The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ian Wakeman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nicholas Sharples, Ian Wakeman
    Protocol Construction Using Genetic Search Techniques. [Citation Graph (0, 0)][DBLP]
    EvoWorkshops, 2000, pp:235-246 [Conf]
  2. David Ellis, Ian Wakeman
    Lessons for Autonomic Services from the Design of an Anonymous DoS Protection Overlay. [Citation Graph (0, 0)][DBLP]
    Autonomic Networking, 2006, pp:86-96 [Conf]
  3. Rory Graves, Ian Wakeman
    ATOM - Active Totally Ordered Multicast. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:171-179 [Conf]
  4. Ian Wakeman, David Ellis, Tim Owen, Julian Rathke, Des Watson
    Risky Business: Motivations for Markets in Programmable Networks. [Citation Graph (0, 0)][DBLP]
    IWAN, 2003, pp:266-279 [Conf]
  5. Jon Robinson, Ian Wakeman, Tim Owen
    Scooby: middleware for service composition in pervasive computing. [Citation Graph (0, 0)][DBLP]
    Middleware for Pervasive and Ad-hoc Computing, 2004, pp:161-166 [Conf]
  6. Malcolm McIlhagga, Ann Light, Ian Wakeman
    Towards a Design Methodology for Adaptive Applications. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1998, pp:133-144 [Conf]
  7. Jon Crowcroft, Stephen Hailes, Mark Handley, Ajit K. Jena, David Lewis, Ian Wakeman
    Some Multimedia Traffic Characterization and Measurement Results. [Citation Graph (0, 0)][DBLP]
    NETWORKS, 1992, pp:3-14 [Conf]
  8. Bill Keller, Tim Owen, Ian Wakeman, Julie Weeds, David J. Weir
    Middleware for User Controlled Environments. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:183-188 [Conf]
  9. Tim Owen, Ian Wakeman, Bill Keller, Julie Weeds, David J. Weir
    Managing the Policies of Non-Technical Users in a Dynamic World. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:251-254 [Conf]
  10. Jean-Chrysostome Bolot, Thierry Turletti, Ian Wakeman
    Scalable Feedback Control for Multicast Video Distribution in the Internet. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1994, pp:58-67 [Conf]
  11. Mark Handley, Ian Wakeman, Jon Crowcroft
    The Conference Control Channel Protocol (CCCP): A Scalable Base for Building Conference Control Applications. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1995, pp:275-287 [Conf]
  12. Ian Wakeman, Atanu Ghosh, Jon Crowcroft, Van Jacobson, Sally Floyd
    Implementing Real Time Packet Forwarding Policies Using Streams. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1995, pp:71-82 [Conf]
  13. S. Naicken, B. Livingston, A. Basu, S. Rodhetbhai, I. Wakeman, D. Chalmers
    The state of peer-to-peer simulators and simulations. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:2, pp:95-98 [Journal]
  14. Ian Wakeman
    Packetized Video Options for Interaction between the User, the Network and the Codec. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1993, v:36, n:1, pp:55-67 [Journal]
  15. Jon Crowcroft, Michael Fry, David Hutchison, Ian Marshall, Morris Sloman, Ian Wakeman
    Active networks and services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:36, n:1, pp:1-3 [Journal]
  16. Ian Wakeman, Alan Jeffrey, Tim Owen, Damyan Pepper
    SafetyNet: A language-based approach to programmable networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:36, n:1, pp:101-114 [Journal]
  17. Ian Wakeman, David Lewis, Jon Crowcroft
    Traffic analysis of trans-Atlantic traffic. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:6, pp:376-388 [Journal]
  18. Ian Wakeman, Jon Crowcroft
    A combined admission and congestion control scheme for variable bit rate video. [Citation Graph (0, 0)][DBLP]
    Distributed Systems Engineering, 1994, v:1, n:4, pp:242-0 [Journal]
  19. Ann Light, Ian Wakeman
    Beyond the interface: users' perceptions of interaction and audience on websites. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 2001, v:13, n:3, pp:325-351 [Journal]
  20. Adnan Al-bar, Ian Wakeman
    A Survey of Adaptive Applications in Mobile Computing. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2001, pp:246-0 [Conf]
  21. Ian Wakeman, Stephen Cogdon, Laurent Mathy, Michael Fry
    Localising Multicast Using Application Predicates. [Citation Graph (0, 0)][DBLP]
    IWSOS, 2007, pp:193-207 [Conf]

  22. Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership. [Citation Graph (, )][DBLP]


  23. Transformation of Online Representation through Time. [Citation Graph (, )][DBLP]


  24. Are your friends who they say they are?: data mining online identities. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002