X hits on this document

12 views

0 shares

0 downloads

0 comments

4 / 4

Safwan Mahmud Khan sainankhan@yahoo.com +1-817-721-0132

Conference Papers

  • [C.

    1] S. M. Khan, K. W. Hamlen, Hatman: Intra-cloud Trust Management for Hadoop, in Proceedings of the 5th IEEE International Conference on Cloud Computing (CLOUD’12), Honolulu, Hawaii, USA, June, 2012. [acceptance rate: 19%]

  • [C.

    2] S. M. Khan, K. W. Hamlen, AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing, in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’12), Liverpool, UK, June, 2012. [acceptance rate: <30%]

  • [C.

    3] S. M. Khan, M. R. Islam, M. U. Chowdhury, Medical Image Classification Using an Efficient Data Mining Technique, in Proceedings of IEEE/ACM International Conference on Machine Learning and Applications (ICMLA'04), Louisville, KY, USA, December, 2004.

  • [C.

    4] M. R. Islam, S. M. Khan, M. Asad-uz-zaman, S. S. K. Robin, A Comparative Study among Three Algorithms for Frequent Pattern Generation, in Proceedings of IEEE/ACM International Conference on Machine Learning and Applications (ICMLA'04), Louisville, KY, USA, December, 2004.

  • [C.

    5] M. A. H. Khan, M. A. N. Siddique, M. Asad-uz-zaman, S. M. Khan, S. S. K. Robin, A different approach to barrier synchronization mechanism for the BSP model on message-passing architectures, in Proceedings of International Conference on Virtual Systems and Multimedia (VSMM 2004), Softopia, Ogaki City, Japan, November, 2004.

  • [C.

    6] M. R. Islam, S. M. Khan, S. S. K. Robin, M. Asad-uz-zaman, A Comparative Study among Algorithms for Frequent Pattern Generation in Data Mining, in Proceedings of IASTED International Conference on Artificial Intelligence and Soft Computing (ASC 2004), Marbella, Spain, September, 2004.

Workshop

[W.1] S. M. Khan, M. Wright, Salsa: a Structured Approach to Large-Scale Anonymity, a poster presentation in the DIMACS/DyDan Workshop on Mathematical and Computational Methods for Information Security, Houston, Texas, USA, December, 2007.

Honors and Awards

  • Scholarship for Excellence in Information Security by the department of Computer Science and Engineering, University of Texas at Arlington.

  • Certificate of Achievement for 4th Place in the 27th ACM International Collegiate Programming Contest (ICPC) 2002, Asia Regional, BUET, Dhaka, Bangladesh.

  • Board Merit Scholarship for 4 years by Bangladesh Government for excellent results in the Higher Secondary Certificate Examination.

  • Board Merit Scholarship for 2 years by Bangladesh Government for excellent results in the Secondary School Certificate Examination.

References Available upon request.

Last updated: September 2012

Document info
Document views12
Page views12
Page last viewedSat Dec 03 16:11:50 UTC 2016
Pages4
Paragraphs192
Words1593

Comments