Ron Addie

Orcid: 0000-0002-6664-8462

According to our database1, Ron Addie authored at least 46 papers between 1979 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Cybersecurity of a Fact Certification Network.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

2021
A social contract for cyberspace.
Proceedings of the 31st International Telecommunication Networks and Applications Conference, 2021

2019
Resource Provisioning for a Multi-Layered Network.
IEEE Access, 2019

The Inference Graph of Cybersecurity Rules.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Sum-rate Optimal Communication under Different Power Constraints.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Better Service from Understanding the Social Network Behaviour in the Internet.
Proceedings of the TENCON 2018, 2018

Experiments and Proofs in Web-service Security.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

A New Approach to Spread-spectrum OFDM.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2016
Emergency network design - saving lives by saving power.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

Inference of social network behavior from Internet traffic traces.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

Validation of multi-layer network optimization.
Proceedings of the 18th International Conference on Transparent Optical Networks, 2016

2015
Performance Evaluation of a Queue Fed by a Poisson Lomax Burst Process.
IEEE Commun. Lett., 2015

Netml-ns3-click: modeling of routers in Netml/ns3 by means of the click modular router.
Proceedings of the 8th International Conference on Simulation Tools and Techniques, 2015

Protecting services from security mis-configuration.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Cost modelling and validation in network optimization.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

2013
Performance evaluation and service rate provisioning for a queue with fractional Brownian input.
Perform. Evaluation, 2013

2011
Five examples of web-services for illustrating requirements for security architecture.
Proceedings of the 2011 International Conference on Data and Knowledge Engineering, 2011

Layered design of mobile backhaul networks.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Link dimensioning for fractional Brownian input.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

NetML: Networking Networks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
A priority-based processor sharing model for TDM passive optical networks.
IEEE J. Sel. Areas Commun., 2010

Five Criteria for Web-Services Security Architecture.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Performance analysis of a Poisson-Pareto queue over the full range of system parameters.
Comput. Networks, 2009

ECOOSE: an echo cancellation object oriented simulation environment.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

Snapshot simulation of internet traffic: queueing of fixed-rate flows.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

2008
Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

2006
Peer-to-peer form based web information systems.
Proceedings of the Database Technologies 2006, 2006

A framework for role-based group deligation in distributed environments.
Proceedings of the Computer Science 2006, 2006

2003
Internet Traffic Modeling and Future Technology Implications.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
Most probable paths and performance formulae for buffers with gaussian input traffic.
Eur. Trans. Telecommun., 2002

Quantum simulation - rare event simulation by means of cloning, thinning and distortion.
Eur. Trans. Telecommun., 2002

Performance evaluation of a queue fed by a Poisson Pareto burst process.
Comput. Networks, 2002

2001
Admission Control Schemes for Bursty Multimedia Traffic.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

A tradeoff between increased network speed and reduced effective bandwidths.
Proceedings of the IEEE International Conference on Communications, 2001

1999
Application of the M/Pareto process to modeling broadband traffic streams.
Proceedings of the IEEE International Conference on Networks 1999, 1999

Modeling superposition of many sources generating self similar traffic.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

A Practical Approach for Multimedia Traffic Modeling.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1998
Broadband traffic modeling: simple solutions to hard problems.
IEEE Commun. Mag., 1998

1997
Performance Investigation into an IEEE 802.14 MAC Protocol for HFC Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
Performance of a <i>P<sub>i</sub></i> Persistent Protocol Subject to Correlated Gaussian Traffic.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

1995
Fractal Traffic: Measurements, Modelling and Performance Evaluation.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

1994
An approximation for performance evaluation of stationary single server queues.
IEEE Trans. Commun., 1994

Queueing Performance of a Tree Type ATM Network.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

Tails of Stationary Distributions of Queued Work.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1990
An Algorithm for Calculating the Availability and Mean Time to Restore for Communication Through a Network.
Comput. Networks ISDN Syst., 1990

1979
The Covariance of Near End Crosstalk and Its Application to PCM System Engineering in Multipair Cable.
IEEE Trans. Commun., 1979


  Loading...