H
Helen J. Wang
Researcher at Microsoft
Publications - 71
Citations - 7219
Helen J. Wang is an academic researcher from Microsoft. The author has contributed to research in topics: Web page & Troubleshooting. The author has an hindex of 37, co-authored 71 publications receiving 6988 citations.
Papers
More filters
Proceedings ArticleDOI
Distributing streaming media content using cooperative networking
TL;DR: This work considers the problem that arises when the server is overwhelmed by the volume of requests from its clients, and proposes Cooperative Networking (CoopNet), where clients cooperate to distribute content, thereby alleviating the load on the server.
Proceedings ArticleDOI
SecondNet: a data center network virtualization architecture with bandwidth guarantees
Chuanxiong Guo,Guohan Lu,Helen J. Wang,Shuang Yang,Chao Kong,Peng Sun,Wenfei Wu,Yongguang Zhang +7 more
TL;DR: This paper proposes virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud and introduces a centralized VDC allocation algorithm for bandwidth guaranteed virtual to physical mapping.
Proceedings Article
Permission re-delegation: attacks and defenses
TL;DR: IPC Inspection prevents opportunities for permission redelegation by reducing an application's permissions after it receives communication from a less privileged application, and it is shown that it prevents the attacks found in the Android system applications.
Proceedings ArticleDOI
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
TL;DR: An examination of a sample set of known vulnerabilities suggests that Shield could be used to prevent exploitation of a substantial fraction of the most dangerous ones, and it is shown that this concept is feasible by describing a prototype Shield framework implementation that filters traffic above the transport layer.
Proceedings Article
Discoverer: automatic protocol reverse engineering from network traces
TL;DR: The efficacy of Discoverer is evaluated over one text protocol (HTTP) and two binary protocols (RPC and CIFS/SMB) by comparing the authors' inferred formats with true formats obtained from Ethereal.