From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Safe and sound: a safety-critical approach to security., и . NSPW, стр. 41-50. ACM, (2001)Designing and evaluating usable security and privacy technology., , и . SOUPS, ACM, (2009)GazeSpace: eye gaze controlled content spaces., , и . BCS HCI (2), стр. 55-58. BCS, (2007)The Great Authentication Fatigue - And How to Overcome It., , , и . HCI (19), том 8528 из Lecture Notes in Computer Science, стр. 228-239. Springer, (2014)Do you know dis?: a user study of a knowledge discovery tool for organizations., , , и . CHI, стр. 2887-2896. ACM, (2011)Eliciting and describing users' models of computer systems.. University of Birmingham, UK, (1997)British Library, EThOS.Listen to Your Heart Rate: Counting the Cost of Media Quality., и . IWAI, том 1814 из Lecture Notes in Computer Science, стр. 9-20. Springer, (1999)It Ain't What You Charge, It's The Way That You Do It: A User Perspective of Network QoS and Pricing., и . Integrated Network Management, стр. 639-654. IEEE, (1999)When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads., , , и . BCS HCI, стр. 215-220. British Computer Society, (2012)Successful Multiparty Audio Communication over the Internet., , и . Commun. ACM, 41 (5): 74-80 (1998)