Name
Papers
Collaborators
IAN WAKEMAN
46
70
Citations 
PageRank 
Referers 
436
129.40
1042
Referees 
References 
1375
546
Search Limit
1001000
Title
Citations
PageRank
Year
Multipath transport and packet spraying for efficient data delivery in data centres.00.342019
Efficient Geocasting in Opportunistic Networks.00.342018
Relating Vertex and Global Graph Entropy in Randomly Generated Graphs.10.362018
Correction to "Vertex Entropy as a Critical Node Measure in Network Monitoring".00.342017
Vertex Entropy As a Critical Node Measure in Network Monitoring.30.682017
Efficient content delivery through fountain coding in opportunistic information-centric networks.30.402017
Is Preferential Attachment the 2nd Law of Thermodynamics in Disguise?00.342016
GSAF: Efficient and flexible geocasting for opportunistic networks20.372016
Mmptcp: A Multipath Transport Protocol For Data Centers60.442016
Towards an approximate graph entropy measure for identifying incidents in network event data.20.422016
Short vs. Long Flows: A Battle That Both Can Win10.352015
The state of peer-to-peer network simulators100.522013
The Fans United will Always be Connected: Building a Practical DTN in a Football Stadium.60.482013
A deniable and efficient question and answer service over ad hoc social networks20.362012
Finding Trusted Publish/Subscribe Trees.00.342012
MediateSpace: decentralised contextual mediation using tuple spaces00.342011
A framework for secure device pairing by demonstration of physical proximity00.342010
Chutney and relish: designing to augment the experience of shopping at a farmers' market80.832010
Can We Use Trust in Online Dating?40.502010
Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems10.372010
Are your friends who they say they are?: data mining online identities30.472009
Transformation of Online Representation through Time10.352009
The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.10.422008
Composing software services in the pervasive computing environment: Languages or APIs?30.462008
Localising multicast using application predicates00.342007
Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership80.612007
The state of peer-to-peer simulators and simulations663.672007
Lessons for autonomic services from the design of an anonymous dos protection overlay00.342006
Middleware for User Controlled Environments10.512005
Managing the Policies of Non-Technical Users in a Dynamic World30.452005
Scooby: middleware for service composition in pervasive computing181.162004
Risky Business: Motivations for Markets in Programmable Networks10.362003
How Web Browsers Shape Users' Understanding Of Networks30.782002
Active networks and services00.342001
SafetyNet: a language-based approach to programmable networks80.802001
Beyond the interface: users' perceptions of interaction and audience on websites151.392001
ATOM - Active Totally Ordered Multicast00.342000
Towards a design methodology for adaptive applications174.211998
Implementing real time packet forwarding policies using streams2015.081995
The conference control channel protocol (CCCP): a scalable base for building conference control applications213.051995
A combined admission and congestion control scheme for variable bit rate video47.801994
Scalable feedback control for multicast video distribution in the Internet15038.921994
Traffic Analysis Of Trans-Atlantic Traffic434.181993
Some multimedia traffic characterisation and measurement results10.681992
A simple TCP extension for high-speed paths00.341992
Is layering, harmful? [remote procedure call]393.901992