default search action
Jennifer Wong-Ma
Person information
- affiliation: UC Irvine, CA, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Barbara Martinez Neda, Flor Morales, Kitana Carbajal Juarez, Jennifer Wong-Ma, Sergio Gago Masagué:
Investigating the Role of Socioeconomic Factors on CS1 Performance. EDUCON 2024: 1-8 - [c43]Jason Lee Weber, Barbara Martinez Neda, Kitana Carbajal Juarez, Jennifer Wong-Ma, Sergio Gago Masagué, Hadar Ziv:
Beyond the Hype: Perceptions and Realities of Using Large Language Models in Computer Science Education at an R1 University. EDUCON 2024: 1-8 - [c42]Barbara Martinez Neda, Flor Morales, Kitana Carbajal Juarez, Jennifer Wong-Ma, Sergio Gago Masagué:
Impacts of Academic Preparedness on CS1 Performance. SIGCSE (2) 2024: 1742-1743 - [c41]Jason Lee Weber, Barbara Martinez Neda, Kitana Carbajal Juarez, Jennifer Wong-Ma, Sergio Gago Masagué, Hadar Ziv:
Measuring CS Student Attitudes Toward Large Language Models. SIGCSE (2) 2024: 1846-1847 - 2023
- [c40]Michael Luu, Matthew Ferland, Varun Nagaraj Rao, Arushi Arora, Randy Huynh, Frederick Reiber, Jennifer Wong-Ma, Michael Shindler:
What is an Algorithms Course?: Survey Results of Introductory Undergraduate Algorithms Courses in the U.S. SIGCSE (1) 2023: 284-290 - 2021
- [c39]Joshua Mitchener, Neal Beeken, Jennifer Wong-Ma:
Dashmips: MIPS Interpreter and VSCode Debugger. SIGCSE 2021: 1375
2010 – 2019
- 2013
- [j10]Joy Zhang, Jennifer L. Wong:
Editorial for MobiCASE 2011 Special Issue. Mob. Networks Appl. 18(1): 1-2 (2013) - [c38]Hui Kang, Jennifer L. Wong:
To hardware prefetch or not to prefetch?: a virtualized environment study and core binding approach. ASPLOS 2013: 357-368 - [c37]Moussa Ehsan, Yao Chen, Hui Kang, Radu Sion, Jennifer L. Wong:
LiPS: A cost-efficient data and task co-scheduler for MapReduce. HiPC 2013: 49-58 - [e1]David Uhler, Khanjan Mehta, Jennifer L. Wong:
Mobile Computing, Applications, and Services - 4th International Conference, MobiCASE 2012, Seattle, WA, USA, October 11-12, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 110, Springer 2013, ISBN 978-3-642-36631-4 [contents] - 2012
- [c36]David Uhler, Khanjan Mehta, Jennifer L. Wong:
Erratum: Mobile Computing, Applications, and Services. MobiCASE 2012 - [c35]Hui Kang, Xiaoyun Zhu, Jennifer L. Wong:
DAPA: Diagnosing Application Performance Anomalies for Virtualized Infrastructures. Hot-ICE 2012 - 2011
- [c34]Hui Kang, Yao Chen, Jennifer L. Wong, Radu Sion, Jason Wu:
Enhancement of Xen's scheduler for MapReduce workloads. HPDC 2011: 251-262 - 2010
- [c33]Aneeta Bhattacharyya, Jennifer L. Wong:
A Resilient Actuation Attack on Wireless Sensor Networks. CAINE 2010: 251-256 - [c32]Tapsie Giridher, Anita Wasilewska, Jennifer L. Wong:
Global Mobile Applications For Monitoring Health. IMCSIT 2010: 855-859
2000 – 2009
- 2009
- [c31]Tapsie Giridher, Raksik Kim, Divya Rai, Adam Hanover, Jun Yuan, Fatima Zarinni, Christelle Scharff, Anita Wasilewska, Jennifer L. Wong:
Mobile applications for informal economies. IMCSIT 2009: 345-352 - [c30]Christelle Scharff, Anita Wasilewska, Jennifer L. Wong, Mamadou Bousso, Ibrahima Ndiaye, C. Sarr:
A model for teaching mobile application development for social changes: Implementation and lessons learned in senegal. IMCSIT 2009: 383-389 - [c29]Anita Wasilewska, Jennifer L. Wong:
Template mobile applications for social and educational development. IMCSIT 2009: 391-398 - [c28]Hui Kang, Jennifer L. Wong:
A Localized Multi-Hop Desynchronization Algorithm for Wireless Sensor Networks. INFOCOM 2009: 2906-2910 - [c27]Sandra P. Tinta, Alexander E. Mohr, Jennifer L. Wong:
Characterizing end-to-end packet reordering with UDP traffic. ISCC 2009: 321-324 - 2008
- [c26]Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, David Scott Warren, Jennifer L. Wong:
A methodology for in-network evaluation of integrated logical-statistical models. SenSys 2008: 197-210 - 2007
- [c25]Jennifer L. Wong, Seapahn Megerian, Miodrag Potkonjak:
Minimizing Global Interconnect in DSP Systems using Bypassing. ICASSP (2) 2007: 77-80 - [c24]Jennifer L. Wong, Azadeh Davoodi, Vishal Khandelwal, Ankur Srivastava, Miodrag Potkonjak:
Statistical timing analysis using Kernel smoothing. ICCD 2007: 97-102 - [c23]Miodrag Potkonjak, Jennifer L. Wong:
Introduction to Digital Design: A Paradigm-Based Approach. MSE 2007: 167-168 - 2006
- [j9]Jennifer L. Wong, Azadeh Davoodi, Vishal Khandelwal, Ankur Srivastava, Miodrag Potkonjak:
A statistical methodology for wire-length prediction. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(7): 1327-1336 (2006) - 2005
- [c22]Jennifer L. Wong, Farinaz Koushanfar, Miodrag Potkonjak:
Flexible ASIC: shared masking for multiple media processors. DAC 2005: 909-914 - [c21]Jennifer L. Wong, Weiping Liao, Fei Li, Lei He, Miodrag Potkonjak:
Scheduling of Soft Real-Time Systems for Context-Aware Applications. DATE 2005: 318-323 - [c20]Alberto Cerpa, Jennifer L. Wong, Louane Kuang, Miodrag Potkonjak, Deborah Estrin:
Statistical model of lossy links in wireless sensor networks. IPSN 2005: 81-88 - [c19]Alberto Cerpa, Jennifer L. Wong, Miodrag Potkonjak, Deborah Estrin:
Temporal properties of low power wireless links: modeling and implications on multi-hop routing. MobiHoc 2005: 414-425 - 2004
- [j8]Jennifer L. Wong, Miodrag Potkonjak, Sujit Dey:
Optimizing designs using the addition of deflection operations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(1): 50-59 (2004) - [j7]Jennifer L. Wong, Gang Qu, Miodrag Potkonjak:
Optimization-intensive watermarking techniques for decision problems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(1): 119-127 (2004) - [j6]Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng, Stefanus Mantik, Miodrag Potkonjak, Gang Qu, Jennifer L. Wong:
Effective iterative techniques for fingerprinting design IP. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(2): 208-215 (2004) - [j5]Jennifer L. Wong, Farinaz Koushanfar, Seapahn Megerian, Miodrag Potkonjak:
Probabilistic constructive optimization techniques. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(6): 859-868 (2004) - [j4]Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak:
Computational forensic techniques for intellectual property protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(6): 987-994 (2004) - [j3]Jennifer L. Wong, Rupak Majumdar, Miodrag Potkonjak:
Fair watermarking using combinatorial isolation lemmas. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(11): 1566-1574 (2004) - [j2]Jennifer L. Wong, Gang Qu, Miodrag Potkonjak:
Power minimization in QoS sensitive systems. IEEE Trans. Very Large Scale Integr. Syst. 12(6): 553-561 (2004) - [c18]Jennifer L. Wong, Azadeh Davoodi, Vishal Khandelwal, Ankur Srivastava, Miodrag Potkonjak:
Wire-length prediction using statistical techniques. ICCAD 2004: 702-705 - [c17]Jennifer L. Wong, Miodrag Potkonjak:
Relative Generic Computational Forensic Techniques. Information Hiding 2004: 148-163 - [c16]Jennifer L. Wong, Roozbeh Jafari, Miodrag Potkonjak:
Gateway Placement for Latency and Energy Efficient Data Aggregation. LCN 2004: 490-497 - [p1]Sasha Slijepcevic, Miodrag Potkonjak, Jennifer L. Wong:
Security and Privacy Protection in Wireless Sensor Networks. Handbook of Sensor Networks 2004 - 2003
- [c15]Jennifer L. Wong, Gang Qu, Miodrag Potkonjak:
An on-line approach for power minimization in QoS sensitive systems. ASP-DAC 2003: 59-64 - [c14]Jennifer L. Wong, Seapahn Megerian, Miodrag Potkonjak:
Design techniques for sensor appliances: foundations and light compass case study. DAC 2003: 66-71 - 2002
- [j1]Gregory Wolfe, Jennifer L. Wong, Miodrag Potkonjak:
Watermarking graph partitioning solutions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 21(10): 1196-1204 (2002) - [c13]Jennifer L. Wong, Seapahn Megerian, Miodrag Potkonjak:
Forward-looking objective functions: concept & applications in high level synthesis. DAC 2002: 904-909 - [c12]Farinaz Koushanfar, Jennifer L. Wong, Jessica Feng, Miodrag Potkonjak:
ILP-based engineering change. DAC 2002: 910-915 - [c11]Jennifer L. Wong, Miodrag Potkonjak:
Search in sensor networks: Challenges, techniques, and applications. ICASSP 2002: 3752-3755 - [c10]Farinaz Koushanfar, Sasha Slijepcevic, Jennifer L. Wong, Miodrag Potkonjak:
Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks. ICASSP 2002: 4186 - 2001
- [c9]Rupak Majumdar, Jennifer L. Wong:
Watermarking of SAT using Combinatorial Isolation Lemmas. DAC 2001: 480-485 - [c8]Gregory Wolfe, Jennifer L. Wong, Miodrag Potkonjak:
Watermarking Graph Partitioning Solutions. DAC 2001: 486-489 - [c7]Jennifer L. Wong, Farinaz Koushanfar, Seapahn Meguerdichian, Miodrag Potkonjak:
A Probabilistic Constructive Approach to Optimization Problems. ICCAD 2001: 453- - [c6]Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak:
Computational Forensic Techniques for Intellectual Property Protection. Information Hiding 2001: 66-80 - 2000
- [c5]Gang Qu, Jennifer L. Wong, Miodrag Potkonjak:
Fair watermarking techniques. ASP-DAC 2000: 55-60 - [c4]Darko Kirovski, David T. Liu, Jennifer L. Wong, Miodrag Potkonjak:
Forensic engineering techniques for VLSI CAD tools. DAC 2000: 581-586
1990 – 1999
- 1999
- [c3]Gang Qu, Jennifer L. Wong, Miodrag Potkonjak:
Optimization-Intensive Watermarking Techniques for Decision Problems. DAC 1999: 33-36 - [c2]Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng, Stefanus Mantik, Miodrag Potkonjak, Gang Qu, Jennifer L. Wong:
Effective Iterative Techniques for Fingerprinting Design IP. DAC 1999: 843-848 - [c1]Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, Miodrag Potkonjak, Jennifer L. Wong:
Copy detection for intellectual property protection of VLSI designs. ICCAD 1999: 600-605
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint