Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accessibility challenges and tool features: an IBM Web developer perspective., , , , and . W4A, page 32. ACM, (2010)Physical accessibility of touchscreen smartphones., , and . ASSETS, page 19:1-19:8. ACM, (2013)Biometric authentication on a mobile device: a study of user effort, error and task disruption., , , , , and . ACSAC, page 159-168. ACM, (2012)Sketching data: lessons learned from a formative user evaluation., , , , , and . SIGGRAPH Mobile, page 11:1. ACM, (2013)Designing an E-grocery application for a palm computer: usability and interface issues., , , , and . IEEE Wirel. Commun., 8 (4): 60-64 (2001)An open source approach to information scent., , , , and . CHI Extended Abstracts, page 355-360. ACM, (2013)Using tagging to identify and organize concerns during pre-requirements analysis., , , , , , , , , and 1 other author(s). EA@ICSE, page 25-30. IEEE, (2009)Business insight toolkit: Flexible pre-requirements modeling., , , , , , , , , and 2 other author(s). ICSE Companion, page 423-424. IEEE, (2009)Towards a tool for keystroke level modeling of skilled screen reading., , , , , , and . ASSETS, page 27-34. ACM, (2010)Perceptions of Risk in Mobile Transaction., , , and . IEEE Symposium on Security and Privacy Workshops, page 214-223. IEEE Computer Society, (2016)