Jeannette M. Wing

Executive Vice President for Research
Computer Science Department
Columbia University
313 Low Library
535 W. 116th Street
New York, NY 10027

wing@columbia.edu
(212) 853-0681

Books, Edited Volumes Book Chapters (Refereed)
Journal Publications Refereed Conference and Workshop Papers
Unrefereed Abstracts, Papers, Reports, and Blogs Technical Reports
(not already listed)
Books, Edited Volumes

A.Z. Spector, P. Norvig, C. Wiggins, and J. M. Wing Data Science in Context: Foundations, Challenges, and Opportunities, Cambridge Univesity Press, 2022.

J.M. Wing, J.P.C. Woodcock, and J. Davies (editors), Proceedings of FM'99: First World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, Springer-Verlag, LNCS 1708 (Volume I) and 1709 (Volume II), 1999.

U. Martin and J. Wing (eds.), Proceedings of the First International Workshop on Larch, Springer-Verlag, Workshops in Computing Series, 1993.

J.V. Guttag and J.J. book Horning (eds.) with S.J. Garland, K.D. Jones, A. Modet, and J.M. Wing, Larch: Languages and Tools for Formal Specification, Springer-Verlag, 1993. Out of print. Available here with permission from Springer-Verlag.

[top of page]


Book Chapters (Refereed)

J.M. Wing “A Conversation About Computational Thinking,” Future Frontiers: Education for an AI World, , Chapter 8, L. Loble, T. Creenaune, and J. Hayes, editors, Melbourne University Press, 2017, pp. 127-140.

P.K. Manadhata and J.M. Wing A Formal Model for a System's Attack Surface,Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, , Chapter 1 , S. Jajodia, A. Ghosh, V. Swarup, C. Wang, and X.S. Wang, editors, Springer, 2011, pp. 1-28.

J.M. Wing Scenario Graphs Applied to Network Security,Information Assurance: Survivability and Security in Networked Systems , Chapter 9 , Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy, editors, Morgan Kaufmann Publishers, Elsevier, Inc., 2008, pp. 247-277.

M. Howard, J. Pincus, and J.M. Wing Measuring Relative Attack Surfaces, Chapter 8, in Computer Security in the 21st Century , D.T. Lee, S.P. Shieh, and J.D. Tygar, editors, Springer, March 2005, pp. 109-137.

B.H. Liskov and J.M. Wing, Behavioral Subtyping Using Invariants and Constraints, in Formal Methods for Distributed Processing, an Object Oriented Approach, Howard Bowman and John Derrick, editors, Cambridge University Press, 2001, pp. 254-280. Also available as CMU-CS-99-156, July 1999.

J.M. Wing and J. Ockerbloom, “Respectful Type Converters for Mutable Types,” in Foundations of Component Based Systems, Gary Leavens and Murali Sitaraman, editors, Cambridge University Press, 2000, pages 161-186. Also available as CMU-CS-99-142, June 1999.

J.M. Wing, “A Symbiotic Relationship Between Formal Methods and Security,” in the Proceedings of the Workshops on Computer Security, Dependability, and Assurance: From Needs to Solution, pp. 26-38. Also available as CMU-CS-98-188, December 1998.

J.M. Wing, “Hints to Specifiers,” Chapter 5 in Educational Issues of Formal Methods, edited by M. Hinchey and N. Dean, Academic Press, London, 1996, pp. 57-77. Preliminary version available as CMU-CS-95-118R, May 1995, which supersedes “Teaching Mathematics to Software Engineers,” CMU-CS-95-118, February 1995.

D.L. Detlefs, M.P. Herlihy and J.M. Wing, “Avalon/C++,” in Advanced Language Implementation: Recent Research at Carnegie Mellon University, P. Lee, editor, MIT Press, 1991.

J.M. Wing et al., “The Avalon Language,” Part IV, Chapters 19-22, in Camelot and Avalon: A Distributed Transaction Facility, J. Eppinger, L. Mummert and A. Spector, editors, Morgan Kaufmann Publishers, Inc., 1991.

M.W. Maimone, J.D. Tygar and J.M. Wing, “Formal Semantics for Visual Specification of Security,” in Visual Languages and Visual Programming, S.-K. Chang, editor, Plenum, 1990, pp. 97-116. Also CMU-CS-88-173r.

[top of page]


Journal Publications

Blau et al., "Protecting Integrity in the Age of Generative AI," Proceedings of the National Academy of Sciences, editorial, vol. 121, no. 22, May 2024.

A.Z. Spector, P. Norvig, C. Wiggins, J.M. Wing, B. Fried, M. Tingley, "Data Science: More Than Just Algorithms," ACM Queue, vol. 21, no. 1, January-February 2021, pp. 102-129. Also Communications of the ACM, vol. 66, no. 8, August 2023, pp. 53-61.

J.M. Wing, "Trustworthy AI," Communications of the ACM, vol. 64, no. 10, October 2021, pp. 64-71.

J.M. Wing, Jeff Goldsmith, Yifei Sun, Linda Fried, Jeannette Wing, Gary Miller, Kiros Berhane, "The Emergence and Future of Public Health Data Science," Public Health Reviews, April 2021.

J.M. Wing, "Toward a Research Agenda for Data Science: The Discussion Begins" Harvard Data Science Review, rejoinder, September 2020.

J.M. Wing, "Ten Research Challenge Areas in Data Science," Harvard Data Science Review, vol. 2, issue 3, September 2020 arXiv:2002.05658.

J.M. Wing and D. Banks, "Highlights of the Inaugural Data Science Leadership Summit," Harvard Data Science Review, November 2019.

J.M. Wing, "The Data Life Cycle," Harvard Data Science Review, June 2019.

T. Zheng, J.M. Wing, C. Stein, and D. Hsu, "New Master's or Doctoral Data Science/Analtyics Programs: Columbia," AMSTAT News, December 2018, pp. 6-11.

J.M. Wing, “Computational Thinking's Influence on Research and Education for All,Italian Journal on Educational Technology (formerly TD Tecnologie Didattiche), 25(2), 7-14. doi: 10.17471/2499-4324/922, 2017.

Y. Gurevich, E. Hudis, and J.M. Wing, “Inverse Privacy,Communications of the ACM, Vol. 59, No. 7, July 2016, pp. 38-42. On-line version with video. Also Microsoft Research Technical Report MSR-TR-2014-100, July 2014, revised version Inverse Privacy, MSR-TR-2015-37, May 2015.

P.K. Manadhata and J.M. Wing, "An Attack Surface Metric," IEEE Transactions on Software Engineering, June 2010.

J.M. Wing, “Computational Thinking and Thinking About Computing,Philosophical Transactions of the Royal Society, vol. 366, July 2008, pp. 3717-3725.

J.M. Wing, “Five Deep Questions in Computing,” CACM, essay, vol. 51, no. 1, January 2008, pp. 58-60.

J.M. Wing, “Computational Thinking,” CACM, viewpoint, vol. 49, no.3 March 2006, pp. 33-35. Chinese translation in Communications of CCF, vol. 3 no. 11, November 2007, pp. 83-85. French translation in Bulletin of Specif, translated by Pierre Lescanne, December 2008.

D. Kindred and J.M. Wing, “Theory Generation for Security Protocols,” in progress.

K.W. Lye and J.M. Wing, “Game Strategies in Network Security,” International Journal of Information Security, February 2005.

J.M. Wing, “Beyond the Horizon: A Call to Arms,” IEEE Security and Privacy, November/December 2003, pp. 62-67.

J.M. Wing and J. Ockerbloom, “Respectful Type Converters,” IEEE Transactions on Software Engineering, vol. 26, no. 7, July 2000, pp. 579-593; also CMU-CS-98-130.

D. Jackson, Y. Ng, and J.M. Wing, “A Nitpick Analysis of Mobile IPv6,” Formal Aspects of Computing, vol. 11, no. 6, 1999, pp. 591-615; also CMU-CS-98-113, March 1998.

H.S. Chadha, J.W. Baugh Jr., and J.M. Wing, “Formal Specification of Concurrent Systems,” Advances in Engineering Software (read by civil and mechanical engineers), vol 30, no. 3, March 1999, pp. 211-224.

G. Leavens and J.M. Wing, “Protective Interface Specifications,” Formal Aspects of Computing, vol. 10, March 1998, pp. 59-75.

A.M. Zaremski and J.M. Wing, “Specification Matching of Software Components,” ACM Trans. on Software Engineering and Methodology, vol. 6, no. 4, October 1997, pp. 333-369. Shorter version published in Proceedings of SIGSOFT Foundations of Software Engineering, October 1995, pp. 6-17; recommended by program committee for submission to TOSEM; also CMU-CS-95-127, March 1995. 2012 SIGSOFT Retrospective Paper Award (for FSE paper).

J.M. Wing and M. Vaziri-Farahani, “A Case Study in Model Checking Software Systems,” Science of Computer Programming, vol. 28, 1997, pp. 273-299; also CMU-CS-96-124. Shorter version published as “Model Checking Software Systems: A Case Study,” Proceedings of SIGSOFT Foundations of Software Engineering, October 1995, pp. 128-139; also CMU-CS-95-128, March 1995.

E.M. Clarke and J.M. Wing, “Formal Methods: State of the Art and Future Directions,” ACM Computing Surveys, vol. 28, no. 4, December 1996, pp. 626-643. Available as CMU-CS-96-178.

L. Mummert, J.M. Wing and M. Satyanarayanan, “Using Belief to Reason about Cache Coherence in Distributed File Systems,” submitted to The Chicago Journal of Theoretical Computer Science, December 1994. Shorter version published as “Using Belief to Reason about Cache Coherence,” in Proceedings of the Symposium on Principles of Distributed Computing, August 1994, pp. 71-80. Recommended by program committee for submission to CJTCS; also CMU-CS-94-151R, December 1994.

D. Jackson and J. Wing, “Lightweight Formal Methods,” IEEE Computer, April 1996, pp. 21-22.

A.M. Zaremski and J.M. Wing, “Signature Matching, a Tool for Software Libraries,” ACM Trans. on Software Engineering and Methodology, vol. 4, no. 2, April 1995, pp. 146-170. Shorter version published as “Signature Matching: A Key to Reuse,” in Proceedings of SIGSOFT Foundations of Software Engineering, December 1993. Recommended by program committee for submission to TOSEM; also CMU-CS-93-151, May 1993.

B.H. Liskov and J.M. Wing, “A Behavioral Notion of Subtyping,” ACM Trans. on Prog. Lang. and Systems, vol. 16, no. 6, November 1994, pp. 1811-1841.

N. Haines, D. Kindred, J.G. Morrisett, S.M. Nettles and J.M. Wing, “Composing First-Class Transactions,” ACM Trans. on Prog. Lang. and Systems, Short Communications, vol. 16, no. 6, November 1994, pp. 1719-1736.

J.M. Wing and C. Gong, “Testing and Verifying Concurrent Objects,” Journal of Parallel and Distributed Computing, vol. 17, 1993, pp. 164-182.

M.P. Herlihy and J.M. Wing, “Specifying Graceful Degradation,” IEEE Trans. on Parallel and Distributed Computing, vol. 2, no. 1, January 1991, pp. 93-104; preliminary version in CMU-CS-87-120 March 1988. Shorter version published as “Specifying Graceful Degradation in Distributed Systems,” in Proceedings of the 6th Symposium on Principles on Distributed Computing, Vancouver, Canada, August 1987, pp. 167-177; also CMU-CS-87-120, May 1987. 

A. Heydon, M. Maimone, D. Tygar, J.M. Wing and A.M. Zaremski, “Miro: Visual Specifications of Security,” IEEE Trans. on Software Engineering, vol. 16, no. 10, October 1990, pp. 1185-1197. Also CMU-CS-89-199, November 1989.

J.M. Wing, “Using Larch to Specify Avalon/C++ Objects,” IEEE Trans. on Software Engineering, vol. 16, no. 9, September 1990, pp. 1076-1088.

J.M. Wing, “A Specifier's Introduction to Formal Methods,” IEEE Computer, vol. 23, no. 9, September 1990, pp. 8-24.  Also CMU-CS-90-136, May 1990, superseding CMU-CS-89-200, “What is a Formal Method?,” November 1989. 

M.P. Herlihy and J.M. Wing, “Linearizability: A Correctness Condition for Concurrent Objects,” ACM Trans. on Prog. Lang. and Systems, vol. 12, no. 3, July 1990, pp. 463-492; also CMU-CS-87-176, November 1987. Shorter version published as “Axioms for Concurrent Objects,” in Proceedings of the 14th Symposium on Principles of Programming Languages, Munich, W. Germany, January 21-23, 1987, pp. 13-26; also CMU-CS-86-154, October 1986.

J.M. Wing, “Verifying Atomic Data Types,” International Journal of Parallel Programming, vol. 18, no. 5, 1989, pp. 315-357.

M.R. Barbacci, D.L. Doubleday, C.B. Weinstock and J.M. Wing, “Developing Applications for Heterogeneous Machine Networks: The Durra Environment,” Computing Systems, vol. 2, no. 1, March 1989, pp. 7-35.

J.M. Wing and M. Nixon, “Extending Ina Jo with Temporal Logic,” IEEE Trans. on Software Engineering, vol. 15, no. 2, February 1989, pp. 181-197. Shorter version in 1986 IEEE Symposium on Security and Privacy, Oakland, California, April 1986, pp. 2-13.

D.L. Detlefs, M.P. Herlihy and J.M. Wing, “Inheritance of Synchronization and Recovery Properties in Avalon/C++,” IEEE Computer, vol. 21, no. 12, December 1988, pp. 57-69. Also CMU-CS-87-133, June 1987.

J.M. Wing, “A Study of Twelve Specifications of the Library Problem,” IEEE Software, vol. 5, no. 4, July 1988, pp. 66-76. Runner-up for 1988 IEEE Software Best Paper Award. Also CMU-CS-87-142, July 1987.

J.M. Wing, “Writing Larch Interface Language Specifications,” ACM Trans. on Prog. Lang. and Systems, vol. 9, no. 1, January 1987, pp. 1-24.

J.V. Guttag, J.J. Horning and J.M. Wing, “The Larch Family of Specification Languages,” IEEE Software, vol. 2, no. 5, September 1985, pp. 24-36.

J.V. Guttag, and J.J. Horning and J.M. Wing, “Some Remarks on Putting Formal Specifications to Productive Use,” Science of Computer Programming, vol. 2, no. 1, October 1982, pp. 53-68.


[top of page]


Refereed Conference and Workshop Papers

D. Mandal, S. Deng, S. Jana, J.M. Wing, and D. Hsu, “ Ensuring Fairness Beyond the Training Data,” Proceedings of the 34th Conference on Neural Information Processing Systems (NeurIPS), December 2020. arXiv:2007.06029, July 2020. July 2020.

R. Bernstein, M. Vakar, and J.M. Wing, “ "Transforming Probabilistic Programs for Model Checking," Proceedings of ACM-IMS Foundations of Data Science, virtual meeting, October 18-20, 2020.

Y. Gurevich, E. Hudis, and J.M. Wing, “ Inverse Privacy: A Position Paper,” MyData 2016 Workshop: Making Sense of the Value of Personal Data, Helsinski, Finland, August 31, 2016.

M.C. Tschantz, A. Datta, A. Datta, and J.M. Wing, “ A Methodology for Information Flow Experiments,” in Proceedings of the 28th IEEE Computer Security Foundations Symposium , July 2015. Full paper.

S. Sen, S. Guha, A. Datta, S.K. Rajamani, J. Tsai, and J.M. Wing, “ Bootstrapping Privacy Compliance in Big Data Systems,” Proceedings of the IEEE Symposium on Security and Privacy ("Oakland") , San Francisco, CA, May 2014. Best Student Paper Award. Also Microsoft Research Technical Report MSR-TR-2014-36, March 2014.

M.C. Tschantz, A. Datta, and J.M. Wing, “ Purpose Restrictions on Information Use,” in Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , Egham, UK, September 9-11, 2013. Also CMU-CS-13-116 and CyLab-13-005 June 2013.

M.C. Tschantz, A. Datta, and J.M. Wing, “ Formalizing and Enforcing Purpose Restrictions in Privacy Policies,” in Proceedings of the IEEE Symposium on Security and Privacy ("Oakland") , San Francisco, CA, May 2012. Also CMU-CS-12-106 Technical Report (full version of conference paper), March 2012.

V. Gligor and J.M. Wing “ Towards a Theory of Trust in Networks of Humans and Computers,” in Proceedings of Nineteenth International Workshop on Security Protocols, Cambridge, England, March 28-30, 2011, Invited Paper.

M.C. Tschantz and J.M. Wing, “ Formal Methods for Privacy,” in Proceedings of Formal Methods 2009 , Eindhoven, The Netherlands, November 2009, pp. 1-15. Also CMU-CS-09-154 Technical Report, August 2009. Invited Paper.

P.K. Manadhata, Y. Karabulut, and J.M. Wing, “ Report: Measuring the Attack Surfaces of Enterprise Software,” Proceedings of the International Symposium Symposium on Engineering Secure Software and Systems, Industry Track, Leuven, Belgium, February 4-6, 2009. Alexandria, VA, October 30, 2006.

P.K. Manadhata, Y. Karabulut, and J.M. Wing, “ ``Measuring the Attack Surfaces of SAP Systems,'' Proceedings of the 19th IEEE International Symposium on Software Reliability Engineering, Industry Track (only abstract and presentation published), Redmond, WA, November 11-14, 2008.

M.C. Tschantz and J.M. Wing, “ Extracting Conditional Confidentiality Policies,” Proceedings of the 6th IEEE International Conference on Software Engineering and Formal Methods, Cape Town, South Africa, November 10-14, 2008, pp. 107-116. Best Paper Award.

P.K. Manadhata, J.M. Wing, M.A. Flynn, and M.A. McQueen, “ Measuring the Attack Surfaces of Two FTP Daemons,” Quality of Protection Workshop, Alexandria, VA, October 30, 2006.

V. Mehta, C. Bartzis, H. Zhu, E.M. Clarke, and J.M. Wing, “ Ranking Attack Graphs,” Proceedings of Recent Advances in Intrusion Detection 2006, Hamburg, Germany, September 2006.

P.K. Manadhata and J.M. Wing, “ An Attack Surface Metric,” First Workshop on Security Metrics, Vancouver, BC, August 2006. position paper.

J.M. Wing, “Scenario Graphs Applied to Security,” Proceedings of Workshop on Verification of Infinite State Systems with Applications to Security, Timisoara, Romania, March 2005. Summary paper.

J. Pincus and J.M. Wing, “Towards an Algebra for Security Policies,” Proceedings of 26th International Conference on Applications and Theory of Petri Nets, Miami, FL, June 2005, pp. 17-25. Extended abstract.

O. Sheyner and J.M. Wing, “Tools for Generating and Analyzing Attack Graphs,” Proceedings of Workshop on Formal Methods for Components and Objects, 2004, pp. 344-371.

M. Howard, J. Pincus, and J.M. Wing, “Measuring Relative Attack Surfaces,” Proceedings of Workshop on Advanced Developments in Software and Systems Security, Taipei, December 2003. Also CMU-CS-03-169 Technical Report, August 2003.

T.M. Wong, C. Wang, and J.M. Wing, “Verifiable Secret Redistribution for Archive Systems,” Proceedings of the First International Security in Storage Workshop, Maryland, December 2002.

K.W. Lye and J.M. Wing, “Game Strategies in Network Security,” in the Proceedings of the Foundations of Computer Security Workshop 2002, July 26, 2002, Copenhagen, Denmark. Longer version available as CMU-CS-02-136, May 2002.

S. Jha, O. Sheyner, and J.M. Wing, “Two Formal Analyses of Attack Graphs,” Proceedings of the 15th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002, pp. 49-63.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing, “Automated Generation and Analysis of Attack Graphs,” Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.

S. Jha and J. Wing, “Survivability Analysis of Networked Systems,” Proceedings of the International Conference on Software Engineering, Toronto, Canada, May 2001. Preliminary version available as CMU-CS-00-168, October 2000.

J. Wing, “Towards a Science of Survivability: A Research Agenda and a Specific Method,” Proceedings of the Third Information Survivability Workshop (ISW-2000),” Boston, MA, October 24-26, 2000. Position paper.

O. Sheyner and J. Wing, “Composing Proofs of Security Protocols Using Isabelle/IOA,” Proceedings of the Theorem Proving for Higher Order Logics (TPHOLs) Workshop, short paper, August 2000. Longer version available as CMU-CS-00-106.

N. Hopper, S. Seshia, and J. Wing, “A Comparison and Combination of Theory Generation and Model Checking for Security Protocol Analysis,” Proceedings of the Workshop on Formal Methods and Security, July 2000; earlier version available as CMU-CS-00-107.

S. Jha, J.M. Wing, R. Linger, and T. Longstaff, “Analyzing Survivability Properties of Specifications of Networks,” Proceedings of the International Conference on Dependable Systems and Networks, Workshop on Dependability Despite Malicious Faults, New York City, NY, June 25-28, 2000, pp. 613-622.

M. Vaziri, N. Lynch, and J.M. Wing, “Proving the Correctness of a Controller Algorithm for the RAID Level 5 System,” Proceedings of the International Symposium on Fault-Tolerant Computing, June 1998; also CMU-CS-98-117, March 1998.

J.M. Wing, “Subtyping for Distributed Object Stores,” Proceedings of the Second IFIP International Workshop on Formal Methods for Open Object-based Distributed Systems (FMOODS), July 1997, pp. 305-318.  Invited Paper. Also CMU-CS-97-121, April 1997.

Gary T. Leavens and J.M. Wing, “Protective Interface Specifications,” Proceedings of TAPSOFT '97 Theory and Practice of Software Development, 7th International Joint Conference CAAP/FASE, Lecture Notes in Computer Science 1214, April 1997, pp. 520-534. Also CMU-CS-96-129R, October 1996. Earlier version appeared as “Protection from the Underspecified,” CMU-CS-96-129 and Iowa State University Dept. of Computer Science TR96-04, April 1996.

D. Kindred and J.M. Wing, “Fast, Automatic Checking of Security Protocols,” Proc. of the USENIX 1996 Workshop on Electronic Commerce, Oakland, CA, November 1996, pp. 41-52. Also CMU-CS-96-173, September 1996.

N. Heintze, J.D. Tygar, J.M. Wing, and H.-C. Wong, “Model Checking Electronic Commerce Protocols,” Proc. of the USENIX 1996 Workshop on Electronic Commerce, Oakland, CA, November 1996, pp. 147-164.

J.M. Wing, “Teaching Mathematics to Software Engineers,” Proceedings of the Fourth International Conference on Algebraic Methodology and Software Technology (AMAST '95), Montreal, Canada, July 3, 1995, pp. 18-40.  Invited Paper. Also CMU-CS-95-118, March 1995; superseded by CMU-CS-95-118R, May 1995.

J.M. Wing and D.C. Steere, “Specifying Weak Sets,” Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, May 30-June 2, 1995. Also CMU-CS-94-194, October 1994.

D. Garlan, G. Abowd, D. Jackson, J. Tomayko, and J.M. Wing, “The CMU Master of Software Engineering Core Curriculum,” Proceedings of the Eighth SEI Conference on Software Engineering Education (CSEE), New Orleans, Lecture Notes in Computer Science 895, Springer-Verlag, March-April 1995, pp. 65-86.

Harpreet S. Chadha, John W. Baugh Jr., and J.M. Wing, “Formal Specification of AEC Product Models,” Computing in Civil Engineering: Proceedings of the First Congress, K. Khozeimeh, ed., American Society of Civil Engineers (ASCE), Washington, D.C., June pp. 571-578, 1994.

J.M. Wing, “Decomposing and Recomposing Transactional Concepts,” Proceedings of the Workshop on Object-based Distributed Programming, Lecture Notes in Computer Science 791, R. Guerraoui, O. Nierstrasz, and M. Riveill (editors), Springer-Verlag, pp. 111-121, 1994.

B. Liskov and J.M. Wing, “Specifications and Their Use in Defining Subtypes,” Proceedings of OOPSLA '93, September 1993, pp. 16-28. Also reprinted by permission from ACM in Proceedings of ZUM '95, Lecture Notes in Computer Science, Springer-Verlag, September 1995, pp. 245-263.

B. Liskov and J.M. Wing, “A New Definition of the Subtype Relation,” Proceedings of ECOOP '93, Lecture Notes in Computer Science 707, Springer-Verlag, July 1993, pp. 118-141. Also CMU-CS-93-149, April 1993; MIT LCS Programming Methodology Group Memo 76, May 1993.

J.M. Wing, M. Faehndrich, J.G. Morrisett, and S.M. Nettles, “Extensions to Standard ML to Support Transactions,” Proceedings of ACM SIGPLAN Workshop on ML and its Applications, June 20-21, 1992, San Francisco, CA, pp 104-118. Also CMU-CS-92-132, April 1992.

J.M. Wing, “Revisiting Abstraction Functions for Reasoning About Concurrency,” Proceedings of the Fifth Refinement Workshop, British Computer Society, Springer-Verlag, C.B. Jones, R.C. Shaw, and T. Denvir, editors, 1992, pp. 298-300. Extended abstract. Invited Paper.

S.M. Nettles and J.M. Wing, “Persistence + Undoability = Transactions,” Proceedings of Hawaii International Conference on Systems Science 25, January 1992. Also CMU-CS-91-173, August 1991.

J.M. Wing and A.M. Zaremski, “Unintrusive Ways to Integrate Formal Specifications in Practice,” Proceedings VDM '91, Lecture Notes in Computer Science 551, Springer-Verlag, October 1991, Delft, The Netherlands, pp. 545-569.  Also CMU-91-113, February 1991.

J.M. Wing and A.M. Zaremski, “A Formal Specification of a Visual Language Editor,” Proceedings of the Sixth International Workshop on Software Specification and Design, October 1991, Como, Italy, pp. 120-129. Also CMU-CS-91-112, February 1991.

E.R. Rollins and J.M. Wing, “Specifications as Search Keys for Software Libraries,” Proceedings of the Eighth International Conference on Logic Programming, Paris, June 1991. Also CMU-CS-90-159, September 1990.

J.M. Wing and C. Gong, “Experience with the Larch Prover,” Proceedings of the ACM Workshop on Formal Methods in Software Development,” Napa, CA, May 1990, pp. 140-143.

J.M. Wing, “Verifying Atomic Data Types,” Proceedings of the REX Workshop on Stepwise Refinement of Distributed Systems: Models, Formalism, Correctness, May 29-June 2, 1989, Plasmolen, The Netherlands, Lecture Notes in Computer Science 430, Springer-Verlag, 1990, pp. 731-758. Invited Paper. Also CMU-CS-89-168, July 1989.

M.R. Barbacci and J.M. Wing, “A Language for Distributed Applications,” Proceedings of the 1990 International Conference on Computer Languages, March 1990, New Orleans, pp. 59-68.

S.M. Clamen, L.D. Leibengood, S.M. Nettles and J.M. Wing, “Reliable Distributed Computing with Avalon/Common Lisp,” Proceedings of the 1990 International Conference on Computer Languages, March 1990, New Orleans, pp. 169-179. Also CMU-CS-89-186, September 1989.

A. Heydon, M. Maimone, J.D. Tygar, J.M. Wing and A.M. Zaremski, “Miro Tools,” Proceedings of the IEEE 1989 Workshop on Visual Languages, Rome, Italy, October 1989, pp. 86-91. Also CMU-CS-89-159, July 1989.

A. Heydon, M. Maimone, J.D. Tygar, J.M. Wing and A.M. Zaremski, “Constraining Pictures with Pictures,” Proceedings of IFIPS '89, San Francisco, CA, August 1989, pp. 157-162. Also CMU-CS-88-185, November 1988.

M.P. Herlihy and J.M. Wing, “Specifying Security Constraints with Relaxation Lattices,” Proceedings of the Computer Security Foundations Workshop II, Franconia, NH, June 1989, pp. 47-53.

J.M. Wing, “Specifying Avalon Objects in Larch,” Proceedings of the International Joint Conference on Theory and Practice of Software Development (TAPSOFT), Barcelona, March 13-17, 1989, Lecture Notes in Computer Science 352, Springer-Verlag, pp. 61-80. Invited Paper. Also CMU-CS-88-208, December 1988.

M.W. Maimone, J.D. Tygar and J.M. Wing, “Miro Semantics for Security,” Proceedings of the IEEE 1988 Workshop on Visual Languages, Pittsburgh, PA, October 1988, pp. 45-51. Also CMU-CS-88-173, August 1988.

M.P. Herlihy and J.M. Wing, “Reasoning About Atomic Objects,” Proceedings of the Symposium on Formal Techniques in Real-time and Fault-tolerant Systems, 22-23 September 1988, Warwick, U.K., Lecture Notes in Computer Science 331, Springer-Verlag, pp. 193-208. Preliminary version in CMU-CS-88-120, March 1988.

J.M. Wing, “Specifying Recoverable Objects,” Proceedings of the Sixth Annual Pacific Northwest Software Quality Conference, Portland, OR, September 1988, pp. 317-331. Also CMU-CS-88-170, July 1988.

M.R. Barbacci, C.B. Weinstock and J.M. Wing, “Programming at the Processor-Memory-Switch Level,” Proceedings of the Tenth International Conference on Software Engineering, Singapore, March 1988, pp. 19-28.

D.L. Detlefs, M.P. Herlihy and J.M. Wing, “Inheritance of Synchronization and Recovery Properties in Avalon/C++,” Proceedings of the Hawaii International Conference on Systems Science, January 1988.

M.R. Barbacci, C.B. Weinstock and J.M. Wing, “Durra: Language Support for Large Grained Parallelism,” Proceedings of the International Conference on Parallel Processing and Applications, L'Aquila, Italy, September 1987.

J.D. Tygar and J.M. Wing, “Visual Specification of Security Constraints,” Proceedings of the 1987 Workshop on Visual Languages, August 19-21, 1987, Linkoping, Sweden. Also CMU-CS-87-122, May 1987.

M.R. Barbacci and J.M. Wing, “Durra: A Task-level Description Language,” Proceedings of the 16th Annual International Conference on Parallel Processing, St. Charles, IL, August 1987, pp. 370-380.

M.P. Herlihy and J.M. Wing, “Avalon: Language Support for Reliable Distributed Systems,” Proceedings of the 17th International Symposium on Fault-Tolerant Computing, Pittsburgh, PA, July 1987, pp. 89-94. Also CMU-CS-86-167, December 1986.

M.R. Barbacci and J.M. Wing, “Specifying Functional and Timing Behavior for Real-Time Applications,” Proceedings of the Conference on Parallel Architectures and Languages Europe (PARLE), vol. 2, Eindhoven, Lecture Notes in Computer Science 259, Springer-Verlag, June 1987, pp. 124-140. Also CMU-CS-86-177, CMU/SEI-86-TR-4, December 1986.

J.M. Wing, “A Larch Specification of the Library Problem,” Proceedings of the Fourth International Workshop on Software Specification and Design, Monterey, CA, April 1987, pp. 34-41. Also CMU-CS-86-168, December 1986.

F. Arbab and J.M. Wing, “Geometric Reasoning: A New Paradigm for Processing Geometric Information,” Proceedings of the International Symposium on New Directions in Computing, sponsored by the IEEE Computer Society, Norwegian Institute of Technology, Trondheim, Norway, August 12-14, 1985, pp. 80-89. Also in Proceedings on IFIP Design Theory for CAD, Tokyo, Japan, October 1985.

J.M. Wing, “Specification Firms: A Vision for the Future,” Proceedings of the Third International Workshop on Software Specification and Design, London, August 26-27, 1985, pp. 241-243.

F. Arbab and J.M. Wing, “Geometric Reasoning for Geometric Modeling,” AIAA/AHS/ASEE Aircraft Design, Systems and Operations Conference, AIAA, Colorado Springs, Colorado, October 14-16, 1985; abstract presented at SIAM Conference on Geometric Modeling and Robotics, Albany, New York, July 15-19, 1985.

D. Berry and J.M. Wing, “Specifying and Prototyping: Some Thoughts on Why They Are Successful,” Proceedings of the International Joint Conference on Theory and Practice of Software Development (TAPSOFT) Volume 2, Berlin, West Germany, Lecture Notes in Computer Science 186, Springer-Verlag, March 1985, pp. 117-128. Also USC Computer Science TR-85-329, July 1985.

J.M. Wing, “Helping Specifiers Evaluate Their Specifications,” Proceedings of AFCET Second International Conference on Software Engineering, Nice, France, June 4-6, 1984, pp. 179-189. Also USC Computer Science TR-85-330, July 1985.

[top of page]


Unrefereed Abstracts, Papers, Reports, and Blogs

J.M. Wing, "Findings and Recommendations of the May 2022 UK-US AI Workshop," National Science Foundation and Engineering and Physical Sciences Research Council, July 2022. ACM Digital Library version.

J.M. Wing, "Trustworthy AI," Voices, Data Science Institute, Columbia University, February 4, 2020. arXiv:2002.06276.

J.M. Wing, "Ten Research Challenge Areas in Data Science," Voices, Data Science Institute, Columbia University, January 2, 2020. arXiv:2002.05658.

J.M. Wing, Vandana P. Janeja, Tyler Kloefkorn, and Lucy C. Erickson, "Data Science Leadership Summit, Workshop Report," September 2018.

Jennifer Rexford, Magda Balazinska, David Culler, and J.M. Wing, "Enabling Computer and Information Science and Engineering Research and Education in the Cloud," NSF Workshop Report, 2018.

J.M. Wing, "Data for Good," ACM Conference on Knowledge Discovery and Data Mining 2018, Keynote Talk, London, UK, August 21, 2018.

J.M. Wing, "How Does Data Science Differ from Computer Science and from Statistics?," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, "Data for Good: FATES, Elaborated," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, "Data for Good," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, "Mission Statement for the Data Science Institute," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, "What is Data Science?," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, "The Data Life Cycle," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, "Data for Good: Preface," Voices, Data Science Institute, Columbia University, January 23, 2018.

J.M. Wing, foreword to Handbook on Computational Thinking, by Anotonio Camerlengo, in Italian, to appear.

J.M. Wing, "Progress in Computational Thinking,'' Communications of the ACM, Vol. 59 No. 7, July 2016, pp. 10-11.

J.M. Wing, "Cyber-Physical Systems You Can Bet Your Life On,'' Microsoft Research Blog, June 17, 2016.

J.M. Wing, "Computational Thinking, Ten Years Later,'' Microsoft Research Blog, March 23, 2016. Also Computational Thinking, Ten Years Later, Blog@CACM, March 23, 2016.

J.M. Wing, "Expeditions: Exploring the Unknown,'' Microsoft Research Blog, February 26, 2016.

J.M. Wing, "Here's Why Microsoft Cares About Basic Research and You Should Too,'' Microsoft Research Blog, October 19, 2015.

J.M. Wing, "Computational Thinking Benefits Society,'' Social Issues in Computing, 40th Anniversary Blog, University of Toronto, January 9, 2014.

J.M.Wing, "NITRD 20: A Day in Your Life,'' Blog@CACM, March 26, 2012.

J.M. Wing, "Happy 20th Birthday to NITRD,'' Blog@CACM, March 26, 2012.

J.M. Wing, "A Futuristic Health IT Scenario,'' Blog@CACM, November 8, 2011.

J.M. Wing, "Connecting Science to Society,'' Blog@CACM, October 14, 2011.

J.M. Wing, "Yes, Computer Scientists are Hypercritical,'' Blog@CACM, October 6, 2011.

J.M. Wing, "Call to Arms: Science and Engineering for Privacy,'' Blog@CACM, March 21, 2011.

J.M. Wing, "Usable Verification: Balancing Thinking and Automating,” Usable Verification Workshop, sponsored by Microsoft Research and NSF, Redmond, WA, November 15-16, 2010, position paper.

J.M. Wing, "Understanding Network Complexity", Proceedings of Second IEEE International Workshop on Network Science of Communications Networks, San Diego, March 19, 2010.

J.M. Wing, "Software Security", Proceedings of First IEEE and IFIP International Symposium on Theoretical Aspects of Software Engineering, Shanghai, China, June 2007.

J.M. Wing, “FAQ on Pi-Calculus,” Microsoft Internal Memo, December 2002.

J. M. Wing, “Platitudes and Attitudes,” Software Tools for Technology Transfer, editorial board opinion piece, Volume 4, Number 3, May 2003, pp. 261-265.

J.M. Wing, “What, Who, and How of Tomorrow,” Monterey Workshops: Radical Innovations of Software and Systems Engineering in the Future, Venice, Italy, October 6-10, 2002, pp. 400-403.

J.M. Wing, “Mathematics in Computer Science Curricula,” Sixth International Conference on Mathematics of Program Construction, Dagstuhl, Germany, July 8-10, 2002. Abstract of invited talk, p. 22.  Slides.

J.M. Wing, “Modeling Unpredictable or Random Environments,” Using Uncertainty Within Computation, AAAI 2001 Fall Symposium, Technical Report FS-01-04, AAAI Press, North Falmouth, Cape Cod, MA, November 2001, pp. 144-145.

