Tristan Henderson

Orcid: 0000-0002-5028-9047

According to our database1, Tristan Henderson authored at least 59 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
1
1
1
1
1
1
2
1
4
2
1
1
1
5
1
1
1
1
1
1
1
1
1
1
2
2
3
2
4
2
2
3
1
2
1
2

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Participatory to what end? Mapping motivations for participatory approaches in data-driven projects.
Proceedings of the 2024 International Conference on Information Technology for Social Good, 2024

2023
Enhancing Citizen Participation Through Data Subject Right Delegation.
Proceedings of the Design for Equality and Justice - INTERACT 2023 IFIP TC 13 Workshops, York, UK, August 28, 2023

2021
Proof of Steak.
CoRR, 2021

Data Portability as a Tool for Audit.
Proceedings of the UbiComp/ISWC '21: 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2021 ACM International Symposium on Wearable Computers, 2021

2020
Co-Creating Autonomy: Group Data Protection and Individual Self-determination within a Data Commons.
Int. J. Digit. Curation, 2020

Short Paper: Integrating the Data Protection Impact Assessment into the Software Development Lifecycle.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
Automating dynamic consent decisions for the processing of social media data in health research.
CoRR, 2019

Teaching Data Ethics: We're going to ethics the heck out of this.
Proceedings of the 3rd Conference on Computing Education Practice, 2019

2018
Toward Reproducibility in Online Social Network Research.
IEEE Trans. Emerg. Top. Comput., 2018

How Portable is Portable?: Exercising the GDPR's Right to Data Portability.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

2017
Contextual Consent: Ethical Mining of Social Media for Health Research.
CoRR, 2017

Beyond the EULA: Improving consent for data mining.
CoRR, 2017

2016
A robust reputation-based location-privacy recommender system using opportunistic networks.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

The Effect of Privacy Concerns on Privacy Recommenders.
Proceedings of the 21st International Conference on Intelligent User Interfaces, 2016

2015
Data Citation Practices in the CRAWDAD Wireless Network Data Archive.
D Lib Mag., 2015

Some Challenges for Ethics in Social Network Research.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

"I Didn't Sign Up for This!": Informed Consent in Social Network Research.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

2014
PFClust: an optimised implementation of a parameter-free clustering algorithm.
Source Code Biol. Medicine, 2014

Human-Data Interaction: The Human Face of the Data-Driven Society.
CoRR, 2014

An Open and Reproducible Paper on Openness and Reproducibility of Papers in Computational Science.
CoRR, 2014

Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks.
Ad Hoc Networks, 2014

Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Privacy-aware location privacy preference recommendations.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

Friend or Flood? Social Prevention of Flooding Attacks in Mobile Opportunistic Networks.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

2013
An architecture for ethical and privacy-sensitive social network experiments.
SIGMETRICS Perform. Evaluation Rev., 2013

Editorial.
Int. J. Hum. Comput. Stud., 2013

Analysis of a Wi-Fi Hotspot Network.
Proceedings of the International Workshop on Wireless Traffic Measurements and Modeling, 2013

MobOCloud: extending cloud computing with mobile opportunistic networks.
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks, 2013

2012
Privacy-enhanced social-network routing.
Comput. Commun., 2012

Reliable Online Social Network Data Collection.
Proceedings of the Computational Social Networks, 2012

2011
Targeted Advertising on the Handset: Privacy and Security Challenges.
Proceedings of the Pervasive Advertising, 2011

The impact of location privacy on opportunistic networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Bootstrapping opportunistic networks using social roles.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Practical privacy-aware opportunistic networking.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

2010
The ambient Loo: caught short when nature calls?
Comput. Commun. Rev., 2010

Privacy-enhanced social network routing in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Planet-scale human mobility measurement.
Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement, 2010

2009
Planet-scale Human Mobility Measurement
CoRR, 2009

Less is more: energy-efficient mobile sensing with senseless.
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009

Scaling measurement experiments to planet-scale: ethical, regulatory and cultural considerations.
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements, 2009

2008
Map: a scalable monitoring system for dependable 802.11 wireless networks.
IEEE Wirel. Commun., 2008

The changing usage of a mature campus-wide wireless network.
Comput. Networks, 2008

CRAWDAD workshop 2007.
Comput. Commun. Rev., 2008

Sharingis caring: so where are your data?
Comput. Commun. Rev., 2008

Promoting tolerance for delay tolerant network research.
Comput. Commun. Rev., 2008

Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Social DTN routing.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

Revisiting inter-flow fairness.
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008

2007
Privacy in Location-Aware Computing Environments.
IEEE Pervasive Comput., 2007

Virtual Walls: Protecting Digital Privacy in Pervasive Environments.
Proceedings of the Pervasive Computing, 2007

2006
CRAWDAD: a community resource for archiving wireless data at Dartmouth.
Comput. Commun. Rev., 2006

2005
CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth.
IEEE Pervasive Comput., 2005

2003
What online gamers really think of the Internet?
Proceedings of the 2nd Workshop on Network and System Support for Games, 2003

Mobility and stability evaluation in wireless multi-hop networks using multi-player games.
Proceedings of the 2nd Workshop on Network and System Support for Games, 2003

2002
Observations on game server discovery mechanisms.
Proceedings of the 1st Workshop on Network and System Support for Games, 2002

2001
Congestion Pricing: Paying Your Way in Communication Networks.
IEEE Internet Comput., 2001

Latency and User Behaviour on a Multiplayer Game Server.
Proceedings of the Networked Group Communication, 2001

Modelling user behaviour in networked games.
Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30, 2001


  Loading...