Mikhail Atallah
#39,838
Most Influential Person Now
Computer scientist
Mikhail Atallah's AcademicInfluence.com Rankings
Mikhail Atallahcomputer-science Degrees
Computer Science
#2001
World Rank
#2080
Historical Rank
#935
USA Rank
Database
#2861
World Rank
#2986
Historical Rank
#572
USA Rank
Download Badge
Computer Science
Mikhail Atallah's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Mikhail Atallah Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mikhail Jibrayil Atallah is a Lebanese American computer scientist, a distinguished professor of computer science at Purdue University. Biography Atallah received his bachelor's degree from the American University of Beirut in 1975. He then moved to Johns Hopkins University for his graduate studies, earning a master's degree in 1980 and a Ph.D. in 1982 under the supervision of S. Rao Kosaraju. Since that time he has been a member of the Purdue University faculty.
Mikhail Atallah's Published Works
Published Works
- Algorithms and Theory of Computation Handbook (2009) (605)
- Disclosure limitation of sensitive rules (1999) (500)
- Dynamic and Efficient Key Management for Access Hierarchies (2009) (466)
- Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research (2009) (458)
- Secure multi-party computation problems and their applications: a review and open problems (2001) (456)
- Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006 (2008) (367)
- Rights protection for relational data (2003) (351)
- Securely outsourcing linear algebra computations (2010) (310)
- Privacy-preserving cooperative statistical analysis (2001) (307)
- Secure outsourcing of scientific computations (2001) (291)
- Watermarking Relational Databases (2002) (289)
- Protecting Software Code by Guards (2001) (266)
- Secure Multi-party Computational Geometry (2001) (258)
- Cascading divide-and-conquer: A technique for designing parallel algorithms (1989) (220)
- On Symmetry Detection (1985) (219)
- Private and Cheating-Free Outsourcing of Algebraic Computations (2008) (210)
- Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation (2001) (207)
- Secure and private sequence comparisons (2003) (200)
- Privacy-preserving cooperative scientific computations (2001) (196)
- Secure outsourcing of sequence comparisons (2004) (196)
- A Linear Time Algorithm for the Hausdorff Distance Between Convex Polygons (1983) (191)
- Natural Language Watermarking and Tamperproofing (2002) (182)
- Efficient Parallel Algorithms for String Editing and Related Problems (1990) (167)
- Protocols for Secure Remote Database Access with Approximate Matching (2001) (154)
- The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions (2006) (150)
- Private collaborative forecasting and benchmarking (2004) (149)
- A secure protocol for computing dot-products in clustered and distributed environments (2002) (147)
- Natural language processing for information assurance and security: an overview and implementations (2001) (134)
- Attribute-Based Access Control with Hidden Policies and Hidden Credentials (2006) (133)
- Reliable detection of episodes in event sequences (2003) (128)
- A study of several specific secure two-party computation problems (2001) (118)
- Efficient Privacy-Preserving k-Nearest Neighbor Search (2008) (113)
- Graph Problems on a Mesh-Connected Processor Array (1984) (107)
- Models and Algorithms for Coscheduling Compute-Intensive Tasks on a Network of Workstations (1992) (106)
- Efficient Parallel Solutions to Some Geometric Problems (1986) (106)
- Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel (1988) (103)
- Computing all skyline probabilities for uncertain data (2009) (102)
- Some dynamic computational geometry problems (1985) (94)
- Multiple and Partial Periodicity Mining in Time Series Databases (2002) (94)
- Indexing Information for Data Forensics (2005) (94)
- Information hiding through errors: a confusing approach (2007) (93)
- Secure and Private Collaborative Linear Programming (2006) (89)
- Secure supply-chain protocols (2003) (87)
- Dynamic computational geometry (1983) (87)
- Robust Authentication Using Physically Unclonable Functions (2009) (83)
- Faster image template matching in the sum of the absolute value of differences measure (2001) (83)
- Rights protection for categorical data (2005) (79)
- Solving tree problems on a mesh-connected processor array (1985) (79)
- Detection of significant sets of episodes in event sequences (2004) (76)
- Translation-based steganography (2005) (72)
- A Generalized Dictionary Machine for VLSI (1985) (70)
- Dynamic and efficient key management for access hierarchies (2005) (69)
- Efficient Private Record Linkage (2009) (68)
- Secure and Efficient Outsourcing of Sequence Comparisons (2012) (68)
- Lost in just the translation (2006) (66)
- Markov Models for Identification of Significant Episodes (2005) (65)
- Words are not enough: sentence level natural language watermarking (2006) (64)
- Efficient plane sweeping in parallel (1986) (62)
- Resilient Rights Protection for Sensor Streams (2004) (61)
- Hidden access control policies with hidden credentials (2004) (61)
- Constructing trees in parallel (1989) (61)
- Fast Detection and Display of Symmetry in Trees (1985) (57)
- Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles (2006) (57)
- Data structures for range minimum queries in multidimensional arrays (2010) (57)
- On Watermarking Numeric Sets (2002) (54)
- Efficient Algorithms for Common Transversals (1987) (52)
- (Almost) optimal parallel block access to range queries (2000) (51)
- Guest Editors' Introduction: Software Protection (2011) (50)
- Pattern Matching Image Compression: Algorithmic and Empirical Results (1999) (50)
- A Randomized Algorithm for Approximate String Matching (2001) (50)
- Privacy preserving route planning (2004) (49)
- On the Discovery of Weak Periodicities in Large Time Series (2002) (45)
- Finding Euler Tours in Parallel (2011) (45)
- Fast Detection and Display of Symmetry in Outerplanar Graphs (1992) (43)
- Rights protection for discrete numeric streams (2006) (43)
- A Matching Problem in the Plane (1985) (43)
- An optimal parallel algorithm for the visibility of a simple polygon from a point (1991) (42)
- Incorporating Temporal Capabilities in Existing Key Management Schemes (2007) (42)
- New clique and independent set algorithms for circle graphs (1992) (41)
- Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors (2008) (41)
- A note on finding a maximum empty rectangle (1986) (40)
- Private Information: To Reveal or not to Reveal (2008) (40)
- A Survey of Anti-Tamper Technologies (2004) (38)
- ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage (2015) (37)
- An efficient parallel algorithm for the row minima of a totally monotone matrix (1991) (37)
- Optimal simulations between mesh-connected arrays of processors (1988) (37)
- Natural language watermarking: challenges in building a practical system (2006) (37)
- Improving Security using Deception (2013) (36)
- Outsourcing Manufacturing: Secure Price‐Masking Mechanisms for Purchasing Component Parts (2011) (35)
- Finding a minimum independent dominating set in a permutation graph (1988) (34)
- Key management for non-tree access hierarchies (2006) (34)
- Privacy-preserving credit checking (2005) (34)
- Binding software to specific native hardware in a VM environment: the puf challenge and opportunity (2008) (33)
- Resilient Information Hiding for Abstract Semi-structures (2003) (33)
- Parallel rectilinear shortest paths with rectangular obstacles (1990) (33)
- Optimal simulations between mesh-connected arrays of processors (1986) (33)
- Authentication of LZ-77 compressed data (2003) (32)
- Computing some distance functions between polygons (1991) (32)
- Secure Collaborative Planning, Forecasting, and Replenishment (SCPFR) (2005) (32)
- Secure and Private Outsourcing of Shape-Based Feature Extraction (2013) (31)
- Passwords decay, words endure: secure and re-usable multiple password mnemonics (2007) (31)
- Efficient parallel techniques for computational geometry (1987) (31)
- C-JDBC: a Middleware Framework for Database Clustering. (2004) (30)
- Point-Based Trust: Define How Much Privacy Is Worth (2006) (30)
- Asymptotically efficient algorithms for skyline probabilities of uncertain data (2011) (30)
- Efficient techniques for realizing geo-spatial access control (2007) (30)
- An empirical study of automatic event reconstruction systems (2006) (29)
- Leakage-free redactable signatures (2012) (28)
- Secure Biometric Authentication for Weak Computational Devices (2005) (28)
- ViWiD : Visible Watermarking Based Defense Against Phishing (2005) (28)
- On the Complexity of Authorization in RBAC under Qualification and Security Constraints (2011) (27)
- Multisearch techniques for implementing data structures on a mesh-connected computer (preliminary version) (1991) (26)
- Incentives and Perceptions of Information Security Risks (2008) (26)
- Efficient Parallel Solutions to Geometric Problems (1985) (26)
- An optimal algorithm for shortest paths on weighted interval and circular-arc graphs, with applications (1993) (25)
- Computing the Convex Hull of Line Intersections (1986) (24)
- Enhanced smart-card based license management (2003) (24)
- Secure Multi-Problem Computation Problems and Their Applications : A Review and Open Problems (2001) (24)
- A tree-based forward digest protocol to verify data integrity in distributed media streaming (2005) (24)
- Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS (2012) (22)
- P-complete geometric problems (1990) (22)
- Compact Recognizers of Episode Sequences (2002) (21)
- An Optimal Parallel Algorithm for the Minimum Circle-Cover Problem (1989) (21)
- Parallel algorithms for evaluating sequences of set-manipulation operations (1988) (21)
- On Parallel Rectilinear Obstacle- Avoiding Paths (1993) (20)
- Parallel techniques for computational geometry (1992) (19)
- Privacy preserving electronic surveillance (2003) (19)
- Algorithms and theory of computation handbook: special topics and techniques (2010) (19)
- Verifying data integrity in peer-to-peer media streaming (2005) (18)
- Optimal Parallel I/O for Range Queries through Replication (2002) (18)
- On the parallel decomposability of geometric problems (1989) (18)
- Watermarking with quadratic residues (1999) (18)
- Private Fingerprint Verification without Local Storage (2004) (17)
- Algorithms and theory of computation handbook: general concepts and techniques (2010) (17)
- Static program decomposition among machines in an SIMD/SPMD heterogeneous environment with non-constant mode switching costs (1994) (17)
- Incentive Alignment and Risk Perception: An Information Security Application (2013) (17)
- Efficient and Practical Approach for Private Record Linkage (2012) (17)
- Similarity Group-By operators for multi-dimensional relational data (2014) (17)
- (Almost) Optimal parallel block access for range queries (2003) (17)
- Privacy-preserving location-dependent query processing (2004) (17)
- An Input-Size/Output-Size Trade-Off in the Time-Complexity of Rectilinear Hidden Surface Removal (Preliminary Version) (1990) (17)
- Parallel Strong Orientation of an Undirected Graph (1984) (17)
- Pattern matching in the Hamming distance with thresholds (2011) (17)
- Parallel algorithms for some functions of two convex polygons (1988) (16)
- Co-scheduling compute-intensive tasks on a network of workstations: model and algorithms (1991) (16)
- Security in Cyber-Enabled Design and Manufacturing: A Survey (2018) (16)
- Adaptive data structures for IP lookups (2003) (16)
- Efficient Leakage-free Authentication of Trees, Graphs and Forests (2012) (16)
- A pattern matching approach to image compression (1996) (16)
- Security-aware Business Process as a Service by hiding provenance (2016) (15)
- Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity (2009) (14)
- Privacy-Preserving Business Process Outsourcing (2012) (14)
- Graph problems on a mesh-connected processor array (Preliminary Version) (1982) (14)
- Why NLP Should Move into IAS (2002) (13)
- A Block-Based Mode Selection Model for SIMD/SPMD Parallel Environments (1994) (13)
- On approximate pattern matching with thresholds (2017) (13)
- On Multidimensional Arrays of Processors (1988) (13)
- Efficient Correlated Action Selection (2006) (13)
- Collaborative Research : ITR : Distributed Data Mining to Protect Information Privacy (2004) (12)
- Sorting with Efficient Use of Special-Purpose Sorters (1988) (12)
- A lower-variance randomized algorithm for approximate string matching (2013) (12)
- Parallel Algorithms for Maximum Matching in Complements of Interval Graphs and Related Problems (2000) (12)
- Secure Outsourcing of Some Computations (1996) (12)
- Private combinatorial group testing (2008) (12)
- Optimal Rotation Problems in Channel Routing (1986) (12)
- Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers (1994) (11)
- Better Logging through Formality (2000) (11)
- Output-Sensitive Methods for Rectilinear Hidden Surface Removal (1993) (11)
- Microstructure-Based Counterfeit Detection in Metal Part Manufacturing (2017) (11)
- On-the-fly intrusion detection for Web portals (2003) (10)
- Deterministic Parallel Computational Geometry (2000) (10)
- A hierarchical protocol for increasing the stealthiness of steganographic methods (2004) (10)
- Cropping-Resilient Segmented Multiple Watermarking (2003) (10)
- An efficient algorithm for maxdominance, with applications (1989) (10)
- Achieving Fairness in Private Contract Negotiation (2005) (10)
- Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques (2009) (10)
- Secure Collaboration in Engineering Systems Design (2014) (10)
- An Adversary-Based Lower Bound for Sorting (1981) (10)
- Running Max/Min Filters Using 1+o(1) Comparisons per Sample (2011) (9)
- Pattern Matching With Mismatches: A Probabilistic Analysis and a Randomized Algorithm (Extended Abstract) (1992) (9)
- Attacking digital watermarks (2004) (9)
- Efficient and secure pattern matching with wildcards using lightweight cryptography (2018) (9)
- The case of using negative (deceiving) information in data protection (2014) (9)
- Algorithms and Theory of Computation Handbook, Second Edition, Volume 1: General Concepts and Techniques (2009) (9)
- Private Outsourcing of Matrix Multiplication over Closed Semi-rings (2016) (9)
- Succinct specifications of portable document access policies (2004) (9)
- Optimal parallel algorithm for visibility of a simple polygon from a point (1989) (9)
- Securing Aggregate Queries for DNA Databases (2019) (9)
- A probabilistic approach to pattern matching with mismatches (1990) (8)
- Biased finger trees and three-dimensional layers of maxima: (preliminary version) (1994) (8)
- On the Multisearching Problem for Hypercubes (1996) (8)
- Internet, education, and the Web (1996) (8)
- Checking similarity of planar figures (1984) (8)
- A Framework for Compile-Time Selection of Parallel Modes in an Simd/spmd Heterogeneous Environment (1993) (8)
- Efficient and secure distribution of massive geo-spatial data (2009) (8)
- Better logging through formality : Applying formal specification techniques to improve audit logs and log consumers (2000) (8)
- Key Commitment in Multimedia Watermarking (CERIAS TR 2002-30) (2002) (7)
- Similarity Group-by Operators for Multi-Dimensional Relational Data (2016) (7)
- Pattern matching image compression (1996) (7)
- On Connecting Red and Blue Rectilinear Polygonal Obstacles with Nonintersecting Monotone Rectilinear Paths (2001) (7)
- A linear time algorithm for the computation of some distance functions between convex polygons (1991) (6)
- Rights assessment for discrete digital data (2004) (6)
- On the Multisearching Problem of Hypercubes (1994) (6)
- Optical PUF Design for Anti-Counterfeiting in Manufacturing of Metallic Goods (2018) (6)
- Secure Codesign: Achieving Optimality Without Revealing (2018) (6)
- A System for Drawing Graphs with Geometric Symmetry (1994) (6)
- Optimal parallel hypercube algorithms for polygon problems (1993) (6)
- Proceedings of the 10th international conference on Privacy enhancing technologies (2010) (6)
- Passwords for Everyone: Secure Mnemonic-based Accessible Authentication (2007) (6)
- Pattern Matching with Mismatches: A Simple Randomized Algorithm and its Analysis (1992) (6)
- A faster parallel algorithm for a matrix searching problem (1990) (6)
- Identifying Interesting Instances for Probabilistic Skylines (2010) (6)
- Augmenting LZ‐77 with authentication and integrity assurance capabilities (2004) (6)
- wmdb.*: rights protection for numeric relational data (2004) (6)
- Duress detection for authentication attacks against multiple administrators (2010) (5)
- Portable and Flexible Document Access Control Mechanisms (2004) (5)
- Replicated Parallel I/O without Additional Scheduling Costs (2003) (5)
- Efficient data structures for range-aggregate queries on trees (2009) (5)
- Key management in hierarchical access control systems (2007) (5)
- Techniques for solving geometric problems on mesh-connected computers (1990) (5)
- Enhancing Passwords Security Using Deceptive Covert Communication (2015) (5)
- A Probabilistic Analysis of a Pattern Matching Problem (1993) (5)
- Efficient Distributed Third-Party Data Authentication for Tree Hierarchies (2008) (5)
- A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk) (2005) (4)
- Finding the Cyclic Index of an Irreducible, Nonnegative Matrix (1982) (4)
- Parallel algorithms for maximum matching in interval graphs (1995) (4)
- An Algorithm for Estimating All Matches Between Two Strings (1996) (4)
- New designs for improving the efficiency and resilience of natural language watermarking (2007) (4)
- Efficient Parallel Algorithms for Planar st-Graphs (1997) (4)
- On Terminal Assignments That Minimize the Density (1984) (4)
- Strategic information revelation in collaborative design (2018) (4)
- Output-Sensitive Hidden Surface Elimination for Rectangles (1988) (4)
- Biased Finger Trees and Thr ee-Dimensional Layers of Maxima (1993) (4)
- New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24) (1993) (4)
- Algorithms for vlsi networks of processors (1983) (3)
- Efficient relaxed search in hierarchically clustered sequence datasets (2012) (3)
- Computing the all-pairs longest chains in the plane (1995) (3)
- A Multi-dimensional Yao ’ s Millionaire Protocol (2001) (3)
- Provable bounds for portable and flexible privacy-preserving access (2005) (3)
- Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (2013) (3)
- A tree-covering problem arising in integrity of tree-structured data (2008) (3)
- sFEA: A Lightweight, Scalable, and Secure Finite Element Analysis Technique (2018) (3)
- On Bipartite Matchings of Minimum Density (1987) (3)
- Confidentiality Management in Collaborative Design (2016) (3)
- A Toolkit for Modeling and Compressing Audit Data (1998) (3)
- Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings (2009) (3)
- Security Issues in Collaborative Computing (2006) (3)
- Digital Rights Management (2004) (2)
- Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management (2011) (2)
- Algorithms for Variable Length Subnet Address Assignment (1998) (2)
- Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords (2016) (2)
- Natural Language Watermarking and Tamperproofing 1 (2002) (2)
- Defending against Password Exposure using Deceptive Covert Communication (2015) (2)
- A Coarse-Grained, Architecture-Independent Approach for Connected Component Labeling (1993) (2)
- A Five Year Plan for Excellence (1986) (2)
- Finding Shortest Maximal Increasing Subsequences and Domination in Permutation Graphs (2004) (2)
- A Graph Orientation Problem (1983) (2)
- Parallel Geometric Algorithms in Coarse-Grain Network Models (1998) (2)
- An assignment algorithm with applications to integrated circuit layout (1986) (2)
- VERIFYING DATA INTEGRITY IN PEER-TO-PEER VIDEO STREAMING (2002) (2)
- ErsatzPasswords: ending password cracking (2015) (2)
- Parallel Algorithms for Longest Increasing Chains in the Plane and Related Problems (1999) (2)
- Secure and private online collaboration (2005) (2)
- Remote Revocation of Smart Cards in a Private DRM System (2005) (2)
- On Performing Robust Order Statistics in Tree-Structured Dictionary Machines (1990) (2)
- Applications of a Numbering Scheme for Polygonal Obstacles in the Plane (1996) (2)
- Multisearch Techniques of Hierarchical DAGs on Mesh-Connected Computers, with Applications (1990) (2)
- Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric (2007) (2)
- Hash-Based Access Control in an Arbitrary Hierarchy ∗ (2004) (2)
- Digital Rights Protection (2004) (2)
- Natural language information assurance and security (2003) (2)
- Cerias Tech Report 2003-51 Resilient Information Hiding for Abstract Semi-structures Resilient Information Hiding for Abstract Semi-structures (2003) (1)
- Techniques for Secure and Reliable Computational Outsourcing (2013) (1)
- Detection of Sets of Episodes in Event Sequences : Algorithms , Analysis and Experiments (2004) (1)
- Sequence comparison on the connection machine (1991) (1)
- Succinct representation of flexible and privacy-preserving access rights (2006) (1)
- An optimal parallel for the visibility of a simple polygon from a point (1991) (1)
- Covert Channels Can Be Useful ! – Layering Authentication Channels to Provide Covert Communication ? (2013) (1)
- Efficient Data Compression in Location Based Services (1)
- Secure Authenticated Comparisons (2011) (1)
- Privacy enhancing technologies : 10th International Symposium, PETS 2010, Berlin, Germany, July 21 - 23, 2010 : proceedings (2010) (1)
- On Estimating the Large Entries of a Convolution (2001) (1)
- Proceedings of the 9th International Symposium on Privacy Enhancing Technologies (2008) (1)
- Special topics and techniques (2010) (1)
- Layering authentication channels to provide covert communication (2013) (1)
- Practical automatic determination of causal relationships in software execution traces (2011) (1)
- Dynamic Computational Geometry (Preliminary Version) (1983) (1)
- sFEA: A Secure Finite Element Analysis Technique (2019) (1)
- Augmenting LZ-77 with authentication and integrity assurance capabilities: Research Articles (2004) (1)
- manuscript Secure Collaborative Planning , Forecasting , and Replenishment ( SCPFR ) (2005) (1)
- Secure Access Accounting for Content Distribution Networks (1)
- Report : Framework for Designing Evidence-Based Patient-Physician Matching Protocols (2019) (1)
- Data in the Cloud : Authentication of Trees , Graphs , and Forests Without Leaking (2010) (1)
- Nonperiodic Modes in Two-Dimensional (2-D) Recursive Digital Filters under Finite Wordlength Effects (1989) (1)
- Efficient Key Derivation for Access Hierarchies ∗ (2006) (1)
- Secure Supply-Chain Collaboration: A New Technology for Supply-Chain Management1 (2004) (1)
- Privacy Preserving Cryptographic Protocols (2016) (1)
- Secure and private outsourcing to untrusted cloud servers (2013) (0)
- Provable Access Accounting for Content Distribution Networks (2003) (0)
- Issues on the algorithm-software continuum (1992) (0)
- The password wall: a better defense against password exposure (2014) (0)
- Security and privacy techniques for outsourced and distributed databases (2010) (0)
- Editor's foreword special issue on the sixth annual symposium on computational geometry (1992) (0)
- Text Data Compression Algorithms (2009) (0)
- Session details: Streams and query processing (2010) (0)
- Efficient Algorithmic Techniques for Combinatorial Problems (1992) (0)
- Model Based Data Reduction for Event Sequences (2008) (0)
- Algorithms and Theory of Computation Handbook - 2 Volume Set (2019) (0)
- [XOK90] T. Hagerup and C. Rub. Optimal Merging and Sorting on the EREW PRAM. Technical Report, Universit/it des Saarlandes, 1989. (2007) (0)
- Topological numbering of features on a mesh (1991) (0)
- Information security applications of natural language processing techniques (2007) (0)
- A Fast and Efficient Privacy Preserving Data Mining Over Vertically Partitioned Data (2015) (0)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Message from the Program Chairs (2010) (0)
- Multidimensional Data Structures for Spatial Applications (2009) (0)
- Algorithmic Coding Theory (2009) (0)
- Computational Geometry for Uncertain Data - (Abstract of Keynote Talk) (2010) (0)
- FOCUS: MULTIPARADIGM PROGRAMMING FOCUS: MULTIPARADIGM PROGRAMMING FOCUS: MULTIPARADIGM PROGRAMMING (2011) (0)
- Order Statistics and Other Complex Data Operations On Tree-Structured Dictionary Machines (1985) (0)
- Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing (2019) (0)
- A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage (2014) (0)
- Reducibility and Completeness (2009) (0)
- Algorithm Design and Analysis Techniques (2009) (0)
- A Randomized Algorith m for Approximate String Matching1 (2000) (0)
- Regular contributions Secure outsourcing of sequence comparisons (2005) (0)
- General concepts and techniques (2010) (0)
- Reliable Dete tion of Episodes in Event Sequen esMar h 19 , 2004 (2004) (0)
- Incentives and Perceptions of Information Security Risks Incitations et Perceptions des Risques pour la Sécurité de l'Information (2008) (0)
- Optimal Parallel Hypercube Algorithms for (1993) (0)
- On the parallel-decomposability of geometric problems (1992) (0)
- An Improved Hypercube Bound for Multisearching and Its Applications (1999) (0)
- Computing the All-Pairs Longest Chain in the Plane (1993) (0)
- Reliable Dete tion of Episodes in Event Sequen esJune 10 , 2003 (2003) (0)
- Efficient Parallel Algorithms for Planar st-Graphs 1 (2002) (0)
- ON CONNECTING RED AND BLUE RECTANGLES WITH NONINTERSECTING MONOTONE RECTILINEAR PATHS (2005) (0)
- Erratum to: Privacy Enhancing Technologies (2010) (0)
- This message will self-destruct: Self-easing covert communication (2007) (0)
- Privacy Enhancing Technologies (2008) (0)
- Third-party grid-data integrity verification (2008) (0)
- Private searching for nearest neighbors (2008) (0)
- Secure two-party input-size reduction: Challenges, solutions and applications (2021) (0)
- Optimal Channel Placement for Multi-Terminal Nets (1989) (0)
- A Coarse-graincd , An : hitceturc-independent Approach for Connected Component Labeling (2018) (0)
- Quantifying the correctness , computational complexity , and security of privacy-preserving string comparators for record linkage Reviewed by Liyue Fan 1 Summary (2013) (0)
- Pattern Matching in Strings (2009) (0)
- Special Thanks to S&P's Reviewers (2005) (0)
- Security and privacy risks in electronic communications: A user's assessment (2017) (0)
- Topological Numbering of Features on a Mesh (CC-88-18) (1988) (0)
- Data Confidentiality in Collaborative Computing (2005) (0)
- Parallel computations of Levenshtein distances (1997) (0)
- Optimal Placement for Multi-Terminal Nets (1984) (0)
- A Peak Finding Strategy for Multi- Dimensional Scalar Fields with Applications to X-ray Crystallography (1996) (0)
- General Pattern Matching (2009) (0)
This paper list is powered by the following services:
Other Resources About Mikhail Atallah
What Schools Are Affiliated With Mikhail Atallah?
Mikhail Atallah is affiliated with the following schools: