John P. McDermott

Learn More
ersonal software assistants that help users with tasks like finding information, scheduling calendars, or managing work flow will require significant customization to each individual user. For example, an assistant that helps schedule a user’s calendar will have to know that user’s scheduling preferences. This article explores the potential of(More)
Unlike MOLGEN, VT's decisions about part selection and placement are so interdependent that plausible reasoning (guessing) is a major feature of its search for a solution. Thus, VT's problem-solving strategy is predominantly one of constructing an approximation and successively refining it. Systems that use plausible reasoning must be able to identify bad(More)
An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This survey provides a taxonomy for computer program security flaws, with an Appendix that documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places.(More)
An organized record of actual flaws can be useful to designers, implementors, and evaluators of computer systems. This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated(More)
In this paper, we describe the organization of a rule-based system, SPAM, that uses map and domain-specific knowledge to interpret airport scenes. This research investigates the use of a rule-based system for the control of image processing and interpretation of results with respect to a world model, as well as the representation of the world model within(More)