2009 | ||
---|---|---|
160 | Hrishikesh B. Acharya, Mohamed G. Gouda: Linear-Time Verification of Firewalls. ICNP 2009: 133-140 | |
159 | Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda: Consistent Fixed Points and Negative Gain. PDCAT 2009: 299-305 | |
158 | Hrishikesh B. Acharya, Mohamed G. Gouda: Brief announcement: the theory of network tracing. PODC 2009: 318-319 | |
157 | Mohamed G. Gouda, Hrishikesh B. Acharya: Nash Equilibria in Stabilizing Systems. SSS 2009: 311-324 | |
156 | Hrishikesh B. Acharya, Mohamed G. Gouda: A Theory of Network Tracing. SSS 2009: 62-74 | |
155 | Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda: Brief Announcement: Consistent Fixed Points and Negative Gain. SSS 2009: 771-772 | |
154 | Alex X. Liu, Mohamed G. Gouda: Firewall Policy Queries. IEEE Trans. Parallel Distrib. Syst. 20(6): 766-777 (2009) | |
153 | Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda: Hop chains: Secure routing and the establishment of distinct identities. Theor. Comput. Sci. 410(6-7): 467-480 (2009) | |
2008 | ||
152 | Mohamed G. Gouda, Alex X. Liu, Mansoor Jafry: Verification of Distributed Firewalls. GLOBECOM 2008: 2013-2017 | |
151 | Yan Li, Mohamed G. Gouda: Sources and Monitors: A Trust Model for Peer-to-Peer Networks. ICCCN 2008: 285-290 | |
150 | Andrew R. Dalton, William P. McCartney, Kajari Ghosh Dastidar, Jason O. Hallstrom, Nigamanth Sridhar, Ted Herman, William Leal, Anish Arora, Mohamed G. Gouda: DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language. ICCCN 2008: 541-547 | |
149 | Jorge Arturo Cobb, Mohamed G. Gouda: Stabilization of Max-Min Fair Networks without Per-flow State. SSS 2008: 156-172 | |
148 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb: Pharewell to Phishing. SSS 2008: 233-245 | |
147 | Mohamed G. Gouda, Alex X. Liu: Formal Specification and Verification of a Secure Micropayment Protocol. I. J. Network Security 7(1): 81-87 (2008) | |
146 | Alex X. Liu, Mohamed G. Gouda: Diverse Firewall Design. IEEE Trans. Parallel Distrib. Syst. 19(9): 1237-1251 (2008) | |
145 | Ehab S. Elmallah, Mohamed G. Gouda, Sandeep S. Kulkarni: Logarithmic keying. TAAS 3(4): (2008) | |
2007 | ||
144 | Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov: Truth in advertising: lightweight verification of route integrity. PODC 2007: 147-156 | |
143 | Young-ri Choi, Mohamed G. Gouda: Stabilization of Flood Sequencing Protocols in Sensor Networks. SSS 2007: 139-153 | |
142 | Mohamed G. Gouda, Yan Li: The Truth System: Can a System of Lying Processes Stabilize? SSS 2007: 311-324 | |
141 | Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda: Reliable bursty convergecast in wireless sensor networks. Computer Communications 30(13): 2560-2576 (2007) | |
140 | Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam: SPP: An anti-phishing single password protocol. Computer Networks 51(13): 3715-3726 (2007) | |
139 | Mohamed G. Gouda, Alex X. Liu: Structured firewall design. Computer Networks 51(4): 1106-1120 (2007) | |
138 | Mohamed G. Gouda, F. Furman Haddix: The alternator. Distributed Computing 20(1): 21-28 (2007) | |
137 | Mehmet Hakan Karaata, Mohamed G. Gouda: A Stabilizing Deactivation/Reactivation Protocol. IEEE Trans. Computers 56(7): 881-888 (2007) | |
136 | Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda: Optimal Dispersal of Certificate Chains. IEEE Trans. Parallel Distrib. Syst. 18(4): 474-484 (2007) | |
2006 | ||
135 | Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda: Key Grids: A Protocol Family for Assigning Symmetric Keys. ICNP 2006: 178-186 | |
134 | Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda: Hop Chains: Secure Routing and the Establishment of Distinct Identities. OPODIS 2006: 365-379 | |
133 | Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang: Fault Masking in Tri-redundant Systems. SSS 2006: 304-313 | |
132 | Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah: Logarithmic Keying of Communication Networks. SSS 2006: 314-323 | |
131 | Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora: Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. Computer Communications 29(11): 2167 (2006) | |
130 | Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora: Secret instantiation in ad-hoc networks. Computer Communications 29(2): 200-215 (2006) | |
129 | Eunjin Jung, Alex X. Liu, Mohamed G. Gouda: Key bundles and parcels: Secure communication in many groups. Computer Networks 50(11): 1781-1798 (2006) | |
128 | Eunjin Jung, Mohamed G. Gouda: Vulnerability analysis of certificate graphs. IJSN 1(1/2): 13-23 (2006) | |
127 | Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006) | |
2005 | ||
126 | Alex X. Liu, Mohamed G. Gouda: Complete Redundancy Detection in Firewalls. DBSec 2005: 193-206 | |
125 | Anish Arora, Rajiv Ramnath, Prasun Sinha, Emre Ertin, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Mukundan Sridharan, Santosh Kumar, Hui Cao, Nick Seddon, Chris Anderson, Ted Herman, Chen Zhang, Nishank Trivedi, Mohamed G. Gouda, Young-ri Choi, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker: Project ExScal (Short Abstract). DCOSS 2005: 393-394 | |
124 | Mohamed G. Gouda, Alex X. Liu: A Model of Stateful Firewalls and Its Properties. DSN 2005: 128-137 | |
123 | F. Furman Haddix, Mohamed G. Gouda: A General Alternator. IASTED PDCS 2005: 409-413 | |
122 | Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda: Zmail: Zero-Sum Free Market Control of Spam. ICDCS Workshops 2005: 20-26 | |
121 | Chin-Tser Huang, Mohamed G. Gouda: State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34 | |
120 | Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda: Reliable bursty convergecast in wireless sensor networks. MobiHoc 2005: 266-276 | |
119 | Mohamed G. Gouda, Young-ri Choi: A State-Based Model of Sensor Protocols. OPODIS 2005: 246-260 | |
118 | Anish Arora, Rajiv Ramnath, Emre Ertin, Prasun Sinha, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Hui Cao, Mukundan Sridharan, Santosh Kumar, Nick Seddon, Chris Anderson, Ted Herman, Nishank Trivedi, Chen Zhang, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, Mohamed G. Gouda, Young-ri Choi, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker: ExScal: Elements of an Extreme Scale Wireless Sensor Network. RTCSA 2005: 102-108 | |
117 | Mohamed G. Gouda, Eunjin Jung: Stabilizing Certificate Dispersal. Self-Stabilizing Systems 2005: 140-152 | |
116 | Mohamed G. Gouda: Self-Stabilizing Systems, Part 1. J. High Speed Networks 14(1): 1-2 (2005) | |
115 | Jorge Arturo Cobb, Mohamed G. Gouda, Deepinder P. Sidhu: Hello again: Stabilization of the Hello protocol in OSPF. J. High Speed Networks 14(1): 39-57 (2005) | |
114 | Mohamed G. Gouda: Self-Stabilizing Systems, Part 2. J. High Speed Networks 14(2): 107 (2005) | |
2004 | ||
113 | Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda: Optimal Dispersal of Certificate Chains. DISC 2004: 435-449 | |
112 | Alex X. Liu, Mohamed G. Gouda: Diverse Firewall Design. DSN 2004: 595-604 | |
111 | Mohamed G. Gouda, Alex X. Liu: Formal Specification and Verification of a Micropayment Protocol. ICCCN 2004: 489-494 | |
110 | Mohamed G. Gouda, Alex X. Liu: Firewall Design: Consistency, Completeness, and Compactness. ICDCS 2004: 320-327 | |
109 | Mohamed G. Gouda, Eunjin Jung: Certificate Dispersal in Ad-Hoc Networks. ICDCS 2004: 616-623 | |
108 | Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu: Firewall Queries. OPODIS 2004: 197-212 | |
107 | Mohamed G. Gouda, Young-ri Choi, Anish Arora: Sentries and Sleepers in Sensor Networks. OPODIS 2004: 384-399 | |
106 | Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed G. Gouda, Young-ri Choi, Ted Herman, Sandeep S. Kulkarni, Umamaheswaran Arumugam, Mikhail Nesterenko, Adnan Vora, Mark Miyashita: A line in the sand: a wireless sensor network for target detection, classification, and tracking. Computer Networks 46(5): 605-634 (2004) | |
2003 | ||
105 | Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27 | |
104 | Eunjin Jung, Alex X. Liu, Mohamed G. Gouda: Key Bundels and Parcels: Secure Communication in Many Groups. Networked Group Communication 2003: 119-130 | |
103 | Murat Demirbas, Anish Arora, Mohamed G. Gouda: A Pursuer-Evader Game for Sensor Networks. Self-Stabilizing Systems 2003: 1-16 | |
102 | Jorge Arturo Cobb, Mohamed G. Gouda, Ravi Musunuri: A Stabilizing Solution to the Stable Path Problem. Self-Stabilizing Systems 2003: 169-183 | |
101 | Mohamed G. Gouda, Chin-Tser Huang: A secure address resolution protocol. Computer Networks 41(1): 57-71 (2003) | |
100 | Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda: Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. IEEE Distributed Systems Online 4(9): (2003) | |
99 | Mohamed G. Gouda, Marco Schneider: Maximizable routing metrics. IEEE/ACM Trans. Netw. 11(4): 663-675 (2003) | |
2002 | ||
98 | Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy: Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468 | |
97 | Mohamed G. Gouda: Multiphase Stabilization. IEEE Trans. Software Eng. 28(2): 201-208 (2002) | |
96 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002) | |
95 | Jorge Arturo Cobb, Mohamed G. Gouda: Stabilization of General Loop-Free Routing. J. Parallel Distrib. Comput. 62(5): 922-944 (2002) | |
2001 | ||
94 | Mohamed G. Gouda: The Theory of Weak Stabilization. WSS 2001: 114-123 | |
93 | Mohamed G. Gouda, Chin-Tser Huang, Anish Arora: On the Security and Vulnerability of PING. WSS 2001: 124-135 | |
92 | Jorge Arturo Cobb, Mohamed G. Gouda: Stabilization of Routing in Directed Networks. WSS 2001: 51-66 | |
91 | Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam: Batch rekeying for secure group communications. WWW 2001: 525-534 | |
90 | Mohamed G. Gouda: Elements of security: Closure, convergence, and protection. Inf. Process. Lett. 77(2-4): 109-114 (2001) | |
2000 | ||
89 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop Integrity in Computer Networks. ICNP 2000: 3-11 | |
88 | Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1): 16-30 (2000) | |
1999 | ||
87 | Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, Mohamed G. Gouda: General and Scalable State Feedback for Multimedia Systems. ISCC 1999: 187-193 | |
86 | Mohamed G. Gouda, Marco Schneider: Stabilization of maximal metric trees. WSS 1999: 10-17 | |
85 | Mohamed G. Gouda, F. Furman Haddix: The alternator. WSS 1999: 48-53 | |
84 | Shlomi Dolev, Mohamed G. Gouda, Marco Schneider: Memory Requirements for Silent Stabilization. Acta Inf. 36(6): 447-462 (1999) | |
1998 | ||
83 | Mohamed G. Gouda, Tommy M. McGuire: Accelerated Heartbeat Protocols. ICDCS 1998: 202-209 | |
82 | Mohamed G. Gouda, Marco Schneider: Maximizable Routing Metrics. ICNP 1998: 71- | |
81 | Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam: Secure Group Communications Using Key Graphs. SIGCOMM 1998: 68-79 | |
