Jeannette M Wing
Jeannette M Wing
Director of Data Science, Professor of Computer Science, Columbia University
Verified email at columbia.edu - Homepage
Title
Cited by
Cited by
Year
Computational thinking
JM Wing
Communications of the ACM 49 (3), 33-35, 2006
67182006
Linearizability: A correctness condition for concurrent objects
MP Herlihy, JM Wing
ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (3), 463-492, 1990
33501990
Formal methods: State of the art and future directions
EM Clarke, JM Wing
ACM Computing Surveys (CSUR) 28 (4), 626-643, 1996
19221996
A behavioral notion of subtyping
BH Liskov, JM Wing
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (6), 1811-1841, 1994
15781994
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
15492002
Computational thinking and thinking about computing
JM Wing
Philosophical Transactions of the Royal Society A: Mathematical, Physical …, 2008
15082008
A specifier's introduction to formal methods
JM Wing
Computer 23 (9), 8-22, 1990
11051990
Specification matching of software components
AM Zaremski, JM Wing
ACM Transactions on Software Engineering and Methodology (TOSEM) 6 (4), 333-369, 1997
7731997
An attack surface metric
PK Manadhata, JM Wing
IEEE Transactions on Software Engineering 37 (3), 371-386, 2010
6672010
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
6632002
Game strategies in network security
K Lye, JM Wing
International Journal of Information Security 4 (1-2), 71-86, 2005
5552005
Signature matching: a tool for using software libraries
AM Zaremski, JM Wing
ACM Transactions on Software Engineering and Methodology (TOSEM) 4 (2), 146-170, 1995
4601995
The Larch Family of Specification Languages.
JV Guttag, JJ Horning, JM Wing
IEEE Softw. 2 (5), 24-36, 1985
3821985
Research notebook: Computational thinking—What and why
J Wing
The link magazine 6, 2011
3142011
Tools for generating and analyzing attack graphs
O Sheyner, J Wing
International symposium on formal methods for components and objects, 344-371, 2003
2822003
Specification matching of software components
AM Zaremski, JM Wing
Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software …, 1995
2741995
Measuring relative attack surfaces
M Howard, J Pincus, JM Wing
Computer security in the 21st century, 109-137, 2005
2722005
Ranking attack graphs
V Mehta, C Bartzis, H Zhu, E Clarke, J Wing
International Workshop on Recent Advances in Intrusion Detection, 127-144, 2006
2452006
Larch in five easy pieces
J Guttag, JJ Horning, JM Wing
Digital Equipment Corporation, Systems Research Center, 1985
2221985
Axioms for concurrent objects
MP Herlihy, JM Wing
Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of …, 1987
2211987
The system can't perform the operation now. Try again later.
Articles 1–20