Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Privacy Concerns about Personal Sensing., , , , and . Pervasive, volume 5538 of Lecture Notes in Computer Science, page 176-183. Springer, (2009)Enhanced Social Cognitive Theory Dynamic Modeling and Simulation Towards Improving the Estimation of "Just-In-Time" States., , , , and . ACC, page 468-473. IEEE, (2022)Designing Supportive Mobile Technology for Stable Diabetes., and . HCI (10), volume 8013 of Lecture Notes in Computer Science, page 361-370. Springer, (2013)Descriptive analysis of physical activity conversations on Twitter., , , and . CHI Extended Abstracts, page 1555-1560. ACM, (2011)Theory is in the Eye of the Beholder: Exploring Difficulties with Validating Intervention Mechanisms: Theory is in the Eye of the Beholder., , , , and . CHI Extended Abstracts, page 401:1-401:6. ACM, (2021)Taking our Time: Chronic Illness and Time-Based Objects in Families., , and . CSCW, page 288-301. ACM, (2015)Data-driven Interpretable Policy Construction for Personalized Mobile Health., , , and . ICDH, page 13-22. IEEE, (2022)Action Centered Contextual Bandits., , , and . NIPS, page 5977-5985. (2017)I give up! Five factors that contribute to the abandonment of information management strategies., , , and . ASIST, volume 45 of Proc. Assoc. Inf. Sci. Technol., page 1-6. Wiley, (2008)Model Personalization in Behavioral Interventions using Model-on-Demand Estimation and Discrete Simultaneous Perturbation Stochastic Approximation., , , and . ACC, page 671-676. IEEE, (2022)