|
Search the dblp DataBase
Stephen Hailes:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alexandr Seleznyov, Stephen Hailes
An Access Control Model Based on Distributed Knowledge Management. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:403-406 [Conf]
- Alfarez Abdul-Rahman, Stephen Hailes
Supporting Trust in Virtual Communities. [Citation Graph (0, 0)][DBLP] HICSS, 2000, pp:- [Conf]
- Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed, Stephen Hailes
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. [Citation Graph (0, 0)][DBLP] ICARIS, 2006, pp:390-403 [Conf]
- Alexandr Seleznyov, Stephen Hailes
Distributed Knowledge Management for Autonomous Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:433-437 [Conf]
- Daniele Quercia, Stephen Hailes, Licia Capra
B-Trust: Bayesian Trust Framework for Pervasive Computing. [Citation Graph (0, 0)][DBLP] iTrust, 2006, pp:298-312 [Conf]
- Daniele Quercia, Stephen Hailes, Licia Capra
TATA: Towards Anonymous Trusted Authentication. [Citation Graph (0, 0)][DBLP] iTrust, 2006, pp:313-323 [Conf]
- Theodore Pagtzis, Stephen Hailes, Peter T. Kirstein
The Case for Proactive Mobile IP. [Citation Graph (0, 0)][DBLP] LCN, 2003, pp:311-314 [Conf]
- Rae Harbird, Stephen Hailes, Cecilia Mascolo
Adaptive resource discovery for ubiquitous computing. [Citation Graph (0, 0)][DBLP] Middleware for Pervasive and Ad-hoc Computing, 2004, pp:155-160 [Conf]
- Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
Adapting asynchronous messaging middleware to ad hoc networking. [Citation Graph (0, 0)][DBLP] Middleware for Pervasive and Ad-hoc Computing, 2004, pp:121-126 [Conf]
- Mirco Musolesi, Stephen Hailes, Cecilia Mascolo
An ad hoc mobility model founded on social network theory. [Citation Graph (0, 0)][DBLP] MSWiM, 2004, pp:20-24 [Conf]
- Jon Crowcroft, Stephen Hailes, Mark Handley, Ajit K. Jena, David Lewis, Ian Wakeman
Some Multimedia Traffic Characterization and Measurement Results. [Citation Graph (0, 0)][DBLP] NETWORKS, 1992, pp:3-14 [Conf]
- Ivan Flechais, Martina Angela Sasse, Stephen Hailes
Bringing security home: a process for developing secure and usable systems. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:49-57 [Conf]
- Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, Saleem Bhatti
STRUDEL: supporting trust in the dynamic establishment of peering coalitions. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:1870-1874 [Conf]
- Socrates Varakliotis, Stephen Hailes, Jörn Ostermann
Optimally smooth error resilient streaming of 3D wireframe animations. [Citation Graph (0, 0)][DBLP] VCIP, 2003, pp:1009-1022 [Conf]
- Mohamed Ahmed, Daniele Quercia, Stephen Hailes
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations. [Citation Graph (0, 0)][DBLP] WOWMOM, 2005, pp:598-602 [Conf]
- Mirco Musolesi, Stephen Hailes, Cecilia Mascolo
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] WOWMOM, 2005, pp:183-189 [Conf]
- Theodore Pagtzis, Peter T. Kirstein, Stephen Hailes, Hossam Afifi
Proactive seamless mobility management for future IP radio access networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:17, pp:1975-1989 [Journal]
- Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
EMMA: Epidemic Messaging Middleware for Ad hoc networks. [Citation Graph (0, 0)][DBLP] Personal and Ubiquitous Computing, 2006, v:10, n:1, pp:28-36 [Journal]
Analysis of Packet Relaying Models and Incentive Strategies in Wireless Ad Hoc Networks with Game Theory. [Citation Graph (, )][DBLP]
Sensing for Stride Information of Sprinters. [Citation Graph (, )][DBLP]
MobiRate: making mobile raters stick to their word. [Citation Graph (, )][DBLP]
Lightweight Distributed Trust Propagation. [Citation Graph (, )][DBLP]
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. [Citation Graph (, )][DBLP]
MACE: adaptive component management middleware for ubiquitous systems. [Citation Graph (, )][DBLP]
Cooperative packet relaying model for wireless ad hoc networks. [Citation Graph (, )][DBLP]
TRULLO - local trust bootstrapping for ubiquitous devices. [Citation Graph (, )][DBLP]
Load Sharing and Bandwidth Control in Mobile P2P Wireless Sensor Networks. [Citation Graph (, )][DBLP]
The effect of correlation coefficients on communities of recommenders. [Citation Graph (, )][DBLP]
Distributed computation in wireless ad hoc grids with bandwidth control. [Citation Graph (, )][DBLP]
Temporal collaborative filtering with adaptive neighbourhoods. [Citation Graph (, )][DBLP]
Temporal diversity in recommender systems. [Citation Graph (, )][DBLP]
Analysis of Wireless Inertial Sensing for Athlete Coaching Support. [Citation Graph (, )][DBLP]
Private distributed collaborative filtering using estimated concordance measures. [Citation Graph (, )][DBLP]
kNN CF: a temporal social network. [Citation Graph (, )][DBLP]
A proposal for unifying mobility with multi-homing, NAT, & security. [Citation Graph (, )][DBLP]
On-body wireless inertial sensing foot control applications. [Citation Graph (, )][DBLP]
Coalition-Based Peering for Flexible Connectivity. [Citation Graph (, )][DBLP]
Knowledge Management for the Protection of Information in Electronic Medical Records. [Citation Graph (, )][DBLP]
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. [Citation Graph (, )][DBLP]
Search in 0.029secs, Finished in 0.030secs
|