Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anind K. DeyUniversity of WashingtonVerified email at uw.edu
Jakob E. BardramProfessor in Computer Science, Technical University of DenmarkVerified email at dtu.dk
Jennifer MankoffUniversity of WashingtonVerified email at cs.washington.edu
Sheldon CohenRobert E. Doherty University Emeritus Professor of Psychology, Carnegie MellonVerified email at cmu.edu
Michael J. TumminiaUniversity of PittsburghVerified email at pitt.edu
Janine M. DutcherCarnegie Mellon Department of PsychologyVerified email at andrew.cmu.edu
Andrew CampbellAlfred Bradley 1915 Third Century Professor, Computer Science, Dartmouth CollegeVerified email at dartmouth.edu
Tanzeem ChoudhuryProfessor, Computing and Information Science, Cornell TechVerified email at cornell.edu
Hong LuResearch Scientist, Intel LabVerified email at intel.com
Nicholas LaneUniversity of Cambridge and Samsung AIVerified email at cam.ac.uk
Mu (Kevin) LinStripe Inc.Verified email at stripe.com
David CreswellProfessor, Carnegie Mellon UniversityVerified email at cmu.edu
Carissa LowAssociate Professor, University of PittsburghVerified email at upmc.edu
John ZimmermanProfessor, Human-Computer Interaction Institute, Carnegie Mellon UnviersityVerified email at cs.cmu.edu
Prerna ChikersalPhD Student at Carnegie Mellon UniversityVerified email at cmu.edu
Jason HongCarnegie Mellon UniversityVerified email at cs.cmu.edu
Jun-Ki MinMotorola MobilityVerified email at cs.cmu.edu
Jason WieseUniversity of UtahVerified email at cs.utah.edu
Mads FrostCo-founder and Chief Information Security Officer at MonsensoVerified email at madsfrost.dk
Giuseppe CardoneGoogleVerified email at google.com
Follow