2023 - Research.com Computer Science in United Kingdom Leader Award
2022 - Research.com Computer Science in United Kingdom Leader Award
2013 - Fellow of the Royal Society, United Kingdom
2004 - IEEE Fellow For contributions to network protocols.
2002 - ACM Fellow For contributions to the design and analysis of network protocols and for technical leadership.
1999 - Fellow of the Royal Academy of Engineering (UK)
Jon Crowcroft mainly focuses on Computer network, Distributed computing, Multicast, Network packet and The Internet. His research ties Wireless network and Computer network together. Jon Crowcroft has included themes like Overlay network, Destination-Sequenced Distance Vector routing, Path vector protocol, Network interface and Routing protocol in his Distributed computing study.
The study incorporates disciplines such as Testbed and Real-time computing in addition to Network packet. His studies in The Internet integrate themes in fields like Computer security, End-to-end principle and Scalability. His research integrates issues of Network architecture and Wireless WAN in his study of Unicast.
Jon Crowcroft spends much of his time researching Computer network, The Internet, Distributed computing, Computer security and World Wide Web. Jon Crowcroft has researched Computer network in several fields, including Wireless and Wireless network. His Telecommunications research extends to The Internet, which is thematically connected.
He regularly ties together related areas like Routing protocol in his Distributed computing studies. World Wide Web connects with themes related to Internet privacy in his study. Source-specific multicast, Pragmatic General Multicast, Protocol Independent Multicast and Distance Vector Multicast Routing Protocol are among the areas of Multicast where the researcher is concentrating his efforts.
Jon Crowcroft mainly investigates Computer network, Computer security, The Internet, Software deployment and Internet privacy. Many of his studies on Computer network involve topics that are commonly interrelated, such as Publication. His work on Blockchain as part of general Computer security study is frequently connected to Work, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
The The Internet study combines topics in areas such as Service delivery framework, Service provider and Artificial intelligence. His work carried out in the field of Software deployment brings together such families of science as Enhanced Data Rates for GSM Evolution, Edge computing, Edge device and Data analysis. His Distributed computing research integrates issues from Cellular network and Cache.
His scientific interests lie mostly in Computer security, The Internet, Computer network, World Wide Web and Blockchain. His study in the field of Homomorphic encryption, Secret sharing and Privacy preserving is also linked to topics like Contact tracing. His study in The Internet is interdisciplinary in nature, drawing from both Software deployment, Content management, Artificial intelligence, Edge computing and Mobile computing.
His work in Computer network is not limited to one particular discipline; it also encompasses Eigenvector centrality. His World Wide Web research is multidisciplinary, relying on both Popularity, Task, Internet privacy and Wireless mesh network. His Validator study integrates concerns from other disciplines, such as Quality of service and Distributed computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
XORs in the air: practical wireless network coding
Sachin Katti;Hariharan Rahul;Wenjun Hu;Dina Katabi.
IEEE ACM Transactions on Networking (2008)
BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks
Pan Hui;J. Crowcroft;E. Yoneki.
IEEE Transactions on Mobile Computing (2011)
Quality-of-service routing for supporting multimedia applications
Zheng Wang;J. Crowcroft.
IEEE Journal on Selected Areas in Communications (1996)
A survey and comparison of peer-to-peer overlay network schemes
Eng Keong Lua;J. Crowcroft;M. Pias;R. Sharma.
IEEE Communications Surveys and Tutorials (2005)
Recommendations on Queue Management and Congestion Avoidance in the Internet
B. Braden;D. Clark;J. Crowcroft;B. Davie.
Recommendations on Queue Management and Congestion Avoidance in the Internet (1998)
Impact of Human Mobility on Opportunistic Forwarding Algorithms
A. Chaintreau;Pan Hu;J. Crowcroft;C. Diot.
IEEE Transactions on Mobile Computing (2007)
Core based trees (CBT)
Tony Ballardie;Paul Francis;Jon Crowcroft.
acm special interest group on data communication (1993)
Pocket switched networks and human mobility in conference environments
Pan Hui;Augustin Chaintreau;James Scott;Richard Gass.
acm special interest group on data communication (2005)
Honeycomb: creating intrusion detection signatures using honeypots
Christian Kreibich;Jon Crowcroft.
acm special interest group on data communication (2004)
TCP-like congestion control for layered multicast data transfer
L. Vicisano;J. Crowcroft;L. Rizzo.
international conference on computer communications (1998)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: