Author of the publication

In mod we trust? Human trust, Bitcoin, and the burning waste of time.

. AI Soc., 33 (2): 291-292 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The perception of two linguistic functions of prosody in Danish., and . ICPhS, University of Glasgow, (2015)Surface Passivation by Quantum Exclusion: On the Quantum Efficiency and Stability of Delta-Doped CCDs and CMOS Image Sensors in Space., , , , , , , , , and 1 other author(s). Sensors, 23 (24): 9857 (December 2023)Using the CSM Correspondence Calculation Algorithm to Quantify Differences between Surfaces., , and . BMVC, page 1-10. British Machine Vision Association, (2000)A Neural Approach for Text Extraction from Scholarly Figures., , and . ICDAR, page 1438-1443. IEEE, (2019)In mod we trust? Human trust, Bitcoin, and the burning waste of time.. AI Soc., 33 (2): 291-292 (2018)Students' Decisions to Use an eLearning System: A Structural Equation Modelling Analysis., , , and . Int. J. Emerg. Technol. Learn., 4 (4): 4-13 (2009)Operational experience of a new HF tropical band broadcasting system.. TBC, 48 (1): 35-38 (2002)The normalized Bushmitch-Fikus-Hamrick (NBFH) metric., , , , and . MILCOM, page 1-6. IEEE, (2012)Attenuating dependence on structural data in computing protein energy landscapes., , , and . BMC Bioinform., 20-S (11): 280:1-280:10 (2019)Evaluation of Automated Image Descriptions for Visually Impaired Students., , and . AIED (2), volume 12749 of Lecture Notes in Computer Science, page 196-201. Springer, (2021)