The SCEAS System
Navigation Menu

Search the dblp DataBase


Heinrich Hussmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Heinrich Hussmann
    A Case Study Towards Algebraic Verification of Code. [Citation Graph (0, 0)][DBLP]
    AMAST, 1991, pp:254-263 [Conf]
  2. Paul Holleis, Friederike Otto, Heinrich Hussmann, Albrecht Schmidt
    Keystroke-level model for advanced mobile phone interaction. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:1505-1514 [Conf]
  3. Andreas Pleuss, Arnd Vitzthum, Heinrich Hussmann
    Integrating Heterogeneous Tools into Model-Centric Development of Interactive Applications. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2007, pp:241-255 [Conf]

  4. ColorPIN: securing PIN entry through indirect input. [Citation Graph (, )][DBLP]

  5. Model-driven development of advanced user interfaces. [Citation Graph (, )][DBLP]

  6. Evaluation of User-Interfaces for Mobile Application Development Environments. [Citation Graph (, )][DBLP]

  7. Evaluation of User Interface Design and Input Methods for Applications on Mobile Touch Screen Devices. [Citation Graph (, )][DBLP]

  8. Applying Domain-Specific Modeling to Mobile Health Monitoring Applications. [Citation Graph (, )][DBLP]

  9. Mobia Modeler: easing the creation process of mobile applications for non-technical users. [Citation Graph (, )][DBLP]

  10. Model-Driven Development of Mobile Applications. [Citation Graph (, )][DBLP]

  11. A Methodology and Framework to Simplify Usability Analysis of Mobile Applications. [Citation Graph (, )][DBLP]

  12. TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones. [Citation Graph (, )][DBLP]

  13. PassShape: stroke based shape passwords. [Citation Graph (, )][DBLP]

  14. My phone is my keypad: privacy-enhanced PIN-entry on public terminals. [Citation Graph (, )][DBLP]

  15. Towards understanding ATM security: a field study of real world ATM use. [Citation Graph (, )][DBLP]

  16. Look into my eyes!: can you guess my password? [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002