80 | Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas: Time-shift scheduling - fair scheduling of flows in high-speed networks. IEEE/ACM Trans. Netw. 6(3): 274-285 (1998) | |
1997 | ||
79 | Jorge Arturo Cobb, Mohamed G. Gouda: Balanced Routing. ICNP 1997: 277-284 | |
78 | Mohamed G. Gouda, F. Furman Haddix: The linear alternator. WSS 1997: 31-47 | |
77 | Anish Arora, Mohamed G. Gouda: Delay-insensitive stabilization. WSS 1997: 95-109 | |
76 | George Varghese, Anish Arora, Mohamed G. Gouda: Self-Stabilization by Tree Correction. Chicago J. Theor. Comput. Sci. 1997: (1997) | |
75 | Jorge Arturo Cobb, Mohamed G. Gouda: The Request Reply Family of Group Routing Protocols. IEEE Trans. Computers 46(6): 659-672 (1997) | |
74 | Jorge Arturo Cobb, Mohamed G. Gouda: Flow theory. IEEE/ACM Trans. Netw. 5(5): 661-674 (1997) | |
1996 | ||
73 | Sarah E. Chodrow, Mohamed G. Gouda: Sentries for the Execution of Concurrent Programs. ICDCS 1996: 11-18 | |
72 | Jorge Arturo Cobb, Mohamed G. Gouda: Group Routing without Group Routing Tables. ICDCS 1996: 344-351 | |
71 | Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas: Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks. ICNP 1996: 6-13 | |
70 | Shlomi Dolev, Mohamed G. Gouda, Marco Schneider: Memory Requirements for Silent Stabilization (Extended Abstract). PODC 1996: 27-34 | |
69 | Mohamed G. Gouda: Network Protocols Between Exact Specifications and Pragmatic Implementations. ACM Comput. Surv. 28(4es): 43 (1996) | |
68 | Jorge Arturo Cobb, Mohamed G. Gouda: Group routing without group routing tables: an exercise in protocol design. Computer Communications 19(14): 1161-1174 (1996) | |
67 | Hussein M. Abdel-Wahab, Mohamed G. Gouda: Systems of Recall Broadcast. Inf. Sci. 90(1-4): 1-17 (1996) | |
66 | Mohamed G. Gouda, F. Furman Haddix: The Stabilizing Token Ring in Three Bits. J. Parallel Distrib. Comput. 35(1): 43-48 (1996) | |
1995 | ||
65 | Mohamed G. Gouda: Stabilizing Client/Server Protocols without the Tears. FORTE 1995: 5-19 | |
64 | Mohamed G. Gouda, Sanjoy Paul: A wireless link protocol: design by refinement. ICNP 1995: 192-200 | |
63 | Mohamed G. Gouda: The Triumph and Tribulation of System Stabilization. WDAG 1995: 1-18 | |
62 | Anish Arora, Mohamed G. Gouda: Load Balancing: An Exercise in Constrainted Convergence. WDAG 1995: 183-197 | |
61 | Sarah E. Chodrow, Mohamed G. Gouda: Implementation of the Sentry System. Softw., Pract. Exper. 25(4): 373-387 (1995) | |
1994 | ||
60 | Anish Arora, Mohamed G. Gouda, George Varghese: Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance. ICDCS 1994: 424-431 | |
59 | James C. Browne, E. Allen Emerson, Mohamed G. Gouda, Daniel P. Miranker, Aloysius K. Mok, Roberto J. Bayardo Jr., Sarah E. Chodrow, David Gadbois, F. Furman Haddix, Thomas W. Hetherington, Lance Obermeyer, Duu-Chung Tsou, Chih-Kan Wang, Rwo-Hsi Wang: A New Approach to Modularity in Rule-Based Programming. ICTAI 1994: 18-25 | |
58 | Jorge Arturo Cobb, Mohamed G. Gouda, Prathima Agrawal: Protocol synchronization with sparse timestraps. PSTV 1994: 169-184 | |
57 | Anish Arora, Mohamed G. Gouda: Distributed Reset. IEEE Trans. Computers 43(9): 1026-1038 (1994) | |
56 | Mohamed G. Gouda: Stabilizing Observers. Inf. Process. Lett. 52(2): 99-103 (1994) | |
55 | Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda: The Elusive Atomic Register. J. ACM 41(2): 311-339 (1994) | |
1993 | ||
54 | Mohamed G. Gouda: Protocol Verification Made Simple: A Tutorial. Computer Networks and ISDN Systems 25(9): 969-980 (1993) | |
53 | James E. Burns, Mohamed G. Gouda, Raymond E. Miller: Stabilization and Pseudo-Stabilization. Distributed Computing 7(1): 35-42 (1993) | |
52 | Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda: Convergence of Iteration Systems. Distributed Computing 7(1): 43-53 (1993) | |
51 | Anish Arora, Mohamed G. Gouda: Closure and Convergence: A Foundation of Fault-Tolerant Computing. IEEE Trans. Software Eng. 19(11): 1015-1027 (1993) | |
50 | Ambuj K. Singh, Mohamed G. Gouda: Rankers: A Classification of Synchronization Problems. Sci. Comput. Program. 21(3): 191-223 (1993) | |
1992 | ||
49 | Anish Arora, Mohamed G. Gouda: Closure and Convergence: A Formulation of Fault-Tolerant Computing. FTCS 1992: 396-403 | |
48 | Jean-Michel Couvreur, Nissim Francez, Mohamed G. Gouda: Asynchronous Unison (Extended Abstract). ICDCS 1992: 486-493 | |
47 | Mohamed G. Gouda: The Two-Dimensional Window Protocol. PSTV 1992: 365-379 | |
46 | Sarah E. Chodrow, Mohamed G. Gouda: The Sentry System. SRDS 1992: 230-237 | |
45 | James H. Anderson, Jae-Heon Yang, Mohamed G. Gouda: The Granularity of Waiting (Extended Abstract). WDAG 1992: 313-328 | |
44 | James H. Anderson, Mohamed G. Gouda: A Criterion for Atomicity. Formal Asp. Comput. 4(3): 273-298 (1992) | |
1991 | ||
43 | Anish Arora, Shlomi Dolev, Mohamed G. Gouda: Maintaining Digital Clocks In Step. WDAG 1991: 71-79 | |
42 | James H. Anderson, Mohamed G. Gouda: A New Explanation of the Glitch Phenomenon. Acta Inf. 28(4): 297-309 (1991) | |
41 | Mohamed G. Gouda, Nicholas J. Multari: Stabilizing Communication Protocols. IEEE Trans. Computers 40(4): 448-458 (1991) | |
40 | Mohamed G. Gouda, Ted Herman: Adaptive Programming. IEEE Trans. Software Eng. 17(9): 911-921 (1991) | |
39 | Chung-Kuo Chang, Mohamed G. Gouda: On the Minimum Requirements for Independent Recovery in Distributed Systems. Inf. Process. Lett. 37(1): 1-7 (1991) | |
38 | Anish Arora, Shlomi Dolev, Mohamed G. Gouda: Maintaining Digital Clocks in Step. Parallel Processing Letters 1: 11-18 (1991) | |
1990 | ||
37 | Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda: Convergence of Iteration Systems (Extended Abstract). CONCUR 1990: 70-82 | |
36 | Anish Arora, Mohamed G. Gouda: Distributed Reset (Extended Abstract). FSTTCS 1990: 316-331 | |
35 | Mohamed G. Gouda, Michael Evangelist: Convergence/response tradeoffs in concurrent systems. SPDP 1990: 188-192 | |
34 | Anish Arora, Mohamed G. Gouda, Ted Herman: Composite Routing Protocols. SPDP 1990: 70-78 | |
33 | Mohamed G. Gouda, Ted Herman: Stabilizing Unison. Inf. Process. Lett. 35(4): 171-175 (1990) | |
1989 | ||
32 | Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier: System Simulation and the Sensitivity of Self-Stabilization. MFCS 1989: 249-258 | |
31 | Geoffrey M. Brown, Mohamed G. Gouda, Raymond E. Miller: Block Acknowledgement: Redesigning the Window Protocol. SIGCOMM 1989: 128-135 | |
30 | Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier: The Instability of Self-Stabilization. Acta Inf. 27(8): 697-724 (1989) | |
29 | Geoffrey M. Brown, Mohamed G. Gouda, Chuan-lin Wu: Token Systems that Self-Stabilize. IEEE Trans. Computers 38(6): 845-852 (1989) | |
1988 | ||
28 | Mohamed G. Gouda, Nicholas F. Maxemchuk, U. Mukherji, Krishan K. Sabnani: Delivery and discrimination: the Seine protocol. SIGCOMM 1988: 292-302 | |
27 | James H. Anderson, Mohamed G. Gouda: Atomic Semantics of Nonatomic Programs. Inf. Process. Lett. 28(2): 99-103 (1988) | |
1987 | ||
26 | Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda: The Elusive Atomic Register Revisited. PODC 1987: 206-221 | |
25 | Chung-Kuo Chang, Mohamed G. Gouda: Independent Recovery. SRDS 1987: 93-104 | |
1986 | ||
24 | Mohamed G. Gouda, Chung-Kuo Chang: Proving Liveness for Networks of Communicating Finite State Machines. ACM Trans. Program. Lang. Syst. 8(1): 154-182 (1986) | |
1985 | ||
23 | Mohamed G. Gouda, Khe-Sing The: Modeling physical layer protocols using communicating finite state machines. SIGCOMM 1985: 54-62 | |
22 | Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam: A Discipline for Constructing Multiphase Communication Protocols ACM Trans. Comput. Syst. 3(4): 315-343 (1985) | |
21 | Mohamed G. Gouda, Ji-Yun Han: Protocol Validation by Fair Progress State Exploration. Computer Networks 9: 353-361 (1985) | |
20 | Mohamed G. Gouda, Hui-Seng Lee: Proving Liveness and Termination of Systolic Arrays Using Communication Finite State Machines. IEEE Trans. Software Eng. 11(10): 1240-1251 (1985) | |
19 | Mohamed G. Gouda, Louis E. Rosier: Priority Networks of Communicating Finite State Machines. SIAM J. Comput. 14(3): 569-584 (1985) | |
1984 | ||
18 | Mohamed G. Gouda, Louis E. Rosier: Communicating Finite State Machines with Priority Channnels. ICALP 1984: 209-221 | |
17 | Mohamed G. Gouda, Chung-Kuo Chang: A Technique for Proving Liveness of Communicating Finite State Machines with Examples. PODC 1984: 38-49 | |
16 | Hai-Yann Hwang, Umeshwar Dayal, Mohamed G. Gouda: Using Semiouterjoins to Process Queries in Multidatabase Systems. PODS 1984: 153-162 | |
15 | Mohamed G. Gouda, Ching-Hua Chow, Simon S. Lam: On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. PSTV 1984: 47-56 | |
14 | Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam: On Constructing Multi-Phase Communication Protocols. PSTV 1984: 57-68 | |
13 | Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam: An exercise in constructing multi-phase communication protocols. Computer Communication Review 14(2): 42-49 (1984) | |
12 | Mohamed G. Gouda: Closed Covers: To Verify Progress for Communicating Finite State Machines. IEEE Trans. Software Eng. 10(6): 846-855 (1984) | |
11 | Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu: On the Progress of Communications between Two Finite State Machines Information and Control 63(3): 200-216 (1984) | |
1983 | ||
10 | Mohamed G. Gouda: An Example for Constructing Communicating Machines by Step-Wise Refinement. Protocol Specification, Testing, and Verification 1983: 63-74 | |
9 | Yao-Tin Yu, Mohamed G. Gouda: Unboundedness Detection for a Class of Communicating Finite-State Machines. Inf. Process. Lett. 17(5): 235-240 (1983) | |
1982 | ||
8 | Mohamed G. Gouda, Bijendra N. Jain: Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies. PSTV 1982: 317 | |
7 | Yao-Tin Yu, Mohamed G. Gouda: Deadlock Detection for a Class of Communicating Finite State Machine. PSTV 1982: 319 | |
1981 | ||
6 | Mohamed G. Gouda, Umeshwar Dayal: Optimal Semijoin Schedules For Query Processing in Local Distributed Database Systems. SIGMOD Conference 1981: 164-175 | |
1980 | ||
5 | Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu: On the progress of communication between two machines. Operating Systems Engineering 1980: 369-389 | |
1979 | ||
4 | Mohamed G. Gouda, D. Body, W. Wood: Global and Local Models for the Specification and Verification of Distributed Systems. Berkeley Workshop 1979: 155- | |
1978 | ||
3 | Mohamed G. Gouda: A Hierarchial Controller for Concurrent Accessing of Distributed Databases. Computer Architecture for Non-Numeric Processing 1978: 65-70 | |
1976 | ||
2 | Mohamed G. Gouda, Eric G. Manning: Protocol Machines: A Concise Formal Model and its Automatic Implementation. ICCC 1976: 346-350 | |
1 | Mohamed G. Gouda, Eric G. Manning: On the Modelling, Analysis and Design of Protocols - A Special Class of Software Structures. ICSE 1976: 256-262 |