Asad Amir Pirzada

According to our database1, Asad Amir Pirzada authored at least 33 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Distributed Multi-Agent RL-Based Autonomous Spectrum Allocation Scheme in D2D Enabled Multi-Tier HetNets.
IEEE Access, 2019

2018
A Survey of Conventional and Artificial Intelligence / Learning based Resource Allocation and Interference Mitigation Schemes in D2D Enabled Networks.
CoRR, 2018

2014
Load dependent dynamic path selection in multi-radio hybrid wireless mesh networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

2009
SafeMesh: A wireless mesh network routing protocol for incident area communications.
Pervasive Mob. Comput., 2009

AODV-HM: A Hybrid Mesh Ad-hoc On-demand Distance Vector Routing Protocol.
J. Res. Pract. Inf. Technol., 2009

ALARM: An Adaptive Load-Aware Routing Metric for Hybrid Wireless Mesh Networks.
Proceedings of the Computer Science 2009, 2009

2008
Wireless Mesh Networks for Public Safety and Crisis Management Applications.
IEEE Internet Comput., 2008

Performance analysis of multi-radio AODV in hybrid wireless mesh networks.
Comput. Commun., 2008

A light-weight internet gateway discovery scheme for infrastructure mesh networks.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

HOVER: hybrid on-demand distance vector routing for wireless mesh networks.
Proceedings of the Computer Science 2008, 2008

2007
Collaborative Dynamic Source Routing using transitional trust filters.
Int. J. Inf. Comput. Secur., 2007

Dependable Dynamic Source Routing without a Trusted Third Party.
J. Res. Pract. Inf. Technol., 2007

High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Light-Weight Client Mobility Approach for Infrastructure Mesh Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Congestion Aware Routing in Hybrid Wireless Mesh Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Trusted Greedy Perimeter Stateless Routing.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Multi-Linked AODV Routing Protocol for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
Trust Establishment In Pure Ad-hoc Networks.
Wirel. Pers. Commun., 2006

Performance Comparison of Trust-Based Reactive Routing Protocols.
IEEE Trans. Mob. Comput., 2006

Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks.
Int. J. Netw. Secur., 2006

Incorporating trust and reputation in the DSR protocol for dependable routing.
Comput. Commun., 2006

Evaluation of multi-radio extensions to AODV for wireless mesh networks.
Proceedings of the Forth ACM International Workshop on Mobility Management & Wireless Access, 2006

Performance Comparison of Multi-Path AODV and DSR Protocols in Hybrid Mesh Networks.
Proceedings of the 14th IEEE International Conference on Networks, 2006

2004
Performance Comparison of Reactive Routing Protocols under Attack Conditions.
Int. J. Wirel. Opt. Commun., 2004

Secure Routing with the DSR Protocol.
Proceedings of the Wireless Information Systems, 2004

Trusted Route Discovery with AODV Protocol.
Proceedings of the International Conference on Wireless Networks, 2004

Secure Pervasive Computing without a Trusted Third Party.
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004

Trust-based routing for ad-hoc wireless networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Trusted Route Discovery with TORA Protocol.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Trusted routing in ad-hoc networks using pheromone trails.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Establishing Trust In Pure Ad-hoc Networks.
Proceedings of the Computer Science 2004, 2004

Kerberos Assisted Authentication in Mobile Ad-hoc Networks.
Proceedings of the Computer Science 2004, 2004


  Loading...