Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy: personal information, threats, and technologies., and . ISTAS, page 9-16. IEEE, (2005)Tools for expressive text-to-speech markup., and . UIST, page 159-160. ACM, (2001)An Explainable AI User Interface for Facilitating Collaboration between Domain Experts and AI Researchers., , , , , , and . xAI (Late-breaking Work, Demos, Doctoral Consortium), volume 3554 of CEUR Workshop Proceedings, page 112-116. CEUR-WS.org, (2023)Context Aware Education for Agriculture., and . PerCom Workshops, page 1-5. IEEE Computer Society, (2009)978-1-4244-3304-9.Report from the Field: Results from an Agricultural Wireless Sensor Network., , and . LCN, page 471-478. IEEE Computer Society, (2004)'This All Together, Hon?' Ubicomp in Non-office Work Environments., , , , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 179-195. Springer, (2004)Human in the loop approaches in multi-modal conversational task guidance system development., , , , , , , , and . CoRR, (2022)Vineyard Computing: Sensor Networks in Agricultural Production., , and . IEEE Pervasive Computing, 3 (1): 38-45 (2004)Designing for Ubiquity: The Perception of Privacy.. IEEE Pervasive Computing, 2 (2): 40-46 (2003)Distill and Collect for Semi-Supervised Temporal Action Segmentation., , , , and . CoRR, (2022)