Follow
Mustaque Ahamad
Mustaque Ahamad
Verified email at cc.gatech.edu
Title
Cited by
Cited by
Year
Securing context-aware applications using environment roles
MJ Covington, W Long, S Srinivasan, AK Dev, M Ahamad, GD Abowd
Proceedings of the sixth ACM symposium on Access control models and …, 2001
6422001
Causal memory: Definitions, implementation, and programming
M Ahamad, G Neiger, JE Burns, P Kohli, PW Hutto
Distributed Computing 9 (1), 37-49, 1995
6411995
The grid protocol: A high performance scheme for maintaining replicated data
SY Cheung, MH Ammar, M Ahamad
IEEE Transactions on Knowledge and Data Engineering 4 (6), 582-592, 1992
4351992
Incentives in BitTorrent induce free riding
S Jun, M Ahamad
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer …, 2005
3772005
The Clouds distributed operating system
P Dasgupta, RJ LeBlanc, M Ahamad, U Ramachandran
Computer 24 (11), 34-44, 1991
3551991
A context-aware security architecture for emerging applications
MJ Covington, P Fogla, Z Zhan, M Ahamad
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2872002
Generalized role-based access control for securing future applications
MJ Covington, MJ Moyer, M Ahamad
Georgia Institute of Technology, 2000
2752000
Slow memory: Weakening consistency to enhance concurrency in distributed shared memories
PW Hutto, M Ahamad
Proceedings., 10th International Conference on Distributed Computing Systems …, 1990
2571990
The power of processor consistency
M Ahamad, RA Bazzi, R John, P Kohli, G Neiger
Proceedings of the fifth annual ACM symposium on Parallel algorithms and …, 1993
1901993
Implementing and programming causal distributed shared memory
M Ahamad, PW Hutto, R John
[1991] Proceedings. 11th International Conference on Distributed Computing …, 1991
1701991
Design and implementation of the clouds distributed operating system
P Dasgupta, RC Chen, S Menon, MP Pearson, R Ananthanarayanan, ...
Computing Systems 3 (1), 11-46, 1990
1551990
Performance characterization of quorum-consensus algorithms for replicated data
M Ahamad, MH Ammar
IEEE Transactions on Software Engineering 15 (4), 492-496, 1989
1491989
Timed consistency for shared distributed objects
FJ Torres-Rojas, M Ahamad, M Raynal
Proceedings of the eighteenth annual ACM symposium on Principles of …, 1999
1211999
{ExecScent}: Mining for New {C&C} Domains in Live Networks with Adaptive Control Protocol Templates
T Nelms, R Perdisci, M Ahamad
22nd USENIX Security Symposium (USENIX Security 13), 589-604, 2013
1132013
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
1122012
Causal memory
M Ahamad, JE Burns, PW Hutto, G Neiger
International Workshop on Distributed Algorithms, 9-30, 1991
1111991
Plausible clocks: constant size logical clocks for distributed systems
FJ Torres-Rojas, M Ahamad
Distributed Computing 12 (4), 179-195, 1999
1101999
Efficient Implementation of Java Remote Method Invocation (RMI).
V Krishnaswamy, D Walther, S Bhola, E Bommaiah, GF Riley, B Topol, ...
COOTS 98, 2-2, 1998
1001998
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation.
V Balasubramaniyan, M Ahamad, H Park
CEAS, 2007
972007
Coherence of distributed shared memory- Unifying synchronization and data transfer
U Ramachandran, M Ahamad, M KHALIDI
1989 International Conference on Parallel Processing, University Park, PA, 1989
961989
The system can't perform the operation now. Try again later.
Articles 1–20