Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. Paper › Research › Not peer-reviewed
  2. Published

    An Accurate Technique for Measuring the Wireless Side of Wireless Networks

    Yeo, J., Youssef, M., Henderson, T. N. H. & Agrawala, A., Jun 2005, p. 13-18.

    Research output: Contribution to conferencePaper

  3. Published

    Analysis of a Wi-Fi Hotspot Network

    Blinn, D., Henderson, T. N. H. & Kotz, D., Jun 2005, p. 1-6.

    Research output: Contribution to conferencePaper

  4. Published

    Latency and user behaviour on a multiplayer game server

    Henderson, T. N. H., Nov 2001, p. 13. 13 p.

    Research output: Contribution to conferencePaper

  5. Published

    Measuring wireless network usage with the Experience Sampling Method

    Henderson, T. N. H., Anthony, D. & Kotz, D., Apr 2005.

    Research output: Contribution to conferencePaper

  6. Published

    Mobility and Stability Evaluation in Wireless Multi-Hop Networks Using Multi-Player Games

    Fitzek, F., Badia, L., Zorzi, M., Schulte, G., Seeling, P. & Henderson, T. N. H., May 2003, p. 177-185.

    Research output: Contribution to conferencePaper

  7. Published

    Modelling user behaviour in networked games

    Henderson, T. N. H. & Bhatti, S. N., Oct 2001, p. 9. 9 p.

    Research output: Contribution to conferencePaper

  8. Published

    Networked games: a QoS-sensitive application for QoS-insensitive users?

    Henderson, T. N. H. & Bhatti, S. N., Aug 2003, p. 141-147.

    Research output: Contribution to conferencePaper

  9. Published

    Observations on game server discovery mechanisms

    Henderson, T. N. H., Apr 2002, p. 47-52.

    Research output: Contribution to conferencePaper

  10. Published

    Protocol-independent multicast pricing

    Henderson, T. N. H. & Bhatti, S. N., Jun 2000, p. 11-17.

    Research output: Contribution to conferencePaper

  11. Published

    What online gamers really think of the Internet

    Henderson, T. N. H. & Oliveira, M., May 2003, p. 69-79.

    Research output: Contribution to conferencePaper

  12. Paper › Research › Peer-reviewed
  13. Published

    Social DTN routing

    Bigwood, G. & Henderson, T. N. H., 9 Dec 2008.

    Research output: Contribution to conferencePaperpeer-review

  14. Poster › Research › Not peer-reviewed
  15. Published

    Enabling useful data sharing through format identification and text mining

    Akestoridis, D-G. & Henderson, T. N. H., 1 Aug 2016.

    Research output: Contribution to conferencePoster

  16. Published

    Predicting consent in online social network health research

    Henderson, T. N. H., 3 Jun 2016.

    Research output: Contribution to conferencePoster

  17. Article › Research
  18. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Yeo, J., Kotz, D. & Henderson, T. N. H., Apr 2006, ACM Computer Communication Review, 36, 2, p. 21-22.

    Research output: Contribution to specialist publicationArticle

  19. Published

    CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth

    Kotz, D. & Henderson, T. N. H., Oct 2005, IEEE Pervasive Computing, 4, 4, p. 12-14.

    Research output: Contribution to specialist publicationArticle

  20. Published

    Congestion Pricing - Paying your way in Communication Networks

    Henderson, T. N. H., Crowcroft, J. & Bhatti, S. N., Sep 2001, IEEE Internet Computing, 5, 5, p. 85-89.

    Research output: Contribution to specialist publicationArticle

  21. Published

    Workshop Report - CRAWDAD Workshop 2006

    Yeo, J., Henderson, T. N. H. & Kotz, D., Jan 2007, ACM SIGMOBILE Mobile Computing and Communication Review, 11, 1, p. 67-69.

    Research output: Contribution to specialist publicationArticle

  22. Article › Research › Peer-reviewed
  23. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In: ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Countering terrorism in public places: the D-Scent approach

    Ormerod, T., Sandham, A., Bull, R., Jackson, M., Bai, L., Bhatti, S. N., Henderson, T. N. H. & Guest, E., Nov 2007, In: Contingency Today.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    MAP: a scalable monitoring system for dependable 802.11 wireless networks

    Sheng, Y., Chen, G., Yin, H., Tan, K., Deshpande, U., Vance, B., Kotz, D., Campbell, A., McDonald, C., Henderson, T. & Wright, J., Oct 2008, In: IEEE Wireless Communications. 15, 5, p. 10-18 9 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Privacy in Location Aware Computing Environments

    Anthony, D., Henderson, T. N. H. & Kotz, D., Oct 2007, In: IEEE Pervasive Computing. 6, 4, p. 64-72 9 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Promoting Tolerance for Delay Tolerant Network Research

    Crowcroft, J., Yoneki, E., Hui, P. & Henderson, T. N. H., Oct 2008, In: ACM Computer Communication Review. 38, 5, p. 63-68 6 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Sharing is caring - so where are your data?

    Henderson, T. N. H., Jan 2008, In: ACM Computer Communication Review. 38, 1, p. 43--44 2 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    The Changing Usage of a Mature Campus-wide Wireless Network

    Henderson, T., Kotz, D. & Abyzov, I., 9 Oct 2008, In: Computer Networks. 52, 14, p. 2690-2712 23 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Workshop Report - CRAWDAD Workshop 2007

    Yeo, J., Henderson, T. N. H. & Kotz, D., Jul 2008, In: ACM Computer Communication Review. 38, 3, p. 79-82

    Research output: Contribution to journalArticlepeer-review

  31. Editorial › Research › Not peer-reviewed
  32. Published

    Editorial

    Vasalou, A., Henderson, T. & Joinson, A., Dec 2013, In: International Journal of Human-Computer Studies. 71, 12, p. 1124-1125

    Research output: Contribution to journalEditorial

  33. Chapter › Research
  34. Published

    Automating Data Rights

    Veale, M., Edwards, L., Eyers, D., Henderson, T., Millard, C. & Lerner, B. S., 2018, Towards Accountable Systems. Eyers, D., Millard, C., Seltzer, M. & Singh, J. (eds.). Vol. 8. p. 149-156 8 p. (Daghstuhl Reports).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Measuring Wireless LANs

    Henderson, T. N. H. & Kotz, D., 2006, Mobile, Wireless, and Sensor Networks. Shorey, R., Ananda, A. L., Chan, M. C. & Ooi, W. T. (eds.). John Wiley and Sons, p. 5-27

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Entry for encyclopedia/dictionary › Research
  38. Published

    Human-data interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D., Crowcroft, J. & Crabtree, A., 2016, Encyclopedia of Human-Computer Interaction. Interaction Design Foundation

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  39. Conference contribution › Research
  40. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

    Bateman, M., Bhatti, S. N., Bigwood, G., Rehunathan, D., Allison, C., Henderson, T. & Miras, D., Apr 2008, Proceedings of the 11th Communications and Networking Simulation Symposium, CNS'08. ACM, p. 30-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Channel sampling strategies for monitoring wireless networks

    Deshpande, U., Henderson, T. & Kotz, D., Apr 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Vols 1 and 2. NEW YORK: IEEE, p. 423-429 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., 12 Sep 2014, Proceedings of the Second Workshop on Linking and Contextualizing Publications and Datasets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Ethics and online social network research - developing best practices

    Henderson, T., Hutton, L. & McNeilly, S., 11 Sep 2012, BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations. BCS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Exploiting self-reported social networks for routing in ubiquitous computing environments

    Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T. & Bhatti, S., Oct 2008, 4TH IEEE IInternational Conference on Wireless and Mobile Computing, Networking and Communication (WiMob 2008). New York: IEEE, p. 484-489 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    MobOCloud: Extending Cloud Computing with Mobile Opportunistic Networks

    Pal, S. & Henderson, T., 30 Sep 2013, Proceedings of ACM CHANTS 2013. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Predicting location-sharing privacy preferences in social network applications

    Bigwood, G., Abdesslem, F. B. & Henderson, T., 19 Jun 2012, Proceedings of the First Workshop on recent advances in behavior prediction and pro-active pervasive computing (AwareCast).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Privacy-Aware Location Privacy Preference Recommendations

    Zhao, Y., Ye, J. & Henderson, T., 2 Dec 2014, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous). p. 120-129

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Revisiting inter-flow fairness

    Bhatti, S., Bateman, M., Rehunathan, D., Henderson, T., Bigwood, G. & Miras, D., Sep 2008, 2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008). NEW YORK: IEEE, p. 585-592 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    The Changing Usage of a Mature Campus-wide Wireless Network

    Henderson, T. N. H., Kotz, D. & Abyzov, I., Sep 2004, MobiCom 2004 : proceedings of the Tenth Annual International Conference on Mobile Computing and Networking, September 26-October 1, 2004, Philadelphia, Pennsylvania, USA. ACM, p. 187-201 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Virtual walls: Protecting digital privacy in pervasive environments

    Kapadia, A., Henderson, T., Fielding, J. J. & Kotz, D., May 2007, Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings. LaMarca, A., Langheinrich, M. & Truong, K. N. (eds.). Springer, p. 162-179 18 p. (Lecture Notes in Computer Science; vol. 4480).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Other contribution › Research
  56. Published

    Incentive-aware opportunistic network routing

    Bigwood, G. & Henderson, T., 2013, Routing in Opportunistic Networks. Woungang, I., Kumar Dhurandher, S., Anpalagan, A. & Vasilakos, A. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  57. Published

    Review: Ethical research standards in a world of big data

    Henderson, T., 6 Mar 2014, F1000Research.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  58. Chapter (peer-reviewed) › Research › Peer-reviewed
  59. Published

    Beyond the EULA: Improving consent for data mining

    Hutton, L. & Henderson, T., 5 Jul 2017, Transparent Data Mining for Big and Small Data. Cerquitelli, T., Quercia, D. & Pasquale, F. (eds.). Springer, p. 147-167 (Studies in Big Data; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

Top