2009 |
185 | EE | Mohamed Yakout,
Mikhail J. Atallah,
Ahmed K. Elmagarmid:
Efficient Private Record Linkage.
ICDE 2009: 1283-1286 |
184 | EE | Hao Yuan,
Mikhail J. Atallah:
Efficient data structures for range-aggregate queries on trees.
ICDT 2009: 111-120 |
183 | EE | Mikhail J. Atallah,
Marina Blanton,
Nelly Fazio,
Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
182 | EE | Mikhail J. Atallah,
Marina Blanton,
Michael T. Goodrich,
Stanislas Polu:
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric
CoRR abs/0904.4670: (2009) |
181 | EE | Daniel G. Aliaga,
Mikhail J. Atallah:
Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity.
Comput. Graph. Forum 28(2): 437-446 (2009) |
2008 |
180 | EE | Mikhail J. Atallah,
Keith B. Frikken,
Marina Blanton,
YounSun Cho:
Private combinatorial group testing.
ASIACCS 2008: 312-320 |
179 | EE | Hao Yuan,
Mikhail J. Atallah:
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies.
ICDCS 2008: 184-193 |
178 | EE | Yinian Qi,
Mikhail J. Atallah:
Efficient Privacy-Preserving k-Nearest Neighbor Search.
ICDCS 2008: 311-319 |
177 | EE | Mikhail J. Atallah,
YounSun Cho,
Ashish Kundu:
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors.
ICDE 2008: 696-704 |
176 | EE | David Benjamin,
Mikhail J. Atallah:
Private and Cheating-Free Outsourcing of Algebraic Computations.
PST 2008: 240-245 |
175 | EE | Mikhail J. Atallah,
Eric Bryant,
John T. Korb,
John R. Rice:
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.
VMSec 2008: 45-48 |
174 | EE | Danfeng Yao,
Keith B. Frikken,
Mikhail J. Atallah,
Roberto Tamassia:
Private Information: To Reveal or not to Reveal.
ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
173 | EE | Mikhail J. Atallah,
Greg N. Frederickson,
Ashish Kundu:
A tree-covering problem arising in integrity of tree-structured data.
Inf. Process. Lett. 109(1): 79-82 (2008) |
2007 |
172 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control.
ASIACCS 2007: 82-92 |
171 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes.
ESORICS 2007: 515-530 |
170 | EE | Umut Topkara,
Mikhail J. Atallah,
Mercan Topkara:
Passwords decay, words endure: secure and re-usable multiple password mnemonics.
SAC 2007: 292-299 |
169 | EE | Umut Topkara,
Mercan Topkara,
Mikhail J. Atallah:
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication.
USENIX Annual Technical Conference 2007: 369-374 |
168 | EE | Mikhail J. Atallah,
Marina Blanton,
Michael T. Goodrich,
Stanislas Polu:
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric.
WADS 2007: 114-126 |
2006 |
167 | EE | Mikhail J. Atallah:
Security Issues in Collaborative Computing.
COCOON 2006: 2 |
166 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken,
Jiangtao Li:
Efficient Correlated Action Selection.
Financial Cryptography 2006: 296-310 |
165 | EE | Danfeng Yao,
Keith B. Frikken,
Mikhail J. Atallah,
Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth.
ICICS 2006: 190-209 |
164 | EE | Umut Topkara,
Mercan Topkara,
Mikhail J. Atallah:
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions.
MM&Sec 2006: 164-174 |
163 | EE | Keith B. Frikken,
Jiangtao Li,
Mikhail J. Atallah:
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
NDSS 2006 |
162 | EE | Ryan Stutsman,
Christian Grothoff,
Mikhail J. Atallah,
Krista Grothoff:
Lost in just the translation.
SAC 2006: 338-345 |
161 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken:
Key management for non-tree access hierarchies.
SACMAT 2006: 11-18 |
160 | EE | Sundararaman Jeyaraman,
Mikhail J. Atallah:
An empirical study of automatic event reconstruction systems.
Digital Investigation 3(Supplement-1): 108-115 (2006) |
159 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Jiangtao Li:
Attribute-Based Access Control with Hidden Policies and Hidden Credentials.
IEEE Trans. Computers 55(10): 1259-1270 (2006) |
158 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
Rights Protection for Discrete Numeric Streams.
IEEE Trans. Knowl. Data Eng. 18(5): 699-714 (2006) |
157 | EE | Marina Blanton,
Mikhail J. Atallah:
Succinct representation of flexible and privacy-preserving access rights.
VLDB J. 15(4): 334-354 (2006) |
2005 |
156 | EE | Mikhail J. Atallah,
Keith B. Frikken,
Marina Blanton:
Dynamic and efficient key management for access hierarchies.
ACM Conference on Computer and Communications Security 2005: 190-202 |
155 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Chen Zhang:
Privacy-preserving credit checking.
ACM Conference on Electronic Commerce 2005: 147-154 |
154 | EE | Michael T. Goodrich,
Mikhail J. Atallah,
Roberto Tamassia:
Indexing Information for Data Forensics.
ACNS 2005: 206-221 |
153 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Marina Bykova:
Remote Revocation of Smart Cards in a Private DRM System.
ACSW Frontiers 2005: 169-178 |
152 | EE | Mikhail J. Atallah:
A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk).
ACSW Frontiers 2005: 73 |
151 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Achieving Fairness in Private Contract Negotiation.
Financial Cryptography 2005: 270-284 |
150 | EE | Mikhail J. Atallah,
Keith B. Frikken,
Michael T. Goodrich,
Roberto Tamassia:
Secure Biometric Authentication for Weak Computational Devices.
Financial Cryptography 2005: 357-371 |
149 | EE | Mikhail J. Atallah:
Data Confidentiality in Collaborative Computing.
HiPC 2005: 1 |
148 | EE | Mercan Topkara,
Ashish Kamra,
Mikhail J. Atallah,
Cristina Nita-Rotaru:
ViWiD : Visible Watermarking Based Defense Against Phishing.
IWDW 2005: 470-483 |
147 | EE | Christian Grothoff,
Krista Grothoff,
Ludmila Alkhutova,
Ryan Stutsman,
Mikhail J. Atallah:
Translation-Based Steganography.
Information Hiding 2005: 219-233 |
146 | EE | Marina Blanton,
Mikhail J. Atallah:
Provable bounds for portable and flexible privacy-preserving access.
SACMAT 2005: 95-101 |
145 | | Robert Gwadera,
Mikhail J. Atallah,
Wojciech Szpankowski:
Markov Models for Identification of Significant Episodes.
SDM 2005 |
144 | EE | Ioannis Ioannidis,
Ananth Grama,
Mikhail J. Atallah:
Adaptive data structures for IP lookups.
ACM Journal of Experimental Algorithmics 10: (2005) |
143 | EE | Ahsan Habib,
Dongyan Xu,
Mikhail J. Atallah,
Bharat K. Bhargava,
John Chuang:
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng. 17(7): 1010-1014 (2005) |
142 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
Rights Protection for Categorical Data.
IEEE Trans. Knowl. Data Eng. 17(7): 912-926 (2005) |
141 | EE | Mikhail J. Atallah,
Jiangtao Li:
Secure outsourcing of sequence comparisons .
Int. J. Inf. Sec. 4(4): 277-287 (2005) |
140 | EE | Robert Gwadera,
Mikhail J. Atallah,
Wojciech Szpankowski:
Reliable detection of episodes in event sequences.
Knowl. Inf. Syst. 7(4): 415-437 (2005) |
2004 |
139 | EE | Mikhail J. Atallah,
Marina Bykova:
Portable and Flexible Document Access Control Mechanisms.
ESORICS 2004: 193-208 |
138 | EE | Florian Kerschbaum,
Mikhail J. Atallah,
David M'Raïhi,
John R. Rice:
Private Fingerprint Verification without Local Storage.
ICBA 2004: 387-394 |
137 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
wmdb.: Rights Protection for Numeric Relational Data.
ICDE 2004: 863 |
136 | EE | Mikhail J. Atallah,
Robert Gwadera,
Wojciech Szpankowski:
Detection of Significant Sets of Episodes in Event Sequences.
ICDM 2004: 3-10 |
135 | EE | Mikhail J. Atallah,
Keith B. Frikken:
Privacy-Preserving Location-Dependent Query Processing.
ICPS 2004: 9-17 |
134 | EE | Mercan Topkara,
Umut Topkara,
Mikhail J. Atallah,
Cüneyt M. Taskiran,
Eugene T. Lin,
Edward J. Delp:
A hierarchical protocol for increasing the stealthiness of steganographic methods.
MM&Sec 2004: 16-24 |
133 | EE | Mikhail J. Atallah,
Jiangtao Li:
Secure Outsourcing of Sequence Comparisons.
Privacy Enhancing Technologies 2004: 63-78 |
132 | EE | Marina Bykova,
Mikhail J. Atallah:
Succinct specifications of portable document access policies.
SACMAT 2004: 41-50 |
131 | | Radu Sion,
Mikhail J. Atallah:
Attacking digital watermarks.
Security, Steganography, and Watermarking of Multimedia Contents 2004: 848-858 |
130 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
Resilient Rights Protection for Sensor Streams.
VLDB 2004: 732-743 |
129 | EE | Mikhail J. Atallah,
Marina Bykova,
Jiangtao Li,
Keith B. Frikken,
Mercan Topkara:
Private collaborative forecasting and benchmarking.
WPES 2004: 103-114 |
128 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Jiangtao Li:
Hidden access control policies with hidden credentials.
WPES 2004: 27 |
127 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Privacy preserving route planning.
WPES 2004: 8-15 |
126 | EE | Mikhail J. Atallah,
Stefano Lonardi:
Augmenting LZ-77 with authentication and integrity assurance capabilities.
Concurrency - Practice and Experience 16(11): 1063-1076 (2004) |
125 | EE | Mikhail J. Atallah,
Sunil Prabhakar,
Keith B. Frikken,
Radu Sion:
Digital Rights Protection.
IEEE Data Eng. Bull. 27(1): 19-25 (2004) |
124 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
Rights Protection for Relational Data.
IEEE Trans. Knowl. Data Eng. 16(12): 1509-1525 (2004) |
2003 |
123 | EE | Mikhail J. Atallah,
Jiangtao Li:
Enhanced Smart-card based License Management.
CEC 2003: 111-119 |
122 | EE | Mikhail J. Atallah,
Hicham G. Elmongui,
Vinayak Deshpande,
Leroy B. Schwarz:
Secure Supply-Chain Protocols.
CEC 2003: 293-302 |
121 | EE | Mikhail J. Atallah,
Keith B. Frikken:
Replicated Parallel I/O without Additional Scheduling Costs.
DEXA 2003: 223-232 |
120 | EE | Robert Gwadera,
Mikhail J. Atallah,
Wojciech Szpankowski:
Reliable Detection of Episodes in Event Sequences.
ICDM 2003: 67-74 |
119 | EE | Ioannis Ioannidis,
Ananth Grama,
Mikhail J. Atallah:
Adaptive Data Structures for IP Lookups.
INFOCOM 2003 |
118 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
On-the-fly Intrusion Detection for Web Portals.
ITCC 2003: 325-330 |
117 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
Resilient Information Hiding for Abstract Semi-structures.
IWDW 2003: 141-153 |
116 | | Mikhail J. Atallah,
Stefano Lonardi:
Authentication of LZ-77 Compressed Data.
SAC 2003: 282-287 |
115 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
Rights Protection for Relational Data.
SIGMOD Conference 2003: 98-109 |
114 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Cropping-Resilient Segmented Multiple Watermarking.
WADS 2003: 231-242 |
113 | EE | Mikhail J. Atallah,
Florian Kerschbaum,
Wenliang Du:
Secure and private sequence comparisons.
WPES 2003: 39-44 |
112 | EE | Keith B. Frikken,
Mikhail J. Atallah:
Privacy preserving electronic surveillance.
WPES 2003: 45-52 |
111 | EE | Mikhail J. Atallah,
Danny Z. Chen,
Ovidiu Daescu:
Efficient Parallel Algorithms for Planar st-Graphs.
Algorithmica 35(3): 194-215 (2003) |
110 | EE | Mikhail J. Atallah,
Sunil Prabhakar:
(Almost) Optimal parallel block access for range queries.
Inf. Sci. 157: 21-31 (2003) |
2002 |
109 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Sunil Prabhakar,
Reihaneh Safavi-Naini:
Optimal Parallel I/O for Range Queries through Replication.
DEXA 2002: 669-678 |
108 | | Christos Berberidis,
Walid G. Aref,
Mikhail J. Atallah,
Ioannis P. Vlahavas,
Ahmed K. Elmagarmid:
Multiple and Partial Periodicity Mining in Time Series Databases.
ECAI 2002: 370-374 |
107 | EE | Ioannis Ioannidis,
Ananth Grama,
Mikhail J. Atallah:
A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments.
ICPP 2002: 379-384 |
106 | EE | Radu Sion,
Mikhail J. Atallah,
Sunil Prabhakar:
On Watermarking Numeric Sets.
IWDW 2002: 130-146 |
105 | EE | Mikhail J. Atallah,
Victor Raskin,
Christian Hempelmann,
Mercan Karahan,
Radu Sion,
Umut Topkara,
Katrina E. Triezenberg:
Natural Language Watermarking and Tamperproofing.
Information Hiding 2002: 196-212 |
104 | EE | Christos Berberidis,
Ioannis P. Vlahavas,
Walid G. Aref,
Mikhail J. Atallah,
Ahmed K. Elmagarmid:
On the Discovery of Weak Periodicities in Large Time Series.
PKDD 2002: 51-61 |
103 | EE | Alberto Apostolico,
Mikhail J. Atallah:
Compact Recognizers of Episode Sequences.
Inf. Comput. 174(2): 180-192 (2002) |
2001 |
102 | EE | Wenliang Du,
Mikhail J. Atallah:
Privacy-Preserving Cooperative Statistical Analysis.
ACSAC 2001: 102-112 |
101 | EE | Wenliang Du,
Mikhail J. Atallah:
Privacy-Preserving Cooperative Scientific Computations.
CSFW 2001: 273-294 |
100 | EE | Hoi Chang,
Mikhail J. Atallah:
Protecting Software Code by Guards.
Digital Rights Management Workshop 2001: 160-175 |
99 | EE | Mikhail J. Atallah,
Victor Raskin,
Michael Crogan,
Christian Hempelmann,
Florian Kerschbaum,
Dina Mohamed,
Sanket Naik:
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.
Information Hiding 2001: 185-199 |
98 | EE | Wenliang Du,
Mikhail J. Atallah:
Secure multi-party computation problems and their applications: a review and open problems.
NSPW 2001: 13-22 |
97 | EE | Mikhail J. Atallah,
Wenliang Du:
Secure Multi-party Computational Geometry.
WADS 2001: 165-179 |
96 | | Mikhail J. Atallah,
K. N. Pantazopoulos,
John R. Rice,
Eugene H. Spafford:
Secure outsourcing of scientific computations.
Advances in Computers 54: 216-272 (2001) |
95 | EE | Mikhail J. Atallah,
Frédéric Chyzak,
Philippe Dumas:
A Randomized Algorithm for Approximate String Matching.
Algorithmica 29(3): 468-486 (2001) |
94 | EE | Mikhail J. Atallah:
On Estimating the Large Entries of a Convolution.
IEEE Trans. Computers 50(3): 193-196 (2001) |
93 | EE | Mikhail J. Atallah:
Faster image template matching in the sum of the absolute value of differences measure.
IEEE Transactions on Image Processing 10(4): 659-663 (2001) |
92 | | Mikhail J. Atallah,
Danny Z. Chen:
On Connecting Red and Blue Rectilinear Polygonal Obstacles with Nonintersecting Monotone Rectilinear Paths.
Int. J. Comput. Geometry Appl. 11(4): 373-400 (2001) |
2000 |
91 | EE | Mikhail J. Atallah,
Sunil Prabhakar:
(Almost) Optimal Parallel Block Access for Range Queries.
PODS 2000: 205-215 |
90 | EE | Chapman Flack,
Mikhail J. Atallah:
Better Logging through Formality.
Recent Advances in Intrusion Detection 2000: 1-16 |
89 | EE | Marilyn G. Andrews,
Mikhail J. Atallah,
Danny Z. Chen,
D. T. Lee:
Parallel Algorithms for Maximum Matching in Complements of Interval Graphs and Related Problems.
Algorithmica 26(2): 263-289 (2000) |
1999 |
88 | EE | Mikhail J. Atallah,
Yann Génin,
Wojciech Szpankowski:
Pattern Matching Image Compression: Algorithmic and Empirical Results.
IEEE Trans. Pattern Anal. Mach. Intell. 21(7): 614-627 (1999) |
87 | | Mikhail J. Atallah:
An Improved Hypercube Bound for Multisearching and Its Applications.
Int. J. Comput. Geometry Appl. 9(1): 29- (1999) |
86 | | Mikhail J. Atallah,
Danny Z. Chen,
Kevin S. Klenk:
Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems.
Parallel Processing Letters 9(4): 511-520 (1999) |
1998 |
85 | EE | Mikhail J. Atallah,
Danny Z. Chen:
Parallel Geometric Algorithms in Coarse-Grain Network Models.
COCOON 1998: 55-64 |
84 | | Mikhail J. Atallah,
Douglas Comer:
Algorithms for Variable Length Subnet Address Assignment.
IEEE Trans. Computers 47(6): 693-699 (1998) |
1997 |
83 | | Mikhail J. Atallah,
Danny Z. Chen,
Kevin S. Klenk:
Parallel algorithms for longest increasing chains in the plane and related problems.
CCCG 1997 |
82 | | Mikhail J. Atallah:
Efficient Parallel Algorithms for Planar st-Graphs.
ISAAC 1997: 223-232 |
1996 |
81 | | Mikhail J. Atallah,
Yann Génin,
Wojciech Szpankowski:
Pattern Matching Image Compression.
Data Compression Conference 1996: 421 |
80 | | Mikhail J. Atallah,
Danny Z. Chen:
Applications of a Numbering Scheme for Polygonal Obstacles in the Plane.
ISAAC 1996: 1-24 |
79 | EE | Elias N. Houstis,
Anupam Joshi,
Mikhail J. Atallah,
Sanjiva Weerawarana,
Ahmed K. Elmagarmid:
Internet, education, and the Web.
WETICE 1996: 27-33 |
1995 |
78 | EE | Marilyn G. Andrews,
Mikhail J. Atallah,
Danny Z. Chen,
D. T. Lee:
Parallel algorithms for maximum matching in interval graphs.
IPPS 1995: 84-92 |
77 | | Mikhail J. Atallah,
Danny Z. Chen,
D. T. Lee:
An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications.
Algorithmica 14(5): 429-441 (1995) |
76 | | Mikhail J. Atallah,
Andreas Fabri:
On the Multisearching Problem for Hypercubes.
Comput. Geom. 5: 293-302 (1995) |
75 | | Mikhail J. Atallah,
Danny Z. Chen:
Optimal Parallel Hypercube Algorithms for Polygon Problems.
IEEE Trans. Computers 44(7): 914-922 (1995) |
74 | | Mikhail J. Atallah,
Danny Z. Chen:
Computing the all-pairs longest chains in the plane.
Int. J. Comput. Geometry Appl. 5(3): 257-271 (1995) |
1994 |
73 | | Joseph Manning,
Mikhail J. Atallah,
Kingsley Cudjoe,
Joe Lozito,
Ron Pacheco:
A System for Drawing Graphs with Geometric Symmetry.
Graph Drawing 1994: 262-265 |
72 | | Mikhail J. Atallah,
Andreas Fabri:
On the Multisearching Problem of Hypercubes.
PARLE 1994: 159-166 |
71 | EE | Mikhail J. Atallah,
Michael T. Goodrich,
Kumar Ramaiyer:
Biased Finger Trees and Three-Dimensional Layers of Maxima (Preliminary Version).
Symposium on Computational Geometry 1994: 150-159 |
70 | EE | Mikhail J. Atallah,
Michael T. Goodrich,
S. Rao Kosaraju:
Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations.
J. ACM 41(6): 1049-1088 (1994) |
69 | | Mikhail J. Atallah,
Frank K. H. A. Dehne,
Russ Miller,
Andrew Rau-Chaplin,
Jyh-Jong Tsay:
Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers.
J. Parallel Distrib. Comput. 20(1): 1-13 (1994) |
68 | | Daniel W. Watson,
Howard Jay Siegel,
John K. Antonio,
Mark A. Nichols,
Mikhail J. Atallah:
A Block-Based Mode Selection Model for SIMD/SPMD Parallel Environments.
J. Parallel Distrib. Comput. 21(3): 271-288 (1994) |
1993 |
67 | | Mikhail J. Atallah,
Danny Z. Chen:
On Parallel Rectilinear Obstacle-avoiding Paths.
CCCG 1993: 210-215 |
66 | | Mikhail J. Atallah,
Danny Z. Chen,
D. T. Lee:
An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications.
ESA 1993: 13-24 |
65 | | Mikhail J. Atallah,
Danny Z. Chen:
Optimal Parallel Hypercube Algorithms for Polygon Problems.
SPDP 1993: 208-215 |
64 | | Mikhail J. Atallah,
Danny Z. Chen:
Computing the All-Pairs Longest Chain in the Plane.
WADS 1993: 1-13 |
63 | | Mikhail J. Atallah:
A Faster Parallel Algorithm for a Matrix Searching Problem.
Algorithmica 9(2): 156-167 (1993) |
62 | | Mikhail J. Atallah,
Danny Z. Chen:
On Parallel Rectilinear Obstacle- Avoiding Paths.
Comput. Geom. 3: 307-313 (1993) |
61 | EE | Alberto Apostolico,
Mikhail J. Atallah,
Susanne E. Hambrusch:
New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24).
Discrete Applied Mathematics 41(2): 179-180 (1993) |
60 | | Michael T. Goodrich,
Mikhail J. Atallah,
Mark H. Overmars:
Output-Sensitive Methods for Rectilinear Hidden Surface Removal
Inf. Comput. 107(1): 1-24 (1993) |
59 | | Mikhail J. Atallah,
Paul B. Callahan,
Michael T. Goodrich:
P-complete geometric problems.
Int. J. Comput. Geometry Appl. 3(4): 443-462 (1993) |
58 | | Mikhail J. Atallah,
Philippe Jacquet,
Wojciech Szpankowski:
A Probabilistic Analysis of a Pattern Matching Problem.
Random Struct. Algorithms 4(2): 191-214 (1993) |
1992 |
57 | | Mikhail J. Atallah,
Philippe Jacquet,
Wojciech Szpankowski:
Pattern Matching With Mismatches: A Probabilistic Analysis and a Randomized Algorithm (Extended Abstract).
CPM 1992: 27-40 |
56 | | Mikhail J. Atallah,
Jyh-Jong Tsay:
On the Parallel-Decomposability of Geometric Problems.
Algorithmica 8(3): 209-231 (1992) |
55 | | Mikhail J. Atallah:
Editor's Foreword: Special Issue on the Sixth Annual Symposium on Computational Geometry.
Algorithmica 8(5&6): 343-344 (1992) |
54 | EE | Alberto Apostolico,
Mikhail J. Atallah,
Susanne E. Hambrusch:
New clique and independent set algorithms for circle graphs.
Discrete Applied Mathematics 36(1): 1-24 (1992) |
53 | EE | Joseph Manning,
Mikhail J. Atallah:
Fast Detection and Display of Symmetry in Outerplanar Graphs.
Discrete Applied Mathematics 39(1): 13-35 (1992) |
52 | | Mikhail J. Atallah,
S. Rao Kosaraju:
An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix.
J. Algorithms 13(3): 394-413 (1992) |
51 | | Mikhail J. Atallah,
Christina Lock Black,
Dan C. Marinescu,
Howard Jay Siegel,
Thomas L. Casavant:
Models and Algorithms for Coscheduling Compute-Intensive Tasks on a Network of Workstations.
J. Parallel Distrib. Comput. 16(4): 318-327 (1992) |
1991 |
50 | EE | Mikhail J. Atallah,
C. Lock,
Dan C. Marinescu,
Howard Jay Siegel,
Thomas L. Casavant:
Co-scheduling compute-intensive tasks on a network of workstations: model and algorithms.
ICDCS 1991: 344-352 |
49 | | Mikhail J. Atallah,
S. Rao Kosaraju:
An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix.
SODA 1991: 394-403 |
48 | EE | Mikhail J. Atallah,
Frank K. H. A. Dehne,
Russ Miller,
Andrew Rau-Chaplin,
Jyh-Jong Tsay:
Multisearch Techniques for Implementing Data Structures on a Mesh-Connected Computer (Preliminary Version).
SPAA 1991: 204-214 |
47 | | Mikhail J. Atallah,
Susanne E. Hambrusch,
Lynn E. Te Winkel:
Topological Numbering of Features on a Mesh.
Algorithmica 6(5): 762-769 (1991) |
46 | | Mikhail J. Atallah,
Danny Z. Chen:
Parallel Rectilinear Shortest Paths with Rectangular Obstacles.
Comput. Geom. 1: 79-113 (1991) |
45 | EE | Mikhail J. Atallah,
Scott McFaddin:
Sequence comparison on the connection machine.
Concurrency - Practice and Experience 3(2): 89-107 (1991) |
44 | EE | Mikhail J. Atallah,
Danny Z. Chen,
Hubert Wagener:
An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point.
J. ACM 38(3): 516-533 (1991) |
43 | EE | Mikhail J. Atallah,
Celso C. Ribeiro,
Sérgio Lifschitz:
Computing some distance functions between polygons.
Pattern Recognition 24(8): 775-781 (1991) |
1990 |
42 | | Michael T. Goodrich,
Mikhail J. Atallah,
Mark H. Overmars:
An Input-Size/Output-Size Trade-Off in the Time-Complexity of Rectilinear Hidden Surface Removal (Preliminary Version).
ICALP 1990: 689-702 |
41 | EE | Mikhail J. Atallah,
Danny Z. Chen:
Parallel Rectilinear Shortest Paths with Rectangular Obstacles.
SPAA 1990: 270-279 |
40 | EE | Mikhail J. Atallah,
Paul B. Callahan,
Michael T. Goodrich:
P-Complete Geometric Problems.
SPAA 1990: 317-326 |
39 | | Mikhail J. Atallah:
A Faster Parallel Algorithm for a Matrix Searching Problem.
SWAT 1990: 192-200 |
38 | | Michael T. Goodrich,
Mikhail J. Atallah:
On Performing Robust Order Statistics in Tree-Structured Dictionary Machines.
J. Parallel Distrib. Comput. 9(1): 69-76 (1990) |
37 | | Alberto Apostolico,
Mikhail J. Atallah,
Lawrence L. Larmore,
Scott McFaddin:
Efficient Parallel Algorithms for String Editing and Related Problems.
SIAM J. Comput. 19(5): 968-988 (1990) |
1989 |
36 | EE | Mikhail J. Atallah,
S. Rao Kosaraju,
Lawrence L. Larmore,
Gary L. Miller,
Shang-Hua Teng:
Constructing Trees in Parallel.
SPAA 1989: 421-431 |
35 | EE | Mikhail J. Atallah,
Jyh-Jong Tsay:
On the Parallel Decomposability of Geometric Problems.
Symposium on Computational Geometry 1989: 104-113 |
34 | EE | Mikhail J. Atallah,
Danny Z. Chen:
Optimal Parallel Algorithm for Visibility of a Simple Polygon from a Point.
Symposium on Computational Geometry 1989: 114-123 |
33 | | Mikhail J. Atallah,
Susanne E. Hambrusch:
Optimal Channel Placement for Multi-Terminal Nets.
WADS 1989: 97-114 |
32 | | Mikhail J. Atallah,
S. Rao Kosaraju:
An Efficient Algorithm for Maxdominance, with Applications.
Algorithmica 4(2): 221-236 (1989) |
31 | | Mikhail J. Atallah,
Danny Z. Chen:
An Optimal Parallel Algorithm for the Minimum Circle-Cover Problem.
Inf. Process. Lett. 32(4): 159-165 (1989) |
30 | | Mikhail J. Atallah,
Richard Cole,
Michael T. Goodrich:
Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms.
SIAM J. Comput. 18(3): 499-532 (1989) |
1988 |
29 | | Mikhail J. Atallah,
Michael T. Goodrich,
S. Rao Kosaraju:
Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations.
AWOC 1988: 1-10 |
28 | | Mikhail J. Atallah,
Michael T. Goodrich:
Parallel Algorithms for Some Functions of two Convex Polygons.
Algorithmica 3: 535-548 (1988) |
27 | EE | Mikhail J. Atallah,
Glenn K. Manacher,
Jorge Urrutia:
Finding a minimum independent dominating set in a permutation graph.
Discrete Applied Mathematics 21(3): 177-183 (1988) |
26 | | Mikhail J. Atallah:
On Multidimensional Arrays of Processors.
IEEE Trans. Computers 37(10): 1306-1309 (1988) |
25 | | Mikhail J. Atallah,
Greg N. Frederickson,
S. Rao Kosaraju:
Sorting with Efficient Use of Special-Purpose Sorters.
Inf. Process. Lett. 27(1): 13-15 (1988) |
24 | EE | S. Rao Kosaraju,
Mikhail J. Atallah:
Optimal simulations between mesh-connected arrays of processors.
J. ACM 35(3): 635-650 (1988) |
23 | | Mikhail J. Atallah,
S. Rao Kosaraju:
Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel.
SIAM J. Comput. 17(5): 849-869 (1988) |
1987 |
22 | | Mikhail J. Atallah,
Richard Cole,
Michael T. Goodrich:
Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms
FOCS 1987: 151-160 |
21 | | Mikhail J. Atallah,
Chandrajit L. Bajaj:
Efficient Algorithms for Common Transversals.
Inf. Process. Lett. 25(2): 87-91 (1987) |
20 | | Mikhail J. Atallah,
Susanne E. Hambrusch:
On Bipartite Matchings of Minimum Density.
J. Algorithms 8(4): 480-502 (1987) |
1986 |
19 | | S. Rao Kosaraju,
Mikhail J. Atallah:
Optimal Simulations between Mesh-Connected Arrays of Processors (Preliminary Version)
STOC 1986: 264-272 |
18 | EE | Mikhail J. Atallah,
Michael T. Goodrich:
Efficient Plane Sweeping in Parallel.
Symposium on Computational Geometry 1986: 216-225 |
17 | | Mikhail J. Atallah,
Susanne E. Hambrusch:
Optimal Rotation Problems in Channel Routing.
IEEE Trans. Computers 35(9): 843-847 (1986) |
16 | | Mikhail J. Atallah,
Susanne E. Hambrusch:
Solving Tree Problems on a Mesh-Connected Processor Array
Information and Control 69(1-3): 168-187 (1986) |
15 | | Mikhail J. Atallah:
Computing the Convex Hull of Line Intersections.
J. Algorithms 7(2): 285-288 (1986) |
14 | | Mikhail J. Atallah,
Michael T. Goodrich:
Efficient Parallel Solutions to Some Geometric Problems.
J. Parallel Distrib. Comput. 3(4): 492-507 (1986) |
1985 |
13 | | Mikhail J. Atallah,
Susanne E. Hambrusch:
Solving Tree Problems on a Mesh-Connected Processor Array (Preliminary Version)
FOCS 1985: 222-231 |
12 | | Mikhail J. Atallah,
Michael T. Goodrich:
Efficient Parallel Solutions to Geometric Problems.
ICPP 1985: 411-417 |
11 | | Mikhail J. Atallah,
S. Rao Kosaraju:
A Generalized Dictionary Machine for VLSI.
IEEE Trans. Computers 34(2): 151-155 (1985) |
10 | | Mikhail J. Atallah:
On Symmetry Detection.
IEEE Trans. Computers 34(7): 663-666 (1985) |
9 | | Mikhail J. Atallah:
A Matching Problem in the Plane.
J. Comput. Syst. Sci. 31(1): 63-70 (1985) |
1984 |
8 | | Mikhail J. Atallah:
Parallel Strong Orientation of an Undirected Graph.
Inf. Process. Lett. 18(1): 37-39 (1984) |
7 | EE | Mikhail J. Atallah,
S. Rao Kosaraju:
Graph Problems on a Mesh-Connected Processor Array.
J. ACM 31(3): 649-667 (1984) |
6 | | Mikhail J. Atallah,
Uzi Vishkin:
Finding Euler Tours in Parallel.
J. Comput. Syst. Sci. 29(3): 330-337 (1984) |
1983 |
5 | | Mikhail J. Atallah:
Dynamic Computational Geometry (Preliminary Version)
FOCS 1983: 92-99 |
4 | | Mikhail J. Atallah:
A Linear Time Algorithm for the Hausdorff Distance Between Convex Polygons.
Inf. Process. Lett. 17(4): 207-209 (1983) |
1982 |
3 | | Mikhail J. Atallah,
S. Rao Kosaraju:
Graph Problems on a Mesh-Connected Processor Array (Preliminary Version)
STOC 1982: 345-353 |
2 | | Mikhail J. Atallah:
Finding the Cyclic Index of an Irreducible, Nonnegative Matrix.
SIAM J. Comput. 11(3): 567-570 (1982) |
1981 |
1 | | Mikhail J. Atallah,
S. Rao Kosaraju:
An Adversary-Based Lower Bound for Sorting.
Inf. Process. Lett. 13(2): 55-57 (1981) |