Ian Wakeman

Orcid: 0000-0002-6559-5493

According to our database1, Ian Wakeman authored at least 55 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Multipath transport and packet spraying for efficient data delivery in data centres.
Comput. Networks, 2019

2018
Relating Vertex and Global Graph Entropy in Randomly Generated Graphs.
Entropy, 2018

Efficient Geocasting in Opportunistic Networks.
Comput. Commun., 2018

2017
Correction to "Vertex Entropy as a Critical Node Measure in Network Monitoring".
IEEE Trans. Netw. Serv. Manag., 2017

Vertex Entropy As a Critical Node Measure in Network Monitoring.
IEEE Trans. Netw. Serv. Manag., 2017

Efficient content delivery through fountain coding in opportunistic information-centric networks.
Comput. Commun., 2017

2016
Is Preferential Attachment the 2nd Law of Thermodynamics in Disguise?
CoRR, 2016

GSAF: Efficient and flexible geocasting for opportunistic networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Towards an approximate graph entropy measure for identifying incidents in network event data.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

MMPTCP: A multipath transport protocol for data centers.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Multipath-TCP in ns-3.
CoRR, 2015

Short vs. Long Flows: A Battle That Both Can Win.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

2013
The state of peer-to-peer network simulators.
ACM Comput. Surv., 2013

The Fans United will Always be Connected: Building a Practical DTN in a Football Stadium.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013

2012
A deniable and efficient question and answer service over ad hoc social networks.
Inf. Retr., 2012

ShineUS: Exploring preferences in public discussion.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Finding Trusted Publish/Subscribe Trees.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

2011
Deploying Pervasive Advertising in a Farmers' Market.
Proceedings of the Pervasive Advertising, 2011

Rhythms in Twitter.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

MediateSpace: decentralised contextual mediation using tuple spaces.
Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2011), Lisbon, Portugal, December 12, 2011

2010
Can We Use Trust in Online Dating?
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Chutney and relish: designing to augment the experience of shopping at a farmers' market.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

A framework for secure device pairing by demonstration of physical proximity.
Proceedings of the FIT '10, 2010

2009
Are your friends who they say they are?: data mining online identities.
ACM Crossroads, 2009

Transformation of Online Representation through Time.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2008
Composing software services in the pervasive computing environment: Languages or APIs?
Pervasive Mob. Comput., 2008

The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.
Proceedings of the Trust Management II, 2008

2007
The state of peer-to-peer simulators and simulations.
Comput. Commun. Rev., 2007

Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership.
Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2007), held at the ACM/IFIP/USENIX 8th International Middleware Conference, November 26, 2007

Localising Multicast Using Application Predicates.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

2006
Lessons for Autonomic Services from the Design of an Anonymous DoS Protection Overlay.
Proceedings of the Autonomic Networking, First International IFIP TC6 Conference, 2006

2005
Managing the Policies of Non-Technical Users in a Dynamic World.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Middleware for User Controlled Environments.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

2004
Scooby: middleware for service composition in pervasive computing.
Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, 2004

2003
Risky Business: Motivations for Markets in Programmable Networks.
Proceedings of the Active Networks, IFIP TC6 5th International Workshop, 2003

2002
How Web browsers shape users' understanding of networks.
Electron. Libr., 2002

2001
Beyond the interface: users' perceptions of interaction and audience on websites.
Interact. Comput., 2001

SafetyNet: A language-based approach to programmable networks.
Comput. Networks, 2001

Active networks and services.
Comput. Networks, 2001

A Survey of Adaptive Applications in Mobile Computing.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
ATOM - Active Totally Ordered Multicast.
Proceedings of the Active Networks, Second International Working Conference, 2000

Protocol Construction Using Genetic Search Techniques.
Proceedings of the Real-World Applications of Evolutionary Computing, 2000

1999
Examining Users' Repertoire of Internet Applications.
Proceedings of the Human-Computer Interaction INTERACT '99: IFIP TC13 International Conference on Human-Computer Interaction, 1999

Internetworking multimedia.
Taylor & Francis, ISBN: 978-0-748-40807-8, 1999

1998
Towards a Design Methodology for Adaptive Applications.
Proceedings of the MOBICOM '98, 1998

1995
Implementing Real Time Packet Forwarding Policies Using Streams.
Proceedings of the USENIX 1995 Technical Conference on UNIX and Advanced Computing Systems, 1995

The Conference Control Channel Protocol (CCCP): A Scalable Base for Building Conference Control Applications.
Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28, 1995

1994
A combined admission and congestion control scheme for variable bit rate video.
Distributed Syst. Eng., 1994

Scalable Feedback Control for Multicast Video Distribution in the Internet.
Proceedings of the ACM SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, London, UK, August 31, 1994

1993
Traffic analysis of trans-Atlantic traffic.
Comput. Commun., 1993

Packetized Video Options for Interaction between the User, the Network and the Codec.
Comput. J., 1993

1992
Is layering, harmful? [remote procedure call].
IEEE Netw., 1992

A simple TCP extension for high-speed paths.
Comput. Commun. Rev., 1992

Some Multimedia Traffic Characterization and Measurement Results.
Proceedings of the Computer Networks, 1992


  Loading...