@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
"\ifx \undefined \k \let \k = \c \fi" #
"\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" #
"\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-FUTURE-INTERNET = "Future Internet"}
@Article{Hudson-Smith:2009:FI,
author = "Andrew Hudson-Smith",
title = "The Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "1--2",
day = "17",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/1",
abstract = "In 1995 technology analyst Gartner [1] developed a
hype cycle model for the adoption of technology. The
cycle comprises five stages from the initial technology
trigger through to a final plateau of productivity
along a with a peak of inflated expectations, a tough
of disillusionment and the slope of enlightenment. The
hype cycle is notable technique for plotting and
identifying waves of innovation and hype in technology
and digital communications. Yet, from where we stand,
we can see the waves of innovation becoming
increasingly shorter, the troughs less deep and the
peaks of expectations higher. The read-write
revolution, that is arguably known as Web 2.0, has
transformed our experience of using the Internet from a
source of information to a means of communication and
participation. It has introduced mirror worlds, the
cloud, wikitecture, social shaping, connected places,
folksonomies and many other terms that I am sure many
of us have used in recent grant applications and
papers. This is the here and now, all of these
technologies are past the technology trigger point and
rising up the peak of inflated expectations with a few
already heading towards the trough before becoming
mainstream and approaching mass adoption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wheeler:2009:LSM,
author = "Steve Wheeler",
title = "Learning Space Mashups: Combining {Web 2.0} Tools to
Create Collaborative and Reflective Learning Spaces",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "3--13",
day = "13",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/3",
abstract = "In this paper, Web 2.0 open content mashups or
combinations are explored. Two case studies of recent
initial teacher training programmes are reviewed where
blogs and wikis were blended to create new virtual
learning spaces. In two separate studies, students
offer their views about using these tools, and reflect
on the strengths and weaknesses of this approach. There
is also discussion about aggregation of content and a
theorization of how community and personal spaces can
create tension and conflict. A new `learning spaces'
model will be presented which aids visualization of the
processes, domains and territories that are brought
into play when content and Web 2.0 tools are mashed up
within the same space.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Mashups.",
}
@Article{Fiaidhi:2009:IMM,
author = "Jinan Fiaidhi and Sabah Mohammed and Lyle Chamarette
and David Thomas",
title = "Identifying Middlewares for Mashup Personal Learning
Environments",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "14--27",
day = "05",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/14",
abstract = "The common understanding of e-learning has shifted
over the last decade from the traditional learning
objects portals to learning paradigms that enforces
constructivism, discovery learning and social
collaboration. Such type of learning takes place
outside the formal academic settings (e.g., seminars or
lectures) where a learning environment is created by
using some kind of web application mashup tools. The
use of these mashup tools moves the learning
environment further away from being a monolithic
platform towards providing an open set of learning
tools, an unrestricted number of actors, and an open
corpus of artifacts, either pre-existing or created by
the learning process - freely combinable and utilizable
by learners within their learning activities. However,
collaboration, mashup and contextualization can only be
supported through services, which can be created and
modified dynamically based on middlewares to suit the
current needs and situations of learners. This article
identifies middlewares suitable for creating effective
personal learning environment based on Web 2.0 mashup
tools. This article also proposed a general framework
for constructing such personal learning environments
based on Ambient Learning realized by learning agents
and the use of Enterprise Mashup servers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Mashups.",
}
@Article{Batcheller:2009:MAG,
author = "James K. Batcheller and Bruce M. Gittings and Robert
I. Dunfey",
title = "A Method for Automating Geospatial Dataset Metadata",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "28--46",
day = "10",
month = nov,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/28",
abstract = "Metadata have long been recognised as crucial to
geospatial asset management and discovery, and yet
undertaking their creation remains an unenviable task
often to be avoided. This paper proposes a practical
approach designed to address such concerns, decomposing
various data creation, management, update and
documentation process steps that are subsequently
leveraged to contribute towards metadata record
completion. Using a customised utility embedded within
a common GIS application, metadata elements are
computationally derived from an imposed feature
metadata standard, dataset geometry, an integrated
storage protocol and pre-prepared content, and
instantiated within a common geospatial discovery
convention. Yielding 27 out of a 32 total metadata
elements (or 15 out of 17 mandatory elements) the
approach demonstrably lessens the burden of metadata
authorship. It also encourages improved geospatial
asset management whilst outlining core requisites for
developing a more open metadata strategy not bound to
any particular application domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Ebner:2009:CWM,
author = "Martin Ebner and Hermann Maurer",
title = "Can Weblogs and Microblogs Change Traditional
Scientific Writing?",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "47--58",
day = "18",
month = nov,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/47",
abstract = "This paper describes a follow-up Web 2.0 approach to a
technology enhanced master course for students of Graz
University of Technology. The lecture ``Social Aspects
of Information Technology'' has a long tradition for
using new didactical scenarios as well as modern
e-Learning technologies. After using a blogosphere one
year ago, this year microblog channels helped to expand
the traditional lecture. Students choose (on a
voluntary basis) whether they want to participate in a
blogging/microblogging group instead of using
conventional methods called Scientific
Writer/Scientific Reviewer. This study addresses the
question whether this method can change the learning
outcome into a more reflective one. Furthermore,
peer-reviewing groups judge the quality of essays and
blog contributions. In this paper we examine if
microblogging can be an appropriate technology for
assisting the process. This publication comes to the
conclusion that an amazing potential and a new way to
work with information is opened when using
microblogging. Students seem to be more engaged,
reflective and critical in as much as they presented
much more personal statements and opinions than years
before.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Beemer:2009:MLR,
author = "Brandon Beemer and Dawn Gregg",
title = "Mashups: a Literature Review and Classification
Framework",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "59--87",
day = "22",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/59",
abstract = "The evolution of the Web over the past few years has
fostered the growth of a handful of new technologies
(e.g. Blogs, Wiki's, Web Services). Recently web
mashups have emerged as the newest Web technology and
have gained lots of momentum and attention from both
academic and industry communities. Current mashup
literature focuses on a wide array of issues, which can
be partially explained by how new the topic is.
However, to date, mashup literature lacks an
articulation of the different subtopics of web mashup
research. This study presents a broad review of mashup
literature to help frame the 1subtopics in mashup
research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Mashups.",
}
@Article{Beall:2010:MND,
author = "Jeffrey Beall",
title = "Metadata for Name Disambiguation and Collocation",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "1--15",
day = "05",
month = jan,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/1",
abstract = "Searching names of persons, families, and
organizations is often difficult in online databases
because different persons or organizations frequently
share the same name and because a single person's or
organization's name may appear in different forms in
various online documents. Databases and search engines
can use metadata as a tool to solve the problem of name
ambiguity and name variation in online databases. This
article describes the challenges names pose in
information retrieval and some emerging name metadata
databases that can help ameliorate the problems.
Effective name disambiguation and collocation increase
search precision and recall and can improve assessment
of scholarly work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Priscoli:2010:FCA,
author = "Francesco Delli Priscoli",
title = "A Fully Cognitive Approach for Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "16--29",
day = "22",
month = jan,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/16",
abstract = "This paper deals with an autonomous cognitive network
management architecture which aims at achieving
inter-network (horizontal) and inter-layer (vertical)
cross-optimization. The proposed architecture is based
on the so-called Cognitive Managers transparently
embedded in properly selected network nodes. The core
of each Cognitive Manager are the so-called thinking
modules, which are in charge of taking consistent and
coordinated decisions according to a fully cognitive
approach. The thinking modules potentially avail of
information coming from both the transport and the
service/content layers of all networks and, based on
all this inter-layer and inter-network information,
take consistent and coordinated decisions impacting the
different layers, aiming at the overall inter-layer,
inter-network optimization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Network Architectures.",
}
@Article{Fiore:2010:SRR,
author = "Ugo Fiore",
title = "Selective Redundancy Removal: a Framework for Data
Hiding",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "30--40",
day = "15",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/30",
abstract = "Data hiding techniques have so far concentrated on
adding or modifying irrelevant information in order to
hide a message. However, files in widespread use, such
as HTML documents, usually exhibit high redundancy
levels, caused by code-generation programs. Such
redundancy may be removed by means of optimization
software. Redundancy removal, if applied selectively,
enables information hiding. This work introduces
Selective Redundancy Removal (SRR) as a framework for
hiding data. An example application of the framework is
given in terms of hiding information in HTML documents.
Non-uniformity across documents may raise alarms.
Nevertheless, selective application of optimization
techniques might be due to the legitimate use of
optimization software not supporting all the
optimization methods, or configured to not use all of
them.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Fuchs:2010:TFW,
author = "Christian Fuchs and Wolfgang Hofkirchner and Matthias
Schafranek and Celina Raffl and Marisol Sandoval and
Robert Bichler",
title = "Theoretical Foundations of the {Web}: Cognition,
Communication, and Co-Operation. Towards an
Understanding of {Web 1.0, 2.0, 3.0}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "41--59",
day = "19",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/41",
abstract = "Currently, there is much talk of Web 2.0 and Social
Software. A common understanding of these notions is
not yet in existence. The question of what makes Social
Software social has thus far also remained
unacknowledged. In this paper we provide a theoretical
understanding of these notions by outlining a model of
the Web as a techno-social system that enhances human
cognition towards communication and co-operation.
According to this understanding, we identify three
qualities of the Web, namely Web 1.0 as a Web of
cognition, Web 2.0 as a Web of human communication, and
Web 3.0 as a Web of co-operation. We use the terms Web
1.0, Web 2.0, Web 3.0 not in a technical sense, but for
describing and characterizing the social dynamics and
information processes that are part of the Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Benedetto:2010:DQE,
author = "Francesco Benedetto and Alberto Curcio and Gaetano
Giunta",
title = "Dynamic {QoS} Evaluation of Multimedia Contents in
Wireless Networks by {``Double-Boomerang''}
Watermarking",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "60--73",
day = "08",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/60",
abstract = "This work presents a cooperative network-aware
processing of multimedia content for dynamic quality of
service management in wireless IP networks. Our
technique can be also used for quality control in UMTS
environments, exploiting the tracing watermarking
recently introduced in literature. In this work, we use
the transmitted video-sequences to monitor the QoS in a
videoconference call. The video-sequence of every
active user travels on the communication link, one time
as video (transparent mode), one time as watermark
(hidden mode) describing a boomerang trajectory. The
results obtained through our simulation trials confirm
the validity of such approach. In fact, the advantages
of distributing the management process are (i) an
easier and more precise localization of the cause of
QoS problems, (ii) a better knowledge of local
situations, (iii) a lower complexity for a single QoS
agent and (iv) an increase in possible actions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Ding:2010:MED,
author = "Lian Ding and Shaofeng Liu",
title = "Markup in Engineering Design: a Discourse",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "74--95",
day = "11",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/74",
abstract = "Today's engineering companies are facing unprecedented
competition in a global market place. There is now a
knowledge intensive shift towards whole product
lifecycle support, and collaborative environments. It
has become particularly important to capture
information, knowledge and experiences about previous
design and following stages during their product
lifecycle, so as to retrieve and reuse such information
in new and follow-on designs activities. Recently, with
the rapid development and adoption of digital
technologies, annotation and markup are becoming
important tools for information communication,
retrieval and management. Such techniques are being
increasingly applied to an array of applications and
different digital items, such as text documents, 2D
images and 3D models. This paper presents a
state-of-the-art review of recent research in markup
for engineering design, including a number of core
markup languages and main markup strategies. Their
applications and future utilization in engineering
design, including multi-viewpoint of product models,
capture of information and rationale across the whole
product lifecycle, integration of engineering design
processes, and engineering document management, are
comprehensively discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Christin:2010:SWS,
author = "Delphine Christin and Parag S. Mogre and Matthias
Hollick",
title = "Survey on Wireless Sensor Network Technologies for
Industrial Automation: The Security and Quality of
Service Perspectives",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "2",
pages = "96--125",
day = "08",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2020096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/2/96",
abstract = "Wireless Sensor Networks (WSNs) are gradually adopted
in the industrial world due to their advantages over
wired networks. In addition to saving cabling costs,
WSNs widen the realm of environments feasible for
monitoring. They thus add sensing and acting
capabilities to objects in the physical world and allow
for communication among these objects or with services
in the future Internet. However, the acceptance of WSNs
by the industrial automation community is impeded by
open issues, such as security guarantees and provision
of Quality of Service (QoS). To examine both of these
perspectives, we select and survey relevant WSN
technologies dedicated to industrial automation. We
determine QoS requirements and carry out a threat
analysis, which act as basis of our evaluation of the
current state-of-the-art. According to the results of
this evaluation, we identify and discuss open research
issues.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Maier:2010:QPT,
author = "Martin Maier and Navid Ghazisaidi",
title = "{QoS} Provisioning Techniques for Future
Fiber-Wireless {(FiWi)} Access Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "2",
pages = "126--155",
day = "29",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2020126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/2/126",
abstract = "A plethora of enabling optical and wireless
access-metro network technologies have been emerging
that can be used to build future-proof bimodal
fiber-wireless (FiWi) networks. Hybrid FiWi networks
aim at providing wired and wireless quad-play services
over the same infrastructure simultaneously and hold
great promise to mitigate the digital divide and change
the way we live and work by replacing commuting with
teleworking. After overviewing enabling optical and
wireless network technologies and their QoS
provisioning techniques, we elaborate on enabling
radio-over-fiber (RoF) and radio-and-fiber (R\&F)
technologies. We describe and investigate new QoS
provisioning techniques for future FiWi networks,
ranging from traffic class mapping, scheduling, and
resource management to advanced aggregation techniques,
congestion control, and layer-2 path selection
algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Taswell:2010:DIM,
author = "Carl Taswell",
title = "A Distributed Infrastructure for Metadata about
Metadata: The {HDMM} Architectural Style and
{PORTAL-DOORS} System",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "2",
pages = "156--189",
day = "01",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2020156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/2/156",
abstract = "Both the IRIS-DNS System and the PORTAL-DOORS System
share a common architectural style for pervasive
metadata networks that operate as distributed metadata
management systems with hierarchical authorities for
entity registering and attribute publishing.
Hierarchical control of metadata redistribution
throughout the registry-directory networks constitutes
an essential characteristic of this architectural style
called Hierarchically Distributed Mobile Metadata
(HDMM) with its focus on moving the metadata for who
what where as fast as possible from servers in response
to requests from clients. The novel concept of
multilevel metadata about metadata has also been
defined for the PORTAL-DOORS System with the use of
entity, record, infoset, representation and message
metadata. Other new features implemented include the
use of aliases, priorities and metaresources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Ramstetter:2010:ASN,
author = "Jerry Rick Ramstetter and Yaling Yang and Danfeng
Yao",
title = "Applications and Security of Next-Generation,
User-Centric Wireless Systems",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "190--211",
day = "28",
month = jul,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/190",
abstract = "Pervasive wireless systems have significantly improved
end-users' quality of life. As manufacturing costs
decrease, communications bandwidth increases, and
contextual information is made more readily available,
the role of next generation wireless systems in
facilitating users' daily activities will grow. Unique
security and privacy issues exist in these wireless,
context-aware, often decentralized systems. For
example, the pervasive nature of such systems allows
adversaries to launch stealthy attacks against them. In
this review paper, we survey several emergent personal
wireless systems and their applications. These systems
include mobile social networks, active implantable
medical devices, and consumer products. We explore each
system's usage of contextual information and provide
insight into its security vulnerabilities. Where
possible, we describe existing solutions for
defendingagainst these vulnerabilities. Finally, we
point out promising future research directions for
improving these systems' robustness and security",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Arkoulis:2010:MSC,
author = "Stamatios Arkoulis and Giannis F. Marias and Pantelis
A. Frangoudis and Jens Oberender and Alexandru Popescu
and Markus Fiedler and Hermann de Meer and George C.
Polyzos",
title = "Misbehavior Scenarios in Cognitive Radio Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "212--237",
day = "29",
month = jul,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/212",
abstract = "Recent advances in the fields of Cognitive Radio and
the proliferation of open spectrum access promise that
spectrum-agile wireless communication will be
widespread in the near future, and will bring
significant flexibility and potential utility
improvements for end users. With spectrum efficiency
being a key objective, most relevant research focuses
on smart coexistence mechanisms. However, wireless
nodes may behave selfishly and should be considered as
rational autonomous entities. Selfishness, pure malice
or even faulty equipment can lead to behavior that does
not conform to sharing protocols and etiquette. Thus,
there is a need to secure spectrum sharing mechanisms
against attacks in the various phases of the sharing
process. Identifying these attacks and possible
countermeasures is the focus of this work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Granitzer:2010:OAS,
author = "Michael Granitzer and Vedran Sabol and Kow Weng Onn
and Dickson Lukose and Klaus Tochtermann",
title = "Ontology Alignment --- a Survey with Focus on Visually
Supported Semi-Automatic Techniques",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "238--258",
day = "04",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/238",
abstract = "Semantic technologies are of paramount importance to
the future Internet. The reuse and integration of
semantically described resources, such as data or
services, necessitates the bringing of ontologies into
mutual agreement. Ontology alignment deals with the
discovery of correspondences between concepts and
relations from different ontologies. Alignment provides
the key ingredient to semantic interoperability. This
paper gives an overview on the state of the art in the
field of visually supported semi-automatic alignment
techniques and presents recent trends and developments.
Particular attention is given to user interfaces and
visualization techniques supporting involvement of
humans in the alignment process. We derive and
summarize requirements for visual semi-automatic
alignment systems, provide an overview of existing
approaches, and discuss the possibilities for further
improvements and future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Xie:2010:TFS,
author = "Iris Xie and Soohyung Joo",
title = "Tales from the Field: Search Strategies Applied in
{Web} Searching",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "259--281",
day = "06",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030259",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/259",
abstract = "In their web search processes users apply multiple
types of search strategies, which consist of different
search tactics. This paper identifies eight types of
information search strategies with associated cases
based on sequences of search tactics during the
information search process. Thirty-one participants
representing the general public were recruited for this
study. Search logs and verbal protocols offered rich
data for the identification of different types of
search strategies. Based on the findings, the authors
further discuss how to enhance web-based information
retrieval (IR) systems to support each type of search
strategy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information Behavior.",
}
@Article{Ho:2010:IVA,
author = "Yeh-Chin Ho and Yi-Bing Lin and Ren-Huang Liou and
Yuan-Kuang Tu",
title = "Implementing Value Added Applications in Next
Generation Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "282--294",
day = "06",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/282",
abstract = "One of the major issues in the future Internet is the
integration of telecom networks with the Internet. In
many countries, large Internet Service Providers (ISPs)
are also telecom operators that have been focusing on
providing Internet services through their telecom
networks with telecom-grade mechanisms. In this
article, we show that IP Multimedia Subsystem (IMS) is
a telecom-grade mechanism that addresses this important
issue. In Next Generation Network (NGN), IMS supports
IP-based multimedia services that can be accessed from
various wireless and wired access technologies through
fixed-mobile convergence. We show how to integrate
Internet Protocol Television (IPTV) with NGN/IMS to
offer enhanced IPTV services for subscribers with
set-top boxes or mobile phones. We specifically
describe the implementations of three services: weather
forecasts, short messages on TV screens and TV
shopping/food ordering for mobile users. Although these
services can be directly implemented in the Internet,
our commercial operation experiences indicate that the
NGN/IMS implementation has advantages in terms of
telecom-grade security, Quality of Service (QoS), and
flexible service creation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Urushidani:2010:DRA,
author = "Shigeo Urushidani and Kensuke Fukuda and Michihiro
Koibuchi and Motonori Nakamura and Shunji Abe and
Yusheng Ji and Michihiro Aoki and Shigeki Yamada",
title = "Dynamic Resource Allocation and {QoS} Control
Capabilities of the {Japanese} Academic Backbone
Network",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "295--307",
day = "09",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030295",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/295",
abstract = "Dynamic resource control capabilities have become
increasingly important for academic networks that must
support big scientific research projects at the same
time as less data intensive research and educational
activities. This paper describes the dynamic resource
allocation and QoS control capabilities of the Japanese
academic backbone network, called SINET3, which
supports a variety of academic applications with a wide
range of network services. The article describes the
network architecture, networking technologies, resource
allocation, QoS control, and layer-1 bandwidth
on-demand services. It also details typical services
developed for scientific research, including the user
interface, resource control, and management functions,
and includes performance evaluations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Mahfoudh:2010:EER,
author = "Saoucene Mahfoudh and Pascale Minet and Ichrak
Amdouni",
title = "Energy Efficient Routing and Node Activity Scheduling
in the {OCARI} Wireless Sensor Network",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "308--340",
day = "17",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030308",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/308",
abstract = "Sensor nodes are characterized by a small size, a low
cost, an advanced communication technology, but also a
limited amount of energy. Energy efficient strategies
are required in such networks to maximize network
lifetime. In this paper, we focus on a solution
integrating energy efficient routing and node activity
scheduling. The energy efficient routing we propose,
called EOLSR, selects the route and minimizes the
energy consumed by an end-to-end transmission, while
avoiding nodes with low residual energy. Simulation
results show that EOLSR outperforms the solution
selecting the route of minimum energy as well as the
solution based on node residual energy. Cross-layering
allows EOLSR to use information from the application
layer or the MAC layer to reduce its overhead and
increase network lifetime. Node activity scheduling is
based on the following observation: the sleep state is
the least power consuming state. So, to schedule node
active and sleeping periods, we propose SERENA that
colors all network nodes using a small number of
colors, such that two nodes with the same color can
transmit without interfering. The node color is mapped
into a time slot during which the node can transmit.
Consequently, each node is awake during its slot and
the slots of its one-hop neighbors, and sleeps in the
remaining time. We evaluate SERENA benefits obtained in
terms of bandwidth, delay and energy. We also show how
cross-layering with the application layer can improve
the end-to-end delays for data gathering
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Networked Sensors and Actuators.",
}
@Article{Lux:2010:CGV,
author = "Mathias Lux and Arthur Pitman and Oge Marques",
title = "Can Global Visual Features Improve Tag Recommendation
for Image Annotation?",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "341--362",
day = "27",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030341",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/341",
abstract = "Recent advances in the fields of digital photography,
networking and computing, have made it easier than ever
for users to store and share photographs. However
without sufficient metadata, e.g., in the form of tags,
photos are difficult to find and organize. In this
paper, we describe a system that recommends tags for
image annotation. We postulate that the use of
low-level global visual features can improve the
quality of the tag recommendation process when compared
to a baseline statistical method based on tag
co-occurrence. We present results from experiments
conducted using photos and metadata sourced from the
Flickr photo website that suggest that the use of
visual features improves the mean average precision
(MAP) of the system and increases the system's ability
to suggest different tags, therefore justifying the
associated increase in complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Topal:2010:TRA,
author = "Sebahattin Topal and Ismet Erkmen and Aydan M.
Erkmen",
title = "Towards the Robotic {``Avatar''}: An Extensive Survey
of the Cooperation between and within Networked Mobile
Sensors",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "363--387",
day = "14",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/363",
abstract = "Cooperation between networked mobile sensors, wearable
and sycophant sensor networks with parasitically
sticking agents, and also having human beings involved
in the loop is the ``Avatarization'' within the robotic
research community, where all networks are connected
and where you can connect/disconnect at any time to
acquire data from a vast unstructured world. This paper
extensively surveys the networked robotic foundations
of this robotic biological ``Avatar'' that awaits us in
the future. Cooperation between networked mobile
sensors as well as cooperation of nodes within a
network are becoming more robust, fault tolerant and
enable adaptation of the networks to changing
environment conditions. In this paper, we survey and
comparatively discuss the current state of networked
robotics via their critical application areas and their
design characteristics. We conclude by discussing
future challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Networked Sensors and Actuators.",
}
@Article{Do:2010:SQM,
author = "Viet Thi Minh Do and Lars Landmark and {\O}ivind
Kure",
title = "A Survey of {QoS} Multicast in Ad Hoc Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "388--416",
day = "14",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030388",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/388",
abstract = "This survey on Quality of Service (QoS) in multicast
ad hoc networks uses a framework based on the
mechanisms in three important elements: resource
estimations, multicast tree/mesh administration, and
multicast routing. Our contribution is an exploration
of the design space and an identification of areas that
have not been fully explored. We discuss the design
space of central mechanisms and classify proposed QoS
multicast schemes according to the mechanisms they
used. In addition, we summarize the scenarios used for
evaluating their performance. Furthermore, we identify
issues, mechanisms, and scenarios that have not been
fully investigated in existing works. The paper
provides a coherent understanding of design principles,
conceptual operation, and evaluated scenarios of
schemes designed for QoS multicast application in
mobile ad hoc networks (MANETs). It also outlines new
areas for future research in this field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Pinart:2010:ATD,
author = "Carolina Pinart",
title = "Anticipation of Traffic Demands to Guarantee {QoS} in
{IP}\slash Optical Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "417--430",
day = "21",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030417",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/417",
abstract = "Traffic in the Internet backbone is expected to grow
above a few Tbit/s in 2020. To cope with this,
operators are moving to IP/optical network
architectures, where IP is the convergence layer for
all services. On the other hand, the quality of service
(QoS) requirements of future applications encompasses
the individualization of services and the assurance of
stricter quality parameters such as latency, jitter or
capacity. In other words, future optical networks will
not only transport more IP data, but they will also
have to offer differentiated QoS requirements to
services. Finally, some emerging applications, e.g.,
grid computing, need greater flexibility in the usage
of network resources, which involves establishing and
releasing connections as if they were virtualized
resources controlled by other elements or layers. In
this context, traffic-driven lightpath provisioning and
service-plane approaches arise as very interesting
candidate solutions to solve the main challenges
described above. This work reviews the concepts of
service-oriented and self-managed networks and relates
them to propose an integrated approach to assure QoS by
offering flow-aware networking in the sense that
traffic demands will be anticipated in a suitable way,
lightpaths will be established taking into account QoS
information (i.e., impairments) and complex services
will be decomposed into optical connections so that the
above techniques can be employed to assure QoS for any
service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Kulatunga:2010:ENC,
author = "Chamil Kulatunga and Jesse Kielthy and Dmitri Botvich
and William Donnelly",
title = "Exploiting the In-Network Capabilities of Multicast to
Discover Proximate {IPTV} Channels",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "431--445",
day = "29",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040431",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/431",
abstract = "IPTV has become the next generation of television due,
in part, to its ability to support features that have
been lacking in conventional broadcasting-for example,
end-user interactivity, personalisation and
localisation. Providers are also searching for the most
efficient delivery methods to provide the greatest
amount of contents at the lowest cost. At present IPTV
uses IP multicast to deliver live TV channels in an
over-provisioned walled-garden network due to issues of
deploying multicast and QoS challenges in the public
Internet. However, IPTV is likely to shift into some
parts of the public Internet in the future as a managed
service. Multicast routing is performed on a
per-session destination-address basis so each router
maintains a table of all of the multicast addresses to
which the content is being forwarded. We exploit this
information to discover and join the in-progress
channels of geographically proximate users and to
create a new incentivised premium service in future
IPTV networks called ProxyTV. This approach is expected
to minimise network bandwidth requirements as it
enables ISPs to optimise bandwidth on their edge
networks. This becomes increasingly significant as TV
content consumes more and more bandwidth, especially
with the onset of HD and 3D capabilities. In this
paper, we have presented in detail the concept with the
results of a survey and an analysis of network traffic
to justify the proposed approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{So-In:2010:DRR,
author = "Chakchai So-In and Raj Jain and Abdel-Karim {Al
Tamimi}",
title = "Deficit Round {Robin} with Fragmentation Scheduling to
Achieve Generalized Weighted Fairness for Resource
Allocation in {IEEE 802.16e} Mobile {WiMAX} Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "446--468",
day = "12",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040446",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/446",
abstract = "Deficit Round Robin (DRR) is a fair packet-based
scheduling discipline commonly used in wired networks
where link capacities do not change with time. However,
in wireless networks, especially wireless broadband
networks, i.e., IEEE 802.16e Mobile WiMAX, there are
two main considerations violate the packet-based
service concept for DRR. First, the resources are
allocated per Mobile WiMAX frame. To achieve full frame
utilization, Mobile WiMAX allows packets to be
fragmented. Second, due to a high variation in wireless
channel conditions, the link/channel capacity can
change over time and location. Therefore, we introduce
a Deficit Round Robin with Fragmentation (DRRF) to
allocate resources per Mobile WiMAX frame in a fair
manner by allowing for varying link capacity and for
transmitting fragmented packets. Similar to DRR and
Generalized Processor Sharing (GPS), DRRF achieves
perfect fairness. DRRF results in a higher throughput
than DRR (80\% improvement) while causing less overhead
than GPS (8 times less than GPS). In addition, in
Mobile WiMAX, the quality of service (QoS) offered by
service providers is associated with the price paid.
This is similar to a cellular phone system; the users
may be required to pay air-time charges. Hence, we have
also formalized a Generalized Weighted Fairness (GWF)
criterion which equalizes a weighted sum of service
time units or slots, called temporal fairness, and
transmitted bytes, called throughput fairness, for
customers who are located in a poor channel condition
or at a further distance versus for those who are near
the base stations, or have a good channel condition. We
use DRRF to demonstrate the application of GWF. These
fairness criteria are used to satisfy basic
requirements for resource allocation, especially for
non real-time traffic. Therefore, we also extend DRRF
to support other QoS requirements, such as minimum
reserved traffic rate, maximum sustained traffic rate,
and traffic priority. For real-time traffic, i.e.,
video traffic, we compare the performance of DRRF with
deadline enforcement to that of Earliest Deadline First
(EDF). The results show that DRRF outperforms EDF
(higher achievable throughput under the promised delay
latency) and maintains fairness under an overload
scenario.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Mahfoudh:2010:NCC,
author = "Saoucene Mahfoudh and Gerard Chalhoub and Pascale
Minet and Michel Misson and Ichrak Amdouni",
title = "Node Coloring and Color Conflict Detection in Wireless
Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "469--504",
day = "13",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040469",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/469",
abstract = "In wireless sensor networks, energy efficiency is
mainly achieved by making nodes sleep. In this paper,
we present the combination of SERENA, a new node
activity scheduling algorithm based on node coloring,
with TDMA/CA, a collision avoidance MAC protocol. We
show that the combination of these two protocols
enables substantial bandwidth and energy benefits for
both general and data gathering applications. As a
first contribution, we prove that the three-hop node
coloring problem is NP-complete. As a second
contribution, the overhead induced by SERENA during
network coloring is reduced, making possible the use of
these protocols even in dense networks with limited
bandwidth. The third contribution of this paper is to
show that applying any slot assignment algorithm with
spatial reuse based on node neighborhood without taking
into account link quality can lead to poor performances
because of collisions. The use of good quality links
will prevent this phenomenon. The fourth contribution
consists of optimizing end-to-end delays for data
gathering applications, by means of cross-layering with
the application. However, color conflicts resulting
from topology changes, mobility and late node arrivals
can give rise to collisions. As a fifth contribution,
we show how the MAC layer can detect color conflicts,
and cope with them at the cost of a slightly reduced
throughput. Then, we discuss the tradeoff between
requesting SERENA to solve the color conflicts and
dealing with them at the MAC layer, our third
contribution. The combination of SERENA and TDMA/CA is
evaluated through simulations on realistic
topologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Networked Sensors and Actuators.",
}
@Article{Gottron:2010:SSM,
author = "Christian Gottron and Andr{\'e} K{\"o}nig and Ralf
Steinmetz",
title = "A Survey on Security in Mobile Peer-to-Peer
Architectures-Overlay-Based vs. Underlay-Based
Approaches",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "505--532",
day = "13",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040505",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/505",
abstract = "Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P)
networks share central characteristics such as their
distributed and decentralized nature. Combining both
networking paradigms results in a Mobile Peer-to-Peer
(MP2P) system that operates independently from a
preexisting infrastructure. Securing MP2P networks in
terms of availability and robustness as basic demands
in envisioned application scenarios like first
responder operations is a challenging task. In this
article, we present a survey of selected threats and of
state of the art countermeasures for MANETs and P2P
networks. Further, we discuss the efficiency of MANET
and P2P security mechanisms when applied in MP2P
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Calegari:2010:OBI,
author = "Silvia Calegari and Gabriella Pasi",
title = "Ontology-Based Information Behaviour to Improve {Web}
Search",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "533--558",
day = "18",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040533",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/533",
abstract = "Web Search Engines provide a huge number of answers in
response to a user query, many of which are not
relevant, whereas some of the most relevant ones may
not be found. In the literature several approaches have
been proposed in order to help a user to find the
information relevant to his/her real needs on the Web.
To achieve this goal the individual Information
Behavior can been analyzed to 'keep' track of the
user's interests. Keeping information is a type of
Information Behavior, and in several works researchers
have referred to it as the study on what people do
during a search on the Web. Generally, the user's
actions (e.g., how the user moves from one Web page to
another, or her/his download of a document, etc.) are
recorded in Web logs. This paper reports on research
activities which aim to exploit the information
extracted from Web logs (or query logs) in personalized
user ontologies, with the objective to support the user
in the process of discovering Web information relevant
to her/his information needs. Personalized ontologies
are used to improve the quality of Web search by
applying two main techniques: query reformulation and
re-ranking of query evaluation results. In this paper
we analyze various methodologies presented in the
literature aimed at using personalized ontologies,
defined on the basis of the observation of Information
Behaviour to help the user in finding relevant
information.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Barradas:2010:ITA,
author = "Alvaro L. Barradas and Maria do Carmo R. Medeiros",
title = "An Intrinsic {TE} Approach for End-to-End {QoS}
Provisioning in {OBS} Networks Using Static
Load-Balanced Routing Strategies",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "559--586",
day = "22",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040559",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/559",
abstract = "Optical burst switching provides a feasible paradigm
for the next IP over optical backbones. However its
burst loss performance can be highly affected by burst
contention. In this paper we discuss traffic
engineering approaches for path selection with the
objective tominimize contention using only topological
information. The discussed strategies are based on
balancing the traffic across the network in order to
reduce congestion without incurring into link state
protocol penalties. The routing strategies are
evaluated by simulation on an optical burst switching
model specifically developed for the purpose with
OMNeT++. Results show that our strategies outperform
the traditionally used shortest path routing to an
extent that depends on the network connectivity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Kolios:2010:LAS,
author = "Panayiotis Kolios and Vasilis Friderikos and Katerina
Papadaki",
title = "Look-Ahead Strategies Based on Store-Carry and Forward
Relaying for Energy Efficient Cellular Communications",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "587--602",
day = "04",
month = nov,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040587",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/587",
abstract = "With the increasing availability of Internet type
services on mobile devices and the attractive flat rate
all-you-can-eat billing system, cellular
telecommunication networks are experiencing a
tremendous growth in data usage demand. However, there
are increasing concerns that current network deployment
trends (including more efficient radio access
techniques and increased spectrum allocation
strategies), will be unable to support the increased
Internet traffic in a sustainable way. The delay
tolerant nature of mobile Internet traffic allows for a
large degree of flexibility in optimizing network
performance to meet different design objectives and
it's a feature that has mostly gone unexplored by the
research community. In this paper, we introduce a novel
message forwarding mechanism in cellular networks that
benefits from the inherent delay tolerance of Internet
type services to provide flexible and adjustable
forwarding strategies for efficient network operation
while guaranteeing timely deliveries. By capitalizing
on the elasticity of message delivery deadlines and the
actual mobility of nodes inside the cell, considerable
performance gains can be achieved by physically
propagating information messages within the network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Islam:2010:NEI,
author = "Salekul Islam and Jean-Charles Gr{\'e}goire",
title = "Network Edge Intelligence for the Emerging
Next-Generation {Internet}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "603--623",
day = "05",
month = nov,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040603",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/603",
abstract = "The success of the Content Delivery Networks (CDN) in
the recent years has demonstrated the increased
benefits of the deployment of some form of
``intelligence'' within the network. Cloud computing,
on the other hand, has shown the benefits of economies
of scale and the use of a generic infrastructure to
support a variety of services. Following that trend, we
propose to move away from the smart terminal-dumb
network dichotomy to a model where some degree of
intelligence is put back into the network, specifically
at the edge, with the support of Cloud technology. In
this paper, we propose the deployment of an Edge Cloud,
which integrates a variety of user-side and server-side
services. On the user side, surrogate, an application
running on top of the Cloud, supports a virtual client.
The surrogate hides the underlying network
infrastructure from the user, thus allowing for
simpler, more easily managed terminals. Network side
services supporting delivery of and exploiting content
are also deployed on this infrastructure, giving the
Internet Service Providers (ISP) many opportunities to
become directly involved in content and service
delivery.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Graham:2010:BMM,
author = "Jim Graham and Greg Newman and Sunil Kumar and
Catherine Jarnevich and Nick Young and Alycia Crall and
Thomas J. Stohlgren and Paul Evangelista",
title = "Bringing Modeling to the Masses: a {Web} Based System
to Predict Potential Species Distributions",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "624--634",
day = "11",
month = nov,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040624",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/624",
abstract = "Predicting current and potential species distributions
and abundance is critical for managing invasive
species, preserving threatened and endangered species,
and conserving native species and habitats. Accurate
predictive models are needed at local, regional, and
national scales to guide field surveys, improve
monitoring, and set priorities for conservation and
restoration. Modeling capabilities, however, are often
limited by access to software and environmental data
required for predictions. To address these needs, we
built a comprehensive web-based system that: (1)
maintains a large database of field data; (2) provides
access to field data and a wealth of environmental
data; (3) accesses values in rasters representing
environmental characteristics; (4) runs statistical
spatial models; and (5) creates maps that predict the
potential species distribution. The system is available
online at www.niiss.org, and provides web-based tools
for stakeholders to create potential species
distribution models and maps under current and future
climate scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kos:2010:CGS,
author = "Alexander Kos and Hans-J{\"u}rgen Himmler",
title = "{CWM Global Search} --- The {Internet} Search Engine
for Chemists and Biologists",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "635--644",
day = "03",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040635",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/635",
abstract = "CWM Global Search is a meta-search engine allowing
chemists and biologists to search the major chemical
and biological databases on the Internet, by structure,
synonyms, CAS Registry Numbers and free text. A
meta-search engine is a search tool that sends user
requests to several other search engines and/or
databases and aggregates the results into a single list
or displays them according to their source [1]. CWM
Global Search is a web application that has many of the
characteristics of desktop applications (also known as
Rich Internet Application, RIA), and it runs on both
Windows and Macintosh platforms. The application is one
of the first RIA for scientists. The application can be
started using the URL
http://cwmglobalsearch.com/gsweb.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Eichler:2010:SSW,
author = "Frederik Eichler and Wolfgang Reinhardt",
title = "Simplifying the Scientific Writing and Review Process
with {SciFlow}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "645--661",
day = "06",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040645",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/645",
abstract = "Scientific writing is an essential part of a student's
and researcher's everyday life. In this paper we
investigate the particularities of scientific writing
and explore the features and limitations of existing
tools for scientific writing. Deriving from this
analysis and an online survey of the scientific writing
processes of students and researchers at the University
of Paderborn, we identify key principles to simplify
scientific writing and reviewing. Finally, we introduce
a novel approach to support scientific writing with a
tool called SciFlow that builds on these principles and
state of the art technologies like cloud computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guthle:2010:IAD,
author = "Martin G{\"u}thle and Jochen K{\"o}gel and Stefan Wahl
and Matthias Kaschub and Christian M. Mueller",
title = "Improving Anomaly Detection for Text-Based Protocols
by Exploiting Message Structures",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "662--669",
day = "21",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040662",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/662",
abstract = "Service platforms using text-based protocols need to
be protected against attacks. Machine-learning
algorithms with pattern matching can be used to detect
even previously unknown attacks. In this paper, we
present an extension to known Support Vector Machine
(SVM) based anomaly detection algorithms for the
Session Initiation Protocol (SIP). Our contribution is
to extend the amount of different features used for
classification (feature space) by exploiting the
structure of SIP messages, which reduces the false
positive rate. Additionally, we show how combining our
approach with attribute reduction significantly
improves throughput.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Kinkelin:2011:UTS,
author = "Holger Kinkelin and Ralph Holz and Heiko Niedermayer
and Simon Mittelberger and Georg Carle",
title = "On Using {TPM} for Secure Identities in Future Home
Networks",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "1--13",
day = "07",
month = jan,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/1",
abstract = "Security should be integrated into future networks
from the beginning, not as an extension. Secure
identities and authentication schemes are an important
step to fulfill this quest. In this article, we argue
that home networks are a natural trust anchor for such
schemes. We describe our concept of home networks as a
universal point of reference for authentication, trust
and access control, and show that our scheme can be
applied to any next generation network. As home
networks are no safe place, we apply Trusted Computing
technology to prevent the abuse of identities, i.e.,
identity theft.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Hanka:2011:DPK,
author = "Oliver Hanka and Michael Eichhorn and Martin
Pfannenstein and J{\"o}rg Ebersp{\"a}cher and Eckehard
Steinbach",
title = "A Distributed Public Key Infrastructure Based on
Threshold Cryptography for the {HiiMap} Next Generation
{Internet} Architecture",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "14--30",
day = "01",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/14",
abstract = "In this article, a security extension for the HiiMap
Next Generation Internet Architecture is presented. We
regard a public key infrastructure which is integrated
into the mapping infrastructure of the
locator/identifier-split addressing scheme. The
security approach is based on Threshold Cryptography
which enables a sharing of keys among the mapping
servers. Hence, a more trustworthy and fair approach
for a Next Generation Internet Architecture as compared
to the state of the art approach is fostered.
Additionally, we give an evaluation based on IETF AAA
recommendations for security-related systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Rifa-Pous:2011:CEC,
author = "Helena Rif{\`a}-Pous and Jordi
Herrera-Joancomart{\'\i}",
title = "Computational and Energy Costs of Cryptographic
Algorithms on Handheld Devices",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "31--48",
day = "14",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/31",
abstract = "Networks are evolving toward a ubiquitous model in
which heterogeneous devices are interconnected.
Cryptographic algorithms are required for developing
security solutions that protect network activity.
However, the computational and energy limitations of
network devices jeopardize the actual implementation of
such mechanisms. In this paper, we perform a wide
analysis on the expenses of launching symmetric and
asymmetric cryptographic algorithms, hash chain
functions, elliptic curves cryptography and pairing
based cryptography on personal agendas, and compare
them with the costs of basic operating system
functions. Results show that although cryptographic
power costs are high and such operations shall be
restricted in time, they are not the main limiting
factor of the autonomy of a device.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things.",
}
@Article{Petrie:2011:ECI,
author = "Charles Petrie",
title = "Enterprise Coordination on the {Internet}",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "49--66",
day = "17",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/49",
abstract = "Enterprises are now connected internally and
externally to other Enterprises via the Internet in
ways that are increasingly difficult to manage,
especially as these interconnections become more
dynamic. Current methods of coordinating the effects of
change as they propagate through these networks of
connections are not likely to scale. What is needed is
a new paradigm for how the Internet supports such
coordination. Indeed, the Internet should and could
provide fundamental coordination functions that are
missing today. In this paper, we describe how such a
``Coordinated Internet'' would work (this paper is an
expanded version of [1]). The key functionality of a
Coordinated Internet would be that the Internet
actively watches what people do (analogous to search
completion on desktops today), correlates these
activities, and actively notifies people when and how
their current tasks affect and are affected by the
activities of other people. This would be accomplished
by standard coordination functions implemented as a
common Internet layer that can be used as a utility by
more specialized applications. Such a Coordinated
Internet would revolutionize enterprise management, for
all enterprises, large and small, corporate and
personal. For example, static workflows would become
obsolete for all but the the most routine processes.
Some solutions provide existence proofs of such a
coordination substrate, such as the Redux solution in
concurrent engineering, which we describe herein.
However, foundational research remains to be done in
the new field of Coordination Engineering in order to
reach the goal of a future Internet in which
coordination functions are fundamental.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Mikoczy:2011:ECN,
author = "Eugen Mik{\'o}czy and Ivan Kotuliak and Oskar van
Deventer",
title = "Evolution of the Converged {NGN} Service Platforms
Towards Future Networks",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "67--86",
day = "04",
month = mar,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/67",
abstract = "This article presents a comparison of main
characteristics of the Next Generation Networks (NGN)
and Future Generation Internet (FGI). The aim is to
discuss and compare two approaches to Future Networks
(FN) and services: the evolution of NGN, and the
revolutionary approach of a new FGI. We present both
frameworks from the services point of view as they are
delivered to the end-user, as well as from the
architectural point of view. We compare selected
properties of both approaches to explain commonalities
and differences. Their challenges are similar: managing
the quality of experience, mobility, security,
scalability and providing openness to applications.
Based on this comparison, we evaluate possible areas
for future convergence in the approach of the two
architectures to the Future Network concept. Our
analysis shows that despite their different
backgrounds, the internet's FGI and telco's NGN are not
that different after all. The convergence of the two
approaches therefore seems the only logical way
forward.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Tonnies:2011:SOA,
author = "Sascha T{\"o}nnies and Benjamin K{\"o}hncke and
Patrick Hennig and Ingo Brunkhorst and Wolf-Tilo
Balke",
title = "A Service Oriented Architecture for Personalized
Universal Media Access",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "87--116",
day = "01",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/87",
abstract = "Multimedia streaming means delivering continuous data
to a plethora of client devices. Besides the actual
data transport, this also needs a high degree of
content adaptation respecting the end users' needs
given by content preferences, transcoding constraints,
and device capabilities. Such adaptations can be
performed in many ways, usually on the media server.
However, when it comes to content editing, like mixing
in subtitles or picture-in-picture composition, relying
on third party service providers may be necessary. For
economic reasons this should be done in a
service-oriented way, because a lot of adaptation
modules can be reused within different adaptation
workflows. Although service-oriented architectures have
become widely accepted in the Web community, the
multimedia environment is still dominated by monolithic
systems. The main reason is the insufficient support
for working with continuous data: generally the
suitability of Web services for handling complex data
types and state-full applications is still limited. In
this paper we discuss extensions of Web service
frameworks, and present a first implementation of a
service-oriented framework for media streaming and
digital item adaptation. The focus lies on the
technical realization of the services. Our experimental
results show the practicality of the actual deployment
of service-oriented multimedia frameworks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Network Architectures.",
}
@Article{Chay:2011:UOT,
author = "Sengtha Chay and Nophea Sasaki",
title = "Using Online Tools to Assess Public Responses to
Climate Change Mitigation Policies in {Japan}",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "117--129",
day = "01",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/117",
abstract = "As a member of the Annex 1 countries to the Kyoto
Protocol of the United Nations Framework Convention on
Climate Change, Japan is committed to reducing 6\% of
the greenhouse gas emissions. In order to achieve this
commitment, Japan has undertaken several major
mitigation measures, one of which is the domestic
measure that includes ecologically friendly lifestyle
programs, utilizing natural energy, participating in
local environmental activities, and amending
environmental laws. Mitigation policies could be
achieved if public responses were strong. As the
internet has increasingly become an online platform for
sharing environmental information, public responses to
the need for reducing greenhouse gas emissions may be
assessed using available online tools. We used Google
Insights for Search, Google AdWords Keyword Tool, and
Google Timeline View to assess public responses in
Japan based on the interest shown for five search terms
that define global climate change and its mitigation
policies. Data on online search interests from January
04, 2004 to July 18, 2010 were analyzed according to
locations and categories. Our study suggests that the
search interests for the five chosen search terms
dramatically increased, especially when new mitigation
policies were introduced or when climate change related
events were organized. Such a rapid increase indicates
that the Japanese public strongly responds to climate
change mitigation policies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Glassey:2011:MIM,
author = "Olivier Glassey",
title = "Metadata For Identity Management of Population
Registers",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "130--143",
day = "18",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/130",
abstract = "A population register is an inventory of residents
within a country, with their characteristics (date of
birth, sex, marital status, etc.) and other
socio-economic data, such as occupation or education.
However, data on population are also stored in numerous
other public registers such as tax, land, building and
housing, military, foreigners, vehicles, etc.
Altogether they contain vast amounts of personal and
sensitive information. Access to public information is
granted by law in many countries, but this transparency
is generally subject to tensions with data protection
laws. This paper proposes a framework to analyze data
access (or protection) requirements, as well as a model
of metadata for data exchange.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Brown:2011:MPB,
author = "Katie Brown and Scott W. Campbell and Rich Ling",
title = "Mobile Phones Bridging the Digital Divide for Teens in
the {US}?",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "144--158",
day = "13",
month = may,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/144",
abstract = "In 2009, just 27\% of American teens with mobile
phones reported using their devices to access the
internet. However, teens from lower income families and
minority teens were significantly more likely to use
their phones to go online. Together, these surprising
trends suggest a potential narrowing of the digital
divide, offering internet access to those without other
means of going online. This is an important move, as,
in today's society, internet access is central to
active citizenship in general and teen citizenship in
particular. Yet the cost of this move toward equal
access is absorbed by those who can least afford it:
Teenagers from low income households. Using survey and
focus group data from a national study of ``Teens and
Mobile Phone Use'' (released by Pew and the University
of Michigan in 2010), this article helps identify and
explain this and other emergent trends for teen use (as
well as non-use) of the internet through mobile
phones.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Mugridge:2011:EWB,
author = "Rick Mugridge and Mark Utting and David Streader",
title = "Evolving {Web}-Based Test Automation into Agile
Business Specifications",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "159--174",
day = "03",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/159",
abstract = "Usually, test automation scripts for a web application
directly mirror the actions that the tester carries out
in the browser, but they tend to be verbose and
repetitive, making them expensive to maintain and
ineffective in an agile setting. Our research has
focussed on providing tool-support for business-level,
example-based specifications that are mapped to the
browser level for automatic verification. We provide
refactoring support for the evolution of existing
browser-level tests into business-level specifications.
As resulting business rule tables may be incomplete,
redundant or contradictory, our tool provides feedback
on coverage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Agile Practices.",
}
@Article{Sempere:2011:ADV,
author = "Andrew Sempere",
title = "Architecture and Design for Virtual Conferences: a
Case Study",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "3",
pages = "175--184",
day = "06",
month = jul,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3030175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/3/175",
abstract = "This paper presents a case study of the design issues
facing a large multi-format virtual conference. The
conference took place twice in two different years,
each time using an avatar-based 3D world with
spatialized audio including keynote, poster and social
sessions. Between year 1 and 2, major adjustments were
made to the architecture and design of the space,
leading to improvement in the nature of interaction
between the participants. While virtual meetings will
likely never supplant the effectiveness of face-to-face
meetings, this paper seeks to outline a few design
principles learned from this experience, which can be
applied generally to make computer mediated
collaboration more effective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Virtual Worlds.",
}
@Article{Graham:2011:IDP,
author = "Roderick Graham and Danielle Taana Smith",
title = "{Internet} as Digital Practice: Examining Differences
in {African American} {Internet} Usage",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "3",
pages = "185--203",
day = "20",
month = jul,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3030185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/3/185",
abstract = "This study assesses differences within the African
American population with respect to internet activity.
Using survey data, we find wide variations within the
population. While some segments of African Americans
are indeed less likely to perform certain activities on
the internet, we note that certain segments of the
African American population are reporting more internet
activity than other racial groups. These `haves' score
high not just in comparison to their African American
peers, but to the US American population as a whole. We
suggest a move away from the digital divide/digital
inequality models and a move towards thinking of
greater or lesser Information and Communication
Technology (ICT) usage as conditioned by the
instrumental needs of population groups. We term this a
digital practice model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Schroth:2011:TTV,
author = "Olaf Schroth and Ellen Pond and Cam Campbell and Petr
Cizek and Stephen Bohus and Stephen R. J. Sheppard",
title = "Tool or Toy? {Virtual} Globes in Landscape Planning",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "204--227",
day = "20",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/204",
abstract = "Virtual globes, i.e., geobrowsers that integrate
multi-scale and temporal data from various sources and
are based on a globe metaphor, have developed into
serious tools that practitioners and various
stakeholders in landscape and community planning have
started using. Although these tools originate from
Geographic Information Systems (GIS), they have become
a different, potentially interactive and public tool
set, with their own specific limitations and new
opportunities. Expectations regarding their utility as
planning and community engagement tools are high, but
are tempered by both technical limitations and ethical
issues [1,2]. Two grassroots campaigns and a
collaborative visioning process, the Kimberley Climate
Adaptation Project case study (British Columbia),
illustrate and broaden our understanding of the
potential benefits and limitations associated with the
use of virtual globes in participatory planning
initiatives. Based on observations, questionnaires and
in-depth interviews with stakeholders and community
members using an interactive 3D model of regional
climate change vulnerabilities, potential impacts, and
possible adaptation and mitigation scenarios in
Kimberley, the benefits and limitations of virtual
globes as a tool for participatory landscape planning
are discussed. The findings suggest that virtual globes
can facilitate access to geospatial information, raise
awareness, and provide a more representative virtual
landscape than static visualizations. However,
landscape is not equally representative at all scales,
and not all types of users seem to benefit equally from
the tool. The risks of misinterpretation can be managed
by integrating the application and interpretation of
virtual globes into face-to-face planning processes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Paar:2011:LCM,
author = "Philip Paar and J{\"o}rg Rekittke",
title = "Low-Cost Mapping and Publishing Methods for Landscape
Architectural Analysis and Design in Slum-Upgrading
Projects",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "228--247",
day = "20",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/228",
abstract = "The research project ``Grassroots GIS'' focuses on the
development of low-cost mapping and publishing methods
for slums and slum-upgrading projects in Manila. In
this project smartphones, collaborative mapping and 3D
visualization applications are systematically employed
to support landscape architectural analysis and design
work in the context of urban poverty and urban informal
settlements. In this paper we focus on the description
of the developed methods and present preliminary
results of this work-in-progress.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Imhof:2011:NRK,
author = "Mark Imhof and Matthew Cox and Angela Fadersen and
Wayne Harvey and Sonia Thompson and David Rees and
Christopher Pettit",
title = "Natural Resource Knowledge and Information Management
via the {Victorian} Resources Online {Website}",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "248--280",
day = "09",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040248",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/248",
abstract = "Since 1997, the Victorian Resources Online (VRO)
website (http://www.dpi.vic.gov.au/vro) has been a key
means for the dissemination of landscape-based natural
resources information via the internet in Victoria,
Australia. The website currently consists of
approximately 11,000 web pages, including 1900 maps and
1000 downloadable documents. Information is provided at
a range of scales-from statewide and regional overviews
to more detailed catchment and sub-catchment levels. At
all these levels of generalisation, information is
arranged in an organisationally agnostic way around key
knowledge ``domains'' (e.g., soil, landform, water).
VRO represents a useful model for the effective
dissemination of a wide range of natural resources
information; relying on partnerships with key subject
matter experts and data custodians, including a
``knowledge network'' of retired land resource
assessment specialists. In this paper, case studies are
presented that illustrate various approaches to
information and knowledge management with a focus on
presentation of spatially contexted soil and landscape
information at different levels of generalisation.
Examples are provided of adapting site-based
information into clickable maps that reveal
site-specific details, as well as ``spatialising'' data
from specialist internal databases to improve
accessibility to a wider audience. Legacy information
sources have also been consolidated and spatially
referenced. More recent incorporation of interactive
visualisation products (such as landscape panoramas,
videos and animations) is providing interactive rich
media content. Currently the site attracts an average
of 1190 user visits per day and user evaluation has
indicated a wide range of users, including students,
teachers, consultants, researchers and extension staff.
The wide range of uses for information and, in
particular, the benefits for natural resource
education, research and extension has also been
identified.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Parsons:2011:TDD,
author = "David Parsons and Ramesh Lal and Manfred Lange",
title = "Test Driven Development: Advancing Knowledge by
Conjecture and Confirmation",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "281--297",
day = "14",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040281",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/281",
abstract = "Test Driven Development (TDD) is a critical agile
software development practice that supports innovation
in short development cycles. However, TDD is one of the
most challenging agile practices to adopt because it
requires changes to work practices and skill sets. It
is therefore important to gain an understanding of TDD
through the experiences of those who have successfully
adopted this practice. We collaborated with an agile
team to provide this experience report on their
adoption of TDD, using observations and interviews
within the product development environment. This
article highlights a number of practices that underlie
successful development with TDD. To provide a
theoretical perspective that can help to explain how
TDD supports a positive philosophy of software
development, we have revised Northover et al.'s
conceptual framework, which is based on a four stage
model of agile development, to reinterpret Popper's
theory of conjecture and falsification in the context
of agile testing strategies. As a result of our
findings, we propose an analytical model for TDD in
agile software development which provides a theoretical
basis for further investigations into the role of TDD
and related practices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Agile Practices.",
}
@Article{Li:2011:SOA,
author = "Haifeng Li and Bo Wu",
title = "A Service-Oriented Architecture for Proactive
Geospatial Information Services",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "298--318",
day = "19",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040298",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/298",
abstract = "The advances in sensor network, linked data, and
service-oriented computing has indicated a trend of
information technology, i.e., toward an open, flexible,
and distributed architecture. However, the existing
information technologies show a lack of effective
sharing, aggregation, and cooperation services to
handle the sensors, data, and processing resources to
fulfill user's complicated tasks in near real-time.
This paper presents a service-orientated architecture
for proactive geospatial information services (PGIS),
which integrates the sensors, data, processing, and
human services. PGIS is designed to organize,
aggregate, and co-operate services by composing small
scale services into service chains to meet the
complicated user requirements. It is a platform to
provide real-time or near real-time data collection,
storage, and processing capabilities. It is a flexible,
reusable, and scalable system to share and interoperate
geospatial data, information, and services. The
developed PGIS framework has been implemented and
preliminary experiments have been performed to verify
its performance. The results show that the basic
functions such as task analysis, managing sensors for
data acquisition, service composition, service chain
construction and execution are validated, and the
important properties of PGIS, including
interoperability, flexibility, and reusability, are
achieved.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Sharma:2011:OLO,
author = "Subhash Sharma and Christopher Pettit and Ian Bishop
and Pang Chan and Falak Sheth",
title = "An Online Landscape Object Library to Support
Interactive Landscape Planning",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "319--343",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040319",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/319",
abstract = "Using landscape objects with geo-visualisation tools
to create 3D virtual environments is becoming one of
the most prominent communication techniques to
understand landscape form, function and processes.
Geo-visualisation tools can also provide useful
participatory planning support systems to explore
current and future environmental issues such as
biodiversity loss, crop failure, competing pressures on
water availability and land degradation. These issues
can be addressed by understanding them in the context
of their locality. In this paper we discuss some of the
technologies which facilitate our work on the issues of
sustainability and productivity, and ultimately support
for planning and decision-making. We demonstrate an
online Landscape Object Library application with a
suite of geo-visualisation tools to support landscape
planning. This suite includes: a GIS based Landscape
Constructor tool, a modified version of a 3D game
engine SIEVE (Spatial Information Exploration and
Visualisation Environment) and an interactive touch
table display. By integrating the Landscape Object
Library with this suite of geo-visualisation tools, we
believe we developed a tool that can support a
diversity of landscape planning activities. This is
illustrated by trial case studies in biolink design,
whole farm planning and renewable energy planning. We
conclude the paper with an evaluation of our Landscape
Object Library and the suite of geographical tools, and
outline some further research directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Formosa:2011:SIS,
author = "Saviour Formosa and Vincent Magri and Julia Neuschmid
and Manfred Schrenk",
title = "Sharing Integrated Spatial and Thematic Data: The
{CRISOLA} Case for {Malta} and the {European Project
Plan4all} Process",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "344--361",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040344",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/344",
abstract = "Sharing data across diverse thematic disciplines is
only the next step in a series of hard-fought efforts
to ensure barrier-free data availability. The Plan4all
project is one such effort, focusing on the
interoperability and harmonisation of spatial planning
data as based on the INSPIRE protocols. The aims are to
support holistic planning and the development of a
European network of public and private actors as well
as Spatial Data Infrastructure (SDI). The Plan4all and
INSPIRE standards enable planners to publish and share
spatial planning data. The Malta case tackled the wider
scenario for sharing of data, through the investigation
of the availability, transformation and dissemination
of data using geoportals. The study is brought to the
fore with an analysis of the approaches taken to ensure
that data in the physical and social domains are
harmonised in an internationally-established process.
Through an analysis of the criminological theme, the
Plan4all process is integrated with the social and land
use themes as identified in the CRISOLA model. The
process serves as a basis for the need to view sharing
as one part of the datacycle rather than an end in
itself: without a solid protocol the foundations have
been laid for the implementation of the datasets in the
social and crime domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Lai:2011:OSE,
author = "Sabrina Lai and Corrado Zoppi",
title = "An Ontology of the Strategic Environmental Assessment
of City Masterplans",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "362--378",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/362",
abstract = "Following a discussion on the semantics of the term
``ontology'', this paper discusses some key points
concerning the ontology of the Strategic Environmental
Assessment procedure applied to city Masterplans, using
sustainability as a reference point. It also assumes
the implementation of Guidelines of the Autonomous
Region of Sardinia as an experimental context, with the
objective of proposing the SEA ontology as an important
contribution to improve SEA's effectiveness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Coltekin:2011:HQG,
author = "Arzu Coltekin and Tumasch Reichenbacher",
title = "High Quality Geographic Services and Bandwidth
Limitations",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "379--396",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040379",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/379",
abstract = "In this paper we provide a critical overview of the
state of the art in human-centric intelligent data
management approaches for geographic visualizations
when we are faced with bandwidth limitations. These
limitations often force us to rethink how we design
displays for geographic visualizations. We need ways to
reduce the amount of data to be visualized and
transmitted. This is partly because modern instruments
effortlessly produce large volumes of data and Web 2.0
further allows bottom-up creation of rich and diverse
content. Therefore, the amount of information we have
today for creating useful and usable cartographic
products is higher than ever before. However, how much
of it can we really use online? To answer this
question, we first calculate the bandwidth needs for
geographic data sets in terms of waiting times. The
calculations are based on various data volumes
estimated by scholars for different scenarios.
Documenting the waiting times clearly demonstrates the
magnitude of the problem. Following this, we summarize
the current hardware and software solutions, then the
current human-centric design approaches trying to
address the constraints such as various screen sizes
and information overload. We also discuss a limited set
of social issues touching upon the digital divide and
its implications. We hope that our systematic
documentation and critical review will help researchers
and practitioners in the field to better understand the
current state of the art.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Neis:2012:SNE,
author = "Pascal Neis and Dennis Zielstra and Alexander Zipf",
title = "The Street Network Evolution of Crowdsourced Maps:
{OpenStreetMap} in {Germany} 2007--2011",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "1--21",
day = "29",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/1",
abstract = "The OpenStreetMap (OSM) project is a prime example in
the field of Volunteered Geographic Information (VGI).
Worldwide, several hundred thousand people are
currently contributing information to the ``free''
geodatabase. However, the data contributions show a
geographically heterogeneous pattern around the globe.
Germany counts as one of the most active countries in
OSM; thus, the German street network has undergone an
extensive development in recent years. The question
that remains is this: How does the street network
perform in a relative comparison with a commercial
dataset? By means of a variety of studies, we show that
the difference between the OSM street network for car
navigation in Germany and a comparable proprietary
dataset was only 9\% in June 2011. The results of our
analysis regarding the entire street network showed
that OSM even exceeds the information provided by the
proprietary dataset by 27\%. Further analyses show on
what scale errors can be reckoned with in the topology
of the street network, and the completeness of turn
restrictions and street name information. In addition
to the analyses conducted over the past few years,
projections have additionally been made about the point
in time by which the OSM dataset for Germany can be
considered ``complete'' in relative comparison to a
commercial dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Stenliden:2012:HCW,
author = "Linnea Stenliden and Mikael Jern",
title = "How Can We Study Learning with Geovisual Analytics
Applied to Statistics?",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "22--41",
day = "30",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/22",
abstract = "It is vital to understand what kind of processes for
learning that Geovisual Analytics creates, as certain
activities and conditions are produced when employing
Geovisual Anlytic tools in education. To understand
learning processes created by Geovisual Analytics,
first requires an understanding of the interactions
between the technology, the workplace where the
learning takes place, and learners' specific knowledge
formation. When studying these types of interaction it
demands a most critical consideration from theoretical
perspectives on research design and methods. This paper
first discusses common, and then a more uncommon,
theoretical approach used within the fields of learning
with multimedia environments and Geovisual Analytics,
the socio-cultural theoretical perspective. The paper
next advocates this constructivist theoretical and
empirical perspective when studying learning with
multiple representational Geovisual Analytic tools. To
illustrate, an outline of a study made within this
theoretical tradition is offered. The study is
conducted in an educational setting where the Open
Statistics eXplorer platform is used. Discussion of our
study results shows that the socio-cultural perspective
has much to offer in terms of what kind of
understanding can be reached in conducting this kind of
studies. Therefore, we argue that empirical research to
analyze how specific communities use various Geovisual
Analytics to evaluate information is best positioned in
a socio-cultural theoretical perspective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Geovisual Analytics.",
}
@Article{Lowell:2012:EAS,
author = "Kim Lowell and Lindsay Smith and Ian Miller and
Christopher Pettit and Eloise Seymour",
title = "{Extension Activity Support System (EASY)}: a
{Web}-Based Prototype for Facilitating Farm
Management",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "42--64",
day = "04",
month = jan,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/42",
abstract = "In response to disparate advances in delivering
spatial information to support agricultural extension
activities, the Extension Activity Support System
(EASY) project was established to develop a vision
statement and conceptual design for such a system based
on a national needs assessment. Personnel from across
Australia were consulted and a review of existing farm
information/management software undertaken to ensure
that any system that is eventually produced from the
EASY vision will build on the strengths of existing
efforts. This paper reports on the collaborative
consultative process undertaken to create the EASY
vision as well as the conceptual technical design and
business models that could support a fully functional
spatially enabled online system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Montenegro:2012:LUP,
author = "Nuno Montenegro and Jorge C. Gomes and Paulo Urbano
and Jos{\'e} P. Duarte",
title = "A Land Use Planning Ontology: {LBCS}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "65--82",
day = "06",
month = jan,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/65",
abstract = "Urban planning has a considerable impact on the
economic performance of cities and on the quality of
life of their populations. Efficiency at this level has
been hampered by the lack of integrated tools to
adequately describe urban space in order to formulate
appropriate design solutions. This paper describes an
ontology called LBCS-OWL2 specifically developed to
overcome this flaw, based on the Land Based
Classification Standards (LBCS), a comprehensive and
detailed land use standard to describe the different
dimensions of urban space. The goal is to provide
semantic and computer-readable land use descriptions of
geo-referenced spatial data. This will help to make
programming strategies available to those involved in
the urban development process. There are several
advantages to transferring a land use standard to an
OWL2 land use ontology: it is modular, it can be shared
and reused, it can be extended and data consistency
maintained, and it is ready for integration, thereby
supporting the interoperability of different urban
planning applications. This standard is used as a basic
structure for the ``City Information Modelling'' (CIM)
model developed within a larger research project called
City Induction, which aims to develop a tool for urban
planning and design.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Jurgenson:2012:WAM,
author = "Nathan Jurgenson",
title = "When Atoms Meet Bits: Social Media, the Mobile {Web}
and Augmented Revolution",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "83--91",
day = "23",
month = jan,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/83",
abstract = "The rise of mobile phones and social media may come to
be historically coupled with a growing atmosphere of
dissent that is enveloping much of the globe. The Arab
Spring, UK Riots, Occupy and many other protests and
so-called ``flash-mobs'' are all massive gatherings of
digitally-connected individuals in physical space; and
they have recently become the new normal. The primary
role of technology in producing this atmosphere has, in
part, been to effectively link the on and the offline.
The trend to view these as separate spaces, what I call
``digital dualism'', is faulty. Instead, I argue that
the digital and physical enmesh to form an ``augmented
reality''. Linking the power of the digital-creating
and disseminating networked information-with the power
of the physical-occupying geographic space with
flesh-and-blood bodies-is an important part of why we
have this current flammable atmosphere of augmented
revolution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Anisetti:2012:WSA,
author = "Marco Anisetti and Claudio A. Ardagna and Ernesto
Damiani and Fulvio Frati and Hausi A. M{\"u}ller and
Atousa Pahlevan",
title = "{Web} Service Assurance: The Notion and the Issues",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "92--109",
day = "14",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/92",
abstract = "Web service technology provides basic infrastructure
for deploying collaborative business processes. Web
Service security standards and protocols aim to provide
secure communication and conversation between service
providers and consumers. Still, for a client calling a
Web service it is difficult to ascertain that a
particular service instance satisfies-at execution
time-specific non-functional properties. In this paper
we introduce the notion of certified Web service
assurance, characterizing how service consumers can
specify the set of security properties that a service
should satisfy. Also, we illustrate a mechanism to
re-check non-functional properties when the execution
context changes. To this end, we introduce the concept
of context-aware certificate, and describe a dynamic,
context-aware service discovery environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Fehling:2012:PBD,
author = "Christoph Fehling and Frank Leymann and Jochen
R{\"u}tschlin and David Schumm",
title = "Pattern-Based Development and Management of Cloud
Applications",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "110--141",
day = "15",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/110",
abstract = "Cloud-based applications require a high degree of
automation regarding their IT resource management, for
example, to handle scalability or resource failures.
This automation is enabled by cloud providers offering
management interfaces accessed by applications without
human interaction. The properties of clouds, especially
pay-per-use billing and low availability of individual
resources, demand such a timely system management. We
call the automated steps to perform one of these
management tasks a ``management flow''. Because the
emerging behavior of the overall system is comprised of
many such management flows and is often hard to
predict, we propose defining abstract management flows,
describing common steps handling the management tasks.
These abstract management flows may then be refined for
each individual use case. We cover abstract management
flows describing how to make an application elastic,
resilient regarding IT resource failure, and how to
move application components between different runtime
environments. The requirements of these management
flows for handled applications are expressed using
architectural patterns that have to be implemented by
the applications. These dependencies result in abstract
management flows being interrelated with architectural
patterns in a uniform pattern catalog. We propose a
method by use of a catalog to guide application
managers during the refinement of abstract management
flows at the design stage of an application. Following
this method, runtime-specific management functionality
and management interfaces are used to obtain automated
management flows for a developed application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Bunting:2012:PAE,
author = "Ben S. {Bunting, Jr.} and Jacob Hughes and Tim
Hetland",
title = "The Player as Author: Exploring the Effects of Mobile
Gaming and the Location-Aware Interface on
Storytelling",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "142--160",
day = "17",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/142",
abstract = "The mobile internet expands the immersive potential of
storytelling by introducing electronic games powered by
portable, location-aware interfaces. Mobile gaming has
become the latest iteration in a decades-long evolution
of electronic games that seek to empower the player not
just as an avatar in a gameworld but also as a
co-author of that gameworld, alongside the game's
original designers. Location-aware interfaces allow
players to implicate places in the physical world as
part of their gameworld (and vice versa) for the first
time. In addition to empowering the player as a
co-author in the process of constructing a compelling
gameworld, then, mobile games eschew linear narrative
structures in favor of a cooperative storytelling
process that is reliant in part on the player's
experience of place. While such an author-player
``worldmaking'' approach to storytelling is not new,
mobile games evolve the process beyond what has yet
been possible within the technical and physical
constraints of the traditional video gaming format.
Location-aware interfaces allow mobile games to extend
the worldmaking process beyond the screen and into the
physical world, co-opting the player's sensory
experiences of real-world places as potential
storytelling tools. In our essay, we theorize the
unique storytelling potential of mobile games while
describing our experience attempting to harness that
potential through the design and implementation of our
hybrid-reality game University of Death.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Oie:2012:SNU,
author = "Kjetil Vaage {\O}ie",
title = "Sensing the News: User Experiences when Reading
Locative News",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "161--178",
day = "21",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/161",
abstract = "This article focuses on user experiences on reading
location-aware news on the mobile platform and aims to
explore what experiences this kind of locative
journalism generates and how such experiences change
the users' social interaction with news. We produced a
specially designed mobile application and tailored news
stories specific to this project called LocaNews in
order to explore participants' relation to the content
in this journalistic format. The result is generated
through a field study and a questionnaire of 32 people
to find out how they experience the news presented in
this format. The user participants' responses are
analyzed based on their news experiences,
contextualizing places and their social interaction
with the news within this form of journalism. Results
showed that the local, semi-local and non-local user
approaches the locative news in a different manner, but
that the average user found this kind of news more
interesting and more informative than ordinary news.
The participants also have a problem identifying this
as journalism, rather than an information service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Sorschag:2012:FOI,
author = "Robert Sorschag",
title = "A Flexible Object-of-Interest Annotation Framework for
Online Video Portals",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "179--215",
day = "22",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/179",
abstract = "In this work, we address the use of object recognition
techniques to annotate what is shown where in online
video collections. These annotations are suitable to
retrieve specific video scenes for object related text
queries which is not possible with the manually
generated metadata that is used by current portals. We
are not the first to present object annotations that
are generated with content-based analysis methods.
However, the proposed framework possesses some
outstanding features that offer good prospects for its
application in real video portals. Firstly, it can be
easily used as background module in any video
environment. Secondly, it is not based on a fixed
analysis chain but on an extensive recognition
infrastructure that can be used with all kinds of
visual features, matching and machine learning
techniques. New recognition approaches can be
integrated into this infrastructure with low
development costs and a configuration of the used
recognition approaches can be performed even on a
running system. Thus, this framework might also benefit
from future advances in computer vision. Thirdly, we
present an automatic selection approach to support the
use of different recognition strategies for different
objects. Last but not least, visual analysis can be
performed efficiently on distributed, multi-processor
environments and a database schema is presented to
store the resulting video annotations as well as the
off-line generated low-level features in a compact
form. We achieve promising results in an annotation
case study and the instance search task of the TRECVID
2011 challenge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Visual Information Retrieval.",
}
@Article{Exter:2012:UWT,
author = "Kristin Den Exter and Stephen Rowe and William Boyd
and David Lloyd",
title = "Using {Web 2.0} Technologies for Collaborative
Learning in Distance Education-Case Studies from an
{Australian} {University}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "216--237",
day = "07",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/216",
abstract = "This paper explores the use of Web 2.0 technologies
for collaborative learning in a higher education
context. A review of the literature exploring the
strengths and weaknesses of Web 2.0 technology is
presented, and a conceptual model of a Web 2.0
community of inquiry is introduced. Two Australian case
studies are described, with an ex-poste evaluation of
the use of Web 2.0 tools. Conclusions are drawn as to
the potential for the use of Web 2.0 tools for
collaborative e-learning in higher education. In
particular, design and integration of Web 2.0 tools
should be closely related to curriculum intent and
pedagogical requirements, care must be taken to provide
clear guidance on both expected student activity and
learning expectations, and there is a clear need to
develop, support and encourage strong interaction both
between teachers and students, and amongst the students
themselves.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Martin:2012:RW,
author = "Ludger Martin and Thomas Gottron",
title = "Readability and the {Web}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "238--252",
day = "12",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/238",
abstract = "Readability indices measure how easy or difficult it
is to read and comprehend a text. In this paper we look
at the relation between readability indices and web
documents from two different perspectives. On the one
hand we analyse how to reliably measure the readability
of web documents by applying content extraction
techniques and incorporating a bias correction. On the
other hand we investigate how web based corpus
statistics can be used to measure readability in a
novel and language independent way.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Garside:2012:SMS,
author = "Debbie Garside and Arjun Ponnusamy and Steve Chan and
Richard Picking",
title = "Secure Military Social Networking and Rapid
Sensemaking in Domain Specific Concept Systems:
Research Issues and Future Solutions",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "253--264",
day = "12",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010253",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/253",
abstract = "This paper identifies the need for a secure military
social networking site and the underlying research
issues linked to the successful development of such
sites. The paper further proposes a solution to the
most basic issues by identifying and tackling known
potential security threats to military personnel and
their families. The paper further defines the base
platform for this development to facilitate rapid
sensemaking to inform critical communications and rapid
decision making processes during abrupt governance and
eco-system change, and how the plethora of information
(termed as Big Data) on social networking sites can be
analysed and harnessed. Underlying architectural
issues, efficiency and complexity are explored and
their future development is considered.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Roche:2012:WBC,
author = "St{\'e}phane Roche and Boris Mericskay and Wided
Batita and Matthieu Bach and Mathieu Rondeau",
title = "{WikiGIS} Basic Concepts: {Web 2.0} for Geospatial
Collaboration",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "265--284",
day = "13",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010265",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/265",
abstract = "With the emergence of Web 2.0, new applications arise
and evolve into more interactive forms of collective
intelligence. These applications offer to both
professionals and citizens an open and expanded access
to geographic information. In this paper, we develop
the conceptual foundations of a new technology solution
called WikiGIS. WikiGIS's strength lies in its ability
to ensure the traceability of changes in
spatial-temporal geographic components (geometric
location and shape, graphics: iconography and
descriptive) generated by users. The final use case
highlights to what extent WikiGIS could be a relevant
and useful technological innovation in
Geocollaboration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Mooney:2012:CHE,
author = "Peter Mooney and Padraig Corcoran",
title = "Characteristics of Heavily Edited Objects in
{OpenStreetMap}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "285--305",
day = "20",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010285",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/285",
abstract = "This paper describes the results of an analysis of the
OpenStreetMap (OSM) database for the United Kingdom
(UK) and Ireland (correct to April 2011). 15, 640 OSM
ways (polygons and polylines), resulting in 316, 949
unique versions of these objects, were extracted and
analysed from the OSM database for the UK and Ireland.
In our analysis we only considered ``heavily edited''
objects in OSM: objects which have been edited 15 or
more times. Our results show that there is no strong
relationship between increasing numbers of contributors
to a given object and the number of tags (metadata)
assigned to it. 87\% of contributions/edits to these
objects are performed by 11\% of the total 4128
contributors. In 79\% of edits additional spatial data
(nodes) are added to objects. The results in this paper
do not attempt to evaluate the OSM data as good/poor
quality but rather informs potential consumers of OSM
data that the data itself is changing over time. In
developing a better understanding of the
characteristics of ``heavily edited'' objects there may
be opportunities to use historical analysis in working
towards quality indicators for OSM in the future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goggin:2012:DIM,
author = "Gerard Goggin",
title = "Driving the {Internet}: Mobile {Internets}, Cars, and
the Social",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "306--321",
day = "20",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010306",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/306",
abstract = "This paper looks at the tandem technologies of cars
and the Internet, and the new ways that they are
assembling the social with the mobile Internet. My
argument is two-fold: firstly, the advent of mobile
Internet in cars brings together new, widely divergent
trajectories of Internet; secondly, such developments
have social implications that vary widely depending on
whether or not we recognize the broader technological
systems and infrastructures, media practices, flows,
and mobilities in which vehicular mobile Internets are
being created.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Nguyen:2012:BAS,
author = "Dinh Khoa Nguyen and Francesco Lelli and Mike P.
Papazoglou and Willem-Jan {Van den Heuvel}",
title = "Blueprinting Approach in Support of Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "322--346",
day = "21",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010322",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/322",
abstract = "Current cloud service offerings, i.e.,
Software-as-a-service (SaaS), Platform-as-a-service
(PaaS) and Infrastructure-as-a-service (IaaS) offerings
are often provided as monolithic, one-size-fits-all
solutions and give little or no room for customization.
This limits the ability of Service-based Application
(SBA) developers to configure and syndicate offerings
from multiple SaaS, PaaS, and IaaS providers to address
their application requirements. Furthermore, combining
different independent cloud services necessitates a
uniform description format that facilitates the design,
customization, and composition. Cloud Blueprinting is a
novel approach that allows SBA developers to easily
design, configure and deploy virtual SBA payloads on
virtual machines and resource pools on the cloud. We
propose the Blueprint concept as a uniform abstract
description for cloud service offerings that may cross
different cloud computing layers, i.e., SaaS, PaaS and
IaaS. To support developers with the SBA design and
development in the cloud, this paper introduces a
formal Blueprint Template for unambiguously describing
a blueprint, as well as a Blueprint Lifecycle that
guides developers through the manipulation, composition
and deployment of different blueprints for an SBA.
Finally, the empirical evaluation of the blueprinting
approach within an EC's FP7 project is reported and an
associated blueprint prototype implementation is
presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Hanzl:2012:HGU,
author = "Ma{\l}gorzata Hanzl and Karol Dzik and Paulina
Kowalczyk and Krystian Kwieci{\'n}ski and Ewa
Stankiewicz and Agata L. Wierzbicka",
title = "Human Geomatics in Urban Design-Two Case Studies",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "347--361",
day = "22",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010347",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/347",
abstract = "The mapping of different aspects of urban phenomena
and their relation to the physical cityscape has been
greatly extended by the use of geomatics. The tradition
to base reasoning on ` understanding the world ' dates
from the time of Aristotle. The extension plan for
Barcelona (Eixample), developed by Cerd{\`a}, which
opened the era of modern urban planning, was preceded
by analyses of rich data, describing both detailed
demographic issues and physical structures. The
contemporary, postmodernist city planning continues
this tradition, although a shift towards analyses of
more human-related issues can be observed, covering,
inter alia, citizens' perception, cultural differences
and patterns of human activities with regard to
distinct social groups. The change towards a more
human-related perspective and the inclusion of urban
morphology analyses are direct consequences of this
trend. The required data may be gathered within a
crowd-sourcing participation process. According to
communicative planning theory, communication with the
wider public is indispensable in order to achieve the
best results, and can be realized with the use of
sophisticated IT tools. Evidence-based reasoning may be
supported by images of significant aesthetic values,
which inspire immediate reactions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Nilsen:2012:CBP,
author = "Line Lundvoll Nilsen",
title = "Collaboration between Professionals: The Use of
Videoconferencing for Delivering E-Health",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "362--371",
day = "02",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/362",
abstract = "This article explores the ways in which collaboration
between professionals using videoconferencing affects
the e-health delivered to patients. In Norway, general
practitioners (GPs) and specialists routinely hold
videoconferences. Observations of 42 VC meetings, each
lasting from 5 to 40 min, were analysed in terms of the
interactions. In addition, five semi-structured,
face-to-face interviews were conducted, each lasting
from 20 to 70 minutes. Statements were selected to
illustrate the content of the interactions and how
collaborative work affects the delivery of healthcare.
Successful collaborative work provides practitioners
with a new way of thinking: exchanging information and
knowledge between levels of care in order to provide
the best treatment for patients locally. The regularity
makes the collaborative work a two-way achievement. GPs
receive decision support and second opinions, and
specialists receive information and opportunities to
follow up. How the professionals manage their work
(i.e., collaborating) may benefit their patients. The
regular use of videoconferencing will furnish
professionals with enhanced resources for the meeting
of patients' demands in the future. Regularly informing
one another and exchanging knowledge, benefits the
professionals by providing increased certainty with
regard to their medical decisions, and it benefits the
patients because they will feel satisfied with the
competence of the specialists where they live.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Kennedy:2012:SAP,
author = "Sean Kennedy and Owen Molloy and Robert Stewart and
Paul Jacob and Maria Maleshkova and Frank Doheny",
title = "A Semantically Automated Protocol Adapter for Mapping
{SOAP} {Web} Services to {RESTful} {HTTP} Format to
Enable the {Web} Infrastructure, Enhance {Web} Service
Interoperability and Ease {Web} Service Migration",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "372--395",
day = "11",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020372",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/372",
abstract = "Semantic Web Services (SWS) are Web Service (WS)
descriptions augmented with semantic information. SWS
enable intelligent reasoning and automation in areas
such as service discovery, composition, mediation,
ranking and invocation. This paper applies SWS to a
previous protocol adapter which, operating within
clearly defined constraints, maps SOAP Web Services to
RESTful HTTP format. However, in the previous adapter,
the configuration element is manual and the latency
implications are locally based. This paper applies SWS
technologies to automate the configuration element and
the latency tests are conducted in a more realistic
Internet based setting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Zafiropoulos:2012:BCC,
author = "Kostas Zafiropoulos and Vasiliki Vrana and Dimitrios
Vagianos",
title = "Bloggers' Community Characteristics and Influence
within {Greek} Political Blogosphere",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "396--412",
day = "19",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020396",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/396",
abstract = "This paper investigates the properties of central or
core political blogs. They can be located as clusters
of blogs whose members have many incoming links. Other
blogs form clouds around them in the sense that they
link the core blogs. A case study records Greek
political blogs and their incoming links reported
through their blogrolls. The adjacency matrix from the
blogs' social network is analyzed and clusters are
located. Three of them, those with the larger numbers
of incoming links, may be considered to be central.
Next, four measures of influence are used to test the
influence of the central blogs. The findings suggest
that there are many kinds of central blogs, influential
and non-influential, and high influence does not always
involve high hyperlinking.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Davies:2012:PEA,
author = "John N. Davies and Paul Comerford and Vic Grout",
title = "Principles of Eliminating Access Control Lists within
a Domain",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "413--429",
day = "19",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020413",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/413",
abstract = "The infrastructure of large networks is broken down
into areas that have a common security policy called a
domain. Security within a domain is commonly
implemented at all nodes. However this can have a
negative effect on performance since it introduces a
delay associated with packet filtering. When Access
Control Lists (ACLs) are used within a router for this
purpose then a significant overhead is introduced
associated with this process. It is likely that
identical checks are made at multiple points within a
domain prior to a packet reaching its destination.
Therefore by eliminating ACLs within a domain by
modifying the ingress/egress points with equivalent
functionality an improvement in the overall performance
can be obtained. This paper considers the effect of the
delays when using router operating systems offering
different levels of functionality. It considers factors
which contribute to the delay particularly due to ACLs
and by using theoretical principles modified by
practical calculation a model is created. Additionally
this paper provides an example of an optimized solution
which reduces the delay through network routers by
distributing the security rules to the ingress/egress
points of the domain without affecting the security
policy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Fernandez:2012:SPW,
author = "Eduardo B. Fernandez and Ola Ajaj and Ingrid Buckley
and Nelly Delessy-Gassant and Keiko Hashizume and Maria
M. Larrondo-Petrie",
title = "A Survey of Patterns for {Web} Services Security and
Reliability Standards",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "430--450",
day = "20",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020430",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/430",
abstract = "An important aspect for the acceptance of
Service-Oriented Architectures is having convenient
ways to help designers build secure applications.
Numerous standards define ways to apply security in web
services. However, these standards are rather complex
and sometimes overlap, which makes them hard to use and
may produce inconsistencies. Representing them as
patterns makes them easier to understand, to compare to
other patterns, to discover inconsistencies, and to use
them to build secure web services applications.
Security patterns abstract the key aspects of a
security mechanism and can thus be applied by
non-experts. We survey here our work on security
patterns for web services and their standards and we
put them in perspective with respect to each other and
to more fundamental patterns. We also consider other
patterns for web services security. All the patterns
described here have been previously published, we only
show here one of them in detail as an illustration of
our style for writing patterns. Our main purpose here
is to enumerate them, show their use, and show how they
relate to each other.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Pollino:2012:COS,
author = "Maurizio Pollino and Grazia Fattoruso and Luigi {La
Porta} and Antonio Bruno {Della Rocca} and Valentina
James",
title = "Collaborative Open Source Geospatial Tools and Maps
Supporting the Response Planning to Disastrous
Earthquake Events",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "451--468",
day = "07",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020451",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/451",
abstract = "The latest improvements in geo-informatics offer new
opportunities in a wide range of territorial and
environmental applications. In this general framework,
a relevant issue is represented by earthquake early
warning and emergency management. This research work
presents the investigation and development of a simple
and innovative geospatial methodology and related
collaborative open source geospatial tools for
predicting and mapping the vulnerability to seismic
hazard in order to support the response planning to
disastrous events. The proposed geospatial methodology
and tools have been integrated into an open source
collaborative GIS system, designed and developed as an
integrated component of an earthquake early warning and
emergency management system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Rosado:2012:SAM,
author = "David G. Rosado and Rafael G{\'o}mez and Daniel
Mellado and Eduardo Fern{\'a}ndez-Medina",
title = "Security Analysis in the Migration to Cloud
Environments",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "469--487",
day = "08",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020469",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/469",
abstract = "Cloud computing is a new paradigm that combines
several computing concepts and technologies of the
Internet creating a platform for more agile and
cost-effective business applications and IT
infrastructure. The adoption of Cloud computing has
been increasing for some time and the maturity of the
market is steadily growing. Security is the question
most consistently raised as consumers look to move
their data and applications to the cloud. We justify
the importance and motivation of security in the
migration of legacy systems and we carry out an
analysis of different approaches related to security in
migration processes to cloud with the aim of finding
the needs, concerns, requirements, aspects,
opportunities and benefits of security in the migration
process of legacy systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Muller:2012:DPM,
author = "Sebastian M{\"u}ller and Franziska Brecht and Benjamin
Fabian and Steffen Kunz and Dominik Kunze",
title = "Distributed Performance Measurement and Usability
Assessment of the {Tor} Anonymization Network",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "488--513",
day = "15",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020488",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/488",
abstract = "While the Internet increasingly permeates everyday
life of individuals around the world, it becomes
crucial to prevent unauthorized collection and abuse of
personalized information. Internet anonymization
software such as Tor is an important instrument to
protect online privacy. However, due to the performance
overhead caused by Tor, many Internet users refrain
from using it. This causes a negative impact on the
overall privacy provided by Tor, since it depends on
the size of the user community and availability of
shared resources. Detailed measurements about the
performance of Tor are crucial for solving this issue.
This paper presents comparative experiments on Tor
latency and throughput for surfing to 500 popular
websites from several locations around the world during
the period of 28 days. Furthermore, we compare these
measurements to critical latency thresholds gathered
from web usability research, including our own user
studies. Our results indicate that without massive
future optimizations of Tor performance, it is unlikely
that a larger part of Internet users would adopt it for
everyday usage. This leads to fewer resources available
to the Tor community than theoretically possible, and
increases the exposure of privacy-concerned
individuals. Furthermore, this could lead to an
adoption barrier of similar privacy-enhancing
technologies for a Future Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Privacy in the Future Internet.",
}
@Article{Nordfeldt:2012:YPV,
author = "Sam Nordfeldt and Carina Berter{\"o}",
title = "Young Patients' Views on the Open {Web 2.0} Childhood
Diabetes Patient Portal: a Qualitative Study",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "514--527",
day = "18",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020514",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/514",
abstract = "Little is known about the views of young patients
themselves on interactive Web portal services provided
by pediatric practitioners. We aimed to explore their
perceptions of a real-world diabetes portal that offers
facts and contact with peers and practitioners; e.g.,
discussion forums, blog tools, self-care and treatment
information, research updates and news from local
practitioners. Twelve young patients (ages 12-21,
median 15 years), one boyfriend, 7 mothers and one
father each wrote an essay on their experience from use
of the portal. Their essays underwent qualitative
content analysis. A major theme was ``Helping and
facilitating daily life with diabetes'', the portal was
perceived as a place where contents are interesting,
inspiring and may trigger users' curiosity. There were
three subthemes; ``Ease of use in my everyday life,''
which includes the perception that the portal was
perceived as smooth and easy to enter and navigate
whenever needed; that information was easy to
understand for different groups of users. ``Support via
an exchange of experience,'' includes the ability to
contact peers being regarded advantageous. Some said
that just reading others' experiences can be helpful in
terms of persevering; children could find peers in the
same age group. ``Evidence based information,''
includes the perception of the portal being a useful
and trustworthy source of facts on e.g., physical
activity, blood glucose, medical devices, emotional
wellbeing, food and nutrition, and other aspects that
impact living with diabetes. Young users expressed
positive perceptions towards the interactive web
portal. Such services seem to have great potential for
supporting young patients and significant others -
intergrading for confidence.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Zafiropoulos:2012:AAG,
author = "Kostas Zafiropoulos and Ioannis Karavasilis and
Vasiliki Vrana",
title = "Assessing the Adoption of e-Government Services by
Teachers in {Greece}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "528--544",
day = "21",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020528",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/528",
abstract = "Technological developments and governments'
understanding of what citizens need usually determine
the design of public online services. For successful
implementation of e-Government services, governments
have to place the user in the center of future
developments, understand what citizens need and measure
what increases citizens' willingness to adopt
e-government services. The paper uses the Technology
Acceptance Model (TAM), the extended TAM, the Diffusion
of Innovations (DOI) theory and the important
determinants of user acceptance perceived risk and
trust, in order to describe teachers' behavioral
intensions to adopt e-Government services. A model
containing trust and risk, along with cognitive, social
and intrinsic factors is used to study the intentions
of e-Government use by Greek primary and secondary
education teachers. Two hundred and thirty teachers
responded to an online survey. Findings reveal that
cognitive and intrinsic factors have significant
effects on intentions to use e-Government websites.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Farman:2012:IST,
author = "Jason Farman",
title = "Introduction to the Social Transformations from the
Mobile {Internet} Special Issue",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "545--550",
day = "23",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020545",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/545",
abstract = "The social transformations brought about by the mobile
internet are extensive. In discussing the broad range
of these transformations-positioned as a shift from
personal computing to pervasive computing-this
editorial elaborates on the key contributions addressed
by the articles in this special issue of Future
Internet. These articles touch on topics such as the
digital divide, the role of the mobile internet in
revolutions like the Arab Spring and the Occupy Wall
Street movement, the development of site-specific and
context-aware news, the incorporation of the internet
into existing technologies like the automobile, and the
utilization of the mobile internet to transform
everyday spaces into game spaces.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Newell:2012:CSC,
author = "David A. Newell and Margaret M. Pembroke and William
E. Boyd",
title = "Crowd Sourcing for Conservation: {Web 2.0} a Powerful
Tool for Biologists",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "551--562",
day = "24",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020551",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/551",
abstract = "The advent and adoption of Web 2.0 technologies offers
a powerful approach to enhancing the capture of
information in natural resource ecology, notably
community knowledge of species distributions. Such
information has previously been collected using, for
example, postal surveys; these are typically
inefficient, with low response rates, high costs, and
requiring respondents to be spatially literate. Here we
describe an example, using the Google Maps Application
Programming Interface, to discuss the opportunities
such tools provide to conservation biology. Toad
Tracker was created as a prototype to demonstrate the
utility of this technology to document the distribution
of an invasive vertebrate pest species, the cane toad,
within Australia. While the technological aspects of
this tool are satisfactory, manager resistance towards
its use raises issues around the public nature of the
technology, the collaborative (non-expert) role in data
collection, and data ownership. We conclude in
suggesting that, for such tools to be accepted by
non-innovation adopters, work is required on both the
technological aspects and, importantly, a cultural
change is required to create an environment of
acceptance of the shifting relationship between
authority, expertise and knowledge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Rotondo:2012:UCP,
author = "Francesco Rotondo",
title = "The {U-City} Paradigm: Opportunities and Risks for
E-Democracy in Collaborative Planning",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "563--574",
day = "05",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020563",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/563",
abstract = "Volunteered Geographic Information (VGI) tools appear
to enhance the possibilities offered by a collaborative
approach to planning. The present paper analyzes both
the results of experiences of the author and of those
available in the literature, highlighting possible
advantages and disadvantages. After a brief
introduction to the meaning of e-democracy, the second
part focuses on the role of ICT in collaborative
planning, proceeding in the third part to an
illustration of an initial panorama of knowledge
gathered using ICT in such processes, while discussing
criticisms and opportunities. The fourth part discusses
the U-city paradigm as a driver of change in urban
planning participation processes. Research perspectives
are then outlined in the final part.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Goetz:2012:UCI,
author = "Marcus Goetz",
title = "Using Crowdsourced Indoor Geodata for the Creation of
a Three-Dimensional Indoor Routing {Web} Application",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "575--591",
day = "06",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020575",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/575",
abstract = "Routing services for outdoor areas are omnipresent and
also three-dimensional (3D) visualization is quite
common within this area. Recent research efforts are
now trying to adapt well known outdoor routing services
to complex indoor environments. However, most of the
current indoor routing systems only focus on
two-dimensional visualization, thus only one level can
be depicted. Especially multi-level routes therefore
lack visualization. Also, most of the (few) existing 3D
indoor routing services utilize proprietary software or
plugins, thus a widespread accessibility for those
services by using common computers or mobile devices is
not feasible. Therefore this paper describes the
development of a web-based 3D routing system based on a
new HTML extension. The visualization of rooms as well
as the computed routes is realized with XML3D. Since
this emerging technology is based on WebGL and will
likely be integrated into the HTML5 standard, the
developed system is already compatible with most common
browsers such as Google Chrome or Firefox. Another key
difference of the approach presented in this paper is
that all utilized data is actually crowdsourced geodata
from OpenStreetMap (OSM). Such data is collaboratively
collected by both amateurs and professionals and can be
used at no charge under the Open Data Commons Open
Database License (ODbL). Our research combines
user-generated geo content of the Web 2.0 with future
Internet technology for the provision of a ubiquitously
accessible 3D indoor routing application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Garau:2012:FCP,
author = "Chiara Garau",
title = "Focus on Citizens: Public Engagement with Online and
Face-to-Face Participation --- a Case Study",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "592--606",
day = "15",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020592",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/592",
abstract = "The main objective of this paper is to focus on how an
integrated system based on Information Communication
Technology (ICT) and face-to-face communication can
increase participation in order to have a positive
effect on quality of life, plans and decisions, and to
discuss the many benefits which web-based public
participation can bring to the planning process through
a set of improvements to relations, quality and
structure of cities in general and in this case example
specifically. With the development of a transparent
support system for collaborative decision-making
processes, it is possible to identify a strategy for
addressing gaps to reach collaborative decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Le:2012:SHO,
author = "Quynh L{\^e} and Hoang Boi Nguyen and Tony Barnett",
title = "Smart Homes for Older People: Positive Aging in a
Digital World",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "607--617",
day = "19",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020607",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/607",
abstract = "Smart homes are homes with technologically advanced
systems to enable domestic task automation, easier
communication, and higher security. As an enabler of
health and well-being enhancement, smart homes have
been geared to accommodate people with special needs,
especially older people. This paper examines the
concept of ``smart home'' in a technologically driven
society and its multi-functional contribution to the
enhancement of older people's lives. Discussion then
focuses on the challenges in the use of smart homes
among older people such as accessibility and ethical
issues. Finally, some implications and recommendations
are provided.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Fernandez:2012:ISI,
author = "Eduardo B. Fernandez",
title = "Introduction to the Special Issue on Recent Advances
in {Web} Services",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "618--620",
day = "27",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030618",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/618",
abstract = "We have collected five papers describing different
aspects of web services and cloud computing. Cloud
computing is the next stage of application
interoperability and it is a logical extension of web
services, both approaches being a variety of
Service-Oriented Architecture. The papers cover
security, migration, certification, and application
development. Together, these papers provide a useful
panorama of some of the issues of these two
technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{AbuKhousa:2012:HCO,
author = "Eman AbuKhousa and Nader Mohamed and Jameela
Al-Jaroodi",
title = "e-Health Cloud: Opportunities and Challenges",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "621--645",
day = "04",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030621",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/621",
abstract = "As the costs of healthcare services rise and
healthcare professionals are becoming scarce and hard
to find, it is imminent that healthcare organizations
consider adopting health information technology (HIT)
systems. HIT allows health organizations to streamline
many of their processes and provide services in a more
efficient and cost-effective manner. The latest
technological trends such as Cloud Computing (CC)
provide a strong infrastructure and offer a true
enabler for HIT services over the Internet. This can be
achieved on a pay-as-you-use model of the ``e-Health
Cloud'' to help the healthcare industry cope with
current and future demands yet keeping their costs to a
minimum. Despite its great potential, HIT as a CC model
has not been addressed extensively in the literature.
There are no apparent frameworks which clearly
encompass all viable schemes and interrelationships
between HIT and CC. Therefore, analyzing and comparing
the effectiveness of such schemes is important. In this
paper we introduce the concept of ``e-Health Cloud''
highlighting many of its constituents and proposing
building an e-health environment and elucidating many
of the challenges confronting the success of the
e-Health Cloud. We will also discuss different possible
solutions to address challenges such as security and
privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Yerima:2012:AMB,
author = "Suleiman Y. Yerima and Gerard P. Parr and Sally I.
McClean and Philip J. Morrow",
title = "Adaptive Measurement-Based Policy-Driven {QoS}
Management with Fuzzy-Rule-based Resource Allocation",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "646--671",
day = "04",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030646",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/646",
abstract = "Fixed and wireless networks are increasingly
converging towards common connectivity with IP-based
core networks. Providing effective end-to-end resource
and QoS management in such complex heterogeneous
converged network scenarios requires unified, adaptive
and scalable solutions to integrate and co-ordinate
diverse QoS mechanisms of different access technologies
with IP-based QoS. Policy-Based Network Management
(PBNM) is one approach that could be employed to
address this challenge. Hence, a policy-based framework
for end-to-end QoS management in converged networks,
CNQF (Converged Networks QoS Management Framework) has
been proposed within our project. In this paper, the
CNQF architecture, a Java implementation of its
prototype and experimental validation of key elements
are discussed. We then present a fuzzy-based CNQF
resource management approach and study the performance
of our implementation with real traffic flows on an
experimental testbed. The results demonstrate the
efficacy of our resource-adaptive approach for
practical PBNM systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Denning:2012:SWC,
author = "Dorothy E. Denning",
title = "{Stuxnet}: What Has Changed?",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "672--687",
day = "16",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030672",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/672",
abstract = "This paper considers the impact of Stuxnet on
cyber-attacks and cyber-defense. It first reviews
trends in cyber-weapons and how Stuxnet fits into these
trends. Because Stuxnet targeted an industrial control
system in order to wreak physical damage, the focus is
on weapons that target systems of that type and produce
physical effects. The paper then examines the impact of
Stuxnet on various domains of action where
cyber-attacks play a role, including state-level
conflict, terrorism, activism, crime, and pranks. For
each domain, it considers the potential for new types
of cyber-attacks, especially attacks against industrial
control systems, and whether such attacks would be
consistent with other trends in the domain. Finally,
the paper considers the impact of Stuxnet on
cyber-defense.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Aftermath of Stuxnet.",
}
@Article{Nilsen:2012:TPV,
author = "Line Lundvoll Nilsen and Terje Solvoll",
title = "Traditional Practice vs. New Tools and Routines in
Stroke Treatment",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "688--699",
day = "06",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030688",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/688",
abstract = "In Norway, it is a national goal to provide more
patients with thrombolytic treatment. A referring
hospital and a specialist hospital have implemented
videoconferencing (VC) equipment to share knowledge and
discuss stroke patients, regarding thrombolytic
treatment. VC has only been used four times within the
19 months that the service has been available. The
objective in this article is to increase the
understanding of the contradiction between the need for
knowledge-sharing through VC technology, as well as the
reasons for low frequency of use when discussing stroke
patients. Semi-structured interviews were conducted
with 13 professionals. The results illustrate how the
technology per se is not the reason for the low
frequency use. Health care is shaped by behavior,
traditional rules, standards and division of labor. By
using cultural historical activity theory (CHAT) as a
framework, we illustrate the importance of
understanding the historic way of performing an
activity to be able to expand the treatment activity in
the future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Prandini:2012:RRA,
author = "Marco Prandini and Marco Ramilli",
title = "Raising Risk Awareness on the Adoption of {Web 2.0}
Technologies in Decision Making Processes",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "700--718",
day = "09",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030700",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/700",
abstract = "In the recent past, the so-called ``Web 2.0'' became a
powerful tool for decision making processes.
Politicians and managers, seeking to improve
participation, embraced this technology as if it simply
were a new, enhanced version of the WorldWideWeb,
better suited to retrieve information, opinions and
feedbacks from the general public on subjects like
laws, acts and policies. This approach was often naive,
neglecting the less-obvious aspects of the technology,
and thus bringing on significant security problems.
This paper shows how, in the end, the result could
easily be the opposite of what was desired. Malicious
attackers, in fact, could quite easily exploit the
vulnerabilities in these systems to hijack the process
and lead to wrong decisions, also causing the public to
lose trust in the systems themselves.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Zafiropoulos:2012:CPA,
author = "Kostas Zafiropoulos",
title = "Connectivity Practices and Activity of {Greek}
Political Blogs",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "719--736",
day = "14",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030719",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/719",
abstract = "This paper uses Social Network Analysis indexes to
study Greek political blogs. The indexes describe
bloggers' community recommendations, centrality and
bloggers' attempt to form spheres of influence. Five
Social Network Analysis indexes are used: incoming
links, normalized betweenness, outgoing links, number
of 1-cliques a blog belongs to, and size of blog's
ego-network. By recording 127 Greek political blogs,
the paper finds that there are two distinct blog
performance properties regarding connectivity: Only a
few blogs serve as authority blogs having many incoming
links and centrality, while a few others try to expand
their influence territory by having many outgoing links
and forming larger 1-cliques and ego-networks. Next,
the paper associates the proposed indexes with blogs'
and users' community activity. Authority blogs present
high blog activity and users' community activity, as
well. These are recorded by large numbers of posts and
comments to the blog posts, respectively. It is shown
that blogs, which strive to expand their network by
using many outgoing links are more likely to link to
the authority blogs. Content analysis reveals that
authority blogs provide news and information and
promote discussion to a much higher degree compared to
the overall Greek political blogosphere.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Loskyll:2012:CBO,
author = "Matthias Loskyll and Ines Heck and Jochen Schlick and
Michael Schwarz",
title = "Context-Based Orchestration for Control of
Resource-Efficient Manufacturing Processes",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "737--761",
day = "14",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030737",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/737",
abstract = "The increasing competition between manufacturers, the
shortening of innovation cycles and the growing
importance of resource-efficient manufacturing demand a
higher versatility of factory automation.
Service-oriented approaches depict a promising
possibility to realize new control architectures by
encapsulating the functionality of mechatronic devices
into services. An efficient discovery, context-based
selection and dynamic orchestration of these services
are the key features for the creation of highly
adaptable manufacturing processes. We describe a
semantic service discovery and ad-hoc orchestration
system, which is able to react to new process variants
and changed contextual information (e.g., failure of
field devices, requirements on the consumption of
resources). Because a standardized vocabulary,
especially for the description of mechatronic
functionalities, is still missing in the manufacturing
domain, the semantic description of services, processes
and manufacturing plants as well as the semantic
interpretation of contextual information play an
important part.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Subirats:2012:KRP,
author = "Laia Subirats and Luigi Ceccaroni and Felip Miralles",
title = "Knowledge Representation for Prognosis of Health
Status in Rehabilitation",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "762--775",
day = "20",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030762",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/762",
abstract = "In this article, key points are discussed concerning
knowledge representation for clinical decision support
systems in the domain of physical medicine and
rehabilitation. Information models, classifications and
terminologies, such as the ``virtual medical record''
(vMR), the ``international classification of
functioning, disability and health'' (ICF), the
``international classification of diseases'' (ICD) and
the ``systematized nomenclature of medicine-clinical
terms'' (SNOMED CT), are used for knowledge integration
and reasoning. A system is described that supports the
measuring of functioning status, diversity, prognosis
and similarity between patients in the post-acute
stage, thus helping health professionals' prescription
of recommendations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Stojmenova:2012:AUC,
author = "Emilija Stojmenova and Bojan Imperl and Tomaz Zohar
and Dejan Dinevski",
title = "Adapted User-Centered Design: a Strategy for the
Higher User Acceptance of Innovative e-Health
Services",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "776--787",
day = "27",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030776",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/776",
abstract = "Being familiar with all the benefits of e-Health and
the strategic plan for the Slovenian health sector's
informatization, Telekom Slovenia and the Faculty of
Medicine from the University of Maribor, along with
other partners, have initiated an e-Health project. The
project group is developing various e-Health services
that are based on modern ICT (information and
communications technology) solutions and will be
available on several screens. In order to meet the
users' needs and expectations and, consequently,
achieve the high acceptance of e-Health services, the
user-centered design (UCD) approach was employed in the
e-Health project. However, during the research it was
found that conventional UCD methods are not completely
appropriate for older adults: the target population of
the e-Health services. That is why the selected UCD
methods were modified and adapted for older adults. The
modified UCD methods used in the research study are
presented in this paper. Using the results of the
adapted UCD methods, a prototype for a service named
MedReminder was developed. The prototype was evaluated
by a group of 12 study participants. The study
participants evaluated the MedReminder service as
acceptable with a good potential for a high adoption
rate among its target population, i.e., older adults.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Hunter:2012:TAE,
author = "Jane Hunter and Anna Gerber",
title = "Towards Annotopia-Enabling the Semantic
Interoperability of {Web}-Based Annotations",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "788--806",
day = "30",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030788",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/788",
abstract = "This paper describes the results of a collaborative
effort that has reconciled the Open Annotation
Collaboration (OAC) ontology and the Annotation
Ontology (AO) to produce a merged data model [the Open
Annotation (OA) data model] to describe Web-based
annotations-and hence facilitate the discovery, sharing
and re-use of such annotations. Using a number of case
studies that include digital scholarly editing, 3D
museum artifacts and sensor data streams, we evaluate
the OA model's capabilities. We also describe our
implementation of an online annotation server that
supports the storage, search and retrieval of
OA-compliant annotations across multiple applications
and disciplines. Finally we discuss outstanding problem
issues associated with the OA ontology, and the impact
that certain design decisions have had on the efficient
storage, indexing, search and retrieval of complex
structured annotations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Schade:2012:SOI,
author = "Sven Schade and Frank Ostermann and Laura Spinsanti
and Werner Kuhn",
title = "Semantic Observation Integration",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "807--829",
day = "03",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030807",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/807",
abstract = "Although the integration of sensor-based information
into analysis and decision making has been a research
topic for many years, semantic interoperability has not
yet been reached. The advent of user-generated content
for the geospatial domain, Volunteered Geographic
Information (VGI), makes it even more difficult to
establish semantic integration. This paper proposes a
novel approach to integrating conventional sensor
information and VGI, which is exploited in the context
of detecting forest fires. In contrast to common
logic-based semantic descriptions, we present a formal
system using algebraic specifications to unambiguously
describe the processing steps from natural phenomena to
value-added information. A generic ontology of
observations is extended and profiled for forest fire
detection in order to illustrate how the sensing
process, and transformations between heterogeneous
sensing systems, can be represented as mathematical
functions and grouped into abstract data types. We
discuss the required ontological commitments and a
possible generalization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Bouzidi:2012:SWA,
author = "Khalil Riad Bouzidi and Bruno Fies and Catherine
Faron-Zucker and Alain Zarli and Nhan Le Thanh",
title = "{Semantic Web} Approach to Ease Regulation Compliance
Checking in Construction Industry",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "830--851",
day = "11",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030830",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/830",
abstract = "Regulations in the Building Industry are becoming
increasingly complex and involve more than one
technical area, covering products, components and
project implementations. They also play an important
role in ensuring the quality of a building, and to
minimize its environmental impact. Control or
conformance checking are becoming more complex every
day, not only for industrials, but also for
organizations charged with assessing the conformity of
new products or processes. This paper will detail the
approach taken by the CSTB (Centre Scientifique et
Technique du B{\^a}timent) in order to simplify this
conformance control task. The approach and the proposed
solutions are based on semantic web technologies. For
this purpose, we first establish a domain-ontology,
which defines the main concepts involved and the
relationships, including one based on OWL (Web Ontology
Language) [1]. We rely on SBVR (Semantics of Business
Vocabulary and Business Rules) [2] and SPARQL (SPARQL
Protocol and RDF Query Language) [3] to reformulate the
regulatory requirements written in natural language,
respectively, in a controlled and formal language. We
then structure our control process based on expert
practices. Each elementary control step is defined as a
SPARQL query and assembled into complex control
processes ``on demand'', according to the component
tested and its semantic definition. Finally, we
represent in RDF (Resource Description Framework) [4]
the association between the SBVR rules and SPARQL
queries representing the same regulatory constraints.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Pileggi:2012:WSM,
author = "Salvatore F. Pileggi and Carlos Fernandez-Llatas and
Vicente Traver",
title = "When the Social Meets the Semantic: Social {Semantic
Web} or {Web} 2.5",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "852--864",
day = "21",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030852",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/852",
abstract = "The social trend is progressively becoming the key
feature of current Web understanding (Web 2.0). This
trend appears irrepressible as millions of users,
directly or indirectly connected through social
networks, are able to share and exchange any kind of
content, information, feeling or experience. Social
interactions radically changed the user approach.
Furthermore, the socialization of content around social
objects provides new unexplored commercial marketplaces
and business opportunities. On the other hand, the
progressive evolution of the web towards the Semantic
Web (or Web 3.0) provides a formal representation of
knowledge based on the meaning of data. When the social
meets semantics, the social intelligence can be formed
in the context of a semantic environment in which user
and community profiles as well as any kind of
interaction is semantically represented (Semantic
Social Web). This paper first provides a conceptual
analysis of the second and third version of the Web
model. That discussion is aimed at the definition of a
middle concept (Web 2.5) resulting in the convergence
and integration of key features from the current and
next generation Web. The Semantic Social Web (Web 2.5)
has a clear theoretical meaning, understood as the
bridge between the overused Web 2.0 and the not yet
mature Semantic Web (Web 3.0).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Groza:2012:PDL,
author = "Adrian Groza and Ioan Alfred Letia",
title = "Plausible Description Logic Programs for Stream
Reasoning",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "865--881",
day = "17",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040865",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/865",
abstract = "Sensor networks are estimated to drive the formation
of the future Internet, with stream reasoning
responsible for analysing sensor data. Stream reasoning
is defined as real time logical reasoning on large,
noisy, heterogeneous data streams, aiming to support
the decision process of large numbers of concurrent
querying agents. In this research we exploited
non-monotonic rule-based systems for handling
inconsistent or incomplete information and also
ontologies to deal with heterogeneity. Data is
aggregated from distributed streams in real time and
plausible rules fire when new data is available. The
advantages of lazy evaluation on data streams were
investigated in this study, with the help of a
prototype developed in Haskell.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Gomes:2012:CDL,
author = "Rui Gomes and L{\'\i}gia Sousa",
title = "Contributions to the Development of Local e-Government
2.0",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "882--899",
day = "22",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040882",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/882",
abstract = "With the emergence of Web 2.0 (Blog, Wiki, RSS,
YouTube, Flickr, Podcast, Social Networks, and
Mashups), new ways of communicating, interacting and
being on the Web have arisen. These new communication
tools and strategies can radically change some specific
work processes in communities, such as the work
processes of an autarchy. Some authors emphasize the
advantages of using Web 2.0 tools in autarchies; thus,
we were interested in exploring the possibilities and
constraints of implementing these tools in our region
of Portugal, the Minho. Using a case study methodology,
we aimed to find out about the possibilities of
implementing Web 2.0 tools in autarchies through
exploring the interest and motivation of autarchic
collaborators in their use (our unit of analysis in
autarchies). Information was gathered with the help of
a questionnaire, the design of which was based on
previous exploratory interviews and applied to four
autarchic units in the Minho region. In each unit,
three different target-groups were surveyed
(Councilors, Information Systems (IS) Technicians, and
General Staff), so that we could triangulate the data.
Data analysis and results emphasized the interest and
motivation of the autarchies in using Web 2.0 tools, as
well as the main constraints that would be faced during
Web 2.0 implementation. It also allowed us to establish
some guidelines for adequate Web 2.0 implementation,
including an ``ideal'' profile of the person
responsible for the implementation process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Harrison:2012:COG,
author = "Teresa M. Harrison and Theresa A. Pardo and Meghan
Cook",
title = "Creating Open Government Ecosystems: a Research and
Development Agenda",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "900--928",
day = "23",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040900",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/900",
abstract = "In this paper, we propose to view the concept of open
government from the perspective of an ecosystem, a
metaphor often used by policy makers, scholars, and
technology gurus to convey a sense of the
interdependent social systems of actors, organizations,
material infrastructures, and symbolic resources that
can be created in technology-enabled,
information-intensive social systems. We use the
concept of an ecosystem to provide a framework for
considering the outcomes of a workshop organized to
generate a research and development agenda for open
government. The agenda was produced in discussions
among participants from the government (at the federal,
state, and local levels), academic and civil sector
communities at the Center for Technology in Government
(CTG) at the University at Albany, SUNY in April 2011.
The paper begins by discussing concepts central to
understanding what is meant by an ecosystem and some
principles that characterize its functioning. We then
apply this metaphor more directly to government,
proposing that policymakers engage in strategic
ecosystems thinking, which means being guided by the
goal of explicitly and purposefully constructing open
government ecosystems. From there, we present the
research agenda questions essential to the development
of this new view of government's interaction with users
and organizations. Our goal is to call attention to
some of the fundamental ways in which government must
change in order to evolve from outdated industrial
bureaucratic forms to information age networked and
interdependent systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Hu:2012:SLP,
author = "Yuh-Jong Hu and Win-Nan Wu and Kua-Ping Cheng and
Ya-Ling Huang",
title = "Semantic Legal Policies for Data Exchange and
Protection across Super-Peer Domains in the Cloud",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "929--954",
day = "25",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040929",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/929",
abstract = "In semantic policy infrastructure, a Trusted Legal
Domain (TLD), designated as a Super-Peer Domain (SPD),
is a legal cage model used to circumscribe the legal
virtual boundary of data disclosure and usage in the
cloud. Semantic legal policies in compliance with the
law are enforced at the super-peer within an SPD to
enable Law-as-a-Service (LaaS) for cloud service
providers. In addition, cloud users could query
fragmented but protected outsourcing cloud data from a
law-aware super-peer, where each query is also
compliant with the law. Semantic legal policies are
logic-based formal policies, which are shown to be a
combination of OWL-DL ontologies and stratified Datalog
rules with negation, i.e., so-called non-monotonic
cq-programs, for policy representation and enforcement.
An agent at the super-peer is a unique law-aware
guardian that provides protected data integration
services for its peers within an SPD. Furthermore,
agents at the super-peers specify how law-compliant
legal policies are unified with each other to provide
protected data exchange services across SPDs in the
semantic data cloud.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Davis:2012:SME,
author = "Jenny L. Davis",
title = "Social Media and Experiential Ambivalence",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "955--970",
day = "26",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040955",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/955",
abstract = "At once fearful and dependent, hopeful and
distrustful, our contemporary relationship with
technology is highly ambivalent. Using experiential
accounts from an ongoing Facebook-based qualitative
study (N = 231), I both diagnose and articulate this
ambivalence. I argue that technological ambivalence is
rooted primarily in the deeply embedded moral
prescription to lead a meaningful life, and a related
uncertainty about the role of new technologies in the
accomplishment of this task. On the one hand,
technology offers the potential to augment or even
enhance personal and public life. On the other hand,
technology looms with the potential to supplant or
replace real experience. I examine these polemic
potentialities in the context of personal experiences,
interpersonal relationships, and political activism. I
conclude by arguing that the pervasive integration and
non-optionality of technical systems amplifies utopian
hopes, dystopian fears, and ambivalent concerns in the
contemporary era.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Theorizing the Web 2012.",
}
@Article{Bencsath:2012:CSD,
author = "Boldizs{\'a}r Bencs{\'a}th and G{\'a}bor P{\'e}k and
Levente Butty{\'a}n and M{\'a}rk F{\'e}legyh{\'a}zi",
title = "The Cousins of {Stuxnet}: {Duqu}, {Flame}, and
{Gauss}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "971--1003",
day = "06",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040971",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/971",
abstract = "Stuxnet was the first targeted malware that received
worldwide attention for causing physical damage in an
industrial infrastructure seemingly isolated from the
onlineworld. Stuxnet was a powerful targeted
cyber-attack, and soon other malware samples were
discovered that belong to this family. In this paper,
we will first present our analysis of Duqu, an
information-collecting malware sharing striking
similarities with Stuxnet. We describe our
contributions in the investigation ranging from the
original detection of Duquvia finding the dropper file
to the design of a Duqu detector toolkit. We then
continue with the analysis of the Flame advanced
information-gathering malware. Flame is unique in the
sense that it used advanced cryptographic techniques to
masquerade as a legitimate proxy and we are currently
collecting intelligence information to be able to break
its very specialencryption mechanism. Besides
explaining the operation of these pieces of malware, we
also examine if and how they could have been detected
by vigilant system administrators manually or in a
semi-automated manner using available tools. Finally,
we discuss lessons that the community can learn from
these incidents. We focus on technical issues, and
avoid speculations on the origin of these threats and
other geopolitical questions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Aftermath of Stuxnet.",
}
@Article{Lord:2012:TSH,
author = "Phillip Lord and Simon Cockell and Robert Stevens",
title = "Three Steps to Heaven: Semantic Publishing in a Real
World Workflow",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1004--1015",
day = "08",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1004",
abstract = "Semantic publishing offers the promise of computable
papers, enriched visualisation and a realisation of the
linked data ideal. In reality, however, the publication
process contrives to prevent richer semantics while
culminating in a ``lumpen'' PDF. In this paper, we
discuss a web-first approach to publication, and
describe a three-tiered approach that integrates with
the existing authoring tooling. Critically, although it
adds limited semantics, it does provide value to all
the participants in the process: the author, the reader
and the machine.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sarma:2012:STP,
author = "Amardeo Sarma and Joao Girao",
title = "Supporting Trust and Privacy with an Identity-Enabled
Architecture",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1016--1025",
day = "19",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1016",
abstract = "Cost reduction and a vastly increased potential to
create new services, such as via the proliferation of
the Cloud, have led to many more players and ``end
points''. With many of them being new entrants,
possibly short-lived, the question of how to handle
trust and privacy in this new context arises. In this
paper, we specifically look at the underlying
infrastructure that connects end-points served by these
players, which is an essential part of the overall
architecture to enable trust and privacy. We present an
enhanced architecture that allows real people, objects
and services to reliably interact via an infrastructure
providing assured levels of trust.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Privacy in the Future Internet.",
}
@Article{George:2012:TMB,
author = "Mathew George and Klaus-Peter Fischer-Hellmann and
Martin Knahl and Udo Bleimann and Shirley Atkinson",
title = "Traceability in Model-Based Testing",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1026--1036",
day = "26",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1026",
abstract = "The growing complexities of software and the demand
for shorter time to market are two important challenges
that face today's IT industry. These challenges demand
the increase of both productivity and quality of
software. Model-based testing is a promising technique
for meeting these challenges. Traceability modeling is
a key issue and challenge in model-based testing.
Relationships between the different models will help to
navigate from one model to another, and trace back to
the respective requirements and the design model when
the test fails. In this paper, we present an approach
for bridging the gaps between the different models in
model-based testing. We propose relation definition
markup language (RDML) for defining the relationships
between models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Antley:2012:TDA,
author = "Jeremy Antley",
title = "Textual Dualism and Augmented Reality in the {Russian}
Empire",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1037--1048",
day = "10",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1037",
abstract = "While the current focus on how digital technology
alters our conception of the self and its place in the
broader perceived reality yields fascinating insight
into modern issues, there is much to be gained by
analyzing the presence of dualist and augmented reality
discourses in a pre-digital era. This essay will
examine the ontological interplay of textual dualist
norms in the Russian and Soviet states of the 19th and
early 20th centuries and how those norms were
challenged by augmented claims embodied in rumors,
refrains, and the spelling of names. By utilizing the
informational concepts of mobility and asynchronicity,
three Russian historical vignettes --- the Emancipation
of the Serfs in 1861, the documentation of Jews in
Imperial Russia, and the attempts by Trotsky to realize
Soviet symchka --- demonstrate that not only are
dualist discourses prevalent in periods outside of the
contemporary, but also that the way in which those
conflicts framed themselves in the past directly
influences their deployment in today's digital world.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Theorizing the Web 2012.",
}
@Article{Wang:2012:VAS,
author = "Jue Wang and Keith J. Bennett and Edward A. Guinness",
title = "Virtual Astronaut for Scientific Visualization--- a
Prototype for {Santa Maria Crater} on {Mars}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1049--1068",
day = "13",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1049",
abstract = "To support scientific visualization of
multiple-mission data from Mars, the Virtual Astronaut
(VA) creates an interactive virtual 3D environment
built on the Unity3D Game Engine. A prototype study was
conducted based on orbital and Opportunity Rover data
covering Santa Maria Crater in Meridiani Planum on
Mars. The VA at Santa Maria provides dynamic visual
representations of the imaging, compositional, and
mineralogical information. The VA lets one navigate
through the scene and provides geomorphic and geologic
contexts for the rover operations. User interactions
include in-situ observations visualization, feature
measurement, and an animation control of rover drives.
This paper covers our approach and implementation of
the VA system. A brief summary of the prototype system
functions and user feedback is also covered. Based on
external review and comments by the science community,
the prototype at Santa Maria has proven the VA to be an
effective tool for virtual geovisual analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Geovisual Analytics.",
}
@Article{Sun:2012:WBG,
author = "Min Sun and Jing Li and Chaowei Yang and Gavin A.
Schmidt and Myra Bambacus and Robert Cahalan and
Qunying Huang and Chen Xu and Erik U. Noble and
Zhenlong Li",
title = "A {Web}-Based Geovisual Analytical System for Climate
Studies",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1069--1085",
day = "14",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1069",
abstract = "Climate studies involve petabytes of spatiotemporal
datasets that are produced and archived at distributed
computing resources. Scientists need an intuitive and
convenient tool to explore the distributed
spatiotemporal data. Geovisual analytical tools have
the potential to provide such an intuitive and
convenient method for scientists to access climate
data, discover the relationships between various
climate parameters, and communicate the results across
different research communities. However, implementing a
geovisual analytical tool for complex climate data in a
distributed environment poses several challenges. This
paper reports our research and development of a
web-based geovisual analytical system to support the
analysis of climate data generated by climate model.
Using the ModelE developed by the NASA Goddard
Institute for Space Studies (GISS) as an example, we
demonstrate that the system is able to (1) manage large
volume datasets over the Internet; (2) visualize
2D/3D/4D spatiotemporal data; (3) broker various
spatiotemporal statistical analyses for climate
research; and (4) support interactive data analysis and
knowledge discovery. This research also provides an
example for managing, disseminating, and analyzing Big
Data in the 21st century.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Geovisual Analytics.",
}
@Article{Cap:2012:TCN,
author = "Clemens H. Cap",
title = "Towards Content Neutrality in {Wiki} Systems",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1086--1104",
day = "19",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1086",
abstract = "The neutral point of view (NPOV) cornerstone of
Wikipedia (WP) is challenged for next generation
knowledge bases. A case is presented for content
neutrality as a new, every point of view (EPOV) guiding
principle. The architectural implications of content
neutrality are discussed and translated into novel
concepts of Wiki architectures. Guidelines for
implementing this architecture are presented. Although
NPOV is criticized, the contribution avoids ideological
controversy and focuses on the benefits of the novel
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Tomas-Gabarron:2013:OVT,
author = "Juan-Bautista Tomas-Gabarron and Esteban Egea-Lopez
and Joan Garcia-Haro",
title = "Optimization of Vehicular Trajectories under
{Gaussian} Noise Disturbances",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "1--20",
day = "27",
month = dec,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/1",
abstract = "Nowadays, research on Vehicular Technology aims at
automating every single mechanical element of vehicles,
in order to increase passengers' safety, reduce human
driving intervention and provide entertainment services
on board. Automatic trajectory tracing for vehicles
under especially risky circumstances is a field of
research that is currently gaining enormous attention.
In this paper, we show some results on how to develop
useful policies to execute maneuvers by a vehicle at
high speeds with the mathematical optimization of some
already established mobility conditions of the car. We
also study how the presence of Gaussian noise on
measurement sensors while maneuvering can disturb
motion and affect the final trajectories. Different
performance criteria for the optimization of such
maneuvers are presented, and an analysis is shown on
how path deviations can be minimized by using
trajectory smoothing techniques like the Kalman Filter.
We finalize the paper with a discussion on how
communications can be used to implement these
schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Paltrinieri:2013:PIE,
author = "Roberta Paltrinieri and Piergiorgio Degli Esposti",
title = "Processes of Inclusion and Exclusion in the Sphere of
Prosumerism",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "21--33",
day = "10",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/21",
abstract = "The term prosumer, first introduced by Toffler in the
1980s, has been developed by sociologists in response
to Web 2.0 (the set of technologies that has
transformed a predominantly static web into the
collaborative medium initially envisaged by Tim
Berners-Lee). The phenomena is now understood as a
process involving the creation of meanings on the part
of the consumer, who re-appropriates spaces that were
dominated by institutionalized production, and this
extends to the exploitation of consumer creativity on
the production side. Recent consumption literature can
be re-interpreted through the prosumer lens in order to
understand whether prosumers are more creative or
alienated in their activities. The peculiar typology of
prosumption introduced by Web 2.0 leads us to analyze
social capital as a key element in value creation, and
to investigate its different online and offline forms.
Our analysis then discusses the digital divide and
critical consumerism as forms of empowerment
impairment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Theorizing the Web 2012.",
}
@Article{Fritsch:2013:CPE,
author = "Lothar Fritsch",
title = "The Clean Privacy Ecosystem of the Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "34--45",
day = "14",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/34",
abstract = "This article speculates on the future of privacy and
electronic identities on the Internet. Based on a short
review of security models and the development of
privacy-enhancing technology, privacy and electronic
identities will be discussed as parts of a larger
context-an ecosystem of personal information and
electronic identities. The article argues for an
ecosystem view of personal information and electronic
identities, as both personal information and identity
information are basic required input for many
applications. Therefore, for both application owners
and users, a functioning ecosystem of personal
information and electronic identification is important.
For the future of the Internet, high-quality
information and controlled circulation of such
information is therefore argued as decisive for the
value of future Internet applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Privacy in the Future Internet.",
}
@Article{Desmet:2013:GAM,
author = "Antoine Desmet and Erol Gelenbe",
title = "Graph and Analytical Models for Emergency Evacuation",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "46--55",
day = "21",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/46",
abstract = "Cyber-Physical-Human Systems (CPHS) combine sensing,
communication and control to obtain desirable outcomes
in physical environments for human beings, such as
buildings or vehicles. A particularly important
application area is emergency management. While recent
work on the design and optimisation of emergency
management schemes has relied essentially on discrete
event simulation, which is challenged by the
substantial amount of programming or reprogramming of
the simulation tools and by the scalability and the
computing time needed to obtain useful performance
estimates, this paper proposes an approach that offers
fast estimates based on graph models and probability
models. We show that graph models can offer insight
into the critical areas in an emergency evacuation and
that they can suggest locations where sensor systems
are particularly important and may require hardening.
On the other hand, we also show that analytical models
based on queueing theory can provide useful estimates
of evacuation times and for routing optimisation. The
results are illustrated with regard to the evacuation
of a real-life building.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Smith:2013:AAN,
author = "Danielle Taana Smith",
title = "{African Americans} and Network Disadvantage:
Enhancing Social Capital through Participation on
Social Networking Sites",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "56--66",
day = "06",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/56",
abstract = "This study examines the participation of African
Americans on social networking sites (SNS), and
evaluates the degree to which African Americans engage
in activities in the online environment to mitigate
social capital deficits. Prior literature suggests that
compared with whites, African Americans have less
social capital that can enhance their socio-economic
mobility. As such, my research question is: do African
Americans enhance their social capital through their
participation on SNS? I use nationally representative
data collected from the Pew Internet and American Life
Project to explore the research question. The results
suggest that the online environment is potentially a
space in which African Americans can lessen social
capital deficits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Menth:2013:GLL,
author = "Michael Menth and Matthias Hartmann and Dominik
Klein",
title = "Global Locator, Local Locator, and Identifier Split
({GLI}-Split)",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "67--94",
day = "11",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/67",
abstract = "The locator/identifier split is an approach for a new
addressing and routing architecture to make routing in
the core of the Internet more scalable. Based on this
principle, we developed the GLI-Split framework, which
separates the functionality of current IP addresses
into a stable identifier and two independent locators,
one for routing in the Internet core and one for edge
networks. This makes routing in the Internet more
stable and provides more flexibility for edge networks.
GLI-Split can be incrementally deployed and it is
backward-compatible with the IPv6 Internet. We describe
its architecture, compare it to other approaches,
present its benefits, and finally present a
proof-of-concept implementation of GLI-Split.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Multisilta:2013:SLW,
author = "Jari Multisilta and Arttu Perttula",
title = "Supporting Learning with Wireless Sensor Data",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "95--112",
day = "19",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/95",
abstract = "In this article, learning is studied in in situ
applications that involve sensors. The main questions
are how to conceptualize experiential learning
involving sensors and what kinds of learning
applications using sensors already exist or could be
designed. It is claimed that experiential learning,
context information and sensor data supports twenty
first century learning. The concepts of context,
technology-mediated experiences, shared felt
experiences and experiential learning theory will be
used to describe a framework for sensor-based mobile
learning environments. Several scenarios and case
examples using sensors and sensor data will be
presented, and they will be analyzed using the
framework. Finally, the article contributes to the
discussion concerning the role of technology-mediated
learning experiences and collective sensor data in
developing twenty first century learning by
characterizing what kinds of skills and competences are
supported in learning situations that involve
sensors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Scholz:2013:CSF,
author = "Markus Scholz and Dawud Gordon and Leonardo Ramirez
and Stephan Sigg and Tobias Dyrks and Michael Beigl",
title = "A Concept for Support of Firefighter Frontline
Communication",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "113--127",
day = "16",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/113",
abstract = "In an indoor firefighter mission, coordination and
communication support are of the utmost importance. We
present our experience from over five years of research
with current firefighter support technology. In
contrast to some large scale emergency response
research, our work is focused on the frontline
interaction between teams of firefighters and the
incident commander on a single site. In this paper we
investigate the flaws in firefighter communication
systems. Frequent technical failures and the high
cognitive costs incurred by communicating impede
coordination. We then extract a list of requirements
for an assistant emergency management technology from
expert interviews. Thirdly, we provide a system concept
and explore challenges for building a novel firefighter
support system based on our previous work. The system
has three key features: robust ad-hoc network,
telemetry and text messaging, as well as implicit
interaction. The result would provide a complementary
mode of communication in addition to the current
trunked radio.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Gelenbe:2013:EQT,
author = "Erol Gelenbe and Ricardo Lent",
title = "Energy-{QoS} Trade-Offs in Mobile Service Selection",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "128--139",
day = "19",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/128",
abstract = "An attractive advantage of mobile networks is that
their users can gain easy access to different services.
In some cases, equivalent services could be fulfilled
by different providers, which brings the question of
how to rationally select the best provider among all
possibilities. In this paper, we investigate an answer
to this question from both quality-of-service (QoS) and
energy perspectives by formulating an optimisation
problem. We illustrate the theoretical results with
examples from experimental measurements of the
resulting energy and performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing Quality-of-Service and Security
in Mobile Heterogeneous Environments.",
}
@Article{Uto:2013:MRI,
author = "Nelson Uto",
title = "A Methodology for Retrieving Information from Malware
Encrypted Output Files: {Brazilian} Case Studies",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "140--167",
day = "25",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/140",
abstract = "This article presents and explains a methodology based
on cryptanalytic and reverse engineering techniques
that can be employed to quickly recover information
from encrypted files generated by malware. The
objective of the methodology is to minimize the effort
with static and dynamic analysis, by using
cryptanalysis and related knowledge as much as
possible. In order to illustrate how it works, we
present three case studies, taken from a big Brazilian
company that was victimized by directed attacks focused
on stealing information from a special purpose hardware
they use in their environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security of Systems and Software
Resiliency.",
}
@Article{Kolding:2013:QSP,
author = "Troels Kolding and Pawel Ochal and Niels Terp
Kjeldgaard J{\o}rgensen and Klaus Pedersen",
title = "{QoS} Self-Provisioning and Interference Management
for Co-Channel Deployed {3G} Femtocells",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "168--189",
day = "02",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/168",
abstract = "A highly efficient self-provisioning interference
management scheme is derived for 3G Home Node-Bs (HNB).
The proposed scheme comprises self-adjustment of the
HNB transmission parameters to meet the targeted QoS
(quality of service) requirements in terms of downlink
and uplink guaranteed minimum throughput and coverage.
This objective is achieved by means of an autonomous
HNB solution, where the transmit power of pilot and
data are adjusted separately, while also controlling
the uplink interference pollution towards the
macro-layer. The proposed scheme is evaluated by means
of extensive system level simulations and the results
show significant performance improvements in terms of
user throughput outage probability, power efficiency,
femtocell coverage, and impact on macro-layer
performance as compared to prior art baseline
techniques. The paper is concluded by also showing
corresponding measurements from live 3G high-speed
packet access (HSPA) HNB field-trials, confirming the
validity of major simulation results and assumptions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing Quality-of-Service and Security
in Mobile Heterogeneous Environments.",
}
@Article{Soderstrom:2013:DDY,
author = "Sylvia S{\"o}derstr{\"o}m",
title = "Digital Differentiation in Young People's {Internet}
Use --- Eliminating or Reproducing Disability
Stereotypes",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "190--204",
day = "07",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/190",
abstract = "Norwegian authorities' policy aims at securing an
information society for all, emphasizing the importance
of accessible and usable Information and Communication
Technology (ICT) for everyone. While the body of
research on young people's use of ICT is quite
comprehensive, research addressing digital
differentiation in young people with disabilities' use
of ICT is still in its early days. This article
investigates how young people with disabilities' use,
or non-use, of assistive ICT creates digital
differentiations. The investigation elaborates on how
the anticipations and stereotypes of disability
establish an authoritative definition of assistive ICT,
and the consequence this creates for the use of the Web
by young people with disabilities. The object of the
article is to provide enhanced insight into the field
of technology and disability by illuminating how
assistive ICT sometimes eliminates and sometimes
reproduces stereotypes and digital differentiations.
The investigation draws on a qualitative interview
study with 23 young Norwegians with disabilities, aged
15-20 years. I draw on a theoretical perspective to
analyze the findings of the study, which employs the
concept of identity multiplicity. The article's closing
discussion expands on technology's significance in
young people's negotiations of impairment and of
perceptions of disability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Loukas:2013:RCT,
author = "George Loukas and Diane Gan and Tuan Vuong",
title = "A Review of Cyber Threats and Defence Approaches in
Emergency Management",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "205--236",
day = "07",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/205",
abstract = "Emergency planners, first responders and relief
workers increasingly rely on computational and
communication systems that support all aspects of
emergency management, from mitigation and preparedness
to response and recovery. Failure of these systems,
whether accidental or because of malicious action, can
have severe implications for emergency management.
Accidental failures have been extensively documented in
the past and significant effort has been put into the
development and introduction of more resilient
technologies. At the same time researchers have been
raising concerns about the potential of cyber attacks
to cause physical disasters or to maximise the impact
of one by intentionally impeding the work of the
emergency services. Here, we provide a review of
current research on the cyber threats to communication,
sensing, information management and vehicular
technologies used in emergency management. We emphasise
on open issues for research, which are the cyber
threats that have the potential to affect emergency
management severely and for which solutions have not
yet been proposed in the literature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Ober:2013:SAB,
author = "Micha Ober and Stefan Katzenbeisser and Kay Hamacher",
title = "Structure and Anonymity of the {Bitcoin} Transaction
Graph",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "237--250",
day = "07",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/237",
abstract = "The Bitcoin network of decentralized payment
transactions has attracted a lot of attention from both
Internet users and researchers in recent years. Bitcoin
utilizes a peer-to-peer network to issue anonymous
payment transactions between different users. In the
currently used Bitcoin clients, the full transaction
history is available at each node of the network to
prevent double spending without the need for a central
authority, forming a valuable source for empirical
research on network structure, network dynamics, and
the implied anonymity challenges, as well as guidance
on the future evolution of complex payment systems. We
found dynamical effects of which some increase
anonymity while others decrease it. Most importantly,
several parameters of the Bitcoin transaction graph
seem to have become stationary over the last 12-18
months. We discuss the implications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Cash: Design and Impacts.",
}
@Article{West:2013:REO,
author = "Rebecca J. West and Bhoomi K. Thakore",
title = "Racial Exclusion in the Online World",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "251--267",
day = "24",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020251",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/251",
abstract = "As the internet has become an integral part of
everyday life, it is understood that patterns of racial
stereotyping and discrimination found in the offline
world are often reproduced online. In our paper, we
examine two exclusionary practices in an online
environment for adult toy collectors: First, the
exclusion of non-white individuals who are expected to
form immediate friendships with other non-white
members; and second, the essentializing of racial
issues when concerns over the lack of racial diversity
in the toys are discussed. This dismissal is often
directly connected to non-white members' decisions to
no longer participate, resulting in a new form of
segregation within virtual space.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Sakellari:2013:ITB,
author = "Georgia Sakellari and Christina Morfopoulou and Erol
Gelenbe",
title = "Investigating the Tradeoffs between Power Consumption
and Quality of Service in a Backbone Network",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "268--281",
day = "24",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020268",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/268",
abstract = "Energy saving in networks has traditionally focussed
on reducing battery consumption through smart wireless
network design. Recently, researchers have turned their
attention to the energy cost and carbon emissions of
the backbone network that both fixed and mobile
communications depend on, proposing primarily
mechanisms that turn equipments OFF or put them into
deep sleep. This is an effective way of saving energy,
provided that the nodes can return to working condition
quickly, but it introduces increased delays and packet
losses that directly affect the quality of
communication experienced by the users. Here we
investigate the associated tradeoffs between power
consumption and quality of service in backbone networks
that employ deep sleep energy savings. We examine these
tradeoffs by conducting experiments on a real PC-based
network topology, where nodes are put into deep sleep
at random times and intervals, resulting in a
continuously changing network with reduced total power
consumption. The average power consumption, the packet
loss and the average delay of this network are examined
with respect to the average value of the ON rate and
the ON/OFF cycle of the nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing Quality-of-Service and Security
in Mobile Heterogeneous Environments.",
}
@Article{Neis:2013:CVG,
author = "Pascal Neis and Dennis Zielstra and Alexander Zipf",
title = "Comparison of Volunteered Geographic Information Data
Contributions and Community Development for Selected
World Regions",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "282--300",
day = "03",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/282",
abstract = "Volunteered Geographic Information (VGI) projects and
their crowdsourced data have been the focus of a number
of scientific analyses and investigations in recent
years. Oftentimes the results show that the
collaboratively collected geodata of one of the most
popular VGI projects, OpenStreetMap (OSM), provides
good coverage in urban areas when considering
particular completeness factors. However, results can
potentially vary significantly for different world
regions. In this article, we conduct an analysis to
determine similarities and differences in data
contributions and community development in OSM between
12 selected urban areas of the world. Our findings
showed significantly different results in data
collection efforts and local OSM community sizes.
European cities provide quantitatively larger amounts
of geodata and number of contributors in OSM, resulting
in a better representation of the real world in the
dataset. Although the number of volunteers does not
necessarily correlate with the general population
density of the urban areas, similarities could be
detected while comparing the percentage of different
contributor groups and the number of changes they made
to the OSM project. Further analyses show that
socio-economic factors, such as income, can have an
impact on the number of active contributors and the
data provided in the analyzed areas. Furthermore, the
results showed significant data contributions by
members whose main territory of interest lies more than
one thousand kilometers from the tested areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marganski:2013:VRV,
author = "Alison Marganski",
title = "Virtual Relationship Violence and Perspectives on
Punishment: Do Gender or Nationality Matter?",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "301--316",
day = "26",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030301",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/301",
abstract = "Given the increasingly popular use of socially
interactive technology (SIT), it is believed that the
way in which individuals communicate and experience
relationships has drastically been changing. For those
who partake in this electronic world, damaging
behaviors akin to those found in the real world have
emerged. Yet, we know little about the extent of these
behaviors in the context of romantic relationships,
especially from a gender or cultural standpoint.
Research on dating violence generally indicates that
women experience in-person victimization at higher
rates than men, although some research has called this
into question. It also suggests that some national
groups experience higher rates of violence than others.
However, research is almost non-existent when it comes
to exploring violence in the digital world. This study
investigated gender and nationality in (1) the nature
and extent of socially interactive intimate violence,
and (2) perceptions of the seriousness of virtual
relationship violence. Using a sample of students from
the United States and Poland, findings revealed that
socially interactive technology may serve as a new
avenue for aggressing against partners, as virtual
relationship violence was not uncommon and reflected
some patterns present in the real world. Some
unexpected patterns also emerged. The results of this
research signal a possible transferability of covert
intimate violence and highlight ways in which
inequalities may exist in our virtual worlds.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Imadali:2013:ESS,
author = "Sofiane Imadali and Athanasia Karanasiou and Alexandru
Petrescu and Ioannis Sifniadis and Eleftheria Velidou
and V{\'e}ronique V{\`e}que and Pantelis Angelidis",
title = "{eHealth} Service Support in Future {IPv6} Vehicular
Networks",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "317--335",
day = "27",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030317",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/317",
abstract = "Recent vehicular networking activities include novel
automotive applications, such as public vehicle to
vehicle/infrastructure (V2X), large scale deployments,
machine-to-machine (M2M) integration scenarios, and
more. The platform described in this paper focuses on
the integration of eHealth in a V2I setting. This is to
allow the use of Internet from a vehicular setting to
disseminate health-related information. From an eHealth
viewpoint, the use of remote healthcare solutions to
record and transmit a patient's vital signs is a
special telemedicine application that helps hospital
resident health professionals to optimally prepare the
patient's admittance. From the automotive perspective,
this is a typical vehicle-to-infrastructure (V2I)
communication scenario. This proposal provides an IPv6
vehicular platform, which integrates eHealth devices
and allows sending captured health-related data to a
personal health record (PHR) application server in the
IPv6 Internet. The collected data is viewed remotely by
a doctor and supports his diagnostic decision. In
particular, our work introduces the integration of
vehicular and eHealth testbeds, describes related work
and presents a lightweight auto-configuration method
based on a DHCPv6 extension to provide IPv6
connectivity with a few numbers of messages.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Gelenbe:2013:FRC,
author = "Erol Gelenbe and Fang-Jing Wu",
title = "Future Research on Cyber-Physical Emergency Management
Systems",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "336--354",
day = "27",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030336",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/336",
abstract = "Cyber-physical systems that include human beings and
vehicles in a built environment, such as a building or
a city, together with sensor networks and decision
support systems have attracted much attention. In
emergencies, which also include mobile searchers and
rescuers, the interactions among civilians and the
environment become much more diverse, and the
complexity of the emergency response also becomes much
greater. This paper surveys current research on
sensor-assisted evacuation and rescue systems and
discusses the related research issues concerning
communication protocols for sensor networks, as well as
several other important issues, such as the integrated
asynchronous control of large-scale emergency response
systems, knowledge discovery for rescue and prototyping
platforms. Then, we suggest directions for further
research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Kotenko:2013:DIH,
author = "Igor Kotenko and Olga Polubelova and Andrey Chechulin
and Igor Saenko",
title = "Design and Implementation of a Hybrid
Ontological-Relational Data Repository for {SIEM}
Systems",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "355--375",
day = "09",
month = jul,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030355",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/355",
abstract = "The technology of Security Information and Event
Management (SIEM) becomes one of the most important
research applications in the area of computer network
security. The overall functionality of SIEM systems
depends largely on the quality of solutions implemented
at the data storage level, which is purposed for the
representation of heterogeneous security events, their
storage in the data repository, and the extraction of
relevant data for analytical modules of SIEM systems.
The paper discusses the key issues of design and
implementation of a hybrid SIEM data repository, which
combines relational and ontological data
representations. Based on the analysis of existing SIEM
systems and standards, the ontological approach is
chosen as a core component of the repository, and an
example of the ontological data model for
vulnerabilities representation is outlined. The hybrid
architecture of the repository is proposed for
implementation in SIEM systems. Since the most of works
on the repositories of SIEM systems is based on the
relational data model, the paper focuses mainly on the
ontological part of the hybrid approach. To test the
repository we used the data model intended for attack
modeling and security evaluation, which includes both
ontological and relational dimensions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security of Systems and Software
Resiliency.",
}
@Article{Chadwick:2013:IAP,
author = "Darren Chadwick and Caroline Wesson and Chris
Fullwood",
title = "{Internet} Access by People with Intellectual
Disabilities: Inequalities and Opportunities",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "376--397",
day = "17",
month = jul,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030376",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/376",
abstract = "This review gives an overview of the societal
inequalities faced by people with intellectual
disabilities, before focusing specifically on
challenges people face accessing the Internet. Current
access will be outlined along with the societal,
support and attitudinal factors that can hinder access.
Discussion of carer views of Internet use by people
with intellectual disabilities will be covered
incorporating consideration of the tension between
protection, self-determination and lifestyle issues and
gaining Internet access. We will address how impairment
related factors may impede access and subsequently
discuss how supports may be used to obfuscate
impairments and facilitate access. We will move on from
this to critically describe some of the potential
benefits the Internet could provide to people with
intellectual disabilities, including the potential for
self-expression, advocacy and developing friendships.
Finally, strategies to better include people with
intellectual disabilities online will be given along
with future research suggestions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Busanelli:2013:CNI,
author = "Stefano Busanelli and Filippo Rebecchi and Marco
Picone and Nicola Iotti and Gianluigi Ferrari",
title = "Cross-Network Information Dissemination in Vehicular
Ad hoc Networks {(VANETs)}: Experimental Results from a
{Smartphone}-Based Testbed",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "398--428",
day = "05",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030398",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/398",
abstract = "In this work, we present an innovative approach for
effective cross-network information dissemination, with
applications to vehicular ad hoc networks (VANETs). The
proposed approach, denoted as ``Cross-Network Effective
Traffic Alert Dissemination'' (X-NETAD), leverages on
the spontaneous formation of local WiFi (IEEE 802.11b)
VANETs, with direct connections between neighboring
vehicles, in order to disseminate, very quickly and
inexpensively, traffic alerts received from the
cellular network. The proposed communication
architecture has been implemented on Android
smartphones. The obtained experimental results show
that an effective cross-network information
dissemination service can entirely rely on
smartphone-based communications. This paves the way to
future Internet architectures, where vehicles will play
a key role as information destinations and sources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Teets:2013:LRC,
author = "Michael Teets and Matthew Goldner",
title = "Libraries' Role in Curating and Exposing Big Data",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "429--438",
day = "20",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030429",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/429",
abstract = "This article examines how one data hub is working to
become a relevant and useful source in the Web of big
data and cloud computing. The focus is on OCLC's
WorldCat database of global library holdings and
includes work by other library organizations to expose
their data using big data concepts and standards.
Explanation is given of how OCLC has begun work on the
knowledge graph for this data and its active
involvement with Schema.org in working to make this
data useful throughout the Web.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Server Technologies in Cloud Computing
and Big Data.",
}
@Article{Gupta:2013:PLN,
author = "Smrati Gupta and M. A. V{\'a}zquez-Castro",
title = "Physical Layer Network Coding Based on Integer Forcing
Precoded Compute and Forward",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "439--459",
day = "28",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030439",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/439",
abstract = "In this paper, we address the implementation of
physical layer network coding (PNC) based on compute
and forward (CF) in relay networks. It is known that
the maximum achievable rates in CF-based transmission
is limited due to the channel approximations at the
relay. In this work, we propose the integer forcing
precoder (IFP), which bypasses this maximum rate
achievability limitation. Our precoder requires channel
state information (CSI) at the transmitter, but only
that of the channel between the transmitter and the
relay, which is a feasible assumption. The overall
contributions of this paper are three-fold. Firstly, we
propose an implementation of CF using IFP and prove
that this implementation achieves higher rates as
compared to traditional relaying schemes. Further, the
probability of error from the proposed scheme is shown
to have up to 2 dB of gain over the existent lattice
network coding-based implementation of CF. Secondly, we
analyze the two phases of transmission in the CF
scheme, thereby characterizing the end-to-end behavior
of the CF and not only one-phase behavior, as in
previous proposals. Finally, we develop decoders for
both the relay and the destination. We use a
generalization of Bezout's theorem to justify the
construction of these decoders. Further, we make an
analytical derivation of the end-to-end probability of
error for cubic lattices using the proposed scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Mantere:2013:NTF,
author = "Matti Mantere and Mirko Sailio and Sami Noponen",
title = "Network Traffic Features for Anomaly Detection in
Specific Industrial Control System Network",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "460--473",
day = "25",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040460",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/460",
abstract = "The deterministic and restricted nature of industrial
control system networks sets them apart from more open
networks, such as local area networks in office
environments. This improves the usability of network
security, monitoring approaches that would be less
feasible in more open environments. One of such
approaches is machine learning based anomaly detection.
Without proper customization for the special
requirements of the industrial control system network
environment, many existing anomaly or misuse detection
systems will perform sub-optimally. A machine learning
based approach could reduce the amount of manual
customization required for different industrial control
system networks. In this paper we analyze a possible
set of features to be used in a machine learning based
anomaly detection system in the real world industrial
control system network environment under investigation.
The network under investigation is represented by
architectural drawing and results derived from network
trace analysis. The network trace is captured from a
live running industrial process control network and
includes both control data and the data flowing between
the control network and the office network. We limit
the investigation to the IP traffic in the traces.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security of Systems and Software
Resiliency.",
}
@Article{Ogul:2013:PAM,
author = "Murat Ogul and Sel{\c{c}}uk Baktir",
title = "Practical Attacks on Mobile Cellular Networks and
Possible Countermeasures",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "474--489",
day = "30",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040474",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/474",
abstract = "Due to widespread adoption of mobile communications
devices and increasingly high throughput capacity of
cellular networks, Third-Generation (3G) and Long Term
Evolution (LTE) are becoming ever more popular.
Millions of smart phones with 3G capabilities are sold
every year and used for mostly browsing the Internet.
Hence, mobile operators have been heavily investing in
their packet switched networks to meet customer demand
and stay ahead in the market. The widespread use of
broadband mobile Internet bring along also some IP
based threats such as the Denial of Service (DoS)
attacks, botnets and malwares. In this paper, we
performed DoS and flooding attacks on 3G mobile
networks and measured their effect on the most critical
elements of a network such as the Radio Network
Controller (RNC) and the Serving GPRS Support Node
(SGSN) devices. We carried out our experiments on a
real mobile network, not just a simulation environment,
and hence our findings depict a realistic picture of
the vulnerabilities existent in 3G mobile networks. We
propose alternative solutions to avoid these
vulnerabilities and mitigate the issues raised.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ziaimatin:2013:STD,
author = "Hasti Ziaimatin and Tudor Groza and Jane Hunter",
title = "Semantic and Time-Dependent Expertise Profiling Models
in Community-Driven Knowledge Curation Platforms",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "490--514",
day = "11",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040490",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/490",
abstract = "Online collaboration and web-based knowledge sharing
have gained momentum as major components of the Web 2.0
movement. Consequently, knowledge embedded in such
platforms is no longer static and continuously evolves
through experts' micro-contributions. Traditional
Information Retrieval and Social Network Analysis
techniques take a document-centric approach to
expertise modeling by creating a macro-perspective of
knowledge embedded in large corpus of static documents.
However, as knowledge in collaboration platforms
changes dynamically, the traditional macro-perspective
is insufficient for tracking the evolution of knowledge
and expertise. Hence, Expertise Profiling is presented
with major challenges in the context of dynamic and
evolving knowledge. In our previous study, we proposed
a comprehensive, domain-independent model for expertise
profiling in the context of evolving knowledge. In this
paper, we incorporate Language Modeling into our
methodology to enhance the accuracy of resulting
profiles. Evaluation results indicate a significant
improvement in the accuracy of profiles generated by
this approach. In addition, we present our profile
visualization tool, Profile Explorer, which serves as a
paradigm for exploring and analyzing time-dependent
expertise profiles in knowledge-bases where content
evolves overtime. Profile Explorer facilitates
comparative analysis of evolving expertise, independent
of the domain and the methodology used in creating
profiles.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Han:2013:MEO,
author = "Qing Han",
title = "Managing Emergencies Optimally Using a Random Neural
Network-Based Algorithm",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "515--534",
day = "16",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040515",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/515",
abstract = "Emergency rescues require that first responders
provide support to evacuate injured and other civilians
who are obstructed by the hazards. In this case, the
emergency personnel can take actions strategically in
order to rescue people maximally, efficiently and
quickly. The paper studies the effectiveness of a
random neural network (RNN)-based task assignment
algorithm involving optimally matching emergency
personnel and injured civilians, so that the emergency
personnel can aid trapped people to move towards
evacuation exits in real-time. The evaluations are run
on a decision support evacuation system using the
Distributed Building Evacuation Simulator (DBES)
multi-agent platform in various emergency scenarios.
The simulation results indicate that the RNN-based task
assignment algorithm provides a near-optimal solution
to resource allocation problems, which avoids resource
wastage and improves the efficiency of the emergency
rescue process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2013:SSV,
author = "Jun Steed Huang and Oliver Yang and Funmilyo Lawal",
title = "Sending Safety Video over {WiMAX} in Vehicle
Communications",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "535--567",
day = "31",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040535",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/535",
abstract = "This paper reports on the design of an OPNET
simulation platform to test the performance of sending
real-time safety video over VANET (Vehicular Adhoc
NETwork) using the WiMAX technology. To provide a more
realistic environment for streaming real-time video, a
video model was created based on the study of video
traffic traces captured from a realistic vehicular
camera, and different design considerations were taken
into account. A practical controller over real-time
streaming protocol is implemented to control data
traffic congestion for future road safety development.
Our driving video model was then integrated with the
WiMAX OPNET model along with a mobility model based on
real road maps. Using this simulation platform,
different mobility cases have been studied and the
performance evaluated in terms of end-to-end delay,
jitter and visual experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Jang:2013:CIS,
author = "S. Mo Jang and Yong Jin Park",
title = "The Citizen as Issue Specialists in a Changing Media
Environment",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "568--579",
day = "13",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040568",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/568",
abstract = "Although recent research suggests that the selective
nature of new media helps foster issue specialists,
little empirical evidence has been documented, mostly
due to theoretical and methodological limitations.
Extending the concept of issue publics, the present
study proposes a method to estimate the degree to which
an individual is a specialist- or a generalist-type
citizen. Applying the method to the 2008 American
National Election Studies data, the study reveals
various characteristics of specialists and generalists.
The results indicate that specialist-type citizens are
positively associated with online news use, but
negatively associated with conventional news media,
such as television, newspaper, and radio. The
implications of the growth of specialists as well as
the validity of the proposed method are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Graham:2013:ISI,
author = "Roderick Graham",
title = "Introduction to the Special Issue on Inequality in the
Digital Environment",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "580--584",
day = "26",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040580",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/580",
abstract = "The purpose of this special issue is to explore social
inequalities in the digital environment. The motivation
for this issue is derived from the disproportionate
focus on technological and economic aspects of the
Information Society to the detriment of sociological
and cultural aspects. The research presented here falls
along three dimensions of inequality. Two papers
explore the ways that race orders interaction online. A
second pair of papers explores the experiences of
technology users with physical and mental disabilities.
A final paper looks at gender, and the higher rates of
intimate partner violence experienced by women online.
Taken as a whole, these five papers highlight some of
the ways that the digital environment can reproduce or
mitigate inequalities that have been molded and
routinized in the physical environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Pileggi:2013:ASG,
author = "Salvatore F. Pileggi and Robert Amor",
title = "Addressing Semantic Geographic Information Systems",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "585--590",
day = "26",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040585",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/585",
abstract = "The progressive consolidation of information
technologies on a large scale has been facilitating and
progressively increasing the production, collection,
and diffusion of geographic data, as well as
facilitating the integration of a large amount of
external information into geographic information
systems (GIS). Traditional GIS is transforming into a
consolidated information infrastructure. This
consolidated infrastructure is affecting more and more
aspects of internet computing and services. Most
popular systems (such as social networks, GPS, and
decision support systems) involve complex GIS and
significant amounts of information. As a web service,
GIS is affected by exactly the same problems that
affect the web as a whole. Therefore, next generation
GIS solutions have to address further methodological
and data engineering challenges in order to accommodate
new applications' extended requirements (in terms of
scale, interoperability, and complexity). The
conceptual and semantic modeling of GIS, as well as the
integration of semantics into current GIS, provide
highly expressive environments that are capable of
meeting the needs and requirements of a wide range of
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Geographic Information System
(Semantic GIS).",
}
@Article{Jeong:2013:FAA,
author = "Sooman Jeong and Kisung Lee and Jungwoo Hwang and
Seongjin Lee and Youjip Won",
title = "Framework for Analyzing {Android} {I/O} Stack
Behavior: From Generating the Workload to Analyzing the
Trace",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "591--610",
day = "13",
month = dec,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040591",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/591",
abstract = "Abstract: The existing I/O workload generators and
trace capturing tools are not adaptable to generating
nor capturing the I/O requests of Android apps. The
Android platform needs proper tools to capture and
replay real world workload in the Android platform to
verify the result of benchmark tools. This paper
introduces Android Storage Performance Analysis Tool,
AndroStep, which is specifically designed for
characterizing and analyzing the behavior of the I/O
subsystem in Android based devices. The AndroStep
consists of Mobibench (workload generator), MOST
(Mobile Storage Analyzer), and Mobigen (workload
replayer). Mobibench is an Android app that generates a
filesystem as well as SQLite database operations.
Mobibench can also vary the number of concurrent
threads to examining the filesystem scalability to
support concurrency, e.g., metadata updates, journal
file creation/deletion. MOST captures the trace and
extracts key filesystem access characteristics such as
access pattern with respect to file types, ratio
between random vs. sequential access, ratio between
buffered vs. synchronous I/O, fraction of metadata
accesses, etc. MOST implements reverse mapping feature
(finding an inode for a given block) and retrospective
reverse mapping (finding an inode for a deleted file).
Mobigen is a trace capturing and replaying tool that is
specifically designed to perform the user experiment
without actual human intervention. Mobigen records the
system calls generated from the user behavior and
sanitizes the trace for replayable form. Mobigen can
replay this trace on different Android platforms or
with different I/O stack configurations. As an example
of using AndroStep, we analyzed the performances of
twelve Android smartphones and the SQLite performances
on five different filesystems. AndroStep makes
otherwise time consuming I/O stack analysis extremely
versatile. AndroStep makes a significant contribution
in terms of shedding light on internal behavior of the
Android I/O stack.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Mobile Engineering.",
}
@Article{Wan:2013:LEC,
author = "Liangtian Wan and Lutao Liu and Guangjie Han and Joel
J. P. C. Rodrigues",
title = "A Low Energy Consumption {DOA} Estimation Approach for
Conformal Array in Ultra-Wideband",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "611--630",
day = "16",
month = dec,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040611",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/611",
abstract = "Most direction-of-arrival (DOA) estimation approaches
for conformal array suffer from high computational
complexity, which cause high energy loss for the
direction finding system. Thus, a low energy
consumption DOA estimation algorithm for conformal
array antenna is proposed in this paper. The arbitrary
baseline direction finding algorithm is extended to
estimate DOA for a conformal array in ultra-wideband.
The rotation comparison method is adopted to solve the
ambiguity of direction finding. The virtual baseline
approach is used to construct the virtual elements.
Theoretically, the virtual elements can be extended in
the space flexibility. Four elements (both actual and
virtual elements) can be used to obtain a group of
solutions. The space angle estimation can be obtained
by using sub-array divided technique and matrix
inversion method. The stability of the proposed
algorithm can be guaranteed by averaging the angles
obtained by different sub-arrays. Finally, the
simulation results verify the effectiveness of the
proposed method with high DOA estimation accuracy and
relatively low computational complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Green Communications and Networking.",
}
@Article{Hermann:2014:CIP,
author = "Steffen Hermann and Benjamin Fabian",
title = "A Comparison of {Internet} Protocol {(IPv6)} Security
Guidelines",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "1--60",
day = "10",
month = jan,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/1",
abstract = "The next generation of the Internet Protocol (IPv6) is
currently about to be introduced in many organizations.
However, its security features are still a very novel
area of expertise for many practitioners. This study
evaluates guidelines for secure deployment of IPv6,
published by the U.S. NIST and the German federal
agency BSI, for topicality, completeness and depth. The
later two are scores defined in this paper and are
based on the Requests for Comments relevant for IPv6
that were categorized, weighted and ranked for
importance using an expert survey. Both guides turn out
to be of practical value, but have a specific focus and
are directed towards different audiences. Moreover,
recommendations for possible improvements are
presented. Our results could also support strategic
management decisions on security priorities as well as
for the choice of security guidelines for IPv6
roll-outs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Branchi:2014:AMS,
author = "Pablo E. Branchi and Carlos Fern{\'a}ndez-Valdivielso
and Ignacio R. Matias",
title = "Analysis Matrix for Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "61--75",
day = "22",
month = jan,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/61",
abstract = "The current digital revolution has ignited the
evolution of communications grids and the development
of new schemes for productive systems. Traditional
technologic scenarios have been challenged, and Smart
Cities have become the basis for urban competitiveness.
The citizen is the one who has the power to set new
scenarios, and that is why a definition of the way
people interact with their cities is needed, as is
commented in the first part of the article. At the same
time, a lack of clarity has been detected in the way of
describing what Smart Cities are, and the second part
will try to set the basis for that. For all before, the
information and communication technologies that manage
and transform 21st century cities must be reviewed,
analyzing their impact on new social behaviors that
shape the spaces and means of communication, as is
posed in the experimental section, setting the basis
for an analysis matrix to score the different elements
that affect a Smart City environment. So, as the better
way to evaluate what a Smart City is, there is a need
for a tool to score the different technologies on the
basis of their usefulness and consequences, considering
the impact of each application. For all of that, the
final section describes the main objective of this
article in practical scenarios, considering how the
technologies are used by citizens, who must be the main
concern of all urban development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Neis:2014:RDF,
author = "Pascal Neis and Dennis Zielstra",
title = "Recent Developments and Future Trends in Volunteered
Geographic Information Research: The Case of
{OpenStreetMap}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "76--106",
day = "27",
month = jan,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/76",
abstract = "User-generated content (UGC) platforms on the Internet
have experienced a steep increase in data contributions
in recent years. The ubiquitous usage of
location-enabled devices, such as smartphones, allows
contributors to share their geographic information on a
number of selected online portals. The collected
information is oftentimes referred to as volunteered
geographic information (VGI). One of the most utilized,
analyzed and cited VGI-platforms, with an increasing
popularity over the past few years, is OpenStreetMap
(OSM), whose main goal it is to create a freely
available geographic database of the world. This paper
presents a comprehensive overview of the latest
developments in VGI research, focusing on its
collaboratively collected geodata and corresponding
contributor patterns. Additionally, trends in the realm
of OSM research are discussed, highlighting which
aspects need to be investigated more closely in the
near future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Office:2014:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of Future {Internet} in
2013",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "107--108",
day = "24",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/107",
abstract = "The term ``crowdsourcing'' was initially introduced by
Howe in his article ``The Rise of Crowdsourcing'' [1].
During the last few years, crowdsourcing has become
popular among companies, institutions and universities,
as a crowd-centered modern ``tool'' for problem
solving. Crowdsourcing is mainly based on the idea of
an open-call publication of a problem, requesting the
response of the crowd for reaching the most appropriate
solution. The focus of this paper is on the role of
crowdsourcing in knowledge acquisition for planning
applications. The first part provides an introduction
to the origins of crowdsourcing in knowledge
generation. The second part elaborates on the concept
of crowdsourcing, while some indicative platforms
supporting the development of crowdsourcing
applications are also described. The third part focuses
on the integration of crowdsourcing with certain web
technologies and GIS (Geographic Information Systems),
for spatial planning applications, while in the fourth
part, a general framework of the rationale behind
crowdsourcing applications is presented. Finally, the
fifth part focuses on a range of case studies that
adopted several crowdsourcing techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papadopoulou:2014:CTK,
author = "Chrysaida-Aliki Papadopoulou and Maria Giaoutzi",
title = "Crowdsourcing as a Tool for Knowledge Acquisition in
Spatial Planning",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "109--125",
day = "05",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/109",
abstract = "The term ``crowdsourcing'' was initially introduced by
Howe in his article ``The Rise of Crowdsourcing'' [1].
During the last few years, crowdsourcing has become
popular among companies, institutions and universities,
as a crowd-centered modern ``tool'' for problem
solving. Crowdsourcing is mainly based on the idea of
an open-call publication of a problem, requesting the
response of the crowd for reaching the most appropriate
solution. The focus of this paper is on the role of
crowdsourcing in knowledge acquisition for planning
applications. The first part provides an introduction
to the origins of crowdsourcing in knowledge
generation. The second part elaborates on the concept
of crowdsourcing, while some indicative platforms
supporting the development of crowdsourcing
applications are also described. The third part focuses
on the integration of crowdsourcing with certain web
technologies and GIS (Geographic Information Systems),
for spatial planning applications, while in the fourth
part, a general framework of the rationale behind
crowdsourcing applications is presented. Finally, the
fifth part focuses on a range of case studies that
adopted several crowdsourcing techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Trinugroho:2014:IIP,
author = "Yohanes Baptista Dafferianto Trinugroho",
title = "Information Integration Platform for Patient-Centric
Healthcare Services: Design, Prototype and
Dependability Aspects",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "126--154",
day = "06",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/126",
abstract = "Technology innovations have pushed today's healthcare
sector to an unprecedented new level. Various portable
and wearable medical and fitness devices are being sold
in the consumer market to provide the self-empowerment
of a healthier lifestyle to society. Many vendors
provide additional cloud-based services for devices
they manufacture, enabling the users to visualize,
store and share the gathered information through the
Internet. However, most of these services are
integrated with the devices in a closed ``silo''
manner, where the devices can only be used with the
provided services. To tackle this issue, an information
integration platform (IIP) has been developed to
support communications between devices and
Internet-based services in an event-driven fashion by
adopting service-oriented architecture (SOA) principles
and a publish/subscribe messaging pattern. It follows
the ``Internet of Things'' (IoT) idea of connecting
everyday objects to various networks and to enable the
dissemination of the gathered information to the global
information space through the Internet. A
patient-centric healthcare service environment is
chosen as the target scenario for the deployment of the
platform, as this is a domain where IoT can have a
direct positive impact on quality of life enhancement.
This paper describes the developed platform, with
emphasis on dependability aspects, including
availability, scalability and security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Toward people aware IoT.",
}
@Article{Lan:2014:NDE,
author = "Xiaoyu Lan and Liangtian Wan and Guangjie Han and Joel
J. P. C. Rodrigues",
title = "A Novel {DOA} Estimation Algorithm Using Array
Rotation Technique",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "155--170",
day = "17",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/155",
abstract = "The performance of traditional direction of arrival
(DOA) estimation algorithm based on uniform circular
array (UCA) is constrained by the array aperture.
Furthermore, the array requires more antenna elements
than targets, which will increase the size and weight
of the device and cause higher energy loss. In order to
solve these issues, a novel low energy algorithm
utilizing array base-line rotation for multiple targets
estimation is proposed. By rotating two elements and
setting a fixed time delay, even the number of elements
is selected to form a virtual UCA. Then, the received
data of signals will be sampled at multiple positions,
which improves the array elements utilization greatly.
2D-DOA estimation of the rotation array is accomplished
via multiple signal classification (MUSIC) algorithms.
Finally, the Cramer-Rao bound (CRB) is derived and
simulation results verified the effectiveness of the
proposed algorithm with high resolution and estimation
accuracy performance. Besides, because of the
significant reduction of array elements number, the
array antennas system is much simpler and less complex
than traditional array.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Green Communications and Networking.",
}
@Article{Motoyoshi:2014:MTF,
author = "Gen Motoyoshi and Kenji Leibnitz and Masayuki Murata",
title = "Mobility Tolerant Firework Routing for Improving
Reachability in {MANETs}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "171--189",
day = "24",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/171",
abstract = "In this paper, we investigate our mobility-assisted
and adaptive broadcast routing mechanism, called
Mobility Tolerant Firework Routing (MTFR), which
utilizes the concept of potentials for routing and
improves node reachability, especially in situations
with high mobility, by including a broadcast mechanism.
We perform detailed evaluations by simulations in a
mobile environment and demonstrate the advantages of
MTFR over conventional potential-based routing. In
particular, we show that MTFR produces better
reachability in many aspects at the expense of a small
additional transmission delay and intermediate traffic
overhead, making MTFR a promising routing protocol and
feasible for future mobile Internet infrastructures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lallie:2014:PCM,
author = "Harjinder Singh Lallie",
title = "The Problems and Challenges of Managing Crowd Sourced
Audio-Visual Evidence",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "190--202",
day = "01",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/190",
abstract = "A number of recent incidents, such as the Stanley Cup
Riots, the uprisings in the Middle East and the London
riots have demonstrated the value of crowd sourced
audio-visual evidence wherein citizens submit
audio-visual footage captured on mobile phones and
other devices to aid governmental institutions,
responder agencies and law enforcement authorities to
confirm the authenticity of incidents and, in the case
of criminal activity, to identify perpetrators. The use
of such evidence can present a significant logistical
challenge to investigators, particularly because of the
potential size of data gathered through such mechanisms
and the added problems of time-lining disparate sources
of evidence and, subsequently, investigating the
incident(s). In this paper we explore this problem and,
in particular, outline the pressure points for an
investigator. We identify and explore a number of
particular problems related to the secure receipt of
the evidence, imaging, tagging and then time-lining the
evidence, and the problem of identifying duplicate and
near duplicate items of audio-visual evidence.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Contemporary and Future Digital
Forensics.",
}
@Article{Bi:2014:RDE,
author = "Huibo Bi",
title = "Routing Diverse Evacuees with the Cognitive Packet
Network Algorithm",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "203--222",
day = "17",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/203",
abstract = "Regarding mobility, health conditions and personal
preferences, evacuees can be categorized into different
classes in realistic environments. Previous emergency
navigation algorithms that direct evacuees with a
single decision rule cannot fulfil civilians' distinct
service requirements and increase the likelihood of
inducing destructive crowd behaviours, such as
clogging, pushing and trampling, due to diverse
mobility. This paper explores a distributed emergency
navigation algorithm that employs the cognitive packet
network concept to tailor different quality of service
needs to different categories of evacuees. In addition,
a congestion-aware algorithm is presented to predict
the future congestion degree of a path with respect to
the observed population density, arrival rate and
service rate of each route segment. Experiments are
implemented in a simulated environment populated with
autonomous agents. Results show that our algorithm can
increase the number of survivors while providing
improved quality of service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zoppi:2014:OAA,
author = "Corrado Zoppi and Sabrina Lai",
title = "An Ontology of the Appropriate Assessment of Municipal
Master Plans Related to {Sardinia} ({Italy})",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "223--241",
day = "23",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/223",
abstract = "This paper discusses some key points related to the
ontology of the ``appropriate assessment'' [1]
procedure concerning plans significantly affecting
Natura 2000 sites. We study this ontology by discussing
its implementation into the adjustment process of the
master plans of the regional municipalities of Sardinia
(Italy) to the Regional Landscape Plan (RLP) and put as
evidence some important general observations, coming
from the case study, concerning the utility and
effectiveness of the ontological conceptual framework
in order to help planners and decision-makers
understand and structure the assessment process of
plans.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Hare:2014:EMC,
author = "Jonathon S. Hare and David P. Dupplaw and Paul H.
Lewis and Wendy Hall and Kirk Martinez",
title = "Exploiting Multimedia in Creating and Analysing
Multimedia {Web} Archives",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "242--260",
day = "24",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/242",
abstract = "The data contained on the web and the social web are
inherently multimedia and consist of a mixture of
textual, visual and audio modalities. Community
memories embodied on the web and social web contain a
rich mixture of data from these modalities. In many
ways, the web is the greatest resource ever created by
human-kind. However, due to the dynamic and distributed
nature of the web, its content changes, appears and
disappears on a daily basis. Web archiving provides a
way of capturing snapshots of (parts of) the web for
preservation and future analysis. This paper provides
an overview of techniques we have developed within the
context of the EU funded ARCOMEM (ARchiving COmmunity
MEMories) project to allow multimedia web content to be
leveraged during the archival process and for
post-archival analysis. Through a set of use cases, we
explore several practical applications of multimedia
analytics within the realm of web archiving, web
archive analysis and multimedia data on the web in
general.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Latvakoski:2014:THA,
author = "Juhani Latvakoski and Mahdi {Ben Alaya} and Herve
Ganem and Bashar Jubeh and Antti Iivari and Jeremie
Leguay and Jaume Martin Bosch and Niclas Granqvist",
title = "Towards Horizontal Architecture for Autonomic {M2M}
Service Networks",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "261--301",
day = "06",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020261",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/261",
abstract = "Today, increasing number of industrial application
cases rely on the Machine to Machine (M2M) services
exposed from physical devices. Such M2M services enable
interaction of physical world with the core processes
of company information systems. However, there are
grand challenges related to complexity and ``vertical
silos'' limiting the M2M market scale and
interoperability. It is here expected that horizontal
approach for the system architecture is required for
solving these challenges. Therefore, a set of
architectural principles and key enablers for the
horizontal architecture have been specified in this
work. A selected set of key enablers called as
autonomic M2M manager, M2M service capabilities, M2M
messaging system, M2M gateways towards energy
constrained M2M asset devices and creation of trust to
enable end-to-end security for M2M applications have
been developed. The developed key enablers have been
evaluated separately in different scenarios dealing
with smart metering, car sharing and electric bike
experiments. The evaluation results shows that the
provided architectural principles, and developed key
enablers establish a solid ground for future research
and seem to enable communication between objects and
applications, which are not initially been designed to
communicate together. The aim as the next step in this
research is to create a combined experimental system to
evaluate the system interoperability and performance in
a more detailed manner.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Toward people aware IoT.",
}
@Article{Braun:2014:SDN,
author = "Wolfgang Braun and Michael Menth",
title = "Software-Defined Networking Using {OpenFlow}:
Protocols, Applications and Architectural Design
Choices",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "302--336",
day = "12",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020302",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/302",
abstract = "We explain the notion of software-defined networking
(SDN), whose southbound interface may be implemented by
the OpenFlow protocol. We describe the operation of
OpenFlow and summarize the features of specification
versions 1.0-1.4. We give an overview of existing
SDN-based applications grouped by topic areas. Finally,
we point out architectural design choices for SDN using
OpenFlow and discuss their performance implications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zafiropoulos:2014:SFG,
author = "Kostas Zafiropoulos and Konstantinos Antoniadis and
Vasiliki Vrana",
title = "Sharing Followers in e-Government {Twitter} Accounts:
The Case of {Greece}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "337--358",
day = "14",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020337",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/337",
abstract = "The recent emergence of e-government and online social
media offers opportunities for governments to meet the
demands and expectations of citizens, to provide
value-added services and overcome barriers of reduced
public budgets. Twitter is the most popular
microblogging platform that can facilitate interaction
and engagement. It is widely used by government
agencies, public affairs practitioners, non-government
organizations, members of Parliament and politicians.
The paper aims to explore the use of Twitter by
government agencies in Greece and record Twitter
followers' preferences regarding which accounts they
follow. The paper records 27 Greek e-government Twitter
accounts and their 107,107 followers. It uses a data
mining technique, association rules and two
multivariate statistical methods, multidimensional
scaling and cluster analysis and proposes the use of a
similarity measure, suitable for describing Twitter
account proximity. In this way, the paper locates
accounts that share followers. Groups of Twitter
accounts are located, and their common orientation is
described. The analysis not only describes Twitter
account similarities and group formation, but to some
extent, the followers' preferences and habits of
obtaining information through Twitter, as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Copeland:2014:UPV,
author = "Andrea Copeland",
title = "The Use of Personal Value Estimations to Select Images
for Preservation in Public Library Digital Community
Collections",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "359--377",
day = "27",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020359",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/359",
abstract = "A considerable amount of information, particularly in
image form, is shared on the web through social
networking sites. If any of this content is worthy of
preservation, who decides what is to be preserved and
based on what criteria. This paper explores the
potential for public libraries to assume this role of
community digital repositories through the creation of
digital collections. Thirty public library users and
thirty librarians were solicited from the Indianapolis
metropolitan area to evaluate five images selected from
Flickr in terms of their value to public library
digital collections and their worthiness of long-term
preservation. Using a seven-point Likert scale,
participants assigned a value to each image in terms of
its importance to self, family and society.
Participants were then asked to explain the reasoning
behind their valuations. Public library users and
librarians had similar value estimations of the images
in the study. This is perhaps the most significant
finding of the study, given the importance of
collaboration and forming partnerships for building and
sustaining community collections and archives.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Mearns:2014:TMS,
author = "Graeme Mearns and Rebecca Simmonds and Ranald
Richardson and Mark Turner and Paul Watson and Paolo
Missier",
title = "Tweet My Street: a Cross-Disciplinary Collaboration
for the Analysis of Local {Twitter} Data",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "378--396",
day = "27",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020378",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/378",
abstract = "Tweet My Street is a cross-disciplinary project
exploring the extent to which data derived from Twitter
can reveal more about spatial and temporal behaviours
and the meanings attached to these locally. This is
done with a longer-term view to supporting the
coproduction and delivery of local services, complaint
mechanisms and horizontal community support networks.
The project has involved the development of a web-based
software application capable of retrieving, storing and
visualising geo-located ``tweets'' (and associated
digital content) from Twitter's Firehose. This has been
piloted in Newcastle upon Tyne (UK) and has proven a
scalable tool that can aid the analysis of social media
data geographically. Beyond explaining efforts to
analyse pilot data via this software, this paper
elucidates three methodological challenges encountered
during early collaboration. These include issues
relating to ``proximity'' with subjects, ethics and
critical questions about scholars' digital
responsibilities during the neogeographic turn.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Scassa:2014:POG,
author = "Teresa Scassa",
title = "Privacy and Open Government",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "397--413",
day = "18",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020397",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/397",
abstract = "The public-oriented goals of the open government
movement promise increased transparency and
accountability of governments, enhanced citizen
engagement and participation, improved service
delivery, economic development and the stimulation of
innovation. In part, these goals are to be achieved by
making more and more government information public in
reusable formats and under open licences. This paper
identifies three broad privacy challenges raised by
open government. The first is how to balance privacy
with transparency and accountability in the context of
``public'' personal information. The second challenge
flows from the disruption of traditional approaches to
privacy based on a collapse of the distinctions between
public and private sector actors. The third challenge
is that of the potential for open government data-even
if anonymized-to contribute to the big data environment
in which citizens and their activities are increasingly
monitored and profiled.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Roy:2014:ODO,
author = "Jeffrey Roy",
title = "Open Data and Open Governance in {Canada}: a Critical
Examination of New Opportunities and Old Tensions",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "414--432",
day = "27",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030414",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/414",
abstract = "As governments develop open data strategies, such
efforts reflect the advent of the Internet, the
digitization of government, and the emergence of
meta-data as a wider socio-economic and societal
transformational. Within this context the purpose of
this article is twofold. First, we seek to both situate
and examine the evolution and effectiveness of open
data strategies in the Canadian public sector, with a
particular focus on municipal governments that have led
this movement. Secondly, we delve more deeply into-if
and how, open data can facilitate more open and
innovative forms of governance enjoining an
outward-oriented public sector (across all government
levels) with an empowered and participative society.
This latter vantage point includes four main and
inter-related dimensions: (i) conceptualizing public
value and public engagement; (ii) media
relations-across traditional intermediaries and
channels and new social media; (iii) political culture
and the politics of privacy in an increasingly
data-centric world; and (iv) federated architectures
and the alignment of localized, sub-national, and
national strategies and governance mechanisms. This
article demonstrates how each of these dimensions
includes important determinants of not only open data's
immediate impacts but also its catalytic ability to
forge wider and collective innovation and more holistic
governance renewal.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Demidova:2014:AEF,
author = "Elena Demidova and Nicola Barbieri and Stefan Dietze
and Adam Funk and Helge Holzmann and Diana Maynard and
Nikolaos Papailiou and Wim Peters and Thomas Risse and
Dimitris Spiliotopoulos",
title = "Analysing and Enriching Focused {Semantic Web}
Archives for {Parliament} Applications",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "433--456",
day = "30",
month = jul,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030433",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/433",
abstract = "The web and the social web play an increasingly
important role as an information source for Members of
Parliament and their assistants, journalists, political
analysts and researchers. It provides important and
crucial background information, like reactions to
political events and comments made by the general
public. The case study presented in this paper is
driven by two European parliaments (the Greek and the
Austrian parliament) and targets an effective
exploration of political web archives. In this paper,
we describe semantic technologies deployed to ease the
exploration of the archived web and social web content
and present evaluation results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Maynard:2014:SCA,
author = "Diana Maynard and Gerhard Gossen and Adam Funk and
Marco Fisichella",
title = "Should {I} Care about Your Opinion? {Detection} of
Opinion Interestingness and Dynamics in Social Media",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "457--481",
day = "13",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030457",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/457",
abstract = "In this paper, we describe a set of reusable text
processing components for extracting opinionated
information from social media, rating it for
interestingness, and for detecting opinion events. We
have developed applications in GATE to extract named
entities, terms and events and to detect opinions about
them, which are then used as the starting point for
opinion event detection. The opinions are then
aggregated over larger sections of text, to give some
overall sentiment about topics and documents, and also
some degree of information about interestingness based
on opinion diversity. We go beyond traditional opinion
mining techniques in a number of ways: by focusing on
specific opinion-target extraction related to key terms
and events, by examining and dealing with a number of
specific linguistic phenomena, by analysing and
visualising opinion dynamics over time, and by
aggregating the opinions in different ways for a more
flexible view of the information contained in the
documents.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Tsimpourla:2014:RDL,
author = "Clare Tsimpourla",
title = "{Rikki} Don't Lose That Number: Enumerated Human
Rights in a Society of Infinite Connections",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "482--497",
day = "19",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030482",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/482",
abstract = "The international Human Rights regime acknowledges a
certain number of rights. That number, albeit
increasing since its inception, does not seem able to
keep up with the pace of modern technology. Human
rights today are not only exercised in the tangible
world; they are also exercised on a daily basis in a
world of ubiquitous computing-as such they can be
easily breached with a mere click of a button. To make
matters worse, these rights are controlled largely by
multinational corporations that have little regard for
their value. In this paper we will attempt to explore
the difficulties the global human rights regime faces
today, the challenge that is its enforcement, and
whether it has come to a standstill in an age where
connections grow faster than the rule of law.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Viscusi:2014:ASV,
author = "Gianluigi Viscusi and Marco Castelli and Carlo
Batini",
title = "Assessing Social Value in Open Data Initiatives: a
Framework",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "498--517",
day = "19",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030498",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/498",
abstract = "Open data initiatives are characterized, in several
countries, by a great extension of the number of data
sets made available for access by public
administrations, constituencies, businesses and other
actors, such as journalists, international institutions
and academics, to mention a few. However, most of the
open data sets rely on selection criteria, based on a
technology-driven perspective, rather than a focus on
the potential public and social value of data to be
published. Several experiences and reports confirm this
issue, such as those of the Open Data Census. However,
there are also relevant best practices. The goal of
this paper is to investigate the different dimensions
of a framework suitable to support public
administrations, as well as constituencies, in
assessing and benchmarking the social value of open
data initiatives. The framework is tested on three
initiatives, referring to three different countries,
Italy, the United Kingdom and Tunisia. The countries
have been selected to provide a focus on European and
Mediterranean countries, considering also the
difference in legal frameworks (civic law vs. common
law countries).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Plachouras:2014:ACA,
author = "Vassilis Plachouras and Florent Carpentier and
Muhammad Faheem and Julien Masan{\`e}s and Thomas Risse
and Pierre Senellart and Patrick Siehndel and Yannis
Stavrakas",
title = "{ARCOMEM} Crawling Architecture",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "518--541",
day = "19",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030518",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/518",
abstract = "The World Wide Web is the largest information
repository available today. However, this information
is very volatile and Web archiving is essential to
preserve it for the future. Existing approaches to Web
archiving are based on simple definitions of the scope
of Web pages to crawl and are limited to basic
interactions with Web servers. The aim of the ARCOMEM
project is to overcome these limitations and to provide
flexible, adaptive and intelligent content acquisition,
relying on social media to create topical Web archives.
In this article, we focus on ARCOMEM's crawling
architecture. We introduce the overall architecture and
we describe its modules, such as the online analysis
module, which computes a priority for the Web pages to
be crawled, and the Application-Aware Helper which
takes into account the type of Web sites and
applications to extract structure from crawled content.
We also describe a large-scale distributed crawler that
has been developed, as well as the modifications we
have implemented to adapt Heritrix, an open source
crawler, to the needs of the project. Our experimental
results from real crawls show that ARCOMEM's crawling
architecture is effective in acquiring focused
information about a topic and leveraging the
information from social media.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Formosa:2014:NPR,
author = "Saviour Formosa",
title = "{NeoGeography} and Preparedness for Real-to-Virtual
World Knowledge Transfer: Conceptual Steps to
{Minecraft Malta}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "542--555",
day = "28",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030542",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/542",
abstract = "Societies have rapidly morphed into complex entities
that are creating accessibility, yet, at the same time,
they are developing new forms of neogeographic-poverty
related to information uptake. Those that have managed
to partake in the opportunities provided by the web
have new vistas to survive in, in contrast to the new
poor who have limited or no access to information. New
forms of data in spatial format are accessible to all,
however few realize the implications of such a
transitional change in wellbeing: Whether entire
societies or individuals. The different generations
taking up the information access can face different
levels of accessibility that may be limited by access
to online data, knowledge of usage of tools and the
understanding of the results, all within the limits on
the spaces they are familiar with. This paper reviews a
conceptual process underlining the initial steps of a
long-term project in the Maltese Islands that seeks to
create an online series of tools that bring the concept
of ``physical place'' to the different generations
through the management of a major project, the creation
of a 3D virtuality, employing scanning processes, GIS,
conversion aspects, and a small block-based Minecraft
engine.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Kaschesky:2014:DVF,
author = "Michael Kaschesky and Luigi Selmi",
title = "{7R} Data Value Framework for Open Data in Practice:
{Fusepool}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "556--583",
day = "08",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030556",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/556",
abstract = "Based on existing literature, this article makes a
case for open (government) data as supporting political
efficiency, socio-economic innovation and
administrative efficiency, but also finds a lack of
measurable impact. It attributes the lack of impact to
shortcomings regarding data access (must be efficient)
and data usefulness (must be effective). To address
these shortcomings, seven key activities that add value
to data are identified and are combined into the 7R
Data Value Framework, which is an applied methodology
for linked data to systematically address both
technical and social shortcomings. The 7R Data Value
Framework is then applied to the international Fusepool
project that develops a set of integrated software
components to ease the publishing of open data based on
linked data and associated best practices. Real-life
applications for the Dutch Parliament and the Libraries
of Free University of Berlin are presented, followed by
a concluding discussion.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Irons:2014:DFI,
author = "Alastair Irons and Harjinder Singh Lallie",
title = "Digital Forensics to Intelligent Forensics",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "584--596",
day = "12",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030584",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/584",
abstract = "In this paper we posit that current investigative
techniques-particularly as deployed by law enforcement,
are becoming unsuitable for most types of crime
investigation. The growth in cybercrime and the
complexities of the types of the cybercrime coupled
with the limitations in time and resources, both
computational and human, in addressing cybercrime put
an increasing strain on the ability of digital
investigators to apply the processes of digital
forensics and digital investigations to obtain timely
results. In order to combat the problems, there is a
need to enhance the use of the resources available and
move beyond the capabilities and constraints of the
forensic tools that are in current use. We argue that
more intelligent techniques are necessary and should be
used proactively. The paper makes the case for the need
for such tools and techniques, and investigates and
discusses the opportunities afforded by applying
principles and procedures of artificial intelligence to
digital forensics intelligence and to intelligent
forensics and suggests that by applying new techniques
to digital investigations there is the opportunity to
address the challenges of the larger and more complex
domains in which cybercrimes are taking place.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Contemporary and Future Digital
Forensics.",
}
@Article{Perger:2014:GGW,
author = "Christoph Perger and Ellsworth LeDrew and Linda See
and Steffen Fritz",
title = "Geography {Geo-Wiki} in the Classroom: Using
Crowdsourcing to Enhance Geographical Teaching",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "597--611",
day = "29",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040597",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/597",
abstract = "Geo-Wiki is a crowdsourcing tool used to derive
information, based on satellite imagery, to validate
and enhance global land cover. Around 5000 users are
registered, who contribute to different campaigns to
collect data across various domains (e.g., agriculture,
biomass, human impact, etc.). However, seeing the
Earth's surface from above does not provide all of the
necessary information for understanding what is
happening on the ground. Instead, we need to enhance
this experience with local knowledge or with additional
information, such as geo-located photographs of surface
features with annotation. The latest development in
enhancing Geo-Wiki in this context has been achieved
through collaboration with the University of Waterloo
to set up a separate branch called Geography Geo-Wiki
for use in undergraduate teaching. We provide the
pedagogical objectives for this branch and describe two
modules that we have introduced in first and third year
Physical Geography classes. The majority of the
feedback was positive and in, many cases, was part of
what the student liked best about the course. Future
plans include the development of additional assignments
for the study of environmental processes using Geo-Wiki
that would engage students in a manner that is very
different from that of conventional teaching.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Dalmau:2014:RDM,
author = "Francesc Valls Dalmau and Pilar Garcia-Almirall and
Ernest Redondo Dom{\'\i}nguez and David Fonseca
Escudero",
title = "From Raw Data to Meaningful Information: a
Representational Approach to Cadastral Databases in
Relation to Urban Planning",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "612--639",
day = "24",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040612",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/612",
abstract = "Digesting the data hose that cities are constantly
producing is complex; data is usually structured with
different criteria, which makes comparative analysis of
multiple cities challenging. However, the publicly
available data from the Spanish cadaster contains urban
information in a documented format with common
semantics for the whole territory, which makes these
analyses possible. This paper uses the information
about the 3D geometry of buildings, their use and their
year of construction, stored in cadastral databases, to
study the relation between the built environment (what
the city is) and the urban plan (what the city wants to
become), translating the concepts of the cadastral data
into the semantics of the urban plan. Different
representation techniques to better understand the city
from the pedestrians' point of view and to communicate
this information more effectively are also discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Geographic Information System
(Semantic GIS).",
}
@Article{Batita:2014:TCF,
author = "Wided Batita and St{\'e}phane Roche and Yvan
B{\'e}dard and Claude Caron",
title = "Towards a Conceptual Framework for {WikiGIS}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "640--672",
day = "29",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040640",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/640",
abstract = "As an emerging complex concept, GeoDesign requires an
innovative theoretical basis, tools, supports and
practices. For this reason, we propose a new concept,
``WikiGIS'', designed to answer some dimensions of the
GeoDesign process. WikiGIS focuses on the needs of
GeoDesign, but we leave the door open for future
improvement when tested in other areas that may have
additional needs. WikiGIS is built on Web 2.0
technologies-and primarily on wiki-to manage the
tracking of participants' editing (i.e., managing the
contributions history). It also offers GIS functions
for geoprocessing and a design-based approach for
sketching proposals. One of the main strengths of
WikiGIS is its ability to manage the traceability of
contributions with an easy and dynamical access, data
quality and deltification. The core of this paper
consists of presenting a conceptual framework for
WikiGIS using UML diagrams. A user interface is
presented later to show how our WikiGIS proposal works.
This interface is simply a means to illustrate the
concepts underlying WikiGIS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Antonio:2014:GDD,
author = "Amy Antonio and David Tuffley",
title = "The Gender Digital Divide in Developing Countries",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "673--687",
day = "31",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040673",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/673",
abstract = "Empirical studies clearly show that women in the
developing world have significantly lower technology
participation rates than men; a result of entrenched
socio-cultural attitudes about the role of women in
society. However, as studies are beginning to show,
when those women are able to engage with Internet
technology, a wide range of personal, family and
community benefits become possible. The key to these
benefits is on-line education, the access to which sets
up a positive feedback loop. This review gives an
overview of the digital divide, before focusing
specifically on the challenges women in developing
countries face in accessing the Internet. Current
gender disparities in Internet use will be outlined and
the barriers that potentially hinder women's access and
participation in the online world will be considered.
We will then look at the potential opportunities for
women's participation in a global digital society along
with a consideration of current initiatives that have
been developed to mitigate gender inequity in
developing countries. We will also consider a promising
avenue for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Risse:2014:AAS,
author = "Thomas Risse and Elena Demidova and Stefan Dietze and
Wim Peters and Nikolaos Papailiou and Katerina Doka and
Yannis Stavrakas and Vassilis Plachouras and Pierre
Senellart and Florent Carpentier and Amin Mantrach and
Bogdan Cautis and Patrick Siehndel and Dimitris
Spiliotopoulos",
title = "The {ARCOMEM} Architecture for Social- and
Semantic-Driven {Web} Archiving",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "688--716",
day = "04",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040688",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/688",
abstract = "The constantly growing amount ofWeb content and the
success of the SocialWeb lead to increasing needs for
Web archiving. These needs go beyond the pure
preservation of Web pages. Web archives are turning
into ``community memories'' that aim at building a
better understanding of the public view on, e.g.,
celebrities, court decisions and other events. Due to
the size of the Web, the traditional ``collect-all''
strategy is in many cases not the best method to build
Web archives. In this paper, we present the ARCOMEM
(From Future Internet 2014, 6 689 Collect-All Archives
to Community Memories) architecture and implementation
that uses semantic information, such as entities,
topics and events, complemented with information from
the Social Web to guide a novel Web crawler. The
resulting archives are automatically enriched with
semantic meta-information to ease the access and allow
retrieval based on conditions that involve high-level
concepts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Hatlevik:2014:UMA,
author = "Ove Edvard Hatlevik and Karoline T{\o}mte",
title = "Using Multilevel Analysis to Examine the Relationship
between Upper Secondary Students {Internet} Safety
Awareness, Social Background and Academic Aspirations",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "717--734",
day = "14",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040717",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/717",
abstract = "Since 2009, most Norwegian students in upper secondary
have had access to their own personal computer at
school. Hence, with the increased access to technology,
the importance of online connectedness has increased
for adolescents' social interaction and communication.
It is, therefore, important to identify and understand
the concept of Internet safety among upper secondary
school students. A total of 4216 students from 238
classrooms in 23 upper secondary schools completed an
Internet safety assessment. The aim of the study was to
operationalize and measure Internet safety in a school
context, and to further examine the factors predicting
students' Internet safety awareness and responsibility.
Our analysis revealed substantial variation in Internet
safety awareness between schools, classrooms and
students. Overall, the findings indicate that students'
social backgrounds are determining for their
development and understanding of Internet safety
awareness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Somarakis:2014:PIT,
author = "Giorgos Somarakis and Anastasia Stratigea",
title = "Public Involvement in Taking Legislative Action as to
the Spatial Development of the Tourist Sector in
{Greece} --- The {``OpenGov''} Platform Experience",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "735--759",
day = "25",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040735",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/735",
abstract = "By the Aarhus Convention (1998) it is recognized the
right of citizens to get access to and influence
decision-making in respect to issues affecting the
state of the environment. More specifically, in Article
8 it is stated that public authorities are forced to
engage public participation when preparing regulations
or legally binding rules that have a significant
environmental impact. Towards this end, Information and
Communication Technologies (ICTs) and their
applications have considerably expanded the potential
of planners and decision makers to interact with
stakeholders and the public and engage them in
participatory processes through ICTs-enabled platforms.
The focus of the present paper is on the context of
public consultation in taking legislative action as to
the spatial development of the tourist sector in
Greece. It consists of three parts: the first part,
where the context of engaging the public in
governmental decision-making in Greece is discussed,
following the Open Government Partnership (OGP)
initiative; the second part, presenting the steps of
the ``OpenGov'' online platform, designed for gathering
public knowledge to further improve legislative efforts
and policy; and the third part, elaborating on the
experience gained by the use of the ``OpenGov''
platform for decision-making on the spatial development
of the tourist sector in Greece.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Shepherd:2014:RRS,
author = "Lynsay A. Shepherd and Jacqueline Archibald and Robert
Ian Ferguson",
title = "Reducing Risky Security Behaviours: Utilising
Affective Feedback to Educate Users",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "760--772",
day = "27",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040760",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/760",
abstract = "Despite the number of tools created to help end-users
reduce risky security behaviours, users are still
falling victim to online attacks. This paper proposes a
browser extension utilising affective feedback to
provide warnings on detection of risky behaviour. The
paper provides an overview of behaviour considered to
be risky, explaining potential threats users may face
online. Existing tools developed to reduce risky
security behaviours in end-users have been compared,
discussing the success rates of various methodologies.
Ongoing research is described which attempts to educate
users regarding the risks and consequences of poor
security behaviour by providing the appropriate
feedback on the automatic recognition of risky
behaviour. The paper concludes that a solution
utilising a browser extension is a suitable method of
monitoring potentially risky security behaviour.
Ultimately, future work seeks to implement an affective
feedback mechanism within the browser extension with
the aim of improving security awareness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Developments in Cybercrime and
Cybercrime Mitigation.",
}
@Article{Brainin:2014:ITO,
author = "Esther Brainin and Efrat Neter",
title = "Inside Technology: Opening the Black Box of Health ---
{Website} Configuration and Content Management",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "773--799",
day = "10",
month = dec,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040773",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/773",
abstract = "Given the existing divide related to Internet skills
and types of Internet use, it is safe to assume that a
large proportion of the population uses the Internet
for health purposes in a partially productive fashion.
We suggest that in addition to user characteristics,
another factor that inhibits productive Internet use,
and thus contributes to the existing gap, is related to
the ways in which the technology is configured. The
goal of this study was to explore the processes that
webmasters and content managers use for constructing
and producing, or selecting content, for health
websites. Interviews conducted with 23 website builders
and managers of websites that represent public and
non-public health organizations revealed that they do
not plan or conduct activities for content needs
elicitation, either in the design stage or on an
ongoing basis. Rather, these professionals rely on a
``self-embodiment'' standard, whereby their and their
cohorts' expectations determine the quality and
functionality of the websites' structure and content.
Hence, target groups beyond their social sphere are
disregarded, and instead of new opportunities, new
cleavages are created. We recommended that government,
public and non-public stakeholders work to establish
construction standards, to ensure that health websites
meet the needs of varied end-user populations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Laurini:2015:GOG,
author = "Robert Laurini",
title = "Geographic Ontologies, Gazetteers and
Multilingualism",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "1--23",
day = "05",
month = jan,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/1",
abstract = "Different languages imply different visions of space,
so that terminologies are different in geographic
ontologies. In addition to their geometric shapes,
geographic features have names, sometimes different in
diverse languages. In addition, the role of gazetteers,
as dictionaries of place names (toponyms), is to
maintain relations between place names and location.
The scope of geographic information retrieval is to
search for geographic information not against a
database, but against the whole Internet: but the
Internet stores information in different languages, and
it is of paramount importance not to remain stuck to a
unique language. In this paper, our first step is to
clarify the links between geographic objects as
computer representations of geographic features,
ontologies and gazetteers designed in various
languages. Then, we propose some inference rules for
matching not only types, but also relations in
geographic ontologies with the assistance of
gazetteers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Geographic Information System
(Semantic GIS).",
}
@Article{Office:2015:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2014",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "24--25",
day = "09",
month = jan,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/24",
abstract = "The significance of approaches to technology-enhanced
learning (TEL) has increased rapidly during the last
few years. Nowadays in education different approaches
such as game-based learning, web-based learning,
video-based online courses, and many others are used on
a daily basis. However, what defines the success of
technology-enhanced learning approaches and how can
such approaches be developed in a structured way?
Furthermore, what different aspects have to be
considered while doing so? To answer these questions,
4567 publications were analyzed in this present
literature review in order to recognize the different
aspects of implementing technology-enhanced learning
approaches. Finally, 20 categories are defined in four
main areas that summarize all the aspects in the field
of technology-enhanced learning. Moreover, the study
also reveals research areas that are important but
hardly investigated in the observed journals of this
study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Schweighofer:2015:ACW,
author = "Patrick Schweighofer and Martin Ebner",
title = "Aspects to Be Considered when Implementing
Technology-Enhanced Learning Approaches: a Literature
Review",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "26--49",
day = "03",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/26",
abstract = "The significance of approaches to technology-enhanced
learning (TEL) has increased rapidly during the last
few years. Nowadays in education different approaches
such as game-based learning, web-based learning,
video-based online courses, and many others are used on
a daily basis. However, what defines the success of
technology-enhanced learning approaches and how can
such approaches be developed in a structured way?
Furthermore, what different aspects have to be
considered while doing so? To answer these questions,
4567 publications were analyzed in this present
literature review in order to recognize the different
aspects of implementing technology-enhanced learning
approaches. Finally, 20 categories are defined in four
main areas that summarize all the aspects in the field
of technology-enhanced learning. Moreover, the study
also reveals research areas that are important but
hardly investigated in the observed journals of this
study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2015:PDE,
author = "Yi-Ting Huang",
title = "Participatory Design to Enhance {ICT} Learning and
Community Attachment: a Case Study in Rural {Taiwan}",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "50--66",
day = "02",
month = mar,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/50",
abstract = "This study used observation and interviews with
participants in ``PunCar Action'' to understand how
participatory design methods can be applied to the
education of rural individuals in information and
communication technology (ICT). PunCar Action is a
volunteer program in which ICT educators tour the rural
communities of Taiwan, offering courses on the use of
digital technology. This paper makes three
contributions: First, we found that participatory
design is an excellent way to teach ICT and Web 2.0
skills, co-create community blogs, and sustain
intrinsic motivation to use Web applications. Second,
PunCar Action provides an innovative bottom-up
intergenerational ICT education model with high
penetrability capable of enhancing the confidence of
rural residents in the use of ICT. Third, the content
of basic courses was based on applications capable of
making the lives of elderly individuals more
convenient, and the advanced course was based on the
co-creation of community blogs aimed at reviving the
core functions of communities and expanding local
industry. Our research was conducted with the use of a
non-quantitative index to measure ICT learning
performance of participants from a rural community. The
results show that PunCar Action emphasizes
interpersonal communication and informational
applications and creates a collaborative process that
encourages rural residents to take action to close the
digital divide.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Gan:2015:SNP,
author = "Diane Gan and Lily R. Jenkins",
title = "Social Networking Privacy --- Who's Stalking You?",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "67--93",
day = "23",
month = mar,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/67",
abstract = "This research investigates the privacy issues that
exist on social networking sites. It is reasonable to
assume that many Twitter users are unaware of the
dangers of uploading a tweet to their timeline which
can be seen by anyone. Enabling geo-location tagging on
tweets can result in personal information leakage,
which the user did not intend to be public and which
can seriously affect that user's privacy and anonymity
online. This research demonstrates that key information
can easily be retrieved using the starting point of a
single tweet with geo-location turned on. A series of
experiments have been undertaken to determine how much
information can be obtained about a particular
individual using only social networking sites and
freely available mining tools. The information gathered
enabled the target subjects to be identified on other
social networking sites such as Foursquare, Instagram,
LinkedIn, Facebook and Google+, where more personal
information was leaked. The tools used are discussed,
the results of the experiments are presented and the
privacy implications are examined.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guillen:2015:IIS,
author = "Edward Guillen and Jeisson S{\'a}nchez and Rafael
Paez",
title = "Inefficiency of {IDS} Static Anomaly Detectors in
Real-World Networks",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "94--109",
day = "06",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/94",
abstract = "A wide range of IDS implementations with anomaly
detection modules have been deployed. In general, those
modules depend on intrusion knowledge databases, such
as Knowledge Discovery Dataset (KDD99), Center for
Applied Internet Data Analysis (CAIDA) or Community
Resource for Archiving Wireless Data at Dartmouth
(CRAWDAD), among others. Once the database is analyzed
and a machine learning method is employed to generate
detectors, some classes of new detectors are created.
Thereafter, detectors are supposed to be deployed in
real network environments in order to achieve detection
with good results for false positives and detection
rates. Since the traffic behavior is quite different
according to the user's network activities over
available services, restrictions and applications, it
is supposed that behavioral-based detectors are not
well suited to all kind of networks. This paper
presents the differences of detection results between
some network scenarios by applying traditional
detectors that were calculated with artificial neural
networks. The same detector is deployed in different
scenarios to measure the efficiency or inefficiency of
static training detectors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Pahlevan:2015:DEC,
author = "Atousa Pahlevan and Jean-Luc Duprat and Alex Thomo and
Hausi M{\"u}ller",
title = "{Dynamis}: Effective Context-Aware {Web} Service
Selection Using Dynamic Attributes",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "110--139",
day = "12",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/110",
abstract = "Quality web service discovery requires narrowing the
search space from an overwhelming set of services down
to the most relevant ones, while matching the
consumer's request. Today, the ranking of services only
considers static attributes or snapshots of current
attribute values, resulting in low-quality search
results. To satisfy the user's need for timely,
well-chosen web services, we ought to consider quality
of service attributes. The problem is that dynamic
attributes can be difficult to measure, frequently
fluctuate, are context-sensitive and depend on
environmental factors, such as network availability at
query time. In this paper, we propose the Dynamis
algorithm to address these challenges effectively.
Dynamis is based on well-established database
techniques, such as skyline and aggregation. We
illustrate our approach using observatory telescope web
services and experimentally evaluate it using stock
market data. In our evaluation, we show significant
improvement in service selection over existing
techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Laneuville:2015:QAU,
author = "Odette Laneuville and Dorota Sikora",
title = "Quantitative Analysis of the Usage of a Pedagogical
Tool Combining Questions Listed as Learning Objectives
and Answers Provided as Online Videos",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "140--151",
day = "15",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/140",
abstract = "To improve the learning of basic concepts in molecular
biology of an undergraduate science class, a
pedagogical tool was developed, consisting of learning
objectives listed at the end of each lecture and
answers to those objectives made available as videos
online. The aim of this study was to determine if the
pedagogical tool was used by students as instructed,
and to explore students' perception of its usefulness.
A combination of quantitative survey data and measures
of online viewing was used to evaluate the usage of the
pedagogical practice. A total of 77 short videos linked
to 11 lectures were made available to 71 students, and
64 completed the survey. Using online tracking tools, a
total of 7046 views were recorded. Survey data
indicated that most students (73.4\%) accessed all
videos, and the majority (98.4\%) found the videos to
be useful in assisting their learning. Interestingly,
approximately half of the students (53.1\%) always or
most of the time used the pedagogical tool as
recommended, and consistently answered the learning
objectives before watching the videos. While the
proposed pedagogical tool was used by the majority of
students outside the classroom, only half used it as
recommended limiting the impact on students'
involvement in the learning of the material presented
in class.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Yamashita:2015:RTH,
author = "Ryoma Yamashita and Kazumasa Takami",
title = "Receiver-Triggered Handshake Protocol for {DTN} in
Disaster Area",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "152--169",
day = "27",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/152",
abstract = "When a disaster hits a wide area, communication
services for public use will be rendered unavailable.
This will make it difficult to confirm the safety of
people in the disaster area. A solution to this problem
is to form delay/disruption tolerant networks (DTN)
using mobile terminals of victims, those of rescuers,
who serve as information carriers, and terminals
(servers) in shelters. In this paper, we propose using
a receiver-triggered handshake protocol for
communication between these terminals. We have
developed the bundle layer protocol for this handshake
method. The proposed method has been implemented on a
network simulator to build an evaluation environment.
The disaster area has been modeled on an area around
Shinjuku Station in Tokyo. Victims are randomly
distributed in the area. We have compared the proposed
method with Epidemic Routing and Spray and Wait in
terms of the delivery rate at which messages reach
their destinations, and the length of time taken for
messages to reach their destinations. We have found
that the delivery rate of the three methods are, more
or less, the same, but that the proposed method is
superior to the other two methods in terms of storage
usage and battery consumption of terminals, and the
number of bundles generated in the network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Smith:2015:OSP,
author = "Marlene A. Smith",
title = "Output from Statistical Predictive Models as Input to
{eLearning} Dashboards",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "170--183",
day = "02",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/170",
abstract = "We describe how statistical predictive models might
play an expanded role in educational analytics by
giving students automated, real-time information about
what their current performance means for eventual
success in eLearning environments. We discuss how an
online messaging system might tailor information to
individual students using predictive analytics. The
proposed system would be data-driven and quantitative;
e.g., a message might furnish the probability that a
student will successfully complete the certificate
requirements of a massive open online course. Repeated
messages would prod underperforming students and alert
instructors to those in need of intervention.
Administrators responsible for accreditation or
outcomes assessment would have ready documentation of
learning outcomes and actions taken to address
unsatisfactory student performance. The article's brief
introduction to statistical predictive models sets the
stage for a description of the messaging system.
Resources and methods needed to develop and implement
the system are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Knapp:2015:UEM,
author = "Herschel Knapp and Sanjog Pangarkar",
title = "Utilizing the {ECHO} Model in the Veterans Health
Affairs System: Guidelines for Setup, Operations and
Preliminary Findings",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "184--195",
day = "08",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/184",
abstract = "Background: In 2011, the Veterans Health
Administration (VHA) consulted with the Project ECHO
(Extension for Community Healthcare Outcomes) team at
the University of New Mexico, Albuquerque, to reproduce
their successful model within the VHA. Methods: The VHA
launched SCAN-ECHO (Specialty Care Access
Network-Extension for Community Healthcare Outcomes), a
multisite videoconferencing system to conduct live
clinical consultations between specialists at a VHA
Medical Center (hospital) and primary care providers
stationed at satellite VHA CBOCs (Community-Based
Outpatient Clinic). Results: Analysis of the first
three years rendered a mean attendee satisfaction of
89.53\% and a consultation satisfaction score of
88.10\%. About half of the SCAN-ECHO consultations
resulted in patients receiving their treatment from
their local primary care providers; the remaining half
were referred to the VHA Medical Center when the
treatment involved equipment or services not available
at the CBOCs (e.g., MRI, surgery). Conclusion: This
paper details the setup, operation logistics and
preliminary findings, suggesting that SCAN-ECHO is a
viable model for providing quality specialty clinical
consultation service, prompter access to care, reduced
commutes and continuing education. Additionally, the
use of a secured Internet-based videoconferencing
system that supports connectivity to multiple (mobile)
devices could expand the utilization of this service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Davaasambuu:2015:SOH,
author = "Battulga Davaasambuu and Keping Yu and Takuro Sato",
title = "Self-Optimization of Handover Parameters for Long-Term
Evolution with Dual Wireless Mobile Relay Nodes",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "196--213",
day = "11",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/196",
abstract = "In recent years, train passengers have been
transferring increasing amounts of data using mobile
devices. Wireless networks with mobile relay nodes
support broadband wireless communications for
passengers of such vehicles using backhaul links.
However, the mobility management entity reuses the
handover of existing user equipment, resulting in the
handover of the Long-Term Evolution network being
unsuitable for user equipment within the cabins of
vehicles traveling at high speed. In this paper, we
propose a self-optimizing handover hysteresis scheme
with dual mobile relay nodes for wireless networks in
high-speed mobile environments. The proposed mechanism
tunes the hysteresis and cell individual offset
handover parameters based on the velocity of the
vehicle and the handover performance indicator, which
affects the handover triggering decision and
performance. The results of simulations conducted in
which the performance of the proposed scheme was
compared to that of an existing scheme show that the
proposed scheme can reduce the number of radio link
failures and service interruptions during handover
procedures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cheng:2015:TPA,
author = "Xiu-Zhi Cheng and Da-Rong Zhu and Shen Zhang and Ping
He",
title = "Tracking Positioning Algorithm for Direction of
Arrival Based on Direction Lock Loop",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "214--224",
day = "26",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/214",
abstract = "In order to solve the problem of poor real-time
performance, low accuracy and high computational
complexity in the traditional process of locating and
tracking of Direction of Arrival (DOA) of moving
targets, this paper proposes a DOA algorithm based on
the Direction Lock Loop (DILL) which adopts Lock Loop
structure to realize the estimation and location of DOA
and can adjust the direction automatically along with
the changes of a signal's angular variation to track
the position of the signal. Meanwhile, to reduce the
influence of nonlinearity and noise on its performance,
the UKF filter is designed for eliminating interference
of the estimated target signal to improve accuracy of
the signal tracking and stability of the system.
Simulation results prove that the algorithm can not
only get a high resolution DOA estimate signal, but can
also locate and track multiple mobile targets
effectively with enhanced accuracy, efficiency and
stability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aman:2015:EEP,
author = "Waqas Aman and Einar Snekkenes",
title = "{EDAS}: An Evaluation Prototype for Autonomic
Event-Driven Adaptive Security in the {Internet of
Things}",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "225--256",
day = "08",
month = jul,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/225",
abstract = "In Internet of Things (IoT), the main driving
technologies are considered to be tiny sensory objects.
These objects cannot host traditional preventive and
detective technologies to provide protection against
the increasing threat sophistication. Furthermore,
these solutions are limited to analyzing particular
contextual information, for instance network
information or files, and do not provide holistic
context for risk analysis and response. Analyzing a
part of a situation may lead to false alarms and later
to unnecessary and incorrect configurations. To
overcome these concerns, we proposed an event-driven
adaptive security (EDAS) model for IoT. EDAS aims to
observe security events (changes) generated by various
things in the monitored IoT environment, investigates
any intentional or unintentional risks associated with
the events and adapts to it autonomously. It correlates
different events in time and space to reduce any false
alarms and provides a mechanism to predict attacks
before they are realized. Risks are responded to
autonomically by utilizing a runtime adaptation
ontology. The mitigation action is chosen after
assessing essential information, such as the risk
faced, user preferences, device capabilities and
service requirements. Thus, it selects an optimal
mitigation action in a particular adverse situation.
The objective of this paper is to investigate EDAS
feasibility and its aptitude as a real-world prototype
in a remote patient monitoring context. It details how
EDAS can be a practical choice for IoT-eHealth in terms
of the security, design and implementation features it
offers as compared to traditional security controls. We
have explained the prototype's major components and
have highlighted the key technical challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Zaidi:2015:VIS,
author = "Kamran Zaidi and Muttukrishnan Rajarajan",
title = "Vehicular {Internet}: Security \& Privacy Challenges
and Opportunities",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "257--275",
day = "24",
month = jul,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030257",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/257",
abstract = "The vehicular internet will drive the future of
vehicular technology and intelligent transportation
systems (ITS). Whether it is road safety, infotainment,
or driver-less cars, the vehicular internet will lay
the foundation for the future of road travel.
Governments and companies are pursuing driver-less
vehicles as they are considered to be more reliable
than humans and, therefore, safer. The vehicles today
are not just a means of transportation but are also
equipped with a wide range of sensors that provide
valuable data. If vehicles are enabled to share data
that they collect with other vehicles or authorities
for decision-making and safer driving, they thereby
form a vehicular network. However, there is a lot at
stake in vehicular networks if they are compromised.
With the stakes so high, it is imperative that the
vehicular networks are secured and made resilient to
any attack or attempt that may have serious
consequences. The vehicular internet can also be the
target of a cyber attack, which can be devastating. In
this paper, the opportunities that the vehicular
internet offers are presented and then various security
and privacy aspects are discussed and some solutions
are presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Floris:2015:SMR,
author = "Roberta Floris and Corrado Zoppi",
title = "Social Media-Related Geographic Information in the
Context of Strategic Environmental Assessment of
Municipal Masterplans: a Case Study Concerning
{Sardinia} ({Italy})",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "276--293",
day = "07",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030276",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/276",
abstract = "This paper proposes a discussion concerning the use of
social media-related geographic information in the
context of the strategic environmental assessment (SEA)
of Sardinian Municipal masterplans (MMPs). We show that
this kind of information improves, substantially, the
SEA process since it provides planners, evaluators, and
the local communities with information retrieved from
social media that would have not been available
otherwise. This information integrates authoritative
data collection, which comes from official sources, and
enlightens tastes and preferences of the users of
services and infrastructure, and their expectations
concerning their spatial organization. A methodological
approach related to the collection of social
media-related geographic information is implemented and
discussed with reference to the urban context of the
city of Cagliari (Sardinia, Italy). The results are
very effective in terms of provision of information,
which may possibly increase the spatial knowledge
available for planning policy definition and
implementation. In this perspective, this kind of
information discloses opportunities for building
analytical scenarios related to urban and regional
planning and it offers useful suggestions for
sustainable development based on tourism strategies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tuffley:2015:EEO,
author = "David Tuffley and Amy Antonio",
title = "Enhancing Educational Opportunities with
Computer-Mediated Assessment Feedback",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "294--306",
day = "11",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030294",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/294",
abstract = "As internet technologies make their way into
developing areas, so too does the possibility of
education and training being delivered to the people
living in those previously unserved areas. The growing
catalogue of free, high quality courseware, when
combined with the newly acquired means of delivery,
creates the potential for millions of people in the
developing world to acquire a good education. Yet a
good education obviously requires more than simply
delivering information; students must also receive high
quality feedback on their assessments. They must be
told how their performance compares with the ideal, and
be shown how to close the gap between the two. However,
delivering high quality feedback is labor-intensive,
and therefore expensive, and has long been recognized
as a problematic issue by educators. This paper
outlines a case study that uses a Learning Management
System (LMS) to efficiently deliver detailed feedback
that is informed by the principles of best practice. We
make the case that the efficiencies of this method
allow for large-scale courses with thousands of
enrolments that are accessible to developing and
developed areas alike. We explore the question; is
computer-mediated feedback delivery efficient and
effective and might it be applied to large-scale
courses at low-cost?",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lu:2015:LJW,
author = "Cunbo Lu and Liangtian Wan",
title = "A Low-Jitter Wireless Transmission Based on Buffer
Management in Coding-Aware Routing",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "307--328",
day = "31",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030307",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/307",
abstract = "It is significant to reduce packet jitter for
real-time applications in a wireless network. Existing
coding-aware routing algorithms use the opportunistic
network coding (ONC) scheme in a packet coding
algorithm. The ONC scheme never delays packets to wait
for the arrival of a future coding opportunity. The
loss of some potential coding opportunities may degrade
the contribution of network coding to jitter
performance. In addition, most of the existing
coding-aware routing algorithms assume that all flows
participating in the network have equal rate. This is
unrealistic, since multi-rate environments often
appear. To overcome the above problem and expand
coding-aware routing to multi-rate scenarios, from the
view of data transmission, we present a low-jitter
wireless transmission algorithm based on buffer
management (BLJCAR), which decides packets in coding
node according to the queue-length based threshold
policy instead of the regular ONC policy as used in
existing coding-aware routing algorithms. BLJCAR is a
unified framework to merge the single rate case and
multiple rate case. Simulations results show that the
BLJCAR algorithm embedded in coding-aware routing
outperforms the traditional ONC policy in terms of
jitter, packet delivery delay, packet loss ratio and
network throughput in network congestion in any traffic
rates.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2015:DRM,
author = "Hua Li and Huan Wang and Wenqing Yin and Yongwei Li
and Yan Qian and Fei Hu",
title = "Development of a Remote Monitoring System for Henhouse
Environment Based on {IoT} Technology",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "329--341",
day = "10",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030329",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/329",
abstract = "To monitor multiple environmental factors of henhouses
in modern chicken farms, a henhouse online monitoring
system based on wireless sensor network was developed
using wireless sensor technology and computer network
technology. Sensor data compensation and correction
were designed to be achieved using software and data
fitting methods, data reliable transmission achieved
using a data loss recovery strategy, and data missing
during monitoring addressed using a self-decision and
online filling method. Operation test of the system
showed that: The system was economic and reliable; it
enabled wireless monitoring and Web display of the
environmental factors of a henhouse; and the root mean
square errors (RMSEs) between the estimated values from
the self-decision and on-line filling method and
experimental values of the four environmental factors
were 0.1698, 3.0859, 77 and 0.094, respectively,
indicative of high estimation accuracy. The system can
provide support for modern management of henhouses and
can be transplanted to related monitoring scenarios in
the agricultural field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Singh:2015:EST,
author = "Dilraj Singh and Amardeep Singh",
title = "Enhanced Secure Trusted {AODV} {(ESTA)} Protocol to
Mitigate Blackhole Attack in Mobile Ad Hoc Networks",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "342--362",
day = "23",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030342",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/342",
abstract = "The self-organizing nature of the Mobile Ad hoc
Networks (MANETs) provide a communication channel
anywhere, anytime without any pre-existing network
infrastructure. However, it is exposed to various
vulnerabilities that may be exploited by the malicious
nodes. One such malicious behavior is introduced by
blackhole nodes, which can be easily introduced in the
network and, in turn, such nodes try to crumble the
working of the network by dropping the maximum data
under transmission. In this paper, a new protocol is
proposed which is based on the widely used Ad hoc
On-Demand Distance Vector (AODV) protocol, Enhanced
Secure Trusted AODV (ESTA), which makes use of multiple
paths along with use of trust and asymmetric
cryptography to ensure data security. The results,
based on NS-3 simulation, reveal that the proposed
protocol is effectively able to counter the blackhole
nodes in three different scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Heller:2015:SID,
author = "Alfred Heller",
title = "The Sensing {Internet}--- a Discussion on Its Impact
on Rural Areas",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "363--371",
day = "28",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/363",
abstract = "This paper is based on the experience of introducing
wireless sensor networks (WSNs) into the building
industry in Denmark and in a rural area of Greenland.
There are very real advantages in the application of
the technology and its consequences for the life cycle
operation of the building sector. Sensor networks can
be seen as an important part of the Internet of Things
and may even constitute an Internet of Sensors, since
the communication layers can differ from the Internet
standards. The current paper describes the case for
application, followed by a discussion of the observed
adaptive advantages and consequences of the technology.
Essentially, WSNs constitute a highly sophisticated
technology that is more robust in a rural context due
to its extremely simple installation procedures (plug
and play) allowing the use of local less-skilled
labour, and the possibility of reconfiguring and
repurposing its use remotely.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Boulos:2015:TIF,
author = "Maged N. Kamel Boulos and Abdulslam Yassine and
Shervin Shirmohammadi and Chakkrit Snae Namahoot and
Michael Br{\"u}ckner",
title = "Towards an ``{Internet of Food}'': Food Ontologies for
the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "372--392",
day = "01",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040372",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/372",
abstract = "Automated food and drink recognition methods connect
to cloud-based lookup databases (e.g., food item
barcodes, previously identified food images, or
previously classified NIR (Near Infrared) spectra of
food and drink items databases) to match and identify a
scanned food or drink item, and report the results back
to the user. However, these methods remain of limited
value if we cannot further reason with the identified
food and drink items, ingredients and
quantities/portion sizes in a proposed meal in various
contexts; i.e., understand from a semantic perspective
their types, properties, and interrelationships in the
context of a given user's health condition and
preferences. In this paper, we review a number of
``food ontologies'', such as the Food Products
Ontology/FOODpedia (by Kolchin and Zamula), Open Food
Facts (by Gigandet et al.), FoodWiki (Ontology-driven
Mobile Safe Food Consumption System by Celik),
FOODS-Diabetes Edition (A Food-Oriented Ontology-Driven
System by Snae Namahoot and Bruckner), and AGROVOC
multilingual agricultural thesaurus (by the UN Food and
Agriculture Organization-FAO). These food ontologies,
with appropriate modifications (or as a basis, to be
added to and further expanded) and together with other
relevant non-food ontologies (e.g., about
diet-sensitive disease conditions), can supplement the
aforementioned lookup databases to enable progression
from the mere automated identification of food and
drinks in our meals to a more useful application
whereby we can automatically reason with the identified
food and drink items and their details (quantities and
ingredients/bromatological composition) in order to
better assist users in making the correct, healthy food
and drink choices for their particular health
condition, age, body weight/BMI (Body Mass Index),
lifestyle and preferences, etc.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fiore:2015:EIB,
author = "Ugo Fiore and Francesco Rossi",
title = "Embedding an Identity-Based Short Signature as a
Digital Watermark",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "393--404",
day = "23",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040393",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/393",
abstract = "Digital watermarking aims at protecting multimedia
content by hiding into it some data that can be used
for such purposes as, for example, intellectual
property protection or integrity control. Sometimes,
the owner of an image would prefer to not transmit,
publish, or hand to a cloud service the original image,
but rather an encrypted version of it. Encrypted images
allow for less embedding room with respect to their
unencrypted counterparts, as there is less spatial
correlation to leverage upon. An architecture for
embedding as payload the digital signature of an
encrypted image, by means of a reversible watermarking
technique, is presented in this work. A noteworthy
point is the use of an identity-based cryptosystem to
avoid certificate management and improve performance.
In addition, the use of IBS-1, a recently proposed
signature scheme, allows for a reduction in the size of
the signature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tian:2015:DTR,
author = "Bo Tian and Kecheng Liu and Yuanzhong Chen",
title = "Dynamical Trust and Reputation Computation Model for
{B2C} E-Commerce",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "405--428",
day = "27",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040405",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/405",
abstract = "Trust is one of the most important factors that
influence the successful application of network service
environments, such as e-commerce, wireless sensor
networks, and online social networks. Computation
models associated with trust and reputation have been
paid special attention in both computer societies and
service science in recent years. In this paper, a
dynamical computation model of reputation for B2C
e-commerce is proposed. Firstly, conceptions associated
with trust and reputation are introduced, and the
mathematical formula of trust for B2C e-commerce is
given. Then a dynamical computation model of reputation
is further proposed based on the conception of trust
and the relationship between trust and reputation. In
the proposed model, classical varying processes of
reputation of B2C e-commerce are discussed.
Furthermore, the iterative trust and reputation
computation models are formulated via a set of
difference equations based on the closed-loop feedback
mechanism. Finally, a group of numerical simulation
experiments are performed to illustrate the proposed
model of trust and reputation. Experimental results
show that the proposed model is effective in simulating
the dynamical processes of trust and reputation for B2C
e-commerce.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Freina:2015:SEI,
author = "Laura Freina and Rosa Bottino and Michela Ott and
Filippo Costa",
title = "Social Empowerment of Intellectually Impaired through
a Cloud Mobile System",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "429--444",
day = "17",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040429",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/429",
abstract = "There is not a unique definition of ``empowerment'',
nevertheless the idea that it involves, on the one
hand, people having control over their own lives and,
on the other, some social aspects seems to be a common
characteristic. Most authors recognize three levels of
empowerment: individual, group, and community level,
which are interconnected and changes at one level
influence the others. Enhancing individual competence
and self-esteem has a direct effect on the control of
one's own life and, in turn, on the social components
of empowerment. In this paper we present Smart Angel, a
project that aims at creating a network involving
families, caregivers, experts, and tutors, as well as
the final users and their friends, based on a mobile
cloud system in support of both everyday living and
urban mobility for people with medium-mild intellectual
disabilities, with particular attention to the Down
syndrome. The system can be seen as a tool to empower
its users to be more independent and therefore
increasing their possibility to have an active role in
their life and an active participation to the
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Buchanan:2015:FIW,
author = "William J. Buchanan and David Lanc and Elochukwu
Ukwandu and Lu Fan and Gordon Russell and Owen Lo",
title = "The Future {Internet}: a World of Secret Shares",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "445--464",
day = "24",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040445",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/445",
abstract = "The Public Key Infrastructure (PKI) is crumbling,
partially due to the lack of a strong understanding of
how encryption actually works, but also due to
weaknesses in its implementation. This paper outlines
an Internet storage technique using secret sharing
methods which could be used to overcome the problems
inherent with PKI, while supporting new types of
architectures incorporating such things as automated
failover and break-glass data recovery. The paper
outlines a novel architecture: SECRET, which supports a
robust cloud-based infrastructure with in-built privacy
and failover. In order to understand the performance
overhead of SECRET, the paper outlines a range of
experiments that investigate the overhead of this and
other secret share methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Gao:2015:DLB,
author = "Ren Gao and Juebo Wu",
title = "Dynamic Load Balancing Strategy for Cloud Computing
with Ant Colony Optimization",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "465--483",
day = "26",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040465",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/465",
abstract = "How to distribute and coordinate tasks in cloud
computing is a challenging issue, in order to get
optimal resource utilization and avoid overload. In
this paper, we present a novel approach on load
balancing via ant colony optimization (ACO), for
balancing the workload in a cloud computing platform
dynamically. Two strategies, forward-backward ant
mechanism and max-min rules, are introduced to quickly
find out the candidate nodes for load balancing. We
formulate pheromone initialization and pheromone update
according to physical resources under the cloud
computing environment, including pheromone evaporation,
incentive, and punishment rules, etc. Combined with
task execution prediction, we define the moving
probability of ants in two ways, that is, whether the
forward ant meets the backward ant, or not, in the
neighbor node, with the aim of accelerating searching
processes. Simulations illustrate that the proposed
strategy can not only provide dynamic load balancing
for cloud computing with less searching time, but can
also get high network performance under medium and
heavily loaded contexts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Kruger:2015:ITE,
author = "Dov Kruger and Sarah Inman and Zhiyu Ding and Yijin
Kang and Poornima Kuna and Yujie Liu and Xiakun Lu and
Stephen Oro and Yingzhu Wang",
title = "Improving Teacher Effectiveness: Designing Better
Assessment Tools in Learning Management Systems",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "484--499",
day = "18",
month = dec,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040484",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/484",
abstract = "Current-generation assessment tools used in K-12 and
post-secondary education are limited in the type of
questions they support; this limitation makes it
difficult for instructors to navigate their assessment
engines. Furthermore, the question types tend to score
low on Bloom's Taxonomy. Dedicated learning management
systems (LMS) such as Blackboard, Moodle and Canvas are
somewhat better than informal tools as they offer more
question types and some randomization. Still, question
types in all the major LMS assessment engines are
limited. Additionally, LMSs place a heavy burden on
teachers to generate online assessments. In this study
we analyzed the top three LMS providers to identify
inefficiencies. These inefficiencies in LMS design,
point us to ways to ask better questions. Our findings
show that teachers have not adopted current tools
because they do not offer definitive improvements in
productivity. Therefore, we developed LiquiZ, a design
for a next-generation assessment engine that reduces
user effort and provides more advanced question types
that allow teachers to ask questions that can currently
only be asked in one-on-one demonstration. The initial
LiquiZ project is targeted toward STEM subjects, so the
question types are particularly advantageous in math or
science subjects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Drogkaris:2015:HMA,
author = "Prokopios Drogkaris and Stefanos Gritzalis and
Christos Kalloniatis and Costas Lambrinoudakis",
title = "A Hierarchical Multitier Approach for Privacy Policies
in e-Government Environments",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "500--515",
day = "21",
month = dec,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040500",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/500",
abstract = "The appeal of e-Government users to retain control
over their personal information, while making use of
advanced governmental electronic services through
interconnected and interoperable deployments, can be
assisted by the incorporation of privacy policy and
Preferences documents. This paper addresses the
formulation of light-weight and accurate privacy
policies, while preserving compliance with underlying
legal and regulatory framework. Through the
exploitation of existing governmental hierarchies, a
multitier approach is proposed able to support diverge
data needs and processing requests imposed by service
providers. The incorporation of this approach into
e-Government environments will reduce the
administrative workload, imposed by the inclusion of
privacy policy documents, and promote the
implementation and provision of user-centric and data
privacy aware electronic services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Zhou:2015:ORR,
author = "Dan Zhou and Zhong Yao",
title = "Optimal Referral Reward Considering Customer's Budget
Constraint",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "516--529",
day = "21",
month = dec,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040516",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/516",
abstract = "Everyone likes Porsche but few can afford it. Budget
constraints always play a critical role in a customer's
decision-making. The literature disproportionally
focuses on how firms can induce customer valuations
toward the product, but does not address how to assess
the influence of budget constraints. We study these
questions in the context of a referral reward program
(RRP). RRP is a prominent marketing strategy that
utilizes recommendations passed from existing customers
to their friends and effectively stimulates word of
mouth (WoM). We build a stylized game-theoretical model
with a nested Stackelberg game involving three players:
a firm, an existing customer, and a potential customer
who is a friend of the existing customer. The budget is
the friend's private information. We show that RRPs
might be optimal when the friend has either a low or a
high valuation, but they work differently in each
situation because of the budget. Furthermore, there are
two budget thresholds, a fixed one and a variable one,
which limit a firm's ability to use rewards.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Chang:2016:PQF,
author = "Gary Chang and Chung-Chieh Lee",
title = "Priority Queues with Fractional Service for Tiered
Delay {QoS}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "1",
day = "29",
month = dec,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/1",
abstract = "Packet scheduling is key to quality of service (QoS)
capabilities of broadband wired and wireless networks.
In a heterogeneous traffic environment, a comprehensive
QoS packet scheduler must strike a balance between flow
fairness and access delay. Many advanced packet
scheduling solutions have targeted fair bandwidth
allocation while protecting delay-constrained traffic
by adding priority queue(s) on top of a fair bandwidth
scheduler. Priority queues are known to cause
performance uncertainties and, thus, various
modifications have been proposed. In this paper, we
present a packet queueing engine dubbed Fractional
Service Buffer (FSB), which, when coupled with a
configurable flow scheduler, can achieve desired QoS
objectives, such as fair throughputs and differentiated
delay guarantees. Key performance metrics, such as
delay limit and probability of delay limit violation,
are derived as a function of key FSB parameters for
each delay class in the packet queueing engine using
diffusion approximations. OPNET simulations verify
these analytical results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing QoS and QoE Levels in Wired and
Wireless Data Networks.",
}
@Article{Wang:2016:DII,
author = "Yun Wang and William Chu and Sarah Fields and Colleen
Heinemann and Zach Reiter",
title = "Detection of Intelligent Intruders in Wireless Sensor
Networks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "2",
day = "20",
month = jan,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/2",
abstract = "Most of the existing research works on the intrusion
detection problem in a wireless sensor network (WSN)
assume linear or random mobility patterns in
abstracting intruders' models in traversing the WSN
field. However, in real-life WSN applications, an
intruder is usually an intelligent mobile robot with
environment learning and detection avoidance capability
(i.e., the capability to avoid surrounding sensors).
Due to this, the literature results based on the linear
or random mobility models may not be applied to the
real-life WSN design and deployment for efficient and
effective intrusion detection in practice. This
motivates us to investigate the impact of intruder's
intelligence on the intrusion detection problem in a
WSN for various applications. To be specific, we
propose two intrusion algorithms, the pinball and
flood-fill algorithms, to mimic the intelligent motion
and behaviors of a mobile intruder in detecting and
circumventing nearby sensors for detection avoidance
while heading for its destination. The two proposed
algorithms are integrated into a WSN framework for
intrusion detection analysis in various circumstances.
Monte Carlo simulations are conducted, and the results
indicate that: (1) the performance of a WSN drastically
changes as a result of the intruder's intelligence in
avoiding sensor detections and intrusion algorithms;
(2) network parameters, including node density, sensing
range and communication range, play a crucial part in
the effectiveness of the intruder's intrusion
algorithms; and (3) it is imperative to integrate
intruder's intelligence in the WSN research for
intruder detection problems under various application
circumstances.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Office:2016:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2015",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "3",
day = "22",
month = jan,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/3",
abstract = "In this paper, we address the problem of energy
conservation and optimization in residential
environments by providing users with useful information
to solicit a change in consumption behavior. Taking
care to highly limit the costs of installation and
management, our work proposes a Non-Intrusive Load
Monitoring (NILM) approach, which consists of
disaggregating the whole-house power consumption into
the individual portions associated to each device.
State of the art NILM algorithms need monitoring data
sampled at high frequency, thus requiring high costs
for data collection and management. In this paper, we
propose an NILM approach that relaxes the requirements
on monitoring data since it uses total active power
measurements gathered at low frequency (about 1 Hz).
The proposed approach is based on the use of Factorial
Hidden Markov Models (FHMM) in conjunction with context
information related to the user presence in the house
and the hourly utilization of appliances. Through a set
of tests, we investigated how the use of these
additional context-awareness features could improve
disaggregation results with respect to the basic FHMM
algorithm. The tests have been performed by using
Tracebase, an open dataset made of data gathered from
real home environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paradiso:2016:CBE,
author = "Francesca Paradiso and Federica Paganelli and Dino
Giuli and Samuele Capobianco",
title = "Context-Based Energy Disaggregation in Smart Homes",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "4",
day = "27",
month = jan,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/4",
abstract = "In this paper, we address the problem of energy
conservation and optimization in residential
environments by providing users with useful information
to solicit a change in consumption behavior. Taking
care to highly limit the costs of installation and
management, our work proposes a Non-Intrusive Load
Monitoring (NILM) approach, which consists of
disaggregating the whole-house power consumption into
the individual portions associated to each device.
State of the art NILM algorithms need monitoring data
sampled at high frequency, thus requiring high costs
for data collection and management. In this paper, we
propose an NILM approach that relaxes the requirements
on monitoring data since it uses total active power
measurements gathered at low frequency (about 1 Hz).
The proposed approach is based on the use of Factorial
Hidden Markov Models (FHMM) in conjunction with context
information related to the user presence in the house
and the hourly utilization of appliances. Through a set
of tests, we investigated how the use of these
additional context-awareness features could improve
disaggregation results with respect to the basic FHMM
algorithm. The tests have been performed by using
Tracebase, an open dataset made of data gathered from
real home environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Ismail:2016:FST,
author = "Umar Mukhtar Ismail and Shareeful Islam and Moussa
Ouedraogo and Edgar Weippl",
title = "A Framework for Security Transparency in Cloud
Computing",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "5",
day = "17",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/5",
abstract = "Individuals and corporate users are persistently
considering cloud adoption due to its significant
benefits compared to traditional computing
environments. The data and applications in the cloud
are stored in an environment that is separated, managed
and maintained externally to the organisation.
Therefore, it is essential for cloud providers to
demonstrate and implement adequate security practices
to protect the data and processes put under their
stewardship. Security transparency in the cloud is
likely to become the core theme that underpins the
systematic disclosure of security designs and practices
that enhance customer confidence in using cloud service
and deployment models. In this paper, we present a
framework that enables a detailed analysis of security
transparency for cloud based systems. In particular, we
consider security transparency from three different
levels of abstraction, i.e., conceptual, organisation
and technical levels, and identify the relevant
concepts within these levels. This allows us to provide
an elaboration of the essential concepts at the core of
transparency and analyse the means for implementing
them from a technical perspective. Finally, an example
from a real world migration context is given to provide
a solid discussion on the applicability of the proposed
framework.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Ma:2016:MDR,
author = "Tinghuai Ma and Xichao Xu and Meili Tang and Yuanfeng
Jin and Wenhai Shen",
title = "{MHBase}: a Distributed Real-Time Query Scheme for
Meteorological Data Based on {HBase}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "6",
day = "01",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/6",
abstract = "Meteorological technology has evolved rapidly in
recent years to provide enormous, accurate and
personalized advantages in the public service. Large
volumes of observational data are generated gradually
by technologies such as geographical remote sensing,
meteorological radar satellite, etc. that makes data
analysis in weather forecasting more precise but also
poses a threat to the traditional method of data
storage. In this paper, we present MHBase,
Meteorological data based on HBase (Hadoop Database), a
distributed real-time query scheme for meteorological
data based on HBase. The calibrated data obtained from
terminal devices will be partitioned into HBase and
persisted to HDFS (the Hadoop Distributed File System).
We propose two algorithms (the Indexed Store and the
Indexed Retrieve Algorithms) to implement a secondary
index using HBase Coprocessors, which allow MHbase to
provide high performance data querying on columns other
than rowkey. Experimental results show that the
performance of MHBase can satisfy the basic demands of
meteorological business services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lischke:2016:ABN,
author = "Matthias Lischke and Benjamin Fabian",
title = "Analyzing the {Bitcoin} Network: The First Four
Years",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "7",
day = "07",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/7",
abstract = "In this explorative study, we examine the economy and
transaction network of the decentralized digital
currency Bitcoin during the first four years of its
existence. The objective is to develop insights into
the evolution of the Bitcoin economy during this
period. For this, we establish and analyze a novel
integrated dataset that enriches data from the Bitcoin
blockchain with off-network data such as business
categories and geo-locations. Our analyses reveal the
major Bitcoin businesses and markets. Our results also
give insights on the business distribution by countries
and how businesses evolve over time. We also show that
there is a gambling network that features many very
small transactions. Furthermore, regional differences
in the adoption and business distribution could be
found. In the network analysis, the small world
phenomenon is investigated and confirmed for several
subgraphs of the Bitcoin network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Deng:2016:ELF,
author = "Zhi-An Deng and Di Wu and Yiran Zhou and Zhenyu Na",
title = "Enhanced Local {Fisher} Discriminant Analysis for
Indoor Positioning in Wireless Local Area Network",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "8",
day = "25",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/8",
abstract = "Feature extraction methods have been used to extract
location features for indoor positioning in wireless
local area networks. However, existing methods, such as
linear discriminant analysis and principal component
analysis, all suffer from the multimodal property of
signal distribution. This paper proposes a novel
method, based on enhanced local fisher discriminant
analysis (LFDA). First, LFDA is proposed to extract
discriminative location features. It maximizes
between-class separability while preserving
within-class local structure of signal space, thereby
guaranteeing maximal discriminative information
involved in positioning. Then, the generalization
ability of LFDA is further enhanced using signal
perturbation, which generates more number of
representative training samples. Experimental results
in realistic indoor environment show that, compared
with previous feature extraction methods, the proposed
method reduces the mean and standard deviation of
positing error by 23.9\% and 33.0\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Golbeck:2016:UPF,
author = "Jennifer Golbeck and Matthew Louis Mauriello",
title = "User Perception of {Facebook} App Data Access: a
Comparison of Methods and Privacy Concerns",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "9",
day = "25",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/9",
abstract = "Users share vast amounts of personal information
online, but are they fully aware of what information
they are sharing and with whom? In this paper, we
focused on Facebook apps and set out to understand how
concerned users are about privacy and how well-informed
they are about what personal data apps can access. We
found that initially, subjects were generally
under-informed about what data apps could access from
their profiles. After viewing additional information
about these permissions, subjects' concern about
privacy on Facebook increased. Subjects' understanding
of what data apps were able to access increased,
although even after receiving explicit information on
the topic, many subjects still did not fully understand
the extent to which apps could access their data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Massa:2016:FEU,
author = "Daniele Massa and Lucio Davide Spano",
title = "{FaceMashup}: An End-User Development Tool for Social
Network Data",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "10",
day = "29",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/10",
abstract = "Every day, each active social network user produces
and shares texts, images and videos. While developers
can access such data through application programming
interfaces (APIs) for creating games, visualizations
and routines, end users have less control on such
information. Their access is mediated by the social
application features, which limits them in combining
sources, filtering results and performing actions on
groups of elements. In order to fill this gap, we
introduce FaceMashup, an end user development (EUD)
environment supporting the manipulation of the Facebook
graph. We describe the tool interface, documenting the
choices we made during the design iterations. Data
types are represented through widgets containing user
interface (UI) elements similar to those used in the
social network application. Widgets can be connected
with each other with the drag and drop of their inner
fields, and the application updates their content.
Finally, we report the results of a user-test on the
FaceMashup prototype, which shows a good acceptance of
the environment by end-users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Golbeck:2016:EFA,
author = "Jennifer Golbeck and Carman Neustaedter",
title = "Environmental Factors Affecting Where People
Geocache",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "11",
day = "12",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/11",
abstract = "Outdoor leisure activities are important for public
health as well as family cohesiveness, yet
environmental factors may easily affect someone's
ability to participate in such activities. We explored
this with a focus on the social web-based treasure hunt
game called Geocaching. We collected data on all US and
Canadian geocaches from OpenCaching.com and conducted
an online survey with twenty geocachers as a follow-up
to our data analysis. Data analysis showed that
geocaches were more often found in areas that were
wealthier, better educated, younger, and more urban,
and had higher population density and better weather.
Survey results showed similar trends: Most people
actively thought about where they would cache and tried
to minimize risks, despite cache hiders thinking less
about these concerns. These results further emphasize
the importance of environmental factors when it comes
to participation in outdoor activities and leads to
Human-Computer Interaction design implications for
location-based online social activities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Antoniadis:2016:MAP,
author = "Konstantinos Antoniadis and Kostas Zafiropoulos and
Vasiliki Vrana",
title = "A Method for Assessing the Performance of e-Government
{Twitter} Accounts",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "12",
day = "18",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/12",
abstract = "This paper introduces a method for assessing the
influence of Twitter accounts of central e-government
agencies. It first stresses the importance of activity
and popularity of the e-government accounts, and also
the importance of community formation among
followers-citizens, as the two main stages of
e-government adoption. The proposed approach combines
activity and popularity of the accounts and followers'
community characteristics in a ranking system, using an
idea originally introduced to measure blogosphere
authority. A Twitter Authority Index is produced. The
method is demonstrated through an extended example: 56
Twitter accounts of ministries of EU countries are
sorted according to their indexes in the proposed
ranking system. Detailed values for the ministries'
accounts and average values for the countries that the
ministries belong to are reported and commented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Fernandez:2016:MSC,
author = "Eduardo B. Fernandez and Nobukazu Yoshioka and
Hironori Washizaki and Madiha H. Syed",
title = "Modeling and Security in Cloud Ecosystems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "13",
day = "20",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/13",
abstract = "Clouds do not work in isolation but interact with
other clouds and with a variety of systems either
developed by the same provider or by external entities
with the purpose to interact with them; forming then an
ecosystem. A software ecosystem is a collection of
software systems that have been developed to coexist
and evolve together. The stakeholders of such a system
need a variety of models to give them a perspective of
the possibilities of the system, to evaluate specific
quality attributes, and to extend the system. A
powerful representation when building or using software
ecosystems is the use of architectural models, which
describe the structural aspects of such a system. These
models have value for security and compliance, are
useful to build new systems, can be used to define
service contracts, find where quality factors can be
monitored, and to plan further expansion. We have
described a cloud ecosystem in the form of a pattern
diagram where its components are patterns and reference
architectures. A pattern is an encapsulated solution to
a recurrent problem. We have recently expanded these
models to cover fog systems and containers. Fog
Computing is a highly-virtualized platform that
provides compute, storage, and networking services
between end devices and Cloud Computing Data Centers; a
Software Container provides an execution environment
for applications sharing a host operating system,
binaries, and libraries with other containers. We
intend to use this architecture to answer a variety of
questions about the security of this system as well as
a reference to design interacting combinations of
heterogeneous components. We defined a metamodel to
relate security concepts which is being expanded.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Heaberlin:2016:EWN,
author = "Bradi Heaberlin and Simon DeDeo",
title = "The Evolution of {Wikipedia}'s Norm Network",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "14",
day = "20",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/14",
abstract = "Social norms have traditionally been difficult to
quantify. In any particular society, their sheer number
and complex interdependencies often limit a
system-level analysis. One exception is that of the
network of norms that sustain the online Wikipedia
community. We study the fifteen-year evolution of this
network using the interconnected set of pages that
establish, describe, and interpret the community's
norms. Despite Wikipedia's reputation for ad hoc
governance, we find that its normative evolution is
highly conservative. The earliest users create norms
that both dominate the network and persist over time.
These core norms govern both content and interpersonal
interactions using abstract principles such as
neutrality, verifiability, and assume good faith. As
the network grows, norm neighborhoods decouple
topologically from each other, while increasing in
semantic coherence. Taken together, these results
suggest that the evolution of Wikipedia's norm network
is akin to bureaucratic systems that predate the
information age.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Okamoto:2016:RBI,
author = "Kazuaki Okamoto and Kazumasa Takami",
title = "Routing Based on Information about the Routes of
Fixed-Route Traveling Nodes and on Destination Areas
Aimed at Reducing the Load on the {DTN}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "15",
day = "27",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/15",
abstract = "In recent years, the interest in delay/disruption
tolerant networking (DTN) is growing as a means of
communication in times of disaster. To ensure that a
DTN works well in an emergency, it is desirable to
promote general use of the DTN, so that it will also be
used in normal times. Since the DTN uses mobile
terminals and vehicles, which are not dedicated network
devices, as relay nodes, the routing method should be
such that it does not impose a large processing load on
relay nodes. This paper considers use of a DTN for a
day-to-day service of delivering content to a specific
area and proposes a new routing method that is based on
information about the routes of fixed-route traveling
nodes, such as public transportation vehicles. The
destination of a bundle is specified not by a terminal
identifier, but by an area, which is identified by its
location information. This paper presents an
outbound-type bundle protocol, which is used by relay
nodes when they have received a forwarding-bundle
request from a sending terminal and try to determine
whether the bundle can reach its destination area.
Using simulation, the superiority of the proposed
routing was confirmed by comparing it to existing
routing methods in terms of the bundle arrival rate and
factors that affect the network load, such as the
number of bundle copies, the number of hops and the
maximum required buffer size.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ibba:2016:DLC,
author = "Simona Ibba and Filippo Eros Pani",
title = "Digital Libraries: The Challenge of Integrating
{Instagram} with a Taxonomy for Content Management",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "16",
day = "10",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/16",
abstract = "Interoperability and social implication are two
current challenges in the digital library (DL) context.
To resolve the problem of interoperability, our work
aims to find a relationship between the main metadata
schemas. In particular, we want to formalize knowledge
through the creation of a metadata taxonomy built with
the analysis and the integration of existing schemas
associated with DLs. We developed a method to integrate
and combine Instagram metadata and hashtags. The final
result is a taxonomy, which provides innovative
metadata with respect to the classification of
resources, as images of Instagram and the
user-generated content, that play a primary role in the
context of modern DLs. The possibility of Instagram to
localize the photos inserted by users allows us to
interpret the most relevant and interesting informative
content for a specific user type and in a specific
location and to improve access, visibility and
searching of library content.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Premnath:2016:SPC,
author = "Sriram Nandha Premnath and Zygmunt J. Haas",
title = "Supporting Privacy of Computations in Mobile Big Data
Systems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "17",
day = "10",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/17",
abstract = "Cloud computing systems enable clients to rent and
share computing resources of third party platforms, and
have gained widespread use in recent years. Numerous
varieties of mobile, small-scale devices such as
smartphones, red e-health devices, etc., across users,
are connected to one another through the massive
internetwork of vastly powerful servers on the cloud.
While mobile devices store ``private information'' of
users such as location, payment, health data, etc.,
they may also contribute ``semi-public information''
(which may include crowdsourced data such as transit,
traffic, nearby points of interests, etc.) for data
analytics. In such a scenario, a mobile device may seek
to obtain the result of a computation, which may depend
on its private inputs, crowdsourced data from other
mobile devices, and/or any ``public inputs'' from other
servers on the Internet. We demonstrate a new method of
delegating real-world computations of
resource-constrained mobile clients using an encrypted
program known as the garbled circuit. Using the garbled
version of a mobile client's inputs, a server in the
cloud executes the garbled circuit and returns the
resulting garbled outputs. Our system assures privacy
of the mobile client's input data and output of the
computation, and also enables the client to verify that
the evaluator actually performed the computation. We
analyze the complexity of our system. We measure the
time taken to construct the garbled circuit as well as
evaluate it for varying number of servers. Using
real-world data, we evaluate our system for a
practical, privacy preserving search application that
locates the nearest point of interest for the mobile
client to demonstrate feasibility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Carrino:2016:IIT,
author = "Francesco Carrino and Elena Mugellini and Omar Abou
Khaled and Nabil Ouerhani and Juergen Ehrensberger",
title = "{iNUIT}: {Internet of Things} for Urban Innovation",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "18",
day = "11",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/18",
abstract = "Internet of Things (IoT) seems a viable way to enable
the Smart Cities of the future. iNUIT (Internet of
Things for Urban Innovation) is a multi-year research
program that aims to create an ecosystem that exploits
the variety of data coming from multiple sensors and
connected objects installed on the scale of a city, in
order to meet specific needs in terms of development of
new services (physical security, resource management,
etc.). Among the multiple research activities within
iNUIT, we present two projects: SmartCrowd and OpEc.
SmartCrowd aims at monitoring the crowd's movement
during large events. It focuses on real-time tracking
using sensors available in smartphones and on the use
of a crowd simulator to detect possible dangerous
scenarios. A proof-of-concept of the application has
been tested at the Pal{\'e}o Festival (Switzerland)
showing the feasibility of the approach. OpEc
(Optimisation de l'Eclairage public) aims at using IoT
to implement dynamic street light management and
control with the goal of reducing street light energy
consumption while guaranteeing the same level of
security of traditional illumination. The system has
been tested during two months in a street in St-Imier
(Switzerland) without interruption, validating its
stability and resulting in an overall energy saving of
about 56\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Lettieri:2016:CSS,
author = "Nicola Lettieri",
title = "Computational Social Science, the Evolution of Policy
Design and Rule Making in Smart Societies",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "19",
day = "12",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/19",
abstract = "In the last 20 years, the convergence of different
factors-the rise of the complexity of science, the
``data deluge'' and the advances in information
technologies-triggered a paradigm shift in the way we
understand complex social systems and their evolution.
Beyond shedding new light onto social dynamics, the
emerging research area of Computational Social Science
(CSS) is providing a new rationale for a more
scientifically-grounded and effective policy design.
The paper discusses the opportunities potentially
deriving from the intersection between policy design
issues and CSS methods. After a general introduction to
the limits of traditional policy-making and a brief
review of the most promising CSS methodologies, the
work deals with way in which the insights potentially
offered by CSS can concretely flow in policy choices.
The attention is focused, to this end, on the legal
mechanisms regulating the formulation and the
evaluation of public policies. Our goal is two-fold:
sketch how the project of a ``smart society'' is
connected to the evolution of social sciences and
emphasize the need for change in the way in which
public policies are conceived of, designed and
implemented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Pandey:2016:UFI,
author = "Pankaj Pandey and Einar Snekkenes",
title = "Using Financial Instruments to Transfer the
Information Security Risks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "20",
day = "17",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/20",
abstract = "For many individuals and organizations,
cyber-insurance is the most practical and only way of
handling a major financial impact of an information
security event. However, the cyber-insurance market
suffers from the problem of information asymmetry, lack
of product diversity, illiquidity, high transaction
cost, and so on. On the other hand, in theory, capital
market-based financial instruments can provide a risk
transfer mechanism with the ability to absorb the
adverse impact of an information security event. Thus,
this article addresses the limitations in the
cyber-(re)insurance markets with a set of capital
market-based financial instruments. This article
presents a set of information security derivatives,
namely options, vanilla options, swap, and futures that
can be traded at an information security prediction
market. Furthermore, this article demonstrates the
usefulness of information security derivatives in a
given scenario and presents an evaluation of the same
in comparison with cyber-insurance. In our analysis, we
found that the information security derivatives can at
least be a partial solution to the problems in the
cyber-insurance markets. The information security
derivatives can be used as an effective tool for
information elicitation and aggregation, cyber risk
pricing, risk hedging, and strategic decision making
for information security risk management.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lerman:2016:IVO,
author = "Kristina Lerman",
title = "Information Is Not a Virus, and Other Consequences of
Human Cognitive Limits",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "21",
day = "13",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/21",
abstract = "The many decisions that people make about what to pay
attention to online shape the spread of information in
online social networks. Due to the constraints of
available time and cognitive resources, the ease of
discovery strongly impacts how people allocate their
attention to social media content. As a consequence,
the position of information in an individual's social
feed, as well as explicit social signals about its
popularity, determine whether it will be seen, and the
likelihood that it will be shared with followers.
Accounting for these cognitive limits simplifies
mechanics of information diffusion in online social
networks and explains puzzling empirical observations:
(i) information generally fails to spread in social
media and (ii) highly connected people are less likely
to re-share information. Studies of information
diffusion on different social media platforms reviewed
here suggest that the interplay between human cognitive
limits and network structure differentiates the spread
of information from other social contagions, such as
the spread of a virus through a population.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Sanchez:2016:DES,
author = "Luis Enrique S{\'a}nchez and Antonio Santos-Olmo and
Esther {\'A}lvarez and Monica Huerta and Sara Camacho
and Eduardo Fern{\'a}ndez-Medina",
title = "Development of an Expert System for the Evaluation of
Students' Curricula on the Basis of Competencies",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "22",
day = "18",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/22",
abstract = "The concept of competence, which emerged during the
reform of computer engineering degrees, has not brought
benefits to companies when attempting to select the
most suitable candidates for their jobs. This article
aims to show some of the research that has been
conducted to determine why companies have not found
these skills useful and how both can be aligned.
Finally, we show the development of an Expert System
that will enable companies to select the most suitable
candidates for their jobs, considering personal and
social skills, along with technical knowledge. This
prototype will serve as a basis to align the
competencies defined in the curricula with professional
requirements, thus allowing a true alignment between
degree courses and the needs of professional
companies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Fantacci:2016:CSS,
author = "Romano Fantacci and Dania Marabissi",
title = "Cognitive Spectrum Sharing: An Enabling Wireless
Communication Technology for a Wide Use of Smart
Systems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "23",
day = "20",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/23",
abstract = "A smart city is an environment where a pervasive,
multi-service network is employed to provide citizens
improved living conditions as well as better public
safety and security. Advanced communication
technologies are essential to achieve this goal. In
particular, an efficient and reliable communication
network plays a crucial role in providing continue,
ubiquitous, and reliable interconnections among users,
smart devices, and applications. As a consequence,
wireless networking appears as the principal enabling
communication technology despite the necessity to face
severe challenges to satisfy the needs arising from a
smart environment, such as explosive data volume,
heterogeneous data traffic, and support of quality of
service constraints. An interesting approach for
meeting the growing data demand due to smart city
applications is to adopt suitable methodologies to
improve the usage of all potential spectrum resources.
Towards this goal, a very promising solution is
represented by the Cognitive Radio technology that
enables context-aware capability in order to pursue an
efficient use of the available communication resources
according to the surrounding environment conditions. In
this paper we provide a review of the characteristics,
challenges, and solutions of a smart city communication
architecture, based on the Cognitive Radio technology,
by focusing on two new network paradigms-namely,
Heterogeneous Network and Machines-to-Machines
communications-that are of special interest to
efficiently support smart city applications and
services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Martini:2016:SOA,
author = "Barbara Martini and Federica Paganelli",
title = "A Service-Oriented Approach for Dynamic Chaining of
Virtual Network Functions over Multi-Provider
Software-Defined Networks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "24",
day = "01",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/24",
abstract = "Emerging technologies such as Software-Defined
Networks (SDN) and Network Function Virtualization
(NFV) promise to address cost reduction and flexibility
in network operation while enabling innovative network
service delivery models. However, operational network
service delivery solutions still need to be developed
that actually exploit these technologies, especially at
the multi-provider level. Indeed, the implementation of
network functions as software running over a
virtualized infrastructure and provisioned on a service
basis let one envisage an ecosystem of network services
that are dynamically and flexibly assembled by
orchestrating Virtual Network Functions even across
different provider domains, thereby coping with
changeable user and service requirements and context
conditions. In this paper we propose an approach that
adopts Service-Oriented Architecture (SOA)
technology-agnostic architectural guidelines in the
design of a solution for orchestrating and dynamically
chaining Virtual Network Functions. We discuss how SOA,
NFV, and SDN may complement each other in realizing
dynamic network function chaining through service
composition specification, service selection, service
delivery, and placement tasks. Then, we describe the
architecture of a SOA-inspired NFV orchestrator, which
leverages SDN-based network control capabilities to
address an effective delivery of elastic chains of
Virtual Network Functions. Preliminary results of
prototype implementation and testing activities are
also presented. The benefits for Network Service
Providers are also described that derive from the
adaptive network service provisioning in a
multi-provider environment through the orchestration of
computing and networking services to provide end users
with an enhanced service experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Garcia-Martinez:2016:MAE,
author = "Ant{\'o}n Garc{\'\i}a-Mart{\'\i}nez and Jos{\'e}
Rivas-Rangel and Jaime Rangel-Quintos and Jos{\'e}
Antonio Espinosa and Cecilio Barba and Carmen
De-Pablos-Heredero",
title = "A Methodological Approach to Evaluate Livestock
Innovations on Small-Scale Farms in Developing
Countries",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "25",
day = "03",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/25",
abstract = "The aim of the study was deepening the knowledge of
livestock innovations knowledge on small-scale farms in
developing countries. First, we developed a methodology
focused on identifying potential appropriate livestock
innovations for smallholders and grouped them in
innovation areas, defined as a set of well-organized
practices with a business purpose. Finally, a process
management program (PMP) was evaluated according to the
livestock innovation level and viability of the
small-scale farms. Logistic regression was used to
evaluate the impact of PMP on the economic viability of
the farm. Information from 1650 small-scale livestock
farms in Mexico was collected and the innovations were
grouped in five innovation areas: A1. Management, A2.
Feeding, A3. Genetic, A4. Reproduction and A5. Animal
Health. The resulting innovation level in the system
was low at 45.7\% and heterogeneous among areas. This
study shows the usefulness of the methodology described
and confirms that implementing a PMP allows improving
the viability an additional 21\%, due to a better
integration of processes, resulting in more efficient
management.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Vovides:2016:ELU,
author = "Yianna Vovides and Sarah Inman",
title = "Elusive Learning-Using Learning Analytics to Support
Reflective Sensemaking of Ill-Structured Ethical
Problems: a Learner-Managed Dashboard Solution",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "26",
day = "11",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/26",
abstract = "Since the turn of the 21st century, we have seen a
surge of studies on the state of U.S. education
addressing issues such as cost, graduation rates,
retention, achievement, engagement, and curricular
outcomes. There is an expectation that graduates should
be able to enter the workplace equipped to take on
complex and ``messy'' or ill-structured problems as
part of their professional and everyday life. In the
context of online learning, we have identified two key
issues that are elusive (hard to capture and make
visible): learning with ill-structured problems and the
interaction of social and individual learning. We
believe that the intersection between learning and
analytics has the potential, in the long-term, to
minimize the elusiveness of deep learning. A proposed
analytics model is described in this article that is
meant to capture and also support further development
of a learner's reflective sensemaking.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Ye:2016:DSA,
author = "Ting Ye and Baowei Wang",
title = "Density Self-Adaptive Hybrid Clustering Routing
Protocol for Wireless Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "27",
day = "29",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/27",
abstract = "Energy efficiency is of major concern in wireless
sensor networks, especially in difficult node
deployment environments. Clustering is an effective
method to save energy consumption and prolong the
network lifetime. There are two kinds of clustering
methods in hierarchical routing protocols, namely
distributed control and centralized control. In the
distributed strategy, the algorithm has good
scalability, but it can easily lead to an uneven
distribution of cluster heads. When the centralized
strategy is used, the network is balanced and robust,
but the overhead of clustering is large and the network
latency is increased. In our proposed protocol, named
DAHC, a mixture algorithm of distributed and
centralized control is used to select a cluster head
(CH). Simultaneously, we propose a novel approach to
judge the cluster density and adjust according to the
preset threshold. The simulation results show that our
methods can evenly distribute the energy load on all
nodes, save the energy consumption of communication and
extend the network lifetime concurrently.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Strizhov:2016:SPS,
author = "Mikhail Strizhov and Zachary Osman and Indrajit Ray",
title = "Substring Position Search over Encrypted Cloud Data
Supporting Efficient Multi-User Setup",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "28",
day = "04",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/28",
abstract = "Existing Searchable Encryption (SE) solutions are able
to handle simple Boolean search queries, such as single
or multi-keyword queries, but cannot handle substring
search queries over encrypted data that also involve
identifying the position of the substring within the
document. These types of queries are relevant in areas
such as searching DNA data. In this paper, we propose a
tree-based Substring Position Searchable Symmetric
Encryption (SSP-SSE) to overcome the existing gap. Our
solution efficiently finds occurrences of a given
substring over encrypted cloud data. Specifically, our
construction uses the position heap tree data structure
and achieves asymptotic efficiency comparable to that
of an unencrypted position heap tree. Our encryption
takes O (k n) time, and the resulting ciphertext is of
size O (k n), where k is a security parameter and n is
the size of stored data. The search takes O (m 2 + o c
c) time and three rounds of communication, where m is
the length of the queried substring and o c c is the
number of occurrences of the substring in the document
collection. We prove that the proposed scheme is secure
against chosen-query attacks that involve an adaptive
adversary. Finally, we extend SSP-SSE to the multi-user
setting where an arbitrary group of cloud users can
submit substring queries to search the encrypted
data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Haider:2016:WBD,
author = "Waqas Haider and Gideon Creech and Yi Xie and Jiankun
Hu",
title = "{Windows} Based Data Sets for Evaluation of Robustness
of Host Based Intrusion Detection Systems {(IDS)} to
Zero-Day and Stealth Attacks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "29",
day = "05",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/29",
abstract = "The Windows Operating System (OS) is the most popular
desktop OS in the world, as it has the majority market
share of both servers and personal computing
necessities. However, as its default signature-based
security measures are ineffectual for detecting
zero-day and stealth attacks, it needs an intelligent
Host-based Intrusion Detection System (HIDS).
Unfortunately, a comprehensive data set that reflects
the modern Windows OS's normal and attack surfaces is
not publicly available. To fill this gap, in this paper
two open data sets generated by the cyber security
department of the Australian Defence Force Academy
(ADFA) are introduced, namely: Australian Defence Force
Academy Windows Data Set (ADFA-WD); and Australian
Defence Force Academy Windows Data Set with a Stealth
Attacks Addendum (ADFA-WD: SAA). Statistical analysis
results based on these data sets show that, due to the
low foot prints of modern attacks and high similarity
of normal and attacked data, both these data sets are
complex, and highly intelligent Host based Anomaly
Detection Systems (HADS) design will be required.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Santos-Olmo:2016:ISC,
author = "Antonio Santos-Olmo and Luis Enrique S{\'a}nchez and
Ismael Caballero and Sara Camacho and Eduardo
Fernandez-Medina",
title = "The Importance of the Security Culture in {SMEs} as
Regards the Correct Management of the Security of Their
Assets",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "30",
day = "07",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/30",
abstract = "The information society is increasingly more dependent
on Information Security Management Systems (ISMSs), and
the availability of these kinds of systems is now vital
for the development of Small and Medium-Sized
Enterprises (SMEs). However, these companies require
ISMSs that have been adapted to their special features,
and which are optimized as regards the resources needed
to deploy and maintain them. This article shows how
important the security culture within ISMSs is for
SMEs, and how the concept of security culture has been
introduced into a security management methodology
(MARISMA is a Methodology for ``Information Security
Management System in SMEs'' developed by the Sicaman
Nuevas Tecnolog{\'\i}as Company, Research Group GSyA
and Alarcos of the University of Castilla-La Mancha.)
for SMEs. This model is currently being directly
applied to real cases, thus allowing a steady
improvement to be made to its implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{DeDeo:2016:CCW,
author = "Simon DeDeo",
title = "Conflict and Computation on {Wikipedia}: a
Finite-State Machine Analysis of {Editor}
Interactions",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "31",
day = "08",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/31",
abstract = "What is the boundary between a vigorous argument and a
breakdown of relations? What drives a group of
individuals across it? Taking Wikipedia as a test case,
we use a hidden Markov model to approximate the
computational structure and social grammar of more than
a decade of cooperation and conflict among its editors.
Across a wide range of pages, we discover a bursty
war/peace structure where the systems can become
trapped, sometimes for months, in a computational
subspace associated with significantly higher levels of
conflict-tracking ``revert'' actions. Distinct patterns
of behavior characterize the lower-conflict subspace,
including tit-for-tat reversion. While a fraction of
the transitions between these subspaces are associated
with top-down actions taken by administrators, the
effects are weak. Surprisingly, we find no statistical
signal that transitions are associated with the
appearance of particularly anti-social users, and only
weak association with significant news events outside
the system. These findings are consistent with
transitions being driven by decentralized processes
with no clear locus of control. Models of belief
revision in the presence of a common resource for
information-sharing predict the existence of two
distinct phases: a disordered high-conflict phase, and
a frozen phase with spontaneously-broken symmetry. The
bistability we observe empirically may be a consequence
of editor turn-over, which drives the system to a
critical point between them.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Guidi:2016:CSI,
author = "Gabriele Guidi and Roberto Miniati and Matteo Mazzola
and Ernesto Iadanza",
title = "Case Study: {IBM Watson} Analytics Cloud Platform as
Analytics-as-a-Service System for Heart Failure Early
Detection",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "32",
day = "13",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/32",
abstract = "In the recent years the progress in technology and the
increasing availability of fast connections have
produced a migration of functionalities in Information
Technologies services, from static servers to
distributed technologies. This article describes the
main tools available on the market to perform Analytics
as a Service (AaaS) using a cloud platform. It is also
described a use case of IBM Watson Analytics, a cloud
system for data analytics, applied to the following
research scope: detecting the presence or absence of
Heart Failure disease using nothing more than the
electrocardiographic signal, in particular through the
analysis of Heart Rate Variability. The obtained
results are comparable with those coming from the
literature, in terms of accuracy and predictive power.
Advantages and drawbacks of cloud versus static
approaches are discussed in the last sections.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Florez:2016:ADC,
author = "Ang{\'e}lica Fl{\'o}rez and Lenin Serrano and Urbano
G{\'o}mez and Luis Su{\'a}rez and Alejandro Villarraga
and Hugo Rodr{\'\i}guez",
title = "Analysis of Dynamic Complexity of the Cyber Security
Ecosystem of {Colombia}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "33",
day = "19",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/33",
abstract = "This paper presents two proposals for the analysis of
the complexity of the Cyber security Ecosystem of
Colombia (CEC). This analysis shows the available
knowledge about entities engaged in cyber security in
Colombia and the relationships between them, which
allow an understanding of the synergy between the
different existing components. The complexity of the
CEC is detailed from the view of the Influence Diagram
of System Dynamics and the Domain Diagram of Software
Engineering. The resulting model makes cyber security
evident as a strategic component of national
security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Merrick:2016:SGT,
author = "Kathryn Merrick and Medria Hardhienata and Kamran
Shafi and Jiankun Hu",
title = "A Survey of Game Theoretic Approaches to Modelling
Decision-Making in Information Warfare Scenarios",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "34",
day = "22",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/34",
abstract = "Our increasing dependence on information technologies
and autonomous systems has escalated international
concern for information- and cyber-security in the face
of politically, socially and religiously motivated
cyber-attacks. Information warfare tactics that
interfere with the flow of information can challenge
the survival of individuals and groups. It is
increasingly important that both humans and machines
can make decisions that ensure the trustworthiness of
information, communication and autonomous systems.
Subsequently, an important research direction is
concerned with modelling decision-making processes. One
approach to this involves modelling decision-making
scenarios as games using game theory. This paper
presents a survey of information warfare literature,
with the purpose of identifying games that model
different types of information warfare operations. Our
contribution is a systematic identification and
classification of information warfare games, as a basis
for modelling decision-making by humans and machines in
such scenarios. We also present a taxonomy of games
that map to information warfare and cyber crime
problems as a precursor to future research on
decision-making in such scenarios. We identify and
discuss open research questions including the role of
behavioural game theory in modelling human decision
making and the role of machine decision-making in
information warfare scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Kou:2016:TVR,
author = "Weili Kou and Hui Li and Kailai Zhou",
title = "Turning Video Resource Management into Cloud
Computing",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "35",
day = "21",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/35",
abstract = "Big data makes cloud computing more and more popular
in various fields. Video resources are very useful and
important to education, security monitoring, and so on.
However, issues of their huge volumes, complex data
types, inefficient processing performance, weak
security, and long times for loading pose challenges in
video resource management. The Hadoop Distributed File
System (HDFS) is an open-source framework, which can
provide cloud-based platforms and presents an
opportunity for solving these problems. This paper
presents video resource management architecture based
on HDFS to provide a uniform framework and a five-layer
model for standardizing the current various algorithms
and applications. The architecture, basic model, and
key algorithms are designed for turning video resources
into a cloud computing environment. The design was
tested by establishing a simulation system prototype.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Santos-Olmo:2016:AAR,
author = "Antonio Santos-Olmo and Luis Enrique S{\'a}nchez and
David G. Rosado and Eduardo Fern{\'a}ndez-Medina and
Mario Piattini",
title = "Applying the Action-Research Method to Develop a
Methodology to Reduce the Installation and Maintenance
Times of Information Security Management Systems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "36",
day = "22",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/36",
abstract = "Society is increasingly dependent on Information
Security Management Systems (ISMS), and having these
kind of systems has become vital for the development of
Small and Medium-Sized Enterprises (SMEs). However,
these companies require ISMS that have been adapted to
their special features and have been optimized as
regards the resources needed to deploy and maintain
them, with very low costs and short implementation
periods. This paper discusses the different cycles
carried out using the `Action Research (AR)' method,
which have allowed the development of a security
management methodology for SMEs that is able to
automate processes and reduce the implementation time
of the ISMS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Boulos:2016:IWH,
author = "Maged N. Kamel Boulos and Dean M. Giustini and Steve
Wheeler",
title = "{Instagram} and {WhatsApp} in Health and Healthcare:
an Overview",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "37",
day = "26",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/37",
abstract = "Instagram and WhatsApp are two social media and
networking services introduced in 2010. They are
currently subsidiaries of Facebook, Inc., California,
USA. Using evidence from the published literature and
case reports indexed in PubMed and other sources, we
present an overview of the various applications of
Instagram and WhatsApp in health and healthcare. We
also briefly describe the main issues surrounding the
uses of these two apps in health and medicine.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue e-Health.",
}
@Article{Yang:2016:NQP,
author = "Weijun Yang and Yuanfeng Chen",
title = "A Novel {QoS} Provisioning Algorithm for Optimal
Multicast Routing in {WMNs}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "38",
day = "01",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/38",
abstract = "The problem of optimal multicast routing in Wireless
Mess Networks (WMNs) with Quality-of-Service (QoS)
provisioning, which is Non-Deterministic Polynomial
(NP)-complete, is studied in this paper. The existing
algorithms are not very efficient or effective. In
order to find an approximation optimal solution for
WMNs in feasible time from source to the set of
destination nodes, combining the previous deterministic
algorithm with the well-known Minimum Path Cost
Heuristic (MPH) algorithm, a novel multicast heuristic
approximation (NMHA) algorithm with QoS provisioning is
proposed in this paper to deal with it. The theoretical
validations for the proposed algorithm are presented to
show its performance and efficiency. After that, the
random static networks with different destination nodes
are evaluated. Simulations in these networks show that
the proposed algorithm can achieve the approximate
optimal solution with the approximation factor of 2(1 +
\epsilon)(1 - 1/ q) and the time complexity of O(qmn 2
\tau K-1).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Liu:2016:OBR,
author = "Xin Liu and Zhongfu Li and Shaohua Jiang",
title = "Ontology-Based Representation and Reasoning in
Building Construction Cost Estimation in {China}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "39",
day = "03",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/39",
abstract = "Cost estimation is one of the most critical tasks for
building construction project management. The existing
building construction cost estimation methods of many
countries, including China, require information from
several sources, including material, labor, and
equipment, and tend to be manual, time-consuming, and
error-prone. To solve these problems, a building
construction cost estimation model based on ontology
representation and reasoning is established, which
includes three major components, i.e., concept model
ontology, work item ontology, and construction
condition ontology. Using this model, the cost
estimation information is modeled into OWL axioms and
SWRL rules that leverage the semantically rich ontology
representation to reason about cost estimation. Based
on OWL axioms and SWRL rules, the cost estimation
information can be translated into a set of concept
models, work items, and construction conditions
associated with the specific construction conditions.
The proposed method is demonstrated in Prot{\'e}g{\'e}
3.4.8 through case studies based on the Measurement
Specifications of Building Construction and Decoration
Engineering taken from GB 50500-2013 (the Chinese
national mandatory specifications). Finally, this
research discusses the limitations of the proposed
method and future research directions. The proposed
method can help a building construction cost estimator
extract information more easily and quickly.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Computing and Knowledge
Building.",
}
@Article{Chinnachodteeranun:2016:SOS,
author = "Rassarin Chinnachodteeranun and Kiyoshi Honda",
title = "Sensor Observation Service {API} for Providing Gridded
Climate Data to Agricultural Applications",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "40",
day = "09",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/40",
abstract = "We developed a mechanism for seamlessly providing
weather data and long-term historical climate data from
a gridded data source through an international standard
web API, which was the Sensor Observation Service (SOS)
defined by the Open Geospatial Consortium (OGC). The
National Agriculture and Food Research Organization
(NARO) Japan has been providing gridded climate data
consisting of nine daily meteorological variables,
which are average, minimum, maximum of air temperature,
relative humidity, sunshine duration, solar radiant
exposure, downward longwave radiation, precipitation
and wind speed for 35 years covering Japan. The gridded
data structure is quite useful for spatial analysis,
such as developing crop suitability maps and monitoring
regional crop development. Individual farmers, however,
make decisions using historical climate information and
forecasts for an incoming cropping season of their
farms. In this regard, climate data at a point-based
structure are convenient for application development to
support farmers' decisions. Through the proposed
mechanism in this paper, the agricultural applications
and analysis can request point-based climate data from
a gridded data source through the standard API with no
need to deal with the complicated hierarchical data
structure of the gridded climate data source. Clients
can easily obtain data and metadata by only accessing
the service endpoint. The mechanism also provides
several web bindings and data encodings for the
clients' convenience. Caching, including the
pre-caching mechanism, was developed and evaluated to
secure an effective response time. The mechanism
enhances the accessibility and usability of the gridded
weather data source, as well as SOS API for
agricultural applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Diaz:2016:CAT,
author = "Paloma D{\'\i}az and John M. Carroll and Ignacio
Aedo",
title = "Coproduction as an Approach to Technology-Mediated
Citizen Participation in Emergency Management",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "41",
day = "10",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/41",
abstract = "Social and mobile computing open up new possibilities
for integrating citizens' information, knowledge, and
social capital in emergency management (EM). This
participation can improve the capacity of local
agencies to respond to unexpected events by involving
citizens not only as first line informants, but also as
first responders. This participation could contribute
to build resilient communities aware of the risks they
are threatened by and able to mobilize their social
capital to cope with them and, in turn, decrease the
impact of threats and hazards. However for this
participation to be possible organizations in charge of
EM need to realize that involving citizens does not
interfere with their protocols and that citizens are a
valuable asset that can contribute to the EM process
with specific skills and capabilities. In this paper we
discuss the design challenges of using social and
mobile computing to move to a more participatory EM
process that starts by empowering both citizens and
organizations in a coproduction service envisioned as a
partnership effort. As an example, we describe a case
study of a participatory design approach that involved
professional EM workers and decision makers in an
effort to understand the challenges of using
technology-based solutions to integrate citizen skills
and capabilities in their operation protocols. The case
study made it possible to identify specific roles that
citizens might play in a crisis or disaster and to
envision scenarios were technologies could be used to
integrate their skills into the EM process. In this way
the paper contributes to the roles and the scenarios of
theory-building about coproduction in EM services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Francese:2016:SEP,
author = "Rita Francese and Michele Risi",
title = "Supporting Elderly People by Ad Hoc Generated Mobile
Applications Based on Vocal Interaction",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "42",
day = "25",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/42",
abstract = "Mobile devices can be exploited for enabling people to
interact with Internet of Things (IoT) services. The
MicroApp Generator [1] is a service-composition tool
for supporting the generation of mobile applications
directly on the mobile device. The user interacts with
the generated app by using the traditional touch-based
interaction. This kind of interaction often is not
suitable for elderly and special needs people that
cannot see or touch the screen. In this paper, we
extend the MicroApp Generator with an interaction
approach enabling a user to interact with the generated
app only by using his voice, which can be very useful
to let special needs people live at home. To this aim,
once the mobile app has been generated and executed,
the system analyses and describes the user interface,
listens to the user speech and performs the associated
actions. A preliminary analysis has been conducted to
assess the user experience of the proposed approach by
a sample composed of elderly users by using a
questionnaire as a research instrument.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Carta:2016:ISI,
author = "Salvatore Carta and Ludovico Boratto",
title = "Introduction to the Special Issue on Human-Computer
Interaction and the {Social Web}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "43",
day = "01",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/43",
abstract = "Data is currently one of the most important assets for
companies in every field. The continuous growth in the
importance and volume of data has created a new
problem: it cannot be handled by traditional analysis
techniques. This problem was, therefore, solved through
the creation of a new paradigm: Big Data. However, Big
Data originated new issues related not only to the
volume or the variety of the data, but also to data
security and privacy. In order to obtain a full
perspective of the problem, we decided to carry out an
investigation with the objective of highlighting the
main issues regarding Big Data security, and also the
solutions proposed by the scientific community to solve
them. In this paper, we explain the results obtained
after applying a systematic mapping study to security
in the Big Data ecosystem. It is almost impossible to
carry out detailed research into the entire topic of
security, and the outcome of this research is,
therefore, a big picture of the main problems related
to security in a Big Data system, along with the
principal solutions to them proposed by the research
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Moreno:2016:MIB,
author = "Julio Moreno and Manuel A. Serrano and Eduardo
Fern{\'a}ndez-Medina",
title = "Main Issues in Big Data Security",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "44",
day = "01",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/44",
abstract = "Data is currently one of the most important assets for
companies in every field. The continuous growth in the
importance and volume of data has created a new
problem: it cannot be handled by traditional analysis
techniques. This problem was, therefore, solved through
the creation of a new paradigm: Big Data. However, Big
Data originated new issues related not only to the
volume or the variety of the data, but also to data
security and privacy. In order to obtain a full
perspective of the problem, we decided to carry out an
investigation with the objective of highlighting the
main issues regarding Big Data security, and also the
solutions proposed by the scientific community to solve
them. In this paper, we explain the results obtained
after applying a systematic mapping study to security
in the Big Data ecosystem. It is almost impossible to
carry out detailed research into the entire topic of
security, and the outcome of this research is,
therefore, a big picture of the main problems related
to security in a Big Data system, along with the
principal solutions to them proposed by the research
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Kosenkov:2016:CCN,
author = "Alexander Kosenkov",
title = "Cyber Conflicts as a New Global Threat",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "45",
day = "09",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/45",
abstract = "In this paper, an attempt is made to analyze the
potential threats and consequences of cyber conflicts
and, in particular, the risks of a global cyber
conflict. The material is based on a comprehensive
analysis of the nature of cyber conflict and its
elements from both technical and societal points of
view. The approach used in the paper considers the
societal component as an essential part of cyber
conflicts, allowing basics of cyber conflicts often
disregarded by researchers and the public to be
highlighted. Finally, the conclusion offers an
opportunity to consider cyber conflict as the most
advanced form of modern warfare, which imposes the most
serious threat and whose effect could be comparable to
weapons of mass destruction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Marti:2016:DED,
author = "Patrizia Marti and Carl Megens and Caroline Hummels",
title = "Data-Enabled Design for Social Change: Two Case
Studies",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "46",
day = "23",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/46",
abstract = "Smartness in contemporary society implies the use of
massive data to improve the experience of people with
connected services and products. The use of big data to
collect information about people's behaviours opens a
new concept of ``user-centred design'' where users are
remotely monitored, observed and profiled. In this
paradigm, users are considered as sources of
information and their participation in the design
process is limited to a role of data generators. There
is a need to identify methodologies that actively
involve people and communities at the core of
ecosystems of interconnected products and services. Our
contribution to designing for social innovation in
ecosystems relies on developing new methods and
approaches to transform data-driven design using a
participatory and co-creative data-enabled design
approach. To this end, we present one of the methods we
have developed to design ``smart'' systems called
Experiential Design Landscapes (EDL), and two sample
projects, Social Stairs and [Y]our Perspective. Social
Stairs faces the topic of behaviour change mediated by
sensing technologies. [Y]our Perspective is a social
platform to sustain processes of deliberative
democracy. Both projects exemplify our approach to
data-enabled design as a social proactive participatory
design approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Deng:2016:RCM,
author = "Ziyun Deng and Lei Chen and Tingqing He and Tao Meng",
title = "A Reliability Calculation Method for {Web} Service
Composition Using Fuzzy Reasoning Colored {Petri} Nets
and Its Application on Supercomputing Cloud Platform",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "47",
day = "27",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/47",
abstract = "In order to develop a Supercomputing Cloud Platform
(SCP) prototype system using Service-Oriented
Architecture (SOA) and Petri nets, we researched some
technologies for Web service composition. Specifically,
in this paper, we propose a reliability calculation
method for Web service compositions, which uses Fuzzy
Reasoning Colored Petri Net (FRCPN) to verify the Web
service compositions. We put forward a definition of
semantic threshold similarity for Web services and a
formal definition of FRCPN. We analyzed five kinds of
production rules in FRCPN, and applied our method to
the SCP prototype. We obtained the reliability value of
the end Web service as an indicator of the overall
reliability of the FRCPN. The method can test the
activity of FRCPN. Experimental results show that the
reliability of the Web service composition has a
correlation with the number of Web services and the
range of reliability transition values.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Alti:2016:ASB,
author = "Adel Alti and Abderrahim Lakehal and S{\'e}bastien
Laborie and Philippe Roose",
title = "Autonomic Semantic-Based Context-Aware Platform for
Mobile Applications in Pervasive Environments",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "48",
day = "29",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/48",
abstract = "Currently, the field of smart-* (home, city, health,
tourism, etc.) is naturally heterogeneous and
multimedia oriented. In such a domain, there is an
increasing usage of heterogeneous mobile devices, as
well as captors transmitting data (IoT). They are
highly connected and can be used for many different
services, such as to monitor, to analyze and to display
information to users. In this context, data management
and adaptation in real time are becoming a challenging
task. More precisely, at one time, it is necessary to
handle in a dynamic, intelligent and transparent
framework various data provided by multiple devices
with several modalities. This paper presents a
Kali-Smart platform, which is an autonomic
semantic-based context-aware platform. It is based on
semantic web technologies and a middleware providing
autonomy and reasoning facilities. Moreover, Kali-Smart
is generic and, as a consequence, offers to users a
flexible infrastructure where they can easily control
various interaction modalities of their own situations.
An experimental study has been made to evaluate the
performance and feasibility of the proposed platform.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Huckle:2016:SB,
author = "Steve Huckle and Martin White",
title = "Socialism and the Blockchain",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "49",
day = "18",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/49",
abstract = "Bitcoin (BTC) is often cited as Libertarian. However,
the technology underpinning Bitcoin, blockchain, has
properties that make it ideally suited to Socialist
paradigms. Current literature supports the Libertarian
viewpoint by focusing on the ability of Bitcoin to
bypass central authority and provide anonymity; rarely
is there an examination of blockchain technology's
capacity for decentralised transparency and
auditability in support of a Socialist model. This
paper conducts a review of the blockchain,
Libertarianism, and Socialist philosophies. It then
explores Socialist models of public ownership and looks
at the unique cooperative properties of blockchain that
make the technology ideal for supporting Socialist
societies. In summary, this paper argues that
blockchain technologies are not just a Libertarian
tool, they also enhance Socialist forms of
governance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Angelini:2016:SLL,
author = "Leonardo Angelini and Stefano Carrino and Omar Abou
Khaled and Susie Riva-Mossman and Elena Mugellini",
title = "Senior Living Lab: An Ecological Approach to {Foster}
Social Innovation in an Ageing Society",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "50",
day = "21",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/50",
abstract = "The Senior Living Lab (SLL) is a transdisciplinary
research platform created by four Universities that
aims at promoting ageing well at home through the
co-creation of innovative products, services and
practices with older adults. While most living labs for
ageing well are focused on Information and
Communication Technologies (ICTs), this social
laboratory adopts a transdisciplinary approach,
bringing together designers, economists, engineers and
healthcare professionals to develop multiple forms of
social innovation using participatory methods. The SLL
is based on an ecological approach, connecting
professionals and users in a cooperative network and
involving all of the stakeholders concerned with ageing
well, such as existing associations, business entities
and policy-makers. Three main themes for the co-design
of products and services were identified at the
beginning of the SLL conception, each sustained by a
major business partner: healthy nutrition to cope with
frailty, improved autonomous mobility to foster
independence and social communication to prevent
isolation. This article shows the innovative
transdisciplinary approach of the SLL and discusses the
particular challenges that emerged during the first
year of its creation, investigating the role of ICTs
when designing products and services for older
adults.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Ali:2016:OSD,
author = "Syed Mustafa Ali and Rachel Powers and Jeffrey Beorse
and Arif Noor and Farah Naureen and Naveed Anjum and
Muhammad Ishaq and Javariya Aamir and Richard
Anderson",
title = "{ODK} Scan: Digitizing Data Collection and Impacting
Data Management Processes in {Pakistan}'s Tuberculosis
Control Program",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "51",
day = "24",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/51",
abstract = "The present grievous tuberculosis situation can be
improved by efficient case management and timely
follow-up evaluations. With the advent of digital
technology, this can be achieved through quick
summarization of the patient-centric data. The aim of
our study was to assess the effectiveness of the ODK
Scan paper-to-digital system during a testing period of
three months. A sequential, explanatory mixed-method
research approach was employed to elucidate technology
use. Training, smartphones, the application and
3G-enabled SIMs were provided to the four field
workers. At the beginning, baseline measures of the
data management aspects were recorded and compared with
endline measures to determine the impact of ODK Scan.
Additionally, at the end of the study, users' feedback
was collected regarding app usability, user interface
design and workflow changes. A total of 122 patients'
records were retrieved from the server and analysed in
terms of quality. It was found that ODK Scan recognized
99.2\% of multiple choice fill-in bubble responses and
79.4\% of numerical digit responses correctly. However,
the overall quality of the digital data was decreased
in comparison to manually entered data. Using ODK Scan,
a significant time reduction is observed in data
aggregation and data transfer activities, but data
verification and form-filling activities took more
time. Interviews revealed that field workers saw value
in using ODK Scan, but they were more concerned about
the time-consuming aspects of the use of ODK Scan.
Therefore, it is concluded that minimal disturbance in
the existing workflow, continuous feedback and value
additions are the important considerations for the
implementing organization to ensure technology adoption
and workflow improvements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue e-Health.",
}
@Article{Hoang:2016:RHI,
author = "Xuan Dau Hoang and Hong Ky Pham",
title = "A Review on Hot-{IP} Finding Methods and Its
Application in Early {DDoS} Target Detection",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "52",
day = "25",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/52",
abstract = "On the high-speed connections of the Internet or
computer networks, the IP (Internet Protocol) packet
traffic passing through the network is extremely high,
and that makes it difficult for network monitoring and
attack detection applications. This paper reviews
methods to find the high-occurrence-frequency elements
in the data stream and applies the most efficient
methods to find Hot-IPs that are high-frequency IP
addresses of IP packets passing through the network.
Fast finding of Hot-IPs in the IP packet stream can be
effectively used in early detection of DDoS
(Distributed Denial of Service) attack targets and
spreading sources of network worms. Research results
show that the Count-Min method gives the best overall
performance for Hot-IP detection thanks to its low
computational complexity, low space requirement and
fast processing speed. We also propose an early
detection model of DDoS attack targets based on Hot-IP
finding, which can be deployed on the target network
routers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Zhu:2016:NMF,
author = "Zhiqin Zhu and Guanqiu Qi and Yi Chai and Yinong
Chen",
title = "A Novel Multi-Focus Image Fusion Method Based on
Stochastic Coordinate Coding and Local Density Peaks
Clustering",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "53",
day = "11",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/53",
abstract = "The multi-focus image fusion method is used in image
processing to generate all-focus images that have large
depth of field (DOF) based on original multi-focus
images. Different approaches have been used in the
spatial and transform domain to fuse multi-focus
images. As one of the most popular image processing
methods, dictionary-learning-based spare representation
achieves great performance in multi-focus image fusion.
Most of the existing dictionary-learning-based
multi-focus image fusion methods directly use the whole
source images for dictionary learning. However, it
incurs a high error rate and high computation cost in
dictionary learning process by using the whole source
images. This paper proposes a novel stochastic
coordinate coding-based image fusion framework
integrated with local density peaks. The proposed
multi-focus image fusion method consists of three
steps. First, source images are split into small image
patches, then the split image patches are classified
into a few groups by local density peaks clustering.
Next, the grouped image patches are used for
sub-dictionary learning by stochastic coordinate
coding. The trained sub-dictionaries are combined into
a dictionary for sparse representation. Finally, the
simultaneous orthogonal matching pursuit (SOMP)
algorithm is used to carry out sparse representation.
After the three steps, the obtained sparse coefficients
are fused following the max L1-norm rule. The fused
coefficients are inversely transformed to an image by
using the learned dictionary. The results and analyses
of comparison experiments demonstrate that fused images
of the proposed method have higher qualities than
existing state-of-the-art methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{He:2016:NFM,
author = "Jingsha He and Chengyue Chang and Peng He and Muhammad
Salman Pathan",
title = "Network Forensics Method Based on Evidence Graph and
Vulnerability Reasoning",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "54",
day = "10",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/54",
abstract = "As the Internet becomes larger in scale, more complex
in structure and more diversified in traffic, the
number of crimes that utilize computer technologies is
also increasing at a phenomenal rate. To react to the
increasing number of computer crimes, the field of
computer and network forensics has emerged. The general
purpose of network forensics is to find malicious users
or activities by gathering and dissecting firm
evidences about computer crimes, e.g., hacking.
However, due to the large volume of Internet traffic,
not all the traffic captured and analyzed is valuable
for investigation or confirmation. After analyzing some
existing network forensics methods to identify common
shortcomings, we propose in this paper a new network
forensics method that uses a combination of network
vulnerability and network evidence graph. In our
proposed method, we use vulnerability evidence and
reasoning algorithm to reconstruct attack scenarios and
then backtrack the network packets to find the original
evidences. Our proposed method can reconstruct attack
scenarios effectively and then identify multi-staged
attacks through evidential reasoning. Results of
experiments show that the evidence graph constructed
using our method is more complete and credible while
possessing the reasoning capability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Chinnachodteeranun:2016:DIW,
author = "Rassarin Chinnachodteeranun and Nguyen Duy Hung and
Kiyoshi Honda and Amor V. M. Ines and Eunjin Han",
title = "Designing and Implementing Weather Generators as {Web}
Services",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "55",
day = "15",
month = dec,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/55",
abstract = "Climate and weather realizations are essential inputs
for simulating crop growth and yields to analyze the
risks associated with future conditions. To simplify
the procedure of generating weather realizations and
make them available over the Internet, we implemented
novel mechanisms for providing weather generators as
web services, as well as a mechanism for sharing
identical weather realizations given a climatological
information. A web service for preparing long-term
climate data was implemented based on an international
standard, Sensor Observation Service (SOS). The weather
generator services, which are the core components of
the framework, analyze climatological data, and can
take seasonal climate forecasts as inputs for
generating weather realizations. The generated weather
realizations are encoded in a standard format, which
are ready for use to crop modeling. All outputs are
generated in SOS standard, which broadens the extent of
data sharing and interoperability with other sectoral
applications, e.g., water resources management. These
services facilitate the development of other
applications requiring input weather realizations, as
these can be obtained easily by just calling the
service. The workload of analysts related to data
preparation and handling of legacy weather generator
programs can be reduced. The architectural design and
implementation presented here can be used as a
prototype for constructing further services on top of
an interoperable sensor network system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Lopez:2017:KTC,
author = "Lorena Isabel Barona L{\'o}pez and {\'A}ngel Leonardo
Valdivieso Caraguay and Marco Antonio Sotelo Monge and
Luis Javier Garc{\'\i}a Villalba",
title = "Key Technologies in the Context of Future Networks:
Operational and Management Requirements",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "1",
day = "22",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/1",
abstract = "The concept of Future Networks is based on the premise
that current infrastructures require enhanced control,
service customization, self-organization and
self-management capabilities to meet the new needs in a
connected society, especially of mobile users. In order
to provide a high-performance mobile system, three main
fields must be improved: radio, network, and operation
and management. In particular, operation and management
capabilities are intended to enable business agility
and operational sustainability, where the addition of
new services does not imply an excessive increase in
capital or operational expenditures. In this context, a
set of key-enabled technologies have emerged in order
to aid in this field. Concepts such as Software Defined
Network (SDN), Network Function Virtualization (NFV)
and Self-Organized Networks (SON) are pushing
traditional systems towards the next 5G network
generation.This paper presents an overview of the
current status of these promising technologies and
ongoing works to fulfill the operational and management
requirements of mobile infrastructures. This work also
details the use cases and the challenges, taking into
account not only SDN, NFV, cloud computing and SON but
also other paradigms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Office:2017:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2016",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "2",
day = "12",
month = jan,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/2",
abstract = "The fifth generation mobile network, or 5G, moves
towards bringing solutions to deploying faster
networks, with hundreds of thousands of simultaneous
connections and massive data transfer. For this
purpose, several emerging technologies are implemented,
resulting in virtualization and self-organization of
most of their components, which raises important
challenges related to safety. In order to contribute to
their resolution, this paper proposes a novel
architecture for incident management on 5G. The
approach combines the conventional risk management
schemes with the Endsley Situational Awareness model,
thus improving effectiveness in different aspects,
among them the ability to adapt to complex and
dynamical monitoring environments, and countermeasure
tracking or the role of context when decision-making.
The proposal takes into account all layers for
information processing in 5G mobile networks, ranging
from infrastructure to the actuators responsible for
deploying corrective measures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lopez:2017:TIM,
author = "Lorena Isabel Barona L{\'o}pez and {\'A}ngel Leonardo
Valdivieso Caraguay and Jorge Maestre Vidal and Marco
Antonio Sotelo Monge and Luis Javier Garc{\'\i}a
Villalba",
title = "Towards Incidence Management in {5G} Based on
Situational Awareness",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "3",
day = "17",
month = jan,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/3",
abstract = "The fifth generation mobile network, or 5G, moves
towards bringing solutions to deploying faster
networks, with hundreds of thousands of simultaneous
connections and massive data transfer. For this
purpose, several emerging technologies are implemented,
resulting in virtualization and self-organization of
most of their components, which raises important
challenges related to safety. In order to contribute to
their resolution, this paper proposes a novel
architecture for incident management on 5G. The
approach combines the conventional risk management
schemes with the Endsley Situational Awareness model,
thus improving effectiveness in different aspects,
among them the ability to adapt to complex and
dynamical monitoring environments, and countermeasure
tracking or the role of context when decision-making.
The proposal takes into account all layers for
information processing in 5G mobile networks, ranging
from infrastructure to the actuators responsible for
deploying corrective measures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Martelli:2017:PVN,
author = "Cristina Martelli",
title = "A Point of View on New Education for Smart
Citizenship",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "4",
day = "01",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/4",
abstract = "Smart cities and intelligent communities have an
ever-growing demand for specialized smart services,
applications, and research-driven innovation. Knowledge
of users' profiles, behavior, and preferences are a
potentially dangerous side effect of smart services.
Citizens are usually not aware of the knowledge bases
generated by the IT services they use: this dimension
of the contemporary and digital era sheds new light on
the elements concerning the concept of citizenship
itself, as it affects dimensions like freedom and
privacy. This paper addresses this issue from an
education system perspective, and advances a
non-technical methodology for being aware and
recognizing knowledge bases generated by user-service
interaction. Starting from narratives, developed in
natural language by unskilled smart service users about
their experience, the proposed method advances an
original methodology, which is identified in the
conceptual models derived from these narratives, a
bridge towards a deeper understanding of the
informative implications of their behavior. The
proposal; which is iterative and scalable; has been
tested on the field and some examples of lesson
contents are presented and discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Park:2017:CMR,
author = "Kyungmo Park and Sanghyo Lee and Yonghan Ahn",
title = "{Construction Management Risk System (CMRS)} for
Construction Management {(CM)} Firms",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "5",
day = "10",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/5",
abstract = "After the global financial crisis of 2008, the need
for risk management arose because it was necessary to
minimize the losses in construction management (CM)
firms. This was caused by a decreased amount of orders
in the Korean CM market, which intensified order
competition between companies. However, research
results revealed that risks were not being
systematically managed owing to the absence of risk
management systems. Thus, it was concluded that it was
necessary to develop standard operating systems and
implement risk management systems in order to manage
risks effectively. Therefore, the purpose of this study
was to develop a construction risk management system
(CRMS) for systematically managing risks. For this
purpose, the field operation managers of CM firms were
interviewed and surveyed in order to define risk
factors. Upon this, a risk assessment priority analysis
was performed. Finally, a risk management system that
comprised seven modules and 20 sub-modules and was
capable of responding systematically to risks was
proposed. Furthermore, the effectiveness of this system
was verified through on-site inspection. This system
allows early response to risks, accountability
verification and immediate response to legal disputes
with clients by managing risk records.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vidros:2017:ADO,
author = "Sokratis Vidros and Constantinos Kolias and Georgios
Kambourakis and Leman Akoglu",
title = "Automatic Detection of Online Recruitment Frauds:
Characteristics, Methods, and a Public Dataset",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "6",
day = "03",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/6",
abstract = "The critical process of hiring has relatively recently
been ported to the cloud. Specifically, the automated
systems responsible for completing the recruitment of
new employees in an online fashion, aim to make the
hiring process more immediate, accurate and
cost-efficient. However, the online exposure of such
traditional business procedures has introduced new
points of failure that may lead to privacy loss for
applicants and harm the reputation of organizations. So
far, the most common case of Online Recruitment Frauds
(ORF), is employment scam. Unlike relevant online fraud
problems, the tackling of ORF has not yet received the
proper attention, remaining largely unexplored until
now. Responding to this need, the work at hand defines
and describes the characteristics of this severe and
timely novel cyber security research topic. At the same
time, it contributes and evaluates the first to our
knowledge publicly available dataset of 17,880
annotated job ads, retrieved from the use of a
real-life system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{He:2017:APP,
author = "Jingsha He and Qi Xiao and Peng He and Muhammad Salman
Pathan",
title = "An Adaptive Privacy Protection Method for Smart Home
Environments Using Supervised Learning",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "7",
day = "05",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/7",
abstract = "In recent years, smart home technologies have started
to be widely used, bringing a great deal of convenience
to people's daily lives. At the same time, privacy
issues have become particularly prominent. Traditional
encryption methods can no longer meet the needs of
privacy protection in smart home applications, since
attacks can be launched even without the need for
access to the cipher. Rather, attacks can be
successfully realized through analyzing the frequency
of radio signals, as well as the timestamp series, so
that the daily activities of the residents in the smart
home can be learnt. Such types of attacks can achieve a
very high success rate, making them a great threat to
users' privacy. In this paper, we propose an adaptive
method based on sample data analysis and supervised
learning (SDASL), to hide the patterns of daily
routines of residents that would adapt to dynamically
changing network loads. Compared to some existing
solutions, our proposed method exhibits advantages such
as low energy consumption, low latency, strong
adaptability, and effective privacy protection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Rametta:2017:DSN,
author = "Corrado Rametta and Giovanni Schembra",
title = "Designing a Softwarized Network Deployed on a Fleet of
Drones for Rural Zone Monitoring",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "8",
day = "20",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/8",
abstract = "In the last decade, the differences in the information
communication technology (ICT) infrastructures between
urban and rural areas have registered a tremendous
increase. ICT infrastructures could strongly help rural
communities where many operations are time consuming,
labor-intensive and expensive due to limited access and
large distances to cover. One of the most attractive
solutions, which is widely recognized as promising for
filling this gap, is the use of drone fleets. In this
context, this paper proposes a video monitoring
platform as a service (VMPaaS) for wide rural areas not
covered by Internet access. The platform is realized
with a Software-Defined Network (SDN)/Network Functions
Virtualization (NFV)-based flying ad-hoc network
(FANET), whose target is providing a flexible and
dynamic connectivity backbone, and a set of drones
equipped with high-resolution cameras, each
transmitting a video stream of a portion of the
considered area. After describing the architecture of
the proposed platform, service chains to realize the
video delivery service are described, and an analytical
model is defined to evaluate the computational load of
the platform nodes in such a way so as to allow the
network orchestrator to decide the backbone drones
where running the virtual functions, and the relative
resources to be allocated. Numerical analysis is
carried out in a case study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Tian:2017:IRB,
author = "Hao Tian and Peifeng Liang",
title = "Improved Recommendations Based on Trust Relationships
in Social Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "9",
day = "21",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/9",
abstract = "In order to alleviate the pressure of information
overload and enhance consumer satisfaction,
personalization recommendation has become increasingly
popular in recent years. As a result, various
approaches for recommendation have been proposed in the
past few years. However, traditional recommendation
methods are still troubled with typical issues such as
cold start, sparsity, and low accuracy. To address
these problems, this paper proposed an improved
recommendation method based on trust relationships in
social networks to improve the performance of
recommendations. In particular, we define trust
relationship afresh and consider several representative
factors in the formalization of trust relationships. To
verify the proposed approach comprehensively, this
paper conducted experiments in three ways. The
experimental results show that our proposed approach
leads to a substantial increase in prediction accuracy
and is very helpful in dealing with cold start and
sparsity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2017:DBS,
author = "Yongqun Chen and Huaibei Zhou and Ruoshan Kong and Li
Zhu and Huaqing Mao",
title = "Decentralized Blind Spectrum Selection in Cognitive
Radio Networks Considering Handoff Cost",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "10",
day = "31",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/10",
abstract = "Due to the spectrum varying nature of cognitive radio
networks, secondary users are required to perform
spectrum handoffs when the spectrum is occupied by
primary users, which will lead to a handoff delay. In
this paper, based on the multi-armed bandit framework
of medium access in decentralized cognitive radio
networks, we investigate blind spectrum selection
problem of secondary users whose sensing ability of
cognitive radio is limited and the channel statistics
are a priori unknown, taking the handoff delay as a
fixed handoff cost into consideration. In this
scenario, secondary users have to make the choice of
either staying foregoing spectrum with low availability
or handing off to another spectrum with higher
availability. We model the problem and investigate the
performance of three representative policies, i.e.,
\rho PRE, SL(K), k th-UCB1. The simulation results show
that, despite the inclusion of the fixed handoff cost,
these policies achieve the same asymptotic performance
as that without handoff cost. Moreover, through
comparison of these policies, we found the k th-UCB1
policy has better overall performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Context-Awareness of Mobile Systems.",
}
@Article{Guazzini:2017:PPP,
author = "Andrea Guazzini and Ay{\c{c}}a Sara{\c{c}} and Camillo
Donati and Annalisa Nardi and Daniele Vilone and
Patrizia Meringolo",
title = "Participation and Privacy Perception in Virtual
Environments: The Role of Sense of Community, Culture
and Gender between {Italian} and {Turkish}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "11",
day = "07",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/11",
abstract = "Advancements in information and communication
technologies have enhanced our possibilities to
communicate worldwide, eliminating borders and making
it possible to interact with people coming from other
cultures like never happened before. Such powerful
tools have brought us to reconsider our concept of
privacy and social involvement in order to make them
fit into this wider environment. It is possible to
claim that the information and communication
technologies (ICT) revolution is changing our world and
is having a core role as a mediating factor for social
movements (e.g., Arab spring) and political decisions
(e.g., Brexit), shaping the world in a faster and
shared brand new way. It is then interesting to explore
how the perception of this brand new environment (in
terms of social engagement, privacy perception and
sense of belonging to a community) differs even in
similar cultures separated by recent historical
reasons. Recent historical events may in effect have
shaped a different psychological representation of
Participation, Privacy and Sense of Community in ICT
environments, determining a different perception of
affordances and concerns of these complex behaviors.
The aim of this research is to examine the relation
between the constructs of Sense of Community,
Participation and Privacy compared with culture and
gender, considering the changes that have occurred in
the last few years with the introduction of the web
environment. A questionnaire, including ad hoc created
scales for Participation and Privacy, have been
administered to 180 participants from Turkey and Italy.
In order to highlight the cultural differences in the
perception of these two constructs, we have provided a
semantic differential to both sub-samples showing
interesting outcomes. The results are then discussed
while taking into account the recent history of both
countries in terms of the widespread of new
technologies, political actions and protest
movements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Wang:2017:SEE,
author = "Xinhua Wang",
title = "Spectrum and Energy Efficiency of Uplink Massive
{MIMO} System with {D2D} Underlay",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "12",
day = "13",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/12",
abstract = "In this paper, both the spectrum efficiency (SE) and
the energy efficiency (EE) are investigated for an
uplink massive multiple-input multiple-output (MIMO)
system coexisting with an underlay device-to-device
(D2D) system. The outage probability and the achievable
rates of the cellular user equipments (CUEs) and the
D2D link are derived in closed-form, respectively.
Constrained by the SE of the D2D link and the CUEs, the
EE of the massive MIMO system is maximized by jointly
optimizing the transmit power of CUEs and the number of
BS antennas. An algorithm with low complexity is
proposed to solve the optimization problem. Performance
results are provided to validate our derived
closed-from results and verify the efficiency of our
proposed scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Zhang:2017:FBI,
author = "Yunpeng Zhang and Chengyou Wang and Xiaoli Wang and
Min Wang",
title = "Feature-Based Image Watermarking Algorithm Using {SVD}
and {APBT} for Copyright Protection",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "13",
day = "19",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/13",
abstract = "Watermarking techniques can be applied in digital
images to maintain the authenticity and integrity for
copyright protection. In this paper, scale-invariant
feature transform (SIFT) is combined with local digital
watermarking and a digital watermarking algorithm based
on SIFT, singular value decomposition (SVD), and all
phase biorthogonal transform (APBT) is proposed. It
describes the generation process of the SIFT algorithm
in detail and obtains a series of scale-invariant
feature points. A large amount of candidate feature
points are selected to obtain the neighborhood which
can be used to embed the watermark. For these selected
feature points, block-based APBT is carried out on
their neighborhoods. Moreover, a coefficients matrix of
certain APBT coefficients is generated for SVD to embed
the encrypted watermark. Experimental results
demonstrate that the proposed watermarking algorithm
has stronger robustness than some previous schemes. In
addition, APBT-based digital watermarking algorithm has
good imperceptibility and is more robust to different
combinations of attacks, which can be applied for the
purpose of copyright protection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Yu:2017:EEM,
author = "Qingyao Yu and Guangming Li and Xiaojie Hang and Kun
Fu and Tianqi Li",
title = "An Energy Efficient {MAC} Protocol for Wireless
Passive Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "14",
day = "19",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/14",
abstract = "Medium Access Control (MAC) protocol is one of the key
network protocols that ensure Wireless Sensor Networks
(WSNs) maintain high performance during communication.
MAC protocol design plays an important role in
improving the performances of the whole network. First,
Wireless Passive Sensor Networks (WPSNs) and MAC
protocols are introduced in this paper. Second, some
existing MAC protocols are introduced. Sensor MAC
(S-MAC) protocol is analyzed and existing improved
backoff algorithms are introduced. A new MAC protocol
called Improved Sensor MAC (IS-MAC) is then proposed to
solve the problem that the contention window (CW)
during carrier sense is fixed in S-MAC protocol. IS-MAC
protocol is able to adjust CW in terms of network load,
so energy consumption can be decreased. Finally,
according to the simulation results on NS2, the
proposed protocol has better performance in terms of
throughput and energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sehra:2017:AOD,
author = "Sukhjit Singh Sehra and Jaiteg Singh and Hardeep Singh
Rai",
title = "Assessing {OpenStreetMap} Data Using Intrinsic Quality
Indicators: An Extension to the {QGIS} Processing
Toolbox",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "15",
day = "21",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/15",
abstract = "OpenStreetMap (OSM) is a recent emerging area in
computational science. There are several unexplored
issues in the quality assessment of OSM. Firstly,
researchers are using various established assessment
methods by comparing OSM with authoritative dataset.
However, these methods are unsuitable to assess OSM
data quality in the case of the non-availability of
authoritative data. In such a scenario, the intrinsic
quality indicators can be used to assess the quality.
Secondly, a framework for data assessment specific to
different geographic information system (GIS) domains
is not available. In this light, the current study
presents an extension of the Quantum GIS (QGIS)
processing toolbox by using existing functionalities
and writing new scripts to handle spatial data. This
would enable researchers to assess the completeness of
spatial data using intrinsic indicators. The study also
proposed a heuristic approach to test the road
navigability of OSM data. The developed models are
applied on Punjab (India) OSM data. The results suggest
that the OSM project in Punjab (India) is progressing
at a slow peace, and contributors' motivation is
required to enhance the fitness of data. It is
concluded that the scripts developed to provide an
intuitive method to assess the OSM data based on
quality indicators can be easily utilized for
evaluating the fitness-of-use of the data of any
region.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mamais:2017:PSD,
author = "Stylianos S. Mamais and George Theodorakopoulos",
title = "Private and Secure Distribution of Targeted
Advertisements to Mobile Phones",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "16",
day = "01",
month = may,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/16",
abstract = "Online Behavioural Advertising (OBA) enables promotion
companies to effectively target users with ads that
best satisfy their purchasing needs. This is highly
beneficial for both vendors and publishers who are the
owners of the advertising platforms, such as websites
and app developers, but at the same time creates a
serious privacy threat for users who expose their
consumer interests. In this paper, we categorize the
available ad-distribution methods and identify their
limitations in terms of security, privacy, targeting
effectiveness and practicality. We contribute our own
system, which utilizes opportunistic networking in
order to distribute targeted adverts within a social
network. We improve upon previous work by eliminating
the need for trust among the users (network nodes)
while at the same time achieving low memory and
bandwidth overhead, which are inherent problems of many
opportunistic networks. Our protocol accomplishes this
by identifying similarities between the consumer
interests of users and then allows them to share access
to the same adverts, which need to be downloaded only
once. Although the same ads may be viewed by multiple
users, privacy is preserved as the users do not learn
each other's advertising interests. An additional
contribution is that malicious users cannot alter the
ads in order to spread malicious content, and also,
they cannot launch impersonation attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Chen:2017:TRU,
author = "Haibao Chen and Yuyan Zhao and Chuxiong Yan",
title = "Towards Rack Utilization in {Internet} Datacenters: An
Approach Based on Dynamic Programming",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "17",
day = "06",
month = may,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/17",
abstract = "In the datacenter rented to Internet Service Providers
(ISPs), the low utilization of racks can seriously
affect ISPs' benefit because the ISPs are charged by
``rack per year'' rather than servers. Based on our
analysis about the utilization data from production
systems, we find that the over-provisioning of power
results in low power utilization, which potentially
decreases rack utilization as well as the ISPs'
benefit. To improve the rack utilization, maximizing
the number of servers in racks is an effective way. In
this paper, we propose a server placement algorithm to
minimize the power fragment in a rack. The experimental
results show that it can save more than 50\% leasing
cost (rack utilization improvement) in evaluation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Grout:2017:SAD,
author = "Vic Grout",
title = "A Simple Approach to Dynamic Optimisation of Flexible
Optical Networks with Practical Application",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "18",
day = "23",
month = may,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/18",
abstract = "This paper provides an initial introduction to, and
definition of, the `Dynamically Powered Relays for a
Flexible Optical Network' (DPR-FON) problem for
opto-electro-optical (OEO) regenerators used in optical
networks. In such networks, optical transmission
parameters can be varied dynamically as traffic
patterns change. This will provide different
bandwidths, but also change the regeneration limits as
a result. To support this flexibility, OEOs (`relays')
may be switched on and off as required, thus saving
power. DPR-FON is shown to be NP-complete;
consequently, solving such a dynamic problem in
real-time requires a fast heuristic capable of
delivering an acceptable approximation to the optimal
configuration with low complexity. In this paper, just
such an algorithm is developed, implemented, and
evaluated against more computationally-demanding
alternatives for two known cases. A number of
real-world extensions are considered as the paper
develops, combining to produce the `Generalised
Dynamically Powered Relays for a Flexible Optical
Network' (GDPR-FON) problem. This, too, is analysed and
an associated fast heuristic proposed, along with an
exploration of the further research that is required.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2017:ABM,
author = "Peng Sun and Guangming Li and Fuqiang Wang",
title = "An Adaptive Back-Off Mechanism for Wireless Sensor
Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "19",
day = "01",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/19",
abstract = "Wireless sensor networks (WSNs) have been extensively
applied in many domains such as smart homes and
Internet of Things (IoT). As part of WSNs'
communication protocols, back-off mechanisms play an
essential role in the deployment of wireless channels
for network nodes and have been at the core of ensuring
effective communication. The performance of many
back-off algorithms is excellent in light or middle
load networks. However, it degrades dramatically in
heavy load networks. In this paper, we propose an
adaptive contention window medium access control (MAC)
protocol to improve the throughput performance under
heavy load. By using the number of historical
collisions as the parameter in the back-off mechanism
to reflect the channel status, the size of the
contention window is adjusted automatically, and the
throughput of network is then improved. Simulation
results show that our optimized MAC protocol has higher
throughput and energy efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2017:ACM,
author = "Jiang Wu and Zhou Lei and Shengbo Chen and Wenfeng
Shen",
title = "An Access Control Model for Preventing Virtual Machine
Escape Attack",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "20",
day = "02",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/20",
abstract = "With the rapid development of Internet, the
traditional computing environment is making a big
migration to the cloud-computing environment. However,
cloud computing introduces a set of new security
problems. Aiming at the virtual machine (VM) escape
attack, we study the traditional attack model and
attack scenarios in the cloud-computing environment. In
addition, we propose an access control model that can
prevent virtual machine escape (PVME) by adapting the
BLP (Bell-La Padula) model (an access control model
developed by D. Bell and J. LaPadula). Finally, the
PVME model has been implemented on full virtualization
architecture. The experimental results show that the
PVME module can effectively prevent virtual machine
escape while only incurring 4\% to 8\% time overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2017:EEP,
author = "Xinhua Wang and Yan Yang and Jinlu Sheng",
title = "Energy Efficient Power Allocation for the Uplink of
Distributed Massive {MIMO} Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "21",
day = "09",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/21",
abstract = "In this paper, an energy efficient power allocation
scheme is proposed for a distributed massive
multiple-input multiple-output (MIMO) system with a
circular antenna array. Single-antenna users
simultaneously transmit signal to the base station (BS)
with a large number of distributed antennas. The tight
approximation of the energy efficiency (EE) is derived
in closed form expressions. Through jointly optimizing
the power allocation and the antenna number of BS, an
NP-hard problem is formulated to maximize the EE. The
equal power allocation is proved to be optimal given
the total transmit power and the number of antennas.
Finally, the optimal antenna number is determined by
one dimension search. It is noteworthy that the NP-hard
problem is solved by one dimension search. Simulation
results validate the accuracy and the low-complexity of
our proposed scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Wang:2017:MIM,
author = "Weijun Wang and Ying Li and Yinghui Huang and Hui Liu
and Tingting Zhang",
title = "A Method for Identifying the Mood States of Social
Network Users Based on Cyber Psychometrics",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "22",
day = "16",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/22",
abstract = "Analyzing people's opinions, attitudes, sentiments,
and emotions based on user-generated content (UGC) is
feasible for identifying the psychological
characteristics of social network users. However, most
studies focus on identifying the sentiments carried in
the micro-blogging text and there is no ideal
calculation method for users' real emotional states. In
this study, the Profile of Mood State (POMS) is used to
characterize users' real mood states and a regression
model is built based on cyber psychometrics and a
multitask method. Features of users' online behavior
are selected through structured statistics and
unstructured text. Results of the correlation analysis
of different features demonstrate that users' real mood
states are not only characterized by the messages
expressed through texts, but also correlate with
statistical features of online behavior. The
sentiment-related features in different timespans
indicate different correlations with the real mood
state. The comparison among various regression
algorithms suggests that the multitask learning method
outperforms other algorithms in root-mean-square error
and error ratio. Therefore, this cyber psychometrics
method based on multitask learning that integrates
structural features and temporal emotional information
could effectively obtain users' real mood states and
could be applied in further psychological measurements
and predictions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2017:NIT,
author = "Lingjun Liu and Zhonghua Xie and Cui Yang",
title = "A Novel Iterative Thresholding Algorithm Based on
Plug-and-Play Priors for Compressive Sampling",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "24",
day = "24",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/24",
abstract = "We propose a novel fast iterative thresholding
algorithm for image compressive sampling (CS) recovery
using three existing denoisers-i.e., TV (total
variation), wavelet, and BM3D (block-matching and 3D
filtering) denoisers. Through the use of the recently
introduced plug-and-play prior approach, we turn these
denoisers into CS solvers. Thus, our method can jointly
utilize the global and nonlocal sparsity of images. The
former is captured by TV and wavelet denoisers for
maintaining the entire consistency; while the latter is
characterized by the BM3D denoiser to preserve details
by exploiting image self-similarity. This composite
constraint problem is then solved with the fast
composite splitting technique. Experimental results
show that our algorithm outperforms several excellent
CS techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cocco:2017:BBC,
author = "Luisanna Cocco and Andrea Pinna and Michele Marchesi",
title = "Banking on Blockchain: Costs Savings Thanks to the
Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "25",
day = "27",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/25",
abstract = "This paper looks at the challenges and opportunities
of implementing blockchain technology across banking,
providing food for thought about the potentialities of
this disruptive technology. The blockchain technology
can optimize the global financial infrastructure,
achieving sustainable development, using more efficient
systems than at present. In fact, many banks are
currently focusing on blockchain technology to promote
economic growth and accelerate the development of green
technologies. In order to understand the potential of
blockchain technology to support the financial system,
we studied the actual performance of the Bitcoin
system, also highlighting its major limitations, such
as the significant energy consumption due to the high
computing power required, and the high cost of
hardware. We estimated the electrical power and the
hash rate of the Bitcoin network, over time, and, in
order to evaluate the efficiency of the Bitcoin system
in its actual operation, we defined three quantities:
``economic efficiency'', ``operational efficiency'',
and ``efficient service''. The obtained results show
that by overcoming the disadvantages of the Bitcoin
system, and therefore of blockchain technology, we
could be able to handle financial processes in a more
efficient way than under the current system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Menesidou:2017:CKM,
author = "Sofia Anna Menesidou and Vasilios Katos and Georgios
Kambourakis",
title = "Cryptographic Key Management in Delay Tolerant
Networks: a Survey",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "26",
day = "27",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/26",
abstract = "Since their appearance at the dawn of the second
millennium, Delay or Disruption Tolerant Networks
(DTNs) have gradually evolved, spurring the development
of a variety of methods and protocols for making them
more secure and resilient. In this context, perhaps,
the most challenging problem to deal with is that of
cryptographic key management. To the best of our
knowledge, the work at hand is the first to survey the
relevant literature and classify the various so far
proposed key management approaches in such a restricted
and harsh environment. Towards this goal, we have
grouped the surveyed key management methods into three
major categories depending on whether the particular
method copes with (a) security initialization, (b) key
establishment, and (c) key revocation. We have
attempted to provide a concise but fairly complete
evaluation of the proposed up-to-date methods in a
generalized way with the aim of offering a central
reference point for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2017:SFI,
author = "Xiruo Liu and Meiyuan Zhao and Sugang Li and Feixiong
Zhang and Wade Trappe",
title = "A Security Framework for the {Internet of Things} in
the Future {Internet} Architecture",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "27",
day = "28",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/27",
abstract = "The Internet of Things (IoT) is a recent trend that
extends the boundary of the Internet to include a wide
variety of computing devices. Connecting many
stand-alone IoT systems through the Internet introduces
many challenges, with security being front-and-center
since much of the collected information will be exposed
to a wide and often unknown audience. Unfortunately,
due to the intrinsic capability limits of low-end IoT
devices, which account for a majority of the IoT end
hosts, many traditional security methods cannot be
applied to secure IoT systems, which open a door for
attacks and exploits directed both against IoT services
and the broader Internet. This paper addresses this
issue by introducing a unified IoT framework based on
the MobilityFirst future Internet architecture that
explicitly focuses on supporting security for the IoT.
Our design integrates local IoT systems into the global
Internet without losing usability, interoperability and
security protection. Specifically, we introduced an IoT
middleware layer that connects heterogeneous hardware
in local IoT systems to the global MobilityFirst
network. We propose an IoT name resolution service
(IoT-NRS) as a core component of the middleware layer,
and develop a lightweight keying protocol that
establishes trust between an IoT device and the
IoT-NRS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT Security and Privacy.",
}
@Article{Rauniyar:2017:DDR,
author = "Ashish Rauniyar and Mohammad Irfan and Oka Danil
Saputra and Jin Woo Kim and Ah Ra Lee and Jae Min Jang
and Soo Young Shin",
title = "Design and Development of a Real-Time Monitoring
System for Multiple Lead-Acid Batteries Based on
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "28",
day = "29",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/csharp.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/28",
abstract = "In this paper, real-time monitoring of multiple
lead-acid batteries based on Internet of things is
proposed and evaluated. Our proposed system monitors
and stores parameters that provide an indication of the
lead acid battery's acid level, state of charge,
voltage, current, and the remaining charge capacity in
a real-time scenario. To monitor these lead-acid
battery parameters, we have developed a data
acquisition system by building an embedded system,
i.e., dedicated hardware and software. The wireless
local area network is used as the backbone network. The
information collected from all the connected battery
clients in the system is analyzed in an asynchronous
transmission control protocol/user datagram
protocol-based C\# server program running on a personal
computer (server) to determine important parameters
like the state of charge of the individual battery, and
if required, appropriate action can be taken in advance
to prevent excessive impairment to the battery.
Further, data are also displayed on an Android mobile
device and are stored in an SQL server database. We
have developed a real prototype to devise an end
product for our proposed system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Ebeid:2017:DEC,
author = "Emad Ebeid and Rune Heick and Rune Hylsberg Jacobsen",
title = "Deducing Energy Consumer Behavior from Smart Meter
Data",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "29",
day = "06",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/29",
abstract = "The ongoing upgrade of electricity meters to smart
ones has opened a new market of intelligent services to
analyze the recorded meter data. This paper introduces
an open architecture and a unified framework for
deducing user behavior from its smart main electricity
meter data and presenting the results in a natural
language. The framework allows a fast exploration and
integration of a variety of machine learning algorithms
combined with data recovery mechanisms for improving
the recognition's accuracy. Consequently, the framework
generates natural language reports of the user's
behavior from the recognized home appliances. The
framework uses open standard interfaces for exchanging
data. The framework has been validated through
comprehensive experiments that are related to an
European Smart Grid project.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Piezzo:2017:FSS,
author = "Chiara Piezzo and Kenji Suzuki",
title = "Feasibility Study of a Socially Assistive Humanoid
Robot for Guiding Elderly Individuals during Walking",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "30",
day = "08",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/30",
abstract = "The impact of the world-wide ageing population has
commenced with respect to society in developed
countries. Several researchers focused on exploring new
methods to improve the quality of life of elderly
individuals by allowing them to remain independent and
healthy to the maximum possible extent. For example,
new walking aids are designed to allow elderly
individuals to remain mobile in a safe manner because
the importance of walking is well-known. The aim of the
present study involves designing a humanoid robot guide
as a walking trainer for elderly individuals. It is
hypothesized that the same service robot provides an
assistive and social contribution with respect to
interaction between elderly users by motivating them to
walk more and simultaneously provides assistance, such
as physical assistance and gait monitoring, while
walking. This study includes a detailed statement of
the research problem as well as a literature review of
existing studies related to walking companion robots. A
user-centred design approach is adopted to report the
results of the current first feasibility study by using
a commercially available humanoid robot known as Pepper
developed by Softbank-Aldebaran. A quantitative
questionnaire was used to investigate all elements that
assess intrinsic motivation in users while performing a
given activity. Conversely, basic gait data were
acquired through a video analysis to test the
capability of the robot to modify the gait of human
users. The results in terms of the feedback received
from elderly subjects and the literature review improve
the design of the walking trainer for elderly
individuals.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Militano:2017:NID,
author = "Leonardo Militano and Antonino Orsino and Giuseppe
Araniti and Antonio Iera",
title = "{NB-IoT} for {D2D}-Enhanced Content Uploading with
Social Trustworthiness in {5G} Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "31",
day = "08",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/31",
abstract = "Future fifth-generation (5G) cellular systems are set
to give a strong boost to the large-scale deployment of
Internet of things (IoT). In the view of a future
converged 5G-IoT infrastructure, cellular IoT solutions
such as narrowband IoT (NB-IoT) and device-to-device
(D2D) communications are key technologies for
supporting IoT scenarios and applications. However,
some open issues still need careful investigation. An
example is the risk of threats to privacy and security
when IoT mobile services rely on D2D communications. To
guarantee efficient and secure connections to IoT
services involving exchange of sensitive data,
reputation-based mechanisms to identify and avoid
malicious devices are fast gaining ground. In order to
tackle the presence of malicious nodes in the network,
this paper introduces reliability and reputation
notions to model the level of trust among devices
engaged in an opportunistic hop-by-hop D2D-based
content uploading scheme. To this end, social awareness
of devices is considered as a means to enhance the
identification of trustworthy nodes. A performance
evaluation study shows that the negative effects due to
malicious nodes can be drastically reduced by adopting
the proposed solution. The performance metrics that
proved to benefit from the proposed solution are data
loss, energy consumption, and content uploading time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Gkioulos:2017:UMV,
author = "Vasileios Gkioulos and Gaute Wangen and Sokratis K.
Katsikas",
title = "User Modelling Validation over the Security Awareness
of Digital Natives",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "32",
day = "10",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/32",
abstract = "Young generations make extensive use of mobile
devices, such as smart-phones, tablets and laptops, for
a variety of daily tasks with potentially critical
impact, while the number of security breaches via
portable devices increases exponentially. A plethora of
security risks associated with these devices are
induced by design shortcomings and vulnerabilities
related to user behavior. Therefore, deploying suitable
risk treatments requires the investigation of how
security experts perceive the digital natives (young
people, born in the digital era), when utilizing their
user behavior models in the design and analysis of
related systems. In this article, we present the
results of a survey performed across a multinational
sample of security professionals, in comparison to our
earlier study over the security awareness of digital
natives. Through this study, we seek to identify
divergences between user behavior and the conceptual
user-models that security experts utilise in their
professional tasks. Our results indicate that the
experts understanding over the user behaviour does not
follow a solidified user-model, while influences from
personal perceptions and randomness are also
noticeable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Shivani:2017:RIE,
author = "J. L. Divya Shivani and Ranjan K. Senapati",
title = "Robust Image Embedded Watermarking Using {DCT} and
Listless {SPIHT}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "33",
day = "12",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/33",
abstract = "This paper presents a DCT-based (DCT: discrete cosine
transform) listless set partitioning in hierarchical
trees (SPIHT) digital watermarking technique that is
robust against several common attacks such as cropping,
filtering, sharpening, noise, inversion, contrast
manipulation, and compression. The proposed technique
is made further robust by the incorporation of the
Chinese remainder theorem (CRT) encryption technique.
Our scheme is compared with the recently proposed
CRT-based DCT technique, CRT-based spatial domain
watermarking, and DCT-based inter block correlation
techniques. Extensive simulation experiments show
better robustness in common image manipulations and, at
the same time, the proposed technique successfully
makes the watermark perceptually invisible. A better
Tamper Assessment Function (TAF) value of 2-15\% and a
better Normalized Correlation (NC) is achieved compared
to some of the above techniques. In particular, the
proposed technique shows better robustness on
compression attacks at moderate to higher compression
ratios. It is possible to maintain the imperceptibility
and low TAF for various values by doubling the capacity
of the watermark.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fourneau:2017:GNA,
author = "Jean-Michel Fourneau and Erol Gelenbe",
title = "{G}-Networks with Adders",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "34",
day = "10",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/34",
abstract = "Abstract: Queueing networks are used to model the
performance of the Internet, of manufacturing and
job-shop systems, supply chains, and other networked
systems in transportation or emergency management.
Composed of service stations where customers receive
service, and then move to another service station till
they leave the network, queueing networks are based on
probabilistic assumptions concerning service times and
customer movement that represent the variability of
system workloads. Subject to restrictive assumptions
regarding external arrivals, Markovian movement of
customers, and service time distributions, such
networks can be solved efficiently with ``product form
solutions'' that reduce the need for software
simulators requiring lengthy computations. G-networks
generalise these models to include the effect of
``signals'' that re-route customer traffic, or negative
customers that reject service requests, and also have a
convenient product form solution. This paper extends
G-networks by including a new type of signal, that we
call an ``Adder'', which probabilistically changes the
queue length at the service center that it visits,
acting as a load regulator. We show that this
generalisation of G-networks has a product form
solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sadik:2017:CAH,
author = "Ahmed R. Sadik and Bodo Urban",
title = "Combining Adaptive Holonic Control and {ISA-95}
Architectures to Self-Organize the Interaction in a
Worker-Industrial Robot Cooperative Workcell",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "35",
day = "14",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/35",
abstract = "Self-Organization is a spontaneous trend which exists
in nature among different organisms. Self-organization
refers to the process where some form of an overall
order arises in a group due to the local interaction
among the members of this group. In manufacturing, a
similar definition of a Reconfigurable Manufacturing
System (RMS) can be found. RMS is a system where the
production components and functions can be modified,
rearranged and/or interchanged in a timely and
cost-effective manner to quickly respond to the
production requirements. The definition of the RMS
concept implies that the self-organization is an
important key factor to fulfil that concept. A case
study where a cooperation among a variable number of
Industrial Robots (IRs) and workers is studied to show
the importance of the research problem. The goal of the
paper is to offer a suitable generic control and
interaction architecture solution model, which obtains
the self-organization from the RMS point of view.
Ultimately, applying the proposed solution concept to
the case study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Binmad:2017:EFR,
author = "Ruchdee Binmad and Mingchu Li and Zhen Wang and Nakema
Deonauth and Chettupally Anil Carie",
title = "An Extended Framework for Recovering From Trust
Breakdowns in Online Community Settings",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "36",
day = "17",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/36",
abstract = "The violation of trust as a result of interactions
that do not proceed as expected gives rise to the
question as to whether broken trust can possibly be
recovered. Clearly, trust recovery is more complex than
trust initialization and maintenance. Trust recovery
requires a more complex mechanism to explore different
factors that cause the decline of trust and identify
the affected individuals of trust violation both
directly and indirectly. In this study, an extended
framework for recovering trust is presented. Aside from
evaluating whether there is potential for recovery
based on the outcome of a forgiveness mechanism after a
trust violation, encouraging cooperation between
interacting parties after a trust violation through
incentive mechanisms is also important. Furthermore, a
number of experiments are conducted to validate the
applicability of the framework and the findings show
that the e-marketplace incorporating our proposed
framework results in improved efficiency of trading,
especially in long-term interactions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lei:2017:NHC,
author = "Zhou Lei and Exiong Sun and Shengbo Chen and Jiang Wu
and Wenfeng Shen",
title = "A Novel Hybrid-Copy Algorithm for Live Migration of
Virtual Machine",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "37",
day = "18",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/37",
abstract = "Live migration of virtual machines is an important
approach for dynamic resource scheduling in cloud
environment. The hybrid-copy algorithm is an excellent
algorithm that combines the pre-copy algorithm with the
post-copy algorithm to remedy the defects of the
pre-copy algorithm and the post-copy algorithm.
Currently, the hybrid-copy algorithm only copies all
memory pages once in advance. In a write-intensive
workload, copy memory pages once may be enough.
However, more iterative copy rounds can significantly
reduce the page faults in a read-intensive workload. In
this paper, we propose a new parameter to decide the
appropriate time to stop the iterative copy phase based
on real-time situation. We use a Markov model to
forecast the memory access pattern. Based on the
predicted results and the analysis of the actual
situation, the memory page transfer order would be
adjusted to reduce the invalid transfers. The novel
hybrid-copy algorithm is implemented on the Xen
platform. The experimental results demonstrate that our
mechanism has good performance both on read-intensive
workloads and write-intensive workloads.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Computing for Real Time
Intelligent Systems.",
}
@Article{Lee:2017:IAO,
author = "Il-Gu Lee",
title = "Interference-Aware Opportunistic Dynamic Energy Saving
Mechanism for Wi-Fi Enabled {IoTs}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "38",
day = "18",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/38",
abstract = "The wireless local area network (WLAN) is one of the
most popular wireless technologies offering
connectivity today, and one of the candidates for the
internet of things (IoTs). However, WLAN's inefficiency
in terms of complexity and relatively large power
consumption compared with other wireless standards has
been reported as a major barrier for IoTs applications.
This paper proposes an interference-aware opportunistic
dynamic energy saving mechanism to improve energy
efficiency for Wi-Fi enabled IoTs. The proposed scheme
optimizes operating clock frequencies adaptively for
signal processing when the mobile station transmits
packets in partial sub-channels. Evaluation results
demonstrate that the proposed scheme improves energy
efficiency by approximately 34\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Roychowdhury:2017:ABS,
author = "Sohini Roychowdhury and Paul Hage and Joseph Vasquez",
title = "{Azure}-Based Smart Monitoring System for Anemia-Like
Pallor",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "39",
day = "26",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/39",
abstract = "Increasing costs of diagnostic healthcare have
necessitated the development of hardware independent
non-invasive Point of Care (POC) systems. Although
anemia prevalence rates in global populations vary
between 10\% and 60\% in various demographic groups,
smart monitoring systems have not yet been developed
for screening and tracking anemia-like pallor. In this
work, we present two cloud platform-hosted POC
applications that are directed towards smart monitoring
of anemia-like pallor through eye and tongue pallor
site images. The applications consist of a front-end
graphical user interface (GUI) module and two different
back-end image processing and machine learning modules.
Both applications are hosted on a browser accessible
tomcat server ported to an Azure Virtual Machine (VM).
We observe that the first application spatially
segments regions of interest from pallor site images
with higher pallor classification accuracy and
relatively longer processing times when compared to the
lesser accurate yet faster second application. Also,
both applications achieve 65\%-98\% accuracy in
separating normal images from images with pallor or
abnormalities. The optimized front-end module is
significantly light-weight with a run-through time
ratio of 10-5 with respect to the back-end modules.
Thus, the proposed applications are portable and
hardware independent, allowing for their use in pallor
monitoring and screening tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bauman:2017:VIE,
author = "Brian Bauman and Patrick Seeling",
title = "Visual Interface Evaluation for Wearables Datasets:
Predicting the Subjective Augmented Vision Image {QoE}
and {QoS}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "40",
day = "28",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/40",
abstract = "As Augmented Reality (AR) applications become
commonplace, the determination of a device operator's
subjective Quality of Experience (QoE) in addition to
objective Quality of Service (QoS) metrics gains
importance. Human subject experimentation is common for
QoE relationship determinations due to the subjective
nature of the QoE. In AR scenarios, the overlay of
displayed content with the real world adds to the
complexity. We employ Electroencephalography (EEG)
measurements as the solution to the inherent
subjectivity and situationality of AR content display
overlaid with the real world. Specifically, we evaluate
prediction performance for traditional image display
(AR) and spherical/immersive image display (SAR) for
the QoE and underlying QoS levels. Our approach
utilizing a four-position EEG wearable achieves high
levels of accuracy. Our detailed evaluation of the
available data indicates that less sensors would
perform almost as well and could be integrated into
future wearable devices. Additionally, we make our
Visual Interface Evaluation for Wearables (VIEW)
datasets from human subject experimentation publicly
available and describe their utilization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2017:SQE,
author = "Mao-hua Sun and Yuan-gang Li and Bing He",
title = "Study on a Quality Evaluation Method for College
{English} Classroom Teaching",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "41",
day = "30",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/41",
abstract = "A quality evaluation method is an important means and
the main basis on which to evaluate the college English
classroom teaching quality of teachers. To overcome the
one-sided subjectivity and resulting imprecision of the
traditional classroom teaching quality evaluation
method, a scientific and reasonable quality evaluation
index system for college English classroom teaching is
constructed. The fuzzy comprehensive evaluation method
and the analytic hierarchy process method are combined
to propose an improved multi-level fuzzy comprehensive
evaluation model for obtaining a new college English
classroom teaching quality evaluation method. In the
proposed method, according to the fuzzy characteristics
of a college English classroom teaching quality
evaluation, the fuzzy comprehensive evaluation method
is used to transform the qualitative evaluation indexes
into limited quantitative evaluation indexes, then a
judgment matrix is constructed to determine the weights
among different levels by using the analytic hierarchy
process method. Additionally, the college English
classroom teaching quality is evaluated in detail.
Finally, an actual case of college English classroom
teaching is used to verify the effectiveness of the
college English classroom teaching quality evaluation
method. The results show that the proposed college
English classroom teaching method can overcome the
subjectivity and randomness shortcomings of the
traditional classroom teaching quality evaluation
methods, and improve the reliability, accuracy, and
objectivity of fuzzy comprehensive evaluation. It is an
effective method to evaluate college English classroom
teaching quality.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue u- and e- Service, Science and
Technology.",
}
@Article{Cominelli:2017:MPF,
author = "Lorenzo Cominelli and Nicola Carbonaro and Daniele
Mazzei and Roberto Garofalo and Alessandro Tognetti and
Danilo {De Rossi}",
title = "A Multimodal Perception Framework for Users Emotional
State Assessment in Social Robotics",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "42",
day = "01",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/42",
abstract = "In this work, we present an unobtrusive and
non-invasive perception framework based on the synergy
between two main acquisition systems: the Touch-Me Pad,
consisting of two electronic patches for physiological
signal extraction and processing; and the Scene
Analyzer, a visual-auditory perception system
specifically designed for the detection of social and
emotional cues. It will be explained how the
information extracted by this specific kind of
framework is particularly suitable for social robotics
applications and how the system has been conceived in
order to be used in human-robot interaction
scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bonguet:2017:SDS,
author = "Adrien Bonguet and Martine Bellaiche",
title = "A Survey of Denial-of-Service and Distributed Denial
of Service Attacks and Defenses in Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "43",
day = "05",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/43",
abstract = "Cloud Computing is a computing model that allows
ubiquitous, convenient and on-demand access to a shared
pool of highly configurable resources (e.g., networks,
servers, storage, applications and services).
Denial-of-Service (DoS) and Distributed
Denial-of-Service (DDoS) attacks are serious threats to
the Cloud services' availability due to numerous new
vulnerabilities introduced by the nature of the Cloud,
such as multi-tenancy and resource sharing. In this
paper, new types of DoS and DDoS attacks in Cloud
Computing are explored, especially the XML-DoS and
HTTP-DoS attacks, and some possible detection and
mitigation techniques are examined. This survey also
provides an overview of the existing defense solutions
and investigates the experiments and metrics that are
usually designed and used to evaluate their
performance, which is helpful for the future research
in the domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Katsinis:2017:MIM,
author = "Georgios Katsinis and Eirini Eleni Tsiropoulou and
Symeon Papavassiliou",
title = "Multicell Interference Management in Device to Device
Underlay Cellular Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "44",
day = "07",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/44",
abstract = "In this paper, the problem of interference mitigation
in a multicell Device to Device (D2D) underlay cellular
network is addressed. In this type of network
architectures, cellular users and D2D users share
common Resource Blocks (RBs). Though such paradigms
allow potential increase in the number of supported
users, the latter comes at the cost of interference
increase that in turn calls for the design of efficient
interference mitigation methodologies. To treat this
problem efficiently, we propose a two step approach,
where the first step concerns the efficient RB
allocation to the users and the second one the
transmission power allocation. Specifically, the RB
allocation problem is formulated as a bilateral
symmetric interaction game. This assures the existence
of a Nash Equilibrium (NE) point of the game, while a
distributed algorithm, which converges to it, is
devised. The power allocation problem is formulated as
a linear programming problem per RB, and the
equivalency between this problem and the total power
minimization problem is shown. Finally, the operational
effectiveness of the proposed approach is evaluated via
numerical simulations, while its superiority against
state of the art approaches existing in the recent
literature is shown in terms of increased number of
supported users, interference reduction and power
minimization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Zhang:2017:RIW,
author = "Heng Zhang and Chengyou Wang and Xiao Zhou",
title = "A Robust Image Watermarking Scheme Based on {SVD} in
the Spatial Domain",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "45",
day = "07",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/45",
abstract = "With the development of image processing technology,
the copyright protection of digital images has become
an urgent problem to be solved. As an effective method,
the robust digital watermarking technique emerges at a
historic moment. Currently, most robust watermarking
schemes are performed in the transform domains, such as
the discrete cosine transform (DCT) and singular value
decomposition (SVD). Compared with spatial domain
watermarking schemes, these methods have achieved good
performance, such as better robustness and higher
security. However, the computational complexity
increases with the use of forward and reverse
transforms. In this paper, we analyze the SVD-based
watermarking scheme and its impact on the spatial
domain. Based on this analysis and the mathematical
characteristics of SVD, we present a robust image
watermarking scheme where a binary watermark is
embedded into the largest singular value of each image
block in the spatial domain. Several experiments are
conducted to verify the performance of the proposed
watermarking scheme. The experimental results show that
compared with the existing SVD domain watermarking
schemes, our proposed method has maintained good
robustness against various attacks. Moreover, it avoids
the false positive problem existing in traditional
SVD-based watermarking schemes and has lower
computational complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lee:2017:DPD,
author = "Il-Gu Lee",
title = "Digital Pre-Distortion of Carrier Frequency Offset for
Reliable Wi-Fi Enabled {IoTs}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "46",
day = "09",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/46",
abstract = "The Internet of Things (IoTs) will change the
requirements for wireless connectivity significantly,
mainly with regard to service coverage, data rate, and
energy efficiency. Therefore, to improve robustness and
reliability, WiFi-enabled IoT devices have been
developed to use narrowband communication. However,
narrowband transmission in WiFi such as IEEE 802.11ah
causes relatively higher frequency error due to the
reduced subcarrier space, which is larger than legacy
wireless local area networks (WLANs) in 2.4/5 GHz
frequencies. In a direct conversion receiver, this
error degrades the signal quality due to the presence
of direct current (DC) offset cancellation circuits. In
this paper, a digital carrier frequency offset (CFO)
predistortion scheme is proposed for a reliable
communication link in dense networks. Evaluation
results demonstrate that the proposed scheme can
improve received signal quality in terms of packet
error rate and error vector magnitude.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Markus:2017:CAI,
author = "Andras Markus and Attila Kertesz and Gabor
Kecskemeti",
title = "Cost-Aware {IoT} Extension of {DISSECT-CF}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "47",
day = "14",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/47",
abstract = "In the age of the Internet of Things (IoT), more and
more sensors, actuators and smart devices get connected
to the network. Application providers often combine
this connectivity with novel scenarios involving cloud
computing. Before implementing changes in these
large-scale systems, an in-depth analysis is often
required to identify governance models, bottleneck
situations, costs and unexpected behaviours.
Distributed systems simulators help in such analysis,
but they are often problematic to apply in this newly
emerging domain. For example, most simulators are
either too detailed (e.g., need extensive knowledge on
networking), or not extensible enough to support the
new scenarios. To overcome these issues, we discuss our
IoT cost analysis oriented extension of DIScrete event
baSed Energy Consumption simulaTor for Clouds and
Federations (DISSECT-CF). Thus, we present an in-depth
analysis of IoT and cloud related pricing models of the
most widely used commercial providers. Then, we show
how the fundamental properties (e.g., data production
frequency) of IoT entities could be linked to the
identified pricing models. To allow the adoption of
unforeseen scenarios and pricing schemes, we present a
declarative modelling language to describe these links.
Finally, we validate our extensions by analysing the
effects of various identified pricing models through
five scenarios coming from the field of weather
forecasting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Sadik:2017:FSS,
author = "Ahmed R. Sadik and Bodo Urban",
title = "Flow Shop Scheduling Problem and Solution in
Cooperative Robotics-Case-Study: One Cobot in
Cooperation with One Worker",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "48",
day = "16",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/48",
abstract = "This research combines between two different
manufacturing concepts. On the one hand, flow shop
scheduling is a well-known problem in production
systems. The problem appears when a group of jobs
shares the same processing sequence on two or more
machines sequentially. Flow shop scheduling tries to
find the appropriate solution to optimize the sequence
order of this group of jobs over the existing machines.
The goal of flow shop scheduling is to obtain the
continuity of the flow of the jobs over the machines.
This can be obtained by minimizing the delays between
two consequent jobs, therefore the overall makespan can
be minimized. On the other hand, collaborative robotics
is a relatively recent approach in production where a
collaborative robot (cobot) is capable of a close
proximity cooperation with the human worker to increase
the manufacturing agility and flexibility. The simplest
case-study of a collaborative workcell is one cobot in
cooperation with one worker. This collaborative
workcell can be seen as a special case of the shop flow
scheduling problem, where the required time from the
worker to perform a specific job is unknown and
variable. Therefore, during this research, we implement
an intelligent control solution which can optimize the
flow shop scheduling problem over the previously
mentioned case-study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{De-Pablos-Heredero:2017:FIS,
author = "Carmen De-Pablos-Heredero",
title = "Future Intelligent Systems and Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "49",
day = "02",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/49",
abstract = "The expansion of telecommunication technologies
touches almost all aspects life that we are living
nowadays. Indeed, such technologies have emerged as a
fourth essential utility alongside the traditional
utilities of electricity, water, and gas. In this
context, Cloud Data Center Networks (cloud-DCNs) have
been proposed as a promising way to cope with such a
high-tech era and with any expected trends in future
computing networks. Resources of cloud-DCNs are leased
to the interested users in the form of services, such
services come in different models that vary between
software, platform, and infrastructure. The leasing
process of any service model starts with the users
(i.e., service tenants). A tenant asks for the service
resources, and the cloud-provider allocates the
resources with a charge that follows a predefined cost
policy. Cloud resources are limited, and those cloud
providers have profit objectives to be satisfied. Thus,
to comply with the aforementioned promise, the limited
resources need to be carefully allocated. Existing
allocation proposals in the literature dealt with this
problem in varying ways. However, none proposes a
win-win allocation model that satisfies both the
providers and tenants. This work proposes A Rational
Allocation Approach in Cloud Data Center Networks
(ARAAC) that efficiently allocates the available cloud
resources, in a way that allows for a win-win
environment to satisfy both parties: the providers and
tenants. To do so, ARAAC deploys the Second Best-Price
(SBP) mechanism along with a behavioral-based
reputation model. The reputation is built according to
the tenants' utilization history throughout their
previous service allocations. The reputation records
along with the adoption of the SBP mechanism allows for
a locally free-equilibrium approach that allocates the
available cloud-DCN resources in an efficient and fair
manner. In ARAAC, through an auction scenario, tenants
with positive reputation records are awarded by having
the required resources allocated at prices that are
lower than what they have offered. Compared to other
benchmark models, simulation results show that ARAAC
can efficiently adapt the behavior of those rational
service-tenants to provide for better use of the cloud
resources, with an increase in the providers'
profits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Quttoum:2017:ARA,
author = "Ahmad Nahar Quttoum and Ayoub Alsarhan and
Abidalrahman Moh'd",
title = "{ARAAC}: a Rational Allocation Approach in Cloud Data
Center Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "50",
day = "06",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/50",
abstract = "The expansion of telecommunication technologies
touches almost all aspects life that we are living
nowadays. Indeed, such technologies have emerged as a
fourth essential utility alongside the traditional
utilities of electricity, water, and gas. In this
context, Cloud Data Center Networks (cloud-DCNs) have
been proposed as a promising way to cope with such a
high-tech era and with any expected trends in future
computing networks. Resources of cloud-DCNs are leased
to the interested users in the form of services, such
services come in different models that vary between
software, platform, and infrastructure. The leasing
process of any service model starts with the users
(i.e., service tenants). A tenant asks for the service
resources, and the cloud-provider allocates the
resources with a charge that follows a predefined cost
policy. Cloud resources are limited, and those cloud
providers have profit objectives to be satisfied. Thus,
to comply with the aforementioned promise, the limited
resources need to be carefully allocated. Existing
allocation proposals in the literature dealt with this
problem in varying ways. However, none proposes a
win-win allocation model that satisfies both the
providers and tenants. This work proposes A Rational
Allocation Approach in Cloud Data Center Networks
(ARAAC) that efficiently allocates the available cloud
resources, in a way that allows for a win-win
environment to satisfy both parties: the providers and
tenants. To do so, ARAAC deploys the Second Best-Price
(SBP) mechanism along with a behavioral-based
reputation model. The reputation is built according to
the tenants' utilization history throughout their
previous service allocations. The reputation records
along with the adoption of the SBP mechanism allows for
a locally free-equilibrium approach that allocates the
available cloud-DCN resources in an efficient and fair
manner. In ARAAC, through an auction scenario, tenants
with positive reputation records are awarded by having
the required resources allocated at prices that are
lower than what they have offered. Compared to other
benchmark models, simulation results show that ARAAC
can efficiently adapt the behavior of those rational
service-tenants to provide for better use of the cloud
resources, with an increase in the providers'
profits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhou:2017:LPP,
author = "Kaijun Zhou and Lingli Yu and Ziwei Long and Siyao
Mo",
title = "Local Path Planning of Driverless Car Navigation Based
on Jump Point Search Method Under Urban Environment",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "51",
day = "12",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/51",
abstract = "The Jump Point Search (JPS) algorithm is adopted for
local path planning of the driverless car under urban
environment, and it is a fast search method applied in
path planning. Firstly, a vector Geographic Information
System (GIS) map, including Global Positioning System
(GPS) position, direction, and lane information, is
built for global path planning. Secondly, the GIS map
database is utilized in global path planning for the
driverless car. Then, the JPS algorithm is adopted to
avoid the front obstacle, and to find an optimal local
path for the driverless car in the urban environment.
Finally, 125 different simulation experiments in the
urban environment demonstrate that JPS can search out
the optimal and safety path successfully, and
meanwhile, it has a lower time complexity compared with
the Vector Field Histogram (VFH), the Rapidly Exploring
Random Tree (RRT), A*, and the Probabilistic Roadmaps
(PRM) algorithms. Furthermore, JPS is validated
usefully in the structured urban environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lupetti:2017:DCP,
author = "Maria Luce Lupetti and Yuan Yao and Haipeng Mi and
Claudio Germak",
title = "Design for Children's Playful Learning with Robots",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "52",
day = "18",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/52",
abstract = "This article presents an investigation of the
implications of designing for children's playful
learning with robots. This study was carried out by
adopting a Research through Design approach that
resulted in the development of a novel
low-anthropomorphic robot called Shybo. The article
reports the main phases of the project: the preliminary
and exploratory research that was carried out to define
a list of design requirements; the design of the robot
and its supplementary materials for carrying out
playful learning experiences; and the evaluation of the
project that involved both parents and children. The
robot, in fact, was finally tested as part of a
two-hour experience that engaged children in activities
related to the associations between sounds and colours.
The article presents and discusses the results of this
evaluation to point out positive aspects of the
experience, emerging issues and hints for future works.
These are documented to share lessons learned that
might be supportive of the general development of
children's playful learning and cognitive experiences
with robots.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2017:TND,
author = "Yao Yang",
title = "Towards a New Digital Era: Observing Local
E-Government Services Adoption in a {Chinese}
Municipality",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "53",
day = "20",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/53",
abstract = "As electronic government services (e-government)
evolve, traditional applications such as online portals
are encountering challenges in a new digital era in
which people thirst for more convenient, diverse
channels of communication with their government.
Despite the efforts devoted to the promotion of Social
Networking Service (SNS) use in e-government for the
past few years, empirical studies regarding this
ongoing trend are still insufficient. In the local
administration of China, a special collaboration
between local governments and private Internet
enterprises is happening: government services are
imported into commercial SNS platforms known as WeChat
and Weibo. This research conducts a case study of a
Chinese municipality premised upon survey data (N =
605) collected in Chongqing. It examines the
determinants of e-services adoption in four major local
applications: two traditional government-led services
``Government website portal'' and ``Government official
app'' (traditional government-led services), and two
built-in government services on social networking
applications ``Weibo Government official account''
``WeChat Public Services''. The paper aims to provide a
closer understanding of current trends in local
government e-services, or in this case, an innovative
trial of Chinese e-government practices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue u- and e- Service, Science and
Technology.",
}
@Article{Rizvi:2017:DCB,
author = "Syed Tahir Hussain Rizvi and Denis Patti and Tomas
Bj{\"o}rklund and Gianpiero Cabodi and Gianluca
Francini",
title = "Deep Classifiers-Based License Plate Detection,
Localization and Recognition on {GPU}-Powered Mobile
Platform",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "66",
day = "21",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/66",
abstract = "The realization of a deep neural architecture on a
mobile platform is challenging, but can open up a
number of possibilities for visual analysis
applications. A neural network can be realized on a
mobile platform by exploiting the computational power
of the embedded GPU and simplifying the flow of a
neural architecture trained on the desktop workstation
or a GPU server. This paper presents an embedded
platform-based Italian license plate detection and
recognition system using deep neural classifiers. In
this work, trained parameters of a highly precise
automatic license plate recognition (ALPR) system are
imported and used to replicate the same neural
classifiers on a Nvidia Shield K1 tablet. A CUDA-based
framework is used to realize these neural networks. The
flow of the trained architecture is simplified to
perform the license plate recognition in real-time.
Results show that the tasks of plate and character
detection and localization can be performed in
real-time on a mobile platform by simplifying the flow
of the trained architecture. However, the accuracy of
the simplified architecture would be decreased
accordingly.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hanna:2017:SSD,
author = "Dalal Hanna and Prakash Veeraraghavan and Ben Soh",
title = "{SDMw}: Secure Dynamic Middleware for Defeating Port
and {OS} Scanning",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "67",
day = "21",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/67",
abstract = "Fingerprinting is a process of identifying the remote
network devices and services running on the devices,
including operating systems (OS) of the devices, and
hosts running different OSs. Several research proposals
and commercial products are available in the market to
defeat fingerprinting. However, they have performance
limitations and expose themselves to attackers. In this
paper, we utilize some real-time fault-tolerance
concepts (viz. real-time/dynamic, detection/locating,
confinement/localizing and masking/decoy) to propose a
plug-and-play adaptive middleware architecture called
Secure Dynamic Middleware (SDMw) with a view to defeat
attackers fingerprinting the network, without exposing
itself to the attackers. We verify that the proposed
scheme works seamlessly and requires zero-configuration
at the client side.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Colombo:2017:CWU,
author = "Bruna Armonas Colombo and Pedro Buck and Vinicius
Miana Bezerra",
title = "Challenges When Using Jurimetrics in {Brazil}--- a
Survey of Courts",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "68",
day = "25",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/68",
abstract = "Jurimetrics is the application of quantitative
methods, usually statistics, to law. An important step
to implement a jurimetric analysis is to extract raw
data from courts and organize that data in a way that
can be processed. Most of the raw data is unstructured
and written in natural language, which stands as a
challenge to Computer Science experts. As it requires
expertise in law, statistics, and computer science,
jurimetrics is a multidisciplinary field. When trying
to implement a jurimetric system in Brazil, additional
challenges were identified due to the heterogeneity of
the different court systems, the lack of standards, and
how the open data laws in Brazil are interpreted and
implemented. In this article, we present a survey of
Brazilian courts in terms of readiness to implement a
jurimetric system. Analyzing a sample of data, we have
found, in light of Brazil's open data regulation,
privacy issues and technical issues. Finally, we
propose a roadmap that encompasses both technology and
public policy to meet those challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computation, Law and the Net-The Future
of Law in the Computational Social Science Era.",
}
@Article{Li:2017:SCT,
author = "Dongyuan Li and Chengshuai Li and Zidong Wang and
Deqiang Wang and Jianping Xing and Bo Zhang",
title = "Signal Consensus in {TSP} of the Same Grid in Road
Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "69",
day = "24",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/69",
abstract = "In this paper, we propose a consensus algorithm with
input constraints for traffic light signals in transit
signal priority (TSP). TSP ensures control strategy of
traffic light signals can be adjusted and applied
according to the real-time traffic status, and provides
priority for buses. We give the convergence conditions
of the consensus algorithms with and without input
constraints in TSP respectively and analyze the
convergence performance of them by using matrix theory
and graph theory, and PTV-VISSIM is used to simulate
the traffic accident probability of three cases at
intersections. Simulation results are presented that a
consensus is asymptotically reached for all weights of
priority; the algorithm with input constraints is more
suitable for TSP than the algorithm without input
constraints, and the traffic accident rate is
reduced.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Computing for Real Time
Intelligent Systems.",
}
@Article{Pruvost:2017:EDM,
author = "Hippolyte Pruvost and Peter Mooney",
title = "Exploring Data Model Relations in {OpenStreetMap}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "70",
day = "24",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/70",
abstract = "The OpenStreetMap (OSM) geographic data model has
three principal object types: nodes (points), ways
(polygons and polylines), and relations (logical
grouping of all three object types to express
real-world geographical relationships). While there has
been very significant analysis of OSM over the past
decade or so, very little research attention has been
given to OSM relations. In this paper, we provide an
exploratory overview of relations in OSM for four
European cities. In this exploration, we undertake
analysis of relations to assess their complexity,
composition and flexibility within the OSM data model.
We show that some of the patterns discovered by
researchers related to OSM nodes and ways also exist in
relations. We find some other interesting aspects of
relations which we believe can act as a catalyst for a
more sustained future research effort on relations in
OSM. These aspects include: the potential influence of
bulk imports of geographical data to OSM, tagging of
relations, and contribution patterns of edits to OSM
relations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mazzenga:2017:FBF,
author = "Franco Mazzenga and Romeo Giuliano and Francesco
Vatalaro",
title = "{FttC}-Based Fronthaul for {5G} Dense\slash
Ultra-Dense Access Network: Performance and Costs in
Realistic Scenarios",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "71",
day = "27",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/71",
abstract = "One distinctive feature of the next 5G systems is the
presence of a dense/ultra-dense wireless access network
with a large number of access points (or nodes) at
short distances from each other. Dense/ultra-dense
access networks allow for providing very high
transmission capacity to terminals. However, the
deployment of dense/ultra-dense networks is slowed down
by the cost of the fiber-based infrastructure required
to connect radio nodes to the central processing units
and then to the core network. In this paper, we
investigate the possibility for existing FttC access
networks to provide fronthaul capabilities for
dense/ultra-dense 5G wireless networks. The analysis is
realistic in that it is carried out considering an
actual access network scenario, i.e., the Italian FttC
deployment. It is assumed that access nodes are
connected to the Cabinets and to the corresponding
distributors by a number of copper pairs. Different
types of cities grouped in terms of population have
been considered. Results focus on fronthaul transport
capacity provided by the FttC network and have been
expressed in terms of the available fronthaul bit rate
per node and of the achievable coverage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khan:2017:TAC,
author = "Muhidul Islam Khan and Muhammad Mahtab Alam and
Yannick {Le Moullec} and Elias Yaacoub",
title = "Throughput-Aware Cooperative Reinforcement Learning
for Adaptive Resource Allocation in Device-to-Device
Communication",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "72",
day = "01",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/72",
abstract = "Device-to-device (D2D) communication is an essential
feature for the future cellular networks as it
increases spectrum efficiency by reusing resources
between cellular and D2D users. However, the
performance of the overall system can degrade if there
is no proper control over interferences produced by the
D2D users. Efficient resource allocation among D2D User
equipments (UE) in a cellular network is desirable
since it helps to provide a suitable interference
management system. In this paper, we propose a
cooperative reinforcement learning algorithm for
adaptive resource allocation, which contributes to
improving system throughput. In order to avoid selfish
devices, which try to increase the throughput
independently, we consider cooperation between devices
as promising approach to significantly improve the
overall system throughput. We impose cooperation by
sharing the value function/learned policies between
devices and incorporating a neighboring factor. We
incorporate the set of states with the appropriate
number of system-defined variables, which increases the
observation space and consequently improves the
accuracy of the learning algorithm. Finally, we compare
our work with existing distributed reinforcement
learning and random allocation of resources. Simulation
results show that the proposed resource allocation
algorithm outperforms both existing methods while
varying the number of D2D users and transmission power
in terms of overall system throughput, as well as D2D
throughput by proper Resource block (RB)-power level
combination with fairness measure and improving the
Quality of service (QoS) by efficient controlling of
the interference level.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Anwar:2017:QSB,
author = "Asim Anwar and Boon-Chong Seet and Xue Jun Li",
title = "Quality of Service Based {NOMA} Group {D2D}
Communications",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "73",
day = "01",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/73",
abstract = "Non-orthogonal multiple access (NOMA) provides
superior spectral efficiency and is considered as a
promising multiple access scheme for fifth generation
(5G) wireless systems. The spectrum efficiency can be
further enhanced by enabling device-to-device (D2D)
communications. In this work, we propose quality of
service (QoS) based NOMA (Q-NOMA) group D2D
communications in which the D2D receivers (DRs) are
ordered according to their QoS requirements. We discuss
two possible implementations of proposed Q-NOMA group
D2D communications based on the two power allocation
coefficient policies. In order to capture the key
aspects of D2D communications, which are device
clustering and spatial separation, we model the
locations of D2D transmitters (DTs) by Gauss-Poisson
process (GPP). The DRs are then considered to be
clustered around DTs. Multiple DTs can exist in
proximity of each other. In order to characterize the
performance, we derive the Laplace transform of the
interference at the probe D2D receiver and obtain a
closed-form expression of its outage probability using
stochastic geometry tools. The performance of proposed
Q-NOMA group D2D communications is then evaluated and
benchmarked against conventional paired D2D
communications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Reddy:2017:ETE,
author = "Nalavala Ramanjaneya Reddy and Pakanati Chenna Reddy
and Mokkala Padmavathamma",
title = "Efficient Traffic Engineering Strategies for Improving
the Performance of {TCP} Friendly Rate Control
Protocol",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "74",
day = "01",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/74",
abstract = "Multimedia services will play a prominent role in the
next generation of internet. With increasing real time
requirements, internet technology has to provide
Quality of Service (QoS) for various kinds of real time
streaming services. When the bandwidth required exceeds
the available network resources, network paths can get
congested, which results in a delay in packet delivery
and packet loss. This situation leads to the design of
new strategies for congestion avoidance and control.
One of the popular and appropriate congestion control
mechanisms that is useful in transmitting multimedia
applications in the transport layer is TCP Friendly
Rate Control Protocol (TFRC). However, TFRC still
suffers from packet loss and delay due to long distance
heavy traffic and network fluctuations. This paper
introduces a number of key concerns like enhanced Round
Trip Time (RTT) and Retransmission Time Out (RTO)
calculations, Enhanced Average Loss Interval (ALI)
methods and improved Time to Live (TTL) features are
applied to TFRC to enhance the performance of TFRC over
wired networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Computing for Real Time
Intelligent Systems.",
}
@Article{Chikaraishi:2017:CSA,
author = "Takenobu Chikaraishi and Yuichiro Yoshikawa and Kohei
Ogawa and Oriza Hirata and Hiroshi Ishiguro",
title = "Creation and Staging of {Android} Theatre
``{Sayonara}'' towards Developing Highly Human-Like
Robots",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "75",
day = "02",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/75",
abstract = "Even after long-term exposures, androids with a
strikingly human-like appearance evoke unnatural
feelings. The behavior that would induce human-like
feelings after long exposures is difficult to
determine, and it often depends on the cultural
background of the observers. Therefore, in this study,
we generate an acting performance system for the
android, in which an android and a human interact in a
stage play in the real world. We adopt the theatrical
theory called Contemporary Colloquial Theatre Theory to
give the android natural behaviors so that audiences
can comfortably observe it even after long-minute
exposure. A stage play is created and shown in various
locations, and the audiences are requested to report
their impressions of the stage and their cultural and
psychological backgrounds in a self-evaluating
questionnaire. Overall analysis indicates that the
audience had positive feelings, in terms of
attractiveness, towards the android on the stage even
after 20 min of exposure. The singularly high
acceptance of the android by Japanese audiences seems
to be correlated with a high animism tendency, rather
than to empathy. We also discuss how the stage play
approach is limited and could be extended to contribute
to realization of human-robot interaction in the real
world.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Engaging in Interaction with Robots.",
}
@Article{Saura:2017:UDM,
author = "Jos{\'e} Ram{\'o}n Saura and Pedro Palos-S{\'a}nchez
and Luis Manuel Cerd{\'a} Su{\'a}rez",
title = "Understanding the Digital Marketing Environment with
{KPIs} and {Web} Analytics",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "76",
day = "04",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/76",
abstract = "In the practice of Digital Marketing (DM), Web
Analytics (WA) and Key Performance Indicators (KPIs)
can and should play an important role in marketing
strategy formulation. It is the aim of this article to
survey the various DM metrics to determine and address
the following question: What are the most relevant
metrics and KPIs that companies need to understand and
manage in order to increase the effectiveness of their
DM strategies? Therefore, to achieve these objectives,
a Systematic Literature Review has been carried out
based on two main themes (i) Digital Marketing and (ii)
Web Analytics. The search terms consulted in the
databases have been (i) DM and (ii) WA obtaining a
result total of n = 378 investigations. The databases
that have been consulted for the extraction of data
were Scopus, PubMed, PsyINFO, ScienceDirect and Web of
Science. In this study, we define and identify the main
KPIs in measuring why, how and for what purpose users
interact with web pages and ads. The main contribution
of the study is to lay out and clarify quantitative and
qualitative KPIs and indicators for DM performance in
order to achieve a consensus on the use and measurement
of these indicators.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2017:CSR,
author = "Ahmad Ali and Yu Ming and Sagnik Chakraborty and Saima
Iram",
title = "A Comprehensive Survey on Real-Time Applications of
{WSN}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "77",
day = "07",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/77",
abstract = "Nowadays, the investigation of the Wireless Sensor
Network (WSN) has materialized its functional area
ubiquitously such as environmental engineering,
industrial and business applications, military,
feedstock and habitat, agriculture sector, seismic
detection, intelligent buildings, smart grids, and
predictive maintenance, etc. Although some challenges
still exist in the wireless sensor network, in spite of
the shortcoming, it has been gaining significant
attention among researchers and technologists due to
its versatility and robustness. WSN is subject to a
high potential technology that has been successfully
implemented and tested in real-time scenarios, as well
as deployed practically in various applications. In
this paper, we have carried out an extensive survey in
real-time applications of wireless sensor network
deployment in a practical scenario such as the
real-time intelligent monitoring of temperature,
criminal activity in borders and surveillance on
traffic monitoring, vehicular behavior on roads, water
level and pressure, and remote monitoring of patients.
The application of the Wireless Sensor Network in the
assorted field of research areas has been widely
deliberated. WSN is found to be the most effective
solution in remote areas which are not yet explored due
to its perilous nature and unreachable places. Here, in
this study, we have cited the recent and updated
research on the ubiquitous usage of WSN in diverse
fields in an extensive and comprehensive approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Kontogiannis:2017:PFN,
author = "Sotirios Kontogiannis and George Kokkonis and Soultana
Ellinidou and Stavros Valsamidis",
title = "Proposed Fuzzy-{NN} Algorithm with {LoRaCommunication}
Protocol for Clustered Irrigation Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "78",
day = "07",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/78",
abstract = "Modern irrigation systems utilize sensors and
actuators, interconnected together as a single entity.
In such entities, A.I. algorithms are implemented,
which are responsible for the irrigation process. In
this paper, the authors present an irrigation Open
Watering System (OWS) architecture that spatially
clusters the irrigation process into autonomous
irrigation sections. Authors' OWS implementation
includes a Neuro-Fuzzy decision algorithm called FITRA,
which originates from the Greek word for seed. In this
paper, the FITRA algorithm is described in detail, as
are experimentation results that indicate significant
water conservations from the use of the FITRA
algorithm. Furthermore, the authors propose a new
communication protocol over LoRa radio as an
alternative low-energy and long-range OWS clusters
communication mechanism. The experimental scenarios
confirm that the FITRA algorithm provides more
efficient irrigation on clustered areas than existing
non-clustered, time scheduled or threshold adaptive
algorithms. This is due to the FITRA algorithm's
frequent monitoring of environmental conditions, fuzzy
and neural network adaptation as well as adherence to
past irrigation preferences.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Zhang:2017:MCU,
author = "Jingbo Zhang and Lili Cai and Shufang Zhang",
title = "Malicious Cognitive User Identification Algorithm in
Centralized Spectrum Sensing System",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "79",
day = "08",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/79",
abstract = "Collaborative spectral sensing can fuse the perceived
results of multiple cognitive users, and thus will
improve the accuracy of perceived results. However, the
multi-source features of the perceived results result
in security problems in the system. When there is a
high probability of a malicious user attack, the
traditional algorithm can correctly identify the
malicious users. However, when the probability of
attack by malicious users is reduced, it is almost
impossible to use the traditional algorithm to
correctly distinguish between honest users and
malicious users, which greatly reduces the perceived
performance. To address the problem above, based on the
\beta function and the feedback iteration mathematical
method, this paper proposes a malicious user
identification algorithm under multi-channel
cooperative conditions (\beta -MIAMC), which involves
comprehensively assessing the cognitive user's
performance on multiple sub-channels to identify the
malicious user. Simulation results show under the same
attack probability, compared with the traditional
algorithm, the \beta -MIAMC algorithm can more
accurately identify the malicious users, reducing the
false alarm probability of malicious users by more than
20\%. When the attack probability is greater than 7\%,
the proposed algorithm can identify the malicious users
with 100\% certainty.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Joshi:2017:FCB,
author = "Pusp Raj Joshi and Shareeful Islam and Syed Islam",
title = "A Framework for Cloud Based E-Government from the
Perspective of Developing Countries",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "80",
day = "09",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/80",
abstract = "Despite significant efforts to initiate electronic
government projects, developing countries are still
struggling to reap the benefits of using e-government
services. An effective implementation of e-government
infrastructure is necessary to increase the efficiency
and transparency of the government services. There are
several studies that observed causes like lack of
infrastructure support, lack of payment gateway and
improper e-government service delivery channel as main
barriers to a wider adoption of e-government services.
The main contribution of this research is to propose a
cloud-based G2G (Government-to-government) e-government
framework for a viable e-government solution from the
perspective of developing countries. We have introduced
a list of concepts and a systematic process to guide
the implementation of e-government project based on the
government's vision, goals, chosen services through the
service delivery channel to the appropriate cloud
service and deployment model. We have used Nepal as a
context of the case study and applied the framework to
a real e-government project of driving licensing
department using action research methodology. The
results from the study show that the G2G approach of
e-government implementation would be the best for
providing effective government services to the
stakeholders of developing countries. The proposed
framework also supports a smooth integration of
government services and reduces the time of the overall
project.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shah:2017:NID,
author = "Reehan Ali Shah and Yuntao Qian and Dileep Kumar and
Munwar Ali and Muhammad Bux Alvi",
title = "Network Intrusion Detection through Discriminative
Feature Selection by Using Sparse Logistic Regression",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "81",
day = "10",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/81",
abstract = "Intrusion detection system (IDS) is a well-known and
effective component of network security that provides
transactions upon the network systems with security and
safety. Most of earlier research has addressed
difficulties such as overfitting, feature redundancy,
high-dimensional features and a limited number of
training samples but feature selection. We approach the
problem of feature selection via sparse logistic
regression (SPLR). In this paper, we propose a
discriminative feature selection and intrusion
classification based on SPLR for IDS. The SPLR is a
recently developed technique for data analysis and
processing via sparse regularized optimization that
selects a small subset from the original feature
variables to model the data for the purpose of
classification. A linear SPLR model aims to select the
discriminative features from the repository of datasets
and learns the coefficients of the linear classifier.
Compared with the feature selection approaches, like
filter (ranking) and wrapper methods that separate the
feature selection and classification problems, SPLR can
combine feature selection and classification into a
unified framework. The experiments in this
correspondence demonstrate that the proposed method has
better performance than most of the well-known
techniques used for intrusion detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Yuan:2017:CBM,
author = "Peiyan Yuan and Hai Yu",
title = "A Combinational Buffer Management Scheme in Mobile
Opportunistic Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "82",
day = "14",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/82",
abstract = "Nodes in Mobile Opportunistic Network (MON) have to
cache packets to deal with the intermittent connection.
The buffer management strategy obviously impacts the
performance of MON, and it attracts more attention
recently. Due to the limited storage capacity of nodes,
traditional buffer management strategies just drop
messages based on the property of message, and they
neglect the collaboration between neighbors, resulting
in an ineffective performance improvement. Therefore,
effective buffer management strategies are necessary to
ensure that each node has enough buffer space to store
the message when the node buffer is close to
congestion. In this paper, we propose a buffer
management strategy by integrating the characteristics
of messages and nodes, and migrate the redundant
messages to the neighbor to optimize the total utility,
instead of deleting them. The simulation experiment
results show that it can obviously improve the delivery
ratio, the overhead ratio and the average delays, and
reduce the amount of hops compared with the traditional
ones.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2017:REI,
author = "Haipeng Li and Hidenori Nakazato and Syed Hassan
Ahmed",
title = "Request Expectation Index Based Cache Replacement
Algorithm for Streaming Content Delivery over {ICN}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "83",
day = "14",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/83",
abstract = "Since the content delivery unit over
Information-Centric Networking (ICN) has shifted from
files to the segments of a file named chunks, solely
either file-level or chunk-level request probability is
insufficient for ICN cache management. In this paper, a
Request Expectation Index (RXI) based cache replacement
algorithm for streaming content delivery is proposed.
In this algorithm, RXI is introduced to serve as a
fine-grained and unified estimation criteria of
possible future request probability for cached chunks.
RXI is customized for streaming content delivery by
adopting both file-level and chunk-level request
probability and considering the dynamically varied
request status at each route as well. Compared to prior
work, the proposed algorithm evicts the chunk with the
minimum expectation of future request to maintain a
high cache utilization. Additionally, simulation
results demonstrate that the RXI-based algorithm can
remarkably enhance the streaming content delivery
performance and can be deployed in complex network
scenarios. The proposed results validate that, by
taking fine-grained request probability and request
status into consideration, the customized in-network
caching algorithm can improve the ICN streaming content
delivery performance by high cache utilization, fast
content delivery, and lower network traffic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jiang:2017:EER,
author = "Fan Jiang and Honglin Wang and Hao Ren and Shuai Xu",
title = "Energy-Efficient Resource and Power Allocation for
Underlay Multicast Device-to-Device Transmission",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "84",
day = "14",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/84",
abstract = "In this paper, we present an energy-efficient resource
allocation and power control scheme for D2D
(Device-to-Device) multicasting transmission. The
objective is to maximize the overall energy-efficiency
of D2D multicast clusters through effective resource
allocation and power control schemes, while considering
the quality of service (QoS) requirements of both
cellular users (CUs) and D2D clusters. We first build
the optimization model and a heuristic resource and
power allocation algorithm is then proposed to solve
the energy-efficiency problem with less computational
complexity. Numerical results indicate that the
proposed algorithm outperforms existing schemes in
terms of throughput per energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Hong:2017:BEF,
author = "Zhen Hong and Zehua Wang and Wei Cai and Victor C. M.
Leung",
title = "Blockchain-Empowered Fair Computational Resource
Sharing System in the {D2D} Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "85",
day = "17",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/85",
abstract = "Device-to-device (D2D) communication is becoming an
increasingly important technology in future networks
with the climbing demand for local services. For
instance, resource sharing in the D2D network features
ubiquitous availability, flexibility, low latency and
low cost. However, these features also bring along
challenges when building a satisfactory resource
sharing system in the D2D network. Specifically, user
mobility is one of the top concerns for designing a
cooperative D2D computational resource sharing system
since mutual communication may not be stably available
due to user mobility. A previous endeavour has
demonstrated and proven how connectivity can be
incorporated into cooperative task scheduling among
users in the D2D network to effectively lower average
task execution time. There are doubts about whether
this type of task scheduling scheme, though effective,
presents fairness among users. In other words, it can
be unfair for users who contribute many computational
resources while receiving little when in need. In this
paper, we propose a novel blockchain-based credit
system that can be incorporated into the
connectivity-aware task scheduling scheme to enforce
fairness among users in the D2D network. Users'
computational task cooperation will be recorded on the
public blockchain ledger in the system as transactions,
and each user's credit balance can be easily accessible
from the ledger. A supernode at the base station is
responsible for scheduling cooperative computational
tasks based on user mobility and user credit balance.
We investigated the performance of the credit system,
and simulation results showed that with a minor
sacrifice of average task execution time, the level of
fairness can obtain a major enhancement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Wang:2017:SME,
author = "Jinpeng Wang and G{\'e}rard Chalhoub",
title = "Study of Mobility Enhancements for {RPL} in
Convergecast Scenarios",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "86",
day = "17",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/86",
abstract = "In recent years, mobility support has become an
important requirement in various wireless sensor
network (WSN) applications. However, due to the strict
resource constraints of power, memory, and processing
resources in WSNs, routing protocols are mainly
designed without considering mobility. Low-Power and
Lossy Networks (LLNs) are a special type of WSNs that
tolerate data loss. The Routing Protocol for Low-Power
and Lossy Networks (RPL) is a routing protocol for LLNs
that adapts IPv6 (Internet Protocol version 6) and runs
on top of the IEEE (Institute of Electrical and
Electronics Engineers) 802.15.4 standard. RPL supports
multipoint-to-point traffic and point-to-multipoint
traffic. In this paper we propose a mobility
enhancement mechanism in order to improve data
collection applications in highly mobile scenarios. The
enhancement is based on signal strength monitoring and
depth updating in order to improve the routing protocol
performance in mobile scenarios. This enhancement helps
routing protocols to cope better with topology changes
and makes proactive decisions on updating next-hop
neighbours. We integrated this mechanism into the RPL
and compared it with other existing RPL mobility
support enhancements. Results obtained through
simulation using Cooja show that our work outperforms
other existing RPL mobility supports on different
performance metrics. Results also prove the efficiency
of our proposal in highly mobile scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yan:2017:HPE,
author = "Chengxin Yan and Ningjiang Chen and Zhang Shuo",
title = "High-Performance Elastic Management for Cloud
Containers Based on Predictive Message Scheduling",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "87",
day = "28",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/87",
abstract = "Containerized data centers can improve the
computational density of IaaS layers. This intensive
high-concurrency environment has high requirements for
message scheduling and container processing. In the
paper, an elastically scalable strategy for cloud
containers based on predictive message scheduling is
introduced, in order to reduce the delay of messages
and improve the response time of services and the
utilization of container resources. According to the
busy degree of different containers, a management
strategy of multiple containers at message-granularity
level is developed, which gives the containers better
elasticity. The simulation results show that the
proposed strategy improves service processing
efficiency and reduces response latency compared with
existing solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mamais:2017:BVP,
author = "Stylianos S. Mamais and George Theodorakopoulos",
title = "Behavioural Verification: Preventing Report Fraud in
Decentralized Advert Distribution Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "88",
day = "20",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/88",
abstract = "Service commissions, which are claimed by Ad-Networks
and Publishers, are susceptible to forgery as non-human
operators are able to artificially create fictitious
traffic on digital platforms for the purpose of
committing financial fraud. This places a significant
strain on Advertisers who have no effective means of
differentiating fabricated Ad-Reports from those which
correspond to real consumer activity. To address this
problem, we contribute an advert reporting system which
utilizes opportunistic networking and a
blockchain-inspired construction in order to identify
authentic Ad-Reports by determining whether they were
composed by honest or dishonest users. What constitutes
a user's honesty for our system is the manner in which
they access adverts on their mobile device. Dishonest
users submit multiple reports over a short period of
time while honest users behave as consumers who view
adverts at a balanced pace while engaging in typical
social activities such as purchasing goods online,
moving through space and interacting with other users.
We argue that it is hard for dishonest users to fake
honest behaviour and we exploit the behavioural
patterns of users in order to classify Ad-Reports as
real or fabricated. By determining the honesty of the
user who submitted a particular report, our system
offers a more secure reward-claiming model which
protects against fraud while still preserving the
user's anonymity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Nardini:2017:FRB,
author = "Giovanni Nardini and Giovanni Stea and Antonio
Virdis",
title = "A Fast and Reliable Broadcast Service for
{LTE}-Advanced Exploiting Multihop Device-to-Device
Transmissions",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "89",
day = "25",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/89",
abstract = "Several applications, from the Internet of Things for
smart cities to those for vehicular networks, need fast
and reliable proximity-based broadcast communications,
i.e., the ability to reach all peers in a geographical
neighborhood around the originator of a message, as
well as ubiquitous connectivity. In this paper, we
point out the inherent limitations of the LTE
(Long-Term Evolution) cellular network, which make it
difficult, if possible at all, to engineer such a
service using traditional infrastructure-based
communications. We argue, instead, that
network-controlled device-to-device (D2D)
communications, relayed in a multihop fashion, can
efficiently support this service. To substantiate the
above claim, we design a proximity-based broadcast
service which exploits multihop D2D. We discuss the
relevant issues both at the UE (User Equipment), which
has to run applications, and within the network (i.e.,
at the eNodeBs), where suitable resource allocation
schemes have to be enforced. We evaluate the
performance of a multihop D2D broadcasting using
system-level simulations, and demonstrate that it is
fast, reliable and economical from a resource
consumption standpoint.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Sadik:2017:OBA,
author = "Ahmed R. Sadik and Bodo Urban",
title = "An Ontology-Based Approach to Enable Knowledge
Representation and Reasoning in Worker-Cobot Agile
Manufacturing",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "90",
day = "24",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/90",
abstract = "There is no doubt that the rapid development in
robotics technology has dramatically changed the
interaction model between the Industrial Robot (IR) and
the worker. As the current robotic technology has
afforded very reliable means to guarantee the physical
safety of the worker during a close proximity
interaction with the IR. Therefore, new forms of
cooperation between the robot and the worker can now be
achieved. Collaborative/Cooperative robotics is the new
branch of industrial robotics which empowers the idea
of cooperative manufacturing. Cooperative manufacturing
significantly depends on the existence of a
collaborative/cooperative robot (cobot). A cobot is
usually a Light-Weight Robot (LWR) which is capable of
operating safely with the human co-worker in a shared
work environment. This is in contrast with the
conventional IR which can only operate in isolation
from the worker workspace, due to the fact that the
conventional IR can manipulate very heavy objects,
which makes it so dangerous to operate in direct
contact with the worker. There is a slight difference
between the definition of collaboration and cooperation
in robotics. In cooperative robotics, both the worker
and the robot are performing tasks over the same
product in the same shared workspace but not
simultaneously. Collaborative robotics has a similar
definition, except that the worker and the robot are
performing a simultaneous task. Gathering the worker
and the cobot in the same manufacturing workcell can
provide an easy and cheap method to flexibly customize
the production. Moreover, to adapt with the production
demands in the real time of production, without the
need to stop or to modify the production operations.
There are many challenges and problems that can be
addressed in the cooperative manufacturing field.
However, one of the most important challenges in this
field is the representation of the cooperative
manufacturing environment and components. Thus, in
order to accomplish the cooperative manufacturing
concept, a proper approach is required to describe the
shared environment between the worker and the cobot.
The cooperative manufacturing shared environment
includes the cobot, the co-worker, and other production
components such as the product itself. Furthermore, the
whole cooperative manufacturing system components need
to communicate and share their knowledge, to reason and
process the shared information, which eventually gives
the control solution the capability of obtaining
collective manufacturing decisions. Putting into
consideration that the control solution should also
provide a natural language which is human readable and
in the same time can be understood by the machine
(i.e., the cobot). Accordingly, a distributed control
solution which combines an ontology-based Multi-Agent
System (MAS) and a Business Rule Management System
(BRMS) is proposed, in order to solve the mentioned
challenges in the cooperative manufacturing, which are:
manufacturing knowledge representation, sharing, and
reasoning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kuang:2017:HTA,
author = "Zhufang Kuang and Gongqiang Li and Junshan Tan and
Zhigang Chen",
title = "High Throughput and Acceptance Ratio Multipath Routing
Algorithm in Cognitive Wireless Mesh Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "91",
day = "25",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/91",
abstract = "The link failure due to the secondary users exiting
the licensed channels when primary users reoccupy the
licensed channels is very important in cognitive
wireless mesh networks (CWMNs). A multipath routing and
spectrum allocation algorithm based on channel
interference and reusability with Quality of Service
(QoS) constraints in CWMNs (MRIR) was proposed.
Maximizing the throughput and the acceptance ratio of
the wireless service is the objective of the MRIR.
First, a primary path of resource conservation with QoS
constraints was constructed, then, a resource
conservation backup path based on channel interference
and reusability with QoS constraints was constructed.
The MRIR algorithm contains the primary path routing
and spectrum allocation algorithm, and the backup path
routing and spectrum allocation algorithm. The
simulation results showed that the MRIR algorithm could
achieve the expected goals and could achieve a higher
throughput and acceptance ratio.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chiti:2017:SAR,
author = "Francesco Chiti and Romano Fantacci and Laura
Pierucci",
title = "Social-Aware Relay Selection for Cooperative Multicast
Device-to-Device Communications",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "92",
day = "04",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/92",
abstract = "The increasing use of social networks such as
Facebook, Twitter, and Instagram to share photos, video
streaming, and music among friends has generated a huge
increase in the amount of data traffic over wireless
networks. This social behavior has triggered new
communication paradigms such as device-to-device (D2D)
and relaying communication schemes, which are both
considered as strong drivers for the next
fifth-generation (5G) cellular systems. Recently, the
social-aware layer and its relationship to and
influence on the physical communications layer have
gained great attention as emerging focus points. We
focus here on the case of relaying communications to
pursue the multicast data dissemination to a group of
users forming a social community through a relay node,
according to the extension of the D2D mode to the case
of device-to-many devices. Moreover, in our case, the
source selects the device to act as the relay among
different users of the multicast group by taking into
account both the propagation link conditions and the
relay social-trust level with the constraint of
minimizing the end-to-end content delivery delay. An
optimization procedure is also proposed in order to
achieve the best performance. Finally, numerical
results are provided to highlight the advantages of
considering the impact of social level on the
end-to-end delivery delay in the integrated
social-physical network in comparison with the
classical relay-assisted multicast communications for
which the relay social-trust level is not considered.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Latif:2017:HWC,
author = "Siddique Latif and Junaid Qadir and Shahzad Farooq and
Muhammad Ali Imran",
title = "How {5G} Wireless (and Concomitant Technologies) Will
Revolutionize Healthcare?",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "93",
day = "11",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/93",
abstract = "The need to have equitable access to quality
healthcare is enshrined in the United Nations (UN)
Sustainable Development Goals (SDGs), which defines the
developmental agenda of the UN for the next 15 years.
In particular, the third SDG focuses on the need to
``ensure healthy lives and promote well-being for all
at all ages''. In this paper, we build the case that 5G
wireless technology, along with concomitant emerging
technologies (such as IoT, big data, artificial
intelligence and machine learning), will transform
global healthcare systems in the near future. Our
optimism around 5G-enabled healthcare stems from a
confluence of significant technical pushes that are
already at play: apart from the availability of
high-throughput low-latency wireless connectivity,
other significant factors include the democratization
of computing through cloud computing; the
democratization of Artificial Intelligence (AI) and
cognitive computing (e.g., IBM Watson); and the
commoditization of data through crowdsourcing and
digital exhaust. These technologies together can
finally crack a dysfunctional healthcare system that
has largely been impervious to technological
innovations. We highlight the persistent deficiencies
of the current healthcare system and then demonstrate
how the 5G-enabled healthcare revolution can fix these
deficiencies. We also highlight open technical research
challenges, and potential pitfalls, that may hinder the
development of such a 5G-enabled health revolution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Qadir:2017:ANU,
author = "Junaid Qadir and Arjuna Sathiaseelan and Umar Bin
Farooq and Muhammad Usama and Muhammad Ali Imran and
Muhammad Shafique",
title = "Approximate Networking for Universal {Internet}
Access",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "94",
day = "11",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/94",
abstract = "Despite the best efforts of networking researchers and
practitioners, an ideal Internet experience is
inaccessible to an overwhelming majority of people the
world over, mainly due to the lack of cost-efficient
ways of provisioning high-performance, global Internet.
In this paper, we argue that instead of an exclusive
focus on a utopian goal of universally accessible
``ideal networking'' (in which we have a high
throughput and quality of service as well as low
latency and congestion), we should consider providing
``approximate networking'' through the adoption of
context-appropriate trade-offs. In this regard, we
propose to leverage the advances in the emerging trend
of ``approximate computing'' that rely on relaxing the
bounds of precise/exact computing to provide new
opportunities for improving the area, power, and
performance efficiency of systems by orders of
magnitude by embracing output errors in resilient
applications. Furthermore, we propose to extend the
dimensions of approximate computing towards various
knobs available at network layers. Approximate
networking can be used to provision ``Global Access to
the Internet for All'' (GAIA) in a pragmatically tiered
fashion, in which different users around the world are
provided a different context-appropriate (but still
contextually functional) Internet experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Mahlous:2017:SES,
author = "Ahmed Redha Mahlous",
title = "{SCMC}: An Efficient Scheme for Minimizing Energy in
{WSNs} Using a Set Cover Approach",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "95",
day = "13",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/95",
abstract = "Energy-efficient clustering and routing are well known
optimization problems in the study