Helen J. Wang
Helen J. Wang
Principal Researcher, Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Content-based image retrieval at the end of the early years
AWM Smeulders, M Worring, S Santini, A Gupta, R Jain
IEEE Transactions on pattern analysis and machine intelligence 22 (12), 1349 …, 2000
80222000
Online aggregation
JM Hellerstein, PJ Haas, HJ Wang
Proceedings of the 1997 ACM SIGMOD international conference on Management of …, 1997
12051997
Distributing streaming media content using cooperative networking
VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai
Proceedings of the 12th international workshop on Network and operating …, 2002
11312002
Secondnet: a data center network virtualization architecture with bandwidth guarantees
C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang
Proceedings of the 6th International COnference, 1-12, 2010
7162010
Policy-enabled handoffs across heterogeneous wireless networks
HJ Wang, RH Katz, J Giese
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
6691999
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
6562011
Resilient peer-to-peer streaming
VN Padmanabhan, HJ Wang, PA Chou
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
6152003
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
HJ Wang, C Guo, DR Simon, A Zugenmaier
Proceedings of the 2004 conference on Applications, technologies …, 2004
4202004
Removal of Cu, Zn, and Cd from aqueous solutions by the dairy manure-derived biochar
X Xu, X Cao, L Zhao, H Wang, H Yu, B Gao
Environmental Science and Pollution Research 20 (1), 358-368, 2013
4092013
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
W Cui, J Kannan, HJ Wang
USENIX Security Symposium, 1-14, 2007
3892007
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ...
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
3742003
Plants vs. cancer: a review on natural phytochemicals in preventing and treating cancers and their druggability
H Wang, T Oo Khor, L Shu, ZY Su, F Fuentes, JH Lee, AN Tony Kong
Anti-Cancer Agents in Medicinal Chemistry (Formerly Current Medicinal …, 2012
3332012
BrowserShield: Vulnerability-driven filtering of dynamic HTML
C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir
ACM Transactions on the Web (TWEB) 1 (3), 11-es, 2007
3152007
Enabling Security in Cloud Storage SLAs with CloudProof.
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
USENIX Annual Technical Conference 242, 355-368, 2011
3112011
Mechanical properties of high-strength concrete after fire
M Li, CX Qian, W Sun
Cement and concrete research 34 (6), 1001-1005, 2004
3062004
Magmatic history of the northeastern Tibetan Plateau
GE Gehrels, A Yin, XF Wang
Journal of Geophysical Research: Solid Earth 108 (B9), 2003
2962003
Automatic Misconfiguration Troubleshooting with PeerPressure.
HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang
OSDI 4, 245-257, 2004
2892004
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
2592012
A highly resolved regional climate model (IPRC-RegCM) and its simulation of the 1998 severe precipitation event over China. Part I: Model description and verification of simulation
Y Wang, OL Sen, B Wang
Journal of Climate 16 (11), 1721-1738, 2003
2442003
Tupni: Automatic reverse engineering of input formats
W Cui, M Peinado, K Chen, HJ Wang, L Irun-Briz
Proceedings of the 15th ACM conference on Computer and communications …, 2008
2432008
The system can't perform the operation now. Try again later.
Articles 1–20