2008 |
11 | EE | Tara Whalen,
Elaine G. Toms,
James Blustein:
Information displays for managing shared files.
CHIMIT 2008: 5 |
2007 |
10 | EE | Tara Whalen,
Carrie Gates:
A Psychological Profile of Defender Personality Traits.
JCP 2(2): 84-93 (2007) |
2006 |
9 | EE | Tara Whalen,
Diana K. Smetters,
Elizabeth F. Churchill:
User experiences with sharing and access control.
CHI Extended Abstracts 2006: 1517-1522 |
8 | EE | Vicki Ha,
Kori M. Inkpen,
Tara Whalen,
Regan L. Mandryk:
Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display.
Tabletop 2006: 177-184 |
7 | EE | Tara Whalen,
Carrie Gates:
Defender Personality Traits.
WISI 2006: 85-90 |
2005 |
6 | EE | Melanie Kellar,
Derek F. Reilly,
Kirstie Hawkey,
Malcolm E. Rodgers,
Bonnie MacKay,
David Dearman,
Vicki Ha,
W. Joseph MacInnes,
Michael N. Nunes,
Karen Parker,
Tara Whalen,
Kori M. Inkpen:
It's a jungle out there: practical considerations for evaluation in the city.
CHI Extended Abstracts 2005: 1533-1536 |
5 | EE | Kirstie Hawkey,
Melanie Kellar,
Derek F. Reilly,
Tara Whalen,
Kori M. Inkpen:
The proximity factor: impact of distance on co-located collaboration.
GROUP 2005: 31-40 |
4 | EE | Tara Whalen,
Kori M. Inkpen:
Gathering evidence: use of visual security cues in web browsers.
Graphics Interface 2005: 137-144 |
2004 |
3 | EE | Carrie Gates,
Tara Whalen:
Profiling the defenders.
NSPW 2004: 107-114 |
1999 |
2 | EE | Damian Bentley,
Gregory G. Rose,
Tara Whalen:
ssmail: Opportunistic Encryption in sendmail.
LISA 1999: 1-8 |
1 | EE | Tara Whalen,
James P. Black:
Adaptive Groupware for Wireless Networks.
WMCSA 1999: 20- |