dblp.uni-trier.dewww.uni-trier.de

Jeannette M. Wing

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
91EEPratyusa K. Manadhata, Yücel Karabulut, Jeannette M. Wing: Report: Measuring the Attack Surfaces of Enterprise Software. ESSoS 2009: 91-100
2008
90EEJeannette M. Wing: Computational thinking and thinking about computing. IPDPS 2008: 1
89EEMichael Carl Tschantz, Jeannette M. Wing: Extracting Conditional Confidentiality Policies. SEFM 2008: 107-116
88EEJeannette M. Wing: Five deep questions in computing. Commun. ACM 51(1): 58-60 (2008)
2007
87EEPeter B. Henderson, Thomas J. Cortina, Jeannette M. Wing: Computational thinking. SIGCSE 2007: 195-196
86EEJeannette M. Wing: Software Security. TASE 2007: 21
2006
85EEJeannette M. Wing: Attack graph generation and analysis. ASIACCS 2006: 14
84EEPratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen: Measuring the attack surfaces of two FTP daemons. QoP 2006: 3-10
83EEVaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing: Ranking Attack Graphs. RAID 2006: 127-144
82EEJeannette M. Wing: Computational thinking. Commun. ACM 49(3): 33-35 (2006)
2005
81EEJonathan D. Pincus, Jeannette M. Wing: Towards an Algebra for Security Policies. ICATPN 2005: 17-25
80 Jeannette M. Wing: Scenario Graphs Applied to Security (Extended Abstract). VISSAS 2005: 229-234
79EEKong-wei Lye, Jeannette M. Wing: Game strategies in network security. Int. J. Inf. Sec. 4(1-2): 71-86 (2005)
2003
78EEOleg Sheyner, Jeannette M. Wing: Tools for Generating and Analyzing Attack Graphs. FMCO 2003: 344-372
77EEJeannette M. Wing: A Call to Action: Look Beyond the Horizon. IEEE Security & Privacy 1(6): 62-67 (2003)
76EEJeannette M. Wing: Platitudes and attitudes. STTT 4(3): 261-265 (2003)
2002
75EESomesh Jha, Oleg Sheyner, Jeannette M. Wing: Two Formal Analys s of Attack Graphs. CSFW 2002: 49-63
74EETheodore M. Wong, Chenxi Wang, Jeannette M. Wing: Verifiable Secret Redistribution for Archive System. IEEE Security in Storage Workshop 2002: 94-106
73EEOleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing: Automated Generation and Analysis of Attack Graphs. IEEE Symposium on Security and Privacy 2002: 273-284
72EEJeannette M. Wing: Mathematics in Computer Science Curricula. MPC 2002: 22
71EEJeannette M. Wing: Vulnerability Analysis of Networked Systems. WETICE 2002: 4
2001
70 Jeannette M. Wing: Survivability Analysis of Networked Systems. FORTE 2001: 459-
69 Somesh Jha, Jeannette M. Wing: Survivability Analysis of Network Systems. ICSE 2001: 307-317
2000
68EEJeannette M. Wing: Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum. AMAST 2000: 2-9
67EEJeannette M. Wing: Survivability Analysis of Networked Systems . APSEC 2000: 6-7
66EESanjay K. Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff: Survivability Analysis of Network Specifications. DSN 2000: 613-622
65EEJeannette M. Wing, Jim Woodcock: The First World Congress on Formal Methods in the Development of Computing Systems. Formal Asp. Comput. 12(3): 145-146 (2000)
64 Jeannette M. Wing, Jim Woodcock: Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems. Formal Methods in System Design 17(3): 199-200 (2000)
63EEJeannette M. Wing, John Ockerbloom: Respectful Type Converters. IEEE Trans. Software Eng. 26(7): 579-593 (2000)
62EEJeannette M. Wing, Jim Woodcock: Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems. IEEE Trans. Software Eng. 26(8): 673-674 (2000)
1999
61 Jeannette M. Wing, Jim Woodcock, Jim Davies: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I Springer 1999
60 Jeannette M. Wing, Jim Woodcock, Jim Davies: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II Springer 1999
59EEDaniel Jackson, Yu-Chung Ng, Jeannette M. Wing: A Nitpick Analysis of Mobile IPv6. Formal Asp. Comput. 11(6): 591-615 (1999)
1998
58EEJeannette M. Wing: Formal Methods: Past, Present, and Future (Abstract). ASIAN 1998: 224
57 Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing: Proving Correctness of a Controller Algorithm for the RAID Level 5 System. FTCS 1998: 16-25
56 Gary T. Leavens, Jeannette M. Wing: Protective Interface Specifications. Formal Asp. Comput. 10(1): 59-75 (1998)
1997
55 Gary T. Leavens, Jeannette M. Wing: Protective Interface Specifications. TAPSOFT 1997: 520-534
54EEAmy Moormann Zaremski, Jeannette M. Wing: Specification Matching of Software Components. ACM Trans. Softw. Eng. Methodol. 6(4): 333-369 (1997)
53 Jeannette M. Wing, Mandana Vaziri: A Case study in Model Checking Software Systems. Sci. Comput. Program. 28(2-3): 273-299 (1997)
1996
52 Edmund M. Clarke, Jeannette M. Wing: Formal Methods: State of the Art and Future Directions. ACM Comput. Surv. 28(4): 626-643 (1996)
51 Edmund M. Clarke, Jeannette M. Wing: Tools and Partial Analysis. ACM Comput. Surv. 28(4es): 116 (1996)
50 Jonathan P. Bowen, Ricky W. Butler, David L. Dill, Robert L. Glass, David Gries, Anthony Hall, Michael G. Hinchey, C. Michael Holloway, Daniel Jackson, Cliff B. Jones, Michael J. Lutz, David Lorge Parnas, John M. Rushby, Jeannette M. Wing, Pamela Zave: An Invitation to Formal Methods. IEEE Computer 29(4): 16-30 (1996)
1995
49 Jeannette M. Wing: Teaching Mathematics to Software Engineers. AMAST 1995: 18-40
48 David Garlan, Alan W. Brown, Daniel Jackson, James E. Tomayko, Jeannette M. Wing: The CMU Master of Software Engineering Core Curriculum. CSEE 1995: 65-86
47 Jeannette M. Wing, David C. Steere: Specifying Weak Sets. ICDCS 1995: 414-421
46EEJeannette M. Wing, Mandana Vaziri: Model Checking Software Systems: A Case Study. SIGSOFT FSE 1995: 128-139
45EEAmy Moormann Zaremski, Jeannette M. Wing: Specification Matching of Software Components. SIGSOFT FSE 1995: 6-17
44 Barbara Liskov, Jeannette M. Wing: Specifications and Their Use in Defining Subtypes. ZUM 1995: 245-263
43 Jeannette M. Wing: Hints for Writing Specifications. ZUM 1995: 497
42EEAmy Moormann Zaremski, Jeannette M. Wing: Signature Matching: A Tool for Using Software Libraries. ACM Trans. Softw. Eng. Methodol. 4(2): 146-170 (1995)
1994
41 David C. Steere, Mahadev Satyanarayanan, Jeannette M. Wing: Dynamic Sets for Search. PODC 1994: 397
40 Lily B. Mummert, Jeannette M. Wing, Mahadev Satyanarayanan: Using Belief to Reason about Cache Coherence. PODC 1994: 71-80
39EENicholas Haines, Darrell Kindred, J. Gregory Morrisett, Scott Nettles, Jeannette M. Wing: Composing First-Class Transactions. ACM Trans. Program. Lang. Syst. 16(6): 1719-1736 (1994)
38EEBarbara Liskov, Jeannette M. Wing: A Behavioral Notion of Subtyping. ACM Trans. Program. Lang. Syst. 16(6): 1811-1841 (1994)
1993
37 Ursula Martin, Jeannette M. Wing: First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992 Springer 1993
36EEBarbara Liskov, Jeannette M. Wing: A New Definition of the Subtype Relation. ECOOP 1993: 118-141
35 Jeannette M. Wing: Decomposing and Recomposing Transactional Concepts. ECOOP Workshop 1993: 111-121
34 Barbara Liskov, Jeannette M. Wing: Specifications and Their Use in Defining Subtypes. OOPSLA 1993: 16-28
33EEAmy Moormann Zaremski, Jeannette M. Wing: Signature Matching: A Key to Reuse. SIGSOFT FSE 1993: 182-190
32 Jeannette M. Wing, C. Gong: Testing and Verifying Concurrent Objects. J. Parallel Distrib. Comput. 17(1-2): 164-182 (1993)
1992
31 Jeannette M. Wing: Specification in Software Development LICS 1992: 112
30 Jeannette M. Wing, Eugene J. Rollins, Amy Moormann Zaremski: Thoughts on a Larch/ML and a New Application for LP. Larch 1992: 297-312
1991
29 Eugene J. Rollins, Jeannette M. Wing: Specifications as Search Keys for Software Libraries. ICLP 1991: 173-187
28 Jeannette M. Wing, Amy Moormann Zaremski: Unintrusive Ways to Integrate Formal Specifications in Practice. VDM Europe (1) 1991: 545-569
27EEMaurice Herlihy, Jeannette M. Wing: Specifying Graceful Degradation. IEEE Trans. Parallel Distrib. Syst. 2(1): 93-104 (1991)
1990
26 Stewart M. Clamen, Linda D. Leibengood, Scott Nettles, Jeannette M. Wing: Reliable Distributed Computing with Avalon/Common Lisp. ICCL 1990: 169-179
25 Mario Barbacci, Jeannette M. Wing: A Language for Distributed Applications. ICCL 1990: 59-68
24EEMaurice Herlihy, Jeannette M. Wing: Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst. 12(3): 463-492 (1990)
23 Jeannette M. Wing: A Specifier's Introduction to Formal Methods. IEEE Computer 23(9): 8-24 (1990)
22EEAllan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990)
21EEJeannette M. Wing: Using Larch to Specify Avalon/C++ Objects. IEEE Trans. Software Eng. 16(9): 1076-1088 (1990)
1989
20 Maurice Herlihy, Jeannette M. Wing: Specifying Security Constraints with Relaxation Lattices. CSFW 1989: 47-53
19 Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Constraining Pictures with Pictures. IFIP Congress 1989: 157-162
18 Stanley B. Zdonik, Toby Bloom, David W. Stemple, Jeannette M. Wing: Panel on Transactions in Object-Oriented Systems. OOPSLA 1989: 473-476
17 Jeannette M. Wing: Verifying Atomic Data Types. REX Workshop 1989: 731-758
16 Jeannette M. Wing: Specifying Avalon Objects in Larch. TAPSOFT, Vol.2 1989: 61-80
15 Mario Barbacci, Dennis L. Doubleday, Charles B. Weinstock, Jeannette M. Wing: Developing Applications for Heterogeneous Machine Networks: The Durra Network. Computing Systems 2(1): 7-35 (1989)
14EEJeannette M. Wing, Mark R. Nixon: Extending Ina Jo with Temporal Logic. IEEE Trans. Software Eng. 15(2): 181-197 (1989)
13EEMaurice Herlihy, Jeannette M. Wing: Linearizable concurrent objects. SIGPLAN Notices 24(4): 133-135 (1989)
1988
12 Maurice Herlihy, Jeannette M. Wing: Reasoning about Atomic Objects. FTRTFT 1988: 193-208
11 Mario Barbacci, Charles B. Weinstock, Jeannette M. Wing: Programming at the Processor-Memory-Switch Level. ICSE 1988: 19-29
10 David Detlefs, Maurice Herlihy, Jeannette M. Wing: Inheritance of Synchronization and Recovery Properties in Avalon/C++. IEEE Computer 21(12): 57-69 (1988)
1987
9 David Detlefs, Maurice Herlihy, K. Kietzke, Jeannette M. Wing: Avalon/C++. C++ Workshop 1987: 451-459
8 Mario Barbacci, Jeannette M. Wing: DURRA : A Task-Level Description Language. ICPP 1987: 370-376
7 Mario Barbacci, Jeannette M. Wing: Specifying Functional and Timing Behavior for Real-Time Applications. PARLE (2) 1987: 124-140
6 Maurice Herlihy, Jeannette M. Wing: Specifying Graceful Degradation in Distributed Systems. PODC 1987: 167-177
5 Maurice Herlihy, Jeannette M. Wing: Axioms for Concurrent Objects. POPL 1987: 13-26
4EEJeannette M. Wing: Writing Larch Interface Language Specifications. ACM Trans. Program. Lang. Syst. 9(1): 1-24 (1987)
1986
3 Jeannette M. Wing, Mark R. Nixon: Extending Ina Jo with Temporal Logic. IEEE Symposium on Security and Privacy 1986: 2-13
1985
2 Daniel M. Berry, Jeannette M. Wing: Specification and Prototyping: Some Thoughts on Why They Are Successful. TAPSOFT, Vol.2 1985: 117-128
1982
1 John V. Guttag, James J. Horning, Jeannette M. Wing: Some Notes on Putting Formal Specifications to Productive Use. Sci. Comput. Program. 2(1): 53-68 (1982)

Coauthor Index

1Mario Barbacci [7] [8] [11] [15] [25]
2Constantinos Bartzis [83]
3Daniel M. Berry [2]
4Toby Bloom [18]
5Jonathan P. Bowen [50]
6Alan W. Brown [48]
7Ricky W. Butler [50]
8Stewart M. Clamen [26]
9Edmund M. Clarke [51] [52] [83]
10Thomas J. Cortina [87]
11Jim Davies [60] [61]
12David Detlefs [9] [10]
13David L. Dill [50]
14Dennis L. Doubleday [15]
15Mark Flynn [84]
16David Garlan [48]
17Robert L. Glass [50]
18C. Gong [32]
19David Gries [50]
20John V. Guttag [1]
21Joshua W. Haines [73]
22Nicholas Haines [39]
23Anthony Hall [50]
24Peter B. Henderson [87]
25Maurice Herlihy [5] [6] [9] [10] [12] [13] [20] [24] [27]
26Allan Heydon [19] [22]
27Michael G. Hinchey (Mike Hinchey) [50]
28C. Michael Holloway [50]
29James J. Horning (Jim Horning) [1]
30Daniel Jackson [48] [50] [59]
31Sanjay K. Jha [66]
32Somesh Jha [69] [73] [75]
33Cliff B. Jones [50]
34Yücel Karabulut [91]
35K. Kietzke [9]
36Darrell Kindred [39]
37Gary T. Leavens [55] [56]
38Linda D. Leibengood [26]
39Richard C. Linger [66]
40Richard Lippmann [73]
41Barbara Liskov [34] [36] [38] [44]
42Thomas A. Longstaff [66]
43Michael J. Lutz [50]
44Kong-wei Lye [79]
45Nancy A. Lynch [57]
46Mark W. Maimone [19] [22]
47Pratyusa K. Manadhata [84] [91]
48Ursula Martin [37]
49Miles McQueen [84]
50Vaibhav Mehta [83]
51J. Gregory Morrisett (Greg Morrisett) [39]
52Lily B. Mummert [40]
53Scott Nettles [26] [39]
54Yu-Chung Ng [59]
55Mark R. Nixon [3] [14]
56John Ockerbloom [63]
57David Lorge Parnas [50]
58Jonathan D. Pincus [81]
59Eugene J. Rollins [29] [30]
60John M. Rushby [50]
61Mahadev Satyanarayanan (M. Satyanarayanan) [40] [41]
62Oleg Sheyner [73] [75] [78]
63David C. Steere [41] [47]
64David W. Stemple [18]
65James E. Tomayko [48]
66Michael Carl Tschantz [89]
67J. Doug Tygar (J. D. Tygar) [19] [22]
68Mandana Vaziri [46] [53] [57]
69Chenxi Wang [74]
70Charles B. Weinstock [11] [15]
71Theodore M. Wong [74]
72Jim Woodcock (J. C. P. Woodcock) [60] [61] [62] [64] [65]
73Amy Moormann Zaremski [19] [22] [28] [30] [33] [42] [45] [54]
74Pamela Zave [50]
75Stanley B. Zdonik [18]
76Haifeng Zhu [83]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)