Search the dblp DataBase
Mohamed G. Gouda :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mohamed G. Gouda , Umeshwar Dayal Optimal Semijoin Schedules For Query Processing in Local Distributed Database Systems. [Citation Graph (12, 5)][DBLP ] SIGMOD Conference, 1981, pp:164-175 [Conf ] Hai-Yann Hwang , Umeshwar Dayal , Mohamed G. Gouda Using Semiouterjoins to Process Queries in Multidatabase Systems. [Citation Graph (3, 12)][DBLP ] PODS, 1984, pp:153-162 [Conf ] Mohamed G. Gouda , D. Body , W. Wood Global and Local Models for the Specification and Verification of Distributed Systems. [Citation Graph (0, 0)][DBLP ] Berkeley Workshop, 1979, pp:155-0 [Conf ] Anish Arora , Paul C. Attie , Michael Evangelist , Mohamed G. Gouda Convergence of Iteration Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CONCUR, 1990, pp:70-82 [Conf ] Alex X. Liu , Mohamed G. Gouda Complete Redundancy Detection in Firewalls. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:193-206 [Conf ] Anish Arora , Rajiv Ramnath , Prasun Sinha , Emre Ertin , Sandip Bapat , Vinayak Naik , Vinod Kulathumani , Hongwei Zhang , Mukundan Sridharan , Santosh Kumar , Hui Cao , Nick Seddon , Chris Anderson , Ted Herman , Chen Zhang , Nishank Trivedi , Mohamed G. Gouda , Young-ri Choi , Mikhail Nesterenko , Romil Shah , Sandeep S. Kulkarni , Mahesh Aramugam , Limin Wang , David E. Culler , Prabal Dutta , Cory Sharp , Gilman Tolle , Mike Grimmer , Bill Ferriera , Ken Parker Project ExScal (Short Abstract). [Citation Graph (0, 0)][DBLP ] DCOSS, 2005, pp:393-394 [Conf ] Mohamed G. Gouda , Alex X. Liu A Model of Stateful Firewalls and Its Properties. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:128-137 [Conf ] Alex X. Liu , Mohamed G. Gouda Diverse Firewall Design. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:595-604 [Conf ] Mohamed G. Gouda Stabilizing Client/Server Protocols without the Tears. [Citation Graph (0, 0)][DBLP ] FORTE, 1995, pp:5-19 [Conf ] Anish Arora , Mohamed G. Gouda Distributed Reset (Extended Abstract). [Citation Graph (0, 0)][DBLP ] FSTTCS, 1990, pp:316-331 [Conf ] Anish Arora , Mohamed G. Gouda Closure and Convergence: A Formulation of Fault-Tolerant Computing. [Citation Graph (0, 0)][DBLP ] FTCS, 1992, pp:396-403 [Conf ] Mohamed G. Gouda , Eric G. Manning , Yao-Tin Yu On the progress of communication between two machines. [Citation Graph (0, 0)][DBLP ] Operating Systems Engineering, 1980, pp:369-389 [Conf ] Mohamed G. Gouda , Louis E. Rosier Communicating Finite State Machines with Priority Channnels. [Citation Graph (0, 0)][DBLP ] ICALP, 1984, pp:209-221 [Conf ] Mohamed G. Gouda , Eric G. Manning Protocol Machines: A Concise Formal Model and its Automatic Implementation. [Citation Graph (0, 0)][DBLP ] ICCC, 1976, pp:346-350 [Conf ] Mohamed G. Gouda , Alex X. Liu Formal Specification and Verification of a Micropayment Protocol. [Citation Graph (0, 0)][DBLP ] ICCCN, 2004, pp:489-494 [Conf ] Anish Arora , Mohamed G. Gouda , George Varghese Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance. [Citation Graph (0, 0)][DBLP ] ICDCS, 1994, pp:424-431 [Conf ] Sarah E. Chodrow , Mohamed G. Gouda Sentries for the Execution of Concurrent Programs. [Citation Graph (0, 0)][DBLP ] ICDCS, 1996, pp:11-18 [Conf ] Jorge Arturo Cobb , Mohamed G. Gouda Group Routing without Group Routing Tables. [Citation Graph (0, 0)][DBLP ] ICDCS, 1996, pp:344-351 [Conf ] Jean-Michel Couvreur , Nissim Francez , Mohamed G. Gouda Asynchronous Unison (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICDCS, 1992, pp:486-493 [Conf ] Mohamed G. Gouda , Chin-Tser Huang , E. N. Elnozahy Key Trees and the Security of Interval Multicast. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:467-468 [Conf ] Mohamed G. Gouda , Eunjin Jung Certificate Dispersal in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:616-623 [Conf ] Mohamed G. Gouda , Alex X. Liu Firewall Design: Consistency, Completeness, and Compactness. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:320-327 [Conf ] Mohamed G. Gouda , Tommy M. McGuire Accelerated Heartbeat Protocols. [Citation Graph (0, 0)][DBLP ] ICDCS, 1998, pp:202-209 [Conf ] Chin-Tser Huang , Mohamed G. Gouda State Checksum and Its Role in System Stabilization. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:29-34 [Conf ] Chin-Tser Huang , Mohamed G. Gouda , E. N. Elnozahy Convergence of IPsec in Presence of Resets. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:22-27 [Conf ] Benjamin Kuipers , Alex X. Liu , Aashin Gautam , Mohamed G. Gouda Zmail: Zero-Sum Free Market Control of Spam. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:20-26 [Conf ] Mohamed G. Gouda , E. N. Elnozahy , Chin-Tser Huang , Tommy M. McGuire Hop Integrity in Computer Networks. [Citation Graph (0, 0)][DBLP ] ICNP, 2000, pp:3-11 [Conf ] Mohamed G. Gouda , Sanjoy Paul A wireless link protocol: design by refinement. [Citation Graph (0, 0)][DBLP ] ICNP, 1995, pp:192-200 [Conf ] Mohamed G. Gouda , Marco Schneider Maximizable Routing Metrics. [Citation Graph (0, 0)][DBLP ] ICNP, 1998, pp:71-0 [Conf ] Jorge Arturo Cobb , Mohamed G. Gouda Balanced Routing. [Citation Graph (0, 0)][DBLP ] ICNP, 1997, pp:277-284 [Conf ] Jorge Arturo Cobb , Mohamed G. Gouda , Amal El-Nahas Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks. [Citation Graph (0, 0)][DBLP ] ICNP, 1996, pp:6-13 [Conf ] Mohamed G. Gouda , Eric G. Manning On the Modelling, Analysis and Design of Protocols - A Special Class of Software Structures. [Citation Graph (0, 0)][DBLP ] ICSE, 1976, pp:256-262 [Conf ] James C. Browne , E. Allen Emerson , Mohamed G. Gouda , Daniel P. Miranker , Aloysius K. Mok , Roberto J. Bayardo Jr. , Sarah E. Chodrow , David Gadbois , F. Furman Haddix , Thomas W. Hetherington , Lance Obermeyer , Duu-Chung Tsou , Chih-Kan Wang , Rwo-Hsi Wang A New Approach to Modularity in Rule-Based Programming. [Citation Graph (0, 0)][DBLP ] ICTAI, 1994, pp:18-25 [Conf ] Mohamed G. Gouda An Example for Constructing Communicating Machines by Step-Wise Refinement. [Citation Graph (0, 0)][DBLP ] Protocol Specification, Testing, and Verification, 1983, pp:63-74 [Conf ] Alaa Youssef , Hussein M. Abdel-Wahab , Kurt Maly , Mohamed G. Gouda General and Scalable State Feedback for Multimedia Systems. [Citation Graph (0, 0)][DBLP ] ISCC, 1999, pp:187-193 [Conf ] Mohamed G. Gouda , Rodney R. Howell , Louis E. Rosier System Simulation and the Sensitivity of Self-Stabilization. [Citation Graph (0, 0)][DBLP ] MFCS, 1989, pp:249-258 [Conf ] Hongwei Zhang , Anish Arora , Young-ri Choi , Mohamed G. Gouda Reliable bursty convergecast in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2005, pp:266-276 [Conf ] Eunjin Jung , Alex X. Liu , Mohamed G. Gouda Key Bundels and Parcels: Secure Communication in Many Groups. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2003, pp:119-130 [Conf ] Rida A. Bazzi , Young-ri Choi , Mohamed G. Gouda Hop Chains: Secure Routing and the Establishment of Distinct Identities. [Citation Graph (0, 0)][DBLP ] OPODIS, 2006, pp:365-379 [Conf ] Mohamed G. Gouda , Young-ri Choi , Anish Arora Sentries and Sleepers in Sensor Networks. [Citation Graph (0, 0)][DBLP ] OPODIS, 2004, pp:384-399 [Conf ] Alex X. Liu , Mohamed G. Gouda , Huibo H. Ma , Anne H. H. Ngu Firewall Queries. [Citation Graph (0, 0)][DBLP ] OPODIS, 2004, pp:197-212 [Conf ] Mohamed G. Gouda , Young-ri Choi A State-Based Model of Sensor Protocols. [Citation Graph (0, 0)][DBLP ] OPODIS, 2005, pp:246-260 [Conf ] F. Furman Haddix , Mohamed G. Gouda A General Alternator. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2005, pp:409-413 [Conf ] Shlomi Dolev , Mohamed G. Gouda , Marco Schneider Memory Requirements for Silent Stabilization (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1996, pp:27-34 [Conf ] Mohamed G. Gouda , Chung-Kuo Chang A Technique for Proving Liveness of Communicating Finite State Machines with Examples. [Citation Graph (0, 0)][DBLP ] PODC, 1984, pp:38-49 [Conf ] Ambuj K. Singh , James H. Anderson , Mohamed G. Gouda The Elusive Atomic Register Revisited. [Citation Graph (0, 0)][DBLP ] PODC, 1987, pp:206-221 [Conf ] Mohamed G. Gouda The Two-Dimensional Window Protocol. [Citation Graph (0, 0)][DBLP ] PSTV, 1992, pp:365-379 [Conf ] Mohamed G. Gouda , Ching-Hua Chow , Simon S. Lam On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] PSTV, 1984, pp:47-56 [Conf ] Mohamed G. Gouda , Bijendra N. Jain Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies. [Citation Graph (0, 0)][DBLP ] PSTV, 1982, pp:317- [Conf ] Yao-Tin Yu , Mohamed G. Gouda Deadlock Detection for a Class of Communicating Finite State Machine. [Citation Graph (0, 0)][DBLP ] PSTV, 1982, pp:319- [Conf ] Jorge Arturo Cobb , Mohamed G. Gouda , Prathima Agrawal Protocol synchronization with sparse timestraps. [Citation Graph (0, 0)][DBLP ] PSTV, 1994, pp:169-184 [Conf ] Ching-Hua Chow , Mohamed G. Gouda , Simon S. Lam On Constructing Multi-Phase Communication Protocols. [Citation Graph (0, 0)][DBLP ] PSTV, 1984, pp:57-68 [Conf ] Anish Arora , Rajiv Ramnath , Emre Ertin , Prasun Sinha , Sandip Bapat , Vinayak Naik , Vinod Kulathumani , Hongwei Zhang , Hui Cao , Mukundan Sridharan , Santosh Kumar , Nick Seddon , Chris Anderson , Ted Herman , Nishank Trivedi , Chen Zhang , Mikhail Nesterenko , Romil Shah , Sandeep S. Kulkarni , Mahesh Aramugam , Limin Wang , Mohamed G. Gouda , Young-ri Choi , David E. Culler , Prabal Dutta , Cory Sharp , Gilman Tolle , Mike Grimmer , Bill Ferriera , Ken Parker ExScal: Elements of an Extreme Scale Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] RTCSA, 2005, pp:102-108 [Conf ] Geoffrey M. Brown , Mohamed G. Gouda , Raymond E. Miller Block Acknowledgement: Redesigning the Window Protocol. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1989, pp:128-135 [Conf ] Mohamed G. Gouda , Nicholas F. Maxemchuk , U. Mukherji , Krishan K. Sabnani Delivery and discrimination: the Seine protocol. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1988, pp:292-302 [Conf ] Mohamed G. Gouda , Khe-Sing The Modeling physical layer protocols using communicating finite state machines. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1985, pp:54-62 [Conf ] Chung Kei Wong , Mohamed G. Gouda , Simon S. Lam Secure Group Communications Using Key Graphs. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1998, pp:68-79 [Conf ] Mohamed G. Gouda A Hierarchial Controller for Concurrent Accessing of Distributed Databases. [Citation Graph (0, 0)][DBLP ] Computer Architecture for Non-Numeric Processing, 1978, pp:65-70 [Conf ] Anish Arora , Mohamed G. Gouda , Ted Herman Composite Routing Protocols. [Citation Graph (0, 0)][DBLP ] SPDP, 1990, pp:70-78 [Conf ] Mohamed G. Gouda , Michael Evangelist Convergence/response tradeoffs in concurrent systems. [Citation Graph (0, 0)][DBLP ] SPDP, 1990, pp:188-192 [Conf ] Chung-Kuo Chang , Mohamed G. Gouda Independent Recovery. [Citation Graph (0, 0)][DBLP ] SRDS, 1987, pp:93-104 [Conf ] Sarah E. Chodrow , Mohamed G. Gouda The Sentry System. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1992, pp:230-237 [Conf ] Jorge Arturo Cobb , Mohamed G. Gouda , Ravi Musunuri A Stabilizing Solution to the Stable Path Problem. [Citation Graph (0, 0)][DBLP ] Self-Stabilizing Systems, 2003, pp:169-183 [Conf ] Murat Demirbas , Anish Arora , Mohamed G. Gouda A Pursuer-Evader Game for Sensor Networks. [Citation Graph (0, 0)][DBLP ] Self-Stabilizing Systems, 2003, pp:1-16 [Conf ] Mohamed G. Gouda , Eunjin Jung Stabilizing Certificate Dispersal. [Citation Graph (0, 0)][DBLP ] Self-Stabilizing Systems, 2005, pp:140-152 [Conf ] James H. Anderson , Jae-Heon Yang , Mohamed G. Gouda The Granularity of Waiting (Extended Abstract). [Citation Graph (0, 0)][DBLP ] WDAG, 1992, pp:313-328 [Conf ] Anish Arora , Shlomi Dolev , Mohamed G. Gouda Maintaining Digital Clocks In Step. [Citation Graph (0, 0)][DBLP ] WDAG, 1991, pp:71-79 [Conf ] Anish Arora , Mohamed G. Gouda Load Balancing: An Exercise in Constrainted Convergence. [Citation Graph (0, 0)][DBLP ] WDAG, 1995, pp:183-197 [Conf ] Mohamed G. Gouda The Triumph and Tribulation of System Stabilization. [Citation Graph (0, 0)][DBLP ] WDAG, 1995, pp:1-18 [Conf ] Eunjin Jung , Ehab S. Elmallah , Mohamed G. Gouda Optimal Dispersal of Certificate Chains. [Citation Graph (0, 0)][DBLP ] DISC, 2004, pp:435-449 [Conf ] Anish Arora , Mohamed G. Gouda Delay-insensitive stabilization. [Citation Graph (0, 0)][DBLP ] WSS, 1997, pp:95-109 [Conf ] Jorge Arturo Cobb , Mohamed G. Gouda Stabilization of Routing in Directed Networks. [Citation Graph (0, 0)][DBLP ] WSS, 2001, pp:51-66 [Conf ] Mohamed G. Gouda The Theory of Weak Stabilization. [Citation Graph (0, 0)][DBLP ] WSS, 2001, pp:114-123 [Conf ] Mohamed G. Gouda , F. Furman Haddix The linear alternator. [Citation Graph (0, 0)][DBLP ] WSS, 1997, pp:31-47 [Conf ] Mohamed G. Gouda , F. Furman Haddix The alternator. [Citation Graph (0, 0)][DBLP ] WSS, 1999, pp:48-53 [Conf ] Mohamed G. Gouda , Chin-Tser Huang , Anish Arora On the Security and Vulnerability of PING. [Citation Graph (0, 0)][DBLP ] WSS, 2001, pp:124-135 [Conf ] Mohamed G. Gouda , Marco Schneider Stabilization of maximal metric trees. [Citation Graph (0, 0)][DBLP ] WSS, 1999, pp:10-17 [Conf ] Xiaozhou (Steve) Li , Yang Richard Yang , Mohamed G. Gouda , Simon S. Lam Batch rekeying for secure group communications. [Citation Graph (0, 0)][DBLP ] WWW, 2001, pp:525-534 [Conf ] James H. Anderson , Mohamed G. Gouda A New Explanation of the Glitch Phenomenon. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1991, v:28, n:4, pp:297-309 [Journal ] Shlomi Dolev , Mohamed G. Gouda , Marco Schneider Memory Requirements for Silent Stabilization. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1999, v:36, n:6, pp:447-462 [Journal ] Mohamed G. Gouda , Rodney R. Howell , Louis E. Rosier The Instability of Self-Stabilization. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1989, v:27, n:8, pp:697-724 [Journal ] Ching-Hua Chow , Mohamed G. Gouda , Simon S. Lam An exercise in constructing multi-phase communication protocols. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 1984, v:14, n:2, pp:42-49 [Journal ] George Varghese , Anish Arora , Mohamed G. Gouda Self-Stabilization by Tree Correction. [Citation Graph (0, 0)][DBLP ] Chicago J. Theor. Comput. Sci., 1997, v:1997, n:, pp:- [Journal ] Anish Arora , Prabal Dutta , Sandip Bapat , Vinod Kulathumani , Hongwei Zhang , Vinayak Naik , Vineet Mittal , Hui Cao , Murat Demirbas , Mohamed G. Gouda , Young-ri Choi , Ted Herman , Sandeep S. Kulkarni , Umamaheswaran Arumugam , Mikhail Nesterenko , Adnan Vora , Mark Miyashita A line in the sand: a wireless sensor network for target detection, classification, and tracking. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:5, pp:605-634 [Journal ] Mohamed G. Gouda Protocol Verification Made Simple: A Tutorial. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1993, v:25, n:9, pp:969-980 [Journal ] Mohamed G. Gouda , Chin-Tser Huang A secure address resolution protocol. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:1, pp:57-71 [Journal ] Mohamed G. Gouda , Ji-Yun Han Protocol Validation by Fair Progress State Exploration. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1985, v:9, n:, pp:353-361 [Journal ] Eunjin Jung , Alex X. Liu , Mohamed G. Gouda Key bundles and parcels: Secure communication in many groups. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:11, pp:1781-1798 [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda Group routing without group routing tables: an exercise in protocol design. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:14, pp:1161-1174 [Journal ] Sandeep S. Kulkarni , Mohamed G. Gouda , Anish Arora Secret instantiation in ad-hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:2, pp:200-215 [Journal ] Sandeep S. Kulkarni , Mohamed G. Gouda , Anish Arora Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:11, pp:2167- [Journal ] Mohamed G. Gouda Network Protocols Between Exact Specifications and Pragmatic Implementations. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:43- [Journal ] James E. Burns , Mohamed G. Gouda , Raymond E. Miller Stabilization and Pseudo-Stabilization. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1993, v:7, n:1, pp:35-42 [Journal ] Anish Arora , Paul C. Attie , Michael Evangelist , Mohamed G. Gouda Convergence of Iteration Systems. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1993, v:7, n:1, pp:43-53 [Journal ] Vinayak Naik , Anish Arora , Sandip Bapat , Mohamed G. Gouda Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2003, v:4, n:9, pp:- [Journal ] James H. Anderson , Mohamed G. Gouda A Criterion for Atomicity. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1992, v:4, n:3, pp:273-298 [Journal ] Mohamed G. Gouda , Eric G. Manning , Yao-Tin Yu On the Progress of Communications between Two Finite State Machines [Citation Graph (0, 0)][DBLP ] Information and Control, 1984, v:63, n:3, pp:200-216 [Journal ] James H. Anderson , Mohamed G. Gouda Atomic Semantics of Nonatomic Programs. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1988, v:28, n:2, pp:99-103 [Journal ] Chung-Kuo Chang , Mohamed G. Gouda On the Minimum Requirements for Independent Recovery in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1991, v:37, n:1, pp:1-7 [Journal ] Mohamed G. Gouda Elements of security: Closure, convergence, and protection. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2001, v:77, n:2-4, pp:109-114 [Journal ] Mohamed G. Gouda Stabilizing Observers. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:52, n:2, pp:99-103 [Journal ] Mohamed G. Gouda , Ted Herman Stabilizing Unison. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1990, v:35, n:4, pp:171-175 [Journal ] Yao-Tin Yu , Mohamed G. Gouda Unboundedness Detection for a Class of Communicating Finite-State Machines. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1983, v:17, n:5, pp:235-240 [Journal ] Hussein M. Abdel-Wahab , Mohamed G. Gouda Systems of Recall Broadcast. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1996, v:90, n:1-4, pp:1-17 [Journal ] Ambuj K. Singh , James H. Anderson , Mohamed G. Gouda The Elusive Atomic Register. [Citation Graph (0, 0)][DBLP ] J. ACM, 1994, v:41, n:2, pp:311-339 [Journal ] Chin-Tser Huang , Mohamed G. Gouda , E. N. Elnozahy Convergence of IPsec in presence of resets. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:2, pp:173-183 [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda , Deepinder P. Sidhu Hello again: Stabilization of the Hello protocol in OSPF. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2005, v:14, n:1, pp:39-57 [Journal ] Mohamed G. Gouda Self-Stabilizing Systems, Part 1. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2005, v:14, n:1, pp:1-2 [Journal ] Mohamed G. Gouda Self-Stabilizing Systems, Part 2. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2005, v:14, n:2, pp:107- [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda Stabilization of General Loop-Free Routing. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2002, v:62, n:5, pp:922-944 [Journal ] Mohamed G. Gouda , F. Furman Haddix The Stabilizing Token Ring in Three Bits. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1996, v:35, n:1, pp:43-48 [Journal ] Anish Arora , Shlomi Dolev , Mohamed G. Gouda Maintaining Digital Clocks in Step. [Citation Graph (0, 0)][DBLP ] Parallel Processing Letters, 1991, v:1, n:, pp:11-18 [Journal ] Ambuj K. Singh , Mohamed G. Gouda Rankers: A Classification of Synchronization Problems. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1993, v:21, n:3, pp:191-223 [Journal ] Mohamed G. Gouda , Louis E. Rosier Priority Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1985, v:14, n:3, pp:569-584 [Journal ] Sarah E. Chodrow , Mohamed G. Gouda Implementation of the Sentry System. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1995, v:25, n:4, pp:373-387 [Journal ] Anish Arora , Mohamed G. Gouda Distributed Reset. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1994, v:43, n:9, pp:1026-1038 [Journal ] Geoffrey M. Brown , Mohamed G. Gouda , Chuan-lin Wu Token Systems that Self-Stabilize. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1989, v:38, n:6, pp:845-852 [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda The Request Reply Family of Group Routing Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1997, v:46, n:6, pp:659-672 [Journal ] Mohamed G. Gouda , Nicholas J. Multari Stabilizing Communication Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1991, v:40, n:4, pp:448-458 [Journal ] Mehmet Hakan Karaata , Mohamed G. Gouda A Stabilizing Deactivation/Reactivation Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:7, pp:881-888 [Journal ] Ching-Hua Chow , Mohamed G. Gouda , Simon S. Lam A Discipline for Constructing Multiphase Communication Protocols [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1985, v:3, n:4, pp:315-343 [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda Flow theory. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:5, pp:661-674 [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda , Amal El-Nahas Time-shift scheduling - fair scheduling of flows in high-speed networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1998, v:6, n:3, pp:274-285 [Journal ] Mohamed G. Gouda , E. N. Elnozahy , Chin-Tser Huang , Tommy M. McGuire Hop integrity in computer networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:308-319 [Journal ] Mohamed G. Gouda , Marco Schneider Maximizable routing metrics. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2003, v:11, n:4, pp:663-675 [Journal ] Chung Kei Wong , Mohamed G. Gouda , Simon S. Lam Secure group communications using key graphs. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2000, v:8, n:1, pp:16-30 [Journal ] Mohamed G. Gouda , Chung-Kuo Chang Proving Liveness for Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1986, v:8, n:1, pp:154-182 [Journal ] Eunjin Jung , Ehab S. Elmallah , Mohamed G. Gouda Optimal Dispersal of Certificate Chains. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:4, pp:474-484 [Journal ] Anish Arora , Mohamed G. Gouda Closure and Convergence: A Foundation of Fault-Tolerant Computing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1993, v:19, n:11, pp:1015-1027 [Journal ] Mohamed G. Gouda Multiphase Stabilization. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2002, v:28, n:2, pp:201-208 [Journal ] Mohamed G. Gouda Closed Covers: To Verify Progress for Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1984, v:10, n:6, pp:846-855 [Journal ] Mohamed G. Gouda , Ted Herman Adaptive Programming. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:9, pp:911-921 [Journal ] Mohamed G. Gouda , Hui-Seng Lee Proving Liveness and Termination of Systolic Arrays Using Communication Finite State Machines. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1985, v:11, n:10, pp:1240-1251 [Journal ] Edmund L. Wong , Praveen Balasubramanian , Lorenzo Alvisi , Mohamed G. Gouda , Vitaly Shmatikov Truth in advertising: lightweight verification of route integrity. [Citation Graph (0, 0)][DBLP ] PODC, 2007, pp:147-156 [Conf ] Mohamed G. Gouda , Sandeep S. Kulkarni , Ehab S. Elmallah Logarithmic Keying of Communication Networks. [Citation Graph (0, 0)][DBLP ] SSS, 2006, pp:314-323 [Conf ] Mohamed G. Gouda , Jorge Arturo Cobb , Chin-Tser Huang Fault Masking in Tri-redundant Systems. [Citation Graph (0, 0)][DBLP ] SSS, 2006, pp:304-313 [Conf ] Mohamed G. Gouda , Yan Li The Truth System: Can a System of Lying Processes Stabilize? [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:311-324 [Conf ] Young-ri Choi , Mohamed G. Gouda Stabilization of Flood Sequencing Protocols in Sensor Networks. [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:139-153 [Conf ] Mohamed G. Gouda , Alex X. Liu , Lok M. Leung , Mohamed A. Alam SPP: An anti-phishing single password protocol. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:13, pp:3715-3726 [Journal ] Mohamed G. Gouda , Alex X. Liu Structured firewall design. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:4, pp:1106-1120 [Journal ] Hongwei Zhang , Anish Arora , Young-ri Choi , Mohamed G. Gouda Reliable bursty convergecast in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:13, pp:2560-2576 [Journal ] Mohamed G. Gouda , F. Furman Haddix The alternator. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2007, v:20, n:1, pp:21-28 [Journal ] Sources and Monitors: A Trust Model for Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language. [Citation Graph (, )][DBLP ] Projection and Division: Linear-Space Verification of Firewalls. [Citation Graph (, )][DBLP ] Key Grids: A Protocol Family for Assigning Symmetric Keys. [Citation Graph (, )][DBLP ] Linear-Time Verification of Firewalls. [Citation Graph (, )][DBLP ] IP Fast Reroute in Networks with Shared Risk Links. [Citation Graph (, )][DBLP ] Consistent Fixed Points and Negative Gain. [Citation Graph (, )][DBLP ] Brief announcement: the theory of network tracing. [Citation Graph (, )][DBLP ] Pharewell to Phishing. [Citation Graph (, )][DBLP ] Stabilization of Max-Min Fair Networks without Per-flow State. [Citation Graph (, )][DBLP ] Brief Announcement: Consistent Fixed Points and Negative Gain. [Citation Graph (, )][DBLP ] A Theory of Network Tracing. [Citation Graph (, )][DBLP ] Nash Equilibria in Stabilizing Systems. [Citation Graph (, )][DBLP ] Brief Announcement: On the Hardness of Topology Inference. [Citation Graph (, )][DBLP ] On the Power of Non-spoofing Adversaries. [Citation Graph (, )][DBLP ] The Weak Network Tracing Problem. [Citation Graph (, )][DBLP ] Verification of Distributed Firewalls. [Citation Graph (, )][DBLP ] Search in 0.053secs, Finished in 0.058secs