Search the dblp DataBase
John Aycock :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Rennie deGraaf , John Aycock , Michael J. Jacobson Jr. Improved Port Knocking with Strong Authentication. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:451-462 [Conf ] John Aycock , R. Nigel Horspool Simple Generation of Static Single-Assignment Form. [Citation Graph (0, 0)][DBLP ] CC, 2000, pp:110-124 [Conf ] John Aycock , R. Nigel Horspool Directly-Executable Earley Parsing. [Citation Graph (0, 0)][DBLP ] CC, 2001, pp:229-243 [Conf ] John Aycock , R. Nigel Horspool Faster Generalized LR Parsing. [Citation Graph (0, 0)][DBLP ] CC, 1999, pp:32-46 [Conf ] Kelly Wilson , John Aycock NEST: NEtwork Server Tool. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2004, pp:700- [Conf ] Michael M. J. Zastre , John Aycock An Exceptional Programming Language. [Citation Graph (0, 0)][DBLP ] PLC, 2005, pp:137- [Conf ] John Aycock Extending Old Compiler Tools with Meta-Tools. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2004, pp:841-845 [Conf ] John Aycock , Ken Barker Viruses 101. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2005, pp:152-156 [Conf ] John Aycock , R. Nigel Horspool , Jan Janousek , Borivoj Melichar Even faster generalized LR parsing. [Citation Graph (0, 0)][DBLP ] Acta Inf., 2001, v:37, n:9, pp:633-651 [Journal ] John Aycock , R. Nigel Horspool Practical Earley Parsing. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:6, pp:620-630 [Journal ] Nathan Friess , Ryan Vogt , John Aycock Timing is everything. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:8, pp:599-603 [Journal ] John Aycock A brief history of just-in-time. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 2003, v:35, n:2, pp:97-113 [Journal ] John Aycock , R. Nigel Horspool Schrödinger's token. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2001, v:31, n:8, pp:803-814 [Journal ] John Aycock , Rennie deGraaf , Michael J. Jacobson Jr. Anti-disassembly using Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2006, v:2, n:1, pp:79-85 [Journal ] Global-scale Anti-spam Testing in Your Own Back Yard. [Citation Graph (, )][DBLP ] Teaching Spam and Spyware at the University of C@1g4ry. [Citation Graph (, )][DBLP ] A Multi-Agent Approach to Testing Anti-Spam Software. [Citation Graph (, )][DBLP ] Ethical Proactive Threat Research. [Citation Graph (, )][DBLP ] Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. [Citation Graph (, )][DBLP ] Army of Botnets. [Citation Graph (, )][DBLP ] The tale of the weather worm. [Citation Graph (, )][DBLP ] Inverse Geolocation: Worms with a Sense of Direction. [Citation Graph (, )][DBLP ] Spamulator: the Internet on a laptop. [Citation Graph (, )][DBLP ] Enbug: when debuggers go bad. [Citation Graph (, )][DBLP ] Code Obfuscation Using Pseudo-random Number Generators. [Citation Graph (, )][DBLP ] Early action in an Earley parser. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs