The SCEAS System
Navigation Menu

Search the dblp DataBase


John Aycock: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.
    Improved Port Knocking with Strong Authentication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:451-462 [Conf]
  2. John Aycock, R. Nigel Horspool
    Simple Generation of Static Single-Assignment Form. [Citation Graph (0, 0)][DBLP]
    CC, 2000, pp:110-124 [Conf]
  3. John Aycock, R. Nigel Horspool
    Directly-Executable Earley Parsing. [Citation Graph (0, 0)][DBLP]
    CC, 2001, pp:229-243 [Conf]
  4. John Aycock, R. Nigel Horspool
    Faster Generalized LR Parsing. [Citation Graph (0, 0)][DBLP]
    CC, 1999, pp:32-46 [Conf]
  5. Kelly Wilson, John Aycock
    NEST: NEtwork Server Tool. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2004, pp:700- [Conf]
  6. Michael M. J. Zastre, John Aycock
    An Exceptional Programming Language. [Citation Graph (0, 0)][DBLP]
    PLC, 2005, pp:137- [Conf]
  7. John Aycock
    Extending Old Compiler Tools with Meta-Tools. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2004, pp:841-845 [Conf]
  8. John Aycock, Ken Barker
    Viruses 101. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2005, pp:152-156 [Conf]
  9. John Aycock, R. Nigel Horspool, Jan Janousek, Borivoj Melichar
    Even faster generalized LR parsing. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 2001, v:37, n:9, pp:633-651 [Journal]
  10. John Aycock, R. Nigel Horspool
    Practical Earley Parsing. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:6, pp:620-630 [Journal]
  11. Nathan Friess, Ryan Vogt, John Aycock
    Timing is everything. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:599-603 [Journal]
  12. John Aycock
    A brief history of just-in-time. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2003, v:35, n:2, pp:97-113 [Journal]
  13. John Aycock, R. Nigel Horspool
    Schrödinger's token. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2001, v:31, n:8, pp:803-814 [Journal]
  14. John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.
    Anti-disassembly using Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:1, pp:79-85 [Journal]

  15. Global-scale Anti-spam Testing in Your Own Back Yard. [Citation Graph (, )][DBLP]

  16. Teaching Spam and Spyware at the University of C@1g4ry. [Citation Graph (, )][DBLP]

  17. A Multi-Agent Approach to Testing Anti-Spam Software. [Citation Graph (, )][DBLP]

  18. Ethical Proactive Threat Research. [Citation Graph (, )][DBLP]

  19. Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. [Citation Graph (, )][DBLP]

  20. Army of Botnets. [Citation Graph (, )][DBLP]

  21. The tale of the weather worm. [Citation Graph (, )][DBLP]

  22. Inverse Geolocation: Worms with a Sense of Direction. [Citation Graph (, )][DBLP]

  23. Spamulator: the Internet on a laptop. [Citation Graph (, )][DBLP]

  24. Enbug: when debuggers go bad. [Citation Graph (, )][DBLP]

  25. Code Obfuscation Using Pseudo-random Number Generators. [Citation Graph (, )][DBLP]

  26. Early action in an Earley parser. [Citation Graph (, )][DBLP]

Search in 0.015secs, Finished in 0.016secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002