default search action
John V. Harrison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2005
- [j6]John V. Harrison, Hal Berghel:
A Protocol Layer Survey of Network Security. Adv. Comput. 64: 110-159 (2005) - [c20]John V. Harrison:
Enhancing Network Security By Preventing User-Initiated Malware Execution. ITCC (2) 2005: 597-602 - 2004
- [j5]John V. Harrison, Anna Andrusiewicz:
A virtual marketplace for advertising narrowcast over digital signage networks. Electron. Commer. Res. Appl. 3(2): 163-175 (2004) - [c19]John V. Harrison, Anna Andrusiewicz:
Using wireless networks to enhance narrowcasting in public spaces. CCNC 2004: 600-604 - 2003
- [c18]John V. Harrison:
Wide Area Digital Signage Networks: A Novel Internet Computing Application. International Conference on Internet Computing 2003: 551-554 - [c17]John V. Harrison, Anna Andrusiewicz:
Enhancing digital advertising using dynamically configurable multimedia. ICME 2003: 717-720 - [c16]John V. Harrison, Anna Andrusiewicz:
The digital signage exchange: a virtual marketplace for out-of-home digital advertising. EC 2003: 274 - [c15]John V. Harrison, Anna Andrusiewicz:
An Emerging Marketplace for Digital Advertising Based on Amalgamated Digital Signage Networks. CEC 2003: 149-156
1990 – 1999
- 1999
- [j4]John V. Harrison, Wie Ming Lim, Anna Andrusiewicz, Anthony Berglas:
Evaluation of the ITOC information system design recovery tool: a case study. J. Syst. Softw. 44(3): 229-240 (1999) - 1998
- [c14]Wie Ming Lim, John V. Harrison, Paul A. Bailes, Anthony Berglas:
Design Recovery through Formal Specification. Australian Software Engineering Conference 1998: 22-31 - [c13]John V. Harrison, Wie Ming Lim:
Automated Reverse Engineering of Legacy 4GL Information System Applications Using the ITOC Workbench. CAiSE 1998: 41-57 - 1997
- [c12]John V. Harrison, Anthony Berglas, Ian Peake:
Legacy 4GL Application Migration via Knowledge-Based Software Engineering Technology: A Case Study. Australian Software Engineering Conference 1997: 70- - [c11]John V. Harrison:
Enhancing Software Development Project Courses Via Industry Participation. CSEE&T 1997: 192-203 - [c10]Wie Ming Lim, John V. Harrison:
Parallel Approaches for Discovering Functional Dependencies from Data for Information System Design Recovery. ISPAN 1997: 254-260 - [c9]Anthony Berglas, John V. Harrison:
Evaluation of the ITOC information system design recovery tool. WPC 1997: 176-182 - [c8]John V. Harrison, Anthony Berglas:
Data Flow Analysis within the ITOC Information System Design Recovery Tool. ASE 1997: 227- - 1996
- [c7]Wie Ming Lim, John V. Harrison:
An Integrated Database Reengineering Architecture - A Generic Approach. Australian Software Engineering Conference 1996: 146-154 - [c6]Paul A. Bailes, Paul Burnim, Murray Chapman, John V. Harrison, Ian Peake:
Towards an intelligent software maintenance network. IFIP World Conference on IT Tools 1996: 129-136 - 1995
- [j3]John V. Harrison:
Incremental view maintenance in extended relational databases. Inf. Softw. Technol. 37(9): 479-491 (1995) - [c5]John V. Harrison, Paul A. Bailes, Anthony Berglas, Ian Peake:
Re-engineering 4GL-based Information System Applications. APSEC 1995: 448-457 - 1994
- [j2]John V. Harrison:
A Finely-Interleaved Consistency Checking Method for Knowledge-Bases. Int. J. Artif. Intell. Tools 3(3): 383-394 (1994) - [c4]John V. Harrison, Suzanne W. Dietrich:
Incremental View Maintenance. Australasian Database Conference 1994: 45-63 - 1993
- [c3]John V. Harrison:
Active Rules in Deductive Databases. CIKM 1993: 174-183 - [c2]John V. Harrison, Suzanne W. Dietrich:
Integrating Active and Deductive Rules. Rules in Database Systems 1993: 288-305 - 1992
- [j1]Suzanne W. Dietrich, Susan Darling Urban, John V. Harrison, Anton P. Karadimce:
A DOOD RANCH at ASU: Integrating Active, Deductive and Object-Oriented Databases. IEEE Data Eng. Bull. 15(1-4): 40-43 (1992) - [c1]John V. Harrison, Suzanne W. Dietrich:
Maintenance of Materialized Views in a Deductive Database: An Update Propagation Approach. Workshop on Deductive Databases, JICSLP 1992: 56-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint