People

Professor Martin Reed

Professor
School of Computer Science and Electronic Engineering (CSEE)
Professor Martin Reed
  • Email

  • Telephone

    +44 (0) 1206 872479

  • Location

    1NW.4.18, Colchester Campus

  • Academic support hours

    During Autumn Term my Academic Support Hours are 09:00-10:00 on Tuesdays or 13:00-14:00 on Fridays. I will be in my office, 1NW.4.18. I can also meet on zoom by request at these times (I will check email during these support hours and respond with a link).

Profile

Biography

Martin is a Professor in, and Deputy Head of, the School of Computer Science and Electronic Engineering. His research interests include computer networking and network security, in particular, recent work is the area of security for IoT, SDN security, information/content centric networking, software defined networking and the transmission of multimedia over networks. He has been involved in a number of EU, EPSRC and Industrially funded projects (see below). He has led the curriculum in the school, including merging the curriculum of the two former departments that formed the current school. He has acted as an external examiner for undergraduate and postgraduate programmes for a number of UK universities.

Qualifications

  • PhD University of Essex, (1997)

  • BEng (1st Class) with Industrial Year at BBC Research Department University of Surrey, (1989)

Research and professional activities

Research interests

Information Centric Networking

Open to supervise

Network security

Open to supervise

quality of Service mechanisms for Internet protocol networks

Open to supervise

management and control of optical and core networks

Open to supervise

multimedia Internet applications

Open to supervise

Teaching and supervision

Current teaching responsibilities

  • Network Engineering (CE321)

  • Network Security (CE324)

  • Network Security (CE823)

Previous supervision

Edita Gashi
Edita Gashi
Thesis title: Path Protection Switching in Information Centric Networking
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 12/3/2024
Perekebode Amangele
Perekebode Amangele
Thesis title: Efficient Malicious Packet Detection in Software Defined Networks
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 22/12/2022
Miroslav Georgiev Mitev
Miroslav Georgiev Mitev
Thesis title: Physical Layer Security for Iot Applications
Degree subject: Electronic Systems Engineering
Degree type: Doctor of Philosophy
Awarded date: 22/12/2020
Karis Louise Bailey
Karis Louise Bailey
Thesis title: Measuring Interactivity in Audio Teleconferencing Using Conversation Analysis
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 31/7/2020
Mohammed Qasim Shawkat Al-Khalidi
Mohammed Qasim Shawkat Al-Khalidi
Thesis title: Anchor Free Mobility
Degree subject: Electronic Systems Engineering
Degree type: Doctor of Philosophy
Awarded date: 9/9/2019
Hildebrand Jacobus Weisenborn
Hildebrand Jacobus Weisenborn
Thesis title: Video Popularity Metrics and Bubble Cache Eviction Algorithm Analysis
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 11/7/2018
Paul Farrow
Paul Farrow
Thesis title: Optimising Networks for Ultra-High Definition Video
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 29/4/2016
Bander Ahmad Alzahrani
Bander Ahmad Alzahrani
Thesis title: Securing the Forwarding Plane of Mediated Information Centric Networks
Degree subject: Computer Science
Degree type: Doctor of Philosophy
Awarded date: 12/5/2015
Mohammed Alhomidi
Mohammed Alhomidi
Thesis title: Managing Information Security Risk Through Attack Graph Analysis
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 5/11/2014
Rajasekhar Sadda
Rajasekhar Sadda
Thesis title: Securing Networks From Layer 2 Attacks
Degree subject: Computing and Electronic Systems
Degree type: Master of Science (by Dissertation)
Awarded date: 5/11/2014
Mohammed NMF Alenezi
Mohammed NMF Alenezi
Thesis title: Detecting, Tracing and Mitigating Against Denial of Service in Ip Networks
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 29/8/2014
Karis Louise Bailey
Karis Louise Bailey
Thesis title: Comparing Narrowband and Wideband Speech Communication
Degree subject: Computer Science
Degree type: Master of Science (by Dissertation)
Awarded date: 23/12/2013
Okung-Dike Ntofon
Okung-Dike Ntofon
Thesis title: Controlling Beyond High Definition Media in Future Networks
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 4/9/2013
Laura Carrea
Laura Carrea
Thesis title: Optimised Probabilistic Data Structures for Forwarding in Information Centric Networking
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 26/7/2013
Ian Paul Mothersole
Ian Paul Mothersole
Thesis title: Optimising Network Layer Firewalls Using Rule Manipulation
Degree subject: Computing and Electronic Systems
Degree type: Doctor of Philosophy
Awarded date: 5/7/2013

Publications

Journal articles (43)

Hu-Bolz, J., Reed, M., Zhang, K., Liu, Z. and Hu, J., Federated Data Acquisition Market: Architecture and a Mean-Field Based Data Pricing Strategy. High-Confidence Computing

Assis, KDR., Almeida, RC., Reed, MJ., Santos, AF., Dinarte, HA., Chaves, DAR., Li, H., Yan, S., Nejabati, R. and Simeonidou, D., (2023). Protection by diversity in elastic optical networks subject to single link failure. Optical Fiber Technology. 75, 103208-103208

Al-Naday, M., Dobre, V., Reed, M., Toor, S., Volckaert, B. and De Turck, F., (2023). Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems. Annals of Telecommunications. 79 (3-4), 165-178

Reed, M., Thomos, N., Al-Khalidi, M. and Al-Zaidi, R., (2023). Intelligent Seamless Handover in Next Generation Networks. IEEE Transactions on Consumer Electronics, 1-1

Hidalgo, C., Vaca, M., Nowak, MP., Frölich, P., Reed, M., Al-Naday, M., Mpatziakas, A., Protogerou, A., Drosou, A. and Tzovaras, D., (2022). Detection, control and mitigation system for secure vehicular communication. Vehicular Communications. 34, 100425-100425

Hu, J., Reed, M., Thomos, N., Al-Naday, M. and Yang, K., (2022). A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace. IEEE Transactions on Network and Service Management. 19 (4), 4691-4705

Mitev, M., Shakiba-Herfeh, M., Chorti, A., Reed, M. and Baghaee, S., (2022). A Physical Layer, Zero-round-trip-time, Multi-factor Authentication Protocol. IEEE Access. 10, 74555-74571

AL-Naday, M., Thomos, N., Hu, J., Volckaert, B., de Turck, F. and Reed, MJ., (2022). Service-based, Multi-Provider, Fog Ecosystem with Joint Optimization of Request Mapping and Response Routing. IEEE Transactions on Services Computing. 16 (3), 1-15

Hu, J., Reed, M., Thomos, N., Al-Naday, MF. and Yang, K., (2021). Securing SDN controlled IoT Networks Through Edge-Blockchain. IEEE Internet of Things Journal. 8 (4), 2102-2115

Zhang, Y., Nie, X., Jiang, J., Wang, W., Xu, K., Zhao, Y., Reed, MJ., Chen, K., Wang, H. and Yao, G., (2021). BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation. IEEE ACM Transactions on Networking. 29 (2), 918-934

Hu, J., Reed, MJ., Al-Naday, M. and Thomos, N., (2021). Hybrid Blockchain for IoT—Energy Analysis and Reward Plan. Sensors. 21 (1), 305-305

Mitev, M., Chorti, A., Reed, M. and Musavian, L., (2020). Authenticated secret key generation in delay-constrained wireless systems. EURASIP Journal on Wireless Communications and Networking. 2020 (1), 122-122

Shen, M., Xu, K., Du, X., Reed, MJ., Bhuiyan, MZA., Zhang, L. and Mijumbi, R., (2020). Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities. IEEE Internet of Things Journal. 7 (5), 3897-3900

Hu, J., Reed, MJ., Al-Naday, MF. and Thomos, N., (2020). Blockchain-Aided Flow Insertion and Verification in Software Defined Networks.. CoRR. abs/2006.14513

Assis, KDR., Santos, AF., Almeida, RC., Reed, MJ., Jaumard, B. and Simeonidou, D., (2020). Virtualization of elastic optical networks and regenerators with traffic grooming. Journal of Optical Communications and Networking. 12 (12), 428-428

Mitev, M., Chorti, A., Belmega, EV. and Reed, MJ., (2020). Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation.. CoRR. abs/2003.12034

Assis, KDR., Almeida, RC., Waldman, H., Santos, AF., Alencar, MS., Reed, MJ., Hammad, A. and Simeonidou, D., (2019). SLA Formulation for Squeezed Protection in Elastic Optical Networks Considering the Modulation Format. Journal of Optical Communications and Networking. 11 (5), 202-212

Al-Khalidi, MQ., Thomos, N., Reed, M., Al-Naday, M. and Trossen, D., (2019). Anchor Free IP Mobility. IEEE Transactions on Mobile Computing. 18 (1), 56-69

AL-Naday, MF., Thomos, N. and Reed, MJ., (2017). Information-Centric Multilayer Networking: Improving Performance Through an ICN/WDM Architecture. IEEE/ACM Transactions on Networking. 25 (1), 83-97

Reed, MJ., Al-Naday, M., Thomos, N., Trossen, D., Petropoulos, G. and Spirou, S., (2016). Stateless multicast switching in software defined networks. 2016 IEEE International Conference on Communications, ICC 2016. abs/1511.06069

Al-Khalidi, M., Thomos, N., Reed, MJ., Al-Naday, MF. and Trossen, D., (2016). Network Controlled Mobility Management using IP over ICN Architecture.. CoRR. abs/1610.09011

Carrea, L., Vernitski, A. and Reed, MJ., (2016). Yes-no Bloom filter: A way of representing sets with fewer false positives

Asghar, MN., Ghanbari, M., Fleury, M. and Reed, MJ., (2015). Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimedia Tools and Applications. 74 (23), 10215-10241

Al-Naday, MF., Thomos, N. and Reed, MJ., (2015). Information-centric Multilayer Network: ICN/WDM.. CoRR. abs/1511.04698

Alzahrani, BA., Reed, MJ., Riihijärvi, J. and Vassilakis, VG., (2015). Scalability of information centric networking using mediated topology management. Journal of Network and Computer Applications. 50, 126-133

Asghar, MN., Ghanbari, M., Fleury, M. and Reed, MJ., (2014). Confidentiality of a selectively encrypted H.264 coded video bit-stream. Journal of Visual Communication and Image Representation. 25 (2), 487-498

Al-Naday, MF., Reed, MJ., Trossen, D. and Yang, K., (2014). Information resilience: Source recovery in an information-centric network. IEEE Network. 28 (3), 36-42

Alenezi, MN. and Reed, MJ., (2014). Uniform DoS traceback. Computers & Security. 45, 17-26

Carrea, L., Vernitski, A. and Reed, M., (2014). Optimized hash for network path encoding with minimized false positives. Computer Networks. 58 (1), 180-191

Alhomidi, M. and Reed, M., (2014). Attack Graph-Based Risk Assessment and Optimisation Approach. International Journal of Network Security & Its Applications. 6 (3), 31-43

Ntofon, OD., Reed, MJ., Malewski, S., Glowiak, M. and Simeonidou, D., (2013). Service-Oriented Control Framework for Next Generation Media Applications Over Future Networks. Journal of Optical Communications and Networking. 5 (7), 784-784

Shan-shan, T., Shao-zhang, N. and Reed, MJ., (2013). Access control based on ABE and IBS for the cloud outsourced data. International Journal of Applied Mathematics and Statistics. 46 (16), 85-92

A Alzahrani, B., G. Vassilakis, V. and J. Reed, M., (2013). Key Management in Information Centric Networking. International journal of Computer Networks & Communications. 5 (6), 153-166

AL-Naday, MF., Almeida, RC., Guild, KM. and Reed, MJ., (2012). Design proposal of a photonic multicast Bloom filter node. Photonic Network Communications. 24 (2), 132-137

Thomas, M., Hunter, D. and Reed, M., (2008). Pseudo-node Reduction on Multi-access Networks for Algorithmic Simplification. IEEE Communications Letters. 12 (7), 538-540

Flores Lucio, G., Reed, MJ. and Henning, ID., (2007). Guided local search as a network planning algorithm that incorporates uncertain traffic demands. Computer Networks. 51 (11), 3172-3196

Flores-Mosri, A. and Reed, MJ., (2006). TCP-friendly transmission of layered coded streams. Electronics Letters. 42 (22), 1316-1316

Lucio, GF., Farrera, MP., Jammeh, E., Fleury, M., Reed, MJ. and Ghanbari, M., (2006). Packet by Packet Analysis in Contemporary Network Simulators. IEEE Latin America Transactions. 4 (4), 299-307

Reed, MJ., Hawksford, MO. and Hughes, P., (2005). Acoustic echo cancellation for stereophonic systems derived from pairwise panning of monophonic speech. IEE Proceedings - Vision, Image, and Signal Processing. 152 (1), 122-122

Reed, MJ. and Hawksford, MOJ., (2000). Efficient implementation of the Volterra filter. IEE Proceedings - Vision, Image, and Signal Processing. 147 (2), 109-109

Reed, MJ. and Hawksford, MOJ., (1998). Acoustic echo cancellation with the fast affine projection. IEE Colloquium (Digest) (470)

Reed, MJ. and Hawksford, MOJ., (1996). Identification of discrete Volterra series using maximum length sequences. IEE Proceedings - Circuits, Devices and Systems. 143 (5), 241-241

Fairwood, RC. and Reed, MJ., (1991). Digital measurement and comparison of current-voltage output capability of amplifiers and demands of loudspeakers. Journal of the Audio Engineering Society. 39 (5), 344-354

Book chapters (3)

Mambretti, J., Chen, J., Yeh, F., Ge, J., You, J., Li, T., de Laat, C., Grosso, P., Liu, T-L., Luo, M-Y., Nakao, A., Müller, P., van der Pol, R., Reed, M., Stanton, M. and Yang, C-S., (2016). Creating a Worldwide Network for the Global Environment for Network Innovations (GENI) and Related Experimental Environments. In: The GENI Book. Springer International Publishing. 589- 632. 9783319337678

(2012). Multiprotocol Label Switching Martin Reed. In: The Cable and Telecommunications Professionals' Reference. Routledge. 395- 420. 9780240807485

(2012). Voice over Internet Protocol Networks Martin J. Reed. In: The Cable and Telecommunications Professionals' Reference. Routledge. 188- 224. 9780240807478

Conferences (78)

Al-Naday, M., Reed, M., Dobre, V., Toor, S., Volckaert, B. and De Turck, F., (2023). Service-based Federated Deep Reinforcement Learning for Anomaly Detection in Fog Ecosystems

Chakraborty, J., Reed, M., Thomos, N., Pratt, G. and Wilson, N., (2023). Machine learning based noise suppression in narrow-band speech communication systems

Millward, DJ., Reed, MJ. and Olaniyi, N., (2023). CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems

Reed, M., Mitnala, VN., Kegel, I. and Bicknell, I., (2022). Seamless Device Handover for Pervasive Speech Communication

Mitnala, VN., Reed, MJ., Kegel, I. and Bicknell, J., (2021). Avoiding handover interruptions in pervasive communication applications through machine learning

Hu, J., Reed, M., Al-Naday, M. and Thomos, N., (2020). Blockchain-Aided Flow Insertion and Verification in Software Defined Networks

Assis, KDR., Almeida, RC., Waldman, H., Reed, MJ., Jaumard, B. and Simeonidou, D., (2020). Linear formulation for the design of elastic optical networks with squeezing protection and shared risk link group: Invited Paper

Mitev, M., Chorti, A., Belmega, EV. and Reed, M., (2020). Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

Amangele, P., Reed, MJ., Al-Naday, M., Thomos, N. and Nowak, M., (2019). Hierarchical Machine Learning for IoT Anomaly Detection in SDN

Mitev, M., Chorti, A. and Reed, M., (2019). Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes

Hernandez-Ramos, JL., Baldini, G., Neisse, R., Al-Naday, M. and Reed, MJ., (2019). A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS

Zeeshan, N., Reed, M. and Siddiqui, Z., (2019). Three-way Security Framework for Cloud based IoT Network

Al-Khalidi, M., Al-Zaidi, R., Woods, J., Reed, M. and Pereira, E., (2019). Securing Marine Data Networks in an IoT Environment

Mitev, M., Chorti, A. and Reed, M., (2019). Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems

Frotscher, A., Monschiebl, B., Drosou, A., Gelenbe, E., Reed, MJ. and Al-Naday, M., (2019). Improve cybersecurity of C-ITS Road Side Infrastructure Installations: the SerIoT - Secure and Safe IoT approach

Zhang, Y., Jiang, J., Xu, K., Nie, X., Reed, MJ., Wang, H., Yao, G., Zhang, M. and Chen, K., (2018). BDS: a centralized near-optimal overlay network for inter-datacenter data replication

Xylomenos, G., Thomas, Y., Vasilakos, X., Georgiades, M., Phinikarides, A., Doumanis, I., Porter, S., Trossen, D., Robitzsch, S., Reed, MJ., Al-Naday, M., Petropoulos, G., Katsaros, K., Xezonaki, M-E. and Riihijarvi, J., (2018). IP Over ICN Goes Live

Psaras, I., Yang, K., Al-Naday, M., Crowcroft, J., Polyzos, G. and Reed, M., (2018). Message from the workshop chairs

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, MJ., Shen, M. and Yang, F., (2018). Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Al-Khalidi, M., Thomos, N., Al-Naday, M., Reed, M. and Trossen, D., (2017). Seamless Handover in IP over ICN Networks: a Coding Approach

Vasilakos, X., Al-Khalidi, M., Siris, VA., Reed, MJ., Thomos, N. and Polyzos, GC., (2017). Mobility-based Proactive Multicast for Seamless Mobility Support in Cellular Network Environments

Crowcroft, J., Mambretti, J., Pavlou, G., Polyzos, GC., Psaras, I., Yang, K., AL-Naday, M., Katsaros, KV. and Reed, MJ., (2017). Chairs'Welcome Message

Al-Khalidi, M., Thomos, N., Reed, MJ., Al-Naday, MF. and Trossen, D., (2017). Seamless handover in IP over ICN networks: A coding approach.

Alenezi, MN., Reed, MJ. and Alhomidi, MA., (2017). Selective Windowed Rate Limiting for DoS Mitigation

Crowcroft, J., Mambretti, J., Pavlou, G., Polyzos, GC., Psaras, I., Yang, K., AL-Naday, M., Katsaros, KV. and Reed, MJ., (2017). Chairs'Welcome Message

Kim, S-Y., Robitzsch, S., Trossen, D., Reed, M., Al-Naday, M. and Riihijärvi, J., (2016). Realizing IP-based Services over an Information-Centric Networking Transport Network

Reed, MJ., Al-Naday, MF., Thomos, N., Trossen, D., Petropoulos, GP. and Spirou, S., (2016). Stateless multicast switching in software defined networks.

Alzahrani, BA., Reed, MJ. and Vassilakis, VG., (2015). Resistance against brute-force attacks on stateless forwarding in information centric networking

Trossen, D., Reed, MJ., Riihijarvi, J., Georgiades, M., Fotiou, N., Xylomenos, G. and IEEE, (2015). IP Over ICN - The Better IP? An Unusual Take on Information-Centric Networking

Trossen, D., Reed, MJ., Riihijarvi, J., Georgiades, M., Fotiou, N. and Xylomenos, G., (2015). IP over ICN - The better IP?

Al-Naday, MF., Bontozoglou, A., Vassilakis, VG. and Reed, MJ., (2014). Quality of service in an information-centric network

Alzahrani, BA., Vassilakis, VG. and Reed, MJ., (2014). Selecting Bloom-filter header lengths for secure information centric networking

Vassilakis, VG., Al-Naday, MF., Reed, MJ., Alzahrani, BA., Yang, K., Moscholios, ID. and Logothetis, MD., (2014). A cache-aware routing scheme for information-centric networks

Alenezi, M. and Reed, MJ., (2013). Denial of service detection through TCP congestion window analysis

Alzahrani, BA., Vassilakis, VG. and Reed, MJ., (2013). Mitigating brute-force attacks on Bloom-filter based forwarding

Alenezi, M. and Reed, MJ., (2013). Selective record route DoS traceback

Alhomidi, MA. and Reed, MJ., (2013). Security risk analysis as a service

Alenezi, M. and Reed, MJ., (2013). Efficient AS DoS traceback

Alzahrani, BA., Vassilakis, VG. and Reed, MJ., (2013). Securing the forwarding plane in information centric networks

Farrow, P. and Reed, M., (2013). Optimising the geographical location of transcoding resources

Alhomidi, M. and Reed, M., (2013). Risk assessment and analysis through population-based attack graph modelling

Fischnaller, F., Singh, YM. and Reed, M., (2013). The Last Supper Interactive: Stereoscopic and ultra-high resolution 4K/3D HD for immersive real-time virtual narrative in Italian Renaissance Art

Alhomidi, M. and Reed, M., (2013). A Genetic Algorithm Approach for the Most Likely Attack Path Problem

Alhomidi, M. and Reed, M., (2013). Finding the minimum cut set in attack graphs using genetic algorithms

Reed, MJ., (2012). Traffic engineering for information-centric networks

Vastardis, N., Bontozoglou, A., Yang, K. and Reed, M., (2012). Simulation tools enabling research on Information-centric Networks

Asghar, MN., Ghanbari, M., Fleury, M. and Reed, MJ., (2012). Analysis of channel error upon selectively encrypted H.264 video

Alhomidi, MA. and Reed, MJ., (2012). Attack graphs representations

Alzahrani, BA., Reed, MJ. and Vassilakis, VG., (2012). Enabling z-Filter updates for self-routing denial-of-service resistant capabilities

Asghar, MN., Ghanbari, M. and Reed, MJ., (2012). Sufficient Encryption with Codewords and Bin-strings of H.264/SVC

Asghar, M., Ghanbari, M., Fleury, M. and Reed, M., (2012). Efficient selective encryption with H.264/SVC CABAC bin-strings

Alenezi, M., Reed, MJ. and ASME, (2011). AUTONOMOUS SYSTEM TRACEBACK FOR DENIAL OF SERVICE MITIGATION

Mothersole, I. and Reed, MJ., (2011). Optimising Rule Order for a Packet Filtering Firewall

Mothersole, I. and Reed, MJ., (2011). A method for moving rules in a network with multiple packet filters

Alenezi, M. and Reed, MJ., (2011). IP traceback methodologies

Reynolds, CJ., Reed, MJ. and Hughes, PJ., (2009). Decentralized headphone based spatialized audio conferencing for low power devices

Qin, Y., Lu, Z., Zervas, G., Reed, MJ., Hunter, DK., Nejabati, R. and Simeonidou, D., (2009). Optimised optical burst aggregation by employing dynamic state-space feedback gain scheduling controller

Qin, Y., Reed, M., Lu, Z., Hunter, D., Rafel, A. and Kang, J., (2009). Fragmentation in a Novel Implementation of Slotted GPON Segmentation and Reassembly

Qin, Y., Zervas, G., Martini, V., Ghandour, M., Savi, M., Baroncelli, F., Martini, B., Castoldi, P., Raffaelli, C., Reed, M., Hunter, D., Nejabati, R. and Simeonidou, D., (2009). Service­Oriented Multi­Granular Optical Network Testbed

Reynolds, CJ., Reed, MJ. and Hughes, PJ., (2008). Analysis of a distributed processing model for spatialized audio conferences

Malfait, L., Gray, P. and Reed, MJ., (2008). Objective listening quality assessment of speech communication systems introducing continuously varying delay (time-warping): A time alignment issue

Reynolds, CJ., Reed, MJ. and Hughes, PJ., (2007). Spatialized audio conferences: IMS integration and traffic modelling

Zervas, G., Nejabati, R., Campi, A., Qin, Y., Simeonidou, D., Callegati, F., O'Mahony, M., Reed, M. and Yu, S., (2007). Demonstration of a fully functional optical burst switched network with application layer resource reservation capability

Lucio, GF., Reed, MJ. and Henning, ID., (2005). Improving a Local Search Technique for Network Optimization Using Inexact Forecasts

Tze-Ven Poh, Jing Jiang and Reed, MJ., (2005). Multicommodity flow optimization in support for packet-switched network traffic engineering

Kang, J. and Reed, MJ., (2005). A scalable control plane for optical-packet-switched networks

Jianghui Kang, (2005). Multi-time scale adaptive optical packet assembly based on Internet traffic prediction

Kang, J. and Reed, MJ., (2004). Traffic grooming in WDM networks using optical packet switches

Reed, MJ., (2003). MPLS label space for optical packet switched networks

Kang, J. and Reed, MJ., (2003). Traffic groondng in WDM networks using optical packet switches

Ranghui Kang and Reed, MJ., (2003). Bandwidth protection in mpls networks using p-cycle structure

Mosri, AF. and Reed, MJ., (2003). Effects of routing algorithms on the transmission of layered streaming media

Reed, MJ., (2002). Network control of optical packet switched networks using GMPLS

Reed, MJ. and Hawksford, MOJ., (1998). Acoustic echo cancellation with the fast affine projection

Reed, MJ., Hawksford, M. and Hollier, M., (1998). Error and convergence properties of the fast affine projection and least mean square echo cancellation algorithms

Reed, MJ. and Hawskford, M., (1997). Comparison of audio system nonlinear performance in Volterra space

Reed, MJ. and Hawksford, M., (1997). Non-Linear Error Correction of Horn Transducers Using a Volterra Filter

Reed, MJ. and Hawksford, M., (1996). Practical Modeling of Nonlinear Audio Systems Using the Volterra Series

Reports and Papers (2)

Al-Naday, M., Reed, MJ., Riihijärvi, J., Trossen, D., Thomos, N. and Al-Khalidi, M., (2018). fCDN: A Flexible and Efficient CDN Infrastructure without DNS Redirection or Content Reflection

AL-Naday, M., Reed, MJ., Riihijärvi, J., Trossen, D., Thomos, N. and Al-Khalidi, MQS., (2018). Service-based Fog architecture without DNS redirection

Grants and funding

2023

Net-Zero self-adaptive activation of distributed self-resilient augmented services

European Commission

2022

Emergency Lighting Products Ltd KTP (22_23 R3) - To design and implement a new generation control board into a range of emergency lighting products, using the latest developments in IoT, network security, and wireless communications technologies.

Innovate UK (formerly Technology Strategy Board)

2021

Network Attachment Inspection (NetAI)

Innovate UK (formerly Technology Strategy Board)

UltraNetAI

Innovate UK (formerly Technology Strategy Board)

CML Microcircuits KTP

Innovate UK (formerly Technology Strategy Board)

2019

MSc studentship

British Telecommunications Plc

2017

SerIoT: Secure and Safe Internet of Things

European Commission

2016

50% To develop innovative monitoring equipment for emergency lighting systems, embed knowledge of embedded systems, computer networks and network security, and create a technical Centre of Excellence.

Technology STrategy Board

50% To develop innovative monitoring equipment for emergency lighting systems, embed knowledge of embedded systems, computer networks and network security, and create a technical Centre of Excellence.

Emergency Lighting Products Ltd

2014

POINT: iP Over IcN - betTer IP?

European Commission (H2020)

2013

Understanding the benefits of wideband audio communications - BT /EPSRC - Studentship - Karis Bailey

British Telecommunications Plc

Information-centric networking for video delivery over existing and emerging ISP networks - BT /EPSRC - Studentship - Hildebrand Weisenborn

British Telecommunications Plc

2012

Assessing the performance and impact of wideband telecommunications

British Telecommunications Plc

2011

VISIONAIR

European Commission (FP7)

PMI2 Connect between Northwestern and University of Essex

British Council

EEDA - Martin Reed

Eeda

2010

Publish Subscribe Internet Technology - PURSUIT

European Commission (FP7)

2009

BT Case Studentship - Laura Carrera

British Telecommunications Plc

Contact

mjreed@essex.ac.uk
+44 (0) 1206 872479

Location:

1NW.4.18, Colchester Campus

Academic support hours:

During Autumn Term my Academic Support Hours are 09:00-10:00 on Tuesdays or 13:00-14:00 on Fridays. I will be in my office, 1NW.4.18. I can also meet on zoom by request at these times (I will check email during these support hours and respond with a link).