Jeannette M Wing
Jeannette M Wing
Director of Data Science, Professor of Computer Science, Columbia University
columbia.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Computational thinking
JM Wing
Communications of the ACM 49 (3), 33-35, 2006
83162006
Linearizability: A correctness condition for concurrent objects
MP Herlihy, JM Wing
ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (3), 463-492, 1990
37171990
Formal methods: State of the art and future directions
EM Clarke, JM Wing
ACM Computing Surveys (CSUR) 28 (4), 626-643, 1996
20541996
Computational thinking and thinking about computing
JM Wing
Philosophical Transactions of the Royal Society A: Mathematical, Physical …, 2008
19282008
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
16942002
A behavioral notion of subtyping
BH Liskov, JM Wing
ACM Transactions on Programming Languages and Systems (TOPLAS) 16 (6), 1811-1841, 1994
16461994
A specifier's introduction to formal methods
JM Wing
Computer 23 (9), 8-22, 1990
12011990
Specification matching of software components
AM Zaremski, JM Wing
ACM Transactions on Software Engineering and Methodology (TOSEM) 6 (4), 333-369, 1997
8181997
An attack surface metric
PK Manadhata, JM Wing
IEEE Transactions on Software Engineering 37 (3), 371-386, 2010
7472010
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
7192002
Game strategies in network security
K Lye, JM Wing
International Journal of Information Security 4 (1), 71-86, 2005
6022005
Signature matching: a tool for using software libraries
AM Zaremski, JM Wing
ACM Transactions on Software Engineering and Methodology (TOSEM) 4 (2), 146-170, 1995
4941995
Research notebook: Computational thinking—What and why
J Wing
The link magazine 6, 20-23, 2011
4312011
The Larch Family of Specification Languages.
JV Guttag, JJ Horning, JM Wing
IEEE Softw. 2 (5), 24-36, 1985
4121985
Tools for generating and analyzing attack graphs
O Sheyner, J Wing
International symposium on formal methods for components and objects, 344-371, 2003
3142003
Measuring relative attack surfaces
M Howard, J Pincus, JM Wing
Computer security in the 21st century, 109-137, 2005
2972005
Ranking attack graphs
V Mehta, C Bartzis, H Zhu, E Clarke, J Wing
International Workshop on Recent Advances in Intrusion Detection, 127-144, 2006
2762006
Specification matching of software components
AM Zaremski, JM Wing
Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software …, 1995
2761995
Axioms for concurrent objects
MP Herlihy, JM Wing
Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of …, 1987
2351987
Larch in five easy pieces
J Guttag, JJ Horning, JM Wing
Digital Equipment Corporation, Systems Research Center, 1985
2331985
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20