Next Issue
Volume 5, December
Previous Issue
Volume 5, June
 
 

Future Internet, Volume 5, Issue 3 (September 2013) – 8 articles , Pages 301-459

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
338 KiB  
Article
Physical Layer Network Coding Based on Integer Forcing Precoded Compute and Forward
by Smrati Gupta and M. A. Vázquez-Castro
Future Internet 2013, 5(3), 439-459; https://doi.org/10.3390/fi5030439 - 28 Aug 2013
Cited by 3 | Viewed by 5890
Abstract
In this paper, we address the implementation of physical layer network coding (PNC) based on compute and forward (CF) in relay networks. It is known that the maximum achievable rates in CF-based transmission is limited due to the channel approximations at the relay. [...] Read more.
In this paper, we address the implementation of physical layer network coding (PNC) based on compute and forward (CF) in relay networks. It is known that the maximum achievable rates in CF-based transmission is limited due to the channel approximations at the relay. In this work, we propose the integer forcing precoder (IFP), which bypasses this maximum rate achievability limitation. Our precoder requires channel state information (CSI) at the transmitter, but only that of the channel between the transmitter and the relay, which is a feasible assumption. The overall contributions of this paper are three-fold. Firstly, we propose an implementation of CF using IFP and prove that this implementation achieves higher rates as compared to traditional relaying schemes. Further, the probability of error from the proposed scheme is shown to have up to 2 dB of gain over the existent lattice network coding-based implementation of CF. Secondly, we analyze the two phases of transmission in the CF scheme, thereby characterizing the end-to-end behavior of the CF and not only one-phase behavior, as in previous proposals. Finally, we develop decoders for both the relay and the destination. We use a generalization of Bezout’s theorem to justify the construction of these decoders. Further, we make an analytical derivation of the end-to-end probability of error for cubic lattices using the proposed scheme. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Show Figures

Figure 1

267 KiB  
Article
Libraries’ Role in Curating and Exposing Big Data
by Michael Teets and Matthew Goldner
Future Internet 2013, 5(3), 429-438; https://doi.org/10.3390/fi5030429 - 20 Aug 2013
Cited by 29 | Viewed by 9903
Abstract
This article examines how one data hub is working to become a relevant and useful source in the Web of big data and cloud computing. The focus is on OCLC’s WorldCat database of global library holdings and includes work by other library organizations [...] Read more.
This article examines how one data hub is working to become a relevant and useful source in the Web of big data and cloud computing. The focus is on OCLC’s WorldCat database of global library holdings and includes work by other library organizations to expose their data using big data concepts and standards. Explanation is given of how OCLC has begun work on the knowledge graph for this data and its active involvement with Schema.org in working to make this data useful throughout the Web. Full article
(This article belongs to the Special Issue Server Technologies in Cloud Computing and Big Data)
Show Figures

Figure 1

5641 KiB  
Article
Cross-Network Information Dissemination in Vehicular Ad hoc Networks (VANETs): Experimental Results from a Smartphone-Based Testbed
by Stefano Busanelli, Filippo Rebecchi, Marco Picone, Nicola Iotti and Gianluigi Ferrari
Future Internet 2013, 5(3), 398-428; https://doi.org/10.3390/fi5030398 - 05 Aug 2013
Cited by 17 | Viewed by 7339
Abstract
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, [...] Read more.
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, with direct connections between neighboring vehicles, in order to disseminate, very quickly and inexpensively, traffic alerts received from the cellular network. The proposed communication architecture has been implemented on Android smartphones. The obtained experimental results show that an effective cross-network information dissemination service can entirely rely on smartphone-based communications. This paves the way to future Internet architectures, where vehicles will play a key role as information destinations and sources. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Show Figures

Figure 1

234 KiB  
Review
Internet Access by People with Intellectual Disabilities: Inequalities and Opportunities
by Darren Chadwick, Caroline Wesson and Chris Fullwood
Future Internet 2013, 5(3), 376-397; https://doi.org/10.3390/fi5030376 - 17 Jul 2013
Cited by 206 | Viewed by 21535
Abstract
This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion [...] Read more.
This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion of carer views of Internet use by people with intellectual disabilities will be covered incorporating consideration of the tension between protection, self-determination and lifestyle issues and gaining Internet access. We will address how impairment related factors may impede access and subsequently discuss how supports may be used to obfuscate impairments and facilitate access. We will move on from this to critically describe some of the potential benefits the Internet could provide to people with intellectual disabilities, including the potential for self-expression, advocacy and developing friendships. Finally, strategies to better include people with intellectual disabilities online will be given along with future research suggestions. Full article
(This article belongs to the Special Issue Inequality in the Digital Environment)
1006 KiB  
Article
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
by Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko
Future Internet 2013, 5(3), 355-375; https://doi.org/10.3390/fi5030355 - 09 Jul 2013
Cited by 10 | Viewed by 11428
Abstract
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, [...] Read more.
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data repository, and the extraction of relevant data for analytical modules of SIEM systems. The paper discusses the key issues of design and implementation of a hybrid SIEM data repository, which combines relational and ontological data representations. Based on the analysis of existing SIEM systems and standards, the ontological approach is chosen as a core component of the repository, and an example of the ontological data model for vulnerabilities representation is outlined. The hybrid architecture of the repository is proposed for implementation in SIEM systems. Since the most of works on the repositories of SIEM systems is based on the relational data model, the paper focuses mainly on the ontological part of the hybrid approach. To test the repository we used the data model intended for attack modeling and security evaluation, which includes both ontological and relational dimensions. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Show Figures

Graphical abstract

183 KiB  
Review
Future Research on Cyber-Physical Emergency Management Systems
by Erol Gelenbe and Fang-Jing Wu
Future Internet 2013, 5(3), 336-354; https://doi.org/10.3390/fi5030336 - 27 Jun 2013
Cited by 75 | Viewed by 11242
Abstract
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among [...] Read more.
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among civilians and the environment become much more diverse, and the complexity of the emergency response also becomes much greater. This paper surveys current research on sensor-assisted evacuation and rescue systems and discusses the related research issues concerning communication protocols for sensor networks, as well as several other important issues, such as the integrated asynchronous control of large-scale emergency response systems, knowledge discovery for rescue and prototyping platforms. Then, we suggest directions for further research. Full article
(This article belongs to the Special Issue Emergency Management, Communications and the Internet)
Show Figures

Figure 1

2931 KiB  
Article
eHealth Service Support in Future IPv6 Vehicular Networks
by Sofiane Imadali, Athanasia Karanasiou, Alexandru Petrescu, Ioannis Sifniadis, Eleftheria Velidou, Véronique Vèque and Pantelis Angelidis
Future Internet 2013, 5(3), 317-335; https://doi.org/10.3390/fi5030317 - 27 Jun 2013
Cited by 3 | Viewed by 6767
Abstract
Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X), large scale deployments, machine-to-machine (M2M) integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to [...] Read more.
Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X), large scale deployments, machine-to-machine (M2M) integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I) communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR) application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Show Figures

Figure 1

246 KiB  
Article
Virtual Relationship Violence and Perspectives on Punishment: Do Gender or Nationality Matter?
by Alison Marganski
Future Internet 2013, 5(3), 301-316; https://doi.org/10.3390/fi5030301 - 26 Jun 2013
Cited by 13 | Viewed by 7603
Abstract
Given the increasingly popular use of socially interactive technology (SIT), it is believed that the way in which individuals communicate and experience relationships has drastically been changing. For those who partake in this electronic world, damaging behaviors akin to those found in the [...] Read more.
Given the increasingly popular use of socially interactive technology (SIT), it is believed that the way in which individuals communicate and experience relationships has drastically been changing. For those who partake in this electronic world, damaging behaviors akin to those found in the real world have emerged. Yet, we know little about the extent of these behaviors in the context of romantic relationships, especially from a gender or cultural standpoint. Research on dating violence generally indicates that women experience in-person victimization at higher rates than men, although some research has called this into question. It also suggests that some national groups experience higher rates of violence than others. However, research is almost non-existent when it comes to exploring violence in the digital world. This study investigated gender and nationality in (1) the nature and extent of socially interactive intimate violence, and (2) perceptions of the seriousness of virtual relationship violence. Using a sample of students from the United States and Poland, findings revealed that socially interactive technology may serve as a new avenue for aggressing against partners, as virtual relationship violence was not uncommon and reflected some patterns present in the real world. Some unexpected patterns also emerged. The results of this research signal a possible transferability of covert intimate violence and highlight ways in which inequalities may exist in our virtual worlds. Full article
(This article belongs to the Special Issue Inequality in the Digital Environment)
Previous Issue
Next Issue
Back to TopTop