@article{WingW00:1, title = {The First World Congress on Formal Methods in the Development of Computing Systems}, author = {Jeannette M. Wing and Jim Woodcock}, year = {2000}, url = {http://link.springer.de/link/service/journals/00165/bibs/0012003/00120145.htm}, researchr = {https://researchr.org/publication/WingW00%3A1}, cites = {0}, citedby = {0}, journal = {Formal Asp. Comput.}, volume = {12}, number = {3}, pages = {145-146}, } @article{WingV97, title = {A Case study in Model Checking Software Systems}, author = {Jeannette M. Wing and Mandana Vaziri}, year = {1997}, tags = {case study, model checking, meta-model, Meta-Environment}, researchr = {https://researchr.org/publication/WingV97}, cites = {0}, citedby = {0}, journal = {Science of Computer Programming}, volume = {28}, number = {2-3}, pages = {273-299}, } @inproceedings{Wing02, title = {Vulnerability Analysis of Networked Systems}, author = {Jeannette M. Wing}, year = {2002}, url = {http://computer.org/proceedings/wetice/1748/17480004.pdf}, tags = {analysis}, researchr = {https://researchr.org/publication/Wing02}, cites = {0}, citedby = {0}, pages = {4}, booktitle = {11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA}, publisher = {IEEE Computer Society}, isbn = {0-7695-1748-X}, } @inproceedings{Wing93, title = {Decomposing and Recomposing Transactional Concepts}, author = {Jeannette M. Wing}, year = {1993}, researchr = {https://researchr.org/publication/Wing93}, cites = {0}, citedby = {0}, pages = {111-121}, booktitle = {Object-Based Distributed Programming, ECOOP 93 Workshop, Kaiserslautern, Germany, July 26-27, 1993}, editor = {Rachid Guerraoui and Oscar Nierstrasz and Michel Riveill}, volume = {791}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-57932-X}, } @inproceedings{Wing08:0, title = {Computational thinking and thinking about computing}, author = {Jeannette M. Wing}, year = {2008}, doi = {10.1109/IPDPS.2008.4536091}, url = {http://dx.doi.org/10.1109/IPDPS.2008.4536091}, researchr = {https://researchr.org/publication/Wing08%3A0}, cites = {0}, citedby = {0}, pages = {1}, booktitle = {22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008}, publisher = {IEEE}, } @article{WingW00, title = {Guest Editors Introduction-Special Issues for FM 99: The First World Congress On Formal Methods in the Development of Computing Systems}, author = {Jeannette M. Wing and Jim Woodcock}, year = {2000}, url = {http://dlib.computer.org/ts/books/ts2000/pdf/e0673.pdf}, researchr = {https://researchr.org/publication/WingW00}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Software Eng.}, volume = {26}, number = {8}, pages = {673-674}, } @article{HainesKMNW94, title = {Composing First-Class Transactions}, author = {Nicholas Haines and Darrell Kindred and J. Gregory Morrisett and Scott Nettles and Jeannette M. Wing}, year = {1994}, doi = {10.1145/197320.197346}, url = {http://doi.acm.org/10.1145/197320.197346}, researchr = {https://researchr.org/publication/HainesKMNW94}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {16}, number = {6}, pages = {1719-1736}, } @article{LiskovW94, title = {A Behavioral Notion of Subtyping}, author = {Barbara Liskov and Jeannette M. Wing}, year = {1994}, doi = {10.1145/197320.197383}, url = {http://doi.acm.org/10.1145/197320.197383}, tags = {subtyping}, researchr = {https://researchr.org/publication/LiskovW94}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {16}, number = {6}, pages = {1811-1841}, } @article{GuttagHW82, title = {Some Notes on Putting Formal Specifications to Productive Use}, author = {John V. Guttag and James J. Horning and Jeannette M. Wing}, year = {1982}, researchr = {https://researchr.org/publication/GuttagHW82}, cites = {0}, citedby = {0}, journal = {Science of Computer Programming}, volume = {2}, number = {1}, pages = {53-68}, } @inproceedings{HerlihyW87, title = {Specifying Graceful Degradation in Distributed Systems}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1987}, researchr = {https://researchr.org/publication/HerlihyW87}, cites = {0}, citedby = {0}, pages = {167-177}, booktitle = {PODC}, } @article{Wing08:1, title = {Five deep questions in computing}, author = {Jeannette M. Wing}, year = {2008}, doi = {10.1145/1327452.1327479}, url = {http://doi.acm.org/10.1145/1327452.1327479}, researchr = {https://researchr.org/publication/Wing08%3A1}, cites = {0}, citedby = {0}, journal = {Communications of the ACM}, volume = {51}, number = {1}, pages = {58-60}, } @inproceedings{Wing02:0, title = {Mathematics in Computer Science Curricula}, author = {Jeannette M. Wing}, year = {2002}, url = {http://link.springer.de/link/service/series/0558/bibs/2386/23860022.htm}, tags = {e-science}, researchr = {https://researchr.org/publication/Wing02%3A0}, cites = {0}, citedby = {0}, pages = {22}, booktitle = {Mathematics of Program Construction, 6th International Conference, MPC 2002, Dagstuhl Castle, Germany, July 8-10, 2002, Proceedings}, editor = {Eerke Boiten and Bernhard Möller}, volume = {2386}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-43857-2}, } @inproceedings{BarbacciW87, title = {DURRA : A Task-Level Description Language}, author = {Mario Barbacci and Jeannette M. Wing}, year = {1987}, researchr = {https://researchr.org/publication/BarbacciW87}, cites = {0}, citedby = {0}, pages = {370-376}, booktitle = {ICPP}, } @inproceedings{Wing98, title = {Formal Methods: Past, Present, and Future (Abstract)}, author = {Jeannette M. Wing}, year = {1998}, url = {http://link.springer.de/link/service/series/0558/bibs/1538/15380224.htm}, researchr = {https://researchr.org/publication/Wing98}, cites = {0}, citedby = {0}, pages = {224}, booktitle = {Advances in Computing Science - ASIAN 98, 4th Asian Computing Science Conference, Manila, The Philippines, December 8-10, 1998, Proceedings}, editor = {Jieh Hsiang and Atsushi Ohori}, volume = {1538}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-65388-0}, } @article{WingG93, title = {Testing and Verifying Concurrent Objects}, author = {Jeannette M. Wing and C. Gong}, year = {1993}, tags = {meta-model, testing, C++, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/WingG93}, cites = {0}, citedby = {0}, journal = {J. Parallel Distrib. Comput.}, volume = {17}, number = {1-2}, pages = {164-182}, } @inproceedings{WingS95, title = {Specifying Weak Sets}, author = {Jeannette M. Wing and David C. Steere}, year = {1995}, tags = {C++}, researchr = {https://researchr.org/publication/WingS95}, cites = {0}, citedby = {0}, pages = {414-421}, booktitle = {ICDCS}, } @inproceedings{SheynerHJLW02, title = {Automated Generation and Analysis of Attack Graphs}, author = {Oleg Sheyner and Joshua W. Haines and Somesh Jha and Richard Lippmann and Jeannette M. Wing}, year = {2002}, url = {http://computer.org/proceedings/sp/1543/15430273abs.htm}, tags = {analysis, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/SheynerHJLW02}, cites = {0}, citedby = {0}, pages = {273-284}, booktitle = {IEEE Symposium on Security and Privacy}, } @article{ZaremskiW95, title = {Signature Matching: A Tool for Using Software Libraries}, author = {Amy Moormann Zaremski and Jeannette M. Wing}, year = {1995}, doi = {10.1145/210134.210179}, url = {http://doi.acm.org/10.1145/210134.210179}, researchr = {https://researchr.org/publication/ZaremskiW95}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Software Engineering Methodology}, volume = {4}, number = {2}, pages = {146-170}, } @inproceedings{ZaremskiW93, title = {Signature Matching: A Key to Reuse}, author = {Amy Moormann Zaremski and Jeannette M. Wing}, year = {1993}, doi = {10.1145/256428.167077}, url = {http://doi.acm.org/10.1145/256428.167077}, tags = {reuse}, researchr = {https://researchr.org/publication/ZaremskiW93}, cites = {0}, citedby = {0}, pages = {182-190}, booktitle = {SIGSOFT FSE}, } @article{Wing:CACM:2009, title = {{CS} woes: deadline-driven research, academic inequality}, author = {Jeannette M. Wing and Mark Guzdial}, year = {2009}, doi = {10.1145/1610252.1610257}, url = {http://doi.acm.org/10.1145/1610252.1610257}, tags = {research, e-science}, researchr = {https://researchr.org/publication/Wing%3ACACM%3A2009}, cites = {0}, citedby = {0}, journal = {Communications of the ACM}, volume = {52}, number = {12}, } @inproceedings{HendersonCW07, title = {Computational thinking}, author = {Peter B. Henderson and Thomas J. Cortina and Jeannette M. Wing}, year = {2007}, doi = {10.1145/1227310.1227378}, url = {http://doi.acm.org/10.1145/1227310.1227378}, researchr = {https://researchr.org/publication/HendersonCW07}, cites = {0}, citedby = {0}, pages = {195-196}, booktitle = {Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007}, editor = {Ingrid Russell and Susan M. Haller and J. D. Dougherty and Susan H. Rodger}, publisher = {ACM}, isbn = {1-59593-361-1}, } @inproceedings{Wing92, title = {Specification in Software Development}, author = {Jeannette M. Wing}, year = {1992}, researchr = {https://researchr.org/publication/Wing92}, cites = {0}, citedby = {0}, pages = {112}, booktitle = {Proceedings, Seventh Annual IEEE Symposium on Logic in Computer Science, 22-25 June 1992, Santa Cruz, California, USA}, publisher = {IEEE Computer Society}, } @inproceedings{JhaWLL00, title = {Survivability Analysis of Network Specifications}, author = {Sanjay K. Jha and Jeannette M. Wing and Richard C. Linger and Thomas A. Longstaff}, year = {2000}, url = {http://computer.org/proceedings/dsn/0707/07070613abs.htm}, tags = {analysis, C++}, researchr = {https://researchr.org/publication/JhaWLL00}, cites = {0}, citedby = {0}, pages = {613-622}, booktitle = {2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA}, publisher = {IEEE Computer Society}, isbn = {0-7695-0707-7}, } @inproceedings{Wing06:0, title = {Attack graph generation and analysis}, author = {Jeannette M. Wing}, year = {2006}, doi = {10.1145/1128817.1128822}, url = {http://doi.acm.org/10.1145/1128817.1128822}, tags = {analysis, graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/Wing06%3A0}, cites = {0}, citedby = {0}, pages = {14}, booktitle = {Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006}, editor = {Ferng-Ching Lin and Der-Tsai Lee and Bao-Shuh Lin and Shiuhpyng Shieh and Sushil Jajodia}, publisher = {ACM}, isbn = {1-59593-272-0}, } @inproceedings{Wing05, title = {Scenario Graphs Applied to Security (Extended Abstract)}, author = {Jeannette M. Wing}, year = {2005}, tags = {graph-rewriting, security, rewriting}, researchr = {https://researchr.org/publication/Wing05}, cites = {0}, citedby = {0}, pages = {229-234}, booktitle = {Verification of Infinite-State Systems with Applications to Security, Proceedings of the NATO Advanced Research Workshop Verification of Infinite State Systems with Applications to Security VISSAS 2005 , Timisoara, Romania, March 17-22, 2005}, editor = {Edmund M. Clarke and Marius Minea and Ferucio Laurentiu Tiplea}, volume = {1}, series = {NATO Security through Science Series D: Information and Communication Security}, publisher = {IOS Press}, isbn = {1-58603-570-3}, } @article{WingW00:0, title = {Introduction: Special Issues for FM 99, the First World Congress on Formal Methods in the Development of Computing Systems}, author = {Jeannette M. Wing and Jim Woodcock}, year = {2000}, researchr = {https://researchr.org/publication/WingW00%3A0}, cites = {0}, citedby = {0}, journal = {Formal Methods in System Design}, volume = {17}, number = {3}, pages = {199-200}, } @article{WingO00, title = {Respectful Type Converters}, author = {Jeannette M. Wing and John Ockerbloom}, year = {2000}, url = {http://www.computer.org:80/tse/ts2000/e0579abs.htm}, researchr = {https://researchr.org/publication/WingO00}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Software Eng.}, volume = {26}, number = {7}, pages = {579-593}, } @article{Wing03, title = {Platitudes and attitudes}, author = {Jeannette M. Wing}, year = {2003}, doi = {10.1007/s10009-002-0105-2}, url = {http://dx.doi.org/10.1007/s10009-002-0105-2}, researchr = {https://researchr.org/publication/Wing03}, cites = {0}, citedby = {0}, journal = {STTT}, volume = {4}, number = {3}, pages = {261-265}, } @inproceedings{TschantzW08, title = {Extracting Conditional Confidentiality Policies}, author = {Michael Carl Tschantz and Jeannette M. Wing}, year = {2008}, doi = {10.1109/SEFM.2008.46}, url = {http://dx.doi.org/10.1109/SEFM.2008.46}, researchr = {https://researchr.org/publication/TschantzW08}, cites = {0}, citedby = {0}, pages = {107-116}, booktitle = {Sixth IEEE International Conference on Software Engineering and Formal Methods, SEFM 2008, Cape Town, South Africa, 10-14 November 2008}, editor = {Antonio Cerone and Stefan Gruner}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3437-4}, } @inproceedings{MummertWS94, title = {Using Belief to Reason about Cache Coherence}, author = {Lily B. Mummert and Jeannette M. Wing and Mahadev Satyanarayanan}, year = {1994}, tags = {caching}, researchr = {https://researchr.org/publication/MummertWS94}, cites = {0}, citedby = {0}, pages = {71-80}, booktitle = {PODC}, } @inproceedings{VaziriLW98, title = {Proving Correctness of a Controller Algorithm for the RAID Level 5 System}, author = {Mandana Vaziri and Nancy A. Lynch and Jeannette M. Wing}, year = {1998}, researchr = {https://researchr.org/publication/VaziriLW98}, cites = {0}, citedby = {0}, pages = {16-25}, booktitle = {FTCS}, } @inproceedings{RollinsW91, title = {Specifications as Search Keys for Software Libraries}, author = {Eugene J. Rollins and Jeannette M. Wing}, year = {1991}, tags = {search}, researchr = {https://researchr.org/publication/RollinsW91}, cites = {0}, citedby = {0}, pages = {173-187}, booktitle = {ICLP}, } @article{HerlihyW89, title = {Linearizable concurrent objects}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1989}, doi = {10.1145/67387.67423}, url = {http://doi.acm.org/10.1145/67387.67423}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/HerlihyW89}, cites = {0}, citedby = {0}, journal = {SIGPLAN Notices}, volume = {24}, number = {4}, pages = {133-135}, } @inproceedings{ZaremskiW95:0, title = {Specification Matching of Software Components}, author = {Amy Moormann Zaremski and Jeannette M. Wing}, year = {1995}, doi = {10.1145/222124.222135}, url = {http://doi.acm.org/10.1145/222124.222135}, tags = {software components, software component}, researchr = {https://researchr.org/publication/ZaremskiW95%3A0}, cites = {0}, citedby = {0}, pages = {6-17}, booktitle = {SIGSOFT FSE}, } @article{ZaremskiW97, title = {Specification Matching of Software Components}, author = {Amy Moormann Zaremski and Jeannette M. Wing}, year = {1997}, doi = {10.1145/261640.261641}, url = {http://doi.acm.org/10.1145/261640.261641}, tags = {software components, software component}, researchr = {https://researchr.org/publication/ZaremskiW97}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Software Engineering Methodology}, volume = {6}, number = {4}, pages = {333-369}, } @inproceedings{Wing95, title = {Hints for Writing Specifications}, author = {Jeannette M. Wing}, year = {1995}, tags = {writing}, researchr = {https://researchr.org/publication/Wing95}, cites = {0}, citedby = {0}, pages = {497}, booktitle = {ZUM 95: The Z Formal Specification Notation, 9th International Conference of Z Usres, Limerick, Ireland, September 7-9, 1995, Proceedings}, editor = {Jonathan P. Bowen and Michael G. Hinchey}, volume = {967}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-60271-2}, } @inproceedings{WingN86, title = {Extending Ina Jo with Temporal Logic}, author = {Jeannette M. Wing and Mark R. Nixon}, year = {1986}, tags = {logic}, researchr = {https://researchr.org/publication/WingN86}, cites = {0}, citedby = {0}, pages = {2-13}, booktitle = {IEEE Symposium on Security and Privacy}, } @inproceedings{WingZ91, title = {Unintrusive Ways to Integrate Formal Specifications in Practice}, author = {Jeannette M. Wing and Amy Moormann Zaremski}, year = {1991}, researchr = {https://researchr.org/publication/WingZ91}, cites = {0}, citedby = {0}, pages = {545-569}, booktitle = {VDM 91 - Formal Software Development, 4th International Symposium of VDM Europe, Noordwijkerhout, The Netherlands, October 21-25, 1991, Proceedings, Volume 1: Conference Contributions}, editor = {Søren Prehn and W. J. Toetenel}, volume = {551}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-54834-3}, } @inproceedings{Wing00, title = {Survivability Analysis of Networked Systems }, author = {Jeannette M. Wing}, year = {2000}, url = {http://csdl.computer.org/comp/proceedings/apsec/2000/0915/00/09150006.pdf}, tags = {analysis}, researchr = {https://researchr.org/publication/Wing00}, cites = {0}, citedby = {0}, pages = {6-7}, booktitle = {7th Asia-Pacific Software Engineering Conference (APSEC 2000), 5-8 December 2000, Singapore}, publisher = {IEEE Computer Society}, isbn = {0-7695-0915-0}, } @article{Wing06:1, title = {Computational thinking}, author = {Jeannette M. Wing}, year = {2006}, doi = {10.1145/1118178.1118215}, url = {http://doi.acm.org/10.1145/1118178.1118215}, researchr = {https://researchr.org/publication/Wing06%3A1}, cites = {0}, citedby = {0}, journal = {Communications of the ACM}, volume = {49}, number = {3}, pages = {33-35}, } @article{Wing03:0, title = {A Call to Action: Look Beyond the Horizon}, author = {Jeannette M. Wing}, year = {2003}, doi = {10.1109/MSECP.2003.1253571}, url = {http://doi.ieeecomputersociety.org/10.1109/MSECP.2003.1253571}, researchr = {https://researchr.org/publication/Wing03%3A0}, cites = {0}, citedby = {0}, journal = {IEEE Security & Privacy}, volume = {1}, number = {6}, pages = {62-67}, } @article{BowenBDGGHHHJJLPRWZ96, title = {An Invitation to Formal Methods}, author = {Jonathan P. Bowen and Ricky W. Butler and David L. Dill and Robert L. Glass and David Gries and Anthony Hall and Michael G. Hinchey and C. Michael Holloway and Daniel Jackson and Cliff B. Jones and Michael J. Lutz and David Lorge Parnas and John M. Rushby and Jeannette M. Wing and Pamela Zave}, year = {1996}, tags = {C++}, researchr = {https://researchr.org/publication/BowenBDGGHHHJJLPRWZ96}, cites = {0}, citedby = {0}, journal = {IEEE Computer}, volume = {29}, number = {4}, pages = {16-30}, } @article{Wing90, title = {Using Larch to Specify Avalon/C++ Objects}, author = {Jeannette M. Wing}, year = {1990}, url = {http://www.computer.org/tse/ts1990/e1076abs.htm}, tags = {meta-model, C++, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/Wing90}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Software Eng.}, volume = {16}, number = {9}, pages = {1076-1088}, } @inproceedings{BarbacciW87:0, title = {Specifying Functional and Timing Behavior for Real-Time Applications}, author = {Mario Barbacci and Jeannette M. Wing}, year = {1987}, researchr = {https://researchr.org/publication/BarbacciW87%3A0}, cites = {0}, citedby = {0}, pages = {124-140}, booktitle = {PARLE, Parallel Architectures and Languages Europe, Volume II: Parallel Languages, Eindhoven, The Netherlands, June 15-19, 1987, Proceedings}, editor = {J. W. de Bakker and A. J. Nijman and Philip C. Treleaven}, volume = {259}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-17945-3}, } @inproceedings{HerlihyW88:0, title = {Reasoning about Atomic Objects}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1988}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/HerlihyW88%3A0}, cites = {0}, citedby = {0}, pages = {193-208}, booktitle = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Proceedings of a Symposium, Warwick, UK, September 22-23, 1988}, editor = {Mathai Joseph}, volume = {331}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-50302-1}, } @inproceedings{BarbacciW90, title = {A Language for Distributed Applications}, author = {Mario Barbacci and Jeannette M. Wing}, year = {1990}, researchr = {https://researchr.org/publication/BarbacciW90}, cites = {0}, citedby = {0}, pages = {59-68}, booktitle = {1990 Internation Conference on Computer Languages, March 12-15 1990, New Orleans, Louisiana, USA}, publisher = {IEEE Computer Society}, isbn = {0-8186-2036-6}, } @inproceedings{GarlanBJTW95, title = {The CMU Master of Software Engineering Core Curriculum}, author = {David Garlan and Alan W. Brown and Daniel Jackson and James E. Tomayko and Jeannette M. Wing}, year = {1995}, tags = {software engineering}, researchr = {https://researchr.org/publication/GarlanBJTW95}, cites = {0}, citedby = {0}, pages = {65-86}, booktitle = {Software Engineering Education, 8th SEI CSEE Conference, New Orleans, LA, USA, March 29 - April 1, 1995, Proceedings}, editor = {Rosalind L. Ibrahim}, volume = {895}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-58951-1}, } @inproceedings{WongWW02, title = {Verifiable Secret Redistribution for Archive System}, author = {Theodore M. Wong and Chenxi Wang and Jeannette M. Wing}, year = {2002}, url = {http://csdl.computer.org/comp/proceedings/sisw/2002/1888/00/18880094abs.htm}, researchr = {https://researchr.org/publication/WongWW02}, cites = {0}, citedby = {0}, pages = {94-106}, booktitle = {IEEE Security in Storage Workshop}, } @inproceedings{Wing89, title = {Verifying Atomic Data Types}, author = {Jeannette M. Wing}, year = {1989}, tags = {data-flow}, researchr = {https://researchr.org/publication/Wing89}, cites = {0}, citedby = {0}, pages = {731-758}, booktitle = {Stepwise Refinement of Distributed Systems, Models, Formalisms, Correctness, REX Workshop, Mook, The Netherlands, May 29 - June 2, 1989, Proceedings}, editor = {J. W. de Bakker and Willem P. de Roever and Grzegorz Rozenberg}, volume = {430}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-52559-9}, } @inproceedings{JhaSW02, title = {Two Formal Analys s of Attack Graphs}, author = {Somesh Jha and Oleg Sheyner and Jeannette M. Wing}, year = {2002}, url = {http://csdl.computer.org/comp/proceedings/csfw/2002/1689/00/16890049abs.htm}, tags = {graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/JhaSW02}, cites = {0}, citedby = {0}, pages = {49-63}, booktitle = {15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, publisher = {IEEE Computer Society}, isbn = {0-7695-1689-0}, } @inproceedings{BerryW85, title = {Specification and Prototyping: Some Thoughts on Why They Are Successful}, author = {Daniel M. Berry and Jeannette M. Wing}, year = {1985}, researchr = {https://researchr.org/publication/BerryW85}, cites = {0}, citedby = {0}, pages = {117-128}, booktitle = {Mathematical Foundations of Software Development, Proceedings of the International Joint Conference on Theory and Practice of Software Development (TAPSOFT), Berlin, Germany, March 25-29, 1985, Volume 2: Colloquium on Software Engineering (CSE)}, editor = {Hartmut Ehrig and Christiane Floyd and Maurice Nivat and James W. Thatcher}, volume = {186}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-15199-0}, } @inproceedings{SheynerW03, title = {Tools for Generating and Analyzing Attack Graphs}, author = {Oleg Sheyner and Jeannette M. Wing}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3188&spage=344}, tags = {graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/SheynerW03}, cites = {0}, citedby = {0}, pages = {344-372}, booktitle = {Formal Methods for Components and Objects, Second International Symposium, FMCO 2003, Leiden, The Netherlands, November 4-7, 2003, Revised Lectures}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, volume = {3188}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-22942-6}, } @inproceedings{Wing07:0, title = {Software Security}, author = {Jeannette M. Wing}, year = {2007}, doi = {10.1109/TASE.2007.45}, url = {http://doi.ieeecomputersociety.org/10.1109/TASE.2007.45}, tags = {security}, researchr = {https://researchr.org/publication/Wing07%3A0}, cites = {0}, citedby = {0}, pages = {21}, booktitle = {First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, TASE 2007, June 5-8, 2007, Shanghai, China}, publisher = {IEEE Computer Society}, } @inproceedings{MehtaBZCW06, title = {Ranking Attack Graphs}, author = {Vaibhav Mehta and Constantinos Bartzis and Haifeng Zhu and Edmund M. Clarke and Jeannette M. Wing}, year = {2006}, doi = {10.1007/11856214_7}, url = {http://dx.doi.org/10.1007/11856214_7}, tags = {graph-rewriting, rewriting}, researchr = {https://researchr.org/publication/MehtaBZCW06}, cites = {0}, citedby = {0}, pages = {127-144}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, editor = {Diego Zamboni and Christopher Krügel}, volume = {4219}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-39723-X}, } @article{JacksonNW99, title = {A Nitpick Analysis of Mobile IPv6}, author = {Daniel Jackson and Yu-Chung Ng and Jeannette M. Wing}, year = {1999}, url = {http://link.springer.de/link/service/journals/00165/bibs/9011006/90110591.htm}, tags = {analysis, mobile}, researchr = {https://researchr.org/publication/JacksonNW99}, cites = {0}, citedby = {0}, journal = {Formal Asp. Comput.}, volume = {11}, number = {6}, pages = {591-615}, } @article{LyeW05, title = {Game strategies in network security}, author = {Kong Wei Lye and Jeannette M. Wing}, year = {2005}, doi = {10.1007/s10207-004-0060-x}, url = {http://dx.doi.org/10.1007/s10207-004-0060-x}, tags = {security}, researchr = {https://researchr.org/publication/LyeW05}, cites = {0}, citedby = {0}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {1-2}, pages = {71-86}, } @inproceedings{ManadhataWFM06, title = {Measuring the attack surfaces of two FTP daemons}, author = {Pratyusa K. Manadhata and Jeannette M. Wing and Mark Flynn and Miles McQueen}, year = {2006}, doi = {10.1145/1179494.1179497}, url = {http://doi.acm.org/10.1145/1179494.1179497}, researchr = {https://researchr.org/publication/ManadhataWFM06}, cites = {0}, citedby = {0}, pages = {3-10}, booktitle = {Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006}, editor = {Günter Karjoth and Fabio Massacci}, publisher = {ACM}, isbn = {1-59593-553-3}, } @article{ClarkeW96, title = {Formal Methods: State of the Art and Future Directions}, author = {Edmund M. Clarke and Jeannette M. Wing}, year = {1996}, researchr = {https://researchr.org/publication/ClarkeW96}, cites = {0}, citedby = {0}, journal = {ACM Computing Surveys}, volume = {28}, number = {4}, pages = {626-643}, } @article{HerlihyW90, title = {Linearizability: A Correctness Condition for Concurrent Objects}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1990}, doi = {10.1145/78969.78972}, url = {http://doi.acm.org/10.1145/78969.78972}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/HerlihyW90}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {12}, number = {3}, pages = {463-492}, } @inproceedings{ManadhataKW09, title = {Report: Measuring the Attack Surfaces of Enterprise Software}, author = {Pratyusa K. Manadhata and Yücel Karabulut and Jeannette M. Wing}, year = {2009}, doi = {10.1007/978-3-642-00199-4_8}, url = {http://dx.doi.org/10.1007/978-3-642-00199-4_8}, researchr = {https://researchr.org/publication/ManadhataKW09}, cites = {0}, citedby = {0}, pages = {91-100}, booktitle = {Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings}, editor = {Fabio Massacci and Samuel T. Redwine Jr. and Nicola Zannone}, volume = {5429}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-00198-7}, } @article{LeavensW98, title = {Protective Interface Specifications}, author = {Gary T. Leavens and Jeannette M. Wing}, year = {1998}, researchr = {https://researchr.org/publication/LeavensW98}, cites = {0}, citedby = {0}, journal = {Formal Asp. Comput.}, volume = {10}, number = {1}, pages = {59-75}, } @inproceedings{SteereSW94, title = {Dynamic Sets for Search}, author = {David C. Steere and Mahadev Satyanarayanan and Jeannette M. Wing}, year = {1994}, tags = {C++, search}, researchr = {https://researchr.org/publication/SteereSW94}, cites = {0}, citedby = {0}, pages = {397}, booktitle = {PODC}, } @inproceedings{Wing95:0, title = {Teaching Mathematics to Software Engineers}, author = {Jeannette M. Wing}, year = {1995}, tags = {teaching}, researchr = {https://researchr.org/publication/Wing95%3A0}, cites = {0}, citedby = {0}, pages = {18-40}, booktitle = {Algebraic Methodology and Software Technology, 4th International Conference, AMAST 95, Montreal, Canada, July 3-7, 1995, Proceedings}, editor = {Vangalur S. Alagar and Maurice Nivat}, volume = {936}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-60043-4}, } @article{BarbacciDWW89, title = {Developing Applications for Heterogeneous Machine Networks: The Durra Network}, author = {Mario Barbacci and Dennis L. Doubleday and Charles B. Weinstock and Jeannette M. Wing}, year = {1989}, researchr = {https://researchr.org/publication/BarbacciDWW89}, cites = {0}, citedby = {0}, journal = {Computing Systems}, volume = {2}, number = {1}, pages = {7-35}, } @inproceedings{BarbacciWW88, title = {Programming at the Processor-Memory-Switch Level}, author = {Mario Barbacci and Charles B. Weinstock and Jeannette M. Wing}, year = {1988}, tags = {programming}, researchr = {https://researchr.org/publication/BarbacciWW88}, cites = {0}, citedby = {0}, pages = {19-29}, booktitle = {ICSE}, } @inproceedings{WingRZ92, title = {Thoughts on a Larch/ML and a New Application for LP}, author = {Jeannette M. Wing and Eugene J. Rollins and Amy Moormann Zaremski}, year = {1992}, researchr = {https://researchr.org/publication/WingRZ92}, cites = {0}, citedby = {0}, pages = {297-312}, booktitle = {First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992}, editor = {Ursula Martin and Jeannette M. Wing}, series = {Workshops in Computing}, publisher = {Springer}, isbn = {3-540-19804-0}, } @inproceedings{LiskovW93:0, title = {Specifications and Their Use in Defining Subtypes}, author = {Barbara Liskov and Jeannette M. Wing}, year = {1993}, tags = {subtyping}, researchr = {https://researchr.org/publication/LiskovW93%3A0}, cites = {0}, citedby = {0}, pages = {16-28}, booktitle = {OOPSLA}, } @inproceedings{WingV95, title = {Model Checking Software Systems: A Case Study}, author = {Jeannette M. Wing and Mandana Vaziri}, year = {1995}, doi = {10.1145/222124.222148}, url = {http://doi.acm.org/10.1145/222124.222148}, tags = {case study, model checking, meta-model, Meta-Environment}, researchr = {https://researchr.org/publication/WingV95}, cites = {0}, citedby = {0}, pages = {128-139}, booktitle = {SIGSOFT FSE}, } @article{Wing90:0, title = {A Specifier s Introduction to Formal Methods}, author = {Jeannette M. Wing}, year = {1990}, researchr = {https://researchr.org/publication/Wing90%3A0}, cites = {0}, citedby = {0}, journal = {IEEE Computer}, volume = {23}, number = {9}, pages = {8-24}, } @article{HerlihyW91:0, title = {Specifying Graceful Degradation}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1991}, url = {http://computer.org/tpds/td1991/l0093abs.htm}, researchr = {https://researchr.org/publication/HerlihyW91%3A0}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Parallel Distrib. Syst.}, volume = {2}, number = {1}, pages = {93-104}, } @inproceedings{LiskovW95, title = {Specifications and Their Use in Defining Subtypes}, author = {Barbara Liskov and Jeannette M. Wing}, year = {1995}, tags = {subtyping}, researchr = {https://researchr.org/publication/LiskovW95}, cites = {0}, citedby = {0}, pages = {245-263}, booktitle = {ZUM 95: The Z Formal Specification Notation, 9th International Conference of Z Usres, Limerick, Ireland, September 7-9, 1995, Proceedings}, editor = {Jonathan P. Bowen and Michael G. Hinchey}, volume = {967}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-60271-2}, } @article{ClarkeW96a, title = {Tools and Partial Analysis}, author = {Edmund M. Clarke and Jeannette M. Wing}, year = {1996}, tags = {analysis}, researchr = {https://researchr.org/publication/ClarkeW96a}, cites = {0}, citedby = {0}, journal = {ACM Computing Surveys}, volume = {28}, number = {4es}, pages = {116}, } @inproceedings{DetlefsHKW87, title = {Avalon/C++}, author = {David Detlefs and Maurice Herlihy and K. Kietzke and Jeannette M. Wing}, year = {1987}, tags = {C++}, researchr = {https://researchr.org/publication/DetlefsHKW87}, cites = {0}, citedby = {0}, pages = {451-459}, booktitle = {C++ Workshop}, } @inproceedings{Wing00:0, title = {Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum}, author = {Jeannette M. Wing}, year = {2000}, url = {http://link.springer.de/link/service/series/0558/bibs/1816/18160002.htm}, tags = {weaving, e-science}, researchr = {https://researchr.org/publication/Wing00%3A0}, cites = {0}, citedby = {0}, pages = {2-9}, booktitle = {Algebraic Methodology and Software Technology. 8th International Conference, AMAST 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings}, editor = {Teodor Rus}, volume = {1816}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-67530-2}, } @inproceedings{PincusW05, title = {Towards an Algebra for Security Policies}, author = {Jonathan D. Pincus and Jeannette M. Wing}, year = {2005}, doi = {10.1007/11494744_3}, url = {http://dx.doi.org/10.1007/11494744_3}, tags = {security, algebra}, researchr = {https://researchr.org/publication/PincusW05}, cites = {0}, citedby = {0}, pages = {17-25}, booktitle = {Applications and Theory of Petri Nets 2005, 26th International Conference, ICATPN 2005, Miami, USA, June 20-25, 2005, Proceedings}, editor = {Gianfranco Ciardo and Philippe Darondeau}, volume = {3536}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-26301-2}, } @inproceedings{Wing89:0, title = {Specifying Avalon Objects in Larch}, author = {Jeannette M. Wing}, year = {1989}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/Wing89%3A0}, cites = {0}, citedby = {0}, pages = {61-80}, booktitle = {TAPSOFT 89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, Barcelona, Spain, March 13-17, 1989, Volume 2: Advanced Seminar on Foundations of Innovative Software Development II and Colloquium on Current Is}, editor = {Josep Díaz and Fernando Orejas}, volume = {352}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-50940-2}, } @inproceedings{HerlihyW87:0, title = {Axioms for Concurrent Objects}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1987}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/HerlihyW87%3A0}, cites = {0}, citedby = {0}, pages = {13-26}, booktitle = {POPL}, } @inproceedings{HerlihyW89:0, title = {Specifying Security Constraints with Relaxation Lattices}, author = {Maurice Herlihy and Jeannette M. Wing}, year = {1989}, tags = {constraints, security}, researchr = {https://researchr.org/publication/HerlihyW89%3A0}, cites = {0}, citedby = {0}, pages = {47-53}, booktitle = {CSFW}, } @article{WingN89, title = {Extending Ina Jo with Temporal Logic}, author = {Jeannette M. Wing and Mark R. Nixon}, year = {1989}, url = {http://www.computer.org/tse/ts1989/e0181abs.htm}, tags = {logic}, researchr = {https://researchr.org/publication/WingN89}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Software Eng.}, volume = {15}, number = {2}, pages = {181-197}, } @article{HeydonMTWZ90, title = {Miró: Visual Specification of Security}, author = {Allan Heydon and Mark W. Maimone and J. D. Tygar and Jeannette M. Wing and Amy Moormann Zaremski}, year = {1990}, url = {http://www.computer.org/tse/ts1990/e1185abs.htm}, tags = {security}, researchr = {https://researchr.org/publication/HeydonMTWZ90}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Software Eng.}, volume = {16}, number = {10}, pages = {1185-1197}, } @inproceedings{Wing01, title = {Survivability Analysis of Networked Systems}, author = {Jeannette M. Wing}, year = {2001}, tags = {analysis}, researchr = {https://researchr.org/publication/Wing01}, cites = {0}, citedby = {0}, pages = {459}, booktitle = {Formal Techniques for Networked and Distributed Systems, FORTE 2001, IFIP TC6/WG6.1 - 21:::st::: International Conference on Formal Techniques for Networked and Distributed Systems, August 28-31, 2001, Cheju Island, Korea}, editor = {Myungchul Kim and Byoungmoon Chin and Sungwon Kang and Danhyung Lee}, volume = {197}, series = {IFIP Conference Proceedings}, publisher = {Kluwer}, isbn = {0-7923-7470-3}, } @inproceedings{JhaW01, title = {Survivability Analysis of Network Systems}, author = {Somesh Jha and Jeannette M. Wing}, year = {2001}, tags = {analysis}, researchr = {https://researchr.org/publication/JhaW01}, cites = {0}, citedby = {0}, pages = {307-317}, booktitle = {Proceedings of the 23rd International Conference on Software Engineering, ICSE 2001, 12-19 May 2001, Toronto, Ontario, Canada}, publisher = {IEEE Computer Society}, isbn = {0-7695-1050-7}, } @inproceedings{LeavensW97, title = {Protective Interface Specifications}, author = {Gary T. Leavens and Jeannette M. Wing}, year = {1997}, researchr = {https://researchr.org/publication/LeavensW97}, cites = {0}, citedby = {0}, pages = {520-534}, booktitle = {TAPSOFT 97: Theory and Practice of Software Development, 7th International Joint Conference CAAP/FASE, Lille, France, April 14-18, 1997, Proceedings}, editor = {Michel Bidoit and Max Dauchet}, volume = {1214}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-62781-2}, } @inproceedings{ClamenLNW90, title = {Reliable Distributed Computing with Avalon/Common Lisp}, author = {Stewart M. Clamen and Linda D. Leibengood and Scott Nettles and Jeannette M. Wing}, year = {1990}, researchr = {https://researchr.org/publication/ClamenLNW90}, cites = {0}, citedby = {0}, pages = {169-179}, booktitle = {1990 Internation Conference on Computer Languages, March 12-15 1990, New Orleans, Louisiana, USA}, publisher = {IEEE Computer Society}, isbn = {0-8186-2036-6}, } @article{Wing87, title = {Writing Larch Interface Language Specifications}, author = {Jeannette M. Wing}, year = {1987}, doi = {10.1145/9758.10500}, url = {http://doi.acm.org/10.1145/9758.10500}, tags = {writing}, researchr = {https://researchr.org/publication/Wing87}, cites = {0}, citedby = {0}, journal = {ACM Transactions on Programming Languages and Systems}, volume = {9}, number = {1}, pages = {1-24}, } @inproceedings{HeydonMTWZ89, title = {Constraining Pictures with Pictures}, author = {Allan Heydon and Mark W. Maimone and J. D. Tygar and Jeannette M. Wing and Amy Moormann Zaremski}, year = {1989}, researchr = {https://researchr.org/publication/HeydonMTWZ89}, cites = {0}, citedby = {0}, pages = {157-162}, booktitle = {IFIP Congress}, } @inproceedings{LiskovW93, title = {A New Definition of the Subtype Relation}, author = {Barbara Liskov and Jeannette M. Wing}, year = {1993}, url = {http://link.springer.de/link/service/series/0558/bibs/0707/07070118.htm}, tags = {subtyping}, researchr = {https://researchr.org/publication/LiskovW93}, cites = {0}, citedby = {0}, pages = {118-141}, booktitle = {ECOOP 93 - Object-Oriented Programming, 7th European Conference, Kaiserslautern, Germany, July 26-30, 1993, Proceedings}, editor = {Oscar Nierstrasz}, volume = {707}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-57120-5}, } @inproceedings{ZdonikBSW89, title = {Panel on Transactions in Object-Oriented Systems}, author = {Stanley B. Zdonik and Toby Bloom and David W. Stemple and Jeannette M. Wing}, year = {1989}, tags = {meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/ZdonikBSW89}, cites = {0}, citedby = {0}, pages = {473-476}, booktitle = {OOPSLA}, } @article{DetlefsHW88, title = {Inheritance of Synchronization and Recovery Properties in Avalon/C++}, author = {David Detlefs and Maurice Herlihy and Jeannette M. Wing}, year = {1988}, tags = {synchronization, C++}, researchr = {https://researchr.org/publication/DetlefsHW88}, cites = {0}, citedby = {0}, journal = {IEEE Computer}, volume = {21}, number = {12}, pages = {57-69}, } @proceedings{fm:1999-2, title = {FM 99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II}, year = {1999}, researchr = {https://researchr.org/publication/fm%3A1999-2}, cites = {0}, citedby = {0}, booktitle = {FM 99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II}, conference = {FM}, editor = {Jeannette M. Wing and Jim Woodcock and Jim Davies}, volume = {1709}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-66588-9}, } @proceedings{fm:1999-1, title = {FM 99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I}, year = {1999}, researchr = {https://researchr.org/publication/fm%3A1999-1}, cites = {0}, citedby = {0}, booktitle = {FM 99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I}, conference = {FM}, editor = {Jeannette M. Wing and Jim Woodcock and Jim Davies}, volume = {1708}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-66587-0}, } @proceedings{larch:1992, title = {First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992}, year = {1993}, researchr = {https://researchr.org/publication/larch%3A1992}, cites = {0}, citedby = {0}, booktitle = {First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992}, conference = {larch}, editor = {Ursula Martin and Jeannette M. Wing}, series = {Workshops in Computing}, publisher = {Springer}, isbn = {3-540-19804-0}, }