default search action
Mustaque Ahamad
Person information
- affiliation: Georgia Institute of Technology, Atlanta GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c116]Miuyin Yong Wong, Kevin Valakuzhy, Mustaque Ahamad, Douglas M. Blough, Fabian Monrose:
Understanding LLMs Ability to Aid Malware Analysts in Bypassing Evasion Techniques. ICMI Companion 2024: 36-40 - [c115]Miuyin Yong Wong, Matthew Landen, Frank Li, Fabian Monrose, Mustaque Ahamad:
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts. SOUPS @ USENIX Security Symposium 2024: 61-80 - [c114]Bing He, Yingchen Ma, Mustaque Ahamad, Srijan Kumar:
Corrective or Backfire: Characterizing and Predicting User Response to Social Correction. WebSci 2024: 149-158 - [i11]Bing He, Yingchen Ma, Mustaque Ahamad, Srijan Kumar:
Corrective or Backfire: Characterizing and Predicting User Response to Social Correction. CoRR abs/2403.04852 (2024) - [i10]Omar Alrawi, Miuyin Yong Wong, Athanasios Avgetidis, Kevin Valakuzhy, Boladji Vinny Adjibi, Konstantinos Karakatsanis, Mustaque Ahamad, Douglas M. Blough, Fabian Monrose, Manos Antonakakis:
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned. CoRR abs/2403.16304 (2024) - 2023
- [c113]Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang:
Combating Robocalls with Phone Virtual Assistant Mediated Interaction. USENIX Security Symposium 2023: 463-479 - [c112]Bing He, Mustaque Ahamad, Srijan Kumar:
Reinforcement Learning-based Counter-Misinformation Response Generation: A Case Study of COVID-19 Vaccine Misinformation. WWW 2023: 2698-2709 - [i9]Bing He, Mustaque Ahamad, Srijan Kumar:
Reinforcement Learning-based Counter-Misinformation Response Generation: A Case Study of COVID-19 Vaccine Misinformation. CoRR abs/2303.06433 (2023) - 2022
- [c111]Nicholas Micallef, Marcelo Sandoval-Castañeda, Adi Cohen, Mustaque Ahamad, Srijan Kumar, Nasir D. Memon:
Cross-Platform Multimodal Misinformation: Taxonomy, Characteristics and Detection for Textual Posts and Videos. ICWSM 2022: 651-662 - 2021
- [c110]Miuyin Yong Wong, Matthew Landen, Manos Antonakakis, Douglas M. Blough, Elissa M. Redmiles, Mustaque Ahamad:
An Inside Look into the Practice of Malware Analysis. CCS 2021: 3053-3069 - [c109]Zhengxian He, Mohit Narayan Rajput, Mustaque Ahamad:
Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony. DSN 2021: 519-530 - [c108]Bing He, Mustaque Ahamad, Srijan Kumar:
PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models. KDD 2021: 575-584 - [c107]Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad:
Applying Deep Learning to Combat Mass Robocalls. SP (Workshops) 2021: 63-70 - [i8]Bing He, Mustaque Ahamad, Srijan Kumar:
PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models. CoRR abs/2109.06777 (2021) - 2020
- [c106]Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad:
Towards a Practical Differentially Private Collaborative Phone Blacklisting System. ACSAC 2020: 100-115 - [c105]Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir D. Memon:
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic. IEEE BigData 2020: 748-757 - [i7]Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad:
Building a Collaborative Phone Blacklisting System with Local Differential Privacy. CoRR abs/2006.09287 (2020) - [i6]Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad:
Fighting Voice Spam with a Virtual Assistant Prototype. CoRR abs/2008.03554 (2020) - [i5]Zhengxian He, Mohit Narayan Rajput, Mustaque Ahamad:
Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony. CoRR abs/2009.10200 (2020) - [i4]Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir D. Memon:
