Search the dblp DataBase
Jason I. Hong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Eric S. Chung , Jason I. Hong , James Lin , Madhu K. Prabaker , James A. Landay , Alan L. Liu Development and evaluation of emerging design patterns for ubiquitous computing. [Citation Graph (0, 0)][DBLP ] Conference on Designing Interactive Systems, 2004, pp:233-242 [Conf ] Jason I. Hong , Jennifer D. Ng , Scott Lederer , James A. Landay Privacy risk models for designing privacy-sensitive ubiquitous computing systems. [Citation Graph (0, 0)][DBLP ] Conference on Designing Interactive Systems, 2004, pp:91-100 [Conf ] Mark W. Newman , Jana Z. Sedivy , Christine Neuwirth , W. Keith Edwards , Jason I. Hong , Shahram Izadi , Karen Marcelo , Trevor F. Smith Designing for serendipity: supporting end-user configuration of ubiquitous computing environments. [Citation Graph (0, 0)][DBLP ] Symposium on Designing Interactive Systems, 2002, pp:147-156 [Conf ] Jason I. Hong The context fabric: an infrastructure for context-aware computing. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2002, pp:554-555 [Conf ] Jason I. Hong , Jeffrey Wong Marmite: end-user programming for the web. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2006, pp:1541-1546 [Conf ] Xiaodong Jiang , Jason I. Hong , Leila Takayama , James A. Landay Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command. [Citation Graph (0, 0)][DBLP ] CHI, 2004, pp:679-686 [Conf ] James Lin , Mark W. Newman , Jason I. Hong , James A. Landay DENIM: finding a tighter fit between tools and practice for Web site design. [Citation Graph (0, 0)][DBLP ] CHI, 2000, pp:510-517 [Conf ] Jennifer Ng , Jonathan Terleski , Jason I. Hong Whisper: analysis and design for a community event service. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2006, pp:1151-1156 [Conf ] Leila Takayama , Lawrence Leung , Xiaodong Jiang , Jason I. Hong You're getting warmer!: how proximity information affects search behavior in physical spaces. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2003, pp:1028-1029 [Conf ] Karen P. Tang , Pedram Keyani , James Fogarty , Jason I. Hong Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. [Citation Graph (0, 0)][DBLP ] CHI, 2006, pp:93-102 [Conf ] Ponnurangam Kumaraguru , Yong Rhee , Alessandro Acquisti , Lorrie Faith Cranor , Jason I. Hong , Elizabeth Nunge Protecting people from phishing: the design and evaluation of an embedded training email system. [Citation Graph (0, 0)][DBLP ] CHI, 2007, pp:905-914 [Conf ] Jeffrey Wong , Jason I. Hong Making mashups with marmite: towards end-user programming for the web. [Citation Graph (0, 0)][DBLP ] CHI, 2007, pp:1435-1444 [Conf ] Michael F. Marotta , Purin Phanichphant , Patrick Malatack , Tej Shah , Greg Price , Thankam Thyvalikakath , Titus Schleyer , Jason I. Hong Design and evaluation of 3d models for electronic dental records. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2007, pp:2567-2572 [Conf ] Jeffrey Heer , Alan Newberger , Chris Beckmann , Jason I. Hong liquid: Context-Aware Distributed Queries. [Citation Graph (0, 0)][DBLP ] Ubicomp, 2003, pp:140-148 [Conf ] Xiaodong Jiang , Jason I. Hong , James A. Landay Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] Ubicomp, 2002, pp:176-193 [Conf ] Jason I. Hong , James A. Landay An Architecture for Privacy-Sensitive Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] MobiSys, 2004, pp:- [Conf ] Xiaodong Jiang , Nicholas Y. Chen , Jason I. Hong , Kevin Wang , Leila Takayama , James A. Landay Siren: Context-aware Computing for Firefighting. [Citation Graph (0, 0)][DBLP ] Pervasive, 2004, pp:87-105 [Conf ] Danyel Fisher , Kris Hildrum , Jason I. Hong , Mark W. Newman , Megan Thomas , Rich Vuduc SWAMI: a framework for collaborative filtering algorithm development and evaluation. [Citation Graph (0, 0)][DBLP ] SIGIR, 2000, pp:366-368 [Conf ] Jason I. Hong , James A. Landay SATIN: a toolkit for informal ink-based applications. [Citation Graph (0, 0)][DBLP ] UIST, 2000, pp:63-72 [Conf ] Yang Li , Jason I. Hong , James A. Landay Topiary: a tool for prototyping location-enhanced applications. [Citation Graph (0, 0)][DBLP ] UIST, 2004, pp:217-226 [Conf ] Michael Chen , Marti A. Hearst , Jason I. Hong , James Lin Cha-Cha: A System for Organizing Intranet Search Results. [Citation Graph (0, 0)][DBLP ] USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf ] Bill N. Schilit , Anthony LaMarca , Gaetano Borriello , William G. Griswold , David McDonald , Edward D. Lazowska , Anand Balachandran , Jason I. Hong , Vaughn Iverson Challenge: ubiquitous location-aware computing and the "place lab" initiative. [Citation Graph (0, 0)][DBLP ] WMASH, 2003, pp:29-35 [Conf ] Jason I. Hong , James A. Landay WebQuilt: a framework for capturing and visualizing the web experience. [Citation Graph (0, 0)][DBLP ] WWW, 2001, pp:717-724 [Conf ] Jason I. Hong Minimizing Security Risks in Ubicomp Systems. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2005, v:38, n:12, pp:118-119 [Journal ] Bill N. Schilit , Jason I. Hong , Marco Gruteser Wireless Location Privacy Protection. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:12, pp:135-137 [Journal ] Jason I. Hong , James A. Landay A Context/Communication Information Agent. [Citation Graph (0, 0)][DBLP ] Personal and Ubiquitous Computing, 2001, v:5, n:1, pp:78-81 [Journal ] Scott Lederer , Jason I. Hong , Anind K. Dey , James A. Landay Personal privacy through understanding and action: five pitfalls for designers. [Citation Graph (0, 0)][DBLP ] Personal and Ubiquitous Computing, 2004, v:8, n:6, pp:440-454 [Journal ] Jason I. Hong , Jeffrey Heer , Sarah Waterson , James A. Landay WebQuilt: A proxy-based approach to remote web usability testing. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst., 2001, v:19, n:3, pp:263-285 [Journal ] Gregory D. Abowd , Christopher G. Atkeson , Jason I. Hong , Sue Long , Rob Kooper , Mike Pinkerton Cyberguide: A mobile context-aware tour guide. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 1997, v:3, n:5, pp:421-433 [Journal ] Gary Hsieh , Karen P. Tang , Wai Yong Low , Jason I. Hong Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM. [Citation Graph (0, 0)][DBLP ] Ubicomp, 2007, pp:91-108 [Conf ] Yue Zhang , Jason I. Hong , Lorrie Faith Cranor Cantina: a content-based approach to detecting phishing web sites. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:639-648 [Conf ] You've been warned: an empirical study of the effectiveness of web browser phishing warnings. [Citation Graph (, )][DBLP ] Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP ] Contextual web history: using visual and contextual cues to improve web browser history. [Citation Graph (, )][DBLP ] SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections. [Citation Graph (, )][DBLP ] Generating default privacy policies for online social networks. [Citation Graph (, )][DBLP ] A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. [Citation Graph (, )][DBLP ] GRAPHITE: A Visual Query System for Large Graphs. [Citation Graph (, )][DBLP ] Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. [Citation Graph (, )][DBLP ] A framework of energy efficient mobile sensing for automatic user state recognition. [Citation Graph (, )][DBLP ] Phinding Phish: An Evaluation of Anti-Phishing Toolbars. [Citation Graph (, )][DBLP ] A hybrid phish detection approach by identity discovery and keywords retrieval. [Citation Graph (, )][DBLP ] Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. [Citation Graph (, )][DBLP ] Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. [Citation Graph (, )][DBLP ] Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP ] School of phish: a real-word evaluation of anti-phishing training. [Citation Graph (, )][DBLP ] Analyzing use of privacy policy attributes in a location sharing application. [Citation Graph (, )][DBLP ] Search in 0.029secs, Finished in 0.033secs