Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing distributed corporate meetings with lightweight avatars., , , , and . CHI Extended Abstracts, page 3829-3834. ACM, (2010)Identity disclosure and the creation of social capital., and . CHI Extended Abstracts, page 720-721. ACM, (2003)How a good software practice thwarts collaboration: the multiple roles of APIs in software development., , , , and . SIGSOFT FSE, page 221-230. ACM, (2004)The Rendezvous Architecture and Language for Constructing Multi-User Applications., , , , and . ACM Trans. Comput. Hum. Interact., 1 (2): 81-125 (1994)Nimble cybersecurity incident management through visualization and defensible recommendations., , , , , and . VizSEC, page 102-113. ACM, (2010)Rendezvous: An Architecture for Synchronous Multi-User Applications., , , and . CSCW, page 317-328. ACM, (1990)Comparing the programming demands of single-user and multi-user applications.. UIST, page 87-94. ACM, (1991)Rendezvous: An Architecture for Synchronous Multi-User Applications, , and . Proceedings of the Conference on Computer-Supported Cooperative Work, page 317-328. Los Angeles, California, ACM, (October 1990)Video Browsing and System Response Time., and . BCS HCI, page 189-198. Cambridge University Press, (1987)Weaving a social fabric into existing software., , , , and . AOSD, page 147-158. ACM, (2005)