The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jason I. Hong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eric S. Chung, Jason I. Hong, James Lin, Madhu K. Prabaker, James A. Landay, Alan L. Liu
    Development and evaluation of emerging design patterns for ubiquitous computing. [Citation Graph (0, 0)][DBLP]
    Conference on Designing Interactive Systems, 2004, pp:233-242 [Conf]
  2. Jason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay
    Privacy risk models for designing privacy-sensitive ubiquitous computing systems. [Citation Graph (0, 0)][DBLP]
    Conference on Designing Interactive Systems, 2004, pp:91-100 [Conf]
  3. Mark W. Newman, Jana Z. Sedivy, Christine Neuwirth, W. Keith Edwards, Jason I. Hong, Shahram Izadi, Karen Marcelo, Trevor F. Smith
    Designing for serendipity: supporting end-user configuration of ubiquitous computing environments. [Citation Graph (0, 0)][DBLP]
    Symposium on Designing Interactive Systems, 2002, pp:147-156 [Conf]
  4. Jason I. Hong
    The context fabric: an infrastructure for context-aware computing. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2002, pp:554-555 [Conf]
  5. Jason I. Hong, Jeffrey Wong
    Marmite: end-user programming for the web. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2006, pp:1541-1546 [Conf]
  6. Xiaodong Jiang, Jason I. Hong, Leila Takayama, James A. Landay
    Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command. [Citation Graph (0, 0)][DBLP]
    CHI, 2004, pp:679-686 [Conf]
  7. James Lin, Mark W. Newman, Jason I. Hong, James A. Landay
    DENIM: finding a tighter fit between tools and practice for Web site design. [Citation Graph (0, 0)][DBLP]
    CHI, 2000, pp:510-517 [Conf]
  8. Jennifer Ng, Jonathan Terleski, Jason I. Hong
    Whisper: analysis and design for a community event service. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2006, pp:1151-1156 [Conf]
  9. Leila Takayama, Lawrence Leung, Xiaodong Jiang, Jason I. Hong
    You're getting warmer!: how proximity information affects search behavior in physical spaces. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2003, pp:1028-1029 [Conf]
  10. Karen P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong
    Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. [Citation Graph (0, 0)][DBLP]
    CHI, 2006, pp:93-102 [Conf]
  11. Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge
    Protecting people from phishing: the design and evaluation of an embedded training email system. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:905-914 [Conf]
  12. Jeffrey Wong, Jason I. Hong
    Making mashups with marmite: towards end-user programming for the web. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:1435-1444 [Conf]
  13. Michael F. Marotta, Purin Phanichphant, Patrick Malatack, Tej Shah, Greg Price, Thankam Thyvalikakath, Titus Schleyer, Jason I. Hong
    Design and evaluation of 3d models for electronic dental records. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2007, pp:2567-2572 [Conf]
  14. Jeffrey Heer, Alan Newberger, Chris Beckmann, Jason I. Hong
    liquid: Context-Aware Distributed Queries. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2003, pp:140-148 [Conf]
  15. Xiaodong Jiang, Jason I. Hong, James A. Landay
    Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2002, pp:176-193 [Conf]
  16. Jason I. Hong, James A. Landay
    An Architecture for Privacy-Sensitive Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2004, pp:- [Conf]
  17. Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, James A. Landay
    Siren: Context-aware Computing for Firefighting. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2004, pp:87-105 [Conf]
  18. Danyel Fisher, Kris Hildrum, Jason I. Hong, Mark W. Newman, Megan Thomas, Rich Vuduc
    SWAMI: a framework for collaborative filtering algorithm development and evaluation. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2000, pp:366-368 [Conf]
  19. Jason I. Hong, James A. Landay
    SATIN: a toolkit for informal ink-based applications. [Citation Graph (0, 0)][DBLP]
    UIST, 2000, pp:63-72 [Conf]
  20. Yang Li, Jason I. Hong, James A. Landay
    Topiary: a tool for prototyping location-enhanced applications. [Citation Graph (0, 0)][DBLP]
    UIST, 2004, pp:217-226 [Conf]
  21. Michael Chen, Marti A. Hearst, Jason I. Hong, James Lin
    Cha-Cha: A System for Organizing Intranet Search Results. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  22. Bill N. Schilit, Anthony LaMarca, Gaetano Borriello, William G. Griswold, David McDonald, Edward D. Lazowska, Anand Balachandran, Jason I. Hong, Vaughn Iverson
    Challenge: ubiquitous location-aware computing and the "place lab" initiative. [Citation Graph (0, 0)][DBLP]
    WMASH, 2003, pp:29-35 [Conf]
  23. Jason I. Hong, James A. Landay
    WebQuilt: a framework for capturing and visualizing the web experience. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:717-724 [Conf]
  24. Jason I. Hong
    Minimizing Security Risks in Ubicomp Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:12, pp:118-119 [Journal]
  25. Bill N. Schilit, Jason I. Hong, Marco Gruteser
    Wireless Location Privacy Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:12, pp:135-137 [Journal]
  26. Jason I. Hong, James A. Landay
    A Context/Communication Information Agent. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 2001, v:5, n:1, pp:78-81 [Journal]
  27. Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay
    Personal privacy through understanding and action: five pitfalls for designers. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 2004, v:8, n:6, pp:440-454 [Journal]
  28. Jason I. Hong, Jeffrey Heer, Sarah Waterson, James A. Landay
    WebQuilt: A proxy-based approach to remote web usability testing. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 2001, v:19, n:3, pp:263-285 [Journal]
  29. Gregory D. Abowd, Christopher G. Atkeson, Jason I. Hong, Sue Long, Rob Kooper, Mike Pinkerton
    Cyberguide: A mobile context-aware tour guide. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1997, v:3, n:5, pp:421-433 [Journal]
  30. Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. Hong
    Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2007, pp:91-108 [Conf]
  31. Yue Zhang, Jason I. Hong, Lorrie Faith Cranor
    Cantina: a content-based approach to detecting phishing web sites. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:639-648 [Conf]

  32. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. [Citation Graph (, )][DBLP]


  33. Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP]


  34. Contextual web history: using visual and contextual cues to improve web browser history. [Citation Graph (, )][DBLP]


  35. SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections. [Citation Graph (, )][DBLP]


  36. Generating default privacy policies for online social networks. [Citation Graph (, )][DBLP]


  37. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. [Citation Graph (, )][DBLP]


  38. GRAPHITE: A Visual Query System for Large Graphs. [Citation Graph (, )][DBLP]


  39. Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. [Citation Graph (, )][DBLP]


  40. A framework of energy efficient mobile sensing for automatic user state recognition. [Citation Graph (, )][DBLP]


  41. Phinding Phish: An Evaluation of Anti-Phishing Toolbars. [Citation Graph (, )][DBLP]


  42. A hybrid phish detection approach by identity discovery and keywords retrieval. [Citation Graph (, )][DBLP]


  43. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. [Citation Graph (, )][DBLP]


  44. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. [Citation Graph (, )][DBLP]


  45. Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP]


  46. School of phish: a real-word evaluation of anti-phishing training. [Citation Graph (, )][DBLP]


  47. Analyzing use of privacy policy attributes in a location sharing application. [Citation Graph (, )][DBLP]


Search in 0.029secs, Finished in 0.033secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002