61 – 70 of 216
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Tools in and out of sight : an analysis informed by Cultural-Historical Activity Theory of audio-haptic activities involving people with visual impairments supported by technology
(2023)
- Thesis › Doctoral thesis (compilation)
-
Mark
Taming Cloud Integrated Systems in the Wild
(2023)
- Thesis › Doctoral thesis (compilation)
-
Mark
Can L2 motivation be modelled as a self-system? A critical assessment
- Contribution to journal › Article
-
Mark
PFASST with dynamic resource management for large-scale applications
(2023) 12th Workshop on Parallel-in-Time Integration
- Contribution to conference › Poster
- 2022
-
Mark
The Use of Computational Geometry Techniques to Resolve the Issues of Coverage and Connectivity in Wireless Sensor Networks
- Contribution to journal › Scientific review
-
Mark
Identifying and Predicting Cybersecurity Threats in Industry 4.0 Based on the Motivations Towards a Critical Infrastructure
(2022) 19th International Conference on Manufacturing Research, ICMR 2022 In Advances in Transdisciplinary Engineering 25. p.10-16
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
How Order is Made in Datasets for Computer Vision : A Machine Gaze with Habaneros, please!
(2022) STS-dagarna
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Machine Pedagogy: : Classifications and Expectations of Egocentric Machine Vision Capabilities
(2022) EASST 2022
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Discretion, Automated Decision-Making and Public Values. : Background and Test of an Approach for Unpacking Human and Technological Agency
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
(2022) 2022 IEEE International Symposium on Secure and Private Execution Environment Design p.109-120
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
