Author of the publication

Exploiting Interaction Features in User Intent Understanding.

, , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 506-517. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Error Recovery Techniques to Improve Sketch Recognition Accuracy., , and . GREC, volume 5046 of Lecture Notes in Computer Science, page 157-168. Springer, (2007)Visual data integration based on description logic reasoning., , and . IDEAS, page 19-28. ACM, (2014)Petroglyph Classification using the Image Distortion Model., , and . VAST, page 1-8. Eurographics Association, (2012)A sketch-based conceptual level data integration methodology., , and . IRI, page 741-748. IEEE Computer Society, (2014)Visual Language Editors based on LR Parsing Techniques., and . IWPT, page 78-90. (2003)Discovering Relaxed Functional Dependencies based on Multi-attribute Dominance Extended Abstract., , , and . ICDE, page 2354-2355. IEEE, (2021)Democratizing Cybersecurity in Smart Environments: Investigating the Mental Models of Novices and Experts., , , and . IS-EUD, volume 13917 of Lecture Notes in Computer Science, page 145-161. Springer, (2023)On the User Perception of Security Risks of TAP Rules: A User Study., , , , and . IS-EUD, volume 13917 of Lecture Notes in Computer Science, page 162-179. Springer, (2023)Towards a Classification Model for Identifying Risky IFTTT Applets., , and . EMPATHY@INTERACT, volume 3053 of CEUR Workshop Proceedings, page 33-37. CEUR-WS.org, (2021)Enabling End-Users to Specify Security Rules with the EFESTO-5W Platform., , , , and . EMPATHY@INTERACT, volume 3053 of CEUR Workshop Proceedings, page 43-47. CEUR-WS.org, (2021)