Volgen
Mustaque Ahamad
Mustaque Ahamad
Geverifieerd e-mailadres voor cc.gatech.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Causal memory: Definitions, implementation, and programming
M Ahamad, G Neiger, JE Burns, P Kohli, PW Hutto
Distributed Computing 9 (1), 37-49, 1995
6971995
Securing context-aware applications using environment roles
MJ Covington, W Long, S Srinivasan, AK Dev, M Ahamad, GD Abowd
Proceedings of the sixth ACM symposium on Access control models and …, 2001
6532001
The grid protocol: A high performance scheme for maintaining replicated data
SY Cheung, MH Ammar, M Ahamad
IEEE Transactions on Knowledge and Data Engineering 4 (6), 582-592, 1992
4481992
Incentives in BitTorrent induce free riding
S Jun, M Ahamad
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer …, 2005
3882005
The Clouds distributed operating system
P Dasgupta, RJ LeBlanc, M Ahamad, U Ramachandran
Computer 24 (11), 34-44, 1991
3601991
A context-aware security architecture for emerging applications
MJ Covington, P Fogla, Z Zhan, M Ahamad
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2892002
Generalized role-based access control for securing future applications
MJ Covington, MJ Moyer, M Ahamad
23rd National Information Systems Security Conference, 115-125, 2000
2802000
Slow memory: Weakening consistency to enhance concurrency in distributed shared memories
PW Hutto, M Ahamad
Proceedings., 10th International Conference on Distributed Computing Systems …, 1990
2681990
The power of processor consistency
M Ahamad, RA Bazzi, R John, P Kohli, G Neiger
Proceedings of the fifth annual ACM symposium on Parallel algorithms and …, 1993
1911993
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
178*2015
Implementing and programming causal distributed shared memory
M Ahamad, PW Hutto, R John
[1991] Proceedings. 11th International Conference on Distributed Computing …, 1991
1711991
Design and implementation of the clouds distributed operating system
P Dasgupta, RC Chen, S Menon, MP Pearson, R Ananthanarayanan, ...
Computing systems 3 (1), 11-46, 1990
1601990
Performance characterization of quorum-consensus algorithms for replicated data
M Ahamad, MH Ammar
IEEE Transactions on Software Engineering 15 (4), 492-496, 1989
1531989
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
1312012
{ExecScent}: Mining for New {C&C} Domains in Live Networks with Adaptive Control Protocol Templates
T Nelms, R Perdisci, M Ahamad
22nd USENIX Security Symposium (USENIX Security 13), 589-604, 2013
1302013
Plausible clocks: constant size logical clocks for distributed systems
FJ Torres-Rojas, M Ahamad
Distributed Computing 12, 179-195, 1999
1251999
Timed consistency for shared distributed objects
FJ Torres-Rojas, M Ahamad, M Raynal
Proceedings of the eighteenth annual ACM symposium on Principles of …, 1999
1171999
Causal memory
M Ahamad, JE Burns, PW Hutto, G Neiger
Distributed Algorithms: 5th International Workshop, WDAG'91 Delphi, Greece …, 1992
1131992
Efficient Implementation of Java Remote Method Invocation (RMI).
V Krishnaswamy, D Walther, S Bhola, E Bommaiah, GF Riley, B Topol, ...
COOTS 98, 2-2, 1998
1021998
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation.
V Balasubramaniyan, M Ahamad, H Park
CEAS, 2007
1012007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20