default search action
John P. McDermott
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c51]John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:
Separation virtual machine monitors. ACSAC 2012: 419-428 - [c50]John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:
The Xenon separation VMM: Secure virtualization infrastructure for military clouds. MILCOM 2012: 1-6 - 2011
- [j33]Leo Freitas, John P. McDermott:
Formal methods for security in the Xenon hypervisor. Int. J. Softw. Tools Technol. Transf. 13(5): 463-489 (2011) - [e3]Robert H'obbes' Zakon, John P. McDermott, Michael E. Locasto:
Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011. ACM 2011, ISBN 978-1-4503-0672-0 [contents] - 2010
- [c49]John P. McDermott, Leo Freitas:
Using formal methods for security in the Xenon project. CSIIRW 2010: 67 - [c48]John P. McDermott:
Fine-Grained Inspection for Higher-Assurance Software Security in Open Source. HICSS 2010: 1-10 - [c47]Anya Kim, John P. McDermott, Myong H. Kang:
Security and Architectural Issues for National Security Cloud Computing. ICDCS Workshops 2010: 21-25 - [e2]Carrie Gates, Michael Franz, John P. McDermott:
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010. ACM 2010, ISBN 978-1-4503-0133-6 [contents]
2000 – 2009
- 2008
- [j32]John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang:
Re-engineering Xen internals for higher-assurance security. Inf. Secur. Tech. Rep. 13(1): 17-24 (2008) - [c46]John P. McDermott, Leo Freitas:
A formal security policy for xenon. FMSE 2008: 43-52 - 2005
- [c45]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c44]John P. McDermott:
Visual security protocol modeling. NSPW 2005: 97-109 - 2003
- [c43]John P. McDermott, Anya Kim, Judith N. Froscher:
Merging paradigms of survivability and security: stochastic faults and designed faults. NSPW 2003: 19-25 - 2001
- [c42]John P. McDermott:
Abuse-Case-Based Assurance Arguments. ACSAC 2001: 366-374
1990 – 1999
- 1999
- [c41]John P. McDermott, Chris Fox:
Using Abuse Case Models for Security Requirements Analysis. ACSAC 1999: 55-64 - 1998
- [c40]John P. McDermott:
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. Workshop on New Security Paradigms 1998: 48-51 - 1997
- [c39]John P. McDermott, R. Gelinas, S. Ornstein:
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. ACSAC 1997: 265- - [c38]John P. McDermott:
Replication Does Survive Information Warfare Attacks. DBSec 1997: 219-228 - 1996
- [j31]John P. McDermott, Ravi Mukkamala:
A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system. J. Comput. Secur. 4(2/3): 189-228 (1996) - [c37]Barbara Katzenberg, Fred Pickard, John P. McDermott:
Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care. CSCW 1996: 364-369 - [c36]John P. McDermott, David M. Goldschlag:
Towards a model of storage jamming. CSFW 1996: 176- - 1995
- [c35]John P. McDermott, David M. Goldschlag:
Storage Jamming. DBSec 1995: 365-381 - 1994
- [j30]Tom M. Mitchell, Rich Caruana, Dayne Freitag, John P. McDermott, David Zabowski:
Experience with a Learning Personal Assistant. Commun. ACM 37(7): 80-91 (1994) - [j29]Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi:
A Taxonomy of Computer Program Security Flaws. ACM Comput. Surv. 26(3): 211-254 (1994) - [j28]Georg Klinker, Marc Linster, David Marques, John P. McDermott, Gregg Yost:
Exploiting problem descriptions to provide assistance with the Sisyphus task. Int. J. Hum. Comput. Stud. 40(2): 293-314 (1994) - [c34]Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr:
A practical approach to high assurance multilevel secure computing service. ACSAC 1994: 2-11 - [c33]Barbara Katzenberg, John P. McDermott:
Meaning-Making in the Creation of Useful Summary Reports. CSCW 1994: 199-206 - [c32]Oliver Costich, John McLean, John P. McDermott:
Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. CSFW 1994: 60-65 - [c31]John P. McDermott:
The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. DBSec 1994: 111-122 - [c30]Gregg Yost, Georg Klinker, Marc Linster, David Marques, John P. McDermott:
The SBF Framework, 1989-1994: From Applications to Workplaces. EKAW 1994: 318-339 - 1993
- [j27]John P. McDermott:
R1 ("XCON") at Age 12: Lessons from an Elementary School Achiever. Artif. Intell. 59(1-2): 241-247 (1993) - [j26]Georg Klinker, David Marques, John P. McDermott:
The Active Glossary: taking integration seriously. Knowl. Acquis. 5(2): 173-197 (1993) - [c29]John P. McDermott, Ravi Mukkamala:
Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System. DBSec 1993: 215-234 - 1992
- [j25]David Marques, Geoffroy Dallemagne, Georg Klinker, John P. McDermott, David Tung:
Easy Programming: Empowering People to Build Their Own Applications. IEEE Expert 7(3): 16-29 (1992) - [c28]C. Lisa Dent, Jesus Boticario, John P. McDermott, Tom M. Mitchell, David Zabowski:
A Personal Learning Apprentice. AAAI 1992: 96-103 - [c27]John P. McDermott, Sushil Jajodia:
Orange Locking: Channel-Free Database Concurrency Control Via Locking. DBSec 1992: 267-284 - [c26]Oliver Costich, John P. McDermott:
A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture. S&P 1992: 192-203 - 1991
- [j24]Georg Klinker, Carlos Bhola, Geoffroy Dallemagne, David Marques, John P. McDermott:
Usable and reusable programming constructs. Knowl. Acquis. 3(2): 117-135 (1991) - [c25]John P. McDermott, Sushil Jajodia, Ravi S. Sandhu:
A single-level scheduler for the replicated architecture for multilevel-secure databases. ACSAC 1991: 2-11 - [c24]Geoffroy Dallemagne, Georg Klinker, David Marques, John P. McDermott, David Tung:
Making Application Programming More Worthwile. Contemporary Knowledge Engineering and Cognition 1991: 6-22 - [p1]Jeffrey C. Schlimmer, Tom M. Mitchell, John P. McDermott:
Justification-Based Refinement of Expert Knowledge. Knowledge Discovery in Databases 1991: 397-410 - 1990
- [c23]John P. McDermott:
Developing Software is like Talking to Eskimos about Snow. AAAI 1990: 1130-1133 - [c22]Christian N. Payne, Judith N. Froscher, John P. McDermott:
On models for a trusted application system. ACSAC 1990: 58-67 - [c21]Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes:
Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). ACSAC 1990: 414-422 - [c20]John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes:
Informal top-level specifications for trusted application systems. ACSAC 1990: 423-433
1980 – 1989
- 1989
- [j23]Sandra Marcus, John P. McDermott:
SALT: A Knowledge Acquisition Language for Propose-and-Revise Systems. Artif. Intell. 39(1): 1-37 (1989) - [j22]Georg Klinker, Casey Boyd, David Dong, Jon Maiman, John P. McDermott, Robert Schnelbach:
Building expert systems with KNACK. Knowl. Acquis. 1(3): 299-320 (1989) - [j21]John P. McDermott:
The World Would Be a Better Place if Non-Programmers Could Program. Mach. Learn. 4: 337-338 (1989) - 1988
- [j20]Sandra Marcus, Jeffrey Stout, John P. McDermott:
VT: An Expert Elevator Designer That Uses Knowledge-Based Backtracking. AI Mag. 9(1): 95-112 (1988) - [j19]Jeffrey Stout, Gilbert Caplain, Sandra Marcus, John P. McDermott:
Toward Automating Recognition of Differing Problem-Solving Demands. Int. J. Man Mach. Stud. 29(5): 599-611 (1988) - [j18]Georg Klinker, Serge Genetet, John P. McDermott:
Knowledge Acquisition for Evaluation Systems. Int. J. Man Mach. Stud. 29(6): 715-731 (1988) - 1987
- [j17]Larry J. Eshelman, Damien Ehret, John P. McDermott, Ming Tan:
MOLE: A Tenacious Knowledge-Acquisition Tool. Int. J. Man Mach. Stud. 26(1): 41-54 (1987) - [j16]Georg Klinker, Joel Bentolila, Serge Genetet, Michael Grimes, John P. McDermott:
KNACK - Report-Driven Knowledge Acquisition. Int. J. Man Mach. Stud. 26(1): 65-79 (1987) - [c19]Georg Klinker, Casey Boyd, Serge Genetet, John P. McDermott:
A KNACK for Knowledge Acquisition. AAAI 1987: 488-493 - [e1]John P. McDermott:
Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, Italy, August 23-28, 1987. Morgan Kaufmann 1987 [contents] - 1986
- [j15]Gary S. Kahn, John P. McDermott:
The Mud System. IEEE Expert 1(1): 23-32 (1986) - [j14]Arnold van de Brug, Judith Bachant, John P. McDermott:
The Taming of R1. IEEE Expert 1(3): 33-39 (1986) - [j13]Jin Kim, John P. McDermott:
Computer Aids for IC Design. IEEE Softw. 3(2): 38-47 (1986) - [c18]Larry J. Eshelman, John P. McDermott:
MOLE: A Knowledge Acquisition Tool that Uses its Head. AAAI 1986: 950-955 - [c17]Janice S. Aikins, Frederick Hayes-Roth, John P. McDermott, Herbert Schorr, Reid G. Smith:
Panel: Directions for Expert Systems. AAAI 1986: 1150 - [c16]Robert Neches, Richard Fikes, Casimir A. Kulikowski, John P. McDermott, Ramesh S. Patil:
Panel: Knowledge Representation Meets Knowledge Acquisition: What Are the Needs and Where Is the Leverage? AAAI 1986: 1153 - [c15]John P. McDermott:
Making Expert Systems Explicit (Invited Paper). IFIP Congress 1986: 539-544 - 1985
- [j12]Drew V. McDermott, M. Mitchell Waldrop, B. Chandrasekaran, John P. McDermott, Roger C. Schank:
The Dark Ages of AI: A Panel Discussion at AAAI-84. AI Mag. 6(3): 122-134 (1985) - [j11]Gary S. Kahn, Steven J. Nowlan, John P. McDermott:
Strategies for Knowledge Acquisition. IEEE Trans. Pattern Anal. Mach. Intell. 7(5): 511-522 (1985) - [j10]Paul S. Rosenbloom, John E. Laird, John P. McDermott, Allen Newell, Edmund Orciuch:
R1-Soar: An Experiment in Knowledge-Intensive Programming in a Problem-Solving Architecture. IEEE Trans. Pattern Anal. Mach. Intell. 7(5): 561-569 (1985) - [j9]David M. McKeown Jr., Wilson A. Harvey, John P. McDermott:
Rule-Based Interpretation of Aerial Imagery. IEEE Trans. Pattern Anal. Mach. Intell. 7(5): 570-585 (1985) - [c14]John P. McDermott:
Where Knowledge Acquisition Tools Fit in the Scheme of Things. CAIA 1985: 222 - [c13]Arnold van de Brug, Judith Bachant, John P. McDermott:
Doing R1 with Style. CAIA 1985: 244-249 - [c12]Mark S. Fox, John P. McDermott:
The Role of Databases in Knowledge-Based Systems. On Knowledge Base Management Systems (Islamorada) 1985: 407-430 - [c11]Gary S. Kahn, Steven J. Nowlan, John P. McDermott:
MORE: An Intelligent Knowledge Acquisition Tool. IJCAI 1985: 581-584 - [c10]Sandra Marcus, John P. McDermott, Tianran Wang:
Knowledge Acquisition for Constructive Systems. IJCAI 1985: 637-639 - 1984
- [j8]John P. McDermott, Judith Bachant:
R1 Revisited: Four Years in the Trenches. AI Mag. 5(3): 21-32 (1984) - 1983
- [j7]John P. McDermott:
The Knowledge Engineering Process. IEEE Database Eng. Bull. 6(4): 30-37 (1983) - [c9]Jin Kim, John P. McDermott:
TALIB: An IC Layout Design Assistant. AAAI 1983: 197-201 - [c8]John P. McDermott:
Extracting Knowledge From Expert Systems. IJCAI 1983: 100-107 - [c7]Shoichi Masui, John P. McDermott, Alan Sobel:
Decision-Making in Time-Critical Situations. IJCAI 1983: 233-235 - 1982
- [j6]John P. McDermott:
R1: A Rule-Based Configurer of Computer Systems. Artif. Intell. 19(1): 39-88 (1982) - 1981
- [c6]John P. McDermott, Barbara Steele:
Extending a Knowledge-Based System to Deal with Ad Hoc Constraints. IJCAI 1981: 824-828 - 1980
- [j5]John P. McDermott:
Nils J. Nilsson, Principles of Artificial lntelligence. Artif. Intell. 15(1-2): 127-131 (1980) - [j4]John P. McDermott:
R1: The Formative Years. AI Mag. 2(2): 21-29 (1980) - [c5]John P. McDermott:
RI: an Expert in the Computer Systems Domain. AAAI 1980: 269-271
1970 – 1979
- 1978
- [j3]Frederick Hayes-Roth, John P. McDermott:
An Interference Matching Technique for Inducing Abstractions. Commun. ACM 21(5): 401-410 (1978) - 1977
- [j2]John P. McDermott, Charles Forgy:
Production system conflict resolution strategies. SIGART Newsl. 63: 37 (1977) - [j1]John P. McDermott, Allen Newell, J. Moore:
The efficiency of certain production system implementations. SIGART Newsl. 63: 38 (1977) - [c4]Michael D. Rychener, Charles Forgy, Pat Langley, John P. McDermott, Allen Newell, K. Ramakrishna:
Problems in Building an Instructable Production System. IJCAI 1977: 337 - [c3]Frederick Hayes-Roth, John P. McDermott:
Knowledge Acquisition from Structural Descriptions. IJCAI 1977: 356-362 - [c2]Douglas B. Lenat, John P. McDermott:
Less Than General Production System Architectures. IJCAI 1977: 928-932 - [c1]Charles Forgy, John P. McDermott:
OPS, A Domain-Independent Production System Language. IJCAI 1977: 933-939
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint