The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohamed G. Gouda: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohamed G. Gouda, Umeshwar Dayal
    Optimal Semijoin Schedules For Query Processing in Local Distributed Database Systems. [Citation Graph (12, 5)][DBLP]
    SIGMOD Conference, 1981, pp:164-175 [Conf]
  2. Hai-Yann Hwang, Umeshwar Dayal, Mohamed G. Gouda
    Using Semiouterjoins to Process Queries in Multidatabase Systems. [Citation Graph (3, 12)][DBLP]
    PODS, 1984, pp:153-162 [Conf]
  3. Mohamed G. Gouda, D. Body, W. Wood
    Global and Local Models for the Specification and Verification of Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Berkeley Workshop, 1979, pp:155-0 [Conf]
  4. Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda
    Convergence of Iteration Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CONCUR, 1990, pp:70-82 [Conf]
  5. Alex X. Liu, Mohamed G. Gouda
    Complete Redundancy Detection in Firewalls. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:193-206 [Conf]
  6. Anish Arora, Rajiv Ramnath, Prasun Sinha, Emre Ertin, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Mukundan Sridharan, Santosh Kumar, Hui Cao, Nick Seddon, Chris Anderson, Ted Herman, Chen Zhang, Nishank Trivedi, Mohamed G. Gouda, Young-ri Choi, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker
    Project ExScal (Short Abstract). [Citation Graph (0, 0)][DBLP]
    DCOSS, 2005, pp:393-394 [Conf]
  7. Mohamed G. Gouda, Alex X. Liu
    A Model of Stateful Firewalls and Its Properties. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:128-137 [Conf]
  8. Alex X. Liu, Mohamed G. Gouda
    Diverse Firewall Design. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:595-604 [Conf]
  9. Mohamed G. Gouda
    Stabilizing Client/Server Protocols without the Tears. [Citation Graph (0, 0)][DBLP]
    FORTE, 1995, pp:5-19 [Conf]
  10. Anish Arora, Mohamed G. Gouda
    Distributed Reset (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1990, pp:316-331 [Conf]
  11. Anish Arora, Mohamed G. Gouda
    Closure and Convergence: A Formulation of Fault-Tolerant Computing. [Citation Graph (0, 0)][DBLP]
    FTCS, 1992, pp:396-403 [Conf]
  12. Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu
    On the progress of communication between two machines. [Citation Graph (0, 0)][DBLP]
    Operating Systems Engineering, 1980, pp:369-389 [Conf]
  13. Mohamed G. Gouda, Louis E. Rosier
    Communicating Finite State Machines with Priority Channnels. [Citation Graph (0, 0)][DBLP]
    ICALP, 1984, pp:209-221 [Conf]
  14. Mohamed G. Gouda, Eric G. Manning
    Protocol Machines: A Concise Formal Model and its Automatic Implementation. [Citation Graph (0, 0)][DBLP]
    ICCC, 1976, pp:346-350 [Conf]
  15. Mohamed G. Gouda, Alex X. Liu
    Formal Specification and Verification of a Micropayment Protocol. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:489-494 [Conf]
  16. Anish Arora, Mohamed G. Gouda, George Varghese
    Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1994, pp:424-431 [Conf]
  17. Sarah E. Chodrow, Mohamed G. Gouda
    Sentries for the Execution of Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:11-18 [Conf]
  18. Jorge Arturo Cobb, Mohamed G. Gouda
    Group Routing without Group Routing Tables. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:344-351 [Conf]
  19. Jean-Michel Couvreur, Nissim Francez, Mohamed G. Gouda
    Asynchronous Unison (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:486-493 [Conf]
  20. Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
    Key Trees and the Security of Interval Multicast. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:467-468 [Conf]
  21. Mohamed G. Gouda, Eunjin Jung
    Certificate Dispersal in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:616-623 [Conf]
  22. Mohamed G. Gouda, Alex X. Liu
    Firewall Design: Consistency, Completeness, and Compactness. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:320-327 [Conf]
  23. Mohamed G. Gouda, Tommy M. McGuire
    Accelerated Heartbeat Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:202-209 [Conf]
  24. Chin-Tser Huang, Mohamed G. Gouda
    State Checksum and Its Role in System Stabilization. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:29-34 [Conf]
  25. Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
    Convergence of IPsec in Presence of Resets. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:22-27 [Conf]
  26. Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda
    Zmail: Zero-Sum Free Market Control of Spam. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:20-26 [Conf]
  27. Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire
    Hop Integrity in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2000, pp:3-11 [Conf]
  28. Mohamed G. Gouda, Sanjoy Paul
    A wireless link protocol: design by refinement. [Citation Graph (0, 0)][DBLP]
    ICNP, 1995, pp:192-200 [Conf]
  29. Mohamed G. Gouda, Marco Schneider
    Maximizable Routing Metrics. [Citation Graph (0, 0)][DBLP]
