default search action
Meghdad Mirabi
Person information
- affiliation: Technical University of Darmstadt, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali Asghar Safaei:
A distributed B+Tree indexing method for processing range queries over streaming data. Clust. Comput. 27(2): 1251-1274 (2024) - [j21]Mohammad Hadian, Seyed Hossein Erfani, Mahmood Deypir, Meghdad Mirabi:
CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain. Clust. Comput. 27(4): 4515-4536 (2024) - [j20]Shahab Safaee, Meghdad Mirabi, Ali Asghar Safaei:
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control. Clust. Comput. 27(7): 9221-9241 (2024) - [j19]Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
A distributed reliable collusion-free algorithm for selecting multiple coordinators in IOTA using fog computing. Concurr. Comput. Pract. Exp. 36(11) (2024) - [j18]Seyed Reza Rouholamini, Meghdad Mirabi, Razieh Farazkish, Amir Sahafi:
Proactive self-healing techniques for cloud computing: A systematic review. Concurr. Comput. Pract. Exp. 36(24) (2024) - [j17]Vahid Bakhtiary, Meghdad Mirabi, Afshin Salajegheh, Seyed Hossein Erfani:
Combo-Chain: Towards a hierarchical attribute-based access control system for IoT with smart contract and sharding technique. Internet Things 25: 101080 (2024) - [j16]Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. J. Supercomput. 80(2): 1491-1521 (2024) - [c12]Ioannis Reppas, Meghdad Mirabi, Leila Fathi, Carsten Binnig, Anton Dignös, Johann Gamper:
Parallel Processing of Temporal Anti-Joins in Memory. DASFAA (1) 2024: 86-102 - [c11]René Klaus Nikiel, Meghdad Mirabi, Carsten Binnig:
TrustDDL: A Privacy-Preserving Byzantine-Robust Distributed Deep Learning Framework. DSN-W 2024: 55-62 - 2023
- [c10]Meghdad Mirabi, René Klaus Nikiel, Carsten Binnig:
SafeML: A Privacy-Preserving Byzantine-Robust Framework for Distributed Machine Learning Training. ICDM (Workshops) 2023: 207-216 - [c9]Meghdad Mirabi, Leila Fathi, Anton Dignös, Johann Gamper, Carsten Binnig:
A New Primitive for Processing Temporal Joins. SSTD 2023: 106-109 - [c8]Meghdad Mirabi, Carsten Binnig:
QFilter: Towards a Fine-Grained Access Control for Aggregation Query Processing over Secret Shared Data. VLDB Workshops 2023 - 2022
- [j15]Samaneh Fathi Ozonbolagh, Meghdad Mirabi:
Efficient XML data placement schemes over multiple mobile wireless broadcast channels. J. Supercomput. 78(1): 168-199 (2022) - [j14]Mohammad Mahdi Kazemian, Meghdad Mirabi:
Controller placement in software defined networks using multi-objective antlion algorithm. J. Supercomput. 78(4): 5626-5649 (2022) - [j13]Maryam Panahnejad, Meghdad Mirabi:
APT-Dt-KC: advanced persistent threat detection based on kill-chain model. J. Supercomput. 78(6): 8644-8677 (2022) - 2021
- [j12]Mohsen Shekarriz, Seyed Morteza Babamir, Meghdad Mirabi:
Query processing optimization in broadcasting XML data in mobile communications. J. Supercomput. 77(6): 5354-5380 (2021) - 2020
- [j11]Rahman Hajian, Soheyla ZakeriKia, Seyed Hossein Erfani, Meghdad Mirabi:
SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput. Networks 183: 107567 (2020)
2010 – 2019
- 2019
- [j10]Madeh Shokri, Meghdad Mirabi:
An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels. J. Supercomput. 75(11): 7147-7173 (2019) - 2017
- [j9]Mohammad Javani, Meghdad Mirabi:
An Efficient Index and Data Distribution Scheme for XML Data Broadcast in Mobile Wireless Networks. J. Inf. Sci. Eng. 33(1): 159-182 (2017) - [j8]Babak Safabahar, Meghdad Mirabi:
A new structure and access mechanism for secure and efficient XML data broadcast in mobile wireless networks. J. Syst. Softw. 125: 119-132 (2017) - 2016
- [j7]Ali Borjian Boroujeni, Meghdad Mirabi:
A Novel Replication Strategy for Efficient XML Data Broadcast in Wireless Mobile Networks. J. Inf. Sci. Eng. 32(2): 309-327 (2016) - [j6]Hossein Mirabi, Meghdad Mirabi, Ali Borjian Boroujeni:
An Efficient XML Data Placement Scheme over Multiple Wireless Broadcast Channels. J. Inf. Sci. Eng. 32(5): 1183-1203 (2016) - [c7]Mahshid Helali Moghadam, Seyed Morteza Babamir, Meghdad Mirabi:
A Multi-Objective Optimization Model for Data-Intensive Workflow Scheduling in Data Grids. LCN Workshops 2016: 25-33 - 2015
- [j5]Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating. J. Inf. Sci. Eng. 31(1): 59-93 (2015) - 2014
- [j4]Hamidah Ibrahim, Yaser Karasneh, Meghdad Mirabi, Razali Yaakob, Mohamed Othman:
An Automatic Domain Independent Schema Matching in Integrating Schemas of Heterogeneous Relational Databases. J. Inf. Sci. Eng. 30(5): 1505-1536 (2014) - [j3]Leila Fathi, Hamidah Ibrahim, Meghdad Mirabi:
An energy conservation indexing method for secure XML data broadcast in mobile wireless networks. Pervasive Mob. Comput. 13: 125-141 (2014) - [j2]Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi:
PS+Pre/Post: A novel structure and access mechanism for wireless XML stream supporting twig pattern queries. Pervasive Mob. Comput. 15: 3-25 (2014) - 2013
- [c6]Leila Fathi, Hamidah Ibrahim, Meghdad Mirabi:
An air indexing method for encrypted XML data broadcast in mobile wireless network. MobiDE 2013: 28-35 - 2012
- [j1]Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
An encoding scheme based on fractional number for querying and updating XML data. J. Syst. Softw. 85(8): 1831-1851 (2012) - [c5]Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
A Compact Bit String Accessibility Map for Secure XML Query Processing. ANT/MobiWIS 2012: 1172-1179 - 2011
- [c4]Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
Label Size Increment of Bit String Based Labeling Scheme in Dynamic XML Updating. DEIS 2011: 466-477 - [c3]Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, Nur Izura Udzir:
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating. NDT 2011: 24-36 - [c2]Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
An Access Control Model for Supporting XML Document Updating. NDT 2011: 37-46 - 2010
- [c1]Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi:
Transferring Clinical Information between Heterogeneous Hospital Database Systems in P2P Networks. NDT (2) 2010: 456-465
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint