Helen J. Wang
Helen J. Wang
Principal Researcher, Microsoft Research
Verified email at microsoft.com
TitleCited byYear
Content-based image retrieval at the end of the early years
AWM Smeulders, M Worring, S Santini, A Gupta, R Jain
IEEE Transactions on pattern analysis and machine intelligence 22 (12), 1349 …, 2000
77832000
Online aggregation
JM Hellerstein, PJ Haas, HJ Wang
Proceedings of the 1997 ACM SIGMOD international conference on Management of …, 1997
11631997
Distributing streaming media content using cooperative networking
VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai
Proceedings of the 12th international workshop on Network and operating …, 2002
11252002
Secondnet: a data center network virtualization architecture with bandwidth guarantees
C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang
Proceedings of the 6th International COnference, 1-12, 2010
6972010
Policy-enabled handoffs across heterogeneous wireless networks
HJ Wang, RH Katz, J Giese
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
6621999
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX Security Symposium 30, 88, 2011
6222011
Resilient peer-to-peer streaming
VN Padmanabhan, HJ Wang, PA Chou
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
6082003
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
HJ Wang, C Guo, DR Simon, A Zugenmaier
Proceedings of the 2004 conference on Applications, technologies …, 2004
4122004
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ...
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
3712003
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
W Cui, J Kannan, HJ Wang
USENIX Security Symposium, 1-14, 2007
3622007
Removal of Cu, Zn, and Cd from aqueous solutions by the dairy manure-derived biochar
X Xu, X Cao, L Zhao, H Wang, H Yu, B Gao
Environmental Science and Pollution Research 20 (1), 358-368, 2013
3532013
BrowserShield: Vulnerability-driven filtering of dynamic HTML
C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir
ACM Transactions on the Web (TWEB) 1 (3), 11-es, 2007
3102007
Enabling Security in Cloud Storage SLAs with CloudProof.
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
USENIX Annual Technical Conference 242, 355-368, 2011
2952011
Automatic Misconfiguration Troubleshooting with PeerPressure.
HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang
OSDI 4, 245-257, 2004
2782004
Mechanical properties of high-strength concrete after fire
M Li, CX Qian, W Sun
Cement and concrete research 34 (6), 1001-1005, 2004
2732004
Magmatic history of the northeastern Tibetan Plateau
GE Gehrels, A Yin, XF Wang
Journal of Geophysical Research: Solid Earth 108 (B9), 2003
2722003
Plants vs. cancer: a review on natural phytochemicals in preventing and treating cancers and their druggability
H Wang, T Oo Khor, L Shu, ZY Su, F Fuentes, JH Lee, AN Tony Kong
Anti-Cancer Agents in Medicinal Chemistry (Formerly Current Medicinal …, 2012
2542012
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
2442012
ICEBERG: An Internet core network architecture for integrated communications
HJ Wang, B Raman, C Chuah, R Biswas, R Gummadi, B Hohlt, X Hong, ...
IEEE Personal Communications 7 (4), 10-19, 2000
2392000
A highly resolved regional climate model (IPRC-RegCM) and its simulation of the 1998 severe precipitation event over China. Part I: Model description and verification of simulation
Y Wang, OL Sen, B Wang
Journal of Climate 16 (11), 1721-1738, 2003
2332003
The system can't perform the operation now. Try again later.
Articles 1–20