|
|
|
John Chuang
Research Papers by Area
Biosensory Computing
Social Distancing and Social Biosensing: Intersubjectivity from Afar
M. Curran, J. Chuang. Computer Supported Cooperative Work, July 2022.
Neural Dynamics of a Single Human with Long-Term, High Temporal Density Electroencephalography
J. Chuang. Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’21), November 2021.
Active Dynamical Prospection: Modeling Sensorimotor Control during Pathfinding via Particle-based Mental Simulation
J. Gordon, J. Chuang. Proceedings of Conference on Artificial Life (ALIFE 2021), July 2021.
Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance
J. Gordon, M. Curran, J. Chuang, C Cheshire. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI 2021), May 2021.
Sensing is Believing: What People Think Biosensors Can Reveal About Thoughts and Feelings
N. Merrill, J. Chuang, C. Cheshire. Proceedings of ACM Conference on Designing Interactive Systems (DIS 2019), June 2019.
Understanding Digitally-Mediated Empathy: An Exploration of Visual, Narrative, and Biosensory Informational Cues
M. Curran, J. Gordon, L. Lin, P.K. Sridhar, J. Chuang. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI 2019), May 2019.
Models of Minds: Reading the Mind Beyond the Brain
N. Merrill, J. Chuang. Adjunct Proceedings of ACM CHI Conference on Human Factors in Computing Systems (alt.chi), May 2019.
One-Step, Three-Factor Passthought Authentication with Custom-Fit, In-Ear EEG
N. Merrill, M. Curran, S. Gandhi, J. Chuang. Frontiers in Neuroscience, April 2019.
Emotional Biosensing: Exploring Critical Alternatives
N. Howell, J. Chuang, A. De Kosnik, G. Niemeyer, K. Ryokai. PACM on Human-Computer Interaction, November 2018. (CSCW 2018)
Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks
T. Piplani, N. Merrill, J. Chuang. Proceedings of IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018), October 2018.
Exploring the Feasibility and Performance of One-Step Three-Factor Authentication with Ear-EEG
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Proceedings of 5th International Conference on Physiological Computing Systems (PhyCS 2018), September 2018.
Best Student Paper Award
When BCIs have APIs: Design Fictions of Everyday Brain-Computer Interface Adoption
R. Wong, N. Merrill, J. Chuang. ACM Conference on Designing Interactive Systems (DIS 2018), June 2018.
Best Paper Honorable Mention
From Scanning Brains to Reading Minds: Talking to Engineers about Brain-Computer Interface
N. Merrill, J. Chuang. ACM CHI Conference on Human Factors in Computing Systems (CHI 2018), April 2018.
A Window into the Soul: Biosensing in Public
E. Sedenberg, R. Wong, J. Chuang. In Surveillance, Privacy and Public Spaces, by Newell, Timan, Koops (eds.), Routledge, March 2018.
Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks
R. Wong, D. Mulligan, E. Van Wyk, J. Pierce, J. Chuang. PACM on Human-Computer Interaction, Vol. 1, No. 2, Article 111, November 2017. (CSCW 2018 Online First)
Best Paper Award
Is the Future of Authenticity All In Our Heads? Moving Passthoughts From the Lab to the World
N. Merrill, M. Curran, J. Chuang. New Security Paradigms Workshop (NSPW ’17), October 2017.
Smile for the Camera: Privacy and Policy Implications of Emotion AI
E. Sedenberg, J. Chuang. Presented at Telecommunications Policy Research Conference, September 2017.
Using Science Fiction Texts to Surface User Reflections on Privacy
R. Wong, D. Mulligan, J. Chuang. Adjunct Proceedings of ACM UbiComp/ISWC, September 2017.
One-Step, Three-Factor Authentication in a Single Earpiece
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Adjunct Proceedings of ACM UbiComp/ISWC, September 2017.
Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home
E. Sedenberg, J. Chuang, D. Mulligan. International Journal of Social Robotics, Volume 8, Issue 4, pp 575–587, August 2016.
Passthoughts Authentication with Low Cost EarEEG
M. Curran, J. Yang, N. Merrill, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.
Passthoughts on the Go: Effect of Exercise on EEG Authentication (Extended Version)
G. Chuang, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.
Classifying Mental Gestures with In-Ear EEG
N. Merrill, M. Curran, J. Yang, J. Chuang. Proceedings of IEEE EMBS 13th Annual International Body Sensor Networks Conference (BSN 2016), June 2016.
Brain Decoding using EEG-controlled Rapid Serial Visual Presentation
T. Maillart, N. Merrill, J. Chuang. 22nd Annual Meeting of the Organization for Human Brain Mapping (OHBM 2016), June 2016.
Audio Autonomy: An Ambient, Interactive Audio Companion System for Dementia Patients and Caregivers
R. Bora, A. McConachie, J. Chuang, B. Shapiro. 5th Workshop on Interactive Systems in Healthcare (WISH), ACM Conference on Human Factors in Computing Systems (CHI 2016), May 2016.
Synestouch - Haptic + Audio Design for Wearable Devices
P. Paredes, R. Ko, A. Aghaseyedjavadi, L. Bäbler, J. Canny, J. Chuang. Proceedings of 6th Conference on Affective Computing and Intelligent Interactions (ACII 2015), September 2015.
Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique
N. Merrill, T. Maillart, B. Johnson, J. Chuang. 2nd International Conference on Physiological Computing Systems (PhyCS'15), February 2015.
My Thoughts are Not Your Thoughts: Robustness of Brainwave Signal Authentication Against Impersonation Attacks
B. Johnson, T. Maillart, J. Chuang.
Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE'14), ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14), September 2014.
One-Step Two-Factor Authentication with Wearable Bio-Sensors
J. Chuang. Workshop on "Who are you?! Adventures in Authentication" (WAY'14), 10th USENIX Symposium on Usable Privacy and Security (SOUPS'14), July 2014.
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves (Project Page)
J. Chuang, H. Nguyen, C. Wang, B. Johnson.
Workshop on Usable Security (USEC'13), Proceedings of the Seventeenth International Conference on Financial Cryptography and Data Security (FC’13), April 2013.
Economics of Information Security and Privacy
Given Enough Eyeballs, All Bugs are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
T. Maillart, M. Zhao, J. Grossklags, J. Chuang. Journal of Cybersecurity, October 2017. (Earlier version appeared in 15th Workshop on the Economics of Information Security (WEIS'16), June 2016.)
Whack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security
P. Chia, J. Chuang, Y. Chen. 15th Workshop on the Economics of Information Security (WEIS'16), June 2016.
Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You
B. Johnson, P. Laskowski, T. Maillart, J. Chuang, and N. Christin. 14th Workshop on the Economics of Information Security (WEIS'15), June 2015.
Government Surveillance and Incentives to Abuse Power
P. Laskowski, B. Johnson, T. Maillart, J. Chuang. Workshop on the Economics of Information Security (WEIS’14), June 2014.
Community-based Web Security: Complementary Roles of the Serious and Casual Contributors
P. Chia, J. Chuang. Proceedings of ACM CSCW,
February 2012.
Metrics for Measuring ISP Badness: The Case of Spam (Short
Paper)
B. Johnson, J. Chuang, J. Grossklags, N. Christin.
Proceedings of the 16th International Conference on
Financial Cryptography and Data Security (FC'12),
February 2012.
Colonel Blotto in the Phishing War
P. Chia, J. Chuang. Proceedings of Conference on
Decision and Game Theory for Security (GameSec 2011), November 2011.
Incentive Dynamics in
Interdependent Network Security. Or: Buying a Raft and
Out-Running a Bear
J. Chuang. Plenary lecture, 2nd
International Conference on Game Theory for Networks
(GameNets 2011), April 2011.
Nash Equilibria for Weakest Target Security Games with Heterogeneous
Agents
B. Johnson, J. Grossklags, N. Christin, J. Chuang.
Proceedings of the 2nd International Conference on Game
Theory for Networks (GameNets 2011), April 2011.
Uncertainty in Interdependent Security Games
B. Johnson, J. Grossklags, N. Christin, J. Chuang.
Proceedings of 2010 Conference on Decision and Game
Theory for Security (GameSec 2010), November 2010.
Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information
B. Johnson, J. Grossklags, N. Christin, J. Chuang.
Proceedings of 15th European Symposium on Research in
Computer Security (ESORICS'10), September 2010.
Nudge: Intermediaries' Role in Interdependent Network Security
J. Grossklags, S. Radosavac, A. Cardenas, J.
Chuang. Proceedings of 3rd International Conference on
Trust and Trustworthy Computing (Trust'10), June 2010.
Security and Insurance Management in Networks with Heterogeneous Agents
J. Grossklags, N. Christin, J. Chuang. Proceedings
of ACM E-Commerce Conference (EC'08), July 2008.
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents
J. Grossklags, N. Christin, J. Chuang. Proceedings (online) of the 7th Workshop on Economics of Information Security (WEIS 2008). Hannover, NH. June 2008.
Predicted and Observed User Behavior in the Weakest-Link Security Game
J. Grossklags, N. Christin, J. Chuang. Proceedings
of the 2008 USENIX Workshop on Usability, Psychology,
and Security (UPSEC'08), April 2008.
Secure or Insure? A Game-Theoretic Analysis of Information
Security Games
J. Grossklags, N. Christin, J. Chuang. Proceedings of the 17th International World Wide Web Conference (WWW2008), April 2008.
Near Rationality and Competitive Equilibria in Networked Systems
N. Christin, J. Grossklags and J. Chuang,
Proceedings of ACM SIGCOMM Workshop on Practice and
Theory of Incentives in Networked Systems (PINS), August
2004.
Economics of
Computer Networks
Loci
of Competition for Future Internet Architectures
J. Chuang. IEEE
Communications Magazine, Special Issue on
Future Internet Architectures:
Design and Deployment Perspectives, July 2011.
Innovations and Upgrades in Virtualized Network Architectures
P. Laskowski, J. Chuang. Proceedings of 2010
Workshop on the Economics of Networks, Systems, and
Computation (NetEcon 2010), October 2010.
A
Leap of Faith: From Large-Scale Testbeds, to the Global
Internet
P. Laskowski, J. Chuang. 37th Research Conference on
Communication, Information and Internet Policy (TPRC'09),
September 2009.
Service Adoption and Pricing of Content Delivery Network (CDN) Services
K. Hosanagar, J. Chuang, R. Krishnan, M. D. Smith, Management Science, September 2008. Conference Version: K.
Hosanagar, R. Krishnan, M. Smith and J. Chuang. Optimal
Pricing of Content Distribution Network Services.
Proceedings of HICSS 2004, Hawaii, January 2004.
User-Directed Routing: From Theory, Towards Practice
P. Laskowski, B. Johnson, J. Chuang. Proceedings of
ACM SIGCOMM Workshop on the Economics of Networks,
Systems, and Computation (NetEcon 2008), August 2008.
Economics-Informed Design of Content Delivery Networks
N. Christin, J. Chuang, J. Grossklags. In R. Buyya,
A.K. Pathan, A. Vakali, eds., Content
Delivery Networks: Principles and Paradigms,
Springer Verlag, August 2008.
Modeling the Adoption of New Network Architectures
D. Joseph, N. Shetty, J. Chuang, I. Stoica. ACM CoNEXT, Dec 2007.
Hidden-Action in Network Routing
M. Feldman, J. Chuang, I. Stoica, S. Shenker. IEEE Journal on Selected Areas in Communications, August 2007.
Conference version: M. Feldman, J. Chuang, I. Stoica,
and S. Shenker, Hidden-Action in Multi-Hop Routing. Proceedings of ACM
E-Commerce Conference (EC'05), June 2005.
Encouraging
Cooperative Interaction Among Network Entities
S. Buchegger, J. Chuang. In F.H.P. Fitzek, M.D.
Katz, eds., Cognitive Wireless Networks: Concepts,
Methodologies and Visions Inspiring the Age of
Enlightenment of Wireless Communications,
Springer, 2007.
On the Optimality and Interconnection of Valiant Load-Balancing Networks
B.
Babaioff, J. Chuang. IEEE INFOCOM, May 2007. (PPT)
Network Monitors and Contracting Systems: Competition and Innovation
P.
Laskowski, J. Chuang. ACM SIGCOMM, September 2006.
Pricing and Resource Allocation in Caching Services with Multiple
Levels of Quality of Service
K. Hosanagar, R. Krishnan, J. Chuang, and V.
Choudhary, , Management Science, Vol. 51, No.
12, December 2005.
Conference version: K. Hosanagar, R. Krishnan, J.
Chuang, and V. Choudhary, Pricing Vertically
Differentiated Web Caching Services, Proceedings of
International Conference on Information Systems (ICIS
2002), Barcelona Spain, December 2002.
A
Cost-Based Analysis of Overlay Routing Geometries
N. Christin and J. Chuang. Proceedings of IEEE
INFOCOM'05, March 2005.
Near Rationality and Competitive Equilibria in Networked Systems
N. Christin, J. Grossklags and J. Chuang,
Proceedings of ACM SIGCOMM Workshop on Practice and
Theory of Incentives in Networked Systems (PINS), August
2004.
Economics of Ad-Hoc, Overlay and Traditional Networks: A
Topological Perspective
J. Chuang, Position Paper for the ACM SIGCOMM
Workshop on Network Research: Exploration of Dimensions
and Scope, Karlsruhe Germany, August 2003.
Economics of Scalable Network Services
J. Chuang. Proceedings of SPIE ITCOM 2001, Denver
CO, August 2001.
Pricing Multicast Communications: A Cost-Based Approach
J. Chuang and M. Sirbu. Telecommunication
Systems 17 (3):281-297, July 2001.
Conference version: J. Chuang and M. Sirbu, Pricing Multicast Communications: A Cost-Based Approach. Proceedings
of the Internet Society INET'98 Conference, Geneva
Switzerland, July 21-24 1998.
Network Transmission and Storage: Vertical Relationships and Industry
Structure
J. Chuang. 27th Telecommunications Policy Research
Conference, Alexandria VA, September 1999.
Open Collaboration and Peer Production
The Virtuous Circle of Wikipedia: Recursive Measures of Collaboration Structures
M. Klein, T. Maillart, J. Chuang. Proceedings of 18th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW'15), March 2015.
Community-based Web Security: Complementary Roles of the Serious and Casual Contributors
P. Chia, J. Chuang. Proceedings of ACM CSCW,
February 2012.
Discovering Digital Content in the Age of Peer-to-Peer
P. Laskowski, J. Ubois, D. Marvit, J. Chuang. 2009
Workshop on the Economics of Networks, Systems, and
Computation (NetEcon 2009), July 2009.
Incentives in Peer-to-Peer Systems
M. Babaioff, J. Chuang, M. Feldman. In N. Nisan, T.
Roughgarden, E. Tardos, V. Vazirani, eds., Algorithmic Game Theory, Cambridge University Press, 2007.
Service Differentiated Peer Selection: An Incentive Mechanism for Peer-to-Peer Media Streaming
A. Habib and J. Chuang. IEEE Transactions on
Multimedia, Vol. 8, No. 3, June 2006.
Free-Riding and Whitewashing in Peer-to-Peer Systems
M.
Feldman, C. Papadimitriou, J. Chuang, I. Stoica. IEEE
Journal on Selected Areas in Communications,
Vol. 24, No. 5, May 2006.
Conference version: M. Feldman, C. Papadimitriou,
J. Chuang, and I. Stoica, Free-Riding and Whitewashing in Peer-to-Peer Systems.
Proceedings of ACM SIGCOMM Workshop on Practice and
Theory of Incentives in Networked Systems (PINS), August
2004.
Overcoming Free-Riding Behavior in Peer-to-Peer Systems
M. Feldman and J. Chuang. ACM Sigecom Exchanges,
Summer 2005.
The
Evolution of Cooperation under Cheap Pseudonyms
M. Feldman and J. Chuang, Proceedings of 7th
International IEEE Conference on E-Commerce Technology
(CEC'05), July 2005.
Content Availability, Pollution and Poisoning in Peer-to-Peer File Sharing
Networks
N. Christin, A. Weigend, and J. Chuang. Proceedings
of ACM E-Commerce Conference (EC'05), June 2005.
A
Cost-Based Analysis of Overlay Routing Geometries
N. Christin and J. Chuang. Proceedings of IEEE
INFOCOM'05, March 2005.
A Case for Taxation in Peer-to-Peer Streaming Broadcast
Y. Chu, J. Chuang, and H. Zhang. Proceedings of ACM
SIGCOMM Workshop on Practice and Theory of Incentives in
Networked Systems (PINS), August 2004.
Incentive Mechanism for Peer-to-Peer Media Streaming
A. Habib and J. Chuang. Proceedings of 12th IEEE
International Workshop on Quality of Service, Montreal
Canada, June 2004.
Robust Incentive Techniques for Peer-to-Peer Networks
M. Feldman, K. Lai, I. Stoica, and J. Chuang.
Proceedings of 5th ACM Conference on Electronic Commerce
(EC'04), New York NY, May 2004.
Designing Incentive Mechanisms for Peer-to-Peer Systems
J. Chuang. Proceedings of 1st IEEE Workshop on Grid
Economics and Business Models, Seoul Korea, April 2004.
On the Cost of Participating in a Peer-to-Peer Network
N. Christin and J. Chuang. Proceedings of 3rd
International Workshop on Peer-to-Peer Systems (IPTPS'04),
San Diego CA, February 2004. Also appeared in Lecture
Notes in Computer Science series, Springer Verlag, 2004. [Companion Technical Report, December 2003.]
Incentives for Cooperation in Peer-to-Peer Networks
K. Lai, M. Feldman, I. Stoica and J. Chuang. 1st
Workshop on Economics of Peer-to-Peer Systems, Berkeley
CA, June 5-6 2003.
Quantifying Disincentives in Peer-to-Peer Networks
M. Feldman, K. Lai, J. Chuang and I. Stoica. 1st
Workshop on Economics of Peer-to-Peer Systems, Berkeley
CA, June 5-6 2003.
User Authentication
One-Step, Three-Factor Passthought Authentication with Custom-Fit, In-Ear EEG
N. Merrill, M. Curran, S. Gandhi, J. Chuang. Frontiers in Neuroscience, April 2019.
Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks
T. Piplani, N. Merrill, J. Chuang. Proceedings of IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018), October 2018.
Exploring the Feasibility and Performance of One-Step Three-Factor Authentication with Ear-EEG
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Proceedings of 5th International Conference on Physiological Computing Systems (PhyCS 2018), September 2018.
Best Student Paper Award
Is the Future of Authenticity All In Our Heads? Moving Passthoughts From the Lab to the World
N. Merrill, M. Curran, J. Chuang. New Security Paradigms Workshop (NSPW ’17), October 2017.
One-Step, Three-Factor Authentication in a Single Earpiece
M. Curran, N. Merrill, S. Gandhi, J. Chuang. Adjunct Proceedings of ACM UbiComp/ISWC, September 2017.
Passthoughts Authentication with Low Cost EarEEG
M. Curran, J. Yang, N. Merrill, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.
Passthoughts on the Go: Effect of Exercise on EEG Authentication (Extended Version)
G. Chuang, J. Chuang. Proceedings of 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016), August 2016.
My Thoughts are Not Your Thoughts: Robustness of Brainwave Signal Authentication Against Impersonation Attacks
B. Johnson, T. Maillart, J. Chuang.
Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE'14), ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14), September 2014.
One-Step Two-Factor Authentication with Wearable Bio-Sensors
J. Chuang. Workshop on "Who are you?! Adventures in Authentication" (WAY'14), 10th USENIX Symposium on Usable Privacy and Security (SOUPS'14), July 2014.
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves (Project Page)
J. Chuang, H. Nguyen, C. Wang, B. Johnson.
Workshop on Usable Security (USEC'13), Proceedings of the Seventeenth International Conference on Financial Cryptography and Data Security (FC’13), April 2013.
Distributed Authentication in Kerberos Using Public Key Cryptography
M. Sirbu and J. Chuang. Proceedings of the Internet
Society Symposium on Network and Distributed System
Security (NDSS'97), San Diego CA, Feb 10-11 1997.
Public-Key Based Ticket Granting Service in Kerberos
M. Sirbu and J. Chuang, IETF Internet Draft, May
1996.
Media
Streaming, Multi-homing, Web Caching, and Network
Storage
Improving Application QoS with Residential Multihoming
A. Habib, J. Chuang. Computer Networks,
Volume 51, Issue 12, Pages 3323-3337, August 2007.
On
the
Feasibility of Switching ISPs in Residential Multihoming
A. Habib, N. Christin, J. Chuang. Proceedings of
International Workshop on Quality-of-Service (IWQoS),
June 2007.
Taking
Advantage of Multihoming with Session Layer Striping
A. Habib, N. Christin, and J. Chuang, Proceedings
of the 9th IEEE Global Internet Symposium (Global
Internet 2006), pages 102-107, Barcelona, Spain. April
2006.
A
Tree-based Forward Digest Protocol to Verify Data
Integrity in Distributed Media Streaming
A. Habib, D. Xu, M. Atallah, B. Bhargava and J.
Chuang, IEEE Transactions on Knowledge and Data
Engineering, July 2005.
MMS:
A Multihome-Aware Media Streaming System
A. Habib and J. Chuang, Proceedings of 13th
Multimedia Computing and Networking Conference (MMCN
'06), January 2006. Earlier version appeared as: A.
Habib, J. Chuang, Multihoming Media Streaming, IEEE
Workshop on Multimedia Systems and Networking (WMSN
'05), April 2005.
Verifying
Data Integrity in Peer-to-Peer Media Streaming
A. Habib, D. Xu, M. Atallah, B. Bhargava and J.
Chuang. ACM/SPIE Multimedia Computing and Networking
(MMCN '05), Jan. 2005.
Resilient Data-Centric Storage in Wireless Sensor Networks
A. Ghose, J. Grossklags, and J. Chuang. IEEE
Distributed Systems Online. November 2003.
Conference version: A. Ghose, J. Grossklags, and J.
Chuang, Resilient
Data-Centric Storage in Wireless Sensor Networks. Proceedings
of 4th International Conference on Mobile Data
Management (MDM 2003), Melbourne Australia, January
2003. Best Paper Award. Also appeared in Lecture
Notes in Computer Science series, No. 2574, pp. 45-62,
Springer Verlag, 2003.
Efficiency
and Performance of Web Cache Reporting Strategies
J. Chuang, S. Kafka, and K. Norlen. Proceedings of
IEEE International Workshop on Data Semantics in Web
Information Systems, Singapore, December 2002.
Service
Differentiation in Web Caching and Content Distribution
M. Feldman and J. Chuang. Proceedings of IASTED
International Conference on Communications and Computer
Networks 2002, Cambridge MA, November 2002.
A
Secure, Publisher-Centric Web Caching Infrastructure
A. Myers, J. Chuang, U. Hengartner, Y. Xie, W.
Zhuang, and H. Zhang. Proceedings of IEEE INFOCOM 2001,
Anchorage AK, April 2001.
Distributed
Network Storage with Quality-of-Service Guarantees
J. Chuang and M. Sirbu. Journal of Network and
Computer Applications 23(3):163-185, July 2000.
Conference version: J. Chuang and M. Sirbu, Distributed
Network Storage with Quality-of-Service Guarantees.
Proceedings of the Internet Society INET'99 Conference,
San Jose CA, June 22-25 1999.
Resource
Allocation for stor-serv: Network Storage Services with QoS
Guarantees
J. Chuang. Proceedings of Internet2 Network Storage
Symposium 1999, Seattle WA, October 1999.
Other
The Evolving Braid: How an Organization in Uganda Achieved Reliable Communications
M. Densmore, B. Bellows, J. Chuang, E. Brewer. Proceedings of Sixth International Conference on Information and Communication Technologies and Development (ICTD2013), December 2013.
Improving Transparency: Extracting, Visualising and Analysing Corporate Relationships from SEC 10-K Documents
M. Gebbie, K. Norlen, G. Lucas, J. Chuang. International Journal on Technology, Policy and Management, Vol. 7, No. 1, pp. 15-31, 2007.
Conference version: G. Lucas, M. Gebbie, K. Norlen
and J. Chuang, Improving Transparency: Extracting, Visualizing, and Analyzing Corporate Relationships from SEC 10-K Documents. 7th
International Conference on Technology Policy and
Innovation, Monterrey Mexico, June 10-13 2003.
On Characterizing Affinity and Its Impact on Network Performance
G. Lucas, A. Ghose, and J. Chuang. Proceedings of
ACM SIGCOMM Workshop on Models, Methods and Tools for
Reproducible Network Research, Karlsruhe Germany, August
25 2003.
EVA: Extraction, Visualization and Analysis of the Telecommunications and
Media Ownership Network
K. Norlen, G. Lucas, M. Gebbie, and J. Chuang.
Proceedings of International Telecommunications Society
14th Biennial Conference (ITS2002), Seoul Korea, August
2002.
Network Delivery of Information Goods: Optimal Pricing of Articles and
Subscriptions
J. Chuang and M. Sirbu. In B. Kahin and H. Varian,
eds., Internet Publishing and Beyond: The Economics
of Digital Information and Intellectual Property,
MIT Press, August 2000.
Optimal Bundling Strategy for Digital Information Goods: Network Delivery
of Articles and Subscriptions
J. Chuang and M. Sirbu. Information Economics and
Policy 11(2):147-176, 1999.
MIPS R10000 Superscalar Microprocessor
A. Ahi, A. Bomdica, G. Shippen, H. Sucar, H.
Su, J. Chuang, N. Vasseghi, R. Ramchandani, R. Martin,
R. Conrad, Y. Chen, K. Yeager, W. Voegtli Jr., M.
Seddighnezhad, Y. Van Atta. HOT CHIPS Symposium VII,
Stanford CA, August 13-15, 1995. [chip photos: small,
medium,
large][packaged: NEC, Toshiba]
|
|