The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yi-Min Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yi-Min Wang, Woei-Jyh Lee
    COMERA: COM Extensible Remoting Architecture. [Citation Graph (0, 0)][DBLP]
    COOTS, 1998, pp:79-88 [Conf]
  2. Pi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj
    Diagnosis and Correction of Logic Design Errors in Digital Circuits. [Citation Graph (0, 0)][DBLP]
    DAC, 1993, pp:503-508 [Conf]
  3. Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen
    Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:561-566 [Conf]
  4. Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu
    Towards Dependable Home Networking: An Experience Report. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:43-48 [Conf]
  5. Yi-Min Wang, Chad Verbowski, Daniel R. Simon
    Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:311-316 [Conf]
  6. Yi-Min Wang, Paramvir Bahl, Wilf Russell
    The SIMBA User Alert Service Architecture for Dependable Alert Delivery. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:463-474 [Conf]
  7. Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski
    Detecting Stealth Software with Strider GhostBuster. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:368-377 [Conf]
  8. Yennun Huang, Yi-Min Wang
    Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:459-463 [Conf]
  9. Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy
    Integrating Checkpointing with Transaction Processing. [Citation Graph (0, 0)][DBLP]
    FTCS, 1997, pp:304-308 [Conf]
  10. Yi-Min Wang, W. Kent Fuchs
    Scheduling Message Processing for Reducing Rollback Propagation. [Citation Graph (0, 0)][DBLP]
    FTCS, 1992, pp:204-211 [Conf]
  11. Yi-Min Wang, Yennun Huang, W. Kent Fuchs
    Progressive Retry for Software Error Recovery in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    FTCS, 1993, pp:138-144 [Conf]
  12. Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pi-Yu Chung, Chandra M. R. Kintala
    Checkpointing and Its Applications. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:22-31 [Conf]
  13. John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang
    Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. [Citation Graph (0, 0)][DBLP]
    ICAC, 2004, pp:106-113 [Conf]
  14. Emre Kycyman, Yi-Min Wang
    Discovering Correctness Constraints for Self-Management of System Configuration. [Citation Graph (0, 0)][DBLP]
    ICAC, 2004, pp:28-35 [Conf]
  15. Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang
    Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:38- [Conf]
  16. Yi-Min Wang, Om P. Damani, Vijay K. Garg
    Distributed Recovery with K-Optimistic Logging. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  17. Roger Wattenhofer, Erran L. Li, Paramvir Bahl, Yi-Min Wang
    Distributed Topology Control for Wireless Multihop Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1388-1397 [Conf]
  18. Anish Arora, Rajesh Jagannathan, Yi-Min Wang
    Model-Based Fault Detection in Powerline Networking. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  19. Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang
    Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:184-194 [Conf]
  20. Yi-Min Wang
    Reducing Message Logging Overhead for Log-based Recovery. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:1925-1928 [Conf]
  21. Ni Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang
    Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:151-158 [Conf]
  22. Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang
    Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  23. Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo
    Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:33-46 [Conf]
  24. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:159-172 [Conf]
  25. Yi-Min Wang, Doug Beck
    Fast User-Mode Rootkit Scanner for the Enterprise. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:23-30 [Conf]
  26. Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang
    LiveOps: Systems Management as a Service. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:187-203 [Conf]
  27. Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
    A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  28. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  29. Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
    Automatic Misconfiguration Troubleshooting with PeerPressure. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:245-258 [Conf]
  30. Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev
    Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:117-130 [Conf]
  31. Om P. Damani, Yi-Min Wang, Vijay K. Garg
    Optimistic Distributed Simulation Based on Transitive Dependency Tracking. [Citation Graph (0, 0)][DBLP]
    Workshop on Parallel and Distributed Simulation, 1997, pp:90-97 [Conf]
  32. Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer
    Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:264-273 [Conf]
  33. Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo
    A Stateful Approach to Spyware Detection and Removal. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:173-182 [Conf]
  34. Yi-Min Wang
    Managing the Aladdin Home Networking System: An Experience Report. [Citation Graph (0, 0)][DBLP]
    SEUS, 2005, pp:25-29 [Conf]
  35. Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
    PeerPressure for automatic troubleshooting. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:398-399 [Conf]
  36. Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee
    Analyzing persistent state interactions to improve state management. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:363-364 [Conf]
  37. Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
    SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:314-327 [Conf]
  38. Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu
    Statistical Identification of Encrypted Web Browsing Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:19-30 [Conf]
  39. José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang
    A Systematic Approach to Uncover Security Flaws in GUI Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:71-85 [Conf]
  40. Yi-Min Wang
    Maximum and Minimum Consistent Global Checkpoints and their Applications. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1995, pp:86-95 [Conf]
  41. Yi-Min Wang, W. Kent Fuchs
    Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1992, pp:147-154 [Conf]
  42. Yi-Min Wang, W. Kent Fuchs
    Lazy Checkpointing Coordination for Bounding Rollback Propagation. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1993, pp:78-85 [Conf]
  43. Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma
    Automated known problem diagnosis with event traces. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2006, pp:375-388 [Conf]
  44. Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson
    Summary-based routing for content-based event distribution networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:5, pp:59-74 [Journal]
  45. Om P. Damani, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Yi-Min Wang
    ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1997, v:29, n:8-13, pp:1019-1027 [Journal]
  46. Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer
    Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  47. E. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson
    A survey of rollback-recovery protocols in message-passing systems. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2002, v:34, n:3, pp:375-408 [Journal]
  48. Jichiang Tsai, Yi-Min Wang, Sy-Yen Kuo
    Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:1, pp:31-37 [Journal]
  49. Yi-Min Wang, Andy Lowry, W. Kent Fuchs
    Consistent Global Checkpoints Based on Direct Dependency Tracking. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:50, n:4, pp:223-230 [Journal]
  50. Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
    More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:2, pp:239-257 [Journal]
  51. Om P. Damani, Yi-Min Wang, Vijay K. Garg
    Distributed recovery with K-optimistic logging. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2003, v:63, n:12, pp:1193-1218 [Journal]
  52. Yi-Min Wang, Pi-Yu Chung, W. Kent Fuchs
    Scheduling for Periodic Concurrent Error Detection in Processor Arrays. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1994, v:23, n:3, pp:306-313 [Journal]
  53. Xuxian Jiang, Dongyan Xu, Yi-Min Wang
    Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
  54. Yi-Min Wang
    Memory latency consideration for load sharing on heterogeneous network of workstations. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Architecture, 2006, v:52, n:1, pp:13-24 [Journal]
  55. Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang
    Hierarchical loop scheduling for clustered NUMA machines. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2000, v:55, n:1, pp:33-44 [Journal]
  56. Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang
    Clustered affinity scheduling on large-scale NUMA multiprocessors. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1997, v:39, n:1, pp:61-70 [Journal]
  57. Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang
    Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:44, n:1, pp:17-29 [Journal]
  58. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal]
  59. Yi-Min Wang, Yennun Huang, W. Kent Fuchs, Chandra M. R. Kintala, Gaurav Suri
    Progressive Retry for Software Failure Recovery in Message-Passing Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:10, pp:1137-1141 [Journal]
  60. Li Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer
    A cone-based distributed topology-control algorithm for wireless multi-hop networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:1, pp:147-159 [Journal]
  61. Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
    Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:10, pp:963-971 [Journal]
  62. Yi-Min Wang, Pi-Yu Chung, In-Jen Lin, W. Kent Fuchs
    Checkpoint Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems.. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1995, v:6, n:5, pp:546-554 [Journal]
  63. Yi-Min Wang, Ming Ma
    Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine. [Citation Graph (0, 0)][DBLP]
    ICAC, 2007, pp:32- [Conf]
  64. Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
    Spam double-funnel: connecting web spammers with advertisers. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:291-300 [Conf]
  65. Yi-Min Wang
    Local Cluster First Load Sharing Policy for Heterogeneous Clusters. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2007, v:23, n:2, pp:497-510 [Journal]
  66. Pi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj
    Logic design error diagnosis and correction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 1994, v:2, n:3, pp:320-332 [Journal]

  67. An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. [Citation Graph (, )][DBLP]


  68. Post-rank reordering: resolving preference misalignments between search engines and end users. [Citation Graph (, )][DBLP]


  69. A Quantitative Study of Forum Spamming Using Context-based Analysis. [Citation Graph (, )][DBLP]


  70. WebProphet: Automating Performance Prediction for Web Services. [Citation Graph (, )][DBLP]


  71. Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. [Citation Graph (, )][DBLP]


  72. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP]


  73. Distributed nonnegative matrix factorization for web-scale dyadic data analysis on mapreduce. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.024secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002