Scalability, fidelity, and containment in the potemkin virtual honeyfarm M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ... Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 532 | 2005 |
Adaptive congestion control for unpredictable cellular networks Y Zaki, T Pötsch, J Chen, L Subramanian, C Görg Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 272 | 2015 |
Digital privacy challenges with shared mobile phone use in Bangladesh SI Ahmed, MR Haque, J Chen, N Dell Proceedings of the ACM on Human-computer Interaction 1 (CSCW), 1-20, 2017 | 145 | 2017 |
Computing within limits B Nardi, B Tomlinson, DJ Patterson, J Chen, D Pargman, B Raghavan, ... Communications of the ACM 61 (10), 86-93, 2018 | 108 | 2018 |
Cultural and psychological factors in cyber-security T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ... Proceedings of the 18th International Conference on Information Integration …, 2016 | 82 | 2016 |
Hermes: data transmission over unknown voice channels A Dhananjay, A Sharma, M Paik, J Chen, TK Kuppusamy, J Li, ... Proceedings of the sixteenth annual international conference on Mobile …, 2010 | 71 | 2010 |
Infrastructure as creative action: Online buying, selling, and delivery in Phnom Penh M Jack, J Chen, SJ Jackson Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 68 | 2017 |
SMS-based web search for low-end mobile devices J Chen, L Subramanian, E Brewer Proceedings of the sixteenth annual international conference on Mobile …, 2010 | 66 | 2010 |
Dissecting web latency in ghana Y Zaki, J Chen, T Pötsch, T Ahmad, L Subramanian Proceedings of the 2014 Conference on Internet Measurement Conference, 241-248, 2014 | 64 | 2014 |
" Everyone Has Some Personal Stuff" Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh SI Ahmed, MR Haque, I Haider, J Chen, N Dell Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 63 | 2019 |
Exploring internet security perceptions and practices in urban ghana J Chen, M Paik, K McCabe 10th Symposium On Usable Privacy and Security (SOUPS 2014), 129-142, 2014 | 54 | 2014 |
RuralCafe: web search in the rural developing world J Chen, L Subramanian, J Li Proceedings of the 18th international conference on World wide web, 411-420, 2009 | 49 | 2009 |
Money, God, and SMS: Explorations in supporting social action through a Bangladeshi mosque MR Rifat, J Chen, K Toyama Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 43 | 2017 |
Computing within limits and ICTD J Chen First Monday, 2015 | 43 | 2015 |
Computing security in the developing world: A case for multidisciplinary research Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ... Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011 | 43 | 2011 |
The persistence of paper: a case study in microfinance from Ghana I Ghosh, J Chen, J Ming, A Abouzied Proceedings of the Seventh International Conference on Information and …, 2015 | 39 | 2015 |
The increasing sophistication of mobile media sharing in lower-middle-class Bangalore J O'Neill, K Toyama, J Chen, B Tate, A Siddique Proceedings of the Eighth International Conference on Information and …, 2016 | 35 | 2016 |
Routing in an Internet-scale network emulator J Chen, D Gupta, KV Vishwanath, AC Snoeren, A Vahdat The IEEE Computer Society's 12th Annual International Symposium on Modeling …, 2004 | 35 | 2004 |
One LED is Enough: Catalyzing Face-to-face Interactions at Conferences with a Gentle Nudge J Chen, A Abouzied Proceedings of the 19th ACM Conference on Computer-Supported Cooperative …, 2016 | 33 | 2016 |
A strategy for limits-aware computing J Chen Proceedings of the Second Workshop on Computing within Limits, 1-6, 2016 | 32 | 2016 |