
Mehdi Bahrami
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j1]Mehdi Bahrami
, Ali Shabani
, Mohammad Reza Mahmoudi
, Shohreh Didari
:
Determination of Effective Weather Parameters on Rainfed Wheat Yield Using Backward Multiple Linear Regressions Based on Relative Importance Metrics. Complex. 2020: 6168252:1-6168252:10 (2020) - [c27]Lei Liu, Mehdi Bahrami, Junhee Park, Wei-Peng Chen:
Web API Search: Discover Web API and Its Endpoint with Natural Language Queries. ICWS 2020: 96-113 - [c26]Lei Liu, Mehdi Bahrami, Wei-Peng Chen:
Automatic Generation of IFTTT Mashup Infrastructures. ASE 2020: 1179-1183 - [c25]Mehdi Bahrami, Wei-Peng Chen:
Automated Web Service Specification Generation Through a Transformation-Based Learning. SCC 2020: 103-119 - [c24]Mehdi Bahrami, Mehdi Assefi, Ian Thomas, Wei-Peng Chen, Shridhar Choudhary, Hamid R. Arabnia:
Deep SAS: A Deep Signature-based API Specification Learning Approach. SMC 2020: 1994-2001
2010 – 2019
- 2019
- [c23]Shridhar Choudhary, Ian Thomas, Mehdi Bahrami, Motoshi Sumioka:
Accelerating the Digital Transformation of Business and Society Through Composite Business Ecosystems. AINA 2019: 419-430 - [c22]Mehdi Bahrami, Wei-Peng Chen:
WATAPI: Composing Web API Specification from API Documentations through an Intelligent and Interactive Annotation Tool. BigData 2019: 4573-4578 - [c21]Arshia Khan, Mehdi Bahrami, Yumna Anwar:
A Deep Learning Based Autonomous Mobile Robotic Assistive Care Giver. HealthCom 2019: 1-8 - 2018
- [c20]Mehdi Bahrami, Junhee Park, Lei Liu, Wei-Peng Chen:
API Learning: Applying Machine Learning to Manage the Rise of API Economy. WWW (Companion Volume) 2018: 151-154 - 2017
- [c19]Mehdi Bahrami, Abhishek Malvankar, Karan K. Budhraja, Chinmay Kundu, Mukesh Singhal, Ashish Kundu:
Compliance-Aware Provisioning of Containers on Cloud. CLOUD 2017: 696-700 - [c18]Karan K. Budhraja, Abhishek Malvankar, Mehdi Bahrami, Chinmay Kundu, Ashish Kundu, Mukesh Singhal:
Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN. CLOUD 2017: 761-765 - [c17]Lei Liu, Yang Peng, Mehdi Bahrami, Liguang (Ted) Xie, Akira Ito, Sevak Mnatsakanyan, Gang Qu, Zilong Ye, Huiping Guo:
ICN-FC: An Information-Centric Networking based framework for efficient functional chaining. ICC 2017: 1-7 - [c16]Mehdi Bahrami, Liguang (Ted) Xie, Lei Liu, Akira Ito, Yang Peng, Sevak Mnatsakanyan, Zilong Ye, Huiping Guo:
Secure function chaining enabled by Information-Centric Networking. ICNC 2017: 415-421 - [c15]Mehdi Bahrami, Mukesh Singhal, Wei-Peng Chen:
Learning Data Privacy and Terms of Service from Different Cloud Service Providers. SmartCloud 2017: 250-257 - 2016
- [b1]Mehdi Bahrami:
A Dynamic Cloud with Data Privacy Preservation. University of California, Merced, USA, 2016 - [c14]Lei Liu, Liguang (Ted) Xie, Mehdi Bahrami, Yang Peng, Akira Ito, Sevak Mnatsakanyan, Gang Qu, Zilong Ye, Huiping Guo:
Demonstration of a Functional Chaining System Enabled by Named-Data Networking. ICN 2016: 227-228 - [c13]Mehdi Bahrami, Mukesh Singhal:
CloudPDB: A light-weight data privacy schema for cloud-based databases. ICNC 2016: 1-5 - [c12]Mehdi Bahrami, Arshia Khan, Mukesh Singhal:
An Energy Efficient Data Privacy Scheme for IoT Devices in Mobile Cloud Computing. IEEE MS 2016: 190-195 - [c11]Mehdi Bahrami, Dong Li, Mukesh Singhal, Ashish Kundu:
An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users. DataCloud@SC 2016: 51-58 - 2015
- [c10]Mehdi Bahrami, Mukesh Singhal:
A dynamic cloud computing platform for eHealth systems. HealthCom 2015: 435-438 - [c9]Mehdi Bahrami, Mukesh Singhal, Zixuan Zhuang:
A cloud-based web crawler architecture. ICIN 2015: 216-223 - [c8]Mehdi Bahrami, Mukesh Singhal:
DCCSOA: A Dynamic Cloud Computing Service-Oriented Architecture. IRI 2015: 158-165 - [c7]Mehdi Bahrami:
Cloud Computing for Emerging Mobile Cloud Apps. MobileCloud 2015: 4-5 - [c6]Mehdi Bahrami, Mukesh Singhal:
A Light-Weight Permutation Based Method for Data Privacy in Mobile Cloud Computing. MobileCloud 2015: 189-198 - [c5]Mehdi Bahrami:
Welcome Message. SCSE 2015: 1-3 - [c4]Mehdi Bahrami:
An Evaluation of Security and Privacy Threats for Cloud-based Applications. SCSE 2015: 17-18 - 2014
- [i4]Mehdi Bahrami, Peyman Arebi, Hosseyn Bakhshizadeh, Hamed Barangi:
A Novel Self-Recognition Method for Autonomic Grid Networks Case Study: Advisor Labor Law Software Application. CoRR abs/1405.6178 (2014) - 2013
- [i3]Mehdi Bahrami:
Cloud Template, a Big Data Solution. CoRR abs/1307.4716 (2013) - 2012
- [i2]Mehdi Bahrami, Mohammad Bahrami:
An overview to Software Architecture in Intrusion Detection System. CoRR abs/1205.4385 (2012) - 2010
- [c3]Mehdi Bahrami, Peyman Arebi:
A Binomial Heap Algorithm for Self-Recognition in Exclusive Management on Autonomic Grid Networks. CICSyN 2010: 326-329 - [c2]Mehrzad Asayesh, Mehdi Bahrami, Sarajodin Katebi, Amir-Massoud Bidgoli:
A Novel Multi Routing in Ad-Hoc Networks Based on Maximum Node Energy. EMS 2010: 432-437
2000 – 2009
- 2008
- [c1]Mehdi Bahrami, Siavosh Kaviani:
A New Method for Knowledge Representation in Expert System's (XMLKR). ICETET 2008: 326-331 - [i1]Mehdi Bahrami:
A New Method for Knowledge Representation in Expert System's (XMLKR). CoRR abs/0812.3648 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-14 00:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint