The SCEAS System
Navigation Menu

Search the dblp DataBase


Stephen Hailes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alexandr Seleznyov, Stephen Hailes
    An Access Control Model Based on Distributed Knowledge Management. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:403-406 [Conf]
  2. Alfarez Abdul-Rahman, Stephen Hailes
    Supporting Trust in Virtual Communities. [Citation Graph (0, 0)][DBLP]
    HICSS, 2000, pp:- [Conf]
  3. Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed, Stephen Hailes
    Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:390-403 [Conf]
  4. Alexandr Seleznyov, Stephen Hailes
    Distributed Knowledge Management for Autonomous Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:433-437 [Conf]
  5. Daniele Quercia, Stephen Hailes, Licia Capra
    B-Trust: Bayesian Trust Framework for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:298-312 [Conf]
  6. Daniele Quercia, Stephen Hailes, Licia Capra
    TATA: Towards Anonymous Trusted Authentication. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:313-323 [Conf]
  7. Theodore Pagtzis, Stephen Hailes, Peter T. Kirstein
    The Case for Proactive Mobile IP. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:311-314 [Conf]
  8. Rae Harbird, Stephen Hailes, Cecilia Mascolo
    Adaptive resource discovery for ubiquitous computing. [Citation Graph (0, 0)][DBLP]
    Middleware for Pervasive and Ad-hoc Computing, 2004, pp:155-160 [Conf]
  9. Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
    Adapting asynchronous messaging middleware to ad hoc networking. [Citation Graph (0, 0)][DBLP]
    Middleware for Pervasive and Ad-hoc Computing, 2004, pp:121-126 [Conf]
  10. Mirco Musolesi, Stephen Hailes, Cecilia Mascolo
    An ad hoc mobility model founded on social network theory. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2004, pp:20-24 [Conf]
  11. Jon Crowcroft, Stephen Hailes, Mark Handley, Ajit K. Jena, David Lewis, Ian Wakeman
    Some Multimedia Traffic Characterization and Measurement Results. [Citation Graph (0, 0)][DBLP]
    NETWORKS, 1992, pp:3-14 [Conf]
  12. Ivan Flechais, Martina Angela Sasse, Stephen Hailes
    Bringing security home: a process for developing secure and usable systems. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:49-57 [Conf]
  13. Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, Saleem Bhatti
    STRUDEL: supporting trust in the dynamic establishment of peering coalitions. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1870-1874 [Conf]
  14. Socrates Varakliotis, Stephen Hailes, Jörn Ostermann
    Optimally smooth error resilient streaming of 3D wireframe animations. [Citation Graph (0, 0)][DBLP]
    VCIP, 2003, pp:1009-1022 [Conf]
  15. Mohamed Ahmed, Daniele Quercia, Stephen Hailes
    A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:598-602 [Conf]
  16. Mirco Musolesi, Stephen Hailes, Cecilia Mascolo
    Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:183-189 [Conf]
  17. Theodore Pagtzis, Peter T. Kirstein, Stephen Hailes, Hossam Afifi
    Proactive seamless mobility management for future IP radio access networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:17, pp:1975-1989 [Journal]
  18. Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
    EMMA: Epidemic Messaging Middleware for Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 2006, v:10, n:1, pp:28-36 [Journal]

  19. Analysis of Packet Relaying Models and Incentive Strategies in Wireless Ad Hoc Networks with Game Theory. [Citation Graph (, )][DBLP]

  20. Sensing for Stride Information of Sprinters. [Citation Graph (, )][DBLP]

  21. MobiRate: making mobile raters stick to their word. [Citation Graph (, )][DBLP]

  22. Lightweight Distributed Trust Propagation. [Citation Graph (, )][DBLP]

  23. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. [Citation Graph (, )][DBLP]

  24. MACE: adaptive component management middleware for ubiquitous systems. [Citation Graph (, )][DBLP]

  25. Cooperative packet relaying model for wireless ad hoc networks. [Citation Graph (, )][DBLP]

  26. TRULLO - local trust bootstrapping for ubiquitous devices. [Citation Graph (, )][DBLP]

  27. Load Sharing and Bandwidth Control in Mobile P2P Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  28. The effect of correlation coefficients on communities of recommenders. [Citation Graph (, )][DBLP]

  29. Distributed computation in wireless ad hoc grids with bandwidth control. [Citation Graph (, )][DBLP]

  30. Temporal collaborative filtering with adaptive neighbourhoods. [Citation Graph (, )][DBLP]

  31. Temporal diversity in recommender systems. [Citation Graph (, )][DBLP]

  32. Analysis of Wireless Inertial Sensing for Athlete Coaching Support. [Citation Graph (, )][DBLP]

  33. Private distributed collaborative filtering using estimated concordance measures. [Citation Graph (, )][DBLP]

  34. kNN CF: a temporal social network. [Citation Graph (, )][DBLP]

  35. A proposal for unifying mobility with multi-homing, NAT, & security. [Citation Graph (, )][DBLP]

  36. On-body wireless inertial sensing foot control applications. [Citation Graph (, )][DBLP]

  37. Coalition-Based Peering for Flexible Connectivity. [Citation Graph (, )][DBLP]

  38. Knowledge Management for the Protection of Information in Electronic Medical Records. [Citation Graph (, )][DBLP]

  39. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. [Citation Graph (, )][DBLP]

Search in 0.029secs, Finished in 0.030secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002