Distributed computing, Computer security, Distributed memory, Distributed shared memory and Shared memory are his primary areas of study. Mustaque Ahamad combines subjects such as Transaction processing, Concurrency control, Standard Operating Environment and Protocol with his study of Distributed computing. The study incorporates disciplines such as Ubiquitous computing and Internet privacy in addition to Computer security.
The various areas that Mustaque Ahamad examines in his Internet privacy study include Dissemination and Upload. Mustaque Ahamad interconnects Data diffusion machine, Uniform memory access and Flat memory model in the investigation of issues within Distributed memory. His Role-based access control research is multidisciplinary, relying on both Security policy, Technical report and Physical access.
Mustaque Ahamad mostly deals with Distributed computing, Computer security, Internet privacy, Computer network and Consistency. His Distributed computing study incorporates themes from Scalability, Distributed object, Distributed shared memory, Consistency model and Protocol. His work investigates the relationship between Distributed shared memory and topics such as Shared memory that intersect with problems in Uniform memory access and Synchronization.
Many of his studies on Computer security apply to Technical report as well. While the research belongs to areas of Internet privacy, Mustaque Ahamad spends his time largely on the problem of The Internet, intersecting his research to questions surrounding Telephony. His research investigates the connection with Consistency and areas like Replication which intersect with concerns in Service and Distributed database.
Mustaque Ahamad focuses on Internet privacy, Computer security, Telephony, The Internet and Authentication. The study incorporates disciplines such as Technical report, Information sensitivity and Social network in addition to Internet privacy. His work on Access control, Identity theft and Information security as part of general Computer security research is often related to Medical record and Data sharing, thus linking different fields of science.
His study in the field of Email spam and Domain Name System also crosses realms of Situation awareness and Public domain. His Authentication research incorporates elements of Scalability, Server, Login and Session Initiation Protocol. His Computer network study deals with Distributed computing intersecting with Orchestration.
His main research concerns Computer security, Internet privacy, Telephony, The Internet and Computer network. His work on Information security and Authentication as part of general Computer security study is frequently linked to Medical record, Hash chain and Session hijacking, bridging the gap between disciplines. The Internet privacy study combines topics in areas such as Mobile device, Control and Spoofing attack.
His work in the fields of Computer network, such as Call management, Packet loss and Call control, overlaps with other areas such as 3pcc. In his works, Mustaque Ahamad conducts interdisciplinary research on Characterization and Distributed computing. His work carried out in the field of Distributed computing brings together such families of science as Domain, Blacklist and Orchestration.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Causal memory: definitions, implementation, and programming
Mustaque Ahamad;Gil Neiger;James E. Burns;Prince Kohli.
Distributed Computing (1995)
Causal memory: definitions, implementation, and programming
Mustaque Ahamad;Gil Neiger;James E. Burns;Prince Kohli.
Distributed Computing (1995)
Securing context-aware applications using environment roles
Michael J. Covington;Wende Long;Srividhya Srinivasan;Anind K. Dev.
symposium on access control models and technologies (2001)
Securing context-aware applications using environment roles
Michael J. Covington;Wende Long;Srividhya Srinivasan;Anind K. Dev.
symposium on access control models and technologies (2001)
The grid protocol: a high performance scheme for maintaining replicated data
S.Y. Cheung;M.H. Ammar;M. Ahamad.
IEEE Transactions on Knowledge and Data Engineering (1992)
The grid protocol: a high performance scheme for maintaining replicated data
S.Y. Cheung;M.H. Ammar;M. Ahamad.
IEEE Transactions on Knowledge and Data Engineering (1992)
Incentives in BitTorrent induce free riding
Seung Jun;Mustaque Ahamad.
acm special interest group on data communication (2005)
Incentives in BitTorrent induce free riding
Seung Jun;Mustaque Ahamad.
acm special interest group on data communication (2005)
The Clouds distributed operating system
P. Dasgupta;R.J. LeBlanc;M. Ahamad;U. Ramachandran.
IEEE Computer (1991)
The Clouds distributed operating system
P. Dasgupta;R.J. LeBlanc;M. Ahamad;U. Ramachandran.
IEEE Computer (1991)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Georgia Institute of Technology
Institut de Recherche en Informatique et Systèmes Aléatoires
University of Florida
Georgia Institute of Technology
Georgia Institute of Technology
University of Georgia
Indraprastha Institute of Information Technology Delhi
Georgia Institute of Technology
Georgia Institute of Technology
Georgia Institute of Technology
Pyron Inc.
University of Oxford
Tohoku University
Mahanakorn University of Technology
University of Georgia
Korea Research Institute of Bioscience and Biotechnology
University of Manitoba
University of Wisconsin–Madison
Michigan State University
University of Southern California
National Center for Immunization and Respiratory Diseases
University of Alabama at Birmingham
Erasmus MC
London School of Economics and Political Science
University of Melbourne
University College London