Search the dblp DataBase
Mikhail J. Atallah :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mikhail J. Atallah , Sunil Prabhakar (Almost) Optimal Parallel Block Access for Range Queries. [Citation Graph (2, 10)][DBLP ] PODS, 2000, pp:205-215 [Conf ] Mikhail J. Atallah , Michael T. Goodrich Efficient Plane Sweeping in Parallel. [Citation Graph (1, 0)][DBLP ] Symposium on Computational Geometry, 1986, pp:216-225 [Conf ] Mikhail J. Atallah , Susanne E. Hambrusch Solving Tree Problems on a Mesh-Connected Processor Array (Preliminary Version) [Citation Graph (1, 0)][DBLP ] FOCS, 1985, pp:222-231 [Conf ] Mikhail J. Atallah , S. Rao Kosaraju A Generalized Dictionary Machine for VLSI. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Computers, 1985, v:34, n:2, pp:151-155 [Journal ] Michael T. Goodrich , Mikhail J. Atallah , Roberto Tamassia Indexing Information for Data Forensics. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:206-221 [Conf ] Wenliang Du , Mikhail J. Atallah Privacy-Preserving Cooperative Statistical Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:102-112 [Conf ] Mikhail J. Atallah A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:73- [Conf ] Keith B. Frikken , Mikhail J. Atallah , Marina Bykova Remote Revocation of Smart Cards in a Private DRM System. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:169-178 [Conf ] Mikhail J. Atallah , Michael T. Goodrich , S. Rao Kosaraju Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations. [Citation Graph (0, 0)][DBLP ] AWOC, 1988, pp:1-10 [Conf ] Mikhail J. Atallah , Danny Z. Chen On Parallel Rectilinear Obstacle-avoiding Paths. [Citation Graph (0, 0)][DBLP ] CCCG, 1993, pp:210-215 [Conf ] Mikhail J. Atallah , Danny Z. Chen , Kevin S. Klenk Parallel algorithms for longest increasing chains in the plane and related problems. [Citation Graph (0, 0)][DBLP ] CCCG, 1997, pp:- [Conf ] Mikhail J. Atallah , Keith B. Frikken , Marina Blanton Dynamic and efficient key management for access hierarchies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:190-202 [Conf ] Hoi Chang , Mikhail J. Atallah Protecting Software Code by Guards. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2001, pp:160-175 [Conf ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken Efficient techniques for realizing geo-spatial access control. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:82-92 [Conf ] Mikhail J. Atallah Security Issues in Collaborative Computing. [Citation Graph (0, 0)][DBLP ] COCOON, 2006, pp:2- [Conf ] Mikhail J. Atallah , Danny Z. Chen Parallel Geometric Algorithms in Coarse-Grain Network Models. [Citation Graph (0, 0)][DBLP ] COCOON, 1998, pp:55-64 [Conf ] Mikhail J. Atallah , Danny Z. Chen Optimal Parallel Algorithm for Visibility of a Simple Polygon from a Point. [Citation Graph (0, 0)][DBLP ] Symposium on Computational Geometry, 1989, pp:114-123 [Conf ] Mikhail J. Atallah , Michael T. Goodrich , Kumar Ramaiyer Biased Finger Trees and Three-Dimensional Layers of Maxima (Preliminary Version). [Citation Graph (0, 0)][DBLP ] Symposium on Computational Geometry, 1994, pp:150-159 [Conf ] Mikhail J. Atallah , Jyh-Jong Tsay On the Parallel Decomposability of Geometric Problems. [Citation Graph (0, 0)][DBLP ] Symposium on Computational Geometry, 1989, pp:104-113 [Conf ] Mikhail J. Atallah , Philippe Jacquet , Wojciech Szpankowski Pattern Matching With Mismatches: A Probabilistic Analysis and a Randomized Algorithm (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CPM, 1992, pp:27-40 [Conf ] Wenliang Du , Mikhail J. Atallah Privacy-Preserving Cooperative Scientific Computations. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:273-294 [Conf ] Mikhail J. Atallah , Yann Génin , Wojciech Szpankowski Pattern Matching Image Compression. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1996, pp:421- [Conf ] Mikhail J. Atallah , Keith B. Frikken Replicated Parallel I/O without Additional Scheduling Costs. [Citation Graph (0, 0)][DBLP ] DEXA, 2003, pp:223-232 [Conf ] Keith B. Frikken , Mikhail J. Atallah , Sunil Prabhakar , Reihaneh Safavi-Naini Optimal Parallel I/O for Range Queries through Replication. [Citation Graph (0, 0)][DBLP ] DEXA, 2002, pp:669-678 [Conf ] Christos Berberidis , Walid G. Aref , Mikhail J. Atallah , Ioannis P. Vlahavas , Ahmed K. Elmagarmid Multiple and Partial Periodicity Mining in Time Series Databases. [Citation Graph (0, 0)][DBLP ] ECAI, 2002, pp:370-374 [Conf ] Mikhail J. Atallah , Danny Z. Chen , D. T. Lee An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications. [Citation Graph (0, 0)][DBLP ] ESA, 1993, pp:13-24 [Conf ] Mikhail J. Atallah , Marina Bykova Portable and Flexible Document Access Control Mechanisms. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:193-208 [Conf ] Mikhail J. Atallah , Keith B. Frikken , Michael T. Goodrich , Roberto Tamassia Secure Biometric Authentication for Weak Computational Devices. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:357-371 [Conf ] Keith B. Frikken , Mikhail J. Atallah Achieving Fairness in Private Contract Negotiation. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:270-284 [Conf ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken , Jiangtao Li Efficient Correlated Action Selection. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:296-310 [Conf ] Mikhail J. Atallah Dynamic Computational Geometry (Preliminary Version) [Citation Graph (0, 0)][DBLP ] FOCS, 1983, pp:92-99 [Conf ] Mikhail J. Atallah , Richard Cole , Michael T. Goodrich Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms [Citation Graph (0, 0)][DBLP ] FOCS, 1987, pp:151-160 [Conf ] Joseph Manning , Mikhail J. Atallah , Kingsley Cudjoe , Joe Lozito , Ron Pacheco A System for Drawing Graphs with Geometric Symmetry. [Citation Graph (0, 0)][DBLP ] Graph Drawing, 1994, pp:262-265 [Conf ] Mikhail J. Atallah Data Confidentiality in Collaborative Computing. [Citation Graph (0, 0)][DBLP ] HiPC, 2005, pp:1- [Conf ] Michael T. Goodrich , Mikhail J. Atallah , Mark H. Overmars An Input-Size/Output-Size Trade-Off in the Time-Complexity of Rectilinear Hidden Surface Removal (Preliminary Version). [Citation Graph (0, 0)][DBLP ] ICALP, 1990, pp:689-702 [Conf ] Florian Kerschbaum , Mikhail J. Atallah , David M'Raïhi , John R. Rice Private Fingerprint Verification without Local Storage. [Citation Graph (0, 0)][DBLP ] ICBA, 2004, pp:387-394 [Conf ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar wmdb.: Rights Protection for Numeric Relational Data. [Citation Graph (0, 0)][DBLP ] ICDE, 2004, pp:863- [Conf ] Mikhail J. Atallah , Robert Gwadera , Wojciech Szpankowski Detection of Significant Sets of Episodes in Event Sequences. [Citation Graph (0, 0)][DBLP ] ICDM, 2004, pp:3-10 [Conf ] Robert Gwadera , Mikhail J. Atallah , Wojciech Szpankowski Reliable Detection of Episodes in Event Sequences. [Citation Graph (0, 0)][DBLP ] ICDM, 2003, pp:67-74 [Conf ] Danfeng Yao , Keith B. Frikken , Mikhail J. Atallah , Roberto Tamassia Point-Based Trust: Define How Much Privacy Is Worth. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:190-209 [Conf ] Mikhail J. Atallah , Michael T. Goodrich Efficient Parallel Solutions to Geometric Problems. [Citation Graph (0, 0)][DBLP ] ICPP, 1985, pp:411-417 [Conf ] Ioannis Ioannidis , Ananth Grama , Mikhail J. Atallah A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments. [Citation Graph (0, 0)][DBLP ] ICPP, 2002, pp:379-384 [Conf ] Mikhail J. Atallah , Keith B. Frikken Privacy-Preserving Location-Dependent Query Processing. [Citation Graph (0, 0)][DBLP ] ICPS, 2004, pp:9-17 [Conf ] Christian Grothoff , Krista Grothoff , Ludmila Alkhutova , Ryan Stutsman , Mikhail J. Atallah Translation-Based Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:219-233 [Conf ] Mikhail J. Atallah , Victor Raskin , Michael Crogan , Christian Hempelmann , Florian Kerschbaum , Dina Mohamed , Sanket Naik Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2001, pp:185-199 [Conf ] Mikhail J. Atallah , Victor Raskin , Christian Hempelmann , Mercan Karahan , Radu Sion , Umut Topkara , Katrina E. Triezenberg Natural Language Watermarking and Tamperproofing. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:196-212 [Conf ] Ioannis Ioannidis , Ananth Grama , Mikhail J. Atallah Adaptive Data Structures for IP Lookups. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Marilyn G. Andrews , Mikhail J. Atallah , Danny Z. Chen , D. T. Lee Parallel algorithms for maximum matching in interval graphs. [Citation Graph (0, 0)][DBLP ] IPPS, 1995, pp:84-92 [Conf ] Mikhail J. Atallah Efficient Parallel Algorithms for Planar st -Graphs. [Citation Graph (0, 0)][DBLP ] ISAAC, 1997, pp:223-232 [Conf ] Mikhail J. Atallah , Danny Z. Chen Applications of a Numbering Scheme for Polygonal Obstacles in the Plane. [Citation Graph (0, 0)][DBLP ] ISAAC, 1996, pp:1-24 [Conf ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar On-the-fly Intrusion Detection for Web Portals. [Citation Graph (0, 0)][DBLP ] ITCC, 2003, pp:325-330 [Conf ] Mercan Topkara , Ashish Kamra , Mikhail J. Atallah , Cristina Nita-Rotaru ViWiD : Visible Watermarking Based Defense Against Phishing. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:470-483 [Conf ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar On Watermarking Numeric Sets. [Citation Graph (0, 0)][DBLP ] IWDW, 2002, pp:130-146 [Conf ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar Resilient Information Hiding for Abstract Semi-structures. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:141-153 [Conf ] Keith B. Frikken , Jiangtao Li , Mikhail J. Atallah Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Wenliang Du , Mikhail J. Atallah Secure multi-party computation problems and their applications: a review and open problems. [Citation Graph (0, 0)][DBLP ] NSPW, 2001, pp:13-22 [Conf ] Mikhail J. Atallah , Andreas Fabri On the Multisearching Problem of Hypercubes. [Citation Graph (0, 0)][DBLP ] PARLE, 1994, pp:159-166 [Conf ] Mikhail J. Atallah , Jiangtao Li Secure Outsourcing of Sequence Comparisons. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2004, pp:63-78 [Conf ] Christos Berberidis , Ioannis P. Vlahavas , Walid G. Aref , Mikhail J. Atallah , Ahmed K. Elmagarmid On the Discovery of Weak Periodicities in Large Time Series. [Citation Graph (0, 0)][DBLP ] PKDD, 2002, pp:51-61 [Conf ] Chapman Flack , Mikhail J. Atallah Better Logging through Formality. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:1-16 [Conf ] Mikhail J. Atallah , Stefano Lonardi Authentication of LZ-77 Compressed Data. [Citation Graph (0, 0)][DBLP ] SAC, 2003, pp:282-287 [Conf ] Ryan Stutsman , Christian Grothoff , Mikhail J. Atallah , Krista Grothoff Lost in just the translation. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:338-345 [Conf ] Umut Topkara , Mikhail J. Atallah , Mercan Topkara Passwords decay, words endure: secure and re-usable multiple password mnemonics. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:292-299 [Conf ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken Key management for non-tree access hierarchies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:11-18 [Conf ] Marina Blanton , Mikhail J. Atallah Provable bounds for portable and flexible privacy-preserving access. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:95-101 [Conf ] Marina Bykova , Mikhail J. Atallah Succinct specifications of portable document access policies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:41-50 [Conf ] Robert Gwadera , Mikhail J. Atallah , Wojciech Szpankowski Markov Models for Identification of Significant Episodes. [Citation Graph (0, 0)][DBLP ] SDM, 2005, pp:- [Conf ] Keith B. Frikken , Mikhail J. Atallah , Chen Zhang Privacy-preserving credit checking. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2005, pp:147-154 [Conf ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar Rights Protection for Relational Data. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2003, pp:98-109 [Conf ] Mikhail J. Atallah , S. Rao Kosaraju An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix. [Citation Graph (0, 0)][DBLP ] SODA, 1991, pp:394-403 [Conf ] Mikhail J. Atallah , Danny Z. Chen Parallel Rectilinear Shortest Paths with Rectangular Obstacles. [Citation Graph (0, 0)][DBLP ] SPAA, 1990, pp:270-279 [Conf ] Mikhail J. Atallah , Paul B. Callahan , Michael T. Goodrich P-Complete Geometric Problems. [Citation Graph (0, 0)][DBLP ] SPAA, 1990, pp:317-326 [Conf ] Mikhail J. Atallah , Frank K. H. A. Dehne , Russ Miller , Andrew Rau-Chaplin , Jyh-Jong Tsay Multisearch Techniques for Implementing Data Structures on a Mesh-Connected Computer (Preliminary Version). [Citation Graph (0, 0)][DBLP ] SPAA, 1991, pp:204-214 [Conf ] Mikhail J. Atallah , S. Rao Kosaraju , Lawrence L. Larmore , Gary L. Miller , Shang-Hua Teng Constructing Trees in Parallel. [Citation Graph (0, 0)][DBLP ] SPAA, 1989, pp:421-431 [Conf ] Mikhail J. Atallah , Danny Z. Chen Optimal Parallel Hypercube Algorithms for Polygon Problems. [Citation Graph (0, 0)][DBLP ] SPDP, 1993, pp:208-215 [Conf ] Radu Sion , Mikhail J. Atallah Attacking digital watermarks. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:848-858 [Conf ] Mikhail J. Atallah , S. Rao Kosaraju Graph Problems on a Mesh-Connected Processor Array (Preliminary Version) [Citation Graph (0, 0)][DBLP ] STOC, 1982, pp:345-353 [Conf ] S. Rao Kosaraju , Mikhail J. Atallah Optimal Simulations between Mesh-Connected Arrays of Processors (Preliminary Version) [Citation Graph (0, 0)][DBLP ] STOC, 1986, pp:264-272 [Conf ] Mikhail J. Atallah A Faster Parallel Algorithm for a Matrix Searching Problem. [Citation Graph (0, 0)][DBLP ] SWAT, 1990, pp:192-200 [Conf ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar Resilient Rights Protection for Sensor Streams. [Citation Graph (0, 0)][DBLP ] VLDB, 2004, pp:732-743 [Conf ] Mikhail J. Atallah , Danny Z. Chen Computing the All-Pairs Longest Chain in the Plane. [Citation Graph (0, 0)][DBLP ] WADS, 1993, pp:1-13 [Conf ] Mikhail J. Atallah , Wenliang Du Secure Multi-party Computational Geometry. [Citation Graph (0, 0)][DBLP ] WADS, 2001, pp:165-179 [Conf ] Mikhail J. Atallah , Susanne E. Hambrusch Optimal Channel Placement for Multi-Terminal Nets. [Citation Graph (0, 0)][DBLP ] WADS, 1989, pp:97-114 [Conf ] Keith B. Frikken , Mikhail J. Atallah Cropping-Resilient Segmented Multiple Watermarking. [Citation Graph (0, 0)][DBLP ] WADS, 2003, pp:231-242 [Conf ] Mikhail J. Atallah , Hicham G. Elmongui , Vinayak Deshpande , Leroy B. Schwarz Secure Supply-Chain Protocols. [Citation Graph (0, 0)][DBLP ] CEC, 2003, pp:293-302 [Conf ] Mikhail J. Atallah , Jiangtao Li Enhanced Smart-card based License Management. [Citation Graph (0, 0)][DBLP ] CEC, 2003, pp:111-119 [Conf ] Elias N. Houstis , Anupam Joshi , Mikhail J. Atallah , Sanjiva Weerawarana , Ahmed K. Elmagarmid Internet, education, and the Web. [Citation Graph (0, 0)][DBLP ] WETICE, 1996, pp:27-33 [Conf ] Mikhail J. Atallah , Marina Bykova , Jiangtao Li , Keith B. Frikken , Mercan Topkara Private collaborative forecasting and benchmarking. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:103-114 [Conf ] Mikhail J. Atallah , Florian Kerschbaum , Wenliang Du Secure and private sequence comparisons. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:39-44 [Conf ] Keith B. Frikken , Mikhail J. Atallah Privacy preserving electronic surveillance. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:45-52 [Conf ] Keith B. Frikken , Mikhail J. Atallah Privacy preserving route planning. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:8-15 [Conf ] Keith B. Frikken , Mikhail J. Atallah , Jiangtao Li Hidden access control policies with hidden credentials. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:27- [Conf ] Mikhail J. Atallah , K. N. Pantazopoulos , John R. Rice , Eugene H. Spafford Secure outsourcing of scientific computations. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2001, v:54, n:, pp:216-272 [Journal ] Mikhail J. Atallah Editor's Foreword: Special Issue on the Sixth Annual Symposium on Computational Geometry. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1992, v:8, n:5&6, pp:343-344 [Journal ] Mikhail J. Atallah A Faster Parallel Algorithm for a Matrix Searching Problem. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1993, v:9, n:2, pp:156-167 [Journal ] Mikhail J. Atallah , Frédéric Chyzak , Philippe Dumas A Randomized Algorithm for Approximate String Matching. [Citation Graph (0, 0)][DBLP ] Algorithmica, 2001, v:29, n:3, pp:468-486 [Journal ] Mikhail J. Atallah , Danny Z. Chen , Ovidiu Daescu Efficient Parallel Algorithms for Planar st -Graphs. [Citation Graph (0, 0)][DBLP ] Algorithmica, 2003, v:35, n:3, pp:194-215 [Journal ] Marilyn G. Andrews , Mikhail J. Atallah , Danny Z. Chen , D. T. Lee Parallel Algorithms for Maximum Matching in Complements of Interval Graphs and Related Problems. [Citation Graph (0, 0)][DBLP ] Algorithmica, 2000, v:26, n:2, pp:263-289 [Journal ] Mikhail J. Atallah , Danny Z. Chen , D. T. Lee An Optimal Algorithm for Shortest Paths on Weighted Interval and Circular-Arc Graphs, with Applications. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1995, v:14, n:5, pp:429-441 [Journal ] Mikhail J. Atallah , Michael T. Goodrich Parallel Algorithms for Some Functions of two Convex Polygons. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1988, v:3, n:, pp:535-548 [Journal ] Mikhail J. Atallah , Susanne E. Hambrusch , Lynn E. Te Winkel Topological Numbering of Features on a Mesh. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1991, v:6, n:5, pp:762-769 [Journal ] Mikhail J. Atallah , S. Rao Kosaraju An Efficient Algorithm for Maxdominance, with Applications. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1989, v:4, n:2, pp:221-236 [Journal ] Mikhail J. Atallah , Jyh-Jong Tsay On the Parallel-Decomposability of Geometric Problems. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1992, v:8, n:3, pp:209-231 [Journal ] Mikhail J. Atallah , Danny Z. Chen Parallel Rectilinear Shortest Paths with Rectangular Obstacles. [Citation Graph (0, 0)][DBLP ] Comput. Geom., 1991, v:1, n:, pp:79-113 [Journal ] Mikhail J. Atallah , Danny Z. Chen On Parallel Rectilinear Obstacle- Avoiding Paths. [Citation Graph (0, 0)][DBLP ] Comput. Geom., 1993, v:3, n:, pp:307-313 [Journal ] Mikhail J. Atallah , Andreas Fabri On the Multisearching Problem for Hypercubes. [Citation Graph (0, 0)][DBLP ] Comput. Geom., 1995, v:5, n:, pp:293-302 [Journal ] Mikhail J. Atallah , Stefano Lonardi Augmenting LZ-77 with authentication and integrity assurance capabilities. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1063-1076 [Journal ] Alberto Apostolico , Mikhail J. Atallah , Susanne E. Hambrusch New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24). [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1993, v:41, n:2, pp:179-180 [Journal ] Joseph Manning , Mikhail J. Atallah Fast Detection and Display of Symmetry in Outerplanar Graphs. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1992, v:39, n:1, pp:13-35 [Journal ] Mikhail J. Atallah , Sunil Prabhakar , Keith B. Frikken , Radu Sion Digital Rights Protection. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:19-25 [Journal ] Sundararaman Jeyaraman , Mikhail J. Atallah An empirical study of automatic event reconstruction systems. [Citation Graph (0, 0)][DBLP ] Digital Investigation, 2006, v:3, n:Supplement-1, pp:108-115 [Journal ] Alberto Apostolico , Mikhail J. Atallah Compact Recognizers of Episode Sequences. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2002, v:174, n:2, pp:180-192 [Journal ] Mikhail J. Atallah , Susanne E. Hambrusch Solving Tree Problems on a Mesh-Connected Processor Array [Citation Graph (0, 0)][DBLP ] Information and Control, 1986, v:69, n:1-3, pp:168-187 [Journal ] Michael T. Goodrich , Mikhail J. Atallah , Mark H. Overmars Output-Sensitive Methods for Rectilinear Hidden Surface Removal [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1993, v:107, n:1, pp:1-24 [Journal ] Mikhail J. Atallah An Improved Hypercube Bound for Multisearching and Its Applications. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Geometry Appl., 1999, v:9, n:1, pp:29-0 [Journal ] Mikhail J. Atallah , Danny Z. Chen On Connecting Red and Blue Rectilinear Polygonal Obstacles with Nonintersecting Monotone Rectilinear Paths. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Geometry Appl., 2001, v:11, n:4, pp:373-400 [Journal ] Mikhail J. Atallah , Danny Z. Chen Computing the all-pairs longest chains in the plane. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Geometry Appl., 1995, v:5, n:3, pp:257-271 [Journal ] Mikhail J. Atallah , Paul B. Callahan , Michael T. Goodrich P-complete geometric problems. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Geometry Appl., 1993, v:3, n:4, pp:443-462 [Journal ] Mikhail J. Atallah , Jiangtao Li Secure outsourcing of sequence comparisons . [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:4, pp:277-287 [Journal ] Mikhail J. Atallah A Linear Time Algorithm for the Hausdorff Distance Between Convex Polygons. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1983, v:17, n:4, pp:207-209 [Journal ] Mikhail J. Atallah Parallel Strong Orientation of an Undirected Graph. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1984, v:18, n:1, pp:37-39 [Journal ] Mikhail J. Atallah , Chandrajit L. Bajaj Efficient Algorithms for Common Transversals. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1987, v:25, n:2, pp:87-91 [Journal ] Mikhail J. Atallah , Danny Z. Chen An Optimal Parallel Algorithm for the Minimum Circle-Cover Problem. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1989, v:32, n:4, pp:159-165 [Journal ] Mikhail J. Atallah , Greg N. Frederickson , S. Rao Kosaraju Sorting with Efficient Use of Special-Purpose Sorters. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1988, v:27, n:1, pp:13-15 [Journal ] Mikhail J. Atallah , S. Rao Kosaraju An Adversary-Based Lower Bound for Sorting. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1981, v:13, n:2, pp:55-57 [Journal ] Mikhail J. Atallah , Sunil Prabhakar (Almost) Optimal parallel block access for range queries. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2003, v:157, n:, pp:21-31 [Journal ] Mikhail J. Atallah , Danny Z. Chen , Hubert Wagener An Optimal Parallel Algorithm for the Visibility of a Simple Polygon from a Point. [Citation Graph (0, 0)][DBLP ] J. ACM, 1991, v:38, n:3, pp:516-533 [Journal ] Mikhail J. Atallah , Michael T. Goodrich , S. Rao Kosaraju Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations. [Citation Graph (0, 0)][DBLP ] J. ACM, 1994, v:41, n:6, pp:1049-1088 [Journal ] Mikhail J. Atallah , S. Rao Kosaraju Graph Problems on a Mesh-Connected Processor Array. [Citation Graph (0, 0)][DBLP ] J. ACM, 1984, v:31, n:3, pp:649-667 [Journal ] S. Rao Kosaraju , Mikhail J. Atallah Optimal simulations between mesh-connected arrays of processors. [Citation Graph (0, 0)][DBLP ] J. ACM, 1988, v:35, n:3, pp:635-650 [Journal ] Mikhail J. Atallah Computing the Convex Hull of Line Intersections. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 1986, v:7, n:2, pp:285-288 [Journal ] Mikhail J. Atallah , Susanne E. Hambrusch On Bipartite Matchings of Minimum Density. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 1987, v:8, n:4, pp:480-502 [Journal ] Mikhail J. Atallah , S. Rao Kosaraju An Efficient Parallel Algorithm for the Row Minima of a Totally Monotone Matrix. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 1992, v:13, n:3, pp:394-413 [Journal ] Mikhail J. Atallah A Matching Problem in the Plane. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1985, v:31, n:1, pp:63-70 [Journal ] Mikhail J. Atallah , Uzi Vishkin Finding Euler Tours in Parallel. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1984, v:29, n:3, pp:330-337 [Journal ] Ioannis Ioannidis , Ananth Grama , Mikhail J. Atallah Adaptive data structures for IP lookups. [Citation Graph (0, 0)][DBLP ] ACM Journal of Experimental Algorithms, 2005, v:10, n:, pp:- [Journal ] Mikhail J. Atallah , Christina Lock Black , Dan C. Marinescu , Howard Jay Siegel , Thomas L. Casavant Models and Algorithms for Coscheduling Compute-Intensive Tasks on a Network of Workstations. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1992, v:16, n:4, pp:318-327 [Journal ] Mikhail J. Atallah , Frank K. H. A. Dehne , Russ Miller , Andrew Rau-Chaplin , Jyh-Jong Tsay Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1994, v:20, n:1, pp:1-13 [Journal ] Mikhail J. Atallah , Michael T. Goodrich Efficient Parallel Solutions to Some Geometric Problems. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1986, v:3, n:4, pp:492-507 [Journal ] Michael T. Goodrich , Mikhail J. Atallah On Performing Robust Order Statistics in Tree-Structured Dictionary Machines. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1990, v:9, n:1, pp:69-76 [Journal ] Daniel W. Watson , Howard Jay Siegel , John K. Antonio , Mark A. Nichols , Mikhail J. Atallah A Block-Based Mode Selection Model for SIMD/SPMD Parallel Environments. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1994, v:21, n:3, pp:271-288 [Journal ] Robert Gwadera , Mikhail J. Atallah , Wojciech Szpankowski Reliable detection of episodes in event sequences. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2005, v:7, n:4, pp:415-437 [Journal ] Mikhail J. Atallah , Yann Génin , Wojciech Szpankowski Pattern Matching Image Compression: Algorithmic and Empirical Results. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 1999, v:21, n:7, pp:614-627 [Journal ] Mikhail J. Atallah , Danny Z. Chen , Kevin S. Klenk Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems. [Citation Graph (0, 0)][DBLP ] Parallel Processing Letters, 1999, v:9, n:4, pp:511-520 [Journal ] Mikhail J. Atallah , Celso C. Ribeiro , Sérgio Lifschitz Computing some distance functions between polygons. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1991, v:24, n:8, pp:775-781 [Journal ] Mikhail J. Atallah , Philippe Jacquet , Wojciech Szpankowski A Probabilistic Analysis of a Pattern Matching Problem. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 1993, v:4, n:2, pp:191-214 [Journal ] Alberto Apostolico , Mikhail J. Atallah , Lawrence L. Larmore , Scott McFaddin Efficient Parallel Algorithms for String Editing and Related Problems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1990, v:19, n:5, pp:968-988 [Journal ] Mikhail J. Atallah Finding the Cyclic Index of an Irreducible, Nonnegative Matrix. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1982, v:11, n:3, pp:567-570 [Journal ] Mikhail J. Atallah , Richard Cole , Michael T. Goodrich Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1989, v:18, n:3, pp:499-532 [Journal ] Mikhail J. Atallah , S. Rao Kosaraju Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:5, pp:849-869 [Journal ] Mikhail J. Atallah On Estimating the Large Entries of a Convolution. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2001, v:50, n:3, pp:193-196 [Journal ] Mikhail J. Atallah On Symmetry Detection. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1985, v:34, n:7, pp:663-666 [Journal ] Mikhail J. Atallah On Multidimensional Arrays of Processors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1988, v:37, n:10, pp:1306-1309 [Journal ] Mikhail J. Atallah , Danny Z. Chen Optimal Parallel Hypercube Algorithms for Polygon Problems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:7, pp:914-922 [Journal ] Mikhail J. Atallah , Douglas Comer Algorithms for Variable Length Subnet Address Assignment. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:6, pp:693-699 [Journal ] Mikhail J. Atallah , Susanne E. Hambrusch Optimal Rotation Problems in Channel Routing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1986, v:35, n:9, pp:843-847 [Journal ] Keith B. Frikken , Mikhail J. Atallah , Jiangtao Li Attribute-Based Access Control with Hidden Policies and Hidden Credentials. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2006, v:55, n:10, pp:1259-1270 [Journal ] Mikhail J. Atallah Faster image template matching in the sum of the absolute value of differences measure. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2001, v:10, n:4, pp:659-663 [Journal ] Ahsan Habib , Dongyan Xu , Mikhail J. Atallah , Bharat K. Bhargava , John Chuang A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:1010-1014 [Journal ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar Rights Protection for Relational Data. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:12, pp:1509-1525 [Journal ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar Rights Protection for Categorical Data. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:912-926 [Journal ] Radu Sion , Mikhail J. Atallah , Sunil Prabhakar Rights Protection for Discrete Numeric Streams. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2006, v:18, n:5, pp:699-714 [Journal ] Marina Blanton , Mikhail J. Atallah Succinct representation of flexible and privacy-preserving access rights. [Citation Graph (0, 0)][DBLP ] VLDB J., 2006, v:15, n:4, pp:334-354 [Journal ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken Incorporating Temporal Capabilities in Existing Key Management Schemes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:515-530 [Conf ] Mikhail J. Atallah , Marina Blanton , Michael T. Goodrich , Stanislas Polu Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric. [Citation Graph (0, 0)][DBLP ] WADS, 2007, pp:114-126 [Conf ] Umut Topkara , Mercan Topkara , Mikhail J. Atallah The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:164-174 [Conf ] Mercan Topkara , Umut Topkara , Mikhail J. Atallah , Cüneyt M. Taskiran , Eugene Lin , Edward J. Delp A hierarchical protocol for increasing the stealthiness of steganographic methods. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2004, pp:16-24 [Conf ] Private combinatorial group testing. [Citation Graph (, )][DBLP ] Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. [Citation Graph (, )][DBLP ] Securely outsourcing linear algebra computations. [Citation Graph (, )][DBLP ] Identifying Interesting Instances for Probabilistic Skylines. [Citation Graph (, )][DBLP ] Efficient and secure distribution of massive geo-spatial data. [Citation Graph (, )][DBLP ] Co-scheduling compute-intensive tasks on a network of workstations: model and algorithms. [Citation Graph (, )][DBLP ] Efficient Privacy-Preserving k-Nearest Neighbor Search. [Citation Graph (, )][DBLP ] Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. [Citation Graph (, )][DBLP ] Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. [Citation Graph (, )][DBLP ] Efficient Private Record Linkage. [Citation Graph (, )][DBLP ] Efficient data structures for range-aggregate queries on trees. [Citation Graph (, )][DBLP ] Robust Authentication Using Physically Unclonable Functions. [Citation Graph (, )][DBLP ] Computing all skyline probabilities for uncertain data. [Citation Graph (, )][DBLP ] Private and Cheating-Free Outsourcing of Algebraic Computations. [Citation Graph (, )][DBLP ] Data Structures for Range Minimum Queries in Multidimensional Arrays. [Citation Graph (, )][DBLP ] Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. [Citation Graph (, )][DBLP ] Computational Geometry for Uncertain Data - (Abstract of Keynote Talk). [Citation Graph (, )][DBLP ] Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity. [Citation Graph (, )][DBLP ] Sequence comparison on the connection machine. [Citation Graph (, )][DBLP ] Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric [Citation Graph (, )][DBLP ] New clique and independent set algorithms for circle graphs. [Citation Graph (, )][DBLP ] Finding a minimum independent dominating set in a permutation graph. [Citation Graph (, )][DBLP ] Search in 0.041secs, Finished in 0.049secs