Author of the publication

Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment.

, , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 234-243. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (8): 2138-2150 (2008)Augmenting Trading Card Game: Playing against Virtual Characters Used in Fictional Stories., , and . Advances in Computer Entertainment, volume 7624 of Lecture Notes in Computer Science, page 549-552. Springer, (2012)Mobile Image Search via Local Crowd: A User Study., , , and . RTCSA (2), page 109-112. IEEE Computer Society, (2011)978-1-4577-1118-3.Churn resilience in network coding-based anonymous P2P system., , and . ISITA, page 270-274. IEEE, (2012)A crowdsourcing based mobile image translation and knowledge sharing service., , , , , and . MUM, page 6. ACM, (2010)Analyzing the influence of virtuality on playful social interaction., , and . Multim. Tools Appl., 75 (14): 8289-8317 (2016)Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment., , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 234-243. Springer, (2013)Computational Model of Depth Perception based on Fixational Eye Movements., and . VISAPP (1), page 328-333. INSTICC Press, (2010)Facilitating natural flow of information among "taste-based" groups., , , and . CHI Extended Abstracts, page 871-876. ACM, (2013)Realizing and evaluating mutual anonymity in P2P networks., , , and . ISITA, page 66-71. IEEE, (2010)