default search action
Yi-Min Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Ying Yang, Yi-Min Wang, Chun-Hung Richard Lin, Chi-Yung Cheng, Chi-Ming Tsai, Ying-Hsien Huang, Tien-Yu Chen, I-Min Chiu:
Explainable deep learning model to predict invasive bacterial infection in febrile young infants: A retrospective study. Int. J. Medical Informatics 172: 105007 (2023) - 2022
- [c64]Yi-Jang Hsu, Yu-Ting Lai, Hsuan-Ming Kuo, Yi-Min Wang, Yinchieh Lai:
Spectral Transmission Background Tunability of a Micro-Ring Resonator via Coherent Feedback. OECC/PSC 2022: 1-3
2010 – 2019
- 2014
- [c63]Ahmed Hassan Awadallah, Ryen W. White, Patrick Pantel, Susan T. Dumais, Yi-Min Wang:
Supporting Complex Search Tasks. CIKM 2014: 829-838 - [c62]Ahmed Hassan Awadallah, Ryen W. White, Susan T. Dumais, Yi-Min Wang:
Struggling or exploring?: disambiguating long search sessions. WSDM 2014: 53-62 - 2013
- [c61]Ahmed Hassan Awadallah, Ryen W. White, Yi-Min Wang:
Toward self-correcting search engines: using underperforming queries to improve search. SIGIR 2013: 263-272 - [c60]Youngho Kim, Ahmed Hassan Awadallah, Ryen W. White, Yi-Min Wang:
Playing by the rules: mining query associations to predict search performance. WSDM 2013: 133-142 - 2012
- [c59]Chao Liu, Yi-Min Wang:
On the connections between explicit semantic analysis and latent semantic analysis. CIKM 2012: 1804-1808 - [c58]Chao Liu, Yi-Min Wang:
TrueLabel + Confusions: A Spectrum of Probabilistic Models in Analyzing Multiple Ratings. ICML 2012 - [c57]Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang, Yi-Min Wang:
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. NDSS 2012 - [i2]Chao Liu, Yi-Min Wang:
TrueLabel + Confusions: A Spectrum of Probabilistic Models in Analyzing Multiple Ratings. CoRR abs/1206.4606 (2012) - 2011
- [c56]Abhinav Pathak, Y. Charlie Hu, Ming Zhang, Paramvir Bahl, Yi-Min Wang:
Fine-grained power modeling for smartphones using system call tracing. EuroSys 2011: 153-168 - 2010
- [c55]Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert G. Greenberg, Yi-Min Wang:
WebProphet: Automating Performance Prediction for Web Services. NSDI 2010: 143-158 - [c54]Chao Liu, Hung-chih Yang, Jinliang Fan, Li-wei He, Yi-Min Wang:
Distributed nonnegative matrix factorization for web-scale dyadic data analysis on mapreduce. WWW 2010: 681-690
2000 – 2009
- 2009
- [c53]Chao Liu, Mei Li, Yi-Min Wang:
Post-rank reordering: resolving preference misalignments between search engines and end users. CIKM 2009: 641-650 - [c52]Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang:
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. SP 2009: 347-359 - 2008
- [j27]Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford:
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distributed Syst. 19(7): 890-902 (2008) - [p1]Jichiang Tsai, Yi-Min Wang:
Communication-Induced Checkpointing Protocols and Rollback-Dependency Trackability: A Survey. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j26]Yi-Min Wang:
Local Cluster First Load Sharing Policy for Heterogeneous Clusters. J. Inf. Sci. Eng. 23(2): 497-510 (2007) - [j25]Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang:
Self-Healing Spyware: Detection, and Remediation. IEEE Trans. Reliab. 56(4): 588-596 (2007) - [c51]Shuo Chen, David Ross, Yi-Min Wang:
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. CCS 2007: 2-11 - [c50]Yi-Min Wang, Ming Ma:
Strider Search Ranger: Towards an Autonomic Anti-Spam Search Engine. ICAC 2007: 32 - [c49]Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma:
A Quantitative Study of Forum Spamming Using Context-based Analysis. NDSS 2007 - [c48]José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic. S&P 2007: 71-85 - [c47]Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218 - [c46]Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen:
Spam double-funnel: connecting web spammers with advertisers. WWW 2007: 291-300 - 2006
- [j24]Xuxian Jiang, Dongyan Xu, Yi-Min Wang:
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distributed Comput. 66(9): 1165-1180 (2006) - [j23]Yi-Min Wang:
Memory latency consideration for load sharing on heterogeneous network of workstations. J. Syst. Archit. 52(1): 13-24 (2006) - [c45]Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma:
Automated known problem diagnosis with event traces. EuroSys 2006: 375-388 - [c44]Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38 - [c43]Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang:
LiveOps: Systems Management as a Service. LISA 2006: 187-203 - [c42]Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006 - [c41]Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev:
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. OSDI 2006: 117-130 - [c40]Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo:
A Stateful Approach to Spyware Detection and Removal. PRDC 2006: 173-182 - [c39]Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee:
Analyzing persistent state interactions to improve state management. SIGMETRICS/Performance 2006: 363-364 - [c38]Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines. S&P 2006: 314-327 - [c37]Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, Brad Daniels:
Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting. SRUTI 2006 - 2005
- [j22]Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang:
More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. J. Inf. Sci. Eng. 21(2): 239-257 (2005) - [j21]Li (Erran) Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer:
A cone-based distributed topology-control algorithm for wireless multi-hop networks. IEEE/ACM Trans. Netw. 13(1): 147-159 (2005) - [c36]Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski:
Detecting Stealth Software with Strider GhostBuster. DSN 2005: 368-377 - [c35]Yi-Min Wang, Doug Beck:
Fast User-Mode Rootkit Scanner for the Enterprise. LISA 2005: 23-30 - [c34]Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang:
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. NDSS 2005 - [c33]Yi-Min Wang:
Managing the Aladdin Home Networking System: An Experience Report. SEUS 2005: 25-29 - 2004
- [j20]Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson:
Summary-based routing for content-based event distribution networks. Comput. Commun. Rev. 34(5): 59-74 (2004) - [j19]Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang:
Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004) - [c32]Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen:
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. DSN 2004: 561-566 - [c31]Emre Kycyman, Yi-Min Wang:
Discovering Correctness Constraints for Self-Management of System Configuration. ICAC 2004: 28-35 - [c30]John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang:
Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. ICAC 2004: 106-113 - [c29]Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang:
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194 - [c28]Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46 - [c27]Ni Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang:
Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. LISA 2004: 151-158 - [c26]Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang:
Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. LISA 2004 - [c25]Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang:
Automatic Misconfiguration Troubleshooting with PeerPressure. OSDI 2004: 245-258 - [c24]Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang:
PeerPressure for automatic troubleshooting. SIGMETRICS 2004: 398-399 - 2003
- [j18]Om P. Damani, Yi-Min Wang, Vijay K. Garg:
Distributed recovery with K-optimistic logging. J. Parallel Distributed Comput. 63(12): 1193-1218 (2003) - [c23]Yi-Min Wang, Chad Verbowski, Daniel R. Simon:
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. DSN 2003: 311-316 - [c22]Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang:
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172 - 2002
- [j17]E. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson:
A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3): 375-408 (2002) - [j16]Paramvir Bahl, Wilf Russell, Yi-Min Wang, Anand Balachandran, Geoffrey M. Voelker, Allen Miu:
PAWNs: Satisfying the need for ubiquitos secure connectivity and location services. IEEE Wirel. Commun. 9(1): 40-48 (2002) - [c21]Anish Arora, Rajesh Jagannathan, Yi-Min Wang:
Model-Based Fault Detection in Powerline Networking. IPDPS 2002 - [c20]Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu:
Statistical Identification of Encrypted Web Browsing Traffic. S&P 2002: 19-30 - [i1]Li Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer:
Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks. CoRR cs.NI/0209012 (2002) - 2001
- [c19]Yi-Min Wang, Paramvir Bahl, Wilf Russell:
The SIMBA User Alert Service Architecture for Dependable Alert Delivery. DSN 2001: 463-474 - [c18]Roger Wattenhofer, Li Li, Paramvir Bahl, Yi-Min Wang:
Distributed Topology Control for Wireless Multihop Ad-hoc Networks. INFOCOM 2001: 1388-1397 - [c17]Li Li, Joseph Y. Halpern, Paramvir Bahl, Yi-Min Wang, Roger Wattenhofer:
Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks. PODC 2001: 264-273 - [e1]Rajendra Raj, Yi-Min Wang:
6th USENIX Conference on Object-Oriented Technologies and Systems, January 29 - February 2, 2001, San Antonio, Texas, USA. USENIX 2001 [contents] - 2000
- [j15]Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang:
Hierarchical loop scheduling for clustered NUMA machines. J. Syst. Softw. 55(1): 33-44 (2000) - [c16]Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu:
Towards Dependable Home Networking: An Experience Report. DSN 2000: 43-48
1990 – 1999
- 1999
- [j14]Jichiang Tsai, Yi-Min Wang, Sy-Yen Kuo:
Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. Inf. Process. Lett. 69(1): 31-37 (1999) - 1998
- [j13]Yi-Min Wang, Pi-Yu Emerald Chung:
Customization of distributed systems using COM. IEEE Concurr. 6(3): 8-12 (1998) - [j12]Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang:
Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors. J. Syst. Softw. 44(1): 17-29 (1998) - [j11]Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang:
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. IEEE Trans. Parallel Distributed Syst. 9(10): 963-971 (1998) - [c15]Yi-Min Wang, Woei-Jyh Lee:
COMERA: COM Extensible Remoting Architecture. COOTS 1998: 79-88 - 1997
- [j10]Om P. Damani, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Yi-Min Wang:
ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. Comput. Networks 29(8-13): 1019-1027 (1997) - [j9]Yi-Min Wang, Hsiao-Hsi Wang, Ruei-Chuan Chang:
Clustered affinity scheduling on large-scale NUMA multiprocessors. J. Syst. Softw. 39(1): 61-70 (1997) - [j8]Yi-Min Wang, Yennun Huang, W. Kent Fuchs, Chandra M. R. Kintala, Gaurav Suri:
Progressive Retry for Software Failure Recovery in Message-Passing Applications. IEEE Trans. Computers 46(10): 1137-1141 (1997) - [c14]Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy:
Integrating Checkpointing with Transaction Processing. FTCS 1997: 304-308 - [c13]Yi-Min Wang, Om P. Damani, Vijay K. Garg:
Distributed Recovery with K-Optimistic Logging. ICDCS 1997: 60-67 - [c12]Kiem-Phong Vo, Yi-Min Wang, P. Emerald Chung, Yennun Huang:
Xept: a software instrumentation method for exception handling. ISSRE 1997: 60-69 - [c11]Om P. Damani, Yi-Min Wang, Vijay K. Garg:
Optimistic Distributed Simulation Based on Transitive Dependency Tracking. Workshop on Parallel and Distributed Simulation 1997: 90-97 - 1996
- [j7]Yennun Huang, Chandra M. R. Kintala, Lawrence Bernstein, Yi-Min Wang:
Components for software fault tolerance and rejuvenation. AT&T Tech. J. 75(2): 29-37 (1996) - 1995
- [j6]Yi-Min Wang, Ruei-Chuan Chang:
A Minimal Synchronization Overhead Affinity Scheduling Algorithm for Shared-Memory Multiprocessors. Int. J. High Speed Comput. 7(2): 231-249 (1995) - [j5]Yi-Min Wang, Pi-Yu Chung, In-Jen Lin, W. Kent Fuchs:
Checkpoint Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems.. IEEE Trans. Parallel Distributed Syst. 6(5): 546-554 (1995) - [c10]Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pi-Yu Chung, Chandra M. R. Kintala:
Checkpointing and Its Applications. FTCS 1995: 22-31 - [c9]Yennun Huang, Yi-Min Wang:
Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. FTCS 1995: 459-463 - [c8]Yi-Min Wang:
Maximum and Minimum Consistent Global Checkpoints and their Applications. SRDS 1995: 86-95 - 1994
- [j4]Yi-Min Wang, Andy Lowry, W. Kent Fuchs:
Consistent Global Checkpoints Based on Direct Dependency Tracking. Inf. Process. Lett. 50(4): 223-230 (1994) - [j3]Yi-Min Wang, Pi-Yu Chung, W. Kent Fuchs:
Scheduling for Periodic Concurrent Error Detection in Processor Arrays. J. Parallel Distributed Comput. 23(3): 306-313 (1994) - [j2]Pi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj:
Logic design error diagnosis and correction. IEEE Trans. Very Large Scale Integr. Syst. 2(3): 320-332 (1994) - 1993
- [c7]Pi-Yu Chung, Yi-Min Wang, Ibrahim N. Hajj:
Diagnosis and Correction of Logic Design Errors in Digital Circuits. DAC 1993: 503-508 - [c6]Yi-Min Wang, Yennun Huang, W. Kent Fuchs:
Progressive Retry for Software Error Recovery in Distributed Systems. FTCS 1993: 138-144 - [c5]Yi-Min Wang:
Reducing Message Logging Overhead for Log-based Recovery. ISCAS 1993: 1925-1928 - [c4]Jie Wu, Yi-Min Wang, Eduardo B. Fernández:
A uniform approach to software and hardware fault tolerance. PDP 1993: 409-416 - [c3]Yi-Min Wang, W. Kent Fuchs:
Lazy Checkpointing Coordination for Bounding Rollback Propagation. SRDS 1993: 78-85 - 1992
- [j1]Yi-Min Wang, Hua Lee, Dipali V. Apte:
Quantitative NMR spectroscopy by matrix pencil methods. Int. J. Imaging Syst. Technol. 4(3): 201-206 (1992) - [c2]Yi-Min Wang, W. Kent Fuchs:
Scheduling Message Processing for Reducing Rollback Propagation. FTCS 1992: 204-211 - [c1]Yi-Min Wang, W. Kent Fuchs:
Optimistic Message Logging for Independent Checkpointing in Message-Passing Systems. SRDS 1992: 147-154
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint