Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confidence-Based Cheat Detection Through Constrained Order Inference of Temporal Sequences., , and . Int. J. Semantic Comput., 17 (2): 223-247 (June 2023)Participant-Making: bridging the gulf between community knowledge and academic research., , , and . J. Community Informatics, (2011)Proceed with Care: Reimagining Home IoT Through a Care Perspective., , , and . CHI, page 166:1-166:15. ACM, (2021)TemporalDedup: Domain-Independent Deduplication of Redundant and Errant Temporal Data., , and . Int. J. Semantic Comput., 17 (2): 309-343 (June 2023)Utilising insight journalism for community technology design., , , , , , , , and . CHI, page 2995-3004. ACM, (2014)The SelfReflector: Design, IoT and the High Street., , , , , and . CHI, page 423. ACM, (2018)Viewpoint: empowering communities with situated voting devices., , , , , , , , and . CHI, page 1361-1370. ACM, (2012)Prototyping Things: Reflecting on Unreported Objects of Design Research for IoT., , , , , , , , , and . Conference on Designing Interactive Systems, page 1807-1816. ACM, (2021)Social Printers: A Physical Social Network for Political Debates., , and . CHI, page 2269-2281. ACM, (2017)Cheat Detection Through Temporal Inference of Constrained Orders for Subsequences., , and . AIKE, page 45-52. IEEE, (2022)