
                 the optimal and safety path successfully, and
                 meanwhile, it has a lower time complexity compared with
                 the Vector Field Histogram (VFH), the Rapidly Exploring
                 Random Tree (RRT), A*, and the Probabilistic Roadmaps
                 (PRM) algorithms. Furthermore, JPS is validated
                 usefully in the structured urban environment.",
  acknowledgement = ack-nhfb,
}

@Article{Lupetti:2017:DCP,
  author =       "Maria Luce Lupetti and Yuan Yao and Haipeng Mi and
                 Claudio Germak",
  title =        "Design for Children's Playful Learning with Robots",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "52",
  day =          "18",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030052",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/52",
  abstract =     "This article presents an investigation of the
                 implications of designing for children's playful
                 learning with robots. This study was carried out by
                 adopting a Research through Design approach that
                 resulted in the development of a novel
                 low-anthropomorphic robot called Shybo. The article
                 reports the main phases of the project: the preliminary
                 and exploratory research that was carried out to define
                 a list of design requirements; the design of the robot
                 and its supplementary materials for carrying out
                 playful learning experiences; and the evaluation of the
                 project that involved both parents and children. The
                 robot, in fact, was finally tested as part of a
                 two-hour experience that engaged children in activities
                 related to the associations between sounds and colours.
                 The article presents and discusses the results of this
                 evaluation to point out positive aspects of the
                 experience, emerging issues and hints for future works.
                 These are documented to share lessons learned that
                 might be supportive of the general development of
                 children's playful learning and cognitive experiences
                 with robots.",
  acknowledgement = ack-nhfb,
}

@Article{Yang:2017:TND,
  author =       "Yao Yang",
  title =        "Towards a New Digital Era: Observing Local
                 E-Government Services Adoption in a {Chinese}
                 Municipality",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "53",
  day =          "20",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030053",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/53",
  abstract =     "As electronic government services (e-government)
                 evolve, traditional applications such as online portals
                 are encountering challenges in a new digital era in
                 which people thirst for more convenient, diverse
                 channels of communication with their government.
                 Despite the efforts devoted to the promotion of Social
                 Networking Service (SNS) use in e-government for the
                 past few years, empirical studies regarding this
                 ongoing trend are still insufficient. In the local
                 administration of China, a special collaboration
                 between local governments and private Internet
                 enterprises is happening: government services are
                 imported into commercial SNS platforms known as WeChat
                 and Weibo. This research conducts a case study of a
                 Chinese municipality premised upon survey data (N =
                 605) collected in Chongqing. It examines the
                 determinants of e-services adoption in four major local
                 applications: two traditional government-led services
                 ``Government website portal'' and ``Government official
                 app'' (traditional government-led services), and two
                 built-in government services on social networking
                 applications ``Weibo Government official account''
                 ``WeChat Public Services''. The paper aims to provide a
                 closer understanding of current trends in local
                 government e-services, or in this case, an innovative
                 trial of Chinese e-government practices.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue u- and e- Service, Science and
                 Technology.",
}

@Article{Rizvi:2017:DCB,
  author =       "Syed Tahir Hussain Rizvi and Denis Patti and Tomas
                 Bj{\"o}rklund and Gianpiero Cabodi and Gianluca
                 Francini",
  title =        "Deep Classifiers-Based License Plate Detection,
                 Localization and Recognition on {GPU}-Powered Mobile
                 Platform",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "66",
  day =          "21",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040066",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/66",
  abstract =     "The realization of a deep neural architecture on a
                 mobile platform is challenging, but can open up a
                 number of possibilities for visual analysis
                 applications. A neural network can be realized on a
                 mobile platform by exploiting the computational power
                 of the embedded GPU and simplifying the flow of a
                 neural architecture trained on the desktop workstation
                 or a GPU server. This paper presents an embedded
                 platform-based Italian license plate detection and
                 recognition system using deep neural classifiers. In
                 this work, trained parameters of a highly precise
                 automatic license plate recognition (ALPR) system are
                 imported and used to replicate the same neural
                 classifiers on a Nvidia Shield K1 tablet. A CUDA-based
                 framework is used to realize these neural networks. The
                 flow of the trained architecture is simplified to
                 perform the license plate recognition in real-time.
                 Results show that the tasks of plate and character
                 detection and localization can be performed in
                 real-time on a mobile platform by simplifying the flow
                 of the trained architecture. However, the accuracy of
                 the simplified architecture would be decreased
                 accordingly.",
  acknowledgement = ack-nhfb,
}

@Article{Hanna:2017:SSD,
  author =       "Dalal Hanna and Prakash Veeraraghavan and Ben Soh",
  title =        "{SDMw}: Secure Dynamic Middleware for Defeating Port
                 and {OS} Scanning",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "67",
  day =          "21",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040067",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/67",
  abstract =     "Fingerprinting is a process of identifying the remote
                 network devices and services running on the devices,
                 including operating systems (OS) of the devices, and
                 hosts running different OSs. Several research proposals
                 and commercial products are available in the market to
                 defeat fingerprinting. However, they have performance
                 limitations and expose themselves to attackers. In this
                 paper, we utilize some real-time fault-tolerance
                 concepts (viz. real-time/dynamic, detection/locating,
                 confinement/localizing and masking/decoy) to propose a
                 plug-and-play adaptive middleware architecture called
                 Secure Dynamic Middleware (SDMw) with a view to defeat
                 attackers fingerprinting the network, without exposing
                 itself to the attackers. We verify that the proposed
                 scheme works seamlessly and requires zero-configuration
                 at the client side.",
  acknowledgement = ack-nhfb,
}

@Article{Colombo:2017:CWU,
  author =       "Bruna Armonas Colombo and Pedro Buck and Vinicius
                 Miana Bezerra",
  title =        "Challenges When Using Jurimetrics in {Brazil}--- a
                 Survey of Courts",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "68",
  day =          "25",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040068",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/68",
  abstract =     "Jurimetrics is the application of quantitative
                 methods, usually statistics, to law. An important step
                 to implement a jurimetric analysis is to extract raw
                 data from courts and organize that data in a way that
                 can be processed. Most of the raw data is unstructured
                 and written in natural language, which stands as a
                 challenge to Computer Science experts. As it requires
                 expertise in law, statistics, and computer science,
                 jurimetrics is a multidisciplinary field. When trying
                 to implement a jurimetric system in Brazil, additional
                 challenges were identified due to the heterogeneity of
                 the different court systems, the lack of standards, and
                 how the open data laws in Brazil are interpreted and
                 implemented. In this article, we present a survey of
                 Brazilian courts in terms of readiness to implement a
                 jurimetric system. Analyzing a sample of data, we have
                 found, in light of Brazil's open data regulation,
                 privacy issues and technical issues. Finally, we
                 propose a roadmap that encompasses both technology and
                 public policy to meet those challenges.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Computation, Law and the Net-The Future
                 of Law in the Computational Social Science Era.",
}

@Article{Li:2017:SCT,
  author =       "Dongyuan Li and Chengshuai Li and Zidong Wang and
                 Deqiang Wang and Jianping Xing and Bo Zhang",
  title =        "Signal Consensus in {TSP} of the Same Grid in Road
                 Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "69",
  day =          "24",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040069",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/69",
  abstract =     "In this paper, we propose a consensus algorithm with
                 input constraints for traffic light signals in transit
                 signal priority (TSP). TSP ensures control strategy of
                 traffic light signals can be adjusted and applied
                 according to the real-time traffic status, and provides
                 priority for buses. We give the convergence conditions
                 of the consensus algorithms with and without input
                 constraints in TSP respectively and analyze the
                 convergence performance of them by using matrix theory
                 and graph theory, and PTV-VISSIM is used to simulate
                 the traffic accident probability of three cases at
                 intersections. Simulation results are presented that a
                 consensus is asymptotically reached for all weights of
                 priority; the algorithm with input constraints is more
                 suitable for TSP than the algorithm without input
                 constraints, and the traffic accident rate is
                 reduced.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Computing for Real Time
                 Intelligent Systems.",
}

@Article{Pruvost:2017:EDM,
  author =       "Hippolyte Pruvost and Peter Mooney",
  title =        "Exploring Data Model Relations in {OpenStreetMap}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "70",
  day =          "24",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040070",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/70",
  abstract =     "The OpenStreetMap (OSM) geographic data model has
                 three principal object types: nodes (points), ways
                 (polygons and polylines), and relations (logical
                 grouping of all three object types to express
                 real-world geographical relationships). While there has
                 been very significant analysis of OSM over the past
                 decade or so, very little research attention has been
                 given to OSM relations. In this paper, we provide an
                 exploratory overview of relations in OSM for four
                 European cities. In this exploration, we undertake
                 analysis of relations to assess their complexity,
                 composition and flexibility within the OSM data model.
                 We show that some of the patterns discovered by
                 researchers related to OSM nodes and ways also exist in
                 relations. We find some other interesting aspects of
                 relations which we believe can act as a catalyst for a
                 more sustained future research effort on relations in
                 OSM. These aspects include: the potential influence of
                 bulk imports of geographical data to OSM, tagging of
                 relations, and contribution patterns of edits to OSM
                 relations.",
  acknowledgement = ack-nhfb,
}

@Article{Mazzenga:2017:FBF,
  author =       "Franco Mazzenga and Romeo Giuliano and Francesco
                 Vatalaro",
  title =        "{FttC}-Based Fronthaul for {5G} Dense\slash
                 Ultra-Dense Access Network: Performance and Costs in
                 Realistic Scenarios",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "71",
  day =          "27",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040071",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/71",
  abstract =     "One distinctive feature of the next 5G systems is the
                 presence of a dense/ultra-dense wireless access network
                 with a large number of access points (or nodes) at
                 short distances from each other. Dense/ultra-dense
                 access networks allow for providing very high
                 transmission capacity to terminals. However, the
                 deployment of dense/ultra-dense networks is slowed down
                 by the cost of the fiber-based infrastructure required
                 to connect radio nodes to the central processing units
                 and then to the core network. In this paper, we
                 investigate the possibility for existing FttC access
                 networks to provide fronthaul capabilities for
                 dense/ultra-dense 5G wireless networks. The analysis is
                 realistic in that it is carried out considering an
                 actual access network scenario, i.e., the Italian FttC
                 deployment. It is assumed that access nodes are
                 connected to the Cabinets and to the corresponding
                 distributors by a number of copper pairs. Different
                 types of cities grouped in terms of population have
                 been considered. Results focus on fronthaul transport
                 capacity provided by the FttC network and have been
                 expressed in terms of the available fronthaul bit rate
                 per node and of the achievable coverage.",
  acknowledgement = ack-nhfb,
}

@Article{Khan:2017:TAC,
  author =       "Muhidul Islam Khan and Muhammad Mahtab Alam and
                 Yannick {Le Moullec} and Elias Yaacoub",
  title =        "Throughput-Aware Cooperative Reinforcement Learning
                 for Adaptive Resource Allocation in Device-to-Device
                 Communication",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "72",
  day =          "01",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040072",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/72",
  abstract =     "Device-to-device (D2D) communication is an essential
                 feature for the future cellular networks as it
                 increases spectrum efficiency by reusing resources
                 between cellular and D2D users. However, the
                 performance of the overall system can degrade if there
                 is no proper control over interferences produced by the
                 D2D users. Efficient resource allocation among D2D User
                 equipments (UE) in a cellular network is desirable
                 since it helps to provide a suitable interference
                 management system. In this paper, we propose a
                 cooperative reinforcement learning algorithm for
                 adaptive resource allocation, which contributes to
                 improving system throughput. In order to avoid selfish
                 devices, which try to increase the throughput
                 independently, we consider cooperation between devices
                 as promising approach to significantly improve the
                 overall system throughput. We impose cooperation by
                 sharing the value function/learned policies between
                 devices and incorporating a neighboring factor. We
                 incorporate the set of states with the appropriate
                 number of system-defined variables, which increases the
                 observation space and consequently improves the
                 accuracy of the learning algorithm. Finally, we compare
                 our work with existing distributed reinforcement
                 learning and random allocation of resources. Simulation
                 results show that the proposed resource allocation
                 algorithm outperforms both existing methods while
                 varying the number of D2D users and transmission power
                 in terms of overall system throughput, as well as D2D
                 throughput by proper Resource block (RB)-power level
                 combination with fairness measure and improving the
                 Quality of service (QoS) by efficient controlling of
                 the interference level.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Anwar:2017:QSB,
  author =       "Asim Anwar and Boon-Chong Seet and Xue Jun Li",
  title =        "Quality of Service Based {NOMA} Group {D2D}
                 Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "73",
  day =          "01",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040073",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/73",
  abstract =     "Non-orthogonal multiple access (NOMA) provides
                 superior spectral efficiency and is considered as a
                 promising multiple access scheme for fifth generation
                 (5G) wireless systems. The spectrum efficiency can be
                 further enhanced by enabling device-to-device (D2D)
                 communications. In this work, we propose quality of
                 service (QoS) based NOMA (Q-NOMA) group D2D
                 communications in which the D2D receivers (DRs) are
                 ordered according to their QoS requirements. We discuss
                 two possible implementations of proposed Q-NOMA group
                 D2D communications based on the two power allocation
                 coefficient policies. In order to capture the key
                 aspects of D2D communications, which are device
                 clustering and spatial separation, we model the
                 locations of D2D transmitters (DTs) by Gauss-Poisson
                 process (GPP). The DRs are then considered to be
                 clustered around DTs. Multiple DTs can exist in
                 proximity of each other. In order to characterize the
                 performance, we derive the Laplace transform of the
                 interference at the probe D2D receiver and obtain a
                 closed-form expression of its outage probability using
                 stochastic geometry tools. The performance of proposed
                 Q-NOMA group D2D communications is then evaluated and
                 benchmarked against conventional paired D2D
                 communications.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Reddy:2017:ETE,
  author =       "Nalavala Ramanjaneya Reddy and Pakanati Chenna Reddy
                 and Mokkala Padmavathamma",
  title =        "Efficient Traffic Engineering Strategies for Improving
                 the Performance of {TCP} Friendly Rate Control
                 Protocol",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "74",
  day =          "01",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040074",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/74",
  abstract =     "Multimedia services will play a prominent role in the
                 next generation of internet. With increasing real time
                 requirements, internet technology has to provide
                 Quality of Service (QoS) for various kinds of real time
                 streaming services. When the bandwidth required exceeds
                 the available network resources, network paths can get
                 congested, which results in a delay in packet delivery
                 and packet loss. This situation leads to the design of
                 new strategies for congestion avoidance and control.
                 One of the popular and appropriate congestion control
                 mechanisms that is useful in transmitting multimedia
                 applications in the transport layer is TCP Friendly
                 Rate Control Protocol (TFRC). However, TFRC still
                 suffers from packet loss and delay due to long distance
                 heavy traffic and network fluctuations. This paper
                 introduces a number of key concerns like enhanced Round
                 Trip Time (RTT) and Retransmission Time Out (RTO)
                 calculations, Enhanced Average Loss Interval (ALI)
                 methods and improved Time to Live (TTL) features are
                 applied to TFRC to enhance the performance of TFRC over
                 wired networks.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Future Computing for Real Time
                 Intelligent Systems.",
}

@Article{Chikaraishi:2017:CSA,
  author =       "Takenobu Chikaraishi and Yuichiro Yoshikawa and Kohei
                 Ogawa and Oriza Hirata and Hiroshi Ishiguro",
  title =        "Creation and Staging of {Android} Theatre
                 ``{Sayonara}'' towards Developing Highly Human-Like
                 Robots",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "75",
  day =          "02",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040075",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/75",
  abstract =     "Even after long-term exposures, androids with a
                 strikingly human-like appearance evoke unnatural
                 feelings. The behavior that would induce human-like
                 feelings after long exposures is difficult to
                 determine, and it often depends on the cultural
                 background of the observers. Therefore, in this study,
                 we generate an acting performance system for the
                 android, in which an android and a human interact in a
                 stage play in the real world. We adopt the theatrical
                 theory called Contemporary Colloquial Theatre Theory to
                 give the android natural behaviors so that audiences
                 can comfortably observe it even after long-minute
                 exposure. A stage play is created and shown in various
                 locations, and the audiences are requested to report
                 their impressions of the stage and their cultural and
                 psychological backgrounds in a self-evaluating
                 questionnaire. Overall analysis indicates that the
                 audience had positive feelings, in terms of
                 attractiveness, towards the android on the stage even
                 after 20 min of exposure. The singularly high
                 acceptance of the android by Japanese audiences seems
                 to be correlated with a high animism tendency, rather
                 than to empathy. We also discuss how the stage play
                 approach is limited and could be extended to contribute
                 to realization of human-robot interaction in the real
                 world.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Engaging in Interaction with Robots.",
}

@Article{Saura:2017:UDM,
  author =       "Jos{\'e} Ram{\'o}n Saura and Pedro Palos-S{\'a}nchez
                 and Luis Manuel Cerd{\'a} Su{\'a}rez",
  title =        "Understanding the Digital Marketing Environment with
                 {KPIs} and {Web} Analytics",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "76",
  day =          "04",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040076",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/76",
  abstract =     "In the practice of Digital Marketing (DM), Web
                 Analytics (WA) and Key Performance Indicators (KPIs)
                 can and should play an important role in marketing
                 strategy formulation. It is the aim of this article to
                 survey the various DM metrics to determine and address
                 the following question: What are the most relevant
                 metrics and KPIs that companies need to understand and
                 manage in order to increase the effectiveness of their
                 DM strategies? Therefore, to achieve these objectives,
                 a Systematic Literature Review has been carried out
                 based on two main themes (i) Digital Marketing and (ii)
                 Web Analytics. The search terms consulted in the
                 databases have been (i) DM and (ii) WA obtaining a
                 result total of n = 378 investigations. The databases
                 that have been consulted for the extraction of data
                 were Scopus, PubMed, PsyINFO, ScienceDirect and Web of
                 Science. In this study, we define and identify the main
                 KPIs in measuring why, how and for what purpose users
                 interact with web pages and ads. The main contribution
                 of the study is to lay out and clarify quantitative and
                 qualitative KPIs and indicators for DM performance in
                 order to achieve a consensus on the use and measurement
                 of these indicators.",
  acknowledgement = ack-nhfb,
}

