2015-08-31 22:04:01 +00:00
%%%%%%%%%%%%%%%%%%%%%%%%%%%% UNPUBLISHED %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
2015-11-04 15:02:40 +00:00
@unpublished { HMRRV16 ,
title = {Do prices coordinate markets?},
author = {Hsu, Justin and
Morgenstern, Jamie and
Rogers, Ryan and
Roth, Aaron and
Vohra, Rakesh},
year = 2015,
url = {http://arxiv.org/abs/1511.00925},
jh = yes,
eprint = yes,
}
2015-08-31 22:04:01 +00:00
@unpublished { HKM-verif15 ,
2015-09-14 07:59:17 +00:00
title = {Computer-aided verification in mechanism design},
2015-08-31 22:04:01 +00:00
author = {Barthe, Gilles and
2015-09-14 07:59:17 +00:00
Gaboardi, Marco and
Gallego Arias, Emilio Jes{\'u}s and
Hsu, Justin and
Roth, Aaron and
Strub, Pierre-Yves},
year = {2015},
url = {http://arxiv.org/abs/1502.04052},
jh = yes,
2015-08-31 22:04:01 +00:00
eprint = yes
}
@unpublished { BEGGHS15 ,
2015-09-14 07:59:17 +00:00
title = {Formal certification of randomized algorithms},
2015-08-31 22:04:01 +00:00
author = {Barthe, Gilles and
Espitau, Thomas and
Gaboardi, Marco and
Gr{\'e}goire, Benjamin and
Hsu, Justin and
Strub, {P}ierre-{Y}ves},
2015-09-14 07:59:17 +00:00
year = 2015,
jh = yes,
docs = yes
2015-08-31 22:04:01 +00:00
}
%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONFERENCES %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
2015-09-11 17:23:51 +00:00
@inproceedings { HHRW16 ,
2015-09-14 07:59:17 +00:00
author = {Hsu, Justin and
2015-09-11 17:23:51 +00:00
Huang, Zhiyi and
Roth, Aaron and
Wu, Zhiwei Steven},
2015-09-14 07:59:17 +00:00
title = {Jointly private convex programming},
2015-09-11 17:23:51 +00:00
booktitle = soda16,
2015-09-14 07:59:17 +00:00
year = {2016},
url = {http://arxiv.org/abs/1411.0998},
jh = yes,
eprint = yes,
note = {To appear.}
2015-09-11 17:23:51 +00:00
}
2015-08-31 22:04:01 +00:00
@inproceedings { BEGHSS15 ,
2015-09-14 07:59:17 +00:00
title = {Relational reasoning via probabilistic coupling},
author = {Barthe, Gilles and
2015-08-31 22:04:01 +00:00
Espitau, Thomas and
Gr{\'e}goire, Benjamin and
Hsu, Justin and
Stefanesco, L{\'e}o and
Strub, {P}ierre-{Y}ves},
booktitle = lpar15,
2015-09-14 07:59:17 +00:00
year = 2015,
jh = yes,
eprint = yes,
url = {http://arxiv.org/abs/1509.03476},
note = {To appear.}
2015-08-31 22:04:01 +00:00
}
@inproceedings { AHJ15 ,
2015-09-14 07:59:17 +00:00
title = {Online assignment with heterogeneous tasks in crowdsourcing
2015-09-11 17:25:42 +00:00
markets},
2015-09-14 07:59:17 +00:00
author = {Assadi, Sepehr and Hsu, Justin and Jabbari, Shahin},
year = {2015},
2015-08-31 22:04:01 +00:00
booktitle = hcomp15,
2015-09-14 07:59:17 +00:00
url = {http://arxiv.org/abs/1508.03593},
jh = yes,
eprint = yes,
note = {To appear.}
2015-08-31 22:04:01 +00:00
}
@inproceedings { HsuTaxes ,
2015-09-14 07:59:17 +00:00
author = {Justin Hsu},
title = {Death, taxes, and formal verification (Abstract)},
year = {2015},
2015-08-31 22:04:01 +00:00
booktitle = snapl15,
2015-09-14 07:59:17 +00:00
jh = yes,
slides = yes,
docs = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { GHaccuracy ,
2015-09-14 07:59:17 +00:00
author = {Marco Gaboardi and
2015-08-31 22:04:01 +00:00
Justin Hsu},
2015-09-14 07:59:17 +00:00
title = {A Theory {AB} toolbox},
year = {2015},
2015-08-31 22:04:01 +00:00
booktitle = snapl15,
2015-09-14 07:59:17 +00:00
jh = yes,
slides = yes,
docs = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { BGGHRS15 ,
2015-09-14 07:59:17 +00:00
title = {Higher-order approximate relational refinement types for
2015-08-31 22:04:01 +00:00
mechanism design and differential privacy},
2015-09-14 07:59:17 +00:00
author = {Barthe, Gilles and
2015-08-31 22:04:01 +00:00
Gaboardi, Marco and
Gallego Arias, Emilio Jes{\'u}s and
Hsu, Justin and
Roth, Aaron and
Strub, Pierre-Yves},
booktitle = popl15,
2015-09-14 07:59:17 +00:00
year = {2015},
url = {http://arxiv.org/abs/1407.6845},
jh = yes,
slides = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { AGGH14 ,
2015-09-14 07:59:17 +00:00
author = {de Amorim, Arthur Azevedo and
2015-08-31 22:04:01 +00:00
Gaboardi, Marco and
Gallego Arias, Emilio Jes{\'u}s and
Hsu, Justin},
2015-09-14 07:59:17 +00:00
title = {Really naturally linear indexed type-checking},
2015-08-31 22:04:01 +00:00
booktitle = {Proceedings of Implementation of Functional Languages (IFL), Boston, Massachusetts},
2015-09-14 07:59:17 +00:00
year = {2014},
url = {http://arxiv.org/abs/1503.04522},
jh = yes,
slides = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { BGGHKS14 ,
2015-09-14 07:59:17 +00:00
author = {Barthe, Gilles and
2015-08-31 22:04:01 +00:00
Gaboardi, Marco and
Gallego Arias, Emilio Jes{\'u}s and
Hsu, Justin and
Kunz, C\'esar and
Strub, Pierre-Yves},
2015-09-14 07:59:17 +00:00
title = {Proving differential privacy in {H}oare logic},
2015-08-31 22:04:01 +00:00
booktitle = csf14,
2015-09-14 07:59:17 +00:00
year = {2014},
url = {http://arxiv.org/abs/1407.2988},
jh = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { HGH14 ,
2015-09-14 07:59:17 +00:00
author = {Hsu, Justin and
2015-08-31 22:04:01 +00:00
Gaboardi, Marco and
Haeberlen, Andreas and
Khanna, Sanjeev and
Narayan, Arjun and
Pierce, Benjamin C and
Roth, Aaron},
2015-09-14 07:59:17 +00:00
title = {Differential privacy: An economic method for choosing epsilon},
2015-08-31 22:04:01 +00:00
booktitle = csf14,
2015-09-14 07:59:17 +00:00
year = 2014,
url = {http://arxiv.org/abs/1402.3329},
jh = yes,
slides = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { HRRU14 ,
2015-09-14 07:59:17 +00:00
author = {Hsu, Justin and
2015-08-31 22:04:01 +00:00
Roth, Aaron and
Roughgarden, Tim and
Ullman, Jonathan},
2015-09-14 07:59:17 +00:00
title = {Privately solving linear programs},
2015-08-31 22:04:01 +00:00
booktitle = icalp14,
2015-09-14 07:59:17 +00:00
year = {2014},
pages = {612--624},
url = {http://arxiv.org/abs/1402.3631},
doi = {10.1007/978-3-662-43948-7_51},
2015-08-31 22:04:01 +00:00
timestamp = {Fri, 31 Oct 2014 14:45:31 +0100},
2015-09-14 07:59:17 +00:00
biburl = {http://dblp.uni-trier.de/rec/bib/conf/icalp/HsuRRU14},
2015-08-31 22:04:01 +00:00
bibsource = {dblp computer science bibliography, http://dblp.org},
2015-09-14 07:59:17 +00:00
jh = yes,
slides = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { GGHRW14 ,
2015-09-14 07:59:17 +00:00
author = {Gaboardi, Marco and
2015-08-31 22:04:01 +00:00
Gallego Arias, Emilio Jes{\'u}s and
Hsu, Justin and
Roth, Aaron and
Wu, Zhiwei Steven},
2015-09-14 07:59:17 +00:00
title = {Dual Query: Practical private query release for high dimensional data},
2015-08-31 22:04:01 +00:00
booktitle = icml14,
2015-09-14 07:59:17 +00:00
year = {2014},
url = {http://arxiv.org/abs/1402.1526},
jh = yes,
slides = yes,
poster = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { HHRRW14 ,
2015-09-14 07:59:17 +00:00
author = {Hsu, Justin and
2015-08-31 22:04:01 +00:00
Huang, Zhiyi and
Roth, Aaron and
Roughgarden, Tim and
Wu, Zhiwei Steven},
2015-09-14 07:59:17 +00:00
title = {Private matchings and allocations},
2015-08-31 22:04:01 +00:00
booktitle = stoc14,
2015-09-14 07:59:17 +00:00
year = {2014},
pages = {21--30},
url = {http://arxiv.org/abs/1311.2828},
doi = {10.1145/2591796.2591826},
2015-08-31 22:04:01 +00:00
timestamp = {Wed, 22 Oct 2014 14:44:14 +0200},
2015-09-14 07:59:17 +00:00
biburl = {http://dblp.uni-trier.de/rec/bib/conf/stoc/HsuHRRW14},
2015-08-31 22:04:01 +00:00
bibsource = {dblp computer science bibliography, http://dblp.org},
2015-09-14 07:59:17 +00:00
jh = yes,
poster = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { WHE13 ,
2015-09-14 07:59:17 +00:00
title = {Towards dependently typed {H}askell: {S}ystem {FC} with kind equality},
author = {Weirich, Stephanie and
2015-08-31 22:04:01 +00:00
Hsu, Justin and
Eisenberg, Richard A},
booktitle = icfp13,
2015-09-14 07:59:17 +00:00
url = {http://www.cis.upenn.edu/~justhsu/docs/nokinds.pdf},
volume = {13},
year = {2013},
jh = yes,
docs = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { HRU13 ,
2015-09-14 07:59:17 +00:00
title = {Differential privacy for the analyst via private equilibrium computation},
author = {Hsu, Justin and
2015-08-31 22:04:01 +00:00
Roth, Aaron and
Ullman, Jonathon},
2015-09-14 07:59:17 +00:00
url = {http://arxiv.org/abs/1211.0877},
2015-08-31 22:04:01 +00:00
booktitle = stoc13,
2015-09-14 07:59:17 +00:00
pages = {341--350},
year = {2013},
jh = yes,
slides = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { GGHHP13 ,
2015-09-14 07:59:17 +00:00
title = {Automatic sensitivity analysis using linear dependent types},
author = {Gaboardi, Marco and
2015-08-31 22:04:01 +00:00
Gallego Arias, Emilio Jes{\'u}s and
Haeberlen, Andreas and
Hsu, Justin and
Pierce, Benjamin C},
2015-09-14 07:59:17 +00:00
url = {http://fopara2013.cs.unibo.it/paper_8.pdf},
2015-08-31 22:04:01 +00:00
booktitle = fopara,
2015-09-14 07:59:17 +00:00
year = {2013},
jh = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { GHHNP13 ,
2015-09-14 07:59:17 +00:00
title = {Linear dependent types for differential privacy},
author = {Gaboardi, Marco and
2015-08-31 22:04:01 +00:00
Haeberlen, Andreas and
Hsu, Justin and
Narayan, Arjun and
Pierce, Benjamin C},
booktitle = popl13,
2015-09-14 07:59:17 +00:00
pages = {357--370},
url = {http://dl.acm.org/citation.cfm?id=2429113},
year = {2013},
jh = yes,
docs = yes
2015-08-31 22:04:01 +00:00
}
@inproceedings { HKR12 ,
2015-09-14 07:59:17 +00:00
title = {Distributed private heavy hitters},
author = {Hsu, Justin and
2015-08-31 22:04:01 +00:00
Khanna, Sanjeev and
Roth, Aaron},
booktitle = icalp12,
2015-09-14 07:59:17 +00:00
pages = {461--472},
year = {2012},
2015-08-31 22:04:01 +00:00
publisher = springer,
2015-09-14 07:59:17 +00:00
url = {http://arxiv.org/abs/1202.4910},
note = {Thanks to Raef Bassily and Adam Smith for spotting an error, now
2015-08-31 22:04:01 +00:00
fixed.},
2015-09-14 07:59:17 +00:00
jh = yes,
slides = yes,
eprint = yes
2015-08-31 22:04:01 +00:00
}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% JOURNALS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
2015-01-03 22:23:27 +00:00
@article { job-matching ,
title = {Job Matching, Coalition Formation, and Gross Substitutes},
volume = {50},
doi = {10.2307/1913392},
number = {6},
urldate = {2013--07--07},
journal = {{Econometrica}},
author = {Kelso, Alexander and Crawford, Vincent},
year = {1982},
pages = {1483--1504},
}
@article { CSS10 ,
title = {Private and continual release of statistics},
volume = {14},
url = {http://eprint.iacr.org/2010/076.pdf},
number = {3},
urldate = {2013--06--23},
journal = tissec,
author = {Chan, T.-H. Hubert and Shi, Elaine and Song, Dawn},
year = {2011},
pages = {26},
}
@inproceedings { DNPR10 ,
title = {Differential privacy under continual observation},
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N.},
url = {http://www.mit.edu/~rothblum/papers/continalobs.pdf},
booktitle = stoc10,
pages = {715--724},
year = {2010},
}
@inproceedings { DNV12 ,
title = {The privacy of the analyst and the power of the state},
author = {Dwork, Cynthia and Naor, Moni and Vadhan, Salil},
booktitle = focs12,
pages = {400--409},
doi = {10.1109/FOCS.2012.87},
url = {http://projects.iq.harvard.edu/files/privacytools/files/06375318.pdf},
year = {2012}
}
@article { PR13 ,
title = {Privacy and Mechanism Design},
author = {Pai, Mallesh and Roth, Aaron},
url = {http://arxiv.org/abs/1306.2083},
journal = sigecom,
year = {2013}
}
@inproceedings { NRS07 ,
title = {Smooth sensitivity and sampling in private data analysis},
url = {http://www.cse.psu.edu/~asmith/pubs/NRS07/NRS07-full-draft-v1.pdf},
author = {Nissim, Kobbi and Raskhodnikova, Sofya and Smith, Adam},
booktitle = stoc07,
pages = {75--84},
year = {2007},
}
@inproceedings { RR14 ,
2015-09-14 07:59:17 +00:00
title = {Asymptotically truthful equilibrium selection in large congestion games},
author = {Rogers, Ryan M and Roth, Aaron},
booktitle = ec14,
pages = {771--782},
year = {2014},
url = {http://arxiv.org/abs/1311.2625}
2015-01-03 22:23:27 +00:00
}
@inproceedings { GLMRT10 ,
title = {Differentially private combinatorial optimization},
url = {http://arxiv.org/abs/0903.4510},
author = {Gupta, Anupam and Ligett, Katrina and Mc{S}herry, Frank and Roth,
Aaron and Talwar, Kunal},
booktitle = soda10,
pages = {1106--1125},
year = {2010},
}
@article { GS99 ,
title = {Walrasian equilibrium with gross substitutes},
author = {Gul, Faruk and Stacchetti, Ennio},
url = {http://www.princeton.edu/~fgul/walras.pdf},
journal = jet,
volume = {87},
number = {1},
pages = {95--124},
year = {1999},
publisher = elsevier
}
@article { BLR08 ,
title = {A learning theory approach to noninteractive database privacy},
author = {Blum, Avrim and Ligett, Katrina and Roth, Aaron},
journal = jacm,
url = {http://arxiv.org/abs/1109.2229},
volume = {60},
number = {2},
pages = {12},
year = {2013},
}
@inproceedings { HR10 ,
title = {A multiplicative weights mechanism for privacy-preserving data analysis},
author = {Hardt, Moritz and Rothblum, Guy N.},
url = {http://www.mit.edu/~rothblum/papers/pmw.pdf},
booktitle = focs10,
pages = {61--70},
year = {2010},
}
@inproceedings { DN03 ,
title = {Revealing information while preserving privacy},
author = {Dinur, Irit and Nissim, Kobbi},
url = {http://www.cse.psu.edu/~asmith/privacy598/papers/dn03.pdf},
booktitle = pods03,
pages = {202--210},
year = {2003},
}
@article { DR14 ,
author = {Cynthia Dwork and
Aaron Roth},
title = {The Algorithmic Foundations of Differential Privacy},
journal = {Foundations and Trends in Theoretical Computer Science},
year = {2014},
volume = {9},
number = {3-4},
pages = {211--407},
url = {http://dx.doi.org/10.1561/0400000042},
doi = {10.1561/0400000042},
timestamp = {Tue, 28 Oct 2014 14:00:24 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/fttcs/DworkR14},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings { KPRU14 ,
title = {Mechanism Design in Large Games: Incentives and Privacy},
url = {http://arxiv.org/abs/1207.4084},
author = {Kearns, Michael and Pai, Mallesh and Roth, Aaron and Ullman, Jonathan},
pages = {403--410},
booktitle = itcs14,
year = {2014}
}
@inproceedings { DRV10 ,
title = {Boosting and differential privacy},
url = {http://research.microsoft.com/pubs/155170/dworkrv10.pdf},
booktitle = focs10,
author = {Dwork, Cynthia and Rothblum, Guy N. and Vadhan, Salil},
year = {2010},
keywords = {Algorithms, {CS}, {DP}, Learning Theory},
pages = {51-– 60},
}
@inproceedings { FPT04 ,
title = {The complexity of pure Nash equilibria},
author = {Fabrikant, Alex and Papadimitriou, Christos and Talwar, Kunal},
url = {http://research.microsoft.com/pubs/74349/pub10-pure.pdf},
booktitle = stoc04,
pages = {604--612},
year = {2004},
}
@article { MS96 ,
title = {Potential games},
author = {Monderer, Dov and Shapley, Lloyd S.},
journal = geb,
url = {http://www.cs.bu.edu/~steng/teaching/Fall2008/potential.pdf},
volume = {14},
number = {1},
pages = {124--143},
year = {1996},
publisher = {Elsevier}
}
@inproceedings { CK05 ,
title = {The price of anarchy of finite congestion games},
author = {Christodoulou, George and Koutsoupias, Elias},
url = {http://dl.acm.org/citation.cfm?id=1060600},
booktitle = stoc05,
pages = {67--73},
year = {2005},
}
@inproceedings { AAE05 ,
title = {The price of routing unsplittable flow},
author = {Awerbuch, Baruch and Azar, Yossi and Epstein, Amir},
booktitle = stoc05,
url = {http://dl.acm.org/citation.cfm?id=1060599},
pages = {57--66},
year = {2005},
}
@inproceedings { Rou09 ,
title = {Intrinsic robustness of the price of anarchy},
author = {Roughgarden, Tim},
url = {http://theory.stanford.edu/~tim/papers/robust.pdf},
booktitle = stoc09,
pages = {513--522},
year = {2009},
}
@inproceedings { BHLR08 ,
title = {Regret minimization and the price of total anarchy},
author = {Blum, Avrim and Haji{A}ghayi, Mohammad{T}aghi and Ligett, Katrina
and Roth, Aaron},
url = {http://dl.acm.org/citation.cfm?id=1374430},
booktitle = stoc08,
pages = {373--382},
year = {2008},
}
@inproceedings { HLM12 ,
title = {A Simple and Practical Algorithm for Differentially Private Data Release},
author = {Moritz Hardt and Katrina Ligett and Frank {McSherry}},
booktitle = nips12,
pages = {2348--2356},
url = {http://arxiv.org/abs/1012.4763},
year = 2012
}
@inproceedings { Ullman13 ,
title = {Answering $n^{2+ o(1)}$ counting queries with differential
privacy is hard},
author = {Ullman, Jonathan},
booktitle = stoc13,
pages = {361--370},
url = {http://arxiv.org/abs/1207.6945},
year = 2013
}
}
@inproceedings { MT07 ,
author = {Frank McSherry and
Kunal Talwar},
title = {Mechanism Design via Differential Privacy},
booktitle = focs07,
pages = {94--103},
url = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2007.41},
year = 2007
}
@inproceedings { FS96 ,
title = {Game theory, on-line prediction and boosting},
author = {Freund, Y. and Schapire, R.E.},
booktitle = colt96,
pages = {325--332},
url = {http://dl.acm.org/citation.cfm?id=238163 },
year = 1996
}
@inproceedings { BDMN05 ,
title = {Practical privacy: the {SuLQ} framework},
author = {Avrim Blum and
Cynthia Dwork and
Frank Mc{S}herry and
Kobbi Nissim},
booktitle = pods05,
pages = {128--138},
url = {http://research.microsoft.com/pubs/64351/bdmn.pdf},
year = 2005
}
@inproceedings { GRU12 ,
title = {Iterative constructions and private data release},
author = {Gupta, Anupam and Roth, Aaron and Jonathan Ullman},
booktitle = tcc12,
pages = {339--356},
url = {http://arxiv.org/abs/1107.3731},
year = 2012
}
@inproceedings { airavat ,
2015-09-14 07:59:17 +00:00
author = {Indrajit Roy and Srinath Setty and Ann Kilzer and Vitaly
2015-01-03 22:23:27 +00:00
Shmatikov and Emmett Witchel},
2015-09-14 07:59:17 +00:00
title = {Airavat: Security and Privacy for {MapReduce}},
booktitle = nsdi10,
url = {http://dl.acm.org/citation.cfm?id=1855731 },
year = 2010
2015-01-03 22:23:27 +00:00
}
@inproceedings { pinq ,
2015-09-14 07:59:17 +00:00
author = {{McSherry}, Frank},
booktitle = sigmod09,
title = {Privacy integrated queries},
url = {http://research.microsoft.com/pubs/80218/sigmod115-mcsherry.pdf},
year = 2009
2015-01-03 22:23:27 +00:00
}
@inproceedings { zhang-2011-privatemining ,
2015-09-14 07:59:17 +00:00
author = {Zhang, Ning and Li, Ming and Lou, Wenjing},
title = {Distributed Data Mining with Differential Privacy},
booktitle = icc11,
url = {http://dl.acm.org/citation.cfm?id=1835868},
year = 2011
2015-01-03 22:23:27 +00:00
}
@inproceedings { evfimievski-2002-associationrules ,
2015-09-14 07:59:17 +00:00
author = {Evfimievski, Alexandre and
Srikant, Ramakrishnan and
Agrawal, Rakesh and
Gehrke, Johannes},
title = {Privacy preserving mining of association rules},
booktitle = kdd02,
url = {http://www.cs.cornell.edu/johannes/papers/2002/kdd2002-privacy.pdf},
year = 2002
2015-01-03 22:23:27 +00:00
}
@inproceedings { t-closeness ,
2015-09-14 07:59:17 +00:00
author = {Ninghui Li and Tiancheng Li and Suresh Venkatasubramanian},
title = {$t$-{C}loseness: {P}rivacy beyond $k$-anonymity and $l$-diversity},
booktitle = icde07,
url = {https://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf},
year = 2007
2015-01-03 22:23:27 +00:00
}
@article { k-anonymity ,
2015-09-14 07:59:17 +00:00
author = {Sweeney, Latanya},
title = {$k$-{A}nonymity: {A} model for protecting privacy},
journal = jufks,
volume = {10},
number = {5},
month = oct,
year = {2002},
pages = {557--570},
url = {http://dl.acm.org/citation.cfm?id=774552}
2015-01-03 22:23:27 +00:00
}
@article { aol ,
2015-09-14 07:59:17 +00:00
author = {Michael Barbaro and Tom Zeller},
title = {A Face Is Exposed for {AOL} Searcher {N}o. 4417749},
journal = {The New York Times},
day = 9,
month = aug,
year = 2006,
url = {http://www.nytimes.com/2006/08/09/technology/09aol.html}
2015-01-03 22:23:27 +00:00
}
@inproceedings { NV08 ,
2015-09-14 07:59:17 +00:00
author = {Arvind Narayanan and
2015-01-03 22:23:27 +00:00
Vitaly Shmatikov},
2015-09-14 07:59:17 +00:00
title = {Robust De-anonymization of Large Sparse Datasets},
booktitle = sp08,
year = {2008},
pages = {111--125},
url = {http://arxiv.org/abs/cs/0610105}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BLST10 ,
2015-09-14 07:59:17 +00:00
author = {Raghav Bhaskar and
Srivatsan Laxman and
Adam Smith and
Abhradeep Thakurta},
title = {Discovering frequent patterns in sensitive data},
booktitle = kdd10,
pages = {503--512},
year = 2010,
url = {http://dl.acm.org/citation.cfm?id=1835869}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CM08 ,
2015-09-14 07:59:17 +00:00
author = {Kamalika Chaudhuri and Claire Monteleoni},
title = {Privacy-preserving logistic regression},
booktitle = nips08,
pages = {289--296},
year = 2008,
url = {http://books.nips.cc/papers/files/nips21/NIPS2008_0964.pdf}
2015-01-03 22:23:27 +00:00
}
@article { CH11 ,
2015-09-14 07:59:17 +00:00
title = {Sample Complexity Bounds for Differentially Private Learning},
author = {Chaudhuri, Kamalika and Hsu, Daniel},
journal = jmlr,
volume = {19},
pages = {155--186},
url = {http://jmlr.org/proceedings/papers/v19/chaudhuri11a/chaudhuri11a.pdf},
year = {2011}
}
@article { certipriv ,
author = {Gilles Barthe and
Boris K{\"{o}}pf and
Federico Olmedo and
Santiago Zanella B{\'{e}}guelin},
title = {Probabilistic Relational Reasoning for Differential Privacy},
journal = toplas,
volume = {35},
number = {3},
pages = {9},
year = {2013},
url = {http://software.imdea.org/~bkoepf/papers/toplas13.pdf},
2015-01-03 22:23:27 +00:00
}
2015-05-13 17:11:28 +00:00
@inproceedings { ReedPierce10 ,
2015-09-14 07:59:17 +00:00
author = {Jason Reed and Benjamin C Pierce},
title = {Distance Makes the Types Grow Stronger: {A} Calculus for
2015-01-03 22:23:27 +00:00
Differential Privacy},
2015-09-14 07:59:17 +00:00
booktitle = icfp10,
year = 2010,
url = {http://dl.acm.org/citation.cfm?id=1863568}
2015-01-03 22:23:27 +00:00
}
@inproceedings { winq ,
2015-09-14 07:59:17 +00:00
title = {A workflow for differentially-private graph synthesis},
author = {Proserpio, Davide and Goldberg, Sharon and {McSherry}, Frank},
booktitle = wosn12,
year = 2012,
pages = {13--18},
url = {http://arxiv.org/abs/1203.3453}
2015-01-03 22:23:27 +00:00
}
@article { KLNRS08 ,
2015-09-14 07:59:17 +00:00
title = {What can we learn privately?},
author = {Kasiviswanathan, Shiva Prasad and Lee, Homin K. and Nissim, Kobbi
2015-01-03 22:23:27 +00:00
and Raskhodnikova, Sofya and Smith, Adam},
2015-09-14 07:59:17 +00:00
journal = siamjc,
volume = {40},
number = {3},
pages = {793--826},
year = {2011},
url = {http://arxiv.org/abs/0803.0924},
publisher = {SIAM}
2015-01-03 22:23:27 +00:00
}
@inproceedings { UV11 ,
2015-09-14 07:59:17 +00:00
title = {{PCPs} and the hardness of generating private synthetic data},
author = {Ullman, Jonathan and Vadhan, Salil},
booktitle = tcc11,
pages = {400--416},
url = {http://eccc.hpi-web.de/report/2010/017/revision/2/download},
year = {2011}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DNRRV09 ,
2015-09-14 07:59:17 +00:00
title = {On the complexity of differentially private data release: efficient
2015-01-03 22:23:27 +00:00
algorithms and hardness results},
2015-09-14 07:59:17 +00:00
author = {Cynthia Dwork and
Moni Naor and
Omer Reingold and
Guy N. Rothblum and
Salil P. Vadhan},
booktitle = stoc09,
pages = {381--390},
year = {2009},
url = {http://dl.acm.org/citation.cfm?id=1536467}
2015-01-03 22:23:27 +00:00
}
@article { AHK12 ,
2015-09-14 07:59:17 +00:00
title = {The Multiplicative Weights Update Method: a Meta-Algorithm and
2015-01-03 22:23:27 +00:00
Applications},
2015-09-14 07:59:17 +00:00
author = {Arora, Sanjeev and Hazan, Elad and Kale, Satyen},
journal = toc,
volume = {8},
number = {1},
pages = {121--164},
url = {http://tocbeta.cs.uchicago.edu/articles/v008a006/v008a006.pdf},
year = {2012}
2015-01-03 22:23:27 +00:00
}
@phdthesis { Garg13 ,
2015-09-14 07:59:17 +00:00
title = {Candidate Multilinear Maps},
author = {Sanjam Garg},
school = {{UCLA}},
year = {2013},
url = {http://www.cs.ucla.edu/~sanjamg/Sanjam%20Garg_files/sanjam-thesis.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { GargGentryHalevi13 ,
2015-09-14 07:59:17 +00:00
title = {Candidate multilinear maps from ideal lattices},
author = {Garg, Sanjam and Gentry, Craig and Halevi, Shai},
booktitle = eucrypt13,
pages = {1--17},
year = {2013},
url = {http://http://eprint.iacr.org/2012/610.pdf}
2015-01-03 22:23:27 +00:00
}
@article { BonehSilverberg03 ,
2015-09-14 07:59:17 +00:00
title = {Applications of multilinear forms to cryptography},
author = {Boneh, Dan and Silverberg, Alice},
journal = {Contemporary Mathematics},
volume = {324},
number = {1},
pages = {71--90},
year = {2003},
publisher = {AMS},
url = {http://https://eprint.iacr.org/2002/080.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { barak2007privacy ,
2015-09-14 07:59:17 +00:00
title = {Privacy, accuracy, and consistency too: a holistic solution to
2015-01-03 22:23:27 +00:00
contingency table release},
2015-09-14 07:59:17 +00:00
author = {Barak, Boaz and Chaudhuri, Kamalika and Dwork, Cynthia and Kale,
2015-01-03 22:23:27 +00:00
Satyen and Mc{S}herry, Frank and Talwar, Kunal},
2015-09-14 07:59:17 +00:00
booktitle = pods07,
pages = {273--282},
url = {http://research.microsoft.com/en-us/projects/DatabasePrivacy/contingency.pdf},
year = {2007}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BNS13 ,
2015-09-14 07:59:17 +00:00
title = {Characterizing the sample complexity of private learners},
author = {Beimel, Amos and Nissim, Kobbi and Stemmer, Uri},
booktitle = itcs13,
pages = {97--110},
year = {2013},
url = {http://dl.acm.org/citation.cfm?id=2422450}
2015-01-03 22:23:27 +00:00
}
@article { CMS11 ,
2015-09-14 07:59:17 +00:00
title = {Differentially private empirical risk minimization},
author = {Chaudhuri, Kamalika and Monteleoni, Claire and Sarwate, Anand D.},
journal = jmlr,
volume = {12},
pages = {1069--1109},
year = {2011},
url = {http://jmlr.org/papers/volume12/chaudhuri11a/chaudhuri11a.pdf}
2015-01-03 22:23:27 +00:00
}
@article { RBHT09 ,
2015-09-14 07:59:17 +00:00
title = {Learning in a Large Function Space: Privacy-Preserving Mechanisms
2015-01-03 22:23:27 +00:00
for {SVM} Learning},
2015-09-14 07:59:17 +00:00
author = {Rubinstein, Benjamin I. P. and Bartlett, Peter L. and Huang, Ling
2015-01-03 22:23:27 +00:00
and Taft, Nina},
2015-09-14 07:59:17 +00:00
journal = jpc,
volume = {4},
number = {1},
pages = {4},
year = {2012},
url = {http://repository.cmu.edu/cgi/viewcontent.cgi?article = 1065&context = jpc}
2015-01-03 22:23:27 +00:00
}
@article { KST12 ,
2015-09-14 07:59:17 +00:00
title = {Private convex empirical risk minimization and high-dimensional regression},
author = {Kifer, Daniel and Smith, Adam and Thakurta, Abhradeep},
journal = jmlr,
volume = {1},
pages = {41},
year = {2012},
url = {http://jmlr.org/proceedings/papers/v23/kifer12/kifer12.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CSS12 ,
2015-09-14 07:59:17 +00:00
title = {Near-optimal differentially private principal components},
author = {Chaudhuri, Kamalika and Sarwate, Anand and Sinha, Kaushik},
booktitle = nips12,
pages = {998--1006},
url = {http://books.nips.cc/papers/files/nips25/NIPS2012_0482.pdf},
year = {2012}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DJW13 ,
2015-09-14 07:59:17 +00:00
title = {Local privacy and statistical minimax rates},
author = {Duchi, John C and Jordan, Michael I. and Wainwright, Martin J.},
booktitle = focs13,
url = {http://www.cs.berkeley.edu/~jduchi/projects/DuchiJoWa13_focs.pdf},
year = {2013}
2015-01-03 22:23:27 +00:00
}
@inproceedings { TS13 ,
2015-09-14 07:59:17 +00:00
title = {(Nearly) Optimal Algorithms for Private Online Learning in
2015-01-03 22:23:27 +00:00
Full-information and Bandit Settings},
2015-09-14 07:59:17 +00:00
author = {Thakurta, Abhradeep G. and Smith, Adam},
booktitle = nips13,
pages = {2733--2741},
url = {http://media.nips.cc/nipsbooks/nipspapers/paper_files/nips26/1270.pdf},
year = {2013}
2015-01-03 22:23:27 +00:00
}
@inproceedings { FS95 ,
title = {A desicion-theoretic generalization of on-line learning and an
application to boosting},
author = {Freund, Yoav and Schapire, Robert E.},
booktitle = colt95,
pages = {23--37},
year = {1995},
organization = springer
}
@inproceedings { RR10 ,
2015-09-14 07:59:17 +00:00
author = {Aaron Roth and
2015-01-03 22:23:27 +00:00
Tim Roughgarden},
2015-09-14 07:59:17 +00:00
title = {Interactive privacy via the median mechanism},
booktitle = stoc10,
pages = {765--774},
url = {http://arxiv.org/abs/0911.1813},
2015-01-03 22:23:27 +00:00
}
@inproceedings { GHRU11 ,
2015-09-14 07:59:17 +00:00
title = {Privately releasing conjunctions and the statistical query barrier},
author = {Gupta, Anupam and Hardt, Moritz and Roth, Aaron and Ullman, Jonathan},
booktitle = stoc11,
pages = {803--812},
url = {http://arxiv.org/abs/1011.1296},
year = {2011}
2015-01-03 22:23:27 +00:00
}
@inproceedings { TS13a ,
2015-09-14 07:59:17 +00:00
title = {Differentially Private Feature Selection via Stability Arguments,
2015-01-03 22:23:27 +00:00
and the Robustness of the Lasso},
2015-09-14 07:59:17 +00:00
author = {Thakurta, Abhradeep G. and Smith, Adam},
booktitle = colt13,
pages = {819--850},
url = {http://jmlr.org/proceedings/papers/v30/Guha13.pdf},
year = {2013}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DL09 ,
title = {Differential privacy and robust statistics},
author = {Dwork, Cynthia and Lei, Jing},
booktitle = stoc09,
pages = {371--380},
year = {2009},
url = {http://research.microsoft.com/pubs/80239/dl09.pdf},
organization = {ACM}
}
@article { LW94 ,
2015-09-14 07:59:17 +00:00
title = {The Weighted Majority Algorithm},
author = {Littlestone, N. and Warmuth, Manfred K.},
journal = ic,
volume = {108},
number = {2},
pages = {212--261},
year = {1994},
publisher = elsevier,
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber = 63487}
2015-01-03 22:23:27 +00:00
}
@article { PST95 ,
2015-09-14 07:59:17 +00:00
title = {Fast approximation algorithms for fractional packing and covering
2015-01-03 22:23:27 +00:00
problems},
2015-09-14 07:59:17 +00:00
author = {Plotkin, Serge A. and Shmoys, David B. and Tardos, {\'E}va},
journal = mor,
volume = {20},
number = {2},
pages = {257--301},
year = {1995},
publisher = informs,
doi = {10.1287/moor.20.2.257}
2015-01-03 22:23:27 +00:00
}
@inproceedings { AK07 ,
2015-09-14 07:59:17 +00:00
title = {A combinatorial, primal-dual approach to semidefinite programs},
author = {Arora, Sanjeev and Kale, Satyen},
booktitle = stoc07,
pages = {227--236},
year = {2007},
url = {http://dl.acm.org/citation.cfm?id=1250823}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CHRMM10 ,
2015-09-14 07:59:17 +00:00
title = {Optimizing linear counting queries under differential privacy},
author = {Li, Chao and Hay, Michael and Rastogi, Vibhor and Miklau, Gerome
2015-01-03 22:23:27 +00:00
and Mc{G}regor, Andrew},
2015-09-14 07:59:17 +00:00
booktitle = pods10,
pages = {123--134},
year = {2010},
url = {http://arxiv.org/abs/0912.4742}
2015-01-03 22:23:27 +00:00
}
@inproceedings { LM12 ,
2015-09-14 07:59:17 +00:00
title = {An adaptive mechanism for accurate query answering under differential privacy},
author = {Li, Chao and Miklau, Gerome},
journal = vldb12,
volume = {5},
number = {6},
pages = {514--525},
year = {2012},
url = {http://arxiv.org/abs/1202.3807}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CPSY12 ,
2015-09-14 07:59:17 +00:00
author = {Grigory Yaroslavtsev and
2015-01-03 22:23:27 +00:00
Graham Cormode and
Cecilia M. Procopiuc and
Divesh Srivastava},
2015-09-14 07:59:17 +00:00
title = {Accurate and efficient private release of datacubes and
2015-01-03 22:23:27 +00:00
contingency tables},
2015-09-14 07:59:17 +00:00
booktitle = icde13,
year = {2013},
pages = {745--756},
url = {http://doi.ieeecomputersociety.org/10.1109/ICDE.2013.6544871}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CV13 ,
title = {A Stability-based Validation Procedure for Differentially Private
Machine Learning},
author = {Chaudhuri, Kamalika and Vinterbo, Staal A.},
2015-08-31 22:04:01 +00:00
booktitle = nips13,
2015-01-03 22:23:27 +00:00
pages = {2652--2660},
year = {2013},
url = {http://papers.nips.cc/paper/5014-a-stability-based-validation-procedure-for-differentially-private-machine-learning.pdf}
}
@article { HW01 ,
title = {Tracking the best linear predictor},
author = {Herbster, Mark and Warmuth, Manfred K.},
journal = jmlr,
volume = {1},
pages = {281--309},
2015-09-14 07:59:17 +00:00
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.7354&rep=rep1&type=pdf},
2015-01-03 22:23:27 +00:00
year = {2001}
}
@inproceedings { DworkSurvey ,
title = {Differential privacy: A survey of results},
author = {Dwork, Cynthia},
booktitle = tamc08,
pages = {1--19},
year = {2008},
url = {http://research.microsoft.com/apps/pubs/default.aspx?id=74339},
publisher = springer
}
@inproceedings { NS-social ,
2015-09-14 07:59:17 +00:00
title = {De-anonymizing social networks},
author = {Narayanan, Arvind and Shmatikov, Vitaly},
booktitle = sp09,
pages = {173--187},
url = {http://arxiv.org/abs/0903.3276},
year = {2009}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DNT14 ,
2015-09-14 07:59:17 +00:00
title = {Using Convex Relaxations for Efficiently and Privately Releasing
2015-01-03 22:23:27 +00:00
Marginals},
2015-09-14 07:59:17 +00:00
author = {Dwork, Cynthia and Nikolov, Aleksandar and Talwar, Kunal},
booktitle = socg14,
pages = {261},
year = {2014},
url = {http://arxiv.org/abs/1308.1385}
2015-01-03 22:23:27 +00:00
}
@inproceedings { TUV12 ,
2015-09-14 07:59:17 +00:00
title = {Faster algorithms for privately releasing marginals},
author = {Thaler, Justin and Ullman, Jonathan and Vadhan, Salil},
booktitle = icalp12,
pages = {810--821},
year = {2012},
url = {http://arxiv.org/abs/1205.1758}
2015-01-03 22:23:27 +00:00
}
@article { GHRU13 ,
2015-09-14 07:59:17 +00:00
title = {Privately releasing conjunctions and the statistical query barrier},
author = {Gupta, Anupam and Hardt, Moritz and Roth, Aaron and Ullman,
2015-01-03 22:23:27 +00:00
Jonathan},
2015-09-14 07:59:17 +00:00
journal = siamjc,
volume = {42},
number = {4},
pages = {1494--1520},
year = {2013},
publisher = {SIAM},
url = {http://epubs.siam.org/doi/abs/10.1137/110857714}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DunfieldP04 ,
author = {Joshua Dunfield and
Frank Pfenning},
title = {Tridirectional typechecking},
booktitle = popl04,
pages = {281--292},
2015-05-13 17:11:28 +00:00
year = 2004,
2015-09-14 07:59:17 +00:00
url = {http://www.cs.cmu.edu/~joshuad/papers/tridirectional-typechecking/Dunfield04_tridirectional.pdf}
2015-01-03 22:23:27 +00:00
}
@article { Meyer92 ,
2015-09-14 07:59:17 +00:00
title = {Applying ``{D}esign by contract''},
author = {Meyer, Bertrand},
journal = {Computer},
volume = {25},
number = {10},
pages = {40--51},
year = {1992},
publisher = {IEEE},
url = {http://www-public.int-evry.fr/~gibson/Teaching/CSC7322/ReadingMaterial/Meyer92.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Vazou+14:ICFP ,
2015-09-14 07:59:17 +00:00
author = {N. Vazou and E. L. Seidel and R. Jhala and D. Vytiniotis and
2015-01-03 22:23:27 +00:00
S. {P}eyton-{J}ones},
2015-09-14 07:59:17 +00:00
title = {{Refinement Types for Haskell}},
booktitle = icfp14,
year = {2014},
url = {http://goto.ucsd.edu/~nvazou/refinement_types_for_haskell.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { NR99 ,
2015-09-14 07:59:17 +00:00
title = {Algorithmic mechanism design},
author = {Nisan, Noam and Ronen, Amir},
booktitle = stoc99,
pages = {129--140},
year = {1999},
url = {http://www.cs.yale.edu/homes/jf/nisan-ronen.pdf}
2015-01-03 22:23:27 +00:00
}
@book { NRTV07 ,
2015-09-14 07:59:17 +00:00
title = {Algorithmic game theory},
author = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V},
