Search the dblp DataBase
Ian Wakeman :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Nicholas Sharples , Ian Wakeman Protocol Construction Using Genetic Search Techniques. [Citation Graph (0, 0)][DBLP ] EvoWorkshops, 2000, pp:235-246 [Conf ] David Ellis , Ian Wakeman Lessons for Autonomic Services from the Design of an Anonymous DoS Protection Overlay. [Citation Graph (0, 0)][DBLP ] Autonomic Networking, 2006, pp:86-96 [Conf ] Rory Graves , Ian Wakeman ATOM - Active Totally Ordered Multicast. [Citation Graph (0, 0)][DBLP ] IWAN, 2000, pp:171-179 [Conf ] Ian Wakeman , David Ellis , Tim Owen , Julian Rathke , Des Watson Risky Business: Motivations for Markets in Programmable Networks. [Citation Graph (0, 0)][DBLP ] IWAN, 2003, pp:266-279 [Conf ] Jon Robinson , Ian Wakeman , Tim Owen Scooby: middleware for service composition in pervasive computing. [Citation Graph (0, 0)][DBLP ] Middleware for Pervasive and Ad-hoc Computing, 2004, pp:161-166 [Conf ] Malcolm McIlhagga , Ann Light , Ian Wakeman Towards a Design Methodology for Adaptive Applications. [Citation Graph (0, 0)][DBLP ] MOBICOM, 1998, pp:133-144 [Conf ] Jon Crowcroft , Stephen Hailes , Mark Handley , Ajit K. Jena , David Lewis , Ian Wakeman Some Multimedia Traffic Characterization and Measurement Results. [Citation Graph (0, 0)][DBLP ] NETWORKS, 1992, pp:3-14 [Conf ] Bill Keller , Tim Owen , Ian Wakeman , Julie Weeds , David J. Weir Middleware for User Controlled Environments. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2005, pp:183-188 [Conf ] Tim Owen , Ian Wakeman , Bill Keller , Julie Weeds , David J. Weir Managing the Policies of Non-Technical Users in a Dynamic World. [Citation Graph (0, 0)][DBLP ] POLICY, 2005, pp:251-254 [Conf ] Jean-Chrysostome Bolot , Thierry Turletti , Ian Wakeman Scalable Feedback Control for Multicast Video Distribution in the Internet. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1994, pp:58-67 [Conf ] Mark Handley , Ian Wakeman , Jon Crowcroft The Conference Control Channel Protocol (CCCP): A Scalable Base for Building Conference Control Applications. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1995, pp:275-287 [Conf ] Ian Wakeman , Atanu Ghosh , Jon Crowcroft , Van Jacobson , Sally Floyd Implementing Real Time Packet Forwarding Policies Using Streams. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1995, pp:71-82 [Conf ] S. Naicken , B. Livingston , A. Basu , S. Rodhetbhai , I. Wakeman , D. Chalmers The state of peer-to-peer simulators and simulations. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2007, v:37, n:2, pp:95-98 [Journal ] Ian Wakeman Packetized Video Options for Interaction between the User, the Network and the Codec. [Citation Graph (0, 0)][DBLP ] Comput. J., 1993, v:36, n:1, pp:55-67 [Journal ] Jon Crowcroft , Michael Fry , David Hutchison , Ian Marshall , Morris Sloman , Ian Wakeman Active networks and services. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:1, pp:1-3 [Journal ] Ian Wakeman , Alan Jeffrey , Tim Owen , Damyan Pepper SafetyNet: A language-based approach to programmable networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:1, pp:101-114 [Journal ] Ian Wakeman , David Lewis , Jon Crowcroft Traffic analysis of trans-Atlantic traffic. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1993, v:16, n:6, pp:376-388 [Journal ] Ian Wakeman , Jon Crowcroft A combined admission and congestion control scheme for variable bit rate video. [Citation Graph (0, 0)][DBLP ] Distributed Systems Engineering, 1994, v:1, n:4, pp:242-0 [Journal ] Ann Light , Ian Wakeman Beyond the interface: users' perceptions of interaction and audience on websites. [Citation Graph (0, 0)][DBLP ] Interacting with Computers, 2001, v:13, n:3, pp:325-351 [Journal ] Adnan Al-bar , Ian Wakeman A Survey of Adaptive Applications in Mobile Computing. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2001, pp:246-0 [Conf ] Ian Wakeman , Stephen Cogdon , Laurent Mathy , Michael Fry Localising Multicast Using Application Predicates. [Citation Graph (0, 0)][DBLP ] IWSOS, 2007, pp:193-207 [Conf ] Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership. [Citation Graph (, )][DBLP ] Transformation of Online Representation through Time. [Citation Graph (, )][DBLP ] Are your friends who they say they are?: data mining online identities. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs