Yi-Min Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

73EEJichiang Tsai, Yi-Min Wang: Communication-Induced Checkpointing Protocols and Rollback-Dependency Trackability: A Survey. Wiley Encyclopedia of Computer Science and Engineering 2008
72EEXuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford: Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008)
71EEShuo Chen, David Ross, Yi-Min Wang: An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. ACM Conference on Computer and Communications Security 2007: 2-11
70EEYi-Min Wang, Ming Ma: Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine. ICAC 2007: 32
69EEJosé Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang: A Systematic Approach to Uncover Security Flaws in GUI Logic. IEEE Symposium on Security and Privacy 2007: 71-85
68EEYuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma: A Quantitative Study of Forum Spamming Using Context-based Analysis. NDSS 2007
67EEXuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang: RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218
66EEYi-Min Wang, Ming Ma, Yuan Niu, Hao Chen: Spam double-funnel: connecting web spammers with advertisers. WWW 2007: 291-300
65EEMing-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang: Self-Healing Spyware: Detection, and Remediation. IEEE Transactions on Reliability 56(4): 588-596 (2007)
64EEYi-Min Wang: Local Cluster First Load Sharing Policy for Heterogeneous Clusters. J. Inf. Sci. Eng. 23(2): 497-510 (2007)
63EEChun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma: Automated known problem diagnosis with event traces. EuroSys 2006: 375-388
62EEXuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang: Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38
61EESamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch: SubVirt: Implementing malware with virtual machines. IEEE Symposium on Security and Privacy 2006: 314-327
60EEChad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang: LiveOps: Systems Management as a Service. LISA 2006: 187-203
59EEYi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006
58EEChad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev: Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. OSDI 2006: 117-130
57EEMing-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo: A Stateful Approach to Spyware Detection and Removal. PRDC 2006: 173-182
56EEChad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee: Analyzing persistent state interactions to improve state management. SIGMETRICS/Performance 2006: 363-364
55EEXuxian Jiang, Dongyan Xu, Yi-Min Wang: Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distrib. Comput. 66(9): 1165-1180 (2006)
54EEYi-Min Wang: Memory latency consideration for load sharing on heterogeneous network of workstations. Journal of Systems Architecture 52(1): 13-24 (2006)
53EEYi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski: Detecting Stealth Software with Strider GhostBuster. DSN 2005: 368-377
52EEYi-Min Wang, Doug Beck: Fast User-Mode Rootkit Scanner for the Enterprise. LISA 2005: 23-30
51EEShuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang: A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. NDSS 2005
50EEYi-Min Wang: Managing the Aladdin Home Networking System: An Experience Report. SEUS 2005: 25-29
49EELi Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer: A cone-based distributed topology-control algorithm for wireless multi-hop networks. IEEE/ACM Trans. Netw. 13(1): 147-159 (2005)
48EEJichiang Tsai, Sy-Yen Kuo, Yi-Min Wang: More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. J. Inf. Sci. Eng. 21(2): 239-257 (2005)
47EEArchana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen: Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. DSN 2004: 561-566
46EEJohn Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang: Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. ICAC 2004: 106-113
45EEEmre Kycyman, Yi-Min Wang: Discovering Correctness Constraints for Self-Management of System Configuration. ICAC 2004: 28-35
44EEHelen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang: Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194
43EENi Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang: Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. LISA 2004: 151-158
42 Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang: Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. LISA 2004
41EEYi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46
40EEHelen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: Automatic Misconfiguration Troubleshooting with PeerPressure. OSDI 2004: 245-258
39EEHelen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: PeerPressure for automatic troubleshooting. SIGMETRICS 2004: 398-399
38EEYi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson: Summary-based routing for content-based event distribution networks. Computer Communication Review 34(5): 59-74 (2004)
37EEYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004)
36EEYi-Min Wang, Chad Verbowski, Daniel R. Simon: Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. DSN 2003: 311-316
35EEYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172
34EEOm P. Damani, Yi-Min Wang, Vijay K. Garg: Distributed recovery with K-optimistic logging. J. Parallel Distrib. Comput. 63(12): 1193-1218 (2003)
33EEQixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu: Statistical Identification of Encrypted Web Browsing Traffic. IEEE Symposium on Security and Privacy 2002: 19-30
32EEAnish Arora, Rajesh Jagannathan, Yi-Min Wang: Model-Based Fault Detection in Powerline Networking. IPDPS 2002
31EEE. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3): 375-408 (2002)
30EEErran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer: Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks CoRR cs.NI/0209012: (2002)
29EEYi-Min Wang, Paramvir Bahl, Wilf Russell: The SIMBA User Alert Service Architecture for Dependable Alert Delivery. DSN 2001: 463-474
28EERoger Wattenhofer, Erran L. Li, Paramvir Bahl, Yi-Min Wang: Distributed Topology Control for Wireless Multihop Ad-hoc Networks. INFOCOM 2001: 1388-1397
27EEErran L. Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer: Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks. PODC 2001: 264-273
26EEYi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu: Towards Dependable Home Networking: An Experience Report. DSN 2000: 43-48
25EEYi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang: Hierarchical loop scheduling for clustered NUMA machines. Journal of Systems and Software 55(1): 33-44 (2000)
24EEJichiang Tsai, Yi-Min Wang, Sy-Yen Kuo: Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. Inf. Process. Lett. 69(1): 31-37 (1999)
23EEYi-Min Wang, Woei-Jyh Lee: COMERA: COM Extensible Remoting Architecture. COOTS 1998: 79-88
22EEJichiang Tsai, Sy-Yen Kuo, Yi-Min Wang: Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. IEEE Trans. Parallel Distrib. Syst. 9(10): 963-971 (1998)
21EEYi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang: Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors. Journal of Systems and Software 44(1): 17-29 (1998)
20 Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy: Integrating Checkpointing with Transaction Processing. FTCS 1997: 304-308
19 Yi-Min Wang, Om P. Damani, Vijay K. Garg: Distributed Recovery with K-Optimistic Logging. ICDCS 1997: 0-
18EEOm P. Damani, Yi-Min Wang, Vijay K. Garg: Optimistic Distributed Simulation Based on Transitive Dependency Tracking. Workshop on Parallel and Distributed Simulation 1997: 90-97
17EEOm P. Damani, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Yi-Min Wang: ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. Computer Networks 29(8-13): 1019-1027 (1997)
16 Yi-Min Wang, Yennun Huang, W. Kent Fuchs, Chandra M. R. Kintala, Gaurav Suri: Progressive Retry for Software Failure Recovery in Message-Passing Applications. IEEE Trans. Computers 46(10): 1137-1141 (1997)
15EEYi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang: Clustered affinity scheduling on large-scale NUMA multiprocessors. Journal of Systems and Software 39(1): 61-70 (1997)
14 Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pi-Yu Chung, Chandra M. R. Kintala: Checkpointing and Its Applications. FTCS 1995: 22-31
13 Yennun Huang, Yi-Min Wang: Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. FTCS 1995: 459-463
12 Yi-Min Wang: Maximum and Minimum Consistent Global Checkpoints and their Applications. SRDS 1995: 86-95
11EEYi-Min Wang, Pi-Yu Chung, In-Jen Lin, W. Kent Fuchs: Checkpoint Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems.. IEEE Trans. Parallel Distrib. Syst. 6(5): 546-554 (1995)
10EEYi-Min Wang, Ruei-Chuan Chang: A Minimal Synchronization Overhead Affinity Scheduling Algorithm for Shared-Memory Multiprocessors. International Journal of High Speed Computing 7(2): 231-249 (1995)
9EEPi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj: Logic design error diagnosis and correction. IEEE Trans. VLSI Syst. 2(3): 320-332 (1994)
8 Yi-Min Wang, Andy Lowry, W. Kent Fuchs: Consistent Global Checkpoints Based on Direct Dependency Tracking. Inf. Process. Lett. 50(4): 223-230 (1994)
7 Yi-Min Wang, Pi-Yu Chung, W. Kent Fuchs: Scheduling for Periodic Concurrent Error Detection in Processor Arrays. J. Parallel Distrib. Comput. 23(3): 306-313 (1994)
6EEPi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj: Diagnosis and Correction of Logic Design Errors in Digital Circuits. DAC 1993: 503-508
5 Yi-Min Wang, Yennun Huang, W. Kent Fuchs: Progressive Retry for Software Error Recovery in Distributed Systems. FTCS 1993: 138-144
4 Yi-Min Wang: Reducing Message Logging Overhead for Log-based Recovery. ISCAS 1993: 1925-1928
3 Yi-Min Wang, W. Kent Fuchs: Lazy Checkpointing Coordination for Bounding Rollback Propagation. SRDS 1993: 78-85
2 Yi-Min Wang, W. Kent Fuchs: Scheduling Message Processing for Reducing Rollback Propagation. FTCS 1992: 204-211
1 Yi-Min Wang, W. Kent Fuchs: Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems. SRDS 1992: 147-154

Coauthor Index

1Dimitris Achlioptas [38]
2Lorenzo Alvisi [31]
3Anish Arora [26] [32]
4Paramvir Bahl (Victor Bahl) [27] [28] [29] [30] [49]
5Doug Beck [52] [53] [59]
6Florian P. Buchholz [62] [72]
7Ruei-Chuan Chang [10] [15] [21] [25]
8Hao Chen [66] [68]
9Peter M. Chen [61]
10Shuo Chen [51] [59] [71]
11Yu Chen [35] [37] [39] [40]
12P. Emerald Chung [17]
13Pi-Yu Chung [6] [7] [9] [11] [14] [20]
14Om P. Damani [17] [18] [19] [34]
15Brad Daniels [42] [46] [56] [58]
16Gautam Das [38]
17John Dunagan [35] [37] [42] [46] [51]
18E. N. Elnozahy (Elmootazbellah (Mootaz) Elnozahy) [20] [31]
19W. Kent Fuchs [1] [2] [3] [5] [7] [8] [11] [16]
20Archana Ganapathi [47]
21Vijay K. Garg [18] [19] [34]
22Ibrahim N. Hajj [6] [9]
23Joseph Y. Halpern [27] [30] [49]
24Francis Hsu [68]
25Yih-Chun Hu [44]
26Yennun Huang [5] [13] [14] [16] [17] [20] [41] [57] [65]
27Rajesh Jagannathan [26] [32]
28Xuxian Jiang [55] [59] [62] [67] [72]
29Aaron Johnson [41] [46]
30David B. Johnson [31]
31Emre Kiciman [56] [58]
32Samuel T. King [59] [61]
33Chandra M. R. Kintala [14] [16] [17]
34Arunvijay Kumar [58]
35Sy-Yen Kuo [22] [24] [41] [48] [57] [65]
36Emre Kycyman [45]
37Ni Lao [43] [47] [63]
38Per-Åke Larson (Paul Larson) [38]
39Adam Woei-Jyh Lee (Woei-Jyh Lee) [23]
40Juhan Lee [56] [58] [60]
41Erran L. Li (Li Li, Li (Erran) Li) [27] [28] [30]
42Jiwei Li [63]
43Li Li [49]
44In-Jen Lin [11]
45Xiaogang Liu [60]
46Jacob R. Lorch [61]
47Andy Lowry [8]
48Shan Lu [56] [58]
49Ming Ma [66] [68] [70]
50Wei-Ying Ma [43] [63]
51José Meseguer [69]
52Yuan Niu [66] [68]
53Venkata N. Padmanabhan [33]
54John C. Platt [39] [40]
55Lili Qiu [33] [38]
56David Ross [71]
57Roussi Roussev [41] [46] [53] [56] [58] [59] [60]
58Wilf Russell [26] [29] [33]
59Ralf Sasse [69]
60Daniel R. Simon [33] [36]
61Eugene H. Spafford [62] [72]
62Qixiang Sun [33]
63Gaurav Suri [16]
64Jichiang Tsai [22] [24] [48] [73]
65Chad Verbowski [35] [36] [37] [38] [41] [42] [46] [51] [53] [56] [58] [59] [60] [61]
66Binh Vo [53]
67Kiem-Phong Vo [14]
68Aaron Walters [62] [72]
69Helen J. Wang [35] [37] [39] [40] [44] [61] [67] [69]
70Hsiao-Hsi Wang [15] [21] [25]
71Roger Wattenhofer [27] [28] [30] [49]
72Ji-Rong Wen [43] [47] [63]
73Ming-Wei Wu [41] [57] [65]
74Dongyan Xu [55] [62] [67] [72]
75Jun Xu [26]
76Chun Yuan [35] [37] [44] [63]
77Ruyun Zhang [39] [40]
78Zheng Zhang [35] [37] [44] [63]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)