Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingers, veins and the grey pound: accessibility of biometric technology., , and . ECCE, volume 250 of ACM International Conference Proceeding Series, page 149-152. ACM, (2007)Security in context: investigating the impact of context on attitudes towards biometric technology., , , and . BCS HCI, page 108-116. ACM, (2010)Usability Challenges in Emerging Markets., , and . ICEIS (5), page 160-165. (2008)Perfectly Balanced Allocation., , and . RANDOM-APPROX, volume 2764 of Lecture Notes in Computer Science, page 240-251. Springer, (2003)A simple dual-RAMP algorithm for resource constraint project scheduling., , and . ACM Southeast Regional Conference, page 67. ACM, (2010)Drawing Graphs with Large Vertices and Thick Edges., , and . WADS, volume 2748 of Lecture Notes in Computer Science, page 281-293. Springer, (2003)Survivable Monitoring in Dynamic Networks., , and . IEEE Trans. Mob. Comput., 5 (9): 1242-1254 (2006)A Distributed Hash Table for Computational Grids., and . IPDPS, IEEE Computer Society, (2004)Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems., , , and . INTERACT (2), volume 5727 of Lecture Notes in Computer Science, page 293-305. Springer, (2009)Biometrics in Practice: What Does HCI Have to Say?, , , and . INTERACT (2), volume 5727 of Lecture Notes in Computer Science, page 920-921. Springer, (2009)