default search action
BibTeX records: John Aycock
@article{DBLP:journals/annals/DurnoAT25,
author = {John Durno and
John Aycock and
Alexandra Tenney},
title = {Big Baggy Shorts: Recovering Data From Canada's Telidon System},
journal = {{IEEE} Ann. Hist. Comput.},
volume = {47},
number = {1},
pages = {64--71},
year = {2025},
url = {https://doi.org/10.1109/MAHC.2025.3536816},
doi = {10.1109/MAHC.2025.3536816},
timestamp = {Tue, 08 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/annals/DurnoAT25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cig/AycockBKTQS25,
author = {John Aycock and
Katie Biittner and
Syeda Zainab Khaleel and
Carl Therrien and
Allie Querengesser and
Hailey Sikstrom},
title = {{AI} vs. {AI:} Comparing Artificial Intelligence with Actual Intelligence
for a Gameplay Task},
booktitle = {{IEEE} Conference on Games, CoG 2025, Lisbon, Portugal, August 26-29,
2025},
pages = {1--4},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/CoG64752.2025.11114144},
doi = {10.1109/COG64752.2025.11114144},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cig/AycockBKTQS25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cig/GaneshAB23,
author = {Shankar Ganesh and
John Aycock and
Katie Biittner},
title = {FrAG: {A} Framework for the Analysis of Games},
booktitle = {{IEEE} Conference on Games, CoG 2023, Boston, MA, USA, August 21-24,
2023},
pages = {1--4},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/CoG57401.2023.10333209},
doi = {10.1109/COG57401.2023.10333209},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cig/GaneshAB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Aycock23,
author = {John Aycock},
editor = {Mikko{-}Jussi Laakso and
Mattia Monga and
Simon and
Judithe Sheard},
title = {Binary Reverse Engineering for All},
booktitle = {Proceedings of the 2023 Conference on Innovation and Technology in
Computer Science Education V. 1, ITiCSE 2023, Turku, Finland, July
7-12, 2023},
pages = {243--249},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3587102.3588790},
doi = {10.1145/3587102.3588790},
timestamp = {Fri, 07 Jul 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iticse/Aycock23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wccce/KendonWA23,
author = {Tyson Kendon and
Leanne Wu and
John Aycock},
editor = {Oluwakemi Ola and
Brian Harrington},
title = {AI-Generated Code Not Considered Harmful},
booktitle = {Proceedings of the 25th Western Canadian Conference on Computing Education,
{WCCCE} 2023, Vancouver, BC, Canada, May 4-5, 2023},
pages = {3:1--3:7},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3593342.3593349},
doi = {10.1145/3593342.3593349},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wccce/KendonWA23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wccce/Aycock23,
author = {John Aycock},
editor = {Oluwakemi Ola and
Brian Harrington},
title = {spy3: {A} Python Subset for {CS1}},
booktitle = {Proceedings of the 25th Western Canadian Conference on Computing Education,
{WCCCE} 2023, Vancouver, BC, Canada, May 4-5, 2023},
pages = {6:1--6:6},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3593342.3593352},
doi = {10.1145/3593342.3593352},
timestamp = {Sat, 05 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/wccce/Aycock23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdg/AycockGBNT22,
author = {John Aycock and
Shankar Ganesh and
Katie Biittner and
Paul Allen Newell and
Carl Therrien},
editor = {Kostas Karpouzis and
Stefano Gualeni and
Johanna Pirker and
Allan Fowler},
title = {The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use
in Atari 2600 Games},
booktitle = {{FDG} '22: Proceedings of the 17th International Conference on the
Foundations of Digital Games, FDG22, Athens, Greece, September 5-8,
2022},
pages = {26:1--26:10},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3555858.3555948},
doi = {10.1145/3555858.3555948},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/fdg/AycockGBNT22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Aycock21,
author = {John Aycock},
editor = {Carsten Schulte and
Brett A. Becker and
Monica Divitini and
Erik Barendsen},
title = {Teaching Social Engineering Using Improv},
booktitle = {ITiCSE '21: Proceedings of the 26th {ACM} Conference on Innovation
and Technology in Computer Science Education V.2, Virtual Event, Germany,
June 26 - July 1, 2021},
pages = {629--630},
publisher = {{ACM}},
year = {2021},
url = {https://doi.org/10.1145/3456565.3460037},
doi = {10.1145/3456565.3460037},
timestamp = {Tue, 28 May 2024 17:11:48 +0200},
biburl = {https://dblp.org/rec/conf/iticse/Aycock21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdg/AycockB20,
author = {John Aycock and
Katie Biittner},
editor = {Georgios N. Yannakakis and
Antonios Liapis and
Penny Kyburz and
Vanessa Volz and
Foaad Khosmood and
Phil Lopes},
title = {LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure
Creator},
booktitle = {{FDG} '20: International Conference on the Foundations of Digital
Games, Bugibba, Malta, September 15-18, 2020},
pages = {23:1--23:7},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3402942.3402988},
doi = {10.1145/3402942.3402988},
timestamp = {Fri, 04 Jul 2025 22:06:28 +0200},
biburl = {https://dblp.org/rec/conf/fdg/AycockB20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WrightA20,
author = {Hannah Wright and
John Aycock},
editor = {Jian Zhang and
Mark Sherriff and
Sarah Heckman and
Pamela A. Cutter and
Alvaro E. Monge},
title = {10 Binary Games for Computer Science Education},
booktitle = {Proceedings of the 51st {ACM} Technical Symposium on Computer Science
Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020},
pages = {1308},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3328778.3372596},
doi = {10.1145/3328778.3372596},
timestamp = {Tue, 23 Mar 2021 10:54:19 +0100},
biburl = {https://dblp.org/rec/conf/sigcse/WrightA20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gamestudies/AycockF19,
author = {John Aycock and
Patrick Finn},
title = {Uncivil Engineering: {A} Textual Divide in Game Studies},
journal = {Game Stud.},
volume = {19},
number = {3},
year = {2019},
url = {http://gamestudies.org/1903/articles/aycockfinn},
timestamp = {Thu, 25 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/gamestudies/AycockF19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/programming/AycockC19,
author = {John Aycock and
Tara Copplestone},
title = {Entombed: An archaeological examination of an Atari 2600 game},
journal = {Art Sci. Eng. Program.},
volume = {3},
number = {2},
pages = {4},
year = {2019},
url = {https://doi.org/10.22152/programming-journal.org/2019/3/4},
doi = {10.22152/PROGRAMMING-JOURNAL.ORG/2019/3/4},
timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/programming/AycockC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdg/KaltmanOA19,
author = {Eric Kaltman and
Joseph C. Osborn and
John Aycock},
editor = {Sebastian Deterding and
Foaad Khosmood and
Johanna Pirker and
Thomas H. Apperley},
title = {S\({}^{\mbox{4}}\)LVE: shareable videogame analysis and visualization},
booktitle = {Proceedings of the 14th International Conference on the Foundations
of Digital Games, {FDG} 2019, San Luis Obispo, California, USA, August
26-30, 2019},
pages = {61:1--61:5},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3337722.3341826},
doi = {10.1145/3337722.3341826},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/fdg/KaltmanOA19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wccce/AycockWHKLLMSSY19,
author = {John Aycock and
Hannah Wright and
Jannik Hildebrandt and
David Kenny and
Nicole Lefebvre and
Mark Lin and
Maria Mamaclay and
Shanel Sayson and
Aidan Stewart and
Amy Yuen},
editor = {Ben Stephenson},
title = {Adapting the "Unessay" for Use in Computer Science},
booktitle = {Proceedings of the 24th Western Canadian Conference on Computing Education,
{WCCCE} '19, Calgary, AB, Canada, May 3-4, 2019},
pages = {2:1--2:6},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3314994.3325073},
doi = {10.1145/3314994.3325073},
timestamp = {Wed, 19 Aug 2020 16:57:01 +0200},
biburl = {https://dblp.org/rec/conf/wccce/AycockWHKLLMSSY19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/AycockGKC18,
author = {John Aycock and
Andrew Groeneveldt and
Hayden Kroepfl and
Tara Copplestone},
editor = {Irene Polycarpou and
Janet C. Read and
Panayiotis Andreou and
Michal Armoni},
title = {Exercises for teaching reverse engineering},
booktitle = {Proceedings of the 23rd Annual {ACM} Conference on Innovation and
Technology in Computer Science Education, ITiCSE 2018, Larnaca, Cyprus,
July 02-04, 2018},
pages = {188--193},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3197091.3197111},
doi = {10.1145/3197091.3197111},
timestamp = {Fri, 12 Mar 2021 15:27:48 +0100},
biburl = {https://dblp.org/rec/conf/iticse/AycockGKC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Aycock18,
author = {John Aycock},
editor = {Irene Polycarpou and
Janet C. Read and
Panayiotis Andreou and
Michal Armoni},
title = {Stick to the script: lightweight recording and playback of live coding},
booktitle = {Proceedings of the 23rd Annual {ACM} Conference on Innovation and
Technology in Computer Science Education, ITiCSE 2018, Larnaca, Cyprus,
July 02-04, 2018},
pages = {350--351},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3197091.3205830},
doi = {10.1145/3197091.3205830},
timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iticse/Aycock18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-02035,
author = {John Aycock and
Tara Copplestone},
title = {Entombed: An archaeological examination of an Atari 2600 game},
journal = {CoRR},
volume = {abs/1811.02035},
year = {2018},
url = {http://arxiv.org/abs/1811.02035},
eprinttype = {arXiv},
eprint = {1811.02035},
timestamp = {Thu, 22 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1811-02035.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Aycock16,
author = {John Aycock},
title = {Retrogame Archeology - Exploring Old Computer Games},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-30004-7},
doi = {10.1007/978-3-319-30004-7},
isbn = {978-3-319-30002-3},
timestamp = {Tue, 16 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/books/sp/Aycock16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigite/StephensonJBA16,
author = {Ben Stephenson and
Mark James and
Nigel Brooke and
John Aycock},
editor = {Deborah Boisvert and
Stephen J. Zilora},
title = {An Industrial Partnership Game Development Capstone Course},
booktitle = {Proceedings of the 17th Annual Conference on Information Technology
Education and the 5th Annual Conference on Research in Information
Technology, {SIGITE/RIIT} 2016, Boston, MA, USA, September 28 - October
1, 2016},
pages = {136--141},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2978192.2978214},
doi = {10.1145/2978192.2978214},
timestamp = {Sun, 06 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sigite/StephensonJBA16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wccce/Aycock16,
author = {John Aycock},
editor = {Surinder Dhanjal and
Faheem Ahmed},
title = {Code Protection: When Abstinence is not an Option},
booktitle = {Proceedings of the 21st Western Canadian Conference on Computing Education,
{WCCCE} '16, Kamloops, BC, Canada, May 6-7, 2016},
pages = {12:1--12:5},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2910925.2910929},
doi = {10.1145/2910925.2910929},
timestamp = {Tue, 06 Nov 2018 16:59:06 +0100},
biburl = {https://dblp.org/rec/conf/wccce/Aycock16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/Aycock15,
author = {John Aycock},
title = {Stringlish: improved English string searching in binary files},
journal = {Softw. Pract. Exp.},
volume = {45},
number = {11},
pages = {1591--1595},
year = {2015},
url = {https://doi.org/10.1002/spe.2327},
doi = {10.1002/SPE.2327},
timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/spe/Aycock15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/AycockC15,
author = {John Aycock and
Daniel Medeiros Nunes de Castro},
title = {Permutation Steganography in {FAT} Filesystems},
journal = {Trans. Data Hiding Multim. Secur.},
volume = {10},
pages = {92--105},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-46739-8\_6},
doi = {10.1007/978-3-662-46739-8\_6},
timestamp = {Fri, 15 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tdhms/AycockC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/AycockPS15,
author = {John Aycock and
Etienne Pitout and
Sarah Storteboom},
editor = {Valentina Dagiene and
Carsten Schulte and
Tatjana Jevsikova},
title = {A Game Engine in Pure Python for {CS1:} Design, Experience, and Limits},
booktitle = {Proceedings of the 2015 {ACM} Conference on Innovation and Technology
in Computer Science Education, ITiCS 2015, Vilnius, Lithuania, July
4-8, 2015},
pages = {93--98},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2729094.2742590},
doi = {10.1145/2729094.2742590},
timestamp = {Tue, 28 May 2024 17:14:29 +0200},
biburl = {https://dblp.org/rec/conf/iticse/AycockPS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Aycock15,
author = {John Aycock},
editor = {Valentina Dagiene and
Carsten Schulte and
Tatjana Jevsikova},
title = {Applied Computer History: Experience Teaching Systems Topics through
Retrogames},
booktitle = {Proceedings of the 2015 {ACM} Conference on Innovation and Technology
in Computer Science Education, ITiCS 2015, Vilnius, Lithuania, July
4-8, 2015},
pages = {105--110},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2729094.2742583},
doi = {10.1145/2729094.2742583},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iticse/Aycock15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/LaingLA14,
author = {Sarah Laing and
Michael E. Locasto and
John Aycock},
editor = {Sergey Bratus and
Felix "FX" Lindner},
title = {An Experience Report on Extracting and Viewing Memory Events via Wireshark},
booktitle = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
CA, USA, August 19, 2014},
publisher = {{USENIX} Association},
year = {2014},
url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/laing},
timestamp = {Mon, 01 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/woot/LaingLA14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MosunovSCACK13,
author = {Anton Mosunov and
Vineet Sinha and
Heather Crawford and
John Aycock and
Daniel Medeiros Nunes de Castro and
Rashmi Kumari},
editor = {Yongdae Kim and
Heejo Lee and
Adrian Perrig},
title = {Assured Supraliminal Steganography in Computer Games},
booktitle = {Information Security Applications - 14th International Workshop, {WISA}
2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8267},
pages = {245--259},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-319-05149-9\_16},
doi = {10.1007/978-3-319-05149-9\_16},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/wisa/MosunovSCACK13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/Aycock12,
author = {John Aycock},
title = {What's in a name. . . generator?},
journal = {J. Comput. Virol.},
volume = {8},
number = {1-2},
pages = {53--60},
year = {2012},
url = {https://doi.org/10.1007/s11416-012-0161-4},
doi = {10.1007/S11416-012-0161-4},
timestamp = {Sun, 17 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/virology/Aycock12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JarabekBA12,
author = {Chris Jarabek and
David Barrera and
John Aycock},
editor = {Robert H'obbes' Zakon},
title = {ThinAV: truly lightweight mobile cloud-based anti-malware},
booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
Orlando, FL, USA, 3-7 December 2012},
pages = {209--218},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2420950.2420983},
doi = {10.1145/2420950.2420983},
timestamp = {Mon, 18 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acsac/JarabekBA12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiide/Williams-KingDAS12,
author = {David Williams{-}King and
J{\"{o}}rg Denzinger and
John Aycock and
Ben Stephenson},
editor = {Mark O. Riedl and
Gita Sukthankar},
title = {The Gold Standard: Automatically Generating Puzzle Game Levels},
booktitle = {Proceedings of the Eighth {AAAI} Conference on Artificial Intelligence
and Interactive Digital Entertainment, AIIDE-12, Stanford, California,
USA, October 8-12, 2012},
publisher = {The {AAAI} Press},
year = {2012},
url = {http://www.aaai.org/ocs/index.php/AIIDE/AIIDE12/paper/view/5472},
timestamp = {Tue, 12 Apr 2022 13:09:30 +0200},
biburl = {https://dblp.org/rec/conf/aiide/Williams-KingDAS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AycockCLJ12,
author = {John Aycock and
Daniel Medeiros Nunes de Castro and
Michael E. Locasto and
Chris Jarabek},
editor = {Ting Yu and
Srdjan Capkun and
Seny Kamara},
title = {Babel: a secure computer is a polyglot},
booktitle = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security,
{CCSW} 2012, Raleigh, NC, USA, October 19, 2012},
pages = {43--54},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2381913.2381922},
doi = {10.1145/2381913.2381922},
timestamp = {Tue, 12 Apr 2022 13:28:49 +0200},
biburl = {https://dblp.org/rec/conf/ccs/AycockCLJ12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Aycock12,
author = {John Aycock},
editor = {Tami Lapidot and
Judith Gal{-}Ezer and
Michael E. Caspersen and
Orit Hazzan},
title = {{\(\mu\)}Python: non-majors programming from the very first lecture},
booktitle = {Annual Conference on Innovation and Technology in Computer Science
Education, ITiCSE '12, Haifa, Israel, July 3-5, 2012},
pages = {345--350},
publisher = {{ACM}},
year = {2012},
url = {https://doi.org/10.1145/2325296.2325376},
doi = {10.1145/2325296.2325376},
timestamp = {Wed, 10 Mar 2021 13:17:16 +0100},
biburl = {https://dblp.org/rec/conf/iticse/Aycock12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LinAM12,
author = {Eric Lin and
John Aycock and
Mohammad Mannan},
editor = {Dong Hoon Lee and
Moti Yung},
title = {Lightweight Client-Side Methods for Detecting Email Forgery},
booktitle = {Information Security Applications - 13th International Workshop, {WISA}
2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {7690},
pages = {254--269},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-35416-8\_18},
doi = {10.1007/978-3-642-35416-8\_18},
timestamp = {Tue, 14 May 2019 10:00:35 +0200},
biburl = {https://dblp.org/rec/conf/wisa/LinAM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Aycock11,
author = {John Aycock},
title = {Spyware and Adware},
series = {Advances in Information Security},
volume = {50},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-0-387-77741-2},
doi = {10.1007/978-0-387-77741-2},
isbn = {978-0-387-77740-5},
timestamp = {Tue, 16 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/series/ais/Aycock11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/LinGTMA11,
author = {Eric Lin and
Saul Greenberg and
Eileah Trotter and
David Ma and
John Aycock},
editor = {Desney S. Tan and
Saleema Amershi and
Bo Begole and
Wendy A. Kellogg and
Manas Tungare},
title = {Does domain highlighting help people identify phishing sites?},
booktitle = {Proceedings of the International Conference on Human Factors in Computing
Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
pages = {2075--2084},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/1978942.1979244},
doi = {10.1145/1978942.1979244},
timestamp = {Fri, 12 Mar 2021 15:27:48 +0100},
biburl = {https://dblp.org/rec/conf/chi/LinGTMA11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cig/NygrenDSA11,
author = {Nick Nygren and
J{\"{o}}rg Denzinger and
Ben Stephenson and
John Aycock},
editor = {Sung{-}Bae Cho and
Simon M. Lucas and
Philip Hingston},
title = {User-preference-based automated level generation for platform games},
booktitle = {2011 {IEEE} Conference on Computational Intelligence and Games, {CIG}
2011, Seoul, South Korea, August 31 - September 3, 2011},
pages = {55--62},
publisher = {{IEEE}},
year = {2011},
url = {https://doi.org/10.1109/CIG.2011.6031989},
doi = {10.1109/CIG.2011.6031989},
timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
biburl = {https://dblp.org/rec/conf/cig/NygrenDSA11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AycockBDD11,
author = {John Aycock and
Elizabeth Buchanan and
Scott D. Dexter and
David Dittrich},
editor = {George Danezis and
Sven Dietrich and
Kazue Sako},
title = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer
Security Research},
booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {7126},
pages = {138--145},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-29889-9\_12},
doi = {10.1007/978-3-642-29889-9\_12},
timestamp = {Mon, 03 Mar 2025 21:04:28 +0100},
biburl = {https://dblp.org/rec/conf/fc/AycockBDD11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AycockS10,
author = {John Aycock and
John P. Sullins},
editor = {Radu Sion and
Reza Curtmola and
Sven Dietrich and
Aggelos Kiayias and
Josep M. Miret and
Kazue Sako and
Francesc Seb{\'{e}}},
title = {Ethical Proactive Threat Research},
booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
2010, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6054},
pages = {231--239},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-14992-4\_21},
doi = {10.1007/978-3-642-14992-4\_21},
timestamp = {Mon, 03 Mar 2025 21:04:28 +0100},
biburl = {https://dblp.org/rec/conf/fc/AycockS10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Williams-KingAC10,
author = {David Williams{-}King and
John Aycock and
Daniel Medeiros Nunes de Castro},
editor = {Reyyan Ayfer and
John Impagliazzo and
Cary Laxer},
title = {Enbug: when debuggers go bad},
booktitle = {Proceedings of the 15th Annual {SIGCSE} Conference on Innovation and
Technology in Computer Science Education, ITiCSE 2010, Bilkent, Ankara,
Turkey, June 26-30, 2010},
pages = {28--32},
publisher = {{ACM}},
year = {2010},
url = {https://doi.org/10.1145/1822090.1822100},
doi = {10.1145/1822090.1822100},
timestamp = {Wed, 10 Mar 2021 13:17:16 +0100},
biburl = {https://dblp.org/rec/conf/iticse/Williams-KingAC10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LinCWA10,
author = {Eric Lin and
Daniel Medeiros Nunes de Castro and
Mea Wang and
John Aycock},
title = {SPoIM: {A} close look at pollution attacks in {P2P} live streaming},
booktitle = {18th International Workshop on Quality of Service, IWQoS 2010, Beijing,
China, 16-18 June 2010},
pages = {1--9},
publisher = {{IEEE}},
year = {2010},
url = {https://doi.org/10.1109/IWQoS.2010.5542735},
doi = {10.1109/IWQOS.2010.5542735},
timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
biburl = {https://dblp.org/rec/conf/iwqos/LinCWA10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/AycockB09,
author = {John Aycock and
Angelo Borsotti},
title = {Early action in an Earley parser},
journal = {Acta Informatica},
volume = {46},
number = {8},
pages = {549--559},
year = {2009},
url = {https://doi.org/10.1007/s00236-009-0107-6},
doi = {10.1007/S00236-009-0107-6},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/acta/AycockB09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/AycockCC09,
author = {John Aycock and
Juan M. Guti{\'{e}}rrez C{\'{a}}rdenas and
Daniel Medeiros Nunes de Castro},
title = {Code Obfuscation Using Pseudo-random Number Generators},
booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational
Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
29-31, 2009},
pages = {418--423},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/CSE.2009.43},
doi = {10.1109/CSE.2009.43},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cse/AycockCC09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/FriessCA09,
author = {Nathan Friess and
Heather Crawford and
John Aycock},
editor = {A Min Tjoa and
Roland R. Wagner},
title = {A Multi-Agent Approach to Testing Anti-Spam Software},
booktitle = {Database and Expert Systems Applications, DEXA, International Workshops,
Linz, Austria, August 31-September 4, 2009, Proceedings},
pages = {38--42},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/DEXA.2009.29},
doi = {10.1109/DEXA.2009.29},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dexaw/FriessCA09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CrawfordA09,
author = {Heather Crawford and
John Aycock},
editor = {Stefan Katzenbeisser and
Ahmad{-}Reza Sadeghi},
title = {Supraliminal Audio Steganography: Audio Files Tricking Audiophiles},
booktitle = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt,
Germany, June 8-10, 2009, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {5806},
pages = {1--14},
publisher = {Springer},
year = {2009},
url = {https://doi.org/10.1007/978-3-642-04431-1\_1},
doi = {10.1007/978-3-642-04431-1\_1},
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
biburl = {https://dblp.org/rec/conf/ih/CrawfordA09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/AycockM08,
author = {John Aycock and
Alana Maurushat},
title = {"Good" worms and human rights},
journal = {{SIGCAS} Comput. Soc.},
volume = {38},
number = {1},
pages = {28--39},
year = {2008},
url = {https://doi.org/10.1145/1361255.1361256},
doi = {10.1145/1361255.1361256},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/sigcas/AycockM08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/CrawfordA08,
author = {Heather Crawford and
John Aycock},
title = {Kwyjibo: automatic domain name generation},
journal = {Softw. Pract. Exp.},
volume = {38},
number = {14},
pages = {1561--1567},
year = {2008},
url = {https://doi.org/10.1002/spe.885},
doi = {10.1002/SPE.885},
timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/spe/CrawfordA08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/NielsenBPAF08,
author = {Margaret Nielsen and
Dane Bertram and
Sampson Pun and
John Aycock and
Nathan Friess},
title = {Global-scale Anti-spam Testing in Your Own Back Yard},
booktitle = {{CEAS} 2008 - The Fifth Conference on Email and Anti-Spam, 21-22 August
2008, Mountain View, California, {USA}},
year = {2008},
url = {http://www.ceas.cc/2008/papers/ceas2008-paper-03.pdf},
timestamp = {Mon, 01 Jul 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ceas/NielsenBPAF08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/AycockCd08,
author = {John Aycock and
Heather Crawford and
Rennie deGraaf},
editor = {June Amillo and
Cary Laxer and
Ernestina Menasalvas Ruiz and
Alison Young},
title = {Spamulator: the Internet on a laptop},
booktitle = {Proceedings of the 13th Annual {SIGCSE} Conference on Innovation and
Technology in Computer Science Education, ITiCSE 2008, Madrid, Spain,
June 30 - July 2, 2008},
pages = {142--147},
publisher = {{ACM}},
year = {2008},
url = {https://doi.org/10.1145/1384271.1384311},
doi = {10.1145/1384271.1384311},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iticse/AycockCd08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/NielsonCA08,
author = {Jordan Nielson and
Daniel Medeiros Nunes de Castro and
John Aycock},
title = {Image spam - {ASCII} to the rescue!},
booktitle = {3rd International Conference on Malicious and Unwanted Software, {MALWARE}
2008, Alexandria, Virginia, USA, October 7-8, 2008},
pages = {65--68},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/MALWARE.2008.4690859},
doi = {10.1109/MALWARE.2008.4690859},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/malware/NielsonCA08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SzaboAAD08,
author = {Joe Szabo and
John Aycock and
Randal Acton and
J{\"{o}}rg Denzinger},
editor = {Roger L. Wainwright and
Hisham Haddad},
title = {The tale of the weather worm},
booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
Fortaleza, Ceara, Brazil, March 16-20, 2008},
pages = {2097--2102},
publisher = {{ACM}},
year = {2008},
url = {https://doi.org/10.1145/1363686.1364193},
doi = {10.1145/1363686.1364193},
timestamp = {Tue, 06 Nov 2018 11:06:48 +0100},
biburl = {https://dblp.org/rec/conf/sac/SzaboAAD08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cig/FinkDA07,
author = {Alex Fink and
J{\"{o}}rg Denzinger and
John Aycock},
title = {Extracting {NPC} behavior from computer games using computer vision
and machine learning techniques},
booktitle = {Proceedings of the 2007 {IEEE} Symposium on Computational Intelligence
and Games, {CIG} 2007, Honolulu, Hawaii, USA, 1-5 April, 2007},
pages = {24--31},
publisher = {{IEEE}},
year = {2007},
url = {https://doi.org/10.1109/CIG.2007.368075},
doi = {10.1109/CIG.2007.368075},
timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
biburl = {https://dblp.org/rec/conf/cig/FinkDA07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/ActonFA07,
author = {Randal Acton and
Nathan Friess and
John Aycock},
title = {Inverse Geolocation: Worms with a Sense of Direction},
booktitle = {Proceedings of the 26th {IEEE} International Performance Computing
and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
Orleans, Louisiana, {USA}},
pages = {487--493},
publisher = {{IEEE} Computer Society},
year = {2007},
url = {https://doi.org/10.1109/PCCC.2007.358931},
doi = {10.1109/PCCC.2007.358931},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ipccc/ActonFA07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VogtAJ07,
author = {Ryan Vogt and
John Aycock and
Michael J. Jacobson Jr.},
title = {Army of Botnets},
booktitle = {Proceedings of the Network and Distributed System Security Symposium,
{NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
2007},
publisher = {The Internet Society},
year = {2007},
url = {https://www.ndss-symposium.org/ndss2007/army-botnets/},
timestamp = {Mon, 01 Feb 2021 08:42:16 +0100},
biburl = {https://dblp.org/rec/conf/ndss/VogtAJ07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Aycock06,
author = {John Aycock},
title = {Computer Viruses and Malware},
series = {Advances in Information Security},
volume = {22},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/0-387-34188-9},
doi = {10.1007/0-387-34188-9},
isbn = {978-0-387-30236-2},
timestamp = {Tue, 16 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/books/sp/Aycock06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AycockdJ06,
author = {John Aycock and
Rennie deGraaf and
Michael J. Jacobson Jr.},
title = {Anti-disassembly using Cryptographic Hash Functions},
journal = {J. Comput. Virol.},
volume = {2},
number = {1},
pages = {79--85},
year = {2006},
url = {https://doi.org/10.1007/s11416-006-0011-3},
doi = {10.1007/S11416-006-0011-3},
timestamp = {Sun, 17 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/virology/AycockdJ06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/Aycock06,
author = {John Aycock},
title = {Teaching Spam and Spyware at the University of C@1g4ry},
booktitle = {{CEAS} 2006 - The Third Conference on Email and Anti-Spam, July 27-28,
2006, Mountain View, California, {USA}},
year = {2006},
url = {http://www.ceas.cc/2006/listabs.html\#23.pdf},
timestamp = {Mon, 01 Jul 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ceas/Aycock06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FriessVA05,
author = {Nathan Friess and
Ryan Vogt and
John Aycock},
title = {Timing is everything},
journal = {Comput. Secur.},
volume = {24},
number = {8},
pages = {599--603},
year = {2005},
url = {https://doi.org/10.1016/j.cose.2005.09.007},
doi = {10.1016/J.COSE.2005.09.007},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/FriessVA05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcse/AycockU05,
author = {John Aycock and
Jim Uhl},
title = {Choice in the classroom},
journal = {{ACM} {SIGCSE} Bull.},
volume = {37},
number = {4},
pages = {84--88},
year = {2005},
url = {https://doi.org/10.1145/1113847.1113883},
doi = {10.1145/1113847.1113883},
timestamp = {Sat, 25 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sigcse/AycockU05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/deGraafAJ05,
author = {Rennie deGraaf and
John Aycock and
Michael J. Jacobson Jr.},
title = {Improved Port Knocking with Strong Authentication},
booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
5-9 December 2005, Tucson, AZ, {USA}},
pages = {451--462},
publisher = {{IEEE} Computer Society},
year = {2005},
url = {https://doi.org/10.1109/CSAC.2005.32},
doi = {10.1109/CSAC.2005.32},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/acsac/deGraafAJ05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/plc/ZastreA05,
author = {Michael M. J. Zastre and
John Aycock},
editor = {Hamid R. Arabnia},
title = {An Exceptional Programming Language},
booktitle = {Proceedings of The 2005 International Conference on Programming Languages
and Compilers, {PLC} 2005, Las Vegas, Nevada, USA, June 27-30, 2005},
pages = {137},
publisher = {{CSREA} Press},
year = {2005},
timestamp = {Thu, 18 Jan 2007 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/plc/ZastreA05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/AycockB05,
author = {John Aycock and
Ken Barker},
editor = {Wanda P. Dann and
Thomas L. Naps and
Paul T. Tymann and
Doug Baldwin},
title = {Viruses 101},
booktitle = {Proceedings of the 36th {SIGCSE} Technical Symposium on Computer Science
Education, {SIGCSE} 2005, St. Louis, Missouri, USA, February 23-27,
2005},
pages = {152--156},
publisher = {{ACM}},
year = {2005},
url = {https://doi.org/10.1145/1047344.1047404},
doi = {10.1145/1047344.1047404},
timestamp = {Thu, 10 Jun 2021 16:43:03 +0200},
biburl = {https://dblp.org/rec/conf/sigcse/AycockB05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic/WilsonA04,
author = {Kelly Wilson and
John Aycock},
editor = {Hamid R. Arabnia and
Olaf Droegehorn and
S. Chatterjee},
title = {{NEST:} NEtwork Server Tool},
booktitle = {Proceedings of the International Conference on Internet Computing,
{IC} '04, Volume 2 {\&} Proceedings of the International Symposium
on Web Services {\&} Applications, {ISWS} '04, Las Vegas, Nevada,
USA, June 21-24, 2004},
pages = {700},
publisher = {{CSREA} Press},
year = {2004},
timestamp = {Fri, 19 Nov 2004 14:34:52 +0100},
biburl = {https://dblp.org/rec/conf/ic/WilsonA04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp/Aycock04,
author = {John Aycock},
editor = {Hamid R. Arabnia and
Hassan Reza},
title = {Extending Old Compiler Tools with Meta-Tools},
booktitle = {Proceedings of the International Conference on Software Engineering
Research and Practice, {SERP} '04, June 21-24, 2004, Las Vegas, Nevada,
USA, Volume 2},
pages = {841--845},
publisher = {{CSREA} Press},
year = {2004},
timestamp = {Fri, 19 Nov 2004 15:25:03 +0100},
biburl = {https://dblp.org/rec/conf/serp/Aycock04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Aycock03,
author = {John Aycock},
title = {A brief history of just-in-time},
journal = {{ACM} Comput. Surv.},
volume = {35},
number = {2},
pages = {97--113},
year = {2003},
url = {https://doi.org/10.1145/857076.857077},
doi = {10.1145/857076.857077},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/csur/Aycock03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigplan/Aycock03,
author = {John Aycock},
title = {The {ART} of compiler construction projects},
journal = {{ACM} {SIGPLAN} Notices},
volume = {38},
number = {12},
pages = {28--32},
year = {2003},
url = {https://doi.org/10.1145/966051.966056},
doi = {10.1145/966051.966056},
timestamp = {Sun, 22 Oct 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sigplan/Aycock03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AycockH02,
author = {John Aycock and
R. Nigel Horspool},
title = {Practical Earley Parsing},
journal = {Comput. J.},
volume = {45},
number = {6},
pages = {620--630},
year = {2002},
url = {https://doi.org/10.1093/comjnl/45.6.620},
doi = {10.1093/COMJNL/45.6.620},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/cj/AycockH02.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ca/Aycock01,
author = {John Aycock},
title = {Practical Earley parsing and the {SPARK} toolkit},
school = {University of Victoria, Canada},
year = {2001},
url = {https://dspace.library.uvic.ca/handle/1828/9392},
timestamp = {Mon, 26 Sep 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/phd/ca/Aycock01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/AycockHJM01,
author = {John Aycock and
R. Nigel Horspool and
Jan Janousek and
Borivoj Melichar},
title = {Even faster generalized {LR} parsing},
journal = {Acta Informatica},
volume = {37},
number = {9},
pages = {633--651},
year = {2001},
url = {https://doi.org/10.1007/PL00013319},
doi = {10.1007/PL00013319},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/acta/AycockHJM01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Aycock01,
author = {John Aycock},
title = {Why bison is becoming extinct},
journal = {{XRDS}},
volume = {7},
number = {5},
pages = {3},
year = {2001},
url = {https://doi.org/10.1145/969637.969640},
doi = {10.1145/969637.969640},
timestamp = {Tue, 03 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/crossroads/Aycock01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/AycockH01,
author = {John Aycock and
R. Nigel Horspool},
title = {Schr{\"{o}}dinger's token},
journal = {Softw. Pract. Exp.},
volume = {31},
number = {8},
pages = {803--814},
year = {2001},
url = {https://doi.org/10.1002/spe.390},
doi = {10.1002/SPE.390},
timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/spe/AycockH01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/AycockH01,
author = {John Aycock and
R. Nigel Horspool},
editor = {Reinhard Wilhelm},
title = {Directly-Executable Earley Parsing},
booktitle = {Compiler Construction, 10th International Conference, {CC} 2001 Held
as Part of the Joint European Conferences on Theory and Practice of
Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2027},
pages = {229--243},
publisher = {Springer},
year = {2001},
url = {https://doi.org/10.1007/3-540-45306-7\_16},
doi = {10.1007/3-540-45306-7\_16},
timestamp = {Tue, 14 May 2019 10:00:48 +0200},
biburl = {https://dblp.org/rec/conf/cc/AycockH01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/AycockH00,
author = {John Aycock and
R. Nigel Horspool},
editor = {David A. Watt},
title = {Simple Generation of Static Single-Assignment Form},
booktitle = {Compiler Construction, 9th International Conference, {CC} 2000, Held
as Part of the European Joint Conferences on the Theory and Practice
of Software, {ETAPS} 2000, Berlin, Germany, March 25 - April 2, 2000,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {1781},
pages = {110--124},
publisher = {Springer},
year = {2000},
url = {https://doi.org/10.1007/3-540-46423-9\_8},
doi = {10.1007/3-540-46423-9\_8},
timestamp = {Tue, 14 May 2019 10:00:48 +0200},
biburl = {https://dblp.org/rec/conf/cc/AycockH00.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpt/HorspoolA00,
author = {R. Nigel Horspool and
John Aycock},
title = {Analysis of Equation Structure using Least Cost Parsing},
booktitle = {Proceedings of the Sixth Internatonal Workshop on Parsing Technologies,
{IWPT} 2000, Treno, Italy, February 23-25, 2000},
pages = {307--308},
year = {2000},
url = {https://aclanthology.org/2000.iwpt-1.36/},
timestamp = {Fri, 06 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iwpt/HorspoolA00.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/AycockL99,
author = {John Aycock and
Michael Levy},
title = {An architecture for easy Web page updating},
journal = {{XRDS}},
volume = {6},
number = {2},
pages = {15--18},
year = {1999},
url = {https://doi.org/10.1145/333104.333111},
doi = {10.1145/333104.333111},
timestamp = {Tue, 03 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/crossroads/AycockL99.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/AycockH99,
author = {John Aycock and
R. Nigel Horspool},
editor = {Stefan J{\"{a}}hnichen},
title = {Faster Generalized {LR} Parsing},
booktitle = {Compiler Construction, 8th International Conference, CC'99, Held as
Part of the European Joint Conferences on the Theory and Practice
of Software, ETAPS'99, Amsterdam, The Netherlands, 22-28 March, 1999,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {1575},
pages = {32--46},
publisher = {Springer},
year = {1999},
url = {https://doi.org/10.1007/978-3-540-49051-7\_3},
doi = {10.1007/978-3-540-49051-7\_3},
timestamp = {Tue, 14 May 2019 10:00:48 +0200},
biburl = {https://dblp.org/rec/conf/cc/AycockH99.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.