Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How external and internal resources influence user action: the case of infusion devices., , , and . Cognition, Technology & Work, 18 (4): 793-805 (2016)Formal Modelling of Cognitive Interpretation., , , and . DSV-IS, volume 4323 of Lecture Notes in Computer Science, page 123-136. Springer, (2006)Artifacts for programmable devices: the good, the bad and the ugly., and . CHI Extended Abstracts, page 1731-1736. ACM, (2013)A resilience markers framework for small teams., , , , and . Rel. Eng. & Sys. Safety, 96 (1): 2-10 (2011)A study in engaging female students in computer science using role models., , , and . ITiCSE, page 63-67. ACM, (2011)cs4fn: a flexible model for computer science outreach., , , , and . ITiCSE, page 297-302. ACM, (2012)Making computing interesting to school students: teachers' perspectives., , , , , and . ITiCSE, page 255-260. ACM, (2013)Video games as research instruments., , , , and . CHI Extended Abstracts, page 4493-4496. ACM, (2010)Combining Human Error Verification and Timing Analysis., , , and . EHCI/DS-VIS, volume 4940 of Lecture Notes in Computer Science, page 18-35. Springer, (2007)Locked-out: investigating the effectiveness of system lockouts to reduce errors in routine tasks., , and . CHI Extended Abstracts, page 3775-3780. ACM, (2010)