Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Dialog and Context in a Speech-Based interface for an Information Visualization Environment., , , , and . Advanced Visual Interfaces, page 274-275. ACM Press, (2000)How Smart Homes Learn: The Evolution of the Networked Home and Household., , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 127-144. Springer, (2007)In Search of Usable Security: Five Lessons from the Field, , , and . IEEE Security and Privacy, 2 (5): 19--24 (2004)Missing the wave? Scattershot funding has its costs., , and . IEEE Pervasive Comput., 4 (1): 80-82 (2005)Deliberate interactions: characterizing technology use in Nairobi, Kenya., , , , and . CHI, page 2593-2602. ACM, (2010)Extraordinary computing: religion as a lens for reconsidering the home., and . CHI, page 749-758. ACM, (2009)"Pimp My Roomba": designing for personalization., , and . CHI, page 193-196. ACM, (2009)Understanding the Role of Configuration Management Systems in Software Development.. CHI Conference Companion, page 39-40. ACM, (1996)It Takes (at least) Two: The Work to Make Romance Work., , , and . CHI, page 566:1-566:17. ACM, (2023)Wellness informatics: towards a definition and grand challenges., , and . CHI Extended Abstracts, page 4505-4508. ACM, (2010)