Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yongwen XuUniversity of Hawaii at ManoaEmail verificata su hawaii.edu
- Philip JohnsonProfessor of Information and Computer Sciences, University of HawaiiEmail verificata su hawaii.edu
- Nervo Xavier VerdezotoSenior Lecturer in Human-Computer Interaction, Cardiff UniversityEmail verificata su cardiff.ac.uk
- Michelle KatchuckUniversity of HawaiiEmail verificata su hawaii.edu
- Sam JosephAssociate Professor of Computer Science, Hawaii Pacific UniversityEmail verificata su hpu.edu
- Daniel SuthersProfessor of Information and Computer Sciences, University of HawaiiEmail verificata su hawaii.edu
- Rune Hylsberg JacobsenProfessorEmail verificata su ece.au.dk
- Niels Olof BouvinAssociate Professor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Mads Schaarup AndersenSenior Usable Security ExpertEmail verificata su alexandra.dk
- Sergi Rotger-GrifulPrincipal Scientist, Eriksholm Research CentreEmail verificata su eriksholm.com
- Henrik BlunckProfessor of Computer Science, University of Applied Sciences Bochum, GermanyEmail verificata su hs-bochum.de
- Kaj GrønbækProfessor, Head of Department of Computer Science, Aarhus University, DenmarkEmail verificata su cs.au.dk
- Majken Kirkegaard RasmussenAarhus University, Digital Design & Information StudiesEmail verificata su cc.au.dk
- Kar-Hai ChuAssociate Professor of Public Health, University of PittsburghEmail verificata su pitt.edu
- Markus WüstenbergPhD student in Ubiquitous Computing and Interaction Group, Aarhus UniversityEmail verificata su cs.au.dk
- Henrik Bærbak ChristensenAssociate Professor, Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Matthias NielsenDepartment of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Matthias NielsenAlexandra InstituteEmail verificata su alexandra.dk