The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeannette M. Wing: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Detlefs, Maurice Herlihy, Jeannette M. Wing
    Inheritance of Synchronization and Recovery Properties in Avalon/C++. [Citation Graph (7, 0)][DBLP]
    IEEE Computer, 1988, v:21, n:12, pp:57-69 [Journal]
  2. Barbara Liskov, Jeannette M. Wing
    Specifications and Their Use in Defining Subtypes. [Citation Graph (4, 0)][DBLP]
    OOPSLA, 1993, pp:16-28 [Conf]
  3. Barbara Liskov, Jeannette M. Wing
    A Behavioral Notion of Subtyping. [Citation Graph (3, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:6, pp:1811-1841 [Journal]
  4. Maurice Herlihy, Jeannette M. Wing
    Specifying Graceful Degradation in Distributed Systems. [Citation Graph (2, 0)][DBLP]
    PODC, 1987, pp:167-177 [Conf]
  5. Maurice Herlihy, Jeannette M. Wing
    Axioms for Concurrent Objects. [Citation Graph (2, 0)][DBLP]
    POPL, 1987, pp:13-26 [Conf]
  6. Jeannette M. Wing
    A Specifier's Introduction to Formal Methods. [Citation Graph (2, 0)][DBLP]
    IEEE Computer, 1990, v:23, n:9, pp:8-24 [Journal]
  7. Amy Moormann Zaremski, Jeannette M. Wing
    Specification Matching of Software Components. [Citation Graph (2, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 1997, v:6, n:4, pp:333-369 [Journal]
  8. Lily B. Mummert, Jeannette M. Wing, Mahadev Satyanarayanan
    Using Belief to Reason about Cache Coherence. [Citation Graph (1, 0)][DBLP]
    PODC, 1994, pp:71-80 [Conf]
  9. Amy Moormann Zaremski, Jeannette M. Wing
    Specification Matching of Software Components. [Citation Graph (1, 0)][DBLP]
    SIGSOFT FSE, 1995, pp:6-17 [Conf]
  10. Nicholas Haines, Darrell Kindred, J. Gregory Morrisett, Scott Nettles, Jeannette M. Wing
    Composing First-Class Transactions. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:6, pp:1719-1736 [Journal]
  11. Maurice Herlihy, Jeannette M. Wing
    Linearizability: A Correctness Condition for Concurrent Objects. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1990, v:12, n:3, pp:463-492 [Journal]
  12. Jeannette M. Wing
    Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum. [Citation Graph (0, 0)][DBLP]
    AMAST, 2000, pp:2-9 [Conf]
  13. Jeannette M. Wing
    Teaching Mathematics to Software Engineers. [Citation Graph (0, 0)][DBLP]
    AMAST, 1995, pp:18-40 [Conf]
  14. Jonathan D. Pincus, Jeannette M. Wing
    Towards an Algebra for Security Policies. [Citation Graph (0, 0)][DBLP]
    ICATPN, 2005, pp:17-25 [Conf]
  15. Jeannette M. Wing
    Survivability Analysis of Networked Systems . [Citation Graph (0, 0)][DBLP]
    APSEC, 2000, pp:6-7 [Conf]
  16. Jeannette M. Wing
    Formal Methods: Past, Present, and Future (Abstract). [Citation Graph (0, 0)][DBLP]
    ASIAN, 1998, pp:224- [Conf]
  17. David Detlefs, Maurice Herlihy, K. Kietzke, Jeannette M. Wing
    Avalon/C++. [Citation Graph (0, 0)][DBLP]
    C++ Workshop, 1987, pp:451-459 [Conf]
  18. Jeannette M. Wing
    Attack graph generation and analysis. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:14- [Conf]
  19. David Garlan, Alan W. Brown, Daniel Jackson, James E. Tomayko, Jeannette M. Wing
    The CMU Master of Software Engineering Core Curriculum. [Citation Graph (0, 0)][DBLP]
    CSEE, 1995, pp:65-86 [Conf]
  20. Maurice Herlihy, Jeannette M. Wing
    Specifying Security Constraints with Relaxation Lattices. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:47-53 [Conf]
  21. Somesh Jha, Oleg Sheyner, Jeannette M. Wing
    Two Formal Analys s of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:49-63 [Conf]
  22. Sanjay K. Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff
    Survivability Analysis of Network Specifications. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:613-622 [Conf]
  23. Barbara Liskov, Jeannette M. Wing
    A New Definition of the Subtype Relation. [Citation Graph (0, 0)][DBLP]
    ECOOP, 1993, pp:118-141 [Conf]
  24. Jeannette M. Wing
    Decomposing and Recomposing Transactional Concepts. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshop, 1993, pp:111-121 [Conf]
  25. Jeannette M. Wing, Amy Moormann Zaremski
    Unintrusive Ways to Integrate Formal Specifications in Practice. [Citation Graph (0, 0)][DBLP]
    VDM Europe (1), 1991, pp:545-569 [Conf]
  26. Oleg Sheyner, Jeannette M. Wing
    Tools for Generating and Analyzing Attack Graphs. [Citation Graph (0, 0)][DBLP]
    FMCO, 2003, pp:344-372 [Conf]
  27. Jeannette M. Wing
    Survivability Analysis of Networked Systems. [Citation Graph (0, 0)][DBLP]
    FORTE, 2001, pp:459-0 [Conf]
  28. Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing
    Proving Correctness of a Controller Algorithm for the RAID Level 5 System. [Citation Graph (0, 0)][DBLP]
    FTCS, 1998, pp:16-25 [Conf]
  29. Maurice Herlihy, Jeannette M. Wing
    Reasoning about Atomic Objects. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1988, pp:193-208 [Conf]
  30. Mario Barbacci, Jeannette M. Wing
    A Language for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    ICCL, 1990, pp:59-68 [Conf]
  31. Stewart M. Clamen, Linda D. Leibengood, Scott Nettles, Jeannette M. Wing
    Reliable Distributed Computing with Avalon/Common Lisp. [Citation Graph (0, 0)][DBLP]
    ICCL, 1990, pp:169-179 [Conf]
  32. Jeannette M. Wing, David C. Steere
    Specifying Weak Sets. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1995, pp:414-421 [Conf]
  33. Eugene J. Rollins, Jeannette M. Wing
    Specifications as Search Keys for Software Libraries. [Citation Graph (0, 0)][DBLP]
    ICLP, 1991, pp:173-187 [Conf]
  34. Mario Barbacci, Jeannette M. Wing
    DURRA : A Task-Level Description Language. [Citation Graph (0, 0)][DBLP]
    ICPP, 1987, pp:370-376 [Conf]
  35. Mario Barbacci, Charles B. Weinstock, Jeannette M. Wing
    Programming at the Processor-Memory-Switch Level. [Citation Graph (0, 0)][DBLP]
    ICSE, 1988, pp:19-29 [Conf]
  36. Somesh Jha, Jeannette M. Wing
    Survivability Analysis of Network Systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:307-317 [Conf]
  37. Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski
    Constraining Pictures with Pictures. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:157-162 [Conf]
  38. Jeannette M. Wing, Eugene J. Rollins, Amy Moormann Zaremski
    Thoughts on a Larch/ML and a New Application for LP. [Citation Graph (0, 0)][DBLP]
    Larch, 1992, pp:297-312 [Conf]
  39. Jeannette M. Wing
    Specification in Software Development [Citation Graph (0, 0)][DBLP]
    LICS, 1992, pp:112- [Conf]
  40. Jeannette M. Wing
    Mathematics in Computer Science Curricula. [Citation Graph (0, 0)][DBLP]
    MPC, 2002, pp:22- [Conf]
  41. Stanley B. Zdonik, Toby Bloom, David W. Stemple, Jeannette M. Wing
    Panel on Transactions in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1989, pp:473-476 [Conf]
  42. Mario Barbacci, Jeannette M. Wing
    Specifying Functional and Timing Behavior for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    PARLE (2), 1987, pp:124-140 [Conf]
  43. David C. Steere, Mahadev Satyanarayanan, Jeannette M. Wing
    Dynamic Sets for Search. [Citation Graph (0, 0)][DBLP]
    PODC, 1994, pp:397- [Conf]
  44. Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing
    Ranking Attack Graphs. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:127-144 [Conf]
  45. Jeannette M. Wing
    Verifying Atomic Data Types. [Citation Graph (0, 0)][DBLP]
    REX Workshop, 1989, pp:731-758 [Conf]
  46. Peter B. Henderson, Thomas J. Cortina, Jeannette M. Wing
    Computational thinking. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:195-196 [Conf]
  47. Jeannette M. Wing, Mandana Vaziri
    Model Checking Software Systems: A Case Study. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1995, pp:128-139 [Conf]
  48. Amy Moormann Zaremski, Jeannette M. Wing
    Signature Matching: A Key to Reuse. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1993, pp:182-190 [Conf]
  49. Theodore M. Wong, Chenxi Wang, Jeannette M. Wing
    Verifiable Secret Redistribution for Archive System. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:94-106 [Conf]
  50. Jeannette M. Wing, Mark R. Nixon
    Extending Ina Jo with Temporal Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:2-13 [Conf]
  51. Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing
    Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf]
  52. Daniel M. Berry, Jeannette M. Wing
    Specification and Prototyping: Some Thoughts on Why They Are Successful. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, Vol.2, 1985, pp:117-128 [Conf]
  53. Gary T. Leavens, Jeannette M. Wing
    Protective Interface Specifications. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:520-534 [Conf]
  54. Jeannette M. Wing
    Specifying Avalon Objects in Larch. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, Vol.2, 1989, pp:61-80 [Conf]
  55. Jeannette M. Wing
    Scenario Graphs Applied to Security (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    VISSAS, 2005, pp:229-234 [Conf]
  56. Jeannette M. Wing
    Vulnerability Analysis of Networked Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:4- [Conf]
  57. Barbara Liskov, Jeannette M. Wing
    Specifications and Their Use in Defining Subtypes. [Citation Graph (0, 0)][DBLP]
    ZUM, 1995, pp:245-263 [Conf]
  58. Jeannette M. Wing
    Hints for Writing Specifications. [Citation Graph (0, 0)][DBLP]
    ZUM, 1995, pp:497- [Conf]
  59. Jeannette M. Wing
    Computational thinking. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:3, pp:33-35 [Journal]
  60. Jonathan P. Bowen, Ricky W. Butler, David L. Dill, Robert L. Glass, David Gries, Anthony Hall, Michael G. Hinchey, C. Michael Holloway, Daniel Jackson, Cliff B. Jones, Michael J. Lutz, David Lorge Parnas, John M. Rushby, Jeannette M. Wing, Pamela Zave
    An Invitation to Formal Methods. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1996, v:29, n:4, pp:16-30 [Journal]
  61. Edmund M. Clarke, Jeannette M. Wing
    Formal Methods: State of the Art and Future Directions. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4, pp:626-643 [Journal]
  62. Edmund M. Clarke, Jeannette M. Wing
    Tools and Partial Analysis. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4es, pp:116- [Journal]
  63. Mario Barbacci, Dennis L. Doubleday, Charles B. Weinstock, Jeannette M. Wing
    Developing Applications for Heterogeneous Machine Networks: The Durra Network. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1989, v:2, n:1, pp:7-35 [Journal]
  64. Daniel Jackson, Yu-Chung Ng, Jeannette M. Wing
    A Nitpick Analysis of Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1999, v:11, n:6, pp:591-615 [Journal]
  65. Gary T. Leavens, Jeannette M. Wing
    Protective Interface Specifications. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1998, v:10, n:1, pp:59-75 [Journal]
  66. Jeannette M. Wing, Jim Woodcock
    The First World Congress on Formal Methods in the Development of Computing Systems. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2000, v:12, n:3, pp:145-146 [Journal]
  67. Jeannette M. Wing, Jim Woodcock
    Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 2000, v:17, n:3, pp:199-200 [Journal]
  68. Jeannette M. Wing
    A Call to Action: Look Beyond the Horizon. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:62-67 [Journal]
  69. Kong-wei Lye, Jeannette M. Wing
    Game strategies in network security. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:71-86 [Journal]
  70. Jeannette M. Wing, C. Gong
    Testing and Verifying Concurrent Objects. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1993, v:17, n:1-2, pp:164-182 [Journal]
  71. John V. Guttag, James J. Horning, Jeannette M. Wing
    Some Notes on Putting Formal Specifications to Productive Use. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1982, v:2, n:1, pp:53-68 [Journal]
  72. Jeannette M. Wing, Mandana Vaziri
    A Case study in Model Checking Software Systems. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1997, v:28, n:2-3, pp:273-299 [Journal]
  73. Maurice Herlihy, Jeannette M. Wing
    Linearizable concurrent objects. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1989, v:24, n:4, pp:133-135 [Journal]
  74. Jeannette M. Wing
    Platitudes and attitudes. [Citation Graph (0, 0)][DBLP]
    STTT, 2003, v:4, n:3, pp:261-265 [Journal]
  75. Jeannette M. Wing
    Writing Larch Interface Language Specifications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1987, v:9, n:1, pp:1-24 [Journal]
  76. Amy Moormann Zaremski, Jeannette M. Wing
    Signature Matching: A Tool for Using Software Libraries. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 1995, v:4, n:2, pp:146-170 [Journal]
  77. Maurice Herlihy, Jeannette M. Wing
    Specifying Graceful Degradation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1991, v:2, n:1, pp:93-104 [Journal]
  78. Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski
    Miró: Visual Specification of Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:10, pp:1185-1197 [Journal]
  79. Jeannette M. Wing
    Using Larch to Specify Avalon/C++ Objects. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:9, pp:1076-1088 [Journal]
  80. Jeannette M. Wing, Mark R. Nixon
    Extending Ina Jo with Temporal Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:2, pp:181-197 [Journal]
  81. Jeannette M. Wing, John Ockerbloom
    Respectful Type Converters. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:7, pp:579-593 [Journal]
  82. Jeannette M. Wing, Jim Woodcock
    Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:8, pp:673-674 [Journal]
  83. Jeannette M. Wing
    Software Security. [Citation Graph (0, 0)][DBLP]
    TASE, 2007, pp:21- [Conf]

  84. Measuring the attack surfaces of two FTP daemons. [Citation Graph (, )][DBLP]


  85. Formal Methods for Privacy. [Citation Graph (, )][DBLP]


  86. Computational thinking and thinking about computing. [Citation Graph (, )][DBLP]


  87. Extracting Conditional Confidentiality Policies. [Citation Graph (, )][DBLP]


  88. Report: Measuring the Attack Surfaces of Enterprise Software. [Citation Graph (, )][DBLP]


  89. Five deep questions in computing. [Citation Graph (, )][DBLP]


  90. An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing. [Citation Graph (, )][DBLP]


  91. CS woes: deadline-driven research, academic inequality. [Citation Graph (, )][DBLP]


  92. NSF funding advice: 21st century innovation. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.424secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002