• Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures 

      Punekar, Mayur; Malluhi, Qutaibah; Wang, Yongge; Desmedt, Yvo ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
    • Client-based confidential data sharing using untrusted clouds 

      Kamal, Naheel Faisal (2021 , Master Thesis)
      Cloud storage has been used widely by organizations and individuals. However, using known cloud providers is not a solution that can fit the needs of many entities that need to store private and sensitive data. This is due ...
    • Deanonymizing tor hidden service users through bitcoin transactions analysis 

      Al Jawaheri, Husam Basil (2017 , Master Thesis)
      With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due ...
    • FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues 

      EL-Manzalawy, Yasser; Abbas, Mostafa; Malluhi, Qutaibah; Honavar, Vasant ( Public Library of Science (PLoS) , 2016 , Article)
      A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ...
    • How to Attack a Disconnected Computer 

      Fezooni, Abdulhady younes; Ghannoum, Ehab Ahmad; Ayesh, Malek Ahmad; Malluhi, Qutaibah ( Qatar University Press , 2020 , Poster)
      This poster presents how a disconnected computer, that has no network access, can be attacked to retrieve data. Air-gapped devices are thought to be an impenetrable setup because the device is disconnected from the network ...
    • Intelligent Virtual Archiving for Accessing News Article Repositories 

      Lebda, Wadha K.; Fetais, Noura; Al Hussaini, Suad; Ismail, Sahar; Malluhi, Qutaibah ( IEEE , 2008 , Conference Paper)
      This paper proposes a news article archiving solution that addresses many of today's systems limitations for effective storage and management of unstructured data items. The proposed system employs formal concept analysis ...
    • INTERPRETABLE DEEP LEARNING MODELS FOR PREDICTION OF CLINICAL OUTCOMES FROM ELECTRONIC HEALTH RECORDS 

      ALSAAD, RAWAN TAYSEER (06-2 , Dissertation)
      The rapid adoption of electronic health records (EHRs) has generated tremendous amounts of valuable clinical data on complex diseases and health trajectories. Yet, achieving successful secondary use of this EHR data for ...
    • A Practical and Scalable Tool to Find Overlaps between Sequences 

      Rachid, Maan Haj; Malluhi, Qutaibah ( Hindawi , 2015 , Article)
      The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ...
    • Private Function Evaluation Using Intel's SGX 

      Abdurahiman, Nihal; Qadeib alban, Ahmad; shikfa, abdullatif; Malluhi, Qutaibah ( Qatar University Press , 2020 , Poster)
      Private Function Evaluation (PFE) is the problem of evalu- ating one party's private data using a private function owned by another party. Several techniques were presented to tackle PFE by running universal circuits in ...
    • The similarity-aware relational intersect database operator 

      Al Marri, Wadha J.; Malluhi, Qutaibah; Ouzzani, Mourad; Tang, Mingjie; Aref, Walid G. ( Springer International Publishing , 2014 , Conference Paper)
      Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
    • Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem 

      Rachid, Maan Haj; Malluhi, Qutaibah; Abouelhoda, Mohamed ( Hindawi , 2014 , Article)
      The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ...