• Hyungsin Kim

    Hyungsin Kim

    My research endeavors contribute to the dynamic fields of Human-Computer Interaction (HCI), Software Engineering, and Digital Healthcare. Grounded in a transdisciplinary approach, my work is enriched by methodologies, theoretical frameworks, and empirical insights drawn from sociology, psychology, educational technology, and computer science. At the core of my inquiry is the design and empirical evaluation of…

  • Ron Lin

    Ron Lin

    Dr. Ron (Rongyu) Lin is a Visiting Assistant Professor of Computer Science at Clark University. He holds a Ph.D. in Electrical and Computer Engineering from King Abdullah University of Science and Technology and an MBA with a STEM concentration in Data Science and Business Analytics from Santa Clara University. Dr. Lin’s research focuses on semiconductor…

  • Lewis Tseng

    Lewis Tseng

    Lewis Tseng’s research aims to make distributed systems (e.g., cloud computing and crypto) trustworthy. His research group designs and builds high-performance fault-tolerant distributed systems, by identifying principles for distributed coordination primitives. Prior to joining Clark, Tseng was an assistant professor at Boston College. Before that, he was with Toyota Info Technology Center, U.S.A. During the…

  • Pawan Gupta

    Pawan Gupta

    Pawan Gupta has worked as a software engineer since 2001. Since 2007, he has been a visiting professor. The University of Massachusetts Lowell awarded him a Bachelor of Science in Computer Science, and Northeastern University awarded him a Master of Science in Engineering in Software Design. He is passionate about software design and enjoys creating…

  • Peter Story

    Peter Story

    Dr. Peter Story researches usable security and privacy. As digital technologies become ever more intertwined with our lives, security and privacy have never been more important. People can protect themselves from digital threats by using protective technologies, such as secure mobile payment systems like Apple Pay and privacy tools like Tor Browser. However, protective technologies will not be…