2001 |
8 | EE | David P. Gilliam,
John C. Kelly,
John D. Powell,
Matt Bishop:
Development of a Software Security Assessment Instrument to Reduce Software Security Risk.
WETICE 2001: 144-149 |
2000 |
7 | EE | Ken Abernethy,
John C. Kelly,
Ann E. Kelley Sobel,
James D. Kiper,
John D. Powell:
Technology Transfer Issues for Formal Methods of Software Specification.
CSEE&T 2000: 23-31 |
6 | EE | Steven L. Cornford,
Martin S. Feather,
John C. Kelly,
Timothy W. Larson,
Burton Sigal,
James D. Kiper:
Design and Development Assessment.
IWSSD 2000: 105-114 |
5 | EE | David P. Gilliam,
John C. Kelly,
Matt Bishop:
Reducing Software Security Risk through an Integrated Approach.
WETICE 2000: 141-146 |
1992 |
4 | EE | Ken Abernethy,
John C. Kelly:
Comparing Object-Oriented and Data Flow Models - a Case Study.
ACM Conference on Computer Science 1992: 541-547 |
3 | EE | John C. Kelly,
Joseph S. Sherif,
Jonathan M. Hops:
An analysis of defect densities found during software inspections.
Journal of Systems and Software 17(2): 111-117 (1992) |
1981 |
2 | | Jerome W. Blaylock,
John C. Kelly:
System Tuning the UNIVAC Executive Operating System's Dynamic Allocator.
Int. CMG Conference 1981: 213-219 |
1978 |
1 | | John C. Kelly,
Gary P. Route:
A Structured Approach for Evaluating UNIVAC 1100 Series Computer Systems.
Int. CMG Conference 1978: 227-238 |