Folgen
Jay Chen
Jay Chen
Senior Researcher (ICSI)
Bestätigte E-Mail-Adresse bei icsi.berkeley.edu
Titel
Zitiert von
Zitiert von
Jahr
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ...
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
5322005
Adaptive congestion control for unpredictable cellular networks
Y Zaki, T Pötsch, J Chen, L Subramanian, C Görg
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
2722015
Digital privacy challenges with shared mobile phone use in Bangladesh
SI Ahmed, MR Haque, J Chen, N Dell
Proceedings of the ACM on Human-computer Interaction 1 (CSCW), 1-20, 2017
1452017
Computing within limits
B Nardi, B Tomlinson, DJ Patterson, J Chen, D Pargman, B Raghavan, ...
Communications of the ACM 61 (10), 86-93, 2018
1082018
Cultural and psychological factors in cyber-security
T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ...
Proceedings of the 18th International Conference on Information Integration …, 2016
822016
Hermes: data transmission over unknown voice channels
A Dhananjay, A Sharma, M Paik, J Chen, TK Kuppusamy, J Li, ...
Proceedings of the sixteenth annual international conference on Mobile …, 2010
712010
Infrastructure as creative action: Online buying, selling, and delivery in Phnom Penh
M Jack, J Chen, SJ Jackson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
682017
SMS-based web search for low-end mobile devices
J Chen, L Subramanian, E Brewer
Proceedings of the sixteenth annual international conference on Mobile …, 2010
662010
Dissecting web latency in ghana
Y Zaki, J Chen, T Pötsch, T Ahmad, L Subramanian
Proceedings of the 2014 Conference on Internet Measurement Conference, 241-248, 2014
642014
" Everyone Has Some Personal Stuff" Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
SI Ahmed, MR Haque, I Haider, J Chen, N Dell
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
632019
Exploring internet security perceptions and practices in urban ghana
J Chen, M Paik, K McCabe
10th Symposium On Usable Privacy and Security (SOUPS 2014), 129-142, 2014
542014
RuralCafe: web search in the rural developing world
J Chen, L Subramanian, J Li
Proceedings of the 18th international conference on World wide web, 411-420, 2009
492009
Money, God, and SMS: Explorations in supporting social action through a Bangladeshi mosque
MR Rifat, J Chen, K Toyama
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
432017
Computing within limits and ICTD
J Chen
First Monday, 2015
432015
Computing security in the developing world: A case for multidisciplinary research
Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ...
Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011
432011
The persistence of paper: a case study in microfinance from Ghana
I Ghosh, J Chen, J Ming, A Abouzied
Proceedings of the Seventh International Conference on Information and …, 2015
392015
The increasing sophistication of mobile media sharing in lower-middle-class Bangalore
J O'Neill, K Toyama, J Chen, B Tate, A Siddique
Proceedings of the Eighth International Conference on Information and …, 2016
352016
Routing in an Internet-scale network emulator
J Chen, D Gupta, KV Vishwanath, AC Snoeren, A Vahdat
The IEEE Computer Society's 12th Annual International Symposium on Modeling …, 2004
352004
One LED is Enough: Catalyzing Face-to-face Interactions at Conferences with a Gentle Nudge
J Chen, A Abouzied
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative …, 2016
332016
A strategy for limits-aware computing
J Chen
Proceedings of the Second Workshop on Computing within Limits, 1-6, 2016
322016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20