2009 | ||
---|---|---|
95 | Pratyusa K. Manadhata, Yücel Karabulut, Jeannette M. Wing: Report: Measuring the Attack Surfaces of Enterprise Software. ESSoS 2009: 91-100 | |
94 | Michael Carl Tschantz, Jeannette M. Wing: Formal Methods for Privacy. FM 2009: 1-15 | |
93 | Jeannette M. Wing, Mark Guzdial: CS woes: deadline-driven research, academic inequality. Commun. ACM 52(12): 8-9 (2009) | |
92 | Jeannette M. Wing, Daniel Reed, Mark Guzdial: An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing. Commun. ACM 52(8): 12-13 (2009) | |
2008 | ||
91 | Jeannette M. Wing: Computational thinking and thinking about computing. IPDPS 2008: 1 | |
90 | Michael Carl Tschantz, Jeannette M. Wing: Extracting Conditional Confidentiality Policies. SEFM 2008: 107-116 | |
89 | Jeannette M. Wing: Five deep questions in computing. Commun. ACM 51(1): 58-60 (2008) | |
2007 | ||
88 | Peter B. Henderson, Thomas J. Cortina, Jeannette M. Wing: Computational thinking. SIGCSE 2007: 195-196 | |
87 | Jeannette M. Wing: Software Security. TASE 2007: 21 | |
2006 | ||
86 | Jeannette M. Wing: Attack graph generation and analysis. ASIACCS 2006: 14 | |
85 | Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen: Measuring the attack surfaces of two FTP daemons. QoP 2006: 3-10 | |
84 | Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing: Ranking Attack Graphs. RAID 2006: 127-144 | |
83 | Jeannette M. Wing: Computational thinking. Commun. ACM 49(3): 33-35 (2006) | |
2005 | ||
82 | Jonathan D. Pincus, Jeannette M. Wing: Towards an Algebra for Security Policies. ICATPN 2005: 17-25 | |
81 | Jeannette M. Wing: Scenario Graphs Applied to Security (Extended Abstract). VISSAS 2005: 229-234 | |
80 | Kong-wei Lye, Jeannette M. Wing: Game strategies in network security. Int. J. Inf. Sec. 4(1-2): 71-86 (2005) | |
2003 | ||
79 | Oleg Sheyner, Jeannette M. Wing: Tools for Generating and Analyzing Attack Graphs. FMCO 2003: 344-372 | |
78 | Jeannette M. Wing: A Call to Action: Look Beyond the Horizon. IEEE Security & Privacy 1(6): 62-67 (2003) | |
77 | Jeannette M. Wing: Platitudes and attitudes. STTT 4(3): 261-265 (2003) | |
2002 | ||
76 | Somesh Jha, Oleg Sheyner, Jeannette M. Wing: Two Formal Analys s of Attack Graphs. CSFW 2002: 49-63 | |
75 | Theodore M. Wong, Chenxi Wang, Jeannette M. Wing: Verifiable Secret Redistribution for Archive System. IEEE Security in Storage Workshop 2002: 94-106 | |
74 | Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing: Automated Generation and Analysis of Attack Graphs. IEEE Symposium on Security and Privacy 2002: 273-284 | |
73 | Jeannette M. Wing: Mathematics in Computer Science Curricula. MPC 2002: 22 | |
72 | Jeannette M. Wing: Vulnerability Analysis of Networked Systems. WETICE 2002: 4 | |
2001 | ||
71 | Jeannette M. Wing: Survivability Analysis of Networked Systems. FORTE 2001: 459- | |
70 | Somesh Jha, Jeannette M. Wing: Survivability Analysis of Network Systems. ICSE 2001: 307-317 | |
2000 | ||
69 | Jeannette M. Wing: Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum. AMAST 2000: 2-9 | |
68 | Jeannette M. Wing: Survivability Analysis of Networked Systems . APSEC 2000: 6-7 | |
67 | Sanjay K. Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff: Survivability Analysis of Network Specifications. DSN 2000: 613-622 | |
66 | Jeannette M. Wing, Jim Woodcock: The First World Congress on Formal Methods in the Development of Computing Systems. Formal Asp. Comput. 12(3): 145-146 (2000) | |
65 | Jeannette M. Wing, Jim Woodcock: Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems. Formal Methods in System Design 17(3): 199-200 (2000) | |
64 | Jeannette M. Wing, John Ockerbloom: Respectful Type Converters. IEEE Trans. Software Eng. 26(7): 579-593 (2000) | |
63 | Jeannette M. Wing, Jim Woodcock: Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems. IEEE Trans. Software Eng. 26(8): 673-674 (2000) | |
1999 | ||
62 | Jeannette M. Wing, Jim Woodcock, Jim Davies: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I Springer 1999 | |
61 | Jeannette M. Wing, Jim Woodcock, Jim Davies: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II Springer 1999 | |
60 | Daniel Jackson, Yu-Chung Ng, Jeannette M. Wing: A Nitpick Analysis of Mobile IPv6. Formal Asp. Comput. 11(6): 591-615 (1999) | |
1998 | ||
59 | Jeannette M. Wing: Formal Methods: Past, Present, and Future (Abstract). ASIAN 1998: 224 | |
58 | Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing: Proving Correctness of a Controller Algorithm for the RAID Level 5 System. FTCS 1998: 16-25 | |
57 | Gary T. Leavens, Jeannette M. Wing: Protective Interface Specifications. Formal Asp. Comput. 10(1): 59-75 (1998) | |
1997 | ||
56 | Gary T. Leavens, Jeannette M. Wing: Protective Interface Specifications. TAPSOFT 1997: 520-534 | |
55 | Amy Moormann Zaremski, Jeannette M. Wing: Specification Matching of Software Components. ACM Trans. Softw. Eng. Methodol. 6(4): 333-369 (1997) | |
54 | Jeannette M. Wing, Mandana Vaziri: A Case study in Model Checking Software Systems. Sci. Comput. Program. 28(2-3): 273-299 (1997) | |
1996 | ||
53 | Edmund M. Clarke, Jeannette M. Wing: Formal Methods: State of the Art and Future Directions. ACM Comput. Surv. 28(4): 626-643 (1996) | |
52 | Edmund M. Clarke, Jeannette M. Wing: Tools and Partial Analysis. ACM Comput. Surv. 28(4es): 116 (1996) | |
51 | Jonathan P. Bowen, Ricky W. Butler, David L. Dill, Robert L. Glass, David Gries, Anthony Hall, Michael G. Hinchey, C. Michael Holloway, Daniel Jackson, Cliff B. Jones, Michael J. Lutz, David Lorge Parnas, John M. Rushby, Jeannette M. Wing, Pamela Zave: An Invitation to Formal Methods. IEEE Computer 29(4): 16-30 (1996) | |
1995 | ||
50 | Jeannette M. Wing: Teaching Mathematics to Software Engineers. AMAST 1995: 18-40 | |
49 | David Garlan, Alan W. Brown, Daniel Jackson, James E. Tomayko, Jeannette M. Wing: The CMU Master of Software Engineering Core Curriculum. CSEE 1995: 65-86 | |
48 | Jeannette M. Wing, David C. Steere: Specifying Weak Sets. ICDCS 1995: 414-421 | |
47 | Jeannette M. Wing, Mandana Vaziri: Model Checking Software Systems: A Case Study. SIGSOFT FSE 1995: 128-139 | |
46 | Amy Moormann Zaremski, Jeannette M. Wing: Specification Matching of Software Components. SIGSOFT FSE 1995: 6-17 | |
45 | Barbara Liskov, Jeannette M. Wing: Specifications and Their Use in Defining Subtypes. ZUM 1995: 245-263 | |
44 | Jeannette M. Wing: Hints for Writing Specifications. ZUM 1995: 497 | |
43 | Amy Moormann Zaremski, Jeannette M. Wing: Signature Matching: A Tool for Using Software Libraries. ACM Trans. Softw. Eng. Methodol. 4(2): 146-170 (1995) | |
1994 | ||
42 | David C. Steere, Mahadev Satyanarayanan, Jeannette M. Wing: Dynamic Sets for Search. PODC 1994: 397 | |
41 | Lily B. Mummert, Jeannette M. Wing, Mahadev Satyanarayanan: Using Belief to Reason about Cache Coherence. PODC 1994: 71-80 | |
40 | Nicholas Haines, Darrell Kindred, J. Gregory Morrisett, Scott Nettles, Jeannette M. Wing: Composing First-Class Transactions. ACM Trans. Program. Lang. Syst. 16(6): 1719-1736 (1994) | |
39 | Barbara Liskov, Jeannette M. Wing: A Behavioral Notion of Subtyping. ACM Trans. Program. Lang. Syst. 16(6): 1811-1841 (1994) | |
1993 | ||
38 | Ursula Martin, Jeannette M. Wing: First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992 Springer 1993 | |
37 | Barbara Liskov, Jeannette M. Wing: A New Definition of the Subtype Relation. ECOOP 1993: 118-141 | |
36 | Jeannette M. Wing: Decomposing and Recomposing Transactional Concepts. ECOOP Workshop 1993: 111-121 | |
35 | Barbara Liskov, Jeannette M. Wing: Specifications and Their Use in Defining Subtypes. OOPSLA 1993: 16-28 | |
34 | Amy Moormann Zaremski, Jeannette M. Wing: Signature Matching: A Key to Reuse. SIGSOFT FSE 1993: 182-190 | |
33 | Jeannette M. Wing, C. Gong: Testing and Verifying Concurrent Objects. J. Parallel Distrib. Comput. 17(1-2): 164-182 (1993) | |
1992 | ||
32 | Jeannette M. Wing: Specification in Software Development LICS 1992: 112 | |
31 | Jeannette M. Wing, Eugene J. Rollins, Amy Moormann Zaremski: Thoughts on a Larch/ML and a New Application for LP. Larch 1992: 297-312 | |
1991 | ||
30 | Eugene J. Rollins, Jeannette M. Wing: Specifications as Search Keys for Software Libraries. ICLP 1991: 173-187 | |
29 | Jeannette M. Wing, Amy Moormann Zaremski: Unintrusive Ways to Integrate Formal Specifications in Practice. VDM Europe (1) 1991: 545-569 | |
28 | Maurice Herlihy, Jeannette M. Wing: Specifying Graceful Degradation. IEEE Trans. Parallel Distrib. Syst. 2(1): 93-104 (1991) | |
1990 | ||
27 | Stewart M. Clamen, Linda D. Leibengood, Scott Nettles, Jeannette M. Wing: Reliable Distributed Computing with Avalon/Common Lisp. ICCL 1990: 169-179 | |
26 | Mario Barbacci, Jeannette M. Wing: A Language for Distributed Applications. ICCL 1990: 59-68 | |
25 | Maurice Herlihy, Jeannette M. Wing: Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst. 12(3): 463-492 (1990) | |
24 | Jeannette M. Wing: A Specifier's Introduction to Formal Methods. IEEE Computer 23(9): 8-24 (1990) | |
23 | Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990) | |
22 | Jeannette M. Wing: Using Larch to Specify Avalon/C++ Objects. IEEE Trans. Software Eng. 16(9): 1076-1088 (1990) | |
1989 | ||
21 | Maurice Herlihy, Jeannette M. Wing: Specifying Security Constraints with Relaxation Lattices. CSFW 1989: 47-53 | |
20 | Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Constraining Pictures with Pictures. IFIP Congress 1989: 157-162 | |
19 | Stanley B. Zdonik, Toby Bloom, David W. Stemple, Jeannette M. Wing: Panel on Transactions in Object-Oriented Systems. OOPSLA 1989: 473-476 | |
18 | Jeannette M. Wing: Verifying Atomic Data Types. REX Workshop 1989: 731-758 | |
17 | Jeannette M. Wing: Specifying Avalon Objects in Larch. TAPSOFT, Vol.2 1989: 61-80 | |
16 | Mario Barbacci, Dennis L. Doubleday, Charles B. Weinstock, Jeannette M. Wing: Developing Applications for Heterogeneous Machine Networks: The Durra Network. Computing Systems 2(1): 7-35 (1989) | |
15 | Jeannette M. Wing, Mark R. Nixon: Extending Ina Jo with Temporal Logic. IEEE Trans. Software Eng. 15(2): 181-197 (1989) | |
14 | Maurice Herlihy, Jeannette M. Wing: Linearizable concurrent objects. SIGPLAN Notices 24(4): 133-135 (1989) | |
1988 | ||
13 | Maurice Herlihy, Jeannette M. Wing: Reasoning about Atomic Objects. FTRTFT 1988: 193-208 | |
12 | Mario Barbacci, Charles B. Weinstock, Jeannette M. Wing: Programming at the Processor-Memory-Switch Level. ICSE 1988: 19-29 | |
11 | David Detlefs, Maurice Herlihy, Jeannette M. Wing: Inheritance of Synchronization and Recovery Properties in Avalon/C++. IEEE Computer 21(12): 57-69 (1988) | |
10 | Jeannette M. Wing: A Study of 12 Specifications of the Library Problem. IEEE Software 5(4): 66-76 (1988) | |
1987 | ||
9 | David Detlefs, Maurice Herlihy, K. Kietzke, Jeannette M. Wing: Avalon/C++. C++ Workshop 1987: 451-459 | |
8 | Mario Barbacci, Jeannette M. Wing: DURRA : A Task-Level Description Language. ICPP 1987: 370-376 | |
7 | Mario Barbacci, Jeannette M. Wing: Specifying Functional and Timing Behavior for Real-Time Applications. PARLE (2) 1987: 124-140 | |
6 | Maurice Herlihy, Jeannette M. Wing: Specifying Graceful Degradation in Distributed Systems. PODC 1987: 167-177 | |
5 | Maurice Herlihy, Jeannette M. Wing: Axioms for Concurrent Objects. POPL 1987: 13-26 | |
4 | Jeannette M. Wing: Writing Larch Interface Language Specifications. ACM Trans. Program. Lang. Syst. 9(1): 1-24 (1987) | |
1986 | ||
3 | Jeannette M. Wing, Mark R. Nixon: Extending Ina Jo with Temporal Logic. IEEE Symposium on Security and Privacy 1986: 2-13 | |
1985 | ||
2 | Daniel M. Berry, Jeannette M. Wing: Specification and Prototyping: Some Thoughts on Why They Are Successful. TAPSOFT, Vol.2 1985: 117-128 | |
1982 | ||
1 | John V. Guttag, James J. Horning, Jeannette M. Wing: Some Notes on Putting Formal Specifications to Productive Use. Sci. Comput. Program. 2(1): 53-68 (1982) |