default search action
Asad Amir Pirzada
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j12]Kamran Zia, Nauman Javed, Muhammad Nadeem Sial, Sohail Ahmed, Asad Amir Pirzada, Farrukh Pervez:
A Distributed Multi-Agent RL-Based Autonomous Spectrum Allocation Scheme in D2D Enabled Multi-Tier HetNets. IEEE Access 7: 6733-6745 (2019) - 2018
- [i1]Kamran Zia, Nauman Javed, Muhammad Nadeem Sial, Sohail Ahmed, Hifsa Iram, Asad Amir Pirzada:
A Survey of Conventional and Artificial Intelligence / Learning based Resource Allocation and Interference Mitigation Schemes in D2D Enabled Networks. CoRR abs/1809.08748 (2018) - 2014
- [c21]Raja Farrukh Ali, Adnan K. Kiani, Asad Amir Pirzada:
Load dependent dynamic path selection in multi-radio hybrid wireless mesh networks. WCNC 2014: 2020-2025
2000 – 2009
- 2009
- [j11]Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
AODV-HM: A Hybrid Mesh Ad-hoc On-demand Distance Vector Routing Protocol. J. Res. Pract. Inf. Technol. 41(1): 65-84 (2009) - [j10]Asad Amir Pirzada, Marius Portmann, Ryan Wishart, Jadwiga Indulska:
SafeMesh: A wireless mesh network routing protocol for incident area communications. Pervasive Mob. Comput. 5(2): 201-221 (2009) - [c20]Asad Amir Pirzada, Ryan Wishart, Marius Portmann, Jadwiga Indulska:
ALARM: An Adaptive Load-Aware Routing Metric for Hybrid Wireless Mesh Networks. ACSC 2009: 25-34 - 2008
- [j9]Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
Performance analysis of multi-radio AODV in hybrid wireless mesh networks. Comput. Commun. 31(5): 885-895 (2008) - [j8]Marius Portmann, Asad Amir Pirzada:
Wireless Mesh Networks for Public Safety and Crisis Management Applications. IEEE Internet Comput. 12(1): 18-25 (2008) - [c19]Stephan Mir, Asad Amir Pirzada, Marius Portmann:
HOVER: hybrid on-demand distance vector routing for wireless mesh networks. ACSC 2008: 63-71 - [c18]Ryan Wishart, Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
A light-weight internet gateway discovery scheme for infrastructure mesh networks. WiOpt 2008: 301-306 - 2007
- [j7]Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Dependable Dynamic Source Routing without a Trusted Third Party. J. Res. Pract. Inf. Technol. 39(1): 19-34 (2007) - [j6]Asad Amir Pirzada, Chris McDonald:
Collaborative Dynamic Source Routing using transitional trust filters. Int. J. Inf. Comput. Secur. 1(3): 278-297 (2007) - [c17]Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol. ACSC 2007: 49-58 - [c16]Asad Amir Pirzada, Ryan Wishart, Marius Portmann:
Multi-Linked AODV Routing Protocol for Wireless Mesh Networks. GLOBECOM 2007: 4925-4930 - [c15]Asad Amir Pirzada, Chris McDonald:
Trusted Greedy Perimeter Stateless Routing. ICON 2007: 206-211 - [c14]Ryan Wishart, Asad Amir Pirzada, Marius Portmann:
A Light-Weight Client Mobility Approach for Infrastructure Mesh Networks. ICON 2007: 252-258 - [c13]Asad Amir Pirzada, Ryan Wishart, Marius Portmann:
Congestion Aware Routing in Hybrid Wireless Mesh Networks. ICON 2007: 513-518 - [c12]Asad Amir Pirzada, Marius Portmann:
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks. MobiQuitous 2007: 1-5 - 2006
- [j5]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Incorporating trust and reputation in the DSR protocol for dependable routing. Comput. Commun. 29(15): 2806-2821 (2006) - [j4]Asad Amir Pirzada, Chris McDonald:
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks. Int. J. Netw. Secur. 3(2): 191-202 (2006) - [j3]Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Performance Comparison of Trust-Based Reactive Routing Protocols. IEEE Trans. Mob. Comput. 5(6): 695-710 (2006) - [j2]Asad Amir Pirzada, Chris McDonald:
Trust Establishment In Pure Ad-hoc Networks. Wirel. Pers. Commun. 37(1-2): 139-168 (2006) - [c11]Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
Performance Comparison of Multi-Path AODV and DSR Protocols in Hybrid Mesh Networks. ICON 2006: 1-6 - [c10]Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
Evaluation of multi-radio extensions to AODV for wireless mesh networks. MOBIWAC 2006: 45-51 - 2005
- [c9]Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Dependable Dynamic Source Routing without a Trusted Third Party. ACSC 2005: 79-86 - 2004
- [j1]Asad Amir Pirzada, Chris McDonald:
Performance Comparison of Reactive Routing Protocols under Attack Conditions. Int. J. Wirel. Opt. Commun. 2(2): 163-180 (2004) - [c8]Asad Amir Pirzada, Chris McDonald:
Kerberos Assisted Authentication in Mobile Ad-hoc Networks. ACSC 2004: 41-46 - [c7]Asad Amir Pirzada, Chris McDonald:
Establishing Trust In Pure Ad-hoc Networks. ACSC 2004: 47-54 - [c6]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Trusted routing in ad-hoc networks using pheromone trails. IEEE Congress on Evolutionary Computation 2004: 1938-1943 - [c5]Asad Amir Pirzada, Chris McDonald:
Trusted Route Discovery with TORA Protocol. CNSR 2004: 121-130 - [c4]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Trust-based routing for ad-hoc wireless networks. ICON 2004: 326-330 - [c3]Asad Amir Pirzada, Chris McDonald:
Secure Pervasive Computing without a Trusted Third Party. ICPS 2004: 240 - [c2]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Trusted Route Discovery with AODV Protocol. International Conference on Wireless Networks 2004: 129-135 - [c1]Asad Amir Pirzada, Chris McDonald:
Secure Routing with the DSR Protocol. Wireless Information Systems 2004: 24-33
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint