Education

Ph.D. Thesis in Computer Science, July 2006

University of California, Los Angeles, CA

Title: “Design of Embedded Systems using Data-Driven Statistical Techniques”

Thesis Advisor: Professor Miodrag Potkonjak

M.S. Thesis in Computer Science, December 2002

University of California, Los Angeles, CA

Title: “Non-Parametric Statistical Techniques for Forensic Engineering”

Thesis Advisor: Professor Miodrag Potkonjak

Research Publications

Journal Papers

[J10] E.S. Park, A. Harlow, A. AghaKouchak, B. Baldi, N. Burley, N. Buswell, R. Crooks, D. Denenberg, P. Ditto, K. Edwards, M. G. Junqueira, A. Geragotelis, A. Holton, J. Lanning, R. Lehman, A. Chen, A. Pantano, J. Rinehart, M. Walter, A. Williams, J. Wong-Ma, M. Yassa, and B. Sato, “Instructor facilitation mediates students’ negative perceptions of active learning instruction,” PLoS ONE, vol. 16, no. 12, December 2021.

[J9] J. L. Wong, A. Davoodi, V. Khandelwal, and A. Srivastava and M. Potkonjak , “A statistical methodology for wire-length prediction,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006.

[J8] J. L. Wong, G. Qu, and M. Potkonjak , “Power minimization in QoS sensitive systems,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 6, pp. 553-561, 2004.

[J7] J. L. Wong, R. Majumdar, and M. Potkonjak , “Fair watermarking using combinatorial isolation lemmas,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 11, pp. 1566-1574, 2004.

[J6] J. L. Wong, F. Koushanfar, S. Megerian, and M. Potkonjak , “Probabilistic constructive optimization techniques,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 6, pp. 859-868, 2004.

[J5] J. L. Wong, D. Kirovski, and M. Potkonjak , “Computational forensic techniques for intellectual property protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 6, pp. 987-994, 2004.

[J4] A. Caldwell, H.-J. Choi, A. Kahng, S. Mantik, M. Potkonjak , G. Qu, and J. L. Wong, “Effective iterative techniques for fingerprinting design IP,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 2, pp. 208-215, 2004.

[J3] J. L. Wong, G. Qu, and M. Potkonjak, “Optimization-intensive watermarking techniques for decision problems,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 1, pp. 119-127, 2004.

[J2] J. L. Wong, M. Potkonjak , and S. Dey, “Optimizing designs using the addition of deflection operations,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 1, pp. 50-59, 2004.

[J1] G. Wolfe, J. L. Wong, and M. Potkonjak , “Watermarking graph partitioning solutions,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 21, no. 10, pp. 1196-1204, 2002.

Conference Papers

[C49] B. Martinez Neda, M. Wang, A. Singh, S. Gago-Masague, and J. Wong-Ma, “Staying Ahead of the Curve: Early Prediction of Academic Probation among First-Year CS Students,” in The International Conference on Applied Artificial Intelligence, ICAPAI, 2023.

[C48] B. Martinez Neda, M. Wang, H. Barkam, J. Wong-Ma, and S. Gago-Masague, “Revisiting Academic Probation in CS: At-Risk Indicators and Impact on Student Success,” in 16th Consortium for Computing Sciences in Colleges Southwest Region Conference, CCSC Southwest, 2023.

[C47] M. Luu, M. Ferland, V. N. Rao, A. Arora, R. Huynh, F. Reiber, J. Wong-Ma, and M. Shindler, “What is an Algorithms Course?: Survey Results of Introductory Undergraduate Algorithms Courses in the U.S.,” in 54th ACM Technical Symposium on Computer Science Education, SIGCSE, 2023.

[C46] J. Mitchener, N. Beeken, and J. L. Wong, “Dashmips: MIPS interpreter and VSCode Debugger,” in 52nd ACM Technical Symposium on Computer Science Education, SIGCSE, 2021.

[C45] M. Ehsan, Y. Chen, H. Kang, R. Sion, and J. L. Wong, “Lips: A cost-efficient data and task co-scheduler for mapreduce,” in 20th Annual International Conference on High Performance Computing, HiPC, 2013.

[C44] H. Kang and J. L. Wong, “vCSIMx86: a Cache Simulation Framework for x86 Virtualization Hosts,” to appear in, Third Workshop on Runtime Environments/Systems, Layering, and Virtualized Environments (RESoLVE), 2013.

[C43] H. Kang and J. L. Wong, “To hardware prefetch or not to prefeth: A virtualized environment study & core binding approach,” to appear in, Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2013.

[C42] H. Kang, X. Zhu, and J. L. Wong, “Dapa: Diagnosing application performance anomalies for virtualized infrastructures,” in 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), 2012, pp. 8-8.

[C41] H. Kang, Y. Chen, J. L. Wong, R. Sion, and J. Wu, “Enhancement of Xen’s scheduler for mapreduce workloads,” in International Symposium on High Performance Distributed Computing, June 2011, pp. 251–262.

[C40] A. Bhattacharyya and J. L. Wong, “A resilient actuation attack on wireless sensor network,” in International Conference on Sensor Networks and Applications, November 2010, pp. 251–256.

[C39] M. Poktonjak, S. Meguerdichian, and J. L. Wong, “Trusted sensors and remote sensing,” in IEEE Conference on Sensors, November 2010, pp. 1104 – 1107.

[C38] T. Giridher, A. Wasilewska, J. L. Wong, and K. S. Rekhi, “Global mobile applications for monitoring health,” in International Multiconference on Computer Science and Information Technology, October 2010, pp. 855–859.

[C37] T. Giridher, A. Bulchandani, R. Kim, P. Naik, A. Wasilewska, and J. L. Wong, “Social mobile applications,” in IEEE The Sixth Annual Conference on Long Island Systems, Applications and Technology, May 2010, pp. 1–6.

[C36] A. Wasilewska and J. L. Wong, “Developing template applications for social advancement,” in 1st International Symposium on Intelligent Mobile Technologies for Social Change at International Multiconference on Computer Science and Information Technology, October 2009, pp. 391–398.

[C35] C. Scharff, A. Wasilewska, J. L. Wong, M. Bousso, and I. Ndiaye, “A model for teaching mobile application development for social changes: Implementation and lessons learned in senegal,” in 1st International Symposium on Intelligent Mobile Technologies for Social change at International Multiconference on Computer Science and Information Technology, October 2009, pp. 383–389.

[C34] T. Giridher, R. Kim, D. Rai, A. Hanover, J. Yu, F. Zarinni, C. Scharff, A. asilewska, and J. L. Wong, “Mobile applications for informal economies,” in 1st International Symposium on Intelligent Mobile Technologies for Social Change at International Multiconference on Computer Science and Information Technology, October 2009, pp. 345–352.

[C33] S. P. Tinta, Y. Zhou, and J. L. Wong, “Robot-assisted energy-efficient data collection from high-fidelity sensor networks,” in International Conference on Technologies for Practical Robot Applications, November 2009, pp. 101–106.

[C32] S. P. Tinta, A. E. Mohr, and J. L. Wong, “Characterizing end-to-end packet reordering with UDP traffic,” in IEEE Symposium on Computers and Communications, July 2009, pp. 321–324.

[C31] H. Kang and J. L. Wong, “A localized multi-hop desynchronization algorithm for wireless sensor networks,” in IEEE Infocom, April 2009, pp. 2906–2910.

[C30] A. Singh, CR Ramnakrishnan, IV Ramnakrishnan, D. Warren, and J. L. Wong, “A methodology for in-network evaluation of integrated logical-statistical models,” to appear in IEEE Sensys, 2008.

[C29] J. L.Wong, A. Davoodi, V. Khandelwal, A. Srivastava, and M. Potkonjak, “Statistical timing analysis using kernel smoothing,” in International Conference on Computer Design, 2007, pp. 97-102.

[C28] M. Potkonjak and J. L. Wong, Introduction to digital design: A paradigm-based approach,” in IEEE International Conference on Microelectronic Systems Education, 2007, pp. 167-168.

[C27] J. L. Wong, S. Megerian, and M. Potkonjak, “Symmetric monotonic regression: Techniques and applications for sensor networks,” in IEEE Sensors Applications Symposium, 2007, pp. 1-6.

[C26] J. L. Wong, S. Megerian, and M. Potkonjak, , “Minimizing global interconnect in DSP systems using bypassing,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, 2007, pp. 77-80.

[C25] J. L. Wong, S. Megerian, and M. Potkonjak, “Staggered Sampling for Efficient Data Collection,” in IEEE Conference on Sensors, 2006, pp. 777-780.

[C24] J. L. Wong, F. Koushanfar, and M. Potkonjak, “Flexible ASIC: shared masking for multiple media processors,” in DAC ‘05: Proceedings of the 42th ACM/IEEE Conference on Design Automation, 2005, pp. 909-914.

[C23] A. Cerpa, J. L. Wong, M. Potkonjak, and D. Estrin, “Temporal properties of low-power wireless links: Modeling and implications on multi-hop routing,” in ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005, pp. 414-425.

[C22] A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and D. Estrin, “Statistical model of lossy links in wireless sensor networks,” in IEEE/ACM International Conference on Information Processing in Sensor Networks, 2005, pp. 81-88.

[C21] J. L. Wong, W. Liao, F. Li, L. He, and M. Potkonjak, “Scheduling of soft real-time systems for context-aware applications,” in International Conference on Design, Automation and Test in Europe, 2005, pp. 318-323.

[C20] J. L. Wong, R. Jafari, and M. Potkonjak, “Gateway placement for latency and energy efficient data aggregation,” in LCN ‘04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN’04). IEEE Computer Society, 2004, pp. 490-497.

[C19] J. L. Wong, J.-Q. Yao, and M. Potkonjak, “Watermarking multiple constant multiplications solutions,” in Asilomar Conference on Signals, Systems, and Computers, 2004, pp. 67-71.

[C18] J. L. Wong and M. Potkonjak, “Relative generic computational forensic techniques,” in IHW ‘04: Proceedings of the 6th International Information Hiding Workshop, 2004, pp. 148-163.

[C17] J. L. Wong, A. Davoodi, V. Khandelwal, A. Srivastava, and M. Potkonjak, “Wire-length prediction using statistical techniques,” in IEEE/ACM International Conference on Computer Aided Design. IEEE Press, 2004, pp. 702-705.

[C16] J. L. Wong, S. Megerian, and M. Potkonjak, “Design techniques for sensor appliances: foundations and light compass case study,” in DAC ‘03: Proceedings of the 40th Conference on Design Automation. ACM Press, 2003, pp. 66-71.

[C15] J. L. Wong, G. Qu, and M. Potkonjak, “An on-line approach for power minimization in QoS sensitive systems,” in ASP-DAC ‘03: Proceedings of the 2003 Conference on Asia South Pacific Design Automation. ACM Press, 2003, pp. 59-64.

[C14] J. L. Wong and M. Potkonjak, “Search in sensor networks: challenges, techniques, and applications,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. IV. IEEE Press, 2002, pp. 3752-3755.

[C13] J. L. Wong, G. Veltri, and M. Potkonjak, “Energy-efficient event tracking in multi-hop wireless networks,” in Integrated Management of Power Aware Communications, Computing and Networking (IMPACCT), 2002, pp. 69-85.

[C12] J. L. Wong, G. Qu, and M. Potkonjak, “Power minimization under QoS constraints,” in IEEE International Packet-video Workshop, 2002, pp. 22-1 - 22-10.

[C11] F. Koushanfar, J. L. Wong, J. Feng, and M. Potkonjak, “ILP-based engineering change,” in DAC ‘02: Proceedings of the 39th Conference on Design Automation. ACM Press, 2002, pp. 910-915.

[C10] J. L. Wong, S. Megerian, and M. Potkonjak, “Forward-looking objective functions: concept and applications in high level synthesis,” in DAC ‘02: Proceedings of the 39th Conference on Design Automation. ACM Press, 2002, pp. 904-909.

[C9] J. L. Wong, D. Kirovski, and M. Potkonjak, “Computational forensic techniques for intellectual property protection,” in IHW ‘01: Proceedings of the 4th International Workshop on Information Hiding. Springer-Verlag, 2001, pp. 66-80.

[C8] J. L. Wong, F. Koushanfar, S. Meguerdichian, and M. Potkonjak, “A probabilistic constructive approach to optimization problems,” in ICCAD ‘01: Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design. IEEE Press, 2001, pp. 453-456.

[C7] G. Wolfe, J. L. Wong, and M. Potkonjak, “Watermarking graph partitioning solutions,” in DAC ‘01: Proceedings of the 38th Conference on Design Automation. ACM Press, 2001, pp. 486-489.

[C6] R. Majumdar and J. L. Wong, “Watermarking of SAT using combinatorial isolation lemmas,” in DAC ‘01: Proceedings of the 38th Conference on Design Automation. ACM Press, 2001, pp. 480-485.

[C5] D. Kirovski, D. Liu, J. L. Wong, and M. Potkonjak, “Forensic engineering techniques for VLSI CAD tools,” in DAC ‘00: Proceedings of the 37th Conference on Design Automation. ACM Press, 2000, pp. 580-586.

[C4] G. Qu, J. L. Wong, and M. Potkonjak, “Fair watermarking techniques,” in ASP-DAC ‘00: Proceedings of the 2000 Conference on Asia South Pacific Design Automation. ACM Press, 2000, pp. 55-60.

[C3] A. B. Kahng, D. Kirovski, S. Mantik, M. Potkonjak, and J. L. Wong, “Copy detection for intellectual property protection of VLSI designs,” in ICCAD ‘99: Proceedings of the 1999 IEEE/ACM International Conference on Computer-aided design. IEEE Press, 1999, pp. 600-605.

[C2] A. E. Caldwell, H.-J. Choi, A. B. Kahng, S. Mantik, M. Potkonjak, G. Qu, and J. L. Wong, “Effective iterative techniques for fingerprinting design IP,” in DAC ‘99: Proceedings of the 36th ACM/IEEE Conference on Design Automation. ACM Press, 1999, pp. 843-848.

[C1] G. Qu, J. L. Wong, and M. Potkonjak, “Optimization-intensive watermarking techniques for decision problems,” in DAC ‘99: Proceedings of the 36th ACM/IEEE Conference on Design Automation. ACM Press, 1999, pp. 33-36.

Book Chapters

[B2] S. Slijepcevic, J. L. Wong, and M. Potkonjak, “Security and privacy protection in wireless sensor networks,” Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, pp. 31-1 - 31-15, 2004.

[B1] J. L. Wong, J. Feng, D. Kirovski, and M. Potkonjak, “Security in sensor networks: watermarking techniques,” Wireless Sensor Networks, pp. 305-323, 2004.

Presentations

[P15] “Flexible ASIC: Shared Masking for Multiple Media Processors.” Presented at the 42nd ACM/IEEE Design Automation Conference, Anaheim, CA, June 2005.

[P14] “Wire Length Prediction Using Statistical Techniques.” Presented at IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA, November 2004.

[P13] “Watermarking Multiple Constant Multiplication Solutions.” Presented at Asilomar Confernce on Signals, Systems, and Computers,Pacific Grove, CA, November 2004.

[P12] “Relative Generic Computational Forensic Techniques.” Presented at Information Hiding, Toronto, Canada, May 2004.

[P11] “Minimizing Global Interconnect using Bypassing and Chaining.” Presented at UCLA Research Review, Los Angeles, CA, April 2004.

[P10] “Design Techniques for Sensor Appliances: Foundations and Light Compass Case Study.” Presented at 39th ACM/IEEE Design Automation Conference, Anaheim, CA, June 2003.

[P9] “Design and Analysis of Mobile Systems.” Presented at UCLA Research Review, Los Angeles, CA, April 2003.

[P8] “On-line Approach to Power Minimization in QoS Sensitive Systems.” Presented at IEEE/ACM Asia and South Pacific Design Automation Conference, Kitakyushu, Japan, January 2003.

[P7] “Forward Looking Objective Functions: Concept & Applications In High Level Synthesis.” Presented at 39th ACM/IEEE Design Automation Conference, New Orleans, LA, June 2002.

[P6] “Search in Sensor Networks.” Presented at ICASSP, Orlando, FL, May 2002.

[P5] “A Probabilistic Constructive Approach to Optimization Problems.” Presented at IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA, November 2001.

[P4] “Watermarking of SAT using Combinatorial Isolation Lemmas.” Presented at 38th ACM/IEEE Design Automation Conference, Las Vegas, NV, June 2001.

[P3] “Forensic Engineering Techniques for VLSI CAD Tools.” Presented at 37th ACM/IEEE Design Automation Conference, Los Angeles, CA, June 2000.

[P2] “Non-Parametrical Statistical Computational Forensic Techniques for Intellectual Property Protection.” Presented at 4th International Information Hiding Workshop, Pittsburgh, PA, April 2001.

[P1] “Effective Iterative Techniques for Fingerprinting Design IP.” Presented at 36th ACM/IEEE Design Automation Conference, New Orleans, LA, June 1999.