Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How do you make information security user friendly?. Inf. Secur. Tech. Rep., 14 (4): 213-216 (2009)Practical multispectral lighting reproduction., , , , , , and . ACM Trans. Graph., 35 (4): 32:1-32:11 (2016)A Poisson reduced-rank regression model for association mapping in sequencing data., , and . BMC Bioinform., 23 (1): 529 (2022)Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)A study of feature subset evaluators and feature subset searching methods for phishing classification., , and . CEAS, page 135-144. ACM, (2011)Digital survivor of sexual assault., , , , , , , , , and . IUI, page 417-425. ACM, (2019)Prototyping a light field display involving direct observation of a video projector array., , , and . CVPR Workshops, page 15-20. IEEE Computer Society, (2011)Time-Offset Conversations on a Life-Sized Automultiscopic Projector Array., , , , , , , , , and . CVPR Workshops, page 927-935. IEEE Computer Society, (2016)Head-Mounted Photometric Stereo for Performance Capture., , , , , , , and . CVMP, page 158-164. IEEE, (2011)Social TV: toward content navigation using social awareness., , , and . EuroITV, page 283-292. ACM, (2010)