Ahmad Baraani-Dastjerdi

According to our database1, Ahmad Baraani-Dastjerdi authored at least 39 papers between 1995 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Cryptographic collusion-resistant protocols for secure sum.
IJESDF, 2017

Enriched LDA (ELDA): Combination of latent Dirichlet allocation with word co-occurrence analysis for aspect extraction.
Expert Syst. Appl., 2017

Links between the personalities, styles and performance in computer programming.
Proceedings of the Software Engineering 2017, 2017

Links between the personalities, styles and performance in computer programming.
Journal of Systems and Software, 2016

Using Personality Traits to Understand the Influence of Personality on Computer Programming: An Empirical Study.
J. Cases on Inf. Techn., 2016

Links between the personalities, styles and performance in computer programming.
CoRR, 2016

The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services.
Knowl. Inf. Syst., 2015

Influence of Personality on Programming Styles an Empirical Study.
JITR, 2015

A New Experience in Persian Text Clustering using FarsNet Ontology.
J. Inf. Sci. Eng., 2015

Bidding strategy for agents in multi-attribute combinatorial double auction.
Expert Syst. Appl., 2015

GLP: A cryptographic approach for group location privacy.
Computer Communications, 2012

Optimizing the performance and robustness of type-2 fuzzy group nearest-neighbor queries.
Mobile Information Systems, 2011

Agent-based modeling of consumer decision making process based on power distance and personality.
Knowl.-Based Syst., 2011

GREST - a type-2 fuzzy distance model for group nearest-neighbor queries.
Journal of Intelligent and Fuzzy Systems, 2011

A Concurrency Control Method Based on Commitment Ordering in Mobile Databases
CoRR, 2011

An Extension of Semantic Proximity for Fuzzy Multivalued Dependencies in Fuzzy Relational Database
CoRR, 2011

A Human-Centric Approach to Group-Based Context-Awareness
CoRR, 2011

Semi-Automatic Labeling of Training Data Sets in Text Classification.
Computer and Information Science, 2011

Leaf constrained minimal spanning trees solved by modified quantum-behaved particle swarm optimization.
Artif. Intell. Rev., 2010

Using the Density of Paths for Semantic Relatedness Measurement.
Proceedings of the 2010 International Conference on Semantic Web & Web Services, 2010

Sudoku Using Parallel Simulated Annealing.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Using the whole structure of ontology for semantic relatedness measurement.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Electronic promotion to new customers using mk.
Inf. Sci., 2009

An algorithm to mine general association rules from tabular data.
Inf. Sci., 2009

A heuristic personality-based bilateral multi-issue bargaining model in electronic commerce.
Int. J. Hum.-Comput. Stud., 2009

A Hybrid Multi Objective Particle Swarm Optimization Method to Discover Biclusters in Microarray Data
CoRR, 2009

One Step beyond Nash Equilibrium.
Proceedings of the 2008 International Conference on Scientific Computing, 2008

An Electronic Marketplace Based on Reputation and Learning.
JTAER, 2007

A Novelty Detection Method Based on Frequent Itemsets.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

An Efficient Classifier Using Decision Trees and Association Rules.
Proceedings of the Advances in Data Mining. 7th Industrial Conference, 2007

A Context-Aware Service Discovery Framework Based on Human Needs Model.
Proceedings of the Service-Oriented Computing, 2007

Electronic Promotion to New Customers using a Fixed link mkNN Learning.
Proceedings of the 2007 International Conference on E-Learning, 2007

A New Segmentation Method for Lung HRCT Images.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
J. UCS, 1997

A Multi-Level View Model for Secure Object-Oriented Databases.
Data Knowl. Eng., 1997

Modeling a multi-level secure object-oriented database using views.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

A Model of Authorization for Object-Oriented Databases based on Object Views.
Proceedings of the Deductive and Object-Oriented Databases, 1995

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.
Proceedings of the Sixth Australasian Database Conference, 1995