Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. 2019
  2. Published

    Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2018
  4. Published

    How portable is portable? Exercising the GDPR's Right to Data Portability

    Wong, J. & Henderson, T., 8 Oct 2018, Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers . ACM, p. 911-920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2016
  6. Published

    A robust reputation-based location-privacy recommender system using opportunistic networks

    Zhao, Y., Ye, J. & Henderson, T., 1 Dec 2016, Proceedings of The 8th EAI International Conference on Mobile Computing, Applications and Services. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    The effect of privacy concerns on privacy recommenders

    Zhao, Y., Ye, J. & Henderson, T., 7 Mar 2016, Proceedings of the 21st International Conference on Intelligent User Interfaces (IUI '16). New York: ACM, p. 218-227 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2015
  9. Published

    Some challenges for ethics in social network research

    Hutton, L. & Henderson, T., 21 Aug 2015, Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research. ACM, p. 13-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2014
  11. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Privacy-Aware Location Privacy Preference Recommendations

    Zhao, Y., Ye, J. & Henderson, T., 2 Dec 2014, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous). p. 120-129

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 2013
  15. Published

    MobOCloud: Extending Cloud Computing with Mobile Opportunistic Networks

    Pal, S. & Henderson, T., 30 Sep 2013, Proceedings of ACM CHANTS 2013. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. 2011
  17. Published

    Bootstrapping opportunistic networks using social roles

    Bigwood, G. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    The impact of location privacy on opportunistic networks

    Parris, I. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. 2010
  20. Published

    Planet-scale human mobility measurement

    Hui, P., Mortier, R., Piorkowski, M., Henderson, T. N. H. & Crowcroft, J., 10 Jun 2010, Proceedings of the Second ACM International Workshop on Hot Topics in Planet-Scale Measurement (HotPlanet). New York: ACM, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Privacy-enhanced social network routing in opportunistic networks

    Parris, I. S., Bigwood, G. J. & Henderson, T. N. H., Mar 2010, Proceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops): IEEE International Workshop on Security and Social Networking (SESOC 2010). IEEE Computer Society, p. 624-629

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. 2009
  23. Published

    Less is more: energy-efficient mobile sensing with SenseLess

    Ben Abdesslem, F., Phillips, A. & Henderson, T., Aug 2009, Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds (MobiHeld '09). NEW YORK: ACM, p. 61-62 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Scaling measurement experiments to planet-scale: ethical, regulatory and cultural considerations

    Henderson, T. N. H. & Ben Abdesslem, F., Jun 2009, Proceedings of the First ACM International Workshop on Hot Topics of Planet-scale Mobility Measurements (HotPlanet). New York: ACM, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Trust and privacy in distributed work groups

    Anthony, D., Henderson, T. N. H. & Kitts, J., Mar 2009, Social Computing and Behavioral Modeling. Liu, H., Salerno, J. J. & Young, M. J. (eds.). New York: Springer, p. 16-23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. 2008
  27. Published

    A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

    Bateman, M., Bhatti, S. N., Bigwood, G., Rehunathan, D., Allison, C., Henderson, T. & Miras, D., Apr 2008, Proceedings of the 11th Communications and Networking Simulation Symposium, CNS'08. ACM, p. 30-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Exploiting self-reported social networks for routing in ubiquitous computing environments

    Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T. & Bhatti, S., Oct 2008, 4TH IEEE IInternational Conference on Wireless and Mobile Computing, Networking and Communication (WiMob 2008). New York: IEEE, p. 484-489 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Revisiting inter-flow fairness

    Bhatti, S., Bateman, M., Rehunathan, D., Henderson, T., Bigwood, G. & Miras, D., Sep 2008, 2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008). NEW YORK: IEEE, p. 585-592 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. 2007
  31. Published

    Virtual walls: Protecting digital privacy in pervasive environments

    Kapadia, A., Henderson, T., Fielding, J. J. & Kotz, D., May 2007, Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings. LaMarca, A., Langheinrich, M. & Truong, K. N. (eds.). Springer, p. 162-179 18 p. (Lecture Notes in Computer Science; vol. 4480).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 Next
Top