BibTeX records: John P. McDermott

download as .bib file

@inproceedings{DBLP:conf/acsac/McDermottMLKK12,
  author       = {John P. McDermott and
                  Bruce E. Montrose and
                  Margery Li and
                  James Kirby and
                  Myong H. Kang},
  editor       = {Robert H'obbes' Zakon},
  title        = {Separation virtual machine monitors},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {419--428},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421011},
  doi          = {10.1145/2420950.2421011},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottMLKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/McDermottMLKK12,
  author       = {John P. McDermott and
                  Bruce E. Montrose and
                  Margery Li and
                  James Kirby and
                  Myong H. Kang},
  title        = {The Xenon separation {VMM:} Secure virtualization infrastructure for
                  military clouds},
  booktitle    = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
                  FL, USA, October 29 - November 1, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MILCOM.2012.6415673},
  doi          = {10.1109/MILCOM.2012.6415673},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/McDermottMLKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/FreitasM11,
  author       = {Leo Freitas and
                  John P. McDermott},
  title        = {Formal methods for security in the Xenon hypervisor},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {13},
  number       = {5},
  pages        = {463--489},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10009-011-0195-9},
  doi          = {10.1007/S10009-011-0195-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/FreitasM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2011,
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732},
  doi          = {10.1145/2076732},
  isbn         = {978-1-4503-0672-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDermottF10,
  author       = {John P. McDermott and
                  Leo Freitas},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Using formal methods for security in the Xenon project},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {67},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852742},
  doi          = {10.1145/1852666.1852742},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDermottF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/McDermott10,
  author       = {John P. McDermott},
  title        = {Fine-Grained Inspection for Higher-Assurance Software Security in
                  Open Source},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.211},
  doi          = {10.1109/HICSS.2010.211},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/McDermott10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/KimMK10,
  author       = {Anya Kim and
                  John P. McDermott and
                  Myong H. Kang},
  title        = {Security and Architectural Issues for National Security Cloud Computing},
  booktitle    = {30th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy},
  pages        = {21--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCSW.2010.32},
  doi          = {10.1109/ICDCSW.2010.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/KimMK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2010,
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261},
  doi          = {10.1145/1920261},
  isbn         = {978-1-4503-0133-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McDermottKMJK08,
  author       = {John P. McDermott and
                  James Kirby and
                  Bruce E. Montrose and
                  Travis Johnson and
                  Myong H. Kang},
  title        = {Re-engineering Xen internals for higher-assurance security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {17--24},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.01.001},
  doi          = {10.1016/J.ISTR.2008.01.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/McDermottKMJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McDermottF08,
  author       = {John P. McDermott and
                  Leo Freitas},
  editor       = {Vitaly Shmatikov},
  title        = {A formal security policy for xenon},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456401},
  doi          = {10.1145/1456396.1456401},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McDermottF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FoleySLSKMTOSFBB05,
  author       = {Simon N. Foley and
                  Abe Singer and
                  Michael E. Locasto and
                  Stelios Sidiroglou and
                  Angelos D. Keromytis and
                  John P. McDermott and
                  Julie Thorpe and
                  Paul C. van Oorschot and
                  Anil Somayaji and
                  Richard Ford and
                  Mark Bush and
                  Alex Boulatov},
  title        = {Highlights from the 2005 New Security Paradigms Workshop},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {393--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.29},
  doi          = {10.1109/CSAC.2005.29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FoleySLSKMTOSFBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermott05,
  author       = {John P. McDermott},
  editor       = {Simon N. Foley},
  title        = {Visual security protocol modeling},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead,
                  California, USA, September 20-23, 2005},
  pages        = {97--109},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1146269.1146293},
  doi          = {10.1145/1146269.1146293},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermott05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermottKF03,
  author       = {John P. McDermott and
                  Anya Kim and
                  Judith N. Froscher},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {Merging paradigms of survivability and security: stochastic faults
                  and designed faults},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {19--25},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986659},
  doi          = {10.1145/986655.986659},
  timestamp    = {Wed, 14 Nov 2018 10:52:51 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermottKF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermott01,
  author       = {John P. McDermott},
  title        = {Abuse-Case-Based Assurance Arguments},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {366--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991553},
  doi          = {10.1109/ACSAC.2001.991553},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermott01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottF99,
  author       = {John P. McDermott and
                  Chris Fox},
  title        = {Using Abuse Case Models for Security Requirements Analysis},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816013},
  doi          = {10.1109/CSAC.1999.816013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/McDermott98,
  author       = {John P. McDermott},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity
                  Attacks},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {48--51},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310911},
  doi          = {10.1145/310889.310911},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/McDermott98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottGO97,
  author       = {John P. McDermott and
                  R. Gelinas and
                  S. Ornstein},
  title        = {Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {265},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646199},
  doi          = {10.1109/CSAC.1997.646199},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottGO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermott97,
  author       = {John P. McDermott},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {Replication Does Survive Information Warfare Attacks},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {219--228},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Wed, 24 Sep 2003 08:16:49 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermott97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/McDermottM96,
  author       = {John P. McDermott and
                  Ravi Mukkamala},
  title        = {A Performance Comparison of Five Transaction Processing Algorithms
                  for the {SINTRA} Replicated-Architecture Database system},
  journal      = {J. Comput. Secur.},
  volume       = {4},
  number       = {2/3},
  pages        = {189--228},
  year         = {1996},
  url          = {https://doi.org/10.3233/JCS-1996-42-305},
  doi          = {10.3233/JCS-1996-42-305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/McDermottM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/KatzenbergPM96,
  author       = {Barbara Katzenberg and
                  Fred Pickard and
                  John P. McDermott},
  editor       = {Mark S. Ackerman and
                  Gary M. Olson and
                  Judith S. Olson},
  title        = {Computer Support for Clinical Practice: Embedding and Evolving Protocols
                  of Care},
  booktitle    = {{CSCW} '96, Proceedings of the {ACM} 1996 Conference on Computer Supported
                  Cooperative Work, Boston, MA, USA, November 16-20, 1996},
  pages        = {364--369},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/240080.240346},
  doi          = {10.1145/240080.240346},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscw/KatzenbergPM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/McDermottG96,
  author       = {John P. McDermott and
                  David M. Goldschlag},
  title        = {Towards a model of storage jamming},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {176},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503703},
  doi          = {10.1109/CSFW.1996.503703},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/McDermottG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermottG95,
  author       = {John P. McDermott and
                  David M. Goldschlag},
  editor       = {David L. Spooner and
                  Steven A. Demurjian and
                  John E. Dobson},
  title        = {Storage Jamming},
  booktitle    = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth
                  Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville,
                  New York, USA, 13-16 August 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {51},
  pages        = {365--381},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 24 Oct 2002 16:18:58 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermottG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MitchellCFMZ94,
  author       = {Tom M. Mitchell and
                  Rich Caruana and
                  Dayne Freitag and
                  John P. McDermott and
                  David Zabowski},
  title        = {Experience with a Learning Personal Assistant},
  journal      = {Commun. {ACM}},
  volume       = {37},
  number       = {7},
  pages        = {80--91},
  year         = {1994},
  url          = {https://doi.org/10.1145/176789.176798},
  doi          = {10.1145/176789.176798},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MitchellCFMZ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LandwehrBMC94,
  author       = {Carl E. Landwehr and
                  Alan R. Bull and
                  John P. McDermott and
                  William S. Choi},
  title        = {A Taxonomy of Computer Program Security Flaws},
  journal      = {{ACM} Comput. Surv.},
  volume       = {26},
  number       = {3},
  pages        = {211--254},
  year         = {1994},
  url          = {https://doi.org/10.1145/185403.185412},
  doi          = {10.1145/185403.185412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/LandwehrBMC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/KlinkerLMMY94,
  author       = {Georg Klinker and
                  Marc Linster and
                  David Marques and
                  John P. McDermott and
                  Gregg Yost},
  title        = {Exploiting problem descriptions to provide assistance with the Sisyphus
                  task},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {40},
  number       = {2},
  pages        = {293--314},
  year         = {1994},
  url          = {https://doi.org/10.1006/ijhc.1994.1014},
  doi          = {10.1006/IJHC.1994.1014},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/KlinkerLMMY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FroscherKMCL94,
  author       = {Judith N. Froscher and
                  Myong H. Kang and
                  John P. McDermott and
                  Oliver Costich and
                  Carl E. Landwehr},
  title        = {A practical approach to high assurance multilevel secure computing
                  service},
  booktitle    = {10th Annual Computer Security Applications Conference, {ACSAC} 1994,
                  5-9 December, 1994 Orlando, FL, {USA}},
  pages        = {2--11},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSAC.1994.367324},
  doi          = {10.1109/CSAC.1994.367324},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FroscherKMCL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/KatzenbergM94,
  author       = {Barbara Katzenberg and
                  John P. McDermott},
  editor       = {John B. Smith and
                  F. Donelson Smith and
                  Thomas W. Malone},
  title        = {Meaning-Making in the Creation of Useful Summary Reports},
  booktitle    = {{CSCW} '94, Proceedings of the Conference on Computer Supported Cooperative
                  Work, Chapel Hill, NC, USA, October 22-26, 1994},
  pages        = {199--206},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/192844.193010},
  doi          = {10.1145/192844.193010},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscw/KatzenbergM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CostichMM94,
  author       = {Oliver Costich and
                  John McLean and
                  John P. McDermott},
  title        = {Confidentiality in a Replicated Architecture Trusted Database System:
                  {A} Formal Model},
  booktitle    = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia,
                  New Hampshire, USA, June 14-16, 1994, Proceedings},
  pages        = {60--65},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSFW.1994.315947},
  doi          = {10.1109/CSFW.1994.315947},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CostichMM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermott94,
  author       = {John P. McDermott},
  editor       = {Joachim Biskup and
                  Matthew Morgenstern and
                  Carl E. Landwehr},
  title        = {The b{\({^2}\)}/c{\({^3}\)} Problem: How Big Buffers Overcome Convert
                  Channel Cynicism in Trusted Database Systems},
  booktitle    = {Database Security, {VIII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth,
                  Germany, 23-26 August, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-60}},
  pages        = {111--122},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermott94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ekaw/YostKLMM94,
  author       = {Gregg Yost and
                  Georg Klinker and
                  Marc Linster and
                  David Marques and
                  John P. McDermott},
  editor       = {Luc Steels and
                  Guus Schreiber and
                  Walter Van de Velde},
  title        = {The {SBF} Framework, 1989-1994: From Applications to Workplaces},
  booktitle    = {A Future for Knowledge Acquisition, 8th European Knowledge Acquisition
                  Workshop, EKAW'94, Hoegaarden, Belgium, September 26-29, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {867},
  pages        = {318--339},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58487-0\_17},
  doi          = {10.1007/3-540-58487-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ekaw/YostKLMM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/McDermott93a,
  author       = {John P. McDermott},
  title        = {{R1} ("XCON") at Age 12: Lessons from an Elementary School
                  Achiever},
  journal      = {Artif. Intell.},
  volume       = {59},
  number       = {1-2},
  pages        = {241--247},
  year         = {1993},
  url          = {https://doi.org/10.1016/0004-3702(93)90192-E},
  doi          = {10.1016/0004-3702(93)90192-E},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/McDermott93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermottM93,
  author       = {John P. McDermott and
                  Ravi Mukkamala},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {Performance Analysis of Transaction Management Algorithms for the
                  {SINTRA} Replicated-Architecture Database System},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {215--234},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermottM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/MarquesDKMT92,
  author       = {David Marques and
                  Geoffroy Dallemagne and
                  Georg Klinker and
                  John P. McDermott and
                  David Tung},
  title        = {Easy Programming: Empowering People to Build Their Own Applications},
  journal      = {{IEEE} Expert},
  volume       = {7},
  number       = {3},
  pages        = {16--29},
  year         = {1992},
  url          = {https://doi.org/10.1109/64.143235},
  doi          = {10.1109/64.143235},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/MarquesDKMT92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/DentBMMZ92,
  author       = {C. Lisa Dent and
                  Jesus Boticario and
                  John P. McDermott and
                  Tom M. Mitchell and
                  David Zabowski},
  editor       = {William R. Swartout},
  title        = {A Personal Learning Apprentice},
  booktitle    = {Proceedings of the 10th National Conference on Artificial Intelligence,
                  San Jose, CA, USA, July 12-16, 1992},
  pages        = {96--103},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {1992},
  url          = {http://www.aaai.org/Library/AAAI/1992/aaai92-015.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/DentBMMZ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermottJ92,
  author       = {John P. McDermott and
                  Sushil Jajodia},
  editor       = {Bhavani Thuraisingham and
                  Carl E. Landwehr},
  title        = {Orange Locking: Channel-Free Database Concurrency Control Via Locking},
  booktitle    = {Database Security, {VI:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21
                  August 1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-21}},
  pages        = {267--284},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermottJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CostichM92,
  author       = {Oliver Costich and
                  John P. McDermott},
  title        = {A multilevel transaction problem for multilevel secure database systems
                  and its solution for the replicated architecture},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {192--203},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213261},
  doi          = {10.1109/RISP.1992.213261},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CostichM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottJS91,
  author       = {John P. McDermott and
                  Sushil Jajodia and
                  Ravi S. Sandhu},
  title        = {A single-level scheduler for the replicated architecture for multilevel-secure
                  databases},
  booktitle    = {Seventh Annual Computer Security Applications Conference, {ACSAC}
                  1991, 2-6 December, 1991, San Antonio, Texas, {USA}},
  pages        = {2--11},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSAC.1991.213023},
  doi          = {10.1109/CSAC.1991.213023},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottJS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ckec/DallemagneKMMT91,
  author       = {Geoffroy Dallemagne and
                  Georg Klinker and
                  David Marques and
                  John P. McDermott and
                  David Tung},
  editor       = {Franz Schmalhofer and
                  Gerhard Strube and
                  Thomas Wetter},
  title        = {Making Application Programming More Worthwile},
  booktitle    = {Contemporary Knowledge Engineering and Cognition, First Joint Workshop,
                  Kaiserslautern, Germany, February 21-22, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {622},
  pages        = {6--22},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0045678},
  doi          = {10.1007/BFB0045678},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ckec/DallemagneKMMT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mit/PF91/SchlimmerMM91,
  author       = {Jeffrey C. Schlimmer and
                  Tom M. Mitchell and
                  John P. McDermott},
  editor       = {Gregory Piatetsky{-}Shapiro and
                  William J. Frawley},
  title        = {Justification-Based Refinement of Expert Knowledge},
  booktitle    = {Knowledge Discovery in Databases},
  pages        = {397--410},
  publisher    = {{AAAI/MIT} Press},
  year         = {1991},
  timestamp    = {Sat, 03 Aug 2019 19:21:51 +0200},
  biburl       = {https://dblp.org/rec/books/mit/PF91/SchlimmerMM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/McDermott90,
  author       = {John P. McDermott},
  editor       = {Howard E. Shrobe and
                  Thomas G. Dietterich and
                  William R. Swartout},
  title        = {Developing Software is like Talking to Eskimos about Snow},
  booktitle    = {Proceedings of the 8th National Conference on Artificial Intelligence.
                  Boston, Massachusetts, USA, July 29 - August 3, 1990, 2 Volumes},
  pages        = {1130--1133},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {1990},
  url          = {http://www.aaai.org/Library/AAAI/1990/aaai90-169.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/McDermott90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PayneFM90,
  author       = {Christian N. Payne and
                  Judith N. Froscher and
                  John P. McDermott},
  title        = {On models for a trusted application system},
  booktitle    = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990,
                  3-7 December, 1990, Tucson, Arizona, {USA}},
  pages        = {58--67},
  publisher    = {{IEEE}},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSAC.1990.143752},
  doi          = {10.1109/CSAC.1990.143752},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PayneFM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FroscherMPL90,
  author       = {Judith N. Froscher and
                  John P. McDermott and
                  Christian N. Payne and
                  Herman Otto Lubbes},
  title        = {Successful acquisition of certifiable application systems (or: How
                  not to shake hands with the tar baby)},
  booktitle    = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990,
                  3-7 December, 1990, Tucson, Arizona, {USA}},
  pages        = {414--422},
  publisher    = {{IEEE}},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSAC.1990.143817},
  doi          = {10.1109/CSAC.1990.143817},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FroscherMPL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottFPL90,
  author       = {John P. McDermott and
                  Judith N. Froscher and
                  Christian N. Payne and
                  Herman Otto Lubbes},
  title        = {Informal top-level specifications for trusted application systems},
  booktitle    = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990,
                  3-7 December, 1990, Tucson, Arizona, {USA}},
  pages        = {423--433},
  publisher    = {{IEEE}},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSAC.1990.143818},
  doi          = {10.1109/CSAC.1990.143818},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottFPL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/MarcusM89,
  author       = {Sandra Marcus and
                  John P. McDermott},
  title        = {{SALT:} {A} Knowledge Acquisition Language for Propose-and-Revise
                  Systems},
  journal      = {Artif. Intell.},
  volume       = {39},
  number       = {1},
  pages        = {1--37},
  year         = {1989},
  url          = {https://doi.org/10.1016/0004-3702(89)90002-7},
  doi          = {10.1016/0004-3702(89)90002-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/MarcusM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/McDermott89,
  author       = {John P. McDermott},
  title        = {The World Would Be a Better Place if Non-Programmers Could Program},
  journal      = {Mach. Learn.},
  volume       = {4},
  pages        = {337--338},
  year         = {1989},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ml/McDermott89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/MarcusSM88,
  author       = {Sandra Marcus and
                  Jeffrey Stout and
                  John P. McDermott},
  title        = {{VT:} An Expert Elevator Designer That Uses Knowledge-Based Backtracking},
  journal      = {{AI} Mag.},
  volume       = {9},
  number       = {1},
  pages        = {95--112},
  year         = {1988},
  url          = {https://ojs.aaai.org/index.php/aimagazine/article/view/664},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/MarcusSM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/StoutCMM88,
  author       = {Jeffrey Stout and
                  Gilbert Caplain and
                  Sandra Marcus and
                  John P. McDermott},
  title        = {Toward Automating Recognition of Differing Problem-Solving Demands},
  journal      = {Int. J. Man Mach. Stud.},
  volume       = {29},
  number       = {5},
  pages        = {599--611},
  year         = {1988},
  url          = {https://doi.org/10.1016/S0020-7373(88)80015-4},
  doi          = {10.1016/S0020-7373(88)80015-4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmms/StoutCMM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/KlinkerGM88,
  author       = {Georg Klinker and
                  Serge Genetet and
                  John P. McDermott},
  title        = {Knowledge Acquisition for Evaluation Systems},
  journal      = {Int. J. Man Mach. Stud.},
  volume       = {29},
  number       = {6},
  pages        = {715--731},
  year         = {1988},
  url          = {https://doi.org/10.1016/S0020-7373(88)80075-0},
  doi          = {10.1016/S0020-7373(88)80075-0},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmms/KlinkerGM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/EshelmanEMT87,
  author       = {Larry J. Eshelman and
                  Damien Ehret and
                  John P. McDermott and
                  Ming Tan},
  title        = {{MOLE:} {A} Tenacious Knowledge-Acquisition Tool},
  journal      = {Int. J. Man Mach. Stud.},
  volume       = {26},
  number       = {1},
  pages        = {41--54},
  year         = {1987},
  url          = {https://doi.org/10.1016/S0020-7373(87)80034-2},
  doi          = {10.1016/S0020-7373(87)80034-2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmms/EshelmanEMT87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/KlinkerBGGM87,
  author       = {Georg Klinker and
                  Joel Bentolila and
                  Serge Genetet and
                  Michael Grimes and
                  John P. McDermott},
  title        = {{KNACK} - Report-Driven Knowledge Acquisition},
  journal      = {Int. J. Man Mach. Stud.},
  volume       = {26},
  number       = {1},
  pages        = {65--79},
  year         = {1987},
  url          = {https://doi.org/10.1016/S0020-7373(87)80036-6},
  doi          = {10.1016/S0020-7373(87)80036-6},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmms/KlinkerBGGM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/KlinkerBGM87,
  author       = {Georg Klinker and
                  Casey Boyd and
                  Serge Genetet and
                  John P. McDermott},
  editor       = {Kenneth D. Forbus and
                  Howard E. Shrobe},
  title        = {A {KNACK} for Knowledge Acquisition},
  booktitle    = {Proceedings of the 6th National Conference on Artificial Intelligence.
                  Seattle, WA, USA, July 1987},
  pages        = {488--493},
  publisher    = {Morgan Kaufmann},
  year         = {1987},
  url          = {http://www.aaai.org/Library/AAAI/1987/aaai87-087.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/KlinkerBGM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ijcai/1987,
  editor       = {John P. McDermott},
  title        = {Proceedings of the 10th International Joint Conference on Artificial
                  Intelligence. Milan, Italy, August 23-28, 1987},
  publisher    = {Morgan Kaufmann},
  year         = {1987},
  url          = {http://ijcai.org/proceedings/1987-1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/1987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/KahnM86,
  author       = {Gary S. Kahn and
                  John P. McDermott},
  title        = {The Mud System},
  journal      = {{IEEE} Expert},
  volume       = {1},
  number       = {1},
  pages        = {23--32},
  year         = {1986},
  url          = {https://doi.org/10.1109/MEX.1986.5006495},
  doi          = {10.1109/MEX.1986.5006495},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/KahnM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/BrugBM86,
  author       = {Arnold van de Brug and
                  Judith Bachant and
                  John P. McDermott},
  title        = {The Taming of {R1}},
  journal      = {{IEEE} Expert},
  volume       = {1},
  number       = {3},
  pages        = {33--39},
  year         = {1986},
  url          = {https://doi.org/10.1109/MEX.1986.4306978},
  doi          = {10.1109/MEX.1986.4306978},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/BrugBM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/KimM86,
  author       = {Jin Kim and
                  John P. McDermott},
  title        = {Computer Aids for {IC} Design},
  journal      = {{IEEE} Softw.},
  volume       = {3},
  number       = {2},
  pages        = {38--47},
  year         = {1986},
  url          = {https://doi.org/10.1109/MS.1986.233072},
  doi          = {10.1109/MS.1986.233072},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/KimM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/EshelmanM86,
  author       = {Larry J. Eshelman and
                  John P. McDermott},
  editor       = {Tom Kehler and
                  Stanley J. Rosenschein},
  title        = {{MOLE:} {A} Knowledge Acquisition Tool that Uses its Head},
  booktitle    = {Proceedings of the 5th National Conference on Artificial Intelligence.
                  Philadelphia, PA, USA, August 11-15, 1986. Volume 2: Engineering},
  pages        = {950--955},
  publisher    = {Morgan Kaufmann},
  year         = {1986},
  url          = {http://www.aaai.org/Library/AAAI/1986/aaai86-157.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/EshelmanM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/AikinsHMSS86,
  author       = {Janice S. Aikins and
                  Frederick Hayes{-}Roth and
                  John P. McDermott and
                  Herbert Schorr and
                  Reid G. Smith},
  editor       = {Tom Kehler and
                  Stanley J. Rosenschein},
  title        = {Panel: Directions for Expert Systems},
  booktitle    = {Proceedings of the 5th National Conference on Artificial Intelligence.
                  Philadelphia, PA, USA, August 11-15, 1986. Volume 2: Engineering},
  pages        = {1150},
  publisher    = {Morgan Kaufmann},
  year         = {1986},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaai/AikinsHMSS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/NechesFKMP86,
  author       = {Robert Neches and
                  Richard Fikes and
                  Casimir A. Kulikowski and
                  John P. McDermott and
                  Ramesh S. Patil},
  editor       = {Tom Kehler and
                  Stanley J. Rosenschein},
  title        = {Panel: Knowledge Representation Meets Knowledge Acquisition: What
                  Are the Needs and Where Is the Leverage?},
  booktitle    = {Proceedings of the 5th National Conference on Artificial Intelligence.
                  Philadelphia, PA, USA, August 11-15, 1986. Volume 2: Engineering},
  pages        = {1153},
  publisher    = {Morgan Kaufmann},
  year         = {1986},
  url          = {http://www.aaai.org/Library/AAAI/1986/aaai86-193.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/NechesFKMP86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/McDermott86,
  author       = {John P. McDermott},
  editor       = {Hans{-}J{\"{u}}rgen Kugler},
  title        = {Making Expert Systems Explicit (Invited Paper)},
  booktitle    = {Information Processing 86, Proceedings of the {IFIP} 10th World Computer
                  Congress, Dublin, Ireland, September 1-5, 1986},
  pages        = {539--544},
  publisher    = {North-Holland/IFIP},
  year         = {1986},
  timestamp    = {Sun, 28 Jul 2019 12:54:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/McDermott86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/McDermottWCMS85,
  author       = {Drew V. McDermott and
                  M. Mitchell Waldrop and
                  B. Chandrasekaran and
                  John P. McDermott and
                  Roger C. Schank},
  title        = {The Dark Ages of {AI:} {A} Panel Discussion at {AAAI-84}},
  journal      = {{AI} Mag.},
  volume       = {6},
  number       = {3},
  pages        = {122--134},
  year         = {1985},
  url          = {https://ojs.aaai.org/index.php/aimagazine/article/view/494},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/McDermottWCMS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/KahnNM85,
  author       = {Gary S. Kahn and
                  Steven J. Nowlan and
                  John P. McDermott},
  title        = {Strategies for Knowledge Acquisition},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {7},
  number       = {5},
  pages        = {511--522},
  year         = {1985},
  url          = {https://doi.org/10.1109/TPAMI.1985.4767699},
  doi          = {10.1109/TPAMI.1985.4767699},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/KahnNM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/RosenbloomLMNO85,
  author       = {Paul S. Rosenbloom and
                  John E. Laird and
                  John P. McDermott and
                  Allen Newell and
                  Edmund Orciuch},
  title        = {R1-Soar: An Experiment in Knowledge-Intensive Programming in a Problem-Solving
                  Architecture},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {7},
  number       = {5},
  pages        = {561--569},
  year         = {1985},
  url          = {https://doi.org/10.1109/TPAMI.1985.4767703},
  doi          = {10.1109/TPAMI.1985.4767703},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pami/RosenbloomLMNO85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/McKeownHM85,
  author       = {David M. McKeown Jr. and
                  Wilson A. Harvey and
                  John P. McDermott},
  title        = {Rule-Based Interpretation of Aerial Imagery},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {7},
  number       = {5},
  pages        = {570--585},
  year         = {1985},
  url          = {https://doi.org/10.1109/TPAMI.1985.4767704},
  doi          = {10.1109/TPAMI.1985.4767704},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/McKeownHM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caia/McDermott85,
  author       = {John P. McDermott},
  editor       = {Charles R. Weisbin},
  title        = {Where Knowledge Acquisition Tools Fit in the Scheme of Things},
  booktitle    = {Artificial Intelligence Applications, {CAIA} 1985, The Engineering
                  of Knowledge-Based Systems, Proceedings of the Second Conference,
                  Miami Beach, Florida, USA, December 11-13, 1985},
  pages        = {222},
  publisher    = {{IEEE} Computer Society / North-Holland},
  year         = {1985},
  timestamp    = {Tue, 30 May 2006 14:03:38 +0200},
  biburl       = {https://dblp.org/rec/conf/caia/McDermott85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caia/BrugBM85,
  author       = {Arnold van de Brug and
                  Judith Bachant and
                  John P. McDermott},
  editor       = {Charles R. Weisbin},
  title        = {Doing {R1} with Style},
  booktitle    = {Artificial Intelligence Applications, {CAIA} 1985, The Engineering
                  of Knowledge-Based Systems, Proceedings of the Second Conference,
                  Miami Beach, Florida, USA, December 11-13, 1985},
  pages        = {244--249},
  publisher    = {{IEEE} Computer Society / North-Holland},
  year         = {1985},
  timestamp    = {Thu, 10 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caia/BrugBM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/db-workshops/FoxM85,
  author       = {Mark S. Fox and
                  John P. McDermott},
  editor       = {Michael L. Brodie and
                  John Mylopoulos},
  title        = {The Role of Databases in Knowledge-Based Systems},
  booktitle    = {On Knowledge Base Management Systems: Integrating Artificial Intelligence
                  and Database Technologies, Book resulting from the Islamorada Workshop
                  1985 (Islamorada, FL, {USA)}},
  series       = {Topics in Information Systems},
  pages        = {407--430},
  publisher    = {Springer},
  year         = {1985},
  timestamp    = {Sat, 03 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/db-workshops/FoxM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/KahnNM85,
  author       = {Gary S. Kahn and
                  Steven J. Nowlan and
                  John P. McDermott},
  editor       = {Aravind K. Joshi},
  title        = {{MORE:} An Intelligent Knowledge Acquisition Tool},
  booktitle    = {Proceedings of the 9th International Joint Conference on Artificial
                  Intelligence. Los Angeles, CA, USA, August 1985},
  pages        = {581--584},
  publisher    = {Morgan Kaufmann},
  year         = {1985},
  url          = {http://ijcai.org/Proceedings/85-1/Papers/110.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:19:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/KahnNM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/MarcusMW85,
  author       = {Sandra Marcus and
                  John P. McDermott and
                  Tianran Wang},
  editor       = {Aravind K. Joshi},
  title        = {Knowledge Acquisition for Constructive Systems},
  booktitle    = {Proceedings of the 9th International Joint Conference on Artificial
                  Intelligence. Los Angeles, CA, USA, August 1985},
  pages        = {637--639},
  publisher    = {Morgan Kaufmann},
  year         = {1985},
  url          = {http://ijcai.org/Proceedings/85-1/Papers/123.pdf},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/MarcusMW85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/McDermottB84,
  author       = {John P. McDermott and
                  Judith Bachant},
  title        = {{R1} Revisited: Four Years in the Trenches},
  journal      = {{AI} Mag.},
  volume       = {5},
  number       = {3},
  pages        = {21--32},
  year         = {1984},
  url          = {https://ojs.aaai.org/index.php/aimagazine/article/view/445},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/McDermottB84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/McDermott83,
  author       = {John P. McDermott},
  title        = {The Knowledge Engineering Process},
  journal      = {{IEEE} Database Eng. Bull.},
  volume       = {6},
  number       = {4},
  pages        = {30--37},
  year         = {1983},
  url          = {http://sites.computer.org/debull/83DEC-CD.pdf},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/McDermott83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/KimM83,
  author       = {Jin Kim and
                  John P. McDermott},
  editor       = {Michael R. Genesereth},
  title        = {{TALIB:} An {IC} Layout Design Assistant},
  booktitle    = {Proceedings of the National Conference on Artificial Intelligence,
                  Washington, D.C., USA, August 22-26, 1983},
  pages        = {197--201},
  publisher    = {{AAAI} Press},
  year         = {1983},
  url          = {http://www.aaai.org/Library/AAAI/1983/aaai83-077.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/KimM83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/McDermott83,
  author       = {John P. McDermott},
  editor       = {Alan Bundy},
  title        = {Extracting Knowledge From Expert Systems},
  booktitle    = {Proceedings of the 8th International Joint Conference on Artificial
                  Intelligence. Karlsruhe, FRG, August 1983},
  pages        = {100--107},
  publisher    = {William Kaufmann},
  year         = {1983},
  url          = {http://ijcai.org/Proceedings/83-1/Papers/023.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:18:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/McDermott83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/MasuiMS83,
  author       = {Shoichi Masui and
                  John P. McDermott and
                  Alan Sobel},
  editor       = {Alan Bundy},
  title        = {Decision-Making in Time-Critical Situations},
  booktitle    = {Proceedings of the 8th International Joint Conference on Artificial
                  Intelligence. Karlsruhe, FRG, August 1983},
  pages        = {233--235},
  publisher    = {William Kaufmann},
  year         = {1983},
  url          = {http://ijcai.org/Proceedings/83-1/Papers/052.pdf},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/MasuiMS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/McDermott82,
  author       = {John P. McDermott},
  title        = {{R1:} {A} Rule-Based Configurer of Computer Systems},
  journal      = {Artif. Intell.},
  volume       = {19},
  number       = {1},
  pages        = {39--88},
  year         = {1982},
  url          = {https://doi.org/10.1016/0004-3702(82)90021-2},
  doi          = {10.1016/0004-3702(82)90021-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/McDermott82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/McDermottS81,
  author       = {John P. McDermott and
                  Barbara Steele},
  editor       = {Patrick J. Hayes},
  title        = {Extending a Knowledge-Based System to Deal with Ad Hoc Constraints},
  booktitle    = {Proceedings of the 7th International Joint Conference on Artificial
                  Intelligence, {IJCAI} '81, Vancouver, BC, Canada, August 24-28, 1981},
  pages        = {824--828},
  publisher    = {William Kaufmann},
  year         = {1981},
  timestamp    = {Tue, 20 Aug 2019 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/McDermottS81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/McDermott80,
  author       = {John P. McDermott},
  title        = {Nils J. Nilsson, Principles of Artificial lntelligence},
  journal      = {Artif. Intell.},
  volume       = {15},
  number       = {1-2},
  pages        = {127--131},
  year         = {1980},
  url          = {https://doi.org/10.1016/0004-3702(80)90026-0},
  doi          = {10.1016/0004-3702(80)90026-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/McDermott80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/McDermott80,
  author       = {John P. McDermott},
  title        = {{R1:} The Formative Years},
  journal      = {{AI} Mag.},
  volume       = {2},
  number       = {2},
  pages        = {21--29},
  year         = {1980},
  url          = {https://ojs.aaai.org/index.php/aimagazine/article/view/100},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/McDermott80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/McDermott80a,
  author       = {John P. McDermott},
  editor       = {Robert Balzer},
  title        = {{RI:} an Expert in the Computer Systems Domain},
  booktitle    = {Proceedings of the 1st Annual National Conference on Artificial Intelligence,
                  Stanford University, CA, USA, August 18-21, 1980},
  pages        = {269--271},
  publisher    = {{AAAI} Press/MIT Press},
  year         = {1980},
  url          = {http://www.aaai.org/Library/AAAI/1980/aaai80-076.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/McDermott80a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Hayes-RothM78,
  author       = {Frederick Hayes{-}Roth and
                  John P. McDermott},
  title        = {An Interference Matching Technique for Inducing Abstractions},
  journal      = {Commun. {ACM}},
  volume       = {21},
  number       = {5},
  pages        = {401--410},
  year         = {1978},
  url          = {https://doi.org/10.1145/359488.359503},
  doi          = {10.1145/359488.359503},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Hayes-RothM78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigart/McDermottF77,
  author       = {John P. McDermott and
                  Charles Forgy},
  title        = {Production system conflict resolution strategies},
  journal      = {{SIGART} Newsl.},
  volume       = {63},
  pages        = {37},
  year         = {1977},
  url          = {https://doi.org/10.1145/1045343.1045364},
  doi          = {10.1145/1045343.1045364},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigart/McDermottF77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigart/McDermottNM77,
  author       = {John P. McDermott and
                  Allen Newell and
                  J. Moore},
  title        = {The efficiency of certain production system implementations},
  journal      = {{SIGART} Newsl.},
  volume       = {63},
  pages        = {38},
  year         = {1977},
  url          = {https://doi.org/10.1145/1045343.1045366},
  doi          = {10.1145/1045343.1045366},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigart/McDermottNM77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/RychenerFLMNR77,
  author       = {Michael D. Rychener and
                  Charles Forgy and
                  Pat Langley and
                  John P. McDermott and
                  Allen Newell and
                  K. Ramakrishna},
  editor       = {Raj Reddy},
  title        = {Problems in Building an Instructable Production System},
  booktitle    = {Proceedings of the 5th International Joint Conference on Artificial
                  Intelligence. Cambridge, MA, USA, August 22-25, 1977},
  pages        = {337},
  publisher    = {William Kaufmann},
  year         = {1977},
  url          = {http://ijcai.org/Proceedings/77-1/Papers/055.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:18:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/RychenerFLMNR77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/Hayes-RothM77,
  author       = {Frederick Hayes{-}Roth and
                  John P. McDermott},
  editor       = {Raj Reddy},
  title        = {Knowledge Acquisition from Structural Descriptions},
  booktitle    = {Proceedings of the 5th International Joint Conference on Artificial
                  Intelligence. Cambridge, MA, USA, August 22-25, 1977},
  pages        = {356--362},
  publisher    = {William Kaufmann},
  year         = {1977},
  url          = {http://ijcai.org/Proceedings/77-1/Papers/062.pdf},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/Hayes-RothM77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/LenatM77,
  author       = {Douglas B. Lenat and
                  John P. McDermott},
  editor       = {Raj Reddy},
  title        = {Less Than General Production System Architectures},
  booktitle    = {Proceedings of the 5th International Joint Conference on Artificial
                  Intelligence. Cambridge, MA, USA, August 22-25, 1977},
  pages        = {928--932},
  publisher    = {William Kaufmann},
  year         = {1977},
  url          = {http://ijcai.org/Proceedings/77-2/Papers/080.pdf},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/LenatM77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ForgyM77,
  author       = {Charles Forgy and
                  John P. McDermott},
  editor       = {Raj Reddy},
  title        = {OPS, {A} Domain-Independent Production System Language},
  booktitle    = {Proceedings of the 5th International Joint Conference on Artificial
                  Intelligence. Cambridge, MA, USA, August 22-25, 1977},
  pages        = {933--939},
  publisher    = {William Kaufmann},
  year         = {1977},
  url          = {http://ijcai.org/Proceedings/77-2/Papers/081.pdf},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/ForgyM77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics