Now showing items 1-20 of 48

    • 1/k Phase Timestamping for Replica Consistency in Interactive Collaborative Applications 

      Bhola, Sumeer Kumar; Ahamad, Mustaque (Georgia Institute of Technology, 1999)
      Interactive Collaborative applications, such as distributed virtual environments, collaborative CAD and multi-player games, are enabled by the data being shared across distributed users. The need to support such ...
    • The 2008 GTISC Security Summit - Emerging Cyber Security Threats 

      Ahamad, Mustaque; Goodman, Seymour E.; Rouland, Christopher Jay; Elder, Robert J., Jr.; Kwon, Mischel; Lee, Wenke; Moore, Morris; Noonan, Thomas E.; Ramsey, Jon; Ransome, James; Thompson, Heath (Georgia Institute of Technology, 2008-10-15)
      Welcome address by Mustaque Ahamad, Director, Georgia Tech Information Security Center, Professor, College of Computing. Opening remarks by Sy Goodman, Professor and Co-Director, Center for International Strategy, Technology, ...
    • A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications 

      Wang, Qingyang (Georgia Institute of Technology, 2014-06-27)
      An essential requirement of cloud computing or data centers is to simultaneously achieve good performance and high utilization for cost efficiency. High utilization through virtualization and hardware resource sharing is ...
    • Building data-centric security mechanisms for web applications 

      Mundada, Yogesh (Georgia Institute of Technology, 2016-04-08)
      Data loss from web applications at different points of compromise has become a major liability in recent years. Existing security guidelines, policies, and tools fail often, ostensibly for reasons stemming from blatant ...
    • Causal Memory: Definitions, Implementation, and Programming 

      Ahamad, Mustaque; Neiger, Gil; Kohli, Prince; Burns, James Edward; Hutto, Phillip W. (Georgia Institute of Technology, 1993)
      The abstraction of a shared memory is of growing importance in distributed computing systems. Traditional memory consistency ensures that all processes agree on a common order of all operations on memory. Unfortunately, ...
    • Causal Memory: Implementation, Programming Support and Experiences 

      John, Ranjit; Ahamad, Mustaque (Georgia Institute of Technology, 1993)
      Distributed Shared memory (DSM) has become an accepted abstraction for programming distributed systems. Although DSM simplifies the programming of distributed applications, maintaining a consistent shared memory can ...
    • A Characterization of Scalable Shared Memories 

      Kohli, Prince; Neiger, Gil; Ahamad, Mustaque (Georgia Institute of Technology, 1993)
      The traditional consistency requirements of shared memory are expensive to provide both in large scale multiprocessor systems and also in distributed systems that implement a shared memory abstraction in software. As a ...
    • Collective Endorsement and the Dissemination Problem in Malicious Environments 

      Lakshmanan, Subramanian; Manohar, Deepak J.; Ahamad, Mustaque; Venkateswaran, H. (Georgia Institute of Technology, 2004-03-08)
      We consider the problem of disseminating an update known to a set of servers to other servers in the system via a gossip protocol. Some of the servers can exhibit malicious behavior. We require that only the updates ...
    • Coordinated memory management in virtualized environments 

      Mohapatra, Dushmanta (Georgia Institute of Technology, 2015-11-16)
      Two recent advances are the primary motivating factors for the research in my dissertation. First, virtualization is no longer confined to the powerful server class machines. It has already been introduced into smart-phones ...
    • Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms 

      Palanisamy, Balaji (Georgia Institute of Technology, 2013-05-15)
      Cloud Computing represents a recent paradigm shift that enables users to share and remotely access high-powered computing resources (both infrastructure and software/services) contained in off-site data centers thereby ...
    • A Crow or a Blackbird?: Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter 

      Balasubramaniyan, Vijay A.; Maheswaran, Arjun; Mahalingam, Viswanathan; Ahamad, Mustaque; Venkateswaran, H. (Georgia Institute of Technology, 2010)
      The growing popularity of Twitter and its ability to enable near instantaneous sharing of information has made it a target of attacks by malicious entities who use it to spam and provide links to malware. There is evidence ...
    • CT-T: MedVault-ensuring security and privacy for electronic medical records 

      Blough, Douglas M.; Liu, Ling; Sainfort, Francois; Ahamad, Mustaque (Georgia Institute of Technology, 2011-08-31)
    • The Design Space for Data Replication Algorithms in Interactive Groupware 

      Bhola, Sumeer Kumar; Ahamad, Mustaque (Georgia Institute of Technology, 1998)
      Interactive (Synchronous) Groupware encompasses a wide range of applications, like collaborative whiteboards, text editors, engineering CAD (Computer Aided Design), Distributed Virtual Environments, and multi-player games. ...
    • Distributed Laboratories: A Research Proposal 

      Fujimoto, Richard M.; Schwan, Karsten; Ahamad, Mustaque; Hudson, Scott E.; Limb, J. O. (John O.); Ammar, Mostafa H. (Mostafa Hamed); Ezquerra, Norberto F.; Mukherjee, Amarnath; Potts, Colin; Ramachandran, Umakishore; Zegura, Ellen W. (Georgia Institute of Technology, 1996)
      The continuing merger of computer and communication technologies is leading to a new computing/communications infrastructure of unprecedented magnitude, enabling new applications with broad economic and social impact. Yet, ...
    • Efficient techniques for secure multiparty computation on mobile devices 

      Carter, Henry Lee (Georgia Institute of Technology, 2015-11-04)
      Smartphones are rapidly becoming a widespread computation platform, with many users relying on their mobile devices as their primary computing device. This popularity has brought about a plethora of mobile applications and ...
    • Emerging Cyber Threats Report for 2009 

      Ahamad, Mustaque; Amster, Dave; Barrett, Michael; Cross, Tom; Heron, George; Jackson, Don; King, Jeff; Lee, Wenke; Naraine, Ryan; Ollmann, Gunter; Ramsey, Jon; Schmidt, Howard A.; Traynor, Patrick (Georgia Institute of Technology, 2008-10-15)
      On October 15, 2008, the Georgia Tech Information Security Center (GTISC) hosted its annual summit on emerging security threats and countermeasures affecting the digital world. At the conclusion of the event, GTISC released ...
    • Empowering bystanders to facilitate Internet censorship measurement and circumvention 

      Burnett, Samuel Read (Georgia Institute of Technology, 2014-07-02)
      Free and open exchange of information on the Internet is at risk: more than 60 countries practice some form of Internet censorship, and both the number of countries practicing censorship and the proportion of Internet users ...
    • Enabling Interactive Applications over the Internet 

      Krishnaswamy, Vijaykumar; Ganev, Ivan Borissov; Dharap, Jaideep M.; Ahamad, Mustaque (Georgia Institute of Technology, 1999)
      As computers become pervasive in the home and community and homes become better connected, new applications will be deployed over the Internet. Interactive Distributed Applications involve users in multiple locations, across ...
    • Evaluating the security of anonymized big graph/structural data 

      Ji, Shouling (Georgia Institute of Technology, 2016-01-08)
      We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a secure graph data ...
    • Evaluation of Causal Distributed Shared Memory for Data-race-free Programs 

      John, Ranjit; Ahamad, Mustaque (Georgia Institute of Technology, 1994)
      Distributed Shared Memory (DSM) is becoming an accepted abstraction for programming distributed systems. Although DSM simplifies the programming of distributed applications, maintaining a consistent view of shared ...