Skip to main content

Research Repository

Advanced Search

All Outputs (35)

Low-cost mobile personal clouds (2016)
Presentation / Conference Contribution
Radenkovic, M., & Huynh, V. S. H. (2016). Low-cost mobile personal clouds. . https://doi.org/10.1109/IWCMC.2016.7577166

We propose a mobile peer to peer personal cloud architecture which allows users to capture, store, analyse, interact with and share different types of personal and context data with no privacy leakage. Our mobile personal cloud can host multiple diff... Read More about Low-cost mobile personal clouds.

Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems (2016)
Journal Article
Radenkovic, M., Crowcroft, J., & Rehmani, M. H. (2016). Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems. IEEE Access, 4, 5309-5321. https://doi.org/10.1109/ACCESS.2016.2606501

Fast emerging mobile edge computing, mobile clouds, Internet of Things (IoT) and cyber physical systems require many novel realistic real time multi-layer algorithms for a wide range of domains, such as intelligent content provision and processing, s... Read More about Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems.

Cognitive privacy for personal clouds (2016)
Journal Article
Radenkovic, M. (2016). Cognitive privacy for personal clouds. Mobile Information Systems, 2016, 1-17. https://doi.org/10.1155/2016/7107103

This paper proposes a novel Cognitive Privacy (CogPriv) framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network node... Read More about Cognitive privacy for personal clouds.

Increasing communication reliability in manufacturing environments (2015)
Presentation / Conference Contribution
Radenkovic, M., Kostadinov, I., & Wietrzyk, B. (2015). Increasing communication reliability in manufacturing environments. In 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). https://doi.org/10.1109/IWCMC.2015.7289283

This paper is concerned with low cost mechanisms that can increase reliability of machine to machine and machine to cloud communications in increasingly complex manufacturing environments that are prone to disconnections and faults. We propose a nove... Read More about Increasing communication reliability in manufacturing environments.

Social delay tolerant approach for safety services in vehicular networks (2015)
Presentation / Conference Contribution
Nguyen-Minh, H., Benslimane, A., & Radenkovic, M. (2015). Social delay tolerant approach for safety services in vehicular networks. In 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). https://doi.org/10.1109/IWCMC.2015.7289253

Vehicular networks have attracted attention for recent years due to their various and emerging applications supporting secure and convenient driving. Regarding specific features of vehicular networks, we propose a new Social-aware Vehicular DTN proto... Read More about Social delay tolerant approach for safety services in vehicular networks.

A feasibility study of an in-the-wild experimental public access WiFi network (2014)
Presentation / Conference Contribution
Sathiaseelan, A., Mortier, R., Goulden, M., Greiffenhagen, C., Radenkovic, M., Crowcroft, J., & McAuley, D. (2014). A feasibility study of an in-the-wild experimental public access WiFi network. In Proceedings of the Fifth ACM Symposium on Computing for Development - ACM DEV-5 '14 (33-42). https://doi.org/10.1145/2674377.2674383

© 2014 ACM. Universal Internet access has become critical to modern life, leading to many explorations of approaches to increase its availability. In this paper we report on a study of one such approach, PAWS, that seeks to understand the technical a... Read More about A feasibility study of an in-the-wild experimental public access WiFi network.

Reputation aware obfuscation for mobile opportunistic networks (2013)
Journal Article
Radenkovic, M., Benslimane, A., & McAuley, D. (2015). Reputation aware obfuscation for mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(1), 230-240. https://doi.org/10.1109/TPDS.2013.265

© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large nu... Read More about Reputation aware obfuscation for mobile opportunistic networks.

Flexible and dynamic network coding for adaptive data transmission in DTNs (2012)
Presentation / Conference Contribution
Radenkovic, M., Zakhary, S., Radenkovic, M., & Zakhary, S. (2012). Flexible and dynamic network coding for adaptive data transmission in DTNs. In Wireless Communications and Mobile Computing Conference (IWCMC), 8th International (567--573). https://doi.org/10.1109/IWCMC.2012.6314266

Existing network coding approaches for Delay-Tolerant Networks (DTNs) do not detect and adapt to congestion in the network. In this paper we describe CafNC (Congestion aware forwarding with Network Coding) that combines adaptive network coding and a... Read More about Flexible and dynamic network coding for adaptive data transmission in DTNs.

Efficient and adaptive congestion control for heterogeneous delay-tolerant networks (2012)
Journal Article
Radenkovic, M., & Grundy, A. (2012). Efficient and adaptive congestion control for heterogeneous delay-tolerant networks. Ad Hoc Networks, 10(7), https://doi.org/10.1016/j.adhoc.2012.03.013

Detecting and dealing with congestion in delay-tolerant networks (DTNs) is an important and challenging problem. Current DTN forwarding algorithms typically direct traffic towards more central nodes in order to maximise delivery ratios and minimise d... Read More about Efficient and adaptive congestion control for heterogeneous delay-tolerant networks.

Congestion aware forwarding in delay tolerant and social opportunistic networks (2011)
Presentation / Conference Contribution
Radenkovic, M., & Grundy, A. (2011). Congestion aware forwarding in delay tolerant and social opportunistic networks. In 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services. https://doi.org/10.1109/WONS.2011.5720201

We propose an approach for opportunistic forwarding that supports optimization of multipoint high volume data flow transfer while maintaining high buffer availability and low delays. This paper explores a number of social, buffer and delay heuristics... Read More about Congestion aware forwarding in delay tolerant and social opportunistic networks.

Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments (2010)
Presentation / Conference Contribution
Radenkovic, M., Zakhary, S. R., & Radenkovic, M. (2010). Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments. In 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS) (161--167). https://doi.org/10.1109/WONS.2010.5437117

This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expirat... Read More about Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments.

Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments (2007)
Presentation / Conference Contribution
Wietrzyk, B., & Radenkovic, M. Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments. Presented at 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other sensors, combined with wireless netwo... Read More about Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments.

Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring (2006)
Presentation / Conference Contribution
Radenkovic, M., & Wietrzyk, B. Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring. Presented at 6th International Workshop on Applications and Services in Wireless Networks (ASWN '06)

This paper investigates the use of wireless mobile ad hoc sensor networks in the nationwide cattle monitoring systems. This problem is essential for monitoring general animal health and detecting outbreaks of animal diseases that can... Read More about Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring.

The multimedia challenges raised by pervasive games (2005)
Presentation / Conference Contribution
Capra, M., Radenkovic, M., Benford, S., Oppermann, L., Drozd, A., & Flintham, M. The multimedia challenges raised by pervasive games. Presented at 13th Annual ACM International Conference on Multimedia (MULTIMEDIA '05)

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other multimedia sensors, combined with wir... Read More about The multimedia challenges raised by pervasive games.