Search the dblp DataBase
John P. McDermott :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John P. McDermott R1: A Rule-Based Configurer of Computer Systems. [Citation Graph (8, 0)][DBLP ] Artif. Intell., 1982, v:19, n:1, pp:39-88 [Journal ] Mark S. Fox , John P. McDermott The Role of Databases in Knowledge-Based Systems. [Citation Graph (2, 0)][DBLP ] On Knowledge Base Management Systems (Islamorada), 1985, pp:407-430 [Conf ] Sandra Marcus , John P. McDermott SALT: A Knowledge Acquisition Language for Propose-and-Revise Systems. [Citation Graph (2, 0)][DBLP ] Artif. Intell., 1989, v:39, n:1, pp:1-37 [Journal ] Sandra Marcus , Jeffrey Stout , John P. McDermott VT: An Expert Elevator Designer That Uses Knowledge-Based Backtracking. [Citation Graph (2, 0)][DBLP ] AI Magazine, 1988, v:9, n:1, pp:95-112 [Journal ] Larry J. Eshelman , Damien Ehret , John P. McDermott , Ming Tan MOLE: A Tenacious Knowledge-Acquisition Tool. [Citation Graph (2, 0)][DBLP ] International Journal of Man-Machine Studies, 1987, v:26, n:1, pp:41-54 [Journal ] Georg Klinker , Joel Bentolila , Serge Genetet , Michael Grimes , John P. McDermott KNACK - Report-Driven Knowledge Acquisition. [Citation Graph (2, 0)][DBLP ] International Journal of Man-Machine Studies, 1987, v:26, n:1, pp:65-79 [Journal ] John P. McDermott , David M. Goldschlag Storage Jamming. [Citation Graph (1, 0)][DBLP ] DBSec, 1995, pp:365-381 [Conf ] John P. McDermott , Sushil Jajodia Orange Locking: Channel-Free Database Concurrency Control Via Locking. [Citation Graph (1, 0)][DBLP ] DBSec, 1992, pp:267-284 [Conf ] John P. McDermott , Ravi Mukkamala Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:215-234 [Conf ] Charles Forgy , John P. McDermott OPS, A Domain-Independent Production System Language. [Citation Graph (1, 0)][DBLP ] IJCAI, 1977, pp:933-939 [Conf ] Gary S. Kahn , Steve Nowlan , John P. McDermott MORE: An Intelligent Knowledge Acquisition Tool. [Citation Graph (1, 0)][DBLP ] IJCAI, 1985, pp:581-584 [Conf ] Sandra Marcus , John P. McDermott , Tianran Wang Knowledge Acquisition for Constructive Systems. [Citation Graph (1, 0)][DBLP ] IJCAI, 1985, pp:637-639 [Conf ] John P. McDermott Extracting Knowledge From Expert Systems. [Citation Graph (1, 0)][DBLP ] IJCAI, 1983, pp:100-107 [Conf ] John P. McDermott Nils J. Nilsson, Principles of Artificial lntelligence. [Citation Graph (1, 0)][DBLP ] Artif. Intell., 1980, v:15, n:1-2, pp:127-131 [Journal ] John P. McDermott , Judith Bachant R1 Revisited: Four Years in the Trenches. [Citation Graph (1, 0)][DBLP ] AI Magazine, 1984, v:5, n:3, pp:21-32 [Journal ] Frederick Hayes-Roth , John P. McDermott An Interference Matching Technique for Inducing Abstractions. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1978, v:21, n:5, pp:401-410 [Journal ] Tom M. Mitchell , Rich Caruana , Dayne Freitag , John P. McDermott , David Zabowski Experience with a Learning Personal Assistant. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1994, v:37, n:7, pp:80-91 [Journal ] Janice S. Aikins , Frederick Hayes-Roth , John P. McDermott , Herbert Schorr , Reid G. Smith Panel: Directions for Expert Systems. [Citation Graph (0, 0)][DBLP ] AAAI, 1986, pp:1150- [Conf ] C. Lisa Dent , Jesus Boticario , John P. McDermott , Tom M. Mitchell , David Zabowski A Personal Learning Apprentice. [Citation Graph (0, 0)][DBLP ] AAAI, 1992, pp:96-103 [Conf ] Larry J. Eshelman , John P. McDermott MOLE: A Knowledge Acquisition Tool that Uses its Head. [Citation Graph (0, 0)][DBLP ] AAAI, 1986, pp:950-955 [Conf ] Jin Kim , John P. McDermott TALIB: An IC Layout Design Assistant. [Citation Graph (0, 0)][DBLP ] AAAI, 1983, pp:197-201 [Conf ] Georg Klinker , Casey Boyd , Serge Genetet , John P. McDermott A KNACK for Knowledge Acquisition. [Citation Graph (0, 0)][DBLP ] AAAI, 1987, pp:488-493 [Conf ] John P. McDermott RI: an Expert in the Computer Systems Domain. [Citation Graph (0, 0)][DBLP ] AAAI, 1980, pp:269-271 [Conf ] John P. McDermott Developing Software is like Talking to Eskimos about Snow. [Citation Graph (0, 0)][DBLP ] AAAI, 1990, pp:1130-1133 [Conf ] Robert Neches , Richard Fikes , Casimir A. Kulikowski , John P. McDermott , Ramesh S. Patil Panel: Knowledge Representation Meets Knowledge Acquisition: What Are the Needs and Where Is the Leverage? [Citation Graph (0, 0)][DBLP ] AAAI, 1986, pp:1153- [Conf ] John P. McDermott Abuse-Case-Based Assurance Arguments. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:366-376 [Conf ] John P. McDermott , Chris Fox Using Abuse Case Models for Security Requirements Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:55-0 [Conf ] John P. McDermott , R. Gelinas , S. Ornstein Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:265-0 [Conf ] A. van de Brug , Judith Bachant , John P. McDermott Doing R1 with Style. [Citation Graph (0, 0)][DBLP ] CAIA, 1985, pp:244-249 [Conf ] John P. McDermott Where Knowledge Acquisition Tools Fit in the Scheme of Things. [Citation Graph (0, 0)][DBLP ] CAIA, 1985, pp:222- [Conf ] Geoffroy Dallemagne , Georg Klinker , David Marques , John P. McDermott , David Tung Making Application Programming More Worthwile. [Citation Graph (0, 0)][DBLP ] Contemporary Knowledge Engineering and Cognition, 1991, pp:6-22 [Conf ] Barbara Katzenberg , John P. McDermott Meaning-Making in the Creation of Useful Summary Reports. [Citation Graph (0, 0)][DBLP ] CSCW, 1994, pp:199-206 [Conf ] Barbara Katzenberg , Fred Pickard , John P. McDermott Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care. [Citation Graph (0, 0)][DBLP ] CSCW, 1996, pp:364-369 [Conf ] Oliver Costich , John McLean , John P. McDermott Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:60-65 [Conf ] John P. McDermott , David M. Goldschlag Towards a model of storage jamming. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:176-0 [Conf ] John P. McDermott The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:111-122 [Conf ] John P. McDermott Replication Does Survive Information Warfare Attacks. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:219-228 [Conf ] Gregg Yost , Georg Klinker , Marc Linster , David Marques , John P. McDermott The SBF Framework, 1989-1994: From Applications to Workplaces. [Citation Graph (0, 0)][DBLP ] EKAW, 1994, pp:318-339 [Conf ] John P. McDermott Making Expert Systems Explicit (Invited Paper). [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1986, pp:539-544 [Conf ] Frederick Hayes-Roth , John P. McDermott Knowledge Acquisition from Structural Descriptions. [Citation Graph (0, 0)][DBLP ] IJCAI, 1977, pp:356-362 [Conf ] Douglas B. Lenat , John P. McDermott Less Than General Production System Architectures. [Citation Graph (0, 0)][DBLP ] IJCAI, 1977, pp:928-932 [Conf ] Shoichi Masui , John P. McDermott , Alan Sobel Decision-Making in Time-Critical Situations. [Citation Graph (0, 0)][DBLP ] IJCAI, 1983, pp:233-235 [Conf ] John P. McDermott , Barbara Steele Extending a Knowledge-Based System to Deal with Ad Hoc Constraints. [Citation Graph (0, 0)][DBLP ] IJCAI, 1981, pp:824-828 [Conf ] Michael D. Rychener , Charles Forgy , Pat Langley , John P. McDermott , Allen Newell , K. Ramakrishna Problems in Building an Instructable Production System. [Citation Graph (0, 0)][DBLP ] IJCAI, 1977, pp:337- [Conf ] John P. McDermott Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. [Citation Graph (0, 0)][DBLP ] Workshop on New Security Paradigms, 1998, pp:48-51 [Conf ] John P. McDermott R1 ("XCON") at Age 12: Lessons from an Elementary School Achiever. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1993, v:59, n:1-2, pp:241-247 [Journal ] John P. McDermott R1: The Formative Years. [Citation Graph (0, 0)][DBLP ] AI Magazine, 1980, v:2, n:2, pp:21-29 [Journal ] Drew V. McDermott , M. Mitchell Waldrop , B. Chandrasekaran , John P. McDermott , Roger C. Schank The Dark Ages of AI: A Panel Discussion at AAAI-84. [Citation Graph (0, 0)][DBLP ] AI Magazine, 1985, v:6, n:3, pp:122-134 [Journal ] Carl E. Landwehr , Alan R. Bull , John P. McDermott , William S. Choi A Taxonomy of Computer Program Security Flaws. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1994, v:26, n:3, pp:211-254 [Journal ] John P. McDermott The Knowledge Engineering Process. [Citation Graph (0, 0)][DBLP ] IEEE Database Eng. Bull., 1983, v:6, n:4, pp:30-37 [Journal ] David Marques , Geoffroy Dallemagne , Georg Klinker , John P. McDermott , David Tung Easy Programming: Empowering People to Build Their Own Applications. [Citation Graph (0, 0)][DBLP ] IEEE Expert, 1992, v:7, n:3, pp:16-29 [Journal ] Georg Klinker , Serge Genetet , John P. McDermott Knowledge Acquisition for Evaluation Systems. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 1988, v:29, n:6, pp:715-731 [Journal ] Georg Klinker , Marc Linster , David Marques , John P. McDermott , Gregg Yost Exploiting problem descriptions to provide assistance with the Sisyphus task. [Citation Graph (0, 0)][DBLP ] Int. J. Hum.-Comput. Stud., 1994, v:40, n:2, pp:293-314 [Journal ] Jeffrey Stout , Gilbert Caplain , Sandra Marcus , John P. McDermott Toward Automating Recognition of Differing Problem-Solving Demands. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 1988, v:29, n:5, pp:599-611 [Journal ] John P. McDermott , Ravi Mukkamala A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:189-228 [Journal ] John P. McDermott The World Would Be a Better Place if Non-Programmers Could Program. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1989, v:4, n:, pp:337-338 [Journal ] Fine-Grained Inspection for Higher-Assurance Software Security in Open Source. [Citation Graph (, )][DBLP ] Search in 0.064secs, Finished in 0.067secs