default search action
Ramzi A. Haraty
Person information
- affiliation: Lebanese American University, Beirut, Department of Computer Science & Mathematics
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Ramzi A. Haraty, Ali Assaf:
DG-means: a superior greedy algorithm for clustering distributed data. J. Supercomput. 80(2): 1990-2024 (2024) - [c53]Zyad Al-Azazi, Ramzi A. Haraty:
A Comparative Approach to Detecting COVID-19 Fake News through Machine Learning Models. ICOIN 2024: 490-495 - 2023
- [j38]Sanaa Kaddoura, Ramzi A. Haraty, Sultan Al Jahdali, Maram Assi:
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. Peer Peer Netw. Appl. 16(5): 2325-2348 (2023) - 2021
- [j37]Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar, Omar Alfandi:
A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems. Future Internet 13(4): 90 (2021) - [j36]Mahdi Dhaini, Mohammad Jaber, Amin Fakhereldine, Sleiman Hamdan, Ramzi A. Haraty:
Green Computing Approaches - A Survey. Informatica (Slovenia) 45(1) (2021) - [j35]Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. ACM Trans. Internet Techn. 21(1): 20:1-20:25 (2021) - 2020
- [j34]Ramzi A. Haraty, Rita Saba:
Information reconciliation through an agent-controlled graph model. Soft Comput. 24(18): 14019-14037 (2020) - [c52]Dhananjay Kumar Singh, Ramzi A. Haraty, Narayan C. Debnath, Prasenjit Choudhury:
An Analysis of the Dynamic Community Detection Algorithms in Complex Networks. ICIT 2020: 989-994 - [c51]Bahia Boukhari, Claude Boueri, Rania Islambouli, Zahraa Sweidan, Ramzi A. Haraty:
SQA Models Comparative Analysis. ICIT 2020: 1001-1006
2010 – 2019
- 2019
- [j33]Ramzi A. Haraty, Rouba Nasrallah:
Indexing Arabic texts using association rule data mining. Libr. Hi Tech 37(1): 101-117 (2019) - [c50]Sugyan Kumar Mishra, Ramzi A. Haraty, Narayan C. Debnath, Anirban Sarkar:
A Hypergraph Coloring Based Modelling of Service Oriented System. INDIN 2019: 1349-1350 - [i2]Safaa J. Kasbah, Issam W. Damaj, Ramzi A. Haraty:
Multigrid Solvers in Reconfigurable Hardware. CoRR abs/1904.00629 (2019) - [i1]Safaa J. Kasbah, Ramzi A. Haraty, Issam W. Damaj:
Reconfigurable Hardware Implementation of the Successive Overrelaxation Method. CoRR abs/1905.06844 (2019) - 2018
- [j32]Ramzi A. Haraty, Nashat Mansour, Hratch Zeitunlian:
Metaheuristic Algorithm for State-Based Software Testing. Appl. Artif. Intell. 32(2): 197-213 (2018) - [j31]Ramzi A. Haraty, Sanaa Kaddoura, Ahmed Sherif Zekri:
Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach. Telematics Informatics 35(4): 801-814 (2018) - [c49]Maram Assi, Ramzi A. Haraty:
A Survey of the Knapsack Problem. ACIT 2018: 1-6 - [c48]Imane Haidar, Ali Massoud Haidar, Ramzi A. Haraty:
Axes-Based Encryption Key. AICCSA 2018: 1-8 - [c47]Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty:
(k, l)-Clustering for Transactional Data Streams Anonymization. ISPEC 2018: 544-556 - [c46]Maram Assi, Bahia Halawi, Ramzi A. Haraty:
Genetic Algorithm Analysis using the Graph Coloring Method for Solving the University Timetable Problem. KES 2018: 899-906 - [c45]Imane Haidar, Ali Massoud Haidar, Ramzi A. Haraty:
Scrambled prime key encryption. MEDES 2018: 94-99 - 2017
- [j30]Ramzi Ahmed Haraty, Sanaa Kaddoura, Ahmed Sherif Zekri:
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix. Int. J. Semantic Web Inf. Syst. 13(2): 74-86 (2017) - [j29]Ramzi A. Haraty, Mohamed El Sai:
Information warfare: a lightweight matrix-based approach for database recovery. Knowl. Inf. Syst. 50(1): 287-313 (2017) - [c44]Ramzi A. Haraty, Maram Assi, Imad Rahal:
A Systematic Review of Anonymous Communication Systems. ICEIS (2) 2017: 211-220 - 2016
- [j28]Ramzi A. Haraty, Nashat Mansour, Lama Moukahal, Iman Khalil:
Regression Test Cases Prioritization Using Clustering and Code Change Relevance. Int. J. Softw. Eng. Knowl. Eng. 26(5): 733-768 (2016) - [j27]Ramzi A. Haraty:
Innovative Mobile E-Healthcare Systems: A New Rule-Based Cache Replacement Strategy Using Least Profit Values. Mob. Inf. Syst. 2016: 6141828:1-6141828:9 (2016) - [j26]Ramzi A. Haraty, Mirna Zbib, Mehedi Masud:
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. Peer-to-Peer Netw. Appl. 9(5): 812-823 (2016) - [j25]Bechara al Bouna, Eliana J. Raad, Richard Chbeir, Charbel Elia, Ramzi A. Haraty:
Anonymizing multimedia documents. World Wide Web 19(1): 135-155 (2016) - [c43]Imad Rahal, Emily Furst, Ramzi A. Haraty:
Parallelizing Instance-Based Data Classifiers. FLAIRS 2016: 442-447 - 2015
- [j24]Hussein Jebbaoui, Azzam Mourad, Hadi Otrok, Ramzi A. Haraty:
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies. Comput. Electr. Eng. 44: 91-103 (2015) - [j23]Ramzi A. Haraty, Bassam Zantout:
A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems. Comput. Hum. Behav. 51: 780-791 (2015) - [j22]Ramzi A. Haraty, Mohamad Dimishkieh, Mehedi Masud:
An Enhanced k-Means Clustering Algorithm for Pattern Discovery in Healthcare Data. Int. J. Distributed Sens. Networks 11: 615740:1-615740:11 (2015) - [j21]Sanaa Kaddoura, Ramzi A. Haraty, Ahmed Sherif Zekri, Mehedi Masud:
Tracking and Repairing Damaged Healthcare Databases Using the Matrix. Int. J. Distributed Sens. Networks 11: 914305:1-914305:8 (2015) - [j20]Miltiadis D. Lytras, Wadee Al-Halabi, Jacky Xi Zhang, Mehedi Masud, Ramzi A. Haraty:
Enabling Technologies and Business Infrastructures for Next Generation Social Media: Big Data, Cloud Computing, Internet of Things and Virtual Reality. J. Univers. Comput. Sci. 21(11): 1379-1384 (2015) - [c42]Ramzi A. Haraty:
A comparative study of mobile database transaction models. ISCC 2015: 134-139 - [c41]Ramzi A. Haraty, Sanaa Kaddoura, Ahmed Sherif Zekri:
Information Warfare: Fighting Back Through the Matrix. SSCI 2015: 449-454 - 2014
- [j19]Ramzi A. Haraty, Abdul Nasser El-Kassar, Suzan Fanous:
Hardening the elgamal cryptosystem in the setting of the second group of units. Int. Arab J. Inf. Technol. 11(5): 514-520 (2014) - [j18]Ramzi A. Haraty, Bassam Zantout:
Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-Based Approach. Int. Arab J. Inf. Technol. 11(6): 526-531 (2014) - [j17]Ramzi A. Haraty, Bassam Zantout:
The TOR data communication system. J. Commun. Networks 16(4): 415-420 (2014) - [j16]Ramzi A. Haraty, Mirna Naous, Azzam Mourad:
Assuring consistency in mixed models. J. Comput. Sci. 5(4): 653-663 (2014) - [c40]Ramzi A. Haraty, Mirna Zbib:
A matrix-based damage assessment and recovery algorithm. I4CS 2014: 22-27 - [c39]Ramzi A. Haraty, Bassam Zantout:
The TOR data communication system: A survey. ISCC 2014: 1-6 - [c38]Ramzi A. Haraty, Mohammad A. Taha, Bechara al Bouna:
MOP: A Privacy Preserving Model for Multimedia Objects. MEDES 2014: 213-219 - 2013
- [j15]Ramzi A. Haraty, Joe Zeitouny:
Rule-Based Data Mining Cache Replacement Strategy. Int. J. Data Warehous. Min. 9(1): 56-69 (2013) - [c37]Ramzi A. Haraty, Georges Stephan:
Relational Database Design Patterns. CSE 2013: 818-824 - [c36]Ramzi A. Haraty, Mirna Naous:
Modeling and Validating the Clinical Information Systems Policy Using Alloy. HIS 2013: 1-17 - [c35]Ramzi A. Haraty, Mirna Naous:
Role-Based Access Control modeling and validation. ISCC 2013: 61-66 - [c34]Bechara al Bouna, Eliana J. Raad, Charbel Elia, Richard Chbeir, Ramzi A. Haraty:
de-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents. MEDES 2013: 68-75 - [p2]Ramzi A. Haraty, Sally Massalkhy:
UPP+: A Flexible User Privacy Policy for Social Networking Services. Security and Privacy Preserving in Social Networks 2013: 139-155 - 2010
- [j14]Omar Cheyaheb Makarem, Ramzi A. Haraty:
Smart container loading. J. Comput. Methods Sci. Eng. 10(3-6): 231-245 (2010) - [c33]Mohammad Beydoun, Ramzi A. Haraty:
Directed Graph Representation and Traversal in Relational Databases. NDT (2) 2010: 443-455
2000 – 2009
- 2009
- [j13]Samer Younes, Ramzi A. Haraty:
An Enhanced Quorum Selection Algorithm. J. Comput. 4(7): 654-662 (2009) - [c32]Jad F. Abbass, Ramzi A. Haraty:
Bit-level locking for concurrency control. AICCSA 2009: 168-173 - 2008
- [j12]Ramzi Ahmed Haraty, Abbass I. Sharif:
The Relationship between Using of an Intelligent Tutoring System and Class Achievement in a Basic Mathematics Course. Int. J. Emerg. Technol. Learn. 3(2): 20-23 (2008) - [j11]Nashat Mansour, Ramzi A. Haraty, Walid Daher, Manal Houri:
An auto-indexing method for Arabic text. Inf. Process. Manag. 44(4): 1538-1545 (2008) - [c31]Amer Chahine, Ramzi A. Haraty:
A Synchronous/Asynchronous Multi-Master Replication Method. CATA 2008: 189-195 - [c30]Samah Rifai, Ramzi A. Haraty:
Online Recruitment - An Intelligent Approach. CATA 2008: 240-245 - [c29]Ramzi A. Haraty, Apostolos N. Papadopoulos, Junping Sun:
Special track on Database Theory, Technology, and Applications: editorial message. SAC 2008: 981 - 2007
- [c28]Samah Rifai, Ramzi A. Haraty, Narayan C. Debnath:
IRS: An Intelligent Recruitment System. CAINE 2007: 301-306 - [c27]Safaa J. Kasbah, Ramzi A. Haraty, Issam W. Damaj:
The Successive Over-Relaxation Method in Reconfigurable Hardware. IMECS 2007: 2395-2400 - 2006
- [j10]Ramzi A. Haraty, Wissam Chehab:
Regression Test Selection for Trusted Database Applications. Int. Arab J. Inf. Technol. 3(4): 308-314 (2006) - [j9]Ramzi A. Haraty, Abdul Nasser El-Kassar, Bilal Shebaro:
A comparative study of ElGamal based digital signature algorithms. J. Comput. Methods Sci. Eng. 6(5-6): 147-156 (2006) - [j8]Ramzi A. Haraty, Walid El Horr:
A hybrid cryptosystem based on WEP for 802.11 networks. J. Comput. Methods Sci. Eng. 6(5-6): 359-377 (2006) - [c26]Ramzi A. Haraty, Lana Turk:
A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme. CAINE 2006: 83-88 - [c25]Hamzeh K. Al Shaar, Ramzi A. Haraty:
A three poled model for web applications. CAINE 2006: 162-166 - [c24]Ramzi A. Haraty, Walid El Horr:
Securing wireless networks with enhanced WEP. CAINE 2006: 358-363 - [c23]Haifa Elsidani Elariss, Souheil Khaddaj, Ramzi A. Haraty:
Towards a New Visual Query Language for GIS. Databases and Applications 2006: 195-202 - [c22]Haifa Elsidani Elariss, Souheil Khaddaj, Ramzi A. Haraty:
An Evaluation of a Visual Query Language for Information Systems. ICEIS (5) 2006: 51-58 - [c21]Ramzi A. Haraty, Apostolos N. Papadopoulos, Junping Sun:
Editorial message: special track on database theory, technology, and applications. SAC 2006: 449 - 2005
- [j7]Abdul Nasser El-Kassar, Ramzi A. Haraty:
ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields. Comput. Sci. Inf. Syst. 2(1): 63-77 (2005) - [j6]Ramzi A. Haraty, Samer A. Khatib:
T-Stem - A Superior Stemmer and Temporal Extractor for Arabic Texts. J. Digit. Inf. Manag. 3(3): 173- (2005) - [j5]Ramzi A. Haraty, Abdul Nasser El-Kassar, Hadi Otrok:
A Comparative Study of El-Gamal Based Cryptographic Algorithms. RITA 12(1): 7-22 (2005) - [c20]Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar:
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. AICCSA 2005: 91 - [c19]Ramzi A. Haraty, Samer A. Khatib:
TREX: a temporal reference extractor for Arabic texts. AICCSA 2005: 126 - [c18]Ramzi A. Haraty, Omar el Ariss:
Lebanese Colloquial Arabic Speech Recognition. CAINE 2005: 285-291 - [c17]Abdul Nasser El-Kassar, Ramzi A. Haraty, Y. A. Awad, Narayan C. Debnath:
Modified RSA in the Domains of Gaussian Integers and Polynomials Over Finite Fields. CAINE 2005: 298-303 - [c16]Ramzi A. Haraty, Apostolos N. Papadopoulos, Junping Sun:
Editorial message: special track on database theory, technology, and applications. SAC 2005: 580 - [r2]Ramzi A. Haraty:
Security Issues in Distributed Transaction Processing Systems. Encyclopedia of Information Science and Technology (V) 2005: 2455-2458 - [r1]Ramzi A. Haraty:
Kernelized Database Systems Security. Encyclopedia of Database Technologies and Applications 2005: 304-307 - 2004
- [j4]Ramzi A. Haraty, Catherine Ghaddar:
Arabic Text Recognition. Int. Arab J. Inf. Technol. 1(2): 156-163 (2004) - [c15]Ramzi A. Haraty, Abdul Nasser El-Kassar, Hadi Otrok:
A Comparative Study of RSA based Cryptographic Algorithms. IASSE 2004: 183-188 - [c14]Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar:
A Comparative Study of Elgamal Based Cryptographic Algorithms. ICEIS (3) 2004: 79-84 - [c13]Ramzi A. Haraty, Arda Zeitunlian:
BVA+ - A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. ICEIS (1) 2004: 495-499 - [c12]Ramzi A. Haraty, Yannis Manolopoulos, Junping Sun:
Editorial message: special track on database theory, technology, and applications. SAC 2004: 657 - [p1]Ramzi A. Haraty, Nashat Mansour, Bassel Daou:
Regression Test Selection for Database Applications. Advanced Topics in Database Research, Vol. 3 2004: 141-165 - 2003
- [c11]Ramzi A. Haraty, Nashat Mansour, Walid Daher:
An Arabic Auto-indexing System for Information Retrieval. Applied Informatics 2003: 1221-1226 - [c10]Ramzi A. Haraty:
Database Technologies Track Editorial. SAC 2003: 502 - 2002
- [j3]Ramzi A. Haraty, Nashat Mansour, Bassel Daou:
Regression Testing of Database Applications. J. Database Manag. 13(2): 31-42 (2002) - [c9]Ramzi A. Haraty, Mohammad Zubair:
Database and digital library technologies: track chairs message. SAC 2002: 401 - [c8]Ramzi A. Haraty, Mazen Hamdoun:
Iterative querying in web-based database applications. SAC 2002: 458-462 - 2001
- [j2]Ramzi A. Haraty, Nashat Mansour, Sana Abiad:
Software Metrics for Database Applications. Int. J. Comput. Their Appl. 8(1) (2001) - [j1]Ramzi A. Haraty, Roula C. Fany:
Query Acceleration in Distributed Database Systems. Rev. Colomb. de Computación 2(1): 19-34 (2001) - [c7]Alaa Hamid, Ramzi A. Haraty:
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text. AICCSA 2001: 110-113 - [c6]Ramzi A. Haraty, Nashat Mansour, Bassel Daou:
Regression testing of database applications. SAC 2001: 285-289 - 2000
- [c5]Ramzi A. Haraty, Roula C. Fany:
A PERF solution for distributed query optimization. CATA 2000: 150-153 - [c4]Ramzi A. Haraty, Roula C. Fany:
Distributed Query Optimization Using PERF Joins. SAC (1) 2000: 284-288 - [c3]Sana Abiad, Ramzi A. Haraty, Nashat Mansour:
Software Metrics for Small Database Applications. SAC (2) 2000: 866-870
1990 – 1999
- 1999
- [c2]Ramzi A. Haraty:
C2 Secure Database Management Systems - A Comparative Study. SAC 1999: 216-220 - 1994
- [c1]Brajendra Panda, William Perrizo, Ramzi A. Haraty:
Secure transaction management and query processing in multilevel secure database systems. SAC 1994: 363-368
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint