Author: Jie Ren

Jie Ren

Jie Ren

Publications

Publication period start: 1989
Publication period end: 2007
Number of co-authors: 16

Co-authors

Number of publications with favourite co-authors
David F. Redmiles
3
Jennifer Ann Rode
3
Roberto Silva Filho
3

Productive Colleagues

Most productive colleagues in number of publications
Thomas B. Sheridan
22
David F. Redmiles
27
Paul Dourish
95

Publications

Ren, Jie, Taylor, Richard N. (2007): Automatic and versatile publications ranking for research institutions and scholars. In Communications of the ACM, 50 (6) pp. 81-85. http://doi.acm.org/10.1145/1247001.1247010

Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann, Filho, Roberto Silva (2005): In the eye of the beholder: A visualization-based approach to information system security. In International Journal of Human-Computer Studies, 63 (1) pp. 5-24. http://dx.doi.org/10.1016/j.ijhcs.2005.04.021

Ottensmeyer, Mark P., Hu, Jianjuen, Thompson, James M., Ren, Jie, Sheridan, Thomas B. (2000): Investigations into Performance of Minimally Invasive Telesurgery with Feedback Time Delay. In Presence: Teleoperators and Virtual Environments, 9 (4) pp. 369-382.

Ren, Jie, Sheridan, Thomas B. (1989): A Fuzzy Expert System. In: Proceedings of the Third International Conference on Human-Computer Interaction , 1989, . pp. 806-813.

Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann, Filho, Roberto Silva (2005): Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 25-34. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf

Rode, Jennifer Ann, Johansson, Carolina, DiGioia, Paul, Filho, Roberto Silva, Nies, Kari, Nguyen, David H., Ren, Jie, Dourish, Paul, Redmiles, David F. (2006): Seeing further: extending visualization as a basis for usable security. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 145-155. http://cups.cs.cmu.edu/soups/2006/slides/rode.pdf