The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Helen J. Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joseph M. Hellerstein, Peter J. Haas, Helen J. Wang
    Online Aggregation. [Citation Graph (39, 20)][DBLP]
    SIGMOD Conference, 1997, pp:171-182 [Conf]
  2. Qiang Huang, David Jao, Helen J. Wang
    Applications of secure electronic voting to automated privacy-preserving troubleshooting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:68-80 [Conf]
  3. Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou
    Resilient Peer-to-Peer Streaming. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:16-27 [Conf]
  4. Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker
    Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:53-64 [Conf]
  5. Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang
    Passive network tomography using Bayesian inference. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:93-94 [Conf]
  6. Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony I. T. Rowstron, Marvin Theimer, Helen J. Wang, Alec Wolman
    An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  7. Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang
    Server-based Inference of Internet Link Lossiness. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  8. Helen J. Wang, Anthony D. Joseph, Randy H. Katz
    A Signaling System Using Lightweight Call Sessions. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:697-706 [Conf]
  9. Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou
    Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:54-63 [Conf]
  10. Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang
    Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:184-194 [Conf]
  11. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:159-172 [Conf]
  12. Qiang Huang, Helen J. Wang, Nikita Borisov
    Privacy-Preserving Friends Troubleshooting Network. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  13. Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou, Kunwadee Sripanidkulchai
    Distributing streaming media content using cooperative networking. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2002, pp:177-186 [Conf]
  14. Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
    Automatic Misconfiguration Troubleshooting with PeerPressure. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:245-258 [Conf]
  15. Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir
    BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:61-74 [Conf]
  16. Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
    Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:1-21 [Conf]
  17. Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier
    Shield: vulnerability-driven network filters for preventing known vulnerability exploits. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:193-204 [Conf]
  18. Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
    PeerPressure for automatic troubleshooting. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:398-399 [Conf]
  19. Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
    SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:314-327 [Conf]
  20. Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto
    ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf]
  21. José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang
    A Systematic Approach to Uncover Security Flaws in GUI Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:71-85 [Conf]
  22. Helen J. Wang, Randy H. Katz, Jochen Giese
    Policy-Enabled Handoffs Across Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP]
    WMCSA, 1999, pp:51-0 [Conf]
  23. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal]
  24. Tao Jiang, Helen J. Wang, Yih-Chun Hu
    Preserving location privacy in wireless lans. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2007, pp:246-257 [Conf]
  25. Helen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson
    Protection and communication abstractions for web browsers in MashupOS. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:1-16 [Conf]
  26. Collin Jackson, Helen J. Wang
    Subspace: secure cross-domain communication for web mashups. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:611-620 [Conf]
  27. Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir
    BrowserShield: Vulnerability-driven filtering of dynamic HTML. [Citation Graph (0, 0)][DBLP]
    TWEB, 2007, v:1, n:3, pp:- [Journal]

  28. Tupni: automatic reverse engineering of input formats. [Citation Graph (, )][DBLP]


  29. Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications. [Citation Graph (, )][DBLP]


  30. MashupOS: Operating System Abstractions for Client Mashups. [Citation Graph (, )][DBLP]


  31. Mining the Web and the Internet for Accurate IP Address Geolocations. [Citation Graph (, )][DBLP]


  32. Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP]


  33. Characterizing Botnets from Email Spam Records. [Citation Graph (, )][DBLP]


  34. On the Incoherencies in Web Browser Access Control Policies. [Citation Graph (, )][DBLP]


  35. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP]


  36. Mobility support in unified communication networks. [Citation Graph (, )][DBLP]


  37. Attacks target Web server logic and prey on XCS weaknesses: technical persepctive. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002