Executive Vice President for Research
Computer Science Department
Columbia University
313 Low Library
535 W. 116th Street
New York, NY 10027
wing@columbia.edu
(212) 853-0681
Books, Edited Volumes
A.Z. Spector, P. Norvig, C. Wiggins, and
J. M. Wing
Data Science in Context: Foundations, Challenges, and Opportunities,
Cambridge Univesity Press, 2022.
J.M. Wing, J.P.C.
Woodcock,
and J. Davies
(editors), Proceedings of
FM'99: First World Congress on Formal Methods in the Development of
Computing Systems, Toulouse, France,
Springer-Verlag, LNCS
1708 (Volume I) and 1709
(Volume II), 1999.
U. Martin and
J. Wing
(eds.), Proceedings
of the First International Workshop on Larch,
Springer-Verlag, Workshops in Computing Series, 1993.
J.V. Guttag
and J.J.
book Horning (eds.) with S.J.
Garland,
K.D. Jones, A. Modet, and J.M. Wing, Larch: Languages and Tools
for Formal Specification, Springer-Verlag, 1993. Out of print. Available here with permission from Springer-Verlag.
[top
of page]
Book
Chapters (Refereed)
J.M. Wing “A Conversation About Computational Thinking,”
Future Frontiers: Education for an AI World,
, Chapter 8, L. Loble, T. Creenaune, and J. Hayes,
editors, Melbourne University Press, 2017, pp. 127-140.
P.K. Manadhata and J.M. Wing “A Formal Model for a System's Attack Surface,
”Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats,
, Chapter 1 , S. Jajodia, A. Ghosh, V. Swarup, C. Wang, and X.S. Wang,
editors, Springer, 2011, pp. 1-28.
J.M. Wing “Scenario Graphs Applied to Network Security,
”Information Assurance: Survivability and Security in Networked Systems
, Chapter 9 , Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy,
editors, Morgan Kaufmann Publishers, Elsevier, Inc., 2008, pp. 247-277.
M. Howard, J. Pincus, and J.M. Wing “Measuring Relative Attack Surfaces,
” Chapter 8, in Computer Security in the 21st Century
, D.T. Lee, S.P. Shieh, and J.D. Tygar,
editors, Springer, March 2005, pp. 109-137.
J.M. Wing and J.
Ockerbloom,
“Respectful Type Converters for Mutable Types,”
in Foundations of Component Based Systems,
Gary Leavens and Murali Sitaraman, editors, Cambridge University
Press, 2000, pages 161-186. Also available as CMU-CS-99-142,
June 1999.
J.M. Wing, “A
Symbiotic
Relationship Between
Formal Methods and
Security,” in the Proceedings of the Workshops on
Computer Security, Dependability, and Assurance: From Needs
to Solution, pp. 26-38. Also available as CMU-CS-98-188, December
1998.
J.M. Wing,
“Hints to
Specifiers,” Chapter 5
in Educational Issues of Formal Methods,
edited by M. Hinchey and N. Dean,
Academic Press, London, 1996, pp. 57-77.
Preliminary version available as CMU-CS-95-118R,
May 1995, which
supersedes “Teaching Mathematics to Software
Engineers,”
CMU-CS-95-118, February
1995.
D.L. Detlefs,
M.P.
Herlihy and J.M. Wing,
“Avalon/C++,”
in Advanced Language
Implementation: Recent Research at Carnegie Mellon University,
P. Lee, editor, MIT Press, 1991.
J.M. Wing et
al., “The
Avalon Language,” Part
IV, Chapters 19-22, in Camelot and Avalon: A Distributed
Transaction Facility,
J. Eppinger, L. Mummert and A. Spector, editors, Morgan Kaufmann
Publishers, Inc., 1991.
M.W. Maimone, J.D.
Tygar and J.M.
Wing,
“Formal
Semantics for Visual
Specification
of Security,”
in Visual Languages and Visual Programming, S.-K. Chang,
editor,
Plenum, 1990, pp. 97-116. Also CMU-CS-88-173r.
[top of page]
Journal Publications
A.Z. Spector, P. Norvig, C. Wiggins, J.M. Wing, B. Fried, M. Tingley,
"Data Science: More Than Just Algorithms,"
ACM Queue, vol. 21, no. 1, January-February 2021, pp. 102-129.
Also Communications of the ACM, vol. 66, no. 8, August 2023, pp. 53-61.
J.M. Wing,
"Trustworthy AI," Communications of the ACM, vol. 64, no. 10, October 2021, pp. 64-71.
J.M. Wing,
"Toward a Research Agenda for Data Science: The Discussion Begins" Harvard Data Science Review, rejoinder, September 2020.
J.M. Wing and D. Banks,
"Highlights of the Inaugural Data Science Leadership Summit," Harvard Data Science Review, November 2019.
J.M. Wing,
"The Data Life Cycle," Harvard Data Science Review, June 2019.
T. Zheng, J.M. Wing, C. Stein, and D. Hsu,
"New Master's or Doctoral Data Science/Analtyics Programs: Columbia," AMSTAT News, December 2018, pp. 6-11.
Y. Gurevich, E. Hudis, and J.M. Wing,
“Inverse Privacy,”
Communications of the ACM, Vol. 59, No. 7, July 2016, pp. 38-42.
On-line version with video.
Also Microsoft Research Technical Report MSR-TR-2014-100, July 2014, revised version
Inverse Privacy,
MSR-TR-2015-37, May 2015.
P.K. Manadhata and J.M. Wing, "An Attack Surface Metric,"
IEEE Transactions on Software Engineering,
June 2010.
J.M. Wing,
“Computational
Thinking,”
CACM, viewpoint, vol. 49, no.3 March 2006, pp. 33-35.
Chinese translation in Communications of CCF, vol. 3 no. 11, November 2007, pp. 83-85.
French translation in Bulletin of Specif, translated by Pierre Lescanne, December 2008.
K.W. Lye and J.M.
Wing,
“Game
Strategies in
Network
Security,” International Journal of Information
Security, February 2005.
J.M. Wing, “Beyond
the
Horizon: A Call to
Arms,” IEEE Security and Privacy, November/December 2003, pp.
62-67.
J.M. Wing and
J.
Ockerbloom, “Respectful
Type
Converters,” IEEE Transactions on Software Engineering,
vol.
26,
no. 7, July
2000, pp. 579-593; also
CMU-CS-98-130.
D. Jackson,
Y. Ng, and
J.M. Wing, “A Nitpick
Analysis of Mobile
IPv6,” Formal Aspects of Computing, vol. 11, no. 6,
1999, pp. 591-615; also CMU-CS-98-113,
March 1998.
H.S. Chadha,
J.W. Baugh
Jr., and J.M. Wing,
“Formal Specification of Concurrent Systems,”
Advances in
Engineering Software (read by civil and
mechanical
engineers), vol 30, no. 3, March
1999, pp. 211-224.
G. Leavens
and J.M.
Wing, “Protective
Interface
Specifications,” Formal Aspects of Computing, vol. 10,
March 1998, pp. 59-75.
A.M. Zaremski
and J.M.
Wing, “Specification
Matching of
Software Components,” ACM Trans. on Software Engineering and
Methodology,
vol. 6,
no. 4, October 1997, pp. 333-369.
Shorter
version published in Proceedings
of
SIGSOFT Foundations of Software
Engineering, October 1995, pp. 6-17; recommended by program
committee
for submission to TOSEM; also CMU-CS-95-127,
March 1995. 2012 SIGSOFT Retrospective Paper Award (for FSE paper).
J.M. Wing and
M.
Vaziri-Farahani, “A Case
Study in Model
Checking Software Systems,” Science of
Computer Programming, vol. 28, 1997, pp. 273-299; also
CMU-CS-96-124.
Shorter version published as “Model
Checking Software
Systems: A Case Study,” Proceedings of
SIGSOFT Foundations of Software
Engineering, October 1995, pp. 128-139; also CMU-CS-95-128,
March 1995.
E.M. Clarke
and J.M.
Wing, “Formal
Methods:
State of the Art and Future Directions,” ACM Computing Surveys,
vol. 28, no. 4, December 1996,
pp. 626-643. Available as
CMU-CS-96-178.
L. Mummert,
J.M. Wing
and M. Satyanarayanan,
“Using Belief to Reason about
Cache Coherence in Distributed File
Systems,” submitted to The Chicago Journal
of Theoretical Computer Science, December 1994.
Shorter version published as “Using
Belief to Reason about Cache
Coherence,”
in Proceedings of the Symposium on Principles of Distributed
Computing,
August 1994, pp. 71-80.
Recommended by program committee for submission to CJTCS;
also CMU-CS-94-151R, December 1994.
D. Jackson
and J. Wing,
“Lightweight
Formal
Methods,” IEEE Computer, April 1996, pp. 21-22.
A.M. Zaremski
and J.M.
Wing, “Signature
Matching, a Tool for
Software Libraries,” ACM Trans. on Software
Engineering and Methodology, vol. 4, no. 2, April 1995,
pp. 146-170.
Shorter version published as “Signature
Matching: A Key to Reuse,” in Proceedings
of SIGSOFT Foundations of Software Engineering,
December 1993.
Recommended by program committee
for submission to TOSEM; also CMU-CS-93-151,
May 1993.
B.H. Liskov
and J.M.
Wing, “A
Behavioral
Notion of Subtyping,” ACM Trans. on Prog. Lang. and Systems,
vol. 16, no. 6, November 1994, pp. 1811-1841.
N. Haines, D.
Kindred,
J.G. Morrisett, S.M.
Nettles and J.M. Wing, “Composing
First-Class Transactions,” ACM
Trans. on Prog. Lang. and Systems, Short
Communications,
vol. 16, no. 6, November 1994, pp. 1719-1736.
J.M. Wing and
C. Gong,
“Testing
and Verifying
Concurrent Objects,” Journal of Parallel and Distributed
Computing,
vol. 17, 1993, pp. 164-182.
M.P. Herlihy
and J.M.
Wing, “Specifying
Graceful Degradation,” IEEE Trans. on Parallel and Distributed
Computing,
vol. 2, no. 1, January 1991, pp. 93-104;
preliminary version in CMU-CS-87-120
March 1988.
Shorter version published as “Specifying
Graceful Degradation in
Distributed Systems,” in Proceedings of the 6th Symposium on
Principles on
Distributed Computing,
Vancouver, Canada, August 1987, pp. 167-177; also CMU-CS-87-120,
May 1987.
A. Heydon, M.
Maimone,
D. Tygar, J.M. Wing
and A.M. Zaremski, “Miro:
Visual
Specifications of Security,” IEEE
Trans. on Software Engineering, vol. 16, no. 10,
October 1990, pp. 1185-1197.
Also CMU-CS-89-199,
November 1989.
J.M. Wing,
“Using
Larch
to Specify Avalon/C++
Objects,” IEEE Trans. on Software Engineering,
vol. 16, no. 9, September 1990, pp. 1076-1088.
J.M. Wing, “A
Specifier's Introduction to
Formal Methods,” IEEE Computer,
vol. 23, no. 9, September 1990, pp. 8-24.
Also CMU-CS-90-136,
May
1990,
superseding CMU-CS-89-200,
“What is a
Formal Method?,” November
1989.
M.P. Herlihy
and J.M.
Wing, “Linearizability:
A Correctness Condition for Concurrent Objects,” ACM Trans. on
Prog. Lang. and Systems, vol. 12, no. 3,
July 1990, pp. 463-492;
also CMU-CS-87-176, November 1987.
Shorter version published as “Axioms
for
Concurrent Objects,” in Proceedings
of the 14th Symposium on
Principles of Programming Languages, Munich, W. Germany, January
21-23, 1987, pp. 13-26; also CMU-CS-86-154,
October 1986.
J.M. Wing,
“Verifying
Atomic Data Types,” International
Journal of Parallel Programming,
vol. 18, no. 5, 1989, pp. 315-357.
M.R.
Barbacci, D.L.
Doubleday, C.B. Weinstock
and J.M. Wing, “Developing
Applications
for Heterogeneous Machine
Networks: The Durra Environment,” Computing Systems,
vol. 2, no. 1, March 1989, pp. 7-35.
J.M. Wing and
M. Nixon,
“Extending Ina Jo
with Temporal Logic,” IEEE Trans. on Software Engineering,
vol. 15, no. 2,
February 1989, pp. 181-197.
Shorter version in 1986 IEEE
Symposium on Security and Privacy, Oakland, California, April
1986,
pp. 2-13.
D.L. Detlefs,
M.P.
Herlihy and J.M. Wing,
“Inheritance
of
Synchronization and Recovery Properties
in Avalon/C++,” IEEE Computer, vol. 21, no. 12, December
1988,
pp. 57-69.
Also CMU-CS-87-133,
June 1987.
J.M. Wing, “A
Study of
Twelve Specifications
of the Library Problem,” IEEE Software, vol. 5, no. 4,
July
1988,
pp. 66-76.
Runner-up for 1988 IEEE Software Best Paper Award.
Also CMU-CS-87-142,
July 1987.
J.M. Wing,
“Writing
Larch Interface Language
Specifications,” ACM Trans. on Prog. Lang. and Systems,
vol.
9, no. 1,
January 1987, pp. 1-24.
J.V. Guttag,
J.J.
Horning and J.M. Wing, “The
Larch Family of Specification
Languages,” IEEE Software, vol. 2, no. 5, September 1985,
pp. 24-36.
J.V. Guttag, and J.J.
Horning and J.M. Wing,
“Some
Remarks on Putting Formal
Specifications to Productive Use,” Science
of Computer Programming, vol. 2, no. 1,
October
1982, pp. 53-68.
[top of page]
Refereed Conference and
Workshop Papers
D. Mandal, S. Deng, S. Jana, J.M. Wing, and D. Hsu,
“
Ensuring Fairness Beyond the Training Data,” Proceedings of the 34th Conference on Neural Information Processing Systems (NeurIPS), December 2020. arXiv:2007.06029, July 2020.
July 2020.
R. Bernstein, M. Vakar, and J.M. Wing,
“
"Transforming Probabilistic Programs for Model Checking," Proceedings of ACM-IMS Foundations of Data
Science, virtual meeting, October 18-20, 2020.
Y. Gurevich, E. Hudis, and J.M. Wing,
“
Inverse Privacy: A Position Paper,”
MyData 2016 Workshop: Making Sense of the Value of Personal Data, Helsinski, Finland, August 31, 2016.
M.C. Tschantz, A. Datta, A. Datta, and J.M. Wing,
“
A Methodology for Information Flow Experiments,” in
Proceedings of the 28th IEEE Computer Security Foundations Symposium
,
July 2015. Full paper.
S. Sen, S. Guha, A. Datta, S.K. Rajamani, J. Tsai, and J.M. Wing,
“
Bootstrapping Privacy Compliance in Big Data Systems,”
Proceedings of the IEEE Symposium on Security and Privacy ("Oakland")
, San Francisco, CA, May 2014. Best Student Paper Award.
Also Microsoft Research Technical Report MSR-TR-2014-36, March 2014.
M.C. Tschantz, A. Datta, and J.M. Wing,
“
Purpose Restrictions on Information Use,” in
Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
,
Egham, UK, September 9-11, 2013. Also
CMU-CS-13-116
and CyLab-13-005
June 2013.
M.C. Tschantz, A. Datta, and J.M. Wing,
“
Formalizing and Enforcing Purpose Restrictions in Privacy Policies,” in
Proceedings of the IEEE Symposium on Security and Privacy ("Oakland")
, San Francisco, CA, May 2012.
Also CMU-CS-12-106
Technical Report (full version of conference paper),
March 2012.
V. Gligor and J.M. Wing
“
Towards a Theory of Trust in Networks of Humans and Computers,” in
Proceedings of Nineteenth International Workshop on Security Protocols,
Cambridge, England, March 28-30, 2011,
Invited Paper.
M.C. Tschantz and J.M. Wing,
“
Formal Methods for Privacy,” in
Proceedings of Formal Methods 2009
, Eindhoven, The Netherlands, November 2009, pp. 1-15.
Also CMU-CS-09-154
Technical Report,
August 2009.
Invited Paper.
P.K. Manadhata, Y. Karabulut, and J.M. Wing,
“
Report: Measuring the Attack Surfaces of Enterprise Software,”
Proceedings of the International Symposium Symposium
on Engineering Secure Software and Systems, Industry Track,
Leuven, Belgium, February 4-6, 2009.
Alexandria, VA, October 30, 2006.
P.K. Manadhata, Y. Karabulut, and J.M. Wing,
“
``Measuring the Attack Surfaces of SAP Systems,''
Proceedings of the 19th IEEE International Symposium
on Software Reliability Engineering, Industry Track (only abstract and presentation published), Redmond, WA, November 11-14, 2008.
M.C. Tschantz and J.M. Wing,
“
Extracting Conditional Confidentiality Policies,”
Proceedings of the 6th IEEE International Conference on Software Engineering and Formal Methods,
Cape Town, South Africa, November 10-14, 2008, pp. 107-116. Best Paper Award.
P.K. Manadhata, J.M. Wing, M.A. Flynn, and M.A. McQueen,
“
Measuring the Attack Surfaces of Two FTP Daemons,”
Quality of Protection Workshop, Alexandria, VA, October 30, 2006.
V. Mehta, C. Bartzis, H. Zhu, E.M. Clarke, and J.M. Wing,
“
Ranking Attack Graphs,”
Proceedings of Recent Advances in Intrusion Detection 2006, Hamburg, Germany, September 2006.
P.K. Manadhata and J.M. Wing,
“
An Attack Surface Metric,”
First Workshop on Security Metrics, Vancouver, BC, August 2006.
position paper.
J.M. Wing,
“Scenario
Graphs Applied to Security,” Proceedings
of Workshop on Verification of Infinite State Systems with Applications to Security, Timisoara, Romania, March 2005.
Summary paper.
J. Pincus and J.M. Wing,
“Towards
an Algebra for Security Policies,” Proceedings
of 26th International Conference on Applications and Theory of Petri Nets, Miami, FL, June 2005, pp. 17-25.
Extended abstract.
O. Sheyner
and J.M.
Wing, “Tools
for
Generating and Analyzing Attack Graphs,”
Proceedings of Workshop on Formal Methods for
Components and Objects, 2004, pp. 344-371.
M. Howard, J.
Pincus,
and J.M. Wing,
“Measuring
Relative Attack Surfaces,” Proceedings
of Workshop on
Advanced Developments in
Software and
Systems Security, Taipei, December 2003.
Also CMU-CS-03-169
Technical Report,
August 2003.
T.M. Wong, C.
Wang, and
J.M. Wing,
“Verifiable
Secret Redistribution for
Archive Systems,” Proceedings
of the First International Security in Storage
Workshop, Maryland,
December 2002.
K.W. Lye and
J.M. Wing,
“Game
Strategies in
Network
Security,” in the Proceedings of the Foundations of
Computer Security Workshop 2002, July
26, 2002, Copenhagen, Denmark. Longer version available as
CMU-CS-02-136,
May 2002.
S. Jha, O.
Sheyner, and
J.M. Wing, “Two
Formal Analyses
of Attack Graphs,” Proceedings of the
15th IEEE Computer Security Foundations Workshop,
Nova Scotia, Canada, June 2002, pp. 49-63.
O. Sheyner,
J. Haines,
S. Jha, R. Lippmann,
and J.M. Wing, “Automated
Generation and
Analysis of Attack Graphs,” Proceedings of the IEEE
Symposium on Security and Privacy, Oakland, CA, May 2002.
S. Jha and J.
Wing,
“Survivability
Analysis
of Networked
Systems,” Proceedings of the International Conference on
Software
Engineering,
Toronto, Canada, May 2001.
Preliminary version available as CMU-CS-00-168,
October 2000.
J. Wing,
“Towards
a
Science of Survivability:
A Research Agenda
and a Specific Method,” Proceedings of the Third
Information Survivability Workshop (ISW-2000),” Boston, MA,
October
24-26, 2000. Position paper.
O. Sheyner
and J. Wing,
“Composing
Proofs of
Security Protocols
Using Isabelle/IOA,” Proceedings of the Theorem Proving for
Higher
Order Logics (TPHOLs) Workshop,
short paper,
August 2000. Longer version available as CMU-CS-00-106.
N. Hopper, S.
Seshia,
and J. Wing, “A
Comparison and
Combination of Theory
Generation and Model Checking for Security Protocol Analysis,” Proceedings
of the Workshop on Formal Methods and Security,
July 2000; earlier version available as CMU-CS-00-107.
S. Jha, J.M.
Wing, R.
Linger, and T.
Longstaff, “Analyzing
Survivability Properties of Specifications of
Networks,” Proceedings of the International Conference on
Dependable Systems and Networks, Workshop on Dependability Despite
Malicious Faults, New York City, NY, June 25-28, 2000, pp. 613-622.
M. Vaziri, N.
Lynch,
and J.M. Wing, “Proving
the Correctness of
a Controller Algorithm for the RAID Level 5 System,” Proceedings
of the International Symposium on
Fault-Tolerant
Computing, June 1998; also CMU-CS-98-117,
March 1998.
J.M. Wing,
“Subtyping
for Distributed Object
Stores,” Proceedings of the Second IFIP International Workshop
on
Formal Methods for Open Object-based Distributed Systems (FMOODS),
July 1997, pp. 305-318. Invited Paper. Also
CMU-CS-97-121,
April 1997.
Gary T.
Leavens and
J.M. Wing, “Protective
Interface
Specifications,” Proceedings of TAPSOFT '97 Theory
and Practice of Software Development, 7th International
Joint Conference CAAP/FASE, Lecture Notes in Computer
Science 1214, April 1997,
pp. 520-534.
Also CMU-CS-96-129R, October 1996.
Earlier version appeared as “Protection from the
Underspecified,”
CMU-CS-96-129
and Iowa State University
Dept.
of Computer Science TR96-04, April 1996.
D. Kindred
and J.M.
Wing, “Fast,
Automatic
Checking of Security
Protocols,” Proc. of the USENIX 1996 Workshop on Electronic
Commerce,
Oakland, CA, November 1996, pp. 41-52. Also CMU-CS-96-173, September
1996.
N. Heintze,
J.D. Tygar,
J.M. Wing, and H.-C.
Wong, “Model
Checking Electronic Commerce
Protocols,” Proc. of the
USENIX 1996 Workshop on Electronic Commerce,
Oakland, CA, November 1996, pp. 147-164.
J.M. Wing,
“Teaching
Mathematics to Software
Engineers,” Proceedings of the
Fourth International Conference on Algebraic Methodology and Software
Technology (AMAST '95), Montreal, Canada, July 3, 1995, pp.
18-40. Invited Paper. Also CMU-CS-95-118,
March 1995;
superseded by
CMU-CS-95-118R,
May 1995.
J.M. Wing and
D.C.
Steere, “Specifying
Weak
Sets,” Proceedings of the 15th International Conference on
Distributed
Computing Systems, Vancouver, May 30-June 2, 1995.
Also CMU-CS-94-194,
October 1994.
D. Garlan, G.
Abowd, D.
Jackson, J. Tomayko,
and J.M. Wing, “The
CMU
Master of Software
Engineering Core
Curriculum,” Proceedings of the Eighth SEI Conference on
Software
Engineering
Education (CSEE), New Orleans, Lecture Notes in Computer Science
895,
Springer-Verlag, March-April 1995, pp. 65-86.
Harpreet S.
Chadha,
John W. Baugh Jr., and
J.M. Wing, “Formal
Specification of AEC
Product Models,” Computing
in Civil Engineering: Proceedings of the First
Congress, K.
Khozeimeh, ed.,
American Society of Civil Engineers (ASCE), Washington, D.C., June
pp. 571-578, 1994.
J.M. Wing, “Decomposing
and
Recomposing
Transactional Concepts,” Proceedings of the Workshop on
Object-based Distributed
Programming, Lecture Notes in Computer Science 791,
R. Guerraoui, O. Nierstrasz, and M. Riveill (editors), Springer-Verlag,
pp. 111-121, 1994.
B. Liskov and
J.M.
Wing, “Specifications
and
Their Use in Defining Subtypes,” Proceedings of OOPSLA '93,
September 1993,
pp. 16-28.
Also reprinted by permission from ACM in Proceedings of ZUM '95,
Lecture Notes in Computer Science, Springer-Verlag,
September 1995, pp. 245-263.
B. Liskov and
J.M.
Wing, “A
New Definition of
the Subtype Relation,” Proceedings of ECOOP '93, Lecture
Notes in Computer Science 707, Springer-Verlag, July 1993,
pp. 118-141.
Also CMU-CS-93-149,
April 1993; MIT
LCS Programming
Methodology Group Memo 76, May 1993.
J.M. Wing, M.
Faehndrich, J.G. Morrisett,
and S.M. Nettles, “Extensions
to Standard
ML to Support Transactions,” Proceedings
of ACM SIGPLAN Workshop on ML and its
Applications,
June 20-21, 1992, San Francisco, CA, pp 104-118.
Also CMU-CS-92-132,
April 1992.
J.M. Wing,
“Revisiting
Abstraction Functions
for Reasoning About Concurrency,” Proceedings of the Fifth
Refinement Workshop, British
Computer
Society, Springer-Verlag, C.B. Jones, R.C. Shaw,
and T. Denvir, editors, 1992, pp. 298-300. Extended abstract. Invited
Paper.
S.M. Nettles
and J.M.
Wing, “Persistence
+
Undoability = Transactions,” Proceedings of Hawaii
International
Conference on Systems
Science 25, January 1992.
