Helen J. Wang
Helen J. Wang
Principal Researcher, Microsoft Research
Dirección de correo verificada de microsoft.com
TítuloCitado porAño
Content-based image retrieval at the end of the early years
AWM Smeulders, M Worring, S Santini, A Gupta, R Jain
IEEE Transactions on Pattern Analysis & Machine Intelligence, 1349-1380, 2000
77192000
Online aggregation
JM Hellerstein, PJ Haas, HJ Wang
Acm Sigmod Record 26 (2), 171-182, 1997
11341997
Distributing streaming media content using cooperative networking
VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai
Proceedings of the 12th international workshop on Network and operating …, 2002
11142002
Secondnet: a data center network virtualization architecture with bandwidth guarantees
C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang
Proceedings of the 6th International COnference, 15, 2010
6732010
Policy-enabled handoffs across heterogeneous wireless networks
HJ Wang, RH Katz, J Giese
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
6551999
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX Security Symposium 30, 88, 2011
6172011
Resilient peer-to-peer streaming
VN Padmanabhan, HJ Wang, PA Chou
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
6082003
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
HJ Wang, C Guo, DR Simon, A Zugenmaier
ACM SIGCOMM Computer Communication Review 34 (4), 193-204, 2004
4142004
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ...
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
3722003
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
W Cui, J Kannan, HJ Wang
USENIX Security Symposium, 1-14, 2007
3562007
Removal of Cu, Zn, and Cd from aqueous solutions by the dairy manure-derived biochar
X Xu, X Cao, L Zhao, H Wang, H Yu, B Gao
Environmental Science and Pollution Research 20 (1), 358-368, 2013
3322013
BrowserShield: Vulnerability-driven filtering of dynamic HTML
C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir
ACM Transactions on the Web (TWEB) 1 (3), 11, 2007
3082007
Enabling Security in Cloud Storage SLAs with CloudProof.
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
USENIX Annual Technical Conference 242, 355-368, 2011
2862011
Automatic Misconfiguration Troubleshooting with PeerPressure.
HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang
OSDI 4, 245-257, 2004
2742004
Magmatic history of the northeastern Tibetan Plateau
GE Gehrels, A Yin, XF Wang
Journal of Geophysical Research: Solid Earth 108 (B9), 2003
2642003
Mechanical properties of high-strength concrete after fire
M Li, CX Qian, W Sun
Cement and concrete research 34 (6), 1001-1005, 2004
2612004
ICEBERG: An Internet core network architecture for integrated communications
HJ Wang, B Raman, C Chuah, R Biswas, R Gummadi, B Hohlt, X Hong, ...
IEEE Personal Communications 7 (4), 10-19, 2000
2372000
Plants vs. cancer: a review on natural phytochemicals in preventing and treating cancers and their druggability
H Wang, T Oo Khor, L Shu, ZY Su, F Fuentes, JH Lee, AN Tony Kong
Anti-Cancer Agents in Medicinal Chemistry (Formerly Current Medicinal …, 2012
2362012
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
2352012
The Multi-Principal OS Construction of the Gazelle Web Browser.
HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter
USENIX security symposium 28, 2009
2272009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20