Knowledge (XXG)

Mikhail Atallah

Source 📝

652: 548: 120:
In 2001, Atallah co-founded Arxan Technologies, Inc., a provider of internet anti-piracy and anti-tampering software, and in 2007, he became its chief technology officer.
566: 637: 627: 260: 642: 622: 617: 175: 632: 202: 647: 246: 106: 209:
since 1997. Previously he received a Presidential Young Investigator Award from the National Science Foundation in 1985.
657: 159: 148: 563: 583: 494: 276: 399: 321: 257: 143:, and he continued working in that area as a faculty member. Algorithmic research by Atallah includes papers on 110: 32: 612: 499: 458: 151: 113:
for his graduate studies, earning a master's degree in 1980 and a Ph.D. in 1982 under the supervision of
186: 163: 144: 551: 463: 449:; McFaddin, Scott (1990), "Efficient parallel algorithms for string editing and related problems", 446: 395: 317: 515: 427: 376: 140: 90: 584:"NSF Award Search: Award # 8451393 - Presidential Young Investigator Award: (Computer Research)" 182: 171: 133: 94: 87: 59: 205:
for his "contributions to parallel and distributed computation". He has been a fellow of the
468: 411: 360: 333: 298: 66: 49: 480: 423: 372: 310: 570: 476: 419: 368: 306: 264: 114: 71: 166:
between pairs of strings. With his student Marina Blanton, Atallah is the editor of the
189:. and the addition of multiple guard points within software as an anti-piracy measure. 606: 337: 302: 431: 380: 227: 400:"Cascading divide-and-conquer: a technique for designing parallel algorithms" 364: 289:
Atallah, Mikhail J. (1985), "Some dynamic computational geometry problems",
242: 129: 155: 117:. Since that time he has been a member of the Purdue University faculty. 198: 472: 415: 258:
Arxan Appoints Dr. Mikhail J. Atallah as Chief Technology Officer
516:"Purdue Team Develops Watermark To Protect Electronic Documents" 206: 185:. His work in this area has included techniques for text-based 322:"Efficient parallel solutions to some geometric problems" 653:
2006 fellows of the Association for Computing Machinery
181:
Atallah's more recent research has been in the area of
351:
Atallah, Mikhail J. (1985), "On symmetry detection",
128:Atallah has published over 200 papers on topics in 93:, a distinguished professor of computer science at 65: 55: 45: 28: 21: 105:Atallah received his bachelor's degree from the 291:Computers & Mathematics with Applications 168:Algorithms and Theory of Computation Handbook 162:, and efficient parallel computations of the 8: 139:Atallah's thesis work was on the subject of 267:, Arxan Technologies, retrieved 2011-09-29. 223: 221: 445:Apostolico, Alberto; Atallah, Mikhail J.; 230:, Purdue University, retrieved 2011-09-29. 18: 462: 217: 277:DBLP listing of Atallah's publications 7: 638:American University of Beirut alumni 394:Atallah, Mikhail J.; Cole, Richard; 238: 236: 16:Lebanese-American computer scientist 628:Researchers in geometric algorithms 203:Association for Computing Machinery 533:"Multiple "guards" foil hackers", 197:In 2006, Atallah was elected as a 14: 643:Johns Hopkins University alumni 623:Theoretical computer scientists 84:Mikhail Jibrayil (Mike) Atallah 495:"Word order may stump hackers" 353:IEEE Transactions on Computers 1: 573:, IEEE, retrieved 2011-09-29. 247:Mathematics Genealogy Project 160:divide and conquer algorithms 107:American University of Beirut 618:American computer scientists 338:10.1016/0743-7315(86)90011-0 326:J. Parallel Distrib. Comput. 303:10.1016/0898-1221(85)90105-1 633:Computer security academics 170:(CRC Press, 2nd ed., 2009, 674: 228:Department faculty profile 109:in 1975. He then moved to 648:Purdue University faculty 451:SIAM Journal on Computing 404:SIAM Journal on Computing 77: 38: 243:Mikhail Jibrayil Atallah 111:Johns Hopkins University 33:Johns Hopkins University 554:, retrieved 2011-09-29. 365:10.1109/TC.1985.1676605 279:, retrieved 2011-09-29. 500:Times Higher Education 158:of geometric figures, 152:computational geometry 316:Atallah, Mikhail J.; 447:Larmore, Lawrence L. 396:Goodrich, Michael T. 318:Goodrich, Michael T. 187:digital watermarking 164:Levenshtein distance 658:Fellows of the IEEE 564:Fellows in Region 4 141:parallel algorithms 569:2011-08-05 at the 535:USA Today Magazine 263:2012-01-29 at the 91:computer scientist 297:(12): 1171–1181, 193:Awards and honors 183:computer security 176:978-1-58488-818-5 134:computer security 95:Purdue University 88:Lebanese American 81: 80: 60:Purdue University 40:Scientific career 665: 598: 597: 595: 594: 580: 574: 561: 555: 546: 540: 538: 530: 524: 523: 522:, April 27, 2001 512: 506: 504: 491: 485: 483: 466: 442: 436: 434: 391: 385: 383: 348: 342: 340: 313: 286: 280: 274: 268: 255: 249: 240: 231: 225: 67:Doctoral advisor 50:Computer Science 19: 673: 672: 668: 667: 666: 664: 663: 662: 603: 602: 601: 592: 590: 582: 581: 577: 571:Wayback Machine 562: 558: 547: 543: 532: 531: 527: 514: 513: 509: 493: 492: 488: 473:10.1137/0219066 464:10.1.1.100.9057 444: 443: 439: 416:10.1137/0218035 393: 392: 388: 350: 349: 345: 315: 288: 287: 283: 275: 271: 265:Wayback Machine 256: 252: 241: 234: 226: 219: 215: 195: 126: 115:S. Rao Kosaraju 103: 72:S. Rao Kosaraju 29:Alma mater 24: 23:Mikhail Atallah 17: 12: 11: 5: 671: 669: 661: 660: 655: 650: 645: 640: 635: 630: 625: 620: 615: 605: 604: 600: 599: 575: 556: 552:award citation 541: 537:, June 1, 2003 525: 507: 486: 457:(5): 968–988, 437: 410:(3): 499–532, 386: 359:(7): 663–666, 343: 332:(4): 492–507, 281: 269: 250: 232: 216: 214: 211: 194: 191: 154:, finding the 125: 122: 102: 99: 79: 78: 75: 74: 69: 63: 62: 57: 53: 52: 47: 43: 42: 36: 35: 30: 26: 25: 22: 15: 13: 10: 9: 6: 4: 3: 2: 670: 659: 656: 654: 651: 649: 646: 644: 641: 639: 636: 634: 631: 629: 626: 624: 621: 619: 616: 614: 613:Living people 611: 610: 608: 589: 585: 579: 576: 572: 568: 565: 560: 557: 553: 550: 545: 542: 536: 529: 526: 521: 517: 511: 508: 503:, May 4, 2001 502: 501: 496: 490: 487: 482: 478: 474: 470: 465: 460: 456: 452: 448: 441: 438: 433: 429: 425: 421: 417: 413: 409: 405: 401: 397: 390: 387: 382: 378: 374: 370: 366: 362: 358: 354: 347: 344: 339: 335: 331: 327: 323: 319: 312: 308: 304: 300: 296: 292: 285: 282: 278: 273: 270: 266: 262: 259: 254: 251: 248: 244: 239: 237: 233: 229: 224: 222: 218: 212: 210: 208: 204: 200: 192: 190: 188: 184: 179: 177: 173: 169: 165: 161: 157: 153: 150: 146: 142: 137: 135: 131: 123: 121: 118: 116: 112: 108: 100: 98: 96: 92: 89: 85: 76: 73: 70: 68: 64: 61: 58: 54: 51: 48: 44: 41: 37: 34: 31: 27: 20: 591:. Retrieved 587: 578: 559: 544: 534: 528: 520:ScienceDaily 519: 510: 498: 489: 454: 450: 440: 407: 403: 389: 356: 352: 346: 329: 325: 294: 290: 284: 272: 253: 196: 180: 167: 138: 127: 119: 104: 83: 82: 56:Institutions 39: 588:www.nsf.gov 607:Categories 593:2024-09-13 549:ACM Fellow 213:References 156:symmetries 130:algorithms 459:CiteSeerX 101:Biography 567:Archived 398:(1989), 320:(1986), 261:Archived 145:parallel 124:Research 481:1059665 432:1752195 424:0996833 381:1341755 373:0800338 311:0822083 245:at the 201:of the 149:dynamic 479:  461:  430:  422:  379:  371:  309:  199:fellow 174:  46:Fields 428:S2CID 377:S2CID 86:is a 207:IEEE 172:ISBN 147:and 132:and 469:doi 412:doi 361:doi 334:doi 299:doi 178:). 609:: 586:. 518:, 497:, 477:MR 475:, 467:, 455:19 453:, 426:, 420:MR 418:, 408:18 406:, 402:, 375:, 369:MR 367:, 357:34 355:, 328:, 324:, 314:. 307:MR 305:, 295:11 293:, 235:^ 220:^ 136:. 97:. 596:. 539:. 505:. 484:. 471:: 435:. 414:: 384:. 363:: 341:. 336:: 330:3 301::

Index

Johns Hopkins University
Computer Science
Purdue University
Doctoral advisor
S. Rao Kosaraju
Lebanese American
computer scientist
Purdue University
American University of Beirut
Johns Hopkins University
S. Rao Kosaraju
algorithms
computer security
parallel algorithms
parallel
dynamic
computational geometry
symmetries
divide and conquer algorithms
Levenshtein distance
ISBN
978-1-58488-818-5
computer security
digital watermarking
fellow
Association for Computing Machinery
IEEE


Department faculty profile

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.