Seguir
Mustaque Ahamad
Mustaque Ahamad
Dirección de correo verificada de cc.gatech.edu
Título
Citado por
Citado por
Año
Causal memory: Definitions, implementation, and programming
M Ahamad, G Neiger, JE Burns, P Kohli, PW Hutto
Distributed Computing 9 (1), 37-49, 1995
7221995
Securing context-aware applications using environment roles
MJ Covington, W Long, S Srinivasan, AK Dev, M Ahamad, GD Abowd
Proceedings of the sixth ACM symposium on Access control models and …, 2001
6612001
The grid protocol: A high performance scheme for maintaining replicated data
SY Cheung, MH Ammar, M Ahamad
IEEE Transactions on Knowledge and Data Engineering 4 (6), 582-592, 2002
4512002
Incentives in BitTorrent induce free riding
S Jun, M Ahamad
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer …, 2005
3852005
The Clouds distributed operating system
P Dasgupta, RJ LeBlanc, M Ahamad, U Ramachandran
Computer 24 (11), 34-44, 1991
3651991
A context-aware security architecture for emerging applications
MJ Covington, P Fogla, Z Zhan, M Ahamad
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2942002
Generalized role-based access control for securing future applications
MJ Covington, MJ Moyer, M Ahamad
23rd National Information Systems Security Conference, 115-125, 2000
2872000
Slow memory: Weakening consistency to enhance concurrency in distributed shared memories
PW Hutto, M Ahamad
Proceedings., 10th International Conference on Distributed Computing Systems …, 1990
2831990
{WebWitness}: investigating, categorizing, and mitigating malware download paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
200*2015
The power of processor consistency
M Ahamad, RA Bazzi, R John, P Kohli, G Neiger
Proceedings of the fifth annual ACM symposium on Parallel algorithms and …, 1993
1971993
Implementing and programming causal distributed shared memory
M Ahamad, PW Hutto, R John
[1991] Proceedings. 11th International Conference on Distributed Computing …, 1991
1761991
Design and implementation of the clouds distributed operating system
P Dasgupta, RC Chen, S Menon, MP Pearson, R Ananthanarayanan, ...
Computing systems 3 (1), 11-46, 1990
1641990
Performance characterization of quorum-consensus algorithms for replicated data
M Ahamad, MH Ammar
IEEE Transactions on Software Engineering 15 (4), 492-496, 1989
1581989
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
1482012
{ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates
T Nelms, R Perdisci, M Ahamad
22nd USENIX Security Symposium (USENIX Security 13), 589-604, 2013
1402013
Plausible clocks: constant size logical clocks for distributed systems
FJ Torres-Rojas, M Ahamad
Distributed Computing 12, 179-195, 1999
1301999
Timed consistency for shared distributed objects
FJ Torres-Rojas, M Ahamad, M Raynal
Proceedings of the eighteenth annual ACM symposium on Principles of …, 1999
1191999
The role of the crowd in countering misinformation: A case study of the COVID-19 infodemic
N Micallef, B He, S Kumar, M Ahamad, N Memon
2020 IEEE international Conference on big data (big data), 748-757, 2020
1162020
Causal memory
M Ahamad, JE Burns, PW Hutto, G Neiger
Distributed Algorithms: 5th International Workshop, WDAG'91 Delphi, Greece …, 1992
1121992
Pindr0p: Using single-ended audio features to determine call provenance
VA Balasubramaniyan, A Poonawalla, M Ahamad, MT Hunter, P Traynor
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1052010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20