小蓝视频

Foundations of Software Systems (FoSS)

Ian Wakeman

Selected Publications

2019

  • Kheirkhah, M., Wakeman, I., & Parisis, G. (n.d.). Multipath transport and packet spraying for efficient data delivery in data centres. Computer Networks, 162(106852), pages. doi:10.1016/j.comnet.2019.07.008
    Article. .

2018

  • Tee, P., Parisis, G., Berthouze, L., & Wakeman, I. (2018). Relating vertex and global graph entropy in randomly generated graphs. Entropy, 20(7), pages. doi:10.3390/e20070481
    Article. .
  • Rajaei, A., Chalmers, D., Wakeman, I., & Parisis, G. (2018). Efficient geocasting in opportunistic networks.
    Thesis. .
  • Tee, P., Parisis, G., Berthouze, L., & Wakeman, I. (2018). Relating Vertex and Global Graph Entropy in Randomly Generated Graphs. doi:10.20944/preprints201805.0302.v1
    Preprint. .

2017

  • Tee, P., Wakeman, I., Parisis, G., Dawes, J., & Kiss, I. (2017). Constraints and entropy in a model of network evolution. European Physical Journal B: Condensed Matter and Complex Systems, 90, 226 ( pages). doi:10.1140/epjb/e2017-80185-5
    Article. .
  • Tee, P., Parisis, G., & Wakeman, I. (2017). Vertex entropy as a critical node measure in network monitoring. IEEE Transactions on Network and Service Management, 14(3), 646-660. doi:10.1109/TNSM.2017.2724301
    Article. .
  • Tee, P., Parisis, G., & Wakeman, I. (2017). Vertex Entropy as a Critical Node Measure in Network Monitoring (vol 14, pg 646, 2017). IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 14(4), 1185. doi:10.1109/TNSM.2017.2774978
    Article. .

2016

  • Tee, P., Wakeman, I., Parisis, G., Dawes, J., & Kiss, I. Z. (2016). Constraints and Entropy in a Model of Network Evolution. Retrieved from http://dx.doi.org/10.1140/epjb/e2017-80185-5
    Preprint.
  • Parisis, G., Sourlas, V., Katsaros, K., Chai, W. K., Pavlou, G., & Wakeman, I. (2017). Efficient content delivery through fountain coding in opportunistic information-centric networks. Computer Communications, 100, 118-128. doi:10.1016/j.comcom.2016.12.005
    Article. .
  • Rajaei, A., Chalmers, D., Wakeman, I., & Parisis, G. (2016). GSAF: efficient and flexible geocasting for opportunistic networks. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM); Coimbra, Portugal; 21-24 June 2016 (pp. pages). Institute of Electrical and Electronics Engineers. doi:10.1109/WoWMoM.2016.7523550
    Conference publication. .
  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2016). MMPTCP: a multipath transport protocol for data centers. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016; San Francisco, CA, USA; 10-15 April 2016 (pp. 1-9). San Francisco, CA, USA: Institute of Electrical and Electronics Engineers. doi:10.1109/INFOCOM.2016.7524530
    Conference publication. .
  • Tee, P., Parisis, G., & Wakeman, I. (2016). Towards an approximate graph entropy measure for identifying incidents in network event data. In Proceedings of the NOMS 2016 IEEE/IFIP Network Operations and Management Symposium 2016; Istanbul, Turkey; 25-29 April 2016 (pp. 1049-1054). Institute of Electrical and Electronics Engineers. doi:10.1109/NOMS.2016.7502959
    Conference publication. .

2015

  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2015). Multipath-TCP in ns-3. Retrieved from http://arxiv.org/abs/1510.07721v1
    Preprint.
  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2015). Short vs. long flows: a battle that both can win. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication; London, UK; 17-21 August 2015 Vol. 45 (pp. 349-350). Association for Computing Machinery. doi:10.1145/2785956.2790018
    Conference publication. .
  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2015). Short vs. Long Flows: A Battle That Both Can Win. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 45(4), 349-350. doi:10.1145/2829988.2790018
    Article. .