J.M. Wing, “Weaving Formal Methods into the Undergraduate Computer Science Curriculum,” in the Proceedings of the Eighth International Conference on Algebraic Methodology and Software 2000, Iowa City, IA, May 2000, Lecture Notes in Computer Science 1816, Springer-Verlag, pp. 2-7. Extended abstract of invited talk.

D. Kindred and J.M. Wing, “Closing the Idealization Gap with Theory Generation,” extended abstract, Proceedings of the DIMACS Workshop on Cryptographic Protocol Design and Verification, Rutgers, NJ, September 3-5, 1997.

J.M. Wing (editor), “Report of the Committee of Visitors for Programs in the Division of Computer and Computation Research,” July 1996.

J.M. Wing (editor), “Report of the Committee of Visitors for the CISE Institutional Infrastructure Program,” November 1995.

J.M. Wing, “Hints for Writing Specifications,” in Proceedings of the Z Users' Meeting '95, September 1995. One-page abstract.

D.T. Steere, M. Satyanarayanan, and J.M. Wing, “Dynamic Sets for Search,” in Proceedings of the Symposium on Principles of Distributed Computing, August 1994, Brief Announcement (one-page abstract), p. 397.

F. Bamberger, P. Ford, and J.M. Wing, “Interoperability,” section in R&D for the NII: Technical Challenges, report edited by M.K. Vernon, E.D. Lazowska, and S.D. Personick, Interuniversity Communications Council, Inc. (EDUCOM), 1994.

J.M. Wing, “Formal Methods,” Encyclopedia of Software Engineering, John Wiley & Sons, Inc., New York, 1994, pp. 504-517. Revision in Second Edition.

B. Liskov and J.M. Wing, “Corrigenda to ECOOP '93 Paper,” ACM SIGPLAN Notices, Volume 29, Number 4, April 1994, p. 4.

J.M. Wing, “Composing Transactional Concepts,” ECOOP '93 Workshop on Object-based Distributed Programming, Kaiserslautern, Germany, July 1993.

J.M. Wing, E.R. Rollins, and A.M. Zaremski, “Thoughts on a Larch/ML and a New Application for LP,” Proceedings of the First International Workshop on Larch, July 13-15, 1992, Dedham, MA.  Also CMU-CS-92-135, July 1992.

J.M. Wing, “Specifications in Software Development,” Proceedings of the Seventh Annual Symposium on Logic in Computer Science, June, 1992. Abstract of Invited Tutorial.

J.M. Wing and A.M. Zaremski, “Two Ways to Integrate Formal Specifications in Practice,” Proceedings of Formal Methods '91, Drymen, Scotland, September 24-27, 1991, position paper.

J.M. Wing, “Program Specification” and “Formal Methods,” Encyclopedia of Computer Science, A. Ralston and E.D. Reilly (eds.), Van Nostrand Reinhold, Third Edition, 1993, pp. 564-565, 1107-1111.

L.D. Leibengood, J.G. Morrisett, S.M. Nettles and J.M. Wing, “ML as a Basis for Distributed Object Management,” Standard ML Workshop, Princeton University, June 7-8, 1990.

M.R. Barbacci, D.L. Doubleday, C.B. Weinstock and J.M. Wing, “The Durra Language and Runtime Environment: Tools for PMS-Level Programming,” Proceedings of the IFIP Working Conference on Decentralized Systems, Lyon, France, December 11-13, 1989.

S.M. Clamen, L.D. Leibengood, S.M. Nettles and J.M. Wing, “An Overview of Avalon/Common Lisp,” Proceedings of the Third Workshop on Large Grained Parallel Programming, Pittsburgh, October 10-11, 1989.

M.R. Barbacci, D.L. Doubleday, C.B. Weinstock and J.M. Wing, “A Status Report on Durra: A Tool for PMS-Level Programming,” Proceedings of the Third Workshop on Large Grained Parallel Programming, Pittsburgh, October 10-11, 1989.

M.P. Herlihy and J.M. Wing, “Linearizable Concurrent Objects,” Proceedings of the ACM SIGPLAN Workshop on Object-Based Concurrent Programming, SIGPLAN Notices, Vol 24, No. 4, April 1989, pp. 133-135.

A. Heydon, M.W. Maimone, A.F. Moormann, J.D. Tygar and J.M. Wing, “Miro: A Visual Language for Specifying Security,” UNIX Security Workshop, Portland, OR, August 29-30, 1988.

D.L. Detlefs, M.P. Herlihy and J.M. Wing, “Avalon/C++: C++ Extensions for Transaction-Based Programming,” Proceedings of the 1987 USENIX Workshop on C++, Santa Fe, NM, November 8-10, 1987.

M. Barbacci and J.M. Wing, “Task-level Application Descriptions,” Workshop on Large Grained Parallelism, Providence, RI, October 27-29, 1986.

J.M. Wing, “Role of Formal Specifications,” NRL Invitational Workshop on Testing and Proving, ACM SIGSOFT Software Engineering Notes, vol. 11, no. 5, October 1986.

J.M. Wing, “Beyond Functional Behavior: Combining Methods to Specify Different Classes of Properties of Large Systems,” Proceedings of Verification Workshop III, Watsonville, CA, February 18-21, 1985, ACM SIGSOFT Software Engineering Notes, vol. 10, no. 4, August 1985, pp. 102-104.

J.M. Wing, “Strength and Essentiality of Specifications,” Workshop Notes: International Workshop on Models and Languages for Software Specification and Design, edited by Robert Babb, Department d'Informatique, Universite Laval, Quebec, DIUL-RR-8408, March 1984, pp. 178-181.

[top of page]


Technical Reports (not already listed above)

Y. Gurevich, N. Haiby, E. Hudis E., J.M. Wing, and E. Ziklik, "Biggish: A solution for the inverse privacy problem,'' Microsoft Research MSR-TR-2016-24, May 2016.

M.C. Tschantz, A. Datta, A. Datta, and J.M. Wing, “ A Methodology for Information Flow Experiments,” arXiv:1405.2376 Technical Report, May 2014.

Y. Gurevich, N. Haiby, E. Hudis E., J.M. Wing, and E. Ziklik, "Biggish: A solution for the inverse privacy problem,'' Microsoft Research MSR-TR-2016-24, May 2016.

M.C. Tschantz, A. Datta, and J.M. Wing, “ Information Flow Investigations,” CMU-CS-13-118 Technical Report, June 2013.

M.C. Tschantz, A. Datta, and J.M. Wing, “ On the Semantics of Privacy Requirements in Privacy Policies,” CMU-CS-11-102 Technical Report, February 2011.

P.K. Manadhata, Y. Karabulut, and J.M. Wing, “Measuring the Attack Surfaces of SAP Business Applications,” CMU-CS-08-134 Technical Report, May 2008.

M.C. Tschantz and J.M. Wing, “Extracting Conditional Confidentiality Policies,” CMU-CS-08-127 Technical Report, May 2008.

P.K. Manadhata, K. Tan, R. Maxion, and J.M. Wing, “An Approach to Measuring A System's Attack Surface,” CMU-CS-07-146 Technical Report, August 2007.

P.K. Manadhata, D. Kaynar, and J.M. Wing, “A Formal Model for a System's Attack Surface,” CMU-CS-07-144 Technical Report, July 2007.

Alberts et al. “Results of SEI Independent Research and Development Projects,” CMU/SEI-2007-TR-006 Technical Report, July 2007.

M. Tschantz and J. M. Wing “Confidentiality Policies and Their Extraction from Source Code,” CMU-CS-07-108 Technical Report, February 2007.

P. Manadhata and J.M. Wing, “ An Attack Surface Metric,“ CMU-CS-05-155, Technical Report, July 2005.

P. Manadhata and J.M. Wing, “Measuring a System's Attack Surface,” also CMU-CS-04-102 Technical Report, January 2004.

G. Fairbanks, D. Garlan, B. Sarpeshkar, R. Simmons, G. Tolle, and J.M. Wing, “Reasoning About Exceptions Using Model Checking,” CMU-CS-02-165. Draft only, still in preparation.

T.M. Wong, J.M. Wing, and C.X. Wang, “Verifiable Secret Redistribution for Threshold Sharing Schemes,” CMU-CS-02-114, February 2002.

S. Jha, O. Sheyner, and J.M. Wing, “Minimization and Reliability Analyses of Attack Graphs,” CMU-CS-02-109, February 2002.

T.M. Wong and J.M. Wing, “Verifiable Secret Redistribution,” CMU-CS-01-155, October 2001. Superseded by CMU-CS-02-114.

O. Sheyner and J. Wing, “Toward Compositional Analysis of Security Protocols Using Theorem Proving,” CMU-CS-00-106, January 2000.

N. Haines, D. Kindred, J.G. Morrisett, S.M. Nettles and J.M. Wing, “Tinkertoy Transactions,” CMU-CS-93-202, December 1993.

B. Liskov and J.M. Wing, “Family Values: A Behavioral Notion of Subtyping,” CMU-CS-93-187, July 1993. Supersedes “A New Definition of the Subtype Relation,” CMU-CS-93-149, April 1993; and “Family Values: A Semantic Notion of Subtyping,” CMU-CS-92-220, December 1992, also published as MIT-LCS-TR-562.

D. Garlan, A. Brown, D. Jackson, J. Tomayko and J. Wing, “The CMU Masters in Software Engineering Core Curriculum,” CMU-CS-93-180, August 1993.

J.M. Wing, M. Faehndrich, N. Haines, K. Kietzke, D. Kindred, J.G. Morrisett and S. Nettles, “Venari/ML Interfaces and Examples,” CMU-CS-93-123, March 1993.

M.P. Herlihy, S.-Y. Ling and J.M. Wing, “Implementation of Commit Timestamps in Avalon,” CMU-CS-91-107, January 1991.

C. Gong and J.M. Wing, “A Library of Concurrent Objects and Their Proofs of Correctness,” CMU-CS-90-151, July 1990.

J.M. Wing and C. Gong, “A Simulator for Concurrent Objects,” CMU-CS-90-150, July 1990.

C. Gong and J.M. Wing, “Raw Code, Specification, and Proof of the Avalon Queue Example,” CMU-CS-89-172, August 1989.

J.M. Wing and C. Gong, “Machine-Assisted Proofs of Properties of Avalon Programs,” CMU-CS-89-171, August 1989.

M. Barbacci and J.M. Wing, “Durra: A Task-level Description Language Reference Manual (Version 2),” CMU/SEI-89-TR-034, August 1989.

J. Wing, M. Herlihy, S. Clamen, D. Detlefs, K. Kietzke, R. Lerner and S.-Y. Ling, “The Avalon/C++ Programming Language (Version 0),” CMU-CS-88-209, December 1988.

M. Barbacci, M. Herlihy and J. Wing, co-editors, “Proceedings of the Second Workshop on Large-Grained Parallelism,” Hidden Valley, PA, October 11-14, 1987, CMU Software Engineering Institute Special Report, CMU/SEI-87-SR-5, November 1987. Also CMU-CS-TR-88-112, February 1988.

M. Barbacci and J.M. Wing, “Durra: A Task-level Description Language,” CMU-CS-86-176 (also CMU/SEI-86-TR-3), December 1986.

M. Nixon and J.M. Wing, “On Adding Concurrency to the Formal Development Methodology (FDM),” System Development Corporation, SP-4360, March 1986.

J.M. Wing and M. Nixon, “Adding Temporal Logic to Ina Jo,” CMU-CS-85-146, July 1985.

J.V. Guttag, J.J. Horning and J.M. Wing, “Larch in Five Easy Pieces,” DEC Systems Research Center Technical Report 5, July 1985.

F. Arbab and J.M. Wing, “Geometric Reasoning: A New Paradigm for Processing Geometric Information,” USC Computer Science TR-85-333. Also available as CMU-CS-85-144, July 1985.

J.M. Wing, “A Two-Tiered Approach and Language for Formally Specifying Program Modules,” USC Computer Science TR-85-331, March 1985.

J.M. Wing, “A Two-Tiered Approach to Specifying Programs,” MIT Laboratory for Computer Science TR-299, Cambridge, MA, 1983. Also Ph.D. thesis under the same title, MIT Department of Electrical Engineering and Computer Science, May 1983.

J.M. Wing, “Experience with Two Examples: A Household Budget and Graphs,” AFFIRM MEMO-30-JMW, USC Information Sciences Institute, Marina del Rey, CA, August 1980.

J.M. Wing, “Partial-Match Retrieval Using Tries, Hashing, and Superimposed Codes,” S.M. Thesis, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, May 1979. Also available as Bell Laboratories Technical Memorandum 79-1353-3, May 1979.

[top of page]

Updated:  10-May-04