Author of the publication

Invisible design: exploring insights and ideas through ambiguous film scenarios.

, , , , , , , , , and . Conference on Designing Interactive Systems, page 534-543. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Engaging Users with Educational Games: The Case of Phishing., , and . CHI Extended Abstracts, ACM, (2019)Experiences from a wireless sensor network deployment in a petroleum environment., , , and . IWCMC, page 382-387. ACM, (2007)Using IMUs to Identify Supervisors on Touch Devices., , , , , and . INTERACT (2), volume 9297 of Lecture Notes in Computer Science, page 565-583. Springer, (2015)Securing passfaces for description., , and . SOUPS, page 24-35. ACM, (2008)Age-related performance issues for PIN and face-based authentication systems., , and . CHI, page 323-332. ACM, (2013)Detecting Port Scans against Mobile Devices with Neural Networks and Decision Trees., , and . EANN, volume 459 of Communications in Computer and Information Science, page 175-182. Springer, (2014)WINTeR: Architecture and Applications of a Wireless Industrial Sensor Network Testbed for Radio-Harsh Environments., , , , , and . CNSR, page 422-431. IEEE Computer Society, (2008)A safe communication scheme for an intelligent Wireless Networked Control System Coordination Agent., , , and . SMC, page 3068-3073. IEEE, (2010)Panopticon as an eLearning support search tool., , , and . CHI, page 1221-1224. ACM, (2014)Activity Recognition for Quality Assessment of Batting Shots in Cricket using a Hierarchical Representation., , and . IMWUT, 1 (3): 62:1-62:31 (2017)