default search action
Qutaibah M. Malluhi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Rawan AlSaad, Qutaibah M. Malluhi, Alaa A. Abd-Alrazaq, Sabri Boughorbel:
Temporal self-attention for risk prediction from electronic health records using non-stationary kernel approximation. Artif. Intell. Medicine 149: 102802 (2024) - [c69]Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. AFRICACRYPT 2024: 149-173 - [i9]Tamer Ahmed Eltaras, Qutaibah M. Malluhi, Alessandro Savino, Stefano Di Carlo, Adnan Qayyum, Junaid Qadir:
R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients. CoRR abs/2406.04227 (2024) - 2023
- [j41]Naheel Faisal Kamal, Abdulla Khalid Al-Ali, Abdulaziz Al-Ali, Sertac Bayhan, Qutaibah M. Malluhi:
LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids. IEEE Access 11: 95358-95367 (2023) - [j40]Kenan Begovic, Abdulaziz Al-Ali, Qutaibah M. Malluhi:
Cryptographic ransomware encryption detection: Survey. Comput. Secur. 132: 103349 (2023) - [c68]Farida Sabry, Wadha Labda, Tamer Eltaras, Fatima Hamza, Khawla Elzoubi, Qutaibah M. Malluhi:
Wearable Data Generation Using Time-Series Generative Adversarial Networks for Hydration Monitoring. BIOSIGNALS 2023: 94-105 - [c67]Maryam Mohammadi, Farida Sabry, Wadha Labda, Qutaibah M. Malluhi:
Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy. IWSPA@CODASPY 2023: 45-53 - [c66]Hussein A. Aly, Abdulaziz Alali, Abdulla K. Al-Ali, Qutaibah M. Malluhi:
Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data. ISGT EUROPE 2023: 1-5 - [i8]Kenan Begovic, Abdulaziz Al-Ali, Qutaibah M. Malluhi:
Cryptographic ransomware encryption detection: Survey. CoRR abs/2306.12008 (2023) - [i7]Hussein Aly, Abdulaziz Al-Ali, Abdullah Al-Ali, Qutaibah M. Malluhi:
A Blackbox Model Is All You Need to Breach Privacy: Smart Grid Forecasting Models as a Use Case. CoRR abs/2309.01523 (2023) - 2022
- [j39]Fawaz Kserawi, Saeed Al-Marri, Qutaibah M. Malluhi:
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation. IEEE Access 10: 43159-43174 (2022) - [j38]Rawan AlSaad, Qutaibah M. Malluhi, Sabri Boughorbel:
PredictPTB: an interpretable preterm birth prediction model using attention-based recurrent neural networks. BioData Min. 15(1) (2022) - [j37]Farida Sabry, Tamer Eltaras, Wadha Labda, Fatima Hamza, Khawla Alzoubi, Qutaibah M. Malluhi:
Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data. Sensors 22(5): 1887 (2022) - [c65]Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs. ISC 2022: 3-19 - 2021
- [j36]Muhammad Usama, Qutaibah M. Malluhi, Nordin Zakaria, Imran Razzak, Waheed Iqbal:
An efficient secure data compression technique based on chaos and adaptive Huffman coding. Peer-to-Peer Netw. Appl. 14(5): 2651-2664 (2021) - [c64]Naheel Faisal Kamal, Qutaibah M. Malluhi:
Client-Based Secure IoT Data Sharing using Untrusted Clouds. WF-IoT 2021: 409-414 - 2020
- [j35]Naram Mhaisen, Qutaibah M. Malluhi:
Data Consistency in Multi-Cloud Storage Systems With Passive Servers and Non-Communicating Clients. IEEE Access 8: 164977-164986 (2020) - [j34]Farida Sabry, Wadha Labda, Aiman Erbad, Qutaibah M. Malluhi:
Cryptocurrencies and Artificial Intelligence: Challenges and Opportunities. IEEE Access 8: 175840-175858 (2020) - [j33]Ahmad Qadeib Alban, Fahad Islam, Qutaibah M. Malluhi, Ali Jaoua:
Anomalies Detection in Software by Conceptual Learning From Normal Executions. IEEE Access 8: 179845-179856 (2020) - [j32]Maan Haj Rachid, Ryan D. Riley, Qutaibah M. Malluhi:
Enclave-based oblivious RAM using Intel's SGX. Comput. Secur. 91: 101711 (2020) - [j31]Mingjie Tang, Yongyang Yu, Ahmed R. Mahmood, Qutaibah M. Malluhi, Mourad Ouzzani, Walid G. Aref:
LocationSpark: In-memory Distributed Spatial Query Processing and Optimization. Frontiers Big Data 3: 30 (2020) - [j30]Omar Abou Selo, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. Secur. Commun. Networks 2020: 3042642:1-3042642:10 (2020) - [j29]Qutaibah M. Malluhi, Vinh Duc Tran, Viet Cuong Trinh:
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption. Symmetry 12(6): 969 (2020) - [c63]Israa Alsarsour, Qutaibah M. Malluhi, Yongge Wang:
Free Chain: Enabling Freedom of Expression through Public Blockchains. DependSys 2020: 33-40 - [c62]Fawaz Kserawi, Qutaibah M. Malluhi:
Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid. DependSys 2020: 106-111
2010 – 2019
- 2019
- [j28]Yongge Wang, Qutaibah M. Malluhi:
The limit of blockchains: infeasibility of a smart Obama-Trump contract. Commun. ACM 62(5): 64-69 (2019) - [j27]Qutaibah M. Malluhi, Abdullatif Shikfa, Vinh Duc Tran, Viet Cuong Trinh:
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices. Comput. Commun. 145: 113-125 (2019) - [j26]Rawan AlSaad, Qutaibah M. Malluhi, Ibrahim Janahi, Sabri Boughorbel:
Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma. BMC Medical Informatics Decis. Mak. 19(1): 214:1-214:11 (2019) - [j25]Mohamed Nassar, Qutaibah M. Malluhi, Mikhail J. Atallah, Abdullatif Shikfa:
Securing Aggregate Queries for DNA Databases. IEEE Trans. Cloud Comput. 7(3): 827-837 (2019) - [c61]Yongge Wang, Qutaibah M. Malluhi:
Reusable Garbled Turing Machines Without FHE. C2SI 2019: 381-398 - [c60]Mingjie Tang, Yongyang Yu, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
Efficient Parallel Skyline Query Processing for High-Dimensional Data. ICDE 2019: 2113-2114 - [c59]Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, Tianyuan Xie:
Breaking HK17 in Practice. ISIT 2019: 1877-1881 - [c58]Farida Sabry, Wadha Labda, Aiman Erbad, Husam Al Jawaheri, Qutaibah M. Malluhi:
Anonymity and Privacy in Bitcoin Escrow Trades. WPES@CCS 2019: 211-220 - [i6]Mingjie Tang, Yongyang Yu, Walid G. Aref, Ahmed R. Mahmood, Qutaibah M. Malluhi, Mourad Ouzzani:
LocationSpark: In-memory Distributed Spatial Query Processing and Optimization. CoRR abs/1907.03736 (2019) - 2018
- [j24]Khaleel Mershad, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Michael Gribskov, Walid G. Aref:
AUDIT: approving and tracking updates with dependencies in collaborative databases. Distributed Parallel Databases 36(1): 81-119 (2018) - [j23]Khaleel Mershad, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Michael Gribskov, Walid G. Aref, Deo Prakash:
COACT: a query interface language for collaborative databases. Distributed Parallel Databases 36(1): 121-151 (2018) - [j22]Izzet F. Senturk, Ponnuraman Balakrishnan, Anas Abu-Doleh, Kamer Kaya, Qutaibah M. Malluhi, Ümit V. Çatalyürek:
A resource provisioning framework for bioinformatics applications in multi-cloud environments. Future Gener. Comput. Syst. 78: 379-391 (2018) - [j21]MingJie Tang, Yongyang Yu, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
Efficient Parallel Skyline Query Processing for High-Dimensional Data. IEEE Trans. Knowl. Data Eng. 30(10): 1838-1851 (2018) - [c57]Mohamed Nassar, Qutaibah M. Malluhi, Tanveer Khan:
