Author: James Blustein

Publications

Publication period start: 2008
Number of co-authors: 8

Co-authors

Number of publications with favourite co-authors
Angelo Di Iorio
1
Tara Whalen
2
Elaine G. Toms
2

Productive Colleagues

Most productive colleagues in number of publications
Elaine G. Toms
17
Keith Instone
19
Fabio Vitali
21

Publications

Blustein, James (2000): Automatically Generated Hypertext Versions of Scholarly Articles and their Evaluation. In: Hypertext 00 - Proceedings of the Eleventh ACM Conference on Hypertext and Hypermedia May 30 - June 03, 2000, San Antonio, Texas, USA. pp. 201-210. https://www.acm.org/pubs/articles/proceedings/hypertext/336296/p201-blustein/p201-blustein.pdf

Blustein, James, Ahmed, Ishtiaq, Instone, Keith (2005): An evaluation of look-ahead breadcrumbs for the WWW. In: Proceedings of the Sixteenth ACM Conference on Hypertext , 2005, . pp. 202-204. https://doi.acm.org/10.1145/1083356.1083394

Blustein, James, Fu, Ching-Lung, Silver, Daniel L. (2005): Information visualization for an intrusion detection system. In: Proceedings of the Sixteenth ACM Conference on Hypertext , 2005, . pp. 278-279. https://doi.acm.org/10.1145/1083356.1083419

Whalen, Tara, Toms, Elaine G., Blustein, James (2008): Information displays for managing shared files. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D., Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. pp. 5. https://doi.acm.org/10.1145/1477973.1477980

Vitali, Fabio, Iorio, Angelo Di, Blustein, James (2009): New forms of Xanalogical storage and function. In: Proceedings of the 20th ACM Conference on Hypertext and Hypermedia , 2009, . pp. 389-390. https://doi.acm.org/10.1145/1557914.1558004

Whalen, Tara, Toms, Elaine G., Blustein, James (2008): Information displays for managing shared files. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology , 2008, . pp. 5. https://dx.doi.org/10.1145/1477973.1477980