Skip to main content

Research Repository

Advanced Search

Outputs (37)

Low-cost mobile personal clouds (2016)
Presentation / Conference Contribution
Radenkovic, M., & Huynh, V. S. H. Low-cost mobile personal clouds. Presented at International Wireless Communications & Mobile Computing Conference (IWCMC 2016)

We propose a mobile peer to peer personal cloud architecture which allows users to capture, store, analyse, interact with and share different types of personal and context data with no privacy leakage. Our mobile personal cloud can host multiple diff... Read More about Low-cost mobile personal clouds.

Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems (2016)
Journal Article
Radenkovic, M., Crowcroft, J., & Rehmani, M. H. (2016). Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems. IEEE Access, 4, 5309-5321. https://doi.org/10.1109/ACCESS.2016.2606501

Fast emerging mobile edge computing, mobile clouds, Internet of Things (IoT) and cyber physical systems require many novel realistic real time multi-layer algorithms for a wide range of domains, such as intelligent content provision and processing, s... Read More about Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems.

Cognitive privacy for personal clouds (2016)
Journal Article
Radenkovic, M. (2016). Cognitive privacy for personal clouds. Mobile Information Systems, 2016, 1-17. https://doi.org/10.1155/2016/7107103

This paper proposes a novel Cognitive Privacy (CogPriv) framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network node... Read More about Cognitive privacy for personal clouds.

Wild interdisciplinarity: ethnography and computer science (2016)
Journal Article
Goulden, M., Greiffenhagen, C., Crowcroft, J., McAuley, D., Mortier, R., Radenkovic, M., & Sathiaseelan, A. (in press). Wild interdisciplinarity: ethnography and computer science. International Journal of Social Research Methodology, https://doi.org/10.1080/13645579.2016.1152022

Drawing on the experiences of a novel collaborative project between sociologists and computer scientists, this paper identifies a set of challenges for fieldwork that are generated by this wild interdisciplinarity. Public Access Wi-Fi Service was a p... Read More about Wild interdisciplinarity: ethnography and computer science.

Social delay tolerant approach for safety services in vehicular networks (2015)
Presentation / Conference Contribution
Nguyen-Minh, H., Benslimane, A., & Radenkovic, M. Social delay tolerant approach for safety services in vehicular networks. Presented at 2015 International Wireless Communications and Mobile Computing Conference (IWCMC)

Vehicular networks have attracted attention for recent years due to their various and emerging applications supporting secure and convenient driving. Regarding specific features of vehicular networks, we propose a new Social-aware Vehicular DTN proto... Read More about Social delay tolerant approach for safety services in vehicular networks.

Increasing communication reliability in manufacturing environments (2015)
Presentation / Conference Contribution
Radenkovic, M., Kostadinov, I., & Wietrzyk, B. Increasing communication reliability in manufacturing environments. Presented at 2015 International Wireless Communications and Mobile Computing Conference (IWCMC)

This paper is concerned with low cost mechanisms that can increase reliability of machine to machine and machine to cloud communications in increasingly complex manufacturing environments that are prone to disconnections and faults. We propose a nove... Read More about Increasing communication reliability in manufacturing environments.

A feasibility study of an in-the-wild experimental public access WiFi network (2014)
Presentation / Conference Contribution
Sathiaseelan, A., Mortier, R., Goulden, M., Greiffenhagen, C., Radenkovic, M., Crowcroft, J., & McAuley, D. (2014, December). A feasibility study of an in-the-wild experimental public access WiFi network. Presented at ACM DEV 2014 - Proceedings of the 2014 Annual Symposium on Computing for Development, San Jose, California, USA

© 2014 ACM. Universal Internet access has become critical to modern life, leading to many explorations of approaches to increase its availability. In this paper we report on a study of one such approach, PAWS, that seeks to understand the technical a... Read More about A feasibility study of an in-the-wild experimental public access WiFi network.

Reputation aware obfuscation for mobile opportunistic networks (2013)
Journal Article
Radenkovic, M., Benslimane, A., & McAuley, D. (2015). Reputation aware obfuscation for mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(1), 230-240. https://doi.org/10.1109/TPDS.2013.265

© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large nu... Read More about Reputation aware obfuscation for mobile opportunistic networks.

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks (2013)
Journal Article
Zakhary, S., Radenkovic, M., & Benslimane, A. (2014). Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks. IEEE Transactions on Vehicular Technology, 63(2), 893-906. https://doi.org/10.1109/TVT.2013.2279671

This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportun... Read More about Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks.