Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in context: investigating the impact of context on attitudes towards biometric technology., , , and . BCS HCI, page 108-116. ACM, (2010)Fingers, veins and the grey pound: accessibility of biometric technology., , and . ECCE, volume 250 of ACM International Conference Proceeding Series, page 149-152. ACM, (2007)Usability Challenges in Emerging Markets., , and . ICEIS (5), page 160-165. (2008)Perfectly Balanced Allocation., , and . RANDOM-APPROX, volume 2764 of Lecture Notes in Computer Science, page 240-251. Springer, (2003)A simple dual-RAMP algorithm for resource constraint project scheduling., , and . ACM Southeast Regional Conference, page 67. ACM, (2010)Drawing Graphs with Large Vertices and Thick Edges., , and . WADS, volume 2748 of Lecture Notes in Computer Science, page 281-293. Springer, (2003)A Distributed Hash Table for Computational Grids., and . IPDPS, IEEE Computer Society, (2004)Survivable Monitoring in Dynamic Networks., , and . IEEE Trans. Mob. Comput., 5 (9): 1242-1254 (2006)Pagoda: a dynamic overlay network for routing, data management, and multicasting., , , , and . SPAA, page 170-179. ACM, (2004)User experience at NCR: an organisational overview., , , , and . BCS HCI, page 195-203. ACM, (2010)