Jeannette Wing
American computer scientist
Jeannette Wing's AcademicInfluence.com Rankings
Download Badge
Computer Science
Why Is Jeannette Wing Influential?
(Suggest an Edit or Addition)According to Wikipedia, Jeannette Marie Wing is Avanessians Director of the Data Science Institute at Columbia University, where she is also a professor of computer science. Until June 30, 2017, she was Corporate Vice President of Microsoft Research with oversight of its core research laboratories around the world and Microsoft Research Connections. Prior to 2013, she was the President's Professor of Computer Science at Carnegie Mellon University, Pittsburgh, Pennsylvania, United States. She also served as assistant director for Computer and Information Science and Engineering at the NSF from 2007 to 2010. She was appointed the Columbia University executive vice president for research in 2021.
Jeannette Wing's Published Works
Published Works
- Computational thinking (2006) (5078)
- Linearizability: a correctness condition for concurrent objects (1990) (3304)
- Formal methods: state of the art and future directions (1996) (1560)
- Automated generation and analysis of attack graphs (2002) (1347)
- A behavioral notion of subtyping (1994) (1321)
- Computational thinking and thinking about computing (2008) (1304)
- A specifier's introduction to formal methods (1990) (877)
- Larch: Languages and Tools for Formal Specification (1993) (812)
- Specification matching of software components (1995) (744)
- An Attack Surface Metric (2011) (599)
- Two formal analyses of attack graphs (2002) (512)
- Game strategies in network security (2005) (438)
- Signature matching: a tool for using software libraries (1995) (362)
- Large Dairy Herd Management (1979) (332)
- The Larch Family of Specification Languages (1985) (305)
- Measuring Relative Attack Surfaces (2005) (244)
- Tools for Generating and Analyzing Attack Graphs (2003) (239)
- Computational Thinking: What and Why? (2010) (206)
- Ranking Attack Graphs (2006) (202)
- Axioms for concurrent objects (1987) (198)
- Scenario graphs and attack graphs (2004) (194)
- An Invitation to Formal Methods (1996) (161)
- Writing Larch interface language specifications (1987) (158)
- Inheritance of synchronization and recovery properties in Avalon/C++ (1988) (142)
- Signature matching: a key to reuse (1993) (129)
- Survivability analysis of networked systems (2001) (128)
- A New Definition of the Subtype Relation (1993) (127)
- A TWO-TIERED APPROACH TO SPECIFYING PROGRAMS (1983) (110)
- Minimization and Reliability Analyses of Attack Graphs (2002) (106)
- Computational thinking’s influence on research and education for all (2017) (105)
- Verifiable secret redistribution for archive systems (2002) (105)
- Specifications as Search Keys for Software Libraries (1991) (97)
- Model checking electronic commerce protocols (1996) (95)
- Specifications and their use in defining subtypes (1993) (95)
- Measuring the attack surfaces of two FTP daemons (2006) (90)
- Bootstrapping Privacy Compliance in Big Data Systems (2014) (84)
- Measuring a System's Attack Surface (2004) (79)
- Composing first-class transactions (1994) (74)
- A Formal Model for a System's Attack Surface (2011) (71)
- Avalon : language support for reliable distributed systems (1986) (68)
- Survivability analysis of network specifications (2000) (67)
- Fast, automatic checking of security protocols (1996) (66)
- What is a specification language ? (2001) (66)
- An Approach to Measuring a System's Attack Surface (2007) (65)
- Trustworthy AI (2020) (65)
- Generalized aliasing as a basis for program analysis tools (2001) (64)
- Specifying Graceful Degradation (1991) (64)
- A study of 12 specifications of the library problem (1988) (64)
- A symbiotic relationship between formal methods and security (1998) (62)
- Model checking software systems: a case study (1995) (60)
- Testing and Verifying Concurrent Objects (1993) (58)
- Miró: Visual Specification of Security (1990) (58)
- Towards a Theory of Trust in Networks of Humans and Computers (2011) (57)
- Behavioral Subtyping Using Invariants and Constraints (2001) (57)
- Formalizing and Enforcing Purpose Restrictions in Privacy Policies (2012) (55)
- A Case study in Model Checking Software Systems (1997) (52)
- Programming at the processor-memory-switch level (1988) (47)
- The Data Life Cycle (2019) (46)
- Five deep questions in computing (2008) (46)
- Formal Methods for Privacy (2009) (45)
- Verifiable Secret Redistribution for Threshold Sharing Schemes (2002) (44)
- Effects of citrus molasses distillers solubles and molasses on rumen parameters and lactation. (1988) (40)
- Signature and specification matching (1996) (38)
- Some Notes on Putting Formal Specifications to Productive Use (1982) (38)
- Family Values: A Behavioral Notion of Subtyping (1993) (38)
- Concurrent atomic garbage collection (1990) (37)
- Effect of Roughage Concentrate Ratio on Digestibility and Rumen Fermentation of Corn Silage-Citrus Pulp Rations (1974) (35)
- A Methodology for Information Flow Experiments (2014) (35)
- Computational thinking (2007) (35)
- Progress in computational thinking, and expanding the HPC community (2016) (34)
- DURRA : A Task-Level Description Language (1987) (34)
- Ensuring Fairness Beyond the Training Data (2020) (32)
- A call to action look beyond the horizon (2003) (32)
- Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum (2000) (31)
- Persistence+undoability=transactions (1992) (30)
- Effects of citrus pulp in high urea rations for steers. (1976) (29)
- Specifying Functional and Timing Behavior for Real-Time Applications (1987) (29)
- Thoughts on a Larch/ML and a New Application for LP (1992) (28)
- Unintrusive Ways to Integrate Formal Specifications in Practice (1991) (28)
- Inverse privacy (2015) (28)
- Theory generation for security protocols (1999) (27)
- Utilization of inorganic iron by ruminants as influenced by form of iron and iron status of the animal. (1967) (25)
- Specifying graceful degradation in distributed systems (1987) (25)
- Respectful Type Converters (2000) (25)
- The CMU Master of Software Engineering Core Curriculum (1995) (23)
- Using Larch to Specify Avalon/C++ Objects (1990) (23)
- Effect of Physical Form and Amount of Citrus Pulp on Utilization of Complete Feeds for Dairy Cattle (1975) (22)
- PENSAMENTO COMPUTACIONAL – Um conjunto de atitudes e habilidades que todos, não só cientistas da computação, ficaram ansiosos para aprender e usar. (2016) (22)
- Extensions to Standard ML to Support Transactions (1992) (21)
- Protective Interface Specifications (1997) (20)
- Weaving formal methods into the undergraduate computer science curriculum (2000) (19)
- A Library of Concurrent Objects and Their Proofs of Correctness (1990) (19)
- A Nitpick Analysis of Mobile IPv6 (1999) (18)
- A language for distributed applications (1990) (18)
- Report: Measuring the Attack Surfaces of Enterprise Software (2009) (18)
- CHAPTER 9 – Scenario Graphs Applied to Network Security (2008) (18)
- Developing Applications for Heterogeneous Machine Networks: The Durra Environment (1989) (17)
- Durra: A Task-Level Description Language Reference Manual (Version 2) (1989) (17)
- Reliable distributed computing with Avalon/Common Lisp (1990) (17)
- Geometric Reasoning: A New Paradigm for Processing Geometric Information (1985) (17)
- INTERNATIONAL HEALTH BENEFITS TRANSFER APPLICATION TOOL: THE USE OF PPP AND INFLATION (2002) (15)
- Effect of source and season on apparent digestibility of carotene in forage by cattle. (1969) (15)
- Purpose Restrictions on Information Use (2013) (15)
- FM’99 — Formal Methods (1999) (14)
- Specification and Prototyping: Some Thoughts on Why They Are Successful (1985) (14)
- Family Values: A Semantic Notion of Subtyping (1992) (14)
- FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II (1999) (12)
- Attack graph generation and analysis (2006) (12)
- Extending Ina Jo With Teimporal Logic (1986) (12)
- Using belief to reason about cache coherence (1994) (11)
- Ten Research Challenge Areas in Data Science (2020) (11)
- Constraining Pictures with Pictures (1989) (10)
- Selective enumeration (2000) (10)
- Verifiable Secret Redistribution for Threshold Sharing Schemes (CMU-CS-02-114) (2002) (9)
- Extracting Conditional Confidentiality Policies (2008) (9)
- Decomposing and Recomposing Transactional Concepts (1993) (9)
- Reasoning about Atomic Objects (1988) (9)
- Venari/ML Interfaces and Examples (1993) (9)
- Preference of calves for a concentrate feed with and without artificial flavors. (1961) (9)
- Decentralized recovery for survivable storage systems (2004) (9)
- Data Science Leadership Summit: Summary Report (2018) (8)
- Teaching Mathematics to Software Engineers (1995) (8)
- Specifying Avalon Objects in Larch (1989) (8)
- On the Semantics of Purpose Requirements in Privacy Policies (2011) (8)
- Specifications as search keys for software libraries : a case study using Lambda Prolog (1990) (8)
- FORMAL SEMANTICS FOR VISUAL SPECIFICATION OF SECURITY (1990) (8)
- Specifying weak sets (1995) (7)
- A Larch Specification of the Library Problem (1986) (7)
- Speci cation Matching of Software (1995) (7)
- Combining Theory Generation and Model Checking for Security Protocol Analysis (2000) (7)
- Formal Verification of Autonomous Systems NASA Intelligent Systems Program (2001) (7)
- Respectful type converters for mutable types (2000) (6)
- LCL: A Larch Interface Language for C (1993) (6)
- First International Workshop on Larch (1993) (6)
- Tools and partial analysis (1996) (6)
- Tinkertoy Transactions (1993) (6)
- Measuring the Attack Surfaces of SAP Business Applications (2008) (6)
- Towards a Theory of Trust (2013) (6)
- Protecting individuals' interests in electronic commerce protocols (2000) (6)
- Towards an Algebra for Security Policies (2005) (6)
- Closing the Idealization Gap with Theory Generation ( Extended Abstract ) (1997) (6)
- The Avalon C++ programming language (version 0) (1988) (6)
- Complete rations for growing dairy replacements utilizing by-product feedstuffs. (1980) (6)
- Miro semantics for security (1988) (6)
- The First World Congress on Formal Methods in the Development of Computing Systems (2000) (5)
- Effect of Procain Penicillin, Potassium Para-Amino Salicylate, and Isoniazid on Young Calves1 (1958) (5)
- What is a formal method (1989) (5)
- The Emergence and Future of Public Health Data Science (2021) (5)
- Program Specification (1982) (5)
- NSF workshop on a software research program for the 21st century (1999) (5)
- Formal specification of concurrent systems (1999) (5)
- A formal specification of a visual language editor (1991) (5)
- Silage investigations in Florida. (1970) (4)
- Machine assisted proofs of properties of Avalon programs (1989) (4)
- Experience with the Larch Prover (1990) (4)
- Specifying security constraints with relaxation lattices (1989) (4)
- Genetic effects on dairy calf growth. (1989) (4)
- FAQ on π-Calculus (2002) (4)
- Jeannette M. Wing @ PCAST; Barbara Liskov keynote (2011) (4)
- Developing Applications for Heterogeneous Machine Networks: The Durra Network (1989) (4)
- Linearizable concurrent objects (1988) (4)
- Reports From Working Groups (1990) (4)
- Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems (2000) (3)
- Biggish: A Solution For The Inverse Privacy Problem (2017) (3)
- Specifications in software development (1992) (3)
- Highlights of the Inaugural Data Science Leadership Summit (2019) (3)
- Subtyping for distributed object stores (1997) (3)
- Enabling Computer and Information Science and Engineering Research and Education in the Cloud (2018) (3)
- Effect of para amino salicylic acid and chlortetracycline alone and in combination on dairy calves. (1957) (3)
- Verifiable Secret Redistribution (2001) (3)
- An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing (2009) (3)
- CS woes (2009) (3)
- Proving correctness of a controller algorithm for the RAID Level 5 System (1998) (3)
- Reviewing peer review (2011) (2)
- TOWARDS A SCIENCE OF SURVIVABILITY: A Research Agenda and a Specific Method (2000) (2)
- Mathematics in Computer Science Curricula (2002) (2)
- Preface (2010) (2)
- Vulnerability Analysis of Networked Systems (2002) (2)
- Effects of Supplementary Bulky Concentrate Feeding on Milk Production (1963) (2)
- Formal Methods: Past, Present, and Future (Abstract) (1998) (2)
- Scenario Graphs Applied to Security ( Summary Paper ) (2005) (2)
- Hints for Writing Specifications (1995) (2)
- A study of twelve specifications of the library problem (1987) (2)
- Towards an Algebra for Security Policies (Extended Abstract) (2005) (2)
- Inverse Privacy (revised) (2015) (2)
- LSL: The Larch Shared Language (1993) (1)
- Purpose Restrictions on Information Use (CMU-CyLab-13-005) (2013) (1)
- Verification Tools for Embedded Systems (2001) (1)
- Confidentiality Policies and Their Extraction from Programs (2007) (1)
- Effect of supplementary digestive enzymes on growth of dairy heifers. (1960) (1)
- FIVE DEEP QUESTIONS IN COMPUTING : Even if they seem unanswerable, just trying to answer them will advance the field's scientific foundations and help engineer the systems we can only imagine (2008) (1)
- Modeling Unpredictable or Random Environments (2001) (1)
- Scenario Graphs Applied to Security (Extended Abstract) (2005) (1)
- First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992 (1993) (1)
- Information Flow Investigations (CMU-CS-13-118) (2013) (1)
- A Systemic Framework for Facilitating Better Client-Developer Collaboration in Complex Projects (2020) (1)
- Nutrient intake of cows from silages made from typical Florida forages. (1963) (1)
- Societal Impact of Data Science and Artificial Intelligence (2018) (1)
- Micro tools (1989) (1)
- Using LP to Debug LSL Specifications (1993) (1)
- Data for Good: Abstract (2018) (1)
- Formal Specification of AEC Product Models (1994) (1)
- The effect of fire on terrestrial amphipods (Crustacea: Amphipoda) in a natural grassland community (2019) (1)
- Verifying atomic data types (1990) (1)
- A Simulator for Concurrent Objects (1990) (1)
- Understanding Network Complexity (2010) (1)
- Risk model validation for BRICS countries: a value-at-risk, expected shortfall and extreme value theory approach (2015) (1)
- Dynamic sets for search (1994) (1)
- Specifying recoverable objects (1988) (1)
- Revisiting Abstraction Functions For Reasoning About Concurrency (1992) (1)
- Opening keynote: Crashing drones and hijacked cameras: Cybertrust meets cyberphysical (2016) (0)
- Subtyping for Distributed Object Stores (Extended Abstract) (1997) (0)
- Tinkertoy(Trade Name) Transactions (1993) (0)
- A Little Bit of Logic (1993) (0)
- Formal Aspects of Computing Protective Interface Specifications ∗ (1999) (0)
- Dictionary catalogue of the history of printing from the John M. Wing Foundation in the Newberry Library (1961) (0)
- A Comparison and Combination of Theory Generation and ModelChe king for Se urity Proto ol AnalysisNi holas (2007) (0)
- A Software Composition Flaw in Google Desktop Search (2005) (0)
- Information Assurance Science and Engineering Project (2004) (0)
- Beyond medicine--the people are the program. (1970) (0)
- Girding yourself for the security research battle (2001) (0)
- Appendix A : Larch Traits and Type Specifications (0)
- Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I (1999) (0)
- An Introduction to Larch (1993) (0)
- On the Horizon (2001) (0)
- Specification in Software Development (1992) (0)
- OOPSLA keynote: Frontiers of Computing Research and Education: A View from the National Science Foundation (2009) (0)
- Beyond functional behavior: combining methods to specify different classes of properties of large systems (1985) (0)
- Verifiable Secret Redistribution (CMU-CS-01-155) (2001) (0)
- Formal methods for computer systems (2003) (0)
- Model Checking Electronic Commerce Protocols ( Extended Abstract ) (1996) (0)
- A Technology Investigation Supporting Software Architecture and Analysis for Evolution (2001) (0)
- Implementation of commit timestamps in Avalon (1991) (0)
- Formal Aspects of Computing A Nitpick Analysis of Mobile IPv 6 (0)
- Formal methods: an industrial perspective (2013) (0)
- Embracing Uncertainty (2017) (0)
- Asia Faculty Summit 2012 Highlights (2012) (0)
- Abstracts in software engineering (1986) (0)
- NSF funding advice (2010) (0)
- Axioms for concurrent objects. Interim report (1987) (0)
- Proceedings of the first First International Workshop on Larch (1992) (0)
- Three Problem Areas Common to Autonomous and Embedded System (2001) (0)
- Five steps to improving employee performance. (1983) (0)
- Hints to Speciiers (1995) (0)
- Wastewater renovation through soil and plants. (1971) (0)
- Behaviour Compatibility within Particular Contexts (0)
- Session details: Keynote Talk II (2020) (0)
- Effect of antibiotics and various other feed additives on growth of young dairy calves. (1961) (0)
- Specifications in Program Development (1993) (0)
- Making meetings effective: it's a matter of control. (1980) (0)
- Encouraging IT usage in future healthcare, quality in CS education (2013) (0)
- Panel on Transactions in Object-Oriented Systems (1989) (0)
- Durra: A Task-level Description Language Preliminary Reference Manual (1986) (0)
- Platitudes and attitudes (2003) (0)
- Usable Verification: Balancing Thinking and Automating (2010) (0)
- AD-A 259 881 Family Values : A Semantic Notion of Subtyping (0)
- More Than Just Algorithms (2023) (0)
- Increasing Computer Science Awareness in High Schools and Colleges (2010) (0)
- Geometric reasoning for geometric modeling (1985) (0)
- The opinion corner Platitudes and attitudes (2003) (0)
- Data Science in Context (2022) (0)
- Research in Wait-Free Synchronization (1991) (0)
- Family Values : A Semantic Notion of Subtyping 1 (1992) (0)
- Production, voluntary consumption, and digestibility of forages when used as feeds for dairy cattle in Florida. (1965) (0)
- Crimped oats for dairy cattle. (1957) (0)
- Transforming Probabilistic Programs for Model Checking (2020) (0)
- Software Security (2007) (0)
- Data for Good: Ensuring the Responsible Use of Data to Benefit Society (2020) (0)
- Toward a Research Agenda for Data Science: The Discussion Begins (2020) (0)
- Keynote 1: Trustworthy AI (2020) (0)
- Toward Compositional Analysis of Security Protocols Using Theorem Proving (2000) (0)
This paper list is powered by the following services:
Other Resources About Jeannette Wing
What Schools Are Affiliated With Jeannette Wing?
Jeannette Wing is affiliated with the following schools: