The publications are listed in the order of their appearance.
  1. Asaduzzaman, M., Roy, C.K., and Schneider, K.A. "VisCad: Flexible Code Clone Analysis Support For NiCad", in Proceedings of the Tool Demo Track of the ICSE 5th International Workshop on Software Clones (IWSC 2011), Waikiki, Hawaii, USA, May 2011, pp. 77-78.
  2. Zibran, M.F., Saha, R.K., Asaduzzaman, M., and Roy, C. K., "Analyzing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study", in Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2011), Las Vegas, USA, April 2011, pp. 295-304.
  3. Saha, R.K., Asaduzzaman, M., Zibran, M.F., Roy, C.K., and Schneider, K.A., “Evaluating Code Clone Genealogies at Release Level: An Empirical Study”, in Proceedings of the 10th IEEE International Conference on Source Code Analysis and Manipulation, Timisoara, Romania, pp. 87-96, September 2010.
  4. Haque, M. R., Naznin, M., Asaduzzaman, M., and Ahmed, R.U., "STP: In-network aggregation through proximity queries in a Sensor Network", in Proceedings of the 12th International Conference on Computers and Information Technology, pp.541-546, 21-23 December 2009.
  5. Islam, M. R., Hasan, M. S., Sharif, I., and Asaduzzaman, M., "A New Point Multiplication Method for Elliptic Curve Cryptography Using Modified Base Representation". International Journal of the Computer, Internet and Management (IJCIM), Volume 16 No. 2(May-August), pp. 9-16. 2008.
  6. Islam, M. R., Asaduzzaman, M., Hasan, M. S., and Bhuyan, I. M. S., "An Efficient Technique For implementation Of Elliptic Curve Cryptosystem over GF ((2^n) ^m)", in Proceedings of the International Conference on Computer and Information Technology (ICCIT-2005), pp. 716-721, 28-30 Dec. 2005.