![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Ben Anderson
2020 – today
- 2024
- [c11]Raed Awill, Wajahat Ali Khan, Maqbool Hussain, Ben Anderson:
Optimizing Aerospace Product Maintenance - A Novel Multi-Modal Knowledge Graph and LLM Approach for Enhanced Decision Support. ESWS (Satellite Events) 2024: 129-132 - 2023
- [c10]Kenechukwu Eyisi, Khuram Nawaz Khayam, Wajahat Ali Khan, Maqbool Hussain, Muhammad Sadiq Hassan Zada, Ben Anderson:
UI/UX for Aerospace Qualification Business Processes. RTIP2R (2) 2023: 369-382 - [c9]Raed Awill, Wajahat Ali Khan, Maqbool Hussain, Muhammad Sadiq Hassan Zada, Ben Anderson:
Aerospace Qualification Services Knowledge Graph: A Leap towards Enhanced Data Management. ISWC (Posters/Demos/Industry) 2023
2010 – 2019
- 2017
- [j12]Ben Anderson
, Sharon Lin, Andy Newing, Abubakr S. Bahaj
, Patrick A. B. James
:
Electricity consumption and household characteristics: Implications for census-taking in a smart metered future. Comput. Environ. Urban Syst. 63: 58-67 (2017) - 2014
- [c8]Nikolaos Vastardis, Mounir Adjrad, Kathryn Buchanan
, Zhining Liao, Christian Koch, Riccardo Russo, Kun Yang, Mohammad Ghavami
, Ben Anderson
, Sandra E. M. Dudley
:
A user-centric system architecture for residential energy consumption reduction. OnlineGreenComm 2014: 1-7
2000 – 2009
- 2007
- [j11]Houssem Assadi, Philippe Owezarski, Ben Anderson
:
Analysis of Internet traffic and usage traces. Ann. des Télécommunications 62(3-4): 275-278 (2007) - [j10]Houssem Assadi, Philippe Owezarski, Ben Anderson:
Analyse de trafic et de traces d'usage de l'internet. Ann. des Télécommunications 62(3-4): 279-282 (2007) - [j9]Samuelle Carlson, Ben Anderson
:
What Are Data? The Many Kinds of Data and Their Implications for Data Re-Use. J. Comput. Mediat. Commun. 12(2): 635-651 (2007) - 2006
- [p1]Ben Anderson:
Passing By and Passing Through. Computers, Phones, and the Internet 2006: 32-42 - 2004
- [j8]Ben Anderson:
Book Review: Society Online: the Internet in Context. New Media Soc. 6(6): 823-827 (2004) - 2003
- [j7]Martin J. Hicks, Claire O'Malley, Sarah Nichols
, Ben Anderson
:
Comparison of 2D and 3D representations for visualising telecommunication usage. Behav. Inf. Technol. 22(3): 185-201 (2003) - 2002
- [c7]Marian S. Stachowicz, Ben Anderson:
Modeling and Control using Fuzzy Logic Package for Mathematica®. FSKD 2002: 222- - 2001
- [j6]Hazel Lacohée, Ben Anderson
:
Interacting with the telephone. Int. J. Hum. Comput. Stud. 54(5): 665-699 (2001) - [j5]Hazel Lacohée, Ben Anderson
:
Erratum: Interacting with the telephone. Int. J. Hum. Comput. Stud. 55(3): 369 (2001) - 2000
- [j4]James L. Alty, Roger P. Knott, Ben Anderson, Michael Smyth
:
A framework for engineering metaphor at the user interface. Interact. Comput. 13(2): 301-322 (2000)
1990 – 1999
- 1999
- [c6]Ben Anderson:
On Not Being There: Watching Intranet Tele-presentations. INTERACT 1999: 451-457 - 1996
- [j3]Ben Anderson, Blair MacIntyre
:
Programming languages: a play in three acts. ACM SIGCHI Bull. 28(3): 15-19 (1996) - [c5]Ben Anderson
:
Providing Explicit Support for Social Constraints: In Search of the Social Computer. CHI Conference Companion 1996: 27-28 - 1995
- [j2]Ben Anderson, Rachel Croft, David Fulton:
Reflections on HCI'94 - a student perspective. ACM SIGCHI Bull. 27(1): 18-19 (1995) - [c4]Ben Anderson, James L. Alty:
Everyday Theories, Cognitive Anthropology and User-centred System Design. BCS HCI 1995: 121-135 - [c3]Michael Smyth, Ben Anderson, James L. Alty:
Metaphor Reflections and a Tool for Thought. BCS HCI 1995: 137-150 - [c2]Michael Smyth, Ben Anderson, Roger P. Knott, James L. Alty:
Reflections on the design of interface metaphors. INTERACT 1995: 339-345 - 1994
- [c1]Ben Anderson, Michael Smyth, Roger P. Knott, Marius Bergan, Julie Bergan, James L. Alty:
Minimising Conceptual Baggage: Making Choices about Metaphor. BCS HCI 1994: 179-194
1980 – 1989
- 1989
- [j1]Kathy Carter, Ben Anderson:
Can video research escape the technology? some reflections on the problems and possibilities of A. V. research. ACM SIGCHI Bull. 21(2): 112-114 (1989)
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-05 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)