Author of the publication

Learning and Recognizing the Places We Go.

, , , , and . UbiComp, volume 3660 of Lecture Notes in Computer Science, page 159-176. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: A Framework for Unifying At-Risk User Research., , , , , , , , , and . CoRR, (2021)The CareNet Display: Lessons Learned from an In Home Evaluation of an Ambient Display., , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 1-17. Springer, (2004)Labscape: A Smart Environment for the Cell Biology Laboratory., , , , , , and . IEEE Pervasive Computing, 1 (3): 13-21 (2002)The Drop: pragmatic problems in the design of a compelling, pervasive game., , and . Computers in Entertainment, 3 (3): 4 (2005)Helping You Protect You., , , , , and . IEEE Secur. Priv., 12 (1): 39-42 (2014)Theory-driven design strategies for technologies that support behavior change in everyday life., , and . CHI, page 405-414. ACM, (2009)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households., , , , , and . CHI, page 5921-5932. ACM, (2016)Rethinking Connection Security Indicators., , , , , , , , and . SOUPS, page 1-14. USENIX Association, (2016)Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy., , , , , , , , and . CHI, page 89. ACM, (2019)