Home > Publications

Journals | Conferences | Book Chapters | MS Thesis | Presentations


Journal Papers     [top]

[J9] J. L. Wong, A. Davoodi, V. Khandelwal, and A. Srivastava and M. Potkonjak , "A statistical methodology for wire-length prediction," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006.

[J8] J. L. Wong, G. Qu, and M. Potkonjak , "Power minimization in QoS sensitive systems," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 6, pp. 553-561, 2004. [PDF]

[J7] J. L. Wong, R. Majumdar, and M. Potkonjak , "Fair watermarking using combinatorial isolation lemmas," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 11, pp. 1566-1574, 2004. [PDF]

[J6] J. L. Wong, F. Koushanfar, S. Megerian, and M. Potkonjak , "Probabilistic constructive optimization techniques," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 6, pp. 859-868, 2004. [PDF]

[J5] J. L. Wong, D. Kirovski, and M. Potkonjak , "Computational forensic techniques for intellectual property protection," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 6, pp. 987-994, 2004. [PDF]

[J4] A. Caldwell, H.-J. Choi, A. Kahng, S. Mantik, M. Potkonjak , G. Qu, and J. L. Wong, "Effective iterative techniques for fingerprinting design IP," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 2, pp. 208-215, 2004. [PDF]

[J3] J. L. Wong, G. Qu, and M. Potkonjak , "Optimization-intensive watermarking techniques for decision problems," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 1, pp. 119-127, 2004. [PDF]

[J2] J. L. Wong, M. Potkonjak , and S. Dey, "Optimizing designs using the addition of deflection operations," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 1, pp. 50-59, 2004. [PDF]

[J1] G. Wolfe, J. L. Wong, and M. Potkonjak , "Watermarking graph partitioning solutions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 21, no. 10, pp. 1196-1204, 2002. [PDF]

Conference Papers    [top]
[C43] H. Kang and J. L. Wong, “vCSIMx86: a Cache Simulation Framework for x86 Virtualization Hosts,” to appear in, Third Workshop on Runtime Environments/Systems, Layering, and Virtualized Environments (RESoLVE), 2013.

[C43] H. Kang and J. L. Wong, “To hardware prefetch or not to prefeth: A virtualized environment study & core binding approach,” to appear in, Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2013.

[C42] H. Kang, X. Zhu, and J. L. Wong, “Dapa: Diagnosing application performance anomalies for virtualized infrastructures,” in 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), 2012, pp. 8–8.

[C41] H. Kang, Y. Chen, J. L. Wong, R. Sion, and J. Wu, “Enhancement of Xen’s scheduler
for mapreduce workloads,” in International Symposium on High Performance Distributed Computing, June 2011, pp. 251–262.

[C40] A. Bhattacharyya and J. L. Wong, “A resilient actuation attack on wireless sensor network,” in International Conference on Sensor Networks and Applications, November 2010, pp. 251–256.

[C39] M. Poktonjak, S. Meguerdichian, and J. L. Wong, “Trusted sensors and remote sensing,” in IEEE Conference on Sensors, November 2010, pp. 1104 – 1107.

[C38] T. Giridher, A. Wasilewska, J. L. Wong, and K. S. Rekhi, “Global mobile applications for monitoring health,” in International Multiconference on Computer Science and Information Technology, October 2010, pp. 855–859.

[C37] T. Giridher, A. Bulchandani, R. Kim, P. Naik, A. Wasilewska, and J. L. Wong, “Social mobile applications,” in IEEE The Sixth Annual Conference on Long Island Systems, Applications and Technology, May 2010, pp. 1–6.

[C36] A. Wasilewska and J. L. Wong, “Developing template applications for social advancement,” in 1st International Symposium on Intelligent Mobile Technologies for Social Change at International Multiconference on Computer Science and Information Technology, October 2009, pp. 391–398.

[C35] C. Scharff, A. Wasilewska, J. L. Wong, M. Bousso, and I. Ndiaye, “A model for teaching mobile application development for social changes: Implementation and lessons learned in senegal,” in 1st International Symposium on Intelligent Mobile Technologies for Social Change at International Multiconference on Computer Science and Information Technology, October 2009, pp. 383–389.

[C34] T. Giridher, R. Kim, D. Rai, A. Hanover, J. Yu, F. Zarinni, C. Scharff, A.Wasilewska, and J. L. Wong, “Mobile applications for informal economies,” in 1st International Symposium on Intelligent Mobile Technologies for Social Change at International Multiconference on Computer Science and Information Technology, October 2009, pp. 345–352.

[C33] S. P. Tinta, Y. Zhou, and J. L. Wong, “Robot-assisted energy-efficient data collection from high-fidelity sensor networks,” in International Conference on Technologies for Practical Robot Applications, November 2009, pp. 101–106.

[C32] S. P. Tinta, A. E. Mohr, and J. L. Wong, “Characterizing end-to-end packet reordering with udp traffic,” in IEEE Symposium on Computers and Communications, July 2009, pp. 321–324.

[C31] H. Kang and J. L. Wong, “A localized multi-hop desynchronization algorithm for wireless sensor networks,” in IEEE Infocom, April 2009, pp. 2906–2910.

[C30] A. Singh, CR Ramnakrishnan, IV Ramnakrishnan, D. Warren, and J. L. Wong, "A methodology for in-network evaluation of integrated logical-statistical models," to appear in IEEE Sensys, 2008.

[C29] J. L.Wong, A. Davoodi, V. Khandelwal, A. Srivastava, and M. Potkonjak, "Statistical timing analysis using kernel smoothing," in International Conference on Computer Design, 2007, pp. 97-102.

[C28] M. Potkonjak and J. L. Wong, "Introduction to digital design: A paradigm-based approach," in IEEE International Conference on Microelectronic Systems Education, 2007, pp. 167-168.

[C27] J. L. Wong, S. Megerian, and M. Potkonjak, "Symmetric monotonic regression: Techniques and applications for sensor networks," in IEEE Sensors Applications Symposium, 2007, pp. 1-6.

[C26] J. L. Wong, S. Megerian, and M. Potkonjak, , "Minimizing global interconnect in DSP systems using bypassing," in IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, 2007,
pp. 77-80.

[C25] J. L. Wong, S. Megerian, and M. Potkonjak, "Staggered Sampling for Efficient Data Collection," in IEEE Conference on Sensors, 2006, pp. 777-780.

[C24] J. L. Wong, F. Koushanfar, and M. Potkonjak, "Flexible ASIC: shared masking for multiple media processors," in DAC '05: Proceedings of the 42th ACM/IEEE Conference on Design Automation, 2005, pp. 909-914. [PDF]

[C23] A. Cerpa, J. L. Wong, M. Potkonjak, and D. Estrin, "Temporal properties of low-power wireless links: Modeling and implications on multi-hop routing," in ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005, pp. 414-425. [PDF]

[C22] A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and D. Estrin, "Statistical model of lossy links in wireless sensor networks," in IEEE/ACM International Conference on Information Processing in Sensor Networks, 2005, pp. 81-88. [PDF]

[C21] J. L. Wong, W. Liao, F. Li, L. He, and M. Potkonjak, "Scheduling of soft real-time systems for context-aware applications," in International Conference on Design, Automation and Test in Europe, 2005, pp. 318-323. [PDF]

[C20] J. L. Wong, R. Jafari, and M. Potkonjak, "Gateway placement for latency and energy efficient data aggregation," in LCN '04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04). IEEE Computer Society, 2004, pp. 490-497. [PDF]

[C19] J. L. Wong, J.-Q. Yao, and M. Potkonjak, "Watermarking multiple constant multiplications solutions," in Asilomar Conference on Signals, Systems, and Computers, 2004, pp. 67-71. [PDF]

[C18] J. L. Wong and M. Potkonjak, "Relative generic computational forensic techniques," in IHW '04: Proceedings of the 6th International Information Hiding Workshop, 2004, pp. 148-163. [PDF]

[C17] J. L. Wong, A. Davoodi, V. Khandelwal, A. Srivastava, and M. Potkonjak, "Wire-length prediction using statistical techniques," in IEEE/ACM International Conference on Computer Aided Design. IEEE Press, 2004, pp. 702-705. [PDF]

[C16] J. L. Wong, S. Megerian, and M. Potkonjak, "Design techniques for sensor appliances: foundations and light compass case study," in DAC '03: Proceedings of the 40th Conference on Design Automation. ACM Press, 2003, pp. 66-71. [PDF]

[C15] J. L. Wong, G. Qu, and M. Potkonjak, "An on-line approach for power minimization in QoS sensitive systems," in ASP-DAC '03: Proceedings of the 2003 Conference on Asia South Pacific Design Automation. ACM Press, 2003, pp. 59-64. [PDF]

[C14] J. L. Wong and M. Potkonjak, "Search in sensor networks: challenges, techniques, and applications," in IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. IV. IEEE Press, 2002, pp. 3752-3755. [PDF]

[C13] J. L. Wong, G. Veltri, and M. Potkonjak, "Energy-efficient event tracking in multi-hop wireless networks," in Integrated Management of Power Aware Communications, Computing and Networking (IMPACCT), 2002, pp. 69-85. [PDF]

[C12] J. L. Wong, G. Qu, and M. Potkonjak, "Power minimization under QoS constraints," in IEEE International Packet-video Workshop, 2002, pp. 22-1 - 22-10. [PDF]

[C11] F. Koushanfar, J. L. Wong, J. Feng, and M. Potkonjak, "ILP-based engineering change," in DAC '02: Proceedings of the 39th Conference on Design Automation. ACM Press, 2002, pp. 910-915. [PDF]

[C10] J. L. Wong, S. Megerian, and M. Potkonjak, "Forward-looking objective functions: concept and applications in high level synthesis," in DAC '02: Proceedings of the 39th Conference on Design Automation. ACM Press, 2002, pp. 904-909. [PDF]

[C9] J. L. Wong, D. Kirovski, and M. Potkonjak, "Computational forensic techniques for intellectual property protection," in IHW '01: Proceedings of the 4th International Workshop on Information Hiding. Springer-Verlag, 2001, pp. 66-80. [PDF]

[C8] J. L. Wong, F. Koushanfar, S. Meguerdichian, and M. Potkonjak, "A probabilistic constructive approach to optimization problems," in ICCAD '01: Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design. IEEE Press, 2001, pp. 453-456. [PDF]

[C7] G. Wolfe, J. L. Wong, and M. Potkonjak, "Watermarking graph partitioning solutions," in DAC '01: Proceedings of the 38th Conference on Design Automation. ACM Press, 2001, pp. 486-489. [PDF]

[C6] R. Majumdar and J. L. Wong, "Watermarking of SAT using combinatorial isolation lemmas," in DAC '01: Proceedings of the 38th Conference on Design Automation. ACM Press, 2001, pp. 480-485. [PDF]

[C5] D. Kirovski, D. Liu, J. L. Wong, and M. Potkonjak, "Forensic engineering techniques for VLSI CAD tools," in DAC '00: Proceedings of the 37th Conference on Design Automation. ACM Press, 2000, pp. 580-586. [PDF]

[C4] G. Qu, J. L. Wong, and M. Potkonjak, "Fair watermarking techniques," in ASP-DAC '00: Proceedings of the 2000 Conference on Asia South Pacific Design Automation. ACM Press, 2000, pp. 55-60. [PDF]

[C3] A. B. Kahng, D. Kirovski, S. Mantik, M. Potkonjak, and J. L. Wong, "Copy detection for intellectual property protection of VLSI designs," in ICCAD '99: Proceedings of the 1999 IEEE/ACM International Conference on Computer-aided design. IEEE Press, 1999, pp. 600-605. [PDF]

[C2] A. E. Caldwell, H.-J. Choi, A. B. Kahng, S. Mantik, M. Potkonjak, G. Qu, and J. L. Wong, "Effective iterative techniques for fingerprinting design IP," in DAC '99: Proceedings of the 36th ACM/IEEE Conference on Design Automation. ACM Press, 1999, pp. 843-848. [PDF]

[C1] G. Qu, J. L. Wong, and M. Potkonjak, "Optimization-intensive watermarking techniques for decision problems," in DAC '99: Proceedings of the 36th ACM/IEEE Conference on Design Automation. ACM Press, 1999, pp. 33-36. [PDF]

Book Chapters    [top]

[B2] S. Slijepcevic, J. L. Wong, and M. Potkonjak, "Security and privacy protection in wireless sensor networks," Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pp. 31-1 - 31-15, 2004.

[B1] J. L. Wong, J. Feng, D. Kirovski, and M. Potkonjak, "Security in sensor networks: watermarking techniques," Wireless Sensor Networks, pp. 305-323, 2004.