Jeannette M. Wing

Affiliations:
  • Microsoft Research, USA
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Jeannette M. Wing authored at least 125 papers between 1982 and 2023.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Awards

ACM Fellow

ACM Fellow 1998, "For fundamental contributions to formal methods, programming languages, and programming methodology, and for promoting the use of formal methods in software development.".

IEEE Fellow

IEEE Fellow 2003, "For contributions to methods for software systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
More Than Just Algorithms.
Commun. ACM, August, 2023

More Than Just Algorithms: A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley.
ACM Queue, 2023

2021
Trustworthy AI.
Commun. ACM, 2021

2020
Ten Research Challenge Areas in Data Science.
CoRR, 2020

Ensuring Fairness Beyond the Training Data.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Transforming Probabilistic Programs for Model Checking.
Proceedings of the FODS '20: ACM-IMS Foundations of Data Science Conference, 2020

Data for Good: Ensuring the Responsible Use of Data to Benefit Society.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2018
Data for Good: Abstract.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Societal Impact of Data Science and Artificial Intelligence.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

2017
Embracing Uncertainty.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Progress in computational thinking, and expanding the HPC community.
Commun. ACM, 2016

Inverse privacy.
Commun. ACM, 2016

Opening keynote: Crashing drones and hijacked cameras: Cybertrust meets cyberphysical.
Proceedings of the 29th IEEE International System-on-Chip Conference, 2016

2015
Inverse Privacy.
CoRR, 2015

A Methodology for Information Flow Experiments.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Bootstrapping Privacy Compliance in Big Data Systems.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Encouraging IT usage in future healthcare, quality in CS education.
Commun. ACM, 2013

Formal methods: an industrial perspective.
Proceedings of the 2013 ACM SIGAda annual conference on High integrity language technology, 2013

Purpose Restrictions on Information Use.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Formalizing and Enforcing Purpose Restrictions in Privacy Policies.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
A Formal Model for a System's Attack Surface.
Proceedings of the Moving Target Defense, 2011

An Attack Surface Metric.
IEEE Trans. Software Eng., 2011

On the Semantics of Purpose Requirements in Privacy Policies
CoRR, 2011

Reviewing peer review.
Commun. ACM, 2011

Jeannette M. Wing @ PCAST; Barbara Liskov keynote.
Commun. ACM, 2011

Towards a Theory of Trust in Networks of Humans and Computers.
Proceedings of the Security Protocols XIX, 2011

2010
Preface.
J. Comput. Sci., 2010

NSF funding advice: 21st century innovation.
Commun. ACM, 2010

2009
An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing.
Commun. ACM, 2009

CS woes: deadline-driven research, academic inequality.
Commun. ACM, 2009

Formal Methods for Privacy.
Proceedings of the FM 2009: Formal Methods, 2009

Report: Measuring the Attack Surfaces of Enterprise Software.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
Five deep questions in computing.
Commun. ACM, 2008

Extracting Conditional Confidentiality Policies.
Proceedings of the Sixth IEEE International Conference on Software Engineering and Formal Methods, 2008

Computational thinking and thinking about computing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Software Security.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Computational thinking.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

2006
Computational thinking.
Commun. ACM, 2006

Ranking Attack Graphs.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Attack graph generation and analysis.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Measuring the attack surfaces of two FTP daemons.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Game strategies in network security.
Int. J. Inf. Sec., 2005

Scenario Graphs Applied to Security (Extended Abstract).
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005

Towards an Algebra for Security Policies.
Proceedings of the Applications and Theory of Petri Nets 2005, 2005

2003
Platitudes and attitudes.
Int. J. Softw. Tools Technol. Transf., 2003

A Call to Action: Look Beyond the Horizon.
IEEE Secur. Priv., 2003

Tools for Generating and Analyzing Attack Graphs.
Proceedings of the Formal Methods for Components and Objects, 2003

2002
Vulnerability Analysis of Networked Systems.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

Automated Generation and Analysis of Attack Graphs.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Verifiable Secret Redistribution for Archive System.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Mathematics in Computer Science Curricula.
Proceedings of the Mathematics of Program Construction, 6th International Conference, 2002

Two Formal Analys s of Attack Graphs.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Survivability Analysis of Network Systems.
Proceedings of the 23rd International Conference on Software Engineering, 2001

2000
Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems.
IEEE Trans. Software Eng., 2000

Respectful Type Converters.
IEEE Trans. Software Eng., 2000

Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems.
Formal Methods Syst. Des., 2000

The First World Congress on Formal Methods in the Development of Computing Systems.
Formal Aspects Comput., 2000

Survivability Analysis of Network Specifications.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Survivability Analysis of Networked Systems .
Proceedings of the 7th Asia-Pacific Software Engineering Conference (APSEC 2000), 2000

Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1999
NSF workshop on a software research program for the 21st century.
ACM SIGSOFT Softw. Eng. Notes, 1999

A Nitpick Analysis of Mobile IPv6.
Formal Aspects Comput., 1999

1998
Protective Interface Specifications.
Formal Aspects Comput., 1998

Proving Correctness of a Controller Algorithm for the RAID Level 5 System.
Proceedings of the Digest of Papers: FTCS-28, 1998

Formal Methods: Past, Present, and Future (Abstract).
Proceedings of the Advances in Computing Science, 1998

1997
Specification Matching of Software Components.
ACM Trans. Softw. Eng. Methodol., 1997

A Case study in Model Checking Software Systems.
Sci. Comput. Program., 1997

1996
Tools and Partial Analysis.
ACM Comput. Surv., 1996

Formal Methods: State of the Art and Future Directions.
ACM Comput. Surv., 1996

An Invitation to Formal Methods.
Computer, 1996

1995
Signature Matching: A Tool for Using Software Libraries.
ACM Trans. Softw. Eng. Methodol., 1995

Hints for Writing Specifications.
Proceedings of the ZUM '95: The Z Formal Specification Notation, 1995

Model Checking Software Systems: A Case Study.
Proceedings of the Third ACM SIGSOFT Symposium on Foundations of Software Engineering, 1995

Specifying Weak Sets.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

The CMU Master of Software Engineering Core Curriculum.
Proceedings of the Software Engineering Education, 8th SEI CSEE Conference, New Orleans, LA, USA, March 29, 1995

Teaching Mathematics to Software Engineers.
Proceedings of the Algebraic Methodology and Software Technology, 1995

1994
A Behavioral Notion of Subtyping.
ACM Trans. Program. Lang. Syst., 1994

Composing First-Class Transactions.
ACM Trans. Program. Lang. Syst., 1994

Dynamic Sets for Search.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

Using Belief to Reason about Cache Coherence.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

1993
Larch: Languages and Tools for Formal Specification
Texts and Monographs in Computer Science, Springer, ISBN: 978-1-4612-2704-5, 1993

Testing and Verifying Concurrent Objects.
J. Parallel Distributed Comput., 1993

Signature Matching: A Key to Reuse.
Proceedings of the First ACM SIGSOFT Symposium on Foundations of Software Engineering, 1993

Specifications and Their Use in Defining Subtypes.
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993

Decomposing and Recomposing Transactional Concepts.
Proceedings of the Object-Based Distributed Programming, 1993

A New Definition of the Subtype Relation.
Proceedings of the ECOOP'93, 1993

1992
Revisiting Abstraction Functions For Reasoning About Concurrency.
Proceedings of the 5th Refinement Workshop, 1992

Specification in Software Development
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

Thoughts on a Larch/ML and a New Application for LP.
Proceedings of the First International Workshop on Larch, 1992

1991
Specifying Graceful Degradation.
IEEE Trans. Parallel Distributed Syst., 1991

A formal specification of a visual language editor.
Proceedings of the 6th International Workshop on Software Specification and Design, 1991

Specifications as Search Keys for Software Libraries.
Proceedings of the Logic Programming, 1991

Unintrusive Ways to Integrate Formal Specifications in Practice.
Proceedings of the VDM '91, 1991

1990
Using Larch to Specify Avalon/C++ Objects.
IEEE Trans. Software Eng., 1990

Miró: Visual Specification of Security.
IEEE Trans. Software Eng., 1990

Linearizability: A Correctness Condition for Concurrent Objects.
ACM Trans. Program. Lang. Syst., 1990

A Specifier's Introduction to Formal Methods.
Computer, 1990

Reliable Distributed Computing with Avalon/Common Lisp.
Proceedings of the 1990 Internation Conference on Computer Languages, 1990

A Language for Distributed Applications.
Proceedings of the 1990 Internation Conference on Computer Languages, 1990

Experience with the Larch Prover.
Proceedings of the Conference proceedings on Formal methods in software development, 1990

1989
Extending Ina Jo with Temporal Logic.
IEEE Trans. Software Eng., 1989

Verifying atomic data types.
Int. J. Parallel Program., 1989

Developing Applications for Heterogeneous Machine Networks: The Durra Network.
Comput. Syst., 1989

Micro tools.
Proceedings of the IEEE Workshop on Visual Languages, 1989

Specifying Avalon Objects in Larch.
Proceedings of the TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1989

Panel on Transactions in Object-Oriented Systems.
Proceedings of the Conference on Object-Oriented Programming: Systems, 1989

Constraining Pictures with Pictures.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989

Specifying Security Constraints with Relaxation Lattices.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1988
A Study of 12 Specifications of the Library Problem.
IEEE Softw., 1988

Linearizable concurrent objects.
Proceedings of the 1988 ACM SIGPLAN Workshop on Object-based Concurrent Programming, 1988

Inheritance of Synchronization and Recovery Properties in Avalon/C++.
Computer, 1988

Miro semantics for security.
Proceedings of the IEEE Workshop on Visual Languages, 1988

Programming at the Processor-Memory-Switch Level.
Proceedings of the Proceedings, 1988

Reasoning about Atomic Objects.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988

1987
Writing Larch Interface Language Specifications.
ACM Trans. Program. Lang. Syst., 1987

Axioms for Concurrent Objects.
Proceedings of the Conference Record of the Fourteenth Annual ACM Symposium on Principles of Programming Languages, 1987

Specifying Graceful Degradation in Distributed Systems.
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, 1987

Specifying Functional and Timing Behavior for Real-Time Applications.
Proceedings of the PARLE, 1987

DURRA : A Task-Level Description Language.
Proceedings of the International Conference on Parallel Processing, 1987

Avalon/C++.
Proceedings of the C++ Workshop. Santa Fe, NM, USA, November 1987, 1987

1986
Abstracts in software engineering.
ACM SIGSOFT Softw. Eng. Notes, 1986

1985
The Larch Family of Specification Languages.
IEEE Softw., 1985

Beyond functional behavior: combining methods to specify different classes of properties of large systems.
ACM SIGSOFT Softw. Eng. Notes, 1985

Specification and Prototyping: Some Thoughts on Why They Are Successful.
Proceedings of the Mathematical Foundations of Software Development, 1985

1982
Some Notes on Putting Formal Specifications to Productive Use.
Sci. Comput. Program., 1982


  Loading...