Foundations of Software Systems (FoSS)

Ian Wakeman

Selected Publications

2019

  • Kheirkhah, M., Wakeman, I., & Parisis, G. (n.d.). Multipath transport and packet spraying for efficient data delivery in data centres. Computer Networks, 162(106852), pages. doi:10.1016/j.comnet.2019.07.008
    Article. View on figshare.

2018

  • Tee, P., Parisis, G., Berthouze, L., & Wakeman, I. (2018). Relating vertex and global graph entropy in randomly generated graphs. Entropy, 20(7), pages. doi:10.3390/e20070481
    Article. View on figshare.
  • Rajaei, A., Chalmers, D., Wakeman, I., & Parisis, G. (2018). Efficient geocasting in opportunistic networks.
    Thesis. View on figshare.
  • Tee, P., Parisis, G., Berthouze, L., & Wakeman, I. (2018). Relating Vertex and Global Graph Entropy in Randomly Generated Graphs. doi:10.20944/preprints201805.0302.v1
    Preprint. View online.

2017

  • Tee, P., Wakeman, I., Parisis, G., Dawes, J., & Kiss, I. (2017). Constraints and entropy in a model of network evolution. European Physical Journal B: Condensed Matter and Complex Systems, 90, 226 ( pages). doi:10.1140/epjb/e2017-80185-5
    Article. View on figshare.
  • Tee, P., Parisis, G., & Wakeman, I. (2017). Vertex entropy as a critical node measure in network monitoring. IEEE Transactions on Network and Service Management, 14(3), 646-660. doi:10.1109/TNSM.2017.2724301
    Article. View on figshare.
  • Tee, P., Parisis, G., & Wakeman, I. (2017). Vertex Entropy as a Critical Node Measure in Network Monitoring (vol 14, pg 646, 2017). IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 14(4), 1185. doi:10.1109/TNSM.2017.2774978
    Article. View online.

2016

  • Tee, P., Wakeman, I., Parisis, G., Dawes, J., & Kiss, I. Z. (2016). Constraints and Entropy in a Model of Network Evolution. Retrieved from http://dx.doi.org/10.1140/epjb/e2017-80185-5
    Preprint.
  • Parisis, G., Sourlas, V., Katsaros, K., Chai, W. K., Pavlou, G., & Wakeman, I. (2017). Efficient content delivery through fountain coding in opportunistic information-centric networks. Computer Communications, 100, 118-128. doi:10.1016/j.comcom.2016.12.005
    Article. View on figshare.
  • Rajaei, A., Chalmers, D., Wakeman, I., & Parisis, G. (2016). GSAF: efficient and flexible geocasting for opportunistic networks. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM); Coimbra, Portugal; 21-24 June 2016 (pp. pages). Institute of Electrical and Electronics Engineers. doi:10.1109/WoWMoM.2016.7523550
    Conference publication. View on figshare.
  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2016). MMPTCP: a multipath transport protocol for data centers. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016; San Francisco, CA, USA; 10-15 April 2016 (pp. 1-9). San Francisco, CA, USA: Institute of Electrical and Electronics Engineers. doi:10.1109/INFOCOM.2016.7524530
    Conference publication. View on figshare.
  • Tee, P., Parisis, G., & Wakeman, I. (2016). Towards an approximate graph entropy measure for identifying incidents in network event data. In Proceedings of the NOMS 2016 IEEE/IFIP Network Operations and Management Symposium 2016; Istanbul, Turkey; 25-29 April 2016 (pp. 1049-1054). Institute of Electrical and Electronics Engineers. doi:10.1109/NOMS.2016.7502959
    Conference publication. View on figshare.

2015

  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2015). Multipath-TCP in ns-3. Retrieved from http://arxiv.org/abs/1510.07721v1
    Preprint.
  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2015). Short vs. long flows: a battle that both can win. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication; London, UK; 17-21 August 2015 Vol. 45 (pp. 349-350). Association for Computing Machinery. doi:10.1145/2785956.2790018
    Conference publication. View on figshare.
  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2015). Short vs. Long Flows: A Battle That Both Can Win. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 45(4), 349-350. doi:10.1145/2829988.2790018
    Article. View online.

2014

  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2014). Multipath TCP in ns-3. Poster session presented at the meeting of WNS3.
    Poster. View on figshare.
  • Wakeman, I., Naicken, S., Rimmer, J., Chalmers, D., & Fisher, C. (2014). The Fans United will Always be Connected: Building a Practical DTN in a Football Stadium. In Ad Hoc Networks (pp. 162-177). Springer International Publishing. doi:10.1007/978-3-319-14225-8_11
    Chapter. View online.

2013

  • Wakeman, I., Naicken, S., Rimmer, J., Chalmers, D., & Fisher, C. (2013). The fans united will always be connected: building a practical DTN in a football stadium. In ADHOCNETS 2013, 5th International Conference on Ad Hoc Networks. Barcelona.
    Presentation. View on figshare.
  • Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., & Gurbani, V. (2013). The state of peer-to-peer network simulators. ACM Computing Surveys, 45(4), 46:1-46:25. doi:10.1145/2501654.2501660
    Article. View on figshare.
  • Chalmers, D., Calcraft, P., Fisher, C., Whiting, L., Rimmer, J., & Wakeman, I. (2013). Mediating exposure in public interactions. In Experiencing Interactivity in Public Spaces - a workshop at CHI 2013. Paris, France.
    Presentation. View on figshare.

2012

  • Fleming, S., Chalmers, D., & Wakeman, I. (2012). A deniable and efficient question & answer service over ad hoc social networks. Information Retrieval, 15(3-4), 296-331. doi:10.1007/s10791-012-9185-0
    Article. View on figshare.
  • Chalmers, D., Calcraft, P., Fisher, C., Whiting, L., Rimmer, J., & Wakeman, I. (2012). ShineUS: Exploring preferences in public discussion. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 (pp. 513-515). doi:10.1109/PerComW.2012.6197552
    Conference publication. View online.
  • Naicken, S., Wakeman, I., & Chalmers, D. (2012). Finding trusted publish/subscribe trees. In 6th IFIP WG 11.11 International Conference, IFIPTM. Surat, India.
    Presentation. View on figshare.
  • Malkani, Y. A., Chalmers, D., Wakeman, I., & Das Dhomeja, L. (2012). A generic framework for device pairing in ubiquitous computing environments. International Journal of Network Security & Its Applications, 4(2), 1-20. doi:10.5121/ijnsa.2012.420
    Article. View on figshare.
  • Naicken, S., Wakeman, I., & Chalmers, D. (2012). Finding trusted publish/subscribe trees. In IFIP Advances in Information and Communication Technology Vol. 374 AICT (pp. 174-190). doi:10.1007/978-3-642-29852-3_12
    Conference publication. View online.

2011

  • Chalmers, D., Fleming, S., Wakeman, I., & Watson, D. (2011). Rhythms in Twitter. In proceedings of 1st International Workshop on Social Object Networks (SocialObjects 2011). Boston, MA, USA.
    Presentation. View on figshare.
  • Wakeman, I., Light, A., Robinson, J., Chalmers, D., & Basu, A. (2011). Deploying Pervasive Advertising in a Farmers' Market. In Pervasive Advertising (pp. 364.0 pages). London: Springer.
    Chapter. View on figshare.
  • Wakeman, I., Gudes, E., Jensen, C. D., & Crampton, J. (2011). IFIP Advances in Information and Communication Technology: Preface (Vol. 358 AICT).
    Book.
  • Umre, A., & Wakeman, I. (2011). Social Foraging Dynamics in Distributed Systems. In Eighth International Conference on Complex Systems (ICCS 2011). New England Complex Systems Institute (NECSI) & Massachusetts Institute of Technology (MIT), Cambridge, MA, USA.
    Presentation. View on figshare.

2010

  • Malkani, Y. A., Chalmers, D., & Wakeman, I. (2010). Secure Device Association: Trends and Issues. In Security of Self-Organizing Networks: MANET, WSN, WMN, VANET (pp. 638.0 pages). Auerbach Publications.
    Chapter. View on figshare.
  • Malkani, Y. A., Chalmers, D., & Wakeman, I. (2010). A framework for secure device pairing by demonstration of physical proximity. In 9th International Conference on Frontiers of Information Technology. Islamabad, Pakistan.
    Presentation. View on figshare.
  • Light, A., Wakeman, I., Robinson, J., Basu, A., & Chalmers, D. (2010). Chutney and Relish: Designing to Augment the Experience of Shopping at a Farmers' Market. In OzCHI. Brisbane, Australia.
    Presentation. View on figshare.
  • MALKANI, Y., CHALMERS, D. A. N., & WAKEMAN, I. A. N. (2010). Secure Device Association. In Security of Self-Organizing Networks (pp. 3-24). Auerbach Publications. doi:10.1201/ebk1439819197-3
    Chapter. View online.
  • Basu, A., Wakeman, I., & Chalmers, D. (2010). A Framework for Developing and Sharing Client Reputations. In 4th IFIP Conference on Trust Management. Morioka, Iwate, Japan.
    Presentation. View on figshare.
  • Wakeman, I., Light, A., Robinson, J., Chalmers, D., & Basu, A. (2010). Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems. In Trust Management IV : 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings (Vol. 321, pp. pages). Springer.
    Chapter. View on figshare.
  • Stanier, J., Naicken, S., Basu, A., Li, J., & Wakeman, I. (2010). Can we use trust in online dating?. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(4), 50-61.
    Article.

2009

  • Feizy, R., Wakeman, I., & Chalmers, D. (2009). Are your friends who they say they are?. XRDS: Crossroads, The ACM Magazine for Students, 16(2), 19-23. doi:10.1145/1665997.1666003
    Article. View online.
  • Feizy, R., Wakeman, I., & Chalmers, D. (2009). Transformation of online representation through time. In Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009 (pp. 273-278). doi:10.1109/ASONAM.2009.64
    Conference publication. View online.
  • Feizy, R., Wakeman, I., & Chalmers, D. (2009). Transformation of Online Representation through Time in Relations to Honesty and Accountability Characteristics. In International Conference on Advances in Social Networks Analysis and Mining. Athens, GREECE.
    Presentation. View on figshare.

2008

  • Robinson, J., Wakeman, I., & Chalmers, D. (2008). Composing software services in the pervasive computing environment: Languages or APIs?. Pervasive and Mobile Computing, 4(4), 481-505. doi:10.1016/j.pmcj.2008.01.001
    Article. View on figshare.
  • Robinson, J., Wakeman, I., Chalmers, D., & Basu, A. (2008). The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications. In Joint iTrust and PST Conference on Privacy, Trust Management and Security (IFIPTM 2008). Trondheim, Norway.
    Presentation. View on figshare.
  • Basu, A., Wakeman, I., Chalmers, D., & Robinson, J. (2008). A Behavioural Model for Client Reputation. In Proceedings of the Joint Workshops on Sustaining Privacy in Autonomous Collaborative Environments (SPACE-2008) and Trust in Mobile Environments (TIME-2008). Trondheim, Norway.
    Presentation. View on figshare.

2007

  • Wakeman, I., Chalmers, D., & Fry, M. (2007). Reconciling Privacy and Security in Pervasive Computing - The Case for Pseudonymous Group Membership. In 5th International Workshop on Middleware for Pervasive and Ad-Hoc Computing. Newport Beach, Orange County, California, USA. doi:10.1145/1376866.1376868
    Presentation. View on figshare.
  • Basu, A., Wakeman, I., & Chalmers, D. (2007). A Behavioural Model for Consumer Reputation.. In 2nd International Workshop on Self-Organizing Systems (IWSOS 2007). The English Lake District, UK.
    Presentation. View on figshare.
  • Naicken, S., Livingston, B., Basu, A., Rodhetbhai, S., Wakeman, I., & Chalmers, D. (2007). The State of Peer-to-Peer Simulators and Simulations. Computer Communication Review, 37(2), 95-98. doi:10.1145/1232919.1232932
    Article. View on figshare.
  • Wakeman, I., Cogdon, S., Mathy, L., & Fry, M. (2007). Localising multicast using application predicates. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 4725 LNCS (pp. 193-207). doi:10.1007/978-3-540-74917-2_16
    Conference publication. View online.

2006

  • Naicken, S., Basu, A., Livingston, B., Rodhetbhai, S., & Wakeman, I. (2006). Towards Yet Another Peer-to-Peer Simulator. In HET-NETS 06. Ilkley, UK.
    Presentation. View on figshare.
  • Ellis, D., & Wakeman, I. (2006). Lessons for autonomic services from the design of an anonymous DoS protection overlay. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 4195 LNCS (pp. 86-96). doi:10.1007/11880905_8
    Conference publication. View online.

2005

  • Umre, A., & Wakeman, I. (2005). Economics of Cooperation: Social Foraging in Distributed Systems. Journal of Research on Computing Science: Advances in Artificial Intelligence Theory, 16, pages.
    Article. View on figshare.
  • Owen, T., Wakeman, I., Keller, B., Weeds, J., & Weir, D. (2005). Managing the Policies of Non-Technical Users in a Dynamic World. In IEEE 6th International Workshop on Policies for Distributed Systems and Networks. Stockholm, Sweden.
    Presentation. View on figshare.
  • Keller, B., Owen, T., Wakeman, I., Weeds, J., & Weir, D. (2005). Middleware for user controlled environments. In Third IEEE International Conference on Pervasive Computing and Communications, Workshops (PerCom 2005). Kauai, HI.
    Presentation. View on figshare.
  • Rimmer, J., Owen, T., Wakeman, I., Keller, B., Weeds, J., & Weir, D. (2005). User Policies in Pervasive Computing Environments. In User Experience Design for Pervasive Computing, Pervasive 2005 Workshop. Munich, Germany.
    Presentation. View on figshare.
  • Keller, B., Owen, T., Wakeman, I., Weeds, J., & Weir, D. (2005). Middleware for user controlled environments. In Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM '05) (pp. 183-188). Washington, DC, USA: IEEE Computer Society. doi:10.1109/PERCOMW.2005.57
    Chapter. View on figshare.

2004

  • Robinson, J., Wakeman, I., & Owen, T. (2004). Scooby: Middleware for Service Composition in Pervasive Computing. In Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing. Toronto, Canada.
    Presentation. View on figshare.
  • Weeds, J., Keller, B., Weir, D., Wakeman, I., Rimmer, J., & Owen, T. (2004). Natural Language Expression of User Policies in Pervasive Computing Environments. In OntoLex 2004 (LREC Workshop on Ontologies and Lexical Resources in Distributed Environments). Lisbon, Portugal.
    Presentation. View on figshare.
  • Wakeman, I., Ellis, D., Owen, T., Rathke, J., & Watson, D. (2004). Risky Business: Motivations for Markets in Programmable Networks. doi:10.1007/978-3-540-24715-9_23
    Presentation. View online.
  • Wakeman, I., Ellis, D., Owen, T., Rathke, J., & Watson, D. (2004). Risky business: motivations for markets in programmable networks. In Active Networks: in Proceedings of 5th International Workshop IWAN 2003, Kyoto, Japan (Vol. 2982, pp. 266-279). New York, USA: Springer Verlag. doi:10.1007/b96396
    Chapter. View on figshare.

2003

  • Al-Bar, A. M., & Wakeman, I. (2003). Camel: A mobile applications framework. In Proceedings - 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC 2003 (pp. 214-223). doi:10.1109/ICCNMC.2003.1243048
    Conference publication. View online.
  • Wakeman, I., Ellis, D., Owen, T., Rathke, J., & Watson, D. (2003). Risky Business: Motivations for markets in programmable networks. In Unknown Book (Vol. 2982, pp. 14.0 pages). Springer-Verlag.
    Chapter. View on figshare.

2002

  • Sheeran, L., Sasse, M. A., Rimmer, J., & Wakeman, I. (2002). How Web browsers shape users' understanding of networks. Electronic Library, 20(1), 35-42. doi:10.1108/02640470210418254
    Article. View online.
  • Owen, T., Rathke, J., Wakeman, I., & Watson, D. (2002). A Model for Controlling Program Behaviour in Pervasive Networks. In 5th IEEE International Workshop on Networked Appliances. Liverpool.
    Presentation. View on figshare.
  • Type, S., Wakeman, I., & Watt, S. (2002). Smarter service location. In Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002 (pp. 115-121). doi:10.1109/IWNA.2002.1241346
    Conference publication. View online.

2001

  • Umre, A., Wakeman, I., Shipman, R., & Roadknight, C. (2001). Biologically inspired algorithms and techniques in Ad-hoc networks. In Multi Service Networks Conference. Oxford, UK.
    Presentation. View on figshare.
  • Wakeman, I., Jeffrey, A., & Owen, T. (2001). A Language-Based Approach to Programmable Networks.. In IEEE Conference on Open Architectures and Network Programming. Tel-Aviv Israel.
    Presentation. View on figshare.
  • Wakeman, I., Jeffrey, A., Owen, T., & Pepper, D. (2001). SafetyNet: a language-based approach to programmable networks. Computer Networks and ISDN Systems, 36(1), 101-114. doi:10.1016/S1389-1286(01)00154-2
    Article. View on figshare.
  • Crowcroft, J., Fry, M., Hutchison, D., Marshall, I., Sloman, M., & Wakeman, I. (2001). Active networks and services. Computer Networks, 36(1), 1-3. doi:10.1016/S1389-1286(01)00149-9
    Article. View online.
  • Al-bar, A., & Wakeman, I. (2001). A survey of adaptive applications in mobile computing. In Proceedings - 21st International Conference on Distributed Computing Systems Workshops (pp. 246-251). doi:10.1109/CDCS.2001.918713
    Conference publication. View online.
  • Wakeman, I., & Light, A. (2001). Beyond the interface: users' perceptions of interaction and audience on websites.. Interacting with Computers, 13(3), 325-351. doi:10.1016/S0953-5438(00)00044-8
    Article. View on figshare.

2000

  • Sheeran, L., Sassa, M. A., Rimmer, J., & Wakeman, I. (n.d.). How Web browsers shape users' understanding of networks. SA Journal of Information Management, 2(2/3). doi:10.4102/sajim.v2i2/3.101
    Article. View online.
  • Graves, R., & Wakeman, I. (2000). ATOM - Active totally ordered multicast. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 1942 (pp. 171-179). doi:10.1007/3-540-40057-5_13
    Conference publication. View online.
  • Wakeman, I., Jeffrey, A., & Owen, T. (2000). A language-based approach to programmable networks. In 2000 IEEE 3rd Conference on Open Architectures and Network Programming Proceedings, OPENARCH 2000 (pp. 128-137). doi:10.1109/OPNARC.2000.828140
    Conference publication. View online.
  • Sharples, N., & Wakeman, I. (2000). Protocol construction using genetic search techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 1803 (pp. 235-246). doi:10.1007/3-540-45561-2_23
    Conference publication. View online.

1999

  • Wakeman, I., & Graves, R. (1999). Resounce control and accounting for active networks. In IEE Colloquium (Digest) (pp. 41-46).
    Conference publication.
  • Crowcroft, J., Handley, M., & Wakeman, I. (1999). Internetworking multimedia. London: Taylor and Francis.
    Book. View on figshare.
  • Rimmer, J., Wakeman, I., Clark, L., & Sasse, M. A. (1999). Examining Users' Repertoire of Internet Applications. In International Conference on Human-Computer Interaction (INTERACT 99). EDINBURGH, SCOTLAND, AUG 30-SEP 03, 1999.
    Presentation. View on figshare.

1998

  • McIlhagga, M., Light, A., & Wakeman, I. (1998). Towards a design methodology for adaptive applications. In MobiCom '98: Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, Dallas, Texas, United States (pp. 133-144). New York, NY, USA: ACM Press. doi:10.1145/288235.288270
    Chapter. View on figshare.
  • McIlhagga, M., Light, A., & Wakeman, I. (1998). Towards a design methodology for adaptive applications. In Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98).. doi:10.1145/288235.288270
    Presentation. View on figshare.
  • Wakeman, I., Ormsby, A., & McIlhagga, M. (1998). Signalling in a component based world. In 1998 IEEE Open Architectures and Network Programming, OPENARCH 1998 Vol. 1998-April (pp. 37-45). doi:10.1109/OPNARC.1998.662042
    Conference publication. View online.

1997

  • Wakeman, I., Ormsby, A., & McIlhagga, M. (1997). An architecture for adaptive retrieval of networked information resources. IEE Colloquium (Digest), (139).
    Article.
  • Wakeman, I., Ormsby, A., & McIlhagga, M. (1997). Architecture for adaptive retrieval of networked information resources. In IEE Colloquium (Digest).
    Conference publication.

1995

  • Handley, M., Wakeman, I., & Crowcroft, J. (1995). The Conference Control Channel Protocol (CCCP): A scalable base for building conference Control applications. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 1995 (pp. 275-287). doi:10.1145/217382.217461
    Conference publication. View online.
  • Handley, M., Wakeman, I., & Crowcroft, J. (1995). The conference control channel protocol (CCCP). ACM SIGCOMM Computer Communication Review, 25(4), 275-287. doi:10.1145/217391.217461
    Article. View online.
  • Wakeman, I., Ghosh, A., Crowcroft, J., Jacobson, V., & Floyd, S. (1995). Implementing real time packet forwarding policies using streams. In USENIX 1995 Technical Conference Proceedings.
    Conference publication.
  • Wakeman, I., Ghosh, A., Crowcroft, J., Jacobson, V., & Floyd, S. (1995). Implementing real time packet forwarding policies using streams. In USENIX 1995 Technical Conference Proceedings.
    Conference publication.
  • Wakeman, I., Ghosh, A., Crowcroft, J., Jacobson, V., & Floyd, S. (1995). Implementing real time packet forwarding policies using streams. In USENIX 1995 Technical Conference Proceedings.
    Conference publication.

1994

  • Wakeman, I., & Crowcroft, J. (1994). A combined admission and congestion control scheme for variable bit rate video. Distributed Systems Engineering, 1(4), 242-256. doi:10.1088/0967-1846/1/4/005
    Article. View online.
  • Bolot, J. -C., Turletti, T., & Wakeman, I. (1994). Scalable feedback control for multicast video distribution in the Internet. ACM SIGCOMM Computer Communication Review, 24(4), 58-67. doi:10.1145/190809.190320
    Article. View online.
  • Bolotl, J. C., Turlettil, T., & Wakeman, I. (1994). Scalable feedback control for multicast in the internet. In Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994 (pp. 58-67). doi:10.1145/190314.190320
    Conference publication. View online.

1993

  • Crowcroft, J., Hailes, S., Handley, M., Jena, A., Lewis, D., & Wakeman, I. (1993). Some multimedia traffic characterisation and measurement results.
    Book.
  • Wakeman, I., Lewis, D., & Crowcroft, J. (1993). Traffic analysis of trans-Atlantic traffic. Computer Communications, 16(6), 376-388. doi:10.1016/0140-3664(93)90119-D
    Article. View online.
  • Wakeman, I. (1993). Packetized Video--Options for Interaction between the User, the Network and the Codec. The Computer Journal, 36(1), 55-67. doi:10.1093/comjnl/36.1.55
    Article. View online.

1992

  • Wang, Z., Crowcroft, J., & Wakeman, I. (1992). A simple TCP extension for high-speed paths. ACM SIGCOMM Computer Communication Review, 22(1), 48-51. doi:10.1145/141790.141794
    Article. View online.
  • Crowcroft, J., Wakeman, I., Wang, Z., & Sirovica, D. (1992). Is Layering Harmful?: Remote Procedure Call mechanisms over TCP can produce behavior analagous to the Silly Window Syndrome because of a mismatched interface between the socket and the TCP modules. IEEE Network, 6(1), 20-24. doi:10.1109/65.120719
    Article. View online.

1991

  • Wakeman, I., & Cullen, A. (1991). Emerging high speed transfer protocols. In IEE Conference Publication (pp. 197-203).
    Conference publication.

Unpublished works

  • Matthews, D., Chalmers, D., & Wakeman, I. (n.d.). MediateSpace: decentralised contextual mediation using tuple spaces. In Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. Lisbon, Portugal.
    Presentation. View on figshare.