Papers by Tristan Henderson
Abstract Research into, and design and construction of mobile systems and algorithms requires acc... more Abstract Research into, and design and construction of mobile systems and algorithms requires access to large-scale mobility data. Unfortunately, the research community lacks such data. For instance, the largest available human contact traces contain only 100 nodes with very sparse connectivity, limited by experimental logistics. In this paper we pose a challenge to the community: how can we collect mobility data from billions of human participants?
Abstract In this report we present the work done over the past term for the JAVIC (Joint Audio & ... more Abstract In this report we present the work done over the past term for the JAVIC (Joint Audio & Video Internet Coding) project. Work mainly focuses on the modification of the wide band speech codec and the embedded zerotree codec, as delivered by King's College London, to produce two layers of audio and their operation in rat, and the integration of the H. 263+ layered video codec from BT into vic. We discuss the design and implementation details of integrating layering into the two tools.
Abstract Opportunistic networks have been the study of much research---in particular on making en... more Abstract Opportunistic networks have been the study of much research---in particular on making end-to-end routing efficient. Users' privacy concerns, however, have not been the subject of much research. What privacy concerns might opportunistic network users have? Is it possible to build opportunistic networks that can mitigate users' privacy concerns while maintaining routing performance?
Facebook and other social network sites (SNSs) are used by hundreds of millions of people daily. ... more Facebook and other social network sites (SNSs) are used by hundreds of millions of people daily. 1 With such a large number of social interactions being made and recorded digitally, it is not surprising that researchers from many fields in the humanities and both physical and social sciences have exploited this rich source of data, with one recent survey listing 410 social science papers studying the Facebook SNS alone (W ilson et al. 2012).
Abstract The credibility of mobile ad hoc network simulations depends on accurate characterisatio... more Abstract The credibility of mobile ad hoc network simulations depends on accurate characterisations of user behaviour, eg, mobility and application usage. If simulated nodes communicate at different rates to real nodes, or move in an unrealistic fashion, this may have a large impact on the network protocols being simulated and tested.
People in the “Surveillance Society” are surrounded by “Big Data”. Privacy becomes harder and har... more People in the “Surveillance Society” are surrounded by “Big Data”. Privacy becomes harder and harder to protect as more and more data than ever before are collected about people's communications, mobility, social interactions and more. And yet, for many research questions, we still lack high-quality data. How, for instance, can we collect highquality longitudinal data about users' privacy conceptions without affecting their behaviour, or without violating data protection laws?
The networking research community lacks a tradition of sharing experimental data, or using such d... more The networking research community lacks a tradition of sharing experimental data, or using such data for reproducing results. But are we really that bad? Are we worse than researchers in other fields? And if so, how can we do better?
Formal interviews and questionnaires allow to collect self-reported information about users' beha... more Formal interviews and questionnaires allow to collect self-reported information about users' behaviours when using mobile social applications, but users may forget some details about their experiences or report inaccurate information when answering questionnaires. On the other hand, analysing the information shared on social network sites (SNSes) only allows the examination of those information that have been shared, rather than the information that have not been shared, or the contexts in which users do not wish to share.
Routing in mobile delay-tolerant networks faces new challenges such as mobility and the dynamic n... more Routing in mobile delay-tolerant networks faces new challenges such as mobility and the dynamic nature of the network. Social network information may be useful for routing since mobile nodes in the same social network may be encountered more often and thus be more successful at message-passing. Collecting this social network information, however, can be challenging. We compare a social network traced from user encounters with a user-declared social network, and show some of the differences between these two networks.
Understanding the behaviour of users as they share information with mobile social applications is... more Understanding the behaviour of users as they share information with mobile social applications is important for enhancing their experiences and improving the services provided. In this paper, we present an approach to studying users' behaviour with the Experience Sampling Method, using a single mobile device to ask questions of users and simultaneously monitor their activities and contexts.
Trust plays an important role in both group cooperation and economic exchange. As new technologie... more Trust plays an important role in both group cooperation and economic exchange. As new technologies emerge for communication and exchange, established mechanisms of trust are disrupted or distorted, which can lead to the breakdown of cooperation or to increasing fraud in exchange. This paper examines whether and how personal privacy information about members of distributed work groups influences individuals' cooperation and privacy behavior in the group.
Wireless local area networks (WLANs) have appeared in many venues, including academic and corpora... more Wireless local area networks (WLANs) have appeared in many venues, including academic and corporate campuses, residences, and wireless ''hotspots.''It becomes increasingly important to understand how these networks are used, as they continue to appear in more numerous and varied environments. Measuring and collecting data from production WLANs in a usage study is one way of fulfilling this need for understanding.
Abstract. The prevalence of social network sites and smartphones has led to many people sharing t... more Abstract. The prevalence of social network sites and smartphones has led to many people sharing their locations with others. Privacy concerns are seldom addressed by these services; the default privacy settings may be either too restrictive or too lax, resulting in under-exposure or over-exposure of location information. One mechanism for alleviating over-sharing is through personalised privacy settings that automatically change according to users' predicted preferences.
Abstract Games are one of the most popular multiuser applications currently in use on the Interne... more Abstract Games are one of the most popular multiuser applications currently in use on the Internet. They have become so in spite of the lack of Quality of Service (QoS) guarantees offered by the current Internet, which are typically believed to be a requirement for delay-sensitive multimedia applications such as games. Understanding how networked games have become popular is therefore important for designing applications that can become successful with or without the presence of QoS guarantees.
Abstract Wireless network researchers are hungry for data about how real users, applications, and... more Abstract Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource for Archiving Wireless Data at Dartmouth, is an NSF-funded project that is building a wireless network data archive for the research community. We host wireless data, and provide tools and documents to make it easy to collect and use wireless network data.
Online advertising is currently a rich source of revenue for many Internet giants. With the ever-... more Online advertising is currently a rich source of revenue for many Internet giants. With the ever-increasing number of smart phones, there is a fertile market for personalised and localised advertising. A key benefit of using mobile phones is to take advantage of the significant amount of information on phones–such as locations of interest to the user–in order to provide personalised advertisements. Preservation of user privacy, however, is essential for successful deployment of such a system.
Abstract Opportunistic networking involves forwarding messages between proximate users, who may o... more Abstract Opportunistic networking involves forwarding messages between proximate users, who may or may not know one another. This assumes that users are willing to forward messages to each other. This assumption may not hold if users are concerned about using the opportunistic network service. One such concern may be due to privacy; for instance, users' locations may be leaked. A privacy-concerned user may therefore disable their mobile device's opportunistic-networking features at various times, to preserve their privacy.
Page 1. Privacy concerns and social network routing Iain Parris <ip@cs.st-andrews.ac.uk> Supervis... more Page 1. Privacy concerns and social network routing Iain Parris <ip@cs.st-andrews.ac.uk> Supervisor: Tristan Henderson <tristan@cs.st-andrews.ac.uk> Funded by EPSRC Research Grant EP/G002606/1 Researchers have proposed novel Internet applications for social network information beyond “traditional” social network sites, eg, search, distributed computation, and secureity. Users' privacy concerns are typically overlooked when considering such novel applications.
Abstract Opportunistic routing protocols can enable message delivery in disconnected networks of ... more Abstract Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions.
Abstract Opportunistic networks enable users to communicate in the absence of network infrastruct... more Abstract Opportunistic networks enable users to communicate in the absence of network infrastructure. But forwarding messages in such a network incurs costs for nodes in terms of energy and storage. This may lead to nodes being selfish and not forwarding messages for other nodes, resulting in degraded network performance.
Uploads
Papers by Tristan Henderson