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic. CoRR abs/2011.05773 (2020)
2010 – 2019
- 2018
- [c104]Payas Gupta, Roberto Perdisci, Mustaque Ahamad:
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. AsiaCCS 2018: 285-296 - [c103]Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta:
Towards Measuring the Effectiveness of Telephony Blacklists. NDSS 2018 - [c102]Srishti Gupta, Dhruv Kuchhal, Payas Gupta, Mustaque Ahamad, Manish Gupta, Ponnurangam Kumaraguru:
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks. WebSci 2018: 67-76 - [c101]Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, Mustaque Ahamad:
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers. WWW 2018: 319-328 - [i3]Srishti Gupta, Dhruv Kuchhal, Payas Gupta, Mustaque Ahamad, Manish Gupta, Ponnurangam Kumaraguru:
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks. CoRR abs/1804.00451 (2018) - 2017
- [c100]Merve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad:
SoK: Fraud in Telephony Networks. EuroS&P 2017: 235-250 - [c99]Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir D. Memon, Mustaque Ahamad:
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. NDSS 2017 - [i2]Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, Mustaque Ahamad:
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers. CoRR abs/1709.08331 (2017) - 2016
- [c98]Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru:
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks. SPSM@CCS 2016: 73-82 - [c97]Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad:
MobiPot: Understanding Mobile Telephony Threats with Honeycards. AsiaCCS 2016: 723-734 - [c96]Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad:
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution. ESORICS (1) 2016: 3-26 - [c95]Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
Towards Measuring and Mitigating Social Engineering Software Download Attacks. USENIX Security Symposium 2016: 773-789 - 2015
- [c94]Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad:
Phoneypot: Data-driven Understanding of Telephony Threats. NDSS 2015 - [c93]Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad:
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. USENIX Security Symposium 2015: 1025-1040 - [i1]Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru:
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks. CoRR abs/1512.07330 (2015) - 2014
- [j27]Musheer Ahmed, Mustaque Ahamad, Tushar Jaiswal:
Augmenting security and accountability within the eHealth Exchange. IBM J. Res. Dev. 58(1) (2014) - [c92]Musheer Ahmed, Mustaque Ahamad:
Combating Abuse of Health Data in the Age of eHealth Exchange. ICHI 2014: 109-118 - 2013
- [c91]Terry Nelms, Roberto Perdisci, Mustaque Ahamad:
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. USENIX Security Symposium 2013: 589-604 - 2012
- [j26]Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, Patrick Traynor:
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Techn. 12(1): 1:1-1:24 (2012) - [c90]Musheer Ahmed, Mustaque Ahamad:
Protecting health information on mobile devices. CODASPY 2012: 229-240 - [c89]Italo Dacosta, Mustaque Ahamad, Patrick Traynor:
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. ESORICS 2012: 199-216 - [c88]Daisuke Mashima, Mustaque Ahamad:
Enhancing accountability of electronic health record usage via patient-centric monitoring. IHI 2012: 409-418 - [c87]Daisuke Mashima, Mustaque Ahamad:
