The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John C. Knight: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chenxi Wang, John C. Knight, Matthew C. Elder
    On Computer Viral Infection and the Effect of Immunization. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:246-256 [Conf]
  2. John C. Knight
    Future Trends of Software Technology and Applications Model-Based Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:18- [Conf]
  3. John C. Knight
    Focusing Software Education on Engineering. [Citation Graph (0, 0)][DBLP]
    CSEE&T, 2004, pp:2-3 [Conf]
  4. John C. Knight, Jonathan Hill, Philip E. Varner, Premkumar T. Devanbu, Alexander L. Wolf, Dennis Heimbigner
    Willow System Demonstration. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:123-125 [Conf]
  5. John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan
    Towards a Rigorous Definition of Information System Survivability. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:78-89 [Conf]
  6. Jonathan C. Rowanhill, Philip E. Varner, John C. Knight
    Efficient Hierarchic Management For Reconfiguration of Networked Information Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:517-526 [Conf]
  7. Elisabeth A. Strunk, John C. Knight
    Assured Reconfiguration of Embedded Real-Time Software. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:367-376 [Conf]
  8. Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello
    Assured Reconfiguration of Fail-Stop Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:2-11 [Conf]
  9. Chenxi Wang, Jonathan Hill, John C. Knight, Jack W. Davidson
    Protection of Software-Based Survivability Mechanisms. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:193-202 [Conf]
  10. John C. Knight, P. Thomas Fletcher, Brian R. Hicks
    Tool Support for Production Use of Formal Techniques. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:1854- [Conf]
  11. John C. Knight
    Challenges in the Utilization of Formal Methods. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1998, pp:1-17 [Conf]
  12. John C. Knight
    Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction. [Citation Graph (0, 0)][DBLP]
    HASE, 2001, pp:3-4 [Conf]
  13. Andrew S. Grimshaw, Marty A. Humphrey, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill, Glenn S. Wasson, Jim Basney
    The Development of Dependable and Survivable Grids. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:729-737 [Conf]
  14. Michael F. Dunn, John C. Knight
    Software Reuse in an Industrial Setting: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICSE, 1991, pp:329-338 [Conf]
  15. Michael F. Dunn, John C. Knight
    Automating the Detection of Reusable Parts in Existing Software. [Citation Graph (0, 0)][DBLP]
    ICSE, 1993, pp:381-390 [Conf]
  16. John C. Knight
    Safety critical systems: challenges and directions. [Citation Graph (0, 0)][DBLP]
    ICSE, 2002, pp:547-550 [Conf]
  17. John C. Knight
    Dependability of embedded systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2002, pp:685-686 [Conf]
  18. John C. Knight
    Computing Systems Dependability. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:742-743 [Conf]
  19. John C. Knight
    An Introduction to Computing System Dependability. [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:730-731 [Conf]
  20. John C. Knight, Paul Ammann
    An Experimental Evaluation of Simple Methods for Seeding Program Errors. [Citation Graph (0, 0)][DBLP]
    ICSE, 1985, pp:337-342 [Conf]
  21. John C. Knight, Elisabeth A. Strunk
    Achieving Critical System Survivability Through Software Architectures. [Citation Graph (0, 0)][DBLP]
    WADS, 2003, pp:51-78 [Conf]
  22. Kevin J. Sullivan, John C. Knight
    Experience Assessing an Architectural Approach to Large-Scale Systematic Reuse. [Citation Graph (0, 0)][DBLP]
    ICSE, 1996, pp:220-229 [Conf]
  23. Kevin J. Sullivan, John C. Knight, Xing Du, Steve Geist
    Information Survivability Control Systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 1999, pp:184-192 [Conf]
  24. John C. Knight, Paul Ammann
    Issues Influencing the Use of N-Version Programming. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:217-222 [Conf]
  25. John C. Knight
    Can Software Faults be Tolerated? (Position Statement). [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:501- [Conf]
  26. William S. Greenwell, Elisabeth A. Strunk, John C. Knight
    Failure Analysis and the Safety-Case Lifecycle. [Citation Graph (0, 0)][DBLP]
    Human Error, Safety and Systems Development, 2004, pp:163-176 [Conf]
  27. John C. Knight, Matthew C. Elder
    Fault Tolerant Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2001, pp:132-137 [Conf]
  28. John C. Knight, Kimberly S. Hanks, Sean R. Travis
    Tool Support for Production Use of Formal Techniques. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2001, pp:242-253 [Conf]
  29. John C. Knight, Aaron G. Cass, Antonio M. Fernández, Kevin G. Wika
    Testing a Safety-Critical Application. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1994, pp:199- [Conf]
  30. Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lutz, John C. Knight
    Using Occurrence Properties of Defect Report Data to Improve Requirements. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:253-262 [Conf]
  31. Allison L. Powell, James C. French, John C. Knight
    A systematic approach to creating and maintaining software documentation. [Citation Graph (0, 0)][DBLP]
    SAC, 1996, pp:201-208 [Conf]
  32. John C. Knight
    Software Challenges in Aviation Systems. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2002, pp:106-112 [Conf]
  33. Kimberly S. Wasson, John C. Knight, Elisabeth A. Strunk, Sean R. Travis
    Tools Supporting the Communication of Critical Domain Knowledge in High-Consequence Systems Development. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:317-330 [Conf]
  34. John C. Knight, Jane C. Prey, William A. Wulf
    Undergraduate computer science education: a new curriculum philosophy & overview. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1994, pp:155-159 [Conf]
  35. Riccardo Scandariato, John C. Knight
    The Design and Evaluation of a Defense System for Internet Worms. [Citation Graph (0, 0)][DBLP]
    SRDS, 2004, pp:164-173 [Conf]
  36. John C. Knight, Susan S. Brilliant
    Preliminary Evaluation of a Formal Approach to User Interface Specification. [Citation Graph (0, 0)][DBLP]
    ZUM, 1997, pp:329-346 [Conf]
  37. John C. Knight, Darrell M. Kienzle
    Preliminary Experience Using Z to Specify a Safety-Critical System. [Citation Graph (0, 0)][DBLP]
    Z User Workshop, 1992, pp:109-118 [Conf]
  38. Wei Hu, Jason Hiser, Daniel Williams, Adrian Filipi, Jack W. Davidson, David Evans, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill
    Secure and practical defense against code-injection attacks using software dynamic translation. [Citation Graph (0, 0)][DBLP]
    VEE, 2006, pp:2-12 [Conf]
  39. Paul Ammann, Dahlard L. Lukes, John C. Knight
    Applying Data Redundancy to Differential Equation Solvers. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1997, v:4, n:, pp:65-77 [Journal]
  40. John C. Knight, Michael F. Dunn
    Software Quality Through Domain-Driven Certification. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1998, v:5, n:, pp:293-315 [Journal]
  41. John C. Knight
    Desert Island Books. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2002, v:9, n:3, pp:321-334 [Journal]
  42. John C. Knight, Nancy G. Leveson
    Should software engineers be licensed?. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:11, pp:87-90 [Journal]
  43. John C. Knight, Nancy G. Leveson
    Software and higher education. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:1, pp:160- [Journal]
  44. John C. Knight, E. Ann Myers
    An Improved Inspection Technique. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:11, pp:50-61 [Journal]
  45. James C. French, John C. Knight, Allison L. Powell
    Applying Hypertext Structures to Software Documentation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1997, v:33, n:2, pp:219-231 [Journal]
  46. John C. Knight, Bev Littlewood
    Guest Editors' Introduction: Critical Task of Writing Dependable Software. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1994, v:11, n:1, pp:16-20 [Journal]
  47. W. Robert Collings, Robert E. Noonan, Samuel T. Gregory, John C. Knight, Roy W. Hamm
    Comprehensive Tools for Assembler Construction. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1983, v:13, n:5, pp:447-451 [Journal]
  48. John C. Knight, Douglas D. Dunlop
    On the Design of a Special-purpose Scientific Programming Language. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1983, v:13, n:10, pp:893-907 [Journal]
  49. John C. Knight, James L. Russel
