Search the dblp DataBase
Yi-Min Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yi-Min Wang , Woei-Jyh Lee COMERA: COM Extensible Remoting Architecture. [Citation Graph (0, 0)][DBLP ] COOTS, 1998, pp:79-88 [Conf ] Pi-Yu Chung , Yi-Min Wang , Ibrahim N. Hajj Diagnosis and Correction of Logic Design Errors in Digital Circuits. [Citation Graph (0, 0)][DBLP ] DAC, 1993, pp:503-508 [Conf ] Archana Ganapathi , Yi-Min Wang , Ni Lao , Ji-Rong Wen Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:561-566 [Conf ] Yi-Min Wang , Wilf Russell , Anish Arora , Rajesh Jagannathan , Jun Xu Towards Dependable Home Networking: An Experience Report. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:43-48 [Conf ] Yi-Min Wang , Chad Verbowski , Daniel R. Simon Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:311-316 [Conf ] Yi-Min Wang , Paramvir Bahl , Wilf Russell The SIMBA User Alert Service Architecture for Dependable Alert Delivery. [Citation Graph (0, 0)][DBLP ] DSN, 2001, pp:463-474 [Conf ] Yi-Min Wang , Doug Beck , Binh Vo , Roussi Roussev , Chad Verbowski Detecting Stealth Software with Strider GhostBuster. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:368-377 [Conf ] Yennun Huang , Yi-Min Wang Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. [Citation Graph (0, 0)][DBLP ] FTCS, 1995, pp:459-463 [Conf ] Yi-Min Wang , Pi-Yu Chung , Yennun Huang , E. N. Elnozahy Integrating Checkpointing with Transaction Processing. [Citation Graph (0, 0)][DBLP ] FTCS, 1997, pp:304-308 [Conf ] Yi-Min Wang , W. Kent Fuchs Scheduling Message Processing for Reducing Rollback Propagation. [Citation Graph (0, 0)][DBLP ] FTCS, 1992, pp:204-211 [Conf ] Yi-Min Wang , Yennun Huang , W. Kent Fuchs Progressive Retry for Software Error Recovery in Distributed Systems. [Citation Graph (0, 0)][DBLP ] FTCS, 1993, pp:138-144 [Conf ] Yi-Min Wang , Yennun Huang , Kiem-Phong Vo , Pi-Yu Chung , Chandra M. R. Kintala Checkpointing and Its Applications. [Citation Graph (0, 0)][DBLP ] FTCS, 1995, pp:22-31 [Conf ] John Dunagan , Roussi Roussev , Brad Daniels , Aaron Johnson , Chad Verbowski , Yi-Min Wang Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. [Citation Graph (0, 0)][DBLP ] ICAC, 2004, pp:106-113 [Conf ] Emre Kycyman , Yi-Min Wang Discovering Correctness Constraints for Self-Management of System Configuration. [Citation Graph (0, 0)][DBLP ] ICAC, 2004, pp:28-35 [Conf ] Xuxian Jiang , Aaron Walters , Dongyan Xu , Eugene H. Spafford , Florian P. Buchholz , Yi-Min Wang Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP ] ICDCS, 2006, pp:38- [Conf ] Yi-Min Wang , Om P. Damani , Vijay K. Garg Distributed Recovery with K-Optimistic Logging. [Citation Graph (0, 0)][DBLP ] ICDCS, 1997, pp:0-0 [Conf ] Roger Wattenhofer , Erran L. Li , Paramvir Bahl , Yi-Min Wang Distributed Topology Control for Wireless Multihop Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:1388-1397 [Conf ] Anish Arora , Rajesh Jagannathan , Yi-Min Wang Model-Based Fault Detection in Powerline Networking. [Citation Graph (0, 0)][DBLP ] IPDPS, 2002, pp:- [Conf ] Helen J. Wang , Yih-Chun Hu , Chun Yuan , Zheng Zhang , Yi-Min Wang Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. [Citation Graph (0, 0)][DBLP ] IPTPS, 2004, pp:184-194 [Conf ] Yi-Min Wang Reducing Message Logging Overhead for Log-based Recovery. [Citation Graph (0, 0)][DBLP ] ISCAS, 1993, pp:1925-1928 [Conf ] Ni Lao , Ji-Rong Wen , Wei-Ying Ma , Yi-Min Wang Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:151-158 [Conf ] Chad Verbowski , John Dunagan , Brad Daniels , Yi-Min Wang Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Yi-Min Wang , Roussi Roussev , Chad Verbowski , Aaron Johnson , Ming-Wei Wu , Yennun Huang , Sy-Yen Kuo Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:33-46 [Conf ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:159-172 [Conf ] Yi-Min Wang , Doug Beck Fast User-Mode Rootkit Scanner for the Enterprise. [Citation Graph (0, 0)][DBLP ] LISA, 2005, pp:23-30 [Conf ] Chad Verbowski , Juhan Lee , Xiaogang Liu , Roussi Roussev , Yi-Min Wang LiveOps: Systems Management as a Service. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:187-203 [Conf ] Shuo Chen , John Dunagan , Chad Verbowski , Yi-Min Wang A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Yi-Min Wang , Doug Beck , Xuxian Jiang , Roussi Roussev , Chad Verbowski , Shuo Chen , Samuel T. King Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Helen J. Wang , John C. Platt , Yu Chen , Ruyun Zhang , Yi-Min Wang Automatic Misconfiguration Troubleshooting with PeerPressure. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:245-258 [Conf ] Chad Verbowski , Emre Kiciman , Arunvijay Kumar , Brad Daniels , Shan Lu , Juhan Lee , Yi-Min Wang , Roussi Roussev Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. [Citation Graph (0, 0)][DBLP ] OSDI, 2006, pp:117-130 [Conf ] Om P. Damani , Yi-Min Wang , Vijay K. Garg Optimistic Distributed Simulation Based on Transitive Dependency Tracking. [Citation Graph (0, 0)][DBLP ] Workshop on Parallel and Distributed Simulation, 1997, pp:90-97 [Conf ] Erran L. Li , Joseph Y. Halpern , Paramvir Bahl , Yi-Min Wang , Roger Wattenhofer Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks. [Citation Graph (0, 0)][DBLP ] PODC, 2001, pp:264-273 [Conf ] Ming-Wei Wu , Yennun Huang , Yi-Min Wang , Sy-Yen Kuo A Stateful Approach to Spyware Detection and Removal. [Citation Graph (0, 0)][DBLP ] PRDC, 2006, pp:173-182 [Conf ] Yi-Min Wang Managing the Aladdin Home Networking System: An Experience Report. [Citation Graph (0, 0)][DBLP ] SEUS, 2005, pp:25-29 [Conf ] Helen J. Wang , John C. Platt , Yu Chen , Ruyun Zhang , Yi-Min Wang PeerPressure for automatic troubleshooting. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2004, pp:398-399 [Conf ] Chad Verbowski , Emre Kiciman , Brad Daniels , Yi-Min Wang , Roussi Roussev , Shan Lu , Juhan Lee Analyzing persistent state interactions to improve state management. [Citation Graph (0, 0)][DBLP ] SIGMETRICS/Performance, 2006, pp:363-364 [Conf ] Samuel T. King , Peter M. Chen , Yi-Min Wang , Chad Verbowski , Helen J. Wang , Jacob R. Lorch SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:314-327 [Conf ] Qixiang Sun , Daniel R. Simon , Yi-Min Wang , Wilf Russell , Venkata N. Padmanabhan , Lili Qiu Statistical Identification of Encrypted Web Browsing Traffic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:19-30 [Conf ] José Meseguer , Ralf Sasse , Helen J. Wang , Yi-Min Wang A Systematic Approach to Uncover Security Flaws in GUI Logic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:71-85 [Conf ] Yi-Min Wang Maximum and Minimum Consistent Global Checkpoints and their Applications. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1995, pp:86-95 [Conf ] Yi-Min Wang , W. Kent Fuchs Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1992, pp:147-154 [Conf ] Yi-Min Wang , W. Kent Fuchs Lazy Checkpointing Coordination for Bounding Rollback Propagation. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1993, pp:78-85 [Conf ] Chun Yuan , Ni Lao , Ji-Rong Wen , Jiwei Li , Zheng Zhang , Yi-Min Wang , Wei-Ying Ma Automated known problem diagnosis with event traces. [Citation Graph (0, 0)][DBLP ] EuroSys, 2006, pp:375-388 [Conf ] Yi-Min Wang , Lili Qiu , Chad Verbowski , Dimitris Achlioptas , Gautam Das , Per-Åke Larson Summary-based routing for content-based event distribution networks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:5, pp:59-74 [Journal ] Om P. Damani , P. Emerald Chung , Yennun Huang , Chandra M. R. Kintala , Yi-Min Wang ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1997, v:29, n:8-13, pp:1019-1027 [Journal ] Erran L. Li , Joseph Y. Halpern , Paramvir Bahl , Yi-Min Wang , Roger Wattenhofer Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] E. N. Elnozahy , Lorenzo Alvisi , Yi-Min Wang , David B. Johnson A survey of rollback-recovery protocols in message-passing systems. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 2002, v:34, n:3, pp:375-408 [Journal ] Jichiang Tsai , Yi-Min Wang , Sy-Yen Kuo Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:69, n:1, pp:31-37 [Journal ] Yi-Min Wang , Andy Lowry , W. Kent Fuchs Consistent Global Checkpoints Based on Direct Dependency Tracking. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:50, n:4, pp:223-230 [Journal ] Jichiang Tsai , Sy-Yen Kuo , Yi-Min Wang More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2005, v:21, n:2, pp:239-257 [Journal ] Om P. Damani , Yi-Min Wang , Vijay K. Garg Distributed recovery with K -optimistic logging. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2003, v:63, n:12, pp:1193-1218 [Journal ] Yi-Min Wang , Pi-Yu Chung , W. Kent Fuchs Scheduling for Periodic Concurrent Error Detection in Processor Arrays. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1994, v:23, n:3, pp:306-313 [Journal ] Xuxian Jiang , Dongyan Xu , Yi-Min Wang Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal ] Yi-Min Wang Memory latency consideration for load sharing on heterogeneous network of workstations. [Citation Graph (0, 0)][DBLP ] Journal of Systems Architecture, 2006, v:52, n:1, pp:13-24 [Journal ] Yi-Min Wang , Hsiao-Hsi Wang , Ruei-Chuan Chang Hierarchical loop scheduling for clustered NUMA machines. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2000, v:55, n:1, pp:33-44 [Journal ] Yi-Min Wang , Hsiao-Hsi Wang , Ruei-Chuan Chang Clustered affinity scheduling on large-scale NUMA multiprocessors. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1997, v:39, n:1, pp:61-70 [Journal ] Yi-Min Wang , Hsiao-Hsi Wang , Ruei-Chuan Chang Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:44, n:1, pp:17-29 [Journal ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal ] Yi-Min Wang , Yennun Huang , W. Kent Fuchs , Chandra M. R. Kintala , Gaurav Suri Progressive Retry for Software Failure Recovery in Message-Passing Applications. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1997, v:46, n:10, pp:1137-1141 [Journal ] Li Li , Joseph Y. Halpern , Paramvir Bahl , Yi-Min Wang , Roger Wattenhofer A cone-based distributed topology-control algorithm for wireless multi-hop networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2005, v:13, n:1, pp:147-159 [Journal ] Jichiang Tsai , Sy-Yen Kuo , Yi-Min Wang Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:10, pp:963-971 [Journal ] Yi-Min Wang , Pi-Yu Chung , In-Jen Lin , W. Kent Fuchs Checkpoint Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems.. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1995, v:6, n:5, pp:546-554 [Journal ] Yi-Min Wang , Ming Ma Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine. [Citation Graph (0, 0)][DBLP ] ICAC, 2007, pp:32- [Conf ] Yi-Min Wang , Ming Ma , Yuan Niu , Hao Chen Spam double-funnel: connecting web spammers with advertisers. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:291-300 [Conf ] Yi-Min Wang Local Cluster First Load Sharing Policy for Heterogeneous Clusters. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2007, v:23, n:2, pp:497-510 [Journal ] Pi-Yu Chung , Yi-Min Wang , Ibrahim N. Hajj Logic design error diagnosis and correction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 1994, v:2, n:3, pp:320-332 [Journal ] An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. [Citation Graph (, )][DBLP ] Post-rank reordering: resolving preference misalignments between search engines and end users. [Citation Graph (, )][DBLP ] A Quantitative Study of Forum Spamming Using Context-based Analysis. [Citation Graph (, )][DBLP ] WebProphet: Automating Performance Prediction for Web Services. [Citation Graph (, )][DBLP ] Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. [Citation Graph (, )][DBLP ] RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP ] Distributed nonnegative matrix factorization for web-scale dyadic data analysis on mapreduce. [Citation Graph (, )][DBLP ] Search in 0.030secs, Finished in 0.034secs