Helen J. Wang spends much of her time researching Computer network, Computer security, Operating system, Distributed computing and Volume. She combines subjects such as Wireless and Scalability with her study of Computer network. Her Computer security research incorporates themes from Protocol stack and Android.
Her study in the field of Reverse engineering also crosses realms of TRACE. Her Distributed computing research integrates issues from Overlay network and Pastry. The various areas that she examines in her Volume study include Control, Interface and Database.
Computer security, World Wide Web, Computer network, Web page and Data mining are her primary areas of study. Her work in the fields of Computer security, such as Exploit, intersects with other areas such as Permission. Her research investigates the connection between World Wide Web and topics such as Access control that intersect with issues in Server and Authorization.
Helen J. Wang has included themes like Scalability, Distributed computing, Mesh networking and Wireless mesh network in her Computer network study. Her studies in Scalability integrate themes in fields like Virtual network and Multiple description coding. Helen J. Wang works mostly in the field of Data mining, limiting it down to topics relating to Troubleshooting and, in certain cases, Technical support, State, Overlay network and Key.
Her World Wide Web research is multidisciplinary, incorporating elements of Computer security, Android and Software deployment. Her Exploit and Discretionary access control study, which is part of a larger body of work in Computer security, is frequently linked to Permission, bridging the gap between disciplines. Her Information sensitivity research incorporates elements of Overhead, Face, Set, Granularity and Visualization.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Distributing streaming media content using cooperative networking
Venkata N. Padmanabhan;Helen J. Wang;Philip A. Chou;Kunwadee Sripanidkulchai.
network and operating system support for digital audio and video (2002)
Joseph M. Hellerstein;Peter J. Haas;Helen J. Wang.
international conference on management of data (1997)
SecondNet: a data center network virtualization architecture with bandwidth guarantees
Chuanxiong Guo;Guohan Lu;Helen J. Wang;Shuang Yang.
conference on emerging network experiment and technology (2010)
Policy-enabled handoffs across heterogeneous wireless networks
H.J. Wang;R.H. Katz;J. Giese.
workshop on mobile computing systems and applications (1999)
Permission re-delegation: attacks and defenses
Adrienne Porter Felt;Helen J. Wang;Alexander Moshchuk;Steven Hanna.
usenix security symposium (2011)
Resilient peer-to-peer streaming
V.N. Padmanabhan;H.J. Wang;P.A. Chou.
international conference on network protocols (2003)
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
Helen J. Wang;Chuanxiong Guo;Daniel R. Simon;Alf Zugenmaier.
acm special interest group on data communication (2004)
Discoverer: automatic protocol reverse engineering from network traces
Weidong Cui;Jayanthkumar Kannan;Helen J. Wang.
usenix security symposium (2007)
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M. Castro;M. B. Jones;A.-M. Kermarrec;A. Rowstron.
international conference on computer communications (2003)
Enabling security in cloud storage SLAs with CloudProof
Raluca Ada Popa;Jacob R. Lorch;David Molnar;Helen J. Wang.
usenix annual technical conference (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: