faculty image


Contact:
Room No. 522
Department of Computer Science & Engineering
Bangladesh University of Engineering & Technology
New Academic Building, West Palashi
Dhaka-1000, Bangladesh.

Email:
rimpi0505042@gmail.com, rimpi@cse.buet.ac.bd

Telephone:
Office:
Cell: +88 01713225520
Residence:

Web page:

Dr. Rezwana Reaz (রিজওয়ানা রিয়াজ )

Lecturer
Research Area:
Bioinformatics and Computational Biology

Research Interest:
Network Protocols
Firewall Security
Cloud Computing
Distributed Computing
Bioinformatics and Computational Biology
Academic Background:
PhD in Computer Science
University of Texas at Austin, USA, 2019.
M.Sc. Engineering in Computer Science and Engineering
BUET, 2013.
B.Sc. Engineering in Computer Science & Engineering
BUET, 2011.

Selected Publications:

Journal Publications:
M. Islam, K. Sarker, T. Das, R. Reaz, and M. Bayzid, STELAR: A statistically consistent coalescent-based species tree estimation method by maximizing triplet consistency, BMC Genomics. (to appear) 

R. Reaz, H. B. Acharya, E. S. Elmallah, J. A. Cobb, and M. G. Gouda. “Policy Expressions and the Bottom-Up Design of Computing Policies”. Computing, 101(9):1307–1326, 2019.

R. Reaz, M. Bayzid, and M. S. Rahman. “Accurate Phylogenetic Tree Reconstruction from Quartets: A Heuristic Approach”. PloS one, vol. 9(8), 2014.

S. Mirarab, R. Reaz, M. Bayzid, T. Zimmermann, M. Swenson, and T. Warnow. “ASTRAL: genome-scale coalescent-based species tree estimation”. Bioinformatics, vol. 30(17), pp. 541-548, 2014.

S.Nazeen, M. S.Rahman, and R. Reaz, “Indeterminate String Inference Algorithms”, Journal of Discrete Algorithms, vol. 10, pp. 23-34, 2012.


Conference Publications:
R. Reaz, E. S. Elmallah, and M. G. Gouda. “Executing Firewalls in Public Clouds”. In the proceedings of the 10th International Conference on Computing, Communication, and Networking Technologies (ICCCNT), pp. 1-6. IEEE, 2019.

R. Reaz, H. B. Acharya, E. S. Elmallah, J. A. Cobb, and M. G. Gouda. “Policy Expressions and the Bottom-Up Design of Computing Policies”. In the proceedings of the 5th International Conference on Networked Systems (NETYS), pp. 151-165, Springer, Cham, 2017.

M. J. H. Heule, R. Reaz, H. B. Acharya and M. G. Gouda. “Analysis of Computing Policies Using SAT Solvers (Short Paper)”. In the proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 190 - 194, Springer, 2016.

M. Ali, R. Reaz, and M. G. Gouda. “Non-repudiation Protocols without a Trusted Party”. In the proceedings of the 4th International Conference on Networked Systems (NETYS),  pp. 1-15, Springer, 2016.

M. Ali, R. Reaz, and M. G. Gouda. “Two-Phase Non-repudiation Protocols”. In the proceedings of the 7th International Conference on Computing, Communication, and Networking Technologies(ICCCNT), p. 22. ACM, 2016.

R. Reaz, M. Ali, M. G. Gouda, M. J. H. Heule, and E. S. Elmallah. “The Implication Problem of Computing Policies”. In the proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 109-123. Springer, 2015.

T. M. Moosa, S.Nazeen, M. S.Rahman, and R. Reaz, “Linear Time Inference of Strings from Cover Arrays using a Binary Alphabet”. In the proceedings of the workshop on Algorithms and Computation (WALCOM), Lecture Notes in Computer Science, vol. 7157, Springer, pp. 160-172, 2012.


Journal Papers:

1. T.M. Moosa, Sumaiya Nazeen, M. Sohel Rahman, Rezwana Reaz Rimpi, Inferring Strings from Cover Arrays, Discrete Mathematics, Algorithms and Applications (DMAA), 5(2), , 2013.
2. Sumaiya Nazeen, M. Sohel Rahman, Rezwana Reaz Rimpi, Indeterminate string inference algorithms, Journal of Discrete Algorithms, 10, 23-34, 2012.
Conference Papers:

1. Sumaiya Nazeen, Tanaeem M Moosa, M. Sohel Rahman, Rezwana Reaz Rimpi, Linear Time Inference of Strings from Cover Arrays using a Binary Alphabet, WALCOM, , 160-172, 2012.