Search the dblp DataBase
Helen J. Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Joseph M. Hellerstein , Peter J. Haas , Helen J. Wang Online Aggregation. [Citation Graph (39, 20)][DBLP ] SIGMOD Conference, 1997, pp:171-182 [Conf ] Qiang Huang , David Jao , Helen J. Wang Applications of secure electronic voting to automated privacy-preserving troubleshooting. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:68-80 [Conf ] Venkata N. Padmanabhan , Helen J. Wang , Philip A. Chou Resilient Peer-to-Peer Streaming. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:16-27 [Conf ] Justin Ma , John Dunagan , Helen J. Wang , Stefan Savage , Geoffrey M. Voelker Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP ] Internet Measurement Conference, 2006, pp:53-64 [Conf ] Venkata N. Padmanabhan , Lili Qiu , Helen J. Wang Passive network tomography using Bayesian inference. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:93-94 [Conf ] Miguel Castro , Michael B. Jones , Anne-Marie Kermarrec , Antony I. T. Rowstron , Marvin Theimer , Helen J. Wang , Alec Wolman An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Venkata N. Padmanabhan , Lili Qiu , Helen J. Wang Server-based Inference of Internet Link Lossiness. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Helen J. Wang , Anthony D. Joseph , Randy H. Katz A Signaling System Using Lightweight Call Sessions. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:697-706 [Conf ] Venkata N. Padmanabhan , Helen J. Wang , Philip A. Chou Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming. [Citation Graph (0, 0)][DBLP ] IPTPS, 2004, pp:54-63 [Conf ] Helen J. Wang , Yih-Chun Hu , Chun Yuan , Zheng Zhang , Yi-Min Wang Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. [Citation Graph (0, 0)][DBLP ] IPTPS, 2004, pp:184-194 [Conf ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:159-172 [Conf ] Qiang Huang , Helen J. Wang , Nikita Borisov Privacy-Preserving Friends Troubleshooting Network. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Venkata N. Padmanabhan , Helen J. Wang , Philip A. Chou , Kunwadee Sripanidkulchai Distributing streaming media content using cooperative networking. [Citation Graph (0, 0)][DBLP ] NOSSDAV, 2002, pp:177-186 [Conf ] Helen J. Wang , John C. Platt , Yu Chen , Ruyun Zhang , Yi-Min Wang Automatic Misconfiguration Troubleshooting with PeerPressure. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:245-258 [Conf ] Charles Reis , John Dunagan , Helen J. Wang , Opher Dubrovsky , Saher Esmeir BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. [Citation Graph (0, 0)][DBLP ] OSDI, 2006, pp:61-74 [Conf ] Xuxian Jiang , Dongyan Xu , Helen J. Wang , Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:1-21 [Conf ] Helen J. Wang , Chuanxiong Guo , Daniel R. Simon , Alf Zugenmaier Shield: vulnerability-driven network filters for preventing known vulnerability exploits. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2004, pp:193-204 [Conf ] Helen J. Wang , John C. Platt , Yu Chen , Ruyun Zhang , Yi-Min Wang PeerPressure for automatic troubleshooting. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2004, pp:398-399 [Conf ] Samuel T. King , Peter M. Chen , Yi-Min Wang , Chad Verbowski , Helen J. Wang , Jacob R. Lorch SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:314-327 [Conf ] Weidong Cui , Marcus Peinado , Helen J. Wang , Michael E. Locasto ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf ] José Meseguer , Ralf Sasse , Helen J. Wang , Yi-Min Wang A Systematic Approach to Uncover Security Flaws in GUI Logic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:71-85 [Conf ] Helen J. Wang , Randy H. Katz , Jochen Giese Policy-Enabled Handoffs Across Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP ] WMCSA, 1999, pp:51-0 [Conf ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal ] Tao Jiang , Helen J. Wang , Yih-Chun Hu Preserving location privacy in wireless lans. [Citation Graph (0, 0)][DBLP ] MobiSys, 2007, pp:246-257 [Conf ] Helen J. Wang , Xiaofeng Fan , Jon Howell , Collin Jackson Protection and communication abstractions for web browsers in MashupOS. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:1-16 [Conf ] Collin Jackson , Helen J. Wang Subspace: secure cross-domain communication for web mashups. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:611-620 [Conf ] Charles Reis , John Dunagan , Helen J. Wang , Opher Dubrovsky , Saher Esmeir BrowserShield: Vulnerability-driven filtering of dynamic HTML. [Citation Graph (0, 0)][DBLP ] TWEB, 2007, v:1, n:3, pp:- [Journal ] Tupni: automatic reverse engineering of input formats. [Citation Graph (, )][DBLP ] Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications. [Citation Graph (, )][DBLP ] MashupOS: Operating System Abstractions for Client Mashups. [Citation Graph (, )][DBLP ] Mining the Web and the Internet for Accurate IP Address Geolocations. [Citation Graph (, )][DBLP ] Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP ] Characterizing Botnets from Email Spam Records. [Citation Graph (, )][DBLP ] On the Incoherencies in Web Browser Access Control Policies. [Citation Graph (, )][DBLP ] RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP ] Mobility support in unified communication networks. [Citation Graph (, )][DBLP ] Attacks target Web server logic and prey on XCS weaknesses: technical persepctive. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs