John Chuang


Research Papers by Area


Biosensory Computing

Social Distancing and Social Biosensing: Intersubjectivity from Afar
M. Curran, J. Chuang. Computer Supported Cooperative Work, July 2022.

Neural Dynamics of a Single Human with Long-Term, High Temporal Density Electroencephalography
J. Chuang. Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’21), November 2021.

Active Dynamical Prospection: Modeling Sensorimotor Control during Pathfinding via Particle-based Mental Simulation
J. Gordon, J. Chuang. Proceedings of Conference on Artificial Life (ALIFE 2021), July 2021.

Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance
J. Gordon, M. Curran, J. Chuang, C Cheshire. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI 2021), May 2021.

Sensing is Believing: What People Think Biosensors Can Reveal About Thoughts and Feelings
N. Merrill, J. Chuang, C. Cheshire. Proceedings of ACM Conference on Designing Interactive Systems (DIS 2019), June 2019.

Understanding Digitally-Mediated Empathy: An Exploration of Visual, Narrative, and Biosensory Informational Cues
M. Curran, J. Gordon, L. Lin, P.K. Sridhar, J. Chuang. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI 2019), May 2019.

Models of Minds: Reading the Mind Beyond the Brain
N. Merrill, J. Chuang. Adjunct Proceedings of ACM CHI Conference on Human Factors in Computing Systems (alt.chi), May 2019.

One-Step, Three-Factor Passthought Authentication with Custom-Fit, In-Ear EEG
N. Merrill, M. Curran, S. Gandhi, J. Chuang. Frontiers in Neuroscience, April 2019.

Emotional Biosensing: Exploring Critical Alternatives
N. Howell, J. Chuang, A. De Kosnik, G. Niemeyer, K. Ryokai. PACM on Human-Computer Interaction, November 2018. (CSCW 2018)

Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks
T. Piplani, N. Merrill, J. Chuang. Proceedings of IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018), October 2018.

Exploring the Feasibility and Performance of One-Step Three-Factor Authentication with Ear-EEG
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Proceedings of 5th International Conference on Physiological Computing Systems (PhyCS 2018), September 2018.
Best Student Paper Award

When BCIs have APIs: Design Fictions of Everyday Brain-Computer Interface Adoption
R. Wong, N. Merrill, J. Chuang. ACM Conference on Designing Interactive Systems (DIS 2018), June 2018.
Best Paper Honorable Mention

From Scanning Brains to Reading Minds: Talking to Engineers about Brain-Computer Interface
N. Merrill, J. Chuang. ACM CHI Conference on Human Factors in Computing Systems (CHI 2018), April 2018.

A Window into the Soul: Biosensing in Public
E. Sedenberg, R. Wong, J. Chuang. In Surveillance, Privacy and Public Spaces, by Newell, Timan, Koops (eds.), Routledge, March 2018.

Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks
R. Wong, D. Mulligan, E. Van Wyk, J. Pierce, J. Chuang. PACM on Human-Computer Interaction, Vol. 1, No. 2, Article 111, November 2017. (CSCW 2018 Online First)
Best Paper Award

Is the Future of Authenticity All In Our Heads? Moving Passthoughts From the Lab to the World
N. Merrill, M. Curran, J. Chuang. New Security Paradigms Workshop (NSPW ’17), October 2017.

Smile for the Camera: Privacy and Policy Implications of Emotion AI
E. Sedenberg, J. Chuang. Presented at Telecommunications Policy Research Conference, September 2017.

Using Science Fiction Texts to Surface User Reflections on Privacy
R. Wong, D. Mulligan, J. Chuang. Adjunct Proceedings of ACM UbiComp/ISWC, September 2017.

One-Step, Three-Factor Authentication in a Single Earpiece
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Adjunct Proceedings of ACM UbiComp/ISWC, September 2017.

Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home
E. Sedenberg, J. Chuang, D. Mulligan. International Journal of Social Robotics, Volume 8, Issue 4, pp 575–587, August 2016.

Passthoughts Authentication with Low Cost EarEEG
M. Curran, J. Yang, N. Merrill, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.

Passthoughts on the Go: Effect of Exercise on EEG Authentication (Extended Version)
G. Chuang, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.

Classifying Mental Gestures with In-Ear EEG
N. Merrill, M. Curran, J. Yang, J. Chuang. Proceedings of IEEE EMBS 13th Annual International Body Sensor Networks Conference (BSN 2016), June 2016.

Brain Decoding using EEG-controlled Rapid Serial Visual Presentation
T. Maillart, N. Merrill, J. Chuang. 22nd Annual Meeting of the Organization for Human Brain Mapping (OHBM 2016), June 2016.

Audio Autonomy: An Ambient, Interactive Audio Companion System for Dementia Patients and Caregivers
R. Bora, A. McConachie, J. Chuang, B. Shapiro. 5th Workshop on Interactive Systems in Healthcare (WISH), ACM Conference on Human Factors in Computing Systems (CHI 2016), May 2016.

Synestouch - Haptic + Audio Design for Wearable Devices
P. Paredes, R. Ko, A. Aghaseyedjavadi, L. Bäbler, J. Canny, J. Chuang. Proceedings of 6th Conference on Affective Computing and Intelligent Interactions (ACII 2015), September 2015.

Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique
N. Merrill, T. Maillart, B. Johnson, J. Chuang. 2nd International Conference on Physiological Computing Systems (PhyCS'15), February 2015.

My Thoughts are Not Your Thoughts: Robustness of Brainwave Signal Authentication Against Impersonation Attacks
B. Johnson, T. Maillart, J. Chuang. Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE'14), ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14), September 2014.

One-Step Two-Factor Authentication with Wearable Bio-Sensors
J. Chuang. Workshop on "Who are you?! Adventures in Authentication" (WAY'14), 10th USENIX Symposium on Usable Privacy and Security (SOUPS'14), July 2014.

I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves (Project Page)
J. Chuang, H. Nguyen, C. Wang, B. Johnson. Workshop on Usable Security (USEC'13), Proceedings of the Seventeenth International Conference on Financial Cryptography and Data Security (FC’13), April 2013.


Economics of Information Security and Privacy

Given Enough Eyeballs, All Bugs are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
T. Maillart, M. Zhao, J. Grossklags, J. Chuang. Journal of Cybersecurity, October 2017. (Earlier version appeared in 15th Workshop on the Economics of Information Security (WEIS'16), June 2016.)

Whack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security
P. Chia, J. Chuang, Y. Chen. 15th Workshop on the Economics of Information Security (WEIS'16), June 2016.

Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You
B. Johnson, P. Laskowski, T. Maillart, J. Chuang, and N. Christin. 14th Workshop on the Economics of Information Security (WEIS'15), June 2015.

Government Surveillance and Incentives to Abuse Power
P. Laskowski, B. Johnson, T. Maillart, J. Chuang. Workshop on the Economics of Information Security (WEIS’14), June 2014.

Community-based Web Security: Complementary Roles of the Serious and Casual Contributors
P. Chia, J. Chuang. Proceedings of ACM CSCW, February 2012.

Metrics for Measuring ISP Badness: The Case of Spam (Short Paper)
B. Johnson, J. Chuang, J. Grossklags, N. Christin. Proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC'12), February 2012.

Colonel Blotto in the Phishing War
P. Chia, J. Chuang. Proceedings of Conference on Decision and Game Theory for Security (GameSec 2011), November 2011.

Incentive Dynamics in Interdependent Network Security. Or: Buying a Raft and Out-Running a Bear
J. Chuang. Plenary lecture, 2nd International Conference on Game Theory for Networks (GameNets 2011), April 2011.

Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents
B. Johnson, J. Grossklags, N. Christin, J. Chuang. Proceedings of the 2nd International Conference on Game Theory for Networks (GameNets 2011), April 2011.

Uncertainty in Interdependent Security Games
B. Johnson, J. Grossklags, N. Christin, J. Chuang. Proceedings of 2010 Conference on Decision and Game Theory for Security (GameSec 2010), November 2010.

Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
B. Johnson, J. Grossklags, N. Christin, J. Chuang. Proceedings of 15th European Symposium on Research in Computer Security (ESORICS'10), September 2010.

Nudge: Intermediaries' Role in Interdependent Network Security
J. Grossklags, S. Radosavac, A. Cardenas, J. Chuang. Proceedings of 3rd International Conference on Trust and Trustworthy Computing (Trust'10), June 2010.

Security and Insurance Management in Networks with Heterogeneous Agents
J. Grossklags, N. Christin, J. Chuang. Proceedings of ACM E-Commerce Conference (EC'08), July 2008.

Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents
J. Grossklags, N. Christin, J. Chuang. Proceedings (online) of the 7th Workshop on Economics of Information Security (WEIS 2008). Hannover, NH. June 2008.

Predicted and Observed User Behavior in the Weakest-Link Security Game
J. Grossklags, N. Christin, J. Chuang. Proceedings of the 2008 USENIX Workshop on Usability, Psychology, and Security (UPSEC'08), April 2008.

Secure or Insure? A Game-Theoretic Analysis of Information Security Games
J. Grossklags, N. Christin, J. Chuang. Proceedings of the 17th International World Wide Web Conference (WWW2008), April 2008.

Near Rationality and Competitive Equilibria in Networked Systems
N. Christin, J. Grossklags and J. Chuang, Proceedings of ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PINS), August 2004.


Economics of Computer Networks

Loci of Competition for Future Internet Architectures
J. Chuang. IEEE Communications Magazine, Special Issue on Future Internet Architectures: Design and Deployment Perspectives, July 2011.

Innovations and Upgrades in Virtualized Network Architectures
P. Laskowski, J. Chuang. Proceedings of 2010 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 2010), October 2010.

A Leap of Faith: From Large-Scale Testbeds, to the Global Internet
P. Laskowski, J. Chuang. 37th Research Conference on Communication, Information and Internet Policy (TPRC'09), September 2009.

Service Adoption and Pricing of Content Delivery Network (CDN) Services
K. Hosanagar, J. Chuang, R. Krishnan, M. D. Smith, Management Science, September 2008. Conference Version: K. Hosanagar, R. Krishnan, M. Smith and J. Chuang. Optimal Pricing of Content Distribution Network Services. Proceedings of HICSS 2004, Hawaii, January 2004.

User-Directed Routing: From Theory, Towards Practice
P. Laskowski, B. Johnson, J. Chuang. Proceedings of ACM SIGCOMM Workshop on the Economics of Networks, Systems, and Computation (NetEcon 2008), August 2008.

Economics-Informed Design of Content Delivery Networks
N. Christin, J. Chuang, J. Grossklags. In R. Buyya, A.K. Pathan, A. Vakali, eds., Content Delivery Networks: Principles and Paradigms, Springer Verlag, August 2008.

Modeling the Adoption of New Network Architectures
D. Joseph, N. Shetty, J. Chuang, I. Stoica. ACM CoNEXT, Dec 2007.

Hidden-Action in Network Routing
M. Feldman, J. Chuang, I. Stoica, S. Shenker. IEEE Journal on Selected Areas in Communications, August 2007.
Conference version: M. Feldman, J. Chuang, I. Stoica, and S. Shenker, Hidden-Action in Multi-Hop Routing. Proceedings of ACM E-Commerce Conference (EC'05), June 2005.

Encouraging Cooperative Interaction Among Network Entities
S. Buchegger, J. Chuang. In F.H.P. Fitzek, M.D. Katz, eds., Cognitive Wireless Networks: Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications, Springer, 2007.

On the Optimality and Interconnection of Valiant Load-Balancing Networks
B. Babaioff, J. Chuang. IEEE INFOCOM, May 2007. (PPT)

Network Monitors and Contracting Systems: Competition and Innovation
P. Laskowski, J. Chuang. ACM SIGCOMM, September 2006.

Pricing and Resource Allocation in Caching Services with Multiple Levels of Quality of Service
K. Hosanagar, R. Krishnan, J. Chuang, and V. Choudhary, , Management Science, Vol. 51, No. 12, December 2005.
Conference version: K. Hosanagar, R. Krishnan, J. Chuang, and V. Choudhary, Pricing Vertically Differentiated Web Caching Services, Proceedings of International Conference on Information Systems (ICIS 2002), Barcelona Spain, December 2002.

A Cost-Based Analysis of Overlay Routing Geometries
N. Christin and J. Chuang. Proceedings of IEEE INFOCOM'05, March 2005.

Near Rationality and Competitive Equilibria in Networked Systems
N. Christin, J. Grossklags and J. Chuang, Proceedings of ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PINS), August 2004.

Economics of Ad-Hoc, Overlay and Traditional Networks: A Topological Perspective
 J. Chuang, Position Paper for the ACM SIGCOMM Workshop on Network Research: Exploration of Dimensions and Scope, Karlsruhe Germany, August 2003.

Economics of Scalable Network Services
J. Chuang. Proceedings of SPIE ITCOM 2001, Denver CO, August 2001.

Pricing Multicast Communications: A Cost-Based Approach
J. Chuang and M. Sirbu. Telecommunication Systems 17 (3):281-297, July 2001.
Conference version: J. Chuang and M. Sirbu, Pricing Multicast Communications: A Cost-Based Approach. Proceedings of the Internet Society INET'98 Conference, Geneva Switzerland, July 21-24 1998.

Network Transmission and Storage: Vertical Relationships and Industry Structure
J. Chuang. 27th Telecommunications Policy Research Conference, Alexandria VA, September 1999.


Open Collaboration and Peer Production

The Virtuous Circle of Wikipedia: Recursive Measures of Collaboration Structures
M. Klein, T. Maillart, J. Chuang. Proceedings of 18th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW'15), March 2015.

Community-based Web Security: Complementary Roles of the Serious and Casual Contributors
P. Chia, J. Chuang. Proceedings of ACM CSCW, February 2012.

Discovering Digital Content in the Age of Peer-to-Peer
P. Laskowski, J. Ubois, D. Marvit, J. Chuang. 2009 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 2009), July 2009.

Incentives in Peer-to-Peer Systems
M. Babaioff, J. Chuang, M. Feldman. In N. Nisan, T. Roughgarden, E. Tardos, V. Vazirani, eds., Algorithmic Game Theory, Cambridge University Press, 2007.

Service Differentiated Peer Selection: An Incentive Mechanism for Peer-to-Peer Media Streaming
A. Habib and J. Chuang. IEEE Transactions on Multimedia, Vol. 8, No. 3, June 2006.

Free-Riding and Whitewashing in Peer-to-Peer Systems
M. Feldman, C. Papadimitriou, J. Chuang, I. Stoica. IEEE Journal on Selected Areas in Communications, Vol. 24, No. 5, May 2006.
Conference version: M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica, Free-Riding and Whitewashing in Peer-to-Peer Systems. Proceedings of ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PINS), August 2004.

Overcoming Free-Riding Behavior in Peer-to-Peer Systems
M. Feldman and J. Chuang. ACM Sigecom Exchanges, Summer 2005.

The Evolution of Cooperation under Cheap Pseudonyms
M. Feldman and J. Chuang, Proceedings of 7th International IEEE Conference on E-Commerce Technology (CEC'05), July 2005.

Content Availability, Pollution and Poisoning in Peer-to-Peer File Sharing Networks
N. Christin, A. Weigend, and J. Chuang. Proceedings of ACM E-Commerce Conference (EC'05), June 2005.

A Cost-Based Analysis of Overlay Routing Geometries
N. Christin and J. Chuang. Proceedings of IEEE INFOCOM'05, March 2005.

A Case for Taxation in Peer-to-Peer Streaming Broadcast
Y. Chu, J. Chuang, and H. Zhang. Proceedings of ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PINS), August 2004.

Incentive Mechanism for Peer-to-Peer Media Streaming
A. Habib and J. Chuang. Proceedings of 12th IEEE International Workshop on Quality of Service, Montreal Canada, June 2004.

Robust Incentive Techniques for Peer-to-Peer Networks
M. Feldman, K. Lai, I. Stoica, and J. Chuang. Proceedings of 5th ACM Conference on Electronic Commerce (EC'04), New York NY, May 2004.

Designing Incentive Mechanisms for Peer-to-Peer Systems
J. Chuang. Proceedings of 1st IEEE Workshop on Grid Economics and Business Models, Seoul Korea, April 2004.

On the Cost of Participating in a Peer-to-Peer Network
 N. Christin and J. Chuang. Proceedings of 3rd International Workshop on Peer-to-Peer Systems (IPTPS'04), San Diego CA, February 2004. Also appeared in Lecture Notes in Computer Science series, Springer Verlag, 2004. [Companion Technical Report, December 2003.]

Incentives for Cooperation in Peer-to-Peer Networks
K. Lai, M. Feldman, I. Stoica and J. Chuang. 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley CA, June 5-6 2003.

Quantifying Disincentives in Peer-to-Peer Networks
M. Feldman, K. Lai, J. Chuang and I. Stoica. 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley CA, June 5-6 2003.


User Authentication

One-Step, Three-Factor Passthought Authentication with Custom-Fit, In-Ear EEG
N. Merrill, M. Curran, S. Gandhi, J. Chuang. Frontiers in Neuroscience, April 2019.

Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks
T. Piplani, N. Merrill, J. Chuang. Proceedings of IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018), October 2018.

Exploring the Feasibility and Performance of One-Step Three-Factor Authentication with Ear-EEG
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Proceedings of 5th International Conference on Physiological Computing Systems (PhyCS 2018), September 2018.
Best Student Paper Award

Is the Future of Authenticity All In Our Heads? Moving Passthoughts From the Lab to the World
N. Merrill, M. Curran, J. Chuang. New Security Paradigms Workshop (NSPW ’17), October 2017.

One-Step, Three-Factor Authentication in a Single Earpiece
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Adjunct Proceedings of ACM UbiComp/ISWC, September 2017.

Passthoughts Authentication with Low Cost EarEEG
M. Curran, J. Yang, N. Merrill, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.

Passthoughts on the Go: Effect of Exercise on EEG Authentication (Extended Version)
G. Chuang, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.

My Thoughts are Not Your Thoughts: Robustness of Brainwave Signal Authentication Against Impersonation Attacks
B. Johnson, T. Maillart, J. Chuang. Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE'14), ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14), September 2014.

One-Step Two-Factor Authentication with Wearable Bio-Sensors
J. Chuang. Workshop on "Who are you?! Adventures in Authentication" (WAY'14), 10th USENIX Symposium on Usable Privacy and Security (SOUPS'14), July 2014.

I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves (Project Page)
J. Chuang, H. Nguyen, C. Wang, B. Johnson. Workshop on Usable Security (USEC'13), Proceedings of the Seventeenth International Conference on Financial Cryptography and Data Security (FC’13), April 2013.

Distributed Authentication in Kerberos Using Public Key Cryptography
M. Sirbu and J. Chuang. Proceedings of the Internet Society Symposium on Network and Distributed System Security (NDSS'97), San Diego CA, Feb 10-11 1997.

Public-Key Based Ticket Granting Service in Kerberos
M. Sirbu and J. Chuang, IETF Internet Draft, May 1996.


Media Streaming, Multi-homing, Web Caching, and Network Storage

Improving Application QoS with Residential Multihoming
A. Habib, J. Chuang. Computer Networks, Volume 51, Issue 12, Pages 3323-3337, August 2007.

On the Feasibility of Switching ISPs in Residential Multihoming
A. Habib, N. Christin, J. Chuang. Proceedings of International Workshop on Quality-of-Service (IWQoS), June 2007.

Taking Advantage of Multihoming with Session Layer Striping
A. Habib, N. Christin, and J. Chuang, Proceedings of the 9th IEEE Global Internet Symposium (Global Internet 2006), pages 102-107, Barcelona, Spain. April 2006.

A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
A. Habib, D. Xu, M. Atallah, B. Bhargava and J. Chuang, IEEE Transactions on Knowledge and Data Engineering, July 2005.

MMS: A Multihome-Aware Media Streaming System
A. Habib and J. Chuang, Proceedings of 13th Multimedia Computing and Networking Conference (MMCN '06), January 2006. Earlier version appeared as: A. Habib, J. Chuang, Multihoming Media Streaming, IEEE Workshop on Multimedia Systems and Networking (WMSN '05), April 2005.

Verifying Data Integrity in Peer-to-Peer Media Streaming
A. Habib, D. Xu, M. Atallah, B. Bhargava and J. Chuang. ACM/SPIE Multimedia Computing and Networking (MMCN '05), Jan. 2005.

