Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Programmers Debug, Revisited: An Information Foraging Theory Perspective., , , , , and . IEEE Trans. Software Eng., 39 (2): 197-215 (2013)Supporting Collaborative Learning through the Use of Electronic Conversational Props., , and . EWHCI, volume 876 of Lecture Notes in Computer Science, page 181-191. Springer, (1994)Designing for auditory web access: accessibility and cellphone users., , , , , , and . W4A, page 4. ACM, (2010)A psychology of programming for design.. INTERACT, page 1005-1006. North-Holland, (1990)FactSheets: Increasing trust in AI services through supplier's declarations of conformity., , , , , , , , , and 4 other author(s). IBM J. Res. Dev., 63 (4/5): 6:1-6:13 (2019)Sketching tools for ideation., , , , , , and . ICSE, page 808-811. ACM, (2011)Flexible Modeling Tools (FlexiTools2010)., , , , and . ICSE (2), page 441-442. ACM, (2010)978-1-60558-719-6.An Empirical Study of Enterprise Conceptual Modeling., , , , , , , , , and 1 other author(s). ER, volume 5829 of Lecture Notes in Computer Science, page 55-69. Springer, (2009)SketchGraph: gestural data input for mobile tablet devices., , , , and . SIGGRAPH Posters, page 23. ACM, (2012)Scents in Programs: Does Information Foraging Theory Apply to Program Maintenance?, , and . VL/HCC, page 15-22. IEEE Computer Society, (2007)