@Article{Ali:2017:CSR,
  author =       "Ahmad Ali and Yu Ming and Sagnik Chakraborty and Saima
                 Iram",
  title =        "A Comprehensive Survey on Real-Time Applications of
                 {WSN}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "77",
  day =          "07",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040077",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/77",
  abstract =     "Nowadays, the investigation of the Wireless Sensor
                 Network (WSN) has materialized its functional area
                 ubiquitously such as environmental engineering,
                 industrial and business applications, military,
                 feedstock and habitat, agriculture sector, seismic
                 detection, intelligent buildings, smart grids, and
                 predictive maintenance, etc. Although some challenges
                 still exist in the wireless sensor network, in spite of
                 the shortcoming, it has been gaining significant
                 attention among researchers and technologists due to
                 its versatility and robustness. WSN is subject to a
                 high potential technology that has been successfully
                 implemented and tested in real-time scenarios, as well
                 as deployed practically in various applications. In
                 this paper, we have carried out an extensive survey in
                 real-time applications of wireless sensor network
                 deployment in a practical scenario such as the
                 real-time intelligent monitoring of temperature,
                 criminal activity in borders and surveillance on
                 traffic monitoring, vehicular behavior on roads, water
                 level and pressure, and remote monitoring of patients.
                 The application of the Wireless Sensor Network in the
                 assorted field of research areas has been widely
                 deliberated. WSN is found to be the most effective
                 solution in remote areas which are not yet explored due
                 to its perilous nature and unreachable places. Here, in
                 this study, we have cited the recent and updated
                 research on the ubiquitous usage of WSN in diverse
                 fields in an extensive and comprehensive approach.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Kontogiannis:2017:PFN,
  author =       "Sotirios Kontogiannis and George Kokkonis and Soultana
                 Ellinidou and Stavros Valsamidis",
  title =        "Proposed Fuzzy-{NN} Algorithm with {LoRaCommunication}
                 Protocol for Clustered Irrigation Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "78",
  day =          "07",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040078",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/78",
  abstract =     "Modern irrigation systems utilize sensors and
                 actuators, interconnected together as a single entity.
                 In such entities, A.I. algorithms are implemented,
                 which are responsible for the irrigation process. In
                 this paper, the authors present an irrigation Open
                 Watering System (OWS) architecture that spatially
                 clusters the irrigation process into autonomous
                 irrigation sections. Authors' OWS implementation
                 includes a Neuro-Fuzzy decision algorithm called FITRA,
                 which originates from the Greek word for seed. In this
                 paper, the FITRA algorithm is described in detail, as
                 are experimentation results that indicate significant
                 water conservations from the use of the FITRA
                 algorithm. Furthermore, the authors propose a new
                 communication protocol over LoRa radio as an
                 alternative low-energy and long-range OWS clusters
                 communication mechanism. The experimental scenarios
                 confirm that the FITRA algorithm provides more
                 efficient irrigation on clustered areas than existing
                 non-clustered, time scheduled or threshold adaptive
                 algorithms. This is due to the FITRA algorithm's
                 frequent monitoring of environmental conditions, fuzzy
                 and neural network adaptation as well as adherence to
                 past irrigation preferences.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Zhang:2017:MCU,
  author =       "Jingbo Zhang and Lili Cai and Shufang Zhang",
  title =        "Malicious Cognitive User Identification Algorithm in
                 Centralized Spectrum Sensing System",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "79",
  day =          "08",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040079",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/79",
  abstract =     "Collaborative spectral sensing can fuse the perceived
                 results of multiple cognitive users, and thus will
                 improve the accuracy of perceived results. However, the
                 multi-source features of the perceived results result
                 in security problems in the system. When there is a
                 high probability of a malicious user attack, the
                 traditional algorithm can correctly identify the
                 malicious users. However, when the probability of
                 attack by malicious users is reduced, it is almost
                 impossible to use the traditional algorithm to
                 correctly distinguish between honest users and
                 malicious users, which greatly reduces the perceived
                 performance. To address the problem above, based on the
                 \beta function and the feedback iteration mathematical
                 method, this paper proposes a malicious user
                 identification algorithm under multi-channel
                 cooperative conditions (\beta -MIAMC), which involves
                 comprehensively assessing the cognitive user's
                 performance on multiple sub-channels to identify the
                 malicious user. Simulation results show under the same
                 attack probability, compared with the traditional
                 algorithm, the \beta -MIAMC algorithm can more
                 accurately identify the malicious users, reducing the
                 false alarm probability of malicious users by more than
                 20\%. When the attack probability is greater than 7\%,
                 the proposed algorithm can identify the malicious users
                 with 100\% certainty.",
  acknowledgement = ack-nhfb,
}

@Article{Joshi:2017:FCB,
  author =       "Pusp Raj Joshi and Shareeful Islam and Syed Islam",
  title =        "A Framework for Cloud Based E-Government from the
                 Perspective of Developing Countries",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "80",
  day =          "09",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040080",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/80",
  abstract =     "Despite significant efforts to initiate electronic
                 government projects, developing countries are still
                 struggling to reap the benefits of using e-government
                 services. An effective implementation of e-government
                 infrastructure is necessary to increase the efficiency
                 and transparency of the government services. There are
                 several studies that observed causes like lack of
                 infrastructure support, lack of payment gateway and
                 improper e-government service delivery channel as main
                 barriers to a wider adoption of e-government services.
                 The main contribution of this research is to propose a
                 cloud-based G2G (Government-to-government) e-government
                 framework for a viable e-government solution from the
                 perspective of developing countries. We have introduced
                 a list of concepts and a systematic process to guide
                 the implementation of e-government project based on the
                 government's vision, goals, chosen services through the
                 service delivery channel to the appropriate cloud
                 service and deployment model. We have used Nepal as a
                 context of the case study and applied the framework to
                 a real e-government project of driving licensing
                 department using action research methodology. The
                 results from the study show that the G2G approach of
                 e-government implementation would be the best for
                 providing effective government services to the
                 stakeholders of developing countries. The proposed
                 framework also supports a smooth integration of
                 government services and reduces the time of the overall
                 project.",
  acknowledgement = ack-nhfb,
}

@Article{Shah:2017:NID,
  author =       "Reehan Ali Shah and Yuntao Qian and Dileep Kumar and
                 Munwar Ali and Muhammad Bux Alvi",
  title =        "Network Intrusion Detection through Discriminative
                 Feature Selection by Using Sparse Logistic Regression",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "81",
  day =          "10",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040081",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/81",
  abstract =     "Intrusion detection system (IDS) is a well-known and
                 effective component of network security that provides
                 transactions upon the network systems with security and
                 safety. Most of earlier research has addressed
                 difficulties such as overfitting, feature redundancy,
                 high-dimensional features and a limited number of
                 training samples but feature selection. We approach the
                 problem of feature selection via sparse logistic
                 regression (SPLR). In this paper, we propose a
                 discriminative feature selection and intrusion
                 classification based on SPLR for IDS. The SPLR is a
                 recently developed technique for data analysis and
                 processing via sparse regularized optimization that
                 selects a small subset from the original feature
                 variables to model the data for the purpose of
                 classification. A linear SPLR model aims to select the
                 discriminative features from the repository of datasets
                 and learns the coefficients of the linear classifier.
                 Compared with the feature selection approaches, like
                 filter (ranking) and wrapper methods that separate the
                 feature selection and classification problems, SPLR can
                 combine feature selection and classification into a
                 unified framework. The experiments in this
                 correspondence demonstrate that the proposed method has
                 better performance than most of the well-known
                 techniques used for intrusion detection.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Yuan:2017:CBM,
  author =       "Peiyan Yuan and Hai Yu",
  title =        "A Combinational Buffer Management Scheme in Mobile
                 Opportunistic Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "82",
  day =          "14",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040082",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/82",
  abstract =     "Nodes in Mobile Opportunistic Network (MON) have to
                 cache packets to deal with the intermittent connection.
                 The buffer management strategy obviously impacts the
                 performance of MON, and it attracts more attention
                 recently. Due to the limited storage capacity of nodes,
                 traditional buffer management strategies just drop
                 messages based on the property of message, and they
                 neglect the collaboration between neighbors, resulting
                 in an ineffective performance improvement. Therefore,
                 effective buffer management strategies are necessary to
                 ensure that each node has enough buffer space to store
                 the message when the node buffer is close to
                 congestion. In this paper, we propose a buffer
                 management strategy by integrating the characteristics
                 of messages and nodes, and migrate the redundant
                 messages to the neighbor to optimize the total utility,
                 instead of deleting them. The simulation experiment
                 results show that it can obviously improve the delivery
                 ratio, the overhead ratio and the average delays, and
                 reduce the amount of hops compared with the traditional
                 ones.",
  acknowledgement = ack-nhfb,
}

@Article{Li:2017:REI,
  author =       "Haipeng Li and Hidenori Nakazato and Syed Hassan
                 Ahmed",
  title =        "Request Expectation Index Based Cache Replacement
                 Algorithm for Streaming Content Delivery over {ICN}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "83",
  day =          "14",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040083",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/83",
  abstract =     "Since the content delivery unit over
                 Information-Centric Networking (ICN) has shifted from
                 files to the segments of a file named chunks, solely
                 either file-level or chunk-level request probability is
                 insufficient for ICN cache management. In this paper, a
                 Request Expectation Index (RXI) based cache replacement
                 algorithm for streaming content delivery is proposed.
                 In this algorithm, RXI is introduced to serve as a
                 fine-grained and unified estimation criteria of
                 possible future request probability for cached chunks.
                 RXI is customized for streaming content delivery by
                 adopting both file-level and chunk-level request
                 probability and considering the dynamically varied
                 request status at each route as well. Compared to prior
                 work, the proposed algorithm evicts the chunk with the
                 minimum expectation of future request to maintain a
                 high cache utilization. Additionally, simulation
                 results demonstrate that the RXI-based algorithm can
                 remarkably enhance the streaming content delivery
                 performance and can be deployed in complex network
                 scenarios. The proposed results validate that, by
                 taking fine-grained request probability and request
                 status into consideration, the customized in-network
                 caching algorithm can improve the ICN streaming content
                 delivery performance by high cache utilization, fast
                 content delivery, and lower network traffic.",
  acknowledgement = ack-nhfb,
}

