Search For:

Displaying 1-34 out of 34 total
Jeannette M. Wing @ PCAST; Barbara Liskov keynote
Found in: Communications of the ACM
By Jeannette M. Wing, Valerie Barr
Issue Date:September 2011
pp. 10-11
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter at http://twitter.com/blogCACMhttp://cac...
     
An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing
Found in: Communications of the ACM
By Daniel Reed, Jeannette M. Wing, Mark Guzdial, Daniel Reed, Daniel Reed, Jeannette M. Wing, Jeannette M. Wing, Mark Guzdial, Mark Guzdial
Issue Date:August 2009
pp. 101-104
The Communications Web site, http://cacm.acm.org, features 13 bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish excerpts from selected posts, plus readers' comments.
     
Verifiable Secret Redistribution for Archive Systems
Found in: Security in Storage Workshop, International IEEE
By Theodore M. Wong, Chenxi Wang, Jeannette M. Wing
Issue Date:December 2002
pp. 94
We present a new verifiable secret redistribution protocol or threshold sharing schemes that forms a key component of a proposed archival storage system. Our protocol supports redistribution from (m,n) to (m,n) threshold sharing schemes without requiring r...
 
An Attack Surface Metric
Found in: IEEE Transactions on Software Engineering
By Pratyusa K. Manadhata, Jeannette M. Wing
Issue Date:May 2011
pp. 371-386
Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a ...
 
Extending Ina Jo With Teimporal Logic
Found in: Security and Privacy, IEEE Symposium on
By Jeannette M. Wing
Issue Date:April 1986
pp. 2
Toward the overall goal of putting formal specifications to practical use in the design of Iarge systems, we explore the combination of two specification methods: using temporal logic to specify concurrency properties and using an existing specification la...
 
Software Security
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Jeannette M. Wing
Issue Date:June 2007
pp. 21
Security vulnerabilities are increasingly due to software. While we focus much of our attention today on code-level vulnerabilities, such as buffer overflows, we should be paying more attention to design-level vulnerabilities. Independently designed and im...
   
A Call to Action: Look Beyond the Horizon
Found in: IEEE Security and Privacy
By Jeannette M. Wing
Issue Date:November 2003
pp. 62-67
<p>Today's attacks exploit code-level flaws such as buffer overruns and type-invalid input. Now we should turn to tomorrow's attacks, and think beyond buffer overruns, code levels, and the horizon. This article is a call to arms to the research commu...
 
Respectful Type Converters
Found in: IEEE Transactions on Software Engineering
By Jeannette M. Wing, John Ockerbloom
Issue Date:July 2000
pp. 579-593
<p><b>Abstract</b>—In converting an object of one type to another, we expect some of the original object's behavior to remain the same and some to change. How can we state the relationship between the original object and converted object ...
 
Extracting Conditional Confidentiality Policies
Found in: Software Engineering and Formal Methods, IEEE International Conference on
By Michael Carl Tschantz, Jeannette M. Wing
Issue Date:November 2008
pp. 107-116
Programs should keep sensitive information, such as medical records, confidential. We present a static analysis that extracts from a program's source code a sound approximation of the most restrictive conditional confidentiality policy that the program obe...
 
Survivability Analysis of Networked Systems
Found in: Software Engineering, International Conference on
By Somesh Jha, Jeannette M. Wing
Issue Date:May 2001
pp. 0307
Abstract: Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased in importance as critical infrastructures have become heavily depe...
 
A Symbiotic Relationship Between Formal Methods and Security
Found in: Computer Security, Dependability, and Assurance
By Jeannette M. Wing
Issue Date:July 1998
pp. 26
Security played a significant role in the development of formal methods in the 70s and early 80s. Have the tables turned? Are formal methods now ready to play a significant role in the development of more secure systems? While not a panacea, the answer is ...
 
NSF funding advice: 21st century innovation
Found in: Communications of the ACM
By Daniel Reed, Jeannette M. Wing, Jeannette M. Wing
Issue Date:May 2010
pp. 10-11
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts. twitter Follow us on Twitter at http://twitter.com/blogCACM Jeannet...
     
A Study of 12 Specifications of the Library Problem
Found in: IEEE Software
By Jeannette M. Wing
Issue Date:July 1988
pp. 66-76
<p>The author studies twelve specifications for a seemingly simple database problem and demonstrates many approaches for classifying informally stated problem requirements. She compares the specifications according to how they address problems of the...
 
Automated Generation and Analysis of Attack Graphs
Found in: Security and Privacy, IEEE Symposium on
By Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing
Issue Date:May 2002
pp. 273
An integral part of modeling the global view of network security is constructing attack graphs. In practice, attack graphs are produced manually by Red Teams. Construction by hand, however, is tedious, error-prone, and impractical for attack graphs larger ...
 
Dynamic sets for search
Found in: Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing (PODC '94)
By David Steere, Jeannette M. Wing, M. Satyanarayanan
Issue Date:August 1994
pp. 397
In [4] a randomized algorithm for mutual exclusion with bounded waiting, employing a logarithmic sized shared variable, was given. Saias and Lynch [5] pointed out that the adversary scheduler postulated in the above paper can observe the behavior of proces...
     
Using belief to reason about cache coherence
Found in: Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing (PODC '94)
By Jeannette M. Wing, Lily B. Mummert, M. Satyanarayanan
Issue Date:August 1994
pp. 71-80
In [4] a randomized algorithm for mutual exclusion with bounded waiting, employing a logarithmic sized shared variable, was given. Saias and Lynch [5] pointed out that the adversary scheduler postulated in the above paper can observe the behavior of proces...
     
Formal methods: state of the art and future directions
Found in: ACM Computing Surveys (CSUR)
By Edmund M. Clarke, Jeannette M. Wing
Issue Date:March 1988
pp. 626-643
Floating-point divide and square-root operations are essential to many scientific and engineering applications, and are required in all computer systems that support the IEEE floating-point standard. Yet many current microprocessors provide only weak supp...
     
Composing first-class transactions
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Darrell Kindred, J. Gregory Morrisett, Jeannette M. Wing, Nicholas Haines, Scott M. Nettles
Issue Date:January 1988
pp. 1719-1736
If a compiler for language L is implemented in L, then it should be able to compile itself. But for systems used interactively commands are compiled and immediately executed, and these commands may invoke the compiler; so there is the question of how ever ...
     
Encouraging IT usage in future healthcare, quality in CS education
Found in: Communications of the ACM
By Jeannette M. Wing, Mark Guzdial
Issue Date:May 2013
pp. 14-15
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter at http://twitter.com/blogCACMhttp://cac...
     
Reviewing peer review
Found in: Communications of the ACM
By Ed H. Chi, Jeannette M. Wing
Issue Date:July 2011
pp. 10-11
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.twitterFollow us on Twitter at http://twitter.com/blogCACMhttp://cac...
     
CS woes: deadline-driven research, academic inequality
Found in: Communications of the ACM
By Jeannette M. Wing, Mark Guzdial, Mark Guzdial
Issue Date:December 2009
pp. 8-9
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish excerpts from selected posts.Follow us on Twitter at http://twitter.com/blogCACMJeannette M. Wi...
     
Five deep questions in computing
Found in: Communications of the ACM
By Jeannette M. Wing
Issue Date:January 2008
pp. 95-100
Even if they seem unanswerable, just trying to answer them will advance the field's scientific foundations and help engineer the systems we can only imagine.
     
Computational thinking
Found in: Proceedinds of the 38th SIGCSE technical symposium on Computer science education (SIGCSE '07)
By Jeannette M. Wing, Peter B. Henderson, Thomas J. Cortina
Issue Date:March 2007
pp. 64-ff
Trying to improve undergraduate teaching based on feedback collected by traditional student course evaluations can be a frustrating experience. Unclear, contradictory and ill-informed student comments leave instructors confused and discouraged. We designed...
     
Attack graph generation and analysis
Found in: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS '06)
By Jeannette M. Wing
Issue Date:March 2006
pp. 14-14
Attack graphs represent the ways in which an adversary can exploit vulnerabilities to break into a system. System administrators analyze these attack graphs to understand where their system's weaknesses lie and to help decide which security measures will b...
     
Computational thinking
Found in: Communications of the ACM
By Jeannette M. Wing
Issue Date:March 2006
pp. 33-35
It represents a universally applicable attitude and skill set everyone, not just computer scientists, would be eager to learn and use.
     
Model checking software systems: a case study
Found in: Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '95)
By Jeannette M. Wing, Mandana Vaziri-Farahani
Issue Date:October 1995
pp. 100-106
Although many local area networks and operating systems support the use of multicast communications, multicast communications have remained primarily an interesting research tool. However, the growing research interest in multimedia and hypermedia for know...
     
Specification matching of software components
Found in: Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '95)
By Amy Moormann Zaremski, Jeannette M. Wing
Issue Date:October 1995
pp. 100-106
Although many local area networks and operating systems support the use of multicast communications, multicast communications have remained primarily an interesting research tool. However, the growing research interest in multimedia and hypermedia for know...
     
Signature matching: a key to reuse
Found in: Proceedings of the 1st ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '93)
By Amy Moormann Zaremski, Jeannette M. Wing
Issue Date:December 1993
pp. 100-106
Although many local area networks and operating systems support the use of multicast communications, multicast communications have remained primarily an interesting research tool. However, the growing research interest in multimedia and hypermedia for know...
     
Specifications and their use in defining subtypes
Found in: Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications (OOPSLA '93)
By Barbara Liskov, Jeannette M. Wing
Issue Date:September 1993
pp. 99-107
Currently object-oriented technology (OOT) plays only a minor role in the computer science curriculum at most universities. This is because the curriculum is already crowded and OOT is just one of many new topics competing for a place. This paper describes...
     
Specification matching of software components
Found in: ACM Transactions on Software Engineering and Methodology (TOSEM)
By Amy Moormann Zaremski, Jeannette M. Wing
Issue Date:January 1992
pp. 333-369
Specification matching is a way to compare two software components, based on descriptions of the component's behaviors. In the context of software reuse and library retrieval, it can help determine whether one component can be substituted for another or ho...
     
Signature matching: a tool for using software libraries
Found in: ACM Transactions on Software Engineering and Methodology (TOSEM)
By Amy Moormann Zaremski, Jeannette M. Wing
Issue Date:January 1992
pp. 146-170
Signature matching is a method for organizing, navigating through, and retrieving from software libraries. We consider two kinds of software library components---functions and modules---and hence two kinds of matching---function matching and module matchin...
     
Tools and partial analysis
Found in: ACM Computing Surveys (CSUR)
By Edmund Clarke, Jeannette M. Wing
Issue Date:March 1988
pp. 116-es
Floating-point divide and square-root operations are essential to many scientific and engineering applications, and are required in all computer systems that support the IEEE floating-point standard. Yet many current microprocessors provide only weak supp...
     
Linearizability: a correctness condition for concurrent objects
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Jeannette M. Wing, Maurice P. Herlihy
Issue Date:January 1988
pp. 463-492
A concurrent object is a data object shared by concurrent processes. Linearizability is a correctness condition for concurrent objects that exploits the semantics of abstract data types. It permits a high degree of concurrency, yet it permits programmers t...
     
A behavioral notion of subtyping
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Barbara H. Liskov, Jeannette M. Wing
Issue Date:January 1988
pp. 1811-1841
The use of hierarchy is an important component of object-oriented design. Hierarchy allows the use of type families, in which higher level supertypes capture the behavior that all of their subtypes have in common. For this methodology to be effective, it i...
     
 1