Author of the publication

A Literature Review of AR-Based Remote Guidance Tasks with User Studies.

, , and . HCI (11), volume 12191 of Lecture Notes in Computer Science, page 111-120. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Digital Technologies and Safeguards for Improving Activities and Well-Being for Aging in Place., , and . HCI (44), volume 12426 of Lecture Notes in Computer Science, page 524-537. Springer, (2020)The Use of Virtual Reality in the Treatment of Posttraumatic Stress Disorder (PTSD)., , and . HCI (13), volume 5622 of Lecture Notes in Computer Science, page 615-624. Springer, (2009)"Showing off" your mobile device: adult literacy learning in the classroom and beyond., , , , , , and . Mobile HCI, page 95-104. ACM, (2011)Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment., , , , , , and . HCI (35), volume 14045 of Lecture Notes in Computer Science, page 622-642. Springer, (2023)Behavioural Monitoring and Security Profiling in the Internet of Things (IoT)., , , , , , and . HPCC/DSS/SmartCity/DependSys, page 1203-1210. IEEE, (2021)A Literature Review of AR-Based Remote Guidance Tasks with User Studies., , and . HCI (11), volume 12191 of Lecture Notes in Computer Science, page 111-120. Springer, (2020)Designing for Privacy and Technology Adoption by Older Adults., , and . HCI (37), volume 1580 of Communications in Computer and Information Science, page 506-515. Springer, (2022)Remote Home Healthcare Services and Tools for Supporting Aging in Place., , and . AHFE (17), volume 1217 of Advances in Intelligent Systems and Computing, page 882-891. Springer, (2020)Fieldwork with vulnerable populations., , and . Interactions, 21 (1): 50-53 (2014)Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System., , , , , , , and . Int. J. Cogn. Informatics Nat. Intell., 15 (4): 1-23 (2021)