Resilient Data-Centric Storage in Wireless Sensor Networks
A. Ghose, J. Grossklags, and J. Chuang. IEEE Distributed Systems Online. November 2003.
Conference version: A. Ghose, J. Grossklags, and J. Chuang, Resilient Data-Centric Storage in Wireless Sensor Networks. Proceedings of 4th International Conference on Mobile Data Management (MDM 2003), Melbourne Australia, January 2003. Best Paper Award. Also appeared in Lecture Notes in Computer Science series, No. 2574, pp. 45-62, Springer Verlag, 2003.

Efficiency and Performance of Web Cache Reporting Strategies
J. Chuang, S. Kafka, and K. Norlen. Proceedings of IEEE International Workshop on Data Semantics in Web Information Systems, Singapore, December 2002.

Service Differentiation in Web Caching and Content Distribution
M. Feldman and J. Chuang. Proceedings of IASTED International Conference on Communications and Computer Networks 2002, Cambridge MA, November 2002.

A Secure, Publisher-Centric Web Caching Infrastructure
A. Myers, J. Chuang, U. Hengartner, Y. Xie, W. Zhuang, and H. Zhang. Proceedings of IEEE INFOCOM 2001, Anchorage AK, April 2001.

Distributed Network Storage with Quality-of-Service Guarantees
J. Chuang and M. Sirbu. Journal of Network and Computer Applications 23(3):163-185, July 2000.
Conference version: J. Chuang and M. Sirbu, Distributed Network Storage with Quality-of-Service Guarantees. Proceedings of the Internet Society INET'99 Conference, San Jose CA, June 22-25 1999.

Resource Allocation for stor-serv: Network Storage Services with QoS Guarantees
J. Chuang. Proceedings of Internet2 Network Storage Symposium 1999, Seattle WA, October 1999.



Other

The Evolving Braid: How an Organization in Uganda Achieved Reliable Communications
M. Densmore, B. Bellows, J. Chuang, E. Brewer. Proceedings of Sixth International Conference on Information and Communication Technologies and Development (ICTD2013), December 2013.

Improving Transparency: Extracting, Visualising and Analysing Corporate Relationships from SEC 10-K Documents
M. Gebbie, K. Norlen, G. Lucas, J. Chuang. International Journal on Technology, Policy and Management, Vol. 7, No. 1, pp. 15-31, 2007.
Conference version: G. Lucas, M. Gebbie, K. Norlen and J. Chuang, Improving Transparency: Extracting, Visualizing, and Analyzing Corporate Relationships from SEC 10-K Documents. 7th International Conference on Technology Policy and Innovation, Monterrey Mexico, June 10-13 2003.

On Characterizing Affinity and Its Impact on Network Performance
G. Lucas, A. Ghose, and J. Chuang. Proceedings of ACM SIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research, Karlsruhe Germany, August 25 2003.

EVA: Extraction, Visualization and Analysis of the Telecommunications and Media Ownership Network
K. Norlen, G. Lucas, M. Gebbie, and J. Chuang. Proceedings of International Telecommunications Society 14th Biennial Conference (ITS2002), Seoul Korea, August 2002.

Network Delivery of Information Goods: Optimal Pricing of Articles and Subscriptions
J. Chuang and M. Sirbu. In B. Kahin and H. Varian, eds., Internet Publishing and Beyond: The Economics of Digital Information and Intellectual Property, MIT Press, August 2000.

Optimal Bundling Strategy for Digital Information Goods: Network Delivery of Articles and Subscriptions
J. Chuang and M. Sirbu. Information Economics and Policy 11(2):147-176, 1999.

MIPS R10000 Superscalar Microprocessor
 A. Ahi, A. Bomdica, G. Shippen, H. Sucar, H. Su, J. Chuang, N. Vasseghi, R. Ramchandani, R. Martin, R. Conrad, Y. Chen, K. Yeager, W. Voegtli Jr., M. Seddighnezhad, Y. Van Atta. HOT CHIPS Symposium VII, Stanford CA, August 13-15, 1995. [chip photos: small, medium, large][packaged: NEC, Toshiba]