Jeannette M. Wing

One Microsoft Way
Microsoft Research
Redmond, WA 98052
wing@microsoft.com
(425) 706-4459
http://www.cs.cmu.edu/~wing/

Research Interests
Trustworthy computing, privacy, security, software specification and verification, distributed and concurrent systems, programming languages, programming methodology, software engineering.

Education

June 1983

Massachusetts Institute of Technology

Cambridge, MA
Ph.D. in Computer Science
Thesis: A Two-Tiered Approach to Specifying Programs.
Advisor: John Guttag.
Minor in logic and number theory.

June 1979

Massachusetts Institute of Technology

Cambridge, MA
S.M. in Electrical Engineering and Computer Science.
Thesis: Partial-Match Retrieval Using Tries, Hashing, and Superimposed Codes.
Advisors: Ronald Rivest (MIT) and John Reiser (Bell Labs).
VI-A co-operative student in Computer Science with AT&T Bell Laboratories.

June 1979

Massachusetts Institute of Technology

Cambridge, MA
S.B. in Computer Science and Engineering.
VI-A co-operative student in Computer Science with AT&T Bell Laboratories.

Employment History

2013-

Microsoft Research

Redmond, WA
Corporate Vice President, Microsoft Research, since July 2013; Head of MSR Labs, since September 2014.
Vice President, Head of Microsoft Research International, January-July 2013.

1985-

Carnegie Mellon University

Pittsburgh, PA
On leave, 2013-.
President's Professor of Computer Science, 2004-.
Head, Computer Science Department, 2004-2007, 2010-2012.
Director of Microsoft - Carnegie Mellon Center for Computational Thinking, 2007-2012.
Professor of Electrical and Computer Engineering, courtesy, 2005-.
Associate Dean for Academic Affairs, School of Computer Science, 1999-2004.
Associate Dean for Doctoral Programs, School of Computer Science, 1998.
Associate Department Head for the Ph.D. Program, Computer Science Department, 1996-2004.
Director of Specification and Verification Center, 2001-.

2007-2010

National Science Foundation

Arlington, VA
Assistant Director for the Computer and Information Science and Engineering (CISE) Directorate

2002-2003

Microsoft Research

Redmond, WA
Visiting Researcher.

1992

Massachusetts Institute of Technology

Cambridge, MA
Visiting Associate Professor of Computer Science.

1983-1985

University of Southern California (USC)

Los Angeles, CA
Assistant Professor, Computer Science Department.

1979-1983

Massachusetts Institute of Technology

Cambridge, MA
Research Assistant, Systematic Programming Development Group, Laboratory for Computer Science.
Research Assistant, Programming Methodology Group, Laboratory for Computer Science.
Teaching Assistant, Department of Electrical Engineering and Computer Science.

1982, 1981

Xerox Palo Alto Research Centers

Palo Alto, CA
Summer Research Intern, Computer Science Laboratory.

1980

USC/Information Sciences Institute

Marina del Rey, CA
Summer Research Assistant, Program Verification Group.

1976-1978

AT&T Bell Laboratories

Murray Hill and Holmdel, NJ
Research Staff/Co-op Student, Interactive Computer Systems Research Department.
Research Staff/Co-op Student, Computing Techniques Research Department.
Research Staff/Co-op Student, Operator Service Department.

Research Activities

Books, Edited Volumes

  1. D. Kroening, D. Garlan, and J.M. Wing, The Practice of Formal Methods, in progress.

  2. J.M. Wing, J.P.C. Woodcock, and J. Davies (editors), Proceedings of FM'99: First World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, Springer-Verlag, LNCS 1708 (Volume I) and 1709 (Volume II), 1999.

  3. U. Martin and J. Wing (eds.), Proceedings of the First International Workshop on Larch, Springer-Verlag, Workshops in Computing Series, 1993.

  4. J.V. Guttag and J.J. Horning (eds.) with S.J. Garland, K.D. Jones, A. Modet, and J.M. Wing, Larch: Languages and Tools for Formal Specification, Springer-Verlag, 1993.

Book Chapters (Refereed)

  1. P.K. Manadhata and J.M. Wing, "A Formal Model for a System's Attack Surface,'' Chapter 1, in Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, S. Jajodia, A. Ghosh, V. Swarup, C. Wang, and X.S. Wang, editors, Springer, 2011, pp. 1-28.

  2. J.M. Wing, "Scenario Graphs Applied to Network Security,'' Chapter 9, in Information Assurance: Survivability and Security in Networked Systems, Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy, editors, Morgan Kaufmann Publishers, Elsevier, Inc., 2008, pp. 247-277.

  3. M. Howard, J. Pincus, and J.M. Wing, "Measuring Relative Attack Surfaces,'' Chapter 8, in Computer Security in the 21st Century, D.T. Lee, S.P. Shieh, and J.D. Tygar, editors, Springer, March 2005, pp. 109-137.

  4. B.H. Liskov and J.M. Wing, "Behavioral Subtyping Using Invariants and Constraints,'' in Formal Methods for Distributed Processing, an Object Oriented Approach, Howard Bowman and John Derrick, editors, Cambridge University Press, 2001, pp. 254-280. Also available as CMU-CS-99-156, July 1999.

  5. J.M. Wing and J. Ockerbloom, "Respectful Type Converters for Mutable Types,'' in Foundations of Component Based Systems, Gary Leavens and Murali Sitaraman, editors, Cambridge University Press, 2000, pages 161-186. Also available as CMU-CS-99-142, June 1999.

  6. J.M. Wing, "A Symbiotic Relationship Between Formal Methods and Security,'' in the Proceedings of the Workshops on Computer Security, Dependability, and Assurance: From Needs to Solution, pp. 26-38. Also available as CMU-CS-98-188, December 1998.

  7. J.M. Wing, "Hints to Specifiers,'' Chapter 5 in Educational Issues of Formal Methods, edited by M. Hinchey and N. Dean, Academic Press, London, 1996, pp. 57-77. Preliminary version available as CMU-CS-95-118R, May 1995, which supersedes "Teaching Mathematics to Software Engineers,'' CMU-CS-95-118, February 1995.

  8. D.L. Detlefs, M.P. Herlihy and J.M. Wing, "Avalon/C++,'' in Advanced Language Implementation: Recent Research at Carnegie Mellon University, P. Lee, editor, MIT Press, 1991.

  9. J.M. Wing et al., "The Avalon Language,'' Part IV, Chapters 19-22, in Camelot and Avalon: A Distributed Transaction Facility, J. Eppinger, L. Mummert and A. Spector, editors, Morgan Kaufmann Publishers, Inc., 1991.

  10. M.W. Maimone, J.D. Tygar and J.M. Wing, "Formal Semantics for Visual Specification of Security,'' in Visual Languages and Visual Programming, S.-K. Chang, editor, Plenum, 1990, pp. 97-116. Also CMU-CS-88-173r.

Journal Publications

  1. Y. Gurevich, E. Hudis, and J.M. Wing, ``Inverse Privacy,'' submitted to Communications of the ACM, July 2014. Also Microsoft Research Technical Report MSR-TR-2014-100, July 2014.

  2. P.K. Manadhata and J.M. Wing "An Attack Surface Metric,'' IEEE Transactions on Software Engineering, June 2010.

  3. J.M. Wing, "Computational Thinking and Thinking about Computing,'' Philosophical Transactions of the Royal Society, vol. 366, July 2008, pp. 3717-3725.

  4. J.M. Wing, "Five Deep Questions in Computing,'' Communications of the ACM, essay, vol. 51, no. 1, January 2008, pp. 58-60.

  5. J.M. Wing, "Computational Thinking,'' Communications of the ACM, viewpoint, vol. 49, no. 3, March 2006, pp. 33-35. Chinese translation in Communications of CCF, vol. 3 no. 11, November 2007, pp. 83-85. French translation, by Pierre Lescanne, in Bulletin of SPECIF, December 2008.

  6. K.W. Lye and J.M. Wing, "Game Strategies in Network Security,'' International Journal of Information Security, February 2005, 4(1-2), pp. 71-86..

  7. J.M. Wing, "Beyond the Horizon: A Call to Arms,'' IEEE Security and Privacy, November/December 2003, pp. 62-67.

  8. D. Kindred and J.M. Wing, "Theory Generation for Security Protocols'', in progress.

  9. J.M. Wing and J. Ockerbloom, "Respectful Type Converters,'' IEEE Transactions on Software Engineering, vol. 26, no. 7, July 2000, pp. 579-593; also CMU-CS-98-130.

  10. D. Jackson, Y. Ng, and J.M. Wing, "A Nitpick Analysis of Mobile IPv6,'' Formal Aspects of Computing, vol. 11, no. 6, 1999, pp. 591-615; also CMU-CS-98-113, March 1998.

  11. H.S. Chadha, J.W. Baugh Jr., and J.M. Wing, "Formal Specification of Concurrent Systems,'' Advances in Engineering Software (read by civil and mechanical engineers), vol 30, no. 3, March 1999, pp. 211-224.

  12. G. Leavens and J.M. Wing, "Protective Interface Specifications,'' Formal Aspects of Computing, vol. 10, March 1998, pp. 59-75.

  13. A.M. Zaremski and J.M. Wing, "Specification Matching of Software Components,'' ACM Trans. on Software Engineering and Methodology, vol. 6, no. 4, October 1997, pp. 333-369. Shorter version published in Proceedings of SIGSOFT Foundations of Software Engineering, October 1995, pp. 6-17; recommended by program committee for submission to TOSEM; also CMU-CS-95-127, March 1995. 2012 SIGSOFT Retrospective Paper Award (for FSE paper).

  14. J.M. Wing and M. Vaziri-Farahani, "A Case Study in Model Checking Software Systems,'' Science of Computer Programming, vol. 28, 1997, pp. 273-299; also CMU-CS-96-124. Shorter version published as "Model Checking Software Systems: A Case Study,'' Proceedings of SIGSOFT Foundations of Software Engineering, October 1995, pp. 128-139; also CMU-CS-95-128, March 1995.

  15. E.M. Clarke and J.M. Wing, "Formal Methods: State of the Art and Future Directions,'' ACM Computing Surveys, vol. 28, no. 4, December 1996, pp. 626-643. Available as CMU-CS-96-178.

  16. L. Mummert, J.M. Wing and M. Satyanarayanan, "Using Belief to Reason about Cache Coherence in Distributed File Systems,'' submitted to The Chicago Journal of Theoretical Computer Science, December 1994. Shorter version published as "Using Belief to Reason about Cache Coherence,'' in Proceedings of the Symposium on Principles of Distributed Computing, August 1994, pp. 71-80. Recommended by program committee for submission to CJTCS; also CMU-CS-94-151R, December 1994.

  17. D. Jackson and J. Wing, "Lightweight Formal Methods,'' IEEE Computer, April 1996, pp. 21-22.

  18. A.M. Zaremski and J.M. Wing, "Signature Matching, a Tool for Software Libraries,'' ACM Trans. on Software Engineering and Methodology, vol. 4, no. 2, April 1995, pp. 146-170. Shorter version published as "Signature Matching: A Key to Reuse,'' in Proceedings of SIGSOFT Foundations of Software Engineering, December 1993. Recommended by program committee for submission to TOSEM; also CMU-CS-93-151, May 1993.

  19. B.H. Liskov and J.M. Wing, "A Behavioral Notion of Subtyping,'' ACM Trans. on Prog. Lang. and Systems, vol. 16, no. 6, November 1994, pp. 1811-1841.

  20. N. Haines, D. Kindred, J.G. Morrisett, S.M. Nettles and J.M. Wing, "Composing First-Class Transactions,'' ACM Trans. on Prog. Lang. and Systems, Short Communications, vol. 16, no. 6, November 1994, pp. 1719-1736.

  21. J.M. Wing and C. Gong, "Testing and Verifying Concurrent Objects,'' Journal of Parallel and Distributed Computing, vol. 17, 1993, pp. 164-182.

  22. M.P. Herlihy and J.M. Wing, "Specifying Graceful Degradation,'' IEEE Trans. on Parallel and Distributed Computing, vol. 2, no. 1, January 1991, pp. 93-104; preliminary version in CMU-CS-87-120 March 1988. Shorter version published as "Specifying Graceful Degradation in Distributed Systems,'' in Proceedings of the 6th Symposium on Principles on Distributed Computing, Vancouver, Canada, August 1987, pp. 167-177; also CMU-CS-87-120, May 1987.

  23. A. Heydon, M. Maimone, D. Tygar, J.M. Wing and A.M. Zaremski, "Miro: Visual Specifications of Security,'' IEEE Trans. on Software Engineering, vol. 16, no. 10, October 1990, pp. 1185-1197. Also CMU-CS-89-199, November 1989.

  24. J.M. Wing, "Using Larch to Specify Avalon/C++ Objects,'' IEEE Trans. on Software Engineering, vol. 16, no. 9, September 1990, pp. 1076-1088.

  25. J.M. Wing, "A Specifier's Introduction to Formal Methods,'' IEEE Computer, vol. 23, no. 9, September 1990, pp. 8-24. Also CMU-CS-90-136, May 1990, superseding CMU-CS-89-200, "What is a Formal Method?,'' November 1989.

  26. M.P. Herlihy and J.M. Wing, "Linearizability: A Correctness Condition for Concurrent Objects,'' ACM Trans. on Prog. Lang. and Systems, vol. 12, no. 3, July 1990, pp. 463-492; also CMU-CS-88-120, November 1987. Shorter version published as "Axioms for Concurrent Objects,'' in Proceedings of the 14th Symposium on Principles of Programming Languages, Munich, W. Germany, January 21-23, 1987, pp. 13-26; also CMU-CS-86-154, October 1986.

  27. J.M. Wing, "Verifying Atomic Data Types,'' International Journal of Parallel Programming, vol. 18, no. 5, 1989, pp. 315-357.

  28. M.R. Barbacci, D.L. Doubleday, C.B. Weinstock and J.M. Wing, "Developing Applications for Heterogeneous Machine Networks: The Durra Environment,'' Computing Systems, vol. 2, no. 1, March 1989, pp. 7-35.

  29. J.M. Wing and M. Nixon, "Extending Ina Jo with Temporal Logic,'' IEEE Trans. on Software Engineering, vol. 15, no. 2, February 1989, pp. 181-197. Shorter version in 1986 IEEE Symposium on Security and Privacy, Oakland, California, April 1986, pp. 2-13.

  30. D.L. Detlefs, M.P. Herlihy and J.M. Wing, "Inheritance of Synchronization and Recovery Properties in Avalon/C++,'' IEEE Computer, vol. 21, no. 12, December 1988, pp. 57-69. Also CMU-CS-87-133, June 1987.

  31. J.M. Wing, "A Study of Twelve Specifications of the Library Problem,'' IEEE Software, vol. 5, no. 4, July 1988, pp. 66-76. Runner-up for 1988 IEEE Software Best Paper Award. Also CMU-CS-87-142, July 1987.

  32. J.M. Wing, "Writing Larch Interface Language Specifications,'' ACM Trans. on Prog. Lang. and Systems, vol. 9, no. 1, January 1987, pp. 1-24.

  33. J.V. Guttag, J.J. Horning and J.M. Wing, "The Larch Family of Specification Languages,'' IEEE Software, vol. 2, no. 5, September 1985, pp. 24-36.

  34. J.V. Guttag, and J.J. Horning and J.M. Wing, "Some Remarks on Putting Formal Specifications to Productive Use,'' Science of Computer Programming, vol. 2, no. 1, October 1982, pp. 53-68.

Refereed Conference and Workshop Papers

  1. S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, and J.M. Wing, "Bootstrapping Privacy Compliance in Big Data Systems,'' in 35th IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 18--21, 2014. Best Student Paper Award. Also Microsoft Research Technical Report MSR-TR-2014-36, March 2014.

  2. M.C. Tschantz, A. Datta, and J.M. Wing, "Purpose Restrictions on Information Use,'' in Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), Egham, UK, September 9-11, 2013. Also CMU-CS-13-116 and CMU-CyLab-13-005, June 2013.

  3. M.C. Tschantz, A. Datta, and J.M. Wing, "Formalizing and Enforcing Purpose Restrictions of Privacy Policies,'' in Proceedings of IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 20-23, 2012. Also CMU-CS-12-106 (full version), March 2012.

  4. V. Gligor and J.M. Wing, "Towards a Theory of Trust in Networks of Humans and Computers,'' in Proceedings of Nineteenth International Workshop on Security Protocols, Cambridge, England, March 28-30, 2011, Lecture Notes in Computer Science, Springer-Verlag, Invited Paper.

  5. M.C. Tschantz and J.M. Wing, "Formal Methods for Privacy,'' in Proceedings of Formal Methods 2009, Eindhoven, The Netherlands, Lecture Notes in Computer Science, Springer-Verlag, November 2009, pp. 1-15. Invited Paper. Also CMU-CS-TR-09-154, August 2009.

  6. P.K. Manadhata, Y. Karabulut, and J.M. Wing, "Report: Measuring the Attack Surface of SAP Platforms and Business Applications,'' in Proceedings of the International Symposium Symposium on Engineering Secure Software and Systems, Industry Track, Leuven, Belgium, February 4-6, 2009, pp. 91-100.

  7. P.K. Manadhata, Y. Karabulut, and J.M. Wing, "Measuring the Attack Surfaces of SAP Systems,'' in Proceedings of the 19th IEEE International Symposium on Software Reliability Engineering, Industry Track (only abstract and presentation published), Redmond, WA, November 11-14, 2008.

  8. M.C. Tschantz and J.M. Wing, "Extracting Conditional Confidentiality Policies,'' in Proceedings of the 6th IEEE International Conference on Software Engineering and Formal Methods, Cape Town, South Africa, November 10-14, 2008, pp. 107-116. Best Paper Award. Preliminary version available as CMU-CS-08-127 Technical Report, May 2008.

  9. P.K Manadhata, J.M. Wing, M.A. Flynn, and M.A. McQueen, "Measuring the Attack Surfaces of Two FTP Daemons,''in Proceedings of Quality of Protection Workshop, Alexandria, VA, October 30, 2006, pp. 3-10.

  10. V. Mehta, C. Bartzis, H. Zhu, E.M. Clarke, and J.M. Wing, "Ranking Attack Graphs,'' in Proceedings of Recent Advances in Intrusion Detection 2006, Hamburg Germany, Sept. 20-22, 2006, pp. 127-144.

  11. P.K. Manadhata and J.M. Wing, "An Attack Surface Metric,'' First Workshop on Security Metrics, Vancouver, BC, August 1, 2006, position paper.

  12. J.M. Wing, "Scenario Graphs Applied to Security,'' in Proceedings of Verification of Infinite State Systems with Applications to Security (VISSAS) 2005, Timisoara, Romania, March 2005, extended abstract, pp. 229-234.

  13. J. Pincus and J.M. Wing, "Towards an Algebra for Security Policies,'' Proceedings of 26th International Conference on Applications and Theory of Petri Nets, Miami, FL, June 2005, extended abstract, pp. 17-25.

  14. O. Sheyner and J.M. Wing, "Tools for Generating and Analyzing Attack Graphs,'' Proceedings of Workshop on Formal Methods for Components and Objects, 2004, pp. 344-371.

  15. M. Howard, J. Pincus, and J.M. Wing, "Measuring Relative Attack Surfaces,'' Proceedings of Workshop on Advanced Developments in Software and Systems Security, Taipei, December 2003. Also CMU-CS-03-169 Technical Report, August 2003.

  16. T.M. Wong, C. Wang, and J.M. Wing, "Verifiable Secret Redistribution for Archive Systems,'' Proceedings of the First International Security in Storage Workshop, Maryland, December 2002.

  17. K.W. Lye and J.M. Wing, "Game Strategies in Network Security,'' in the Proceedings of the Foundations of Computer Security Workshop 2002, July 26, 2002, Copenhagen, Denmark. Longer version available as CMU-CS-02-136, May 2002.

  18. S. Jha, O. Sheyner, and J.M. Wing, "Two Formal Analyses of Attack Graphs,'' Proceedings of the 15th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002, pp. 49-63.

  19. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing, "Automated Generation and Analysis of Attack Graphs,'' Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.

  20. S. Jha and J. Wing, "Survivability Analysis of Networked Systems,'' Proceedings of the International Conference on Software Engineering, Toronto, Canada, May 2001. Preliminary version available as CMU-CS-00-168, October 2000.

  21. J. Wing, "Towards a Science of Survivability: A Research Agenda and a Specific Method,'' Proceedings of the Third Information Survivability Workshop (ISW-2000),'' Boston, MA, October 24-26, 2000. Position paper.

  22. O. Sheyner and J. Wing, "Composing Proofs of Security Protocols Using Isabelle/IOA,'' Proceedings of the Theorem Proving for Higher Order Logics (TPHOLs) Workshop, short paper, August 2000. Longer version available as CMU-CS-00-106.

  23. N. Hopper, S. Seshia, and J. Wing, "A Comparison and Combination of Theory Generation and Model Checking for Security Protocol Analysis,'' Proceedings of the Workshop on Formal Methods and Security, July 2000; earlier version available as CMU-CS-00-107.

  24. S. Jha, J.M. Wing, R. Linger, and T. Longstaff, "Analyzing Survivability Properties of Specifications of Networks,'' Proceedings of the International Conference on Dependable Systems and Networks, Workshop on Dependability Despite Malicious Faults, New York City, NY, June 25-28, 2000, pp. 613-622.

  25. M. Vaziri, N. Lynch, and J.M. Wing, "Proving the Correctness of a Controller Algorithm for the RAID Level 5 System,'' Proceedings of the International Symposium on Fault-Tolerant Computing, June 1998; also CMU-CS-98-117, March 1998.

  26. J.M. Wing, "Subtyping for Distributed Object Stores,'' Proceedings of the Second IFIP International Workshop on Formal Methods for Open Object-based Distributed Systems (FMOODS), July 1997, pp. 305-318. Invited Paper. Also CMU-CS-97-121, April 1997.

  27. Gary T. Leavens and J.M. Wing, "Protective Interface Specifications,'' Proceedings of TAPSOFT '97 Theory and Practice of Software Development, 7th International Joint Conference CAAP/FASE, Lecture Notes in Computer Science 1214, April 1997, pp. 520-534. Also CMU-CS-96-129R, October 1996. Earlier version appeared as "Protection from the Underspecified,'' CMU-CS-96-129 and Iowa State University Dept. of Computer Science TR96-04, April 1996.

  28. D. Kindred and J.M. Wing, "Fast, Automatic Checking of Security Protocols,'' Proc. of the USENIX 1996 Workshop on Electronic Commerce, Oakland, CA, November 1996, pp. 41-52. Also CMU-CS-96-173, September 1996.

  29. N. Heintze, J.D. Tygar, J.M. Wing, and H.-C. Wong, "Model Checking Electronic Commerce Protocols,'' Proc. of the USENIX 1996 Workshop on Electronic Commerce, Oakland, CA, November 1996, pp. 147-164.

  30. J.M. Wing, "Teaching Mathematics to Software Engineers,'' Proceedings of the Fourth International Conference on Algebraic Methodology and Software Technology (AMAST '95), Montreal, Canada, July 3, 1995, pp. 18-40. Invited Paper. Also CMU-CS-95-118, March 1995; superseded by CMU-CS-95-118R, May 1995.

  31. J.M. Wing and D.C. Steere, "Specifying Weak Sets,'' Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, May 30-June 2, 1995. Also CMU-CS-94-194, October 1994.

  32. D. Garlan, G. Abowd, D. Jackson, J. Tomayko, and J.M. Wing, "The CMU Master of Software Engineering Core Curriculum,'' Proceedings of the Eighth SEI Conference on Software Engineering Education (CSEE), New Orleans, Lecture Notes in Computer Science 895, Springer-Verlag, March-April 1995, pp. 65-86.

  33. Harpreet S. Chadha, John W. Baugh Jr., and J.M. Wing, "Formal Specification of AEC Product Models,'' Computing in Civil Engineering: Proceedings of the First Congress, K. Khozeimeh, ed., American Society of Civil Engineers (ASCE), Washington, DC, June pp. 571-578, 1994.

  34. J.M. Wing, "Decomposing and Recomposing Transactional Concepts,'' Proceedings of the Workshop on Object-based Distributed Programming, Lecture Notes in Computer Science 791, R. Guerraoui, O. Nierstrasz, and M. Riveill (editors), Springer-Verlag, pp. 111-121, 1994.

  35. B. Liskov and J.M. Wing, "Specifications and Their Use in Defining Subtypes,'' Proceedings of OOPSLA '93, September 1993, pp. 16-28. Also reprinted by permission from ACM in Proceedings of ZUM '95, Lecture Notes in Computer Science, Springer-Verlag, September 1995, pp. 245-263.

  36. B. Liskov and J.M. Wing, "A New Definition of the Subtype Relation,'' Proceedings of ECOOP '93, Lecture Notes in Computer Science 707, Springer-Verlag, July 1993, pp. 118-141. Also CMU-CS-93-149, April 1993; MIT LCS Programming Methodology Group Memo 76, May 1993.

  37. J.M. Wing, M. Faehndrich, J.G. Morrisett, and S.M. Nettles, "Extensions to Standard ML to Support Transactions,'' Proceedings of ACM SIGPLAN Workshop on ML and its Applications, June 20-21, 1992, San Francisco, CA, pp 104-118. Also CMU-CS-92-132, April 1992.

  38. J.M. Wing, "Revisiting Abstraction Functions for Reasoning About Concurrency,'' Proceedings of the Fifth Refinement Workshop, British Computer Society, Springer-Verlag, C.B. Jones, R.C. Shaw, and T. Denvir, editors, 1992, pp. 298-300. Extended abstract. Invited Paper.

  39. S.M. Nettles and J.M. Wing, "Persistence + Undoability = Transactions,'' Proceedings of Hawaii International Conference on Systems Science 25, January 1992. Also CMU-CS-91-173, August 1991.

  40. J.M. Wing and A.M. Zaremski, "Unintrusive Ways to Integrate Formal Specifications in Practice,'' Proceedings VDM '91, Lecture Notes in Computer Science 551, Springer-Verlag, October 1991, Delft, The Netherlands, pp. 545-569. Also CMU-91-113, February 1991.

  41. J.M. Wing and A.M. Zaremski, "A Formal Specification of a Visual Language Editor,'' Proceedings of the Sixth International Workshop on Software Specification and Design, October 1991, Como, Italy, pp. 120-129. Also CMU-91-112, February 1991.

  42. E.R. Rollins and J.M. Wing, "Specifications as Search Keys for Software Libraries,'' Proceedings of the Eighth International Conference on Logic Programming, Paris, June 1991. Also CMU-90-159, September 1990.

  43. J.M. Wing and C. Gong, "Experience with the Larch Prover,'' Proceedings of the ACM Workshop on Formal Methods in Software Development,'' Napa, CA, May 1990, pp. 140-143.

  44. J.M. Wing, "Verifying Atomic Data Types,'' Proceedings of the REX Workshop on Stepwise Refinement of Distributed Systems: Models, Formalism, Correctness, May 29-June 2, 1989, Plasmolen, The Netherlands, Lecture Notes in Computer Science 430, Springer-Verlag, 1990, pp. 731-758. Invited Paper. Also CMU-CS-89-168, July 1989.

  45. M.R. Barbacci and J.M. Wing, "A Language for Distributed Applications,'' Proceedings of the 1990 International Conference on Computer Languages, March 1990, New Orleans, pp. 59-68.

  46. S.M. Clamen, L.D. Leibengood, S.M. Nettles and J.M. Wing, "Reliable Distributed Computing with Avalon/Common Lisp,'' Proceedings of the 1990 International Conference on Computer Languages, March 1990, New Orleans, pp. 169-179. Also CMU-CS-89-186, September 1989.

  47. A. Heydon, M. Maimone, J.D. Tygar, J.M. Wing and A.M. Zaremski, "Miro Tools,'' Proceedings of the IEEE 1989 Workshop on Visual Languages, Rome, Italy, October 1989, pp. 86-91. Also CMU-CS-89-159, July 1989.

  48. A. Heydon, M. Maimone, J.D. Tygar, J.M. Wing and A.M. Zaremski, "Constraining Pictures with Pictures,'' Proceedings of IFIPS '89, San Francisco, CA, August 1989, pp. 157-162. Also CMU-CS-88-185, November 1988.

  49. M.P. Herlihy and J.M. Wing, "Specifying Security Constraints with Relaxation Lattices,'' Proceedings of the Computer Security Foundations Workshop II, Franconia, NH, June 1989, pp. 47-53.

  50. J.M. Wing, "Specifying Avalon Objects in Larch,'' Proceedings of the International Joint Conference on Theory and Practice of Software Development (TAPSOFT), Barcelona, March 13-17, 1989, Lecture Notes in Computer Science 352, Springer-Verlag, pp. 61-80. Invited Paper. Also CMU-CS-88-208, December 1988.

  51. M.W. Maimone, J.D. Tygar and J.M. Wing, "Miro Semantics for Security,'' Proceedings of the IEEE 1988 Workshop on Visual Languages, Pittsburgh, PA, October 1988, pp. 45-51. Also CMU-CS-88-173, August 1988.

  52. M.P. Herlihy and J.M. Wing, "Reasoning About Atomic Objects,'' Proceedings of the Symposium on Formal Techniques in Real-time and Fault-tolerant Systems, 22-23 September 1988, Warwick, U.K., Lecture Notes in Computer Science 331, Springer-Verlag, pp. 193-208. Preliminary version in CMU-CS-87-176, March 1988.

  53. J.M. Wing, "Specifying Recoverable Objects,'' Proceedings of the Sixth Annual Pacific Northwest Software Quality Conference, Portland, OR, September 1988, pp. 317-331. Also CMU-CS-88-170, July 1988.

  54. M.R. Barbacci, C.B. Weinstock and J.M. Wing, "Programming at the Processor-Memory-Switch Level,'' Proceedings of the Tenth International Conference on Software Engineering, Singapore, March 1988, pp. 19-28.

  55. D.L. Detlefs, M.P. Herlihy and J.M. Wing, "Inheritance of Synchronization and Recovery Properties in Avalon/C++,'' Proceedings of the Hawaii International Conference on Systems Science, January 1988.

  56. M.R. Barbacci, C.B. Weinstock and J.M. Wing, "Durra: Language Support for Large Grained Parallelism,'' Proceedings of the International Conference on Parallel Processing and Applications, L'Aquila, Italy, September 1987.

  57. J.D. Tygar and J.M. Wing, "Visual Specification of Security Constraints,'' Proceedings of the 1987 Workshop on Visual Languages, August 19-21, 1987, Linkoping, Sweden. Also CMU-CS-87-122, May 1987.

  58. M.R. Barbacci and J.M. Wing, "Durra: A Task-level Description Language,'' Proceedings of the 16th Annual International Conference on Parallel Processing, St. Charles, IL, August 1987, pp. 370-380.

  59. M.P. Herlihy and J.M. Wing, "Avalon: Language Support for Reliable Distributed Systems,'' Proceedings of the 17th International Symposium on Fault-Tolerant Computing, Pittsburgh, PA, July 1987, pp. 89-94. Also CMU-CS-86-167, December 1986.

  60. M.R. Barbacci and J.M. Wing, "Specifying Functional and Timing Behavior for Real-Time Applications,'' Proceedings of the Conference on Parallel Architectures and Languages Europe (PARLE), vol. 2, Eindhoven, Lecture Notes in Computer Science 259, Springer-Verlag, June 1987, pp. 124-140. Also CMU-CS-86-177, CMU/SEI-86-TR-4, December 1986.

  61. J.M. Wing, "A Larch Specification of the Library Problem,'' Proceedings of the Fourth International Workshop on Software Specification and Design, Monterey, CA, April 1987, pp. 34-41. Also CMU-CS-86-168, December 1986.

  62. F. Arbab and J.M. Wing, "Geometric Reasoning: A New Paradigm for Processing Geometric Information,'' Proceedings of the International Symposium on New Directions in Computing, sponsored by the IEEE Computer Society, Norwegian Institute of Technology, Trondheim, Norway, August 12-14, 1985, pp. 80-89. Also in Proceedings on IFIP Design Theory for CAD, Tokyo, Japan, October 1985.

  63. J.M. Wing, "Specification Firms: A Vision for the Future,'' Proceedings of the Third International Workshop on Software Specification and Design, London, August 26-27, 1985, pp. 241-243.

  64. F. Arbab and J.M. Wing, "Geometric Reasoning for Geometric Modeling,'' AIAA/AHS/ASEE Aircraft Design, Systems and Operations Conference, AIAA, Colorado Springs, Colorado, October 14-16, 1985; abstract presented at SIAM Conference on Geometric Modeling and Robotics, Albany, New York, July 15-19, 1985.

  65. F. Arbab and J.M. Wing, "Geometric Reasoning for Geometric Modeling,'' Proceedings of the IASTED International Conferences on Computer-Aided Design Applications,'' Montreal, Canada, June 4-6, 1985.

  66. D. Berry and J.M. Wing, "Specifying and Prototyping: Some Thoughts on Why They Are Successful,'' Proceedings of the International Joint Conference on Theory and Practice of Software Development (TAPSOFT) Volume 2, Berlin, West Germany, Lecture Notes in Computer Science 186, Springer-Verlag, March 1985, pp. 117-128. Also USC Computer Science TR-85-329, July 1985.

  67. J.M. Wing, "Helping Specifiers Evaluate Their Specifications,'' Proceedings of AFCET Second International Conference on Software Engineering, Nice, France, June 4-6, 1984, pp. 179-189. Also USC Computer Science TR-85-330, July 1985.

Unrefereed Abstracts, Papers, Reports, Columns, Blogs

  1. J.M. Wing, "Computational Thinking Benefits Society,'' Social Issues in Computing, 40th Anniversary Blog, University of Toronto, January 9, 2014.

  2. J.M.Wing, "NITRD 20: A Day in Your Life,'' Blog@CACM, March 26, 2012.

  3. J.M. Wing, "Happy 20th Birthday to NITRD,'' Blog@CACM, March 26, 2012.

  4. J.M. Wing, "A Futuristic Health IT Scenario,'' Blog@CACM, November 8, 2011.

  5. J.M. Wing, "Connecting Science to Society,'' Blog@CACM, October 14, 2011.

  6. J.M. Wing, "Yes, Computer Scientists are Hypercritical,'' Blog@CACM, October 6, 2011.

  7. J.M. Wing, "Call to Arms: Science and Engineering for Privacy,'' Blog@CACM, March 21, 2011.

  8. J.M. Wing, "Usable Verification: Balancing Thinking and Automating,'' Usable Verification Workshop, October 23, 2010, position paper.

  9. J.M. Wing, "Talking with PCAST,'' Blog@CACM, September 15, 2010.

  10. J.M. Wing, "Why Peer Review Matters,'' Blog@CACM, September 7, 2010. Also CACM, Vol. 54, No. 7, July 2011.

  11. H.E. Seidel and J.M. Wing, preface to inaugural issue of Journal of Computational Science, P.M.A. Sloot, editor, Elsevier, April 2010. To appear.

  12. J.M. Wing, "Understanding Network Complexity,'' in Proceedings of the Second IEEE International Workshop on Network Science for Communications Networks, San Diego, CA, March 19, 2010.

  13. J.M. Wing, "FY10 and FY11 Funding Opportunities for the Computing Community,'' Computing Research Association, vol. 22, no. 2, March 2010.

  14. A. de Strulle, J. Ferrini-Mundy, H. Hirsh, S.-S. Lim, M. Maher, E. Rom, J.M. Wing (Chair), and S. Winter, "Connecting Learning and Education for a Knowledge Society,'' Internal Task Force on Innovation in Learning and Education, National Science Foundation, internal paper, January 30, 2010.

  15. J.M. Wing, "Twelve Tips for Department Heads from an NSF Perspective,'' Blog@CACM, December 10, 2009. Also CACM, Vol. 53, No. 5, May 2010.

  16. J.M. Wing, "Computing and Administration Priorities,'' Computing Research Association, vol. 21, no. 5, November 2009.

  17. J.M. Wing, "Breaking the Cycle,'' Blog@CACM, August 21, 2009. Also CACM, Vol. 52, No. 12, December 2009.

  18. J.M. Wing, "Windmills in the Water,'' Blog@CACM, June 7, 2009.

  19. J.M. Wing, "When the White House Calls...,'' Blog@CACM, June 2, 2009.

  20. J.M. Wing, "Educating Future Generations in Computing,'' Computing Research Association, vol. 21, no. 2, March 2009.

  21. J.M. Wing, "A Simple View of the Budget Process,'' Blog@CACM, February 7, 2009.

  22. E. Lazowska, M. Pollack, D. Reed, and J.M. Wing, "Boldly Exploring the Endless Frontier,'' Computing Research Association, vol. 21, no. 1, January 2009.

  23. J.M. Wing, "Cyber-Physical Systems,'' Computing Research Association, vol. 21, no. 1, January 2009.

  24. J.M. Wing, "A^7: Anywhere Anytime Affordable Access to Anything by Anyone Authorized,'' Computing Research Association, vol. 20, no. 5, November 2008.

  25. J.M. Wing, "Data-Intensive Computing,'' Computing Research News, Computing Research Association, vol. 20, no. 2, March 2008, p. 3.

  26. J.M. Wing, "Thinking About Computing,'' Computing Research News, Computing Research Association, vol. 19, no. 5, November 2007, p. 3.

  27. S. Tekinay and J.M. Wing, "Cyber-enabled Discovery and Innovation,'' Computing Research News, Computing Research Association, November 2007, vol. 19, no. 5, November 2007, pp. 1 and 7.

  28. J.M. Wing, "Software Security,'' Proceedings of First IEEE and IFIP International Symposium on Theoretical Aspects of Software Engineering, Shanghai, China, June 2007.

  29. J.M. Wing, "FAQ on Pi-Calculus,'' Microsoft Internal Memo, December 2002.

  30. J. M. Wing, "Platitudes and Attitudes,'' Software Tools for Technology Transfer, editorial board opinion piece, Volume 4, Number 3, May 2003, pp. 261-265.

  31. J.M. Wing, "What, Who, and How of Tomorrow,'' Monterey Workshops: Radical Innovations of Software and Systems Engineering in the Future, Venice, Italy, October 6-10, 2002, pp. 400-403.

  32. J.M. Wing, "Mathematics in Computer Science Curricula,'' Sixth International Conference on Mathematics of Program Construction, Dagstuhl, Germany, July 8-10, 2002. Abstract of invited talk, p. 22.

  33. J.M. Wing, "Modeling Unpredictable or Random Environments,'' Using Uncertainty Within Computation, AAAI 2001 Fall Symposium, Technical Report FS-01-04, AAAI Press, North Falmouth, Cape Cod, MA, November 2001, pp. 144-145.

  34. J.M. Wing, "Weaving Formal Methods into the Undergraduate Computer Science Curriculum,'' in the Proceedings of the Eighth International Conference on Algebraic Methodology and Software 2000, Iowa City, IA, May 2000, Lecture Notes in Computer Science 1816, Springer-Verlag, pp. 2-7. Extended abstract of invited talk.

  35. D. Kindred and J.M. Wing, "Closing the Idealization Gap with Theory Generation,'' extended abstract, Proceedings of the DIMACS Workshop on Cryptographic Protocol Design and Verification, Rutgers, NJ, September 3-5, 1997.

  36. J.M. Wing (editor), "Report of the Committee of Visitors for Programs in the Division of Computer and Computation Research,'' July 1996.

  37. J.M. Wing (editor), "Report of the Committee of Visitors for the CISE Institutional Infrastructure Program,'' November 1995.

  38. J.M. Wing, "Hints for Writing Specifications,'' in Proceedings of the Z Users' Meeting '95, September 1995. One-page abstract.

  39. D.T. Steere, M. Satyanarayanan, and J.M. Wing, "Dynamic Sets for Search,'' in Proceedings of the Symposium on Principles of Distributed Computing, August 1994, Brief Announcement (one-page abstract), p. 397.

  40. F. Bamberger, P. Ford, and J.M. Wing, "Interoperability,'' section in R&D for the NII: Technical Challenges, report edited by M.K. Vernon, E.D. Lazowska, and S.D. Personick, Interuniversity Communications Council, Inc. (EDUCOM), 1994.

  41. J.M. Wing, "Formal Methods,'' Encyclopedia of Software Engineering, John Wiley & Sons, Inc., New York, 1994, pp. 504-517. Revision in Second Edition.

  42. B. Liskov and J.M. Wing, "Corrigenda to ECOOP '93 Paper,'' ACM SIGPLAN Notices, Volume 29, Number 4, April 1994, p. 4.

  43. J.M. Wing, "Composing Transactional Concepts,'' ECOOP '93 Workshop on Object-based Distributed Programming, Kaiserslautern, Germany, July 1993.

  44. J.M. Wing, E.R. Rollins, and A.M. Zaremski, "Thoughts on a Larch/ML and a New Application for LP,'' Proceedings of the First International Workshop on Larch, July 13-15, 1992, Dedham, MA. Also CMU-CS-92-135, July 1992.

  45. J.M. Wing, "Specifications in Software Development,'' Proceedings of the Seventh Annual Symposium on Logic in Computer Science, June, 1992. Abstract of Invited Tutorial.

  46. J.M. Wing and A.M. Zaremski, "Two Ways to Integrate Formal Specifications in Practice,'' Proceedings of Formal Methods '91, Drymen, Scotland, September 24-27, 1991, position paper.

  47. J.M. Wing, "Program Specification'' and "Formal Methods,'' Encyclopedia of Computer Science, A. Ralston and E.D. Reilly (eds.), Van Nostrand Reinhold, Third Edition, 1993, pp. 564-565, 1107-1111.

  48. L.D. Leibengood, J.G. Morrisett, S.M. Nettles and J.M. Wing, "ML as a Basis for Distributed Object Management,'' Standard ML Workshop, Princeton University, June 7-8, 1990.

  49. M.R. Barbacci, D.L. Doubleday, C.B. Weinstock and J.M. Wing, "The Durra Language and Runtime Environment: Tools for PMS-Level Programming,'' Proceedings of the IFIP Working Conference on Decentralized Systems, Lyon, France, December 11-13, 1989.

  50. S.M. Clamen, L.D. Leibengood, S.M. Nettles and J.M. Wing, "An Overview of Avalon/Common Lisp,'' Proceedings of the Third Workshop on Large Grained Parallel Programming, Pittsburgh, October 10-11, 1989.

  51. M.R. Barbacci, D.L. Doubleday, C.B. Weinstock and J.M. Wing, "A Status Report on Durra: A Tool for PMS-Level Programming,'' Proceedings of the Third Workshop on Large Grained Parallel Programming, Pittsburgh, October 10-11, 1989.

  52. M.P. Herlihy and J.M. Wing, "Linearizable Concurrent Objects,'' Proceedings of the ACM SIGPLAN Workshop on Object-Based Concurrent Programming, SIGPLAN Notices, Vol 24, No. 4, April 1989, pp. 133-135.

  53. A. Heydon, M.W. Maimone, A.F. Moormann, J.D. Tygar and J.M. Wing, "Miro: A Visual Language for Specifying Security,'' UNIX Security Workshop, Portland, OR, August 29-30, 1988.

  54. D.L. Detlefs, M.P. Herlihy and J.M. Wing, "Avalon/C++: C++ Extensions for Transaction-Based Programming,'' Proceedings of the 1987 USENIX Workshop on C++, Santa Fe, NM, November 8-10, 1987.

  55. M. Barbacci and J.M. Wing, "Task-level Application Descriptions,'' Workshop on Large Grained Parallelism, Providence, RI, October 27-29, 1986.

  56. J.M. Wing, "Role of Formal Specifications,'' NRL Invitational Workshop on Testing and Proving, ACM SIGSOFT Software Engineering Notes, vol. 11, no. 5, October 1986.

  57. J.M. Wing, "Beyond Functional Behavior: Combining Methods to Specify Different Classes of Properties of Large Systems,'' Proceedings of Verification Workshop III, Watsonville, CA, February 18-21, 1985, ACM SIGSOFT Software Engineering Notes, vol. 10, no. 4, August 1985, pp. 102-104.

  58. J.M. Wing, "Strength and Essentiality of Specifications,'' Workshop Notes: International Workshop on Models and Languages for Software Specification and Design, edited by Robert Babb, Department d'Informatique, Universite Laval, Quebec, DIUL-RR-8408, March 1984, pp. 178-181.

Technical Reports (not already listed above)

  1. M.C. Tschantz, A. Datta, A. Datta, and J.M. Wing, "A Methodology for Information Flow Experiments,'' arXiv:1405.2376 Technical Report, May 2014.

  2. M.C. Tschantz, A. Datta, and J.M. Wing, "Information Flow Investigations,'' CMU-CS-08-118, June 2013.

  3. M.C. Tschantz, A. Datta, and J.M. Wing, "On the Semantics of Purpose Requirements in Privacy Policies,'' CMU-CS-11-102, February 2011.

  4. P.K. Manadhata, Y. Karabulut, and J.M. Wing, "Measuring the Attack Surfaces of SAP Business Applications,'' CMU-CS-08-134 Technical Report, May 2008.

  5. P.K. Manadhata, K. Tan, R. Maxion, and J.M. Wing, "An Approach to Measuring a System's Attack Surface,'' CMU-CS-07-146 Technical Report, August 2007.

  6. P.K. Manadhata, D. Kaynar, and J.M. Wing, "A Formal Model for a System's Attack Surface,'' CMU-CS-07-144 Technical Report, July 2007.

  7. Alberts et al., "Results of SEI Independent Research and Development Projects,'' CMU/SEI-2007-TR-006 Technical Report, July 2007.

  8. M. Tschantz and J. M. Wing, "Confidentiality Policies and Their Extraction from Source Code,'' CMU-CS-07-108 Technical Report, February 2007.

  9. P. Manadhata and J.M. Wing, "An Attack Surface Metric,'' CS-TR-05-155, July 2005.

  10. P. Manadhata and J.M. Wing, "Measuring a System's Attack Surface,'' CS-TR-04-102, January 2004.

  11. G. Fairbanks, D. Garlan, B. Sarpeshkar, R. Simmons, G. Tolle, and J.M. Wing, "Reasoning About Exceptions Using Model Checking,'' CMU-CS-02-165. In preparation.

  12. T.M. Wong, J.M. Wing, and C.X. Wang, "Verifiable Secret Redistribution for Threshold Sharing Schemes,'' CMU-CS-02-114, February 2002.

  13. S. Jha, O. Sheyner, and J.M. Wing, "Minimization and Reliability Analyses of Attack Graphs,'' CMU-CS-02-109, February 2002.

  14. T.M. Wong and J.M. Wing, "Verifiable Secret Redistribution,'' CMU-CS-01-155, October 2001. Superseded by CMU-CS-02-114.

  15. O. Sheyner and J. Wing, "Toward Compositional Analysis of Security Protocols Using Theorem Proving,'' CMU-CS-00-106, January 2000.

  16. N. Haines, D. Kindred, J.G. Morrisett, S.M. Nettles and J.M. Wing, "Tinkertoy Transactions,'' CMU-CS-93-202, December 1993.

  17. B. Liskov and J.M. Wing, "Family Values: A Behavioral Notion of Subtyping,'' CMU-CS-93-187, July 1993. Supersedes "A New Definition of the Subtype Relation,'' CMU-CS-93-149, April 1993; and "Family Values: A Semantic Notion of Subtyping,'' CMU-CS-92-220, December 1992, also published as MIT-LCS-TR-562.

  18. D. Garlan, A. Brown, D. Jackson, J. Tomayko and J. Wing, "The CMU Masters in Software Engineering Core Curriculum,'' CMU-CS-93-180, August 1993.

  19. J.M. Wing, M. Faehndrich, N. Haines, K. Kietzke, D. Kindred, J.G. Morrisett and S. Nettles, "Venari/ML Interfaces and Examples,'' CMU-CS-93-123, March 1993.

  20. M.P. Herlihy, S.-Y. Ling and J.M. Wing, "Implementation of Commit Timestamps in Avalon,'' CMU-CS-91-107, January 1991.

  21. C. Gong and J.M. Wing, "A Library of Concurrent Objects and Their Proofs of Correctness,'' CMU-CS-90-151, July 1990.

  22. J.M. Wing and C. Gong, "A Simulator for Concurrent Objects,'' CMU-CS-90-150, July 1990.

  23. C. Gong and J.M. Wing, "Raw Code, Specification, and Proof of the Avalon Queue Example,'' CMU-CS-89-172, August 1989.

  24. J.M. Wing and C. Gong, "Machine-Assisted Proofs of Properties of Avalon Programs,'' CMU-CS-89-171, August 1989.

  25. M. Barbacci and J.M. Wing, "Durra: A Task-level Description Language Reference Manual (Version 2),'' CMU/SEI-89-TR-34, August 1989.

  26. J. Wing, M. Herlihy, S. Clamen, D. Detlefs, K. Kietzke, R. Lerner and S.-Y. Ling, "The Avalon/C++ Programming Language (Version 0),'' CMU-CS-88-209, December 1988.

  27. M. Barbacci, M. Herlihy and J. Wing, co-editors, "Proceedings of the Second Workshop on Large-Grained Parallelism,'' Hidden Valley, PA, October 11-14, 1987, CMU Software Engineering Institute Special Report, CMU/SEI-87-SR-5, November 1987. Also CMU-CS-TR-88-112, February 1988.

  28. M. Barbacci and J.M. Wing, "Durra: A Task-level Description Language,'' CMU-CS-86-176 (also CMU/SEI-86-TR-3), December 1986.

  29. M. Nixon and J.M. Wing, "On Adding Concurrency to the Formal Development Methodology (FDM),'' System Development Corporation, SP-4360, March 1986.

  30. J.M. Wing and M. Nixon, "Adding Temporal Logic to Ina Jo,'' CMU-CS-85-146, July 1985.

  31. J.V. Guttag, J.J. Horning and J.M. Wing, "Larch in Five Easy Pieces,'' DEC Systems Research Center Technical Report 5, July 1985.

  32. F. Arbab and J.M. Wing, "Geometric Reasoning: A New Paradigm for Processing Geometric Information,'' USC Computer Science TR-85-333. Also available as CMU-CS-85-144, July 1985.

  33. J.M. Wing, "A Two-Tiered Approach and Language for Formally Specifying Program Modules,'' USC Computer Science TR-85-331, March 1985.

  34. J.M. Wing, "A Two-Tiered Approach to Specifying Programs,'' MIT Laboratory for Computer Science TR-299, Cambridge, MA, 1983. Also Ph.D. thesis under the same title, MIT Department of Electrical Engineering and Computer Science, May 1983.

  35. J.M. Wing, "Experience with Two Examples: A Household Budget and Graphs,'' AFFIRM MEMO-30-JMW, USC Information Sciences Institute, Marina del Rey, CA, August 1980.

  36. J.M. Wing, "Partial-Match Retrieval Using Tries, Hashing, and Superimposed Codes,'' S.M. Thesis, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, May 1979. Also available as Bell Laboratories Technical Memorandum 79-1353-3, May 1979.

Software Artifacts

  1. Scenario Graph and Attack Graph Toolkits. Generates a graph of all failure scenarios (attacks) given a desired property of a given model of a system. The attack graph toolkit automatically generates graphs akin to what a Red Team would draw by hand. 2004-2007.

  2. The TOM Service. Supports conversions of documents and files of one type to another. 1994-now. http://tom.cs.cmu.edu/

  3. Venari/ML. System support for persistence, concurrency, and transactions for Standard ML of New Jersey. 1991-1994.

  4. Concurrent Object Library. Repository and simulator for implementations of linearizable objects, 1989-1992.

  5. Miro. Visual languages and tools for specifying security policies. Built on top of Garnet and CommonLisp. 1988-1991.

  6. Avalon/C++. Programming language support for distributed transactions. Built on top of Camelot and Mach. 1987-1990.
Patents Filed

  1. Privacy Preserving Sensor Apparatus, MS#339904.02, filed on January 18, 2014.

  2. Enhanced Spatial Impression For Home Audio, MS#339903.01, filed on January 18, 2014.

  3. Dynamic Calibration Of An Audio System, MS#339902.01, filed on January 18, 2014.

  4. Structural Element For Sound Field Estimation And Production, MS#339901.01, files on January 9, 2014.

  5. Adapting Audio Based Upon Detected Environmental Acoustics, MS#339900.01, filed December 20, 2013.

University, Industry, and Government Talks

  1. "Privacy Compliance in Big Data Systems," 2014 Rising Stars in EECS Workshop, University of California, Berkeley, CA, November 3, 2014.Keynote Speaker.

  2. "Computational Thinking," Tulane University, New Orleans, LA, October 13, 2014.

  3. "Towards a Theory of Trust in Networks of Humans and Computers," Computing the Future: Celebrating Computer Science and Artificial Intelligence, MAC50 Celebration, MIT, Cambridge, MA, May 28, 2014.

  4. "Towards a Theory of Trust in Networks of Humans and Computers," Informatics Colloquium, Universite Pierre and Marie Curie, Paris, May 20, 2014.

  5. "Computational Thinking,'' Wheeler Lecture, Computer Laboratory, University of Cambridge, Cambridge, UK, May 14, 2014.

  6. "Towards a Theory of Trust in Networks of Humans and Computers,'' Distinguished Lecture Series in Computer Science, University of Chicago, May 8, 2014. Distinguished Lecturer.

  7. "Thinking about Computational Thinking," University of Washington, Phi Beta Kappa Visiting Scholars Program, Seattle, WA, April 30, 2014.

  8. "Formal Methods: An Industrial Perpsective," Carnegie Mellon University, Pittsburgh, PA, April 22, 2014.

  9. "Computational Thinking,'' University of Colorado-Boulder, Phi Beta Kappa Visiting Scholars Program, Boulder, CO, April 17, 2014.

  10. "Computational Thinking,'' Computational Journalism Speaker Series, Columbia University, New York City, NY, February 4, 2014.

  11. "Towards a Theory of Trust in Networks of Humans and Computers,'' Cornell University, Ithaca, NY, in celebration of Fred Schneider's 60th Birthday, December 5, 2013.

  12. "Computational Thinking,'' Phi Beta Kappa Visiting Scholars Program, Xavier University, Cincinnati, OH, October 17, 2013.

  13. "Towards a Theory of Trust in Networks of Humans and Computers,'' MSR Security Reading Group, October 3, 2013.

  14. "Asian Perspectives on Science and Technology Policy: Contrasts and Commonalities with the US,'' Session on the Budgetary and Policy Context for R&D in FY 2014, AAAS Forum on Science and Technology Policy, Washington, DC, May 2, 2013. Invited Speaker.

  15. "Functional Programming in the Real World,'' 15-150 Lecture, Carnegie Mellon University, April 29, 2013.

  16. "Cyber-Physical Meets CyberTrust,'' TRUST External Advisory Board Meeting, Washington, DC, November 16, 2012.

  17. "Computational Thinking,'' Columbia University, New York, NY, Joseph Traub's 80th Birthday Symposium, November 9, 2012.

  18. "Towards a Theory of Trust in Networks of Humans and Computers,'' TRUST Security Seminar, University of California, Berkeley, CA, November 1, 2012. Invited Speaker.

  19. "Computational Thinking,'' Microsoft Research Asia Faculty Summit, Tianjin, China, October 26, 2012.

  20. "Towards a Theory of Trust,'' Tsinghua University, Beijing, China, September 14, 2012.

  21. "Insights into DC: The Budget Cycle, NSF, and More,'' Robotics Institute Faculty Meeting, August 17, 2012.

  22. "Computational Thinking,'' Andrew's Leap Program, Carnegie Mellon University, July 13, 2012.

  23. "Trustworthy Computing Research at CMU,'' CIA, Langley, VA, June 14, 2012.

  24. "Trustworthy Computing Research at CMU,'' Office of Naval Research, Pittsburgh, PA, June 13, 2012.

  25. "Computational Thinking,'' Cornell University, Ithaca, NY, May 17, 2012.

  26. "Computational Thinking,'' University of Waterloo, Waterloo, Canada, May 1, 2012. Distinguished Lecturer.

  27. "Computational Thinking,'' Boston University, inaugural celebration for the Hariri Institute for Computing and Computational Science and Engineering. April 21, 2012. Invited Speaker.

  28. "Composition of Systems and Policies for Security,'' CMU-NSA Lablet Review, Pittsburgh, PA, via videoconference, April 17, 2012.

  29. "Towards a Theory of Trust in Networks of Humans and Computers,'' Information Trust Institute, University of Illinois, Urbana-Champaign, IL, March 27, 2012. Distinguished Lecturer.

  30. "Computational Thinking,'' University of Toronto, Toronto, Canada, February 7, 2012. Distinguished Lecturer.

  31. "Computational Thinking,'' Hong Kong University, October 12, 2011.

  32. "What's Hot in Computing?'', Institute for Advanced Studies and College of Engineering, Hong Kong University of Science and Technology, October 12, 2011. Distinguished Lecturer.

  33. "What's Hot in Computing?'', Hong Kong University, October 11, 2011. William Mong Distinguished Lecturer.

  34. "Computational Thinking,'' Indiana University, Informatics and Computing Colloquium, Bloomington, IN, September 9, 2011. Distinguished Lecturer.

  35. "Masters-Level Cybersecurity Education at Carnegie Mellon,'' National Security Agency, Linthicum, MD, August 10, 2011.

  36. "What's Hot in Computing?'', Carnegie Mellon Volunteer Forum, CMU, Pittsburgh, PA, June 3, 2011.

  37. "What's Hot in Computing?'', CMU-Qatar Campus, Doha, Qatar, April 13, 2011.

  38. "Computational Thinking,'' CMU-Qatar Campus, Doha, Qatar, April 12, 2011. Distinguished Speaker.

  39. "The Importance of Broader Impacts at NSF,'' University of California, Santa Barbara, CA, April 1, 2011.

  40. "Computational Thinking,'' University of California, Santa Barbara, CA, April 1, 2011. Distinguished Lecturer.

  41. "Computational Thinking,'' University of Alabama, Birmingham, AL, UAB ACM Distinguished Speaker, March 28, 2011. Distinguished Speaker.

  42. "Computational Thinking,'' Chinese University of Hong Kong, February 14, 2011.

  43. "Computational Thinking,'' Northwestern University, Evanston, IL, Dean's Distinguished Speakers Series, February 9, 2011. Distinguished Speaker.

  44. "Computational Thinking,'' New York City College of Technology, New York, NY, February 4, 2011.

  45. "Funding Opportunities and Funding Hints,'' Human-Computer Interaction Institute, Carnegie Mellon, Pittsburgh, PA, December 14, 2010.

  46. "Computational Thinking in Education,'' Computer Science Education Week, Carnegie Mellon, Pittsburgh, PA, December 8, 2010.

  47. "Computational Thinking and (and Its Potential in Healthcare),'' Vanderbilt University, Nashville, TN, November 11, 2010.

  48. "Computational Thinking,'' Rochester Institute of Technology, Rochester, NY, Dean's Lecture Series, November 5, 2010.

  49. "Computational Thinking,'' IST Distinguished Lecture Series, Institute of Science and Technology, Vienna, Austria, September 27, 2010. Distinguished Lecturer.

  50. "Computational Thinking,'' 40 Year Anniversary Event, University of Zurich, Zurich, Switzerland, September 24, 2010.

  51. "Computational Thinking,'' Initiative in Innovative Computing Colloquium, Harvard University, Cambridge, MA, May 5, 2010. Distinguished Lecturer.

  52. "Computational Thinking,'' University of North Carolina, Charlotte, NC, sponsored by CRA-W and Coalition to Diversify Computing, April 30, 2010. Distinguished Lecturer.

  53. "Computational Thinking,'' Science, Technology, and Education in Pakistan (STEP) Lecture Series, Carnegie Mellon, April 23, 2010.

  54. "Computational Thinking,'' Brown University, Providence, RI, April 19, 2010. Distinguished Lecturer.

  55. "Computational Thinking,'' University of Puerto Rico Rio, San Juan, Puerto Rico, April 8, 2010.

  56. "Computer and Information Science and Engineering,'' Texas Tech faculty and administrators, Arlington, VA, March 31, 2010.

  57. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' University of Louisiana, Lafayette, LA, March 18, 2010. Distinguished Lecturer.

  58. "Computational Thinking and Thinking About Computing,'' Louisiana State University, Baton Rouge, March 17, 2010. Distinguished Lecturer.

  59. "Computational Thinking and Thinking About Computing,'' Heidelberg Institute for Theoretical Studies, Heidelberg, Germnany, March 8, 2010. Distinguished Lecturer.

  60. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' 20th Anniversary Celebration, University of California, Riverside, Riverside, CA, February 17, 2010.

  61. "Confidentiality Policy Extraction,'' University of Wisconsin, Madison, WI, January 27, 2010. Distinguished Lecturer.

  62. "Computational Thinking,'' University of Texas, Arlington, TX, January 20, 2010. Distinguished Lecturer.

  63. "Unleashing Waves of Innovation,'' Federal Communications Commission, October 26, 2009.

  64. "Computational Thinking and Thinking About Computing,'' Colorado State University, October 21, 2009. Distinguished Lecturer.

  65. "Computational Thinking,'' St. Joseph's University, Philadelphia, PA, October 8, 2009.

  66. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' Microsoft Research Asia, Beijing, China, September 21, 2009.

  67. "Computational Thinking and Thinking About Computing,'' Institute for Human and Machine Cognition, Pensacola, FL, September 2, 2009.

  68. "Computational Thinking and Thinking About Computing,'' Yahoo! Research, Santa Clara, CA, July 29, 2009, Distinguished Lecturer.

  69. "Cyber Physical Systems,'' Capitol Hill Luncheon for Senator Reid and Senator Rockefeller and staff, Hart Building, Washington, DC, July 9, 2009.

  70. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' AT&T Laboratories, Floram Park, NJ, June 10, 2009. Distinguished Speaker.

  71. "We Compute'' Panel, Strategic Planning Government Forum, Arlington, VA, May 8, 2009.

  72. "Computational Thinking and Thinking About Computing,'' University of Michigan, April 15, 2009.

  73. "Computational Thinking,'' Kent State, Kent, OH, April 1, 2009.

  74. "Cyber-Physical Systems: Research Challenges,'' University of Texas, Austin, TX, March 26, 2009.

  75. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' University of Maryland, College Park, MD March 12, 2009.

  76. "Cyber-Physical Systems: Research Challenges,'' University of Illinois, Urbana-Champaign, IL, February 12, 2009.

  77. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' IBM Research, Hawthorne, NY, December 4, 2008.

  78. "Supporting Basic Research at the National Science Foundation,'' Microsoft Asia 10th Anniversary Faculty Summit, Beijing, China, November 3, 2008. Invited Speaker.

  79. "Network Science and Engineering Research Challenges,'' MIT Laboratory for Information and Decision Systems, Cambridge, MA, October 9, 2008.

  80. "Computational Thinking: Two and a Half Years Later,'' Computational Thinking Seminar Series, Carnegie Mellon University, Pittsburgh, PA, September 26, 2008.

  81. "eScience for All: Not If, But When,'' The Broader Impact of Science, Microsoft Faculty Summit, Redmond, WA, July 29, 2008. Invited Panelist.

  82. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' Google Lab Seattle, Freemont, WA, July 29, 2008.

  83. "Computational Thinking and Thinking About Computing,'' Santa Fe Institute, Santa Fe, NM, July 11, 2008.

  84. "Network Science and Engineering: Research Challenges,'' Stanford University, Palo Alto, CA, May 21, 2008.

  85. "Computational Thinking and Thinking About Computing,'' University of Florida, Gainesville, Florida, April 17, 2008.

  86. "Computational Thinking and Thinking About Computing,'' Villanova University, Villanova, Pennsylvania, Distinguished Lecture Series of the Delaware Valley, April 7, 2008. Distinguished Lecturer.

  87. "Computational Thinking and Thinking About Computing,'' Eastern Michigan University, Ypsilanti, Michigan, April 2, 2008.

  88. "Computational Thinking and Thinking About Computing,'' Georgia Tech, Atlanta, GA, March 28, 2008.

  89. "Confidentiality Policy Extraction,'' Cornell University, Ithaca, New York, Gerald Salton Lecture, February 28, 2008.

  90. "Computational Thinking and Thinking About Computing,'' Computer Science and Artificial Intelligence Laboratory, MIT, Cambridge, MA, November 30, 2007.

  91. `Computational Thinking,'' William and Mary College, Williamsburg, Virginia, November 9, 2007. Distinguished Speaker.

  92. "Computational Thinking,'' CS4HS Program, University of Washington, July 20, 2007. Keynote Speaker.

  93. "Automatic Generation and Analysis of Attack Graphs,'' Tsinghua University, Beijing, China, June 5, 2007.

  94. "Computational Thinking,'' Microsoft Research Asia, Beijing, China, June 4, 2007.

  95. "Automatic Generation and Analysis of Attack Graphs,'' University of Utah, April 26, 2007. Organick Memorial Lecture.

  96. "Computational Thinking,'' University of Utah, April 25, 2007 Organick Memorial Lecture.

  97. "Automatic Generation and Analysis of Attack Graphs,'' SUNY Stony Brook, February 28, 2007. Distinguished Lecture.

  98. "Automatic Generation and Analysis of Attack Graphs,'' University of Wisconsin-La Crosse, February 19, 2007. Distinguished Lecture.

  99. "Computational Thinking,'' University of Wisconsin-La Crosse, February 19, 2007. Distinguished Lecture.

  100. "Automatic Generation and Analysis of Attack Graphs,'' McGill University, January 19, 2007. Distinguished Lecture.

  101. "Automatic Generation and Analysis of Attack Graphs,'' University of Illinois, Chicago, November 9, 2006. Distinguished Lecture.

  102. "Automatic Generation and Analysis of Attack Graphs,'' Laboratory of Education and Research in Security Assured Information Systems (LERSAIS), University of Pittsburgh, September 22, 2006. Distinguished Lecture.

  103. "Formal Methods'' ProLogic, Fairmont, VA, September 20, 2006.

  104. "Computational Thinking,'' ProLogic, Fairmont, VA, September 20, 2006.

  105. "Computational Thinking,'' Computer Science Pedagogy Colloquium, Carnegie Mellon University, September 19, 2006.

  106. "Computational Thinking,'' CS4HS Program, Carnegie Mellon University, July 22, 2006. Keynote Speaker.

  107. "Automatic Generation and Analysis of Attack Graphs,'' NSF TRUST Center, Women in Science and Engineering Program, UC Berkeley, July 10-11, 2006.

  108. "Automatic Generation and Analysis of Attack Graphs,'' ETH, Zurich, June 12, 2006.

  109. "Computational Thinking,'' DARPA Computer Science Futures, Pittsburgh, PA, May 31, 2006.

  110. "An Attack Surface Metric," CyLab Corporate Partners Meeting, Pittsburgh, PA, April 20, 2006.

  111. "Automatic Generation and Analysis of Attack Graphs," Dartmouth College, April 10, 2006.

  112. "Computational Thinking and CS@CMU," Hong Kong University of Science and Technology, November 5, 2005.

  113. "Predictable Software," Shanghai Jiao Tong University, November 3, 2005.

  114. "CS@CMU," Tsinghua University, October 28, 2005.

  115. "CS@CMU," Chinese Academy of Sciences, October 28, 2005.

  116. CS@CMU, Beijing University, October 28, 2005.

  117. "Predictable Software," Microsoft Asia, Beijing, China, October 27, 2005.

  118. "Software Security," National Chiao Tung University, Hsinchu, Taiwan, June 7, 2005.

  119. "Automatic Generation and Analysis of Attack Graphs," National Chiao Tung University, Hsinchu, Taiwan, June 6, 2005.

  120. "Automatic Generation and Analysis of Attack Graphs," University of Minnesota, Distinguished Lecture, February 14, 2005.

  121. "Automatic Generation and Analysis of Attack Graphs," University of Pennsylvania, Distinguished Lecture, November 23, 2004.

  122. "Automatic Generation and Analysis of Attack Graphs," The Center for Education and Research in Information Assurance and Security (CERIAS) Seminar, Purdue University, September 28, 2004.

  123. "Automatic Generation and Analysis of Attack Graphs," Carnegie Mellon Software Engineering Institute, June 3, 2004.

  124. "Automatic Generation and Analysis of Attack Graphs," Florida International University, Miami, FL, April 23, 2004. Distinguished Lecture.

  125. "Measuring Relative Attack Surfaces,'' Microsoft Research, Redmond, WA, August 21, 2003.

  126. "Security Research,'' Microsoft Research, Redmond, WA, July 24, 2003.

  127. "Work in Progress: A Model for Attack Surfaces,'' Microsoft Research, Redmond, WA, March 20, 2003.

  128. "Vulnerability Analysis Using Attack Graphs,'' Yamacraw Distinguished Speaker Series, Savannah, GA, February 18, 2003.

  129. "Vulnerability Analysis Using Attack Graphs,'' University of Washington, Seattle, WA, February 11, 2003.

  130. "Vulnerability Analysis of Networks Using Attack Graphs,'' University of Illinois, Urbana-Champaign, IL, February 7, 2002.

  131. "Formal Methods: Past, Present, and Future,'' University of Illinois, Urbana-Champaign, IL, February 7, 2002.

  132. "Vulnerability Analysis of Networks Using Attack Graphs,'' Microsoft Research Labs, Redmond, WA, January 28, 2002.

  133. "The Rare Glitch Project Overview,'' Honeywell Laboratories, Minneapolis, MN, December 3, 2001.

  134. "School of Computer Science: Educational Programs,'' IT-Center, Dortmund, Germany, November 22, 2001.

  135. "Survivability Analysis of Networked Systems,'' Cornell University, Computer Research Associates-Women and Lucent Distinguished Lecturer Series, Cornell University, October 4, 2001.

  136. "Survivability Analysis of Networked Systems,'' Information and Communications University, Taejon, Korea, May 14, 2001.

  137. "Survivability Analysis of Networked Systems,'' DARPA OASIS PI meeting, Norfolk, VA, February 14, 2001.

  138. "Survivability Analysis of Distributed Systems,'' University of British Columbia, Distinguished Lecture Series, November 9, 2000.

  139. "Reasoning About Security Protocols,'' National University of Singapore, August 2, 2000.

  140. "Mobility and Security,'' National University of Singapore, August 2, 2000.

  141. "Reasoning About Security Protocols,'' Cornell University, Distinguished Lecture Series, November 11, 1999.

  142. "Reasoning About Security,'' University of Utah, Distinguished Lecture Series, November 4, 1999.

  143. "Reasoning About Security Protocols,'' IBM Research Laboratories, Yorktown Heights, NY, June 28, 1999.

  144. "Formal Methods: Past, Present, and Future,'' DePaul University, Distinguished Lecture Series, October 2, 1998.

  145. "Formal Methods: Past, Present, and Future,'' University of Washington, Distinguished Lecture Series, February 19, 1998.

  146. "A Story in the Practice of Formal Methods,'' Brown University, April 11, 1997.

  147. "Formal Methods: Past, Present, and Future,'' Programming Systems Cultural Exchange Series, Carnegie Mellon, February 17, 1997.

  148. "Formal Methods: Past, Present, and Future,'' University of Pennsylvania, Distinguished Lecture Series, January 28, 1997.

  149. "Mathematics for Software Engineers,'' Harvard University, November 26, 1996.

  150. "Using Belief to Reason About Cache Coherence in Distributed Systems,'' United Nations University, Institute of Information Sciences and Technology, December 27, 1995.

  151. "A Behavioral Notion of Subtyping,'' United Nations University, Institute of Information Sciences and Technology, December 27, 1995.

  152. "Using Belief to Reason About Cache Coherence in Distributed Systems,'' Princeton University, May 2, 1995.

  153. "Using Belief to Reason About Cache Coherence in Distributed Systems,'' University of Maryland, March 27, 1995.

  154. "Why Formal Methods?,'' University of Manitoba, Winnipeg, Canada, March 21, 1995.

  155. "What is a Formal Method?,'' BNR/NT Design Forum, Bell-Northern Research Ltd., June 16, 1994.

  156. "Larch,'' Williams College, Williamstown, MA, April 23, 1994.

  157. "What is a Formal Method?,'' Williams College, Class of 60's Scholar Program, Williamstown, MA, April 22, 1994.

  158. "Concurrent Multi-Threaded Transactions,'' University of Washington, January 21, 1994.

  159. "Concurrent Multi-Threaded Transactions,'' Technical University of Delft, Delft, The Netherlands, September 20, 1993.

  160. "Concurrent Multi-Threaded Transactions,'' ECRC, Munich, Germany, July 22, 1993.

  161. "Larch,'' Queen's University, Kingston, Canada, April 2, 1993.

  162. "Family Values: A Semantic Notion of Subtyping,'' Carnegie Mellon, POP Seminar Series, March 12, 1993.

  163. "Specifications in Software Development,'' National Security Agency, NSASAB Panel on Formal Methods, Ft. George Meade, MD, February 10, 1993.

  164. "What is a Formal Method?,'' National Security Agency, NSASAB Panel on Formal Methods, Ft. George Meade, MD, February 10, 1993.

  165. "Avalon: Language Support for Reliable Distributed Systems,'' The Chinese University of Hong Kong, December 28, 1992.

  166. "Larch,'' INRS/Bell Northern Research, Verdun, Canada, November 6, 1992.

  167. "Persistence + Undoability = Transactions,'' University of Massachusetts, Amherst, MA, May 8, 1992.

  168. "What is a Formal Method?,'' Winona State University, Winona, Minnesota, April 10, 1992.

  169. "What is a Formal Method?,'' University of Wisconsin-La Crosse, La Crosse, Wisconsin, April 9, 1992.

  170. "What is a Formal Method?,'' Carroll College, Waukesau, Wisconsin, April 9, 1992.

  171. "Persistence + Undoability = Transactions,'' MIT Laboratory for Computer Science, Cambridge, MA, April 6, 1992.

  172. "Unintrusive Ways to Integrate Formal Specifications in Practice,'' Motorola, Inc., Phoenix, Arizona, March 9, 1992.

  173. "What is a Formal Method?,'' Motorola, Inc., Phoenix, Arizona, March 9, 1992.

  174. "Avalon: Language Support for Reliable Distributed Systems,'' Hewlett-Packard Laboratories, Bristol, England, January 7, 1992.

  175. "Unintrusive Ways to Integrate Formal Specifications in Practice,'' Concordia University, Montreal, Canada, November 28, 1991.

  176. "Specifications as Search Keys,'' AT&T Bell Laboratories, Murray Hill, NJ, August 12, 1991.

  177. "Specifications as Search Keys,'' DEC/Cambridge Research Lab., Cambridge, MA, March 21, 1991.

  178. "Specifications as Search Keys,'' MIT Laboratory for Computer Science, Cambridge, MA, March 20, 1991.

  179. "Specifying Avalon Objects in Larch,'' Michigan State University, East Lansing, MI, January 29, 1991.

  180. "Avalon: Language Support for Reliable Distributed Systems,'' University of Illinois, Urbana-Champaign, IL, January 28, 1991.

  181. "Avalon: Language Support for Reliable Distributed Systems,'' University of California at Santa Barbara, Santa Barbara, CA, December 7, 1990.

  182. "Avalon: Language Support for Reliable Distributed Systems,'' Cornell University, Ithaca, NY, November 8, 1990.

  183. "Avalon: Language Support for Reliable Distributed Systems,'' Academia Sinica, Taipei, Taiwan, August 1, 1990.

  184. "What is a Formal Method?,'' Academia Sinica, Taipei, Taiwan, August 1, 1990.

  185. "Verifying Atomic Data Types,'' Technion University, Israel, April 6, 1990.

  186. "What is a Formal Method?,'' Information Networking Institute, Pittsburgh, PA, January 29, 1990.

  187. "Specifying and Verifying Abstract Data Types,'' Information Networking Institute, Pittsburgh, PA, January 29, 1990.

  188. "What is a Formal Method?,'' Argonne National Laboratories, Chicago, IL, November 16, 1989.

  189. "Formal Specifications in Software Engineering,'' National Computer Security Center, Baltimore, MD, October 19, 1989.

  190. "What is a Formal Method?,'' Army Science Board Committee on Software in the Army, SEI, Pittsburgh, PA, October 13, 1989.

  191. "Avalon: Language Support for Reliable Distributed Systems,'' IBM Research Laboratories, Yorktown Heights, NY, August 14, 1989.

  192. "Avalon: Language Support for Reliable Distributed Systems,'' University of Tunis, Tunisia, May 26, 1989.

  193. "Specifying Avalon Objects in Larch,'' MIT Laboratory for Computer Science, Cambridge, MA, April 25, 1989.

  194. "Beyond Rewrite Rule Engines: Affirm, Reve, Larch Prover,'' Carnegie Mellon University, Pittsburgh, PA, October 25, 1988.

  195. "Avalon: Language Support for Reliable Distributed Systems,'' University of Science and Technology of China, Hefei, China, May 21, 1988.

  196. "The Larch Family of Specification Languages,'' University of Science and Technology of China, Hefei, China, May 21, 1988.

  197. "Avalon: Language Support for Reliable Distributed Systems,'' East-China Research Institute of Computer Technology, Shanghai, China, May 18, 1988.

  198. "Axioms for Concurrent Objects,'' Shanghai Jiao Tong University, Shanghai, China, May 17, 1988.

  199. "The Larch Family of Specification Languages,'' Shanghai Jiao Tong University, Shanghai, China, May 16, 1988.

  200. "The Larch Family of Specification Languages,'' Northwestern University, Xi'an, China, May 13, 1988.

  201. "Specifying and Verifying Abstract Data Types,'' Northwestern University, Xi'an, China, May 13, 1988.

  202. "Specifying Graceful Degradation in Distributed Systems,'' Institute of Software, Academia Sinica, Beijing, China, May 10, 1988.

  203. "Avalon: Language Support for Reliable Distributed Systems,'' Institute of Software, Academia Sinica, Beijing, China, May 9, 1988.

  204. "Specifying and Verifying Abstract Data Types,'' Tsinghua University, Beijing, China, May 6, 1988.

  205. "Specifying and Verifying Abstract Data Types,'' Information Technology Institute, Beijing, China, May 5, 1988.

  206. "Axioms for Concurrent Objects,'' Institute of Software, Academia Sinica, Beijing, China, May 5, 1988.

  207. "The Larch Family of Specification Languages,'' Institute of Software, Academia Sinica, Beijing, China, May 4, 1988.

  208. "Specifying and Verifying Abstract Data Types,'' Institute of Software, Academia Sinica, Beijing, China, May 3, 1988.

  209. "Avalon: Language Support for Reliable Distributed Systems,'' Center for Dependable Systems, CMU, Pittsburgh, PA, March 23, 1988.

  210. "Formal Specifications of Concurrent and Distributed Systems,'' National Computer Security Center, Ft. George G. Meade, MD, March 16, 1988.

  211. "Miro: A Visual Approach to Specifying Security,'' National Computer Security Center, Ft. George G. Meade, MD, February 23, 1988.

  212. "The Larch Family of Specification Languages,'' Tektronix, Beaverton, OR, October 30, 1987.

  213. "Avalon: Language Support for Reliable Distributed Systems,'' Oregon Graduate Center, Beaverton, OR, October 29, 1987.

  214. "The Larch Family of Specification Languages,'' Software Engineering Institute, Pittsburgh, PA, April 24, 1987.

  215. "Axioms for Concurrent Objects,'' University of Texas, Austin, TX, March 27, 1987.

  216. "Axioms for Concurrent Objects,'' MCC, Austin, TX, March 26, 1987.

  217. "A Larch Specification of the Library Example,'' UNISYS, Los Angeles, CA, April 6, 1987,

  218. "Axioms for Concurrent Objects,'' AT&T Bell Laboratories, Murray Hill, NJ, November 14, 1986.

  219. "Axioms for Concurrent Objects,'' MIT Laboratory for Computer Science, Cambridge, MA, October 14, 1986.

  220. "Formal Specifications in Software Engineering,'' Carnegie Mellon University, Pittsburgh, PA, October 3, 1985.

  221. "The Larch Family of Specification Languages,'' Stanford Research Institute, Menlo Park, CA, April 8, 1986.

  222. "Adding Temporal Logic to a Formal Specification Language,'' Carnegie Mellon University, Pittsburgh, PA, March 22, 1985.

  223. "Adding Temporal Logic to a Formal Specification Language,'' University of California at Berkeley, Berkeley, CA, March 7, 1985.

  224. "Practical Problems with Writing Specifications,'' Imperial College, London, England, October 26, 1984.

  225. "Developing Program Specifications Following a Two-Tiered Approach,'' University of Saarbrucken, Saarbrucken, West Germany, June 1, 1984.

  226. "Developing Program Specifications Following a Two-Tiered Approach,'' University of California at Santa Barbara, Santa Barbara, CA, May 14, 1984.

  227. "Developing Program Specifications Following a Two-Tiered Approach,'' UCLA, Los Angeles, CA, May 10, 1984.

  228. "A Two-Tiered Approach to Specifying Programs,'' System Development Corporation, Santa Monica, CA, April 20, 1984.

  229. "A Two-Tiered Approach to Specifying Programs,'' IBM Research Laboratory, San Jose, CA, March 23, 1984.

  230. "A Two-Tiered Approach to Specifying Programs,'' USC Institute for Information Sciences, Marina del Rey, CA, February 17, 1984.

  231. "Design and Analysis of Computer Algorithms,'' Institute of Southwestern China, Canton, China, June 1979.

  232. "Design and Implementation of Programming Languages,'' Institute of Southwestern China, Canton, China, June 1979.

Conference and Workshop Talks

  1. "Computational Thinking," Advanced Research and Technology Symposium, MIT Lincoln Laboratory, Cambridge, MA, December 2, 2014. KeynoteSpeaker.

  2. "Joys of Academia, Government, and Industry," 2014 Rising Stars in EECS Workshop, University of California, Berkeley, CA, November 3, 2014.Keynote Speaker.

  3. "Computational Thinking in the Sciences and Beyond," 11th Asian Faculty Summit, Beijing, China, October 30, 2014. Distinguished Speaker.

  4. "Cyber-Physical Systems," 4th CyberLinx Series, National Security Agency, Ft. Meade, MD, October 24, 2014. Invited Speaker.

  5. "Formal Methods: An Industrial Perspetive,'' 14th International Conference on Runtime Verification, Toronto, Canada, September 23, 2014. Keynote Speaker.

  6. "Software Engineering Research Opportunities," Round Table with CTO/CXO on Emerging Software Engineering Challenges, 36th International Conference in Software Engineering, Hyderabad, India, June 6, 2014. Keynote Speaker.

  7. "The Impact of Computer Science Research on Science, Technology, and Society,'' MSR-INRIA Joint Centre Scientific Event, Palaiseau, France, May 19, 2014. Keynote Speaker.

  8. "The Impact of Computer Science Research on Science, Technology, and Society,'' TechVista, Jaipur, India, January 24, 2014. Keynote Speaker.

  9. "What's Hot in Computing,'' LeadersLab Workshop, Price Waterhouse Coopers, December 10, 2013.

  10. "Formal Methods: An Industrial Perspetive,'' High-Integrity Language Technologies, Pittsburgh, PA, November 14, 2013. Keynote Speaker.

  11. "Computational Thinking,'' 9th University Course Forum of Computer Science, Chongqing, China, November 2, 2013. Keynote Speaker.

  12. "The Impact of Computer Science Research on Science, Technology, and Society,'' 21st Century Computing Conference, Hefei China, November 1, 2013. Keynote Speaker.

  13. "A Framework for Privacy Research,'' 4th Annual Microsoft Privacy Workshop, Redmond, WA, October 23, 2013. Keynote Speaker.

  14. "Formal Methods: An Industrial Perspective,'' Computer-Aided Verification (CAV) 2013, St. Petersburg, Russia, July 19, 2013, Keynote Speaker.

  15. "Microsoft Research Impact on Science, Technology, and Society'' Microsoft Faculty Summit, Redmond, WA, July 16, 2013. Keynote Speaker.

  16. "Computational Thinking,'' Fifth Israeli Presidential Conference, Jerusalem, Israel, Master Class, June 20, 2013, Invited Speaker.

  17. "Towards a Theory of Trust in Networks of Humans and Computers,'' The GREPSEC Workshop, women and underrepresented groups in security, San Francisco, CA, May 18, 2013, Invited Speaker.

  18. "Creating New Initiatives: The NSF Perspective,'' Interacting with Agencies/Creating New Initiatives Session, Leadership in Science Policy Institute, Computing Community Consortium, Washington, DC, April 11, 2013. Invited Speaker.

  19. "A Day in Your Life,'' How Fundamental Computing Research Touches Everyday Lives, American Association for the Advancement of Science (AAAS) Annual Meeting, Boston, MA, February 16, 2013.

  20. "Trust in Networks of Humans and Computers,'' pecha kucha, Cybersecurity IdeasLab, World Economic Forum, Davos, Switzerland, January 26, 2013.

  21. "Towards a Theory of Trust,'' 21st Century Computing Conference, Tianjin, China, Distinguished Speaker October 25, 2012.

  22. "Computational Thinking,'' CPATH Symposium, Folsom Lake College, Folsom, CA, via videoconference, Keynote Speaker September 28, 2012.

  23. "Computational Thinking: It's For Everyone,'' pecha kucha, CMU IdeasLab, The Annual Meeting of the New Champions 2012 World Economic Forum, Summer Davos, Tianjin, China, September 12, 2012.

  24. "Cyber-Physical Meets CyberTrust,'' International Symposium for Resilient Control Systems, Salt Lake City, UT, Keynote Speaker August 15, 2012.

  25. "Towards a Theory of Trust in Networks of Humans and Computers,'' Workshop on Semantic Computing and Security, Oakland, CA, Keynote Speaker May 24, 2012.

  26. "Computational Thinking,'' General Electric Asian-Pacific American Forum, Washington, DC, April 30, 2012. Invited Speaker.

  27. "Career Advice,'' Planning Your Research Career session, CRA Career Mentoring Workshop, Washington, DC, February 27, 2012. Invited Speaker.

  28. "A Day in Your Life,'' NITRD 20th Anniversary Symposium, Washington, DC, February 16, 2012. Invited Speaker.

  29. "What's Hot in Computing?'', TEDx, Leadership Pittsburgh, Nemacolin, PA, November 19, 2011.

  30. "Creating New Initiatives: The NSF Perspective,'' Interacting with Agencies/Creating New Initiatives Session, Leadership in Science Policy Institute, Computing Community Consortium, Washington, DC, November 7, 2011. Invited Speaker.

  31. "What's Hot in Computing?'', SBAC-PAD 2011: The 23rd International Symposium on Computer Architecture and High Performance Computing, Vitoria, Brazil, October 26, 2011. Keynote Speaker.

  32. "Computational Thinking," IEEE Symposium on Visual Languages, Pittsburgh, PA, September 20, 2011. Keynote Speaker.

  33. "Tips for the Job Search Process,'' The Job Search Process (pre-PhD), CRA-W Career Mentoring Workshop, San Jose, CA, June 4, 2011.

  34. "Computational Thinking,'' Opportunities for Undergraduate Research in Computer Science (OurCS) Workshop, Carnegie Mellon University, Pittsburgh, PA, March 4, 2011. Keynote Speaker.

  35. "Crowds and Clouds,'' American Association for the Advancement of Science (AAAS) Annual Meeting, Panel Session on Cloud Computing, Washington, DC, February 18, 2011.

  36. "Computational Thinking,'' Merging Knowledge, celebration of 5th anniversary of Centre for Computational and Systems Biology, Microsoft Research and University of Trento, Trento, Italy, December 2, 2010. Invited Speaker.

  37. "Usable Verification: Balancing Thinking and Automating,'' Usable Verification Workshop, Redmond, WA, November 15, 2010.

  38. "Computational Thinking,'' Systems Thinking in Public Health, University of Pittsburgh, October 6, 2010.

  39. "Computational Thinking's Role in CyberLearning,'' Open Community Meeting, NSF Task Force on Cyberlearning and Workforce Development, Arlington, VA, September 22, 2010. Participation via videoconference. Invited Panelist.

  40. "Peer Review in Computing,'' Plenary Session Panel, Computing Research Associates Conference, Snowbird, UT, July 19, 2010. Invited Panelist.

  41. "Frontiers of Computing: A View from the National Science Foundation,'' Tsinghua Vision 2020, Tsinghua University, Beijing, China, July 12, 2010. Invited Speaker.

  42. "Trends in Science and Engineering: A View from the National Science Foundation,'' The Third US-China Computer Science Leadership Summit, Peking University, Beijing, China, June 14-15, 2010.

  43. "Cyber-Physical Systems,'' New Programming Paradigms for Cyber-Physical Systems, Fujitsu Labs, Mountain View, CA, June 10, 2010. Keynote Speaker.

  44. "Toward a US Cybersecurity R&D Agenda,'' US Cybersecurity R&D, Oakland, CA, May 19, 2010.

  45. "Frontiers of Computing: A View from the National Science Foundation,'' UAE Forum in Information and Communication Technology Research 2010 (ICTRF2010), Khalifa University, Abu Dhabi, UAE, May 9, 2010. Keynote Speaker.

  46. "Crowds and Clouds,'' The Crowd and The Cloud: Innovation and Collaboration, Georgetown University, Washington, DC, April 20, 2010. Keynote Speaker.

  47. "Computational Thinking,'' NSF CPATH PI Meeting, Arlington, VA, March 25, 2010. Keynote Speaker.

  48. "Cyber-Physical Systems,'' Inter-Agency Workshop on Cyber-Physical Systems, Alexandria, VA, March 11, 2010.

  49. "Computational Thinking in K-12,'' NSF CPATH Research Experiences for Teachers, Arlington, VA, March 4, 2010. Keynote Speaker.

  50. "Computational Thinking,'' 2010 EDUCAUSE Learning Initiative Annual Meeting on New Learning Environments for a Web 2.0 World, Austin, Texas, January 21, 2010. Keynote Speaker.

  51. "Formal Methods for Privacy,'' Formal Methods 2009, Eindhoven, The Netherlands, November 4, 2009. Keynote Speaker.

  52. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' OOPSLA 2009, October 28, 2009, Orlando, FL. Keynote Speaker.

  53. "Innovation in Information Technology,'' Accelerating Energy Innovation: Lessons from Multiple Sectors, National Bureau of Economic Research, Washington, DC, October 23, 2009. Invited Panelist.

  54. "Computational Thinking and Thinking About Computing,'' China Computer Science Vision 2020, Tsinghua University, Beijing, China, October 14, 2009. Invited Speaker.

  55. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' ACM International Conference on Mobile Computing and Networking, September 22, 2009. Keynote Speaker.

  56. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' 46th Design Automation Conference, San Francisco, CA, July 28, 2009. Invited Speaker.

  57. "Cyber-Physical Systems: NSF Perspective,'' Cyber-Physical Systems Security, Newark, NJ, July 22, 2009. Sponsored by US Department of Homeland Security. Invited Speaker.

  58. "Computational Thinking,'' SIG Computing Teachers Breakfast Forum, National Education Computing Conference, June 29, 2009. Invited Speaker.

  59. "Computational Thinking,'' Enseignement de TICs dans les Grandes Ecoles de Paris Tech, Paris, France, June 24, 2009. Invited Speaker.

  60. "Research Challenges for the ICT Community,'' Roundtable on Building a Green Future: Clean Innovation, Investments, and Jobs, OECD Workshop on ICTs, The Environment and Climate Change, Helsingor, Denmark, May 27, 2009. Invited Panelist.

  61. "Computational Thinking and Thinking About Computing,'' TTI/Vanguard Conference, Washington, DC, May 7, 2009. Invited Speaker.

  62. "Computational Thinking and Thinking About Computing,'' Consortium for Computing Sciences in Colleges, Northeast Division, Plattsburgh, NY, April 25, 2009. Invited Speaker.

  63. "Frontiers in Research and Education in Computing: A View from the National Science Foundation,'' IEEE Wireless Telecommunications Symposium, Prague, CZ, April 22, 2009. Invited Speaker.

  64. "Computational Thinking and Thinking About Computing,'' Future and Emerging Technologies Conference, Prague, CZ, April 22, 2009. Invited Speaker.

  65. "Multidisciplinary Research at NSF,'' Panel on Multidisciplinary Research in ICT, Future and Emerging Technologies Conference, Prague, CZ, April 21, 2009. Invited Panelist.

  66. "Computational Thinking,'' Computational Thinking for Everyone Workshop, National Academies, February 19, 2009, Washington, DC. Invited Panelist.

  67. "Computational Thinking,'' American Association for the Advancement of Science (AAAS) Annual Meeting, Chicago, IL, February 15, 2009. Invited Speaker.

  68. "Cyber-Physical Systems,'' NSF Informational Workshop on Cyber-Physical Systems, December 15, 2008.

  69. "Computational Thinking,'' Science in Society: Dialogues and Scientific Responsibility, Workshop on Information and Communications Technology, Paris, France, November 25, 2008. Invited Speaker.

  70. "Computer Science Outside the Box,'' Computer Science Outside the Box Workshop, co-sponsored by NSF, CRA, CCC, November 10, 2008.

  71. "Computational Thinking,'' Geographic Information Science, Park City, UT, September 24, 2008. Invited Speaker.

  72. "Network Science and Engineering,'' NSF Informational Workshop on Network Science and Engineering, September 5, 2008.

  73. "A View from DC,'' Computing Research Associates Conference, Snowbird, UT, July 14, 2008. Invited Speaker.

  74. "Cyber-Physical Systems Research Challenges,'' ACM Third International Workshop on Feedback Control Implementation and Design in Computing Systems and Networks, Annapolis, MD, June 6, 2008. Keynote Speaker.

  75. "Computational Thinking and Thinking About Computing,'' SIGMETRICS, Annapolis, MD, June 5, 2008. Keynote Speaker.

  76. "Cyber Security Research Challenges,'' Cybersecurity Summit, Arlington, VA, May 8, 2008, Keynote Speaker.

  77. "Cyber-Physical Systems Research Challenges,'' Cyber-Physical Systems Summit, St. Louis, Missouri, April 24, 2008. Keynote Speaker.

  78. "Cyber-Physical Systems Research Challenges,'' CPSWEEK 2008, St. Louis, Missouri, April 24, 2008. Invited Speaker.

  79. "Computational Thinking and Thinking About Computing,'' 22nd IEEE International Conference Parallel and Distributed Processing Symposium, Miami, Florida, April 16, 2008. Banquet Speaker.

  80. "Cyber-Physical Systems Research Challenges,'' National Workshop on High-Confidence Automotive Cyber-Physical Systems, Troy, Michigan, April 3, 2008.

  81. "Computational Thinking and Thinking About Computing,'' 46th Annual ACM Southeast Conference, Auburn, Alabama, March 28, 2008. Invited Speaker.

  82. "Data-Intensive Computing at NSF,'' Data-Intensive Computing Symposium, Mountain View, CA, March 26, 2008. Invited Speaker.

  83. "Computational Thinking and Thinking About Computing,'' Grand Challenges in Computing (United Kingdom) 2008, London, England, March 19, 2008, Keynote Speaker.

  84. "Computational Thinking and Thinking About Computing,'' From Computers to Ubiquitous Computing, by 2020, Royal Society of London, London, England, March 17, 2008. Invited Speaker.

  85. "Network Science and Engineering,'' GENI Engineering Conference, Arlington, VA, March 3, 2008. Keynote Speaker.

  86. "Computational Thinking and Thinking About Computing,'' Biotechnology Symposium, California State University, Oakland, California, January 11, 2008. Invited Speaker.

  87. "Research Needs and NSF/CISE Perspective," Software for Dependable Systems: Sufficient Evidence? Symposium, National Academies, Washington, DC, October 23, 2007. Invited Panelist.

  88. "Looking Ahead for Computing and at NSF,'' Informatics Europe, Berlin, Germany, October 8, 2007. Keynote Speaker.

  89. "Computational Thinking,'' OurCS, Carnegie Mellon, Pittsburgh, PA, October 5, 2007. Keynote Speaker.

  90. "Privacy Research Ideas,'' Data Confidentiality Research Workshop, Arlington, Virginia, September 5, 2007.

  91. "Computer Science Meets Science and Engineering,'' High-End Computing File System and I/O Workshop, Arlington, Virginia, August 6, 2007.

  92. "Formal Methods for Software Systems,'' High Confidence Real-Time Operating Systems, Arlington, Virginia, July 9, 2007. Keynote Speaker.

  93. "Software Security," First IEEE and IFIP International Symposium on Theoretical Aspects of Software Engineering (TASE 2007), June 7, 2007, Shanghai, China. Keynote Speaker.

  94. "Computational Thinking,'' SIGCSE 2007, Special Session on Computational Thinking, Covington, Kentucky, March 8, 2007.

  95. "Computational Thinking and CS@CMU,'' TechVista 2007, Microsoft India, Bangalore, India, January 23, 2007. Keynote Speaker.

  96. "An Attack Surface Metric," 10th IASTED International Conference on Software Engineering and Applications, Dallas, Texas, November 13, 2006. Keynote Speaker.

  97. "Software Assurance," Executive Women's Forum, Phoenix, AZ, September 14, 2006. Invited Panelist.

  98. "Attack Graph Generation and Analysis," ACM Symposium on Information, Computer, and Communications Security, Taipei, Taiwan, March 22, 2006. Invited Speaker.

  99. "Strong Girls, Strong Women," Making the Connection Breakfast, March 1, 2006, Carnegie Mellon, Pittsburgh, PA, Keynote Speaker.

  100. "The View from Carnegie Mellon: What We Did and What We're Doing," National Center for Women and Information Technology (NCWIT) Leadership Team and Alliance Meeting, Pittsburgh, PA, November 17, 2005. Keynote Speaker.

  101. "Predictable Software," Computing in the 21st Century Conference, Hong Kong, November 5, 2005. Invited Speaker.

  102. "Predictable Software," Computing in the 21st Century Conference, Hangzhou, China, November 1, 2005. Invited Speaker.

  103. "Computational Thinking and CS@CMU," Microsoft Research Asia Faculty Summit, Hangzhou, China, October 31, 2005. Invited Speaker.

  104. "Towards an Algebra for Security Policies,'' 26th International Conference on Applications and Theory of Petri Nets, Miami, FL, June 23, 2005. Distinguished Speaker.

  105. "Automatic Generation and Analysis of Attack Graphs,'', 11th Information Security Conference, Kaohsiung, Taiwan, June 9, 2005. Keynote Speaker.

  106. "Automatic Generation and Analysis of Attack Graphs,'' NATO ARW Verification of Infinite State Systems with Applications to Security (VISSAS) 2005, Timisoara, Romania, March 21, 2005. Invited Speaker.

  107. "Measuring Relative Attack Surfaces,'' Workshop on Advanced Developments in Software and Systems Security, Taipei, December 7, 2003.

  108. "Vulnerability Analysis Using Attack Graphs,'' Microsoft Academic Conference Germany 2003, Dresden, Germany, November 12, 2003. Invited Speaker.

  109. "Vulnerability Analysis Using Attack Graphs,'' Microsoft Research Academic Conference, Budapest, Hungary, November 11, 2003. Invited Speaker.

  110. "Vulnerability Analysis Using Attack Graphs,'' Microsoft Research, Cambridge, England, November 10, 2003.

  111. "Vulnerability Analysis Using Attack Graphs,'' Formal Methods for Components and Objects,'' Leiden, The Netherlands, November 4-7, 2003. Invited Speaker.

  112. "Vulnerability Analysis Using Attack Graphs,'' Carnegie Mellon Center for Computers, Communications, and Security, September 30, 2003.

  113. "CSTB Security Studies,'' NSF EDUCAUSE, Washington, DC, October 22-23, 2002.

  114. "What, Who, and How of Tomorrow,'' Monterey Workshops: Radical Innovations of Software and Systems Engineering in the Future, Venice, Italy, October 6-10, 2002. Invited Speaker.

  115. "Mathematics in Computer Science Curricula,'' Sixth International Conference on Mathematics of Program Construction, Dagstuhl, Germany, July 8-10, 2002. Invited Speaker.

  116. "Survivability Analysis of Networked Systems,'' IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Workshop on Enterprise Security, Pittsburgh, PA, June 10-12, 2002. Invited Speaker.

  117. "Survivability Analysis of Networked Systems,'' FORTE 2001, Cheju Island, Korea, August 31, 2001. Invited Speaker.

  118. "Code-Level Specification,'' Specifying and Checking Properties of Software, University of Washington/Microsoft Research Summer Institute, August 12, 2001. Invited Speaker.

  119. "Scenario Graph Generation and MDP-Based Analysis,'' ARO Kickoff Meeting, Philadelphia, PA, May 24-25, 2001.

  120. "Survivability Analysis of Networked Systems,'' Seventh Asia Pacific Software Engineering Conference (APSEC'2000), Singapore, December 5-8, 2000, Keynote Speaker.

  121. "Software Survivability Analysis,'' NASA Ames, Design for Safety 2000 Workshop, Moffett Training Center, California, October 12, 2000. Invited Speaker.

  122. "Towards a Science of Survivability,'' Third Information Survivability Workshop (ISW-2000), Boston, MA, October 24-26, 2000.

  123. "Analyzing Survivability Properties of Specifications of Networks,'' Workshop on Dependability Despite Malicious Faults, New York City, NY, June 28, 2000

  124. "Weaving Formal Methods into the Undergraduate Computer Science Curriculum,'' Eighth International Conference on Algebraic Methodology and Software Technology (AMAST 2000), Iowa City, IA, May 23, 2000. Invited Speaker for Education Day.

  125. "Whither Larch?,'' Larch Users Group Meeting, FM'99, September 24, 1999. Toulouse, FR.

  126. "Formal Methods: Past, Present, and Future,'' 1998 Asian Computing Science Conference, Manila, The Philippines, December 10, 1998, Keynote Speaker.

  127. "Formal Methods: Past, Present, and Future,'' Fourth Software Reuse Symposium: From Architectures to Products, Ft. Meade, MD, August 19, 1998. Invited Speaker.

  128. "Subtyping for Distributed Object Stores,'', Second IFIP International Workshop on Formal Methods for Open Object-based Distributed Systems (FMOODS), July 23, 1997, University of Kent at Canterbury. Invited Speaker.

  129. "Mathematics for Software Engineering,'' Mathematical Foundations of Programming Semantics, Boulder, CO, June 4, 1996. Invited Speaker.

  130. "Model Checking Software Systems: A Case Study,'' ACM SIGSOFT Foundations of Software Engineering, October 12, 1995.

  131. "Teaching Mathematics to Software Engineers,'' ZUM'95, Z Users Group, Limerick, Ireland, September 9, 1995, Invited Speaker for Education Day.

  132. "Specifications and Their Use in Defining Subtypes,'' ZUM'95, Z Users Group, Limerick, Ireland, September 8, 1995. Invited Speaker.

  133. "Teaching Mathematics to Software Engineers,'' Fourth International Conference on Algebraic Methodology and Software Technology (AMAST '95), Montreal, Canada, July 3, 1995. Invited Speaker for Education Day.

  134. "Using Belief to Reason About Cache Coherence in Distributed Systems,'' Formal Specification: Foundations, Methods, Tools and Applications, Warsaw, Poland, May 30, 1995.

  135. "The Role of Logic Programming in Software Engineering'' Int'l Conf. on Logic Programming '94, Santa Marguerita Ligure, Italy, June 13, 1994. Invited Speaker.

  136. "Specifications and Their Use in Defining Subtypes,'' OOPSLA '93, Washington, DC, September 28, 1993.

  137. "A New Definition of Subtyping,'' ECOOP '93, Kaiserslautern, Germany, July 28, 1993.

  138. "Composing Transactional Concepts,'' ECOOP '93 Workshop on Object-Based Distributed Programming, Kaiserslautern, Germany, July 26, 1993.

  139. "Specifications in Software Development,'' Logic in Computer Science Conference, Santa Cruz, CA, June 23, 1992. Invited Speaker.

  140. "Extensions to Standard ML to Support Transactions,'' Workshop on ML and its Applications, San Francisco, CA, June 21, 1992.

  141. "Persistence + Undoability = Transactions,'' Foundations of Inf. Systems Specification and Design, Dagstuhl, Germany, March 17, 1992.

  142. "Revisiting Abstraction Functions for Reasoning about Concurrency,'' Fifth Refinement Workshop: Theory and Practice, London, UK, January 8, 1992. Invited Speaker.

  143. "Unintrusive Ways to Integrate Formal Specifications in Practice,'' VDM '91, Delft, The Netherlands, October 25, 1991.

  144. "Textual Specifications of Visual Specifications,'' Workshop on Formal Methods in Computer Graphics, Marina di Carrara, Italy, June 17, 1991. Keynote Speaker.

  145. "ML as a Basis for Distributed Object Management,'' Standard ML Workshop, Princeton University, NJ, June 8, 1990.

  146. "Larch,'' ACM Workshop on Formal Methods in Software Development, Napa, CA, May 10, 1990.

  147. "Reliable Distributed Computing with Avalon/Common Lisp,'' IEEE Computer Society 1990 International Conference on Computer Languages, New Orleans, LA, March 14, 1990.

  148. "What is a Formal Method?,'' Formal Methods Workshop 1989, sponsored by the Governments of the US, the UK, and Canada, Halifax, Nova Scotia, July 25, 1989. Invited Speaker.

  149. "Specifying Security Constraints with Relaxation Lattices,'' Computer Security Foundations Workshop II, Franconia, NH, June 12, 1989.

  150. "Verifying Atomic Data Types,'' REX Workshop on Stepwise Refinement of Distributed Systems: Models, Formalism, Correctness, Plasmolen, The Netherlands, May 29-June 2, 1989.

  151. "Specifying Avalon Objects in Larch,'' Seminar on Foundations of Innovative Software Development, Conference on Theory and Practice of Software Development (TAPSOFT),'' Barcelona, Spain, March 16, 1989. Invited Speaker.

  152. "Reasoning About Atomic Objects,'' Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems,'' Warwick, England, September 23, 1988.

  153. "Specifying Recoverable Objects,'' Sixth Annual Pacific Northwest Software Quality Conference, Portland, OR, September 19, 1988.

  154. "Durra: a Task-Level Description Language,'' International Conference on Parallel Processing, St. Charles, IL, August 19, 1987.

  155. "Specifying Graceful Degradation in Distributed Systems,'' Sixth Symposium on Principles of Distributed Computing, Vancouver, Canada, August 11, 1987.

  156. "A Summary of the Library Problem,'' Fourth Int'l Workshop on Software Specification and Design, Monterey, CA, April 4, 1987.

  157. "A Larch Specification of the Library Example,'' Fourth Int'l Workshop on Software Specification and Design, Monterey, CA, April 3, 1987.

  158. "Specifying Functional and Timing Behavior for Real-Time Applications,'' Conference on Parallel Architectures and Languages Europe, Eindhoven, June 16, 1987.

  159. "Axioms for Concurrent Objects,'' Fourteenth Symposium on Principles of Programming Languages, Munich, W. Germany, January 21, 1987.

  160. "Extending Ina Jo with Temporal Logic,'' IEEE Symposium on Security and Privacy, Oakland, CA, April 7, 1986.

  161. "Geometric Reasoning: A New Paradigm for Processing Geometric Information,'' IEEE International Symposium on New Directions in Computing, Trondheim, Norway, August 12, 1985.

  162. "Specifying and Prototyping: Some Thoughts on Why They Are Successful,'' Theory and Practice of Software Development, Berlin, West Germany, March 25, 1985.

  163. "The Practice of Specifications,'' Workshop on Formal Aspects of Specification, Swindon, England, October 22, 1984.

  164. "Helping Specifiers Evaluate Their Specifications,'' AFCET Second International Conference on Software Engineering, Nice, France, June 5, 1984.

Professional Societies, Foundations, and Boards Talks

  1. "Thinking About Computational Thinking,'' University of Washington Phi Beta Kappa Centennial, Seattle, WA, April 30, 2014.

  2. "Privacy Research at Carnegie Mellon,'' Information Security and Privacy Advisory Board, National Institute of Standards and Technology, May 30, 2012.

  3. "What's Hot in Computing?,'' Hong Kong Carnegie Mellon Alumni Chapter, Hong Kong, October 10, 2011.

  4. "What's Hot in Computing?,'' Seattle Carnegie Mellon Alumni Chapter, Seattle, WA, March 23, 2011.

  5. "What's Hot in Computing?,'' Carnegie Mellon Advancement, Pittsburgh, PA, February 28, 2011.

  6. "Computational Thinking,'' Models of Infectious Disease Agent Study (MIDAS) Network, University of Pittsburgh, Pittsburgh, PA, October 7, 2010.

  7. "NSF and CISE Updates and PCAST Summary,'' National Academy of Engineering, Section 5, Washington, D,C October 4, 2010. Participation via videoconference.

  8. "CISE Education and Workforce Programs,'' ACM Education Policy Council, Washington, DC, February 23, 2010.

  9. "CISE Updates,'' CRA Executive Leadership Summit, Washington, DC, February 22, 2010.

  10. "The Budget Process,'' CRA Government Affairs Committee, Washington, DC, February 21, 2010.

  11. "Connecting Learning and Education for a Knowledge Society,'' National Science Board, February 4, 2010.

  12. "CISE Updates,'' National Academy of Engineering, Section 5, Irvine, CA, October 5, 2009.

  13. "Frontiers of Research and Infrastructure in CISE,'' Coalition of Academic Scientific Computation, Arlington, VA, April 29, 2009.

  14. "Computational Thinking,'' CISE and EHR Brown Bag, NSF, Arlington, VA, March 18, 2009.

  15. "Computing and CISE,'' Environment Research and Education Advisory Committee, NSF, Arlington, VA, October 15, 2008.

  16. "Computational Thinking and Thinking About Computing,'' Philosophical Society of Washington, Washington, DC, October 10, 2008

  17. "CISE Updates,'' National Academy of Engineering, Section 5, Washington, DC, October 6, 2008.

  18. "Computational Thinking for Everyone,'' National Academies, Washington, DC, September 19, 2008.

  19. "Increasing Female Students in Computer Science at Carnegie Mellon University: What We Did and What We're Doing,'' Women's Equality Day, NSF, Arlington, VA, August 26, 2008.

  20. "Data-Intensive Computing,'' Corporate Alliance Meeting, NSF, Arlington, VA, June 18, 2008.

  21. "Broadening Participation in Computing,'' Committee on Equal Opportunities in Science and Engineering (CEOSE), NSF, Arlington, VA, June 16, 2008.

  22. "CISE Updates,'' Office of Cyberinfrastructure Advisory Committee Meeting, NSF, Arlington, VA, May 15, 2008.

  23. "CISE Director's Review,'' NSF, Arlington, VA, May 13, 2008.

  24. "What's Up at CISE'' Committee on Science Policy, Society of Industrial and Applied Mathematics (SIAM), Washington, DC, November 15, 2007.

  25. "What's Up at CISE,'' Social, Behavioral, and Economic Sciences, Advisory Committee Meeting, NSF, Arlington, VA, November 8, 2007.

  26. "What's Up at CISE,'' Board on Mathematical Sciences and Their Applications, National Academies, Washington, DC, November 2, 2007.

  27. "Looking Ahead at CISE,'' Office of Cyberinfrastructure Advisory Committee Meeting, NSF, Arlington, VA, November 1, 2007.

  28. "Computing Themes and CISE Programs,'' National Academy of Engineering, Section 5, Washington, DC, October 1, 2007.

  29. "Looking Ahead at NSF/CISE,'' DARPA ISAT, Woods Hole, MA, August 14, 2007.

  30. "Looking Ahead at NSF/CISE,'' IT Deans Meeting, Computing Research Association, July 19, 2007.

  31. "Looking Ahead at NSF,'' CRA Leadership Summit, Washington, DC, February 26, 2007.

Addresses, Interviews, Testimonies, and Speeches

  1. An Insight, An Idea with Jeannette Wing, World Economic Forum, Davos, Switzerland, January 27, 2013.

  2. Passion, support system guided CMU's Wing through school, Pittsburgh Business Times, May 4, 2012. pdf.

  3. Interview with Jeannette Wing, Scientific Data Sharing Project, December 5, 2010.

  4. Experiences at the National Science Foundation, Friendship Village of the South Hills, Pittsburgh, PA, December 9, 2010.

  5. AI Futures, AI Workshop, Carnegie Mellon, December 4, 2010.

  6. Jeannette Wing, EECS Alumni/ae: taking EECS to the limits, MIT EECS Newsletter, Fall 2010.

  7. What's Hot in Computer Science?, Olympus Show and Tell, Pittsburgh, PA, October 5, 2010. Pittsburgh Post-Gazette news story.

  8. Denken wie ein Computerwissenschafter, Mario Wasserfallerm APA-ZukunftWissenm, September 27, 2010.

  9. CMU Professor Reflects on Time At National Science Foundation, Pittsburgh Post-Gazette, September 8, 2010.

  10. Computer Science, Presentation to President's Council of Advisors on Science and Technology (PCAST), September 1, 2010.

  11. "The Importance of Broader Impacts at NSF,'' Broader Impacts in Research and Discovery Summit (BIRDS), Arlington, VA, June 22, 2010.

  12. Welcome Address, BIOCISE Workshop, Arlington, VA, May 25, 2010.

  13. Welcome Address, Information Integration and Informatics PI Meeting, Rossyln, VA, April 22, 2010.

  14. Welcome Address, Computational Thinking Applied to Big Data in Healthcare Workshop, DARPA/NLM/NSF, Crystal City, VA, March 29, 2010.

  15. Welcome Address, Computer Systems Research Workshop, Arlington, VA, March 25, 2010.

  16. Microsoft and NSF Enable Research in the Cloud, February 4, 2010.

  17. "Computational Thinking for Everyone,'' Workshop II, National Academies, Washington, DC, February 4, 2010.

  18. "Computer Security Expert Jeannette Wing,'' in Cool Careers in Information Sciences, Sally Ride Science Publishers, 2009.

  19. Welcome Address, Discovery and Innovation in Health IT, San Francisco, CA, October 29, 2009.

  20. Welcome Address, NSF Workshop on Design and Automation, Arlington, VA, July 8, 2009.

  21. Cyber Security Hearing, testimony to House Committee on Science and Technology's Subcommittee on Technology and Innovation and Subcommittee on Research and Science Education, June 16, 2009.

  22. Welcome Address, Collaborative Research in Computational Neuroscience PI Meeting, Pittsburgh, PA, June 7, 2009.

  23. "Jeannette Wing, The Computational Thinker,'' Susan Karlin, IEEE The Institute (online), member profile, April 6, 2009.

  24. Welcome Address, Science of Power Management Workshop, Arlington, VA, April 9, 2009.

  25. "Computational Thinking,'' Research Experiences for Undergraduates (REU) Sites PI Meeting, Arlington, VA, March 12, 2009.

  26. The Grill: Jeannette M. Wing, interview by Gary Anthes, Computerworld, Vol. 43, No. 8, February 23, 2009, pp. 16-18.

  27. Last Byte: Q&A The Upper Limit, interview by Leah Hoffman, Communications of the ACM, Vol. 52, No. 1, January 2009, pp. 111-112.

  28. "Computational Thinking,'' Computational Thinking Olympiad Planning Committee, Arlington, VA, November 21, 2008.

  29. "Thinking Like a Computer Scientist,'' Kojo Nnamdi Show, WAMU 88.5, National Public Radio, November 19, 2008.

  30. Welcome Address, Molecular Communication, Arlington, VA, February 20, 2008.

  31. Welcome Address, Grace Hopper Conference, Orlando, Florida, October 18, 2007.

  32. Welcome Address, NSF Nanoelectronics Workshop, Arlington, Virginia, October 15, 2007.

  33. Welcome Address, NSF Quantum Information Systems Workshop, Arlington, Virginia, September 10, 2007.

  34. A Conversation with Jeannette Wing about Computational Thinking, IT Conversations with Jon Udell.

  35. "Dan Siewiorek, the Epitome of Carnegie Mellon,'' Dan60, December 4, 2006.

  36. Q&A with Jeannette M. Wing, interview by Lauren Aaronson, IEEE Spectrum (Online), July 2006.

Invited Participant

  1. Naturally Expressed Rapid Design (NERD), DARPA/ISAT Workshop, Airlie Center, Warrenton, VA, August 14-15, 2014.

  2. Survivalist/Intermittent Computing and Communications, DARPA/ISAT Workshop, Airlie Center, Warrenton, VA, August 11, 2014.

  3. The EverCloud: Anticipating and Countering Cloud-Rot, DARPA/ISAT Workshop, Seattle, WA, March 31-April 1, 2014.

  4. Trusting Networks of Humans and Computers, DARPA/ISAT Workshop, San Francisco, CA, March 20-21, 2014.

  5. Big Data: Government and Industry Examples, Data Science Forum, Presidential Inaugural Series, Carnegie Mellon, Pittsburgh, PA, November 14, 2013.

  6. Fifth Israeli Presidential Conference, June 18-20, 2013. Education: The Test of Tomorrow Panel, Jerusalem, Israel, June 19, 2013. Invited Panelist.

  7. Decoding the Digital Gender Divide, World Economic Forum, Davos, Switzerland, January 24, 2013.

  8. Science of Security Community Meeting, National Harbor, MD, November 29-30, 2012.

  9. Anonymity and Accountability, NSF Secure and Trustworthy Computing PI meeting, National Harbor, MD, November 27-29, 2012, session co-chair.

  10. Future Directions and Research Funding, MSRA Faculty Summit, Tianjin, China, October 27, 2012.

  11. The Role of Higher Education in China's Economy, University Roundtable, Tianjin, China, September 13, 2012.

  12. Big Data, The Annual Meeting of the New Champions 2012 World Economic Forum, Summer Davos, Tianjin, China, September 12, 2012. Invited Panelist.

  13. Microsoft Faculty Summit, Redmond, WA, July 16-17, 2012.

  14. Microsoft Think Tank Summit, Redmond, WA, July 15, 2012.

  15. TEDx, Leadership Pittsburgh, Nemacolin, PA, November 19-20, 2011.

  16. NSF TRUST Center Autumn 2011 Conference, Washington, DC, November 2-3, 2011.

  17. Microsoft Faculty Summit, Redmond, WA, July 18-20, 2011.

  18. Google Faculty Summit, New York, NY, July 13-15, 2011.

  19. Role of Information Sciences and Engineering in Sustainability, sponsored by the Computer Computing Consortium and NSF, Washington, DC, February 3-4, 2011.

  20. Usable Verification, sponsored by Microsoft Research and NSF, Redmond, WA, November 15-16, 2010.

  21. Innovation in Computing and IT for Sustainability, National Academies, Washington, DC, May 27, 2010. Invited Panelist.

  22. Government Panel, National Cyber Leap Year Summit, NITRD, Arlington, VA, August 17-19, 2009.

  23. Microsoft Faculty Summit, Redmond, WA, July 13-14, 2009.

  24. Rebooting Computer Science Summit, January 12-14, 2009, Mountain View, CA.

  25. Science in Society: Dialogues and Scientific Responsibility, Mouvement Universel de la Responsibilite Scientifique (MURS), European Union, Paris, France, November 24-25, 2008.

  26. "Mindswap on Cloud Computing,'' Microsoft Research Asia, Beijing, China, November 3, 2008.

  27. "Academia and Government Working Together to Promote Interdisciplinary Research,'' Panel on Interdisciplinary Research, Microsoft New England, September 22, 2008. Invited Panelist.

  28. Microsoft Faculty Summit, Redmond, WA, July 28-29, 2008.

  29. "Computing at Scale: Challenges and Opportunities,'' Google Faculty Summit, Mountain View, CA, July 24, 2008. Invited Panelist.

  30. "Data-Intensive Computing Symposium,'' Computer Community Consortium, Sunnyvale, CA, March 26, 2008.

  31. "National Cyber-Defense Initiative (NCDI) Workshop on Game-changing Solutions for Cyber Security,'' Intelligence Advanced Research Projects Activity (IARPA), College Park, Maryland, November 7, 2007.

  32. "The Science of Thinking: Europe's Next Challenge,'' Science Business, Brussels, Belgium, September 19, 2007.

  33. Google Faculty Summit, Mountain View, CA, July 26-27, 2007.

  34. "Optimism for the Future of Computing,'' Microsoft Faculty Summit, Redmond, Washington, July 16, 2007, Invited Panelist.

  35. NSF CyberInfrastructure Team, panel session, Washington, DC, July 11, 2007

  36. SIGCSE 2007, Birds-of-a-Feather session on Computational Thinking, organized by Peter Henderson, Covington, Kentucky, March 8, 2007.

  37. Science 2020 Forum, Venice, Italy, September 4-5, 2006. Organized by Microsoft Research Cambridge.

  38. PCAST Subcommittee on Cybersecurity, University Club of Chicago, August 30, 2006.

  39. Metricon 1.0, Vancouver, BC, August 1, 2006.

  40. Google Faculty Summit, Mountain View, CA, July 27-28, 2006.

  41. Microsoft Faculty Summit, Redmond, WA, July 17-18, 2006.

  42. NSF Cyber Trust PI Meeting, Newport, CA, September 25-27, 2005.

  43. Google Faculty Summit, Mountain View, CA, August 5, 2005.

  44. ARO High Confidence Embedded Systems, PI Meeting, Lincoln, Nebraska, May 10-11, 2005.

  45. NATO ARW Verification of Infinite State Systems with Applications to Security (VISSAS) 2005, Timisoara, Romania, March 17-22, 2005.

  46. CRA Computing Leadership Summit, Washington DC, February 28, 2005.

  47. DARPA ISAT Study "Bolt-on Security,'' Alexandria, VA, February 19-20, 2004.

  48. Workshop on Advanced Developments in Software and Systems Security,'' Taipei, Taiwan, December 5-7, 2003.

  49. Computer Research Associates Conference on Grand Research Challenges in Information Security and Assurance, November 16-19, 2003.

  50. Carnegie Mellon Sustainable Computing Consortium, Invited panelist, Pittsburgh, PA, September 30, 2003.

  51. Workshop on Software Engineering for Embedded Systems, Monterey Workshop Series, Chicago, IL, September 24-26, 2003.

  52. NSF/NIST Invitational Workshop on Cybersecurity Workforce Needs Assessment and Educational Innovation, Washington, DC, August 7-8, 2003.

  53. Microsoft Faculty Summit, Redmond, WA, July 28-29, 2003. Invited panelist on Trustworthy Computing, July 29, 2003.

  54. ARO High Confidence Embedded Systems, PI Meeting, Pittsburgh, PA, May 1-2, 2003.

  55. Microsoft Research Security Workshop, Snoqualmie, WA, February 28, 2003.

  56. Microsoft Research Concurrency Workshop, Snoqualmie, WA, February 24-25, 2003.

  57. NSF EDUCAUSE, Cybersecurity in Higher Education, Washington, DC, October 22-23, 2002.

  58. ARO High Confidence Embedded Systems, PI Meeting, Atlanta, GA, May 30-31, 2002.

  59. Electronic Tools Infrastructure (ETI) Workshop, IT-Center, Dortmund, Germany, November 23-24, 2001.

  60. Using Uncertainty Within Computation, AAAI 2001 Fall Symposium, North Falmouth, Cape Cod, MA, November 2-4, 2001. Invited panelist: "Future Research Directions on Uncertainty Within Computation.''

  61. Specifying and Checking Properties of Software, University of Washington/Microsoft Research Summer Institute, August 12-16, 2001.

  62. ARO High Confidence Embedded Systems, PI Kickoff Meeting, Philadelphia, May 24-25, 2001.

  63. DARPA High Assurance Scientific Computing, Arlington, VA, March 13-15, 2001.

  64. DARPA OASIS PI Meeting, Norfolk, VA, February 13-16, 2001.

  65. High Dependability Computing Consortium (HDCC) Workshop, NASA/Ames, January 10-12, 2001.

  66. Formalism in Software Engineering Education and Practice, Asia-Pacific Software Engineering Conference (APSEC), Singapore, December 6, 2000, invited panelist.

  67. SEI and IEEE Computer Society, Third Information Survivability Workshop (ISW-2000), Boston, MA, October 24-26, 2000.

  68. NASA/Ames, Design for Safety 2000 Workshop, Moffett Training Center, California, October 10-12, 2000.

  69. DARPA High Confidence Aviation Systems Workshop, Arlington, Virginia, June 21, 2000.

  70. DARPA IASET PI Meeting, Alexandria, Virginia, April 25-26, 2000.

  71. DARPA Formal Methods PI Meeting, Alexandria, Virginia, October 25-26, 1999.

  72. ISAT/DARPA Annual Meetings: April 24-25, 2001, April 26, 2000, January 19, 2000, May 6, 1999, January 20-21, 1999, IDA; August 20-24, 2001, July 10-14, 2000, August 23-27, 1999; Woods Hole, MA, November 11-13, 2000, Seattle, WA.

  73. University of Washington/Microsoft Research Summer Institute on Technologies to Improve Software Development, Seattle and Semiamoo, August 2-6, 1999.

  74. ONR and NSF Workshop in Computer Security, Fault Tolerance, and Software Assurance: From Needs to Solutions, Williamsburg, VA, November 10-12, 1998.

  75. DARPA Formal Methods PI Meeting, Palo Alto, October 29-30, 1998.

  76. NSF Software Workshop, Baltimore, Maryland, October 15-16, 1998.

  77. DARPA EDCS PI Meeting, Baltimore, Maryland, July 21-23, 1998.

  78. DARPA ITO PI Meeting, Austin, Texas, November 10-12, 1997.

  79. Panel on Funding for Software Research, COMPSAC, Washington, DC, August 14, 1997.

  80. DARPA CAETI Meeting, Berkeley, CA, November 19-22, 1996.

  81. DARPA ITO PI Meeting, Dallas, Texas, October 7-8, 1996.

  82. DARPA CAETI Meeting, University of Arlington, Texas, March 20-22, 1996.

  83. ZUM'95, Education Day, Z Users Group, Limerick, Ireland, September 9, 1995.

  84. Formal Specification: Foundations, Methods, Tools and Applications, Warsaw, Poland, May 29-June 1, 1995.

  85. Workshop on Industrializing Formal Specification Techniques, Ft. Lauderdale, April 5-8, 1995.

  86. ARPA Persistent Object Bases/Interoperability Meeting, La Jolla, CA, Oct. 31-Nov. 2, 1994.

  87. ARPA Software Composition Meeting, Charleston, SC, May 3-5, 1994.

  88. Research and Development for the NII: Technical Challenges, Gaithersburg, MD, NIST, February 28-March 1, 1994. Co-chair of Track on Interoperability.

  89. ACM SIGPLAN Workshop on Interface Definition Languages, January 20, 1994. Program chair.

  90. ECOOP '93 Workshop on Granularity of Objects in Distributed Systems, Kaiserslautern, Germany, July 26, 1993.

  91. ECOOP '93 Workshop on Object-Based Distributed Programming, Kaiserslautern, Germany, July 26-27, 1993. Invited panelist and speaker.

  92. NSASAB Panel on Formal Methods, Ft. George Meade, MD, February 9-10, 1993.

  93. NSF Workshop on the Future of Programming Languages and Compilers, Charleston, SC, January 6-7, 1993.

  94. Software Technology Conference, DARPA Software and Intelligent Systems Technology and Computing Systems Technology Offices, Los Angeles, CA, April 28-30, 1992.

  95. Foundations of Information Systems Specification and Design, International Conference and Research Center for Computer Science, Dagstuhl-Seminars, Saarbrucken, Germany, March 16-20, 1992.

  96. HPCC Software PI Meeting, DARPA Computing Systems Technology Office, San Diego, CA, January 15-17, 1992.

  97. Fifth Refinement Workshop: Theory and Practice of Formal Software, British Computer Society, London, UK, January 8-10, 1992.

  98. Intelligent Information Systems Workshop on Data/Knowledge Management, Como, Italy, October 28-30, 1991.

  99. Formal Methods '91, Governments of the US, the UK, and Canada, Drymen, Scotland, September 24-27, 1991.

  100. Formal Methods in Computer Graphics, Eurographics Association, Marina di Carrara, Italy, June 17-19, 1991.

  101. DARPA Information Science and Technology Office PI Meeting, Providence, RI, Feb. 27-March 1, 1991.

  102. Programming Concepts and Methods, IFIP Working Group 2.3, Catalina Island, CA, December 10-14, 1990.

  103. Research Agenda for Software Engineering and Large Scale Systems, DARPA Information Science and Technology Office, Washington, DC, June 27-29, 1990.

  104. IFIP TC 2 Working Conference on Programming Concepts and Methods, Sea of Galilee, Israel, April 2-5, 1990.

  105. Object-Oriented Database Concepts, Panel Session OOPSLA '89, S. Zdonik, organizer, New Orleans, October 4, 1989.

  106. Formal Methods Workshop '89, Governments of the US, the UK, and Canada, Nova Scotia, July 23-27, 1989.

  107. Stepwise Refinement of Distributed Systems: Models, Formalism, Correctness, Eindhoven, The Netherlands, May 29-June 2, 1989.

  108. Integrated Approach for Fault Tolerance: Current State and Future Requirements, University of Maryland at College Park, Institute for Advanced Computer Systems, May 4-5, 1989.

  109. Trusted System Design Validation Workshop, Computational Logic Inc., DARPA, Austin, TX, December 1-2, 1988.

  110. DARPA PI meeting, Information Science and Technology Office, Austin, TX, November 14-18, 1988.

  111. Future of Programming Languages Workshop, ONR, Miami, FL, October 13-14, 1988.

  112. Methodologies and Object-Oriented Programming Workshop, ACM OOPSLA, Orlando, FL, October 5, 1987.

  113. How Will We Specify Concurrent Systems in the Year 2000?, Western Committee of the IEEE Computer Society, Lake Arrowhead, CA, September 16-18, 1987.

  114. IFIP Working Group 2.3 Meeting, Pittsburgh, PA, August 15-19, 1988.

  115. Fourth International Workshop on Software Specification and Design, ACM SIGSOFT, IEEE Computer Society, AFCET, The Alvey Programme, and LCRST, Monterey, CA, April 3-4, 1987.

  116. Large Grained Parallelism, IEEE Computer Society, Providence, RI, October 27-29, 1986.

  117. Testing and Proving: Two Approaches to Assurance, Naval Research Laboratory, in conjunction with COMPASS '86, Georgetown University, Washington, DC, July 9-11, 1986.

  118. Third International Workshop on Software Specification and Design, ACM SIGSOFT, IEEE Computer Society, AFCET, the Alvey Programme, and LCRST, London, UK, August 26-27, 1985.

  119. Verification Workshop III, DOD Computer Security Center, Watsonville, CA, February 19-21, 1985.

  120. Workshop on Formal Aspects of Specification, The Alvey Programme, Imperial College, London, UK, October 22-24, 1984.

  121. Workshop on Formal Software Development Methods, Dansk Datamatik Center (Denmark) and Standard Telephone and Cable (England), Copenhagen, Denmark, May 21-25, 1984.

  122. Second International Workshop on Models and Languages for Software Specification and Design, IEEE Computer Society, LCRST, Oregon Graduate Center, and Laval University, Orlando, FL, March 30, 1984.

Grant Support

  • [Current]  

  • [Past]  
  • Educational Activities
    Courses Taught
  • [Post-graduate]  

  • [Graduate]  

  • [Undergraduate] 
  • Former Students

  • [Doctoral]  
    1. Michael Tschantz, "Formalizing and Enforcing Purpose Restrictions,'' May 2012.
      UC Berkeley post-doc.

    2. Pratyusa Manadhata, "An Attack Surface Metric,'' August 2008,
      HP Labs, Princeton, NJ.

    3. Oleg Sheyner, "Scenario Graphs and Attack Graphs,'' May 2004,
      MarketSight, Cambridge, MA. ACM Dissertation Award Nominee 2004. SCS Dissertation Award 2004.

    4. Theodore Wong, "Decentralized Recovery for Survivable Storage Systems,'' May 2004,
      IBM Almaden, CA.

    5. Rob O'Callahan (joint with D. Jackson), "Generalized Aliasing as a Basis for Program Analysis Tools,'' November 2000.
      Mozilla, New Zealand. ACM Dissertation Award Honorable Mention 2002.

    6. Hao-Chi Wong (Pure and Applied Logic), "Protecting Individuals' Interests in Electronic Commerce Protocols,'' October 2000.
      Intel, CA.

    7. Craig Damon, "Selective Enumeration,'' (joint with D. Jackson), August 2000.
      University of Vermont, VT.

    8. Darrell Kindred, "Theory Generation for Security Protocols,'' April 1999.
      SPARTA, Columbia, MD.

    9. Amy Moormann Zaremski, "Signature and Specification Matching,'' January 1996.
      Xerox Webster Research Center, Rochester, NY.

    10. Scott Nettles, "Safe and Efficient Persistent Heaps,'' December 1995.
      University of Texas, Austin, TX.

    11. J. Gregory Morrisett, "Compiling With Types'' (joint with R. Harper), December 1995.
      Harvard University, Cambridge, MA.

    12. Fritz Knabe, "Language Support for Mobile Agents,'' December 1995.
      Netezza, Marlborough, MA.

    13. Bruce L. Horn, "Constrained Objects,'' (joint with J. Morris), December 1993.
      Consultant, Bay Area, CA.

    14. Richard A. Lerner, "Specifying Objects in Concurrent Programs,'' May 1991.
      Amerinex Artificial Intelligence, 409 Main St., Amherst, MA 02002.

    15. David L. Detlefs, "Concurrent, Atomic Garbage Collection,'' October 1990.
      Google, Seattle, WA.

  • [Doctoral Committee Member]  
    Will Klieber, August 2013; Sicun (Sean) Gao (Pure and Applied Logic Program, Philosophy), October 2012; Kami Vaniea, September 2012; Jason Franklin, May 2012; Elie Burzstein (LSV, ENS-Cachan, CNRS, INRIA), November 2008; Murali Talipur, December 2006; Sanjit Seshia, May 2005; Michael McDougall (University of Pennsylvania), December 2004; Shawn Butler, May 2003; Adrian Perrig, December 2001; Will Marrero, June 2001; Marius Minea, January 2000; Juergen Dingel, November 1999; John Ockerbloom, January 1998; William Blackmon (Civil Engineering), July 1997; Charles Krueger, July 1997; William Courtright (Electrical and Computer Engineering), April 1997; David Steere, January 1997; Susan Older, December 1996; Qi Lu, May 1996; Chun Gong (University of Pittsburgh), October 1995; Bernhard Humm (University of Wollongong, Australia), September 1994; Nico Plat (Technical University of Delft, The Netherlands), September 1993; Jerry Burch, August 1992; Allan Heydon, October 1991; Olin Shivers, May 1991; John Baugh (Civil Engineering), August 1989.

  • [Master's]  
    1. Oren Dobzinski, ECE, "Alert Abstraction Using Attack Graphs," May 2006.
    2. E. Chaos Golubitsky, Information Networking Institute Program, "Measuring Attack Surfaces on Open Source IMAP Servers,'' May 2005.
    3. Meera Sridhar, CSD 5th Year Scholars Program, "Experiments Using an Attack Graph Toolkit,'' August 2004.
    4. Jose Rivera, CMU MSE program, independent study, "Development of a Concurrent Terminal Emulator using Formal Methods,'' October 1995.
    5. Chee Chew, MIT Co-op thesis, "Creator: An Interactive Application Builder,'' May 1993.
    6. Tini Widjojo (USC), 1984-1985.
    7. Sharon Anderson (USC), 1983-1985.

  • [Bachelor's]  
    1. Meera Sridhar, "The Honeywell Sensor Voter Algorithm: A Case Study,'' December 2002.
    2. Yuchung Ng, "A Nitpick Specification of IPv6,'' May 1997.
    3. Mandana Vaziri-Farahani, "Model Checking Cache Coherence Protocols for Distributed File Systems,'' ECE honors thesis, May 1995. Runner-up in the First Computing Research Association Outstanding Female Undergraduate Competition.
  • Visitors

  • [Faculty]  

  • [Scientists]  

  • [Postdocs]  

  • [Ph.D. Students]  

  • Other Educational Activities

  • [Participant] 

  • [Video] 
  • Service Activities

    National Organizations

  • [Awards, Honors] 

  • [Boards, Committees] 

  • [Lecturer] 
  • Regional Organization

  • [Honors] 
  • Journal Organizations

  • [Editorial Board] 

  • [Guest Editor] 

  • [Steering Committee] 
  • Conference and Workshop Organizations

  • [Workshop Organizer] 

  • [Program Chair] 

  • [Session Chair] 

  • [Program Committee] 

  • [Local Arrangements Chair] 

  • [Steering Committee, Advisory Board] 

  • Refereeing, Reviewing

  • [Journals] 
    ACM Transactions on Programming Languages and Systems, ACM Transactions on Computer Systems, Communications of the ACM, ACM Computing Surveys, ACM Computing Reviews, IEEE Communications Magazine, IEEE Computer, IEEE Software (special recognition), IEEE Transactions on Computers, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Software Engineering, Information Processing Letters, International Journal of Computers and Applications, Journal of Internetworking: Research and Experience, Journal of Symbolic Logic, New Media and Society.

  • [Conferences] 
    Thirteenth International Conference on Information and Communications Security 2011, International Symposium on Fault-Tolerant Computing Systems 1998, Hawaii International Conference on System Sciences 1988 and 1990, ACM Principles of Programming Languages Symposium 1987, Logic in Computer Science 1987, Fourth International Workshop on Software Specification and Design 1987, Sixth International Conference on Software Engineering, ACM LISP and Functional Languages Conference 1986, ACM Functional Programming Languages and Computer Architecture 1981.

  • [Grant Proposals] 
    Army Research Office; National Science Foundation; National Computer Security Center; National Institutes of Health; State of Idaho; University of California; Belgium Office for Scientific, Technical and Cultural Affairs; Natural Sciences and Engineering Research Council of Canada; Hong Kong Research Grants Council; The Israel Academy of Sciences and Humanities (Basic Research Foundation); Swedish Embassy, Office of Science and Technology, Washington, DC; The Netherlands Computer Science Research Foundation; Swiss National Science Foundation; Council of Physical Sciences of the Netherlands Organization for Scientific Research; Vienna Science and Technology Fund.

  • [Books] 
    Addison-Wesley Publishing Company, Reading, MA; Boyd and Fraser Publishing Company, Boston, MA; Cambridge University Press, Stanford, CA; McGraw-Hill Book Company, New York, NY; The MIT Press, Cambridge, MA; Charles E. Merrill Publishing, Co., IL; Prentice-Hall, Englewood Cliffs, NJ; Wadsworth Publishing Company, Belmont, CA.

  • [Other] 
    National Research Council, Computer Science and Telecommunications Board, 2012-2013; National University of Ireland Maynooth, 2011; National Science Foundation China, December 16-22, 2010; National Research Council, Computer Science and Telecommunications Board, "Trust in Cyberspace,'' 1997-1998; National Research Council, Commission on Engineering and Technical Systems, 1992.
  • University-wide Service

  • [University] 

  • [School] 

  • [Department]  

  • [Other Universities]  

  • Other Professional Activities

  • [Advisory Board]  

  • [Consultant]  

  • [Visiting Professor] 


  • [LaTeX -> HTML by ltoh]
    Russell W. Quong (quong@best.com.REMOVETHIS-SPAM-FILTER-PART)
    Last modified: Aug 26 2005