Name
Affiliation
Papers
JEANNETTE M. WING
Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA, USA|c|
112
Collaborators
Citations 
PageRank 
115
6429
874.60
Referers 
Referees 
References 
9767
1373
1091
Search Limit
1001000
Title
Citations
PageRank
Year
Data for Good: Ensuring the Responsible Use of Data to Benefit Society00.342020
Transforming Probabilistic Programs for Model Checking00.342020
Ensuring Fairness Beyond the Training Data00.342020
Data for Good: Abstract.00.342018
Societal Impact of Data Science and Artificial Intelligence.00.342018
Embracing Uncertainty.00.342017
Progress in computational thinking, and expanding the HPC community.30.442016
Inverse Privacy.00.342016
Bootstrapping Privacy Compliance in Big Data Systems170.702014
A Methodology for Information Flow Experiments10.352014
Encouraging IT usage in future healthcare, quality in CS education00.342013
Formal methods: an industrial perspective.00.342013
Purpose Restrictions on Information Use.40.432013
Formalizing and Enforcing Purpose Restrictions in Privacy Policies240.862012
Jeannette M. Wing @ PCAST; Barbara Liskov keynote70.582011
On the Semantics of Purpose Requirements in Privacy Policies30.392011
Reviewing peer review.10.372011
Towards a theory of trust in networks of humans and computers161.222011
Computational thinking445158.332011
Computational thinking445158.332011
NSF funding advice: 21st century innovation110.592010
An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing30.402009
Report: Measuring the Attack Surfaces of Enterprise Software70.742009
CS woes: deadline-driven research, academic inequality10.352009
Extracting Conditional Confidentiality Policies30.412008
Five deep questions in computing113.662008
Software Security10.372007
Measuring the attack surfaces of two FTP daemons363.592006
Attack graph generation and analysis10.362006
Ranking Attack Graphs532.522006
Towards an algebra for security policies30.572005
Tools for Generating and Analyzing Attack Graphs804.622003
Platitudes and attitudes00.342003
A Call to Action: Look Beyond the Horizon80.602003
Vulnerability Analysis of Networked Systems20.412002
Automated generation and analysis of attack graphs50935.102002
Survivability Analysis Of Networked Systems516.492001
Lightweight Formal Methods504.272001
Respectful Type Converters131.642000
The First World Congress on Formal Methods in the Development of Computing Systems00.342000
Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum100.692000
NSF workshop on a software research program for the 21st century10.641999
A Nitpick Analysis of Mobile IPv683.531999
FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II4713.971999
Proving Correctness of a Controller Algorithm for the RAID Level 5 System00.341998
Formal Methods: Past, Present, and Future (Abstract)00.341998
Temporal Query Processing and Optimization in Object-Oriented Databases10.361997
A Uniform Framework for Processing Temporal Object Queries00.341997
Formal Methods Light110.901996
Tools and partial analysis40.891996
  • 1
  • 2