2008 |
73 | EE | Jichiang Tsai,
Yi-Min Wang:
Communication-Induced Checkpointing Protocols and Rollback-Dependency Trackability: A Survey.
Wiley Encyclopedia of Computer Science and Engineering 2008 |
72 | EE | Xuxian Jiang,
Florian P. Buchholz,
Aaron Walters,
Dongyan Xu,
Yi-Min Wang,
Eugene H. Spafford:
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008) |
2007 |
71 | EE | Shuo Chen,
David Ross,
Yi-Min Wang:
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism.
ACM Conference on Computer and Communications Security 2007: 2-11 |
70 | EE | Yi-Min Wang,
Ming Ma:
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine.
ICAC 2007: 32 |
69 | EE | José Meseguer,
Ralf Sasse,
Helen J. Wang,
Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic.
IEEE Symposium on Security and Privacy 2007: 71-85 |
68 | EE | Yuan Niu,
Hao Chen,
Francis Hsu,
Yi-Min Wang,
Ming Ma:
A Quantitative Study of Forum Spamming Using Context-based Analysis.
NDSS 2007 |
67 | EE | Xuxian Jiang,
Helen J. Wang,
Dongyan Xu,
Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
SRDS 2007: 209-218 |
66 | EE | Yi-Min Wang,
Ming Ma,
Yuan Niu,
Hao Chen:
Spam double-funnel: connecting web spammers with advertisers.
WWW 2007: 291-300 |
65 | EE | Ming-Wei Wu,
Yi-Min Wang,
Sy-Yen Kuo,
Yennun Huang:
Self-Healing Spyware: Detection, and Remediation.
IEEE Transactions on Reliability 56(4): 588-596 (2007) |
64 | EE | Yi-Min Wang:
Local Cluster First Load Sharing Policy for Heterogeneous Clusters.
J. Inf. Sci. Eng. 23(2): 497-510 (2007) |
2006 |
63 | EE | Chun Yuan,
Ni Lao,
Ji-Rong Wen,
Jiwei Li,
Zheng Zhang,
Yi-Min Wang,
Wei-Ying Ma:
Automated known problem diagnosis with event traces.
EuroSys 2006: 375-388 |
62 | EE | Xuxian Jiang,
Aaron Walters,
Dongyan Xu,
Eugene H. Spafford,
Florian P. Buchholz,
Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
ICDCS 2006: 38 |
61 | EE | Samuel T. King,
Peter M. Chen,
Yi-Min Wang,
Chad Verbowski,
Helen J. Wang,
Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines.
IEEE Symposium on Security and Privacy 2006: 314-327 |
60 | EE | Chad Verbowski,
Juhan Lee,
Xiaogang Liu,
Roussi Roussev,
Yi-Min Wang:
LiveOps: Systems Management as a Service.
LISA 2006: 187-203 |
59 | EE | Yi-Min Wang,
Doug Beck,
Xuxian Jiang,
Roussi Roussev,
Chad Verbowski,
Shuo Chen,
Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
NDSS 2006 |
58 | EE | Chad Verbowski,
Emre Kiciman,
Arunvijay Kumar,
Brad Daniels,
Shan Lu,
Juhan Lee,
Yi-Min Wang,
Roussi Roussev:
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management.
OSDI 2006: 117-130 |
57 | EE | Ming-Wei Wu,
Yennun Huang,
Yi-Min Wang,
Sy-Yen Kuo:
A Stateful Approach to Spyware Detection and Removal.
PRDC 2006: 173-182 |
56 | EE | Chad Verbowski,
Emre Kiciman,
Brad Daniels,
Yi-Min Wang,
Roussi Roussev,
Shan Lu,
Juhan Lee:
Analyzing persistent state interactions to improve state management.
SIGMETRICS/Performance 2006: 363-364 |
55 | EE | Xuxian Jiang,
Dongyan Xu,
Yi-Min Wang:
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distrib. Comput. 66(9): 1165-1180 (2006) |
54 | EE | Yi-Min Wang:
Memory latency consideration for load sharing on heterogeneous network of workstations.
Journal of Systems Architecture 52(1): 13-24 (2006) |
2005 |
53 | EE | Yi-Min Wang,
Doug Beck,
Binh Vo,
Roussi Roussev,
Chad Verbowski:
Detecting Stealth Software with Strider GhostBuster.
DSN 2005: 368-377 |
52 | EE | Yi-Min Wang,
Doug Beck:
Fast User-Mode Rootkit Scanner for the Enterprise.
LISA 2005: 23-30 |
51 | EE | Shuo Chen,
John Dunagan,
Chad Verbowski,
Yi-Min Wang:
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
NDSS 2005 |
50 | EE | Yi-Min Wang:
Managing the Aladdin Home Networking System: An Experience Report.
SEUS 2005: 25-29 |
49 | EE | Li Li,
Joseph Y. Halpern,
Paramvir Bahl,
Yi-Min Wang,
Roger Wattenhofer:
A cone-based distributed topology-control algorithm for wireless multi-hop networks.
IEEE/ACM Trans. Netw. 13(1): 147-159 (2005) |
48 | EE | Jichiang Tsai,
Sy-Yen Kuo,
Yi-Min Wang:
More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability.
J. Inf. Sci. Eng. 21(2): 239-257 (2005) |
2004 |
47 | EE | Archana Ganapathi,
Yi-Min Wang,
Ni Lao,
Ji-Rong Wen:
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems.
DSN 2004: 561-566 |
46 | EE | John Dunagan,
Roussi Roussev,
Brad Daniels,
Aaron Johnson,
Chad Verbowski,
Yi-Min Wang:
Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests.
ICAC 2004: 106-113 |
45 | EE | Emre Kycyman,
Yi-Min Wang:
Discovering Correctness Constraints for Self-Management of System Configuration.
ICAC 2004: 28-35 |
44 | EE | Helen J. Wang,
Yih-Chun Hu,
Chun Yuan,
Zheng Zhang,
Yi-Min Wang:
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
IPTPS 2004: 184-194 |
43 | EE | Ni Lao,
Ji-Rong Wen,
Wei-Ying Ma,
Yi-Min Wang:
Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis.
LISA 2004: 151-158 |
42 | | Chad Verbowski,
John Dunagan,
Brad Daniels,
Yi-Min Wang:
Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration.
LISA 2004 |
41 | EE | Yi-Min Wang,
Roussi Roussev,
Chad Verbowski,
Aaron Johnson,
Ming-Wei Wu,
Yennun Huang,
Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
LISA 2004: 33-46 |
40 | EE | Helen J. Wang,
John C. Platt,
Yu Chen,
Ruyun Zhang,
Yi-Min Wang:
Automatic Misconfiguration Troubleshooting with PeerPressure.
OSDI 2004: 245-258 |
39 | EE | Helen J. Wang,
John C. Platt,
Yu Chen,
Ruyun Zhang,
Yi-Min Wang:
PeerPressure for automatic troubleshooting.
SIGMETRICS 2004: 398-399 |
38 | EE | Yi-Min Wang,
Lili Qiu,
Chad Verbowski,
Dimitris Achlioptas,
Gautam Das,
Per-Åke Larson:
Summary-based routing for content-based event distribution networks.
Computer Communication Review 34(5): 59-74 (2004) |
37 | EE | Yi-Min Wang,
Chad Verbowski,
John Dunagan,
Yu Chen,
Helen J. Wang,
Chun Yuan,
Zheng Zhang:
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program. 53(2): 143-164 (2004) |
2003 |
36 | EE | Yi-Min Wang,
Chad Verbowski,
Daniel R. Simon:
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.
DSN 2003: 311-316 |
35 | EE | Yi-Min Wang,
Chad Verbowski,
John Dunagan,
Yu Chen,
Helen J. Wang,
Chun Yuan,
Zheng Zhang:
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support.
LISA 2003: 159-172 |
34 | EE | Om P. Damani,
Yi-Min Wang,
Vijay K. Garg:
Distributed recovery with K-optimistic logging.
J. Parallel Distrib. Comput. 63(12): 1193-1218 (2003) |
2002 |
33 | EE | Qixiang Sun,
Daniel R. Simon,
Yi-Min Wang,
Wilf Russell,
Venkata N. Padmanabhan,
Lili Qiu:
Statistical Identification of Encrypted Web Browsing Traffic.
IEEE Symposium on Security and Privacy 2002: 19-30 |
32 | EE | Anish Arora,
Rajesh Jagannathan,
Yi-Min Wang:
Model-Based Fault Detection in Powerline Networking.
IPDPS 2002 |
31 | EE | E. N. Elnozahy,
Lorenzo Alvisi,
Yi-Min Wang,
David B. Johnson:
A survey of rollback-recovery protocols in message-passing systems.
ACM Comput. Surv. 34(3): 375-408 (2002) |
30 | EE | Erran L. Li,
Joseph Y. Halpern,
Paramvir Bahl,
Yi-Min Wang,
Roger Wattenhofer:
Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks
CoRR cs.NI/0209012: (2002) |
2001 |
29 | EE | Yi-Min Wang,
Paramvir Bahl,
Wilf Russell:
The SIMBA User Alert Service Architecture for Dependable Alert Delivery.
DSN 2001: 463-474 |
28 | EE | Roger Wattenhofer,
Erran L. Li,
Paramvir Bahl,
Yi-Min Wang:
Distributed Topology Control for Wireless Multihop Ad-hoc Networks.
INFOCOM 2001: 1388-1397 |
27 | EE | Erran L. Li,
Joseph Y. Halpern,
Paramvir Bahl,
Yi-Min Wang,
Roger Wattenhofer:
Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks.
PODC 2001: 264-273 |
2000 |
26 | EE | Yi-Min Wang,
Wilf Russell,
Anish Arora,
Rajesh Jagannathan,
Jun Xu:
Towards Dependable Home Networking: An Experience Report.
DSN 2000: 43-48 |
25 | EE | Yi-Min Wang,
Hsiao-Hsi Wang,
Ruei-Chuan Chang:
Hierarchical loop scheduling for clustered NUMA machines.
Journal of Systems and Software 55(1): 33-44 (2000) |
1999 |
24 | EE | Jichiang Tsai,
Yi-Min Wang,
Sy-Yen Kuo:
Evaluations of Domino-Free Communication-Induced Checkpointing Protocols.
Inf. Process. Lett. 69(1): 31-37 (1999) |
1998 |
23 | EE | Yi-Min Wang,
Woei-Jyh Lee:
COMERA: COM Extensible Remoting Architecture.
COOTS 1998: 79-88 |
22 | EE | Jichiang Tsai,
Sy-Yen Kuo,
Yi-Min Wang:
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability.
IEEE Trans. Parallel Distrib. Syst. 9(10): 963-971 (1998) |
21 | EE | Yi-Min Wang,
Hsiao-Hsi Wang,
Ruei-Chuan Chang:
Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors.
Journal of Systems and Software 44(1): 17-29 (1998) |
1997 |
20 | | Yi-Min Wang,
Pi-Yu Chung,
Yennun Huang,
E. N. Elnozahy:
Integrating Checkpointing with Transaction Processing.
FTCS 1997: 304-308 |
19 | | Yi-Min Wang,
Om P. Damani,
Vijay K. Garg:
Distributed Recovery with K-Optimistic Logging.
ICDCS 1997: 0- |
18 | EE | Om P. Damani,
Yi-Min Wang,
Vijay K. Garg:
Optimistic Distributed Simulation Based on Transitive Dependency Tracking.
Workshop on Parallel and Distributed Simulation 1997: 90-97 |
17 | EE | Om P. Damani,
P. Emerald Chung,
Yennun Huang,
Chandra M. R. Kintala,
Yi-Min Wang:
ONE-IP: Techniques for Hosting a Service on a Cluster of Machines.
Computer Networks 29(8-13): 1019-1027 (1997) |
16 | | Yi-Min Wang,
Yennun Huang,
W. Kent Fuchs,
Chandra M. R. Kintala,
Gaurav Suri:
Progressive Retry for Software Failure Recovery in Message-Passing Applications.
IEEE Trans. Computers 46(10): 1137-1141 (1997) |
15 | EE | Yi-Min Wang,
Hsiao-Hsi Wang,
Ruei-Chuan Chang:
Clustered affinity scheduling on large-scale NUMA multiprocessors.
Journal of Systems and Software 39(1): 61-70 (1997) |
1995 |
14 | | Yi-Min Wang,
Yennun Huang,
Kiem-Phong Vo,
Pi-Yu Chung,
Chandra M. R. Kintala:
Checkpointing and Its Applications.
FTCS 1995: 22-31 |
13 | | Yennun Huang,
Yi-Min Wang:
Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems.
FTCS 1995: 459-463 |
12 | | Yi-Min Wang:
Maximum and Minimum Consistent Global Checkpoints and their Applications.
SRDS 1995: 86-95 |
11 | EE | Yi-Min Wang,
Pi-Yu Chung,
In-Jen Lin,
W. Kent Fuchs:
Checkpoint Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems..
IEEE Trans. Parallel Distrib. Syst. 6(5): 546-554 (1995) |
10 | EE | Yi-Min Wang,
Ruei-Chuan Chang:
A Minimal Synchronization Overhead Affinity Scheduling Algorithm for Shared-Memory Multiprocessors.
International Journal of High Speed Computing 7(2): 231-249 (1995) |
1994 |
9 | EE | Pi-Yu Chung,
Yi-Min Wang,
Ibrahim N. Hajj:
Logic design error diagnosis and correction.
IEEE Trans. VLSI Syst. 2(3): 320-332 (1994) |
8 | | Yi-Min Wang,
Andy Lowry,
W. Kent Fuchs:
Consistent Global Checkpoints Based on Direct Dependency Tracking.
Inf. Process. Lett. 50(4): 223-230 (1994) |
7 | | Yi-Min Wang,
Pi-Yu Chung,
W. Kent Fuchs:
Scheduling for Periodic Concurrent Error Detection in Processor Arrays.
J. Parallel Distrib. Comput. 23(3): 306-313 (1994) |
1993 |
6 | EE | Pi-Yu Chung,
Yi-Min Wang,
Ibrahim N. Hajj:
Diagnosis and Correction of Logic Design Errors in Digital Circuits.
DAC 1993: 503-508 |
5 | | Yi-Min Wang,
Yennun Huang,
W. Kent Fuchs:
Progressive Retry for Software Error Recovery in Distributed Systems.
FTCS 1993: 138-144 |
4 | | Yi-Min Wang:
Reducing Message Logging Overhead for Log-based Recovery.
ISCAS 1993: 1925-1928 |
3 | | Yi-Min Wang,
W. Kent Fuchs:
Lazy Checkpointing Coordination for Bounding Rollback Propagation.
SRDS 1993: 78-85 |
1992 |
2 | | Yi-Min Wang,
W. Kent Fuchs:
Scheduling Message Processing for Reducing Rollback Propagation.
FTCS 1992: 204-211 |
1 | | Yi-Min Wang,
W. Kent Fuchs:
Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems.
SRDS 1992: 147-154 |