Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CanTouchThis: Examining the Effect of Physical Contact in a Mobile Multiplayer Game., , , , and . CHI Extended Abstracts, page 1609-1616. ACM, (2017)Konzerninternes Outsourcing von E-Mail- und anderen Unternehmenskommunikationsdiensten.. Comput. und Recht, 32 (9): 606-613 (2016)Context of Use Evaluation of Peripheral Displays (CUEPD)., , and . INTERACT, volume 3585 of Lecture Notes in Computer Science, page 579-587. Springer, (2005)Deploying Contextual Computing in a Campus Setting., , , , and . INC, page 135-140. Plymouth University, (2016)Bool the Miner: Relying on Ghost Companions to Solve Boolean Equations., , , , and . CHI PLAY (Companion), page 25-31. ACM, (2016)Ada: constructing a synthetic organism., , , , , , , , , and 11 other author(s). IROS, page 1808-1813. IEEE, (2002)Ada: a Playful Interactive Space., , , , , , , , , and 9 other author(s). INTERACT, IOS Press, (2003)Algorithmic Programming Language Identification, , and . CoRR, (2011)Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications., , , and . CCS, page 3576-3578. ACM, (2023)Characterizing knowledge depth in intelligent safety systems., and . Appl. Artif. Intell., 3 (2-3): 129-142 (1989)