Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: John P. McDermott
@inproceedings{DBLP:conf/acsac/McDermottMLKK12, author = {John P. McDermott and Bruce E. Montrose and Margery Li and James Kirby and Myong H. Kang}, editor = {Robert H'obbes' Zakon}, title = {Separation virtual machine monitors}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {419--428}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421011}, doi = {10.1145/2420950.2421011}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermottMLKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/McDermottMLKK12, author = {John P. McDermott and Bruce E. Montrose and Margery Li and James Kirby and Myong H. Kang}, title = {The Xenon separation {VMM:} Secure virtualization infrastructure for military clouds}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415673}, doi = {10.1109/MILCOM.2012.6415673}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/McDermottMLKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/FreitasM11, author = {Leo Freitas and John P. McDermott}, title = {Formal methods for security in the Xenon hypervisor}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {13}, number = {5}, pages = {463--489}, year = {2011}, url = {https://doi.org/10.1007/s10009-011-0195-9}, doi = {10.1007/S10009-011-0195-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/FreitasM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2011, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732}, doi = {10.1145/2076732}, isbn = {978-1-4503-0672-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDermottF10, author = {John P. McDermott and Leo Freitas}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Using formal methods for security in the Xenon project}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {67}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852742}, doi = {10.1145/1852666.1852742}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McDermottF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/McDermott10, author = {John P. McDermott}, title = {Fine-Grained Inspection for Higher-Assurance Software Security in Open Source}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.211}, doi = {10.1109/HICSS.2010.211}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/McDermott10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/KimMK10, author = {Anya Kim and John P. McDermott and Myong H. Kang}, title = {Security and Architectural Issues for National Security Cloud Computing}, booktitle = {30th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy}, pages = {21--25}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCSW.2010.32}, doi = {10.1109/ICDCSW.2010.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/KimMK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2010, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261}, doi = {10.1145/1920261}, isbn = {978-1-4503-0133-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McDermottKMJK08, author = {John P. McDermott and James Kirby and Bruce E. Montrose and Travis Johnson and Myong H. Kang}, title = {Re-engineering Xen internals for higher-assurance security}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {17--24}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.01.001}, doi = {10.1016/J.ISTR.2008.01.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/McDermottKMJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McDermottF08, author = {John P. McDermott and Leo Freitas}, editor = {Vitaly Shmatikov}, title = {A formal security policy for xenon}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {43--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456401}, doi = {10.1145/1456396.1456401}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McDermottF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FoleySLSKMTOSFBB05, author = {Simon N. Foley and Abe Singer and Michael E. Locasto and Stelios Sidiroglou and Angelos D. Keromytis and John P. McDermott and Julie Thorpe and Paul C. van Oorschot and Anil Somayaji and Richard Ford and Mark Bush and Alex Boulatov}, title = {Highlights from the 2005 New Security Paradigms Workshop}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {393--396}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.29}, doi = {10.1109/CSAC.2005.29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FoleySLSKMTOSFBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermott05, author = {John P. McDermott}, editor = {Simon N. Foley}, title = {Visual security protocol modeling}, booktitle = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005}, pages = {97--109}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1146269.1146293}, doi = {10.1145/1146269.1146293}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermott05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermottKF03, author = {John P. McDermott and Anya Kim and Judith N. Froscher}, editor = {Christian Hempelmann and Victor Raskin}, title = {Merging paradigms of survivability and security: stochastic faults and designed faults}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {19--25}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986659}, doi = {10.1145/986655.986659}, timestamp = {Wed, 14 Nov 2018 10:52:51 +0100}, biburl = {https://dblp.org/rec/conf/nspw/McDermottKF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermott01, author = {John P. McDermott}, title = {Abuse-Case-Based Assurance Arguments}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {366--374}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991553}, doi = {10.1109/ACSAC.2001.991553}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermott01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottF99, author = {John P. McDermott and Chris Fox}, title = {Using Abuse Case Models for Security Requirements Analysis}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {55--64}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816013}, doi = {10.1109/CSAC.1999.816013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermottF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/McDermott98, author = {John P. McDermott}, editor = {Bob Blakley and Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald}, title = {Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks}, booktitle = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998}, pages = {48--51}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/310889.310911}, doi = {10.1145/310889.310911}, timestamp = {Thu, 09 Sep 2021 18:23:55 +0200}, biburl = {https://dblp.org/rec/conf/nspw/McDermott98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottGO97, author = {John P. McDermott and R. Gelinas and S. Ornstein}, title = {Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses}, booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997), 8-12 December 1997, San Diego, CA, {USA}}, pages = {265}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSAC.1997.646199}, doi = {10.1109/CSAC.1997.646199}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermottGO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermott97, author = {John P. McDermott}, editor = {Tsau Young Lin and Shelly Qian}, title = {Replication Does Survive Information Warfare Attacks}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {219--228}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Wed, 24 Sep 2003 08:16:49 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/McDermott97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/McDermottM96, author = {John P. McDermott and Ravi Mukkamala}, title = {A Performance Comparison of Five Transaction Processing Algorithms for the {SINTRA} Replicated-Architecture Database system}, journal = {J. Comput. Secur.}, volume = {4}, number = {2/3}, pages = {189--228}, year = {1996}, url = {https://doi.org/10.3233/JCS-1996-42-305}, doi = {10.3233/JCS-1996-42-305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/McDermottM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/KatzenbergPM96, author = {Barbara Katzenberg and Fred Pickard and John P. McDermott}, editor = {Mark S. Ackerman and Gary M. Olson and Judith S. Olson}, title = {Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care}, booktitle = {{CSCW} '96, Proceedings of the {ACM} 1996 Conference on Computer Supported Cooperative Work, Boston, MA, USA, November 16-20, 1996}, pages = {364--369}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/240080.240346}, doi = {10.1145/240080.240346}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscw/KatzenbergPM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/McDermottG96, author = {John P. McDermott and David M. Goldschlag}, title = {Towards a model of storage jamming}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {176}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503703}, doi = {10.1109/CSFW.1996.503703}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/McDermottG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermottG95, author = {John P. McDermott and David M. Goldschlag}, editor = {David L. Spooner and Steven A. Demurjian and John E. Dobson}, title = {Storage Jamming}, booktitle = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995}, series = {{IFIP} Conference Proceedings}, volume = {51}, pages = {365--381}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 24 Oct 2002 16:18:58 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/McDermottG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MitchellCFMZ94, author = {Tom M. Mitchell and Rich Caruana and Dayne Freitag and John P. McDermott and David Zabowski}, title = {Experience with a Learning Personal Assistant}, journal = {Commun. {ACM}}, volume = {37}, number = {7}, pages = {80--91}, year = {1994}, url = {https://doi.org/10.1145/176789.176798}, doi = {10.1145/176789.176798}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MitchellCFMZ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LandwehrBMC94, author = {Carl E. Landwehr and Alan R. Bull and John P. McDermott and William S. Choi}, title = {A Taxonomy of Computer Program Security Flaws}, journal = {{ACM} Comput. Surv.}, volume = {26}, number = {3}, pages = {211--254}, year = {1994}, url = {https://doi.org/10.1145/185403.185412}, doi = {10.1145/185403.185412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/LandwehrBMC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KlinkerLMMY94, author = {Georg Klinker and Marc Linster and David Marques and John P. McDermott and Gregg Yost}, title = {Exploiting problem descriptions to provide assistance with the Sisyphus task}, journal = {Int. J. Hum. Comput. Stud.}, volume = {40}, number = {2}, pages = {293--314}, year = {1994}, url = {https://doi.org/10.1006/ijhc.1994.1014}, doi = {10.1006/IJHC.1994.1014}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/KlinkerLMMY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FroscherKMCL94, author = {Judith N. Froscher and Myong H. Kang and John P. McDermott and Oliver Costich and Carl E. Landwehr}, title = {A practical approach to high assurance multilevel secure computing service}, booktitle = {10th Annual Computer Security Applications Conference, {ACSAC} 1994, 5-9 December, 1994 Orlando, FL, {USA}}, pages = {2--11}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/CSAC.1994.367324}, doi = {10.1109/CSAC.1994.367324}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FroscherKMCL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/KatzenbergM94, author = {Barbara Katzenberg and John P. McDermott}, editor = {John B. Smith and F. Donelson Smith and Thomas W. Malone}, title = {Meaning-Making in the Creation of Useful Summary Reports}, booktitle = {{CSCW} '94, Proceedings of the Conference on Computer Supported Cooperative Work, Chapel Hill, NC, USA, October 22-26, 1994}, pages = {199--206}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/192844.193010}, doi = {10.1145/192844.193010}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscw/KatzenbergM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CostichMM94, author = {Oliver Costich and John McLean and John P. McDermott}, title = {Confidentiality in a Replicated Architecture Trusted Database System: {A} Formal Model}, booktitle = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings}, pages = {60--65}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/CSFW.1994.315947}, doi = {10.1109/CSFW.1994.315947}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CostichMM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermott94, author = {John P. McDermott}, editor = {Joachim Biskup and Matthew Morgenstern and Carl E. Landwehr}, title = {The b{\({^2}\)}/c{\({^3}\)} Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems}, booktitle = {Database Security, {VIII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994}, series = {{IFIP} Transactions}, volume = {{A-60}}, pages = {111--122}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/McDermott94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ekaw/YostKLMM94, author = {Gregg Yost and Georg Klinker and Marc Linster and David Marques and John P. McDermott}, editor = {Luc Steels and Guus Schreiber and Walter Van de Velde}, title = {The {SBF} Framework, 1989-1994: From Applications to Workplaces}, booktitle = {A Future for Knowledge Acquisition, 8th European Knowledge Acquisition Workshop, EKAW'94, Hoegaarden, Belgium, September 26-29, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {867}, pages = {318--339}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58487-0\_17}, doi = {10.1007/3-540-58487-0\_17}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/ekaw/YostKLMM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/McDermott93a, author = {John P. McDermott}, title = {{R1} ("XCON") at Age 12: Lessons from an Elementary School Achiever}, journal = {Artif. Intell.}, volume = {59}, number = {1-2}, pages = {241--247}, year = {1993}, url = {https://doi.org/10.1016/0004-3702(93)90192-E}, doi = {10.1016/0004-3702(93)90192-E}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/McDermott93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermottM93, author = {John P. McDermott and Ravi Mukkamala}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {Performance Analysis of Transaction Management Algorithms for the {SINTRA} Replicated-Architecture Database System}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {215--234}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/McDermottM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/MarquesDKMT92, author = {David Marques and Geoffroy Dallemagne and Georg Klinker and John P. McDermott and David Tung}, title = {Easy Programming: Empowering People to Build Their Own Applications}, journal = {{IEEE} Expert}, volume = {7}, number = {3}, pages = {16--29}, year = {1992}, url = {https://doi.org/10.1109/64.143235}, doi = {10.1109/64.143235}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/MarquesDKMT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/DentBMMZ92, author = {C. Lisa Dent and Jesus Boticario and John P. McDermott and Tom M. Mitchell and David Zabowski}, editor = {William R. Swartout}, title = {A Personal Learning Apprentice}, booktitle = {Proceedings of the 10th National Conference on Artificial Intelligence, San Jose, CA, USA, July 12-16, 1992}, pages = {96--103}, publisher = {{AAAI} Press / The {MIT} Press}, year = {1992}, url = {http://www.aaai.org/Library/AAAI/1992/aaai92-015.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/DentBMMZ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermottJ92, author = {John P. McDermott and Sushil Jajodia}, editor = {Bhavani Thuraisingham and Carl E. Landwehr}, title = {Orange Locking: Channel-Free Database Concurrency Control Via Locking}, booktitle = {Database Security, {VI:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992}, series = {{IFIP} Transactions}, volume = {{A-21}}, pages = {267--284}, publisher = {North-Holland}, year = {1992}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/McDermottJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CostichM92, author = {Oliver Costich and John P. McDermott}, title = {A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {192--203}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213261}, doi = {10.1109/RISP.1992.213261}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/CostichM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottJS91, author = {John P. McDermott and Sushil Jajodia and Ravi S. Sandhu}, title = {A single-level scheduler for the replicated architecture for multilevel-secure databases}, booktitle = {Seventh Annual Computer Security Applications Conference, {ACSAC} 1991, 2-6 December, 1991, San Antonio, Texas, {USA}}, pages = {2--11}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/CSAC.1991.213023}, doi = {10.1109/CSAC.1991.213023}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/McDermottJS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ckec/DallemagneKMMT91, author = {Geoffroy Dallemagne and Georg Klinker and David Marques and John P. McDermott and David Tung}, editor = {Franz Schmalhofer and Gerhard Strube and Thomas Wetter}, title = {Making Application Programming More Worthwile}, booktitle = {Contemporary Knowledge Engineering and Cognition, First Joint Workshop, Kaiserslautern, Germany, February 21-22, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {622}, pages = {6--22}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0045678}, doi = {10.1007/BFB0045678}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ckec/DallemagneKMMT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mit/PF91/SchlimmerMM91, author = {Jeffrey C. Schlimmer and Tom M. Mitchell and John P. McDermott}, editor = {Gregory Piatetsky{-}Shapiro and William J. Frawley}, title = {Justification-Based Refinement of Expert Knowledge}, booktitle = {Knowledge Discovery in Databases}, pages = {397--410}, publisher = {{AAAI/MIT} Press}, year = {1991}, timestamp = {Sat, 03 Aug 2019 19:21:51 +0200}, biburl = {https://dblp.org/rec/books/mit/PF91/SchlimmerMM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/McDermott90, author = {John P. McDermott}, editor = {Howard E. Shrobe and Thomas G. Dietterich and William R. Swartout}, title = {Developing Software is like Talking to Eskimos about Snow}, booktitle = {Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, USA, July 29 - August 3, 1990, 2 Volumes}, pages = {1130--1133}, publisher = {{AAAI} Press / The {MIT} Press}, year = {1990}, url = {http://www.aaai.org/Library/AAAI/1990/aaai90-169.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/McDermott90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PayneFM90, author = {Christian N. Payne and Judith N. Froscher and John P. McDermott}, title = {On models for a trusted application system}, booktitle = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990, 3-7 December, 1990, Tucson, Arizona, {USA}}, pages = {58--67}, publisher = {{IEEE}}, year = {1990}, url = {https://doi.org/10.1109/CSAC.1990.143752}, doi = {10.1109/CSAC.1990.143752}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PayneFM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FroscherMPL90, author = {Judith N. Froscher and John P. McDermott and Christian N. Payne and Herman Otto Lubbes}, title = {Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby)}, booktitle = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990, 3-7 December, 1990, Tucson, Arizona, {USA}}, pages = {414--422}, publisher = {{IEEE}}, year = {1990}, url = {https://doi.org/10.1109/CSAC.1990.143817}, doi = {10.1109/CSAC.1990.143817}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FroscherMPL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottFPL90, author = {John P. McDermott and Judith N. Froscher and Christian N. Payne and Herman Otto Lubbes}, title = {Informal top-level specifications for trusted application systems}, booktitle = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990, 3-7 December, 1990, Tucson, Arizona, {USA}}, pages = {423--433}, publisher = {{IEEE}}, year = {1990}, url = {https://doi.org/10.1109/CSAC.1990.143818}, doi = {10.1109/CSAC.1990.143818}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/McDermottFPL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/MarcusM89, author = {Sandra Marcus and John P. McDermott}, title = {{SALT:} {A} Knowledge Acquisition Language for Propose-and-Revise Systems}, journal = {Artif. Intell.}, volume = {39}, number = {1}, pages = {1--37}, year = {1989}, url = {https://doi.org/10.1016/0004-3702(89)90002-7}, doi = {10.1016/0004-3702(89)90002-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/MarcusM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ml/McDermott89, author = {John P. McDermott}, title = {The World Would Be a Better Place if Non-Programmers Could Program}, journal = {Mach. Learn.}, volume = {4}, pages = {337--338}, year = {1989}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ml/McDermott89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/MarcusSM88, author = {Sandra Marcus and Jeffrey Stout and John P. McDermott}, title = {{VT:} An Expert Elevator Designer That Uses Knowledge-Based Backtracking}, journal = {{AI} Mag.}, volume = {9}, number = {1}, pages = {95--112}, year = {1988}, url = {https://ojs.aaai.org/index.php/aimagazine/article/view/664}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/MarcusSM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/StoutCMM88, author = {Jeffrey Stout and Gilbert Caplain and Sandra Marcus and John P. McDermott}, title = {Toward Automating Recognition of Differing Problem-Solving Demands}, journal = {Int. J. Man Mach. Stud.}, volume = {29}, number = {5}, pages = {599--611}, year = {1988}, url = {https://doi.org/10.1016/S0020-7373(88)80015-4}, doi = {10.1016/S0020-7373(88)80015-4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/StoutCMM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KlinkerGM88, author = {Georg Klinker and Serge Genetet and John P. McDermott}, title = {Knowledge Acquisition for Evaluation Systems}, journal = {Int. J. Man Mach. Stud.}, volume = {29}, number = {6}, pages = {715--731}, year = {1988}, url = {https://doi.org/10.1016/S0020-7373(88)80075-0}, doi = {10.1016/S0020-7373(88)80075-0}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/KlinkerGM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/EshelmanEMT87, author = {Larry J. Eshelman and Damien Ehret and John P. McDermott and Ming Tan}, title = {{MOLE:} {A} Tenacious Knowledge-Acquisition Tool}, journal = {Int. J. Man Mach. Stud.}, volume = {26}, number = {1}, pages = {41--54}, year = {1987}, url = {https://doi.org/10.1016/S0020-7373(87)80034-2}, doi = {10.1016/S0020-7373(87)80034-2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/EshelmanEMT87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KlinkerBGGM87, author = {Georg Klinker and Joel Bentolila and Serge Genetet and Michael Grimes and John P. McDermott}, title = {{KNACK} - Report-Driven Knowledge Acquisition}, journal = {Int. J. Man Mach. Stud.}, volume = {26}, number = {1}, pages = {65--79}, year = {1987}, url = {https://doi.org/10.1016/S0020-7373(87)80036-6}, doi = {10.1016/S0020-7373(87)80036-6}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/KlinkerBGGM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/KlinkerBGM87, author = {Georg Klinker and Casey Boyd and Serge Genetet and John P. McDermott}, editor = {Kenneth D. Forbus and Howard E. Shrobe}, title = {A {KNACK} for Knowledge Acquisition}, booktitle = {Proceedings of the 6th National Conference on Artificial Intelligence. Seattle, WA, USA, July 1987}, pages = {488--493}, publisher = {Morgan Kaufmann}, year = {1987}, url = {http://www.aaai.org/Library/AAAI/1987/aaai87-087.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/KlinkerBGM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ijcai/1987, editor = {John P. McDermott}, title = {Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, Italy, August 23-28, 1987}, publisher = {Morgan Kaufmann}, year = {1987}, url = {http://ijcai.org/proceedings/1987-1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/1987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/KahnM86, author = {Gary S. Kahn and John P. McDermott}, title = {The Mud System}, journal = {{IEEE} Expert}, volume = {1}, number = {1}, pages = {23--32}, year = {1986}, url = {https://doi.org/10.1109/MEX.1986.5006495}, doi = {10.1109/MEX.1986.5006495}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/KahnM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/BrugBM86, author = {Arnold van de Brug and Judith Bachant and John P. McDermott}, title = {The Taming of {R1}}, journal = {{IEEE} Expert}, volume = {1}, number = {3}, pages = {33--39}, year = {1986}, url = {https://doi.org/10.1109/MEX.1986.4306978}, doi = {10.1109/MEX.1986.4306978}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/BrugBM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/KimM86, author = {Jin Kim and John P. McDermott}, title = {Computer Aids for {IC} Design}, journal = {{IEEE} Softw.}, volume = {3}, number = {2}, pages = {38--47}, year = {1986}, url = {https://doi.org/10.1109/MS.1986.233072}, doi = {10.1109/MS.1986.233072}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/KimM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/EshelmanM86, author = {Larry J. Eshelman and John P. McDermott}, editor = {Tom Kehler and Stanley J. Rosenschein}, title = {{MOLE:} {A} Knowledge Acquisition Tool that Uses its Head}, booktitle = {Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, PA, USA, August 11-15, 1986. Volume 2: Engineering}, pages = {950--955}, publisher = {Morgan Kaufmann}, year = {1986}, url = {http://www.aaai.org/Library/AAAI/1986/aaai86-157.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/EshelmanM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/AikinsHMSS86, author = {Janice S. Aikins and Frederick Hayes{-}Roth and John P. McDermott and Herbert Schorr and Reid G. Smith}, editor = {Tom Kehler and Stanley J. Rosenschein}, title = {Panel: Directions for Expert Systems}, booktitle = {Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, PA, USA, August 11-15, 1986. Volume 2: Engineering}, pages = {1150}, publisher = {Morgan Kaufmann}, year = {1986}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/AikinsHMSS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/NechesFKMP86, author = {Robert Neches and Richard Fikes and Casimir A. Kulikowski and John P. McDermott and Ramesh S. Patil}, editor = {Tom Kehler and Stanley J. Rosenschein}, title = {Panel: Knowledge Representation Meets Knowledge Acquisition: What Are the Needs and Where Is the Leverage?}, booktitle = {Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, PA, USA, August 11-15, 1986. Volume 2: Engineering}, pages = {1153}, publisher = {Morgan Kaufmann}, year = {1986}, url = {http://www.aaai.org/Library/AAAI/1986/aaai86-193.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/NechesFKMP86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/McDermott86, author = {John P. McDermott}, editor = {Hans{-}J{\"{u}}rgen Kugler}, title = {Making Expert Systems Explicit (Invited Paper)}, booktitle = {Information Processing 86, Proceedings of the {IFIP} 10th World Computer Congress, Dublin, Ireland, September 1-5, 1986}, pages = {539--544}, publisher = {North-Holland/IFIP}, year = {1986}, timestamp = {Sun, 28 Jul 2019 12:54:16 +0200}, biburl = {https://dblp.org/rec/conf/ifip/McDermott86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/McDermottWCMS85, author = {Drew V. McDermott and M. Mitchell Waldrop and B. Chandrasekaran and John P. McDermott and Roger C. Schank}, title = {The Dark Ages of {AI:} {A} Panel Discussion at {AAAI-84}}, journal = {{AI} Mag.}, volume = {6}, number = {3}, pages = {122--134}, year = {1985}, url = {https://ojs.aaai.org/index.php/aimagazine/article/view/494}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/McDermottWCMS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/KahnNM85, author = {Gary S. Kahn and Steven J. Nowlan and John P. McDermott}, title = {Strategies for Knowledge Acquisition}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {7}, number = {5}, pages = {511--522}, year = {1985}, url = {https://doi.org/10.1109/TPAMI.1985.4767699}, doi = {10.1109/TPAMI.1985.4767699}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/KahnNM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/RosenbloomLMNO85, author = {Paul S. Rosenbloom and John E. Laird and John P. McDermott and Allen Newell and Edmund Orciuch}, title = {R1-Soar: An Experiment in Knowledge-Intensive Programming in a Problem-Solving Architecture}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {7}, number = {5}, pages = {561--569}, year = {1985}, url = {https://doi.org/10.1109/TPAMI.1985.4767703}, doi = {10.1109/TPAMI.1985.4767703}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/RosenbloomLMNO85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/McKeownHM85, author = {David M. McKeown Jr. and Wilson A. Harvey and John P. McDermott}, title = {Rule-Based Interpretation of Aerial Imagery}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {7}, number = {5}, pages = {570--585}, year = {1985}, url = {https://doi.org/10.1109/TPAMI.1985.4767704}, doi = {10.1109/TPAMI.1985.4767704}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/McKeownHM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caia/McDermott85, author = {John P. McDermott}, editor = {Charles R. Weisbin}, title = {Where Knowledge Acquisition Tools Fit in the Scheme of Things}, booktitle = {Artificial Intelligence Applications, {CAIA} 1985, The Engineering of Knowledge-Based Systems, Proceedings of the Second Conference, Miami Beach, Florida, USA, December 11-13, 1985}, pages = {222}, publisher = {{IEEE} Computer Society / North-Holland}, year = {1985}, timestamp = {Tue, 30 May 2006 14:03:38 +0200}, biburl = {https://dblp.org/rec/conf/caia/McDermott85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caia/BrugBM85, author = {Arnold van de Brug and Judith Bachant and John P. McDermott}, editor = {Charles R. Weisbin}, title = {Doing {R1} with Style}, booktitle = {Artificial Intelligence Applications, {CAIA} 1985, The Engineering of Knowledge-Based Systems, Proceedings of the Second Conference, Miami Beach, Florida, USA, December 11-13, 1985}, pages = {244--249}, publisher = {{IEEE} Computer Society / North-Holland}, year = {1985}, timestamp = {Thu, 10 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caia/BrugBM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/db-workshops/FoxM85, author = {Mark S. Fox and John P. McDermott}, editor = {Michael L. Brodie and John Mylopoulos}, title = {The Role of Databases in Knowledge-Based Systems}, booktitle = {On Knowledge Base Management Systems: Integrating Artificial Intelligence and Database Technologies, Book resulting from the Islamorada Workshop 1985 (Islamorada, FL, {USA)}}, series = {Topics in Information Systems}, pages = {407--430}, publisher = {Springer}, year = {1985}, timestamp = {Sat, 03 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/db-workshops/FoxM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/KahnNM85, author = {Gary S. Kahn and Steven J. Nowlan and John P. McDermott}, editor = {Aravind K. Joshi}, title = {{MORE:} An Intelligent Knowledge Acquisition Tool}, booktitle = {Proceedings of the 9th International Joint Conference on Artificial Intelligence. Los Angeles, CA, USA, August 1985}, pages = {581--584}, publisher = {Morgan Kaufmann}, year = {1985}, url = {http://ijcai.org/Proceedings/85-1/Papers/110.pdf}, timestamp = {Tue, 20 Aug 2019 16:19:04 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/KahnNM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/MarcusMW85, author = {Sandra Marcus and John P. McDermott and Tianran Wang}, editor = {Aravind K. Joshi}, title = {Knowledge Acquisition for Constructive Systems}, booktitle = {Proceedings of the 9th International Joint Conference on Artificial Intelligence. Los Angeles, CA, USA, August 1985}, pages = {637--639}, publisher = {Morgan Kaufmann}, year = {1985}, url = {http://ijcai.org/Proceedings/85-1/Papers/123.pdf}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/MarcusMW85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/McDermottB84, author = {John P. McDermott and Judith Bachant}, title = {{R1} Revisited: Four Years in the Trenches}, journal = {{AI} Mag.}, volume = {5}, number = {3}, pages = {21--32}, year = {1984}, url = {https://ojs.aaai.org/index.php/aimagazine/article/view/445}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/McDermottB84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/McDermott83, author = {John P. McDermott}, title = {The Knowledge Engineering Process}, journal = {{IEEE} Database Eng. Bull.}, volume = {6}, number = {4}, pages = {30--37}, year = {1983}, url = {http://sites.computer.org/debull/83DEC-CD.pdf}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/McDermott83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/KimM83, author = {Jin Kim and John P. McDermott}, editor = {Michael R. Genesereth}, title = {{TALIB:} An {IC} Layout Design Assistant}, booktitle = {Proceedings of the National Conference on Artificial Intelligence, Washington, D.C., USA, August 22-26, 1983}, pages = {197--201}, publisher = {{AAAI} Press}, year = {1983}, url = {http://www.aaai.org/Library/AAAI/1983/aaai83-077.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/KimM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/McDermott83, author = {John P. McDermott}, editor = {Alan Bundy}, title = {Extracting Knowledge From Expert Systems}, booktitle = {Proceedings of the 8th International Joint Conference on Artificial Intelligence. Karlsruhe, FRG, August 1983}, pages = {100--107}, publisher = {William Kaufmann}, year = {1983}, url = {http://ijcai.org/Proceedings/83-1/Papers/023.pdf}, timestamp = {Tue, 20 Aug 2019 16:18:54 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/McDermott83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/MasuiMS83, author = {Shoichi Masui and John P. McDermott and Alan Sobel}, editor = {Alan Bundy}, title = {Decision-Making in Time-Critical Situations}, booktitle = {Proceedings of the 8th International Joint Conference on Artificial Intelligence. Karlsruhe, FRG, August 1983}, pages = {233--235}, publisher = {William Kaufmann}, year = {1983}, url = {http://ijcai.org/Proceedings/83-1/Papers/052.pdf}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/MasuiMS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/McDermott82, author = {John P. McDermott}, title = {{R1:} {A} Rule-Based Configurer of Computer Systems}, journal = {Artif. Intell.}, volume = {19}, number = {1}, pages = {39--88}, year = {1982}, url = {https://doi.org/10.1016/0004-3702(82)90021-2}, doi = {10.1016/0004-3702(82)90021-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/McDermott82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/McDermottS81, author = {John P. McDermott and Barbara Steele}, editor = {Patrick J. Hayes}, title = {Extending a Knowledge-Based System to Deal with Ad Hoc Constraints}, booktitle = {Proceedings of the 7th International Joint Conference on Artificial Intelligence, {IJCAI} '81, Vancouver, BC, Canada, August 24-28, 1981}, pages = {824--828}, publisher = {William Kaufmann}, year = {1981}, timestamp = {Tue, 20 Aug 2019 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/McDermottS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/McDermott80, author = {John P. McDermott}, title = {Nils J. Nilsson, Principles of Artificial lntelligence}, journal = {Artif. Intell.}, volume = {15}, number = {1-2}, pages = {127--131}, year = {1980}, url = {https://doi.org/10.1016/0004-3702(80)90026-0}, doi = {10.1016/0004-3702(80)90026-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/McDermott80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/McDermott80, author = {John P. McDermott}, title = {{R1:} The Formative Years}, journal = {{AI} Mag.}, volume = {2}, number = {2}, pages = {21--29}, year = {1980}, url = {https://ojs.aaai.org/index.php/aimagazine/article/view/100}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/McDermott80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/McDermott80a, author = {John P. McDermott}, editor = {Robert Balzer}, title = {{RI:} an Expert in the Computer Systems Domain}, booktitle = {Proceedings of the 1st Annual National Conference on Artificial Intelligence, Stanford University, CA, USA, August 18-21, 1980}, pages = {269--271}, publisher = {{AAAI} Press/MIT Press}, year = {1980}, url = {http://www.aaai.org/Library/AAAI/1980/aaai80-076.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/McDermott80a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Hayes-RothM78, author = {Frederick Hayes{-}Roth and John P. McDermott}, title = {An Interference Matching Technique for Inducing Abstractions}, journal = {Commun. {ACM}}, volume = {21}, number = {5}, pages = {401--410}, year = {1978}, url = {https://doi.org/10.1145/359488.359503}, doi = {10.1145/359488.359503}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Hayes-RothM78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigart/McDermottF77, author = {John P. McDermott and Charles Forgy}, title = {Production system conflict resolution strategies}, journal = {{SIGART} Newsl.}, volume = {63}, pages = {37}, year = {1977}, url = {https://doi.org/10.1145/1045343.1045364}, doi = {10.1145/1045343.1045364}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigart/McDermottF77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigart/McDermottNM77, author = {John P. McDermott and Allen Newell and J. Moore}, title = {The efficiency of certain production system implementations}, journal = {{SIGART} Newsl.}, volume = {63}, pages = {38}, year = {1977}, url = {https://doi.org/10.1145/1045343.1045366}, doi = {10.1145/1045343.1045366}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigart/McDermottNM77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/RychenerFLMNR77, author = {Michael D. Rychener and Charles Forgy and Pat Langley and John P. McDermott and Allen Newell and K. Ramakrishna}, editor = {Raj Reddy}, title = {Problems in Building an Instructable Production System}, booktitle = {Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, MA, USA, August 22-25, 1977}, pages = {337}, publisher = {William Kaufmann}, year = {1977}, url = {http://ijcai.org/Proceedings/77-1/Papers/055.pdf}, timestamp = {Tue, 20 Aug 2019 16:18:08 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/RychenerFLMNR77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/Hayes-RothM77, author = {Frederick Hayes{-}Roth and John P. McDermott}, editor = {Raj Reddy}, title = {Knowledge Acquisition from Structural Descriptions}, booktitle = {Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, MA, USA, August 22-25, 1977}, pages = {356--362}, publisher = {William Kaufmann}, year = {1977}, url = {http://ijcai.org/Proceedings/77-1/Papers/062.pdf}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/Hayes-RothM77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/LenatM77, author = {Douglas B. Lenat and John P. McDermott}, editor = {Raj Reddy}, title = {Less Than General Production System Architectures}, booktitle = {Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, MA, USA, August 22-25, 1977}, pages = {928--932}, publisher = {William Kaufmann}, year = {1977}, url = {http://ijcai.org/Proceedings/77-2/Papers/080.pdf}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/LenatM77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ForgyM77, author = {Charles Forgy and John P. McDermott}, editor = {Raj Reddy}, title = {OPS, {A} Domain-Independent Production System Language}, booktitle = {Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, MA, USA, August 22-25, 1977}, pages = {933--939}, publisher = {William Kaufmann}, year = {1977}, url = {http://ijcai.org/Proceedings/77-2/Papers/081.pdf}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ForgyM77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.