@Article{Jiang:2017:EER,
  author =       "Fan Jiang and Honglin Wang and Hao Ren and Shuai Xu",
  title =        "Energy-Efficient Resource and Power Allocation for
                 Underlay Multicast Device-to-Device Transmission",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "84",
  day =          "14",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040084",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/84",
  abstract =     "In this paper, we present an energy-efficient resource
                 allocation and power control scheme for D2D
                 (Device-to-Device) multicasting transmission. The
                 objective is to maximize the overall energy-efficiency
                 of D2D multicast clusters through effective resource
                 allocation and power control schemes, while considering
                 the quality of service (QoS) requirements of both
                 cellular users (CUs) and D2D clusters. We first build
                 the optimization model and a heuristic resource and
                 power allocation algorithm is then proposed to solve
                 the energy-efficiency problem with less computational
                 complexity. Numerical results indicate that the
                 proposed algorithm outperforms existing schemes in
                 terms of throughput per energy consumption.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Hong:2017:BEF,
  author =       "Zhen Hong and Zehua Wang and Wei Cai and Victor C. M.
                 Leung",
  title =        "Blockchain-Empowered Fair Computational Resource
                 Sharing System in the {D2D} Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "85",
  day =          "17",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040085",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/85",
  abstract =     "Device-to-device (D2D) communication is becoming an
                 increasingly important technology in future networks
                 with the climbing demand for local services. For
                 instance, resource sharing in the D2D network features
                 ubiquitous availability, flexibility, low latency and
                 low cost. However, these features also bring along
                 challenges when building a satisfactory resource
                 sharing system in the D2D network. Specifically, user
                 mobility is one of the top concerns for designing a
                 cooperative D2D computational resource sharing system
                 since mutual communication may not be stably available
                 due to user mobility. A previous endeavour has
                 demonstrated and proven how connectivity can be
                 incorporated into cooperative task scheduling among
                 users in the D2D network to effectively lower average
                 task execution time. There are doubts about whether
                 this type of task scheduling scheme, though effective,
                 presents fairness among users. In other words, it can
                 be unfair for users who contribute many computational
                 resources while receiving little when in need. In this
                 paper, we propose a novel blockchain-based credit
                 system that can be incorporated into the
                 connectivity-aware task scheduling scheme to enforce
                 fairness among users in the D2D network. Users'
                 computational task cooperation will be recorded on the
                 public blockchain ledger in the system as transactions,
                 and each user's credit balance can be easily accessible
                 from the ledger. A supernode at the base station is
                 responsible for scheduling cooperative computational
                 tasks based on user mobility and user credit balance.
                 We investigated the performance of the credit system,
                 and simulation results showed that with a minor
                 sacrifice of average task execution time, the level of
                 fairness can obtain a major enhancement.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Wang:2017:SME,
  author =       "Jinpeng Wang and G{\'e}rard Chalhoub",
  title =        "Study of Mobility Enhancements for {RPL} in
                 Convergecast Scenarios",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "86",
  day =          "17",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040086",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/86",
  abstract =     "In recent years, mobility support has become an
                 important requirement in various wireless sensor
                 network (WSN) applications. However, due to the strict
                 resource constraints of power, memory, and processing
                 resources in WSNs, routing protocols are mainly
                 designed without considering mobility. Low-Power and
                 Lossy Networks (LLNs) are a special type of WSNs that
                 tolerate data loss. The Routing Protocol for Low-Power
                 and Lossy Networks (RPL) is a routing protocol for LLNs
                 that adapts IPv6 (Internet Protocol version 6) and runs
                 on top of the IEEE (Institute of Electrical and
                 Electronics Engineers) 802.15.4 standard. RPL supports
                 multipoint-to-point traffic and point-to-multipoint
                 traffic. In this paper we propose a mobility
                 enhancement mechanism in order to improve data
                 collection applications in highly mobile scenarios. The
                 enhancement is based on signal strength monitoring and
                 depth updating in order to improve the routing protocol
                 performance in mobile scenarios. This enhancement helps
                 routing protocols to cope better with topology changes
                 and makes proactive decisions on updating next-hop
                 neighbours. We integrated this mechanism into the RPL
                 and compared it with other existing RPL mobility
                 support enhancements. Results obtained through
                 simulation using Cooja show that our work outperforms
                 other existing RPL mobility supports on different
                 performance metrics. Results also prove the efficiency
                 of our proposal in highly mobile scenarios.",
  acknowledgement = ack-nhfb,
}

@Article{Yan:2017:HPE,
  author =       "Chengxin Yan and Ningjiang Chen and Zhang Shuo",
  title =        "High-Performance Elastic Management for Cloud
                 Containers Based on Predictive Message Scheduling",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "87",
  day =          "28",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040087",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/87",
  abstract =     "Containerized data centers can improve the
                 computational density of IaaS layers. This intensive
                 high-concurrency environment has high requirements for
                 message scheduling and container processing. In the
                 paper, an elastically scalable strategy for cloud
                 containers based on predictive message scheduling is
                 introduced, in order to reduce the delay of messages
                 and improve the response time of services and the
                 utilization of container resources. According to the
                 busy degree of different containers, a management
                 strategy of multiple containers at message-granularity
                 level is developed, which gives the containers better
                 elasticity. The simulation results show that the
                 proposed strategy improves service processing
                 efficiency and reduces response latency compared with
                 existing solutions.",
  acknowledgement = ack-nhfb,
}

@Article{Mamais:2017:BVP,
  author =       "Stylianos S. Mamais and George Theodorakopoulos",
  title =        "Behavioural Verification: Preventing Report Fraud in
                 Decentralized Advert Distribution Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "88",
  day =          "20",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040088",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/88",
  abstract =     "Service commissions, which are claimed by Ad-Networks
                 and Publishers, are susceptible to forgery as non-human
                 operators are able to artificially create fictitious
                 traffic on digital platforms for the purpose of
                 committing financial fraud. This places a significant
                 strain on Advertisers who have no effective means of
                 differentiating fabricated Ad-Reports from those which
                 correspond to real consumer activity. To address this
                 problem, we contribute an advert reporting system which
                 utilizes opportunistic networking and a
                 blockchain-inspired construction in order to identify
                 authentic Ad-Reports by determining whether they were
                 composed by honest or dishonest users. What constitutes
                 a user's honesty for our system is the manner in which
                 they access adverts on their mobile device. Dishonest
                 users submit multiple reports over a short period of
                 time while honest users behave as consumers who view
                 adverts at a balanced pace while engaging in typical
                 social activities such as purchasing goods online,
                 moving through space and interacting with other users.
                 We argue that it is hard for dishonest users to fake
                 honest behaviour and we exploit the behavioural
                 patterns of users in order to classify Ad-Reports as
                 real or fabricated. By determining the honesty of the
                 user who submitted a particular report, our system
                 offers a more secure reward-claiming model which
                 protects against fraud while still preserving the
                 user's anonymity.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Nardini:2017:FRB,
  author =       "Giovanni Nardini and Giovanni Stea and Antonio
                 Virdis",
  title =        "A Fast and Reliable Broadcast Service for
                 {LTE}-Advanced Exploiting Multihop Device-to-Device
                 Transmissions",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "89",
  day =          "25",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040089",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/89",
  abstract =     "Several applications, from the Internet of Things for
                 smart cities to those for vehicular networks, need fast
                 and reliable proximity-based broadcast communications,
                 i.e., the ability to reach all peers in a geographical
                 neighborhood around the originator of a message, as
                 well as ubiquitous connectivity. In this paper, we
                 point out the inherent limitations of the LTE
                 (Long-Term Evolution) cellular network, which make it
                 difficult, if possible at all, to engineer such a
                 service using traditional infrastructure-based
                 communications. We argue, instead, that
                 network-controlled device-to-device (D2D)
                 communications, relayed in a multihop fashion, can
                 efficiently support this service. To substantiate the
                 above claim, we design a proximity-based broadcast
                 service which exploits multihop D2D. We discuss the
                 relevant issues both at the UE (User Equipment), which
                 has to run applications, and within the network (i.e.,
                 at the eNodeBs), where suitable resource allocation
                 schemes have to be enforced. We evaluate the
                 performance of a multihop D2D broadcasting using
                 system-level simulations, and demonstrate that it is
                 fast, reliable and economical from a resource
                 consumption standpoint.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Sadik:2017:OBA,
  author =       "Ahmed R. Sadik and Bodo Urban",
  title =        "An Ontology-Based Approach to Enable Knowledge
                 Representation and Reasoning in Worker-Cobot Agile
                 Manufacturing",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "90",
  day =          "24",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040090",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/90",
  abstract =     "There is no doubt that the rapid development in
                 robotics technology has dramatically changed the
                 interaction model between the Industrial Robot (IR) and
                 the worker. As the current robotic technology has
                 afforded very reliable means to guarantee the physical
                 safety of the worker during a close proximity
                 interaction with the IR. Therefore, new forms of
                 cooperation between the robot and the worker can now be
                 achieved. Collaborative/Cooperative robotics is the new
                 branch of industrial robotics which empowers the idea
                 of cooperative manufacturing. Cooperative manufacturing
                 significantly depends on the existence of a
                 collaborative/cooperative robot (cobot). A cobot is
                 usually a Light-Weight Robot (LWR) which is capable of
                 operating safely with the human co-worker in a shared
                 work environment. This is in contrast with the
                 conventional IR which can only operate in isolation
                 from the worker workspace, due to the fact that the
                 conventional IR can manipulate very heavy objects,
                 which makes it so dangerous to operate in direct
                 contact with the worker. There is a slight difference
                 between the definition of collaboration and cooperation
                 in robotics. In cooperative robotics, both the worker
                 and the robot are performing tasks over the same
                 product in the same shared workspace but not
                 simultaneously. Collaborative robotics has a similar
                 definition, except that the worker and the robot are
                 performing a simultaneous task. Gathering the worker
                 and the cobot in the same manufacturing workcell can
                 provide an easy and cheap method to flexibly customize
                 the production. Moreover, to adapt with the production
                 demands in the real time of production, without the
                 need to stop or to modify the production operations.
                 There are many challenges and problems that can be
                 addressed in the cooperative manufacturing field.
                 However, one of the most important challenges in this
                 field is the representation of the cooperative
                 manufacturing environment and components. Thus, in
                 order to accomplish the cooperative manufacturing
                 concept, a proper approach is required to describe the
                 shared environment between the worker and the cobot.
                 The cooperative manufacturing shared environment
                 includes the cobot, the co-worker, and other production
                 components such as the product itself. Furthermore, the
                 whole cooperative manufacturing system components need
                 to communicate and share their knowledge, to reason and
                 process the shared information, which eventually gives
                 the control solution the capability of obtaining
                 collective manufacturing decisions. Putting into
                 consideration that the control solution should also
                 provide a natural language which is human readable and
                 in the same time can be understood by the machine
                 (i.e., the cobot). Accordingly, a distributed control
                 solution which combines an ontology-based Multi-Agent
                 System (MAS) and a Business Rule Management System
                 (BRMS) is proposed, in order to solve the mentioned
                 challenges in the cooperative manufacturing, which are:
                 manufacturing knowledge representation, sharing, and
                 reasoning.",
  acknowledgement = ack-nhfb,
}

@Article{Kuang:2017:HTA,
  author =       "Zhufang Kuang and Gongqiang Li and Junshan Tan and
                 Zhigang Chen",
  title =        "High Throughput and Acceptance Ratio Multipath Routing
                 Algorithm in Cognitive Wireless Mesh Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "91",
  day =          "25",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040091",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/91",
  abstract =     "The link failure due to the secondary users exiting
                 the licensed channels when primary users reoccupy the
                 licensed channels is very important in cognitive
                 wireless mesh networks (CWMNs). A multipath routing and
                 spectrum allocation algorithm based on channel
                 interference and reusability with Quality of Service
                 (QoS) constraints in CWMNs (MRIR) was proposed.
                 Maximizing the throughput and the acceptance ratio of
                 the wireless service is the objective of the MRIR.
                 First, a primary path of resource conservation with QoS
                 constraints was constructed, then, a resource
                 conservation backup path based on channel interference
                 and reusability with QoS constraints was constructed.
                 The MRIR algorithm contains the primary path routing
                 and spectrum allocation algorithm, and the backup path
                 routing and spectrum allocation algorithm. The
                 simulation results showed that the MRIR algorithm could
                 achieve the expected goals and could achieve a higher
                 throughput and acceptance ratio.",
  acknowledgement = ack-nhfb,
}

@Article{Chiti:2017:SAR,
  author =       "Francesco Chiti and Romano Fantacci and Laura
                 Pierucci",
  title =        "Social-Aware Relay Selection for Cooperative Multicast
                 Device-to-Device Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "92",
  day =          "04",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040092",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/92",
  abstract =     "The increasing use of social networks such as
                 Facebook, Twitter, and Instagram to share photos, video
                 streaming, and music among friends has generated a huge
                 increase in the amount of data traffic over wireless
                 networks. This social behavior has triggered new
                 communication paradigms such as device-to-device (D2D)
                 and relaying communication schemes, which are both
                 considered as strong drivers for the next
                 fifth-generation (5G) cellular systems. Recently, the
                 social-aware layer and its relationship to and
                 influence on the physical communications layer have
                 gained great attention as emerging focus points. We
                 focus here on the case of relaying communications to
                 pursue the multicast data dissemination to a group of
                 users forming a social community through a relay node,
                 according to the extension of the D2D mode to the case
                 of device-to-many devices. Moreover, in our case, the
                 source selects the device to act as the relay among
                 different users of the multicast group by taking into
                 account both the propagation link conditions and the
                 relay social-trust level with the constraint of
                 minimizing the end-to-end content delivery delay. An
                 optimization procedure is also proposed in order to
                 achieve the best performance. Finally, numerical
                 results are provided to highlight the advantages of
                 considering the impact of social level on the
                 end-to-end delivery delay in the integrated
                 social-physical network in comparison with the
                 classical relay-assisted multicast communications for
                 which the relay social-trust level is not considered.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Latif:2017:HWC,
  author =       "Siddique Latif and Junaid Qadir and Shahzad Farooq and
                 Muhammad Ali Imran",
  title =        "How {5G} Wireless (and Concomitant Technologies) Will
                 Revolutionize Healthcare?",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "93",
  day =          "11",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040093",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/93",
  abstract =     "The need to have equitable access to quality
                 healthcare is enshrined in the United Nations (UN)
                 Sustainable Development Goals (SDGs), which defines the
                 developmental agenda of the UN for the next 15 years.
                 In particular, the third SDG focuses on the need to
                 ``ensure healthy lives and promote well-being for all
                 at all ages''. In this paper, we build the case that 5G
                 wireless technology, along with concomitant emerging
                 technologies (such as IoT, big data, artificial
                 intelligence and machine learning), will transform
                 global healthcare systems in the near future. Our
                 optimism around 5G-enabled healthcare stems from a
                 confluence of significant technical pushes that are
                 already at play: apart from the availability of
                 high-throughput low-latency wireless connectivity,
                 other significant factors include the democratization
                 of computing through cloud computing; the
                 democratization of Artificial Intelligence (AI) and
                 cognitive computing (e.g., IBM Watson); and the
                 commoditization of data through crowdsourcing and
                 digital exhaust. These technologies together can
                 finally crack a dysfunctional healthcare system that
                 has largely been impervious to technological
                 innovations. We highlight the persistent deficiencies
                 of the current healthcare system and then demonstrate
                 how the 5G-enabled healthcare revolution can fix these
                 deficiencies. We also highlight open technical research
                 challenges, and potential pitfalls, that may hinder the
                 development of such a 5G-enabled health revolution.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Qadir:2017:ANU,
  author =       "Junaid Qadir and Arjuna Sathiaseelan and Umar Bin
                 Farooq and Muhammad Usama and Muhammad Ali Imran and
                 Muhammad Shafique",
  title =        "Approximate Networking for Universal {Internet}
                 Access",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "94",
  day =          "11",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040094",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/94",
  abstract =     "Despite the best efforts of networking researchers and
                 practitioners, an ideal Internet experience is
                 inaccessible to an overwhelming majority of people the
                 world over, mainly due to the lack of cost-efficient
                 ways of provisioning high-performance, global Internet.
                 In this paper, we argue that instead of an exclusive
                 focus on a utopian goal of universally accessible
                 ``ideal networking'' (in which we have a high
                 throughput and quality of service as well as low
                 latency and congestion), we should consider providing
                 ``approximate networking'' through the adoption of
                 context-appropriate trade-offs. In this regard, we
                 propose to leverage the advances in the emerging trend
                 of ``approximate computing'' that rely on relaxing the
                 bounds of precise/exact computing to provide new
                 opportunities for improving the area, power, and
                 performance efficiency of systems by orders of
                 magnitude by embracing output errors in resilient
                 applications. Furthermore, we propose to extend the
                 dimensions of approximate computing towards various
                 knobs available at network layers. Approximate
                 networking can be used to provision ``Global Access to
                 the Internet for All'' (GAIA) in a pragmatically tiered
                 fashion, in which different users around the world are
                 provided a different context-appropriate (but still
                 contextually functional) Internet experience.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Communications and Computing for
                 Sustainable Development Goals.",
}

@Article{Mahlous:2017:SES,
  author =       "Ahmed Redha Mahlous",
  title =        "{SCMC}: An Efficient Scheme for Minimizing Energy in
                 {WSNs} Using a Set Cover Approach",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "95",
  day =          "13",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040095",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/95",
  abstract =     "Energy-efficient clustering and routing are well known
                 optimization problems in the study of Wireless Sensor
                 Network (WSN) lifetime extension. In this paper, we
                 propose an intelligent hybrid optimization algorithm
                 based on a Set Cover approach to create clusters, and
                 min-cost max-flow for routing (SCMC) to increase the
                 lifetime of WSNs. In our method we used linear
                 programming (LP) to model the WSN optimization problem.
                 This model considers minimizing the energy for all
                 nodes in each set cover (cluster), and then minimizing
                 the routing energy between the nodes and the base
                 station through intermediate nodes, namely cluster
                 heads. To evaluate the performance of our scheme,
                 extensive simulations were conducted with different
                 scenarios. The results show that the set cover approach
                 combined with the min-cost max-flow algorithm reduces
                 energy consumption and increases the network's lifetime
                 and throughput.",
  acknowledgement = ack-nhfb,
}

@Article{Shehni:2018:NLW,
  author =       "Rezvan Almas Shehni and Karim Faez and Farshad Eshghi
                 and Manoochehr Kelarestaghi",
  title =        "A New Lightweight Watchdog-Based Algorithm for
                 Detecting {Sybil} Nodes in Mobile {WSNs}",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "1",
  day =          "21",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/1",
  abstract =     "Wide-spread deployment of Wireless Sensor Networks
                 (WSN) necessitates special attention to security
                 issues, amongst which Sybil attacks are the most
                 important ones. As a core to Sybil attacks, malicious
                 nodes try to disrupt network operations by creating
                 several fabricated IDs. Due to energy consumption
                 concerns in WSNs, devising detection algorithms which
                 release the sensor nodes from high computational and
                 communicational loads are of great importance. In this
                 paper, a new computationally lightweight watchdog-based
                 algorithm is proposed for detecting Sybil IDs in mobile
                 WSNs. The proposed algorithm employs watchdog nodes for
                 collecting detection information and a designated
                 watchdog node for detection information processing and
                 the final Sybil list generation. Benefiting from a
                 newly devised co-presence state diagram and adequate
                 detection rules, the new algorithm features low extra
                 communication overhead, as well as a satisfactory
                 compromise between two otherwise contradictory
                 detection measures of performance, True Detection Rate
                 (TDR) and False Detection Rate (FDR). Extensive
                 simulation results illustrate the merits of the new
                 algorithm compared to a couple of recent watchdog-based
                 Sybil detection algorithms.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Zhou:2018:AOR,
  author =       "Zhibin Zhou and Pin Liu and Qin Liu and Guojun Wang",
  title =        "An Anonymous Offline {RFID} Grouping-Proof Protocol",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "2",
  day =          "01",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010002",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/2",
  abstract =     "As more and more items are tagged with RFID (Radio
                 Frequency Identification) tags, grouping-proof
                 technology is widely utilized to provide a coexistence
                 evidence for a group of related items. Due to the
                 wireless channel used in RFID systems, a security risk
                 exists in the communication between the reader and
                 tags. How to ensure the tag's information security and
                 to generate reliable grouping-proof becomes a hot
                 research topic. To protect the privacy of tags, the
                 verification of grouping-proof is traditionally
                 executed by the verifier, and the reader is only used
                 to collect the proof data. This approach can cause the
                 reader to submit invalid proof data to the verifier in
                 the event of DoP (Deny of Proof) attack. In this paper,
                 an ECC-based, off-line anonymous grouping-proof
                 protocol (EAGP) is proposed. The protocol authorizes
                 the reader to examine the validity of grouping-proof
                 without knowing the identities of tags. From the
                 security and performance analysis, the EAGP can protect
                 the security and privacy of RFID tags, and defence
                 impersonation and replay attacks. Furthermore, it has
                 the ability to reduce the system overhead caused by the
                 invalid submission of grouping-proofs. As a result, the
                 proposed EAGP equips practical application values.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Hoyhtya:2018:RLA,
  author =       "Marko H{\"o}yhty{\"a} and Olli Apilo and Mika
                 Lasanen",
  title =        "Review of Latest Advances in {3GPP} Standardization:
                 {D2D} Communication in {5G} Systems and Its Energy
                 Consumption Models",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "3",
  day =          "03",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010003",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/3",
  abstract =     "Device-to-device (D2D) communication is an essential
                 part of the future fifth generation (5G) system that
                 can be seen as a ``network of networks,'' consisting of
                 multiple seamlessly-integrated radio access
                 technologies (RATs). Public safety communications,
                 autonomous driving, socially-aware networking, and
                 infotainment services are example use cases of D2D
                 technology. High data rate communications and use of
                 several active air interfaces in the described network
                 create energy consumption challenges for both base
                 stations and the end user devices. In this paper, we
                 review the status of 3rd Generation Partnership Project
                 (3GPP) standardization, which is the most important
                 standardization body for 5G systems. We define a set of
                 application scenarios for D2D communications in 5G
                 networks. We use the recent models of 3GPP long term
                 evolution (LTE) and WiFi interfaces in analyzing the
                 power consumption from both the infrastructure and user
                 device perspectives. The results indicate that with the
                 latest radio interfaces, the best option for energy
                 saving is the minimization of active interfaces and
                 sending the data with the best possible data rate.
                 Multiple recommendations on how to exploit the results
                 in future networks are given.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Pecori:2018:VLA,
  author =       "Riccardo Pecori",
  title =        "A Virtual Learning Architecture Enhanced by Fog
                 Computing and Big Data Streams",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "4",
  day =          "03",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010004",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/4",
  abstract =     "In recent years, virtual learning environments are
                 gaining more and more momentum, considering both the
                 technologies deployed in their support and the sheer
                 number of terminals directly or indirectly interacting
                 with them. This essentially means that every day, more
                 and more smart devices play an active role in this
                 exemplary Web of Things scenario. This digital
                 revolution, affecting education, appears clearly
                 intertwined with the earliest forecasts of the Internet
                 of Things, envisioning around 50 billions heterogeneous
                 devices and gadgets to be active by 2020, considering
                 also the deployment of the fog computing paradigm,
                 which moves part of the computational power to the edge
                 of the network. Moreover, these interconnected objects
                 are expected to produce more and more significant
                 streams of data, themselves generated at unprecedented
                 rates, sometimes to be analyzed almost in real time.
                 Concerning educational environments, this translates to
                 a new type of big data stream, which can be labeled as
                 educational big data streams. Here, pieces of
                 information coming from different sources (such as
                 communications between students and instructors, as
                 well as students' tests, etc.) require accurate
                 analysis and mining techniques in order to retrieve
                 fruitful and well-timed insights from them. This
                 article presents an overview of the current state of
                 the art of virtual learning environments and their
                 limitations; then, it explains the main ideas behind
                 the paradigms of big data streams and of fog computing,
                 in order to introduce an e-learning architecture
                 integrating both of them. Such an action aims to
                 enhance the ability of virtual learning environments to
                 be closer to the needs of all the actors in an
                 educational scenario, as demonstrated by a preliminary
                 implementation of the envisioned architecture. We
                 believe that the proposed big stream and fog-based
                 educational framework may pave the way towards a better
                 understanding of students' educational behaviors and
                 foster new research directions in the field.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Anwar:2018:ESS,
  author =       "Nazia Anwar and Huifang Deng",
  title =        "Elastic Scheduling of Scientific Workflows under
                 Deadline Constraints in Cloud Computing Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "5",
  day =          "07",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010005",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/5",
  abstract =     "Scientific workflow applications are collections of
                 several structured activities and fine-grained
                 computational tasks. Scientific workflow scheduling in
                 cloud computing is a challenging research topic due to
                 its distinctive features. In cloud environments, it has
                 become critical to perform efficient task scheduling
                 resulting in reduced scheduling overhead, minimized
                 cost and maximized resource utilization while still
                 meeting the user-specified overall deadline. This paper
                 proposes a strategy, Dynamic Scheduling of Bag of Tasks
                 based workflows (DSB), for scheduling scientific
                 workflows with the aim to minimize financial cost of
                 leasing Virtual Machines (VMs) under a user-defined
                 deadline constraint. The proposed model groups the
                 workflow into Bag of Tasks (BoTs) based on data
                 dependency and priority constraints and thereafter
                 optimizes the allocation and scheduling of BoTs on
                 elastic, heterogeneous and dynamically provisioned
                 cloud resources called VMs in order to attain the
                 proposed method's objectives. The proposed approach
                 considers pay-as-you-go Infrastructure as a Service
                 (IaaS) clouds having inherent features such as
                 elasticity, abundance, heterogeneity and VM
                 provisioning delays. A trace-based simulation using
                 benchmark scientific workflows representing real world
                 applications, demonstrates a significant reduction in
                 workflow computation cost while the workflow deadline
                 is met. The results validate that the proposed model
                 produces better success rates to meet deadlines and
                 cost efficiencies in comparison to adapted
                 state-of-the-art algorithms for similar problems.",
  acknowledgement = ack-nhfb,
}

@Article{Li:2018:IIS,
  author =       "Wenjuan Li and Weizhi Meng and Lam For Kwok",
  title =        "Investigating the Influence of Special On-Off Attacks
                 on Challenge-Based Collaborative Intrusion Detection
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "6",
  day =          "08",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010006",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/6",
  abstract =     "Intrusions are becoming more complicated with the
                 recent development of adversarial techniques. To boost
                 the detection accuracy of a separate intrusion
                 detector, the collaborative intrusion detection network
                 (CIDN) has thus been developed by allowing intrusion
                 detection system (IDS) nodes to exchange data with each
                 other. Insider attacks are a great threat for such
                 types of collaborative networks, where an attacker has
                 the authorized access within the network. In
                 literature, a challenge-based trust mechanism is
                 effective at identifying malicious nodes by sending
                 challenges. However, such mechanisms are heavily
                 dependent on two assumptions, which would cause CIDNs
                 to be vulnerable to advanced insider attacks in
                 practice. In this work, we investigate the influence of
                 advanced on-off attacks on challenge-based CIDNs, which
                 can respond truthfully to one IDS node but behave
                 maliciously to another IDS node. To evaluate the attack
                 performance, we have conducted two experiments under a
                 simulated and a real CIDN environment. The obtained
                 results demonstrate that our designed attack is able to
                 compromise the robustness of challenge-based CIDNs in
                 practice; that is, some malicious nodes can behave
                 untruthfully without a timely detection.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Office:2018:ARF,
  author =       "Future Internet Editorial Office",
  title =        "Acknowledgement to Reviewers of {{\booktitle{Future
                 Internet}}} in 2017",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "7",
  day =          "12",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010007",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/7",
  abstract =     "Remote areas with sparse population, disaster areas in
                 the aftermath, and refugee camps all require
                 communication that is not forthcoming from commercial
                 vendors. Numerous communication system options are
                 available, but with widely varying cost and efficacy.
                 The goal of this work is to discuss a framework in
                 which to consider appropriate telecommunications
                 technology. The framework approaches sustainable
                 development as a business, under the assumption that
                 social/technical/environmental sustainability requires
                 economic sustainability. The framework incorporates
                 well known and accepted business canvas as a roadmap.
                 Information and Communication Technology (ICT)
                 interventions are then considered in terms of their
                 value proposition, markets, and perhaps most important
                 for the realm of sustainable development, the key
                 partners. To illustrate how the framework applies, we
                 consider three case studies and then apply the
                 resultant principles to the consideration of these ICT
                 projects. The case studies are chosen for their
                 diversity. Furthermore, after verifying the decision
                 framework, recommendations are made for three ongoing
                 intervention projects in limited-resource settings.",
  acknowledgement = ack-nhfb,
}

@Article{Brown:2018:DFC,
  author =       "Suzana Brown and Alan Mickelson",
  title =        "A Decision Framework for Choosing Telecommunication
                 Technologies in Limited-Resource Settings",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "8",
  day =          "12",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010008",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/8",
  abstract =     "Remote areas with sparse population, disaster areas in
                 the aftermath, and refugee camps all require
                 communication that is not forthcoming from commercial
                 vendors. Numerous communication system options are
                 available, but with widely varying cost and efficacy.
                 The goal of this work is to discuss a framework in
                 which to consider appropriate telecommunications
                 technology. The framework approaches sustainable
                 development as a business, under the assumption that
                 social/technical/environmental sustainability requires
                 economic sustainability. The framework incorporates
                 well known and accepted business canvas as a roadmap.
                 Information and Communication Technology (ICT)
                 interventions are then considered in terms of their
                 value proposition, markets, and perhaps most important
                 for the realm of sustainable development, the key
                 partners. To illustrate how the framework applies, we
                 consider three case studies and then apply the
                 resultant principles to the consideration of these ICT
                 projects. The case studies are chosen for their
                 diversity. Furthermore, after verifying the decision
                 framework, recommendations are made for three ongoing
                 intervention projects in limited-resource settings.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment
                 2017.",
}

@Article{Mansour:2018:VAH,
  author =       "Asmae Ait Mansour and Nourddine Enneya and Mohamed
                 Ouadou",
  title =        "A Velocity-Aware Handover Trigger in Two-Tier
                 Heterogeneous Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "9",
  day =          "15",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010009",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/9",
  abstract =     "The unexpected change in user equipment (UE) velocity
                 is recognized as the primary explanation for poor
                 handover quality. In order to resolve this issue, while
                 limiting ping-pong (PP) events we carefully and
                 dynamically optimized handover parameters for each UE
                 unit according to its velocity and the coverage area of
                 the access point (AP). In order to recognize any
                 variations in velocity, we applied Allan variance
                 (AVAR) to the received signal strength (RSS) from the
                 serving AP. To assess our approach, it was essential to
                 configure a heterogeneous network context (LTE-WiFi)
                 and interconnect Media-Independent Handover (MIH) and
                 Proxy Mobile IPv6 (PMIPv6) for seamless handover.
                 Reproduction demonstrated that our approach does not
                 only result in a gain in relatively accurate velocity
                 but in addition reduces the number of PP and handover
                 failures (HOFs).",
  acknowledgement = ack-nhfb,
}

@Article{Seet:2018:RAC,
  author =       "Boon-Chong Seet and Syed Faraz Hasan and Peter Han-Joo
                 Chong",
  title =        "Recent Advances on Cellular {D2D} Communications",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "1",
  pages =        "10",
  day =          "17",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10010010",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/1/10",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Recent Advances in Cellular D2D
                 Communications.",
}

@Article{Giuli:2018:AFI,
  author =       "Dino Giuli",
  title =        "Announcing the 2018 {{\booktitle{Future Internet}}}
                 Travel Award for {PhD} Students",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "11",
  day =          "28",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020011",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/11",
  abstract =     "In the field of cognitive radio spectrum sensing, the
                 adaptive silence period management mechanism (ASPM) has
                 improved the problem of the low time-resource
                 utilization rate of the traditional silence period
                 management mechanism (TSPM). However, in the case of
                 the low signal-to-noise ratio (SNR), the ASPM algorithm
                 will increase the probability of missed detection for
                 the primary user (PU). Focusing on this problem, this
                 paper proposes an improved adaptive silence period
                 management (IA-SPM) algorithm which can adaptively
                 adjust the sensing parameters of the current period in
                 combination with the feedback information from the data
                 communication with the sensing results of the previous
                 period. The feedback information in the channel is
                 achieved with frequency resources rather than time
                 resources in order to adapt to the parameter change in
                 the time-varying channel. The Monte Carlo simulation
                 results show that the detection probability of the
                 IA-SPM is 10-15\% higher than that of the ASPM under
                 low SNR conditions.",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:2018:IAS,
  author =       "Jingbo Zhang and Zhenyang Sun and Shufang Zhang",
  title =        "The Improved Adaptive Silence Period Algorithm over
                 Time-Variant Channels in the Cognitive Radio System",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "12",
  day =          "29",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020012",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/12",
  abstract =     "In the field of cognitive radio spectrum sensing, the
                 adaptive silence period management mechanism (ASPM) has
                 improved the problem of the low time-resource
                 utilization rate of the traditional silence period
                 management mechanism (TSPM). However, in the case of
                 the low signal-to-noise ratio (SNR), the ASPM algorithm
                 will increase the probability of missed detection for
                 the primary user (PU). Focusing on this problem, this
                 paper proposes an improved adaptive silence period
                 management (IA-SPM) algorithm which can adaptively
                 adjust the sensing parameters of the current period in
                 combination with the feedback information from the data
                 communication with the sensing results of the previous
                 period. The feedback information in the channel is
                 achieved with frequency resources rather than time
                 resources in order to adapt to the parameter change in
                 the time-varying channel. The Monte Carlo simulation
                 results show that the detection probability of the
                 IA-SPM is 10-15\% higher than that of the ASPM under
                 low SNR conditions.",
  acknowledgement = ack-nhfb,
}

@Article{Loreti:2018:PAB,
  author =       "Pierpaolo Loreti and Lorenzo Bracciale and Alberto
                 Caponi",
  title =        "Push Attack: Binding Virtual and Real Identities Using
                 Mobile Push Notifications",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "13",
  day =          "31",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020013",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/13",
  abstract =     "Popular mobile apps use push notifications extensively
                 to offer an ``always connected'' experience to their
                 users. Social networking apps use them as a real-time
                 channel to notify users about new private messages or
                 new social interactions (e.g., friendship request,
                 tagging, etc.). Despite the cryptography used to
                 protect these communication channels, the strict
                 temporal binding between the actions that trigger the
                 notifications and the reception of the notification
                 messages in the mobile device may represent a privacy
                 issue. In this work, we present the push notification
                 attack designed to bind the physical owners of mobile
                 devices with their virtual identities, even if
                 pseudonyms are used. In an online attack, an active
                 attacker triggers a push notification and captures the
                 notification packets that transit in the network. In an
                 offline attack, a passive attacker correlates the
                 social network activity of a user with the received
                 push notification. The push notification attack
                 bypasses the standard ways of protecting user privacy
                 based on the network layer by operating at the
                 application level. It requires no additional software
                 on the victim's mobile device.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Abbasi:2018:RVV,
  author =       "Irshad Ahmed Abbasi and Adnan Shahid Khan",
  title =        "A Review of Vehicle to Vehicle Communication Protocols
                 for {VANETs} in the Urban Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "14",
  day =          "31",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020014",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/14",
  abstract =     "Vehicular Ad-hoc Networks (VANETs) have been gaining
                 significant attention from the research community due
                 to their increasing importance for building an
                 intelligent transportation system. The characteristics
                 of VANETs, such as high mobility, network partitioning,
                 intermittent connectivity and obstacles in city
                 environments, make routing a challenging task. Due to
                 these characteristics of VANETs, the performance of a
                 routing protocol is degraded. The position-based
                 routing is considered to be the most significant
                 approach in VANETs. In this paper, we present a brief
                 review of most significant position based unicast
                 routing protocols designed for vehicle to vehicle
                 communications in the urban environment. We provide
                 them with their working features for exchanging
                 information between vehicular nodes. We describe their
                 pros and cons. This study also provides a comparison of
                 the vehicle to vehicle communication based routing
                 protocols. The comparative study is based on some
                 significant factors such as mobility, traffic density,
                 forwarding techniques and method of junction selection
                 mechanism, and strategy used to handle a local optimum
                 situation. It also provides the simulation based study
                 of existing dynamic junction selection routing
                 protocols and a static junction selection routing
                 protocol. It provides a profound insight into the
                 routing techniques suggested in this area and the most
                 valuable solutions to advance VANETs. More importantly,
                 it can be used as a source of references to other
                 researchers in finding literature that is relevant to
                 routing in VANETs.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue New Perspectives in Intelligent
                 Transportation Systems and Mobile Communications
                 towards a Smart Cities Context.",
}

@Article{Pau:2018:SPC,
  author =       "Giovanni Pau and Tiziana Campisi and Antonino Canale
                 and Alessandro Severino and Mario Collotta and Giovanni
                 Tesoriere",
  title =        "Smart Pedestrian Crossing Management at Traffic Light
                 Junctions through a Fuzzy-Based Approach",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "15",
  day =          "01",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020015",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/15",
  abstract =     "In the last few years, numerous research efforts have
                 been conducted to merge the Internet of Things (IoT)
                 with smart city environments. The goal to make a city
                 ``smart'' is arising as a possible solution to lessen
                 the issues caused by the urban population growth and
                 fast urbanization. Attention also has focused on the
                 pedestrian crossings because they are one of the most
                 dangerous places in the transport field. Information
                 and Communications Technologies (ICT) can undoubtedly
                 be an excellent support in developing infrastructures
                 that can best manage pedestrian crossing. For this
                 reason, this paper introduces a fuzzy logic-based
                 solution able to manage dynamically the traffic lights'
                 phases in signalized pedestrian crossings. The proposed
                 approach provides the possibility to change the phases
                 of the traffic light taking into account the time of
                 the day and the number of pedestrians about to cross
                 the road. The paper presents a thorough description of
                 the fuzzy logic controller configuration, an in-depth
                 analysis of the application scenario and simulative
                 assessments obtained through Vissim simulations.",
  acknowledgement = ack-nhfb,
}

@Article{Pathan:2018:ETB,
  author =       "Muhammad Salman Pathan and Nafei Zhu and Jingsha He
                 and Zulfiqar Ali Zardari and Muhammad Qasim Memon and
                 Muhammad Iftikhar Hussain",
  title =        "An Efficient Trust-Based Scheme for Secure and Quality
                 of Service Routing in {MANETs}",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "16",
  day =          "05",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020016",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/16",
  abstract =     "Due to the dynamism of topology, sharing of bandwidth
                 and constraint of resources in wireless nodes, the
                 provision of quality of service (QoS) for routing in
                 mobile ad hoc networks (MANETs) presents a great
                 challenge. Security is another crucial aspect of
                 providing QoS since the existence of malicious nodes
                 present all kinds of threats to MANETs. Although a
                 number of mechanisms have been proposed for protecting
                 MANETs, most of the solutions are only effective for a
                 particular kind of attacks or provide security at the
                 cost of sacrificing QoS. In this paper, we propose a
                 trust-based secure QoS routing scheme by combining
                 social and QoS trust. The primary approach of the
                 proposed scheme relies on mitigating nodes that exhibit
                 various packet forwarding misbehavior and on
                 discovering the path that ensures reliable
                 communication through the trust mechanism. The scheme
                 would select the best forwarding node based on packet
                 forwarding behavior as well as capability in terms of
                 QoS parameters, such as residual energy, channel
                 quality, link quality, etc. We will present an
                 adversary model for packet dropping attack against
                 which we evaluate the proposed scheme. Simulation
                 experiment using Network Simulator-2 (NS2) and under
                 various network conditions show that mixing social and
                 QoS trust parameters can greatly improve security and
                 quality of service routing in terms of overhead, packet
                 delivery ratio and energy consumption.",
  acknowledgement = ack-nhfb,
}

@Article{Rexha:2018:ITF,
  author =       "Blerim Rexha and Gresa Shala and Valon Xhafa",
  title =        "Increasing Trustworthiness of Face Authentication in
                 Mobile Devices by Modeling Gesture Behavior and
                 Location Using Neural Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "17",
  day =          "05",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020017",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/17",
  abstract =     "Personal mobile devices currently have access to a
                 significant portion of their user's private sensitive
                 data and are increasingly used for processing mobile
                 payments. Consequently, securing access to these mobile
                 devices is a requirement for securing access to the
                 sensitive data and potentially costly services. Face
                 authentication is one of the promising biometrics-based
                 user authentication mechanisms that has been widely
                 available in this era of mobile computing. With a
                 built-in camera capability on smartphones, tablets, and
                 laptops, face authentication provides an attractive
                 alternative of legacy passwords for its memory-less
                 authentication process, which is so sophisticated that
                 it can unlock the device faster than a fingerprint.
                 Nevertheless, face authentication in the context of
                 smartphones has proven to be vulnerable to attacks. In
                 most current implementations, a sufficiently
                 high-resolution face image displayed on another mobile
                 device will be enough to circumvent security measures
                 and bypass the authentication process. In order to
                 prevent such bypass attacks, gesture recognition
                 together with location is proposed to be additionally
                 modeled. Gestures provide a faster and more convenient
                 method of authentication compared to a complex
                 password. The focus of this paper is to build a secure
                 authentication system with face, location and gesture
                 recognition as components. User gestures and location
                 data are a sequence of time series; therefore, in this
                 paper we propose to use unsupervised learning in the
                 long short-term memory recurrent neural network to
                 actively learn to recognize, group and discriminate
                 user gestures and location. Moreover, a
                 clustering-based technique is also implemented for
                 recognizing gestures and location.",
  acknowledgement = ack-nhfb,
}

@Article{Kambourakis:2018:SPW,
  author =       "Georgios Kambourakis and Felix Gomez Marmol and Guojun
                 Wang",
  title =        "Security and Privacy in Wireless and Mobile Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "18",
  day =          "09",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020018",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/18",
  abstract =     "The present work introduces virtual fairs,
                 particularly the perceived benefits, challenges, and
                 relevance of such fairs for recruitment and employer
                 branding. These aspects were explored in a
                 semi-structured interview with an organizer of virtual
                 fairs across Scandinavia, and a focus group composed of
                 Norwegian recruiters and exhibitors. The results of the
                 data collection can be summarized in the form of themes
                 that relate to web analytics, web services and
                 optimization. The benefits of virtual fairs pertain to
                 the (a) visibility and branding; (b) costs; and (c)
                 analytics-based customization. Challenges of virtual
                 career fairs pertain to the (a) lack of online
                 engagement, (b) preparation and staffing costs; (c)
                 lack of guidelines; (d) talent access and
                 identification; (e) security and infrastructure; (f)
                 long-term planning; (g) and inter-dependencies. The
                 discussion summarizes the implications of branding and
                 recruitment and the value they add to business, also
                 noting how context effects may come into play. The
                 article concludes by exploring the possibility that
                 virtual fairs will complement or become the new
                 standard in recruitment and outlines future avenues for
                 research and practice.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Vik:2018:VCF,
  author =       "{\AA}dne Stenberg Vik and Bj{\o}rn Christian
                 N{\o}rbech and Debora Jeske",
  title =        "Virtual Career Fairs: Perspectives from {Norwegian}
                 Recruiters and Exhibitors",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "19",
  day =          "12",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020019",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/19",
  abstract =     "The present work introduces virtual fairs,
                 particularly the perceived benefits, challenges, and
                 relevance of such fairs for recruitment and employer
                 branding. These aspects were explored in a
                 semi-structured interview with an organizer of virtual
                 fairs across Scandinavia, and a focus group composed of
                 Norwegian recruiters and exhibitors. The results of the
                 data collection can be summarized in the form of themes
                 that relate to web analytics, web services and
                 optimization. The benefits of virtual fairs pertain to
                 the (a) visibility and branding; (b) costs; and (c)
                 analytics-based customization. Challenges of virtual
                 career fairs pertain to the (a) lack of online
                 engagement, (b) preparation and staffing costs; (c)
                 lack of guidelines; (d) talent access and
                 identification; (e) security and infrastructure; (f)
                 long-term planning; (g) and inter-dependencies. The
                 discussion summarizes the implications of branding and
                 recruitment and the value they add to business, also
                 noting how context effects may come into play. The
                 article concludes by exploring the possibility that
                 virtual fairs will complement or become the new
                 standard in recruitment and outlines future avenues for
                 research and practice.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue u- and e- Service, Science and
                 Technology.",
}

@Article{Gatteschi:2018:BSC,
  author =       "Valentina Gatteschi and Fabrizio Lamberti and Claudio
                 Demartini and Chiara Pranteda and V{\'\i}ctor
                 Santamar{\'\i}a",
  title =        "Blockchain and Smart Contracts for Insurance: Is the
                 Technology Mature Enough?",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "20",
  day =          "20",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020020",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/20",
  abstract =     "Blockchain is receiving increasing attention from
                 academy and industry, since it is considered a
                 breakthrough technology that could bring huge benefits
                 to many different sectors. In 2017, Gartner positioned
                 blockchain close to the peak of inflated expectations,
                 acknowledging the enthusiasm for this technology that
                 is now largely discussed by media. In this scenario,
                 the risk to adopt it in the wake of enthusiasm, without
                 objectively judging its actual added value is rather
                 high. Insurance is one the sectors that, among others,
                 started to carefully investigate the possibilities of
                 blockchain. For this specific sector, however, the hype
                 cycle shows that the technology is still in the
                 innovation trigger phase, meaning that the spectrum of
                 possible applications has not been fully explored yet.
                 Insurers, as with many other companies not necessarily
                 active only in the financial sector, are currently
                 requested to make a hard decision, that is, whether to
                 adopt blockchain or not, and they will only know if
                 they were right in 3-5 years. The objective of this
                 paper is to support actors involved in this decision
                 process by illustrating what a blockchain is, analyzing
                 its advantages and disadvantages, as well as discussing
                 several use cases taken from the insurance sector,
                 which could easily be extended to other domains.",
  acknowledgement = ack-nhfb,
}

@Article{DAmico:2018:RCK,
  author =       "Antonella D'Amico and Domenico Guastella",
  title =        "Robotics Construction Kits: From ``Objects to Think
                 with'' to ``Objects to Think and to Emote with''",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "21",
  day =          "24",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020021",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/21",
  abstract =     "This paper discusses new ideas about the use of
                 educational robotics in social-emotional learning. In
                 particular, educational robotics could be a tool
                 intended to allow children to acquire some of the basic
                 aspects of human emotions and emotional functioning,
                 and to understand how these relate to the mind and
                 body. More specifically, by using robots such as the
                 LEGO Mindstorm construction kits-which allow users to
                 both construct the body of the robot and to provide it
                 with a behavioural repertory-children have the
                 opportunity to visualize (and manipulate) the
                 relationship between the robot's body and mind. This
                 allows them to simulate ``embodied emotional minds''
                 and to reflect on new neuroscientific concepts
                 regarding body-mind and cognition-emotion
                 relationships.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Engaging in Interaction with Robots.",
}

@Article{Oliveira:2018:LMP,
  author =       "Ewerton L. S. Oliveira and Davide Orr{\`u} and Luca
                 Morreale and Tiago P. Nascimento and Andrea Bonarini",
  title =        "Learning and Mining Player Motion Profiles in
                 Physically Interactive Robogames",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "3",
  pages =        "22",
  day =          "26",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10030022",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/3/22",
  abstract =     "Physically-Interactive RoboGames