Helen J. Wang spends much of her time researching Computer network, Computer security, Operating system, Distributed computing and Volume. She combines subjects such as Wireless and Scalability with her study of Computer network. Her Computer security research incorporates themes from Protocol stack and Android.
Her study in the field of Reverse engineering also crosses realms of TRACE. Her Distributed computing research integrates issues from Overlay network and Pastry. The various areas that she examines in her Volume study include Control, Interface and Database.
Computer security, World Wide Web, Computer network, Web page and Data mining are her primary areas of study. Her work in the fields of Computer security, such as Exploit, intersects with other areas such as Permission. Her research investigates the connection between World Wide Web and topics such as Access control that intersect with issues in Server and Authorization.
Helen J. Wang has included themes like Scalability, Distributed computing, Mesh networking and Wireless mesh network in her Computer network study. Her studies in Scalability integrate themes in fields like Virtual network and Multiple description coding. Helen J. Wang works mostly in the field of Data mining, limiting it down to topics relating to Troubleshooting and, in certain cases, Technical support, State, Overlay network and Key.
Her primary areas of study are Augmented reality, Human–computer interaction, Multimedia, World Wide Web and Abstraction. Helen J. Wang has researched Augmented reality in several fields, including Role-based access control, Computer access control, Access control, Certificate and Key. Her studies examine the connections between Multimedia and genetics, as well as such issues in Rendering, with regards to Web content, JavaScript, Gesture, User privacy and Operating system.
Her World Wide Web research is multidisciplinary, incorporating elements of Computer security, Android and Software deployment. Her Exploit and Discretionary access control study, which is part of a larger body of work in Computer security, is frequently linked to Permission, bridging the gap between disciplines. Her Information sensitivity research incorporates elements of Overhead, Face, Set, Granularity and Visualization.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Distributing streaming media content using cooperative networking
Venkata N. Padmanabhan;Helen J. Wang;Philip A. Chou;Kunwadee Sripanidkulchai.
network and operating system support for digital audio and video (2002)
Online aggregation
Joseph M. Hellerstein;Peter J. Haas;Helen J. Wang.
international conference on management of data (1997)
SecondNet: a data center network virtualization architecture with bandwidth guarantees
Chuanxiong Guo;Guohan Lu;Helen J. Wang;Shuang Yang.
conference on emerging network experiment and technology (2010)
Policy-enabled handoffs across heterogeneous wireless networks
H.J. Wang;R.H. Katz;J. Giese.
workshop on mobile computing systems and applications (1999)
Permission re-delegation: attacks and defenses
Adrienne Porter Felt;Helen J. Wang;Alexander Moshchuk;Steven Hanna.
usenix security symposium (2011)
Resilient peer-to-peer streaming
V.N. Padmanabhan;H.J. Wang;P.A. Chou.
international conference on network protocols (2003)
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
Helen J. Wang;Chuanxiong Guo;Daniel R. Simon;Alf Zugenmaier.
acm special interest group on data communication (2004)
Discoverer: automatic protocol reverse engineering from network traces
Weidong Cui;Jayanthkumar Kannan;Helen J. Wang.
usenix security symposium (2007)
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M. Castro;M. B. Jones;A.-M. Kermarrec;A. Rowstron.
international conference on computer communications (2003)
Enabling security in cloud storage SLAs with CloudProof
Raluca Ada Popa;Jacob R. Lorch;David Molnar;Helen J. Wang.
usenix annual technical conference (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Microsoft (United States)
Microsoft (United States)
Microsoft (United States)
University of California, Berkeley
Microsoft (United States)
Microsoft (United States)
Microsoft (United States)
ByteDance
University of Washington
Google (United States)
Brigham Young University
Harvard University
Kent State University
Macquarie University
Oak Ridge National Laboratory
Peking University
Nord University
University of Queensland
University of Zurich
University of California, Riverside
University of Hong Kong
University of Chile
Queensland University of Technology
Medical College of Wisconsin
Simon Fraser University
Georgetown University