Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Reducing the Risk of Errors in Digital Forensic Investigations., , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 99-106. Springer, (2012)A Study of Application and Device Effects Between a WAP Phone and a Palm PDA., and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 192-203. Springer, (2004)Musical program auralisation: a structured approach to motif design., and . Interact. Comput., 14 (5): 457-485 (2002)Who Helps the Helper? A Situated Scaffolding System for Supporting Less Experienced Feedback Givers., , and . AIED, volume 125 of Frontiers in Artificial Intelligence and Applications, page 851-853. IOS Press, (2005)Network infrastructure visualisation using high-dimensional node-attribute data., and . IEEE VAST, page 293-294. IEEE Computer Society, (2012)User-Contributory Case-Based Reasoning for Digital Forensic Investigations., , and . EST, page 103-106. IEEE Computer Society, (2012)The Use of Audio in Minimal Access Surgery, and . XVIII European Annual Conference on Human Decision Making and Manual Control, page 13-22. Loughborough, UK, Group D Publications Ltd, (1999)A survey of two-dimensional graph layout techniques for information visualisation, , and . Information Visualization, 12 (3-4): 324--357 (2013)Using Music as a Communication Medium., , and . CHI Extended Abstracts, page 30-31. ACM, (1997)Using music to communicate computing information., and . Interact. Comput., 14 (5): 435-456 (2002)