Author: Michael McQuaid
Publication Overview
Publication period start: 2009
Number of co-authors: 19
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Roussinov,
Dmitri,
Tolle,
Kristine,
Ramsey,
Marshall,
McQuaid,
Michael,
Chen,
Hsinchun
(1999):
Visualizing Internet Search Results with Adaptive Self-Organizing Maps.
In:
Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval
,
1999,
.
pp. 336.
https://www.acm.org/pubs/articles/proceedings/ir/312624/p336-roussinov/p336-roussinov.pdf
Booker,
Queen Esther,
Lopez,
Ana V.,
McQuaid,
Michael,
Farrar,
Scott
(2002):
Advanced Question and Answering Systems for Community Development.
In:
HICSS 2002
,
2002,
.
pp. 11.
https://csdl.computer.org/comp/proceedings/hicss/2002/1435/01/14350011babs.htm
Hengst,
Mariëlle den,
McQuaid,
Michael,
Zhu,
Jiang
(2004):
Impact of Time-Based Visualization on Situation Awareness.
In:
HICSS 2004
,
2004,
.
https://csdl.computer.org/comp/proceedings/hicss/2004/2056/01/205610039babs.htm
McQuaid,
Michael,
Booker,
Queen Esther
(2001):
Community Development and Technology Minitrack - Introduction.
In:
HICSS 2001
,
2001,
.
https://csdl.computer.org/comp/proceedings/hicss/2001/0981/01/09811016abs.htm
McQuaid,
Michael,
Briggs,
Robert O.,
Gillman,
Duffy,
Hauck,
Roslin V.,
Lin,
Chienting,
Mittleman,
Daniel D.,
Nunamaker,
Jay F.,
Ramsey,
Marshall,
Jr.,
Nicholas C. Romano
(2000):
Tools for Distributed Facilitation.
In:
HICSS 2000
,
2000,
.
https://csdl.computer.org/comp/proceedings/hicss/2000/0493/01/04931041abs.htm
Roussinov,
Dmitri,
McQuaid,
Michael
(2000):
Information Navigation by Clustering and Summarizing Query Results.
In:
HICSS 2000
,
2000,
.
https://csdl.computer.org/comp/proceedings/hicss/2000/0493/03/04933006abs.htm
McQuaid,
Michael,
Zheng,
Kai,
Melville,
Nigel,
Green,
Lee
(2009):
Usable deidentification of sensitive patient care data.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 31.
https://doi.acm.org/10.1145/1572532.1572570