Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Talking Heads: Multimedia Artifact Creation, Use, and Sharing in Distributed Meetings., , , and . CSCW, page 1701-1713. ACM, (2016)Presiding over accidents: system direction of human action., , , , and . CHI, page 463-470. ACM, (2004)Usability and privacy: a study of Kazaa P2P file-sharing., and . CHI, page 137-144. ACM, (2003)Stopping spyware at the gate: a user study of privacy, notice and spyware., , , , , , and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 43-52. ACM, (2005)Ad-hoc Guesting: When Exceptions Are the Rule., , , , and . UPSEC, USENIX Association, (2008)Noticing notice: a large-scale experiment on the timing of software license agreements., , , and . CHI, page 607-616. ACM, (2007)Bridging the Gap between Privacy by Design and Privacy in Practice., , , , , , , and . CHI Extended Abstracts, page 3415-3422. ACM, (2016)Towards automatic extraction of event and place semantics from flickr tags., , and . SIGIR, page 103-110. ACM, (2007)Combining Collaborative Filtering with Personal Agents for Better Recommendations, and . Proceedings of the 1999 Conference of the AAAI, page 439-446. AAAI Press, (1999)Analysis of Lexical Signatures for Finding Lost or Related Documents, , and . Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, page 103-110. Amsterdam, Netherlands, ACM Press, (July 2007)