default search action
John Aycock
Person information
- affiliation: University of Calgary, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c49]Shankar Ganesh, John Aycock, Katie Biittner:
FrAG: A Framework for the Analysis of Games. CoG 2023: 1-4 - [c48]John Aycock:
Binary Reverse Engineering for All. ITiCSE (1) 2023: 243-249 - [c47]Tyson Kendon, Leanne Wu, John Aycock:
AI-Generated Code Not Considered Harmful. WCCCE 2023: 3:1-3:7 - [c46]John Aycock:
spy3: A Python Subset for CS1. WCCCE 2023: 6:1-6:6 - 2022
- [c45]John Aycock, Shankar Ganesh, Katie Biittner, Paul Allen Newell, Carl Therrien:
The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use in Atari 2600 Games. FDG 2022: 26:1-26:10 - 2021
- [c44]John Aycock:
Teaching Social Engineering Using Improv. ITiCSE (2) 2021: 629-630 - 2020
- [c43]John Aycock, Katie Biittner:
LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator. FDG 2020: 23:1-23:7 - [c42]Hannah Wright, John Aycock:
10 Binary Games for Computer Science Education. SIGCSE 2020: 1308
2010 – 2019
- 2019
- [j18]John Aycock, Patrick Finn:
Uncivil Engineering: A Textual Divide in Game Studies. Game Stud. 19(3) (2019) - [j17]John Aycock, Tara Copplestone:
Entombed: An archaeological examination of an Atari 2600 game. Art Sci. Eng. Program. 3(2): 4 (2019) - [c41]Eric Kaltman, Joseph C. Osborn, John Aycock:
S4LVE: shareable videogame analysis and visualization. FDG 2019: 61:1-61:5 - [c40]John Aycock, Hannah Wright, Jannik Hildebrandt, David Kenny, Nicole Lefebvre, Mark Lin, Maria Mamaclay, Shanel Sayson, Aidan Stewart, Amy Yuen:
Adapting the "Unessay" for Use in Computer Science. WCCCE 2019: 2:1-2:6 - 2018
- [c39]John Aycock, Andrew Groeneveldt, Hayden Kroepfl, Tara Copplestone:
Exercises for teaching reverse engineering. ITiCSE 2018: 188-193 - [c38]John Aycock:
Stick to the script: lightweight recording and playback of live coding. ITiCSE 2018: 350-351 - [i1]John Aycock, Tara Copplestone:
Entombed: An archaeological examination of an Atari 2600 game. CoRR abs/1811.02035 (2018) - 2016
- [b4]John Aycock:
Retrogame Archeology - Exploring Old Computer Games. Springer 2016, ISBN 978-3-319-30002-3, pp. 1-222 - [c37]Ben Stephenson, Mark James, Nigel Brooke, John Aycock:
An Industrial Partnership Game Development Capstone Course. SIGITE 2016: 136-141 - [c36]John Aycock:
Code Protection: When Abstinence is not an Option. WCCCE 2016: 12:1-12:5 - 2015
- [j16]John Aycock:
Stringlish: improved English string searching in binary files. Softw. Pract. Exp. 45(11): 1591-1595 (2015) - [j15]John Aycock, Daniel Medeiros Nunes de Castro:
Permutation Steganography in FAT Filesystems. Trans. Data Hiding Multim. Secur. 10: 92-105 (2015) - [c35]John Aycock, Etienne Pitout, Sarah Storteboom:
A Game Engine in Pure Python for CS1: Design, Experience, and Limits. ITiCSE 2015: 93-98 - [c34]John Aycock:
Applied Computer History: Experience Teaching Systems Topics through Retrogames. ITiCSE 2015: 105-110 - 2014
- [c33]Sarah Laing, Michael E. Locasto, John Aycock:
An Experience Report on Extracting and Viewing Memory Events via Wireshark. WOOT 2014 - 2013
- [c32]Anton Mosunov, Vineet Sinha, Heather Crawford, John Aycock, Daniel Medeiros Nunes de Castro, Rashmi Kumari:
Assured Supraliminal Steganography in Computer Games. WISA 2013: 245-259 - 2012
- [j14]John Aycock:
What's in a name. . . generator? J. Comput. Virol. 8(1-2): 53-60 (2012) - [c31]Chris Jarabek, David Barrera, John Aycock:
ThinAV: truly lightweight mobile cloud-based anti-malware. ACSAC 2012: 209-218 - [c30]David Williams-King, Jörg Denzinger, John Aycock, Ben Stephenson:
The Gold Standard: Automatically Generating Puzzle Game Levels. AIIDE 2012 - [c29]John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek:
Babel: a secure computer is a polyglot. CCSW 2012: 43-54 - [c28]John Aycock:
μPython: non-majors programming from the very first lecture. ITiCSE 2012: 345-350 - [c27]Eric Lin, John Aycock, Mohammad Mannan:
Lightweight Client-Side Methods for Detecting Email Forgery. WISA 2012: 254-269 - 2011
- [b3]John Aycock:
Spyware and Adware. Advances in Information Security 50, Springer 2011, ISBN 978-0-387-77740-5, pp. 1-128 - [c26]Eric Lin, Saul Greenberg, Eileah Trotter, David Ma, John Aycock:
Does domain highlighting help people identify phishing sites? CHI 2011: 2075-2084 - [c25]Nick Nygren, Jörg Denzinger, Ben Stephenson, John Aycock:
User-preference-based automated level generation for platform games. CIG 2011: 55-62 - [c24]John Aycock, Elizabeth Buchanan, Scott D. Dexter, David Dittrich:
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research. Financial Cryptography Workshops 2011: 138-145 - 2010
- [c23]John Aycock, John P. Sullins:
Ethical Proactive Threat Research. Financial Cryptography Workshops 2010: 231-239 - [c22]David Williams-King, John Aycock, Daniel Medeiros Nunes de Castro:
Enbug: when debuggers go bad. ITiCSE 2010: 28-32 - [c21]Eric Lin, Daniel Medeiros Nunes de Castro, Mea Wang, John Aycock:
SPoIM: A close look at pollution attacks in P2P live streaming. IWQoS 2010: 1-9
2000 – 2009
- 2009
- [j13]John Aycock, Angelo Borsotti:
Early action in an Earley parser. Acta Informatica 46(8): 549-559 (2009) - [c20]John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro:
Code Obfuscation Using Pseudo-random Number Generators. CSE (3) 2009: 418-423 - [c19]Nathan Friess, Heather Crawford, John Aycock:
A Multi-Agent Approach to Testing Anti-Spam Software. DEXA Workshops 2009: 38-42 - [c18]Heather Crawford, John Aycock:
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. Information Hiding 2009: 1-14 - 2008
- [j12]John Aycock, Alana Maurushat:
"Good" worms and human rights. SIGCAS Comput. Soc. 38(1): 28-39 (2008) - [j11]Heather Crawford, John Aycock:
Kwyjibo: automatic domain name generation. Softw. Pract. Exp. 38(14): 1561-1567 (2008) - [c17]Margaret Nielsen, Dane Bertram, Sampson Pun, John Aycock, Nathan Friess:
Global-scale Anti-spam Testing in Your Own Back Yard. CEAS 2008 - [c16]John Aycock, Heather Crawford, Rennie deGraaf:
Spamulator: the Internet on a laptop. ITiCSE 2008: 142-147 - [c15]Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock:
Image spam - ASCII to the rescue! MALWARE 2008: 65-68 - [c14]Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger:
The tale of the weather worm. SAC 2008: 2097-2102 - 2007
- [c13]Alex Fink, Jörg Denzinger, John Aycock:
Extracting NPC behavior from computer games using computer vision and machine learning techniques. CIG 2007: 24-31 - [c12]Randal Acton, Nathan Friess, John Aycock:
Inverse Geolocation: Worms with a Sense of Direction. IPCCC 2007: 487-493 - [c11]Ryan Vogt, John Aycock, Michael J. Jacobson Jr.:
Army of Botnets. NDSS 2007 - 2006
- [b2]John Aycock:
Computer Viruses and Malware. Advances in Information Security 22, Springer 2006, ISBN 978-0-387-30236-2, pp. 1-227 - [j10]John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.:
Anti-disassembly using Cryptographic Hash Functions. J. Comput. Virol. 2(1): 79-85 (2006) - [c10]John Aycock:
Teaching Spam and Spyware at the University of C@1g4ry. CEAS 2006 - 2005
- [j9]Nathan Friess, Ryan Vogt, John Aycock:
Timing is everything. Comput. Secur. 24(8): 599-603 (2005) - [j8]John Aycock, Jim Uhl:
Choice in the classroom. ACM SIGCSE Bull. 37(4): 84-88 (2005) - [c9]Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.:
Improved Port Knocking with Strong Authentication. ACSAC 2005: 451-462 - [c8]Michael M. J. Zastre, John Aycock:
An Exceptional Programming Language. PLC 2005: 137 - [c7]John Aycock, Ken Barker:
Viruses 101. SIGCSE 2005: 152-156 - 2004
- [c6]Kelly Wilson, John Aycock:
NEST: NEtwork Server Tool. International Conference on Internet Computing 2004: 700 - [c5]John Aycock:
Extending Old Compiler Tools with Meta-Tools. Software Engineering Research and Practice 2004: 841-845 - 2003
- [j7]John Aycock:
A brief history of just-in-time. ACM Comput. Surv. 35(2): 97-113 (2003) - [j6]John Aycock:
The ART of compiler construction projects. ACM SIGPLAN Notices 38(12): 28-32 (2003) - 2002
- [j5]John Aycock, R. Nigel Horspool:
Practical Earley Parsing. Comput. J. 45(6): 620-630 (2002) - 2001
- [b1]John Aycock:
Practical Earley parsing and the SPARK toolkit. University of Victoria, Canada, 2001 - [j4]John Aycock, R. Nigel Horspool, Jan Janousek, Borivoj Melichar:
Even faster generalized LR parsing. Acta Informatica 37(9): 633-651 (2001) - [j3]John Aycock:
Why bison is becoming extinct. XRDS 7(5): 3 (2001) - [j2]John Aycock, R. Nigel Horspool:
Schrödinger's token. Softw. Pract. Exp. 31(8): 803-814 (2001) - [c4]John Aycock, R. Nigel Horspool:
Directly-Executable Earley Parsing. CC 2001: 229-243 - 2000
- [c3]John Aycock, R. Nigel Horspool:
Simple Generation of Static Single-Assignment Form. CC 2000: 110-124 - [c2]R. Nigel Horspool, John Aycock:
Analysis of Equation Structure using Least Cost Parsing. IWPT 2000: 307-308
1990 – 1999
- 1999
- [j1]John Aycock, Michael Levy:
An architecture for easy Web page updating. XRDS 6(2): 15-18 (1999) - [c1]John Aycock, R. Nigel Horspool:
Faster Generalized LR Parsing. CC 1999: 32-46
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint