2009 | ||
---|---|---|
190 | Ian Goldberg, Mikhail J. Atallah: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings Springer 2009 | |
189 | Hao Yuan, Mikhail J. Atallah: Efficient and secure distribution of massive geo-spatial data. GIS 2009: 440-443 | |
188 | Mohamed Yakout, Mikhail J. Atallah, Ahmed K. Elmagarmid: Efficient Private Record Linkage. ICDE 2009: 1283-1286 | |
187 | Hao Yuan, Mikhail J. Atallah: Efficient data structures for range-aggregate queries on trees. ICDT 2009: 111-120 | |
186 | Keith B. Frikken, Marina Blanton, Mikhail J. Atallah: Robust Authentication Using Physically Unclonable Functions. ISC 2009: 262-277 | |
185 | Mikhail J. Atallah, Yinian Qi: Computing all skyline probabilities for uncertain data. PODS 2009: 279-287 | |
184 | Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): (2009) | |
183 | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric CoRR abs/0904.4670: (2009) | |
182 | Daniel G. Aliaga, Mikhail J. Atallah: Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. Comput. Graph. Forum 28(2): 437-446 (2009) | |
181 | Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah: Translation-based steganography. Journal of Computer Security 17(3): 269-303 (2009) | |
2008 | ||
180 | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho: Private combinatorial group testing. ASIACCS 2008: 312-320 | |
179 | Hao Yuan, Mikhail J. Atallah: Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. ICDCS 2008: 184-193 | |
178 | Yinian Qi, Mikhail J. Atallah: Efficient Privacy-Preserving k-Nearest Neighbor Search. ICDCS 2008: 311-319 | |
177 | Mikhail J. Atallah, YounSun Cho, Ashish Kundu: Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. ICDE 2008: 696-704 | |
176 | David Benjamin, Mikhail J. Atallah: Private and Cheating-Free Outsourcing of Algebraic Computations. PST 2008: 240-245 | |
175 | Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice: Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. VMSec 2008: 45-48 | |
174 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): (2008) | |
173 | Mikhail J. Atallah, Greg N. Frederickson, Ashish Kundu: A tree-covering problem arising in integrity of tree-structured data. Inf. Process. Lett. 109(1): 79-82 (2008) | |
2007 | ||
172 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Efficient techniques for realizing geo-spatial access control. ASIACCS 2007: 82-92 | |
171 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530 | |
170 | Umut Topkara, Mikhail J. Atallah, Mercan Topkara: Passwords decay, words endure: secure and re-usable multiple password mnemonics. SAC 2007: 292-299 | |
169 | Umut Topkara, Mercan Topkara, Mikhail J. Atallah: Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. USENIX Annual Technical Conference 2007: 369-374 | |
168 | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. WADS 2007: 114-126 | |
2006 | ||
167 | Mikhail J. Atallah: Security Issues in Collaborative Computing. COCOON 2006: 2 | |
166 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li: Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310 | |
165 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 | |
164 | Umut Topkara, Mercan Topkara, Mikhail J. Atallah: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. MM&Sec 2006: 164-174 | |
163 | Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah: Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. NDSS 2006 | |
162 | Ryan Stutsman, Christian Grothoff, Mikhail J. Atallah, Krista Grothoff: Lost in just the translation. SAC 2006: 338-345 | |
161 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Key management for non-tree access hierarchies. SACMAT 2006: 11-18 | |
160 | Sundararaman Jeyaraman, Mikhail J. Atallah: An empirical study of automatic event reconstruction systems. Digital Investigation 3(Supplement-1): 108-115 (2006) | |
159 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Trans. Computers 55(10): 1259-1270 (2006) | |
158 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Discrete Numeric Streams. IEEE Trans. Knowl. Data Eng. 18(5): 699-714 (2006) | |
157 | Marina Blanton, Mikhail J. Atallah: Succinct representation of flexible and privacy-preserving access rights. VLDB J. 15(4): 334-354 (2006) | |
2005 | ||
156 | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton: Dynamic and efficient key management for access hierarchies. ACM Conference on Computer and Communications Security 2005: 190-202 | |
155 | Keith B. Frikken, Mikhail J. Atallah, Chen Zhang: Privacy-preserving credit checking. ACM Conference on Electronic Commerce 2005: 147-154 | |
154 | Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia: Indexing Information for Data Forensics. ACNS 2005: 206-221 | |
153 | Keith B. Frikken, Mikhail J. Atallah, Marina Bykova: Remote Revocation of Smart Cards in a Private DRM System. ACSW Frontiers 2005: 169-178 | |
152 | Mikhail J. Atallah: A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). ACSW Frontiers 2005: 73 | |
151 | Keith B. Frikken, Mikhail J. Atallah: Achieving Fairness in Private Contract Negotiation. Financial Cryptography 2005: 270-284 | |
150 | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia: Secure Biometric Authentication for Weak Computational Devices. Financial Cryptography 2005: 357-371 | |
149 | Mikhail J. Atallah: Data Confidentiality in Collaborative Computing. HiPC 2005: 1 | |
148 | Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru: ViWiD : Visible Watermarking Based Defense Against Phishing. IWDW 2005: 470-483 | |
147 | Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah: Translation-Based Steganography. Information Hiding 2005: 219-233 | |
146 | Marina Blanton, Mikhail J. Atallah: Provable bounds for portable and flexible privacy-preserving access. SACMAT 2005: 95-101 | |
145 | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski: Markov Models for Identification of Significant Episodes. SDM 2005 | |
144 | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah: Adaptive data structures for IP lookups. ACM Journal of Experimental Algorithmics 10: (2005) | |
143 | Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang: A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. IEEE Trans. Knowl. Data Eng. 17(7): 1010-1014 (2005) | |
142 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Categorical Data. IEEE Trans. Knowl. Data Eng. 17(7): 912-926 (2005) | |
141 | Mikhail J. Atallah, Jiangtao Li: Secure outsourcing of sequence comparisons . Int. J. Inf. Sec. 4(4): 277-287 (2005) | |
140 | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski: Reliable detection of episodes in event sequences. Knowl. Inf. Syst. 7(4): 415-437 (2005) | |
2004 | ||
139 | Mikhail J. Atallah, Marina Bykova: Portable and Flexible Document Access Control Mechanisms. ESORICS 2004: 193-208 | |
138 | Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice: Private Fingerprint Verification without Local Storage. ICBA 2004: 387-394 | |
137 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: wmdb.: Rights Protection for Numeric Relational Data. ICDE 2004: 863 | |
136 | Mikhail J. Atallah, Robert Gwadera, Wojciech Szpankowski: Detection of Significant Sets of Episodes in Event Sequences. ICDM 2004: 3-10 | |
135 | Mikhail J. Atallah, Keith B. Frikken: Privacy-Preserving Location-Dependent Query Processing. ICPS 2004: 9-17 | |
134 | Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp: A hierarchical protocol for increasing the stealthiness of steganographic methods. MM&Sec 2004: 16-24 | |
133 | Mikhail J. Atallah, Jiangtao Li: Secure Outsourcing of Sequence Comparisons. Privacy Enhancing Technologies 2004: 63-78 | |
132 | Marina Bykova, Mikhail J. Atallah: Succinct specifications of portable document access policies. SACMAT 2004: 41-50 | |
131 | Radu Sion, Mikhail J. Atallah: Attacking digital watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 848-858 | |
130 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Resilient Rights Protection for Sensor Streams. VLDB 2004: 732-743 | |
129 | Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara: Private collaborative forecasting and benchmarking. WPES 2004: 103-114 | |
128 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Hidden access control policies with hidden credentials. WPES 2004: 27 | |
127 | Keith B. Frikken, Mikhail J. Atallah: Privacy preserving route planning. WPES 2004: 8-15 | |
126 | Mikhail J. Atallah, Stefano Lonardi: Augmenting LZ-77 with authentication and integrity assurance capabilities. Concurrency - Practice and Experience 16(11): 1063-1076 (2004) | |
125 | Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion: Digital Rights Protection. IEEE Data Eng. Bull. 27(1): 19-25 (2004) | |
124 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Relational Data. IEEE Trans. Knowl. Data Eng. 16(12): 1509-1525 (2004) | |
2003 | ||
123 | Mikhail J. Atallah, Jiangtao Li: Enhanced Smart-card based License Management. CEC 2003: 111-119 | |
122 | Mikhail J. Atallah, Hicham G. Elmongui, Vinayak Deshpande, Leroy B. Schwarz: Secure Supply-Chain Protocols. CEC 2003: 293-302 | |
121 | Mikhail J. Atallah, Keith B. Frikken: Replicated Parallel I/O without Additional Scheduling Costs. DEXA 2003: 223-232 | |
120 | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski: Reliable Detection of Episodes in Event Sequences. ICDM 2003: 67-74 | |
119 | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah: Adaptive Data Structures for IP Lookups. INFOCOM 2003 | |
118 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: On-the-fly Intrusion Detection for Web Portals. ITCC 2003: 325-330 | |
117 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Resilient Information Hiding for Abstract Semi-structures. IWDW 2003: 141-153 | |
116 | Mikhail J. Atallah, Stefano Lonardi: Authentication of LZ-77 Compressed Data. SAC 2003: 282-287 | |
115 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Relational Data. SIGMOD Conference 2003: 98-109 | |
114 | Keith B. Frikken, Mikhail J. Atallah: Cropping-Resilient Segmented Multiple Watermarking. WADS 2003: 231-242 | |
113 | Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du: Secure and private sequence comparisons. WPES 2003: 39-44 | |
112 | Keith B. Frikken, Mikhail J. Atallah: Privacy preserving electronic surveillance. WPES 2003: 45-52 | |
111 | Mikhail J. Atallah, Danny Z. Chen, Ovidiu Daescu: Efficient Parallel Algorithms for Planar st-Graphs. Algorithmica 35(3): 194-215 (2003) | |
110 | Mikhail J. Atallah, Sunil Prabhakar: (Almost) Optimal parallel block access for range queries. Inf. Sci. 157: 21-31 (2003) | |
2002 | ||
109 | Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678 | |
108 | Christos Berberidis, Walid G. Aref, Mikhail J. Atallah, Ioannis P. Vlahavas, Ahmed K. Elmagarmid: Multiple and Partial Periodicity Mining in Time Series Databases. ECAI 2002: 370-374 | |
107 | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah: A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments. ICPP 2002: 379-384 | |
106 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: On Watermarking Numeric Sets. IWDW 2002: 130-146 | |
105 | Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg: Natural Language Watermarking and Tamperproofing. Information Hiding 2002: 196-212 | |
104 | Christos Berberidis, Ioannis P. Vlahavas, Walid G. Aref, Mikhail J. Atallah, Ahmed K. Elmagarmid: On the Discovery of Weak Periodicities in Large Time Series. PKDD 2002: 51-61 | |
103 | Alberto Apostolico, Mikhail J. Atallah: Compact Recognizers of Episode Sequences. Inf. Comput. 174(2): 180-192 (2002) | |
2001 | ||
102 | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-112 | |
101 | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Scientific Computations. CSFW 2001: 273-294 | |
100 | Hoi Chang, Mikhail J. Atallah: Protecting Software Code by Guards. Digital Rights Management Workshop 2001: 160-175 | |
99 | Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik: Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. Information Hiding 2001: 185-199 | |
98 | Wenliang Du, Mikhail J. Atallah: Secure multi-party computation problems and their applications: a review and open problems. NSPW 2001: 13-22 | |
97 | Mikhail J. Atallah, Wenliang Du: Secure Multi-party Computational Geometry. WADS 2001: 165-179 | |
96 | Mikhail J. Atallah, K. N. Pantazopoulos, John R. Rice, Eugene H. Spafford: Secure outsourcing of scientific computations. Advances in Computers 54: 216-272 (2001) | |
95 | Mikhail J. Atallah, Frédéric Chyzak, Philippe Dumas: A Randomized Algorithm for Approximate String Matching. Algorithmica 29(3): 468-486 (2001) | |
94 | Mikhail J. Atallah: On Estimating the Large Entries of a Convolution. IEEE Trans. Computers 50(3): 193-196 (2001) | |
93 | Mikhail J. Atallah: Faster image template matching in the sum of the absolute value of differences measure. IEEE Transactions on Image Processing 10(4): 659-663 (2001) | |
92 | Mikhail J. Atallah, Danny Z. Chen: On Connecting Red and Blue Rectilinear Polygonal Obstacles with Nonintersecting Monotone Rectilinear Paths. Int. J. Comput. Geometry Appl. 11(4): 373-400 (2001) | |
2000 | ||
91 | Mikhail J. Atallah, Sunil Prabhakar: (Almost) Optimal Parallel Block Access for Range Queries. PODS 2000: 205-215 | |
90 | Chapman Flack, Mikhail J. Atallah: Better Logging through Formality. Recent Advances in Intrusion Detection 2000: 1-16 | |
89 | Marilyn G. Andrews, Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: Parallel Algorithms for Maximum Matching in Complements of Interval Graphs and Related Problems. Algorithmica 26(2): 263-289 (2000) | |
1999 | ||
88 | Mikhail J. Atallah, Yann Génin, Wojciech Szpankowski: Pattern Matching Image Compression: Algorithmic and Empirical Results. IEEE Trans. Pattern Anal. Mach. Intell. 21(7): 614-627 (1999) | |
87 | Mikhail J. Atallah: An Improved Hypercube Bound for Multisearching and Its Applications. Int. J. Comput. Geometry Appl. 9(1): 29- (1999) | |
86 | Mikhail J. Atallah, Danny Z. Chen, Kevin S. Klenk: Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems. Parallel Processing Letters 9(4): 511-520 (1999) | |
1998 | ||
85 | Mikhail J. Atallah, Danny Z. Chen: Parallel Geometric Algorithms in Coarse-Grain Network Models. COCOON 1998: 55-64 | |
84 | Mikhail J. Atallah, Douglas Comer: Algorithms for Variable Length Subnet Address Assignment. IEEE Trans. Computers 47(6): 693-699 (1998) | |
1997 | ||
83 | Mikhail J. Atallah, Danny Z. Chen, Kevin S. Klenk: Parallel algorithms for longest increasing chains in the plane and related problems. CCCG 1997 | |
82 | Mikhail J. Atallah: Efficient Parallel Algorithms for Planar st-Graphs. ISAAC 1997: 223-232 | |
1996 | ||
81 | Mikhail J. Atallah, Yann Génin, Wojciech Szpankowski: Pattern Matching Image Compression. Data Compression Conference 1996: 421 | |
80 | Mikhail J. Atallah, Danny Z. Chen: Applications of a Numbering Scheme for Polygonal Obstacles in the Plane. ISAAC 1996: 1-24 | |
79 | Elias N. Houstis, Anupam Joshi, Mikhail J. Atallah, Sanjiva Weerawarana, Ahmed K. Elmagarmid: Internet, education, and the Web. WETICE 1996: 27-33 | |
1995 | ||
78 | Marilyn G. Andrews, Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: Parallel algorithms for maximum matching in interval graphs. IPPS 1995: 84-92 | |
77 | Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications. Algorithmica 14(5): 429-441 (1995) | |
76 | Mikhail J. Atallah, Andreas Fabri: On the Multisearching Problem for Hypercubes. Comput. Geom. 5: 293-302 (1995) | |
75 | Mikhail J. Atallah, Danny Z. Chen: Optimal Parallel Hypercube Algorithms for Polygon Problems. IEEE Trans. Computers 44(7): 914-922 (1995) | |
74 | Mikhail J. Atallah, Danny Z. Chen: Computing the all-pairs longest chains in the plane. Int. J. Comput. Geometry Appl. 5(3): 257-271 (1995) | |
1994 | ||
73 | Joseph Manning, Mikhail J. Atallah, Kingsley Cudjoe, Joe Lozito, Ron Pacheco: A System for Drawing Graphs with Geometric Symmetry. Graph Drawing 1994: 262-265 | |
72 | Mikhail J. Atallah, Andreas Fabri: On the Multisearching Problem of Hypercubes. PARLE 1994: 159-166 | |
71 | Mikhail J. Atallah, Michael T. Goodrich, Kumar Ramaiyer: Biased Finger Trees and Three-Dimensional Layers of Maxima (Preliminary Version). Symposium on Computational Geometry 1994: 150-159 | |
70 | Mikhail J. Atallah, Michael T. Goodrich, S. Rao Kosaraju: Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations. J. ACM 41(6): 1049-1088 (1994) | |
69 | Mikhail J. Atallah, Frank K. H. A. Dehne, Russ Miller, Andrew Rau-Chaplin, Jyh-Jong Tsay: Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers. J. Parallel Distrib. Comput. 20(1): 1-13 (1994) | |
68 | Daniel W. Watson, Howard Jay Siegel, John K. Antonio, Mark A. Nichols, Mikhail J. Atallah: A Block-Based Mode Selection Model for SIMD/SPMD Parallel Environments. J. Parallel Distrib. Comput. 21(3): 271-288 (1994) | |
1993 | ||
67 | Mikhail J. Atallah, Danny Z. Chen: On Parallel Rectilinear Obstacle-avoiding Paths. CCCG 1993: 210-215 | |
66 | Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications. ESA 1993: 13-24 | |
65 | Mikhail J. Atallah, Danny Z. Chen: Optimal Parallel Hypercube Algorithms for Polygon Problems. SPDP 1993: 208-215 | |
64 | Mikhail J. Atallah, Danny Z. Chen: Computing the All-Pairs Longest Chain in the Plane. WADS 1993: 1-13 | |
63 | Mikhail J. Atallah: A Faster Parallel Algorithm for a Matrix Searching Problem. Algorithmica 9(2): 156-167 (1993) | |
62 | Mikhail J. Atallah, Danny Z. Chen: On Parallel Rectilinear Obstacle- Avoiding Paths. Comput. Geom. 3: 307-313 (1993) | |
61 | Alberto Apostolico, Mikhail J. Atallah, Susanne E. Hambrusch: New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24). Discrete Applied Mathematics 41(2): 179-180 (1993) | |
60 | Michael T. Goodrich, Mikhail J. Atallah, Mark H. Overmars: Output-Sensitive Methods for Rectilinear Hidden Surface Removal Inf. Comput. 107(1): 1-24 (1993) | |
59 | Mikhail J. Atallah, Paul B. Callahan, Michael T. Goodrich: P-complete geometric problems. Int. J. Comput. Geometry Appl. 3(4): 443-462 (1993) | |
58 | Mikhail J. Atallah, Philippe Jacquet, Wojciech Szpankowski: A Probabilistic Analysis of a Pattern Matching Problem. Random Struct. Algorithms 4(2): 191-214 (1993) | |
1992 | ||
57 | Mikhail J. Atallah, Philippe Jacquet, Wojciech Szpankowski: Pattern Matching With Mismatches: A Probabilistic Analysis and a Randomized Algorithm (Extended Abstract). CPM 1992: 27-40 | |
56 | Mikhail J. Atallah, Jyh-Jong Tsay: On the Parallel-Decomposability of Geometric Problems. Algorithmica 8(3): 209-231 (1992) | |
55 | Mikhail J. Atallah: Editor's Foreword: Special Issue on the Sixth Annual Symposium on Computational Geometry. Algorithmica 8(5&6): 343-344 (1992) | |
54 | Alberto Apostolico, Mikhail J. Atallah, Susanne E. Hambrusch: New clique and independent set algorithms for circle graphs. Discrete Applied Mathematics 36(1): 1-24 (1992) | |
53 | Joseph Manning, Mikhail J. Atallah: Fast Detection and Display of Symmetry in Outerplanar Graphs. Discrete Applied Mathematics 39(1): 13-35 (1992) | |
52 | Mikhail J. Atallah, S. Rao Kosaraju: An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix. J. Algorithms 13(3): 394-413 (1992) | |
51 | Mikhail J. Atallah, Christina Lock Black, Dan C. Marinescu, Howard Jay Siegel, Thomas L. Casavant: Models and Algorithms for Coscheduling Compute-Intensive Tasks on a Network of Workstations. J. Parallel Distrib. Comput. 16(4): 318-327 (1992) | |
1991 | ||
50 | Mikhail J. Atallah, C. Lock, Dan C. Marinescu, Howard Jay Siegel, Thomas L. Casavant: Co-scheduling compute-intensive tasks on a network of workstations: model and algorithms. ICDCS 1991: 344-352 | |
49 | Mikhail J. Atallah, S. Rao Kosaraju: An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix. SODA 1991: 394-403 | |
48 | Mikhail J. Atallah, Frank K. H. A. Dehne, Russ Miller, Andrew Rau-Chaplin, Jyh-Jong Tsay: Multisearch Techniques for Implementing Data Structures on a Mesh-Connected Computer (Preliminary Version). SPAA 1991: 204-214 | |
47 | Mikhail J. Atallah, Susanne E. Hambrusch, Lynn E. Te Winkel: Topological Numbering of Features on a Mesh. Algorithmica 6(5): 762-769 (1991) | |
46 | Mikhail J. Atallah, Danny Z. Chen: Parallel Rectilinear Shortest Paths with Rectangular Obstacles. Comput. Geom. 1: 79-113 (1991) | |
45 | Mikhail J. Atallah, Scott McFaddin: Sequence comparison on the connection machine. Concurrency - Practice and Experience 3(2): 89-107 (1991) | |
44 | Mikhail J. Atallah, Danny Z. Chen, Hubert Wagener: An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point. J. ACM 38(3): 516-533 (1991) | |
43 | Mikhail J. Atallah, Celso C. Ribeiro, Sérgio Lifschitz: Computing some distance functions between polygons. Pattern Recognition 24(8): 775-781 (1991) | |
1990 | ||
42 | Michael T. Goodrich, Mikhail J. Atallah, Mark H. Overmars: An Input-Size/Output-Size Trade-Off in the Time-Complexity of Rectilinear Hidden Surface Removal (Preliminary Version). ICALP 1990: 689-702 | |
41 | Mikhail J. Atallah, Danny Z. Chen: Parallel Rectilinear Shortest Paths with Rectangular Obstacles. SPAA 1990: 270-279 | |
40 | Mikhail J. Atallah, Paul B. Callahan, Michael T. Goodrich: P-Complete Geometric Problems. SPAA 1990: 317-326 | |
39 | Mikhail J. Atallah: A Faster Parallel Algorithm for a Matrix Searching Problem. SWAT 1990: 192-200 | |
38 | Michael T. Goodrich, Mikhail J. Atallah: On Performing Robust Order Statistics in Tree-Structured Dictionary Machines. J. Parallel Distrib. Comput. 9(1): 69-76 (1990) | |
37 | Alberto Apostolico, Mikhail J. Atallah, Lawrence L. Larmore, Scott McFaddin: Efficient Parallel Algorithms for String Editing and Related Problems. SIAM J. Comput. 19(5): 968-988 (1990) | |
1989 | ||
36 | Mikhail J. Atallah, S. Rao Kosaraju, Lawrence L. Larmore, Gary L. Miller, Shang-Hua Teng: Constructing Trees in Parallel. SPAA 1989: 421-431 | |
35 | Mikhail J. Atallah, Jyh-Jong Tsay: On the Parallel Decomposability of Geometric Problems. Symposium on Computational Geometry 1989: 104-113 | |
34 | Mikhail J. Atallah, Danny Z. Chen: Optimal Parallel Algorithm for Visibility of a Simple Polygon from a Point. Symposium on Computational Geometry 1989: 114-123 | |
33 | Mikhail J. Atallah, Susanne E. Hambrusch: Optimal Channel Placement for Multi-Terminal Nets. WADS 1989: 97-114 | |
32 | Mikhail J. Atallah, S. Rao Kosaraju: An Efficient Algorithm for Maxdominance, with Applications. Algorithmica 4(2): 221-236 (1989) | |
31 | Mikhail J. Atallah, Danny Z. Chen: An Optimal Parallel Algorithm for the Minimum Circle-Cover Problem. Inf. Process. Lett. 32(4): 159-165 (1989) | |
30 | Mikhail J. Atallah, Richard Cole, Michael T. Goodrich: Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms. SIAM J. Comput. 18(3): 499-532 (1989) | |
1988 | ||
29 | Mikhail J. Atallah, Michael T. Goodrich, S. Rao Kosaraju: Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations. AWOC 1988: 1-10 | |
28 | Mikhail J. Atallah, Michael T. Goodrich: Parallel Algorithms for Some Functions of two Convex Polygons. Algorithmica 3: 535-548 (1988) | |
27 | Mikhail J. Atallah, Glenn K. Manacher, Jorge Urrutia: Finding a minimum independent dominating set in a permutation graph. Discrete Applied Mathematics 21(3): 177-183 (1988) | |
26 | Mikhail J. Atallah: On Multidimensional Arrays of Processors. IEEE Trans. Computers 37(10): 1306-1309 (1988) | |
25 | Mikhail J. Atallah, Greg N. Frederickson, S. Rao Kosaraju: Sorting with Efficient Use of Special-Purpose Sorters. Inf. Process. Lett. 27(1): 13-15 (1988) | |
24 | S. Rao Kosaraju, Mikhail J. Atallah: Optimal simulations between mesh-connected arrays of processors. J. ACM 35(3): 635-650 (1988) | |
23 | Mikhail J. Atallah, S. Rao Kosaraju: Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel. SIAM J. Comput. 17(5): 849-869 (1988) | |
1987 | ||
22 | Mikhail J. Atallah, Richard Cole, Michael T. Goodrich: Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms FOCS 1987: 151-160 | |
21 | Mikhail J. Atallah, Chandrajit L. Bajaj: Efficient Algorithms for Common Transversals. Inf. Process. Lett. 25(2): 87-91 (1987) | |
20 | Mikhail J. Atallah, Susanne E. Hambrusch: On Bipartite Matchings of Minimum Density. J. Algorithms 8(4): 480-502 (1987) | |
1986 | ||
19 | S. Rao Kosaraju, Mikhail J. Atallah: Optimal Simulations between Mesh-Connected Arrays of Processors (Preliminary Version) STOC 1986: 264-272 | |
18 | Mikhail J. Atallah, Michael T. Goodrich: Efficient Plane Sweeping in Parallel. Symposium on Computational Geometry 1986: 216-225 | |
17 | Mikhail J. Atallah, Susanne E. Hambrusch: Optimal Rotation Problems in Channel Routing. IEEE Trans. Computers 35(9): 843-847 (1986) | |
16 | Mikhail J. Atallah, Susanne E. Hambrusch: Solving Tree Problems on a Mesh-Connected Processor Array Information and Control 69(1-3): 168-187 (1986) | |
15 | Mikhail J. Atallah: Computing the Convex Hull of Line Intersections. J. Algorithms 7(2): 285-288 (1986) | |
14 | Mikhail J. Atallah, Michael T. Goodrich: Efficient Parallel Solutions to Some Geometric Problems. J. Parallel Distrib. Comput. 3(4): 492-507 (1986) | |
1985 | ||
13 | Mikhail J. Atallah, Susanne E. Hambrusch: Solving Tree Problems on a Mesh-Connected Processor Array (Preliminary Version) FOCS 1985: 222-231 | |
12 | Mikhail J. Atallah, Michael T. Goodrich: Efficient Parallel Solutions to Geometric Problems. ICPP 1985: 411-417 | |
11 | Mikhail J. Atallah, S. Rao Kosaraju: A Generalized Dictionary Machine for VLSI. IEEE Trans. Computers 34(2): 151-155 (1985) | |
10 | Mikhail J. Atallah: On Symmetry Detection. IEEE Trans. Computers 34(7): 663-666 (1985) | |
9 | Mikhail J. Atallah: A Matching Problem in the Plane. J. Comput. Syst. Sci. 31(1): 63-70 (1985) | |
1984 | ||
8 | Mikhail J. Atallah: Parallel Strong Orientation of an Undirected Graph. Inf. Process. Lett. 18(1): 37-39 (1984) | |
7 | Mikhail J. Atallah, S. Rao Kosaraju: Graph Problems on a Mesh-Connected Processor Array. J. ACM 31(3): 649-667 (1984) | |
6 | Mikhail J. Atallah, Uzi Vishkin: Finding Euler Tours in Parallel. J. Comput. Syst. Sci. 29(3): 330-337 (1984) | |
1983 | ||
5 | Mikhail J. Atallah: Dynamic Computational Geometry (Preliminary Version) FOCS 1983: 92-99 | |
4 | Mikhail J. Atallah: A Linear Time Algorithm for the Hausdorff Distance Between Convex Polygons. Inf. Process. Lett. 17(4): 207-209 (1983) | |
1982 | ||
3 | Mikhail J. Atallah, S. Rao Kosaraju: Graph Problems on a Mesh-Connected Processor Array (Preliminary Version) STOC 1982: 345-353 | |
2 | Mikhail J. Atallah: Finding the Cyclic Index of an Irreducible, Nonnegative Matrix. SIAM J. Comput. 11(3): 567-570 (1982) | |
1981 | ||
1 | Mikhail J. Atallah, S. Rao Kosaraju: An Adversary-Based Lower Bound for Sorting. Inf. Process. Lett. 13(2): 55-57 (1981) |