Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    "I didn't sign up for this!": Informed consent in social network research

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). p. 178-187 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

    Bateman, M., Bhatti, S. N., Bigwood, G., Rehunathan, D., Allison, C., Henderson, T. & Miras, D., Apr 2008, Proceedings of the 11th Communications and Networking Simulation Symposium, CNS'08. ACM, p. 30-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A robust reputation-based location-privacy recommender system using opportunistic networks

    Zhao, Y., Ye, J. & Henderson, T., 1 Dec 2016, Proceedings of The 8th EAI International Conference on Mobile Computing, Applications and Services. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    An Accurate Technique for Measuring the Wireless Side of Wireless Networks

    Yeo, J., Youssef, M., Henderson, T. N. H. & Agrawala, A., Jun 2005, p. 13-18.

    Research output: Contribution to conferencePaper

  6. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In : ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticle

  8. Published

    Analysis of a Wi-Fi Hotspot Network

    Blinn, D., Henderson, T. N. H. & Kotz, D., Jun 2005, p. 1-6.

    Research output: Contribution to conferencePaper

  9. Published

    Automating Data Rights

    Veale, M., Edwards, L., Eyers, D., Henderson, T., Millard, C. & Lerner, B. S., 2018, Towards Accountable Systems. Eyers, D., Millard, C., Seltzer, M. & Singh, J. (eds.). Vol. 8. p. 149-156 8 p. (Daghstuhl Reports).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. E-pub ahead of print
  11. Published

    Beyond the EULA: Improving consent for data mining

    Hutton, L. & Henderson, T., 5 Jul 2017, Transparent Data Mining for Big and Small Data. Cerquitelli, T., Quercia, D. & Pasquale, F. (eds.). Springer, p. 147-167 (Studies in Big Data; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  12. Published

    Bootstrapping opportunistic networks using social roles

    Bigwood, G. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    CRAWDAD: A Wireless Network Data Archive for WiSec Researchers

    Henderson, T. & Kotz, D., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  14. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Yeo, J., Kotz, D. & Henderson, T. N. H., Apr 2006, ACM Computer Communication Review, 36, 2, p. 21-22.

    Research output: Contribution to specialist publicationArticle

  15. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Kotz, D. & Henderson, T. N. H., Oct 2005, IEEE Pervasive Computing, 4, 4, p. 12-14.

    Research output: Contribution to specialist publicationArticle

  16. Forthcoming

    Case Studies and Challenges in Reproducibility in the Computational Sciences

    Arabas, S., Bareford, M. R., Gent, I. P., Gorman, B. M., Hajiarabderkani, M., Henderson, T., Hutton, L., Konovalov, A., Kotthoff, L., McCreesh, C., Paul, R. R., Petrie, K. E. J., Razaq, A., Reijsbergen, D. & Takeda, K., 1 Sep 2014, (In preparation) arXiv.

    Research output: Other contribution

  17. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Channel sampling strategies for monitoring wireless networks

    Deshpande, U., Henderson, T. & Kotz, D., Apr 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Vols 1 and 2. NEW YORK: IEEE, p. 423-429 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Forthcoming

    Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Congestion Pricing - Paying your way in Communication Networks

    Henderson, T. N. H., Crowcroft, J. & Bhatti, S. N., Sep 2001, IEEE Internet Computing, 5, 5, p. 85-89.

    Research output: Contribution to specialist publicationArticle

Previous 1 2 3 4 5 Next
Top