The SCEAS System
Navigation Menu

Search the dblp DataBase


John P. McDermott: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John P. McDermott
    R1: A Rule-Based Configurer of Computer Systems. [Citation Graph (8, 0)][DBLP]
    Artif. Intell., 1982, v:19, n:1, pp:39-88 [Journal]
  2. Mark S. Fox, John P. McDermott
    The Role of Databases in Knowledge-Based Systems. [Citation Graph (2, 0)][DBLP]
    On Knowledge Base Management Systems (Islamorada), 1985, pp:407-430 [Conf]
  3. Sandra Marcus, John P. McDermott
    SALT: A Knowledge Acquisition Language for Propose-and-Revise Systems. [Citation Graph (2, 0)][DBLP]
    Artif. Intell., 1989, v:39, n:1, pp:1-37 [Journal]
  4. Sandra Marcus, Jeffrey Stout, John P. McDermott
    VT: An Expert Elevator Designer That Uses Knowledge-Based Backtracking. [Citation Graph (2, 0)][DBLP]
    AI Magazine, 1988, v:9, n:1, pp:95-112 [Journal]
  5. Larry J. Eshelman, Damien Ehret, John P. McDermott, Ming Tan
    MOLE: A Tenacious Knowledge-Acquisition Tool. [Citation Graph (2, 0)][DBLP]
    International Journal of Man-Machine Studies, 1987, v:26, n:1, pp:41-54 [Journal]
  6. Georg Klinker, Joel Bentolila, Serge Genetet, Michael Grimes, John P. McDermott
    KNACK - Report-Driven Knowledge Acquisition. [Citation Graph (2, 0)][DBLP]
    International Journal of Man-Machine Studies, 1987, v:26, n:1, pp:65-79 [Journal]
  7. John P. McDermott, David M. Goldschlag
    Storage Jamming. [Citation Graph (1, 0)][DBLP]
    DBSec, 1995, pp:365-381 [Conf]
  8. John P. McDermott, Sushil Jajodia
    Orange Locking: Channel-Free Database Concurrency Control Via Locking. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:267-284 [Conf]
  9. John P. McDermott, Ravi Mukkamala
    Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:215-234 [Conf]
  10. Charles Forgy, John P. McDermott
    OPS, A Domain-Independent Production System Language. [Citation Graph (1, 0)][DBLP]
    IJCAI, 1977, pp:933-939 [Conf]
  11. Gary S. Kahn, Steve Nowlan, John P. McDermott
    MORE: An Intelligent Knowledge Acquisition Tool. [Citation Graph (1, 0)][DBLP]
    IJCAI, 1985, pp:581-584 [Conf]
  12. Sandra Marcus, John P. McDermott, Tianran Wang
    Knowledge Acquisition for Constructive Systems. [Citation Graph (1, 0)][DBLP]
    IJCAI, 1985, pp:637-639 [Conf]
  13. John P. McDermott
    Extracting Knowledge From Expert Systems. [Citation Graph (1, 0)][DBLP]
    IJCAI, 1983, pp:100-107 [Conf]
  14. John P. McDermott
    Nils J. Nilsson, Principles of Artificial lntelligence. [Citation Graph (1, 0)][DBLP]
    Artif. Intell., 1980, v:15, n:1-2, pp:127-131 [Journal]
  15. John P. McDermott, Judith Bachant
    R1 Revisited: Four Years in the Trenches. [Citation Graph (1, 0)][DBLP]
    AI Magazine, 1984, v:5, n:3, pp:21-32 [Journal]
  16. Frederick Hayes-Roth, John P. McDermott
    An Interference Matching Technique for Inducing Abstractions. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:5, pp:401-410 [Journal]
  17. Tom M. Mitchell, Rich Caruana, Dayne Freitag, John P. McDermott, David Zabowski
    Experience with a Learning Personal Assistant. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:7, pp:80-91 [Journal]
  18. Janice S. Aikins, Frederick Hayes-Roth, John P. McDermott, Herbert Schorr, Reid G. Smith
    Panel: Directions for Expert Systems. [Citation Graph (0, 0)][DBLP]
    AAAI, 1986, pp:1150- [Conf]
  19. C. Lisa Dent, Jesus Boticario, John P. McDermott, Tom M. Mitchell, David Zabowski
    A Personal Learning Apprentice. [Citation Graph (0, 0)][DBLP]
    AAAI, 1992, pp:96-103 [Conf]
  20. Larry J. Eshelman, John P. McDermott
    MOLE: A Knowledge Acquisition Tool that Uses its Head. [Citation Graph (0, 0)][DBLP]
    AAAI, 1986, pp:950-955 [Conf]
  21. Jin Kim, John P. McDermott
    TALIB: An IC Layout Design Assistant. [Citation Graph (0, 0)][DBLP]
    AAAI, 1983, pp:197-201 [Conf]
  22. Georg Klinker, Casey Boyd, Serge Genetet, John P. McDermott
    A KNACK for Knowledge Acquisition. [Citation Graph (0, 0)][DBLP]
    AAAI, 1987, pp:488-493 [Conf]
  23. John P. McDermott
    RI: an Expert in the Computer Systems Domain. [Citation Graph (0, 0)][DBLP]
    AAAI, 1980, pp:269-271 [Conf]
  24. John P. McDermott
    Developing Software is like Talking to Eskimos about Snow. [Citation Graph (0, 0)][DBLP]
    AAAI, 1990, pp:1130-1133 [Conf]
  25. Robert Neches, Richard Fikes, Casimir A. Kulikowski, John P. McDermott, Ramesh S. Patil
    Panel: Knowledge Representation Meets Knowledge Acquisition: What Are the Needs and Where Is the Leverage? [Citation Graph (0, 0)][DBLP]
    AAAI, 1986, pp:1153- [Conf]
  26. John P. McDermott
    Abuse-Case-Based Assurance Arguments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:366-376 [Conf]
  27. John P. McDermott, Chris Fox
    Using Abuse Case Models for Security Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:55-0 [Conf]
  28. John P. McDermott, R. Gelinas, S. Ornstein
    Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:265-0 [Conf]
  29. A. van de Brug, Judith Bachant, John P. McDermott
    Doing R1 with Style. [Citation Graph (0, 0)][DBLP]
    CAIA, 1985, pp:244-249 [Conf]
  30. John P. McDermott
    Where Knowledge Acquisition Tools Fit in the Scheme of Things. [Citation Graph (0, 0)][DBLP]
    CAIA, 1985, pp:222- [Conf]
  31. Geoffroy Dallemagne, Georg Klinker, David Marques, John P. McDermott, David Tung
    Making Application Programming More Worthwile. [Citation Graph (0, 0)][DBLP]
    Contemporary Knowledge Engineering and Cognition, 1991, pp:6-22 [Conf]
  32. Barbara Katzenberg, John P. McDermott
    Meaning-Making in the Creation of Useful Summary Reports. [Citation Graph (0, 0)][DBLP]
    CSCW, 1994, pp:199-206 [Conf]
  33. Barbara Katzenberg, Fred Pickard, John P. McDermott
    Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care. [Citation Graph (0, 0)][DBLP]
    CSCW, 1996, pp:364-369 [Conf]
  34. Oliver Costich, John McLean, John P. McDermott
    Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:60-65 [Conf]
  35. John P. McDermott, David M. Goldschlag
    Towards a model of storage jamming. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:176-0 [Conf]
  36. John P. McDermott
    The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:111-122 [Conf]
  37. John P. McDermott
    Replication Does Survive Information Warfare Attacks. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:219-228 [Conf]
  38. Gregg Yost, Georg Klinker, Marc Linster, David Marques, John P. McDermott
    The SBF Framework, 1989-1994: From Applications to Workplaces. [Citation Graph (0, 0)][DBLP]
    EKAW, 1994, pp:318-339 [Conf]
  39. John P. McDermott
    Making Expert Systems Explicit (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1986, pp:539-544 [Conf]
  40. Frederick Hayes-Roth, John P. McDermott
    Knowledge Acquisition from Structural Descriptions. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1977, pp:356-362 [Conf]
  41. Douglas B. Lenat, John P. McDermott
    Less Than General Production System Architectures. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1977, pp:928-932 [Conf]
  42. Shoichi Masui, John P. McDermott, Alan Sobel
    Decision-Making in Time-Critical Situations. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1983, pp:233-235 [Conf]
  43. John P. McDermott, Barbara Steele
    Extending a Knowledge-Based System to Deal with Ad Hoc Constraints. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1981, pp:824-828 [Conf]
  44. Michael D. Rychener, Charles Forgy, Pat Langley, John P. McDermott, Allen Newell, K. Ramakrishna
    Problems in Building an Instructable Production System. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1977, pp:337- [Conf]
  45. John P. McDermott
    Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:48-51 [Conf]
  46. John P. McDermott
    R1 ("XCON") at Age 12: Lessons from an Elementary School Achiever. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1993, v:59, n:1-2, pp:241-247 [Journal]
  47. John P. McDermott
    R1: The Formative Years. [Citation Graph (0, 0)][DBLP]
    AI Magazine, 1980, v:2, n:2, pp:21-29 [Journal]
  48. Drew V. McDermott, M. Mitchell Waldrop, B. Chandrasekaran, John P. McDermott, Roger C. Schank
    The Dark Ages of AI: A Panel Discussion at AAAI-84. [Citation Graph (0, 0)][DBLP]
    AI Magazine, 1985, v:6, n:3, pp:122-134 [Journal]
  49. Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi
    A Taxonomy of Computer Program Security Flaws. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1994, v:26, n:3, pp:211-254 [Journal]
  50. John P. McDermott
    The Knowledge Engineering Process. [Citation Graph (0, 0)][DBLP]
    IEEE Database Eng. Bull., 1983, v:6, n:4, pp:30-37 [Journal]
  51. David Marques, Geoffroy Dallemagne, Georg Klinker, John P. McDermott, David Tung
    Easy Programming: Empowering People to Build Their Own Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Expert, 1992, v:7, n:3, pp:16-29 [Journal]
  52. Georg Klinker, Serge Genetet, John P. McDermott
    Knowledge Acquisition for Evaluation Systems. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 1988, v:29, n:6, pp:715-731 [Journal]
  53. Georg Klinker, Marc Linster, David Marques, John P. McDermott, Gregg Yost
    Exploiting problem descriptions to provide assistance with the Sisyphus task. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 1994, v:40, n:2, pp:293-314 [Journal]
  54. Jeffrey Stout, Gilbert Caplain, Sandra Marcus, John P. McDermott
    Toward Automating Recognition of Differing Problem-Solving Demands. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 1988, v:29, n:5, pp:599-611 [Journal]
  55. John P. McDermott, Ravi Mukkamala
    A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:189-228 [Journal]
  56. John P. McDermott
    The World Would Be a Better Place if Non-Programmers Could Program. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1989, v:4, n:, pp:337-338 [Journal]

  57. Fine-Grained Inspection for Higher-Assurance Software Security in Open Source. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.009secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002