Author of the publication

Adaptive, intelligent presentation of information for the museum visitor in PEACH

, , , , , , , , , , , , , , , , , and . User Modeling and User-Adapted Interaction, 17 (3): 257--304 (July 2007)
DOI: 10.1007/s11257-007-9029-6

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterization of JWST science performance from commissioning, , , , , , , , , and 601 other author(s). (2022)cite arxiv:2207.05632Comment: 60 pages, 30 figures.Disability-adjusted life years (DALYs) for 291 diseases and injuries in 21 regions, 1990-2010: a systematic analysis for the Global Burden of Disease Study 2010., , , , , , , , , and 351 other author(s). Lancet (London, England), 380 (9859): 2197--2223 (Dec 15, 2012)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Comprehensive Analysis of Alternative Splicing Across Tumors from 8,705 Patients, , , , , , , , , and 725 other author(s). Cancer Cell, 34 (2): 211--224.e6 (August 2018)Applications of digital technology to radar., , , , and . Proc. IEEE, 73 (2): 325-339 (1985)Retail Vision-Based Self-checkout - Exploring Real Time Real Purpose General Vision System., , , , , , , , , and 2 other author(s). VISAPP (1), page 13-14. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)NIIIP-SMART: an investigation of distributed object approaches to support MES development and deployment in a virtual enterprise., , , , , , , , and . EDOC, page 366-377. IEEE, (1998)An Analysis of Telepsychiatry Programs from an Organizational Perspective., , and . Cyberpsy., Behavior, and Soc. Networking, 3 (6): 911-916 (2000)Preventing Personal Data Theft in Images with Adversarial ML., , , and . CoRR, (2020)