Mohamed Ahmed
Mohamed Ahmed
benevolent.ai
Verified email at benevolent.ai
TitleCited byYear
Learning convolutional neural networks for graphs
M Niepert, M Ahmed, K Kutzkov
International conference on machine learning, 2014-2023, 2016
7242016
ClickOS and the art of network function virtualization
J Martins, M Ahmed, C Raiciu, V Olteanu, M Honda, R Bifulco, F Huici
11th {USENIX} Symposium on Networked Systems Design and Implementation …, 2014
6512014
Temporal locality in today's content caching: why it matters and how to model it
S Traverso, M Ahmed, M Garetto, P Giaccone, E Leonardi, S Niccolini
ACM SIGCOMM Computer Communication Review 43 (5), 5-12, 2013
1452013
A peek into the future: Predicting the evolution of popularity in user generated content
M Ahmed, S Spagna, F Huici, S Niccolini
Proceedings of the sixth ACM international conference on Web search and data …, 2013
1442013
Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm
J Kim, P Bentley, C Wallenta, M Ahmed, S Hailes
International Conference on Artificial Immune Systems, 390-403, 2006
892006
Enabling fast, dynamic network processing with clickos
J Martins, M Ahmed, C Raiciu, F Huici
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
552013
Unravelling the impact of temporal and geographical locality in content caching systems
S Traverso, M Ahmed, M Garetto, P Giaccone, E Leonardi, S Niccolini
IEEE Transactions on Multimedia 17 (10), 1839-1854, 2015
532015
SUAAVE: Combining aerial robots and wireless networking
S Cameron, S Hailes, S Julier, S McClean, G Parr, N Trigoni, M Ahmed, ...
442010
In-net: In-network processing for the masses
R Stoenescu, V Olteanu, M Popovici, M Ahmed, J Martins, R Bifulco, ...
Proceedings of the Tenth European Conference on Computer Systems, 1-15, 2015
292015
What's app? A wide-scale measurement study of smart phone markets
N d'Heureuse, F Huici, M Arumaithurai, M Ahmed, K Papagiannaki, ...
ACM SIGMOBILE Mobile Computing and Communications Review 16 (2), 16-27, 2012
252012
Understanding the detection of view fraud in video content portals
M Marciel, R Cuevas, A Banchs, R González, S Traverso, M Ahmed, ...
Proceedings of the 25th International Conference on World Wide Web, 357-368, 2016
232016
Understanding the detection of view fraud in video content portals
M Marciel, R Cuevas, A Banchs, R González, S Traverso, M Ahmed, ...
Proceedings of the 25th International Conference on World Wide Web, 357-368, 2016
232016
Exploring deep recurrent models with reinforcement learning for molecule design
D Neil, M Segler, L Guasch, M Ahmed, D Plumbley, M Sellwood, N Brown
192018
Rethinking access networks with high performance virtual software brases
R Bifulco, T Dietz, F Huici, M Ahmed, J Martins, S Niccolini, HJ Kolbe
2013 Second European Workshop on Software Defined Networks, 7-12, 2013
182013
Analyzing the performance of LRU caches under non-stationary traffic patterns
M Ahmed, S Traverso, P Giaccone, E Leonardi, S Niccolini
arXiv preprint arXiv:1301.4909, 2013
182013
Enabling dynamic network processing with clickOS
M Ahmed, F Huici, A Jahanpanah
ACM SIGCOMM Computer Communication Review 42 (4), 293-294, 2012
182012
A statistical matching approach to detect privacy violation for trust-based collaborations
M Ahmed, D Quercia, S Hailes
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
162005
ADAM: An agent-based middleware architecture for distributed access control
A Seleznyov, MO Ahmed, S Hailes
The Twenty-Second International Multi-Conference on Applied Informatics …, 2004
162004
A component-based architecture for cognitive radio resource management
M Ahmed, S Hailes, V Kolar, M Petrova, P Mahonen
2009 4th International Conference on Cognitive Radio Oriented Wireless …, 2009
152009
Towards minimalistic, virtualized content caches with minicache
S Kuenzer, J Martins, M Ahmed, F Huici
Proceedings of the 2013 workshop on Hot topics in middleboxes and network …, 2013
132013
The system can't perform the operation now. Try again later.
Articles 1–20