Enabling Robust Information Accountability in E-healthcare Systems. HealthSec 2012 - 2011
- [j25]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor:
Improving Authentication Performance of Distributed SIP Proxies. IEEE Trans. Parallel Distributed Syst. 22(11): 1804-1812 (2011) - 2010
- [c86]Terry Nelms, Mustaque Ahamad:
Packet scheduling for deep packet inspection on multi-core architectures. ANCS 2010: 21 - [c85]Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor:
PinDr0p: using single-ended audio features to determine call provenance. CCS 2010: 109-120 - [c84]Daisuke Mashima, Abhinav Srivastava, Jonathon T. Giffin, Mustaque Ahamad:
Protecting E-healthcare Client Devices against Malware and Physical Theft. HealthSec 2010
2000 – 2009
- 2009
- [c83]Daisuke Mashima, Mustaque Ahamad:
Using identity credential usage logs to detect anomalous service accesses. Digital Identity Management 2009: 73-80 - [c82]Daisuke Mashima, Mustaque Ahamad, Swagath Kannan:
User-Centric Handling of Identity Agent Compromise. ESORICS 2009: 19-36 - [c81]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor:
Improving authentication performance of distributed SIP proxies. IPTComm 2009: 1 - [e1]Mustaque Ahamad, Dorgham Sisalem, Eric Chen, Charles Consel:
Principles, Systems and Applications of IP Telecommunications. Third International Conference, IPTComm 2009, Atlanta, Georgia, USA, July 7-8, 2009. Proceedings. ACM 2009, ISBN 978-1-60558-767-7 [contents] - 2008
- [j24]Aameek Singh, Ling Liu, Mustaque Ahamad:
Privacy analysis and enhancements for data sharing in *nix systems. Int. J. Inf. Comput. Secur. 2(4): 376-410 (2008) - [c80]Jeff King, Jennifer Stoll, Michael T. Hunter, Mustaque Ahamad:
ALPACA: a lightweight platform for analyzing claim acceptability. WICOW 2008: 47-52 - [c79]Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad:
Protectit: trusted distributed services operating on sensitive data. EuroSys 2008: 137-147 - [c78]Vijay A. Balasubramaniyan, Arup Acharya, Mustaque Ahamad, Mudhakar Srivatsa, Italo Dacosta, Charles P. Wright:
SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability. ICDCS 2008: 562-572 - 2007
- [c77]Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Park:
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. CEAS 2007 - [c76]Li Xiong, Ling Liu, Mustaque Ahamad:
Countering feedback sparsity and manipulation in reputation systems. CollaborateCom 2007: 203-212 - 2006
- [j23]Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee:
Countering Security Information Overload through Alert and Packet Visualization. IEEE Computer Graphics and Applications 26(2): 60-70 (2006) - [j22]Minaxi Gupta, Mostafa H. Ammar, Mustaque Ahamad:
Trade-offs between reliability and overheads in peer-to-peer reputation tracking. Comput. Networks 50(4): 501-522 (2006) - [c75]Aameek Singh, Ling Liu, Mustaque Ahamad:
Privacy Analysis for Data Sharing in *nix Systems. USENIX ATC, General Track 2006: 249-254 - [c74]Seung Jun, Mustaque Ahamad:
FeedEx: collaborative exchange of news feeds. WWW 2006: 113-122 - 2005
- [j21]Gregory J. Conti, Mustaque Ahamad:
A Framework for Countering Denial-of-Information Attacks. IEEE Secur. Priv. 3(6): 50-56 (2005) - [c73]R. Viswanath, Mustaque Ahamad, Karsten Schwan:
Harnessing Shared Wide-area Clusters for Dynamic High End Services. CLUSTER 2005: 1-10 - [c72]Tianying Chang, Jinliang Fan, Mustaque Ahamad, George V. Popescu, Zhen Liu:
Preference-aware overlay topologies for group communication. GLOBECOM 2005: 5 - [c71]Zhiyuan Zhan, Mustaque Ahamad, Michel Raynal:
Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users. ICDCS 2005: 209-218 - [c70]Seung Jun, Mustaque Ahamad, Jun (Jim) Xu:
Robust Information Dissemination in Uncooperative Environments. ICDCS 2005: 293-302 - [c69]Gregory J. Conti, Mustaque Ahamad, Robert Norback:
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. ISI 2005: 492-497 - [c68]Tianying Chang, Mustaque Ahamad:
Improving Service Performance through Object Replication in Middleware: A Peer-to-Peer Approach. Peer-to-Peer Computing 2005: 245-252 - [c67]Seung Jun, Mustaque Ahamad:
Incentives in BitTorrent induce free riding. P2PECON@SIGCOMM 2005: 116-121 - [c66]Gregory J. Conti, Mustaque Ahamad, John T. Stasko:
Attacking information visualization system usability overloading and deceiving the human. SOUPS 2005: 89-100 - [c65]Lei Kong, Deepak J. Manohar, Mustaque Ahamad, Arun Subbiah, Michael H. Sun, Douglas M. Blough:
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance. SRDS 2005: 143-154 - [c64]Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. VizSEC 2005: 10 - 2004
- [c63]Kang Li, Calton Pu, Mustaque Ahamad:
Resisting SPAM Delivery by TCP Damping. CEAS 2004 - [c62]Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran:
Collective Endorsement and the Dissemination Problem in Malicious Environments. DSN 2004: 527-536 - [c61]Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran:
Parameterized Authentication. ESORICS 2004: 276-292 - [c60]Tianying Chang, Mustaque Ahamad:
GT-P2PRMI: Improving Middleware Performance Using Peer-to-Peer Service Replication. FTDCS 2004: 172-177 - 2003
- [j20]Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran:
Responsive Security for Stored Data. IEEE Trans. Parallel Distributed Syst. 14(9): 818-828 (2003) - [c59]Mustaque Ahamad, Michel Raynal:
Ordering vs Timeliness: Two Facets of Consistency? Future Directions in Distributed Computing 2003: 73-80 - [c58]Vinay Manivel, Mustaque Ahamad, H. Venkateswaran:
Attack resistant cache replacement for survivable services. SSRS@CCS 2003: 64-71 - [c57]Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran:
Responsive Security for Stored Data. ICDCS 2003: 146-154 - [c56]Lei Kong, Arun Subbiah, Mustaque Ahamad, Douglas M. Blough:
A Reconfigurable Byzantine Quorum Approach for the Agile Store. SRDS 2003: 219- - 2002
- [j19]Francisco J. Torres-Rojas, Mustaque Ahamad, Michel Raynal:
Real-time based strong consistency for distributed objects. Comput. Syst. Sci. Eng. 17(2): 133-142 (2002) - [j18]Mustaque Ahamad, Muthusamy Chelliah:
Flexible Robust Programming in Distributed Object Systems. IEEE Trans. Knowl. Data Eng. 14(5): 1126-1140 (2002) - [c55]Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad:
A Context-Aware Security Architecture for Emerging Applications. ACSAC 2002: 249-258 - [c54]Mustaque Ahamad, Leo Mark, Wenke Lee, Edward Omicienski, Andre dos Santos, Ling Liu, Calton Pu:
Guarding the next Internet frontier: countering denial of information attacks. NSPW 2002: 136-143 - 2001
- [c53]Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran:
A Secure and Highly Available Distributed Store for Meeting Diverse Data Storage Needs. DSN 2001: 251-260 - [c52]Matthew J. Moyer, Mustaque Ahamad:
Generalized Role-Based Access Control. ICDCS 2001: 391-398 - [c51]Vijaykumar Krishnaswamy, Mustaque Ahamad, Michel Raynal, David E. Bakken:
Shared State Consistency for Time-Sensitive Distributed Applications. ICDCS 2001: 606-614 - [c50]Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd:
Securing context-aware applications using environment roles. SACMAT 2001: 10-20 - [c49]Francisco J. Torres-Rojas, Mustaque Ahamad, Michel Raynal:
Real-Time Based Strong Consistency for Distributed Objects. WORDS 2001: 161-168 - 2000
- [c48]Vijaykumar Krishnaswamy, Ivan B. Ganev, Jaideep M. Dharap, Mustaque Ahamad:
Distributed Object Implementations for Interactive Applications. Middleware 2000: 45-70 - [c47]Sumeer Bhola, Mustaque Ahamad:
1/k phase stamping for continuous shared data (extended abstract). PODC 2000: 181-190
1990 – 1999
- 1999
- [j17]Francisco J. Torres-Rojas, Mustaque Ahamad:
Plausible Clocks: Constant Size Logical Clocks for Distributed Systems. Distributed Comput. 12(4): 179-195 (1999) - [j16]Mustaque Ahamad, Michel Raynal, Gérard Thia-Kime:
An adaptive architecture for causally consistent distributed services. Distributed Syst. Eng. 6(2): 63-70 (1999) - [j15]Mustaque Ahamad, Rammohan Kordale:
Scalable Consistency Protocols for Distributed Services. IEEE Trans. Parallel Distributed Syst. 10(9): 888-903 (1999) - [c46]John A. Zinky, Linsey O'Brien, David E. Bakken, Vijaykumar Krishnaswamy, Mustaque Ahamad:
PASS - A service for Efficient Large Scale Dissemination of Time Varying Data Using CORBA. ICDCS 1999: 496-506 - [c45]Francisco J. Torres-Rojas, Mustaque Ahamad, Michel Raynal:
Timed Consistency for Shared Distributed Objects. PODC 1999: 163-172 - [c44]Sumeer Bhola, Mustaque Ahamad:
Workload Modeling for Highly Interactive Applications. SIGMETRICS 1999: 210-211 - 1998
- [j14]Prince Kohli, Mustaque Ahamad, Karsten Schwan:
Indigo: user-level support for building distributed shared abstractions. Concurr. Pract. Exp. 10(1): 1-29 (1998) - [c43]Vijaykumar Krishnaswamy, Dan Walther, Sumeer Bhola, Ethendranath Bommaiah, George F. Riley, Brad Topol, Mustaque Ahamad:
Efficient Implementation of Java Remote Method Invocation (RMI). COOTS 1998: 19-27 - [c42]Mustaque Ahamad, Michel Raynal, Gérard Thia-Kime:
An Adaptive Protocol for Implementing Causally Consistent Distributed Services. ICDCS 1998: 86-93 - [c41]Sumeer Bhola, Bodhi Mukherjee, Sri Doddapaneni, Mustaque Ahamad:
Flexible Batching and Consistency Mechanisms for Building Interactive Groupware Applications. ICDCS 1998: 388-395 - [c40]Brad Topol, Mustaque Ahamad, John T. Stasko:
Robust State Sharing for Wide Area Distributed Applications. ICDCS 1998: 554-561 - [c39]Michel Raynal, Mustaque Ahamad:
Exploiting write semantics in implementing partially replicated causal objects. PDP 1998: 157-163 - [c38]Sumeer Bhola, Guruduth Banavar, Mustaque Ahamad:
Responsiveness and Consistency Tradoffs in Interactive Groupware. PODC 1998: 324 - [c37]G. Drew Kessler, Larry F. Hodges, Mustaque Ahamad:
RAVEL, a support system for the development of distributed, multi-user VE applications. VRAIS 1998: 260-267 - [c36]Francisco J. Torres-Rojas, Mustaque Ahamad, Michel Raynal:
Lifetime Based Consistency Protocols for Distributed Objects. DISC 1998: 378-392 - 1997
- [c35]Michel Raynal, Gérard Thia-Kime, Mustaque Ahamad:
From serializable to causal transactions for collaborative applications. EUROMICRO 1997: 314- - [c34]Richard West, Karsten Schwan, Ivan Tacic, Mustaque Ahamad:
Exploiting Temporal and Spatial Constraints on Distributed Shared Objects. ICDCS 1997: 280-287 - 1996
- [j13]Rammohan Kordale, Mustaque Ahamad, Murthy V. Devarakonda:
Object Caching in a CORBA Compliant System. Comput. Syst. 9(4): 377-404 (1996) - [c33]Rammohan Kordale, Mustaque Ahamad, Murthy V. Devarakonda:
Object Caching in a CORBA Compliant System. COOTS 1996 - [c32]Rammohan Kordale, Mustaque Ahamad:
A Scalable Technique for Implementing Multiple Consistency Levels for Distributed Objects. ICDCS 1996: 369-376 - [c31]Michel Raynal, Gérard Thia-Kime, Mustaque Ahamad:
From Serializable to Causal Transactions (Abstract). PODC 1996: 310 - [c30]Mustaque Ahamad, Sumeer Bhola, Rammohan Kordale, Francisco J. Torres-Rojas:
Scalable information sharing in large scale distributed systems. ACM SIGOPS European Workshop 1996: 149-156 - [c29]Francisco J. Torres-Rojas, Mustaque Ahamad:
Plausible Clocks: Constant Size Logical Clocks for Distributed Systems. WDAG 1996: 71-88 - 1995
- [j12]José M. Bernabéu-Aubán, Mostafa H. Ammar, Mustaque Ahamad:
Optimizing a Generalized Polling Protocol for Resource Finding over a Multiple Access Channel. Comput. Networks ISDN Syst. 27(10): 1429-1445 (1995) - [j11]Mustaque Ahamad, Gil Neiger, James E. Burns, Prince Kohli, Phillip W. Hutto:
Causal Memory: Definitions, Implementation, and Programming. Distributed Comput. 9(1): 37-49 (1995) - [c28]Prince Kohli, Mustaque Ahamad, Karsten Schwan:
Indigo: User-Level Support for Building Distributed Shared Abstractions. HPDC 1995: 130-137 - [c27]Muthusamy Chelliah, Mustaque Ahamad:
System Support for Robust Collaborative Applications. SRDS 1995: 62-71 - 1994
- [c26]Mustaque Ahamad, Ranjit John, Prince Kohli, Gil Neiger:
Causal Memory Meets the Consistency and Performance Needs of Distributed Applications. ACM SIGOPS European Workshop 1994: 45-50 - [c25]Mustaque Ahamad, Francisco J. Torres-Rojas, Rammohan Kordale, Jasjit Singh, Shawn Smith:
Detecting Mutual Consistency of Shared Objects. WMCSA 1994: 44-50 - 1993
- [c24]R. Ananthanarayanan, Mustaque Ahamad, Richard J. LeBlanc:
Coherence, Synchronization and State-sharing in Distributed Shared-memory Applications. ICPP (1) 1993: 324-331 - [c23]Prince Kohli, Gil Neiger, Mustaque Ahamad:
A Characterization of Scalable Shared Memories. ICPP (1) 1993: 332-335 - [c22]Mustaque Ahamad, Rida A. Bazzi, Ranjit John, Prince Kohli, Gil Neiger:
The Power of Processor Consistency. SPAA 1993: 251-260 - 1992
- [j10]Shun Yan Cheung, Mostafa H. Ammar, Mustaque Ahamad:
The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data. IEEE Trans. Knowl. Data Eng. 4(6): 582-592 (1992) - 1991
- [j9]José M. Bernabéu-Aubán, Mustaque Ahamad, Mostafa H. Ammar:
Resource Finding in Store-and-Forward Networks. Acta Informatica 28(7): 657-680 (1991) - [j8]Partha Dasgupta, Richard J. LeBlanc, Mustaque Ahamad, Umakishore Ramachandran:
The Clouds Distributed Operating System. Computer 24(11): 34-44 (1991) - [j7]Mustaque Ahamad, Mostafa H. Ammar, Shun Yan Cheung:
Multidimensional Voting. ACM Trans. Comput. Syst. 9(4): 399-431 (1991) - [c21]Mustaque Ahamad, Phillip W. Hutto, Ranjit John:
Implementing and programming causal distributed shared memory. ICDCS 1991: 274-281 - [c20]Mustaque Ahamad, James E. Burns, Phillip W. Hutto, Gil Neiger:
Causal Memory. WDAG 1991: 9-30 - 1990
- [j6]Mustaque Ahamad, Partha Dasgupta, Richard J. LeBlanc:
Fault-Tolerant Atomic Computations in an Object-Based Distributed System. Distributed Comput. 4: 69-80 (1990) - [c19]Luke Lin, Mustaque Ahamad:
Checkpointing and rollback-recovery in distributed object based systems. FTCS 1990: 97-104 - [c18]Phillip W. Hutto, Mustaque Ahamad:
Slow Memory: Weakening Consistency to Enchance Concurrency in Distributed Shared Memories. ICDCS 1990: 302-309 - [c17]Shun Yan Cheung, Mustaque Ahamad, Mostafa H. Ammar:
Multi-Dimensional Voting: A General Method for Implementing Synchronization in Distributed Systems. ICDCS 1990: 362-369 - [c16]Shun Yan Cheung, Mostafa H. Ammar, Mustaque Ahamad:
The Grid Protocol: A High Performance Scheme for Maintaining Replicated Data. ICDE 1990: 438-445 - [c15]José M. Bernabéu-Aubán, Mustaque Ahamad, Mostafa H. Ammar:
Resource Finding in Store-and-Forward Networks. INFOCOM 1990: 819-826 - [c14]Mustaque Ahamad, Mostafa H. Ammar, Shun Yan Cheung:
Optimizing the Performance of Quorum Consensus Replica Control Protocols. Workshop on the Management of Replicated Data 1990: 102-107
1980 – 1989
- 1989
- [j5]Partha Dasgupta, Raymond C. Chen, Sathis Menon, Mark P. Pearson, R. Ananthanarayanan, Umakishore Ramachandran, Mustaque Ahamad, Richard J. LeBlanc, William F. Appelbe, José M. Bernabéu-Aubán, Phillip W. Hutto, M. Yousef Amin Khalidi, Christopher J. Wilkenloh:
The Design and Implementation of the Clouds Distributed Operating System. Comput. Syst. 3(1): 11-46 (1989) - [j4]Shun Yan Cheung, Mustaque Ahamad, Mostafa H. Ammar:
Optimizing Vote and Quorum Assignments for Reading and Writing Replicated Data. IEEE Trans. Knowl. Data Eng. 1(3): 387-397 (1989) - [j3]Mustaque Ahamad, Mostafa H. Ammar:
Performance Characterization of Quorum-Consensus Algorithms for Replicated Data. IEEE Trans. Software Eng. 15(4): 492-501 (1989) - [c13]Nasr E. Belkeir, Mustaque Ahamad:
Low Cost Algorithms for Message Delivery in Dynamic Multicast Groups. ICDCS 1989: 110-117 - [c12]Shun Yan Cheung, Mustaque Ahamad, Mostafa H. Ammar:
Optimizing Vote and Quorum Assignments for Reading and Writing Replicated Data. ICDE 1989: 271-279 - [c11]Umakishore Ramachandran, Mustaque Ahamad, M. Yousef Amin Khalidi:
Coherence of Distributed Shared Memory: Unifying Synchronization and Data Transfer. ICPP (2) 1989: 160-169 - [c10]José M. Bernabéu-Aubán, Mostafa H. Ammar, Mustaque Ahamad:
Optimal Selection of Multicast Groups for Resource Location on a Distributed System. INFOCOM 1989: 312-321 - [c9]Mustaque Ahamad, Nasr E. Belkeir:
Using multicast communication for dynamic load balancing in local area networks. LCN 1989: 77-84 - [c8]Mustaque Ahamad, Luke Lin:
Using Checkpoints to Localize the Effects of Faults in Distributed Systems. SRDS 1989: 2-11 - [c7]José M. Bernabéu-Aubán, Mustaque Ahamad:
Applying a Path-Compression technique to Obtain an Efficient Distributed Mutual Exclusion Algorithm. WDAG 1989: 33-44 - 1988
- [c6]Mostafa H. Ammar, José M. Bernabéu-Aubán, Mustaque Ahamad:
Using hint tables to locate resources in distributed systems. INFOCOM 1988: 1050-1059 - [c5]Mustaque Ahamad, Mostafa H. Ammar, José M. Bernabéu-Aubán, M. Yousef Amin Khalidi:
Using multicast communication to locate resources in LAN-based distributed system. LCN 1988: 193-202 - 1987
- [j2]Mustaque Ahamad:
An Efficient Algorithm for Name Resolution in Computer Networks. Comput. Networks 13: 301-311 (1987) - [c4]Mustaque Ahamad, Partha Dasgupta, Richard J. LeBlanc, C. Thomas Wilkes:
Fault Tolerant Computing in Object Based Distributed Operating Systems. SRDS 1987: 115-125 - [c3]Mustaque Ahamad, Mostafa H. Ammar:
Performance Characterization of Quorum-Consensus Allgorihms for Replicated Data. SRDS 1987: 161-168 - 1985
- [j1]Mustaque Ahamad, Arthur J. Bernstein:
An Application of Name Based Addressing to Low Level Distributed Algorithms. IEEE Trans. Software Eng. 11(1): 59-67 (1985) - [c2]Mustaque Ahamad, Arthur J. Bernstein:
Multicast Communication in UNIX 4.2BSD. ICDCS 1985: 80-87 - 1984
- [c1]David Scott Warren, Mustaque Ahamad, Saumya K. Debray, Laxmikant V. Kalé:
Executing Distributed Prolog Programs on a Broadcast Network. SLP 1984: 12-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint