M Y S T U D E N T S
Ph.D. Graduates
DANIEL MIRANKER
Professor, University Texas at Austin
"Treat: A New and Efficient Match Algorithm for AI Production Systems," 1987.
STEPHEN TAYLOR
Professor, Dartmouth College
"Parallel Logic Programming Systems (Completed at Technion)," 1987.
ALEXANDER PASIK
(deceased)
"A Methodology for Programming Production Systems and Its Implications on Parallelism," 1989.
MICHAEL VAN BIEMA
"Constraint-Based Invocation: Integrating the Object-Oriented and Rule-Based Paradigms," 1990.
RUSSELL MILLS
(degree awarded posthumously)
"llC: A Hierarchial Parallel Programming Language," 1992.
NATHANIEL POLISH
Daedulus Technology Group
"Mixed Distance Measures for the Optimization of Concatenative Vocubularies in Speech Synthesis," 1993.
HASANAT DEWAN
"Runtime Reorganization of Parallel and Distributed Expert Database Systems," 1994.
JASON GLAZIER
Thompson Financial
" Dynamic Neighborhood Bounding: An Error Reduction Technique for Monte Carlo Simulation," 1994.
DAVID ESPINOSA
UNK
"Semantic Lego: A Modular Theory of Interpreters," 1995.
MAURICIO HERNANDEZ
IBM Research Almaden
"A Generalization of Band Join and its Application to the Merge/Purge Problem," 1996.
PHILIP CHAN
Professor, Florida Tech
"An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning," 1997.
DAVID OHSIE
Smarts
"Codebook-based Fault Diagnosis in Network Management," 1998
ANDREAS PRODROMIDIS
Programize, LLC.
"Efficiency and Scalability of Distributed Data Mining, Pruning and Bridging Multiple Models," 1998.
WENKE LEE
Professor, GA Tech
"A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems," 1999.
DAVE (WEI) FAN
IBM Hawthorne research
"Cost-sensitive, scalable adaptive learning," 2000.
ELEAZAR ESKIN (THE ZAR)
Professor, UCLA
"Probabilistic methods in Intrusion Detection and Genomics," 2002.
SHLOMO HERSHKOP
Director of Engineering, Allure Security Technology
"The Yank Spam Detection System," 2004.
GERMAN CREAMER
Professor, Steven Institute of Technology
"On the use of boosting in financial prediction," (co-advisor: Y. Freund) 2005.
KE WANG
"Network Payload-based Anomaly Detection and Content-based Alert Correlation," 2006.
JANAK PAREKH
"Privacy-preserving Distributed Event Corroboration," 2007.
WEI-JEN LI
Goldman Sachs
"Malcode-bearing Documents", 2008.
VANESSA FRIAZ-MARTINEZ
University Maryland, College Park.
"Behavior-based Access Control," 2008.
GABRIELA CRETU-CIOCARLIE
SRI
"STAND Anomaly Detection Learning Strategies," 2009.
BRIAN BOWEN
Sandia National Labs
"Decoy Networking," 2010.
MALEK BEN SALEM
Accenture
"Insider Threat, 2011"
YINGBO SONG
"Privatizing Network Traces, 2012"
ANG CUI
"Symbiotic Embedded Machine and Embedded Device Insecurity", 2015
NATHANIEL BOGGS
Relative Metrics of Security for Defense in Depth Architectures, 2015
PREETAM DUTTA
Columbia Simulated User Bots, 2019