Author of the publication

Arrange-A-Space: tabletop interfaces and gender collaboration.

, , , , and . CHI Extended Abstracts, page 1495-1500. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arrange-A-Space: tabletop interfaces and gender collaboration., , , , and . CHI Extended Abstracts, page 1495-1500. ACM, (2011)An integrated semiconductor device enabling non-optical genome sequencing, , , , , , , , , and 34 other author(s). Nature, 475 (7356): 348--352 (July 2011)Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)., , , , , , , and . WWW (Companion Volume), page 1311-1314. ACM, (2017)The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach., , , , and . EuroS&P Workshops, page 227-238. IEEE, (2021)A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement., , and . ACM Comput. Surv., 48 (1): 15:1-15:54 (2015)Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes., and . eCrime, page 1-17. IEEE, (2023)Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention., and . EICC, page 1-10. ACM, (2024)"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making., , , , , and . ACM Trans. Priv. Secur., 24 (1): 5:1-5:29 (2020)Automatically Dismantling Online Dating Fraud., , , , , and . CoRR, (2019)Text generation for dataset augmentation in security classification tasks., and . CoRR, (2023)