Also CMU-CS-91-173,
August 1991.
J.M. Wing and
A.M.
Zaremski, “Unintrusive
Ways to Integrate Formal Specifications in Practice,” Proceedings
VDM '91, Lecture Notes in Computer Science
551, Springer-Verlag,
October 1991, Delft, The Netherlands, pp. 545-569. Also
CMU-91-113,
February 1991.
J.M. Wing and
A.M.
Zaremski, “A
Formal
Specification of a Visual Language Editor,” Proceedings of the
Sixth International Workshop on Software
Specification and Design, October 1991, Como, Italy,
pp. 120-129.
Also CMU-CS-91-112,
February 1991.
E.R. Rollins
and J.M.
Wing, “Specifications
as Search Keys for Software Libraries,” Proceedings of the
Eighth
International Conference on Logic
Programming,
Paris, June 1991. Also CMU-CS-90-159,
September 1990.
J.M. Wing and
C. Gong,
“Experience
with the
Larch Prover,” Proceedings of the ACM
Workshop on Formal Methods in Software Development,” Napa, CA, May
1990, pp. 140-143.
J.M. Wing,
“Verifying
Atomic Data Types,” Proceedings
of the REX Workshop on
Stepwise Refinement of Distributed Systems: Models,
Formalism, Correctness, May 29-June 2, 1989,
Plasmolen, The Netherlands,
Lecture Notes in Computer
Science 430, Springer-Verlag, 1990, pp. 731-758. Invited Paper.
Also CMU-CS-89-168,
July 1989.
M.R. Barbacci
and J.M.
Wing, “A
Language for
Distributed Applications,” Proceedings of the
1990 International Conference on Computer Languages,
March 1990, New Orleans, pp. 59-68.
S.M. Clamen,
L.D.
Leibengood, S.M. Nettles
and J.M. Wing, “Reliable
Distributed
Computing with Avalon/Common
Lisp,” Proceedings of the 1990 International Conference
on Computer Languages, March 1990, New Orleans, pp. 169-179.
Also CMU-CS-89-186,
September 1989.
A. Heydon, M.
Maimone,
J.D. Tygar, J.M. Wing
and A.M. Zaremski, “Miro
Tools,” Proceedings
of the IEEE 1989
Workshop on Visual
Languages, Rome, Italy, October 1989, pp. 86-91. Also
CMU-CS-89-159,
July 1989.
A. Heydon, M.
Maimone,
J.D. Tygar, J.M. Wing
and A.M. Zaremski, “Constraining
Pictures with Pictures,” Proceedings
of IFIPS '89,
San Francisco, CA, August 1989, pp. 157-162. Also CMU-CS-88-185,
November 1988.
M.P. Herlihy
and J.M.
Wing, “Specifying
Security Constraints with Relaxation Lattices,” Proceedings of
the
Computer Security Foundations Workshop II,
Franconia, NH, June 1989, pp. 47-53.
J.M. Wing,
“Specifying
Avalon Objects in
Larch,” Proceedings of the
International Joint Conference on Theory and Practice
of Software Development (TAPSOFT),
Barcelona, March 13-17, 1989,
Lecture Notes in Computer Science 352, Springer-Verlag,
pp. 61-80. Invited Paper. Also CMU-CS-88-208,
December
1988.
M.W. Maimone,
J.D.
Tygar and J.M. Wing, “Miro
Semantics for Security,” Proceedings of the IEEE 1988 Workshop
on Visual Languages, Pittsburgh, PA, October 1988, pp. 45-51.
Also
CMU-CS-88-173,
August 1988.
M.P. Herlihy
and J.M.
Wing, “Reasoning
About
Atomic Objects,” Proceedings
of the Symposium on Formal Techniques in
Real-time and Fault-tolerant Systems, 22-23 September 1988,
Warwick,
U.K., Lecture Notes in Computer Science 331, Springer-Verlag,
pp. 193-208.
Preliminary version in CMU-CS-88-120,
March 1988.
J.M. Wing,
“Specifying
Recoverable Objects,” Proceedings
of the Sixth Annual Pacific Northwest Software
Quality Conference,
Portland, OR, September 1988, pp. 317-331. Also CMU-CS-88-170,
July 1988.
M.R.
Barbacci, C.B.
Weinstock and J.M. Wing,
“Programming
at the
Processor-Memory-Switch Level,” Proceedings of
the Tenth International Conference on
Software
Engineering, Singapore, March 1988, pp. 19-28.
D.L. Detlefs,
M.P.
Herlihy and J.M. Wing,
“Inheritance of Synchronization and Recovery Properties in
Avalon/C++,” Proceedings of the Hawaii International Conference on
Systems Science,
January 1988.
M.R.
Barbacci, C.B.
Weinstock and J.M. Wing,
“Durra:
Language Support for Large
Grained Parallelism,” Proceedings
of the International Conference on Parallel
Processing and Applications, L'Aquila, Italy, September 1987.
J.D. Tygar
and J.M.
Wing, “Visual
Specification of Security Constraints,” Proceedings of the 1987
Workshop on Visual Languages,
August 19-21, 1987, Linkoping, Sweden.
Also CMU-CS-87-122,
May 1987.
M.R. Barbacci
and J.M.
Wing, “Durra:
A
Task-level Description Language,” Proceedings of the 16th
Annual
International
Conference on Parallel Processing, St. Charles, IL, August 1987,
pp. 370-380.
M.P. Herlihy
and J.M.
Wing, “Avalon: Language
Support for Reliable Distributed Systems,” Proceedings of the 17th
International Symposium on
Fault-Tolerant
Computing, Pittsburgh, PA, July 1987, pp. 89-94.
Also CMU-CS-86-167,
December 1986.
M.R. Barbacci
and J.M.
Wing, “Specifying
Functional and Timing Behavior for Real-Time
Applications,” Proceedings of the Conference on Parallel
Architectures
and Languages Europe (PARLE), vol. 2, Eindhoven,
Lecture Notes in Computer Science 259,
Springer-Verlag, June 1987,
pp. 124-140.
Also CMU-CS-86-177,
CMU/SEI-86-TR-4,
December 1986.
J.M. Wing, “A
Larch
Specification of the
Library Problem,” Proceedings of the Fourth International Workshop
on
Software
Specification and Design, Monterey, CA, April 1987,
pp. 34-41.
Also CMU-CS-86-168,
December 1986.
F. Arbab and
J.M. Wing,
“Geometric
Reasoning:
A New Paradigm for Processing Geometric
Information,” Proceedings of the International Symposium
on New Directions in
Computing, sponsored by the IEEE Computer Society,
Norwegian Institute of Technology, Trondheim, Norway, August
12-14, 1985, pp. 80-89. Also in Proceedings on IFIP Design
Theory for
CAD, Tokyo, Japan, October 1985.
J.M. Wing,
“Specification
Firms: A Vision for
the Future,” Proceedings of the
Third International Workshop on Software Specification and Design,
London,
August 26-27, 1985, pp. 241-243.
F. Arbab and
J.M. Wing,
“Geometric Reasoning
for Geometric Modeling,” AIAA/AHS/ASEE Aircraft Design, Systems
and Operations
Conference,
AIAA, Colorado Springs, Colorado, October 14-16, 1985; abstract
presented at SIAM Conference on Geometric Modeling and Robotics,
Albany, New York, July 15-19, 1985.
D. Berry and
J.M. Wing,
“Specifying
and
Prototyping: Some Thoughts on Why They Are Successful,” Proceedings
of the
International Joint Conference on Theory and Practice
of Software Development (TAPSOFT) Volume 2,
Berlin, West Germany,
Lecture Notes in Computer Science 186,
Springer-Verlag,
March 1985, pp. 117-128.
Also USC Computer Science TR-85-329, July 1985.
J.M. Wing,
“Helping
Specifiers Evaluate Their
Specifications,” Proceedings
of AFCET Second International Conference on Software Engineering,
Nice, France, June 4-6, 1984, pp. 179-189.
Also USC Computer Science TR-85-330, July 1985.
[top of page]
Unrefereed Abstracts,
Papers, Reports, and Blogs
J.M. Wing, Vandana P. Janeja, Tyler Kloefkorn, and Lucy C. Erickson,
"Data Science Leadership Summit, Workshop Report," September 2018.
Jennifer Rexford, Magda Balazinska, David Culler, and J.M. Wing, "Enabling Computer and Information Science and Engineering Research and Education in the Cloud," NSF Workshop Report, 2018.
J.M. Wing, "Data for Good," ACM Conference on Knowledge Discovery and Data Mining 2018, Keynote Talk, London, UK, August 21, 2018.
J.M. Wing, "How Does Data Science Differ from Computer Science and from Statistics?," Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, "Data for Good: FATES, Elaborated,"
Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, "Data for Good,"
Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, "Mission Statement for the Data Science Institute,"
Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, "What is Data Science?,"
Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, "The Data Life Cycle,"
Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, "Data for Good: Preface,"
Voices, Data Science Institute, Columbia University, January 23, 2018.
J.M. Wing, foreword to Handbook on Computational Thinking, by Anotonio Camerlengo, in Italian, to appear.
J.M. Wing, "Progress in Computational Thinking,''
Communications of the ACM, Vol. 59 No. 7, July 2016, pp. 10-11.
J.M. Wing, "Cyber-Physical Systems You Can Bet Your Life On,'' Microsoft Research
Blog, June 17, 2016.
J.M. Wing, "Computational Thinking, Ten Years Later,'' Microsoft Research Blog, March 23, 2016. Also
Computational Thinking, Ten Years Later, Blog@CACM, March 23, 2016.
J.M. Wing, "Expeditions: Exploring the Unknown,'' Microsoft Research Blog, February 26, 2016.
J.M. Wing, "Here's Why Microsoft Cares About Basic Research and You Should Too,'' Microsoft Research Blog, October 19, 2015.
J.M. Wing, "Computational Thinking Benefits Society,'' Social Issues in Computing, 40th Anniversary Blog, University of Toronto, January 9, 2014.
J.M.Wing, "NITRD 20: A Day in Your Life,''
Blog@CACM, March 26, 2012.
J.M. Wing, "Happy 20th Birthday to NITRD,''
Blog@CACM, March 26, 2012.
J.M. Wing, "A Futuristic Health IT Scenario,''
Blog@CACM, November 8, 2011.
J.M. Wing, "Connecting Science to Society,''
Blog@CACM, October 14, 2011.
J.M. Wing, "Yes, Computer Scientists are Hypercritical,''
Blog@CACM, October 6, 2011.
J.M. Wing, "Call to Arms: Science and Engineering for Privacy,''
Blog@CACM, March 21, 2011.
J.M. Wing, "Usable Verification: Balancing Thinking and
Automating,” Usable Verification Workshop, sponsored by Microsoft Research and NSF, Redmond, WA, November
15-16, 2010,
position paper.
J.M. Wing,
"Understanding Network Complexity", Proceedings of Second IEEE International Workshop on Network Science of Communications Networks, San Diego, March 19, 2010.
J.M. Wing,
"Software Security", Proceedings of First IEEE and IFIP International Symposium on Theoretical Aspects of Software Engineering, Shanghai, China, June 2007.
J.M. Wing, “FAQ on
Pi-Calculus,” Microsoft
Internal Memo, December 2002.
J. M. Wing,
“Platitudes
and Attitudes,” Software
Tools for Technology Transfer, editorial
board opinion
piece, Volume 4, Number 3, May 2003, pp. 261-265.
J.M. Wing,
“What, Who,
and How of Tomorrow,”
Monterey Workshops: Radical Innovations of Software and Systems
Engineering in the
Future, Venice, Italy, October 6-10, 2002, pp. 400-403.
J.M. Wing,
“Mathematics
in Computer Science
Curricula,”
Sixth International Conference on Mathematics of Program
Construction, Dagstuhl, Germany, July 8-10, 2002.
Abstract of invited talk, p. 22. Slides.
J.M. Wing,
“Modeling
Unpredictable or Random
Environments,” Using Uncertainty Within Computation, AAAI
2001 Fall
Symposium, Technical Report FS-01-04, AAAI Press, North Falmouth, Cape
Cod, MA,
November 2001, pp. 144-145.
J.M. Wing,
“Weaving
Formal Methods into the
Undergraduate Computer Science
Curriculum,” in the Proceedings of the Eighth International
Conference on Algebraic
Methodology and Software 2000, Iowa City, IA, May 2000, Lecture
Notes
in Computer Science 1816, Springer-Verlag, pp. 2-7. Extended
abstract of invited talk.
D. Kindred
and J.M.
Wing, “Closing
the
Idealization Gap with
Theory Generation,” extended abstract, Proceedings of the
DIMACS
Workshop on Cryptographic Protocol Design and Verification,
Rutgers, NJ, September
3-5, 1997.
J.M. Wing
(editor),
“Report of the Committee
of Visitors
for Programs in the Division of Computer and Computation Research,”
July 1996.
J.M. Wing
(editor),
“Report
of the Committee
of Visitors
for the CISE Institutional Infrastructure Program,”
November 1995.
J.M. Wing,
“Hints
for
Writing
Specifications,”
in Proceedings of the Z Users' Meeting '95, September 1995.
One-page abstract.
D.T. Steere,
M.
Satyanarayanan, and J.M.
Wing, “Dynamic
Sets for Search,”
in Proceedings of the Symposium on Principles of Distributed
Computing,
August 1994, Brief Announcement (one-page abstract),
p. 397.
F. Bamberger,
P. Ford,
and J.M. Wing,
“Interoperability,”
section in R&D for the NII:
Technical Challenges, report edited by M.K. Vernon,
E.D. Lazowska, and S.D. Personick, Interuniversity Communications
Council, Inc. (EDUCOM), 1994.
J.M. Wing,
“Formal
Methods,” Encyclopedia
of Software Engineering,
John Wiley & Sons, Inc., New York, 1994, pp. 504-517.
Revision in Second Edition.
B. Liskov and
J.M.
Wing, “Corrigenda
to ECOOP
'93 Paper,” ACM SIGPLAN Notices, Volume 29, Number 4,
April
1994,
p. 4.
J.M. Wing,
“Composing
Transactional
Concepts,” ECOOP '93 Workshop on Object-based Distributed
Programming,
Kaiserslautern, Germany, July 1993.
J.M. Wing,
E.R.
Rollins, and A.M. Zaremski,
“Thoughts
on a Larch/ML and a New Application for LP,” Proceedings
of the First International Workshop on Larch,
July 13-15, 1992, Dedham, MA. Also CMU-CS-92-135,
July 1992.
J.M. Wing,
“Specifications
in Software
Development,” Proceedings of the Seventh Annual
Symposium on Logic in Computer Science, June, 1992.
Abstract of Invited Tutorial.
J.M. Wing and
A.M.
Zaremski, “Two Ways to
Integrate
Formal Specifications in Practice,” Proceedings of Formal Methods
'91, Drymen, Scotland,
September
24-27, 1991, position paper.
J.M. Wing,
“Program
Specification” and
“Formal
Methods,” Encyclopedia of Computer Science, A.
Ralston and E.D.
Reilly (eds.),
Van Nostrand
Reinhold, Third Edition, 1993,
pp. 564-565, 1107-1111.
L.D.
Leibengood, J.G.
Morrisett, S.M. Nettles
and J.M. Wing, “ML
as a Basis for Distributed Object Management,”
Standard ML Workshop, Princeton University, June 7-8, 1990.
M.R.
Barbacci, D.L.
Doubleday, C.B. Weinstock
and J.M. Wing, “The
Durra Language and Runtime Environment: Tools for
PMS-Level
Programming,” Proceedings of the IFIP Working Conference on
Decentralized
Systems, Lyon, France, December 11-13, 1989.
S.M. Clamen,
L.D.
Leibengood, S.M. Nettles
and J.M. Wing, “An
Overview of Avalon/Common Lisp,” Proceedings of
the Third Workshop on Large Grained Parallel
Programming, Pittsburgh, October 10-11, 1989.
M.R.
Barbacci, D.L.
Doubleday, C.B. Weinstock
and J.M. Wing, “A
Status Report on Durra: A Tool for PMS-Level
Programming,” Proceedings of the Third Workshop on Large
Grained
Parallel
Programming, Pittsburgh, October 10-11, 1989.
M.P. Herlihy
and J.M.
Wing, “Linearizable
Concurrent Objects,”
Proceedings of the ACM SIGPLAN Workshop on Object-Based
Concurrent Programming, SIGPLAN Notices, Vol 24, No. 4, April
1989,
pp. 133-135.
A. Heydon,
M.W.
Maimone, A.F. Moormann, J.D.
Tygar and J.M. Wing, “Miro: A Visual Language for Specifying Security,”
UNIX Security Workshop, Portland, OR, August 29-30,
1988.
D.L. Detlefs,
M.P.
Herlihy and J.M. Wing,
“Avalon/C++:
C++ Extensions for Transaction-Based
Programming,” Proceedings of the 1987 USENIX Workshop on C++,
Santa Fe, NM, November 8-10, 1987.
M. Barbacci
and J.M.
Wing, “Task-level
Application Descriptions,” Workshop on Large Grained
Parallelism, Providence, RI, October 27-29, 1986.
J.M. Wing,
“Role of
Formal Specifications,”
NRL Invitational Workshop
on Testing and Proving, ACM SIGSOFT Software Engineering
Notes, vol. 11, no. 5, October 1986.
J.M. Wing,
“Beyond
Functional Behavior:
Combining Methods to Specify Different
Classes of Properties of Large Systems,” Proceedings
of Verification Workshop III, Watsonville, CA, February 18-21, 1985, ACM
SIGSOFT Software Engineering Notes, vol. 10, no.
4, August 1985, pp. 102-104.
J.M. Wing,
“Strength
and Essentiality of
Specifications,” Workshop Notes:
International Workshop on Models and Languages for Software
Specification
and Design, edited by Robert Babb, Department d'Informatique,
Universite
Laval, Quebec, DIUL-RR-8408, March 1984, pp. 178-181.
[top of page]
Technical Reports (not
already listed above)
Y. Gurevich, N. Haiby, E. Hudis E., J.M. Wing, and E. Ziklik,
"Biggish: A solution for the inverse privacy problem,''
Microsoft Research MSR-TR-2016-24, May 2016.
M.C. Tschantz, A. Datta, A. Datta, and J.M. Wing,
“
A Methodology for Information Flow Experiments,”
arXiv:1405.2376
Technical Report, May 2014.
Y. Gurevich, N. Haiby, E. Hudis E., J.M. Wing, and E. Ziklik,
"Biggish: A solution for the inverse privacy problem,''
Microsoft Research MSR-TR-2016-24, May 2016.
M.C. Tschantz, A. Datta, and J.M. Wing,
“
Information Flow Investigations,”
CMU-CS-13-118
Technical Report, June 2013.
M.C. Tschantz, A. Datta, and J.M. Wing,
“
On the Semantics of Privacy Requirements in Privacy Policies,”
CMU-CS-11-102
Technical Report,
February 2011.
P.K. Manadhata, Y. Karabulut, and J.M. Wing,
“Measuring the Attack Surfaces of SAP Business Applications,”
CMU-CS-08-134
Technical Report, May 2008.
M.C. Tschantz and J.M. Wing,
“Extracting Conditional Confidentiality Policies,”
CMU-CS-08-127
Technical Report, May 2008.
P.K. Manadhata, K. Tan, R. Maxion, and J.M. Wing,
“An Approach to Measuring A System's Attack Surface,”
CMU-CS-07-146 Technical Report, August 2007.
P.K. Manadhata, D. Kaynar, and J.M. Wing,
“A Formal Model for a System's Attack Surface,”
CMU-CS-07-144 Technical Report, July 2007.
Alberts et al.
“Results of SEI Independent Research and Development Projects,”
CMU/SEI-2007-TR-006 Technical Report, July 2007.
M. Tschantz and J. M. Wing
“Confidentiality Policies and Their Extraction from Source Code,”
CMU-CS-07-108 Technical Report, February 2007.
P. Manadhata and
J.M. Wing,
“
An Attack Surface Metric,“
CMU-CS-05-155,
Technical Report,
July 2005.
P. Manadhata and
J.M. Wing,
“Measuring
a
System's Attack
Surface,” also
CMU-CS-04-102
Technical Report,
January 2004.
G. Fairbanks, D.
Garlan, B. Sarpeshkar, R.
Simmons,
G. Tolle, and J.M. Wing, “Reasoning About Exceptions Using Model
Checking,”
CMU-CS-02-165.
Draft only, still in preparation.
T.M.
Wong, J.M. Wing, and C.X. Wang,
“Verifiable
Secret
Redistribution for Threshold Sharing Schemes,”
CMU-CS-02-114,
February 2002.
S.
Jha, O. Sheyner, and J.M. Wing,
“Minimization and Reliability Analyses of Attack Graphs,”
CMU-CS-02-109,
February 2002.
T.M.
Wong and J.M. Wing, “Verifiable Secret
Redistribution,”
CMU-CS-01-155,
October 2001. Superseded
by CMU-CS-02-114.
O.
Sheyner and J. Wing, “Toward Compositional
Analysis of Security Protocols Using Theorem
Proving,”
CMU-CS-00-106,
January 2000.
N.
Haines, D. Kindred, J.G. Morrisett, S.M.
Nettles and J.M. Wing, “Tinkertoy Transactions,”
CMU-CS-93-202,
December 1993.
B.
Liskov and J.M. Wing, “Family Values: A
Behavioral Notion of Subtyping,”
CMU-CS-93-187, July 1993. Supersedes “A New Definition of the Subtype
Relation,”
CMU-CS-93-149,
April 1993;
and “Family Values: A Semantic Notion of Subtyping,”
CMU-CS-92-220,
December 1992, also published as MIT-LCS-TR-562.
D.
Garlan, A. Brown, D. Jackson, J. Tomayko
and J. Wing, “The CMU Masters in Software Engineering Core Curriculum,”
CMU-CS-93-180,
August 1993.
J.M.
Wing, M. Faehndrich, N. Haines, K.
Kietzke, D. Kindred,
J.G. Morrisett and S. Nettles, “Venari/ML Interfaces and Examples,”
CMU-CS-93-123,
March 1993.
M.P.
Herlihy, S.-Y. Ling and J.M. Wing,
“Implementation of Commit Timestamps in Avalon,”
CMU-CS-91-107,
January 1991.
C.
Gong and J.M. Wing, “A Library of
Concurrent Objects and Their Proofs of Correctness,”
CMU-CS-90-151,
July 1990.
J.M.
Wing and C. Gong, “A Simulator for
Concurrent Objects,”
CMU-CS-90-150,
July 1990.
C.
Gong and J.M. Wing, “Raw Code,
Specification, and Proof of the Avalon Queue Example,”
CMU-CS-89-172,
August 1989.
J.M.
Wing and C. Gong, “Machine-Assisted
Proofs of Properties of Avalon Programs,”
CMU-CS-89-171,
August 1989.
M.
Barbacci and J.M. Wing, “Durra:
A
Task-level Description Language Reference Manual
(Version 2),” CMU/SEI-89-TR-034,
August 1989.
J.
Wing, M. Herlihy, S. Clamen, D. Detlefs,
K. Kietzke, R. Lerner and S.-Y. Ling, “The
Avalon/C++ Programming
Language (Version 0),”
CMU-CS-88-209,
December 1988.
M.
Barbacci, M. Herlihy and J. Wing,
co-editors, “Proceedings of the Second Workshop on Large-Grained
Parallelism,”
Hidden Valley, PA, October 11-14, 1987,
CMU Software Engineering Institute Special
Report, CMU/SEI-87-SR-5, November 1987.
Also CMU-CS-TR-88-112,
February 1988.
M.
Barbacci and J.M. Wing, “Durra:
A
Task-level Description Language,”
CMU-CS-86-176
(also CMU/SEI-86-TR-3),
December 1986.
M.
Nixon and J.M. Wing, “On
Adding
Concurrency to the Formal Development Methodology
(FDM),” System Development Corporation, SP-4360, March 1986.
J.M.
Wing and M. Nixon, “Adding Temporal
Logic to Ina Jo,”
CMU-CS-85-146,
July 1985.
J.V.
Guttag, J.J. Horning and J.M. Wing,
“Larch
in Five Easy Pieces,” DEC Systems Research Center Technical
Report 5, July 1985.
F.
Arbab and J.M. Wing, “Geometric Reasoning:
A New Paradigm for Processing Geometric
Information,” USC Computer Science TR-85-333. Also available as
CMU-CS-85-144,
July 1985.
J.M.
Wing, “A Two-Tiered Approach and
Language for Formally Specifying Program
Modules,” USC Computer Science TR-85-331, March 1985.
J.M.
Wing, “A
Two-Tiered Approach to
Specifying Programs,” MIT Laboratory
for Computer Science TR-299, Cambridge, MA, 1983. Also Ph.D.
thesis under the same title, MIT Department of Electrical
Engineering and Computer Science, May 1983.
J.M.
Wing, “Experience with Two Examples: A
Household Budget and Graphs,”
AFFIRM MEMO-30-JMW, USC Information Sciences Institute,
Marina del Rey, CA, August 1980.
J.M.
Wing, “Partial-Match
Retrieval Using
Tries, Hashing, and Superimposed Codes,”
S.M. Thesis, MIT Department of Electrical Engineering and Computer
Science,
Cambridge, MA, May 1979.
Also available as Bell Laboratories Technical Memorandum 79-1353-3, May
1979.
[top of page]
Updated:
10-May-04