default search action
Ash Mohammad Abbas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Ash Mohammad Abbas:
An algorithm for next-level connections of users in online social networks. Iran J. Comput. Sci. 7(2): 189-201 (2024) - [j12]Ash Mohammad Abbas:
ChordC: a mobile anchor trajectory for localization in wireless sensor networks. Iran J. Comput. Sci. 7(4): 813-828 (2024) - 2022
- [j11]Ash Mohammad Abbas:
Analysis of Inflation in Perceived Marks in a Grading Algorithm. SN Comput. Sci. 3(3): 200 (2022) - 2021
- [j10]Ash Mohammad Abbas:
Social network analysis using deep learning: applications and schemes. Soc. Netw. Anal. Min. 11(1): 106 (2021) - [j9]Ash Mohammad Abbas:
Analysis of weighted centroid-based localization scheme for wireless sensor networks. Telecommun. Syst. 78(4): 595-607 (2021)
2010 – 2019
- 2017
- [j8]Ash Mohammad Abbas, Hamzah Ali Abdulrahman Qasem:
VirP: Virtual Points Based Localization Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 97(2): 2951-2970 (2017) - 2016
- [j7]Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy:
A queue state driven analysis of IEEE 802.11 DCF for ad hoc networks under non-saturation conditions. Int. J. Comput. Sci. Eng. 12(2/3): 237-253 (2016) - [c22]Hamzah Ali Abdulrahman Qasem, Ash Mohammad Abbas:
MoveRL: A Movement Region Based Location Discovery Protocol for Wireless Sensor Networks. ICTCS 2016: 24:1-24:6 - 2015
- [c21]Ash Mohammad Abbas:
TrustLP: A trust-based localization protocol for wireless sensor networks. WiOpt 2015: 529-536 - 2014
- [c20]Bashim Akram Khan, Ash Mohammad Abbas:
GoldenCrops: A software tool for analysis of a social network. ICACCI 2014: 1958-1962 - [c19]Ash Mohammad Abbas, Hamzah Ali Abdulrahman Qasem:
AnchLP: An anchor-based localization protocol for wireless sensor networks. ICACCI 2014: 2122-2128 - 2012
- [c18]Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy:
Saturation Analysis of IEEE 802.11 EDCA for Ad Hoc Networks. IC3 2012: 419-430 - [c17]Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy:
Analysis of IEEE 802.11 DCF for ad hoc networks under nonsaturation conditions. ICACCI 2012: 392-398 - 2011
- [j6]Ash Mohammad Abbas:
Analysis of Generalized Impact Factors and the Indices of Journals. J. Inf. Process. Syst. 7(2): 341-354 (2011) - [j5]Ash Mohammad Abbas:
Weighted indices for evaluating the quality of research with multiple authorship. Scientometrics 88(1): 107-131 (2011) - [c16]Ash Mohammad Abbas, Ravindra Kumar:
A Client Perceived Performance Evaluation of Web Servers. ACC (2) 2011: 307-316 - [c15]Ash Mohammad Abbas:
A Service Profile Based Service Quality Model for an Institutional Electronic Library. IC3 2011: 383-394 - [c14]Khaled Abdullah Mohammed Al Soufy, Ash Mohammad Abbas:
An Analytical Model for QoS Routing in TDMA-Based Ad Hoc Networks. IC3 2011: 426-437 - [i9]Ash Mohammad Abbas:
Resequencing: A Method for Conforming to Conventions for Sharing Credits Among Multiple Authors. CoRR abs/1101.2985 (2011) - [i8]Ash Mohammad Abbas:
An Analytical Model for Service Profile Based Service Quality of an Institutional eLibrary. CoRR abs/1102.4078 (2011) - [i7]Ash Mohammad Abbas:
uRbAn: A Multipath Routing based Architecture with Energy and Mobility Management for Quality of Service Support in Mobile Ad hoc Networks. CoRR abs/1102.5043 (2011) - [i6]Ash Mohammad Abbas:
Polynomial Weights or Generalized Geometric Weights: Yet Another Scheme for Assigning Credits to Multiple Authors. CoRR abs/1103.2848 (2011) - [i5]Ash Mohammad Abbas:
Bounds and Inequalities Relating h-Index, g-Index, e-Index and Generalized Impact Factor. CoRR abs/1103.5045 (2011) - [i4]Ash Mohammad Abbas:
Multihop Adjustment for the Number of Nodes in Contention-Based MAC Protocols for Wireless Ad hoc Networks. CoRR abs/1108.4035 (2011) - 2010
- [j4]Ash Mohammad Abbas, Bijendra Nath Jain:
Path diminution in node-disjoint multipath routing for mobile ad hoc networks is unavoidable with single route discovery. Int. J. Ad Hoc Ubiquitous Comput. 5(1): 7-21 (2010) - [j3]Ash Mohammad Abbas:
Analysis of Multiple Attempt Multipath Routing for mobile ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 5(3): 163-177 (2010) - [j2]Ash Mohammad Abbas, Øivind Kure:
Quality of Service in mobile ad hoc networks: a survey. Int. J. Ad Hoc Ubiquitous Comput. 6(2): 75-98 (2010) - [i3]Ash Mohammad Abbas:
Weighted Indices for Evaluating the Quality of Research with Multiple Authorship. CoRR abs/1010.1904 (2010) - [i2]Ash Mohammad Abbas:
Analysis of Generalized Impact Factor and Indices of Journals. CoRR abs/1011.4879 (2010) - [i1]Ash Mohammad Abbas:
Generalized Linear Weights for Sharing Credits Among Multiple Authors. CoRR abs/1012.5477 (2010)
2000 – 2009
- 2009
- [c13]Khaled Abdullah Mohammed Al Soufy, Ash Mohammad Abbas:
Enhancing bandwidth reservation guarantees for QoS routing in mobile ad hoc networks. HiPC 2009: 195-204 - 2008
- [c12]Ash Mohammad Abbas:
A Slotted and Cross-Layer Node-Disjoint Multipath Routing Protocol for Mobile Ad Hoc Networks. ICIT 2008: 165-170 - [c11]Ash Mohammad Abbas:
Overheads and Mean Route Failure Time of a Hybrid Protocol for Node-Disjoint Multipath Routing in Mobile Ad Hoc Networks. ICIT 2008: 177-182 - [c10]Ash Mohammad Abbas:
Scalability and Route Failure Time of a Hybrid Protocol for Identification of Node-Disjoint Paths in Mobile Ad Hoc Networks. ICDCIT 2008: 109-120 - [c9]Ash Mohammad Abbas:
Analysis of a hybrid protocol for identification of a maximal set of node-disjoint paths in mobile Ad hoc networks. ICON 2008: 1-7 - 2007
- [c8]Ash Mohammad Abbas, Tehzeeb Ahmed Abbasi:
An Improvement over Incremental Approach for Guaranteed Identification of Multiple Node-Disjoint Paths in Mobile Ad hoc Networks. COMSWARE 2007 - [c7]Ash Mohammad Abbas, Mansoor Alam, Bijendra Nath Jain:
Alleviating path correlation using directional antenna in node-disjoint multipath routing for mobile ad hoc networks. IWCMC 2007: 405-410 - 2006
- [j1]Ash Mohammad Abbas, Bijendra Nath Jain:
Mitigating path diminution in disjoint multipath routing for mobile ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 1(3): 137-146 (2006) - [c6]Ash Mohammad Abbas:
Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc Networks. ICIT 2006: 64-67 - [c5]Ash Mohammad Abbas, Vibhu Saujanya Sharma, Anoop Jain:
A Domain Based Prioritized Model forWeb Servers. ICIT 2006: 265-268 - [c4]Ash Mohammad Abbas, Bijendra Nath Jain:
Mitigating overheads and path correlation in node-disjoint multipath routing for mobile ad hoc networks. COMSWARE 2006: 1-7 - [c3]Ash Mohammad Abbas, Bijendra Nath Jain:
Path diminution is unavoidable in node-disjoint multipath routing with single route discovery. COMSWARE 2006: 1-10 - 2004
- [c2]Ash Mohammad Abbas, Bijendra Nath Jain:
Path diminution in disjoint multipath routing for mobile ad hoc networks. PIMRC 2004: 130-134 - 2003
- [c1]Ash Mohammad Abbas, Bijendra Nath Jain:
An Analytical Framework for Path Reliabilities in Mobile Ad Hoc Networks. ISCC 2003: 63-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 01:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint