Author of the publication

Task and user effects on reading patterns in information search.

, , , , , and . Interacting with Computers, 23 (4): 346-362 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonparametric background model based clutter map for X-band marine radar., , , , , and . ICIP, page 123-127. IEEE, (2015)Automated Security Checking and Patching Using TestTalk., and . ASE, page 261-264. IEEE Computer Society, (2000)High-order Parallel Iterative Method For The Heat Equations., and . CSC, page 243-250. CSREA Press, (2010)Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks., , and . NetCoM, page 40-45. IEEE Computer Society, (2009)Using RAIC for Dependable On-line Upgrading of Distributed Systems., and . COMPSAC, page 1006-1011. IEEE Computer Society, (2002)A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS)., , , , , and . COMPSAC (2), page 473-478. IEEE Computer Society, (2009)978-0-7695-3726-9.Optimization of Integrated Risk in Commercial Banking based on Financial Statements., , , , , and . ITQM, volume 31 of Procedia Computer Science, page 501-510. Elsevier, (2014)Dynamic Programming Based Research Position Planning: Empirical Analysis from the Chinese Academy of Sciences., , , , and . ITQM, volume 55 of Procedia Computer Science, page 35-42. Elsevier, (2015)A Study on the Effect of Traceability Links in Software Maintenance., , and . IEEE Access, (2013)CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing., , , and . Future Generation Comp. Syst., 29 (5): 1300-1308 (2013)