Year |
Citation |
Score |
2017 |
Wing JM. Computational thinking’s influence on research and education for all Journal On Educational Technology. 25: 7-14. DOI: 10.17471/2499-4324/922 |
0.307 |
|
2015 |
Tschantz MC, Datta A, Wing JM. A Methodology for Information Flow Experiments Proceedings of the Computer Security Foundations Workshop. 2015: 554-568. DOI: 10.1109/CSF.2015.40 |
0.685 |
|
2013 |
Wing JM. Formal methods: an industrial perspective Acm Sigada Ada Letters. 33: 85-86. DOI: 10.1145/2658982.2527291 |
0.339 |
|
2013 |
Tschantz MC, Datta A, Wing JM. Purpose restrictions on information use Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 610-627. DOI: 10.1007/978-3-642-40203-6_34 |
0.713 |
|
2012 |
Tschantz MC, Datta A, Wing JM. Formalizing and enforcing purpose restrictions in privacy policies Proceedings - Ieee Symposium On Security and Privacy. 176-190. DOI: 10.1109/SP.2012.21 |
0.695 |
|
2011 |
Manadhata PK, Wing JM. An attack surface metric Ieee Transactions On Software Engineering. 37: 371-386. DOI: 10.1109/Tse.2010.60 |
0.73 |
|
2009 |
Tschantz MC, Wing JM. Formal methods for privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5850: 1-15. DOI: 10.1007/978-3-642-05089-3_1 |
0.696 |
|
2009 |
Manadhata PK, Karabulut Y, Wing JM. Report: Measuring the attack surfaces of enterprise software Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5429: 91-100. DOI: 10.1007/978-3-642-00199-4_8 |
0.731 |
|
2008 |
Tschantz MC, Wing JM. Extracting conditional confidentiality policies Proceedings - 6th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2008. 107-116. DOI: 10.1109/SEFM.2008.46 |
0.712 |
|
2003 |
Wong TM, Wang C, Wing JM. Verifiable secret redistribution for archive systems Proceedings - 1st International Ieee Security in Storage Workshop, Sisw 2002. 94-105. DOI: 10.1109/SISW.2002.1183515 |
0.482 |
|
2003 |
Wing JM. Platitudes and attitudes International Journal On Software Tools For Technology Transfer. 4: 261-265. DOI: 10.1007/S10009-002-0105-2 |
0.331 |
|
2000 |
Wing JM, Woodcock J. The First World Congress on Formal Methods in the Development of Computing Systems Formal Aspects of Computing. 12: 145-146. DOI: 10.1007/Pl00011167 |
0.309 |
|
1999 |
Chadha HS, Baugh JW, Wing JM. Formal specification of concurrent systems Advances in Engineering Software. 30: 211-224. DOI: 10.1016/S0965-9978(98)00058-1 |
0.356 |
|
1998 |
Wing JM. A symbiotic relationship between formal methods and security Computational Statistics & Data Analysis. 26-38. DOI: 10.1109/Csda.1998.798355 |
0.353 |
|
1997 |
Zaremski AM, Wing JM. Specification matching of software components Acm Transactions On Software Engineering and Methodology. 6: 333-369. DOI: 10.1145/261640.261641 |
0.352 |
|
1997 |
Wing JM, Vaziri-Farahani M. A case study in model checking software systems Science of Computer Programming. 28: 273-299. DOI: 10.1016/S0167-6423(96)00020-2 |
0.358 |
|
1996 |
Clarke EM, Wing JM. Formal methods: state of the art and future directions Acm Computing Surveys. 28: 626-643. DOI: 10.1145/242223.242257 |
0.382 |
|
1995 |
Zaremski AM, Wing JM. Signature matching: a tool for using software libraries Acm Transactions On Software Engineering and Methodology. 4: 146-170. DOI: 10.1145/210134.210179 |
0.346 |
|
1994 |
Haines N, Kindred D, Morrisett JG, Nettles SM, Wing JM. Composing First-Class Transactions Acm Transactions On Programming Languages and Systems (Toplas). 16: 1719-1736. DOI: 10.1145/197320.197346 |
0.625 |
|
1990 |
Heydon A, Maimone MW, Tygar JD, Wing JM, Zaremski AM. Miró: Visual Specification of Security Ieee Transactions On Software Engineering. 16: 1185-1197. DOI: 10.1109/32.60298 |
0.355 |
|
1990 |
Wing JM. A Specifier’s Introduction to Formal Methods Computer. 23: 8-22. DOI: 10.1109/2.58215 |
0.345 |
|
1989 |
Wing JM, Nixon MR. Extending Ina Jo with temporal logic Ieee Transactions On Software Engineering. 15: 181-197. DOI: 10.1109/32.21744 |
0.327 |
|
1988 |
Detlefs DL, Herlihy MP, Wing JM. Inheritance of Synchronization and Recovery Properties in Avalon/C++ Computer. 21: 57-69. DOI: 10.1109/2.16189 |
0.323 |
|
1987 |
Wing JM. Writing Larch Interface Language Specifications Acm Transactions On Programming Languages and Systems (Toplas). 9: 1-24. DOI: 10.1145/9758.10500 |
0.328 |
|
1986 |
Guttag JV, Horning JJ, Wing JM. Abstracts in software engineering Acm Sigsoft Software Engineering Notes. 11: 103-110. DOI: 10.1145/382300.382317 |
0.564 |
|
1985 |
Guttag J, Horning J, Wing J. The Larch Family of Specification Languages Ieee Software. 2: 24-36. DOI: 10.1109/Ms.1985.231756 |
0.594 |
|
1982 |
Guttag J, Horning J, Wing J. Some notes on putting formal specifications to productive use Science of Computer Programming. 2: 53-68. DOI: 10.1016/0167-6423(82)90004-1 |
0.587 |
|
Show low-probability matches. |