![]() | 2009 | |
---|---|---|
190 | ![]() ![]() ![]() ![]() ![]() ![]() | Ian Goldberg, Mikhail J. Atallah: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings Springer 2009 |
189 | ![]() ![]() ![]() ![]() ![]() ![]() | Hao Yuan, Mikhail J. Atallah: Efficient and secure distribution of massive geo-spatial data. GIS 2009: 440-443 |
188 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Yakout, Mikhail J. Atallah, Ahmed K. Elmagarmid: Efficient Private Record Linkage. ICDE 2009: 1283-1286 |
187 | ![]() ![]() ![]() ![]() ![]() ![]() | Hao Yuan, Mikhail J. Atallah: Efficient data structures for range-aggregate queries on trees. ICDT 2009: 111-120 |
186 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Marina Blanton, Mikhail J. Atallah: Robust Authentication Using Physically Unclonable Functions. ISC 2009: 262-277 |
185 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Yinian Qi: Computing all skyline probabilities for uncertain data. PODS 2009: 279-287 |
184 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
183 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric CoRR abs/0904.4670: (2009) |
182 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel G. Aliaga, Mikhail J. Atallah: Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. Comput. Graph. Forum 28(2): 437-446 (2009) |
181 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Grothoff, Krista Grothoff, Ryan Stutsman, Ludmila Alkhutova, Mikhail J. Atallah: Translation-based steganography. Journal of Computer Security 17(3): 269-303 (2009) |
2008 | ||
180 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho: Private combinatorial group testing. ASIACCS 2008: 312-320 |
179 | ![]() ![]() ![]() ![]() ![]() ![]() | Hao Yuan, Mikhail J. Atallah: Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. ICDCS 2008: 184-193 |
178 | ![]() ![]() ![]() ![]() ![]() ![]() | Yinian Qi, Mikhail J. Atallah: Efficient Privacy-Preserving k-Nearest Neighbor Search. ICDCS 2008: 311-319 |
177 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, YounSun Cho, Ashish Kundu: Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. ICDE 2008: 696-704 |
176 | ![]() ![]() ![]() ![]() ![]() ![]() | David Benjamin, Mikhail J. Atallah: Private and Cheating-Free Outsourcing of Algebraic Computations. PST 2008: 240-245 |
175 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice: Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. VMSec 2008: 45-48 |
174 | ![]() ![]() ![]() ![]() ![]() ![]() | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
173 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Greg N. Frederickson, Ashish Kundu: A tree-covering problem arising in integrity of tree-structured data. Inf. Process. Lett. 109(1): 79-82 (2008) |
2007 | ||
172 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Efficient techniques for realizing geo-spatial access control. ASIACCS 2007: 82-92 |
171 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Incorporating Temporal Capabilities in Existing Key Management Schemes. ESORICS 2007: 515-530 |
170 | ![]() ![]() ![]() ![]() ![]() ![]() | Umut Topkara, Mikhail J. Atallah, Mercan Topkara: Passwords decay, words endure: secure and re-usable multiple password mnemonics. SAC 2007: 292-299 |
169 | ![]() ![]() ![]() ![]() ![]() ![]() | Umut Topkara, Mercan Topkara, Mikhail J. Atallah: Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. USENIX Annual Technical Conference 2007: 369-374 |
168 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu: Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. WADS 2007: 114-126 |
2006 | ||
167 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Security Issues in Collaborative Computing. COCOON 2006: 2 |
166 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li: Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310 |
165 | ![]() ![]() ![]() ![]() ![]() ![]() | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 |
164 | ![]() ![]() ![]() ![]() ![]() ![]() | Umut Topkara, Mercan Topkara, Mikhail J. Atallah: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. MM&Sec 2006: 164-174 |
163 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah: Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. NDSS 2006 |
162 | ![]() ![]() ![]() ![]() ![]() ![]() | Ryan Stutsman, Christian Grothoff, Mikhail J. Atallah, Krista Grothoff: Lost in just the translation. SAC 2006: 338-345 |
161 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken: Key management for non-tree access hierarchies. SACMAT 2006: 11-18 |
160 | ![]() ![]() ![]() ![]() ![]() ![]() | Sundararaman Jeyaraman, Mikhail J. Atallah: An empirical study of automatic event reconstruction systems. Digital Investigation 3(Supplement-1): 108-115 (2006) |
159 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Trans. Computers 55(10): 1259-1270 (2006) |
158 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Discrete Numeric Streams. IEEE Trans. Knowl. Data Eng. 18(5): 699-714 (2006) |
157 | ![]() ![]() ![]() ![]() ![]() ![]() | Marina Blanton, Mikhail J. Atallah: Succinct representation of flexible and privacy-preserving access rights. VLDB J. 15(4): 334-354 (2006) |
2005 | ||
156 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Keith B. Frikken, Marina Blanton: Dynamic and efficient key management for access hierarchies. ACM Conference on Computer and Communications Security 2005: 190-202 |
155 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah, Chen Zhang: Privacy-preserving credit checking. ACM Conference on Electronic Commerce 2005: 147-154 |
154 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia: Indexing Information for Data Forensics. ACNS 2005: 206-221 |
153 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah, Marina Bykova: Remote Revocation of Smart Cards in a Private DRM System. ACSW Frontiers 2005: 169-178 |
152 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). ACSW Frontiers 2005: 73 |
151 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah: Achieving Fairness in Private Contract Negotiation. Financial Cryptography 2005: 270-284 |
150 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia: Secure Biometric Authentication for Weak Computational Devices. Financial Cryptography 2005: 357-371 |
149 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Data Confidentiality in Collaborative Computing. HiPC 2005: 1 |
148 | ![]() ![]() ![]() ![]() ![]() ![]() | Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru: ViWiD : Visible Watermarking Based Defense Against Phishing. IWDW 2005: 470-483 |
147 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah: Translation-Based Steganography. Information Hiding 2005: 219-233 |
146 | ![]() ![]() ![]() ![]() ![]() ![]() | Marina Blanton, Mikhail J. Atallah: Provable bounds for portable and flexible privacy-preserving access. SACMAT 2005: 95-101 |
145 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski: Markov Models for Identification of Significant Episodes. SDM 2005 |
144 | ![]() ![]() ![]() ![]() ![]() ![]() | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah: Adaptive data structures for IP lookups. ACM Journal of Experimental Algorithmics 10: (2005) |
143 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang: A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. IEEE Trans. Knowl. Data Eng. 17(7): 1010-1014 (2005) |
142 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Categorical Data. IEEE Trans. Knowl. Data Eng. 17(7): 912-926 (2005) |
141 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Jiangtao Li: Secure outsourcing of sequence comparisons . Int. J. Inf. Sec. 4(4): 277-287 (2005) |
140 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski: Reliable detection of episodes in event sequences. Knowl. Inf. Syst. 7(4): 415-437 (2005) |
2004 | ||
139 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Bykova: Portable and Flexible Document Access Control Mechanisms. ESORICS 2004: 193-208 |
138 | ![]() ![]() ![]() ![]() ![]() ![]() | Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice: Private Fingerprint Verification without Local Storage. ICBA 2004: 387-394 |
137 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: wmdb.: Rights Protection for Numeric Relational Data. ICDE 2004: 863 |
136 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Robert Gwadera, Wojciech Szpankowski: Detection of Significant Sets of Episodes in Event Sequences. ICDM 2004: 3-10 |
135 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Keith B. Frikken: Privacy-Preserving Location-Dependent Query Processing. ICPS 2004: 9-17 |
134 | ![]() ![]() ![]() ![]() ![]() ![]() | Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp: A hierarchical protocol for increasing the stealthiness of steganographic methods. MM&Sec 2004: 16-24 |
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Jiangtao Li: Secure Outsourcing of Sequence Comparisons. Privacy Enhancing Technologies 2004: 63-78 |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Marina Bykova, Mikhail J. Atallah: Succinct specifications of portable document access policies. SACMAT 2004: 41-50 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah: Attacking digital watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 848-858 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Resilient Rights Protection for Sensor Streams. VLDB 2004: 732-743 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara: Private collaborative forecasting and benchmarking. WPES 2004: 103-114 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Hidden access control policies with hidden credentials. WPES 2004: 27 |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah: Privacy preserving route planning. WPES 2004: 8-15 |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Stefano Lonardi: Augmenting LZ-77 with authentication and integrity assurance capabilities. Concurrency - Practice and Experience 16(11): 1063-1076 (2004) |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion: Digital Rights Protection. IEEE Data Eng. Bull. 27(1): 19-25 (2004) |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Relational Data. IEEE Trans. Knowl. Data Eng. 16(12): 1509-1525 (2004) |
2003 | ||
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Jiangtao Li: Enhanced Smart-card based License Management. CEC 2003: 111-119 |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Hicham G. Elmongui, Vinayak Deshpande, Leroy B. Schwarz: Secure Supply-Chain Protocols. CEC 2003: 293-302 |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Keith B. Frikken: Replicated Parallel I/O without Additional Scheduling Costs. DEXA 2003: 223-232 |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski: Reliable Detection of Episodes in Event Sequences. ICDM 2003: 67-74 |
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah: Adaptive Data Structures for IP Lookups. INFOCOM 2003 |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: On-the-fly Intrusion Detection for Web Portals. ITCC 2003: 325-330 |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Resilient Information Hiding for Abstract Semi-structures. IWDW 2003: 141-153 |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Stefano Lonardi: Authentication of LZ-77 Compressed Data. SAC 2003: 282-287 |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: Rights Protection for Relational Data. SIGMOD Conference 2003: 98-109 |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah: Cropping-Resilient Segmented Multiple Watermarking. WADS 2003: 231-242 |
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du: Secure and private sequence comparisons. WPES 2003: 39-44 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah: Privacy preserving electronic surveillance. WPES 2003: 45-52 |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen, Ovidiu Daescu: Efficient Parallel Algorithms for Planar st-Graphs. Algorithmica 35(3): 194-215 (2003) |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Sunil Prabhakar: (Almost) Optimal parallel block access for range queries. Inf. Sci. 157: 21-31 (2003) |
2002 | ||
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith B. Frikken, Mikhail J. Atallah, Sunil Prabhakar, Reihaneh Safavi-Naini: Optimal Parallel I/O for Range Queries through Replication. DEXA 2002: 669-678 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Christos Berberidis, Walid G. Aref, Mikhail J. Atallah, Ioannis P. Vlahavas, Ahmed K. Elmagarmid: Multiple and Partial Periodicity Mining in Time Series Databases. ECAI 2002: 370-374 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah: A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments. ICPP 2002: 379-384 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar: On Watermarking Numeric Sets. IWDW 2002: 130-146 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg: Natural Language Watermarking and Tamperproofing. Information Hiding 2002: 196-212 |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Christos Berberidis, Ioannis P. Vlahavas, Walid G. Aref, Mikhail J. Atallah, Ahmed K. Elmagarmid: On the Discovery of Weak Periodicities in Large Time Series. PKDD 2002: 51-61 |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Alberto Apostolico, Mikhail J. Atallah: Compact Recognizers of Episode Sequences. Inf. Comput. 174(2): 180-192 (2002) |
2001 | ||
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-112 |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Scientific Computations. CSFW 2001: 273-294 |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Hoi Chang, Mikhail J. Atallah: Protecting Software Code by Guards. Digital Rights Management Workshop 2001: 160-175 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik: Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. Information Hiding 2001: 185-199 |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mikhail J. Atallah: Secure multi-party computation problems and their applications: a review and open problems. NSPW 2001: 13-22 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Wenliang Du: Secure Multi-party Computational Geometry. WADS 2001: 165-179 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, K. N. Pantazopoulos, John R. Rice, Eugene H. Spafford: Secure outsourcing of scientific computations. Advances in Computers 54: 216-272 (2001) |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Frédéric Chyzak, Philippe Dumas: A Randomized Algorithm for Approximate String Matching. Algorithmica 29(3): 468-486 (2001) |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: On Estimating the Large Entries of a Convolution. IEEE Trans. Computers 50(3): 193-196 (2001) |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Faster image template matching in the sum of the absolute value of differences measure. IEEE Transactions on Image Processing 10(4): 659-663 (2001) |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: On Connecting Red and Blue Rectilinear Polygonal Obstacles with Nonintersecting Monotone Rectilinear Paths. Int. J. Comput. Geometry Appl. 11(4): 373-400 (2001) |
2000 | ||
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Sunil Prabhakar: (Almost) Optimal Parallel Block Access for Range Queries. PODS 2000: 205-215 |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Chapman Flack, Mikhail J. Atallah: Better Logging through Formality. Recent Advances in Intrusion Detection 2000: 1-16 |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Marilyn G. Andrews, Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: Parallel Algorithms for Maximum Matching in Complements of Interval Graphs and Related Problems. Algorithmica 26(2): 263-289 (2000) |
1999 | ||
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Yann Génin, Wojciech Szpankowski: Pattern Matching Image Compression: Algorithmic and Empirical Results. IEEE Trans. Pattern Anal. Mach. Intell. 21(7): 614-627 (1999) |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: An Improved Hypercube Bound for Multisearching and Its Applications. Int. J. Comput. Geometry Appl. 9(1): 29- (1999) |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen, Kevin S. Klenk: Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems. Parallel Processing Letters 9(4): 511-520 (1999) |
1998 | ||
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Parallel Geometric Algorithms in Coarse-Grain Network Models. COCOON 1998: 55-64 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Douglas Comer: Algorithms for Variable Length Subnet Address Assignment. IEEE Trans. Computers 47(6): 693-699 (1998) |
1997 | ||
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen, Kevin S. Klenk: Parallel algorithms for longest increasing chains in the plane and related problems. CCCG 1997 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Efficient Parallel Algorithms for Planar st-Graphs. ISAAC 1997: 223-232 |
1996 | ||
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Yann Génin, Wojciech Szpankowski: Pattern Matching Image Compression. Data Compression Conference 1996: 421 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Applications of a Numbering Scheme for Polygonal Obstacles in the Plane. ISAAC 1996: 1-24 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Elias N. Houstis, Anupam Joshi, Mikhail J. Atallah, Sanjiva Weerawarana, Ahmed K. Elmagarmid: Internet, education, and the Web. WETICE 1996: 27-33 |
1995 | ||
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Marilyn G. Andrews, Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: Parallel algorithms for maximum matching in interval graphs. IPPS 1995: 84-92 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications. Algorithmica 14(5): 429-441 (1995) |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Andreas Fabri: On the Multisearching Problem for Hypercubes. Comput. Geom. 5: 293-302 (1995) |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Optimal Parallel Hypercube Algorithms for Polygon Problems. IEEE Trans. Computers 44(7): 914-922 (1995) |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Computing the all-pairs longest chains in the plane. Int. J. Comput. Geometry Appl. 5(3): 257-271 (1995) |
1994 | ||
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Joseph Manning, Mikhail J. Atallah, Kingsley Cudjoe, Joe Lozito, Ron Pacheco: A System for Drawing Graphs with Geometric Symmetry. Graph Drawing 1994: 262-265 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Andreas Fabri: On the Multisearching Problem of Hypercubes. PARLE 1994: 159-166 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich, Kumar Ramaiyer: Biased Finger Trees and Three-Dimensional Layers of Maxima (Preliminary Version). Symposium on Computational Geometry 1994: 150-159 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich, S. Rao Kosaraju: Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations. J. ACM 41(6): 1049-1088 (1994) |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Frank K. H. A. Dehne, Russ Miller, Andrew Rau-Chaplin, Jyh-Jong Tsay: Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers. J. Parallel Distrib. Comput. 20(1): 1-13 (1994) |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel W. Watson, Howard Jay Siegel, John K. Antonio, Mark A. Nichols, Mikhail J. Atallah: A Block-Based Mode Selection Model for SIMD/SPMD Parallel Environments. J. Parallel Distrib. Comput. 21(3): 271-288 (1994) |
1993 | ||
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: On Parallel Rectilinear Obstacle-avoiding Paths. CCCG 1993: 210-215 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen, D. T. Lee: An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications. ESA 1993: 13-24 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Optimal Parallel Hypercube Algorithms for Polygon Problems. SPDP 1993: 208-215 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Computing the All-Pairs Longest Chain in the Plane. WADS 1993: 1-13 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: A Faster Parallel Algorithm for a Matrix Searching Problem. Algorithmica 9(2): 156-167 (1993) |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: On Parallel Rectilinear Obstacle- Avoiding Paths. Comput. Geom. 3: 307-313 (1993) |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Alberto Apostolico, Mikhail J. Atallah, Susanne E. Hambrusch: New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24). Discrete Applied Mathematics 41(2): 179-180 (1993) |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael T. Goodrich, Mikhail J. Atallah, Mark H. Overmars: Output-Sensitive Methods for Rectilinear Hidden Surface Removal Inf. Comput. 107(1): 1-24 (1993) |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Paul B. Callahan, Michael T. Goodrich: P-complete geometric problems. Int. J. Comput. Geometry Appl. 3(4): 443-462 (1993) |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Philippe Jacquet, Wojciech Szpankowski: A Probabilistic Analysis of a Pattern Matching Problem. Random Struct. Algorithms 4(2): 191-214 (1993) |
1992 | ||
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Philippe Jacquet, Wojciech Szpankowski: Pattern Matching With Mismatches: A Probabilistic Analysis and a Randomized Algorithm (Extended Abstract). CPM 1992: 27-40 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Jyh-Jong Tsay: On the Parallel-Decomposability of Geometric Problems. Algorithmica 8(3): 209-231 (1992) |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Editor's Foreword: Special Issue on the Sixth Annual Symposium on Computational Geometry. Algorithmica 8(5&6): 343-344 (1992) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Alberto Apostolico, Mikhail J. Atallah, Susanne E. Hambrusch: New clique and independent set algorithms for circle graphs. Discrete Applied Mathematics 36(1): 1-24 (1992) |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Joseph Manning, Mikhail J. Atallah: Fast Detection and Display of Symmetry in Outerplanar Graphs. Discrete Applied Mathematics 39(1): 13-35 (1992) |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix. J. Algorithms 13(3): 394-413 (1992) |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Christina Lock Black, Dan C. Marinescu, Howard Jay Siegel, Thomas L. Casavant: Models and Algorithms for Coscheduling Compute-Intensive Tasks on a Network of Workstations. J. Parallel Distrib. Comput. 16(4): 318-327 (1992) |
1991 | ||
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, C. Lock, Dan C. Marinescu, Howard Jay Siegel, Thomas L. Casavant: Co-scheduling compute-intensive tasks on a network of workstations: model and algorithms. ICDCS 1991: 344-352 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix. SODA 1991: 394-403 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Frank K. H. A. Dehne, Russ Miller, Andrew Rau-Chaplin, Jyh-Jong Tsay: Multisearch Techniques for Implementing Data Structures on a Mesh-Connected Computer (Preliminary Version). SPAA 1991: 204-214 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Susanne E. Hambrusch, Lynn E. Te Winkel: Topological Numbering of Features on a Mesh. Algorithmica 6(5): 762-769 (1991) |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Parallel Rectilinear Shortest Paths with Rectangular Obstacles. Comput. Geom. 1: 79-113 (1991) |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Scott McFaddin: Sequence comparison on the connection machine. Concurrency - Practice and Experience 3(2): 89-107 (1991) |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen, Hubert Wagener: An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point. J. ACM 38(3): 516-533 (1991) |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Celso C. Ribeiro, Sérgio Lifschitz: Computing some distance functions between polygons. Pattern Recognition 24(8): 775-781 (1991) |
1990 | ||
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael T. Goodrich, Mikhail J. Atallah, Mark H. Overmars: An Input-Size/Output-Size Trade-Off in the Time-Complexity of Rectilinear Hidden Surface Removal (Preliminary Version). ICALP 1990: 689-702 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Parallel Rectilinear Shortest Paths with Rectangular Obstacles. SPAA 1990: 270-279 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Paul B. Callahan, Michael T. Goodrich: P-Complete Geometric Problems. SPAA 1990: 317-326 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: A Faster Parallel Algorithm for a Matrix Searching Problem. SWAT 1990: 192-200 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael T. Goodrich, Mikhail J. Atallah: On Performing Robust Order Statistics in Tree-Structured Dictionary Machines. J. Parallel Distrib. Comput. 9(1): 69-76 (1990) |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Alberto Apostolico, Mikhail J. Atallah, Lawrence L. Larmore, Scott McFaddin: Efficient Parallel Algorithms for String Editing and Related Problems. SIAM J. Comput. 19(5): 968-988 (1990) |
1989 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju, Lawrence L. Larmore, Gary L. Miller, Shang-Hua Teng: Constructing Trees in Parallel. SPAA 1989: 421-431 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Jyh-Jong Tsay: On the Parallel Decomposability of Geometric Problems. Symposium on Computational Geometry 1989: 104-113 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: Optimal Parallel Algorithm for Visibility of a Simple Polygon from a Point. Symposium on Computational Geometry 1989: 114-123 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Susanne E. Hambrusch: Optimal Channel Placement for Multi-Terminal Nets. WADS 1989: 97-114 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: An Efficient Algorithm for Maxdominance, with Applications. Algorithmica 4(2): 221-236 (1989) |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Danny Z. Chen: An Optimal Parallel Algorithm for the Minimum Circle-Cover Problem. Inf. Process. Lett. 32(4): 159-165 (1989) |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Richard Cole, Michael T. Goodrich: Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms. SIAM J. Comput. 18(3): 499-532 (1989) |
1988 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich, S. Rao Kosaraju: Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations. AWOC 1988: 1-10 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich: Parallel Algorithms for Some Functions of two Convex Polygons. Algorithmica 3: 535-548 (1988) |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Glenn K. Manacher, Jorge Urrutia: Finding a minimum independent dominating set in a permutation graph. Discrete Applied Mathematics 21(3): 177-183 (1988) |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: On Multidimensional Arrays of Processors. IEEE Trans. Computers 37(10): 1306-1309 (1988) |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Greg N. Frederickson, S. Rao Kosaraju: Sorting with Efficient Use of Special-Purpose Sorters. Inf. Process. Lett. 27(1): 13-15 (1988) |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | S. Rao Kosaraju, Mikhail J. Atallah: Optimal simulations between mesh-connected arrays of processors. J. ACM 35(3): 635-650 (1988) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel. SIAM J. Comput. 17(5): 849-869 (1988) |
1987 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Richard Cole, Michael T. Goodrich: Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms FOCS 1987: 151-160 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Chandrajit L. Bajaj: Efficient Algorithms for Common Transversals. Inf. Process. Lett. 25(2): 87-91 (1987) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Susanne E. Hambrusch: On Bipartite Matchings of Minimum Density. J. Algorithms 8(4): 480-502 (1987) |
1986 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | S. Rao Kosaraju, Mikhail J. Atallah: Optimal Simulations between Mesh-Connected Arrays of Processors (Preliminary Version) STOC 1986: 264-272 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich: Efficient Plane Sweeping in Parallel. Symposium on Computational Geometry 1986: 216-225 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Susanne E. Hambrusch: Optimal Rotation Problems in Channel Routing. IEEE Trans. Computers 35(9): 843-847 (1986) |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Susanne E. Hambrusch: Solving Tree Problems on a Mesh-Connected Processor Array Information and Control 69(1-3): 168-187 (1986) |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Computing the Convex Hull of Line Intersections. J. Algorithms 7(2): 285-288 (1986) |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich: Efficient Parallel Solutions to Some Geometric Problems. J. Parallel Distrib. Comput. 3(4): 492-507 (1986) |
1985 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Susanne E. Hambrusch: Solving Tree Problems on a Mesh-Connected Processor Array (Preliminary Version) FOCS 1985: 222-231 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Michael T. Goodrich: Efficient Parallel Solutions to Geometric Problems. ICPP 1985: 411-417 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: A Generalized Dictionary Machine for VLSI. IEEE Trans. Computers 34(2): 151-155 (1985) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: On Symmetry Detection. IEEE Trans. Computers 34(7): 663-666 (1985) |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: A Matching Problem in the Plane. J. Comput. Syst. Sci. 31(1): 63-70 (1985) |
1984 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Parallel Strong Orientation of an Undirected Graph. Inf. Process. Lett. 18(1): 37-39 (1984) |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: Graph Problems on a Mesh-Connected Processor Array. J. ACM 31(3): 649-667 (1984) |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Uzi Vishkin: Finding Euler Tours in Parallel. J. Comput. Syst. Sci. 29(3): 330-337 (1984) |
1983 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Dynamic Computational Geometry (Preliminary Version) FOCS 1983: 92-99 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: A Linear Time Algorithm for the Hausdorff Distance Between Convex Polygons. Inf. Process. Lett. 17(4): 207-209 (1983) |
1982 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: Graph Problems on a Mesh-Connected Processor Array (Preliminary Version) STOC 1982: 345-353 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah: Finding the Cyclic Index of an Irreducible, Nonnegative Matrix. SIAM J. Comput. 11(3): 567-570 (1982) |
1981 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, S. Rao Kosaraju: An Adversary-Based Lower Bound for Sorting. Inf. Process. Lett. 13(2): 55-57 (1981) |