Search the dblp DataBase
Jeannette M. Wing :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David Detlefs , Maurice Herlihy , Jeannette M. Wing Inheritance of Synchronization and Recovery Properties in Avalon/C++. [Citation Graph (7, 0)][DBLP ] IEEE Computer, 1988, v:21, n:12, pp:57-69 [Journal ] Barbara Liskov , Jeannette M. Wing Specifications and Their Use in Defining Subtypes. [Citation Graph (4, 0)][DBLP ] OOPSLA, 1993, pp:16-28 [Conf ] Barbara Liskov , Jeannette M. Wing A Behavioral Notion of Subtyping. [Citation Graph (3, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1994, v:16, n:6, pp:1811-1841 [Journal ] Maurice Herlihy , Jeannette M. Wing Specifying Graceful Degradation in Distributed Systems. [Citation Graph (2, 0)][DBLP ] PODC, 1987, pp:167-177 [Conf ] Maurice Herlihy , Jeannette M. Wing Axioms for Concurrent Objects. [Citation Graph (2, 0)][DBLP ] POPL, 1987, pp:13-26 [Conf ] Jeannette M. Wing A Specifier's Introduction to Formal Methods. [Citation Graph (2, 0)][DBLP ] IEEE Computer, 1990, v:23, n:9, pp:8-24 [Journal ] Amy Moormann Zaremski , Jeannette M. Wing Specification Matching of Software Components. [Citation Graph (2, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 1997, v:6, n:4, pp:333-369 [Journal ] Lily B. Mummert , Jeannette M. Wing , Mahadev Satyanarayanan Using Belief to Reason about Cache Coherence. [Citation Graph (1, 0)][DBLP ] PODC, 1994, pp:71-80 [Conf ] Amy Moormann Zaremski , Jeannette M. Wing Specification Matching of Software Components. [Citation Graph (1, 0)][DBLP ] SIGSOFT FSE, 1995, pp:6-17 [Conf ] Nicholas Haines , Darrell Kindred , J. Gregory Morrisett , Scott Nettles , Jeannette M. Wing Composing First-Class Transactions. [Citation Graph (1, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1994, v:16, n:6, pp:1719-1736 [Journal ] Maurice Herlihy , Jeannette M. Wing Linearizability: A Correctness Condition for Concurrent Objects. [Citation Graph (1, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1990, v:12, n:3, pp:463-492 [Journal ] Jeannette M. Wing Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum. [Citation Graph (0, 0)][DBLP ] AMAST, 2000, pp:2-9 [Conf ] Jeannette M. Wing Teaching Mathematics to Software Engineers. [Citation Graph (0, 0)][DBLP ] AMAST, 1995, pp:18-40 [Conf ] Jonathan D. Pincus , Jeannette M. Wing Towards an Algebra for Security Policies. [Citation Graph (0, 0)][DBLP ] ICATPN, 2005, pp:17-25 [Conf ] Jeannette M. Wing Survivability Analysis of Networked Systems . [Citation Graph (0, 0)][DBLP ] APSEC, 2000, pp:6-7 [Conf ] Jeannette M. Wing Formal Methods: Past, Present, and Future (Abstract). [Citation Graph (0, 0)][DBLP ] ASIAN, 1998, pp:224- [Conf ] David Detlefs , Maurice Herlihy , K. Kietzke , Jeannette M. Wing Avalon/C++. [Citation Graph (0, 0)][DBLP ] C++ Workshop, 1987, pp:451-459 [Conf ] Jeannette M. Wing Attack graph generation and analysis. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:14- [Conf ] David Garlan , Alan W. Brown , Daniel Jackson , James E. Tomayko , Jeannette M. Wing The CMU Master of Software Engineering Core Curriculum. [Citation Graph (0, 0)][DBLP ] CSEE, 1995, pp:65-86 [Conf ] Maurice Herlihy , Jeannette M. Wing Specifying Security Constraints with Relaxation Lattices. [Citation Graph (0, 0)][DBLP ] CSFW, 1989, pp:47-53 [Conf ] Somesh Jha , Oleg Sheyner , Jeannette M. Wing Two Formal Analys s of Attack Graphs. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:49-63 [Conf ] Sanjay K. Jha , Jeannette M. Wing , Richard C. Linger , Thomas A. Longstaff Survivability Analysis of Network Specifications. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:613-622 [Conf ] Barbara Liskov , Jeannette M. Wing A New Definition of the Subtype Relation. [Citation Graph (0, 0)][DBLP ] ECOOP, 1993, pp:118-141 [Conf ] Jeannette M. Wing Decomposing and Recomposing Transactional Concepts. [Citation Graph (0, 0)][DBLP ] ECOOP Workshop, 1993, pp:111-121 [Conf ] Jeannette M. Wing , Amy Moormann Zaremski Unintrusive Ways to Integrate Formal Specifications in Practice. [Citation Graph (0, 0)][DBLP ] VDM Europe (1), 1991, pp:545-569 [Conf ] Oleg Sheyner , Jeannette M. Wing Tools for Generating and Analyzing Attack Graphs. [Citation Graph (0, 0)][DBLP ] FMCO, 2003, pp:344-372 [Conf ] Jeannette M. Wing Survivability Analysis of Networked Systems. [Citation Graph (0, 0)][DBLP ] FORTE, 2001, pp:459-0 [Conf ] Mandana Vaziri , Nancy A. Lynch , Jeannette M. Wing Proving Correctness of a Controller Algorithm for the RAID Level 5 System. [Citation Graph (0, 0)][DBLP ] FTCS, 1998, pp:16-25 [Conf ] Maurice Herlihy , Jeannette M. Wing Reasoning about Atomic Objects. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1988, pp:193-208 [Conf ] Mario Barbacci , Jeannette M. Wing A Language for Distributed Applications. [Citation Graph (0, 0)][DBLP ] ICCL, 1990, pp:59-68 [Conf ] Stewart M. Clamen , Linda D. Leibengood , Scott Nettles , Jeannette M. Wing Reliable Distributed Computing with Avalon/Common Lisp. [Citation Graph (0, 0)][DBLP ] ICCL, 1990, pp:169-179 [Conf ] Jeannette M. Wing , David C. Steere Specifying Weak Sets. [Citation Graph (0, 0)][DBLP ] ICDCS, 1995, pp:414-421 [Conf ] Eugene J. Rollins , Jeannette M. Wing Specifications as Search Keys for Software Libraries. [Citation Graph (0, 0)][DBLP ] ICLP, 1991, pp:173-187 [Conf ] Mario Barbacci , Jeannette M. Wing DURRA : A Task-Level Description Language. [Citation Graph (0, 0)][DBLP ] ICPP, 1987, pp:370-376 [Conf ] Mario Barbacci , Charles B. Weinstock , Jeannette M. Wing Programming at the Processor-Memory-Switch Level. [Citation Graph (0, 0)][DBLP ] ICSE, 1988, pp:19-29 [Conf ] Somesh Jha , Jeannette M. Wing Survivability Analysis of Network Systems. [Citation Graph (0, 0)][DBLP ] ICSE, 2001, pp:307-317 [Conf ] Allan Heydon , Mark W. Maimone , J. D. Tygar , Jeannette M. Wing , Amy Moormann Zaremski Constraining Pictures with Pictures. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1989, pp:157-162 [Conf ] Jeannette M. Wing , Eugene J. Rollins , Amy Moormann Zaremski Thoughts on a Larch/ML and a New Application for LP. [Citation Graph (0, 0)][DBLP ] Larch, 1992, pp:297-312 [Conf ] Jeannette M. Wing Specification in Software Development [Citation Graph (0, 0)][DBLP ] LICS, 1992, pp:112- [Conf ] Jeannette M. Wing Mathematics in Computer Science Curricula. [Citation Graph (0, 0)][DBLP ] MPC, 2002, pp:22- [Conf ] Stanley B. Zdonik , Toby Bloom , David W. Stemple , Jeannette M. Wing Panel on Transactions in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1989, pp:473-476 [Conf ] Mario Barbacci , Jeannette M. Wing Specifying Functional and Timing Behavior for Real-Time Applications. [Citation Graph (0, 0)][DBLP ] PARLE (2), 1987, pp:124-140 [Conf ] David C. Steere , Mahadev Satyanarayanan , Jeannette M. Wing Dynamic Sets for Search. [Citation Graph (0, 0)][DBLP ] PODC, 1994, pp:397- [Conf ] Vaibhav Mehta , Constantinos Bartzis , Haifeng Zhu , Edmund M. Clarke , Jeannette M. Wing Ranking Attack Graphs. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:127-144 [Conf ] Jeannette M. Wing Verifying Atomic Data Types. [Citation Graph (0, 0)][DBLP ] REX Workshop, 1989, pp:731-758 [Conf ] Peter B. Henderson , Thomas J. Cortina , Jeannette M. Wing Computational thinking. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2007, pp:195-196 [Conf ] Jeannette M. Wing , Mandana Vaziri Model Checking Software Systems: A Case Study. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1995, pp:128-139 [Conf ] Amy Moormann Zaremski , Jeannette M. Wing Signature Matching: A Key to Reuse. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1993, pp:182-190 [Conf ] Theodore M. Wong , Chenxi Wang , Jeannette M. Wing Verifiable Secret Redistribution for Archive System. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2002, pp:94-106 [Conf ] Jeannette M. Wing , Mark R. Nixon Extending Ina Jo with Temporal Logic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:2-13 [Conf ] Oleg Sheyner , Joshua W. Haines , Somesh Jha , Richard Lippmann , Jeannette M. Wing Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf ] Daniel M. Berry , Jeannette M. Wing Specification and Prototyping: Some Thoughts on Why They Are Successful. [Citation Graph (0, 0)][DBLP ] TAPSOFT, Vol.2, 1985, pp:117-128 [Conf ] Gary T. Leavens , Jeannette M. Wing Protective Interface Specifications. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1997, pp:520-534 [Conf ] Jeannette M. Wing Specifying Avalon Objects in Larch. [Citation Graph (0, 0)][DBLP ] TAPSOFT, Vol.2, 1989, pp:61-80 [Conf ] Jeannette M. Wing Scenario Graphs Applied to Security (Extended Abstract). [Citation Graph (0, 0)][DBLP ] VISSAS, 2005, pp:229-234 [Conf ] Jeannette M. Wing Vulnerability Analysis of Networked Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:4- [Conf ] Barbara Liskov , Jeannette M. Wing Specifications and Their Use in Defining Subtypes. [Citation Graph (0, 0)][DBLP ] ZUM, 1995, pp:245-263 [Conf ] Jeannette M. Wing Hints for Writing Specifications. [Citation Graph (0, 0)][DBLP ] ZUM, 1995, pp:497- [Conf ] Jeannette M. Wing Computational thinking. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:3, pp:33-35 [Journal ] Jonathan P. Bowen , Ricky W. Butler , David L. Dill , Robert L. Glass , David Gries , Anthony Hall , Michael G. Hinchey , C. Michael Holloway , Daniel Jackson , Cliff B. Jones , Michael J. Lutz , David Lorge Parnas , John M. Rushby , Jeannette M. Wing , Pamela Zave An Invitation to Formal Methods. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1996, v:29, n:4, pp:16-30 [Journal ] Edmund M. Clarke , Jeannette M. Wing Formal Methods: State of the Art and Future Directions. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4, pp:626-643 [Journal ] Edmund M. Clarke , Jeannette M. Wing Tools and Partial Analysis. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:116- [Journal ] Mario Barbacci , Dennis L. Doubleday , Charles B. Weinstock , Jeannette M. Wing Developing Applications for Heterogeneous Machine Networks: The Durra Network. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1989, v:2, n:1, pp:7-35 [Journal ] Daniel Jackson , Yu-Chung Ng , Jeannette M. Wing A Nitpick Analysis of Mobile IPv6. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1999, v:11, n:6, pp:591-615 [Journal ] Gary T. Leavens , Jeannette M. Wing Protective Interface Specifications. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1998, v:10, n:1, pp:59-75 [Journal ] Jeannette M. Wing , Jim Woodcock The First World Congress on Formal Methods in the Development of Computing Systems. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2000, v:12, n:3, pp:145-146 [Journal ] Jeannette M. Wing , Jim Woodcock Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems. [Citation Graph (0, 0)][DBLP ] Formal Methods in System Design, 2000, v:17, n:3, pp:199-200 [Journal ] Jeannette M. Wing A Call to Action: Look Beyond the Horizon. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:6, pp:62-67 [Journal ] Kong-wei Lye , Jeannette M. Wing Game strategies in network security. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:71-86 [Journal ] Jeannette M. Wing , C. Gong Testing and Verifying Concurrent Objects. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1993, v:17, n:1-2, pp:164-182 [Journal ] John V. Guttag , James J. Horning , Jeannette M. Wing Some Notes on Putting Formal Specifications to Productive Use. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1982, v:2, n:1, pp:53-68 [Journal ] Jeannette M. Wing , Mandana Vaziri A Case study in Model Checking Software Systems. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1997, v:28, n:2-3, pp:273-299 [Journal ] Maurice Herlihy , Jeannette M. Wing Linearizable concurrent objects. [Citation Graph (0, 0)][DBLP ] SIGPLAN Notices, 1989, v:24, n:4, pp:133-135 [Journal ] Jeannette M. Wing Platitudes and attitudes. [Citation Graph (0, 0)][DBLP ] STTT, 2003, v:4, n:3, pp:261-265 [Journal ] Jeannette M. Wing Writing Larch Interface Language Specifications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1987, v:9, n:1, pp:1-24 [Journal ] Amy Moormann Zaremski , Jeannette M. Wing Signature Matching: A Tool for Using Software Libraries. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 1995, v:4, n:2, pp:146-170 [Journal ] Maurice Herlihy , Jeannette M. Wing Specifying Graceful Degradation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1991, v:2, n:1, pp:93-104 [Journal ] Allan Heydon , Mark W. Maimone , J. D. Tygar , Jeannette M. Wing , Amy Moormann Zaremski Miró: Visual Specification of Security. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:10, pp:1185-1197 [Journal ] Jeannette M. Wing Using Larch to Specify Avalon/C++ Objects. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:9, pp:1076-1088 [Journal ] Jeannette M. Wing , Mark R. Nixon Extending Ina Jo with Temporal Logic. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:2, pp:181-197 [Journal ] Jeannette M. Wing , John Ockerbloom Respectful Type Converters. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2000, v:26, n:7, pp:579-593 [Journal ] Jeannette M. Wing , Jim Woodcock Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2000, v:26, n:8, pp:673-674 [Journal ] Jeannette M. Wing Software Security. [Citation Graph (0, 0)][DBLP ] TASE, 2007, pp:21- [Conf ] Measuring the attack surfaces of two FTP daemons. [Citation Graph (, )][DBLP ] Formal Methods for Privacy. [Citation Graph (, )][DBLP ] Computational thinking and thinking about computing. [Citation Graph (, )][DBLP ] Extracting Conditional Confidentiality Policies. [Citation Graph (, )][DBLP ] Report: Measuring the Attack Surfaces of Enterprise Software. [Citation Graph (, )][DBLP ] Five deep questions in computing. [Citation Graph (, )][DBLP ] An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing. [Citation Graph (, )][DBLP ] CS woes: deadline-driven research, academic inequality. [Citation Graph (, )][DBLP ] NSF funding advice: 21st century innovation. [Citation Graph (, )][DBLP ] Search in 0.186secs, Finished in 0.191secs