Author of the publication

An Optical See-Through Augmented Reality System for the Treatment of Phobia to Small Animals.

, , , , , and . HCI (14), volume 4563 of Lecture Notes in Computer Science, page 651-659. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Brain Activity Quantification for Sport Audiovisual Content Visualization using EEG., , , , , and . BIOSIGNALS, page 145-149. SciTePress, (2015)Psychological countermeasures in manned space missions: "EARTH" system for the Mars-500 project., , , , and . Computers in Human Behavior, (2016)The VEPSY Updated Project: Virtual Reality in Clinical Psychology., , , , , , , , , and 7 other author(s). Cyberpsy., Behavior, and Soc. Networking, 4 (4): 449-455 (2001)Presence and Reality Judgment in Virtual Environments: A Unitary Construct?, , , , , and . Cyberpsy., Behavior, and Soc. Networking, 3 (3): 327-335 (2000)Telepsychology: Public Speaking Fear Treatment on the Internet., , , , , and . Cyberpsy., Behavior, and Soc. Networking, 3 (6): 959-968 (2000)Clinically Significant Virtual Environments for the Treatment of Panic Disorder and Agoraphobia., , , , , and . Cyberpsy., Behavior, and Soc. Networking, 7 (5): 527-535 (2004)A game for emotional regulation in adolescents: The (body) interface device matters., , , , , , and . Computers in Human Behavior, (2016)Liver segmentation in MRI: A fully automatic method based on stochastic partitions., , , , and . Computer Methods and Programs in Biomedicine, 114 (1): 11-28 (2014)A New Approach in Metal Artifact Reduction for CT 3D Reconstruction., , , , and . IWINAC (2), volume 5602 of Lecture Notes in Computer Science, page 11-19. Springer, (2009)Ontologies for Intelligent e-Therapy: Application to Obesity., , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 894-901. Springer, (2009)