Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
steve benfordThe University of NottinghamVerified email at cs.nott.ac.uk
Alexandra BrintrupUniversity of CambridgeVerified email at cam.ac.uk
Stephen MakPhD Candidate, University of CambridgeVerified email at cam.ac.uk
adrian hazzardUniversity of NottinghamVerified email at nottingham.ac.uk
Alan ChamberlainPrincipal Research Fellow - University of Nottingham, Computer ScienceVerified email at nottingham.ac.uk
Dave ToweyUniversity of Nottingham Ningbo ChinaVerified email at nottingham.edu.cn
Andrew P FrenchUniversity of NottinghamVerified email at nottingham.ac.uk
Dimitrios DarzentasEdinburgh Napier UniversityVerified email at Napier.ac.uk
Chris GreenhalghProfessor of Computer Science, University of NottinghamVerified email at nottingham.ac.uk
Michaela HoareMixed Reality Lab, University of NottinghamVerified email at nottingham.ac.uk
Yaniv ProselkovPhD Researcher, University of CambridgeVerified email at cam.ac.uk
Tsong Yueh ChenProfessor of Software Engineering,Swinburne University of TechnologyVerified email at swin.edu.au
Zhi Quan (George) ZHOUSenior Expert (Safety and Cybersecurity) & ProfessorVerified email at connect.hku.hk
Jun FengHohai UniversityVerified email at hhu.edu.cn
Tim PearceUniversity of LeicesterVerified email at le.ac.uk
Stefan SchoepfPhD Student, University of CambridgeVerified email at cam.ac.uk
Dale RogersON Semiconductor Professor of Business, Logistics & Supply Chain ManagementVerified email at asu.edu
Thomas ChoiArizona State UniversityVerified email at asu.edu
Zhang JieUniversity of BristolVerified email at bristol.ac.uk
Torbjørn NetlandETH ZurichVerified email at ethz.ch