default search action
John Potter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i1]Manal Helal, Fanrong Kong, Sharon C. A. Chen, Fei Zhou, Dominic E. Dwyer, John Potter, Vitali Sintchenko:
Linear normalised hash function for clustering gene sequences and identifying reference sequences from multiple sequence alignments. CoRR abs/2311.17964 (2023)
2010 – 2019
- 2016
- [c51]Vijay Murgai, Derek Hendry, Kevin Downing, David Carbone, John Potter:
Development of low optical cross talk filters for VIIRS (JPSS). Earth Observing Systems 2016: 997202 - 2013
- [j12]Lingke Fan, Glen Bush, Emmanuel Katsogridakis, David M. Simpson, Robert Allen, John Potter, Anthony A. Birch, Ronney B. Panerai:
Adaptive feedback analysis and control of programmable stimuli for assessment of cerebrovascular function. Medical Biol. Eng. Comput. 51(6): 709-718 (2013) - [j11]Lingke Fan, Glen Bush, Emmanuel Katsogridakis, David M. Simpson, Robert Allen, John Potter, Anthony A. Birch, Ronney B. Panerai:
Erratum to: Adaptive feedback analysis and control of programmable stimuli for assessment of cerebrovascular function. Medical Biol. Eng. Comput. 51(7): 835 (2013) - [c50]Yi Lu, John Potter, Jingling Xue:
Structural Lock Correlation with Ownership Types. ESOP 2013: 391-410 - 2012
- [c49]Yi Lu, John Potter, Jingling Xue:
Ownership Types for Object Synchronisation. APLAS 2012: 18-33 - [c48]Yi Lu, John Potter, Chenyi Zhang, Jingling Xue:
A Type and Effect System for Determinism in Multithreaded Programs. ESOP 2012: 518-538
2000 – 2009
- 2009
- [j10]Neil Selwyn, John Potter, Sue Cranmer:
Primary pupils' use of information and communication technologies at school and home. Br. J. Educ. Technol. 40(5): 919-932 (2009) - [j9]Sue Cranmer, Neil Selwyn, John Potter:
Exploring primary pupils' experiences and understandings of 'e-safety'. Educ. Inf. Technol. 14(2): 127-142 (2009) - [c47]Yi Lu, John Potter, Jingling Xue:
Ownership Downgrading for Ownership Types. APLAS 2009: 144-160 - [c46]Manal Helal, Lenore R. Mullin, John Potter, Vitali Sintchenko:
Search Space Reduction Technique for Distributed Multiple Sequence Alignment. NPC 2009: 219-226 - 2007
- [j8]John Potter, Abdelsalam Shanneb:
Incremental Lock Selection for Composite Objects. J. Object Technol. 6(9): 477-494 (2007) - [j7]Jingling Xue, Phung Hua Nguyen, John Potter:
Interprocedural side-effect analysis for incomplete object-oriented software modules. J. Syst. Softw. 80(1): 92-105 (2007) - [c45]Abdul Babar, Vladimir Tosic, John Potter:
Aligning the Map Requirements Modelling with the B-method for Formal Software Development. APSEC 2007: 17-24 - [c44]Yi Lu, John Potter, Jingling Xue:
Validity Invariants and Effects. ECOOP 2007: 202-226 - 2006
- [c43]Abdelsalam Shanneb, John Potter:
Lock Selection Made Easy. ASWEC 2006: 341-350 - [c42]Yi Lu, John Potter:
On Ownership and Accessibility. ECOOP 2006: 99-123 - [c41]Michael Chan, John Potter:
Recognition of Musically Similar Polyphonic Music. ICPR (4) 2006: 809-812 - [c40]Yi Lu, John Potter:
Protecting representation with effect encapsulation. POPL 2006: 359-371 - 2005
- [j6]John Potter:
Book review. Comput. Educ. 44(2): 197-200 (2005) - [j5]Abdelsalam Shanneb, John Potter, James Noble:
Exclusion requirements and potential concurrency for composite objects. Sci. Comput. Program. 58(3): 344-365 (2005) - [c39]Abdelsalam Shanneb, John Potter:
Flexible Exclusion Control for Composite Objects. ACSC 2005: 277-286 - [c38]Abdul Babar, John Potter:
Adapting the Personal Software Process (PSP) to Formal Methods. Australian Software Engineering Conference 2005: 192-201 - [c37]John Potter, Abdelsalam Shanneb, Eric Yu:
Demonstrating the Effectiveness of Exclusion Control for Components. Australian Software Engineering Conference 2005: 344-353 - [c36]Yi Lu, John Potter:
A Type System for Reachability and Acyclicity. ECOOP 2005: 479-503 - 2002
- [j4]Trent Hill, James Noble, John Potter:
Scalable Visualizations of Object-Oriented Systems with Ownership Trees. J. Vis. Lang. Comput. 13(3): 319-339 (2002) - [c35]Xiaogang Zhang, John Potter:
Responsive Bisimulation. IFIP TCS 2002: 601-612 - 2001
- [c34]David G. Clarke, James Noble, John Potter:
Simple Ownership Types for Object Containment. ECOOP 2001: 53-76 - [c33]Jonathon Tidswell, John Potter:
A graphical definition of authorization schema in the DTAC model. SACMAT 2001: 109-120 - 2000
- [c32]John Potter, James Noble:
Conglomeration -- Realizing Alias Protection. ACSC 2000: 189-195 - [c31]James Noble, David Holmes, John Potter:
Exclusion for composite objects. OOPSLA 2000: 13-28 - [c30]Trent Hill, James Noble, John Potter:
Scalable Visualisations with Ownership Trees. TOOLS (37) 2000: 202-213 - [c29]John Potter:
Object Structuring Techniques. TOOLS (34) 2000: 443-444 - [c28]Trent Hill, James Noble, John Potter:
Visualizing the Structure of Object-Oriented Systems. VL 2000: 191-198
1990 – 1999
- 1999
- [c27]David G. Clarke, James Noble, John Potter:
Overcoming Representation Exposure. ECOOP Workshops 1999: 149-151 - [c26]Jonathon Tidswell, Geoffrey H. Outhred, John Potter:
Dynamic Rights: Safe Extensible Access Control. ACM Workshop on Role-Based Access Control 1999: 113-120 - [c25]James Noble, David G. Clarke, John Potter:
Object Ownership for Dynamic Alias Protection. TOOLS (32) 1999: 176-187 - 1998
- [c24]Jonathon Tidswell, John Potter:
A Dynamically Typed Access Control Model. ACISP 1998: 308-319 - [c23]John Potter, James Noble, David G. Clarke:
The Ins and Outs of Objects. Australian Software Engineering Conference 1998: 80-89 - [c22]James Noble, Jan Vitek, John Potter:
Flexible Alias Protection. ECOOP 1998: 158-185 - [c21]Geoffrey H. Outhred, John Potter:
Component Composition with Sharing. ECOOP Workshops 1998: 141-142 - [c20]David Holmes, James Noble, John Potter:
Toward Reusable Synchronisation for Object-Oriented Languages. ECOOP Workshops 1998: 439 - [c19]David G. Clarke, John Potter, James Noble:
Ownership Types for Flexible Alias Protection. OOPSLA 1998: 48-64 - [c18]John Potter, Ryan Shelswell, Ian Joyner:
Library Interoperability via Inheritance. TOOLS (26) 1998: 71-83 - [c17]Xiaogang Zhang, John Potter:
A Compositional Approach to Concurrent Objects. TOOLS (27) 1998: 116-126 - 1997
- [c16]Jonathon Tidswell, John Potter:
An Approach to Dynamic Domain and Type Enforcement. ACISP 1997: 26-37 - [c15]James Noble, John Potter:
Change Detection for Aggregate Objects with Aliasing. Australian Software Engineering Conference 1997: 98- - [c14]Geoffrey H. Outhred, John Potter:
A Flexible Service Selection Model for Enterprise Distributed Systems. EDOC 1997: 227- - [c13]David Holmes, James Noble, John Potter:
Aspects of Synchronization. TOOLS (25) 1997: 2-14 - [c12]John Potter, Richard Soley:
Keynotes: Java and Eiffel: A de facto relationship? TOOLS (23) 1997: 3 - [c11]Axel Wabenhorst, John Potter:
Modelling Multi-Threading in Java. TOOLS (25) 1997: 153-164 - [c10]Xiaogang Zhang, John Potter:
Class-Based Models in the -Calculus. TOOLS (25) 1997: 238-251 - [c9]James Noble, John Potter:
Applying Design Patterns. TOOLS (25) 1997: 355-356 - 1996
- [j3]Mark Sifer, John Potter:
Structured Graphs: A Visual Formalism for Scalable Graph Based CASE Tools. Aust. Comput. J. 28(1): 13-26 (1996) - [c8]David B. Lowe, Athula Ginige, Mark Sifer, John Potter:
The Matilda Data Model and its Implications. MMM 1996: 269-285 - [c7]Steven Sommer, John Potter:
Operating system extensions for dynamic real-time application. RTSS 1996: 45-50 - 1995
- [j2]Mark Sifer, John Potter:
Scalability for Graph-Based Case Tools. Int. J. Softw. Eng. Knowl. Eng. 5(3): 347-365 (1995) - 1994
- [c6]Mark Sifer, John Potter:
Scalability for graph based CASE tools. APSEC 1994: 317-326 - 1993
- [c5]Ghinwa Jalloul, John Potter:
A Separate Proposal for Eiffel. TOOLS (12/9) 1993: 63-74 - [c4]John Potter, Christine Mingins:
Object-Oriented Design - the Eiffel Method. TOOLS (12/9) 1993: 320 - [e2]Christine Mingins, William Haebich, John Potter, Bertrand Meyer:
Technology of Object-Oriented Languages and Systems Tools 12: Proceedings of the twelfth International Conference Tools Pacific, Melbourne 1993. Incorporating the proceedings of Tools 9, Sydney 1992. Prentice Hall 1993, ISBN 0-13-124512-0 [contents] - 1992
- [c3]Ghinwa Jalloul, John Potter:
Models for Concurrent Eiffel. TOOLS (6) 1992: 183-191 - [c2]John Potter:
Designing for Reusability. TOOLS (6) 1992: 239 - 1991
- [e1]John Potter, Mario Tokoro, Bertrand Meyer:
TOOLS 1992: 6th International Conference on Technology of Object-Oriented Languages and Systems, Sydney, Australia. Prentice Hall 1991, ISBN 0-13-926940-1 [contents]
1980 – 1989
- 1986
- [c1]Thomas Vasak, John Potter:
Characterisation of Terminating Logic Programs. SLP 1986: 140-147 - 1985
- [j1]Thomas Vasak, John Potter:
Metalogical Control for Logic Programs. J. Log. Program. 2(3): 203-220 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint