Now showing items 1-20 of 24

    • 1/k Phase Timestamping for Replica Consistency in Interactive Collaborative Applications 

      Bhola, Sumeer Kumar; Ahamad, Mustaque (Georgia Institute of Technology, 1999)
      Interactive Collaborative applications, such as distributed virtual environments, collaborative CAD and multi-player games, are enabled by the data being shared across distributed users. The need to support such ...
    • Causal Memory: Definitions, Implementation, and Programming 

      Ahamad, Mustaque; Neiger, Gil; Kohli, Prince; Burns, James Edward; Hutto, Phillip W. (Georgia Institute of Technology, 1993)
      The abstraction of a shared memory is of growing importance in distributed computing systems. Traditional memory consistency ensures that all processes agree on a common order of all operations on memory. Unfortunately, ...
    • Causal Memory: Implementation, Programming Support and Experiences 

      John, Ranjit; Ahamad, Mustaque (Georgia Institute of Technology, 1993)
      Distributed Shared memory (DSM) has become an accepted abstraction for programming distributed systems. Although DSM simplifies the programming of distributed applications, maintaining a consistent shared memory can ...
    • A Characterization of Scalable Shared Memories 

      Kohli, Prince; Neiger, Gil; Ahamad, Mustaque (Georgia Institute of Technology, 1993)
      The traditional consistency requirements of shared memory are expensive to provide both in large scale multiprocessor systems and also in distributed systems that implement a shared memory abstraction in software. As a ...
    • A Crow or a Blackbird?: Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter 

      Balasubramaniyan, Vijay A.; Maheswaran, Arjun; Mahalingam, Viswanathan; Ahamad, Mustaque; Venkateswaran, H. (Georgia Institute of Technology, 2010)
      The growing popularity of Twitter and its ability to enable near instantaneous sharing of information has made it a target of attacks by malicious entities who use it to spam and provide links to malware. There is evidence ...
    • The Design Space for Data Replication Algorithms in Interactive Groupware 

      Bhola, Sumeer Kumar; Ahamad, Mustaque (Georgia Institute of Technology, 1998)
      Interactive (Synchronous) Groupware encompasses a wide range of applications, like collaborative whiteboards, text editors, engineering CAD (Computer Aided Design), Distributed Virtual Environments, and multi-player games. ...
    • Distributed Laboratories: A Research Proposal 

      Fujimoto, Richard M.; Schwan, Karsten; Ahamad, Mustaque; Hudson, Scott E.; Limb, J. O. (John O.); Ammar, Mostafa H. (Mostafa Hamed); Ezquerra, Norberto F.; Mukherjee, Amarnath; Potts, Colin; Ramachandran, Umakishore; Zegura, Ellen W. (Georgia Institute of Technology, 1996)
      The continuing merger of computer and communication technologies is leading to a new computing/communications infrastructure of unprecedented magnitude, enabling new applications with broad economic and social impact. Yet, ...
    • Enabling Interactive Applications over the Internet 

      Krishnaswamy, Vijaykumar; Ganev, Ivan Borissov; Dharap, Jaideep M.; Ahamad, Mustaque (Georgia Institute of Technology, 1999)
      As computers become pervasive in the home and community and homes become better connected, new applications will be deployed over the Internet. Interactive Distributed Applications involve users in multiple locations, across ...
    • Evaluation of Causal Distributed Shared Memory for Data-race-free Programs 

      John, Ranjit; Ahamad, Mustaque (Georgia Institute of Technology, 1994)
      Distributed Shared Memory (DSM) is becoming an accepted abstraction for programming distributed systems. Although DSM simplifies the programming of distributed applications, maintaining a consistent view of shared ...
    • An Evaluation of State Sharing Techniques in Distributed Operating Systems 

      John, Ranjit; Ahamad, Mustaque; Ramachandran, Umakishore; Ananthanarayanan, R. (Rajagopal); Mohindra, Ajay (Georgia Institute of Technology, 1993)
      A shared memory abstraction in distributed systems (DSM) provides ease of programming but could be costly to implement. Many protocols have been proposed recently that are based on different approaches for exploiting ...
    • Exploiting Temporal and Spatial Constraints on Distributed Shared Objects 

      West, Richard; Schwan, Karsten; Tacic, Ivan; Ahamad, Mustaque (Georgia Institute of Technology, 1996)
      The advent of gigabit network technologies has made it possible to combine sets of uni- and multiprocessor workstations into a distributed, massively-parallel computer system. Middleware, such as distributed shared objects ...
    • Generalized Role-Based Access Control for Securing Future Applications 

      Covington, Michael J.; Moyer, Matthew James; Ahamad, Mustaque (Georgia Institute of Technology, 2000)
      As computing technology becomes more pervasive and broadband services are deployed into residential communities, new applications will emerge for the home and community environment. These applications will assist people ...
    • Indigo: User-level Support for Building Distributed Shared Abstractions 

      Kohli, Prince; Ahamad, Mustaque; Schwan, Karsten (Georgia Institute of Technology, 1994)
      Distributed systems that consist of workstations connected by high performance interconnects offer computational power comparable to moderate size parallel machines. Middleware like Distributed Shared Memory (DSM) or ...
    • Multi-Model Fault-Tolerant Programming in Distributed Object-Based Systems 

      Chelliah, Muthusamy; Ahamad, Mustaque (Georgia Institute of Technology, 1993)
      Many transaction models, and computation replication schemes based on such models have been proposed in the literature. All these techniques for software fault tolerance, referred to herein as action models, provide data ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The most recommended defense against this threat is to completely replace HTTP with HTTPS. ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2012-02)
      HTTP cookies are the de facto mechanism for session authentication in web applications. However, their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended to protect ...
    • Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials 

      Balasubramaniyan, Vijay A.; Lee, Younho; Ahamad, Mustaque (Georgia Institute of Technology, 2009)
      A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent ...
    • Responsive Security for Stored Data 

      Lakshmanan, Subramanian; Ahamad, Mustaque; Venkateswaran, H. (Georgia Institute of Technology, 2002)
      We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The store uses secret sharing schemes to ...
    • Responsiveness and Consistency Tradeoffs in Interactive Groupware 

      Bhola, Sumeer Kumar; Banavar, Guruduth S.; Ahamad, Mustaque (Georgia Institute of Technology, 1998)
      Interactive (or Synchronous) groupware is increasingly being deployed in widely distributed environments. Users of such applications are accustomed to direct manipulation interfaces that require fast response time. The ...
    • Robust State Sharing for Wide Area Distributed Applications 

      Topol, Brad Byer; Ahamad, Mustaque; Stasko, John T. (Georgia Institute of Technology, 1997)
      In this article, we present the Mocha wide area computing infrastructure we are currently developing. Mocha provides support for robust shared objects on heterogeneous platforms, and utilizes advanced distributed shared ...