    ICNP, 1998, pp:71-0 [Conf]
  30. Jorge Arturo Cobb, Mohamed G. Gouda
    Balanced Routing. [Citation Graph (0, 0)][DBLP]
    ICNP, 1997, pp:277-284 [Conf]
  31. Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
    Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 1996, pp:6-13 [Conf]
  32. Mohamed G. Gouda, Eric G. Manning
    On the Modelling, Analysis and Design of Protocols - A Special Class of Software Structures. [Citation Graph (0, 0)][DBLP]
    ICSE, 1976, pp:256-262 [Conf]
  33. James C. Browne, E. Allen Emerson, Mohamed G. Gouda, Daniel P. Miranker, Aloysius K. Mok, Roberto J. Bayardo Jr., Sarah E. Chodrow, David Gadbois, F. Furman Haddix, Thomas W. Hetherington, Lance Obermeyer, Duu-Chung Tsou, Chih-Kan Wang, Rwo-Hsi Wang
    A New Approach to Modularity in Rule-Based Programming. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1994, pp:18-25 [Conf]
  34. Mohamed G. Gouda
    An Example for Constructing Communicating Machines by Step-Wise Refinement. [Citation Graph (0, 0)][DBLP]
    Protocol Specification, Testing, and Verification, 1983, pp:63-74 [Conf]
  35. Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, Mohamed G. Gouda
    General and Scalable State Feedback for Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 1999, pp:187-193 [Conf]
  36. Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier
    System Simulation and the Sensitivity of Self-Stabilization. [Citation Graph (0, 0)][DBLP]
    MFCS, 1989, pp:249-258 [Conf]
  37. Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda
    Reliable bursty convergecast in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:266-276 [Conf]
  38. Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
    Key Bundels and Parcels: Secure Communication in Many Groups. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:119-130 [Conf]
  39. Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda
    Hop Chains: Secure Routing and the Establishment of Distinct Identities. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2006, pp:365-379 [Conf]
  40. Mohamed G. Gouda, Young-ri Choi, Anish Arora
    Sentries and Sleepers in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2004, pp:384-399 [Conf]
  41. Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu
    Firewall Queries. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2004, pp:197-212 [Conf]
  42. Mohamed G. Gouda, Young-ri Choi
    A State-Based Model of Sensor Protocols. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2005, pp:246-260 [Conf]
  43. F. Furman Haddix, Mohamed G. Gouda
    A General Alternator. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:409-413 [Conf]
  44. Shlomi Dolev, Mohamed G. Gouda, Marco Schneider
    Memory Requirements for Silent Stabilization (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1996, pp:27-34 [Conf]
  45. Mohamed G. Gouda, Chung-Kuo Chang
    A Technique for Proving Liveness of Communicating Finite State Machines with Examples. [Citation Graph (0, 0)][DBLP]
    PODC, 1984, pp:38-49 [Conf]
  46. Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda
    The Elusive Atomic Register Revisited. [Citation Graph (0, 0)][DBLP]
    PODC, 1987, pp:206-221 [Conf]
  47. Mohamed G. Gouda
    The Two-Dimensional Window Protocol. [Citation Graph (0, 0)][DBLP]
    PSTV, 1992, pp:365-379 [Conf]
  48. Mohamed G. Gouda, Ching-Hua Chow, Simon S. Lam
    On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    PSTV, 1984, pp:47-56 [Conf]
  49. Mohamed G. Gouda, Bijendra N. Jain
    Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies. [Citation Graph (0, 0)][DBLP]
    PSTV, 1982, pp:317- [Conf]
  50. Yao-Tin Yu, Mohamed G. Gouda
    Deadlock Detection for a Class of Communicating Finite State Machine. [Citation Graph (0, 0)][DBLP]
    PSTV, 1982, pp:319- [Conf]
  51. Jorge Arturo Cobb, Mohamed G. Gouda, Prathima Agrawal
    Protocol synchronization with sparse timestraps. [Citation Graph (0, 0)][DBLP]
    PSTV, 1994, pp:169-184 [Conf]
  52. Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam
    On Constructing Multi-Phase Communication Protocols. [Citation Graph (0, 0)][DBLP]
    PSTV, 1984, pp:57-68 [Conf]
  53. Anish Arora, Rajiv Ramnath, Emre Ertin, Prasun Sinha, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Hui Cao, Mukundan Sridharan, Santosh Kumar, Nick Seddon, Chris Anderson, Ted Herman, Nishank Trivedi, Chen Zhang, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, Mohamed G. Gouda, Young-ri Choi, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker
    ExScal: Elements of an Extreme Scale Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:102-108 [Conf]
  54. Geoffrey M. Brown, Mohamed G. Gouda, Raymond E. Miller
    Block Acknowledgement: Redesigning the Window Protocol. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1989, pp:128-135 [Conf]
  55. Mohamed G. Gouda, Nicholas F. Maxemchuk, U. Mukherji, Krishan K. Sabnani
    Delivery and discrimination: the Seine protocol. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1988, pp:292-302 [Conf]
  56. Mohamed G. Gouda, Khe-Sing The
    Modeling physical layer protocols using communicating finite state machines. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1985, pp:54-62 [Conf]
  57. Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
    Secure Group Communications Using Key Graphs. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1998, pp:68-79 [Conf]
  58. Mohamed G. Gouda
    A Hierarchial Controller for Concurrent Accessing of Distributed Databases. [Citation Graph (0, 0)][DBLP]
    Computer Architecture for Non-Numeric Processing, 1978, pp:65-70 [Conf]
  59. Anish Arora, Mohamed G. Gouda, Ted Herman
    Composite Routing Protocols. [Citation Graph (0, 0)][DBLP]
    SPDP, 1990, pp:70-78 [Conf]
  60. Mohamed G. Gouda, Michael Evangelist
    Convergence/response tradeoffs in concurrent systems. [Citation Graph (0, 0)][DBLP]
    SPDP, 1990, pp:188-192 [Conf]
  61. Chung-Kuo Chang, Mohamed G. Gouda
    Independent Recovery. [Citation Graph (0, 0)][DBLP]
    SRDS, 1987, pp:93-104 [Conf]
  62. Sarah E. Chodrow, Mohamed G. Gouda
    The Sentry System. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1992, pp:230-237 [Conf]
  63. Jorge Arturo Cobb, Mohamed G. Gouda, Ravi Musunuri
    A Stabilizing Solution to the Stable Path Problem. [Citation Graph (0, 0)][DBLP]
    Self-Stabilizing Systems, 2003, pp:169-183 [Conf]
  64. Murat Demirbas, Anish Arora, Mohamed G. Gouda
    A Pursuer-Evader Game for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Self-Stabilizing Systems, 2003, pp:1-16 [Conf]
  65. Mohamed G. Gouda, Eunjin Jung
    Stabilizing Certificate Dispersal. [Citation Graph (0, 0)][DBLP]
    Self-Stabilizing Systems, 2005, pp:140-152 [Conf]
  66. James H. Anderson, Jae-Heon Yang, Mohamed G. Gouda
    The Granularity of Waiting (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    WDAG, 1992, pp:313-328 [Conf]
  67. Anish Arora, Shlomi Dolev, Mohamed G. Gouda
    Maintaining Digital Clocks In Step. [Citation Graph (0, 0)][DBLP]
    WDAG, 1991, pp:71-79 [Conf]
  68. Anish Arora, Mohamed G. Gouda
    Load Balancing: An Exercise in Constrainted Convergence. [Citation Graph (0, 0)][DBLP]
    WDAG, 1995, pp:183-197 [Conf]
  69. Mohamed G. Gouda
    The Triumph and Tribulation of System Stabilization. [Citation Graph (0, 0)][DBLP]
    WDAG, 1995, pp:1-18 [Conf]
  70. Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda
    Optimal Dispersal of Certificate Chains. [Citation Graph (0, 0)][DBLP]
    DISC, 2004, pp:435-449 [Conf]
  71. Anish Arora, Mohamed G. Gouda
    Delay-insensitive stabilization. [Citation Graph (0, 0)][DBLP]
    WSS, 1997, pp:95-109 [Conf]
  72. Jorge Arturo Cobb, Mohamed G. Gouda
    Stabilization of Routing in Directed Networks. [Citation Graph (0, 0)][DBLP]
    WSS, 2001, pp:51-66 [Conf]
  73. Mohamed G. Gouda
    The Theory of Weak Stabilization. [Citation Graph (0, 0)][DBLP]
    WSS, 2001, pp:114-123 [Conf]
  74. Mohamed G. Gouda, F. Furman Haddix
    The linear alternator. [Citation Graph (0, 0)][DBLP]
    WSS, 1997, pp:31-47 [Conf]
  75. Mohamed G. Gouda, F. Furman Haddix
    The alternator. [Citation Graph (0, 0)][DBLP]
    WSS, 1999, pp:48-53 [Conf]
  76. Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
    On the Security and Vulnerability of PING. [Citation Graph (0, 0)][DBLP]
    WSS, 2001, pp:124-135 [Conf]
  77. Mohamed G. Gouda, Marco Schneider
    Stabilization of maximal metric trees. [Citation Graph (0, 0)][DBLP]
    WSS, 1999, pp:10-17 [Conf]
  78. Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam
    Batch rekeying for secure group communications. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:525-534 [Conf]
  79. James H. Anderson, Mohamed G. Gouda
    A New Explanation of the Glitch Phenomenon. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1991, v:28, n:4, pp:297-309 [Journal]
  80. Shlomi Dolev, Mohamed G. Gouda, Marco Schneider
    Memory Requirements for Silent Stabilization. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1999, v:36, n:6, pp:447-462 [Journal]
  81. Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier
    The Instability of Self-Stabilization. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1989, v:27, n:8, pp:697-724 [Journal]
  82. Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam
    An exercise in constructing multi-phase communication protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:42-49 [Journal]
  83. George Varghese, Anish Arora, Mohamed G. Gouda
    Self-Stabilization by Tree Correction. [Citation Graph (0, 0)][DBLP]
    Chicago J. Theor. Comput. Sci., 1997, v:1997, n:, pp:- [Journal]
  84. Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed G. Gouda, Young-ri Choi, Ted Herman, Sandeep S. Kulkarni, Umamaheswaran Arumugam, Mikhail Nesterenko, Adnan Vora, Mark Miyashita
    A line in the sand: a wireless sensor network for target detection, classification, and tracking. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:5, pp:605-634 [Journal]
  85. Mohamed G. Gouda
    Protocol Verification Made Simple: A Tutorial. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1993, v:25, n:9, pp:969-980 [Journal]
  86. Mohamed G. Gouda, Chin-Tser Huang
    A secure address resolution protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:1, pp:57-71 [Journal]
  87. Mohamed G. Gouda, Ji-Yun Han
    Protocol Validation by Fair Progress State Exploration. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1985, v:9, n:, pp:353-361 [Journal]
  88. Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
    Key bundles and parcels: Secure communication in many groups. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:11, pp:1781-1798 [Journal]
  89. Jorge Arturo Cobb, Mohamed G. Gouda
    Group routing without group routing tables: an exercise in protocol design. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:14, pp:1161-1174 [Journal]
  90. Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
    Secret instantiation in ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:2, pp:200-215 [Journal]
  91. Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
    Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:11, pp:2167- [Journal]
  92. Mohamed G. Gouda
    Network Protocols Between Exact Specifications and Pragmatic Implementations. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4es, pp:43- [Journal]
  93. James E. Burns, Mohamed G. Gouda, Raymond E. Miller
    Stabilization and Pseudo-Stabilization. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1993, v:7, n:1, pp:35-42 [Journal]
  94. Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda
    Convergence of Iteration Systems. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1993, v:7, n:1, pp:43-53 [Journal]
  95. Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda
    Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:9, pp:- [Journal]
  96. James H. Anderson, Mohamed G. Gouda
    A Criterion for Atomicity. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1992, v:4, n:3, pp:273-298 [Journal]
  97. Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu
    On the Progress of Communications between Two Finite State Machines [Citation Graph (0, 0)][DBLP]
    Information and Control, 1984, v:63, n:3, pp:200-216 [Journal]
  98. James H. Anderson, Mohamed G. Gouda
    Atomic Semantics of Nonatomic Programs. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1988, v:28, n:2, pp:99-103 [Journal]
  99. Chung-Kuo Chang, Mohamed G. Gouda
    On the Minimum Requirements for Independent Recovery in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1991, v:37, n:1, pp:1-7 [Journal]
  100. Mohamed G. Gouda
    Elements of security: Closure, convergence, and protection. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:77, n:2-4, pp:109-114 [Journal]
  101. Mohamed G. Gouda
    Stabilizing Observers. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:52, n:2, pp:99-103 [Journal]
  102. Mohamed G. Gouda, Ted Herman
    Stabilizing Unison. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1990, v:35, n:4, pp:171-175 [Journal]
  103. Yao-Tin Yu, Mohamed G. Gouda
    Unboundedness Detection for a Class of Communicating Finite-State Machines. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1983, v:17, n:5, pp:235-240 [Journal]
  104. Hussein M. Abdel-Wahab, Mohamed G. Gouda
    Systems of Recall Broadcast. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1996, v:90, n:1-4, pp:1-17 [Journal]
  105. Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda
    The Elusive Atomic Register. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1994, v:41, n:2, pp:311-339 [Journal]
  106. Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
    Convergence of IPsec in presence of resets. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:2, pp:173-183 [Journal]
  107. Jorge Arturo Cobb, Mohamed G. Gouda, Deepinder P. Sidhu
    Hello again: Stabilization of the Hello protocol in OSPF. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2005, v:14, n:1, pp:39-57 [Journal]
  108. Mohamed G. Gouda
    Self-Stabilizing Systems, Part 1. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2005, v:14, n:1, pp:1-2 [Journal]
  109. Mohamed G. Gouda
    Self-Stabilizing Systems, Part 2. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2005, v:14, n:2, pp:107- [Journal]
  110. Jorge Arturo Cobb, Mohamed G. Gouda
    Stabilization of General Loop-Free Routing. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2002, v:62, n:5, pp:922-944 [Journal]
  111. Mohamed G. Gouda, F. Furman Haddix
    The Stabilizing Token Ring in Three Bits. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1996, v:35, n:1, pp:43-48 [Journal]
  112. Anish Arora, Shlomi Dolev, Mohamed G. Gouda
    Maintaining Digital Clocks in Step. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1991, v:1, n:, pp:11-18 [Journal]
  113. Ambuj K. Singh, Mohamed G. Gouda
    Rankers: A Classification of Synchronization Problems. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1993, v:21, n:3, pp:191-223 [Journal]
  114. Mohamed G. Gouda, Louis E. Rosier
    Priority Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1985, v:14, n:3, pp:569-584 [Journal]
  115. Sarah E. Chodrow, Mohamed G. Gouda
    Implementation of the Sentry System. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1995, v:25, n:4, pp:373-387 [Journal]
  116. Anish Arora, Mohamed G. Gouda
    Distributed Reset. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1994, v:43, n:9, pp:1026-1038 [Journal]
  117. Geoffrey M. Brown, Mohamed G. Gouda, Chuan-lin Wu
    Token Systems that Self-Stabilize. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1989, v:38, n:6, pp:845-852 [Journal]
  118. Jorge Arturo Cobb, Mohamed G. Gouda
    The Request Reply Family of Group Routing Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:6, pp:659-672 [Journal]
  119. Mohamed G. Gouda, Nicholas J. Multari
    Stabilizing Communication Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1991, v:40, n:4, pp:448-458 [Journal]
  120. Mehmet Hakan Karaata, Mohamed G. Gouda
    A Stabilizing Deactivation/Reactivation Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:7, pp:881-888 [Journal]
  121. Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam
    A Discipline for Constructing Multiphase Communication Protocols [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1985, v:3, n:4, pp:315-343 [Journal]
  122. Jorge Arturo Cobb, Mohamed G. Gouda
    Flow theory. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:5, pp:661-674 [Journal]
  123. Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
    Time-shift scheduling - fair scheduling of flows in high-speed networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1998, v:6, n:3, pp:274-285 [Journal]
  124. Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire
    Hop integrity in computer networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:308-319 [Journal]
  125. Mohamed G. Gouda, Marco Schneider
    Maximizable routing metrics. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:4, pp:663-675 [Journal]
  126. Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
    Secure group communications using key graphs. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2000, v:8, n:1, pp:16-30 [Journal]
  127. Mohamed G. Gouda, Chung-Kuo Chang
    Proving Liveness for Networks of Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1986, v:8, n:1, pp:154-182 [Journal]
  128. Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda
    Optimal Dispersal of Certificate Chains. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:4, pp:474-484 [Journal]
  129. Anish Arora, Mohamed G. Gouda
    Closure and Convergence: A Foundation of Fault-Tolerant Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1993, v:19, n:11, pp:1015-1027 [Journal]
  130. Mohamed G. Gouda
    Multiphase Stabilization. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:2, pp:201-208 [Journal]
  131. Mohamed G. Gouda
    Closed Covers: To Verify Progress for Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1984, v:10, n:6, pp:846-855 [Journal]
  132. Mohamed G. Gouda, Ted Herman
    Adaptive Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:9, pp:911-921 [Journal]
  133. Mohamed G. Gouda, Hui-Seng Lee
    Proving Liveness and Termination of Systolic Arrays Using Communication Finite State Machines. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1985, v:11, n:10, pp:1240-1251 [Journal]
  134. Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov
    Truth in advertising: lightweight verification of route integrity. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:147-156 [Conf]
  135. Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah
    Logarithmic Keying of Communication Networks. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:314-323 [Conf]
  136. Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang
    Fault Masking in Tri-redundant Systems. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:304-313 [Conf]
  137. Mohamed G. Gouda, Yan Li
    The Truth System: Can a System of Lying Processes Stabilize? [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:311-324 [Conf]
  138. Young-ri Choi, Mohamed G. Gouda
    Stabilization of Flood Sequencing Protocols in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:139-153 [Conf]
  139. Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam
    SPP: An anti-phishing single password protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3715-3726 [Journal]
  140. Mohamed G. Gouda, Alex X. Liu
    Structured firewall design. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:4, pp:1106-1120 [Journal]
  141. Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda
    Reliable bursty convergecast in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:13, pp:2560-2576 [Journal]
  142. Mohamed G. Gouda, F. Furman Haddix
    The alternator. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2007, v:20, n:1, pp:21-28 [Journal]

  143. Sources and Monitors: A Trust Model for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  144. DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language. [Citation Graph (, )][DBLP]


  145. Projection and Division: Linear-Space Verification of Firewalls. [Citation Graph (, )][DBLP]


  146. Key Grids: A Protocol Family for Assigning Symmetric Keys. [Citation Graph (, )][DBLP]


  147. Linear-Time Verification of Firewalls. [Citation Graph (, )][DBLP]


  148. IP Fast Reroute in Networks with Shared Risk Links. [Citation Graph (, )][DBLP]


  149. Consistent Fixed Points and Negative Gain. [Citation Graph (, )][DBLP]


  150. Brief announcement: the theory of network tracing. [Citation Graph (, )][DBLP]


  151. Pharewell to Phishing. [Citation Graph (, )][DBLP]


  152. Stabilization of Max-Min Fair Networks without Per-flow State. [Citation Graph (, )][DBLP]


  153. Brief Announcement: Consistent Fixed Points and Negative Gain. [Citation Graph (, )][DBLP]


  154. A Theory of Network Tracing. [Citation Graph (, )][DBLP]


  155. Nash Equilibria in Stabilizing Systems. [Citation Graph (, )][DBLP]


  156. Brief Announcement: On the Hardness of Topology Inference. [Citation Graph (, )][DBLP]


  157. On the Power of Non-spoofing Adversaries. [Citation Graph (, )][DBLP]


  158. The Weak Network Tracing Problem. [Citation Graph (, )][DBLP]


  159. Verification of Distributed Firewalls. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002