Multipath transport and packet spraying for efficient data delivery in data centres. | 0 | 0.34 | 2019 |
Efficient Geocasting in Opportunistic Networks. | 0 | 0.34 | 2018 |
Relating Vertex and Global Graph Entropy in Randomly Generated Graphs. | 1 | 0.36 | 2018 |
Correction to "Vertex Entropy as a Critical Node Measure in Network Monitoring". | 0 | 0.34 | 2017 |
Vertex Entropy As a Critical Node Measure in Network Monitoring. | 3 | 0.68 | 2017 |
Efficient content delivery through fountain coding in opportunistic information-centric networks. | 3 | 0.40 | 2017 |
Is Preferential Attachment the 2nd Law of Thermodynamics in Disguise? | 0 | 0.34 | 2016 |
GSAF: Efficient and flexible geocasting for opportunistic networks | 2 | 0.37 | 2016 |
Mmptcp: A Multipath Transport Protocol For Data Centers | 6 | 0.44 | 2016 |
Towards an approximate graph entropy measure for identifying incidents in network event data. | 2 | 0.42 | 2016 |
Short vs. Long Flows: A Battle That Both Can Win | 1 | 0.35 | 2015 |
The state of peer-to-peer network simulators | 10 | 0.52 | 2013 |
The Fans United will Always be Connected: Building a Practical DTN in a Football Stadium. | 6 | 0.48 | 2013 |
A deniable and efficient question and answer service over ad hoc social networks | 2 | 0.36 | 2012 |
Finding Trusted Publish/Subscribe Trees. | 0 | 0.34 | 2012 |
MediateSpace: decentralised contextual mediation using tuple spaces | 0 | 0.34 | 2011 |
A framework for secure device pairing by demonstration of physical proximity | 0 | 0.34 | 2010 |
Chutney and relish: designing to augment the experience of shopping at a farmers' market | 8 | 0.83 | 2010 |
Can We Use Trust in Online Dating? | 4 | 0.50 | 2010 |
Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems | 1 | 0.37 | 2010 |
Are your friends who they say they are?: data mining online identities | 3 | 0.47 | 2009 |
Transformation of Online Representation through Time | 1 | 0.35 | 2009 |
The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications. | 1 | 0.42 | 2008 |
Composing software services in the pervasive computing environment: Languages or APIs? | 3 | 0.46 | 2008 |
Localising multicast using application predicates | 0 | 0.34 | 2007 |
Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership | 8 | 0.61 | 2007 |
The state of peer-to-peer simulators and simulations | 66 | 3.67 | 2007 |
Lessons for autonomic services from the design of an anonymous dos protection overlay | 0 | 0.34 | 2006 |
Middleware for User Controlled Environments | 1 | 0.51 | 2005 |
Managing the Policies of Non-Technical Users in a Dynamic World | 3 | 0.45 | 2005 |
Scooby: middleware for service composition in pervasive computing | 18 | 1.16 | 2004 |
Risky Business: Motivations for Markets in Programmable Networks | 1 | 0.36 | 2003 |
How Web Browsers Shape Users' Understanding Of Networks | 3 | 0.78 | 2002 |
Active networks and services | 0 | 0.34 | 2001 |
SafetyNet: a language-based approach to programmable networks | 8 | 0.80 | 2001 |
Beyond the interface: users' perceptions of interaction and audience on websites | 15 | 1.39 | 2001 |
ATOM - Active Totally Ordered Multicast | 0 | 0.34 | 2000 |
Towards a design methodology for adaptive applications | 17 | 4.21 | 1998 |
Implementing real time packet forwarding policies using streams | 20 | 15.08 | 1995 |
The conference control channel protocol (CCCP): a scalable base for building conference control applications | 21 | 3.05 | 1995 |
A combined admission and congestion control scheme for variable bit rate video | 4 | 7.80 | 1994 |
Scalable feedback control for multicast video distribution in the Internet | 150 | 38.92 | 1994 |
Traffic Analysis Of Trans-Atlantic Traffic | 4 | 34.18 | 1993 |
Some multimedia traffic characterisation and measurement results | 1 | 0.68 | 1992 |
A simple TCP extension for high-speed paths | 0 | 0.34 | 1992 |
Is layering, harmful? [remote procedure call] | 39 | 3.90 | 1992 |