Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sousveillance and Cyborglogs: A 30-Year Empirical Voyage through Ethical, Legal, and Policy Issues.. Presence Teleoperators Virtual Environ., 14 (6): 625-646 (2005)EyeTap Devices for Augmented, Deliberately Diminished, or Otherwise Altered Visual Perception of Rigid Planar Patches of Real-World Scenes., and . Presence Teleoperators Virtual Environ., 11 (2): 158-175 (2002)Computer Architectures for Protection of Personal Informatic Property: Putting Pirates, Pigs, and Rapists in Perspective.. First Monday, (2000)Smart Clothing: The Shift to Wearable Computing.. Commun. ACM, 39 (8): 23-24 (1996)The chirplet transform: physical considerations., and . IEEE Trans. Signal Process., 43 (11): 2745-2761 (1995)Non-electrophonic cyborg instruments: playing on everyday things as if the whole world were one giant musical instrument., , , and . ACM Multimedia, page 932-941. ACM, (2007)Fluid samplers: sampling music keyboards having fluidly continuous action and sound, without being electrophones., and . ACM Multimedia, page 912-921. ACM, (2007)Arrays of water jets as user interfaces: detection and estimation of flow by listening to turbulence signatures using hydrophones., and . ACM Multimedia, page 505-508. ACM, (2007)Sensing of the Self, Society, and the Environment., , , , , and . IEEE SENSORS, page 1-4. IEEE, (2020)Exploring design through wearable computing art(ifacts)., , and . CHI Extended Abstracts, page 634-635. ACM, (2002)