Author of the publication

Achieving Dependability in the Configuration, Integration and Testing of Healthcare Technologies.

, , , and . Computer Supported Cooperative Work, 15 (5-6): 467-499 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. David Remy University of Stuttgart

Periodic Trajectories of Passive One-Legged Hopper, and . Dataset, (2024)Related to: M. Raff, N. Rosa and C. D. Remy, "Connecting Gaits in Energetically Conservative Legged Systems," in IEEE Robotics and Automation Letters, vol. 7, no. 3, pp. 8407-8414, July 2022,. doi: 10.1109/LRA.2022.3186500.
 

Other publications of authors with the same name

AWeSOMe 2005 PC Co-chairs' Message., , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 37-38. Springer, (2005)'Colour, it's just a constant problem': an examination of practice, infrastructure and workflow in colour printing., , , , and . COOP, page 44-55. ACM, (2008)Special Issue Editorial Integrated health records: practice and technology., , , , and . Health Informatics Journal, 14 (2): 75-77 (2008)How Can I Help You? Call Centres, Classification Work and Coordination., , , and . Computer Supported Cooperative Work, 16 (3): 231-264 (2007)Ethnographically informed system design: the development and evaluation of an Internet-based electronic banking application., , and . ECIS, page 513-527. Euro-Arab Management School, (1998)Working hard in the 'office': an ethnomethodological study of on-line workshops., , , and . CSCL, page 619-620. International Society of the Learning Sciences, (2002)Aesthetics, digital technology and collaboration., , , , and . BCS HCI (2), page 199-200. BCS, (2008)Being a turker., , , and . CSCW, page 224-235. ACM, (2014)Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models., , , , , , , and . CCGRID, page 106-113. IEEE Computer Society, (2008)The times they are a-changin': mobile payments in india., , and . CHI, page 1413-1422. ACM, (2011)