Author of the publication

Understanding Barriers and Design Opportunities to Improve Healthcare and QOL for Older Adults through Voice Assistants.

, , , , , , , , and . ASSETS, page 9:1-9:16. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pan-cancer analysis of whole genomes identifies driver rearrangements promoted by LINE-1 retrotransposition, , , , , , , , , and 115 other author(s). Nature Genetics, (2020)Design methodology for the IBM POWER7 microprocessor., , , , , , , , , and 15 other author(s). IBM J. Res. Dev., 55 (3): 9 (2011)Zero Trust Architecture Approach for Developing Mission Critical Embedded Systems., , , , , , , , , and 2 other author(s). HPEC, page 1-5. IEEE, (2023)Agile and Resilient Embedded Systems., , , , , , , , , and 6 other author(s). MILCOM, page 715-720. IEEE, (2021)Understanding Barriers and Design Opportunities to Improve Healthcare and QOL for Older Adults through Voice Assistants., , , , , , , , and . ASSETS, page 9:1-9:16. ACM, (2021)A Novel Approach to Cyber Situational Awareness in Embedded Systems., , , , , , , , , and 4 other author(s). HPEC, page 1-5. IEEE, (2021)Security-as-a-Service for Embedded Systems., , , , , , , , , and 1 other author(s). MILCOM, page 691-695. IEEE, (2023)The Impact of Query Suggestion in E-Commerce Websites., and . WEB, volume 108 of Lecture Notes in Business Information Processing, page 248-254. Springer, (2011)Proactive Provenance Policies for Automatic Cryptographic Data Centric Security., , , and . IPAW, volume 12839 of Lecture Notes in Computer Science, page 71-87. Springer, (2021)An experience report on requirements reliability engineering using formal methods., , and . ISSRE, page 52-57. IEEE Computer Society, (1995)