scispace - formally typeset
A

Ahmed El-Hassany

Researcher at ETH Zurich

Publications -  10
Citations -  316

Ahmed El-Hassany is an academic researcher from ETH Zurich. The author has contributed to research in topics: Concurrency & Troubleshooting. The author has an hindex of 7, co-authored 10 publications receiving 282 citations. Previous affiliations of Ahmed El-Hassany include Institute of Company Secretaries of India & Indiana University.

Papers
More filters
Proceedings ArticleDOI

Troubleshooting blackbox SDN control software with minimal causal sequences

TL;DR: This paper presents a technique for automatically identifying a minimal sequence of inputs responsible for triggering a given bug, without making assumptions about the language or instrumentation of the software under test.
Proceedings Article

NetComplete: Practical Network Wide Configuration Synthesis with Autocompletion

TL;DR: This work presents NetComplete, a system that assists operators in modifying existing network-wide configurations to comply with new routing policies, and implemented NetComplete and showed that it can autocomplete configurations using static routes, OSPF, and BGP.
Posted Content

Network-wide Configuration Synthesis

TL;DR: Computer networks are hard to manage, given a set of high-level requirements, and operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols so that they, collectively, compute a compatible forwarding state.
Proceedings ArticleDOI

SDNRacer: concurrency analysis for software-defined networks

TL;DR: The paper evaluates SDNRacer on several real-world OpenFlow controllers, running both reactive and proactive applications in large networks, and shows that the tool is practically effective: it quickly pinpoints harmful concurrency violations without overwhelming the user with false positives.
Book ChapterDOI

Network-Wide Configuration Synthesis

TL;DR: In this paper, the authors present a set of high-level requirements (e.g., reachability, security) that operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols so that they collectively compute a compatible forwarding state.