Author of the publication

The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid.

, , , , , , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 168-179. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Personal Data: Can IT Security Management Standards Help?. ACSAC, page 266-275. IEEE Computer Society, (2003)The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid., , , , , , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 168-179. Springer, (2004)Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world., , , , and . CHI, page 1009-1018. ACM, (2006)Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?, and . ACSAC, page 107-. IEEE Computer Society, (2000)Physical, Social, and Experiential Knowledge in Pervasive Computing Environments., , , , , , and . IEEE Pervasive Computing, 6 (4): 56-63 (2007)Developing privacy guidelines for social location disclosure applications and services., , , , and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 65-76. ACM, (2005)Continuous Sensing of Gesture for Control of Audio-Visual Media., , , , , and . ISWC, page 236-237. IEEE Computer Society, (2003)Prototypes and paratypes: designing mobile and ubiquitous computing applications., , , , , , and . IEEE Pervasive Computing, 4 (4): 67-73 (2005)Mobile HCI 2004 Workshop on Location Systems Privacy and Control., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 525-526. Springer, (2004)Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service., , , , , , , , , and 1 other author(s). UbiComp, volume 3660 of Lecture Notes in Computer Science, page 213-231. Springer, (2005)