Mustaque Ahamad
Mustaque Ahamad
Verified email at
Cited by
Cited by
Causal memory: Definitions, implementation, and programming
M Ahamad, G Neiger, JE Burns, P Kohli, PW Hutto
Distributed Computing 9 (1), 37-49, 1995
Securing context-aware applications using environment roles
MJ Covington, W Long, S Srinivasan, AK Dev, M Ahamad, GD Abowd
Proceedings of the sixth ACM symposium on Access control models and …, 2001
The grid protocol: A high performance scheme for maintaining replicated data
SY Cheung, MH Ammar, M Ahamad
IEEE Transactions on Knowledge and Data Engineering 4 (6), 582-592, 1992
Incentives in BitTorrent induce free riding
S Jun, M Ahamad
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer …, 2005
The Clouds distributed operating system
P Dasgupta, RJ LeBlanc, M Ahamad, U Ramachandran
Computer 24 (11), 34-44, 1991
A context-aware security architecture for emerging applications
MJ Covington, P Fogla, Z Zhan, M Ahamad
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Generalized role-based access control for securing future applications
MJ Covington, MJ Moyer, M Ahamad
23rd National Information Systems Security Conference, 115-125, 2000
Slow memory: Weakening consistency to enhance concurrency in distributed shared memories
PW Hutto, M Ahamad
Proceedings., 10th International Conference on Distributed Computing Systems …, 1990
The power of processor consistency
M Ahamad, RA Bazzi, R John, P Kohli, G Neiger
Proceedings of the fifth annual ACM symposium on Parallel algorithms and …, 1993
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
Implementing and programming causal distributed shared memory
M Ahamad, PW Hutto, R John
[1991] Proceedings. 11th International Conference on Distributed Computing …, 1991
Design and implementation of the clouds distributed operating system
P Dasgupta, RC Chen, S Menon, MP Pearson, R Ananthanarayanan, ...
Computing systems 3 (1), 11-46, 1990
Performance characterization of quorum-consensus algorithms for replicated data
M Ahamad, MH Ammar
IEEE Transactions on Software Engineering 15 (4), 492-496, 1989
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
I Dacosta, S Chakradeo, M Ahamad, P Traynor
ACM Transactions on Internet Technology (TOIT) 12 (1), 1-24, 2012
{ExecScent}: Mining for New {C&C} Domains in Live Networks with Adaptive Control Protocol Templates
T Nelms, R Perdisci, M Ahamad
22nd USENIX Security Symposium (USENIX Security 13), 589-604, 2013
Plausible clocks: constant size logical clocks for distributed systems
FJ Torres-Rojas, M Ahamad
Distributed Computing 12, 179-195, 1999
Timed consistency for shared distributed objects
FJ Torres-Rojas, M Ahamad, M Raynal
Proceedings of the eighteenth annual ACM symposium on Principles of …, 1999
Causal memory
M Ahamad, JE Burns, PW Hutto, G Neiger
Distributed Algorithms: 5th International Workshop, WDAG'91 Delphi, Greece …, 1992
Efficient Implementation of Java Remote Method Invocation (RMI).
V Krishnaswamy, D Walther, S Bhola, E Bommaiah, GF Riley, B Topol, ...
COOTS 98, 2-2, 1998
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation.
V Balasubramaniyan, M Ahamad, H Park
CEAS, 2007
The system can't perform the operation now. Try again later.
Articles 1–20