Search the dblp DataBase
John C. Knight :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chenxi Wang , John C. Knight , Matthew C. Elder On Computer Viral Infection and the Effect of Immunization. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:246-256 [Conf ] John C. Knight Future Trends of Software Technology and Applications Model-Based Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2006, pp:18- [Conf ] John C. Knight Focusing Software Education on Engineering. [Citation Graph (0, 0)][DBLP ] CSEE&T, 2004, pp:2-3 [Conf ] John C. Knight , Jonathan Hill , Philip E. Varner , Premkumar T. Devanbu , Alexander L. Wolf , Dennis Heimbigner Willow System Demonstration. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:123-125 [Conf ] John C. Knight , Elisabeth A. Strunk , Kevin J. Sullivan Towards a Rigorous Definition of Information System Survivability. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:78-89 [Conf ] Jonathan C. Rowanhill , Philip E. Varner , John C. Knight Efficient Hierarchic Management For Reconfiguration of Networked Information Systems. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:517-526 [Conf ] Elisabeth A. Strunk , John C. Knight Assured Reconfiguration of Embedded Real-Time Software. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:367-376 [Conf ] Elisabeth A. Strunk , John C. Knight , M. Anthony Aiello Assured Reconfiguration of Fail-Stop Systems. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:2-11 [Conf ] Chenxi Wang , Jonathan Hill , John C. Knight , Jack W. Davidson Protection of Software-Based Survivability Mechanisms. [Citation Graph (0, 0)][DBLP ] DSN, 2001, pp:193-202 [Conf ] John C. Knight , P. Thomas Fletcher , Brian R. Hicks Tool Support for Production Use of Formal Techniques. [Citation Graph (0, 0)][DBLP ] World Congress on Formal Methods, 1999, pp:1854- [Conf ] John C. Knight Challenges in the Utilization of Formal Methods. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1998, pp:1-17 [Conf ] John C. Knight Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction. [Citation Graph (0, 0)][DBLP ] HASE, 2001, pp:3-4 [Conf ] Andrew S. Grimshaw , Marty A. Humphrey , John C. Knight , Anh Nguyen-Tuong , Jonathan C. Rowanhill , Glenn S. Wasson , Jim Basney The Development of Dependable and Survivable Grids. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2005, pp:729-737 [Conf ] Michael F. Dunn , John C. Knight Software Reuse in an Industrial Setting: A Case Study. [Citation Graph (0, 0)][DBLP ] ICSE, 1991, pp:329-338 [Conf ] Michael F. Dunn , John C. Knight Automating the Detection of Reusable Parts in Existing Software. [Citation Graph (0, 0)][DBLP ] ICSE, 1993, pp:381-390 [Conf ] John C. Knight Safety critical systems: challenges and directions. [Citation Graph (0, 0)][DBLP ] ICSE, 2002, pp:547-550 [Conf ] John C. Knight Dependability of embedded systems. [Citation Graph (0, 0)][DBLP ] ICSE, 2002, pp:685-686 [Conf ] John C. Knight Computing Systems Dependability. [Citation Graph (0, 0)][DBLP ] ICSE, 2003, pp:742-743 [Conf ] John C. Knight An Introduction to Computing System Dependability. [Citation Graph (0, 0)][DBLP ] ICSE, 2004, pp:730-731 [Conf ] John C. Knight , Paul Ammann An Experimental Evaluation of Simple Methods for Seeding Program Errors. [Citation Graph (0, 0)][DBLP ] ICSE, 1985, pp:337-342 [Conf ] John C. Knight , Elisabeth A. Strunk Achieving Critical System Survivability Through Software Architectures. [Citation Graph (0, 0)][DBLP ] WADS, 2003, pp:51-78 [Conf ] Kevin J. Sullivan , John C. Knight Experience Assessing an Architectural Approach to Large-Scale Systematic Reuse. [Citation Graph (0, 0)][DBLP ] ICSE, 1996, pp:220-229 [Conf ] Kevin J. Sullivan , John C. Knight , Xing Du , Steve Geist Information Survivability Control Systems. [Citation Graph (0, 0)][DBLP ] ICSE, 1999, pp:184-192 [Conf ] John C. Knight , Paul Ammann Issues Influencing the Use of N-Version Programming. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1989, pp:217-222 [Conf ] John C. Knight Can Software Faults be Tolerated? (Position Statement). [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1989, pp:501- [Conf ] William S. Greenwell , Elisabeth A. Strunk , John C. Knight Failure Analysis and the Safety-Case Lifecycle. [Citation Graph (0, 0)][DBLP ] Human Error, Safety and Systems Development, 2004, pp:163-176 [Conf ] John C. Knight , Matthew C. Elder Fault Tolerant Distributed Information Systems. [Citation Graph (0, 0)][DBLP ] ISSRE, 2001, pp:132-137 [Conf ] John C. Knight , Kimberly S. Hanks , Sean R. Travis Tool Support for Production Use of Formal Techniques. [Citation Graph (0, 0)][DBLP ] ISSRE, 2001, pp:242-253 [Conf ] John C. Knight , Aaron G. Cass , Antonio M. Fernández , Kevin G. Wika Testing a Safety-Critical Application. [Citation Graph (0, 0)][DBLP ] ISSTA, 1994, pp:199- [Conf ] Kimberly S. Wasson , Kendra N. Schmid , Robyn R. Lutz , John C. Knight Using Occurrence Properties of Defect Report Data to Improve Requirements. [Citation Graph (0, 0)][DBLP ] RE, 2005, pp:253-262 [Conf ] Allison L. Powell , James C. French , John C. Knight A systematic approach to creating and maintaining software documentation. [Citation Graph (0, 0)][DBLP ] SAC, 1996, pp:201-208 [Conf ] John C. Knight Software Challenges in Aviation Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2002, pp:106-112 [Conf ] Kimberly S. Wasson , John C. Knight , Elisabeth A. Strunk , Sean R. Travis Tools Supporting the Communication of Critical Domain Knowledge in High-Consequence Systems Development. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2003, pp:317-330 [Conf ] John C. Knight , Jane C. Prey , William A. Wulf Undergraduate computer science education: a new curriculum philosophy & overview. [Citation Graph (0, 0)][DBLP ] SIGCSE, 1994, pp:155-159 [Conf ] Riccardo Scandariato , John C. Knight The Design and Evaluation of a Defense System for Internet Worms. [Citation Graph (0, 0)][DBLP ] SRDS, 2004, pp:164-173 [Conf ] John C. Knight , Susan S. Brilliant Preliminary Evaluation of a Formal Approach to User Interface Specification. [Citation Graph (0, 0)][DBLP ] ZUM, 1997, pp:329-346 [Conf ] John C. Knight , Darrell M. Kienzle Preliminary Experience Using Z to Specify a Safety-Critical System. [Citation Graph (0, 0)][DBLP ] Z User Workshop, 1992, pp:109-118 [Conf ] Wei Hu , Jason Hiser , Daniel Williams , Adrian Filipi , Jack W. Davidson , David Evans , John C. Knight , Anh Nguyen-Tuong , Jonathan C. Rowanhill Secure and practical defense against code-injection attacks using software dynamic translation. [Citation Graph (0, 0)][DBLP ] VEE, 2006, pp:2-12 [Conf ] Paul Ammann , Dahlard L. Lukes , John C. Knight Applying Data Redundancy to Differential Equation Solvers. [Citation Graph (0, 0)][DBLP ] Ann. Software Eng., 1997, v:4, n:, pp:65-77 [Journal ] John C. Knight , Michael F. Dunn Software Quality Through Domain-Driven Certification. [Citation Graph (0, 0)][DBLP ] Ann. Software Eng., 1998, v:5, n:, pp:293-315 [Journal ] John C. Knight Desert Island Books. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2002, v:9, n:3, pp:321-334 [Journal ] John C. Knight , Nancy G. Leveson Should software engineers be licensed?. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:11, pp:87-90 [Journal ] John C. Knight , Nancy G. Leveson Software and higher education. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:1, pp:160- [Journal ] John C. Knight , E. Ann Myers An Improved Inspection Technique. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:11, pp:50-61 [Journal ] James C. French , John C. Knight , Allison L. Powell Applying Hypertext Structures to Software Documentation. [Citation Graph (0, 0)][DBLP ] Inf. Process. Manage., 1997, v:33, n:2, pp:219-231 [Journal ] John C. Knight , Bev Littlewood Guest Editors' Introduction: Critical Task of Writing Dependable Software. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1994, v:11, n:1, pp:16-20 [Journal ] W. Robert Collings , Robert E. Noonan , Samuel T. Gregory , John C. Knight , Roy W. Hamm Comprehensive Tools for Assembler Construction. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1983, v:13, n:5, pp:447-451 [Journal ] John C. Knight , Douglas D. Dunlop On the Design of a Special-purpose Scientific Programming Language. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1983, v:13, n:10, pp:893-907 [Journal ] John C. Knight , James L. Russel Software Development Tools for Microcontrollers. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1985, v:15, n:5, pp:459-472 [Journal ] Paul Ammann , John C. Knight Data Diversity: An Approach to Software Fault Tolerance. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1988, v:37, n:4, pp:418-425 [Journal ] Elisabeth A. Strunk , John C. Knight Dependability through Assured Reconfiguration in Embedded System Software. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:3, pp:172-187 [Journal ] Paul Ammann , Susan S. Brilliant , John C. Knight The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:2, pp:142-148 [Journal ] Thomas Anderson , John C. Knight A Framework for Software Fault Tolerance in Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1983, v:9, n:3, pp:355-364 [Journal ] Susan S. Brilliant , John C. Knight , Nancy G. Leveson The Consistent Comparison Problem in N-Version Software. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:11, pp:1481-1485 [Journal ] Susan S. Brilliant , John C. Knight , Nancy G. Leveson Analysis of Faults in an N-Version Software Experiment. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:2, pp:238-247 [Journal ] Dave E. Eckhardt , Alper K. Caglayan , John C. Knight , Larry D. Lee , David F. McAllister , Mladen A. Vouk , John P. J. Kelly An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:7, pp:692-702 [Journal ] John C. Knight , Nancy G. Leveson An Experimental Evaluation of the Assumption of Independence in Multiversion Programming. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:1, pp:96-109 [Journal ] John C. Knight , John I. A. Urquhart On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:5, pp:553-563 [Journal ] John C. Knight Editorial: AE Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2004, v:30, n:1, pp:1-2 [Journal ] John C. Knight Editorial: The State of TSE. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2004, v:30, n:2, pp:81-0 [Journal ] John C. Knight Editorial: AE Farewell. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2004, v:30, n:5, pp:281-0 [Journal ] John C. Knight Editorial: AE Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2004, v:30, n:8, pp:489-490 [Journal ] John C. Knight AE Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2002, v:28, n:3, pp:209- [Journal ] John C. Knight Editorial: New AE Introduction/Farewell. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2002, v:28, n:12, pp:1105- [Journal ] John C. Knight Editorial: AE Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2003, v:29, n:4, pp:289- [Journal ] John C. Knight AE Farewell. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2003, v:29, n:8, pp:673- [Journal ] John C. Knight New AEIC Introduction and AE Farewell. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2003, v:29, n:11, pp:961- [Journal ] Nancy G. Leveson , Stephen S. Cha , John C. Knight , Timothy J. Shimeall The Use of Self Checks and Voting in Software Error Detection: An Empirical Study. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:4, pp:432-443 [Journal ] Patrick J. Graydon , John C. Knight , Elisabeth A. Strunk Assurance Based Development of Critical Systems. [Citation Graph (0, 0)][DBLP ] DSN, 2007, pp:347-357 [Conf ] Jonathan C. Rowanhill , Glenn S. Wasson , Zach Hill , Jim Basney , Yuliyan Kiryakov , John C. Knight , Anh Nguyen-Tuong , Andrew S. Grimshaw , Marty Humphrey Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. [Citation Graph (0, 0)][DBLP ] HPCC, 2007, pp:260-272 [Conf ] Patrick J. Graydon , John C. Knight , Elisabeth A. Strunk Achieving Dependable Systems by Synergistic Development of Architectures and Assurance Cases. [Citation Graph (0, 0)][DBLP ] WADS, 2006, pp:362-382 [Conf ] Practical Limits on Software Dependability: A Case Study. [Citation Graph (, )][DBLP ] Security through redundant data diversity. [Citation Graph (, )][DBLP ] Exploiting refactoring in formal verification. [Citation Graph (, )][DBLP ] Software Process Synthesis in Assurance Based Development of Dependable Systems. [Citation Graph (, )][DBLP ] Meeting virtual organization performance goals through adaptive grid reconfiguration. [Citation Graph (, )][DBLP ] Formal Verification by Reverse Synthesis. [Citation Graph (, )][DBLP ] On the effectiveness of the metamorphic shield. [Citation Graph (, )][DBLP ] Search in 0.013secs, Finished in 0.019secs