Follow
Jay Chen
Jay Chen
Senior Researcher (ICSI)
Verified email at icsi.berkeley.edu
Title
Cited by
Cited by
Year
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ...
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
5232005
Adaptive congestion control for unpredictable cellular networks
Y Zaki, T Pötsch, J Chen, L Subramanian, C Görg
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
2502015
Digital privacy challenges with shared mobile phone use in Bangladesh
SI Ahmed, MR Haque, J Chen, N Dell
Proceedings of the ACM on Human-computer Interaction 1 (CSCW), 1-20, 2017
1282017
Computing within limits
B Nardi, B Tomlinson, DJ Patterson, J Chen, D Pargman, B Raghavan, ...
Communications of the ACM 61 (10), 86-93, 2018
992018
Cultural and psychological factors in cyber-security
T Halevi, N Memon, J Lewis, P Kumaraguru, S Arora, N Dagar, F Aloul, ...
Proceedings of the 18th International Conference on Information Integration …, 2016
712016
Hermes: data transmission over unknown voice channels
A Dhananjay, A Sharma, M Paik, J Chen, TK Kuppusamy, J Li, ...
Proceedings of the sixteenth annual international conference on Mobile …, 2010
692010
SMS-based web search for low-end mobile devices
J Chen, L Subramanian, E Brewer
Proceedings of the sixteenth annual international conference on Mobile …, 2010
652010
Infrastructure as creative action: Online buying, selling, and delivery in Phnom Penh
M Jack, J Chen, SJ Jackson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
642017
Dissecting web latency in ghana
Y Zaki, J Chen, T Pötsch, T Ahmad, L Subramanian
Proceedings of the 2014 Conference on Internet Measurement Conference, 241-248, 2014
632014
" Everyone Has Some Personal Stuff" Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
SI Ahmed, MR Haque, I Haider, J Chen, N Dell
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
552019
Exploring internet security perceptions and practices in urban ghana
J Chen, M Paik, K McCabe
10th Symposium On Usable Privacy and Security (SOUPS 2014), 129-142, 2014
502014
RuralCafe: web search in the rural developing world
J Chen, L Subramanian, J Li
Proceedings of the 18th international conference on World wide web, 411-420, 2009
482009
Computing within limits and ICTD
J Chen
First Monday, 2015
442015
Computing security in the developing world: A case for multidisciplinary research
Y Ben-David, S Hasan, J Pal, M Vallentin, S Panjwani, P Gutheim, J Chen, ...
Proceedings of the 5th ACM workshop on Networked systems for developing …, 2011
422011
Money, God, and SMS: Explorations in supporting social action through a Bangladeshi mosque
MR Rifat, J Chen, K Toyama
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
372017
The persistence of paper: a case study in microfinance from Ghana
I Ghosh, J Chen, J Ming, A Abouzied
Proceedings of the Seventh International Conference on Information and …, 2015
372015
Routing in an Internet-scale network emulator
J Chen, D Gupta, KV Vishwanath, AC Snoeren, A Vahdat
The IEEE Computer Society's 12th Annual International Symposium on Modeling …, 2004
352004
The increasing sophistication of mobile media sharing in lower-middle-class Bangalore
J O'Neill, K Toyama, J Chen, B Tate, A Siddique
Proceedings of the Eighth International Conference on Information and …, 2016
332016
One LED is Enough: Catalyzing Face-to-face Interactions at Conferences with a Gentle Nudge
J Chen, A Abouzied
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative …, 2016
312016
Shelter dynamics in refugee and IDP camps: Customization, permanency, and opportunities
S Sabie, J Chen, A Abouzied, F Hashim, H Kahlon, S Easterbrook
Proceedings of the 2017 Workshop on Computing within Limits, 11-20, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20