Items where Subject is "Networks"
- UCL Eprints (16733)
- UCL Departments and Research Centres (8604)
- UCL Engineering Sciences (894)
- Department of Computer Science (390)
- Networks (38)
- Department of Computer Science (390)
- UCL Engineering Sciences (894)
- UCL Departments and Research Centres (8604)
Number of items at this level: 38.
A
Anderson, R;
Brown, I;
Clayton, R;
Dowty, T;
Korff, D;
Munro, E;
(2006)
Children's Databases - Safety and Privacy.
[Book].
Information Commissioner's Office: Wilmslow.
![]() |
![]() |
B
Bittau, A.;
(2009)
Toward least-privilege isolation for software.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Briscoe, R.;
(2009)
Re-feedback: freedom with accountability for causing congestion in a connectionless internetwork.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Brown, I;
(2007)
Grady and Parisi: the law and economics of cybersecurity [Review article].
Law Quarterly Review
, 123
pp. 172-175.
![]() |
![]() |
Brown, I;
(2006)
The evolution of anti-circumvention law.
International Review of Law, Computers & Technology
, 20
(3)
pp. 239-260.
10.1080/13600860600852119.
![]() |
![]() |
Brown, I;
(2000)
Maintaining consumer confidence in electronic payment mechanisms.
UCL (University College London), Computer Science, Jesus College, University of Cambridge: Cambridge, UK.
![]() |
![]() |
Brown, I;
Davies, S;
Hosein, G;
(2000)
The Economic Impact of the Regulation of Investigatory Powers Bill.
British Chambers of Commerce: London.
![]() |
![]() |
Brown, I;
Korff, D;
(2004)
Privacy & law enforcement.
(UK Information Commissioner Study Project
, pp. pp. 172-175
).
UCL (University College London), Foundation for Information Policy Research: Wilmslow, UK.
![]() |
![]() |
Brown, I;
Perkins, C;
Crowcroft, J;
(1999)
Watercasting: distributed watermarking of multicast media.
In:
(Proceedings) NGC '99: First International COST264 Workshop on Networked Group Communication.
(pp. pp. 286-300).
Springer-Verlag: Berlin, Germany.
![]() |
![]() |
Brown, Ian;
(2001)
End-to-end security in active networks.
Doctoral thesis (Ph.D), University of London.
![]() |
![]() |
C
Cheng, L;
Galis, A;
(2006)
Security Protocol for Active Networks.
In:
(pp. pp. 1-6).
IEEE
![]() |
![]() |
Cheng, L;
Hailes, S;
(2008)
Managed Exercise Monitoring: a Novel Application of Wireless On-Body Inertial Sensing.
In:
(Proceedings) 5th International Summer School and Symposium on Medical Devices and Biosensors.
(pp. pp. 143-146).
IEEE
![]() |
![]() |
Cheng, L;
Hailes, S;
(2008)
On-Body Wireless Inertial Sensing Foot Control Applications.
In:
(Proceedings) 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
(pp. pp. 328-332).
IEEE
![]() |
![]() |
Cheng, L;
Hailes, S;
Cheng, Z;
Fan, FY;
Hang, D;
Yang, Y;
(2008)
Compressing Inertial Motion Data in Wireless Sensing Systems – An Initial Experiment.
In:
(pp. pp. 293-296).
IEEE Computer Society Press: US.
![]() |
![]() |
Cheng, L;
Jean, K;
Ocampo, R;
Galis, A;
(2006)
Towards Flexible Service-aware Adaptation Management in Ambient Networks.
In:
(pp. pp. 1-6).
IEEE
![]() |
![]() |
Cheng, L;
Ocampo, R;
Jean, K;
Galis, A;
Simon, C;
Szabo, R;
Kersch, P;
(2006)
Towards distributed hash tables (De)composition in ambient networks.
In: State, R and VanDerMeer, S and OSullivan, D and Pfeifer, T, (eds.)
UNSPECIFIED
(258 - 268).
SPRINGER-VERLAG BERLIN
![]() |
![]() |
Cheng, L.;
(2007)
Bridging distributed hash tables in wireless ad-hoc networks.
In:
2007 Global IEEE Telecommunications Conference (GLOBECOM '07).
(pp. pp. 5159-5163).
IEEE: Piscataway, NJ, USA.
![]() |
![]() |
Cheng, L.;
Hailes, S.;
Leung, D.;
Fan, F.;
Yang, Y.;
Cheng, Z.;
(2008)
An experimental study on a motion sensing system for sports training.
Presented at: 5th European Conference on Wireless Sensor Networks (EWSN) 2008, Bologna, Italy.
![]() |
![]() |
Choi, S.-H.;
(2006)
Design and analysis for TCP-friendly window-based congestion control.
Doctoral thesis , University of London.
![]() |
![]() |
E
Eaves, W;
Cheng, L;
Galis, A;
Becker, T;
Suzuki, T;
Denazis, S;
Kitahara, C;
(2002)
SNAP based resource control for active networks.
In:
(pp. pp. 2098-2102).
![]() |
![]() |
G
Gevros, P.;
Crowcroft, J.;
Kirstein, P.;
Bhatti, S.;
(2001)
Congestion control mechanisms and the best effort service model.
IEEE Network
, 15
(3)
pp. 16-26.
10.1109/65.923937.
![]() |
![]() |
Gryce, C;
Piccinelli, G;
Zirpins, C;
(2003)
An architectural model for electronic services.
In:
Proceedings of IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2003), June 9-11, 2003, University of Linz, Linz, Austria.
(pp. 113-114).
IEEE Computer Society
![]() |
![]() |
H
Harbird, R;
Finkelstein, A;
Hailes, S;
McKinney, E;
Jeyarajah-Dent, R;
(2008)
PRAIS - PRivacy impact Analysis for Information Sharing.
In:
(Proceedings) PRAIS - PRivacy impact Analysis for Information Sharing, Healthcare Computing Conference (HC2008).
BCS: Harrogate, UK.
![]() |
![]() |
Hatzikonstantinou, A.C.;
(2009)
A unified architecture for adaption of mobile system behaviour: implementation of the vertical handoff paradigm.
Doctoral thesis , UCL (University College London).
|
Huici, F.;
(2010)
Deployable filtering architectures against large denial-of-service attacks.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
L
Lathia, N.;
Hailes, S.;
Capra, L.;
(2008)
Trust based collaborative filtering.
In: Karabulut, Y. and Mitchell, J.C. and Herrmann, P. and Jensen, C.D., (eds.)
Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway.
Springer Verlag: New York, USA.
![]() |
![]() |
M
Mathieu, B;
Song, M;
Galis, A;
Cheng, L;
Jean, K;
Ocampo, R;
(2007)
Self-management of context-aware overlay ambient networks.
In:
2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2.
(pp. 749 - 752).
IEEE
![]() |
![]() |
McGuffin, L.J.;
Smith, R.T.;
Bryson, K.;
Sørensen, S.-A.;
Jones, D.T.;
(2006)
High throughput profile-profile based fold recognition for the entire human proteome.
BMC Bioinformatics
, 7
(1)
p. 288.
10.1186/1471-2105-7-288.
![]() |
![]() |
N
Newsome, J;
Karp, B;
Song, D;
(2005)
Polygraph: Automatically generating signatures for polymorphic worms.
In:
(pp. pp. 226-241).
![]() |
![]() |
P
Pagtzis, T;
Kirstein, P;
Hailes, S;
(2001)
Operational and fairness issues with connection-less traffic over IEEE802.11b.
In:
(Proceedings) IEEE International Conference on Communications.
(pp. pp. 1905-1913).
IEEE
![]() |
![]() |
Q
Quercia, D.;
(2009)
Trust models for mobile content-sharing applications.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Quercia, D.;
Hailes, S.;
Capra, L.;
(2006)
B-Trust: Bayesian trust framework for pervasive computing.
In:
Trust Management: Proceedings of the 4th International Conference, iTrust 2006.
(pp. pp. 298-312).
Springer Verlag: Berlin / Heidelberg, Germany.
![]() |
![]() |
Quercia, D.;
Hailes, S.M.;
(2010)
Sybil attacks against mobile users: friends and foes to the rescue.
Presented at: The 29th Conference on Computer Communications (IEEE INFOCOM 2010), San Diego, US.
![]() |
![]() |
R
Ratnasamy, S;
Handley, M;
Karp, R;
Shenker, S;
(2002)
Topologically-aware overlay construction and server selection.
In:
(pp. pp. 1190-1199).
![]() |
![]() |
S
Shah, D;
Wischik, D;
(2006)
Optimal scheduling algorithms for input-queued switches.
In:
(pp. pp. 1-11).
IEEE Computer Society: Los Alamitos, US.
![]() |
![]() |
W
Wischik, D.J.;
(2001)
Sample path large deviations for queues with many inputs.
The Annals of Applied Probability
, 11
(2)
p. 379.
10.1214/aoap/1015345296.
![]() |
![]() |
Z
Zhou, S;
(2007)
Rich-club phenomenon of the Internet topology.
In:
Encyclopedia of Internet Technologies and Applications.
(pp. 469-472).
![]() |
![]() |
Zhou, S;
Mondragon, RJ;
(2007)
Structural constraints in complex networks.
NEW J PHYS
, 9
, Article 173. 10.1088/1367-2630/9/6/173.
![]() |
![]() |