2012
135Software decoys for insider threat. Younghee Park, Salvatore J. Stolfo. ASIACCS 2012, 93-94. Web SearchBibTeXDownload
134The MEERKATS Cloud Security Architecture. Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou. ICDCS Workshops 2012, 446-450. Web SearchBibTeXDownload
133Does Profiling Make Us More Secure?. Shari Lawrence Pfleeger, Marc Rogers, Masooda Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo. IEEE Security & Privacy (10): 10-15 (2012). Web SearchBibTeXDownload
132Usable, Secure, Private Search. Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo. IEEE Security & Privacy (10): 53-60 (2012). Web SearchBibTeXDownload
131Lost in Translation: Improving Decoy Documents via Automated Translation. Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo. IEEE Symposium on Security and Privacy Workshops 2012, 129-133. Web SearchBibTeXDownload
130Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis. IEEE Symposium on Security and Privacy Workshops 2012, 125-128. Web SearchBibTeXDownload
129A system for generating and injecting indistinguishable network decoys. Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo. Journal of Computer Security (20): 199-221 (2012). Web SearchBibTeXDownload
128A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. Malek Ben Salem, Salvatore J. Stolfo. Security and Communication Networks (5): 863-872 (2012). Web SearchBibTeXDownload
2011
127From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. Ang Cui, Jatin Kataria, Salvatore J. Stolfo. ACSAC 2011, 393-402. Web SearchBibTeXDownload
126Decoy Document Deployment for Effective Masquerade Attack Detection. Malek Ben Salem, Salvatore J. Stolfo. DIMVA 2011, 35-54. Web SearchBibTeXDownload
125Insider Threat Defense. Salvatore J. Stolfo, Brian M. Bowen, Malek Ben Salem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 609-611. Web SearchBibTeXDownload
124Guest Editors' Introduction: The Science of Security. David Evans, Salvatore J. Stolfo. IEEE Security & Privacy (9): 16-17 (2011). Web SearchBibTeXDownload
123Measuring Security. Abe Kleinfeld, Steven M. Bellovin, David Evans. IEEE Security & Privacy (9): 60-65 (2011). Web SearchBibTeXDownload
122Symbiotes and defensive Mutualism: Moving Target Defense. Ang Cui, Salvatore J. Stolfo. Moving Target Defense 2011, 99-108. Web SearchBibTeXDownload
121Defending Embedded Systems with Software Symbiotes. Ang Cui, Salvatore J. Stolfo. RAID 2011, 358-377. Web SearchBibTeXDownload
120Modeling User Search Behavior for Masquerade Detection. Malek Ben Salem, Salvatore J. Stolfo. RAID 2011, 181-200. Web SearchBibTeXDownload
119Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo. RAID 2011, 142-160. Web SearchBibTeXDownload
118Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. Ang Cui, Jatin Kataria, Salvatore J. Stolfo. WOOT 2011, 19-27. Web SearchBibTeXDownload
2010
117A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. Ang Cui, Salvatore J. Stolfo. ACSAC 2010, 97-106. Web SearchBibTeXDownload
116Erratum to: A link mining algorithm for earnings forecast and trading. Germán Creamer, Salvatore J. Stolfo. Data Min. Knowl. Discov. (21): 542 (2010). Web SearchBibTeXDownload
115Ethics in Security Vulnerability Research. Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo. IEEE Security & Privacy (8): 67-72 (2010). Web SearchBibTeXDownload
114Privacy-Preserving Sharing of Sensitive Information. Salvatore J. Stolfo, Gene Tsudik. IEEE Security & Privacy (8): 16-17 (2010). Web SearchBibTeXDownload
113Monitoring Technologies for Mitigating Insider Threats. Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo. Insider Threats in Cyber Security 2010, 197-217. Web SearchBibTeXDownload
112On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo. Machine Learning (81): 179-205 (2010). Web SearchBibTeXDownload
111BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo. RAID 2010, 118-137. Web SearchBibTeXDownload
110Automating the injection of believable decoys to detect snooping. Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo. WISEC 2010, 81-86. Web SearchBibTeXDownload
2009
109A Network Access Control Mechanism Based on Behavior Profiles. Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis. ACSAC 2009, 3-12. Web SearchBibTeXDownload
108Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo. AISec 2009, 39-46. Web SearchBibTeXDownload
107Polymorphic shellcode: the demise of signature-based detection. Salvatore J. Stolfo. CSIIRW 2009, 7. Web SearchBibTeXDownload
106Keynote panel. Doug Maughan, George Hull, Salvatore J. Stolfo, Robert Stratton. CSIIRW 2009, 10. Web SearchBibTeXDownload
105A link mining algorithm for earnings forecast and trading. Germán Creamer, Salvatore J. Stolfo. Data Min. Knowl. Discov. (18): 419-445 (2009). Web SearchBibTeXDownload
104BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis. ICISS 2009, 193-207. Web SearchBibTeXDownload
103Designing Host and Network Sensors to Mitigate the Insider Threat. Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo. IEEE Security & Privacy (7): 22-29 (2009). Web SearchBibTeXDownload
102Addressing the Insider Threat. Shari Lawrence Pfleeger, Salvatore J. Stolfo. IEEE Security & Privacy (7): 10-13 (2009). Web SearchBibTeXDownload
101Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo. NDSS 2009. Web SearchBibTeXDownload
100Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo. RAID 2009, 41-60. Web SearchBibTeXDownload
99Brave New World: Pervasive Insecurity of Embedded Network Devices. Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo. RAID 2009, 378-380. Web SearchBibTeXDownload
98Baiting Inside Attackers Using Decoy Documents. Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo. SecureComm 2009, 51-70. Web SearchBibTeXDownload
2008
97Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis. ACSAC 2008, 367-376. Web SearchBibTeXDownload
96Casting out Demons: Sanitizing Training Data for Anomaly Sensors. Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis. IEEE Symposium on Security and Privacy 2008, 81-95. Web SearchBibTeXDownload
95A Survey of Insider Attack Detection Research. Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo. Insider Attack and Cyber Security 2008, 69-90. Web SearchBibTeXDownload
94Behavior-Based Network Access Control: A Proof-of-Concept. Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis. ISC 2008, 175-190. Web SearchBibTeXDownload
93Return Value Predictability Profiles for Self-healing. Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo. IWSEC 2008, 152-166. Web SearchBibTeXDownload
2007
92On the infeasibility of modeling polymorphic shellcode. Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo. ACM Conference on Computer and Communications Security 2007, 541-551. Web SearchBibTeXDownload
91A Study of Malcode-Bearing Documents. Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis. DIMVA 2007, 231-250. Web SearchBibTeXDownload
90Towards Stealthy Malware Detection. Salvatore J. Stolfo, Ke Wang, Wei-Jen Li. Malware Detection 2007, 231-249. Web SearchBibTeXDownload
89Segmentation and Automated Social Hierarchy Detection through Email Network Analysis. Germán Creamer, Ryan Rowe, Shlomo Hershkop, Salvatore J. Stolfo. WebKDD/SNA-KDD 2007, 40-58. Web SearchBibTeXDownload
2006
88Behavior-based modeling and its application to Email analysis. Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang. ACM Trans. Internet Techn. (6): 187-221 (2006). Cited by 32Web SearchBibTeXDownload
87A temporal based forensic analysis of electronic communication. Salvatore J. Stolfo, Germán Creamer, Shlomo Hershkop. DG.O 2006, 23-24. Web SearchBibTeXDownload
86Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. Ke Wang, Janak J. Parekh, Salvatore J. Stolfo. RAID 2006, 226-248. Cited by 72Web SearchBibTeXDownload
85Verifying genre-based clustering approach to content extraction. Suhit Gupta, Hila Becker, Gail E. Kaiser, Salvatore J. Stolfo. WWW 2006, 875-876. Web SearchBibTeXDownload
2005
84Email mining toolkit supporting law enforcement forensic analyses. Salvatore J. Stolfo, Shlomo Hershkop. DG.O 2005, 221-222. Web SearchBibTeXDownload
83Anomaly Detection in Computer Security and an Application to File System Accesses. Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang. ISMIS 2005, 14-28. Web SearchBibTeXDownload
82An Email Worm Vaccine Architecture. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo. ISPEC 2005, 97-108. Web SearchBibTeXDownload
81A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Marie Svore. Journal of Computer Security (13): 659-693 (2005). Web SearchBibTeXDownload
80Combining email models for false positive reduction. Shlomo Hershkop, Salvatore J. Stolfo. KDD 2005, 98-107. Web SearchBibTeXDownload
79Anomalous Payload-Based Worm Detection and Signature Generation. Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo. RAID 2005, 227-246. Cited by 128Web SearchBibTeXDownload
78FLIPS: Hybrid Adaptive Intrusion Prevention. Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo. RAID 2005, 82-101. Cited by 55Web SearchBibTeXDownload
77Extracting context to improve accuracy for HTML content extraction. Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo. WWW (Special interest tracks and posters) 2005, 1114-1115. Web SearchBibTeXDownload
2004
76Identifying spam without peeking at the contents. Shlomo Hershkop, Salvatore J. Stolfo. ACM Crossroads (11): 3 (2004). Web SearchBibTeXDownload
75Worm and Attack Early Warning. Salvatore J. Stolfo. IEEE Security & Privacy (2): 73-75 (2004). Web SearchBibTeXDownload
74Using artificial anomalies to detect unknown and known network intrusions. Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan. Knowl. Inf. Syst. (6): 507-527 (2004). Web SearchBibTeXDownload
73Anomalous Payload-Based Network Intrusion Detection. Ke Wang, Salvatore J. Stolfo. RAID 2004, 203-222. Cited by 309Web SearchBibTeXDownload
72Email archive analysis through graphical visualization. Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo. VizSEC 2004, 128-132. Web SearchBibTeXDownload
2003
71Citizen's Attitudes about Privacy While Accessing Government and Private Websites: Results of an Online Study. Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicec, Stephen Jan. DG.O 2003. Web SearchBibTeXDownload
70Surveillance Detection in High Bandwidth Environments. Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo. DISCEX (1) 2003, 130. Web SearchBibTeXDownload
69EMT/MET: Systems for Modeling and Detecting Errant Email. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern. DISCEX (2) 2003, 290. Web SearchBibTeXDownload
68Behavior Profiling of Email. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu. ISI 2003, 74-90. Cited by 36Web SearchBibTeXDownload
67A Behavior-Based Approach to Securing Email Systems. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu. MMM-ACNS 2003, 57-81. Cited by 31Web SearchBibTeXDownload
2002
66Towards the Digital Government of the 21st Century. Herbert Schorr, Salvatore J. Stolfo. DG.O 2002. Web SearchBibTeXDownload
65A Fully Distributed Framework for Cost-Sensitive Data Mining. Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo. ICDCS 2002, 445-446. Cited by 4Web SearchBibTeXDownload
64Progressive Modeling. Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, Salvatore J. Stolfo. ICDM 2002, 163-170. Web SearchBibTeXDownload
63Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok. Journal of Computer Security (10): 5-22 (2002). Web SearchBibTeXDownload
62Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo. RAID 2002, 36-53. Web SearchBibTeXDownload
61A Framework for Scalable Cost-sensitive Learning Based on Combing Probabilities and Benefits. Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. Stolfo. SDM 2002. Cited by 11Web SearchBibTeXDownload
60Ensemble-based Adaptive Intrusion Detection. Wei Fan, Salvatore J. Stolfo. SDM 2002. Web SearchBibTeXDownload
2001
59Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan. ICDM 2001, 123-130. Web SearchBibTeXDownload
58Data Mining Methods for Detection of New Malicious Executables. Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo. IEEE Symposium on Security and Privacy 2001, 38-49. Web SearchBibTeXDownload
57Cost Complexity-Based Pruning of Ensemble Classifiers. Andreas L. Prodromidis, Salvatore J. Stolfo. Knowl. Inf. Syst. (3): 449-469 (2001). Web SearchBibTeXDownload
56Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin. SIGMOD Record (30): 5-14 (2001). Web SearchBibTeXDownload
55MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables. Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo. USENIX Annual Technical Conference, FREENIX Track 2001, 245-252. Web SearchBibTeXDownload
2000
54A framework for constructing features and models for intrusion detection systems. Wenke Lee, Salvatore J. Stolfo. ACM Trans. Inf. Syst. Secur. (3): 227-261 (2000). Web SearchBibTeXDownload
53Adaptive Intrusion Detection: A Data Mining Approach. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok. Artif. Intell. Rev. (14): 533-567 (2000). Web SearchBibTeXDownload
52Towards the digital government of the 21st century: a report from the workshop on research and development opportunities in federal information services. Herbert Schorr, Salvatore J. Stolfo. DG.O 2000. Web SearchBibTeXDownload
51A Multiple Model Cost-Sensitive Approach for Intrusion Detection. Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller. ECML 2000, 142-153. Web SearchBibTeXDownload
50A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo. Recent Advances in Intrusion Detection 2000, 49-65. Web SearchBibTeXDownload
1999
49Minimal Cost Complexity Pruning of Meta-Classifiers. Andreas L. Prodromidis, Salvatore J. Stolfo. AAAI/IAAI 1999, 979. Web SearchBibTeXDownload
48AdaCost: Misclassification Cost-Sensitive Boosting. Wei Fan, Salvatore J. Stolfo, Junxin Zhang, Philip K. Chan. ICML 1999, 97-105. Web SearchBibTeX
47A Data Mining Framework for Building Intrusion Detection Models. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok. IEEE Symposium on Security and Privacy 1999, 120-132. Web SearchBibTeXDownload
46The Application of AdaBoost for Distributed, Scalable and On-Line Learning. Wei Fan, Salvatore J. Stolfo, Junxin Zhang. KDD 1999, 362-366. Web SearchBibTeXDownload
45Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok. KDD 1999, 114-124. Web SearchBibTeXDownload
44Guest Editors' Introduction. Carolyn McGregor, Anthony Maedel, Laurence Tianruo Yang, Sanjay Goel, Alexander Zelikovsky. Machine Learning (36): 5-7 (1999). Cited by 2Web SearchBibTeXDownload
43Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Wenke Lee, Salvatore J. Stolfo. Recent Advances in Intrusion Detection 1999. Web SearchBibTeXDownload
42Automated Intrusion Detection Using NFR: Methods and Experiences. Wenke Lee, Christopher T. Park, Salvatore J. Stolfo. Workshop on Intrusion Detection and Network Monitoring 1999, 63-72. Web SearchBibTeXDownload
1998
41AI Approaches to Fraud Detection and Risk Management. Tom Fawcett, Ira J. Haimowitz, Foster J. Provost, Salvatore J. Stolfo. AI Magazine (19): 107-108 (1998). Web SearchBibTeXDownload
40A Digital Government for the 21st Century. Herbert Schorr, Salvatore J. Stolfo. Commun. ACM (41): 15-19 (1998). Web SearchBibTeXDownload
39Real-world Data is Dirty: Data Cleansing and The Merge/Purge Problem. Mauricio A. Hernández, Salvatore J. Stolfo. Data Min. Knowl. Discov. (2): 9-37 (1998). Web SearchBibTeXDownload
38Mining Databases with Different Schemas: Integrating Incompatible Classifiers. Andreas L. Prodromidis, Salvatore J. Stolfo. KDD 1998, 314-318. Web SearchBibTeXDownload
37Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. Philip K. Chan, Salvatore J. Stolfo. KDD 1998, 164-168. Web SearchBibTeXDownload
36Mining Audit Data to Build Intrusion Detection Models. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok. KDD 1998, 66-72. Web SearchBibTeXDownload
35Database Research at Columbia University. Shih-Fu Chang, Luis Gravano, Gail E. Kaiser, Kenneth A. Ross, Salvatore J. Stolfo. SIGMOD Record (27): 75-80 (1998). Web SearchBibTeXDownload
1997
34On the Accuracy of Meta-Learning for Scalable Data Mining. Philip K. Chan, Salvatore J. Stolfo. J. Intell. Inf. Syst. (8): 5-28 (1997). Web SearchBibTeXDownload
33JAM: Java Agents for Meta-Learning over Distributed Databases. Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan. KDD 1997, 74-81. Web SearchBibTeXDownload
1996
32Sharing Learned Models among Remote Database Partitions by Local Meta-Learning. Philip K. Chan, Salvatore J. Stolfo. KDD 1996, 2-7. Web SearchBibTeXDownload
1995
31A Comparative Evaluation of Voting and Meta-learning on Partitioned Data. Philip K. Chan, Salvatore J. Stolfo. ICML 1995, 90-98. Web SearchBibTeX
30A coding approach to event correlation. S. Kliger, Shaula Yemini, Yechiam Yemini, David Ohsie, Salvatore J. Stolfo. Integrated Network Management 1995, 266-277. Web SearchBibTeX
29Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning. Philip K. Chan, Salvatore J. Stolfo. KDD 1995, 39-44. Web SearchBibTeXDownload
28The Merge/Purge Problem for Large Databases. Mauricio A. Hernández, Salvatore J. Stolfo. SIGMOD Conference 1995, 127-138. Web SearchBibTeXDownload
1994
27Scalable Parallel and Distributed Expert Database Systems with Predictive Load Balancing. Hasanat M. Dewan, Salvatore J. Stolfo, Leland Woodbury. J. Parallel Distrib. Comput. (22): 506-522 (1994). Web SearchBibTeXDownload
26Predictive Dynamic Load Balancing of Parallel Hash-Joins Over Heterogeneous Processors in the Presence of Data Skew. Hasanat M. Dewan, Mauricio A. Hernández, Kui W. Mok, Salvatore J. Stolfo. PDIS 1994, 40-49. Web SearchBibTeXDownload
25Performance of Incremental Update in Database Rule Processing. David Ohsie, Hasanat M. Dewan, Salvatore J. Stolfo, Sushil Da Silva. RIDE-ADS 1994, 10-18. Web SearchBibTeXDownload
24Meta-level Control of Rule Execution in a Parallel and Distributed Expert Database System. Hasanat M. Dewan, Salvatore J. Stolfo. RIDE-ADS 1994, 105-114. Web SearchBibTeXDownload
23Predictive Dynamic Load Balancing of Parallel and Distributed Rule and Query Processing. Hasanat M. Dewan, Salvatore J. Stolfo, Mauricio A. Hernández, Jae-Jun Hwang. SIGMOD Conference 1994, 277-288. Web SearchBibTeXDownload
1993
22Experiments on Multi-Strategy Learning by Meta-Learning. Philip K. Chan, Salvatore J. Stolfo. CIKM 1993, 314-323. Web SearchBibTeXDownload
21Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. Benjamin W. Wah, Thomas S. Huang, Aravind K. Joshi, Dan I. Moldovan, Yiannis Aloimonos, Ruzena Bajcsy, Dana H. Ballard, Doug DeGroot, Kenneth DeJong, Charles R. Dyer, Scott E. Fahlman, Ralph Grishman, Lynette Hirschman, Richard E. Korf, Stephen E. Levinson, Daniel P. Miranker, N. H. Morgan, Sergei Nirenburg, Tomaso Poggio, Edward M. Riseman, Craig Stanfil, Salvatore J. Stolfo, Steven L. Tanimoto, Charles C. Weems. IEEE Trans. Knowl. Data Eng. (5): 138-154 (1993). Web SearchBibTeXDownload
20Toward Multi-Strategy Parallel & Distributed Learning in Sequence Analysis. Philip K. Chan, Salvatore J. Stolfo. ISMB 1993, 65-73. Web SearchBibTeXDownload
19System Reorganization and Load Balancing of Parallel Database Rule Processing. Hasanat M. Dewan, Salvatore J. Stolfo. ISMIS 1993, 186-197. Web SearchBibTeXDownload
18Dynamic neighborhood bounding for Monte Carlo simulation. Jason S. Glazier, Salvatore J. Stolfo. Winter Simulation Conference 1993, 466-473. Web SearchBibTeXDownload
1992
17Is Production System Match Interesting?. Mark Perlin, Jaime G. Carbonell, Daniel P. Miranker, Salvatore J. Stolfo, Milind Tambe. ICTAI 1992, 2-3. Web SearchBibTeX
16Incremental Database Rule Processing In PARADISER. Hasanat M. Dewan, David Ohsie, Salvatore J. Stolfo, Ouri Wolfson, Sushil Da Silva. J. Intell. Inf. Syst. (1): 177-209 (1992). Cited by 16Web SearchBibTeXDownload
1991
15The PARULEL Parallel Rule Language. Salvatore J. Stolfo, Hasanat M. Dewan, Ouri Wolfson. ICPP (2) 1991, 36-45. Cited by 20Web SearchBibTeX
14PARULE: Parallel Rule Processing Using Meta-rules for Redaction. Salvatore J. Stolfo, Ouri Wolfson, Philip K. Chan, Hasanat M. Dewan, Leland Woodbury, Jason S. Glazier, David Ohsie. J. Parallel Distrib. Comput. (13): 366-382 (1991). Cited by 35Web SearchBibTeXDownload
13Incremental Evaluation of Rules and its Relationship to Parallelism. Ouri Wolfson, Hasanat M. Dewan, Salvatore J. Stolfo, Yechiam Yemini. SIGMOD Conference 1991, 78-87. Cited by 43Web SearchBibTeXDownload
1987
12Initial Performance of the DADO2 Prototype. Salvatore J. Stolfo. IEEE Computer (20): 75-83 (1987). Web SearchBibTeXDownload
1986
11The Do-loop Considered Harmful in Production System Programming. Michael van Biema, Daniel P. Miranker, Salvatore J. Stolfo. Expert Database Conf. 1986, 177-190. Web SearchBibTeX
10The DADO Production System Machine. Salvatore J. Stolfo, Daniel P. Miranker. J. Parallel Distrib. Comput. (3): 269-296 (1986). Cited by 32Web SearchBibTeXDownload
1985
9Towards the Parallel Execution of Rules in Production System Programs. Toru Ishida, Salvatore J. Stolfo. ICPP 1985, 568-575. Web SearchBibTeX
1984
8Five Parallel Algorithms for Production System Execution on the DADO Machine. Salvatore J. Stolfo. AAAI 1984, 300-307. Web SearchBibTeXDownload
7LPS Algorithms. Andy Lowry, Stephen Taylor, Salvatore J. Stolfo. FGCS 1984, 436-448. Web SearchBibTeX
6Logic Programming Using Parallel Associative Operations. Stephen Taylor, Andy Lowry, Gerald Q. Maguire Jr., Salvatore J. Stolfo. SLP 1984, 58-68. Web SearchBibTeX
1983
5ACE: An Expert System for Telephone Cable Maintenance. Gregg T. Vesonder, Salvatore J. Stolfo, John E. Zielinski, Frederick D. Miller, David H. Copp. IJCAI 1983, 116-121. Web SearchBibTeX
4Architecture and Applications of DADO: A Large-Scale Parallel Computer for Artificial Intelligence. Salvatore J. Stolfo, Daniel P. Miranker, David Elliot Shaw. IJCAI 1983, 850-854. Cited by 27Web SearchBibTeX
1982
3DADO: A Tree-Structured Machine Architecture for Production Systems. Salvatore J. Stolfo, David Elliot Shaw. AAAI 1982, 242-246. Web SearchBibTeXDownload
1981
2The NON-VON Database Machine: A Brief Overview. David Elliot Shaw, Salvatore J. Stolfo, Hussein Ibrahim, Bruce Hillyer, Gio Wiederhold, J. A. Andrews. IEEE Database Eng. Bull. (4): 41-52 (1981). Web SearchBibTeXDownload
1979
1Automatic Discovery of Heuristics for Nondeterministic Programs. Salvatore J. Stolfo, Malcolm C. Harrison. IJCAI 1979, 853-855. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research