default search action
John Bigham
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j21]Mathangi Sridharan, John Bigham, Paul Michael Campbell, Chris I. Phillips, Eliane L. Bodanese:
Inferring Micro-Activities Using Wearable Sensing for ADL Recognition of Home-Care Patients. IEEE J. Biomed. Health Informatics 24(3): 747-759 (2020)
2010 – 2019
- 2019
- [c59]Mathangi Sridharan, John Bigham, Paul Michael Campbell, Eliane L. Bodanese:
Evaluation of Factors Affecting Inverse Beacon Fingerprinting Using Route Prediction Algorithm. WCNC 2019: 1-7 - 2018
- [c58]Zixiang Ma, John Bigham, Stefan Poslad, Bang Wu, Xiaoshuai Zhang, Eliane L. Bodanese:
Device-Free, Activity During Daily Life, Recognition Using a Low-Cost Lidar. GLOBECOM 2018: 1-6 - 2017
- [j20]Jinfu Wang, John Bigham, Chris I. Phillips:
A Geographical Proximity Aware Multi-Path Routing Mechanism for Resilient Networking. IEEE Commun. Lett. 21(7): 1533-1536 (2017) - [c57]Mathangi Sridharan, John Bigham, Chris Phillips, Eliane L. Bodanese:
Collaborative location estimation for confined spaces using magnetic field and inverse beacon positioning. IEEE SENSORS 2017: 1-3 - [c56]Zixiang Ma, Stefan Poslad, John Bigham, Xiaoshuai Zhang, Liang Men:
A BLE RSSI ranking based indoor positioning system for generic smartphones. WTS 2017: 1-8 - 2016
- [c55]Gareth Tyson, John Bigham, Eliane L. Bodanese, Nadeem Akhtar, Pradipta Biswas, Pat Langdon, Vineet Mimrot, Pratyay Mukhopadhyay, Vinay J. Ribeiro:
Designing an adaptive emergency warning system for heterogeneous environments. PIMRC 2016: 1-6 - 2014
- [j19]Gareth Tyson, Eliane L. Bodanese, John Bigham, Andreas Mauthe:
Beyond content delivery: can ICNs help emergency scenarios? IEEE Netw. 28(3): 44-49 (2014) - [c54]Yue Jia, Eliane L. Bodanese, Chris I. Phillips, John Bigham, Ran Tao:
Improved reliability of large scale publish/subscribe based MOMs using model checking. NOMS 2014: 1-8 - 2013
- [j18]Kejiong Li, John Bigham, Eliane L. Bodanese, Laurissa N. Tokarchuk:
Outdoor Location Estimation in Changeable Environments. IEEE Commun. Lett. 17(11): 2072-2075 (2013) - [j17]Haibo Mei, John Bigham, Peng Jiang, Eliane L. Bodanese:
Distributed Dynamic Frequency Allocation in Fractional Frequency Reused Relay Based Cellular Networks. IEEE Trans. Commun. 61(4): 1327-1336 (2013) - [j16]Rong Zhang, Li Wang, Gerard Parr, Osianoh Glenn Aliu, Benga Awoseyila, Nader Azarmi, Saleem Bhatti, Eliane L. Bodanese, Hong Chen, Mehrdad Dianati, Amit Kumar Dutta, Michael Fitch, Krishnamurthy Giridhar, Steve Hailes, K. V. S. Hari, Muhammad Ali Imran, Aditya K. Jagannatham, Abhay Karandikar, Santosh Kawade, Mohammed Zafar Ali Khan, Sayee C. Kompalli, Patrick Langdon, Babu Narayanan, Andreas Mauthe, Joseph McGeehan, Neelesh B. Mehta, J. Klutto Milleth, Klaus Moessner, Rakshith Rajashekar, Barathram Ramkumar, Vinay J. Ribeiro, Kasturi Vasudevan, Lajos Hanzo, John Bigham:
Advances in base- and mobile-station aided cooperative wireless communications: An overview. IEEE Veh. Technol. Mag. 8(1): 57-69 (2013) - [j15]Kejiong Li, John Bigham, Laurissa N. Tokarchuk:
Validation of a Probabilistic Approach to Outdoor Localization. IEEE Wirel. Commun. Lett. 2(2): 167-170 (2013) - [c53]Kejiong Li, John Bigham, Laurissa N. Tokarchuk, Eliane L. Bodanese:
A probabilistic approach to outdoor localization using clustering and principal component transformations. IWCMC 2013: 1418-1423 - [c52]Kejiong Li, John Bigham, Eliane L. Bodanese, Laurissa N. Tokarchuk:
Location estimation in large indoor multi-floor buildings using hybrid networks. WCNC 2013: 2137-2142 - [i1]John Bigham:
Exploiting Uncertain and Temporal Information in Correlation. CoRR abs/1302.1521 (2013) - 2012
- [j14]Kejiong Li, Peng Jiang, Eliane L. Bodanese, John Bigham:
Outdoor Location Estimation Using Received Signal Strength Feedback. IEEE Commun. Lett. 16(7): 978-981 (2012) - [c51]Yue Jia, Eliane L. Bodanese, John Bigham:
Model checking of the reliability of publish/subscribe structure based system. ICCC 2012: 155-160 - [c50]Yue Jia, Eliane L. Bodanese, John Bigham:
Checking the robustness of a Message Oriented Middleware based system. ICUMT 2012: 280-285 - [c49]Haibo Mei, Peng Jiang, John Bigham:
Dynamic frequency allocation and network reconfiguration on Relay Based Cellular Network. WCNC 2012: 2984-2989 - [c48]Peng Jiang, John Bigham, Eliane L. Bodanese:
A resilience wireless enhancement for neighborhood watching system. WCNC 2012: 3323-3327 - [c47]Kejiong Li, Peng Jiang, Eliane L. Bodanese, John Bigham:
Real time radio coverage monitoring in self-organizing networks with user feedback. WiMob 2012: 837-844 - 2011
- [j13]Peng Jiang, John Bigham, Eliane L. Bodanese, Emmanuel Claudel:
Publish/subscribe delay-tolerant message-oriented middleware for resilient communication. IEEE Commun. Mag. 49(9): 124-130 (2011) - [c46]Jinfu Wang, John Bigham, Jiayi Wu:
Enhance Resilience and QoS Awareness in Message Oriented Middleware for Mission Critical Applications. ITNG 2011: 677-682 - [c45]Haibo Mei, Peng Jiang, John Bigham:
Augmenting coverage in a cellular network with DTN routing. WCNC 2011: 516-521 - [c44]Xu Yang, Yapeng Wang, John Bigham, Laurie G. Cuthbert:
Adaptive CAC using NeuroEvolution to maximize throughput in mobile networks. WCNC 2011: 897-902 - [c43]Peng Jiang, John Bigham, Eliane L. Bodanese:
Adaptive service provisioning for emergency communications with DTN. WCNC 2011: 2125-2130 - [c42]Haibo Mei, Peng Jiang, John Bigham:
Augment delay tolerant networking routing to extend wireless network coverage. WCSP 2011: 1-5 - 2010
- [c41]Reijo Savola, Habtamu Abie, John Bigham, Domenico Rotondi:
Innovations and Advances in Adaptive Secure Message Oriented Middleware. ICDCS Workshops 2010: 288-289 - [c40]John Bigham, Milan Novkovic:
Adding Resilience to Message Oriented Middleware: The GEMOM Approach. ICDCS Workshops 2010: 292-293 - [c39]Haris Pervaiz, Haibo Mei, John Bigham, Peng Jiang:
Enhanced cooperation in heterogeneous wireless networks using coverage adjustment. IWCMC 2010: 241-245 - [c38]Jinfu Wang, Peng Jiang, John Bigham, Bob Chew, Milan Novkovic, Ilesh Dattani:
Adding resilience to message oriented middleware. SERENE 2010: 89-94
2000 – 2009
- 2009
- [j12]Usman Naeem, John Bigham:
Activity recognition in the home using a hierarchal framework with object usage data. J. Ambient Intell. Smart Environ. 1(4): 335-350 (2009) - [c37]Usman Naeem, John Bigham:
Recognising activities of daily life through the usage of everyday objects around the home. PervasiveHealth 2009: 1-4 - 2008
- [j11]Peng Jiang, John Bigham, Jiayi Wu:
Self-organizing relay stations in relay based cellular networks. Comput. Commun. 31(13): 2937-2945 (2008) - [j10]Peng Jiang, John Bigham, M. Anas Khan:
Distributed Algorithm for Real Time Cooperative Synthesis of Wireless Cell Coverage Patterns. IEEE Commun. Lett. 12(9): 702-704 (2008) - [c36]Xu Yang, John Bigham:
Constraint Optimization in Call Admission Control Domain with a NeuroEvolution Algorithm. BIONETICS 2008: 25 - [c35]Habtamu Abie, Ilesh Dattani, Milan Novkovic, John Bigham, Shaun Topham, Reijo Savola:
GEMOM - Significant and Measurable Progress beyond the State of the Art. ICSNC 2008: 191-196 - [c34]Jinfu Wang, John Bigham:
