


default search action
Future Internet, Volume 13
Volume 13, Number 1, January 2021
- Jing Wang
, ZhongCheng Wu, Fang Li, Jun Zhang
:
A Data Augmentation Approach to Distracted Driving Detection. 1 - Luz Santamaria-Granados
, Juan Francisco Mendoza-Moreno
, Gustavo Ramírez-González
:
Tourist Recommender Systems Based on Emotion Recognition - A Scientometric Review. 2 - Aleksandr Romanov
, Anna V. Kurtukova
, Alexander A. Shelupanov, Anastasia Mikhailovna Fedotova, Valery Goncharov:
Authorship Identification of a Russian-Language Text Using Support Vector Machine and Deep Neural Networks. 3 - Abderrahim Zannou
, Abdelhak Boulaalam
, El Habib Nfaoui
:
SIoT: A New Strategy to Improve the Network Lifetime with an Efficient Search Process. 4 - Pekka Pääkkönen, Daniel Pakkala
, Jussi Kiljander
, Roope Sarala:
Architecture for Enabling Edge Inference via Model Transfer from Cloud Domain in a Kubernetes Environment. 5 - Rui Hu, Bruno Michel
, Dario Russo
, Niccolò Mora
, Guido Matrella
, Paolo Ciampolini
, Francesca Cocchi, Enrico Montanari, Stefano Nunziata
, Thomas Brunschwiler
:
An Unsupervised Behavioral Modeling and Alerting System Based on Passive Sensing for Elderly Care. 6 - Ivonne Angelica Castiblanco Jimenez
, Laura Cristina Cepeda García
, Maria Grazia Violante, Federica Marcolin
, Enrico Vezzetti:
Commonly Used External TAM Variables in e-Learning, Agriculture and Virtual Reality Applications. 7 - Sagar Kora Venu
, Sridhar Ravula
:
Evaluation of Deep Convolutional Generative Adversarial Networks for Data Augmentation of Chest X-ray Images. 8 - Goran Matosevic
, Jasminka Dobsa, Dunja Mladenic:
Using Machine Learning for Web Page Classification in Search Engine Optimization. 9 - Yousra Javed
, Elham Al Qahtani, Mohamed Shehab
:
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East. 10 - Lukasz Tomczyk
:
Evaluation of Digital Piracy by Youths. 11 - Juan Wang
, Yang Yu
, Yi Li, Chengyang Fan, Shirong Hao:
Design and Implementation of Virtual Security Function Based on Multiple Enclaves. 12 - Mingxuan Che, Kui Yao
, Chao Che, Zhangwei Cao, Fanchen Kong:
Knowledge-Graph-Based Drug Repositioning against COVID-19 by Graph Convolutional Network with Attention Mechanism. 13 - Xiaolin Zhang
, Chao Che:
Drug Repurposing for Parkinson's Disease by Integrating Knowledge Graph Completion Model and Knowledge Fusion of Medical Literature. 14 - José Manuel Ortiz-Marcos
, María Tomé-Fernández
, Christian Fernández-Leyva
:
Cyberbullying Analysis in Intercultural Educational Environments Using Binary Logistic Regressions. 15 - Wei Li, Peng Sun, Rui Han:
Path Segmentation-Based Hybrid Caching in Information-Centric Networks. 16 - Jiachen Sun, Peter A. Gloor
:
E-Mail Network Patterns and Body Language Predict Risk-Taking Attitude. 17 - Serhat Peker
, Gonca Gokce Menekse Dalveren
, Yavuz Inal
:
The Effects of the Content Elements of Online Banner Ads on Visual Attention: Evidence from An-Eye-Tracking Study. 18 - Ola Karajeh, Dirar A. Darweesh
, Omar Darwish
, Noor Abu-El-Rub
, Belal Alsinglawi
, Nasser Alsaedi:
A Classifier to Detect Informational vs. Non-Informational Heart Attack Tweets. 19 - Abdulelah A. Alghamdi
, Margaret Plunkett
:
The Perceived Impact of Social Networking Sites and Apps on the Social Capital of Saudi Postgraduate Students: A Case Study. 20 - Maxim Bakaev
, Olga Razumnikova
:
What Makes a UI Simple? Difficulty and Complexity in Tasks Engaging Visual-Spatial Working Memory. 21
Volume 13, Number 2, February 2021
- Xavier Boulet, Mahdi Zargayouna
, Gérard Scémama, Fabien Leurent
:
A Middleware-Based Approach for Multi-Scale Mobility Simulation. 22 - Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis
, Stefanos Gritzalis
:
Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks. 23 - Mohammed Amine Bouras
, Qinghua Lu
, Sahraoui Dhelim
, Huansheng Ning
:
A Lightweight Blockchain-Based IoT Identity Management Approach. 24 - Daniel Abril-López
, Hortensia Morón-Monge
, María del Carmen Morón-Monge
, Maria Dolores Lopez-Correa
:
The Learning to Learn Competence in Early Childhood Preservice Teachers: An Outdoor and e/m-Learning Experience in the Museum. 25 - Dwiza Riana
, Achmad Nizar Hidayanto, Sri H. V. Pulukadang, Darmawan Napitupulu:
Integrative Factors of E-Health Laboratory Adoption: A Case of Indonesia. 26 - Chuanyan Hao
, Anqi Zheng, Yuqi Wang, Bo Jiang
:
Experiment Information System Based on an Online Virtual Laboratory. 27 - Future Internet Editorial Office:
Acknowledgment to Reviewers of Future Internet in 2020. 28 - Valerio Basile
, Francesco Cauteruccio
, Giorgio Terracina
:
How Dramatic Events Can Affect Emotionality in Social Posting: The Impact of COVID-19 on Reddit. 29 - Dimitrios Papamartzivanos
, Sofia-Anna Menesidou
, Panagiotis Gouvas, Thanassis Giannetsos:
A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly. 30 - Cristòfol Rovira
, Lluís Codina
, Carlos Lopezosa
:
Language Bias in the Google Scholar Ranking Algorithm. 31 - Diego Reforgiato Recupero
:
Technology Enhanced Learning Using Humanoid Robots. 32 - Dongwei Guo
, Mengmeng Fu
, Hai Li:
Cooperation in Social Dilemmas: A Group Game Model with Double-Layer Networks. 33 - Vanessa Rodríguez Breijo
, Nuria Simelio
, Pedro Molina Rodríguez-Navas
:
Council Press Offices as Sources of Political Information: Between Journalism for Accountability and Propaganda. 34 - Francisco Delgado
:
Teaching Physics for Computer Science Students in Higher Education During the COVID-19 Pandemic: A Fully Internet-Supported Course. 35 - Chao Zhou, Tao Zhang
:
High Performance Graph Data Imputation on Multiple GPUs. 36 - Fenglei Yang, Fei Liu
, Shanshan Liu:
Collaborative Filtering Based on a Variational Gaussian Mixture Model. 37 - Yao Xu
, Qin Yu:
Adaptive Weighted Multi-Level Fusion of Multi-Scale Features: A New Approach to Pedestrian Detection. 38 - Joachim Bjørge Ulven, Gaute Wangen
:
A Systematic Review of Cybersecurity Risks in Higher Education. 39 - Tianfang Sun, Pin Yang, Mengming Li, Shan Liao:
An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion. 40 - Gabriela Torres Delgado
, Neil Hernández-Gress:
Research Professors' Self-Assessment of Competencies. 41 - Qiang Duan
:
Intelligent and Autonomous Management in Cloud-Native Future Networks - A Survey on Related Standards from an Architectural Perspective. 42 - Nadezhda N. Pokrovskaia
, Veronika L. Leontyeva, Marianna Yu. Ababkova
, Lucio Cappelli, Fabrizio D'Ascenzo
:
Digital Communication Tools and Knowledge Creation Processes for Enriched Intellectual Outcome - Experience of Short-Term E-Learning Courses during Pandemic. 43 - Nadezhda N. Pokrovskaia
, Olga N. Korableva, Lucio Cappelli
, Denis A. Fedorov:
Digital Regulation of Intellectual Capital for Open Innovation: Industries' Expert Assessments of Tacit Knowledge for Controlling and Networking Outcome. 44 - Nuno Marques da Costa
, Nelson Mileu
, André Alves
:
Dashboard COMPRIME_COMPRI_MOv: Multiscalar Spatio-Temporal Monitoring of the COVID-19 Pandemic in Portugal. 45 - Jedsada Phengsuwan
, Tejal Shah
, Nipun Balan Thekkummal, Zhenyu Wen, Rui Sun, Divya Pullarkatt
, Hemalatha Thirugnanam
, Maneesha Vinodini Ramesh, Graham Morgan, Philip James, Rajiv Ranjan:
Use of Social Media Data in Disaster Management: A Survey. 46 - Zhi-Peng Yang, Lu Hua, Ningjie Gao, Ru Huo, Jiang Liu, Tao Huang
:
An Accelerating Approach for Blockchain Information Transmission Based on NDN. 47 - Yao Du
, Zehua Wang
, Victor C. M. Leung
:
Blockchain-Enabled Edge Intelligence for IoT: Background, Emerging Trends and Open Issues. 48 - Guowei Cui
, Wei Shuai, Xiaoping Chen:
Semantic Task Planning for Service Robots in Open Worlds. 49 - Hamed Z. Jahromi
, Declan T. Delaney
, Andrew Hines
:
A Sign of Things to Come: Predicting the Perception of Above-the-Fold Time in Web Browsing. 50 - Lili Sun
, Xueyan Liu
, Min Zhao, Bo Yang:
Interpretable Variational Graph Autoencoder with Noninformative Prior. 51 - Guillermo Rodríguez-Abitia
, Graciela Bribiesca Correa
:
Assessing Digital Transformation in Universities. 52 - Athanasios K. Goudosis
, Sokratis K. Katsikas
:
ARIBC: Online Reporting Based on Identity-Based Cryptography. 53 - Yazhi Liu
, Jiye Zhang
, Wei Li, Qianqian Wu, Pengmiao Li:
Load Balancing Oriented Predictive Routing Algorithm for Data Center Networks. 54 - Zhou Lei, Yiyong Huang
:
Video Captioning Based on Channel Soft Attention and Semantic Reconstructor. 55
Volume 13, Number 3, March 2021
- Alireza Ahadi
, Matt Bower
, Abhay Singh
, Michael Garrett
:
Online Professional Learning in Response to COVID-19 - Towards Robust Evaluation. 56 - Thirupathi Samala
, Vijaya Kumar Manupati
, Maria Leonilde R. Varela
, Goran D. Putnik:
Investigation of Degradation and Upgradation Models for Flexible Unit Systems: A Systematic Literature Review. 57 - Efstratios Chatzoglou
, Georgios Kambourakis
, Vasileios Kouliaridis
:
A Multi-Tier Security Analysis of Official Car Management Apps for Android. 58 - Albert Weichselbraun
, Philipp Kuntschik
, Vincenzo Francolino, Mirco Saner
, Urs Dahinden
, Vinzenz Wyss:
Adapting Data-Driven Research to the Fields of Social Sciences and the Humanities. 59 - Carl-Anton Werner Axelsson
, Mona Guath
, Thomas Nygren
:
Learning How to Separate Fake from Real News: Scalable Digital Tutorials Promoting Students' Civic Online Reasoning. 60 - Max Cappellari
, John Belstner, Bryan Rodriguez, Jeff Sedayao
:
A Cloud-Based Data Collaborative to Combat the COVID-19 Pandemic and to Solve Major Technology Challenges. 61 - Claudia Daniela Antal
, Tudor Cioara
, Ionut Anghel, Marcel Antal, Ioan Salomie:
Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. 62 - Maghsoud Morshedi
, Josef Noll:
Estimating PQoS of Video Conferencing on Wi-Fi Networks Using Machine Learning. 63 - Jie Yu, Yaliu Li
, Chenle Pan, Junwei Wang:
A Classification Method for Academic Resources Based on a Graph Attention Network. 64 - Jhan-Jia Lin, Yu-Tse Lee, Ja-Ling Wu
:
The Effect of Thickness-Based Dynamic Matching Mechanism on a Hyperledger Fabric-Based TimeBank System. 65 - Dimitra Georgiou
, Costas Lambrinoudakis
:
Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations. 66 - Eric Hitimana
, Gaurav Bajpai
, Richard Musabe
, Louis Sibomana, Kayalvizhi Jayavel
:
Implementation of IoT Framework with Data Analysis Using Deep Learning Methods for Occupancy Prediction in a Building. 67 - Steven Knowles Flanagan
, Zuoyin Tang
, Jianhua He, Irfan Yusoff
:
Investigating and Modeling of Cooperative Vehicle-to-Vehicle Safety Stopping Distance. 68 - Yi-Bing Lin, Chien-Chao Tseng
, Ming-Hung Wang
:
Effects of Transport Network Slicing on 5G Applications. 69 - Zhiyan Yu
, Gaochao Xu, Yang Li
, Peng Liu
, Long Li
:
Joint Offloading and Energy Harvesting Design in Multiple Time Blocks for FDMA Based Wireless Powered MEC. 70 - Pin Wu
, Rukang Zhu
, Zhidan Lei
:
Transfer Learning for Multi-Premise Entailment with Relationship Processing Module. 71 - Shengbo Chen, Hongchang Zhang
, Zhou Lei:
Person Re-Identification Based on Attention Mechanism and Context Information Fusion. 72 - Xingchen Zhou, Ming Xu
, Yiming Wu, Ning Zheng:
Deep Model Poisoning Attack on Federated Learning. 73 - Marisol Hernández-Orellana
, Adolfina Pérez Garcias
, Ángel Roco-Videla
:
Characterization of the Digital Identity of Chilean University Students Considering Their Personal Learning Environments. 74 - Yuexuan Zhao
, Jing Huang:
Dirichlet Process Prior for Student's t Graph Variational Autoencoders. 75 - Quintino Francesco Lotito
, Davide Zanella, Paolo Casari
:
Realistic Aspects of Simulation Models for Fake News Epidemics over Social Networks. 76 - Laith T. Khrais
, Abdullah M. Alghamdi
:
The Role of Mobile Application Acceptance in Shaping E-Customer Service. 77 - Chuanhong Li
, Lei Song, Xuewen Zeng:
An Adaptive Throughput-First Packet Scheduling Algorithm for DPDK-Based Packet Processing Systems. 78 - Sadaf Safavi
, Mehrdad Jalali
:
RecPOID: POI Recommendation with Friendship Aware and Deep CNN. 79 - Lazaros Vrysis
, Nikolaos Vryzas
, Rigas Kotsakis, Theodora Saridou
, Maria Matsiola
, Andreas A. Veglis
, Carlos Arcila Calderón
, Charalampos Dimoulas
:
A Web Interface for Analyzing Hate Speech. 80 - Dries Naudts
, Vasilis Maglogiannis
, Seilendria A. Hadiwardoyo
, Daniel van den Akker, Simon Vanneste
, Siegfried Mercelis
, Peter Hellinckx
, Bart Lannoo, Johann Márquez-Barja
, Ingrid Moerman:
Vehicular Communication Management Framework: A Flexible Hybrid Connectivity Platform for CCAM Services. 81 - Swarna Bindu Chetty, Hamed Ahmadi
, Sachin Sharma
, Avishek Nag
:
Virtual Network Function Embedding under Nodal Outage Using Deep Q-Learning. 82
Volume 13, Number 4, April 2021
- Malika Bendechache
, Sergej Svorobej
, Patricia Takako Endo
, Adrian Mihai, Theo Lynn
:
Simulating and Evaluating a Real-World ElasticSearch System Using the RECAP DES Simulator. 83 - Neo C. K. Yiu
:
Decentralizing Supply Chain Anti-Counterfeiting and Traceability Systems Using Blockchain Technology. 84 - Gianluca Reali
, Mauro Femminella
:
Two-Layer Network Caching for Different Service Requirements. 85 - Neo C. K. Yiu
:
Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability. 86 - Georgios Bouloukakis
, Ioannis D. Moscholios
, Nikolaos Georgantas, Valérie Issarny
:
Performance Analysis of Internet of Things Interactions via Simulation-Based Queueing Models. 87 - Xiaoyuan Wang
, Junyan Han
, Chenglin Bai, Huili Shi
, Jinglei Zhang, Gang Wang:
Research on the Impacts of Generalized Preceding Vehicle Information on Traffic Flow in V2X Environment. 88 - Yubo Peng, Bofeng Zhang, Furong Chang:
Overlapping Community Detection of Bipartite Networks Based on a Novel Community Density. 89 - Sanaa Kaddoura
, Ramzi A. Haraty
, Karam Al Kontar, Omar Alfandi:
A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems. 90 - María Soledad Ramírez-Montoya
, María Isabel Loaiza-Aguirre
, Alexandra Zúñiga-Ojeda
, May Portuguez Castro
:
Characterization of the Teaching Profile within the Framework of Education 4.0. 91 - Agnese Augello
, Ignazio Infantino
, Giovanni Pilato
, Gianpaolo Vitale
:
Site Experience Enhancement and Perspective in Cultural Heritage Fruition - A Survey on New Technologies and Methodologies Based on a "Four-Pillars" Approach. 92 - Samar Samir Khalil
, Sherin M. Youssef
, Sherine Nagy Saleh
:
iCaps-Dfake: An Integrated Capsule-Based Model for Deepfake Image and Video Detection. 93 - Haokun Fang, Quan Qian
:
Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning. 94 - Geneci da Silva Ribeiro Rocha
, Leticia de Oliveira
, Edson Talamini
:
Blockchain Applications in Agribusiness: A Systematic Review. 95 - Shawal Khan
, Ishita Sharma, Mazzamal Aslam, Muhammad Zahid Khan
, Shahzad Khan:
Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey. 96 - William Eduardo Villegas-Ch.
, Joselin García-Ortiz
, Karen Mullo-Ca, Santiago Sánchez-Viteri, Milton Román Cañizares
:
Implementation of a Virtual Assistant for the Academic Management of a University with the Use of Artificial Intelligence. 97 - María Artemisa Sangermán Jiménez
, Pedro Ponce
:
Differentiated Teaching Based on Standardized Metrics Integrating Fuzzy Logic Type 2 Detection Theory: High School Case - PrepaTec, Mexico. 98 - Alba Vázquez-López
, Martín Barrasa-Rioja, Manuel Marey-Pérez
:
ICT in Rural Areas from the Perspective of Dairy Farming: A Systematic Review. 99 - Kayla S. Sansevere
, Nathan Ward
:
Linking Phubbing Behavior to Self-Reported Attentional Failures and Media Multitasking. 100 - Alexandru Dorobantiu
, Valentin Ogrean, Remus Brad
:
Coronary Centerline Extraction from CCTA Using 3D-UNet. 101 - Ana Teresa Ferreira, Carlos Fernandes, José Vieira, Filipe Portela
:
Pervasive Intelligent Models to Predict the Outcome of COVID-19 Patients. 102
Volume 13, Number 5, May 2021
- Giulia Bressan, Giulia Cisotto
, Gernot R. Müller-Putz
, Selina Christin Wriessnegger
:
Deep Learning-Based Classification of Fine Hand Movements from Low Frequency EEG. 103 - Khalid Al-Naime
, Adnan Al-Anbuky, Grant A. Mawston:
Remote Monitoring Model for the Preoperative Prehabilitation Program of Patients Requiring Abdominal Surgery. 104 - Mohamed Yousif, Chaminda Hewage
, Liqaa F. Nawaf
:
IoT Technologies during and Beyond COVID-19: A Comprehensive Review. 105 - Bernhard Standl
, Nadine Schlomske-Bodenstein:
A Pattern Mining Method for Teaching Practices. 106 - Vincenza Carchiolo
, Alessandro Longheu
, Michele Malgeri
, Giuseppe Mangioni
, Maria Laura Previti:
Mutual Influence of Users Credibility and News Spreading in Online Social Networks. 107 - Stefano Guarino
, Enrico Mastrostefano, Massimo Bernaschi, Alessandro Celestini
, Marco Cianfriglia, Davide Torre, Lena Rebecca Zastrow:
Inferring Urban Social Networks from Publicly Available Data. 108 - Davide Tosi
, Alessandro Siro Campi
:
How Schools Affected the COVID-19 Pandemic in Italy: Data Analysis for Lombardy Region, Campania Region and Emilia Region. 109 - Mirko Duradoni
, Stefania Collodi, Serena Coppolino Perfumi
, Andrea Guazzini
:
Reviewing Stranger on the Internet: The Role of Identifiability through "Reputation" in Online Decision Making. 110 - Abdulsalam O. Alzahrani, Mohammed J. F. Alenazi
:
Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks. 111 - Mauricio Herrera
, Alex Godoy-Faúndez
:
Exploring the Roles of Local Mobility Patterns, Socioeconomic Conditions, and Lockdown Policies in Shaping the Patterns of COVID-19 Spread. 112 - Michele Bonanni, Francesco Chiti
, Romano Fantacci
, Laura Pierucci
:
Dynamic Control Architecture Based on Software Defined Networking for the Internet of Things. 113 - Stefan Helmstetter, Heiko Paulheim
:
Collecting a Large Scale Dataset for Classifying Fake News Tweets Using Weak Supervision. 114 - Mike Oluwatayo Ojo
, Davide Adami
, Stefano Giordano
:
Experimental Evaluation of a LoRa Wildlife Monitoring Network in a Forest Vegetation Area. 115 - Stavros A. Nikou, Anastasios A. Economides
:
A Framework for Mobile-Assisted Formative Assessment to Promote Students' Self-Determination. 116 - Marco Ferretti
, Serena Nicolazzo
, Antonino Nocera
:
H2O: Secure Interactions in IoT via Behavioral Fingerprinting. 117