Author of the publication

Business Intelligence Analytics Guest editors' introduction.

, , and . IEEE Computer Graphics and Applications, 34 (5): 22-24 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spy-resistant keyboard: more secure password entry on public touch screen displays., , and . OZCHI, volume 122 of ACM International Conference Proceeding Series, ACM, (2005)RelAltTab: assisting users in switching windows., , , and . IUI, page 385-388. ACM, (2008)Workplace Indicators of Mood: Behavioral and Cognitive Correlates of Mood Among Information Workers., , , and . Digital Health, page 29-36. ACM, (2016)An Exploratory Study Toward the Preferred Conversational Style for Compatible Virtual Agents., , , , and . IVA, volume 10011 of Lecture Notes in Computer Science, page 40-50. (2016)Theories of Conversation for Conversational IR., , , and . ACM Trans. Inf. Syst., 39 (4): 39:1-39:23 (2021)Affective Conversational Agents: Understanding Expectations and Personal Influences., , , , , and . CoRR, (2023)Digital Memories in an Era of Ubiquitous Computing and Abundant Storage, , , , , , and . Communications of the ACM, 49 (1): 44-50 (2006)Personalization via friendsourcing., , , , and . ACM Trans. Comput.-Hum. Interact., (2010)Effective Notification Systems Depend on User Trust., , , and . INTERACT, page 684-685. IOS Press, (2001)SWARM: An Actuated Wearable for Mediating Affect., , , , and . TEI, page 293-300. ACM, (2015)