default search action
Fawad Nazir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [b1]Fawad Nazir:
Optimization and modeling of content delivery algorithms for dense mobile social networks. University of New South Wales, Sydney, Australia, 2010 - [c16]Fawad Nazir, Helmut Prendinger, Aruna Seneviratne:
Participatory Mobile Social Network Simulation Environment. ICC 2010: 1-6 - [c15]Ken-ichi Kawarabayashi, Fawad Nazir, Helmut Prendinger:
Message Duplication Reduction in Dense Mobile Social Networks. ICCCN 2010: 1-6 - [c14]Fawad Nazir, Helmut Prendinger, Aruna Seneviratne:
Participatory mobile social network simulation environment. MobiOpp 2010: 171-174
2000 – 2009
- 2009
- [c13]Fawad Nazir, Jianhua Ma, Aruna Seneviratne:
Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks. CSE (4) 2009: 1066-1073 - [c12]Fawad Nazir, Victoria S. Uren, Andriy Nikolov:
Algorithms for Generating Ontology Based Visualization from Semantic Search Results. DEXA Workshops 2009: 464-468 - 2008
- [c11]Fawad Nazir, Hideaki Takeda:
Extraction and analysis of tripartite relationships from Wikipedia. ISTAS 2008: 1-13 - 2007
- [c10]Fawad Nazir, Tallat Hussain Tarar, Faran Javed Chawla, Hiroki Suguri, Hafiz Farooq Ahmad, Arshad Ali:
Constella: A Complete IP Network Topology Discovery Solution. APNOMS 2007: 425-436 - 2006
- [c9]Fawad Nazir, Mohsan Jameel, Tallat Hussain Tarar, Hamid Abbas Burki, Hafiz Farooq Ahmad, Arshad Ali, Hiroki Suguri:
An Efficient Approach Towards IP Network Topology Discovery for Large Multi-Subnet Networks. ISCC 2006: 989-993 - [c8]Roger Les Cottrell, Connie Logg, Mahesh Chhapparia, Maxim Grigoriev, Felipe Haro, Fawad Nazir, Mark Sandford:
Evaluation of Techniques to Detect Significant Network Performance Problems using End-to-End Active Network Measurements. NOMS 2006: 85-94 - 2005
- [c7]M. Omair Shafiq, Arshad Ali, Amina Tariq, Amna Basharat, Hafiz Farooq Ahmad, Hiroki Suguri, Fawad Nazir:
A distributed services based conference planner application using software agents, grid services and web services. AAMAS 2005: 137-138 - [c6]Sajjad Haider, Fawad Nazir, Hafiz Farooq Ahmad, Hamid Abbas Burki, Hiroki Suguri, Arshad Ali:
Restriction of Network Topology Discovery within a Single Administrative Domain. Communications in Computing 2005: 222-225 - [c5]Fawad Nazir, Faran Javed Chawla, Sajjad Haider, Hafiz Farooq Ahmad, Hiroki Suguri, Arshad Ali:
Standardizing IP Network Topology Discovery through MIB Development. Communications in Computing 2005: 226-230 - [c4]Zohaib Najeeb, Fawad Nazir, Sajjad Haider, Hiroki Suguri, Hafiz Farooq Ahmad, Arshad Ali:
An intelligent self-learning algorithm for IP network topology discovery. LANMAN 2005 - 2004
- [c3]Arshad Ali, Fawad Nazir, Hamid Abbas Burki, Tallat Hussain Tarar, Hafiz Farooq Ahmad, Hiroki Suguri:
Moginma: an autonomous grid node monitoring agent. ICWI 2004: 957-960 - [c2]Aatif Kamal, Arshad Ali, Ashiq Anjum, Fawad Nazir, Hafiz Farooq Ahmad, Hamid Abbas Burki, Hiroki Suguri, Umair Ali Shah, Tallat Hussain Tarar:
Process maturity for software project outsourcing. ICWI 2004: 1095-1098 - [c1]Fawad Nazir, Hafiz Farooq Ahmad, Hamid Abbas Burki, Tallat Hussain Tarar, Arshad Ali, Hiroki Suguri:
A Resource Monitoring and Management Middleware Infrastructure for Semantic Resource Grid. SAG 2004: 188-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint