2009 | ||
---|---|---|
75 | Chao Liu, Mei Li, Yi-Min Wang: Post-rank reordering: resolving preference misalignments between search engines and end users. CIKM 2009: 641-650 | |
74 | Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang: Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. IEEE Symposium on Security and Privacy 2009: 347-359 | |
2008 | ||
73 | Jichiang Tsai, Yi-Min Wang: Communication-Induced Checkpointing Protocols and Rollback-Dependency Trackability: A Survey. Wiley Encyclopedia of Computer Science and Engineering 2008 | |
72 | Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford: Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008) | |
2007 | ||
71 | Shuo Chen, David Ross, Yi-Min Wang: An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. ACM Conference on Computer and Communications Security 2007: 2-11 | |
70 | Yi-Min Wang, Ming Ma: Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine. ICAC 2007: 32 | |
69 | José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang: A Systematic Approach to Uncover Security Flaws in GUI Logic. IEEE Symposium on Security and Privacy 2007: 71-85 | |
68 | Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma: A Quantitative Study of Forum Spamming Using Context-based Analysis. NDSS 2007 | |
67 | Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang: RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218 | |
66 | Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen: Spam double-funnel: connecting web spammers with advertisers. WWW 2007: 291-300 | |
65 | Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang: Self-Healing Spyware: Detection, and Remediation. IEEE Transactions on Reliability 56(4): 588-596 (2007) | |
64 | Yi-Min Wang: Local Cluster First Load Sharing Policy for Heterogeneous Clusters. J. Inf. Sci. Eng. 23(2): 497-510 (2007) | |
2006 | ||
63 | Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma: Automated known problem diagnosis with event traces. EuroSys 2006: 375-388 | |
62 | Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang: Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38 | |
61 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch: SubVirt: Implementing malware with virtual machines. IEEE Symposium on Security and Privacy 2006: 314-327 | |
60 | Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang: LiveOps: Systems Management as a Service. LISA 2006: 187-203 | |
59 | Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006 | |
58 | Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev: Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. OSDI 2006: 117-130 | |
57 | Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo: A Stateful Approach to Spyware Detection and Removal. PRDC 2006: 173-182 | |
56 | Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee: Analyzing persistent state interactions to improve state management. SIGMETRICS/Performance 2006: 363-364 | |
55 | Xuxian Jiang, Dongyan Xu, Yi-Min Wang: Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distrib. Comput. 66(9): 1165-1180 (2006) | |
54 | Yi-Min Wang: Memory latency consideration for load sharing on heterogeneous network of workstations. Journal of Systems Architecture 52(1): 13-24 (2006) | |
2005 | ||
53 | Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski: Detecting Stealth Software with Strider GhostBuster. DSN 2005: 368-377 | |
52 | Yi-Min Wang, Doug Beck: Fast User-Mode Rootkit Scanner for the Enterprise. LISA 2005: 23-30 | |
51 | Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang: A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. NDSS 2005 | |
50 | Yi-Min Wang: Managing the Aladdin Home Networking System: An Experience Report. SEUS 2005: 25-29 | |
49 | Li Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer: A cone-based distributed topology-control algorithm for wireless multi-hop networks. IEEE/ACM Trans. Netw. 13(1): 147-159 (2005) | |
48 | Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang: More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. J. Inf. Sci. Eng. 21(2): 239-257 (2005) | |
2004 | ||
47 | Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen: Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. DSN 2004: 561-566 | |
46 | John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang: Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. ICAC 2004: 106-113 | |
45 | Emre Kycyman, Yi-Min Wang: Discovering Correctness Constraints for Self-Management of System Configuration. ICAC 2004: 28-35 | |
44 | Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang: Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194 | |
43 | Ni Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang: Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. LISA 2004: 151-158 | |
42 | Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang: Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. LISA 2004 | |
41 | Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46 | |
40 | Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: Automatic Misconfiguration Troubleshooting with PeerPressure. OSDI 2004: 245-258 | |
39 | Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: PeerPressure for automatic troubleshooting. SIGMETRICS 2004: 398-399 | |
38 | Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson: Summary-based routing for content-based event distribution networks. Computer Communication Review 34(5): 59-74 (2004) | |
37 | Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004) | |
2003 | ||
36 | Yi-Min Wang, Chad Verbowski, Daniel R. Simon: Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. DSN 2003: 311-316 | |
35 | Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172 | |
34 | Om P. Damani, Yi-Min Wang, Vijay K. Garg: Distributed recovery with K-optimistic logging. J. Parallel Distrib. Comput. 63(12): 1193-1218 (2003) | |
2002 | ||
33 | Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu: Statistical Identification of Encrypted Web Browsing Traffic. IEEE Symposium on Security and Privacy 2002: 19-30 | |
32 | Anish Arora, Rajesh Jagannathan, Yi-Min Wang: Model-Based Fault Detection in Powerline Networking. IPDPS 2002 | |
31 | E. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3): 375-408 (2002) | |
30 | Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer: Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks CoRR cs.NI/0209012: (2002) | |
2001 | ||
29 | Yi-Min Wang, Paramvir Bahl, Wilf Russell: The SIMBA User Alert Service Architecture for Dependable Alert Delivery. DSN 2001: 463-474 | |
28 | Roger Wattenhofer, Erran L. Li, Paramvir Bahl, Yi-Min Wang: Distributed Topology Control for Wireless Multihop Ad-hoc Networks. INFOCOM 2001: 1388-1397 | |
27 | Erran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer: Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks. PODC 2001: 264-273 | |
2000 | ||
26 | Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu: Towards Dependable Home Networking: An Experience Report. DSN 2000: 43-48 | |
25 | Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang: Hierarchical loop scheduling for clustered NUMA machines. Journal of Systems and Software 55(1): 33-44 (2000) | |
1999 | ||
24 | Jichiang Tsai, Yi-Min Wang, Sy-Yen Kuo: Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. Inf. Process. Lett. 69(1): 31-37 (1999) | |
1998 | ||
23 | Yi-Min Wang, Woei-Jyh Lee: COMERA: COM Extensible Remoting Architecture. COOTS 1998: 79-88 | |
22 | Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang: Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. IEEE Trans. Parallel Distrib. Syst. 9(10): 963-971 (1998) | |
21 | Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang: Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors. Journal of Systems and Software 44(1): 17-29 (1998) | |
1997 | ||
20 | Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy: Integrating Checkpointing with Transaction Processing. FTCS 1997: 304-308 | |
19 | Yi-Min Wang, Om P. Damani, Vijay K. Garg: Distributed Recovery with K-Optimistic Logging. ICDCS 1997: 0- | |
18 | Om P. Damani, Yi-Min Wang, Vijay K. Garg: Optimistic Distributed Simulation Based on Transitive Dependency Tracking. Workshop on Parallel and Distributed Simulation 1997: 90-97 | |
17 | Om P. Damani, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Yi-Min Wang: ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. Computer Networks 29(8-13): 1019-1027 (1997) | |
16 | Yi-Min Wang, Yennun Huang, W. Kent Fuchs, Chandra M. R. Kintala, Gaurav Suri: Progressive Retry for Software Failure Recovery in Message-Passing Applications. IEEE Trans. Computers 46(10): 1137-1141 (1997) | |
15 | Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang: Clustered affinity scheduling on large-scale NUMA multiprocessors. Journal of Systems and Software 39(1): 61-70 (1997) | |
1995 | ||
14 | Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pi-Yu Chung, Chandra M. R. Kintala: Checkpointing and Its Applications. FTCS 1995: 22-31 | |
13 | Yennun Huang, Yi-Min Wang: Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. FTCS 1995: 459-463 | |
12 | Yi-Min Wang: Maximum and Minimum Consistent Global Checkpoints and their Applications. SRDS 1995: 86-95 | |
11 | Yi-Min Wang, Pi-Yu Chung, In-Jen Lin, W. Kent Fuchs: Checkpoint Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems.. IEEE Trans. Parallel Distrib. Syst. 6(5): 546-554 (1995) | |
10 | Yi-Min Wang, Ruei-Chuan Chang: A Minimal Synchronization Overhead Affinity Scheduling Algorithm for Shared-Memory Multiprocessors. International Journal of High Speed Computing 7(2): 231-249 (1995) | |
1994 | ||
9 | Pi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj: Logic design error diagnosis and correction. IEEE Trans. VLSI Syst. 2(3): 320-332 (1994) | |
8 | Yi-Min Wang, Andy Lowry, W. Kent Fuchs: Consistent Global Checkpoints Based on Direct Dependency Tracking. Inf. Process. Lett. 50(4): 223-230 (1994) | |
7 | Yi-Min Wang, Pi-Yu Chung, W. Kent Fuchs: Scheduling for Periodic Concurrent Error Detection in Processor Arrays. J. Parallel Distrib. Comput. 23(3): 306-313 (1994) | |
1993 | ||
6 | Pi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj: Diagnosis and Correction of Logic Design Errors in Digital Circuits. DAC 1993: 503-508 | |
5 | Yi-Min Wang, Yennun Huang, W. Kent Fuchs: Progressive Retry for Software Error Recovery in Distributed Systems. FTCS 1993: 138-144 | |
4 | Yi-Min Wang: Reducing Message Logging Overhead for Log-based Recovery. ISCAS 1993: 1925-1928 | |
3 | Yi-Min Wang, W. Kent Fuchs: Lazy Checkpointing Coordination for Bounding Rollback Propagation. SRDS 1993: 78-85 | |
1992 | ||
2 | Yi-Min Wang, W. Kent Fuchs: Scheduling Message Processing for Reducing Rollback Propagation. FTCS 1992: 204-211 | |
1 | Yi-Min Wang, W. Kent Fuchs: Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems. SRDS 1992: 147-154 |