A Scheme for Three-way Secure and Verifiable E-Voting. AICCSA 2018: 1-6 - [i5]Yongge Wang, Qutaibah M. Malluhi:
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. IACR Cryptol. ePrint Arch. 2018: 252 (2018) - 2017
- [c56]Mayur Punekar, Qutaibah M. Malluhi, Yongge Wang, Yvo Desmedt:
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. BDCAT 2017: 33-42 - [c55]Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. CANS 2017: 470-481 - [c54]Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. AsiaCCS 2017: 230-240 - [c53]Yongyang Yu, MingJie Tang, Walid G. Aref, Qutaibah M. Malluhi, Mostafa M. Abbas, Mourad Ouzzani:
In-Memory Distributed Matrix Computation Processing and Optimization. ICDE 2017: 1047-1058 - [i4]Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. IACR Cryptol. ePrint Arch. 2017: 41 (2017) - [i3]Yongge Wang, Qutaibah M. Malluhi:
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project. IACR Cryptol. ePrint Arch. 2017: 1258 (2017) - 2016
- [j20]Abdul Hameed, Alireza Khoshkbarforoushha, Rajiv Ranjan, Prem Prakash Jayaraman, Joanna Kolodziej, Pavan Balaji, Sherali Zeadally, Qutaibah Marwan Malluhi, Nikos Tziritas, Abhinav Vishnu, Samee U. Khan, Albert Y. Zomaya:
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing 98(7): 751-774 (2016) - [j19]Saif Ur Rehman Malik, Samee U. Khan, Sam J. Ewen, Nikos Tziritas, Joanna Kolodziej, Albert Y. Zomaya, Sajjad Ahmad Madani, Nasro Min-Allah, Lizhe Wang, Cheng-Zhong Xu, Qutaibah M. Malluhi, Johnatan E. Pecero, Pavan Balaji, Abhinav Vishnu, Rajiv Ranjan, Sherali Zeadally, Hongxiang Li:
Performance analysis of data intensive cloud systems based on data management and replication: a survey. Distributed Parallel Databases 34(2): 179-215 (2016) - [j18]Yongge Wang, Qutaibah M. Malluhi, Khaled Md. Khan:
Garbled computation in cloud. Future Gener. Comput. Syst. 62: 54-65 (2016) - [j17]Wadha J. Al Marri, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Walid G. Aref:
The similarity-aware relational database set operators. Inf. Syst. 59: 79-93 (2016) - [j16]MingJie Tang, Yongyang Yu, Qutaibah M. Malluhi, Mourad Ouzzani, Walid G. Aref:
LocationSpark: A Distributed In-Memory Data Management System for Big Spatial Data. Proc. VLDB Endow. 9(13): 1565-1568 (2016) - [j15]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-Dimensional Relational Data. IEEE Trans. Knowl. Data Eng. 28(2): 510-523 (2016) - [j14]Fan Zhang, Kai Hwang, Samee U. Khan, Qutaibah M. Malluhi:
Skyline Discovery and Composition of Multi-Cloud Mashup Services. IEEE Trans. Serv. Comput. 9(1): 72-83 (2016) - [c52]Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. ESORICS (1) 2016: 301-323 - [c51]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-By operators for multi-dimensional relational data. ICDE 2016: 1448-1449 - [c50]Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
An efficient instance hiding scheme. SoICT 2016: 388-395 - 2015
- [j13]Fan Zhang, Qutaibah M. Malluhi, Tamer Elsayed, Samee U. Khan, Keqin Li, Albert Y. Zomaya:
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems. Future Gener. Comput. Syst. 51: 98-110 (2015) - [j12]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Anonymizing transactional datasets. J. Comput. Secur. 23(1): 89-106 (2015) - [c49]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Efficient Sanitization of Unsafe Data Correlations. EDBT/ICDT Workshops 2015: 278-285 - [c48]MingJie Tang, Yongyang Yu, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
Efficient Processing of Hamming-Distance-Based Similarity-Search Queries Over MapReduce. EDBT 2015: 361-372 - [c47]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud. EDOC 2015: 134-141 - [c46]Khaleel Mershad, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Walid G. Aref:
Approving Updates in Collaborative Databases. IC2E 2015: 42-47 - [c45]Mostafa M. Abbas, Ponnuraman Balakrishnan, Qutaibah M. Malluhi:
Evaluation of Combined Genome Assemblies: A Case Study with Fungal Genomes. IWBBIO (2) 2015: 333-344 - [e1]Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez-González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, Farkhund Iqbal:
Distributed Computing and Artificial Intelligence, 12th International Conference, DCAI 2015, Salamanca, Spain, June 3-5, 2015. Advances in Intelligent Systems and Computing 373, Springer 2015, ISBN 978-3-319-19637-4 [contents] - 2014
- [c44]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
A Model Driven Framework for Secure Outsourcing of Computation to the Cloud. IEEE CLOUD 2014: 968-969 - [c43]Amel Hamzaoui, Qutaibah M. Malluhi, Chris Clifton, Ryan D. Riley:
Association Rule Mining on Fragmented Database. DPM/SETOP/QASA 2014: 335-342 - [c42]Farida Sabry, Abdelkarim Erradi, Mohamed Nassar, Qutaibah M. Malluhi:
Automatic Generation of Optimized Workflow for Distributed Computations on Large-Scale Matrices. ICSOC 2014: 79-92 - [c41]Mostafa M. Abbas, Qutaibah M. Malluhi, Ponnuraman Balakrishnan:
Scalable Multi-core Implementation for Motif Finding Problem. ISPDC 2014: 178-183 - [c40]Wadha J. Al Marri, Qutaibah M. Malluhi, Mourad Ouzzani, MingJie Tang, Walid G. Aref:
The Similarity-Aware Relational Intersect Database Operator. SISAP 2014: 164-175 - [i2]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Qutaibah M. Malluhi, Mourad Ouzzani:
On Order-independent Semantics of the Similarity Group-By Relational Database Operator. CoRR abs/1412.4303 (2014) - [i1]MingJie Tang, Ruby Y. Tahboub, Walid G. Aref, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, Yasin N. Silva:
Similarity Group-by Operators for Multi-dimensional Relational Data. CoRR abs/1412.4842 (2014) - 2013
- [j11]Khaled M. Khan, Qutaibah M. Malluhi:
Trust in Cloud Services: Providing More Controls to Clients. Computer 46(7): 94-96 (2013) - [j10]Khaled M. Khan, Qutaibah M. Malluhi:
Role of contextual properties in enterprise service migration to cloud computing. Concurr. Comput. Pract. Exp. 25(18): 2455-2470 (2013) - [c39]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
Secure Outsourcing of Matrix Operations as a Service. IEEE CLOUD 2013: 918-925 - [c38]Mohamed Nassar, Bechara al Bouna, Qutaibah M. Malluhi:
Secure Outsourcing of Network Flow Data Analysis. BigData Congress 2013: 431-432 - [c37]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Using Safety Constraint for Transactional Dataset Anonymization. DBSec 2013: 164-178 - [c36]Ahmet Erhan Nergiz, Chris Clifton, Qutaibah M. Malluhi:
Updating outsourced anatomized private databases. EDBT 2013: 179-190 - [c35]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
Practical and Secure Outsourcing of Matrix Computations to the Cloud. ICDCS Workshops 2013: 70-75 - [c34]Shumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi:
Secure and Private Outsourcing of Shape-Based Feature Extraction. ICICS 2013: 90-99 - [c33]Fan Zhang, Qutaibah M. Malluhi, Tamer M. Elsyed:
ConMR: Concurrent MapReduce Programming Model for Large Scale Shared-Data Applications. ICPP 2013: 671-679 - [c32]Ryan D. Riley, Chris Clifton, Qutaibah M. Malluhi:
Maintaining Database Anonymity in the Presence of Queries. STM 2013: 33-48 - 2012
- [c31]Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi:
Secure and Efficient Outsourcing of Sequence Comparisons. ESORICS 2012: 505-522 - 2011
- [c30]Khaled M. Khan, Qutaibah M. Malluhi:
Identifying Contextual Properties of Software Architecture in Cloud Computing. DASC 2011: 561-568 - 2010
- [j9]Khaled M. Khan, Qutaibah M. Malluhi:
Establishing Trust in Cloud Computing. IT Prof. 12(5): 20-27 (2010) - [c29]Khaled M. Khan, Qutaibah M. Malluhi:
Security-Aware Service Composition for End Users of Small Enterprises. SoMeT 2010: 257-267
2000 – 2009
- 2009
- [c28]Sungbum Hong, Qutaibah M. Malluhi, Tom Jacob:
Efficient Channel Allocation Scheme with Triangle Communication. ICN 2009: 297-305 - 2008
- [c27]Wadha K. Lebda, Noura Fetais, Suad Al Hussaini, Sahar smail, Qutaibah M. Malluhi:
Intelligent virtual archiving for accessing news article repositories. AICCSA 2008: 909-912 - [c26]Noora AlNaimi, Nuha Barhoum, Abeer Nasser, Alia Swidan, Qutaibah M. Malluhi:
A system for automatic gathering and intelligent analyses of Doha traffic data. AICCSA 2008: 935-936 - [c25]Tarek M. El-Fouly, Mohammed Saleh, Qutaibah M. Malluhi:
Efficient Forward Error Correction for Reliable Transmission in Packet Networks. PDPTA 2008: 103-109 - 2007
- [c24]Qutaibah M. Malluhi, Sungbum Hong:
An Efficient Algorithm for Determining the Relationship between Two Nodes on DAG. FCS 2007: 144-147 - [c23]Qutaibah M. Malluhi, Zhi Lin:
Bypassing the System Caching and the Filesystem for High-Performance I/O Intensive Applications. PDPTA 2007: 410-414 - [c22]Omar Aldaoud, Houssain Kettani, Krishnapriya Guduru, Qutaibah M. Malluhi:
Storage Performance over Fast Ethernet, Giga Ethernet, Giga Ethernet TOE and InfiniBand. PDPTA 2007: 967-871 - 2006
- [c21]Qutaibah M. Malluhi, M. F. Malouhi:
Ragged-Edge Array Coding for Reliable and Efficient Storage Arrays. AICCSA 2006: 144-150 - [c20]Xuejun Liang, Qutaibah M. Malluhi:
Combinatorial Optimization in Mapping Generalized Template Matching onto Reconfigurable Computers. ERSA 2006: 223-226 - [c19]Omar Aldaoud, Houssain Kettani, Krishnapriya Guduru, Qutaibah M. Malluhi:
Performance Analysis of Network Storage Manager System Using DAFS over InfiniBand. PDPTA 2006: 151-157 - 2005
- [c18]Omar Aldaoud, Krishnapriya Guduru, Qutaibah M. Malluhi:
Reliable Distributed Lookup Service Based on Jini and JGroups. PDPTA 2005: 1325-1331 - [c17]Qutaibah M. Malluhi, Vinti Verma:
Impact of Ethernet Jumbo Frames on TCP/IP Application Performance. PDPTA 2005: 1332-1335 - 2004
- [c16]Zeyad Ali, Qutaibah M. Malluhi:
Application-Controllable Policies in the NSM Distributed Mass Storage System. CLADE 2004: 96 - [c15]Zeyad Ali, Qutaibah M. Malluhi:
Enhancing Data-Intensive Applications Performance by Tuning the Distributed Storage Policies. PDPTA 2004: 1515-1522 - 2003
- [j8]Qutaibah M. Malluhi, Gwang S. Jung:
Enabling High-Performance Data Service in the Web Environment. Int. J. Comput. Their Appl. 10(2): 125-133 (2003) - [c14]Shaofeng Yang, Zeyad Ali, Houssain Kettani, Vinti Verma, Qutaibah M. Malluhi:
Network Storage Management in Data Grid Environment. GCC (2) 2003: 879-886 - [c13]Zeyad Ali, Qutaibah M. Malluhi:
NSM: A Distributed Storage Architecture for Data-Intensive Applications. IEEE Symposium on Mass Storage Systems 2003: 87-91 - 2002
- [c12]Qutaibah M. Malluhi, Zeyad Ali:
DTViewer: A High Performance Distributed Terrain Image Viewer with Reliable Data Delivery. JCIS 2002: 927-930 - 2000
- [c11]Gwang S. Jung, Kyung W. Kang, Qutaibah M. Malluhi:
Multithreaded Distributed MPEGI-Video Delivery in the Internet Environment. SAC (2) 2000: 592-597 - [c10]Qutaibah M. Malluhi, Debasis Mitra, Bassem A. Alhalabi, Mohammad Khalid Hamza:
Turning chaos into order: a critical evaluation of web-based technologies. WebNet 2000: 910-915
1990 – 1999
- 1999
- [c9]Qutaibah M. Malluhi, Gwang S. Jung, William E. Johnston:
Efficient and Dependable Multimedia Data Delivery Service in World Wide Web Environment. HICSS 1999 - 1998
- [j7]Qutaibah M. Malluhi, William E. Johnston:
Coding for High Availability of a Distributed-Parallel Storage System. IEEE Trans. Parallel Distributed Syst. 9(12): 1237-1252 (1998) - [c8]Bassem A. Alhalabi, Qutaibah M. Malluhi, Rafic A. Ayoubi:
Non-Refreshing Analog Neural Storage Tailored for On-Chip Learning. Great Lakes Symposium on VLSI 1998: 168- - [c7]Gwang S. Jung, Qutaibah M. Malluhi, W. G. Brown:
A Scheme for High-Performance Data Delivery in the Web Environment. ICPADS 1998: 210-217 - 1997
- [c6]Qutaibah M. Malluhi, William E. Johnston:
Techniques for Availability and Reliability of Distributed-Parallel Storage Systems. Euro-PDS 1997: 23-28 - 1996
- [j6]Qutaibah M. Malluhi, Magdy A. Bayoumi, T. R. N. Rao:
Correction to "Efficient Mapping of ANNs on Hypercube Massively Parallel Machines". IEEE Trans. Computers 45(4): 511 (1996) - [j5]Rafic A. Ayoubi, Qutaibah M. Malluhi, Magdy A. Bayoumi:
The Extended Cube Connected Cycles: An Efficient Interconnection for Massively Parallel Systems. IEEE Trans. Computers 45(5): 609-614 (1996) - [c5]Qutaibah M. Malluhi, William E. Johnston:
Approaches for a Reliable High-Performance Distributed-Parallel Storage System. HPDC 1996: 500-509 - 1995
- [j4]Qutaibah M. Malluhi, Magdy A. Bayoumi, T. R. N. Rao:
Efficient Mapping of ANNs on Hypercube Massively Parallel Machines. IEEE Trans. Computers 44(6): 769-779 (1995) - [j3]Bojan Groselj, Qutaibah M. Malluhi:
Combinatorial Optimization of Distributed Queries. IEEE Trans. Knowl. Data Eng. 7(6): 915-927 (1995) - [j2]Qutaibah M. Malluhi, Magdy A. Bayoumi, T. R. N. Rao:
Tree-based special-purpose Array architectures for neural computing. J. VLSI Signal Process. 11(3): 245-262 (1995) - 1994
- [j1]Qutaibah M. Malluhi, Magdy A. Bayoumi:
The Hierarchical Hypercube: A New Interconnection Topology for Massively Parallel Systems. IEEE Trans. Parallel Distributed Syst. 5(1): 17-30 (1994) - 1993
- [c4]Qutaibah M. Malluhi, Magdy A. Bayoumi, T. R. N. Rao:
An application-specific array architecture for feedforward with backpropagation ANNs. ASAP 1993: 333-344 - [c3]Qutaibah M. Malluhi, Magdy A. Bayoumi, T. R. N. Rao:
On the Hierarchical Hypercube Interconnection Network. IPPS 1993: 524-530 - [c2]Qutaibah M. Malluhi, Magdy A. Bayoumi, T. R. N. Rao:
An Efficient Mapping of Multilayer Perceptron with Backpropagation ANNs on Hypercubes. SPDP 1993: 368-375 - 1992
- [c1]Qutaibah M. Malluhi, Magdy A. Bayoumi:
Properties and Performance of the Hierarchical Hypercube. IPPS 1992: 47-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint