Skip to main content

Research Repository

Advanced Search

All Outputs (34)

Wild interdisciplinarity: ethnography and computer science (2016)
Journal Article
Goulden, M., Greiffenhagen, C., Crowcroft, J., McAuley, D., Mortier, R., Radenkovic, M., & Sathiaseelan, A. (in press). Wild interdisciplinarity: ethnography and computer science. International Journal of Social Research Methodology, https://doi.org/10.1080/13645579.2016.1152022

Drawing on the experiences of a novel collaborative project between sociologists and computer scientists, this paper identifies a set of challenges for fieldwork that are generated by this wild interdisciplinarity. Public Access Wi-Fi Service was a p... Read More about Wild interdisciplinarity: ethnography and computer science.

Social delay tolerant approach for safety services in vehicular networks (2015)
Conference Proceeding
Nguyen-Minh, H., Benslimane, A., & Radenkovic, M. (2015). Social delay tolerant approach for safety services in vehicular networks. In 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). https://doi.org/10.1109/IWCMC.2015.7289253

Vehicular networks have attracted attention for recent years due to their various and emerging applications supporting secure and convenient driving. Regarding specific features of vehicular networks, we propose a new Social-aware Vehicular DTN proto... Read More about Social delay tolerant approach for safety services in vehicular networks.

Increasing communication reliability in manufacturing environments (2015)
Conference Proceeding
Radenkovic, M., Kostadinov, I., & Wietrzyk, B. (2015). Increasing communication reliability in manufacturing environments. In 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). https://doi.org/10.1109/IWCMC.2015.7289283

This paper is concerned with low cost mechanisms that can increase reliability of machine to machine and machine to cloud communications in increasingly complex manufacturing environments that are prone to disconnections and faults. We propose a nove... Read More about Increasing communication reliability in manufacturing environments.

A feasibility study of an in-the-wild experimental public access WiFi network (2014)
Conference Proceeding
Sathiaseelan, A., Mortier, R., Goulden, M., Greiffenhagen, C., Radenkovic, M., Crowcroft, J., & McAuley, D. (2014). A feasibility study of an in-the-wild experimental public access WiFi network. In Proceedings of the Fifth ACM Symposium on Computing for Development - ACM DEV-5 '14 (33-42). https://doi.org/10.1145/2674377.2674383

© 2014 ACM. Universal Internet access has become critical to modern life, leading to many explorations of approaches to increase its availability. In this paper we report on a study of one such approach, PAWS, that seeks to understand the technical a... Read More about A feasibility study of an in-the-wild experimental public access WiFi network.

Reputation aware obfuscation for mobile opportunistic networks (2013)
Journal Article
Radenkovic, M., Benslimane, A., & McAuley, D. (2015). Reputation aware obfuscation for mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(1), 230-240. https://doi.org/10.1109/TPDS.2013.265

© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large nu... Read More about Reputation aware obfuscation for mobile opportunistic networks.

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks (2013)
Journal Article
Zakhary, S., Radenkovic, M., & Benslimane, A. (2014). Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks. IEEE Transactions on Vehicular Technology, 63(2), 893-906. https://doi.org/10.1109/TVT.2013.2279671

This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportun... Read More about Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks.

Flexible and dynamic network coding for adaptive data transmission in DTNs (2012)
Conference Proceeding
Radenkovic, M., Zakhary, S., Radenkovic, M., & Zakhary, S. (2012). Flexible and dynamic network coding for adaptive data transmission in DTNs. In Wireless Communications and Mobile Computing Conference (IWCMC), 8th International (567--573). https://doi.org/10.1109/IWCMC.2012.6314266

Existing network coding approaches for Delay-Tolerant Networks (DTNs) do not detect and adapt to congestion in the network. In this paper we describe CafNC (Congestion aware forwarding with Network Coding) that combines adaptive network coding and a... Read More about Flexible and dynamic network coding for adaptive data transmission in DTNs.

Efficient and adaptive congestion control for heterogeneous delay-tolerant networks (2012)
Journal Article
Radenkovic, M., & Grundy, A. (2012). Efficient and adaptive congestion control for heterogeneous delay-tolerant networks. Ad Hoc Networks, 10(7), https://doi.org/10.1016/j.adhoc.2012.03.013

Detecting and dealing with congestion in delay-tolerant networks (DTNs) is an important and challenging problem. Current DTN forwarding algorithms typically direct traffic towards more central nodes in order to maximise delivery ratios and minimise d... Read More about Efficient and adaptive congestion control for heterogeneous delay-tolerant networks.

Congestion aware forwarding in delay tolerant and social opportunistic networks (2011)
Conference Proceeding
Radenkovic, M., & Grundy, A. (2011). Congestion aware forwarding in delay tolerant and social opportunistic networks. In 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services. https://doi.org/10.1109/WONS.2011.5720201

We propose an approach for opportunistic forwarding that supports optimization of multipoint high volume data flow transfer while maintaining high buffer availability and low delays. This paper explores a number of social, buffer and delay heuristics... Read More about Congestion aware forwarding in delay tolerant and social opportunistic networks.

Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments (2010)
Conference Proceeding
Radenkovic, M., Zakhary, S. R., & Radenkovic, M. (2010). Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments. In 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS) (161--167). https://doi.org/10.1109/WONS.2010.5437117

This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expirat... Read More about Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments.

Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments (2007)
Conference Proceeding
Wietrzyk, B., & Radenkovic, M. (2007). Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments. In 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services. https://doi.org/10.1109/WONS.2007.340493

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other sensors, combined with wireless netwo... Read More about Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments.

Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring (2006)
Conference Proceeding
Radenkovic, M., & Wietrzyk, B. (2006). Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring.

This paper investigates the use of wireless mobile ad hoc sensor networks in the nationwide cattle monitoring systems. This problem is essential for monitoring general animal health and detecting outbreaks of animal diseases that can... Read More about Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring.

The multimedia challenges raised by pervasive games (2005)
Conference Proceeding
Capra, M., Radenkovic, M., Benford, S., Oppermann, L., Drozd, A., & Flintham, M. (2005). The multimedia challenges raised by pervasive games. In Proceedings of the 13th annual ACM international conference on Multimedia - MULTIMEDIA '05. https://doi.org/10.1145/1101149.1101163

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other multimedia sensors, combined with wir... Read More about The multimedia challenges raised by pervasive games.