Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager., , , , and . USENIX Security Symposium, page 499-515. USENIX Association, (2023)An Autonomous Driving System - Dedicated Vehicle for People with ASD and their Caregivers., , , , , , and . AutomotiveUI (adjunct), page 142-147. ACM, (2021)Control of an airborne wind energy system with a Magnus effect., , and . ACC, page 4978-4983. IEEE, (2016)A Privacy Paradox? Impact of Privacy Concerns on Willingness to Disclose COVID-19 Health Status in the United States., , , , , , , , and . CSCW Companion, page 159-162. ACM, (2022)The importance of situation-specific encodings: analysis of a simple connectionist model of letter transposition effects., , and . Connect. Sci., 30 (2): 135-159 (2018)Mastering for DVD (Abstract).. ICIP, IEEE, (2000)A Principled Approach to Feature Selection in Models of Sentence Processing., and . Cogn. Sci., (2020)Designing to Fight Pandemics: A Review of Literature and Identifying Design Patterns for COVID-19 Tracing Apps., , , , , and . HCI (3), volume 13304 of Lecture Notes in Computer Science, page 36-49. Springer, (2022)Proximity System: A Description-Based System for Quantifying the Nearness or Apartness of Visual Rough Sets., and . Trans. Rough Sets, (2014)Privacy Interventions and Education (PIE): Encouraging Privacy Protective Behavioral Change Online., , , , , , , , , and 1 other author(s). CHI Extended Abstracts, page 361:1-361:5. ACM, (2023)