Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ziplock Snakes., , , , and . Int. J. Comput. Vis., 25 (3): 191-201 (1997)Supporting selective information sharing with people-tagging., and . CHI Extended Abstracts, page 3423-3428. ACM, (2008)Going with the flow: email awareness and task management., , and . CSCW, page 441-450. ACM, (2006)Coherent Compound Motion: Corners and Nonrigid Configurations., , and . Neural Comput., 2 (1): 44-57 (1990)Improving personal privacy in social systems with people-tagging., and . GROUP, page 11-20. ACM, (2009)Managing change in ontologies., , and . IRI, page 253-258. IEEE Systems, Man, and Cybernetics Society, (2005)Intentional access management: making access control usable for end-users., and . SOUPS, volume 149 of ACM International Conference Proceeding Series, page 20-31. ACM, (2006)Tagging: Behaviour and motivations., and . ASIST, volume 46 of Proc. Assoc. Inf. Sci. Technol., page 1-5. Wiley, (2009)Network-Oriented Document Abstraction Language: Structure and Reference for the Rest of the Web.. Extreme Markup Languages®, (2005)A grounded theory of information sharing behavior in a personal learning space., and . CSCW, page 459-468. ACM, (2006)