​
Login / Signup
Ken Wong
Publication Activity (10 Years)
Years Active: 1985-2019
Publications (10 Years): 5
Top Topics
Fuzzy Clustering
Low Energy
Microblog Posts
Database
Top Venues
CoRR
CNS
ICISSP
EDBT
</>
Publications
</>
Alexander William Wong
,
Ken Wong
,
Abram Hindle
Tracing Forum Posts to MOOC Content using Topic Analysis.
CoRR
(2019)
Aaron Hunter
,
Ken Wong
Decoy Systems with Low Energy Bluetooth Communication.
ICISSP
(2018)
Anjan Kumar Amirishetty
,
Yunrui Li
,
Tolga Yurek
,
Mahesh Girkar
,
Wilson Chan
,
Graham Ivey
,
Vsevolod Panteleenko
,
Ken Wong
Buddy Instance - A Mechanism for Increasing Availability in Shared-Disk Clusters.
EDBT
(2017)
Ken Wong
,
Aaron Hunter
Bluetooth for decoy systems: A practical study.
CNS
(2017)
Anjan Kumar Amirishetty
,
Yunrui Li
,
Tolga Yurek
,
Mahesh Girkar
,
Wilson Chan
,
Graham Ivey
,
Vsevolod Panteleenko
,
Ken Wong
Improving Predictable Shared-Disk Clusters Performance for Database Clouds.
ICDE
(2017)
Parmod Kumar
,
Faisal Mahmood
,
Dhanya Menoth Mohan
,
Ken Wong
,
Abhishek Agrawal
,
Mohamed Elgendi
,
Rohit Shukla
,
Justin Dauwels
,
Alice H. D. Chan
On the effect of subliminal priming on subjective perception of images: A machine learning approach.
EMBC
(2014)
James Randa
,
Joel Dunsmore
,
Dazhen Gu
,
Ken Wong
,
David K. Walker
,
Roger D. Pollard
Verification of Noise-Parameter Measurements and Uncertainties.
IEEE Trans. Instrum. Meas.
60 (11) (2011)
Charlie Wiseman
,
Jyoti Parwatikar
,
Ken Wong
,
John D. DeHart
,
Jonathan S. Turner
Design of an Extensible Network Testbed.
NCA
(2010)
Charlie Wiseman
,
Jonathan S. Turner
,
Michela Becchi
,
Patrick Crowley
,
John D. DeHart
,
Mart Haitjema
,
Shakir James
,
Fred Kuhns
,
Jing Lu
,
Jyoti Parwatikar
,
Ritun Patney
,
Michael Wilson
,
Ken Wong
,
David Zar
A remotely accessible network processor-based router for network experimentation.
ANCS
(2008)
Charlie Wiseman
,
Ken Wong
,
Tilman Wolf
,
Sergey Gorinsky
Operational experience with a virtual networking laboratory.
SIGCSE
(2008)
Ken Wong
,
Tilman Wolf
,
Sergey Gorinsky
,
Jonathan S. Turner
Teaching experiences with a virtual network laboratory.
SIGCSE
(2007)
Charlie Wiseman
,
Jonathan S. Turner
,
Ken Wong
,
Brandon Heller
Experimental evaluation of a coarse-grained switch scheduler.
ANCS
(2007)
John D. DeHart
,
Fred Kuhns
,
Jyoti Parwatikar
,
Jonathan S. Turner
,
Charlie Wiseman
,
Ken Wong
The open network laboratory.
SIGCSE
(2006)
John D. DeHart
,
Fred Kuhns
,
Jyoti Parwatikar
,
Jonathan S. Turner
,
Charlie Wiseman
,
Ken Wong
The open network laboratory: a resource for networking research and education.
Comput. Commun. Rev.
35 (5) (2005)
Fred Kuhns
,
John D. DeHart
,
Anshul Kantawala
,
Ralph Keller
,
John W. Lockwood
,
Prashanth Pappu
,
David Richard
,
David E. Taylor
,
Jyoti Parwatikar
,
Ed Spitznagel
,
Jonathan S. Turner
,
Ken Wong
Design and Evaluation of a High Performance Dynamically Extensible Router.
DANCE
(2002)
Li-Fu Chang
,
Abhay Dubey
,
Keh-Jeng Chang
,
Robert Mathews
,
Ken Wong
Incorporating Process Induced Effects into RC Extraction.
VLSI Design
(1999)
Ken Wong
Looking at Code With Your Safety Goggles On.
Ada-Europe
(1998)
Ken Wong
,
Jeff Joyce
Refinement of Safety-Related Hazards into Verifiable Code Assertions.
SAFECOMP
(1998)
Ken Wong
,
Mark A. Franklin
Performance Analysis of a Parallel Logic Simulation Machine.
J. Parallel Distributed Comput.
7 (3) (1989)
Ken Wong
The risk involved in computerisation what can go wrong.
Comput. Law Secur. Rev.
1 (5) (1986)
Ken Wong
What does go wrong - The facts.
Comput. Law Secur. Rev.
1 (6) (1986)
Ken Wong
Computer crime - Risk management and computer security.
Comput. Secur.
4 (4) (1985)