Mohamed Ahmed

Affiliations:
  • NEC Laboratories Europe, Heidelberg, Germany
  • University College London, UK (former)


According to our database1, Mohamed Ahmed authored at least 26 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Vocabulary for Growth: Topic Modeling of Content Popularity Evolution.
IEEE Trans. Multim., 2018

2017
The cookie recipe: Untangling the use of cookies in the wild.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

2016
Understanding the Detection of View Fraud in Video Content Portals.
Proceedings of the 25th International Conference on World Wide Web, 2016

Efficient Distributed Decision Trees for Robust Regression.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016

Learning Convolutional Neural Networks for Graphs.
Proceedings of the 33nd International Conference on Machine Learning, 2016

The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Unravelling the Impact of Temporal and Geographical Locality in Content Caching Systems.
IEEE Trans. Multim., 2015

Understanding the detection of fake view fraud in Video Content Portals.
CoRR, 2015

In-Net: in-network processing for the masses.
Proceedings of the Tenth European Conference on Computer Systems, 2015

Weighted Similarity Estimation in Data Streams.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
ClickOS and the Art of Network Function Virtualization.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Policy-enabled internet of things deployable platforms for vaccine cold chains.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

2013
Why Temporal Locality Matters: Evaluating Cache Performance for Content-on-Demand Distribution
CoRR, 2013

Analyzing the Performance of LRU Caches under Non-Stationary Traffic Patterns
CoRR, 2013

Temporal locality in today's content caching: why it matters and how to model it.
Comput. Commun. Rev., 2013

A peek into the future: predicting the evolution of popularity in user generated content.
Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, 2013

Enabling fast, dynamic network processing with clickOS.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Rethinking Access Networks with High Performance Virtual Software BRASes.
Proceedings of the Second European Workshop on Software Defined Networks, 2013

Towards minimalistic, virtualized content caches with minicache.
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization, 2013

2012
What's app?: a wide-scale measurement study of smart phone markets.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012

Enabling dynamic network processing with clickOS.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

2009
Towards Understanding the Requirements and Limitations of Reputation-Based Systems.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A component-based architecture for cognitive radio resource management.
Proceedings of the 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2009

2006
MACE: adaptive component management middleware for ubiquitous systems.
Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2006), held at the ACM/IFIP/USENIX 7th International Middleware Conference, November 27, 2006

Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

2005
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations.
Proceedings of the 2005 International Conference on a World of Wireless, 2005


  Loading...