Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Mohamed G. Gouda
2010 – today
- 2013
[j79]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda: The best keying protocol for sensor networks. Pervasive and Mobile Computing 9(4): 564-571 (2013)- 2012
[j78]Alex X. Liu, Jason M. Kovacs, Mohamed G. Gouda: A secure cookie scheme. Computer Networks 56(6): 1723-1730 (2012)
[j77]Young-ri Choi, Mohamed G. Gouda: A state-based model of sensor protocols. Theor. Comput. Sci. 458: 61-75 (2012)- 2011
[j76]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda: Is that you? Authentication in a network without identities. IJSN 6(4): 181-190 (2011)
[j75]Mohamed G. Gouda, Hrishikesh B. Acharya: Nash equilibria in stabilizing systems. Theor. Comput. Sci. 412(33): 4325-4335 (2011)
[j74]Jorge Arturo Cobb, Mohamed G. Gouda: Stabilization of max-min fair networks without per-flow state. Theor. Comput. Sci. 412(40): 5562-5579 (2011)
[c114]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda: Is That You? Authentication in a Network without Identities. GLOBECOM 2011: 1-5
[c113]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda: TPP: The Two-Way Password Protocol. ICCCN 2011: 1-6
[c112]
[c111]
[c110]Hrishikesh B. Acharya, Mohamed G. Gouda: Firewall verification and redundancy checking are equivalent. INFOCOM 2011: 2123-2128
[c109]Sushil K. Prasad, Almadena Yu. Chtchelkanova, Sajal K. Das, Frank Dehne, Mohamed G. Gouda, Anshul Gupta, Joseph JáJá, Krishna Kant, Anita La Salle, Richard LeBlanc, Manish Lumsdaine, David A. Padua, Manish Parashar, Viktor K. Prasanna, Yves Robert, Arnold L. Rosenberg, Sartaj Sahni, Behrooz Shirazi, Alan Sussman, Charles C. Weems, Jie Wu: NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. SIGCSE 2011: 617-618
[c108]Hrishikesh B. Acharya, Mohamed G. Gouda: Brief announcement: RedRem: a parallel redundancy remover. SPAA 2011: 267-268
[c107]Hrishikesh B. Acharya, Taehwan Choi, Rida A. Bazzi, Mohamed G. Gouda: The K-Observer Problem in Computer Networks. SSS 2011: 5-18
[c106]Hrishikesh B. Acharya, Anil Kumar Katti, Mohamed G. Gouda: Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks. SSS 2011: 431-432
[c105]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda: The best keying protocol for sensor networks. WOWMOM 2011: 1-6- 2010
[j73]Mohamed Eltoweissy, David Hung-Chang Du, Mario Gerla, Silvia Giordano, Mohamed G. Gouda, Henning Schulzrinne, Moustafa Youssef, Donald F. Towsley: Mission critical networking [Guest editorial]. IEEE Journal on Selected Areas in Communications 28(5): 625-629 (2010)
[j72]Alex X. Liu, Mohamed G. Gouda: Complete Redundancy Removal for Packet Classifiers in TCAMs. IEEE Trans. Parallel Distrib. Syst. 21(4): 424-437 (2010)
[j71]Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda: Stabilization of Flood Sequencing Protocols in Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 21(7): 1042-1055 (2010)
[c104]
[c103]Hrishikesh B. Acharya, Mohamed G. Gouda: Projection and Division: Linear-Space Verification of Firewalls. ICDCS 2010: 736-743
[c102]Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda: Firewall modules and modular firewalls. ICNP 2010: 174-182
[c101]Yan Li, Mohamed G. Gouda: IP Fast Reroute in Networks with Shared Risk Links. Networking 2010: 213-226
[c100]Hrishikesh B. Acharya, Mohamed G. Gouda: Brief Announcement: On the Hardness of Topology Inference. SSS 2010: 285-287
[c99]Hrishikesh B. Acharya, Mohamed G. Gouda: On the Power of Non-spoofing Adversaries. DISC 2010: 437-449
2000 – 2009
- 2009
[j70]Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda: Hop chains: Secure routing and the establishment of distinct identities. Theor. Comput. Sci. 410(6-7): 467-480 (2009)
[j69]Alex X. Liu, Mohamed G. Gouda: Firewall Policy Queries. IEEE Trans. Parallel Distrib. Syst. 20(6): 766-777 (2009)
[c98]
[c97]
[c96]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda: Consistent Fixed Points and Negative Gain. PDCAT 2009: 299-305
[c95]Hrishikesh B. Acharya, Mohamed G. Gouda: Brief announcement: the theory of network tracing. PODC 2009: 318-319
[c94]
[c93]
[c92]
[c91]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda: Brief Announcement: Consistent Fixed Points and Negative Gain. SSS 2009: 771-772
[e1]Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo, Sanjai Narain, Felix Wu (Eds.): Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-778-3- 2008
[j68]Mohamed G. Gouda, Alex X. Liu: Formal Specification and Verification of a Secure Micropayment Protocol. I. J. Network Security 7(1): 81-87 (2008)
[j67]
[j66]Alex X. Liu, Mohamed G. Gouda: Diverse Firewall Design. IEEE Trans. Parallel Distrib. Syst. 19(9): 1237-1251 (2008)
[c90]Mohamed G. Gouda, Alex X. Liu, Mansoor Jafry: Verification of Distributed Firewalls. GLOBECOM 2008: 2013-2017
[c89]Yan Li, Mohamed G. Gouda: Sources and Monitors: A Trust Model for Peer-to-Peer Networks. ICCCN 2008: 285-290
[c88]Andrew R. Dalton, William P. McCartney, Kajari Ghosh Dastidar, Jason O. Hallstrom, Nigamanth Sridhar, Ted Herman, William Leal, Anish Arora, Mohamed G. Gouda: DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language. ICCCN 2008: 541-547
[c87]Jorge Arturo Cobb, Mohamed G. Gouda: Stabilization of Max-Min Fair Networks without Per-flow State. SSS 2008: 156-172
[c86]Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb: Pharewell to Phishing. SSS 2008: 233-245- 2007
[j65]Mohamed G. Gouda, Alex X. Liu: Structured firewall design. Computer Networks 51(4): 1106-1120 (2007)
[j64]Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam: SPP: An anti-phishing single password protocol. Computer Networks 51(13): 3715-3726 (2007)
[j63]Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda: Reliable bursty convergecast in wireless sensor networks. Computer Communications 30(13): 2560-2576 (2007)
[j62]
[j61]Anish Arora, Mohamed G. Gouda, Jason O. Hallstrom, Ted Herman, William Leal, Nigamanth Sridhar: A state-based language for sensor-actuator networks. SIGBED Review 4(3): 25-30 (2007)
[j60]Mehmet Hakan Karaata, Mohamed G. Gouda: A Stabilizing Deactivation/Reactivation Protocol. IEEE Trans. Computers 56(7): 881-888 (2007)
[j59]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda: Optimal Dispersal of Certificate Chains. IEEE Trans. Parallel Distrib. Syst. 18(4): 474-484 (2007)
[c85]Edmund L. Wong, Praveen Balasubramanian, Lorenzo Alvisi, Mohamed G. Gouda, Vitaly Shmatikov: Truth in advertising: lightweight verification of route integrity. PODC 2007: 147-156
[c84]Young-ri Choi, Mohamed G. Gouda: Stabilization of Flood Sequencing Protocols in Sensor Networks. SSS 2007: 139-153
[c83]- 2006
[b2]Chin-Tser Huang, Mohamed G. Gouda: Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112
[j58]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda: Key bundles and parcels: Secure communication in many groups. Computer Networks 50(11): 1781-1798 (2006)
[j57]Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora: Secret instantiation in ad-hoc networks. Computer Communications 29(2): 200-215 (2006)
[j56]Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora: Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]. Computer Communications 29(11): 2167 (2006)
[j55]Eunjin Jung, Mohamed G. Gouda: Vulnerability analysis of certificate graphs. IJSN 1(1/2): 13-23 (2006)
[j54]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006)
[c82]Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gouda: Key Grids: A Protocol Family for Assigning Symmetric Keys. ICNP 2006: 178-186
[c81]Rida A. Bazzi, Young-ri Choi, Mohamed G. Gouda: Hop Chains: Secure Routing and the Establishment of Distinct Identities. OPODIS 2006: 365-379
