Jeannette M. Wing - Publications

Affiliations: 
Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science

27 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Wing JM. Computational thinking’s influence on research and education for all Journal On Educational Technology. 25: 7-14. DOI: 10.17471/2499-4324/922  0.307
2015 Tschantz MC, Datta A, Wing JM. A Methodology for Information Flow Experiments Proceedings of the Computer Security Foundations Workshop. 2015: 554-568. DOI: 10.1109/CSF.2015.40  0.685
2013 Wing JM. Formal methods: an industrial perspective Acm Sigada Ada Letters. 33: 85-86. DOI: 10.1145/2658982.2527291  0.339
2013 Tschantz MC, Datta A, Wing JM. Purpose restrictions on information use Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 610-627. DOI: 10.1007/978-3-642-40203-6_34  0.713
2012 Tschantz MC, Datta A, Wing JM. Formalizing and enforcing purpose restrictions in privacy policies Proceedings - Ieee Symposium On Security and Privacy. 176-190. DOI: 10.1109/SP.2012.21  0.695
2011 Manadhata PK, Wing JM. An attack surface metric Ieee Transactions On Software Engineering. 37: 371-386. DOI: 10.1109/Tse.2010.60  0.73
2009 Tschantz MC, Wing JM. Formal methods for privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5850: 1-15. DOI: 10.1007/978-3-642-05089-3_1  0.696
2009 Manadhata PK, Karabulut Y, Wing JM. Report: Measuring the attack surfaces of enterprise software Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5429: 91-100. DOI: 10.1007/978-3-642-00199-4_8  0.731
2008 Tschantz MC, Wing JM. Extracting conditional confidentiality policies Proceedings - 6th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2008. 107-116. DOI: 10.1109/SEFM.2008.46  0.712
2003 Wong TM, Wang C, Wing JM. Verifiable secret redistribution for archive systems Proceedings - 1st International Ieee Security in Storage Workshop, Sisw 2002. 94-105. DOI: 10.1109/SISW.2002.1183515  0.482
2003 Wing JM. Platitudes and attitudes International Journal On Software Tools For Technology Transfer. 4: 261-265. DOI: 10.1007/S10009-002-0105-2  0.331
2000 Wing JM, Woodcock J. The First World Congress on Formal Methods in the Development of Computing Systems Formal Aspects of Computing. 12: 145-146. DOI: 10.1007/Pl00011167  0.309
1999 Chadha HS, Baugh JW, Wing JM. Formal specification of concurrent systems Advances in Engineering Software. 30: 211-224. DOI: 10.1016/S0965-9978(98)00058-1  0.356
1998 Wing JM. A symbiotic relationship between formal methods and security Computational Statistics & Data Analysis. 26-38. DOI: 10.1109/Csda.1998.798355  0.353
1997 Zaremski AM, Wing JM. Specification matching of software components Acm Transactions On Software Engineering and Methodology. 6: 333-369. DOI: 10.1145/261640.261641  0.352
1997 Wing JM, Vaziri-Farahani M. A case study in model checking software systems Science of Computer Programming. 28: 273-299. DOI: 10.1016/S0167-6423(96)00020-2  0.358
1996 Clarke EM, Wing JM. Formal methods: state of the art and future directions Acm Computing Surveys. 28: 626-643. DOI: 10.1145/242223.242257  0.382
1995 Zaremski AM, Wing JM. Signature matching: a tool for using software libraries Acm Transactions On Software Engineering and Methodology. 4: 146-170. DOI: 10.1145/210134.210179  0.346
1994 Haines N, Kindred D, Morrisett JG, Nettles SM, Wing JM. Composing First-Class Transactions Acm Transactions On Programming Languages and Systems (Toplas). 16: 1719-1736. DOI: 10.1145/197320.197346  0.625
1990 Heydon A, Maimone MW, Tygar JD, Wing JM, Zaremski AM. Miró: Visual Specification of Security Ieee Transactions On Software Engineering. 16: 1185-1197. DOI: 10.1109/32.60298  0.355
1990 Wing JM. A Specifier’s Introduction to Formal Methods Computer. 23: 8-22. DOI: 10.1109/2.58215  0.345
1989 Wing JM, Nixon MR. Extending Ina Jo with temporal logic Ieee Transactions On Software Engineering. 15: 181-197. DOI: 10.1109/32.21744  0.327
1988 Detlefs DL, Herlihy MP, Wing JM. Inheritance of Synchronization and Recovery Properties in Avalon/C++ Computer. 21: 57-69. DOI: 10.1109/2.16189  0.323
1987 Wing JM. Writing Larch Interface Language Specifications Acm Transactions On Programming Languages and Systems (Toplas). 9: 1-24. DOI: 10.1145/9758.10500  0.328
1986 Guttag JV, Horning JJ, Wing JM. Abstracts in software engineering Acm Sigsoft Software Engineering Notes. 11: 103-110. DOI: 10.1145/382300.382317  0.564
1985 Guttag J, Horning J, Wing J. The Larch Family of Specification Languages Ieee Software. 2: 24-36. DOI: 10.1109/Ms.1985.231756  0.594
1982 Guttag J, Horning J, Wing J. Some notes on putting formal specifications to productive use Science of Computer Programming. 2: 53-68. DOI: 10.1016/0167-6423(82)90004-1  0.587
Show low-probability matches.