2014

  • Kheirkhah, M., Wakeman, I., & Parisis, G. (2014). Multipath TCP in ns-3. Poster session presented at the meeting of WNS3.
    Poster. .
  • Wakeman, I., Naicken, S., Rimmer, J., Chalmers, D., & Fisher, C. (2014). The Fans United will Always be Connected: Building a Practical DTN in a Football Stadium. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 162-177). Springer International Publishing. doi:10.1007/978-3-319-14225-8_11
    Chapter. .

2013

  • Wakeman, I., Naicken, S., Rimmer, J., Chalmers, D., & Fisher, C. (2013). The fans united will always be connected: building a practical DTN in a football stadium. In ADHOCNETS 2013, 5th International Conference on Ad Hoc Networks. Barcelona.
    Presentation. .
  • Basu, A., Fleming, S., Stanier, J., Naicken, S., Wakeman, I., & Gurbani, V. (2013). The state of peer-to-peer network simulators. ACM Computing Surveys, 45(4), 46:1-46:25. doi:10.1145/2501654.2501660
    Article. .
  • Chalmers, D., Calcraft, P., Fisher, C., Whiting, L., Rimmer, J., & Wakeman, I. (2013). Mediating exposure in public interactions. In Experiencing Interactivity in Public Spaces - a workshop at CHI 2013. Paris, France.
    Presentation. .

2012

  • Fleming, S., Chalmers, D., & Wakeman, I. (2012). A deniable and efficient question & answer service over ad hoc social networks. Information Retrieval, 15(3-4), 296-331. doi:10.1007/s10791-012-9185-0
    Article. .
  • Chalmers, D., Calcraft, P., Fisher, C., Whiting, L., Rimmer, J., & Wakeman, I. (2012). ShineUS: Exploring preferences in public discussion. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 (pp. 513-515). doi:10.1109/PerComW.2012.6197552
    Conference publication. .
  • Naicken, S., Wakeman, I., & Chalmers, D. (2012). Finding trusted publish/subscribe trees. In 6th IFIP WG 11.11 International Conference, IFIPTM. Surat, India.
    Presentation. .
  • Malkani, Y. A., Chalmers, D., Wakeman, I., & Das Dhomeja, L. (2012). A generic framework for device pairing in ubiquitous computing environments. International Journal of Network Security & Its Applications, 4(2), 1-20. doi:10.5121/ijnsa.2012.420
    Article. .
  • Naicken, S., Wakeman, I., & Chalmers, D. (2012). Finding trusted publish/subscribe trees. In IFIP Advances in Information and Communication Technology Vol. 374 AICT (pp. 174-190). doi:10.1007/978-3-642-29852-3_12
    Conference publication. .

2011

  • Chalmers, D., Fleming, S., Wakeman, I., & Watson, D. (2011). Rhythms in Twitter. In proceedings of 1st International Workshop on Social Object Networks (SocialObjects 2011). Boston, MA, USA.
    Presentation. .
  • Wakeman, I., Light, A., Robinson, J., Chalmers, D., & Basu, A. (2011). Deploying Pervasive Advertising in a Farmers' Market. In Pervasive Advertising (pp. 364.0 pages). London: Springer.
    Chapter. .
  • Wakeman, I., Gudes, E., Jensen, C. D., & Crampton, J. (2011). IFIP Advances in Information and Communication Technology: Preface (Vol. 358 AICT).
    Book.
  • Umre, A., & Wakeman, I. (2011). Social Foraging Dynamics in Distributed Systems. In Eighth International Conference on Complex Systems (ICCS 2011). New England Complex Systems Institute (NECSI) & Massachusetts Institute of Technology (MIT), Cambridge, MA, USA.
    Presentation. .

2010

  • Malkani, Y. A., Chalmers, D., & Wakeman, I. (2010). Secure Device Association: Trends and Issues. In Security of Self-Organizing Networks: MANET, WSN, WMN, VANET (pp. 638.0 pages). Auerbach Publications.
    Chapter. .
  • Malkani, Y. A., Chalmers, D., & Wakeman, I. (2010). A framework for secure device pairing by demonstration of physical proximity. In 9th International Conference on Frontiers of Information Technology. Islamabad, Pakistan.
    Presentation. .
  • Light, A., Wakeman, I., Robinson, J., Basu, A., & Chalmers, D. (2010). Chutney and Relish: Designing to Augment the Experience of Shopping at a Farmers' Market. In OzCHI. Brisbane, Australia.
    Presentation. .
  • MALKANI, Y., CHALMERS, D. A. N., & WAKEMAN, I. A. N. (2010). Secure Device Association. In Security of Self-Organizing Networks (pp. 3-24). Auerbach Publications. doi:10.1201/ebk1439819197-3
    Chapter. .
  • Basu, A., Wakeman, I., & Chalmers, D. (2010). A Framework for Developing and Sharing Client Reputations. In 4th IFIP Conference on Trust Management. Morioka, Iwate, Japan.
    Presentation. .
  • Wakeman, I., Light, A., Robinson, J., Chalmers, D., & Basu, A. (2010). Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems. In Trust Management IV : 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings (Vol. 321, pp. pages). Springer.
    Chapter. .
  • Stanier, J., Naicken, S., Basu, A., Li, J., & Wakeman, I. (2010). Can we use trust in online dating?. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(4), 50-61.
    Article.

2009

  • Feizy, R., Wakeman, I., & Chalmers, D. (2009). Are your friends who they say they are?. XRDS: Crossroads, The ACM Magazine for Students, 16(2), 19-23. doi:10.1145/1665997.1666003
    Article. .
  • Feizy, R., Wakeman, I., & Chalmers, D. (2009). Transformation of online representation through time. In Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009 (pp. 273-278). doi:10.1109/ASONAM.2009.64
    Conference publication. .
  • Feizy, R., Wakeman, I., & Chalmers, D. (2009). Transformation of Online Representation through Time in Relations to Honesty and Accountability Characteristics. In International Conference on Advances in Social Networks Analysis and Mining. Athens, GREECE.
    Presentation. .

2008

  • Robinson, J., Wakeman, I., & Chalmers, D. (2008). Composing software services in the pervasive computing environment: Languages or APIs?. Pervasive and Mobile Computing, 4(4), 481-505. doi:10.1016/j.pmcj.2008.01.001
    Article. .
  • Robinson, J., Wakeman, I., Chalmers, D., & Basu, A. (2008). The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications. In Joint iTrust and PST Conference on Privacy, Trust Management and Security (IFIPTM 2008). Trondheim, Norway.
    Presentation. .
  • Basu, A., Wakeman, I., Chalmers, D., & Robinson, J. (2008). A Behavioural Model for Client Reputation. In Proceedings of the Joint Workshops on Sustaining Privacy in Autonomous Collaborative Environments (SPACE-2008) and Trust in Mobile Environments (TIME-2008). Trondheim, Norway.
    Presentation. .

2007

  • Wakeman, I., Chalmers, D., & Fry, M. (2007). Reconciling Privacy and Security in Pervasive Computing - The Case for Pseudonymous Group Membership. In 5th International Workshop on Middleware for Pervasive and Ad-Hoc Computing. Newport Beach, Orange County, California, USA. doi:10.1145/1376866.1376868
    Presentation. .
  • Basu, A., Wakeman, I., & Chalmers, D. (2007). A Behavioural Model for Consumer Reputation.. In 2nd International Workshop on Self-Organizing Systems (IWSOS 2007). The English Lake District, UK.
    Presentation. .
  • Naicken, S., Livingston, B., Basu, A., Rodhetbhai, S., Wakeman, I., & Chalmers, D. (2007). The State of Peer-to-Peer Simulators and Simulations. Computer Communication Review, 37(2), 95-98. doi:10.1145/1232919.1232932
    Article. .
  • Wakeman, I., Cogdon, S., Mathy, L., & Fry, M. (2007). Localising multicast using application predicates. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 4725 LNCS (pp. 193-207). doi:10.1007/978-3-540-74917-2_16
    Conference publication. .

2006

  • Naicken, S., Basu, A., Livingston, B., Rodhetbhai, S., & Wakeman, I. (2006). Towards Yet Another Peer-to-Peer Simulator. In HET-NETS 06. Ilkley, UK.
    Presentation. .
  • Ellis, D., & Wakeman, I. (2006). Lessons for autonomic services from the design of an anonymous DoS protection overlay. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 4195 LNCS (pp. 86-96). doi:10.1007/11880905_8
    Conference publication. .

2005

  • Umre, A., & Wakeman, I. (2005). Economics of Cooperation: Social Foraging in Distributed Systems. Journal of Research on Computing Science: Advances in Artificial Intelligence Theory, 16, pages.
    Article. .
  • Owen, T., Wakeman, I., Keller, B., Weeds, J., & Weir, D. (2005). Managing the Policies of Non-Technical Users in a Dynamic World. In IEEE 6th International Workshop on Policies for Distributed Systems and Networks. Stockholm, Sweden.
    Presentation. .
  • Keller, B., Owen, T., Wakeman, I., Weeds, J., & Weir, D. (2005). Middleware for user controlled environments. In Third IEEE International Conference on Pervasive Computing and Communications, Workshops (PerCom 2005). Kauai, HI.
    Presentation. .
  • Rimmer, J., Owen, T., Wakeman, I., Keller, B., Weeds, J., & Weir, D. (2005). User Policies in Pervasive Computing Environments. In User Experience Design for Pervasive Computing, Pervasive 2005 Workshop. Munich, Germany.
    Presentation. .
  • Keller, B., Owen, T., Wakeman, I., Weeds, J., & Weir, D. (2005). Middleware for user controlled environments. In Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM '05) (pp. 183-188). Washington, DC, USA: IEEE Computer Society. doi:10.1109/PERCOMW.2005.57
    Chapter. .

2004

  • Robinson, J., Wakeman, I., & Owen, T. (2004). Scooby: Middleware for Service Composition in Pervasive Computing. In Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing. Toronto, Canada.
    Presentation. .
  • Weeds, J., Keller, B., Weir, D., Wakeman, I., Rimmer, J., & Owen, T. (2004). Natural Language Expression of User Policies in Pervasive Computing Environments. In OntoLex 2004 (LREC Workshop on Ontologies and Lexical Resources in Distributed Environments). Lisbon, Portugal.
    Presentation. .
  • Wakeman, I., Ellis, D., Owen, T., Rathke, J., & Watson, D. (2004). Risky Business: Motivations for Markets in Programmable Networks. doi:10.1007/978-3-540-24715-9_23
    Presentation. .
  • Wakeman, I., Ellis, D., Owen, T., Rathke, J., & Watson, D. (2004). Risky business: motivations for markets in programmable networks. In Active Networks: in Proceedings of 5th International Workshop IWAN 2003, Kyoto, Japan (Vol. 2982, pp. 266-279). New York, USA: Springer Verlag. doi:10.1007/b96396
    Chapter. .

2003

  • Al-Bar, A. M., & Wakeman, I. (2003). Camel: A mobile applications framework. In Proceedings - 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC 2003 (pp. 214-223). doi:10.1109/ICCNMC.2003.1243048
    Conference publication. .
  • Wakeman, I., Ellis, D., Owen, T., Rathke, J., & Watson, D. (2003). Risky Business: Motivations for markets in programmable networks. In Unknown Book (Vol. 2982, pp. 14.0 pages). Springer-Verlag.
    Chapter. .

2002

  • Sheeran, L., Sasse, M. A., Rimmer, J., & Wakeman, I. (2002). How Web browsers shape users' understanding of networks. Electronic Library, 20(1), 35-42. doi:10.1108/02640470210418254
    Article. .
  • Owen, T., Rathke, J., Wakeman, I., & Watson, D. (2002). A Model for Controlling Program Behaviour in Pervasive Networks. In 5th IEEE International Workshop on Networked Appliances. Liverpool.
    Presentation. .
  • Type, S., Wakeman, I., & Watt, S. (2002). Smarter service location. In Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002 (pp. 115-121). doi:10.1109/IWNA.2002.1241346
    Conference publication. .

2001

  • Umre, A., Wakeman, I., Shipman, R., & Roadknight, C. (2001). Biologically inspired algorithms and techniques in Ad-hoc networks. In Multi Service Networks Conference. Oxford, UK.
    Presentation. .
  • Wakeman, I., Jeffrey, A., & Owen, T. (2001). A Language-Based Approach to Programmable Networks.. In IEEE Conference on Open Architectures and Network Programming. Tel-Aviv Israel.
    Presentation. .
  • Wakeman, I., Jeffrey, A., Owen, T., & Pepper, D. (2001). SafetyNet: a language-based approach to programmable networks. Computer Networks and ISDN Systems, 36(1), 101-114. doi:10.1016/S1389-1286(01)00154-2
    Article. .
  • Crowcroft, J., Fry, M., Hutchison, D., Marshall, I., Sloman, M., & Wakeman, I. (2001). Active networks and services. Computer Networks, 36(1), 1-3. doi:10.1016/S1389-1286(01)00149-9
    Article. .
  • Al-bar, A., & Wakeman, I. (2001). A survey of adaptive applications in mobile computing. In Proceedings - 21st International Conference on Distributed Computing Systems Workshops (pp. 246-251). doi:10.1109/CDCS.2001.918713
    Conference publication. .
  • Wakeman, I., & Light, A. (2001). Beyond the interface: users' perceptions of interaction and audience on websites.. Interacting with Computers, 13(3), 325-351. doi:10.1016/S0953-5438(00)00044-8
    Article. .

2000

  • Sheeran, L., Sassa, M. A., Rimmer, J., & Wakeman, I. (n.d.). How Web browsers shape users' understanding of networks. SA Journal of Information Management, 2(2/3). doi:10.4102/sajim.v2i2/3.101
    Article. .
  • Graves, R., & Wakeman, I. (2000). ATOM - Active totally ordered multicast. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 1942 (pp. 171-179). doi:10.1007/3-540-40057-5_13
    Conference publication. .
  • Wakeman, I., Jeffrey, A., & Owen, T. (2000). A language-based approach to programmable networks. In 2000 IEEE 3rd Conference on Open Architectures and Network Programming Proceedings, OPENARCH 2000 (pp. 128-137). doi:10.1109/OPNARC.2000.828140
    Conference publication. .
  • Sharples, N., & Wakeman, I. (2000). Protocol construction using genetic search techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 1803 (pp. 235-246). doi:10.1007/3-540-45561-2_23
    Conference publication. .

1999

  • Wakeman, I., & Graves, R. (1999). Resounce control and accounting for active networks. In IEE Colloquium (Digest) (pp. 41-46).
    Conference publication.
  • Crowcroft, J., Handley, M., & Wakeman, I. (1999). Internetworking multimedia. London: Taylor and Francis.
    Book. .
  • Rimmer, J., Wakeman, I., Clark, L., & Sasse, M. A. (1999). Examining Users' Repertoire of Internet Applications. In International Conference on Human-Computer Interaction (INTERACT 99). EDINBURGH, SCOTLAND, AUG 30-SEP 03, 1999.
    Presentation. .

1998

  • McIlhagga, M., Light, A., & Wakeman, I. (1998). Towards a design methodology for adaptive applications. In MobiCom '98: Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, Dallas, Texas, United States (pp. 133-144). New York, NY, USA: ACM Press. doi:10.1145/288235.288270
    Chapter. .
  • McIlhagga, M., Light, A., & Wakeman, I. (1998). Towards a design methodology for adaptive applications. In Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98).. doi:10.1145/288235.288270
    Presentation. .
  • Wakeman, I., Ormsby, A., & McIlhagga, M. (1998). Signalling in a component based world. In 1998 IEEE Open Architectures and Network Programming, OPENARCH 1998 Vol. 1998-April (pp. 37-45). doi:10.1109/OPNARC.1998.662042
    Conference publication. .

1997

  • Wakeman, I., Ormsby, A., & McIlhagga, M. (1997). An architecture for adaptive retrieval of networked information resources. IEE Colloquium (Digest), (139).
    Article.
  • Wakeman, I., Ormsby, A., & McIlhagga, M. (1997). Architecture for adaptive retrieval of networked information resources. In IEE Colloquium (Digest).
    Conference publication.

1995

  • Handley, M., Wakeman, I., & Crowcroft, J. (1995). The Conference Control Channel Protocol (CCCP): A scalable base for building conference Control applications. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 1995 (pp. 275-287). doi:10.1145/217382.217461
    Conference publication. .
  • Handley, M., Wakeman, I., & Crowcroft, J. (1995). The conference control channel protocol (CCCP). ACM SIGCOMM Computer Communication Review, 25(4), 275-287. doi:10.1145/217391.217461
    Article. .
  • Wakeman, I., Ghosh, A., Crowcroft, J., Jacobson, V., & Floyd, S. (1995). Implementing real time packet forwarding policies using streams. In USENIX 1995 Technical Conference Proceedings.
    Conference publication.
  • Wakeman, I., Ghosh, A., Crowcroft, J., Jacobson, V., & Floyd, S. (1995). Implementing real time packet forwarding policies using streams. In USENIX 1995 Technical Conference Proceedings.
    Conference publication.
  • Wakeman, I., Ghosh, A., Crowcroft, J., Jacobson, V., & Floyd, S. (1995). Implementing real time packet forwarding policies using streams. In USENIX 1995 Technical Conference Proceedings.
    Conference publication.

1994

  • Wakeman, I., & Crowcroft, J. (1994). A combined admission and congestion control scheme for variable bit rate video. Distributed Systems Engineering, 1(4), 242-256. doi:10.1088/0967-1846/1/4/005
    Article. .
  • Bolot, J. -C., Turletti, T., & Wakeman, I. (1994). Scalable feedback control for multicast video distribution in the Internet. ACM SIGCOMM Computer Communication Review, 24(4), 58-67. doi:10.1145/190809.190320
    Article. .
  • Bolotl, J. C., Turlettil, T., & Wakeman, I. (1994). Scalable feedback control for multicast in the internet. In Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994 (pp. 58-67). doi:10.1145/190314.190320
    Conference publication. .

1993

  • Crowcroft, J., Hailes, S., Handley, M., Jena, A., Lewis, D., & Wakeman, I. (1993). Some multimedia traffic characterisation and measurement results.
    Book.
  • Wakeman, I., Lewis, D., & Crowcroft, J. (1993). Traffic analysis of trans-Atlantic traffic. Computer Communications, 16(6), 376-388. doi:10.1016/0140-3664(93)90119-D
    Article. .
  • Wakeman, I. (1993). Packetized Video--Options for Interaction between the User, the Network and the Codec. The Computer Journal, 36(1), 55-67. doi:10.1093/comjnl/36.1.55
    Article. .

1992

  • Wang, Z., Crowcroft, J., & Wakeman, I. (1992). A simple TCP extension for high-speed paths. ACM SIGCOMM Computer Communication Review, 22(1), 48-51. doi:10.1145/141790.141794
    Article. .
  • Crowcroft, J., Wakeman, I., Wang, Z., & Sirovica, D. (1992). Is Layering Harmful?: Remote Procedure Call mechanisms over TCP can produce behavior analagous to the Silly Window Syndrome because of a mismatched interface between the socket and the TCP modules. IEEE Network, 6(1), 20-24. doi:10.1109/65.120719
    Article. .

1991

  • Wakeman, I., & Cullen, A. (1991). Emerging high speed transfer protocols. In IEE Conference Publication (pp. 197-203).
    Conference publication.

Unpublished works

  • Matthews, D., Chalmers, D., & Wakeman, I. (n.d.). MediateSpace: decentralised contextual mediation using tuple spaces. In Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. Lisbon, Portugal.
    Presentation. .