[c80]Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang: Fault Masking in Tri-redundant Systems. SSS 2006: 304-313
[c79]Mohamed G. Gouda, Sandeep S. Kulkarni, Ehab S. Elmallah: Logarithmic Keying of Communication Networks. SSS 2006: 314-323- 2005
[b1]Tommy M. McGuire, Mohamed G. Gouda: The Austin Protocol Compiler. Advances in Information Security 13, Springer 2005, ISBN 978-0-387-23227-0, pp. 1-132
[j53]
[j52]Jorge Arturo Cobb, Mohamed G. Gouda, Deepinder P. Sidhu: Hello again: Stabilization of the Hello protocol in OSPF. J. High Speed Networks 14(1): 39-57 (2005)
[j51]
[c78]
[c77]Anish Arora, Rajiv Ramnath, Prasun Sinha, Emre Ertin, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Mukundan Sridharan, Santosh Kumar, Hui Cao, Nick Seddon, Chris Anderson, Ted Herman, Chen Zhang, Nishank Trivedi, Mohamed G. Gouda, Young-ri Choi, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker: Project ExScal (Short Abstract). DCOSS 2005: 393-394
[c76]
[c75]Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda: Zmail: Zero-Sum Free Market Control of Spam. ICDCS Workshops 2005: 20-26
[c74]Chin-Tser Huang, Mohamed G. Gouda: State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34
[c73]Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda: Reliable bursty convergecast in wireless sensor networks. MobiHoc 2005: 266-276
[c72]
[c71]
[c70]Anish Arora, Rajiv Ramnath, Emre Ertin, Prasun Sinha, Sandip Bapat, Vinayak Naik, Vinod Kulathumani, Hongwei Zhang, Hui Cao, Mukundan Sridharan, Santosh Kumar, Nick Seddon, Chris Anderson, Ted Herman, Nishank Trivedi, Chen Zhang, Mikhail Nesterenko, Romil Shah, Sandeep S. Kulkarni, Mahesh Aramugam, Limin Wang, Mohamed G. Gouda, Young-ri Choi, David E. Culler, Prabal Dutta, Cory Sharp, Gilman Tolle, Mike Grimmer, Bill Ferriera, Ken Parker: ExScal: Elements of an Extreme Scale Wireless Sensor Network. RTCSA 2005: 102-108
[c69]Mohamed G. Gouda, Eunjin Jung: Stabilizing Certificate Dispersal. Self-Stabilizing Systems 2005: 140-152- 2004
[j50]Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed G. Gouda, Young-ri Choi, Ted Herman, Sandeep S. Kulkarni, Umamaheswaran Arumugam, Mikhail Nesterenko, Adnan Vora, Mark Miyashita: A line in the sand: a wireless sensor network for target detection, classification, and tracking. Computer Networks 46(5): 605-634 (2004)
[c68]
[c67]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda: Optimal dispersal of special certificate graphs. GLOBECOM 2004: 2213-2217
[c66]Mohamed G. Gouda, Alex X. Liu: Formal Specification and Verification of a Micropayment Protocol. ICCCN 2004: 489-494
[c65]Mohamed G. Gouda, Alex X. Liu: Firewall Design: Consistency, Completeness, and Compactness. ICDCS 2004: 320-327
[c64]
[c63]
[c62]Mohamed G. Gouda, Young-ri Choi, Anish Arora: Sentries and Sleepers in Sensor Networks. OPODIS 2004: 384-399
[c61]Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda: Optimal Dispersal of Certificate Chains. DISC 2004: 435-449- 2003
[j49]Mohamed G. Gouda, Chin-Tser Huang: A secure address resolution protocol. Computer Networks 41(1): 57-71 (2003)
[j48]Vinayak Naik, Anish Arora, Sandip Bapat, Mohamed G. Gouda: Dependable Systems - Whisper: Local Secret Maintenance in Sensor Networks. IEEE Distributed Systems Online 4(9) (2003)
[j47]Mohamed G. Gouda, Marco Schneider: Maximizable routing metrics. IEEE/ACM Trans. Netw. 11(4): 663-675 (2003)
[c60]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27
[c59]Eunjin Jung, Alex X. Liu, Mohamed G. Gouda: Key Bundels and Parcels: Secure Communication in Many Groups. Networked Group Communication 2003: 119-130
[c58]Murat Demirbas, Anish Arora, Mohamed G. Gouda: A Pursuer-Evader Game for Sensor Networks. Self-Stabilizing Systems 2003: 1-16
[c57]Jorge Arturo Cobb, Mohamed G. Gouda, Ravi Musunuri: A Stabilizing Solution to the Stable Path Problem. Self-Stabilizing Systems 2003: 169-183- 2002
[j46]Jorge Arturo Cobb, Mohamed G. Gouda: Stabilization of General Loop-Free Routing. J. Parallel Distrib. Comput. 62(5): 922-944 (2002)
[j45]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002)
[j44]
[c56]Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy: Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468- 2001
[j43]Mohamed G. Gouda: Elements of security: Closure, convergence, and protection. Inf. Process. Lett. 77(2-4): 109-114 (2001)
[c55]
[c54]
[c53]Mohamed G. Gouda, Chin-Tser Huang, Anish Arora: On the Security and Vulnerability of PING. WSS 2001: 124-135
[c52]Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam: Batch rekeying for secure group communications. WWW 2001: 525-534- 2000
[j42]Mohamed G. Gouda, Tommy M. McGuire: Alert communication primitives above TCP. J. High Speed Networks 9(2): 139-150 (2000)
[j41]Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1): 16-30 (2000)
[c51]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop Integrity in Computer Networks. ICNP 2000: 3-11
1990 – 1999
- 1999
[j40]Shlomi Dolev, Mohamed G. Gouda, Marco Schneider: Memory Requirements for Silent Stabilization. Acta Inf. 36(6): 447-462 (1999)
[c50]Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, Mohamed G. Gouda: General and Scalable State Feedback for Multimedia Systems. ISCC 1999: 187-193
[c49]
[c48]- 1998
[j39]Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas: Time-shift scheduling - fair scheduling of flows in high-speed networks. IEEE/ACM Trans. Netw. 6(3): 274-285 (1998)
[c47]
[c46]
[c45]Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam: Secure Group Communications Using Key Graphs. SIGCOMM 1998: 68-79- 1997
[j38]George Varghese, Anish Arora, Mohamed G. Gouda: Self-Stabilization by Tree Correction. Chicago J. Theor. Comput. Sci. 1997 (1997)
[j37]Jorge Arturo Cobb, Mohamed G. Gouda: The Request Reply Family of Group Routing Protocols. IEEE Trans. Computers 46(6): 659-672 (1997)
[j36]
[c44]
[c43]
[c42]- 1996
[j35]Jorge Arturo Cobb, Mohamed G. Gouda: Group routing without group routing tables: an exercise in protocol design. Computer Communications 19(14): 1161-1174 (1996)
[j34]Mohamed G. Gouda: Network Protocols Between Exact Specifications and Pragmatic Implementations. ACM Comput. Surv. 28(4es): 43 (1996)
[j33]Hussein M. Abdel-Wahab, Mohamed G. Gouda: Systems of Recall Broadcast. Inf. Sci. 90(1-4): 1-17 (1996)
[j32]Anish Arora, Mohamed G. Gouda, George Varghese: Constraint satisfaction as a basis for designing nonmasking fault-tolerance. J. High Speed Networks 5(3): 293-306 (1996)
[j31]Mohamed G. Gouda, F. Furman Haddix: The Stabilizing Token Ring in Three Bits. J. Parallel Distrib. Comput. 35(1): 43-48 (1996)
[c41]Sarah E. Chodrow, Mohamed G. Gouda: Sentries for the Execution of Concurrent Programs. ICDCS 1996: 11-18
[c40]Jorge Arturo Cobb, Mohamed G. Gouda: Group Routing without Group Routing Tables. ICDCS 1996: 344-351
[c39]Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas: Time-Shift Scheduling: Fair Scheduling of Flows in High Speed Networks. ICNP 1996: 6-13
[c38]Shlomi Dolev, Mohamed G. Gouda, Marco Schneider: Memory Requirements for Silent Stabilization (Extended Abstract). PODC 1996: 27-34- 1995
[j30]Sarah E. Chodrow, Mohamed G. Gouda: Implementation of the Sentry System. Softw., Pract. Exper. 25(4): 373-387 (1995)
[j29]Mohamed G. Gouda, Arun N. Netravali, Krishan K. Sabnani: A periodic state exchange protocol and its verification. IEEE Transactions on Communications 43(9): 2475-2484 (1995)
[c37]
[c36]
[c35]
[c34]Anish Arora, Mohamed G. Gouda: Load Balancing: An Exercise in Constrainted Convergence. WDAG 1995: 183-197- 1994
[j28]
[j27]Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda: The Elusive Atomic Register. J. ACM 41(2): 311-339 (1994)
[j26]
[c33]Anish Arora, Mohamed G. Gouda, George Varghese: Constraint Satisfaction as a Basis for Designing Nonmasking Fault-Tolerance. ICDCS 1994: 424-431
[c32]James C. Browne, E. Allen Emerson, Mohamed G. Gouda, Daniel P. Miranker, Aloysius K. Mok, Roberto J. Bayardo Jr., Sarah E. Chodrow, David Gadbois, F. Furman Haddix, Thomas W. Hetherington, Lance Obermeyer, Duu-Chung Tsou, Chih-Kan Wang, Rwo-Hsi Wang: A New Approach to Modularity in Rule-Based Programming. ICTAI 1994: 18-25
[c31]Jorge Arturo Cobb, Mohamed G. Gouda, Prathima Agrawal: Protocol synchronization with sparse timestraps. PSTV 1994: 169-184- 1993
[j25]Mohamed G. Gouda: Protocol Verification Made Simple: A Tutorial. Computer Networks and ISDN Systems 25(9): 969-980 (1993)
[j24]James E. Burns, Mohamed G. Gouda, Raymond E. Miller: Stabilization and Pseudo-Stabilization. Distributed Computing 7(1): 35-42 (1993)
[j23]Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda: Convergence of Iteration Systems. Distributed Computing 7(1): 43-53 (1993)
[j22]Ambuj K. Singh, Mohamed G. Gouda: Rankers: A Classification of Synchronization Problems. Sci. Comput. Program. 21(3): 191-223 (1993)
[j21]Anish Arora, Mohamed G. Gouda: Closure and Convergence: A Foundation of Fault-Tolerant Computing. IEEE Trans. Software Eng. 19(11): 1015-1027 (1993)- 1992
[j20]James H. Anderson, Mohamed G. Gouda: A Criterion for Atomicity. Formal Asp. Comput. 4(3): 273-298 (1992)
[c30]Anish Arora, Mohamed G. Gouda: Closure and Convergence: A Formulation of Fault-Tolerant Computing. FTCS 1992: 396-403
[c29]Jean-Michel Couvreur, Nissim Francez, Mohamed G. Gouda: Asynchronous Unison (Extended Abstract). ICDCS 1992: 486-493
[c28]
[c27]
[c26]James H. Anderson, Jae-Heon Yang, Mohamed G. Gouda: The Granularity of Waiting (Extended Abstract). WDAG 1992: 313-328- 1991
[j19]James H. Anderson, Mohamed G. Gouda: A New Explanation of the Glitch Phenomenon. Acta Inf. 28(4): 297-309 (1991)
[j18]Chung-Kuo Chang, Mohamed G. Gouda: On the Minimum Requirements for Independent Recovery in Distributed Systems. Inf. Process. Lett. 37(1): 1-7 (1991)
[j17]Anish Arora, Shlomi Dolev, Mohamed G. Gouda: Maintaining Digital Clocks in Step. Parallel Processing Letters 1: 11-18 (1991)
[j16]Mohamed G. Gouda, Nicholas J. Multari: Stabilizing Communication Protocols. IEEE Trans. Computers 40(4): 448-458 (1991)
[j15]Geoffrey M. Brown, Mohamed G. Gouda, Raymond E. Miller: Block acknowledgment: redesigning the window protocol. IEEE Transactions on Communications 39(4): 524-532 (1991)
[j14]
[c25]- 1990
[j13]
[c24]Anish Arora, Paul C. Attie, Michael Evangelist, Mohamed G. Gouda: Convergence of Iteration Systems (Extended Abstract). CONCUR 1990: 70-82
[c23]
[c22]
[c21]Mohamed G. Gouda, Michael Evangelist: Convergence/response tradeoffs in concurrent systems. SPDP 1990: 188-192
1980 – 1989
- 1989
[j12]Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier: The Instability of Self-Stabilization. Acta Inf. 27(8): 697-724 (1989)
[j11]Geoffrey M. Brown, Mohamed G. Gouda, Chuan-lin Wu: Token Systems that Self-Stabilize. IEEE Trans. Computers 38(6): 845-852 (1989)
[c20]Mohamed G. Gouda, Rodney R. Howell, Louis E. Rosier: System Simulation and the Sensitivity of Self-Stabilization. MFCS 1989: 249-258
[c19]Geoffrey M. Brown, Mohamed G. Gouda, Raymond E. Miller: Block Acknowledgement: Redesigning the Window Protocol. SIGCOMM 1989: 128-135- 1988
[j10]James H. Anderson, Mohamed G. Gouda: Atomic Semantics of Nonatomic Programs. Inf. Process. Lett. 28(2): 99-103 (1988)
[c18]Mohamed G. Gouda, Nicholas F. Maxemchuk, Utpal Mukherji, Krishan K. Sabnani: Delivery and discrimination: the Seine protocol. SIGCOMM 1988: 292-302- 1987
[c17]Ambuj K. Singh, James H. Anderson, Mohamed G. Gouda: The Elusive Atomic Register Revisited. PODC 1987: 206-221
[c16]- 1986
[j9]Mohamed G. Gouda, Chung-Kuo Chang: Proving Liveness for Networks of Communicating Finite State Machines. ACM Trans. Program. Lang. Syst. 8(1): 154-182 (1986)- 1985
[j8]Mohamed G. Gouda, Ji-Yun Han: Protocol Validation by Fair Progress State Exploration. Computer Networks 9: 353-361 (1985)
[j7]Mohamed G. Gouda, Louis E. Rosier: Priority Networks of Communicating Finite State Machines. SIAM J. Comput. 14(3): 569-584 (1985)
[j6]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam: A Discipline for Constructing Multiphase Communication Protocols. ACM Trans. Comput. Syst. 3(4): 315-343 (1985)
[j5]Mohamed G. Gouda, Hui-Seng Lee: Proving Liveness and Termination of Systolic Arrays Using Communication Finite State Machines. IEEE Trans. Software Eng. 11(10): 1240-1251 (1985)
[c15]Mohamed G. Gouda, Khe-Sing The: Modeling physical layer protocols using communicating finite state machines. SIGCOMM 1985: 54-62- 1984
[j4]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam: An exercise in constructing multi-phase communication protocols. Computer Communication Review 14(2): 42-49 (1984)
[j3]Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu: On the Progress of Communications between Two Finite State Machines. Information and Control 63(3): 200-216 (1984)
[j2]Mohamed G. Gouda: Closed Covers: To Verify Progress for Communicating Finite State Machines. IEEE Trans. Software Eng. 10(6): 846-855 (1984)
[c14]Mohamed G. Gouda, Louis E. Rosier: Communicating Finite State Machines with Priority Channnels. ICALP 1984: 209-221
[c13]Mohamed G. Gouda, Chung-Kuo Chang: A Technique for Proving Liveness of Communicating Finite State Machines with Examples. PODC 1984: 38-49
[c12]Hai-Yann Hwang, Umeshwar Dayal, Mohamed G. Gouda: Using Semiouterjoins to Process Queries in Multidatabase Systems. PODS 1984: 153-162
[c11]Mohamed G. Gouda, Ching-Hua Chow, Simon S. Lam: On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. PSTV 1984: 47-56
[c10]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam: On Constructing Multi-Phase Communication Protocols. PSTV 1984: 57-68- 1983
[j1]Yao-Tin Yu, Mohamed G. Gouda: Unboundedness Detection for a Class of Communicating Finite-State Machines. Inf. Process. Lett. 17(5): 235-240 (1983)
[c9]Mohamed G. Gouda: An Example for Constructing Communicating Machines by Step-Wise Refinement. Protocol Specification, Testing, and Verification 1983: 63-74- 1982
[c8]Mohamed G. Gouda, Bijendra N. Jain: Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies. PSTV 1982: 317
[c7]Yao-Tin Yu, Mohamed G. Gouda: Deadlock Detection for a Class of Communicating Finite State Machine. PSTV 1982: 319- 1981
[c6]Mohamed G. Gouda, Umeshwar Dayal: Optimal Semijoin Schedules For Query Processing in Local Distributed Database Systems. SIGMOD Conference 1981: 164-175- 1980
[c5]Mohamed G. Gouda, Eric G. Manning, Yao-Tin Yu: On the progress of communication between two machines. Operating Systems Engineering 1980: 369-389
1970 – 1979
- 1979
[c4]Mohamed G. Gouda, D. Body, W. Wood: Global and Local Models for the Specification and Verification of Distributed Systems. Berkeley Workshop 1979: 155-- 1978
[c3]Mohamed G. Gouda: A Hierarchial Controller for Concurrent Accessing of Distributed Databases. Computer Architecture for Non-Numeric Processing 1978: 65-70- 1976
[c2]Mohamed G. Gouda, Eric G. Manning: Protocol Machines: A Concise Formal Model and its Automatic Implementation. ICCC 1976: 346-350
[c1]Mohamed G. Gouda, Eric G. Manning: On the Modelling, Analysis and Design of Protocols - A Special Class of Software Structures. ICSE 1976: 256-262
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:59 CEST by the dblp team



