Author of the publication

Surch: Enabling Structural Search and Comparison for Surgical Videos.

, , , , and . CHI, page 801:1-801:17. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surch: Enabling Structural Search and Comparison for Surgical Videos, , , , and . Conference on Human Factors in Computing Systems - Proceedings, 1, page 1--17. New York, NY, USA, ACM, (April 2023)Prototyping Ubiquitous Biosensing Applications through Speculative Design., , , , , , , and . Intelligent Environments, page 198-205. IEEE, (2012)Modeling Language Vagueness in Privacy Policies Using Deep Neural Networks., , and . AAAI Fall Symposia, AAAI Press, (2016)Addressing homelessness in LA County by combat or cure: Examining the effect of conceptual metaphor on reasoning., , and . CogSci, cognitivesciencesociety.org, (2022)A Real-Time, Multimodal, and Dimensional Affect Recognition System., , and . PRICAI, volume 7458 of Lecture Notes in Computer Science, page 241-249. Springer, (2012)Exploring the use of speech input by blind people on mobile devices., and . ASSETS, page 11:1-11:8. ACM, (2013)Examining Menstrual Tracking to Inform the Design of Personal Informatics Tools., , , , , , , , and . CHI, page 6876-6888. ACM, (2017)Modelling the Migration and Maturation of Dendritic Cells for Automatic Optimization of Complex Engineering Problems., and . ECAL, page 899-900. MIT Press, (2013)An Immune Inspired Algorithm for Solving Dynamic Vehicle Dispatching Problem in a Port Container Terminal., , and . ICARIS, volume 5666 of Lecture Notes in Computer Science, page 329-342. Springer, (2009)Danger Theory or Trained Neural Network - A Comparative Study for Behavioural Detection., and . SCIS&ISIS, page 867-874. IEEE, (2018)