Anomaly detection in the case of message oriented middleware. Middleware Security 2008: 40-42 - [c33]Usman Naeem, John Bigham:
Activity recognition using a hierarchical framework. PervasiveHealth 2008: 24-27 - 2007
- [j9]Ning Lu, John Bigham:
On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks. Comput. Networks 51(10): 2554-2564 (2007) - [c32]Usman Naeem, John Bigham, Jinfu Wang:
Recognising Activities of Daily Life Using Hierarchical Plans. EuroSSC 2007: 175-189 - [c31]Xu Yang, John Bigham:
A Call Admission Control Scheme Using NeuroEvolution Algorithm in Cellular Networks. IJCAI 2007: 186-191 - 2006
- [j8]John Bigham, David Gamez, Xuan Jin, Chris I. Phillips:
Test data for anomaly detection in the electricity infrastructure. Int. J. Crit. Infrastructures 2(4): 396-411 (2006) - [c30]Laurissa N. Tokarchuk, John Bigham, Laurie G. Cuthbert:
Fuzzy and Tile Coding Function Approximation in Agent Coevolution. Artificial Intelligence and Applications 2006: 353-358 - [c29]Ning Lu, John Bigham:
Intra-Class Utility-Fair Bandwidth Adaptation for Multi-Class Traffic in Wireless Networks. MDM 2006: 111 - [c28]Ning Lu, John Bigham:
An optimal bandwidth adaptation algorithm for multi-class traffic in wireless networks. QSHINE 2006: 55 - 2005
- [c27]Ning Lu, John Bigham:
Utility-maximization bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks. Q2SWinet 2005: 136-143 - [c26]Ken Ngo-Pham, John Bigham, Julian Rodaway, Laurissa N. Tokarchuk:
A System to Mark Programs Automatically. QSIC 2005: 317-322 - [c25]Xu Yang, John Bigham, Laurie G. Cuthbert:
Resource management for service providers in heterogeneous wireless networks. WCNC 2005: 1305-1310 - [c24]Lin Du, John Bigham, Laurie G. Cuthbert:
Geographic load balancing for WCDMA mobile networks using a bubble oscillation algorithm. WCNC 2005: 1714-1719 - 2004
- [j7]John Bigham, Laurie G. Cuthbert, Xu Yang, Ning Lu, Damian Ryan:
Using intelligent agents for managing resources in military communications. Comput. Networks 46(5): 709-721 (2004) - [c23]Karen Shoop, John Bigham, Chris I. Phillips:
Resource management employing pseudo-delay for IP networks. CCNC 2004: 222-227 - [c22]Lin Du, John Bigham, Laurie G. Cuthbert:
A Bubble Oscillation Algorithm for Distributed Geographic Load Balancing in Mobile Networks. INFOCOM 2004 - [c21]Yapeng Wang, Laurie G. Cuthbert, John Bigham:
Intelligent radio resource management for IEEE 802.11 WLAN. WCNC 2004: 1365-1370 - [c20]John Bigham, Xuan Jin, David Gamez, Chris I. Phillips:
Hybrid Workflow and Bayesian Networks to Correlate Information in the Protection of Large Scale Critical Infrastructures. WISP@ICATPN 2004: 87-99 - 2003
- [j6]Lin Du, John Bigham, Laurie G. Cuthbert:
Towards intelligent geographic load balancing for mobile cellular networks. IEEE Trans. Syst. Man Cybern. Part C 33(4): 480-491 (2003) - [c19]John Bigham, Lin Du:
Cooperative negotiation in a multi-agent system for real-time load balancing of a mobile cellular network. AAMAS 2003: 568-575 - [c18]Lin Du, John Bigham:
Constrained Coverage Optimisation for Mobile Cellular Networks. EvoWorkshops 2003: 199-210 - [c17]John Bigham, David Gamez, Ning Lu:
Safeguarding SCADA Systems with Anomaly Detection. MMM-ACNS 2003: 171-182 - [c16]Petrit Nahi, Clive Parini, Lin Du, John Bigham, Laurie G. Cuthbert:
Cell shaping using pattern synthesis for a distributed load balancing scheme in cellular networks. WCNC 2003: 93-97 - [c15]Lin Du, John Bigham, Laurie G. Cuthbert, Petrit Nahi, Clive Parini:
Intelligent cellular network load balancing using a cooperative negotiation approach. WCNC 2003: 1675-1679 - 2002
- [c14]John Bigham:
Security and Survivability of Large Scale Critical Infrastructures. EDCC 2002: 84-85 - [c13]Lin Du, John Bigham, Laurie G. Cuthbert:
An intelligent geographic load balance scheme for mobile cellular networks. ICCCN 2002: 348-353 - [c12]John Bigham:
Intelligent Control of Wireless and Fixed Telecom Networks. Soft-Ware 2002: 349 - [c11]Lin Du, John Bigham, Laurie G. Cuthbert, Clive Parini, Petrit Nahi:
Cell size and shape adjustment depending on call traffic distribution. WCNC 2002: 886-891 - 2001
- [j5]Terje Tjelta, Agne Nordbotten, Marco Annoni, Enrico Scarrone, Simone Bizzarri, Laurissa Tokarchuk, John Bigham, Chris Adams, Ken Craig, Manuel Dinis:
Future broadband radio access systems for integrated services with flexible resource management. IEEE Commun. Mag. 39(8): 56-63 (2001) - [c10]Sergi Robles, Joan Borrell, John Bigham, Laurissa N. Tokarchuk, Laurie G. Cuthbert:
Design of a trust model for a secure multi-agent marketplace. Agents 2001: 77-78 - 2000
- [j4]Alex L. Hayzelden, John Bigham, Stefan Poslad, Phil Buckle, E. H. Mamdani:
Communications Systems Driven by Software Agent Technology. J. Netw. Syst. Manag. 8(3): 321-347 (2000) - [j3]Evangelos Vayias, John Soldatos, John Bigham, Laurie G. Cuthbert, Zhiyuan Luo:
Intelligent Agents for ATM Network Control and Resource Management: Experiences and Results from an Implementation on a Network Testbed. J. Netw. Syst. Manag. 8(3): 373-395 (2000)
1990 – 1999
- 1999
- [j2]Alex L. Hayzelden, John Bigham:
Agent technology in communications systems: an overview. Knowl. Eng. Rev. 14(4): 341-375 (1999) - [c9]Zhiyuan Luo, John Bigham, Laurie G. Cuthbert, Alex L. Hayzelden:
Traffic Control and Resource Management Using a Multi-Agent System. Broadband Communications 1999: 597-606 - [c8]John Bigham, Laurie G. Cuthbert, Alex L. Hayzelden, Zhiyuan Luo:
Multi-agent System for Network Resource Management. IS&N 1999: 514-526 - 1998
- [c7]John Bigham:
Correlation using uncertain and temporal information. Applications of Uncertainty Formalisms 1998: 242-265 - [c6]Alex L. Hayzelden, John Bigham:
Heterogeneous Multi-Agent Architecture for ATM Virtual Path Network Resource Configuration. IATA 1998: 45-59 - [c5]John Bigham, Alex L. Hayzelden:
Subsumption and Survivability in Bidding for Bandwidth. ICMAS 1998: 393-394 - 1997
- [c4]John Bigham:
Exploiting Uncertain and Temporal Information in Correlation. UAI 1997: 22-29 - 1995
- [c3]John Bigham, Zhiyuan Luo, Debashis Banerjee:
A Cost Bounded Possibilistic ATMS. ECSQARU 1995: 52-59 - 1994
- [c2]John Bigham:
Using Preference based Heuristics to Control Abductive Reasoning. IPMU 1994: 418-427 - 1993
- [j1]Philippe Besnard, Yves Moinard, Wilmer Pereira, Michael Clarke, Nic Wilson, Miguel Delgado, Serafín Moral, Juan Cano, Didier Dubois, Henri Prade, Luis Fariñas del Cerro, Jérôme Lang, Stéphane Amarger, John Fox, Paul J. Krause, Michael Dohnal, Christine Froidevaux, Jérôme Mengin, Ramón López de Mántaras, Lluís Godo, E. H. Mamdani, John Bigham, Simon Parsons, Rudolf Kruse, Olivier Paillet, Pierre Siegel, Philippe Smets, Yen-Teh Hsia, Alessandro Saffiotti, Robert Kennes, Hong Xu, Elizabeth Umkehrer, Kurt Sundermeyer, Chris Whitney:
DRUMS: Defeasible Reasoning and Uncertainty Management Systems. AI Commun. 6(1): 27-46 (1993)
1980 – 1989
- 1987
- [c1]Francois Arlabosse, Erik Gaussens, John Bigham, Thies Wittig:
Knowledge Representation and Inference Techniques in Industrial Control, ESPRIT P387 KRITIC. Wissensbasierte Systeme 1987: 380-387
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint