Jeannette M Wing
Jeannette M Wing
Director of Data Science, Professor of Computer Science, Columbia University
Verified email at columbia.edu - Homepage
Title
Cited by
Cited by
Year
Computational thinking
JM Wing
Communications of the ACM 49 (3), 33-35, 2006
83062006
Linearizability: A correctness condition for concurrent objects
MP Herlihy, JM Wing
ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (3), 463-492, 1990
37161990
Formal methods: State of the art and future directions
EM Clarke, JM Wing
ACM Computing Surveys (CSUR) 28 (4), 626-643, 1996
20531996
Computational thinking and thinking about computing
JM Wing
Philosophical Transactions of the Royal Society A: Mathematical, Physical …, 2008
19242008
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
16932002
A behavioral notion of subtyping
BH Liskov, JM Wing
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (6), 1811-1841, 1994
16461994
A specifier's introduction to formal methods
JM Wing
Computer 23 (9), 8-22, 1990
12011990
Specification matching of software components
AM Zaremski, JM Wing
ACM Transactions on Software Engineering and Methodology (TOSEM) 6 (4), 333-369, 1997
8181997
An attack surface metric
PK Manadhata, JM Wing
IEEE Transactions on Software Engineering 37 (3), 371-386, 2010
7442010
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
7182002
Game strategies in network security
K Lye, JM Wing
International Journal of Information Security 4 (1), 71-86, 2005
6012005
Signature matching: a tool for using software libraries
AM Zaremski, JM Wing
ACM Transactions on Software Engineering and Methodology (TOSEM) 4 (2), 146-170, 1995
4941995
Research notebook: Computational thinking—What and why
J Wing
The link magazine 6, 20-23, 2011
4312011
The Larch Family of Specification Languages.
JV Guttag, JJ Horning, JM Wing
IEEE Softw. 2 (5), 24-36, 1985
4121985
Tools for generating and analyzing attack graphs
O Sheyner, J Wing
International symposium on formal methods for components and objects, 344-371, 2003
3142003
Measuring relative attack surfaces
M Howard, J Pincus, JM Wing
Computer security in the 21st century, 109-137, 2005
2972005
Ranking attack graphs
V Mehta, C Bartzis, H Zhu, E Clarke, J Wing
International Workshop on Recent Advances in Intrusion Detection, 127-144, 2006
2762006
Specification matching of software components
AM Zaremski, JM Wing
Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software …, 1995
2761995
Axioms for concurrent objects
MP Herlihy, JM Wing
Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of …, 1987
2351987
Larch in five easy pieces
J Guttag, JJ Horning, JM Wing
Digital Equipment Corporation, Systems Research Center, 1985
2331985
The system can't perform the operation now. Try again later.
Articles 1–20