Mohamed Ahmed
Mohamed Ahmed
Verified email at
Cited by
Cited by
Learning convolutional neural networks for graphs
M Niepert, M Ahmed, K Kutzkov
International conference on machine learning, 2014-2023, 2016
ClickOS and the art of network function virtualization
J Martins, M Ahmed, C Raiciu, V Olteanu, M Honda, R Bifulco, F Huici
11th {USENIX} symposium on networked systems design and implementation …, 2014
Temporal locality in today's content caching: Why it matters and how to model it
S Traverso, M Ahmed, M Garetto, P Giaccone, E Leonardi, S Niccolini
ACM SIGCOMM Computer Communication Review 43 (5), 5-12, 2013
A peek into the future: Predicting the evolution of popularity in user generated content
M Ahmed, S Spagna, F Huici, S Niccolini
Proceedings of the sixth ACM international conference on Web search and data …, 2013
Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm
J Kim, P Bentley, C Wallenta, M Ahmed, S Hailes
Unravelling the impact of temporal and geographical locality in content caching systems
S Traverso, M Ahmed, M Garetto, P Giaccone, E Leonardi, S Niccolini
IEEE Transactions on Multimedia 17 (10), 1839-1854, 2015
Enabling fast, dynamic network processing with clickos
J Martins, M Ahmed, C Raiciu, F Huici
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
Exploring deep recurrent models with reinforcement learning for molecule design
D Neil, M Segler, L Guasch, M Ahmed, D Plumbley, M Sellwood, N Brown
SUAAVE: Combining aerial robots and wireless networking
S Cameron, S Hailes, S Julier, S McClean, G Parr, N Trigoni, M Ahmed, ...
Understanding the detection of view fraud in video content portals
M Marciel, R Cuevas, A Banchs, R González, S Traverso, M Ahmed, ...
Proceedings of the 25th International Conference on World Wide Web, 357-368, 2016
Defactor: Differentiable edge factorization-based probabilistic graph generation
R Assouel, M Ahmed, MH Segler, A Saffari, Y Bengio
arXiv preprint arXiv:1811.09766, 2018
A statistical matching approach to detect privacy violation for trust-based collaborations
M Ahmed, D Quercia, S Hailes
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
Molecular representation learning with language models and domain-relevant auxiliary tasks
B Fabian, T Edlich, H Gaspar, M Segler, J Meyers, M Fiscato, M Ahmed
arXiv preprint arXiv:2011.13230, 2020
What's app? A wide-scale measurement study of smart phone markets
N d'Heureuse, F Huici, M Arumaithurai, M Ahmed, K Papagiannaki, ...
ACM SIGMOBILE Mobile Computing and Communications Review 16 (2), 16-27, 2012
Analyzing the performance of LRU caches under non-stationary traffic patterns
M Ahmed, S Traverso, P Giaccone, E Leonardi, S Niccolini
arXiv preprint arXiv:1301.4909, 2013
In-net: In-network processing for the masses
R Stoenescu, V Olteanu, M Popovici, M Ahmed, J Martins, R Bifulco, ...
Proceedings of the Tenth European Conference on Computer Systems, 1-15, 2015
The cookie recipe: Untangling the use of cookies in the wild
R Gonzalez, L Jiang, M Ahmed, M Marciel, R Cuevas, H Metwalley, ...
2017 Network Traffic Measurement and Analysis Conference (TMA), 1-9, 2017
Rethinking access networks with high performance virtual software brases
R Bifulco, T Dietz, F Huici, M Ahmed, J Martins, S Niccolini, HJ Kolbe
2013 Second European Workshop on Software Defined Networks, 7-12, 2013
Enabling dynamic network processing with clickOS
M Ahmed, F Huici, A Jahanpanah
ACM SIGCOMM Computer Communication Review 42 (4), 293-294, 2012
ADAM: An agent-based middleware architecture for distributed access control
A Seleznyov, MO Ahmed, S Hailes
The Twenty-Second International Multi-Conference on Applied Informatics …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20