    Software Development Tools for Microcontrollers. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1985, v:15, n:5, pp:459-472 [Journal]
  50. Paul Ammann, John C. Knight
    Data Diversity: An Approach to Software Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1988, v:37, n:4, pp:418-425 [Journal]
  51. Elisabeth A. Strunk, John C. Knight
    Dependability through Assured Reconfiguration in Embedded System Software. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:3, pp:172-187 [Journal]
  52. Paul Ammann, Susan S. Brilliant, John C. Knight
    The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:2, pp:142-148 [Journal]
  53. Thomas Anderson, John C. Knight
    A Framework for Software Fault Tolerance in Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1983, v:9, n:3, pp:355-364 [Journal]
  54. Susan S. Brilliant, John C. Knight, Nancy G. Leveson
    The Consistent Comparison Problem in N-Version Software. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:11, pp:1481-1485 [Journal]
  55. Susan S. Brilliant, John C. Knight, Nancy G. Leveson
    Analysis of Faults in an N-Version Software Experiment. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:2, pp:238-247 [Journal]
  56. Dave E. Eckhardt, Alper K. Caglayan, John C. Knight, Larry D. Lee, David F. McAllister, Mladen A. Vouk, John P. J. Kelly
    An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:7, pp:692-702 [Journal]
  57. John C. Knight, Nancy G. Leveson
    An Experimental Evaluation of the Assumption of Independence in Multiversion Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1986, v:12, n:1, pp:96-109 [Journal]
  58. John C. Knight, John I. A. Urquhart
    On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:5, pp:553-563 [Journal]
  59. John C. Knight
    Editorial: AE Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:1, pp:1-2 [Journal]
  60. John C. Knight
    Editorial: The State of TSE. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:2, pp:81-0 [Journal]
  61. John C. Knight
    Editorial: AE Farewell. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:5, pp:281-0 [Journal]
  62. John C. Knight
    Editorial: AE Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:8, pp:489-490 [Journal]
  63. John C. Knight
    AE Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:3, pp:209- [Journal]
  64. John C. Knight
    Editorial: New AE Introduction/Farewell. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:12, pp:1105- [Journal]
  65. John C. Knight
    Editorial: AE Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2003, v:29, n:4, pp:289- [Journal]
  66. John C. Knight
    AE Farewell. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2003, v:29, n:8, pp:673- [Journal]
  67. John C. Knight
    New AEIC Introduction and AE Farewell. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2003, v:29, n:11, pp:961- [Journal]
  68. Nancy G. Leveson, Stephen S. Cha, John C. Knight, Timothy J. Shimeall
    The Use of Self Checks and Voting in Software Error Detection: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:4, pp:432-443 [Journal]
  69. Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk
    Assurance Based Development of Critical Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:347-357 [Conf]
  70. Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey
    Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. [Citation Graph (0, 0)][DBLP]
    HPCC, 2007, pp:260-272 [Conf]
  71. Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk
    Achieving Dependable Systems by Synergistic Development of Architectures and Assurance Cases. [Citation Graph (0, 0)][DBLP]
    WADS, 2006, pp:362-382 [Conf]

  72. Practical Limits on Software Dependability: A Case Study. [Citation Graph (, )][DBLP]


  73. Security through redundant data diversity. [Citation Graph (, )][DBLP]


  74. Exploiting refactoring in formal verification. [Citation Graph (, )][DBLP]


  75. Software Process Synthesis in Assurance Based Development of Dependable Systems. [Citation Graph (, )][DBLP]


  76. Meeting virtual organization performance goals through adaptive grid reconfiguration. [Citation Graph (, )][DBLP]


  77. Formal Verification by Reverse Synthesis. [Citation Graph (, )][DBLP]


  78. On the effectiveness of the metamorphic shield. [Citation Graph (, )][DBLP]


Search in 0.942secs, Finished in 0.946secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002