default search action
Ron Addie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c35]Kaled Aljebur, Mostfa Albdair, Ron Addie:
Cybersecurity of a Fact Certification Network. ITNAC 2022: 50-55 - 2021
- [c34]Dawood Sheniar, James Northway, James Talbot, David Millsom, Yan Li, Ron Addie:
A social contract for cyberspace. ITNAC 2021: 158-165
2010 – 2019
- 2019
- [j12]Chang Xing, Ronald G. Addie, Yu Peng, Rongping Lin, Fan Li, Wenjie Hu, Vyacheslav M. Abramov, Moshe Zukerman:
Resource Provisioning for a Multi-Layered Network. IEEE Access 7: 16226-16245 (2019) - [c33]Mohammad Kaisb Layous Alhasnawi, Ronald G. Addie:
Sum-rate Optimal Communication under Different Power Constraints. ICETE (1) 2019: 379-386 - [c32]Dawood Sheniar, Nabeel Hadaad, Ron Addie:
The Inference Graph of Cybersecurity Rules. ITNAC 2019: 1-6 - 2018
- [c31]Mohammad Kaisb Layous Alhasnawi, Ronald G. Addie, Shahab A. Abdulla:
A New Approach to Spread-spectrum OFDM. ICETE (1) 2018: 447-454 - [c30]Dawood Sheniar, Nabeel Hadaad, David Martin, Ron Addie, Shahab A. Abdullah:
Experiments and Proofs in Web-service Security. ITNAC 2018: 1-6 - [c29]Mostfa Albdair, Ronald G. Addie, Alexander A. Kist:
Better Service from Understanding the Social Network Behaviour in the Internet. TENCON 2018: 838-843 - 2016
- [c28]Yu Peng, Rongping Lin, Fan Li, Chang Xing, Jun Guo, Wenjie Hu, Vyacheslav M. Abramov, Ronald G. Addie, Moshe Zukerman:
Validation of multi-layer network optimization. ICTON 2016: 1-4 - [c27]Mostfa Albdair, Ronald G. Addie, David Fatseas:
Inference of social network behavior from Internet traffic traces. ITNAC 2016: 7-12 - [c26]Nabeel Hadaad, Andreas Pitsillides, Panayiotis Kolios, Alan Kuras, Ronald G. Addie:
Emergency network design - saving lives by saving power. ITNAC 2016: 19-21 - 2015
- [j11]Jiongze Chen, Ronald G. Addie, Moshe Zukerman, Timothy D. Neame:
Performance Evaluation of a Queue Fed by a Poisson Lomax Burst Process. IEEE Commun. Lett. 19(3): 367-370 (2015) - [c25]Ronald G. Addie, Yu Peng, Mostfa Albdair, Chang Xing, David Fatseas, Moshe Zukerman:
Cost modelling and validation in network optimization. ITNAC 2015: 11-16 - [c24]Nabeel Hadaad, Luke Drury, Ronald G. Addie:
Protecting services from security mis-configuration. ITNAC 2015: 120-125 - [c23]Ronald G. Addie, Joshua Pravin Raj Natarajan:
Netml-ns3-click: modeling of routers in Netml/ns3 by means of the click modular router. SimuTools 2015: 293-295 - 2013
- [j10]Jiongze Chen, Ronald G. Addie, Moshe Zukerman:
Performance evaluation and service rate provisioning for a queue with fractional Brownian input. Perform. Evaluation 70(11): 1028-1045 (2013) - 2011
- [c22]Ronald G. Addie, Yu Peng, Moshe Zukerman:
NetML: Networking Networks. DASC 2011: 1055-1060 - [c21]Jiongze Chen, Ronald G. Addie, Moshe Zukerman:
Link dimensioning for fractional Brownian input. HPSR 2011: 151-157 - [c20]David Fatseas, Ron Addie:
Layered design of mobile backhaul networks. ICON 2011: 293-298 - [c19]Ronald G. Addie, Sam Moffatt, Stijn Dekeyser, Alan W. Colman:
Five examples of web-services for illustrating requirements for security architecture. ICDKE 2011: 47-54 - 2010
- [j9]Yan Wang, Moshe Zukerman, Ron Addie, Sammy Chan, Richard J. Harris:
A priority-based processor sharing model for TDM passive optical networks. IEEE J. Sel. Areas Commun. 28(6): 863-874 (2010) - [c18]Ronald G. Addie, Alan W. Colman:
Five Criteria for Web-Services Security Architecture. NSS 2010: 521-526
2000 – 2009
- 2009
- [j8]Ron Addie, Timothy D. Neame, Moshe Zukerman:
Performance analysis of a Poisson-Pareto queue over the full range of system parameters. Comput. Networks 53(7): 1099-1113 (2009) - [c17]Stephen Braithwaite, Ron Addie:
ECOOSE: an echo cancellation object oriented simulation environment. SimuTools 2009: 15 - [c16]Ron Addie:
Snapshot simulation of internet traffic: queueing of fixed-rate flows. SimuTools 2009: 83 - 2008
- [c15]Ronald G. Addie:
Snapshot simulation of internet traffic: fast and accurate for heavy-tailed flows. SimuTools 2008: 12 - 2006
- [c14]Hua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson:
A framework for role-based group deligation in distributed environments. ACSC 2006: 321-328 - [c13]Stijn Dekeyser, Jan Hidders, Richard Watson, Ron Addie:
Peer-to-peer form based web information systems. ADC 2006: 79-88 - 2003
- [c12]Moshe Zukerman, Timothy D. Neame, Ron Addie:
Internet Traffic Modeling and Future Technology Implications. INFOCOM 2003: 587-596 - 2002
- [j7]Ron Addie, Timothy D. Neame, Moshe Zukerman:
Performance evaluation of a queue fed by a Poisson Pareto burst process. Comput. Networks 40(3): 377-397 (2002) - [j6]Ron Addie, Petteri Mannersalo, Ilkka Norros:
Most probable paths and performance formulae for buffers with gaussian input traffic. Eur. Trans. Telecommun. 13(3): 183-196 (2002) - [j5]Ronald G. Addie:
Quantum simulation - rare event simulation by means of cloning, thinning and distortion. Eur. Trans. Telecommun. 13(4): 387-397 (2002) - 2001
- [c11]Timothy D. Neame, Moshe Zukerman, Ronald G. Addie:
A tradeoff between increased network speed and reduced effective bandwidths. ICC 2001: 979-984 - [c10]Teck Kiong Lee, Moshe Zukerman, Ron Addie:
Admission Control Schemes for Bursty Multimedia Traffic. INFOCOM 2001: 478-487
1990 – 1999
- 1999
- [c9]Timothy D. Neame, Moshe Zukerman, Ron Addie:
A Practical Approach for Multimedia Traffic Modeling. Broadband Communications 1999: 73-82 - [c8]Ronald G. Addie, Timothy D. Neame, Moshe Zukerman:
Modeling superposition of many sources generating self similar traffic. ICC 1999: 387-391 - [c7]Timothy D. Neame, Moshe Zukerman, Ron Addie:
Application of the M/Pareto process to modeling broadband traffic streams. ICON 1999: 53-58 - 1998
- [j4]Ronald G. Addie, Moshe Zukerman, Timothy D. Neame:
Broadband traffic modeling: simple solutions to hard problems. IEEE Commun. Mag. 36(8): 88-95 (1998) - 1997
- [c6]Milosh V. Ivanovich, Moshe Zukerman, Ron Addie:
Performance Investigation into an IEEE 802.14 MAC Protocol for HFC Networks. ICC (2) 1997: 999-1003 - 1996
- [c5]Ron Addie, Darren Platt, Moshe Zukerman:
Performance of a Pi Persistent Protocol Subject to Correlated Gaussian Traffic. INFOCOM 1996: 263-270 - 1995
- [c4]Ron Addie, Moshe Zukerman, Timothy D. Neame:
Fractal Traffic: Measurements, Modelling and Performance Evaluation. INFOCOM 1995: 977-984 - 1994
- [j3]Ronald G. Addie, Moshe Zukerman:
An approximation for performance evaluation of stationary single server queues. IEEE Trans. Commun. 42(12): 3150-3160 (1994) - [c3]Ron Addie, Moshe Zukerman:
Queueing Performance of a Tree Type ATM Network. INFOCOM 1994: 48-55 - [c2]Ron Addie:
Tails of Stationary Distributions of Queued Work. INFOCOM 1994: 1170-1177 - 1993
- [c1]Ron Addie, Moshe Zukerman:
An Approximation for Performance Evaluation of Stationary Single Server Queues. INFOCOM 1993: 835-842 - 1990
- [j2]Richard Taylor, Ron Addie:
An Algorithm for Calculating the Availability and Mean Time to Restore for Communication Through a Network. Comput. Networks ISDN Syst. 20(1): 109-114 (1990)
1970 – 1979
- 1979
- [j1]Alan J. Gibbs, Ron Addie:
The Covariance of Near End Crosstalk and Its Application to PCM System Engineering in Multipair Cable. IEEE Trans. Commun. 27(2): 469-477 (1979)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint