Content-based image retrieval at the end of the early years AWM Smeulders, M Worring, S Santini, A Gupta, R Jain IEEE Transactions on pattern analysis and machine intelligence 22 (12), 1349 …, 2000 | 8243 | 2000 |
Online aggregation JM Hellerstein, PJ Haas, HJ Wang Proceedings of the 1997 ACM SIGMOD international conference on Management of …, 1997 | 1223 | 1997 |
Distributing streaming media content using cooperative networking VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai Proceedings of the 12th international workshop on Network and operating …, 2002 | 1167 | 2002 |
Secondnet: a data center network virtualization architecture with bandwidth guarantees C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang Proceedings of the 6th International COnference, 1-12, 2010 | 757 | 2010 |
Policy-enabled handoffs across heterogeneous wireless networks HJ Wang, RH Katz, J Giese Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999 | 693 | 1999 |
Permission Re-Delegation: Attacks and Defenses. AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin USENIX security symposium 30, 88, 2011 | 680 | 2011 |
Resilient peer-to-peer streaming VN Padmanabhan, HJ Wang, PA Chou 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 634 | 2003 |
Removal of Cu, Zn, and Cd from aqueous solutions by the dairy manure-derived biochar X Xu, X Cao, L Zhao, H Wang, H Yu, B Gao Environmental Science and Pollution Research 20 (1), 358-368, 2013 | 435 | 2013 |
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits HJ Wang, C Guo, DR Simon, A Zugenmaier Proceedings of the 2004 conference on Applications, technologies …, 2004 | 429 | 2004 |
Discoverer: Automatic Protocol Reverse Engineering from Network Traces. W Cui, J Kannan, HJ Wang USENIX Security Symposium, 1-14, 2007 | 406 | 2007 |
An evaluation of scalable application-level multicast built using peer-to-peer overlays M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ... IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 387 | 2003 |
Plants vs. cancer: a review on natural phytochemicals in preventing and treating cancers and their druggability H Wang, T Oo Khor, L Shu, ZY Su, F Fuentes, JH Lee, AN Tony Kong Anti-Cancer Agents in Medicinal Chemistry (Formerly Current Medicinal …, 2012 | 365 | 2012 |
Enabling Security in Cloud Storage SLAs with CloudProof. RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang USENIX Annual Technical Conference 242, 355-368, 2011 | 341 | 2011 |
BrowserShield: Vulnerability-driven filtering of dynamic HTML C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir ACM Transactions on the Web (TWEB) 1 (3), 11-es, 2007 | 326 | 2007 |
Mechanical properties of high-strength concrete after fire M Li, CX Qian, W Sun Cement and concrete research 34 (6), 1001-1005, 2004 | 317 | 2004 |
Automatic Misconfiguration Troubleshooting with PeerPressure. HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang OSDI 4, 245-257, 2004 | 309 | 2004 |
Magmatic history of the northeastern Tibetan Plateau GE Gehrels, A Yin, XF Wang Journal of Geophysical Research: Solid Earth 108 (B9), 2003 | 305 | 2003 |
User-driven access control: Rethinking permission granting in modern operating systems F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan 2012 IEEE Symposium on Security and Privacy, 224-238, 2012 | 272 | 2012 |
Tupni: Automatic reverse engineering of input formats W Cui, M Peinado, K Chen, HJ Wang, L Irun-Briz Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 254 | 2008 |
A highly resolved regional climate model (IPRC-RegCM) and its simulation of the 1998 severe precipitation event over China. Part I: Model description and verification of simulation Y Wang, OL Sen, B Wang Journal of Climate 16 (11), 1721-1738, 2003 | 248 | 2003 |