School of Electronic Engineering and Computer Science

Dr Athen Ma, BEng PhD


Senior Lecturer

Telephone: +44 20 7882 5153
Room Number: Engineering, Eng E101
Office Hours: Friday 15:00-17:00


Research Interests:

Please visit my personal webpage


  • Ma A (2019). Ecological networks reveal resilience of agro-ecosystems to changes in farming management. nameOfConference
  • Ma A, Bohan DA, Canard E et al. (2018). A Replicated Network Approach to ‘Big Data’ in Ecology. nameOfConference
  • Zhao L, Zhang H, O'Gorman EJ et al. (2016). Weighting and indirect effects identify keystone species in food webs.. nameOfConference
  • Lu X, Gray C, Brown LE et al. (2016). Drought rewires the cores of food webs. nameOfConference
  • Bohan DA, Landuyt D, Ma A et al. (2016). Networking Our Way to Better Ecosystem Service Provision. nameOfConference
  • Ma A, Mondragón RJ, Latora V (2015). Anatomy of funded research in science.. nameOfConference
  • Gray C, Figueroa DH, Hudson LN et al. (2015). Joining the dots: An automated method for constructing food webs from compendia of published interactions. nameOfConference
  • Poslad S, Ma A, Wang Z et al. (2015). Using a Smart City IoT to Incentivise and Target Shifts in Mobility Behaviour--Is It a Piece of Pie?. nameOfConference
  • Ma A, Mondragon RJ (2015). Rich-cores in Networks. nameOfConference
  • Gray C, Baird DJ, Baumgartner S et al. (2014). FORUM: Ecological networks: the missing links in biomonitoring science. nameOfConference
  • Mei H, Ma A, Poslad S et al. (2013). Short Term Traffic Volume Prediction for Sustainable Transportation in Urban Area. nameOfConference
  • Montoya LV, Ma A, Mondragon RJ (2013). Social Achievement and Centrality in MathOverflow. nameOfConference
  • Oshin TO, Poslad S, Ma A (2012). A Method to Evaluate the Energy-Efficiency of Wide-Area Location Determination Techniques Used by Smartphones. 2012 IEEE 15th International Conference on Computational Science and Engineering (CSE)
  • Ma A, Mondragon RJ (2012). Beyond Centrality - Finding vulnerabilities in complex networks. NetSci
  • Ma A, Mondragon RJ (2012). Evaluation of network robustness using a node tearing algorithm. nameOfConference
  • Ma A, Poslad S, Oshin TO (2012). Improving the Energy-Efficiency of GPS based Location Sensing Smartphone Applications. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
  • Pinto FC, Videira A, Ma A et al. (2011). Efficient big brother networks. IEEE EUROCOM
  • Wang Y, Shi S, Yang X et al. (2010). Bluetooth Indoor Positioning using RSSI and Least Square Estimation. International Conference on Future Computer and Communication
  • Yang X, Wu D, Wang Y et al. (2010). K-Means Based Clustering on Mobile Usage for Social Network Analysis Purpose. Advanced Information Management and Service (IMS), 2010 6th International Conference on
  • Ariffin SHS, Schormans JA, Ma AHI (2009). Application of the generalised ballot theorem for evaluation of performance in packet buffers with non-first in first out scheduling. nameOfConference
  • Wang Y, Yang X, Lu N et al. (2009). A Simulation Package for Hot-spot Traffic Relief in WCDMA Networks. ICCSA
  • Wang L, De Vial E, Tokarchuk L et al. (2009). Blue Danger: Live action gaming over Bluetooth. nameOfConference
  • DONG R, TOKARCHUK LN, MA A (2009). Digging Friendship: Paper Recommendation in Social Networks. Proceedings of Networking & Electronic Commerce Research Conference
  • Wang Y, Yang X, Ma A et al. (2009). Intelligent Resource Optimisation Using Semi-Smart Antennas in LTE OFDMA Systems. Communications Technology and Applications, 2009. ICCTA '09. IEEE International Conference on
  • Tokarchuk L, Shoop K, Ma A (2009). Using Co-presence Communities to Enhance Social Recommendation. nameOfConference
  • Chew B, Wang J, Ma A et al. (2008). Anomalous Usage in Web Applications. NAEC
  • Wang Y, Ma A, Cuthbert L et al. (2006). A Multi-agent Based Intelligent Wireless Passenger Support system. Networking and Electronic Commerce Research Conference (NAEC)
  • Wang Y, Ma A, Cuthbert L (2006). Agent Based Cooperation Control over Wireless LAN networks with Semi-Smart Antennas’, IASTED Int’l Conference on Networks and Communication Systems (NCS). IASTED Int’l Conference on Networks and Communication Systems (NCS)
  • Wang Y, Ma A, Cuthbert L (2006). An Agent-based Passenger Support System over Heterogeneous Wireless Infrastructures in an Airport Environment. IASTED International Conference on Networks and Communication Systems (NCS)
  • Wang Y, Ma A, Wu J et al. (2006). Cooperative control of WCDMA system under geographically congested situations. 4th IASTED Int’l Conference on Communications, Internet, and Information Technology (CIIT)
  • Wang Y, Ma A, Cuthbert L (2006). IEEE 802.11 WLAN load balancing using adaptive antennas and cooperative controls. IET International Conference on Wireless Mobile and Multimedia Networks Proceedings (ICWMMN 2006)
  • Ma AHI, Schormans JA (2005). Fast, stable simulation of power-law packet traffic using concatenated acceleration techniques. nameOfConference
  • Koutsouris N, Mitrou N, Wang Y et al. (2004). An agent-based system for supporting enhanced services over wireless infrastructures. CCCT'04
  • Ma A, Schormans J, Cuthbert L (2003). Aggregation technique for networks with power law traffic and application to accelerated simulation. nameOfConference
  • Leung CM, Schormans JA, Ma AHI (2002). Measurement-based queue length distribution estimation for power-law traffic. nameOfConference
  • Ma AHI, Schormans JA (2002). Hybrid technique for analysis of multiplexed power-law traffic in broadband networks. nameOfConference
  • Ma AHI, Schormans JA (2002). Accelerated simulation modelling of Power-law traffic via aggregation. ICT02
  • Ma AHI, Schormans JA (2002). Efficient simulation modelling for long range dependent traffic. RESIM’02
  • Ma AHI, Schormans JA (2001). A fast simulation method for modelling IP networks. 17th UKTS
  • Schormans JA, Pitts JM, Ma AHI et al. (2000). Accurate results for traffic engineering in the presence of LRD. 16th UKTS
  • Ma AHI, Schormans JA, Pitts JM et al. (2000). Design rules and equivalent capacity for buffering of Pareto source. nameOfConference
  • MA H, Mondragón RJ (publicationYear). Evaluation of network robustness using a node tearing algorithm. nameOfConference