Helen J. Wang
Helen J. Wang
Principal Researcher, Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Content-based image retrieval at the end of the early years
AWM Smeulders, M Worring, S Santini, A Gupta, R Jain
IEEE Transactions on pattern analysis and machine intelligence 22 (12), 1349 …, 2000
82062000
Online aggregation
JM Hellerstein, PJ Haas, HJ Wang
Proceedings of the 1997 ACM SIGMOD international conference on Management of …, 1997
12221997
Distributing streaming media content using cooperative networking
VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai
Proceedings of the 12th international workshop on Network and operating …, 2002
11652002
Secondnet: a data center network virtualization architecture with bandwidth guarantees
C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang
Proceedings of the 6th International COnference, 1-12, 2010
7532010
Policy-enabled handoffs across heterogeneous wireless networks
HJ Wang, RH Katz, J Giese
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999
6921999
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
6792011
Resilient peer-to-peer streaming
VN Padmanabhan, HJ Wang, PA Chou
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
6342003
Removal of Cu, Zn, and Cd from aqueous solutions by the dairy manure-derived biochar
X Xu, X Cao, L Zhao, H Wang, H Yu, B Gao
Environmental Science and Pollution Research 20 (1), 358-368, 2013
4312013
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
HJ Wang, C Guo, DR Simon, A Zugenmaier
Proceedings of the 2004 conference on Applications, technologies …, 2004
4282004
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
W Cui, J Kannan, HJ Wang
USENIX Security Symposium, 1-14, 2007
4042007
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ...
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
3862003
Plants vs. cancer: a review on natural phytochemicals in preventing and treating cancers and their druggability
H Wang, T Oo Khor, L Shu, ZY Su, F Fuentes, JH Lee, AN Tony Kong
Anti-Cancer Agents in Medicinal Chemistry (Formerly Current Medicinal …, 2012
3562012
Enabling Security in Cloud Storage SLAs with CloudProof.
RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang
USENIX Annual Technical Conference 242, 355-368, 2011
3352011
BrowserShield: Vulnerability-driven filtering of dynamic HTML
C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir
ACM Transactions on the Web (TWEB) 1 (3), 11-es, 2007
3252007
Mechanical properties of high-strength concrete after fire
M Li, CX Qian, W Sun
Cement and concrete research 34 (6), 1001-1005, 2004
3132004
Automatic Misconfiguration Troubleshooting with PeerPressure.
HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang
OSDI 4, 245-257, 2004
3072004
Magmatic history of the northeastern Tibetan Plateau
GE Gehrels, A Yin, XF Wang
Journal of Geophysical Research: Solid Earth 108 (B9), 2003
3002003
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
2712012
Tupni: Automatic reverse engineering of input formats
W Cui, M Peinado, K Chen, HJ Wang, L Irun-Briz
Proceedings of the 15th ACM conference on Computer and communications …, 2008
2542008
A highly resolved regional climate model (IPRC-RegCM) and its simulation of the 1998 severe precipitation event over China. Part I: Model description and verification of simulation
Y Wang, OL Sen, B Wang
Journal of Climate 16 (11), 1721-1738, 2003
2482003
The system can't perform the operation now. Try again later.
Articles 1–20