**Contact: **

Room No. 522

Department of Computer Science & Engineering

Bangladesh University of Engineering & Technology

New Academic Building, West Palashi

Dhaka-1000, Bangladesh.

**Email: **

rimpi0505042@gmail.com, rimpi@cse.buet.ac.bd

**Telephone: **

Office:

Cell: +88 01713225520

Residence:

Firewall Security

Cloud Computing

Distributed Computing

Bioinformatics and Computational Biology

University of Texas at Austin, USA, 2019.

M.Sc. Engineering in Computer Science and Engineering

BUET, 2013.

B.Sc. Engineering in Computer Science & Engineering

BUET, 2011.

Journal Publications:

M. Islam, K. Sarker, T. Das, R. Reaz, and M. Bayzid, STELAR: A statistically consistent coalescent-based species tree estimation method by maximizing triplet consistency, BMC Genomics. (to appear)

R. Reaz, H. B. Acharya, E. S. Elmallah, J. A. Cobb, and M. G. Gouda. “Policy Expressions and the Bottom-Up Design of Computing Policies”. Computing, 101(9):1307–1326, 2019.

R. Reaz, M. Bayzid, and M. S. Rahman. “Accurate Phylogenetic Tree Reconstruction from Quartets: A Heuristic Approach”. PloS one, vol. 9(8), 2014.

S. Mirarab, R. Reaz, M. Bayzid, T. Zimmermann, M. Swenson, and T. Warnow. “ASTRAL: genome-scale coalescent-based species tree estimation”. Bioinformatics, vol. 30(17), pp. 541-548, 2014.

S.Nazeen, M. S.Rahman, and R. Reaz, “Indeterminate String Inference Algorithms”, Journal of Discrete Algorithms, vol. 10, pp. 23-34, 2012.

Conference Publications:

R. Reaz, E. S. Elmallah, and M. G. Gouda. “Executing Firewalls in Public Clouds”. In the proceedings of the 10th International Conference on Computing, Communication, and Networking Technologies (ICCCNT), pp. 1-6. IEEE, 2019.

R. Reaz, H. B. Acharya, E. S. Elmallah, J. A. Cobb, and M. G. Gouda. “Policy Expressions and the Bottom-Up Design of Computing Policies”. In the proceedings of the 5th International Conference on Networked Systems (NETYS), pp. 151-165, Springer, Cham, 2017.

M. J. H. Heule, R. Reaz, H. B. Acharya and M. G. Gouda. “Analysis of Computing Policies Using SAT Solvers (Short Paper)”. In the proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 190 - 194, Springer, 2016.

M. Ali, R. Reaz, and M. G. Gouda. “Non-repudiation Protocols without a Trusted Party”. In the proceedings of the 4th International Conference on Networked Systems (NETYS), pp. 1-15, Springer, 2016.

M. Ali, R. Reaz, and M. G. Gouda. “Two-Phase Non-repudiation Protocols”. In the proceedings of the 7th International Conference on Computing, Communication, and Networking Technologies(ICCCNT), p. 22. ACM, 2016.

R. Reaz, M. Ali, M. G. Gouda, M. J. H. Heule, and E. S. Elmallah. “The Implication Problem of Computing Policies”. In the proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 109-123. Springer, 2015.

T. M. Moosa, S.Nazeen, M. S.Rahman, and R. Reaz, “Linear Time Inference of Strings from Cover Arrays using a Binary Alphabet”. In the proceedings of the workshop on Algorithms and Computation (WALCOM), Lecture Notes in Computer Science, vol. 7157, Springer, pp. 160-172, 2012.

1. | T.M. Moosa, Sumaiya Nazeen, M. Sohel Rahman, Rezwana Reaz Rimpi, Inferring Strings from Cover Arrays, Discrete Mathematics, Algorithms and Applications (DMAA), 5(2), , 2013. |
---|---|

2. | Sumaiya Nazeen, M. Sohel Rahman, Rezwana Reaz Rimpi, Indeterminate string inference algorithms, Journal of Discrete Algorithms, 10, 23-34, 2012. |

1. | Sumaiya Nazeen, Tanaeem M Moosa, M. Sohel Rahman, Rezwana Reaz Rimpi, Linear Time Inference of Strings from Cover Arrays using a Binary Alphabet, WALCOM, , 160-172, 2012. |
---|