Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    "I didn't sign up for this!": Informed consent in social network research

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). p. 178-187 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

    Bateman, M., Bhatti, S. N., Bigwood, G., Rehunathan, D., Allison, C., Henderson, T. & Miras, D., Apr 2008, Proceedings of the 11th Communications and Networking Simulation Symposium, CNS'08. ACM, p. 30-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A robust reputation-based location-privacy recommender system using opportunistic networks

    Zhao, Y., Ye, J. & Henderson, T., 1 Dec 2016, Proceedings of The 8th EAI International Conference on Mobile Computing, Applications and Services. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    An Accurate Technique for Measuring the Wireless Side of Wireless Networks

    Yeo, J., Youssef, M., Henderson, T. N. H. & Agrawala, A., Jun 2005, p. 13-18.

    Research output: Contribution to conferencePaper

  6. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In : ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticle

  8. Published

    Analysis of a Wi-Fi Hotspot Network

    Blinn, D., Henderson, T. N. H. & Kotz, D., Jun 2005, p. 1-6.

    Research output: Contribution to conferencePaper

  9. Published

    Automating Data Rights

    Veale, M., Edwards, L., Eyers, D., Henderson, T., Millard, C. & Lerner, B. S., 2018, Towards Accountable Systems. Eyers, D., Millard, C., Seltzer, M. & Singh, J. (eds.). Vol. 8. p. 149-156 8 p. (Daghstuhl Reports).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. E-pub ahead of print
  11. Published

    Beyond the EULA: Improving consent for data mining

    Hutton, L. & Henderson, T., 5 Jul 2017, Transparent Data Mining for Big and Small Data. Cerquitelli, T., Quercia, D. & Pasquale, F. (eds.). Springer, p. 147-167 (Studies in Big Data; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  12. Published

    Bootstrapping opportunistic networks using social roles

    Bigwood, G. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    CRAWDAD: A Wireless Network Data Archive for WiSec Researchers

    Henderson, T. & Kotz, D., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  14. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Yeo, J., Kotz, D. & Henderson, T. N. H., Apr 2006, ACM Computer Communication Review, 36, 2, p. 21-22.

    Research output: Contribution to specialist publicationArticle

  15. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Kotz, D. & Henderson, T. N. H., Oct 2005, IEEE Pervasive Computing, 4, 4, p. 12-14.

    Research output: Contribution to specialist publicationArticle

  16. Forthcoming

    Case Studies and Challenges in Reproducibility in the Computational Sciences

    Arabas, S., Bareford, M. R., Gent, I. P., Gorman, B. M., Hajiarabderkani, M., Henderson, T., Hutton, L., Konovalov, A., Kotthoff, L., McCreesh, C., Paul, R. R., Petrie, K. E. J., Razaq, A., Reijsbergen, D. & Takeda, K., 1 Sep 2014, (In preparation) arXiv.

    Research output: Other contribution

  17. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Channel sampling strategies for monitoring wireless networks

    Deshpande, U., Henderson, T. & Kotz, D., Apr 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Vols 1 and 2. NEW YORK: IEEE, p. 423-429 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Forthcoming

    Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Congestion Pricing - Paying your way in Communication Networks

    Henderson, T. N. H., Crowcroft, J. & Bhatti, S. N., Sep 2001, IEEE Internet Computing, 5, 5, p. 85-89.

    Research output: Contribution to specialist publicationArticle

  21. Published

    Context-based personalised settings for mobile location sharing

    Abdesslem, F. B., Henderson, T., Brostoff, S. & Sasse, M. A., 27 Oct 2011. 4 p.

    Research output: Contribution to conferencePaper

  22. Published

    Contextual consent: ethical mining of social media for health research

    Norval, C. & Henderson, T., 26 Jan 2017, Proceedings of the WSDM 2017 Workshop on Mining Online Health Reports. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Countering terrorism in public places: the D-Scent approach

    Ormerod, T., Sandham, A., Bull, R., Jackson, M., Bai, L., Bhatti, S. N., Henderson, T. N. H. & Guest, E., Nov 2007, In : Contingency Today.

    Research output: Contribution to journalArticle

  24. Published

    Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., Jan 2015, In : D-Lib Magazine. 21, 1/2

    Research output: Contribution to journalArticle

  26. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., 12 Sep 2014, Proceedings of the Second Workshop on Linking and Contextualizing Publications and Datasets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Editorial

    Vasalou, A., Henderson, T. & Joinson, A., Dec 2013, In : International Journal of Human-Computer Studies. 71, 12, p. 1124-1125

    Research output: Contribution to journalEditorial

  28. Forthcoming

    Employee surveillance: the road to surveillance is paved with good intentions

    Edwards, L., Martin, L. & Henderson, T., 6 Oct 2018, (Accepted/In press) Amsterdam Privacy Conference. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Enabling useful data sharing through format identification and text mining

    Akestoridis, D-G. & Henderson, T. N. H., 1 Aug 2016.

    Research output: Contribution to conferencePoster

  30. Published

    Ethics and online social network research - developing best practices

    Henderson, T., Hutton, L. & McNeilly, S., 11 Sep 2012, BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations. BCS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Exploiting self-reported social networks for routing in ubiquitous computing environments

    Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T. & Bhatti, S., Oct 2008, 4TH IEEE IInternational Conference on Wireless and Mobile Computing, Networking and Communication (WiMob 2008). New York: IEEE, p. 484-489 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks

    Parris, I. S., Ben Abdesslem, F. & Henderson, T., 2012, In : Ad Hoc Networks. 15 p.

    Research output: Contribution to journalArticle

  33. Published

    Facebook or Fakebook? The effect of simulation on location privacy user studies

    Parris, I., Abdesslem, F. B. & Henderson, T. N. H., 6 Sep 2010. 2 p.

    Research output: Contribution to conferencePaper

  34. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    How portable is portable? Exercising the GDPR's Right to Data Portability

    Wong, J. & Henderson, T., 8 Oct 2018, Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers . ACM, p. 911-920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D., Crowcroft, J. & Crabtree, A., 2016, Encyclopedia of Human-Computer Interaction.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  37. Forthcoming

    Human-Data Interaction: The Human Face of the Data-Driven Society

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 1 Oct 2014, (In preparation).

    Research output: Working paper

  38. Published

    IRONMAN: Using social networks to add incentives and reputation to opportunistic networks

    Bigwood, G. J. & Henderson, T., 9 Oct 2011, p. 65-72. 8 p.

    Research output: Contribution to conferencePaper

  39. Published

    Incentive-aware opportunistic network routing

    Bigwood, G. & Henderson, T., 2013, Routing in Opportunistic Networks. Woungang, I., Kumar Dhurandher, S., Anpalagan, A. & Vasilakos, A. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  40. Published

    Latency and user behaviour on a multiplayer game server

    Henderson, T. N. H., Nov 2001, p. 13. 13 p.

    Research output: Contribution to conferencePaper

  41. Published

    Less is more: energy-efficient mobile sensing with SenseLess

    Ben Abdesslem, F., Phillips, A. & Henderson, T., Aug 2009, Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds (MobiHeld '09). NEW YORK: ACM, p. 61-62 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    MAP: a scalable monitoring system for dependable 802.11 wireless networks

    Sheng, Y., Chen, G., Yin, H., Tan, K., Deshpande, U., Vance, B., Kotz, D., Campbell, A., McDonald, C., Henderson, T. & Wright, J., Oct 2008, In : IEEE Wireless Communications. 15, 5, p. 10-18 9 p.

    Research output: Contribution to journalArticle

  43. Published

    Making social media research reproducible

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the ICWSM Workshop on Standards and Practices in Large-Scale Social Media Research. Association for the Advancement of Artificial Intelligence, p. 2-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Measuring Wireless LANs

    Henderson, T. N. H. & Kotz, D., 2006, Mobile, Wireless, and Sensor Networks. Shorey, R., Ananda, A. L., Chan, M. C. & Ooi, W. T. (eds.). John Wiley and Sons, p. 5-27

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    Measuring wireless network usage with the Experience Sampling Method

    Henderson, T. N. H., Anthony, D. & Kotz, D., Apr 2005.

    Research output: Contribution to conferencePaper

  46. Published

    MobOCloud: Extending Cloud Computing with Mobile Opportunistic Networks

    Pal, S. & Henderson, T., 30 Sep 2013, Proceedings of ACM CHANTS 2013. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Mobile experience sampling: Reaching the parts of Facebook other methods cannot reach

    Abdesslem, F. B., Parris, I. & Henderson, T. N. H., 6 Sep 2010. 8 p.

    Research output: Contribution to conferencePaper

  48. Published

    Mobility and Stability Evaluation in Wireless Multi-Hop Networks Using Multi-Player Games

    Fitzek, F., Badia, L., Zorzi, M., Schulte, G., Seeling, P. & Henderson, T. N. H., May 2003, p. 177-185.

    Research output: Contribution to conferencePaper

  49. Published

    Modelling user behaviour in networked games

    Henderson, T. N. H. & Bhatti, S. N., Oct 2001, p. 9. 9 p.

    Research output: Contribution to conferencePaper

  50. Published

    Networked games: a QoS-sensitive application for QoS-insensitive users?

    Henderson, T. N. H. & Bhatti, S. N., Aug 2003, p. 141-147.

    Research output: Contribution to conferencePaper

Previous 1 2 Next
Top