Ramzi A. Haraty

Orcid: 0000-0002-6978-3627

Affiliations:
  • Lebanese American University, Beirut, Department of Computer Science & Mathematics


According to our database1, Ramzi A. Haraty authored at least 96 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DG-means: a superior greedy algorithm for clustering distributed data.
J. Supercomput., January, 2024

A Comparative Approach to Detecting COVID-19 Fake News through Machine Learning Models.
Proceedings of the International Conference on Information Networking, 2024

2023
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs.
Peer Peer Netw. Appl., September, 2023

2021
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy.
ACM Trans. Internet Techn., 2021

Green Computing Approaches - A Survey.
Informatica (Slovenia), 2021

A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems.
Future Internet, 2021

2020
Information reconciliation through an agent-controlled graph model.
Soft Comput., 2020

An Analysis of the Dynamic Community Detection Algorithms in Complex Networks.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

SQA Models Comparative Analysis.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

2019
Indexing Arabic texts using association rule data mining.
Libr. Hi Tech, 2019

Reconfigurable Hardware Implementation of the Successive Overrelaxation Method.
CoRR, 2019

Multigrid Solvers in Reconfigurable Hardware.
CoRR, 2019

A Hypergraph Coloring Based Modelling of Service Oriented System.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

2018
Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach.
Telematics Informatics, 2018

Metaheuristic Algorithm for State-Based Software Testing.
Appl. Artif. Intell., 2018

Scrambled prime key encryption.
Proceedings of the 10th International Conference on Management of Digital EcoSystems, 2018

Genetic Algorithm Analysis using the Graph Coloring Method for Solving the University Timetable Problem.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

(k, l)-Clustering for Transactional Data Streams Anonymization.
Proceedings of the Information Security Practice and Experience, 2018

Axes-Based Encryption Key.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

A Survey of the Knapsack Problem.
Proceedings of the International Arab Conference on Information Technology, 2018

2017
Information warfare: a lightweight matrix-based approach for database recovery.
Knowl. Inf. Syst., 2017

Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix.
Int. J. Semantic Web Inf. Syst., 2017

A Systematic Review of Anonymous Communication Systems.
Proceedings of the ICEIS 2017, 2017

2016
Anonymizing multimedia documents.
World Wide Web, 2016

Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems.
Peer-to-Peer Netw. Appl., 2016

Innovative Mobile E-Healthcare Systems: A New Rule-Based Cache Replacement Strategy Using Least Profit Values.
Mob. Inf. Syst., 2016

Regression Test Cases Prioritization Using Clustering and Code Change Relevance.
Int. J. Softw. Eng. Knowl. Eng., 2016

Parallelizing Instance-Based Data Classifiers.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

2015
Enabling Technologies and Business Infrastructures for Next Generation Social Media: Big Data, Cloud Computing, Internet of Things and Virtual Reality.
J. Univers. Comput. Sci., 2015

Tracking and Repairing Damaged Healthcare Databases Using the Matrix.
Int. J. Distributed Sens. Networks, 2015

An Enhanced <i>k</i>-Means Clustering Algorithm for Pattern Discovery in Healthcare Data.
Int. J. Distributed Sens. Networks, 2015

A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems.
Comput. Hum. Behav., 2015

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies.
Comput. Electr. Eng., 2015

Information Warfare: Fighting Back Through the Matrix.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

A comparative study of mobile database transaction models.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Assuring consistency in mixed models.
J. Comput. Sci., 2014

The TOR data communication system.
J. Commun. Networks, 2014

Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-Based Approach.
Int. Arab J. Inf. Technol., 2014

Hardening the elgamal cryptosystem in the setting of the second group of units.
Int. Arab J. Inf. Technol., 2014

MOP: A Privacy Preserving Model for Multimedia Objects.
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014

The TOR data communication system: A survey.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

A matrix-based damage assessment and recovery algorithm.
Proceedings of the 14th International Conference on Innovations for Community Services, 2014

2013
UPP+: A Flexible User Privacy Policy for Social Networking Services.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

Rule-Based Data Mining Cache Replacement Strategy.
Int. J. Data Warehous. Min., 2013

<i>de</i>-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

Role-Based Access Control modeling and validation.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Modeling and Validating the Clinical Information Systems Policy Using Alloy.
Proceedings of the Health Information Science - Second International Conference, 2013

Relational Database Design Patterns.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2010
Smart container loading.
J. Comput. Methods Sci. Eng., 2010

Directed Graph Representation and Traversal in Relational Databases.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

2009
An Enhanced Quorum Selection Algorithm.
J. Comput., 2009

Bit-level locking for concurrency control.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
An auto-indexing method for Arabic text.
Inf. Process. Manag., 2008

The Relationship between Using of an Intelligent Tutoring System and Class Achievement in a Basic Mathematics Course.
Int. J. Emerg. Technol. Learn., 2008

Special track on Database Theory, Technology, and Applications: editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Online Recruitment - An Intelligent Approach.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008

A Synchronous/Asynchronous Multi-Master Replication Method.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008

2007
The Successive Over-Relaxation Method in Reconfigurable Hardware.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

IRS: An Intelligent Recruitment System.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2006
A hybrid cryptosystem based on WEP for 802.11 networks.
J. Comput. Methods Sci. Eng., 2006

A comparative study of ElGamal based digital signature algorithms.
J. Comput. Methods Sci. Eng., 2006

Regression Test Selection for Trusted Database Applications.
Int. Arab J. Inf. Technol., 2006

Editorial message: special track on database theory, technology, and applications.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

An Evaluation of a Visual Query Language for Information Systems.
Proceedings of the ICEIS 2006, 2006

Towards a New Visual Query Language for GIS.
Proceedings of the IASTED International Conference on Databases and Applications, 2006

A three poled model for web applications.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

Securing wireless networks with enhanced WEP.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

2005
A Comparative Study of El-Gamal Based Cryptographic Algorithms.
RITA, 2005

T-Stem - A Superior Stemmer and Temporal Extractor for Arabic Texts.
J. Digit. Inf. Manag., 2005

ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields.
Comput. Sci. Inf. Syst., 2005

Lebanese Colloquial Arabic Speech Recognition.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

Modified RSA in the Domains of Gaussian Integers and Polynomials Over Finite Fields.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

TREX: a temporal reference extractor for Arabic texts.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

Kernelized Database Systems Security.
Proceedings of the Encyclopedia of Database Technologies and Applications, 2005

Security Issues in Distributed Transaction Processing Systems.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Arabic Text Recognition.
Int. Arab J. Inf. Technol., 2004

Editorial message: special track on database theory, technology, and applications.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

BVA<sup>+</sup> - A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases.
Proceedings of the ICEIS 2004, 2004

A Comparative Study of Elgamal Based Cryptographic Algorithms.
Proceedings of the ICEIS 2004, 2004

A Comparative Study of RSA based Cryptographic Algorithms.
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2004

Regression Test Selection for Database Applications.
Proceedings of the Advanced Topics in Database Research, Vol. 3, 2004

2003
Database Technologies Track Editorial.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

An Arabic Auto-indexing System for Information Retrieval.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Regression Testing of Database Applications.
J. Database Manag., 2002

Database and digital library technologies: track chairs message.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Iterative querying in web-based database applications.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

2001
Query Acceleration in Distributed Database Systems.
Rev. Colomb. de Computación, 2001

Software Metrics for Database Applications.
Int. J. Comput. Their Appl., 2001

A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001

2000
Distributed Query Optimization Using PERF Joins.
Proceedings of the Applied Computing 2000, 2000

Software Metrics for Small Database Applications.
Proceedings of the Applied Computing 2000, 2000

A PERF solution for distributed query optimization.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
C2 Secure Database Management Systems - A Comparative Study.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

1994
Secure transaction management and query processing in multilevel secure database systems.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994


  Loading...