Follow
Helen J. Wang
Helen J. Wang
Principal Researcher, Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Online aggregation
JM Hellerstein, PJ Haas, HJ Wang
Proceedings of the 1997 ACM SIGMOD international conference on Management of …, 1997
13631997
Distributing streaming media content using cooperative networking
VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai
Proceedings of the 12th international workshop on Network and operating …, 2002
11982002
Secondnet: a data center network virtualization architecture with bandwidth guarantees
C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang
Proceedings of the 6th International COnference, 1-12, 2010
8272010
Permission re-delegation: Attacks and defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
7562011
Policy-enabled handoffs across heterogeneous wireless networks
HJ Wang, RH Katz, J Giese
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
7161999
Resilient peer-to-peer streaming
VN Padmanabhan, HJ Wang, PA Chou
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
6462003
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
W Cui, J Kannan, HJ Wang
USENIX Security Symposium, 1-14, 2007
5142007
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
HJ Wang, C Guo, DR Simon, A Zugenmaier
Proceedings of the 2004 conference on Applications, technologies …, 2004
4522004
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ...
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
3952003
Enabling security in cloud storage {SLAs} with {CloudProof}
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011
3842011
BrowserShield: Vulnerability-driven filtering of dynamic HTML
C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir
ACM Transactions on the Web (TWEB) 1 (3), 11-es, 2007
3412007
Automatic Misconfiguration Troubleshooting with PeerPressure.
HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang
OSDI 4, 245-257, 2004
3282004
Tupni: Automatic reverse engineering of input formats
W Cui, M Peinado, K Chen, HJ Wang, L Irun-Briz
Proceedings of the 15th ACM conference on Computer and communications …, 2008
3202008
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
3042012
Inflammation in alcoholic liver disease
HJ Wang, B Gao, S Zakhari, LE Nagy
Annual review of nutrition 32, 343-368, 2012
2712012
Preserving location privacy in wireless LANs
T Jiang, HJ Wang, YC Hu
Proceedings of the 5th international conference on Mobile systems …, 2007
2582007
The Multi-Principal OS Construction of the Gazelle Web Browser.
HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter
USENIX security symposium 28, 2009
2522009
Strider: A black-box, state-based approach to change and configuration management and support
YM Wang, C Verbowski, J Dunagan, Y Chen, HJ Wang, C Yuan, Z Zhang
Science of Computer Programming 53 (2), 143-164, 2004
2512004
ICEBERG: An Internet core network architecture for integrated communications
HJ Wang, B Raman, C Chuah, R Biswas, R Gummadi, B Hohlt, X Hong, ...
IEEE Personal Communications 7 (4), 10-19, 2000
2502000
Subspace: secure cross-domain communication for web mashups
C Jackson, HJ Wang
Proceedings of the 16th international conference on World Wide Web, 611-620, 2007
2272007
The system can't perform the operation now. Try again later.
Articles 1–20