Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. Working paper › Research
  2. Forthcoming

    Human-Data Interaction: The Human Face of the Data-Driven Society

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 1 Oct 2014, (In preparation).

    Research output: Working paper

  3. Paper › Research › Not peer-reviewed
  4. Published

    An Accurate Technique for Measuring the Wireless Side of Wireless Networks

    Yeo, J., Youssef, M., Henderson, T. N. H. & Agrawala, A., Jun 2005, p. 13-18.

    Research output: Contribution to conferencePaper

  5. Published

    Analysis of a Wi-Fi Hotspot Network

    Blinn, D., Henderson, T. N. H. & Kotz, D., Jun 2005, p. 1-6.

    Research output: Contribution to conferencePaper

  6. Published

    Latency and user behaviour on a multiplayer game server

    Henderson, T. N. H., Nov 2001, p. 13. 13 p.

    Research output: Contribution to conferencePaper

  7. Published

    Measuring wireless network usage with the Experience Sampling Method

    Henderson, T. N. H., Anthony, D. & Kotz, D., Apr 2005.

    Research output: Contribution to conferencePaper

  8. Published

    Mobile experience sampling: Reaching the parts of Facebook other methods cannot reach

    Abdesslem, F. B., Parris, I. & Henderson, T. N. H., 6 Sep 2010. 8 p.

    Research output: Contribution to conferencePaper

  9. Published

    Mobility and Stability Evaluation in Wireless Multi-Hop Networks Using Multi-Player Games

    Fitzek, F., Badia, L., Zorzi, M., Schulte, G., Seeling, P. & Henderson, T. N. H., May 2003, p. 177-185.

    Research output: Contribution to conferencePaper

  10. Published

    Modelling user behaviour in networked games

    Henderson, T. N. H. & Bhatti, S. N., Oct 2001, p. 9. 9 p.

    Research output: Contribution to conferencePaper

  11. Published

    Networked games: a QoS-sensitive application for QoS-insensitive users?

    Henderson, T. N. H. & Bhatti, S. N., Aug 2003, p. 141-147.

    Research output: Contribution to conferencePaper

  12. Published

    Observations on game server discovery mechanisms

    Henderson, T. N. H., Apr 2002, p. 47-52.

    Research output: Contribution to conferencePaper

  13. Published

    Protocol-independent multicast pricing

    Henderson, T. N. H. & Bhatti, S. N., Jun 2000, p. 11-17.

    Research output: Contribution to conferencePaper

  14. Published

    Social delay-tolerant network routing

    Bigwood, G. J., Henderson, T. N. H. & Bhatti, S. N., Jan 2009. 5 p.

    Research output: Contribution to conferencePaper

  15. Published

    What online gamers really think of the Internet

    Henderson, T. N. H. & Oliveira, M., May 2003, p. 69-79.

    Research output: Contribution to conferencePaper

  16. Paper › Research › Peer-reviewed
  17. Published

    Context-based personalised settings for mobile location sharing

    Abdesslem, F. B., Henderson, T., Brostoff, S. & Sasse, M. A., 27 Oct 2011. 4 p.

    Research output: Contribution to conferencePaper

  18. Published

    Facebook or Fakebook? The effect of simulation on location privacy user studies

    Parris, I., Abdesslem, F. B. & Henderson, T. N. H., 6 Sep 2010. 2 p.

    Research output: Contribution to conferencePaper

  19. Published

    IRONMAN: Using social networks to add incentives and reputation to opportunistic networks

    Bigwood, G. J. & Henderson, T., 9 Oct 2011, p. 65-72. 8 p.

    Research output: Contribution to conferencePaper

  20. Published

    Practical privacy-aware opportunistic networking

    Parris, I. & Henderson, T., 5 Jul 2011. 5 p.

    Research output: Contribution to conferencePaper

  21. Published

    Social DTN routing

    Bigwood, G. & Henderson, T. N. H., 9 Dec 2008.

    Research output: Contribution to conferencePaper

  22. Published

    Understanding mobile social behaviour using smartphones

    Abdesslem, F. B. & Henderson, T. N. H., 17 Oct 2010. 4 p.

    Research output: Contribution to conferencePaper

  23. Published

    Usable data-driven privacy research: should we be afraid of the Big (Bad?) Data Wolf?

    Henderson, T., Nov 2010. 2 p.

    Research output: Contribution to conferencePaper

  24. Poster › Research › Not peer-reviewed
  25. Published

    Enabling useful data sharing through format identification and text mining

    Akestoridis, D-G. & Henderson, T. N. H., 1 Aug 2016.

    Research output: Contribution to conferencePoster

  26. Published

    Predicting consent in online social network health research

    Henderson, T. N. H., 3 Jun 2016.

    Research output: Contribution to conferencePoster

  27. Poster › Research › Peer-reviewed
  28. Published

    CRAWDAD: A Wireless Network Data Archive for WiSec Researchers

    Henderson, T. & Kotz, D., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  29. Published

    Recommending Location Privacy Preferences in Ubiquitous Computing

    Zhao, Y., Ye, J. & Henderson, T., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  30. Article › Research
  31. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Yeo, J., Kotz, D. & Henderson, T. N. H., Apr 2006, ACM Computer Communication Review, 36, 2, p. 21-22.

    Research output: Contribution to specialist publicationArticle

  32. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Kotz, D. & Henderson, T. N. H., Oct 2005, IEEE Pervasive Computing, 4, 4, p. 12-14.

    Research output: Contribution to specialist publicationArticle

  33. Published

    Congestion Pricing - Paying your way in Communication Networks

    Henderson, T. N. H., Crowcroft, J. & Bhatti, S. N., Sep 2001, IEEE Internet Computing, 5, 5, p. 85-89.

    Research output: Contribution to specialist publicationArticle

  34. Published

    Workshop Report - CRAWDAD Workshop 2006

    Yeo, J., Henderson, T. N. H. & Kotz, D., Jan 2007, ACM SIGMOBILE Mobile Computing and Communication Review, 11, 1, p. 67-69.

    Research output: Contribution to specialist publicationArticle

  35. Article › Research › Not peer-reviewed
  36. Published

    The ambient loo - caught short when nature calls?

    Haddadi, H., Henderson, T. & Crowcroft, J., Apr 2010, In : ACM Computer Communication Review. 40, 2, p. 78-78 1 p.

    Research output: Contribution to journalArticle

  37. Article › Research › Peer-reviewed
  38. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In : ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticle

  39. E-pub ahead of print
  40. Published

    Countering terrorism in public places: the D-Scent approach

    Ormerod, T., Sandham, A., Bull, R., Jackson, M., Bai, L., Bhatti, S. N., Henderson, T. N. H. & Guest, E., Nov 2007, In : Contingency Today.

    Research output: Contribution to journalArticle

  41. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., Jan 2015, In : D-Lib Magazine. 21, 1/2

    Research output: Contribution to journalArticle

  42. Published

    Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks

    Parris, I. S., Ben Abdesslem, F. & Henderson, T., 2012, In : Ad Hoc Networks. 15 p.

    Research output: Contribution to journalArticle

  43. Published

    MAP: a scalable monitoring system for dependable 802.11 wireless networks

    Sheng, Y., Chen, G., Yin, H., Tan, K., Deshpande, U., Vance, B., Kotz, D., Campbell, A., McDonald, C., Henderson, T. & Wright, J., Oct 2008, In : IEEE Wireless Communications. 15, 5, p. 10-18 9 p.

    Research output: Contribution to journalArticle

  44. Published

    PFClust: an optimised implementation of a parameter-free clustering algorithm

    Musayeva, K., Henderson, T., Mitchell, J. B. O. & Mavridis, L., Feb 2014, In : Source Code for Biology and Medicine. 9, 5

    Research output: Contribution to journalArticle

  45. Published

    Privacy in Location Aware Computing Environments

    Anthony, D., Henderson, T. N. H. & Kotz, D., Oct 2007, In : IEEE Pervasive Computing. 6, 4, p. 64-72 9 p.

    Research output: Contribution to journalArticle

  46. Published

    Privacy-enhanced social-network routing

    Parris, I. S. & Henderson, T., 1 Jan 2012, In : Computer Communications. 35, 1, p. 62-74 9 p.

    Research output: Contribution to journalArticle

  47. Published

    Promoting Tolerance for Delay Tolerant Network Research

    Crowcroft, J., Yoneki, E., Hui, P. & Henderson, T. N. H., Oct 2008, In : ACM Computer Communication Review. 38, 5, p. 63-68 6 p.

    Research output: Contribution to journalArticle

  48. Published

    Sharing is caring - so where are your data?

    Henderson, T. N. H., Jan 2008, In : ACM Computer Communication Review. 38, 1, p. 43--44 2 p.

    Research output: Contribution to journalArticle

  49. Published

    The Changing Usage of a Mature Campus-wide Wireless Network

    Henderson, T., Kotz, D. & Abyzov, I., 9 Oct 2008, In : Computer Networks. 52, 14, p. 2690-2712 23 p.

    Research output: Contribution to journalArticle

  50. E-pub ahead of print
  51. Published

    Towards reproducibility in online social network research

    Hutton, L. & Henderson, T., Mar 2018, In : IEEE Transactions on Emerging Topics in Computing. 6, 1, p. 156-167 12 p.

    Research output: Contribution to journalArticle

  52. Published

    Workshop Report - CRAWDAD Workshop 2007

    Yeo, J., Henderson, T. N. H. & Kotz, D., Jul 2008, In : ACM Computer Communication Review. 38, 3, p. 79-82

    Research output: Contribution to journalArticle

  53. Editorial › Research › Not peer-reviewed
  54. Published

    Editorial

    Vasalou, A., Henderson, T. & Joinson, A., Dec 2013, In : International Journal of Human-Computer Studies. 71, 12, p. 1124-1125

    Research output: Contribution to journalEditorial

  55. Other contribution › Research
  56. Forthcoming

    Case Studies and Challenges in Reproducibility in the Computational Sciences

    Arabas, S., Bareford, M. R., Gent, I. P., Gorman, B. M., Hajiarabderkani, M., Henderson, T., Hutton, L., Konovalov, A., Kotthoff, L., McCreesh, C., Paul, R. R., Petrie, K. E. J., Razaq, A., Reijsbergen, D. & Takeda, K., 1 Sep 2014, (In preparation) arXiv.

    Research output: Other contribution

  57. Chapter › Research
  58. Published

    Automating Data Rights

    Veale, M., Edwards, L., Eyers, D., Henderson, T., Millard, C. & Lerner, B. S., 2018, Towards Accountable Systems. Eyers, D., Millard, C., Seltzer, M. & Singh, J. (eds.). Vol. 8. p. 149-156 8 p. (Daghstuhl Reports).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Published

    Measuring Wireless LANs

    Henderson, T. N. H. & Kotz, D., 2006, Mobile, Wireless, and Sensor Networks. Shorey, R., Ananda, A. L., Chan, M. C. & Ooi, W. T. (eds.). John Wiley and Sons, p. 5-27

    Research output: Chapter in Book/Report/Conference proceedingChapter

  61. Published

    Reliable online social network data collection

    Abdesslem, F. B., Parris, I. & Henderson, T., 2012, Computational Social Networks: Mining and Visualization. Abraham, A. (ed.). London, UK: Springer-Verlag, p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 Next
Top