652:
548:
120:
In 2001, Atallah co-founded Arxan
Technologies, Inc., a provider of internet anti-piracy and anti-tampering software, and in 2007, he became its chief technology officer.
566:
637:
627:
260:
642:
622:
617:
175:
632:
202:
647:
246:
106:
209:
since 1997. Previously he received a
Presidential Young Investigator Award from the National Science Foundation in 1985.
657:
159:
148:
563:
583:
494:
276:
399:
321:
257:
143:, and he continued working in that area as a faculty member. Algorithmic research by Atallah includes papers on
110:
32:
612:
499:
458:
151:
113:
for his graduate studies, earning a master's degree in 1980 and a Ph.D. in 1982 under the supervision of
186:
163:
144:
551:
463:
449:; McFaddin, Scott (1990), "Efficient parallel algorithms for string editing and related problems",
446:
395:
317:
515:
427:
376:
140:
90:
584:"NSF Award Search: Award # 8451393 - Presidential Young Investigator Award: (Computer Research)"
182:
171:
133:
94:
87:
59:
205:
for his "contributions to parallel and distributed computation". He has been a fellow of the
468:
411:
360:
333:
298:
66:
49:
480:
423:
372:
310:
570:
476:
419:
368:
306:
264:
114:
71:
166:
between pairs of strings. With his student Marina
Blanton, Atallah is the editor of the
189:. and the addition of multiple guard points within software as an anti-piracy measure.
606:
337:
302:
431:
380:
227:
400:"Cascading divide-and-conquer: a technique for designing parallel algorithms"
364:
289:
Atallah, Mikhail J. (1985), "Some dynamic computational geometry problems",
242:
129:
155:
117:. Since that time he has been a member of the Purdue University faculty.
198:
472:
415:
258:
Arxan
Appoints Dr. Mikhail J. Atallah as Chief Technology Officer
516:"Purdue Team Develops Watermark To Protect Electronic Documents"
206:
185:. His work in this area has included techniques for text-based
322:"Efficient parallel solutions to some geometric problems"
653:
2006 fellows of the
Association for Computing Machinery
181:
Atallah's more recent research has been in the area of
351:
Atallah, Mikhail J. (1985), "On symmetry detection",
128:Atallah has published over 200 papers on topics in
93:, a distinguished professor of computer science at
65:
55:
45:
28:
21:
105:Atallah received his bachelor's degree from the
291:Computers & Mathematics with Applications
168:Algorithms and Theory of Computation Handbook
162:, and efficient parallel computations of the
8:
139:Atallah's thesis work was on the subject of
267:, Arxan Technologies, retrieved 2011-09-29.
223:
221:
445:Apostolico, Alberto; Atallah, Mikhail J.;
230:, Purdue University, retrieved 2011-09-29.
18:
462:
217:
277:DBLP listing of Atallah's publications
7:
638:American University of Beirut alumni
394:Atallah, Mikhail J.; Cole, Richard;
238:
236:
16:Lebanese-American computer scientist
628:Researchers in geometric algorithms
203:Association for Computing Machinery
533:"Multiple "guards" foil hackers",
197:In 2006, Atallah was elected as a
14:
643:Johns Hopkins University alumni
623:Theoretical computer scientists
84:Mikhail Jibrayil (Mike) Atallah
495:"Word order may stump hackers"
353:IEEE Transactions on Computers
1:
573:, IEEE, retrieved 2011-09-29.
247:Mathematics Genealogy Project
160:divide and conquer algorithms
107:American University of Beirut
618:American computer scientists
338:10.1016/0743-7315(86)90011-0
326:J. Parallel Distrib. Comput.
303:10.1016/0898-1221(85)90105-1
633:Computer security academics
170:(CRC Press, 2nd ed., 2009,
674:
228:Department faculty profile
109:in 1975. He then moved to
648:Purdue University faculty
451:SIAM Journal on Computing
404:SIAM Journal on Computing
77:
38:
243:Mikhail Jibrayil Atallah
111:Johns Hopkins University
33:Johns Hopkins University
554:, retrieved 2011-09-29.
365:10.1109/TC.1985.1676605
279:, retrieved 2011-09-29.
500:Times Higher Education
158:of geometric figures,
152:computational geometry
316:Atallah, Mikhail J.;
447:Larmore, Lawrence L.
396:Goodrich, Michael T.
318:Goodrich, Michael T.
187:digital watermarking
164:Levenshtein distance
658:Fellows of the IEEE
564:Fellows in Region 4
141:parallel algorithms
569:2011-08-05 at the
535:USA Today Magazine
263:2012-01-29 at the
91:computer scientist
297:(12): 1171–1181,
193:Awards and honors
183:computer security
176:978-1-58488-818-5
134:computer security
95:Purdue University
88:Lebanese American
81:
80:
60:Purdue University
40:Scientific career
665:
598:
597:
595:
594:
580:
574:
561:
555:
546:
540:
538:
530:
524:
523:
522:, April 27, 2001
512:
506:
504:
491:
485:
483:
466:
442:
436:
434:
391:
385:
383:
348:
342:
340:
313:
286:
280:
274:
268:
255:
249:
240:
231:
225:
67:Doctoral advisor
50:Computer Science
19:
673:
672:
668:
667:
666:
664:
663:
662:
603:
602:
601:
592:
590:
582:
581:
577:
571:Wayback Machine
562:
558:
547:
543:
532:
531:
527:
514:
513:
509:
493:
492:
488:
473:10.1137/0219066
464:10.1.1.100.9057
444:
443:
439:
416:10.1137/0218035
393:
392:
388:
350:
349:
345:
315:
288:
287:
283:
275:
271:
265:Wayback Machine
256:
252:
241:
234:
226:
219:
215:
195:
126:
115:S. Rao Kosaraju
103:
72:S. Rao Kosaraju
29:Alma mater
24:
23:Mikhail Atallah
17:
12:
11:
5:
671:
669:
661:
660:
655:
650:
645:
640:
635:
630:
625:
620:
615:
605:
604:
600:
599:
575:
556:
552:award citation
541:
537:, June 1, 2003
525:
507:
486:
457:(5): 968–988,
437:
410:(3): 499–532,
386:
359:(7): 663–666,
343:
332:(4): 492–507,
281:
269:
250:
232:
216:
214:
211:
194:
191:
154:, finding the
125:
122:
102:
99:
79:
78:
75:
74:
69:
63:
62:
57:
53:
52:
47:
43:
42:
36:
35:
30:
26:
25:
22:
15:
13:
10:
9:
6:
4:
3:
2:
670:
659:
656:
654:
651:
649:
646:
644:
641:
639:
636:
634:
631:
629:
626:
624:
621:
619:
616:
614:
613:Living people
611:
610:
608:
589:
585:
579:
576:
572:
568:
565:
560:
557:
553:
550:
545:
542:
536:
529:
526:
521:
517:
511:
508:
503:, May 4, 2001
502:
501:
496:
490:
487:
482:
478:
474:
470:
465:
460:
456:
452:
448:
441:
438:
433:
429:
425:
421:
417:
413:
409:
405:
401:
397:
390:
387:
382:
378:
374:
370:
366:
362:
358:
354:
347:
344:
339:
335:
331:
327:
323:
319:
312:
308:
304:
300:
296:
292:
285:
282:
278:
273:
270:
266:
262:
259:
254:
251:
248:
244:
239:
237:
233:
229:
224:
222:
218:
212:
210:
208:
204:
200:
192:
190:
188:
184:
179:
177:
173:
169:
165:
161:
157:
153:
150:
146:
142:
137:
135:
131:
123:
121:
118:
116:
112:
108:
100:
98:
96:
92:
89:
85:
76:
73:
70:
68:
64:
61:
58:
54:
51:
48:
44:
41:
37:
34:
31:
27:
20:
591:. Retrieved
587:
578:
559:
544:
534:
528:
520:ScienceDaily
519:
510:
498:
489:
454:
450:
440:
407:
403:
389:
356:
352:
346:
329:
325:
294:
290:
284:
272:
253:
196:
180:
167:
138:
127:
119:
104:
83:
82:
56:Institutions
39:
588:www.nsf.gov
607:Categories
593:2024-09-13
549:ACM Fellow
213:References
156:symmetries
130:algorithms
459:CiteSeerX
101:Biography
567:Archived
398:(1989),
320:(1986),
261:Archived
145:parallel
124:Research
481:1059665
432:1752195
424:0996833
381:1341755
373:0800338
311:0822083
245:at the
201:of the
149:dynamic
479:
461:
430:
422:
379:
371:
309:
199:fellow
174:
46:Fields
428:S2CID
377:S2CID
86:is a
207:IEEE
172:ISBN
147:and
132:and
469:doi
412:doi
361:doi
334:doi
299:doi
178:).
609::
586:.
518:,
497:,
477:MR
475:,
467:,
455:19
453:,
426:,
420:MR
418:,
408:18
406:,
402:,
375:,
369:MR
367:,
357:34
355:,
328:,
324:,
314:.
307:MR
305:,
295:11
293:,
235:^
220:^
136:.
97:.
596:.
539:.
505:.
484:.
471::
435:.
414::
384:.
363::
341:.
336::
330:3
301::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.