Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Marketing Strategy at Forerunner Recordings.. J. Inf. Technol. Educ. Discuss. Cases, (2014)Using a Parallel Ensemble of Sequence-Based Selection Hyper-Heuristics for Electric Bus Scheduling., , and . GECCO Companion, page 1712-1720. ACM, (2023)Microservices, and . (2014)The Economic Impact of Cybercrime and Cyber Espionage, and . Centre for Strategic and International Studies, (2013)Text similarity: an alternative way to search MEDLINE., , , , and . Bioinform., 22 (18): 2298-2304 (2006)Spatially Aware Cell Cluster(SpACCl) Graphs: Predicting Outcome in Oropharyngeal p16+ Tumors., , and . MICCAI (1), volume 8149 of Lecture Notes in Computer Science, page 412-419. Springer, (2013)Metahumans: Using Facial Action Coding in Games to Develop Social and Communication Skills for People with Autism., , , , , and . HCI (8), volume 13309 of Lecture Notes in Computer Science, page 343-355. Springer, (2022)Co-designing Virtual Environments for People with Intellectual Disabilities to Assess Cognitive Decline: Methodology., , , , and . HCI (44), volume 1833 of Communications in Computer and Information Science, page 306-313. Springer, (2023)Enhancing the tracking capabilities of the Microsoft Kinect for stroke rehabilitation., , , , , and . SeGAH, page 1-8. IEEE Computer Society, (2013)A pilot study of cyber security and privacy related behavior and personality traits., , and . WWW (Companion Volume), page 737-744. International World Wide Web Conferences Steering Committee / ACM, (2013)