Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Salvatore J. Stolfo
2010 – today
- 2013
[j37]Ang Cui, Jatin Kataria, Salvatore J. Stolfo: Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Inf. Manag. Comput. Security 21(2): 121-138 (2013)
[c97]John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore J. Stolfo: On the feasibility of online malware detection with performance counters. ISCA 2013: 559-570
[c96]Ang Cui, Michael Costello, Salvatore J. Stolfo: When Firmware Modifications Attack: A Case Study of Embedded Exploitation. NDSS 2013
[c95]Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo: System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. IEEE Symposium on Security and Privacy Workshops 2013: 52-59- 2012
[j36]Shari Lawrence Pfleeger, Marc Rogers, Masooda Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo: Does Profiling Make Us More Secure? IEEE Security & Privacy 10(4): 10-15 (2012)
[j35]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo: Usable, Secure, Private Search. IEEE Security & Privacy 10(5): 53-60 (2012)
[j34]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo: A system for generating and injecting indistinguishable network decoys. Journal of Computer Security 20(2-3): 199-221 (2012)
[j33]Malek Ben Salem, Salvatore J. Stolfo: A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. Security and Communication Networks 5(8): 863-872 (2012)
[c94]
[c93]Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou: The MEERKATS Cloud Security Architecture. ICDCS Workshops 2012: 446-450
[c92]Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis: Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshops 2012: 125-128
[c91]Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo: Lost in Translation: Improving Decoy Documents via Automated Translation. IEEE Symposium on Security and Privacy Workshops 2012: 129-133
[e3]Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (Eds.): Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8- 2011
[j32]David Evans, Salvatore J. Stolfo: Guest Editors' Introduction: The Science of Security. IEEE Security & Privacy 9(3): 16-17 (2011)
[j31]Salvatore J. Stolfo, Steven M. Bellovin, David Evans: Measuring Security. IEEE Security & Privacy 9(3): 60-65 (2011)
[c90]Ang Cui, Jatin Kataria, Salvatore J. Stolfo: From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. ACSAC 2011: 393-402
[c89]Malek Ben Salem, Salvatore J. Stolfo: Decoy Document Deployment for Effective Masquerade Attack Detection. DIMVA 2011: 35-54
[c88]Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo: Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. RAID 2011: 142-160
[c87]Malek Ben Salem, Salvatore J. Stolfo: Modeling User Search Behavior for Masquerade Detection. RAID 2011: 181-200
[c86]
[c85]Ang Cui, Jatin Kataria, Salvatore J. Stolfo: Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. WOOT 2011: 19-27
[p4]Ang Cui, Salvatore J. Stolfo: Symbiotes and defensive Mutualism: Moving Target Defense. Moving Target Defense 2011: 99-108
[r1]Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem: Insider Threat Defense. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 609-611- 2010
[j30]Germán Creamer, Salvatore J. Stolfo: Erratum to: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 21(3): 542 (2010)
[j29]Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo: Ethics in Security Vulnerability Research. IEEE Security & Privacy 8(2): 67-72 (2010)
[j28]Salvatore J. Stolfo, Gene Tsudik: Privacy-Preserving Sharing of Sensitive Information. IEEE Security & Privacy 8(4): 16-17 (2010)
[j27]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Machine Learning 81(2): 179-205 (2010)
[c84]Ang Cui, Salvatore J. Stolfo: A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. ACSAC 2010: 97-106
[c83]Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo: BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. RAID 2010: 118-137
[c82]Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo: Automating the injection of believable decoys to detect snooping. WISEC 2010: 81-86
[p3]Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo: Monitoring Technologies for Mitigating Insider Threats. Insider Threats in Cyber Security 2010: 197-217
2000 – 2009
- 2009
[j26]Germán Creamer, Salvatore J. Stolfo: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3): 419-445 (2009)
[j25]Shari Lawrence Pfleeger, Salvatore J. Stolfo: Addressing the Insider Threat. IEEE Security & Privacy 7(6): 10-13 (2009)
[j24]Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Designing Host and Network Sensors to Mitigate the Insider Threat. IEEE Security & Privacy 7(6): 22-29 (2009)
[c81]Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis: A Network Access Control Mechanism Based on Behavior Profiles. ACSAC 2009: 3-12
[c80]Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo: Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46
[c79]
[c78]
[c77]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ICISS 2009: 193-207
[c76]Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo: Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009
[c75]Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo: Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60
[c74]Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo: Brave New World: Pervasive Insecurity of Embedded Network Devices. RAID 2009: 378-380
[c73]Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo: Baiting Inside Attackers Using Decoy Documents. SecureComm 2009: 51-70- 2008
[c72]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376
[c71]Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190
[c70]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
[c69]Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
[p2]Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo: A Survey of Insider Attack Detection Research. Insider Attack and Cyber Security 2008: 69-90
[e2]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6- 2007
[c68]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
[c67]Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250
[c66]Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo: Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. WebKDD/SNA-KDD 2007: 40-58
[p1]Salvatore J. Stolfo, Ke Wang, Wei-Jen Li: Towards Stealthy Malware Detection. Malware Detection 2007: 231-249- 2006
[j23]Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006)
[c65]Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop: A temporal based forensic analysis of electronic communication. DG.O 2006: 23-24
[c64]Ke Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248
[c63]Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo: Verifying genre-based clustering approach to content extraction. WWW 2006: 875-876- 2005
[j22]Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore: A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. Journal of Computer Security 13(4): 659-693 (2005)
[c62]Salvatore J. Stolfo, Shlomo Hershkop: Email mining toolkit supporting law enforcement forensic analyses. DG.O 2005: 221-222
[c61]Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28
[c60]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108
[c59]Shlomo Hershkop, Salvatore J. Stolfo: Combining email models for false positive reduction. KDD 2005: 98-107
[c58]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
[c57]Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246
[c56]Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo: Extracting context to improve accuracy for HTML content extraction. WWW (Special interest tracks and posters) 2005: 1114-1115- 2004
[j21]Shlomo Hershkop, Salvatore J. Stolfo: Identifying spam without peeking at the contents. ACM Crossroads 11(2): 3 (2004)
[j20]
[j19]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004)
[c55]
[c54]Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo: Email archive analysis through graphical visualization. VizSEC 2004: 128-132- 2003
[c53]Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan: Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. DG.O 2003
[c52]Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo: Surveillance Detection in High Bandwidth Environments. DISCEX (1) 2003: 130-
[c51]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290-
[c50]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90
[c49]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81- 2002
[j18]Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(1/2): 5-22 (2002)
[c48]
[c47]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo: A Fully Distributed Framework for Cost-Sensitive Data Mining. ICDCS 2002: 445-446
[c46]Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, Salvatore J. Stolfo: Progressive Modeling. ICDM 2002: 163-170
[c45]Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. RAID 2002: 36-53
[c44]
[c43]Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo: A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. SDM 2002- 2001
[j17]Andreas L. Prodromidis, Salvatore J. Stolfo: Cost Complexity-Based Pruning of Ensemble Classifiers. Knowl. Inf. Syst. 3(4): 449-469 (2001)
[j16]Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record 30(4): 5-14 (2001)
[c42]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan: Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130
[c41]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo: Data Mining Methods for Detection of New Malicious Executables. IEEE Symposium on Security and Privacy 2001: 38-49
[c40]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo: MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. USENIX Annual Technical Conference, FREENIX Track 2001: 245-252- 2000
[j15]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000)
[j14]Wenke Lee, Salvatore J. Stolfo: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000)
[c39]Herbert Schorr, Salvatore J. Stolfo: Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. DG.O 2000
[c38]Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller: A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153
[c37]Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo: A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
[e1]Raghu Ramakrishnan, Salvatore J. Stolfo, Roberto J. Bayardo, Ismail Parsa (Eds.): Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, Boston, MA, USA, August 20-23, 2000. ACM 2000, ISBN 1-58113-233-6
1990 – 1999
- 1999
[j13]Philip K. Chan, Salvatore J. Stolfo, David Wolpert: Guest Editors' Introduction. Machine Learning 36(1-2): 5-7 (1999)
[c36]Andreas L. Prodromidis, Salvatore J. Stolfo: Minimal Cost Complexity Pruning of Meta-Classifiers. AAAI/IAAI 1999: 979
[c35]Wei Fan, Salvatore J. Stolfo, Junxin Zhang, Philip K. Chan: AdaCost: Misclassification Cost-Sensitive Boosting. ICML 1999: 97-105
[c34]Wenke Lee, Christopher T. Park, Salvatore J. Stolfo: Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72
[c33]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124
[c32]Wei Fan, Salvatore J. Stolfo, Junxin Zhang: The Application of AdaBoost for Distributed, Scalable and On-Line Learning. KDD 1999: 362-366
[c31]Wenke Lee, Salvatore J. Stolfo: Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999
[c30]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy 1999: 120-132- 1998
[j12]Tom Fawcett, Ira J. Haimowitz, Foster J. Provost, Salvatore J. Stolfo: AI Approaches to Fraud Detection and Risk Management. AI Magazine 19(2): 107-108 (1998)
[j11]Herbert Schorr, Salvatore J. Stolfo: A Digital Government for the 21st Century. Commun. ACM 41(11): 15-19 (1998)
[j10]Mauricio A. Hernández, Salvatore J. Stolfo: Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. Data Min. Knowl. Discov. 2(1): 9-37 (1998)
[j9]Shih-Fu Chang, Luis Gravano, Gail E. Kaiser, Kenneth A. Ross, Salvatore J. Stolfo: Database Research at Columbia University. SIGMOD Record 27(3): 75-80 (1998)
[c29]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok: Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72
[c28]Philip K. Chan, Salvatore J. Stolfo: Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. KDD 1998: 164-168
[c27]Andreas L. Prodromidis, Salvatore J. Stolfo: Mining Databases with Different Schemas: Integrating Incompatible Classifiers. KDD 1998: 314-318- 1997
[j8]Philip K. Chan, Salvatore J. Stolfo: On the Accuracy of Meta-Learning for Scalable Data Mining. J. Intell. Inf. Syst. 8(1): 5-28 (1997)
[c26]Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan: JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81- 1996
[c25]Philip K. Chan, Salvatore J. Stolfo: Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. KDD 1996: 2-7- 1995
[c24]Philip K. Chan, Salvatore J. Stolfo: A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. ICML 1995: 90-98
[c23]S. Kliger, Shaula Yemini, Yechiam Yemini, David Ohsie, Salvatore J. Stolfo: A coding approach to event correlation. Integrated Network Management 1995: 266-277
[c22]Philip K. Chan, Salvatore J. Stolfo: Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. KDD 1995: 39-44
[c21]Mauricio A. Hernández, Salvatore J. Stolfo: The Merge/Purge Problem for Large Databases. SIGMOD Conference 1995: 127-138- 1994
[j7]Hasanat M. Dewan, Salvatore J. Stolfo, Leland Woodbury: Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. J. Parallel Distrib. Comput. 22(3): 506-522 (1994)
[c20]Hasanat M. Dewan, Mauricio A. Hernández, Kui W. Mok, Salvatore J. Stolfo: Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. PDIS 1994: 40-49
[c19]David Ohsie, Hasanat M. Dewan, Salvatore J. Stolfo, Sushil Da Silva: Performance of Incremental Update in Database Rule Processing. RIDE-ADS 1994: 10-18
[c18]Hasanat M. Dewan, Salvatore J. Stolfo: Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. RIDE-ADS 1994: 105-114
[c17]Hasanat M. Dewan, Salvatore J. Stolfo, Mauricio A. Hernández, Jae-Jun Hwang: Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. SIGMOD Conference 1994: 277-288- 1993
[j6]Benjamin W. Wah, Thomas S. Huang, Aravind K. Joshi, Dan I. Moldovan, Yiannis Aloimonos, Ruzena Bajcsy, Dana H. Ballard, Doug DeGroot, Kenneth DeJong, Charles R. Dyer, Scott E. Fahlman, Ralph Grishman, Lynette Hirschman, Richard E. Korf, Stephen E. Levinson, Daniel P. Miranker, N. H. Morgan, Sergei Nirenburg, Tomaso Poggio, Edward M. Riseman, Craig Stanfil, Salvatore J. Stolfo, Steven L. Tanimoto, Charles C. Weems: Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. IEEE Trans. Knowl. Data Eng. 5(1): 138-154 (1993)
[c16]Philip K. Chan, Salvatore J. Stolfo: Experiments on Multi-Strategy Learning by Meta-Learning. CIKM 1993: 314-323
[c15]Philip K. Chan, Salvatore J. Stolfo: Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. ISMB 1993: 65-73
[c14]Hasanat M. Dewan, Salvatore J. Stolfo: System Reorganization and Load Balancing of Parallel Database Rule Processing. ISMIS 1993: 186-197
[c13]Jason S. Glazier, Salvatore J. Stolfo: Dynamic neighborhood bounding for Monte Carlo simulation. Winter Simulation Conference 1993: 466-473- 1992
[j5]Hasanat M. Dewan, David Ohsie, Salvatore J. Stolfo, Ouri Wolfson, Sushil Da Silva: Incremental Database Rule Processing In PARADISER. J. Intell. Inf. Syst. 1(2): 177-209 (1992)
[c12]Mark Perlin, Jaime G. Carbonell, Daniel P. Miranker, Salvatore J. Stolfo, Milind Tambe: Is Production System Match Interesting? ICTAI 1992: 2-3- 1991
[j4]Salvatore J. Stolfo, Ouri Wolfson, Philip K. Chan, Hasanat M. Dewan, Leland Woodbury, Jason S. Glazier, David Ohsie: PARULE: Parallel Rule Processing Using Meta-rules for Redaction. J. Parallel Distrib. Comput. 13(4): 366-382 (1991)
[c11]Salvatore J. Stolfo, Hasanat M. Dewan, Ouri Wolfson: The PARULEL Parallel Rule Language. ICPP (2) 1991: 36-45
[c10]Ouri Wolfson, Hasanat M. Dewan, Salvatore J. Stolfo, Yechiam Yemini: Incremental Evaluation of Rules and its Relationship to Parallelism. SIGMOD Conference 1991: 78-87
1980 – 1989
- 1987
[j3]- 1986
[j2]Salvatore J. Stolfo, Daniel P. Miranker: The DADO Production System Machine. J. Parallel Distrib. Comput. 3(2): 269-296 (1986)
[c9]Michael van Biema, Daniel P. Miranker, Salvatore J. Stolfo: The Do-loop Considered Harmful in Production System Programming. Expert Database Conf. 1986: 177-190- 1985
[c8]Toru Ishida, Salvatore J. Stolfo: Towards the Parallel Execution of Rules in Production System Programs. ICPP 1985: 568-575- 1984
[c7]Salvatore J. Stolfo: Five Parallel Algorithms for Production System Execution on the DADO Machine. AAAI 1984: 300-307
[c6]
[c5]Stephen Taylor, Andy Lowry, Gerald Q. Maguire Jr., Salvatore J. Stolfo: Logic Programming Using Parallel Associative Operations. SLP 1984: 58-68- 1983
[c4]Gregg T. Vesonder, Salvatore J. Stolfo, John E. Zielinski, Frederick D. Miller, David H. Copp: ACE: An Expert System for Telephone Cable Maintenance. IJCAI 1983: 116-121
[c3]Salvatore J. Stolfo, Daniel P. Miranker, David Elliot Shaw: Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. IJCAI 1983: 850-854- 1982
[c2]Salvatore J. Stolfo, David Elliot Shaw: DADO: A Tree-Structured Machine Architecture for Production Systems. AAAI 1982: 242-246- 1981
[j1]David Elliot Shaw, Salvatore J. Stolfo, Hussein Ibrahim, Bruce Hillyer, Gio Wiederhold, J. A. Andrews: The NON-VON Database Machine: A Brief Overview. IEEE Database Eng. Bull. 4(2): 41-52 (1981)
1970 – 1979
- 1979
[c1]Salvatore J. Stolfo, Malcolm C. Harrison: Automatic Discovery of Heuristics for Nondeterministic Programs. IJCAI 1979: 853-855
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:04 CEST by the dblp team



