


default search action
Md Abdul Alim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Enping Zhou
, Makoto Kobayashi
, Takuya Fujihashi
, Md Abdul Alim
, Shunsuke Saruwatari
, Masahiro Nishi
, Takashi Watanabe
:
A Reliable Multicast Protocol for Streaming Services in Non-Terrestrial Networks. IEEE Access 12: 176210-176231 (2024) - [c15]Md Abdul Alim, Gilberto Berardinelli, Troels Bundgaard Sørensen, Preben E. Mogensen, Jesper Kaagaard:
Extended Spectrum Access: A Game Changer for WiFi-6E. MeditCom 2024: 347-352 - 2023
- [j14]Ishrat Zahan, Md. Kamrujjaman, Md Abdul Alim, Md. Shahidul Islam
, Taufiquar Khan
:
The evolution of resource distribution, slow diffusion, and dispersal strategies in heterogeneous populations. Frontiers Appl. Math. Stat. 9 (2023) - [j13]Kakali Chowdhury
, Md Abdul Alim
:
Mixed Convection in a Double Lid-Driven Wavy Shaped Cavity Filled with Nanofluid Subject to Magnetic Field and Internal Heat Source. J. Appl. Math. 2023: 7117186:1-7117186:13 (2023) - [c14]Frodouard Minani, Makoto Kobayashi, Takuya Fujihashi, Md Abdul Alim, Shunsuke Saruwatari, Masahiro Nishi, Takashi Watanabe:
A Fundamental Discussion on Reward-Based Reinforcement Learning for Uplink Resource Allocation in NTN. ICMU 2023: 1-6 - [i7]Sayeda Fahmida Ferdousi, Md Abdul Alim:
Effects on two semi-circular wall heaters in a rectangular enclosure containing trapezoidal heated obstacle in presence of MHD. CoRR abs/2307.04183 (2023) - 2022
- [j12]Ishrat Zahan, Md. Kamrujjaman, Md Abdul Alim, Muhammad Mohebujjaman, Taufiquar Khan
:
Dynamics of heterogeneous population due to spatially distributed parameters and an ideal free pair. Frontiers Appl. Math. Stat. 8 (2022) - [c13]Enping Zhou
, Makoto Kobayashi, Takuya Fujihashi, Md Abdul Alim
, Shunsuke Saruwatari, Masahiro Nishi, Takashi Watanabe:
Reliable Multicast Streaming for Hierarchical Non-Terrestrial Network. WINCOM 2022: 1-6 - 2020
- [j11]Md Abdul Alim
, Shunsuke Saruwatari, Takashi Watanabe
:
Asym-FDMAC: In-band full-duplex medium access control protocol for asymmetric traffic in wireless LAN. Wirel. Networks 26(2): 807-822 (2020)
2010 – 2019
- 2019
- [j10]Xiang Li
, Tianyi Pan
, Md Abdul Alim
, My T. Thai
:
Resource Allocation in Highly Dynamic Device-to-Device Communication: An Adaptive Set Multi-Cover Approach. IEEE Trans. Wirel. Commun. 18(10): 4607-4619 (2019) - 2018
- [j9]Md Abdul Alim
, Ahmet Ay, Md Mahmudul Hasan, My T. Thai
, Tamer Kahveci
:
Construction of Signaling Pathways with RNAi Data and Multiple Reference Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 15(4): 1079-1091 (2018) - [j8]Alan Kuhnle
, Md Abdul Alim
, Xiang Li, Huiling Zhang, My T. Thai
:
Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models. IEEE Trans. Comput. Soc. Syst. 5(2): 418-429 (2018) - [c12]Victoria G. Crawford, Alan Kuhnle, Md Abdul Alim, My T. Thai:
Space-Efficient and Dynamic Caching for D2D Networks of Heterogeneous Users. MASS 2018: 317-325 - [i6]Alan Kuhnle, Md Abdul Alim, Xiang Li, Huiling Zhang, My T. Thai:
Multiplex Influence Maximization in Online Social Networks with Heterogeneous Diffusion Models. CoRR abs/1802.01729 (2018) - 2017
- [j7]Md Abdul Alim
, Makoto Kobayashi
, Shunsuke Saruwatari, Takashi Watanabe
:
In-band full-duplex medium access control design for heterogeneous wireless LAN. EURASIP J. Wirel. Commun. Netw. 2017: 83 (2017) - [j6]Md Abdul Alim
, Tianyi Pan, My T. Thai, Walid Saad:
Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications. IEEE Trans. Wirel. Commun. 16(1): 551-564 (2017) - [c11]Alan Kuhnle, Tianyi Pan, Md Abdul Alim, My T. Thai:
Scalable bicriteria algorithms for the threshold activation problem in online social networks. INFOCOM 2017: 1-9 - [c10]Alan Kuhnle, Tianyi Pan, Victoria G. Crawford, Md Abdul Alim, My T. Thai:
Pseudo-Separation for Assessment of Structural Vulnerability of a Network. SIGMETRICS (Abstracts) 2017: 13-14 - [c9]Tianyi Pan, Md Abdul Alim, Xiang Li, My T. Thai:
Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks. WASA 2017: 496-508 - [c8]Md Abdul Alim, Shunsuke Saruwatari, Takashi Watanabe
:
Backscatter MAC protocol for future Internet of Things networks. WiMob 2017: 1-7 - [i5]Alan Kuhnle, Tianyi Pan, Md Abdul Alim, My T. Thai:
Scalable Bicriteria Algorithms for the Threshold Activation Problem in Online Social Networks. CoRR abs/1701.08799 (2017) - [i4]Tianyi Pan, Md Abdul Alim, Xiang Li, My T. Thai:
Vulnerability of D2D Communications from Interconnected Social Networks. CoRR abs/1702.02040 (2017) - [i3]Alan Kuhnle, Tianyi Pan, Victoria G. Crawford, Md Abdul Alim, My T. Thai:
Pseudo-Separation for Assessment of Structural Vulnerability of a Network. CoRR abs/1704.04555 (2017) - 2016
- [j5]Md Abdul Alim, Xiang Li, Nam P. Nguyen, My T. Thai, Abdelsalam Helal:
Structural Vulnerability Assessment of Community-Based Routing in Opportunistic Networks. IEEE Trans. Mob. Comput. 15(12): 3156-3170 (2016) - [j4]Huiling Zhang, Md Abdul Alim, Xiang Li, My T. Thai, Hien T. Nguyen
:
Misinformation in Online Social Networks: Detect Them All with a Limited Budget. ACM Trans. Inf. Syst. 34(3): 18:1-18:24 (2016) - [c7]Makoto Kobayashi
, Md Abdul Alim, Shunsuke Saruwatari, Takashi Watanabe
:
A basic analysis of medium access control for full-duplex WLAN. ICMU 2016: 1-6 - [c6]Md Abdul Alim, Takashi Watanabe
:
Full Duplex Medium Access Control Protocol for Asymmetric Traffic. VTC Fall 2016: 1-6 - [i2]Md Abdul Alim, Tianyi Pan, My Tra Thai, Walid Saad:
Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications. CoRR abs/1611.01582 (2016) - 2015
- [j3]Thang N. Dinh
, Nam P. Nguyen, Md Abdul Alim, My T. Thai:
A near-optimal adaptive algorithm for maximizing modularity in dynamic scale-free networks. J. Comb. Optim. 30(3): 747-767 (2015) - [c5]Md Abdul Alim, Ahmet Ay, Md Mahmudul Hasan, My T. Thai, Tamer Kahveci:
Multiple reference networks improve accuracy of signaling network construction. BCB 2015: 176-185 - [c4]Huiling Zhang, Md Abdul Alim, My T. Thai, Hien T. Nguyen
:
Monitor placement to timely detect misinformation in Online Social Networks. ICC 2015: 1152-1157 - 2014
- [j2]Nam P. Nguyen, Md Abdul Alim, Thang N. Dinh
, My T. Thai:
A method to detect communities with stability in social networks. Soc. Netw. Anal. Min. 4(1): 224 (2014) - [c3]Md Abdul Alim, Alan Kuhnle, My T. Thai:
Are communities as strong as we think? ASONAM 2014: 314-319 - [c2]Md Abdul Alim, Nam P. Nguyen, Thang N. Dinh
, My T. Thai:
Structural Vulnerability Analysis of Overlapping Communities in Complex Networks. WI-IAT (2) 2014: 5-12 - 2013
- [c1]Nam P. Nguyen, Md Abdul Alim, Yilin Shen, My T. Thai:
Assessing network vulnerability in a community structure point of view. ASONAM 2013: 231-235 - 2011
- [j1]Md Miraj Ali, Md Abdul Alim, Laek Sazzad Andallah:
Conjugate Effects of Radiation and Joule Heating on Magnetohydrodynamic Free Convection Flow along a Sphere with Heat Generation. Am. J. Comput. Math. 1(1): 18-25 (2011) - 2010
- [i1]Ijaj Md. Laisuzzaman, Nahid Imran, Abdullah Al Nahid, Md. Ziaul Amin, Md Abdul Alim:
The Framework for Implementing ECommerce: The Role of Bank and Telecom in Bangladesh. CoRR abs/1002.3333 (2010)
Coauthor Index
aka: My Tra Thai

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint