Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

    Bateman, M., Bhatti, S. N., Bigwood, G., Rehunathan, D., Allison, C., Henderson, T. & Miras, D., Apr 2008, Proceedings of the 11th Communications and Networking Simulation Symposium, CNS'08. ACM, p. 30-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Channel sampling strategies for monitoring wireless networks

    Deshpande, U., Henderson, T. & Kotz, D., Apr 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Vols 1 and 2. NEW YORK: IEEE, p. 423-429 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., 12 Sep 2014, Proceedings of the Second Workshop on Linking and Contextualizing Publications and Datasets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Ethics and online social network research - developing best practices

    Henderson, T., Hutton, L. & McNeilly, S., 11 Sep 2012, BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations. BCS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Exploiting self-reported social networks for routing in ubiquitous computing environments

    Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T. & Bhatti, S., Oct 2008, 4TH IEEE IInternational Conference on Wireless and Mobile Computing, Networking and Communication (WiMob 2008). New York: IEEE, p. 484-489 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Incentive-aware opportunistic network routing

    Bigwood, G. & Henderson, T., 2013, Routing in Opportunistic Networks. Woungang, I., Kumar Dhurandher, S., Anpalagan, A. & Vasilakos, A. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

Previous 1 2 Next
Top