Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Snookered by an interruption?: use a cue., , and . BCS HCI, page 251-256. British Computer Society, (2012)A Rational Model of the Effect of Information Scent on the Exploration of Menus., and . ICCM, page 82-87. (2004)Social networking use and RescueTime: the issue of engagement., , , and . UbiComp Adjunct, page 687-690. ACM, (2014)Cognitive Dimensions of Notations: Design Tools for Cognitive Technology., , , , , , , , , and 4 other author(s). Cognitive Technology, volume 2117 of Lecture Notes in Computer Science, page 325-341. Springer, (2001)Using redundancy to detect human error., , , , and . CHI, page 2403-2406. ACM, (2013)Investigating computer game immersion and the component real world dissociation., , and . CHI Extended Abstracts, page 3407-3412. ACM, (2009)Designing for the task: what numbers are really used in hospitals?, , and . CHI Extended Abstracts, page 1733-1738. ACM, (2012)Task Lockouts Induce Crowdworkers to Switch to Other Activities., , and . CHI Extended Abstracts, page 1785-1790. ACM, (2015)Artifacts for programmable devices: the good, the bad and the ugly., and . CHI Extended Abstracts, page 1731-1736. ACM, (2013)Multitasking and interruptions: a SIG on bridging the gap between research on the micro and macro worlds., , , , , and . CHI Extended Abstracts, page 1189-1192. ACM, (2012)