default search action
Jeannette M. Wing
Person information
- affiliation: Microsoft Research, USA
- affiliation: Carnegie Mellon University, Pittsburgh, USA
- award: ACM Distinguished Service Award, 2014
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j49]Peter Norvig, Alfred Z. Spector, Chris Wiggins, Jeannette M. Wing, Ben Fried, Michael Tingley:
More Than Just Algorithms. Commun. ACM 66(8): 53-61 (2023) - [j48]Alfred Z. Spector, Peter Norvig, Chris Wiggins, Jeannette M. Wing, Ben Fried, Michael Tingley:
More Than Just Algorithms: A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley. ACM Queue 21(1): 102-129 (2023) - 2021
- [j47]Jeannette M. Wing:
Trustworthy AI. Commun. ACM 64(10): 64-71 (2021) - 2020
- [c78]Jeannette M. Wing:
Data for Good: Ensuring the Responsible Use of Data to Benefit Society. IEEE BigData 2020: 1-2 - [c77]Ryan Bernstein, Matthijs Vákár, Jeannette M. Wing:
Transforming Probabilistic Programs for Model Checking. FODS 2020: 149-159 - [c76]Debmalya Mandal, Samuel Deng, Suman Jana, Jeannette M. Wing, Daniel J. Hsu:
Ensuring Fairness Beyond the Training Data. NeurIPS 2020 - [e5]Jeannette M. Wing, David Madigan:
FODS '20: ACM-IMS Foundations of Data Science Conference, Virtual Event, USA, October 19-20, 2020. ACM 2020, ISBN 978-1-4503-8103-1 [contents] - [i7]Jeannette M. Wing:
Ten Research Challenge Areas in Data Science. CoRR abs/2002.05658 (2020) - [i6]Jeannette M. Wing:
Trustworthy AI. CoRR abs/2002.06276 (2020) - [i5]Debmalya Mandal, Samuel Deng, Suman Jana, Jeannette M. Wing, Daniel Hsu:
Ensuring Fairness Beyond the Training Data. CoRR abs/2007.06029 (2020) - [i4]Ryan Bernstein, Matthijs Vákár, Jeannette M. Wing:
Transforming Probabilistic Programs for Model Checking. CoRR abs/2008.09680 (2020)
2010 – 2019
- 2018
- [c75]Jeannette M. Wing:
Data for Good: Abstract. KDD 2018: 4 - [c74]Foster J. Provost, James Hodson, Jeannette M. Wing, Qiang Yang, Jennifer Neville:
Societal Impact of Data Science and Artificial Intelligence. KDD 2018: 2872-2873 - 2017
- [c73]Jeannette M. Wing:
Embracing Uncertainty. SIGCSE 2017: 7 - 2016
- [j46]Jeannette M. Wing, Dan Stanzione:
Progress in computational thinking, and expanding the HPC community. Commun. ACM 59(7): 10-11 (2016) - [j45]Yuri Gurevich, Jeannette M. Wing:
Inverse privacy. Commun. ACM 59(7): 38-42 (2016) - [c72]Jeannette M. Wing, Danella Zhao:
Opening keynote: Crashing drones and hijacked cameras: Cybertrust meets cyberphysical. SoCC 2016: 1-3 - 2015
- [c71]Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. CSF 2015: 554-568 - [i3]Yuri Gurevich, Efim Hudis, Jeannette M. Wing:
Inverse Privacy. CoRR abs/1510.03311 (2015) - 2014
- [c70]Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Y. Tsai, Jeannette M. Wing:
Bootstrapping Privacy Compliance in Big Data Systems. IEEE Symposium on Security and Privacy 2014: 327-342 - [i2]Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. CoRR abs/1405.2376 (2014) - 2013
- [j44]Jeannette M. Wing, Mark Guzdial:
Encouraging IT usage in future healthcare, quality in CS education. Commun. ACM 56(5): 14-15 (2013) - [c69]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Purpose Restrictions on Information Use. ESORICS 2013: 610-627 - [c68]Jeannette M. Wing:
Formal methods: an industrial perspective. HILT 2013: 85-86 - 2012
- [c67]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Formalizing and Enforcing Purpose Restrictions in Privacy Policies. IEEE Symposium on Security and Privacy 2012: 176-190 - 2011
- [j43]Jeannette M. Wing, Ed H. Chi:
Reviewing peer review. Commun. ACM 54(7): 10-11 (2011) - [j42]Jeannette M. Wing, Valerie Barr:
Jeannette M. Wing @ PCAST; Barbara Liskov keynote. Commun. ACM 54(9): 10-11 (2011) - [j41]Pratyusa K. Manadhata, Jeannette M. Wing:
An Attack Surface Metric. IEEE Trans. Software Eng. 37(3): 371-386 (2011) - [c66]Virgil D. Gligor, Jeannette M. Wing:
Towards a Theory of Trust in Networks of Humans and Computers. Security Protocols Workshop 2011: 223-242 - [c65]Jeannette M. Wing:
Computational thinking. VL/HCC 2011: 3 - [p1]Pratyusa K. Manadhata, Jeannette M. Wing:
A Formal Model for a System's Attack Surface. Moving Target Defense 2011: 1-28 - [i1]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
On the Semantics of Purpose Requirements in Privacy Policies. CoRR abs/1102.4326 (2011) - 2010
- [j40]Jeannette M. Wing, Daniel Reed:
NSF funding advice: 21st century innovation. Commun. ACM 53(5): 10-11 (2010) - [j39]Edward Seidel, Jeannette M. Wing:
Preface. J. Comput. Sci. 1(1): 1-2 (2010)
2000 – 2009
- 2009
- [j38]Jeannette M. Wing, Daniel Reed, Mark Guzdial:
An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing. Commun. ACM 52(8): 12-13 (2009) - [j37]Jeannette M. Wing, Mark Guzdial:
CS woes: deadline-driven research, academic inequality. Commun. ACM 52(12): 8-9 (2009) - [c64]Pratyusa K. Manadhata, Yücel Karabulut, Jeannette M. Wing:
Report: Measuring the Attack Surfaces of Enterprise Software. ESSoS 2009: 91-100 - [c63]Michael Carl Tschantz, Jeannette M. Wing:
Formal Methods for Privacy. FM 2009: 1-15 - 2008
- [j36]Jeannette M. Wing:
Five deep questions in computing. Commun. ACM 51(1): 58-60 (2008) - [c62]Jeannette M. Wing:
Computational thinking and thinking about computing. IPDPS 2008: 1 - [c61]Michael Carl Tschantz, Jeannette M. Wing:
Extracting Conditional Confidentiality Policies. SEFM 2008: 107-116 - 2007
- [c60]Peter B. Henderson, Thomas J. Cortina, Jeannette M. Wing:
Computational thinking. SIGCSE 2007: 195-196 - [c59]Jeannette M. Wing:
Software Security. TASE 2007: 21 - 2006
- [j35]Jeannette M. Wing:
Computational thinking. Commun. ACM 49(3): 33-35 (2006) - [c58]Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen:
Measuring the attack surfaces of two FTP daemons. QoP 2006: 3-10 - [c57]Jeannette M. Wing:
Attack graph generation and analysis. AsiaCCS 2006: 14 - [c56]Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing:
Ranking Attack Graphs. RAID 2006: 127-144 - 2005
- [j34]Kong-wei Lye, Jeannette M. Wing:
Game strategies in network security. Int. J. Inf. Sec. 4(1-2): 71-86 (2005) - [c55]Jonathan D. Pincus, Jeannette M. Wing:
Towards an Algebra for Security Policies. ICATPN 2005: 17-25 - [c54]Jeannette M. Wing:
Scenario Graphs Applied to Security (Extended Abstract). VISSAS 2005: 229-234 - 2003
- [j33]Jeannette M. Wing:
A Call to Action: Look Beyond the Horizon. IEEE Secur. Priv. 1(6): 62-67 (2003) - [j32]Jeannette M. Wing:
Platitudes and attitudes. Int. J. Softw. Tools Technol. Transf. 4(3): 261-265 (2003) - [c53]Oleg Sheyner, Jeannette M. Wing:
Tools for Generating and Analyzing Attack Graphs. FMCO 2003: 344-372 - 2002
- [c52]Somesh Jha, Oleg Sheyner, Jeannette M. Wing:
Two Formal Analys s of Attack Graphs. CSFW 2002: 49-63 - [c51]Jeannette M. Wing:
Mathematics in Computer Science Curricula. MPC 2002: 22 - [c50]Theodore M. Wong, Chenxi Wang, Jeannette M. Wing:
Verifiable Secret Redistribution for Archive System. IEEE Security in Storage Workshop 2002: 94-106 - [c49]Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
Automated Generation and Analysis of Attack Graphs. S&P 2002: 273-284 - [c48]Jeannette M. Wing:
Vulnerability Analysis of Networked Systems. WETICE 2002: 4 - 2001
- [c47]Jeannette M. Wing:
Survivability Analysis of Networked Systems. FORTE 2001: 459- - [c46]Somesh Jha, Jeannette M. Wing:
Survivability Analysis of Network Systems. ICSE 2001: 307-317 - 2000
- [j31]Jeannette M. Wing, Jim Woodcock:
The First World Congress on Formal Methods in the Development of Computing Systems. Formal Aspects Comput. 12(3): 145-146 (2000) - [j30]Jeannette M. Wing, Jim Woodcock:
Introduction: Special Issues for FM'99, the First World Congress on Formal Methods in the Development of Computing Systems. Formal Methods Syst. Des. 17(3): 199-200 (2000) - [j29]Jeannette M. Wing, John Ockerbloom:
Respectful Type Converters. IEEE Trans. Software Eng. 26(7): 579-593 (2000) - [j28]Jeannette M. Wing, Jim Woodcock:
Guest Editors' Introduction-Special Issues for FM '99: The First World Congress On Formal Methods in the Development of Computing Systems. IEEE Trans. Software Eng. 26(8): 673-674 (2000) - [c45]Jeannette M. Wing:
Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum. AMAST 2000: 2-9 - [c44]Jeannette M. Wing:
Survivability Analysis of Networked Systems . APSEC 2000: 6-7 - [c43]Somesh Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff:
Survivability Analysis of Network Specifications. DSN 2000: 613-622
1990 – 1999
- 1999
- [j27]Daniel Jackson, Yu-Chung Ng, Jeannette M. Wing:
A Nitpick Analysis of Mobile IPv6. Formal Aspects Comput. 11(6): 591-615 (1999) - [j26]Victor R. Basili, Laszlo A. Belady, Barry W. Boehm, Frederick P. Brooks Jr., James Browne, Richard A. DeMillo, Stuart I. Feldman, Cordell Green, Butler W. Lampson, Duncan H. Lawrie, Nancy G. Leveson, Nancy A. Lynch, Mark D. Weiser, Jeannette M. Wing:
NSF workshop on a software research program for the 21st century. ACM SIGSOFT Softw. Eng. Notes 24(3): 37-44 (1999) - [e4]Jeannette M. Wing, Jim Woodcock, Jim Davies:
FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I. Lecture Notes in Computer Science 1708, Springer 1999, ISBN 3-540-66587-0 [contents] - [e3]Jeannette M. Wing, Jim Woodcock, Jim Davies:
FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II. Lecture Notes in Computer Science 1709, Springer 1999, ISBN 3-540-66588-9 [contents] - 1998
- [j25]Gary T. Leavens, Jeannette M. Wing:
Protective Interface Specifications. Formal Aspects Comput. 10(1): 59-75 (1998) - [c42]Jeannette M. Wing:
Formal Methods: Past, Present, and Future (Abstract). ASIAN 1998: 224 - [c41]Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing:
Proving Correctness of a Controller Algorithm for the RAID Level 5 System. FTCS 1998: 16-25 - 1997
- [j24]Jeannette M. Wing, Mandana Vaziri:
A Case study in Model Checking Software Systems. Sci. Comput. Program. 28(2-3): 273-299 (1997) - [j23]Amy Moormann Zaremski, Jeannette M. Wing:
Specification Matching of Software Components. ACM Trans. Softw. Eng. Methodol. 6(4): 333-369 (1997) - [c40]Gary T. Leavens, Jeannette M. Wing:
Protective Interface Specifications. TAPSOFT 1997: 520-534 - 1996
- [j22]Jonathan P. Bowen, Ricky W. Butler, David L. Dill, Robert L. Glass, David Gries, Anthony Hall, Michael G. Hinchey, C. Michael Holloway, Daniel Jackson, Cliff B. Jones, Michael J. Lutz, David Lorge Parnas, John M. Rushby, Jeannette M. Wing, Pamela Zave:
An Invitation to Formal Methods. Computer 29(4): 16-30 (1996) - [j21]Edmund M. Clarke, Jeannette M. Wing:
Tools and Partial Analysis. ACM Comput. Surv. 28(4es): 116 (1996) - [j20]Edmund M. Clarke, Jeannette M. Wing:
Formal Methods: State of the Art and Future Directions. ACM Comput. Surv. 28(4): 626-643 (1996) - 1995
- [j19]Amy Moormann Zaremski, Jeannette M. Wing:
Signature Matching: A Tool for Using Software Libraries. ACM Trans. Softw. Eng. Methodol. 4(2): 146-170 (1995) - [c39]Jeannette M. Wing:
Teaching Mathematics to Software Engineers. AMAST 1995: 18-40 - [c38]David Garlan, Alan W. Brown, Daniel Jackson, James E. Tomayko, Jeannette M. Wing:
The CMU Master of Software Engineering Core Curriculum. CSEE 1995: 65-86 - [c37]Jeannette M. Wing, David C. Steere:
Specifying Weak Sets. ICDCS 1995: 414-421 - [c36]Amy Moormann Zaremski, Jeannette M. Wing:
Specification Matching of Software Components. SIGSOFT FSE 1995: 6-17 - [c35]Jeannette M. Wing, Mandana Vaziri:
Model Checking Software Systems: A Case Study. SIGSOFT FSE 1995: 128-139 - [c34]Barbara Liskov, Jeannette M. Wing:
Specifications and Their Use in Defining Subtypes. ZUM 1995: 245-263 - [c33]Jeannette M. Wing:
Hints for Writing Specifications. ZUM 1995: 497 - 1994
- [j18]Nicholas Haines, Darrell Kindred, J. Gregory Morrisett, Scott Nettles, Jeannette M. Wing:
Composing First-Class Transactions. ACM Trans. Program. Lang. Syst. 16(6): 1719-1736 (1994) - [j17]Barbara Liskov, Jeannette M. Wing:
A Behavioral Notion of Subtyping. ACM Trans. Program. Lang. Syst. 16(6): 1811-1841 (1994) - [c32]Lily B. Mummert, Jeannette M. Wing, Mahadev Satyanarayanan:
Using Belief to Reason about Cache Coherence. PODC 1994: 71-80 - [c31]David C. Steere, Mahadev Satyanarayanan, Jeannette M. Wing:
Dynamic Sets for Search. PODC 1994: 397 - [e2]Jeannette M. Wing, Richard L. Wexelblat:
Proceedings of the Workshop on Interface Definition Languages, January 20, 1994, Portland, Oregon, USA, in conjunction with POPL 1994. ACM Press 1994 [contents] - 1993
- [b1]John V. Guttag, James J. Horning, Stephen J. Garland, Kevin D. Jones, A. Modet, Jeannette M. Wing:
Larch: Languages and Tools for Formal Specification. Texts and Monographs in Computer Science, Springer 1993, ISBN 978-1-4612-7636-4, pp. 1-156 - [j16]Jeannette M. Wing, Chun Gong:
Testing and Verifying Concurrent Objects. J. Parallel Distributed Comput. 17(1-2): 164-182 (1993) - [c30]Barbara Liskov, Jeannette M. Wing:
A New Definition of the Subtype Relation. ECOOP 1993: 118-141 - [c29]Jeannette M. Wing:
Decomposing and Recomposing Transactional Concepts. ECOOP Workshop 1993: 111-121 - [c28]Barbara Liskov, Jeannette M. Wing:
Specifications and Their Use in Defining Subtypes. OOPSLA 1993: 16-28 - [c27]Amy Moormann Zaremski, Jeannette M. Wing:
Signature Matching: A Key to Reuse. SIGSOFT FSE 1993: 182-190 - [e1]Ursula Martin, Jeannette M. Wing:
First International Workshop on Larch, Proceedings of the first First International Workshop on Larch, Dedham, Massachusetts, USA, 13-15 July 1992. Workshops in Computing, Springer 1993, ISBN 3-540-19804-0 [contents] - 1992
- [c26]Jeannette M. Wing, Eugene J. Rollins, Amy Moormann Zaremski:
Thoughts on a Larch/ML and a New Application for LP. Larch 1992: 297-312 - [c25]Jeannette M. Wing:
Specification in Software Development. LICS 1992: 112 - [c24]Jeannette M. Wing:
Revisiting Abstraction Functions For Reasoning About Concurrency. Refine 1992: 298-300 - 1991
- [j15]Maurice Herlihy, Jeannette M. Wing:
Specifying Graceful Degradation. IEEE Trans. Parallel Distributed Syst. 2(1): 93-104 (1991) - [c23]Jeannette M. Wing, Amy Moormann Zaremski:
Unintrusive Ways to Integrate Formal Specifications in Practice. VDM Europe (1) 1991: 545-569 - [c22]Eugene J. Rollins, Jeannette M. Wing:
Specifications as Search Keys for Software Libraries. ICLP 1991: 173-187 - [c21]Jeannette M. Wing, Amy Moormann Zaremski:
A formal specification of a visual language editor. IWSSD 1991: 120-129 - 1990
- [j14]Jeannette M. Wing:
A Specifier's Introduction to Formal Methods. Computer 23(9): 8-24 (1990) - [j13]Maurice Herlihy, Jeannette M. Wing:
Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst. 12(3): 463-492 (1990) - [j12]Jeannette M. Wing:
Using Larch to Specify Avalon/C++ Objects. IEEE Trans. Software Eng. 16(9): 1076-1088 (1990) - [j11]Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990) - [c20]Jeannette M. Wing, Chun Gong:
Experience with the Larch Prover. Formal Methods in Software Development 1990: 140-143 - [c19]Mario Barbacci, Jeannette M. Wing:
A Language for Distributed Applications. ICCL 1990: 59-68 - [c18]Stewart M. Clamen, Linda D. Leibengood, Scott Nettles, Jeannette M. Wing:
Reliable Distributed Computing with Avalon/Common Lisp. ICCL 1990: 169-179
1980 – 1989
- 1989
- [j10]Mario Barbacci, Dennis L. Doubleday, Charles B. Weinstock, Jeannette M. Wing:
Developing Applications for Heterogeneous Machine Networks: The Durra Network. Comput. Syst. 2(1): 7-35 (1989) - [j9]Jeannette M. Wing:
Verifying atomic data types. Int. J. Parallel Program. 18(5): 315-357 (1989) - [j8]Jeannette M. Wing, Mark R. Nixon:
Extending Ina Jo with Temporal Logic. IEEE Trans. Software Eng. 15(2): 181-197 (1989) - [c17]Maurice Herlihy, Jeannette M. Wing:
Specifying Security Constraints with Relaxation Lattices. CSFW 1989: 47-53 - [c16]Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Constraining Pictures with Pictures. IFIP Congress 1989: 157-162 - [c15]Stanley B. Zdonik, Toby Bloom, David W. Stemple, Jeannette M. Wing:
Panel on Transactions in Object-Oriented Systems. OOPSLA 1989: 473-476 - [c14]Jeannette M. Wing:
Verifying Atomic Data Types. REX Workshop 1989: 731-758 - [c13]Jeannette M. Wing:
Specifying Avalon Objects in Larch. TAPSOFT, Vol.2 1989: 61-80 - [c12]Allan Heydon, Mark W. Maimone, J. Doug Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Micro tools. VL 1989: 86-91 - 1988
- [j7]David Detlefs, Maurice Herlihy, Jeannette M. Wing:
Inheritance of Synchronization and Recovery Properties in Avalon/C++. Computer 21(12): 57-69 (1988) - [j6]Jeannette M. Wing:
A Study of 12 Specifications of the Library Problem. IEEE Softw. 5(4): 66-76 (1988) - [c11]Maurice Herlihy, Jeannette M. Wing:
Reasoning about Atomic Objects. FTRTFT 1988: 193-208 - [c10]Mario Barbacci, Charles B. Weinstock, Jeannette M. Wing:
Programming at the Processor-Memory-Switch Level. ICSE 1988: 19-29 - [c9]Mark W. Maimone, J. Doug Tygar, Jeannette M. Wing:
Miro semantics for security. VL 1988: 45-51 - [c8]Maurice Herlihy, Jeannette M. Wing:
Linearizable concurrent objects. OOPSLA/ECOOP Workshop on Object-based Concurrent Programming 1988: 133-135 - 1987
- [j5]Jeannette M. Wing:
Writing Larch Interface Language Specifications. ACM Trans. Program. Lang. Syst. 9(1): 1-24 (1987) - [c7]David Detlefs, Maurice Herlihy, K. Kietzke, Jeannette M. Wing:
Avalon/C++. C++ Workshop 1987: 451-459 - [c6]Mario Barbacci, Jeannette M. Wing:
DURRA : A Task-Level Description Language. ICPP 1987: 370-376 - [c5]Mario Barbacci, Jeannette M. Wing:
Specifying Functional and Timing Behavior for Real-Time Applications. PARLE (2) 1987: 124-140 - [c4]Maurice Herlihy, Jeannette M. Wing:
Specifying Graceful Degradation in Distributed Systems. PODC 1987: 167-177 - [c3]Maurice Herlihy, Jeannette M. Wing:
Axioms for Concurrent Objects. POPL 1987: 13-26 - 1986
- [j4]John V. Guttag, James J. Horning, Jeannette M. Wing:
Abstracts in software engineering. ACM SIGSOFT Softw. Eng. Notes 11(1): 103-110 (1986) - [c2]Jeannette M. Wing, Mark R. Nixon:
Extending Ina Jo with Temporal Logic. S&P 1986: 2-13 - 1985
- [j3]Jeannette M. Wing:
Beyond functional behavior: combining methods to specify different classes of properties of large systems. ACM SIGSOFT Softw. Eng. Notes 10(4): 102-104 (1985) - [j2]John V. Guttag, James J. Horning, Jeannette M. Wing:
The Larch Family of Specification Languages. IEEE Softw. 2(5): 24-36 (1985) - [c1]Daniel M. Berry, Jeannette M. Wing:
Specification and Prototyping: Some Thoughts on Why They Are Successful. TAPSOFT, Vol.2 1985: 117-128 - 1982
- [j1]John V. Guttag, James J. Horning, Jeannette M. Wing:
Some Notes on Putting Formal Specifications to Productive Use. Sci. Comput. Program. 2(1): 53-68 (1982)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint