Qutaibah Malluhi
Title
Cited by
Cited by
Year
Establishing trust in cloud computing
KM Khan, Q Malluhi
IT professional 12 (5), 20-27, 2010
4582010
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
A Hameed, A Khoshkbarforoushha, R Ranjan, PP Jayaraman, J Kolodziej, ...
Computing 98 (7), 751-774, 2016
3112016
The hierarchical hypercube: A new interconnection topology for massively parallel systems
QM Malluhi, MA Bayoumi
IEEE Transactions on Parallel and Distributed Systems 5 (1), 17-30, 1994
1601994
Locationspark: A distributed in-memory data management system for big spatial data
M Tang, Y Yu, QM Malluhi, M Ouzzani, WG Aref
Proceedings of the VLDB Endowment 9 (13), 1565-1568, 2016
1392016
Secure and efficient outsourcing of sequence comparisons
M Blanton, MJ Atallah, KB Frikken, Q Malluhi
European Symposium on Research in Computer Security, 505-522, 2012
872012
Performance analysis of data intensive cloud systems based on data management and replication: a survey
SUR Malik, SU Khan, SJ Ewen, N Tziritas, J Kolodziej, AY Zomaya, ...
Distributed and Parallel Databases 34 (2), 179-215, 2016
512016
Coding for high availability of a distributed-parallel storage system
QM Malluhi, WE Johnston
IEEE Transactions on Parallel and Distributed Systems 9 (12), 1237-1252, 1998
421998
Trust in cloud services: providing more controls to clients
KM Khan, Q Malluhi
IEEE Annals of the History of Computing 46 (07), 94-96, 2013
412013
Highly scalable sequential pattern mining based on MapReduce model on the cloud
CC Chen, CY Tseng, MS Chen
2013 IEEE International Congress on Big Data, 310-317, 2013
38*2013
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
International conference on information and communications security, 90-99, 2013
352013
Efficient mapping of ANNs on hypercube massively parallel machines
QM Malluhi, MA Bayoumi, TRN Rao
IEEE Transactions on Computers 44 (6), 769-779, 1995
351995
A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption
QM Malluhi, A Shikfa, VC Trinh
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
322017
Assessment of de novo assemblers for draft genomes: a case study with fungal genomes
MM Abbas, QM Malluhi, P Balakrishnan
BMC genomics 15 (9), 1-12, 2014
312014
Skyline Discovery and Composition of Multi-Cloud Mashup Services
QMM Fan Zhang, Kai Hwang, Samee U. Khan
IEEE Trans. Services Computing 9, 2016
30*2016
A resource provisioning framework for bioinformatics applications in multi-cloud environments
IF Senturk, P Balakrishnan, A Abu-Doleh, K Kaya, Q Malluhi, ...
Future Generation Computer Systems 78, 379-391, 2018
242018
Paillier's encryption: Implementation and cloud applications
M Nassar, A Erradi, QM Malluhi
2015 International Conference on Applied Research in Computer Science and …, 2015
222015
Deanonymizing tor hidden service users through bitcoin transactions analysis
H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad
Computers & Security 89, 101684, 2020
212020
Efficient Processing of Hamming-Distance-Based Similarity-Search Queries Over MapReduce.
MJ Tang, Y Yu, WG Aref, QM Malluhi, M Ouzzani
EDBT, 361-372, 2015
212015
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
202013
Similarity Group-By operators for multi-dimensional relational data
MJ Tang, RY Tahboub, WG Aref, MJ Atallah, QM Malluhi, M Ouzzani, ...
32nd IEEE International Conference on Data Engineering, ICDE 2016, 1448--1449, 2016
192016
The system can't perform the operation now. Try again later.
Articles 1–20