year = {2007},
publisher = {Cambridge University Press}
2015-01-03 22:23:27 +00:00
}
@article { BBHM08 ,
2015-09-14 07:59:17 +00:00
title = {Reducing mechanism design to algorithm design via machine learning},
author = {Balcan, {M}aria-{F}lorina and Blum, Avrim and Hartline, Jason D and Mansour, Yishay},
journal = {Journal of Computer and System Sciences},
volume = {74},
number = {8},
pages = {1245--1270},
year = {2008},
publisher = {Elsevier},
url = {http://www.cs.cmu.edu/~ninamf/papers/ml_md_bbhm.pdf}
2015-01-03 22:23:27 +00:00
}
@techreport { CKRW14 ,
2015-09-14 07:59:17 +00:00
title = {Privacy and Truthful Equilibrium Selection for Aggregative Games},
author = {Cummings, Rachel and Kearns, Michael and Roth, Aaron and Wu, Zhiwei Steven},
year = {2014},
url = {http://arxiv.org/abs/1407.7740}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DD09 ,
2015-09-14 07:59:17 +00:00
title = {On the power of randomization in algorithmic mechanism design},
author = {Dobzinski, Shahar and Dughmi, Shaddin},
booktitle = focs09,
pages = {505--514},
url = {http://arxiv.org/abs/0904.4193}
2015-01-03 22:23:27 +00:00
}
@article { DugR14 ,
2015-09-14 07:59:17 +00:00
title = {Black-box randomized reductions in algorithmic mechanism design},
author = {Dughmi, Shaddin and Roughgarden, Tim},
journal = siamjc,
volume = {43},
number = {1},
pages = {312--336},
year = {2014},
url = {http://theory.stanford.edu/~tim/papers/blackbox.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CIL12 ,
2015-09-14 07:59:17 +00:00
title = {On the limits of black-box reductions in mechanism design},
author = {Chawla, Shuchi and Immorlica, Nicole and Lucier, Brendan},
booktitle = stoc12,
year = {2012},
url = {http://arxiv.org/abs/1109.2067}
2015-01-03 22:23:27 +00:00
}
@inproceedings { HL10 ,
2015-09-14 07:59:17 +00:00
title = {Bayesian algorithmic mechanism design},
author = {Hartline, Jason D and Lucier, Brendan},
booktitle = stoc10,
pages = {301--310},
year = {2010},
url = {http://arxiv.org/abs/0909.4756}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Ramsey:2002 ,
2015-09-14 07:59:17 +00:00
Author = {Ramsey, Norman and Pfeffer, Avi},
2015-01-03 22:23:27 +00:00
Booktitle = popl02,
2015-09-14 07:59:17 +00:00
Pages = {154--165},
2015-01-03 22:23:27 +00:00
Publisher = {ACM},
2015-09-14 07:59:17 +00:00
Title = {Stochastic lambda calculus and monads of probability distributions},
Year = {2002},
url = {http://www.cs.tufts.edu/~nr/pubs/pmonad.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Park:2005 ,
author = {Sungwoo Park and
Frank Pfenning and
Sebastian Thrun},
title = {A probabilistic language based upon sampling functions},
booktitle = popl05,
year = {2005},
pages = {171--182},
url = {https://www.cs.cmu.edu/~fp/papers/popl05.pdf}
}
@article { Hurd:2005 ,
2015-09-14 07:59:17 +00:00
Author = {Hurd, Joe and {M}c{I}ver, Annabelle and Morgan, Carroll},
Journal = tcs,
Number = {1},
Pages = {96--112},
Title = {Probabilistic guarded commands mechanized in {HOL}},
Volume = {346},
Year = {2005},
url = {http://www.cse.unsw.edu.au/~carrollm/probs/Papers/Hurd-05.pdf}
2015-01-03 22:23:27 +00:00
}
@book { McIver:2005 ,
2015-09-14 07:59:17 +00:00
Author = {{M}c{I}ver, A. and Morgan, C.},
2015-09-11 17:23:51 +00:00
Publisher = springer,
2015-09-14 07:59:17 +00:00
Series = {Monographs in Computer Science},
Title = {Abstraction, Refinement, and Proof for Probabilistic Systems},
Year = {2005}}
2015-01-03 22:23:27 +00:00
@inproceedings { Borgstrom:2011 ,
author = {Johannes Borgstr{\"o}m and
Andrew D Gordon and
Michael Greenberg and
James Margetson and
Jurgen Van Gael},
title = {Measure Transformer Semantics for Bayesian Machine Learning},
booktitle = esop11,
year = {2011},
pages = {77--96},
url = {http://cis.upenn.edu/~mgree/papers/esop2011_mts.pdf}
}
@inproceedings { Kiselyov:2009 ,
author = {Oleg Kiselyov and
{C}hung-{C}hieh Shan},
title = {Embedded Probabilistic Programming},
booktitle = {DSL},
year = {2009},
pages = {360--384}
}
@inproceedings { Goodman:2013 ,
author = {Noah D Goodman},
title = {The principles and practice of probabilistic programming},
booktitle = popl13,
year = {2013},
pages = {399--402},
url = {https://web.stanford.edu/~ngoodman/papers/POPL2013-abstract.pdf}
}
@inproceedings { Sampson+14 ,
2015-09-14 07:59:17 +00:00
title = {Expressing and verifying probabilistic assertions},
author = {Sampson, Adrian and Panchekha, Pavel and Mytkowicz, Todd and {M}c{K}inley, Kathryn S and Grossman, Dan and Ceze, Luis},
booktitle = pldi14,
pages = {14},
year = {2014},
url = {http://research.microsoft.com/pubs/211410/passert-pldi2014.pdf}
2015-01-03 22:23:27 +00:00
}
@Inproceedings { Bornholt+14 ,
2015-09-14 07:59:17 +00:00
author = {James Bornholt and Todd Mytkowicz and Kathryn S {M}c{K|inley}},
booktitle = asplos14,
title = {Uncertain$\langle$T$\rangle$: A First-Order Type for Uncertain Data},
year = {2014},
url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pdf}
2015-01-03 22:23:27 +00:00
}
@article { Giry82 ,
2015-09-14 07:59:17 +00:00
author = {Giry, Mich\`{e}le},
2015-01-03 22:23:27 +00:00
journal = {Categorical Aspects of Topology and Analysis},
2015-09-14 07:59:17 +00:00
pages = {68--85},
title = {{A categorical approach to probability theory}},
year = {1982},
2015-01-03 22:23:27 +00:00
}
@inproceedings { FreemanP91 ,
2015-09-14 07:59:17 +00:00
title = {Refinement types for {ML}},
author = {Freeman, Tim and Pfenning, Frank},
booktitle = pldi91,
pages = {268--277},
year = {1991},
url = {https://www.cs.cmu.edu/~fp/papers/pldi91.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BBFGM08 ,
2015-09-14 07:59:17 +00:00
author = "J. Bengtson and K. Bhargavan and C. Fournet and A. D. Gordon and S. Maffeis",
title = "Refinement types for secure implementations",
booktitle = csf08,
year = 2008,
url = {http://prosecco.gforge.inria.fr/personal/karthik/pubs/refinement-types-for-secure-implementations-proceedings-csf08.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { fstar ,
2015-09-14 07:59:17 +00:00
author = {Swamy, Nikhil and Chen, Juan and Fournet, C{\'e}dric and Strub, {P}ierre-{Y}ves and Bhargavan, Karthikeyan and Yang, Jean},
title = {Secure distributed programming with value-dependent types},
booktitle = icfp11,
year = 2011,
url = {http://research.microsoft.com/pubs/150012/icfp-camera-ready.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { liquid ,
2015-09-14 07:59:17 +00:00
title = {Liquid types},
author = {Rondon, Patrick M and Kawaguci, Ming and Jhala, Ranjit},
booktitle = pldi08,
pages = {159--169},
year = {2008},
url = {http://goto.ucsd.edu/~rjhala/papers/liquid_types.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { rfstar ,
2015-09-14 07:59:17 +00:00
title = {Probabilistic relational verification for cryptographic implementations},
author = {Barthe, Gilles and Fournet, C{\'e}dric and Gr{\'e}goire, Benjamin and Strub, {P}ierre-{Y}ves and Swamy, Nikhil and Zanella-B{\'e}guelin, Santiago},
booktitle = popl14,
pages = {193--206},
year = {2014},
url = {http://research.microsoft.com/en-us/um/people/nswamy/papers/rfstar.pdf}
2015-01-03 22:23:27 +00:00
}
@INPROCEEDINGS { polymonad ,
2015-09-14 07:59:17 +00:00
TITLE = {Polymonadic Programming},
AUTHOR = {Michael Hicks and Gavin Bierman and Nataliya Guts and Daan Leijen and Nikhil Swamy},
2015-01-03 22:23:27 +00:00
BOOKTITLE = mfps14,
2015-09-14 07:59:17 +00:00
YEAR = 2014,
url = {http://arxiv.org/abs/1406.2060}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Dwork06 ,
2015-09-14 07:59:17 +00:00
Author = {Dwork, Cynthia},
Booktitle = icalp06,
Pages = {1--12},
Title = {Differential Privacy},
Year = {2006},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.7534&rep=rep1&type=pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Benton04 ,
2015-09-14 07:59:17 +00:00
Author = {Benton, Nick},
Booktitle = popl04,
Pages = {14--25},
Title = {Simple relational correctness proofs for static analyses and program transformations},
Year = {2004},
url = {http://research.microsoft.com/en-us/um/people/nick/correctnessfull.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { AmtoftB04 ,
2015-09-14 07:59:17 +00:00
author = {Torben Amtoft and
2015-01-03 22:23:27 +00:00
Anindya Banerjee},
2015-09-14 07:59:17 +00:00
title = {Information Flow Analysis in Logical Form},
booktitle = sas04,
pages = {100--115},
publisher = springer,
address = {Heidelberg},
series = lncs,
volume = {3148},
year = {2004},
url = {http://software.imdea.org/~ab/Publications/ifalftr.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BartheGZ09 ,
2015-09-14 07:59:17 +00:00
Address = {New York},
Author = {Barthe, Gilles and Gr{\'e}goire, Benjamin and {Zanella-B{\'e}guelin}, Santiago},
Booktitle = popl09,
Pages = {90--101},
Title = {Formal Certification of Code-Based Cryptographic Proofs},
Year = {2009},
url = {http://research.microsoft.com/pubs/185309/Zanella.2009.POPL.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BartheGHZ11 ,
2015-09-14 07:59:17 +00:00
author = {Gilles Barthe and
2015-01-03 22:23:27 +00:00
Benjamin Gr{\'e}goire and
Sylvain Heraud and
Santiago Zanella B{\'e}guelin},
2015-09-14 07:59:17 +00:00
title = {Computer-Aided Security Proofs for the Working Cryptographer},
booktitle = crypto11,
year = {2011},
pages = {71--90},
url = {http://software.imdea.org/~szanella/Zanella.2011.CRYPTO.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BartheDGKZ13 ,
2015-09-14 07:59:17 +00:00
author = {Gilles Barthe and
2015-01-03 22:23:27 +00:00
George Danezis and
Benjamin Gr{\'e}goire and
C{\'e}sar Kunz and
Santiago Zanella B{\'e}guelin},
2015-09-14 07:59:17 +00:00
title = {Verified Computational Differential Privacy with Applications
2015-01-03 22:23:27 +00:00
to Smart Metering},
2015-09-14 07:59:17 +00:00
booktitle = csf13,
year = {2013},
pages = {287--301},
url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/easypriv.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:journals/corr/BaiTG14 ,
2015-09-14 07:59:17 +00:00
author = {Wei Bai and
2015-01-03 22:23:27 +00:00
Emmanuel M Tadjouddine and
Yu Guo},
2015-09-14 07:59:17 +00:00
title = {Enabling Automatic Certification of Online Auctions},
booktitle = fesca14,
series = {EPTCS},
volume = {147},
year = {2014},
pages = {123--132},
url = {http://dx.doi.org/10.4204/EPTCS.147.9},
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/facs2/BaiTPG13 ,
2015-09-14 07:59:17 +00:00
author = {Wei Bai and
2015-01-03 22:23:27 +00:00
Emmanuel M Tadjouddine and
Terry R Payne and
Sheng-Uei Guan},
2015-09-14 07:59:17 +00:00
title = {A Proof-Carrying Code Approach to Certificate Auction Mechanisms},
booktitle = {FACS},
year = {2013},
pages = {23--40},
url = {http://dx.doi.org/10.1007/978--3-319--07602--7_4},
publisher = springer,
series = lncs,
volume = {8348},
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/ceemas/TadjouddineG07 ,
2015-09-14 07:59:17 +00:00
author = {Emmanuel M Tadjouddine and
2015-01-03 22:23:27 +00:00
Frank Guerin},
2015-09-14 07:59:17 +00:00
title = {Verifying Dominant Strategy Equilibria in Auctions},
booktitle = ceemas07,
year = {2007},
pages = {288--297},
url = {http://dx.doi.org/10.1007/978--3-540--75254--7_29},
publisher = springer,
series = lncs,
volume = {4696},
2015-01-03 22:23:27 +00:00
}
@article { DBLP:journals/ipl/Vestergaard06 ,
2015-09-14 07:59:17 +00:00
author = {Ren{\'e} Vestergaard},
title = {A constructive approach to sequential Nash equilibria},
journal = {Inf. Process. Lett.},
volume = {97},
number = {2},
year = {2006},
pages = {46--51},
url = {http://dx.doi.org/10.1016/j.ipl.2005.09.010},
bibsource = {DBLP, http://dblp.uni-trier.de}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Roux:2009 ,
2015-09-14 07:59:17 +00:00
author = {Le Roux, St{\'e}phane},
title = {Acyclic Preferences and Existence of Sequential Nash Equilibria: A Formal and Constructive Equivalence},
booktitle = tphol09,
year = {2009}
2015-01-03 22:23:27 +00:00
}
2015-05-13 17:11:28 +00:00
@techreport { BUCS-TR-2008-026 ,
2015-09-14 07:59:17 +00:00
author = {Andrei Lapets and Alex Levin and David Parkes},
title = {{A Typed Truthful Language for One-dimensional Truthful Mechanism Design}},
number = {BUCS-TR-2008--026},
year = {2008},
institution = {Boston University},
url = {http://cs-people.bu.edu/lapets/resource/typed-ec-mech.pdf}
2015-01-03 22:23:27 +00:00
}
@misc { Fang14 ,
2015-09-14 07:59:17 +00:00
author = {Ye Fang and Swarat Chaudhuri and Moshe Vardi},
title = {{Computer-aided mechanism design}},
howpublished = {Poster at POPL'14},
year = {2014}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CasinghinoSW14 ,
2015-09-14 07:59:17 +00:00
author = {Chris Casinghino and Vilhelm Sj\"{o}berg and Stephanie Weirich},
title = {Combining Proofs and Programs in a Dependently Typed Langauge},
booktitle = popl14,
year = {2014},
url = {http://www.seas.upenn.edu/~ccasin/papers/combining-TR.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/mkm/0002CKMRWW13 ,
2015-09-14 07:59:17 +00:00
author = {Christoph Lange and
Marco B Caminati and
Manfred Kerber and
Till Mossakowski and
Colin Rowat and
Makarius Wenzel and
Wolfgang Windsteiger},
title = {A Qualitative Comparison of the Suitability of Four Theorem
2015-01-03 22:23:27 +00:00
Provers for Basic Auction Theory},
2015-09-14 07:59:17 +00:00
booktitle = {MKM/Calculemus/DML},
publisher = springer,
series = lncs,
volume = {7961},
year = {2013},
pages = {200--215},
url = {http://dx.doi.org/10.1007/978--3-642--39320--4_13}
2015-01-03 22:23:27 +00:00
}
@article { DBLP:journals/cacm/ChaudhuriGL12 ,
2015-09-14 07:59:17 +00:00
author = {Swarat Chaudhuri and
Sumit Gulwani and
Roberto Lublinerman},
title = {Continuity and robustness of programs},
journal = cacm,
volume = {55},
number = {8},
year = {2012},
pages = {107--115},
url = {http://dl.acm.org/citation.cfm?id=2240262}
2015-01-03 22:23:27 +00:00
}
2015-09-11 17:23:51 +00:00
@article { BartheDR04 ,
2015-09-14 07:59:17 +00:00
title = {Secure information flow by self-composition},
author = {Barthe, Gilles and
D'Argenio, Pedro R and
Rezk, Tamara},
journal = mscs,
volume = {21},
number = {06},
pages = {1207--1252},
year = {2011},
publisher = cup,
url = {http://www-sop.inria.fr/lemme/Tamara.Rezk/publication/Barthe-DArgenio-Rezk-Journal.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { ZaksP08 ,
2015-09-14 07:59:17 +00:00
author = {Anna Zaks and Amir Pnueli},
title = {{CoVaC}: Compiler Validation by Program Analysis of the Cross-Product},
booktitle = fm08,
pages = {35--51},
publisher = springer,
address = {Heidelberg},
series = lncs,
volume = {5014},
year = {2008},
url = {http://llvm.org/pubs/2008-05-CoVaC.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { TerauchiA05 ,
2015-09-14 07:59:17 +00:00
Address = {Heidelberg},
Author = {Terauchi, Tachio and Aiken, Alex},
Booktitle = sas05,
Pages = {352--367},
Publisher = springer,
Series = lncs,
Title = {Secure Information Flow as a Safety Problem},
Volume = {3672},
Year = {2005},
url = {http://theory.stanford.edu/~aiken/publications/papers/sas05b.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BartheCK11 ,
2015-09-14 07:59:17 +00:00
author = {Gilles Barthe and
2015-01-03 22:23:27 +00:00
Juan Manuel Crespo and
C{\'e}sar Kunz},
2015-09-14 07:59:17 +00:00
title = {Relational Verification Using Product Programs},
booktitle = fm11,
year = {2011},
pages = {200--214},
url = {http://software.imdea.org/~ckunz/rellog/long-rellog.pdf},
2015-01-03 22:23:27 +00:00
}
@inproceedings { BartheCK13 ,
2015-09-14 07:59:17 +00:00
author = {Gilles Barthe and
Juan Manuel Crespo and
C{\'e}sar Kunz},
title = {Beyond 2-Safety: Asymmetric Product Programs for Relational
2015-01-03 22:23:27 +00:00
Program Verification},
2015-09-14 07:59:17 +00:00
booktitle = lfcompsci13,
year = {2013},
pages = {29--43},
url = {http://dx.doi.org/10.1007/978--3-642--35722--0_3},
bibsource = {DBLP, http://dblp.uni-trier.de}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/esop/KnowlesF07 ,
2015-09-14 07:59:17 +00:00
author = {Kenneth Knowles and Cormac Flanagan},
title = {Type Reconstruction for General Refinement Types},
booktitle = esop07,
year = {2007},
pages = {505--519},
url = {http://users.soe.ucsc.edu/~cormac/papers/esop07.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/esop/WadlerF09 ,
2015-09-14 07:59:17 +00:00
author = {Philip Wadler and Robert Bruce Findler},
title = {Well-Typed Programs Can't Be Blamed},
booktitle = esop09,
year = {2009},
pages = {1--16},
url = {http://homepages.inf.ed.ac.uk/wadler/papers/blame/blame.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/popl/GreenbergPW10 ,
2015-09-14 07:59:17 +00:00
author = {Michael Greenberg and Benjamin C Pierce and Stephanie Weirich},
title = {Contracts made manifest},
booktitle = popl10,
year = {2010},
pages = {353--364},
url = {http://www.cis.upenn.edu/~bcpierce/papers/contracts-popl.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DBLP:conf/sfp/GronskiF07 ,
2015-09-14 07:59:17 +00:00
author = {Jessica Gronski and Cormac Flanagan},
title = {Unifying Hybrid Types and Contracts},
booktitle = tfp07,
year = {2007},
pages = {54--70},
url = {https://sage.soe.ucsc.edu/tfp07-gronski-flanagan.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { OngR11 ,
2015-09-14 07:59:17 +00:00
title = {Verifying higher-order functional programs with pattern-matching algebraic data types},
author = {Ong, C-H Luke and Ramsay, Steven James},
booktitle = popl11,
pages = {587--598},
year = {2011},
url = {https://www.cs.ox.ac.uk/files/3721/main.pdf}
2015-01-03 22:23:27 +00:00
}
@misc { Pierce:2012 ,
2015-09-14 07:59:17 +00:00
author = {Benjamin C Pierce},
title = {Differential Privacy in the Programming Languages Community},
year = {2012},
howpublished = {Invited tutorial at DIMACS Workshop on Recent Work on
2015-01-03 22:23:27 +00:00
Differential Privacy across Computer Science}
}
@inproceedings { FindlerF02 ,
2015-09-14 07:59:17 +00:00
author = {Robert Bruce Findler and Matthias Felleisen},
title = {Contracts for higher-order functions},
booktitle = icfp02,
year = {2002},
pages = {48--59},
url =
2015-01-03 22:23:27 +00:00
{http://www.eecs.northwestern.edu/~robby/pubs/papers/ho-contracts-techreport.pdf}
}
@INPROCEEDINGS { Augustsson98 ,
2015-09-14 07:59:17 +00:00
author = {Lennart Augustsson},
title = {Cayenne -- a Language With Dependent Types},
booktitle = icfp98,
year = {1998},
pages = {239--250},
url = {http://link.springer.com/chapter/10.1007%2F10704973_6}
2015-01-03 22:23:27 +00:00
}
@article { Brady13 ,
2015-09-14 07:59:17 +00:00
author = {Edwin Brady},
title = {Idris, a general-purpose dependently typed programming language:
2015-01-03 22:23:27 +00:00
Design and implementation},
2015-09-14 07:59:17 +00:00
journal = jfp,
volume = {23},
number = {5},
year = {2013},
pages = {552--593},
url = {http://eb.host.cs.st-andrews.ac.uk/drafts/impldtp.pdf}
2015-01-03 22:23:27 +00:00
}
@incollection { epigram ,
2015-09-14 07:59:17 +00:00
title = {Epigram: Practical programming with dependent types},
author = {{M}c{B}ride, Conor},
booktitle = {Advanced Functional Programming},
pages = {130--170},
year = {2005},
publisher = springer,
url = {http://cs.ru.nl/~freek/courses/tt-2010/tvftl/epigram-notes.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Vytiniotis+13 ,
2015-09-14 07:59:17 +00:00
author = {Vytiniotis, Dimitrios and Peyton Jones, Simon and Claessen, Koen and Ros{\'e}n, Dan},
title = {HALO: Haskell to Logic Through Denotational Semantics},
booktitle = popl13,
year = {2013},
url = {http://research.microsoft.com/en-us/people/dimitris/hcc-popl.pdf}
2015-01-03 22:23:27 +00:00
}
@INPROCEEDINGS { Flanagan06 ,
2015-09-14 07:59:17 +00:00
author = {Jessica Gronski and Kenneth Knowles and Aaron Tomb and Stephen N Freund and Cormac Flanagan},
title = {Sage: Hybrid checking for flexible specifications},
2015-01-03 22:23:27 +00:00
booktitle = {Scheme and Functional Programming Workshop},
2015-09-14 07:59:17 +00:00
year = {2006},
pages = {93--104},
url = {http://galois.com/wp-content/uploads/2014/07/pub_AT_SAGEHybridChecking.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { EignerM13 ,
2015-09-14 07:59:17 +00:00
author = {Fabienne Eigner and
2015-01-03 22:23:27 +00:00
Matteo Maffei},
2015-09-14 07:59:17 +00:00
title = {Differential Privacy by Typing in Security Protocols},
booktitle = csf13,
year = {2013},
pages = {272--286},
url = {http://sps.cs.uni-saarland.de/publications/dp_proto_long.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { GordonHNR14 ,
2015-09-14 07:59:17 +00:00
author = {Andrew D Gordon and
2015-01-03 22:23:27 +00:00
Thomas A Henzinger and
Aditya V Nori and
Sriram K Rajamani},
2015-09-14 07:59:17 +00:00
title = {Probabilistic programming},
booktitle = icse14,
year = {2014},
pages = {167--181},
url = {http://research.microsoft.com/pubs/208585/fose-icse2014.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DaviesP00 ,
2015-09-14 07:59:17 +00:00
author = {Rowan Davies and
2015-01-03 22:23:27 +00:00
Frank Pfenning},
2015-09-14 07:59:17 +00:00
title = {Intersection types and computational effects},
booktitle = icfp00,
year = {2000},
pages = {198--208},
url = {http://www.cs.cmu.edu/~fp/papers/icfp00.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { XiP99 ,
2015-09-14 07:59:17 +00:00
author = {Hongwei Xi and
2015-01-03 22:23:27 +00:00
Frank Pfenning},
2015-09-14 07:59:17 +00:00
title = {Dependent Types in Practical Programming},
booktitle = popl99,
year = {1999},
pages = {214--227},
url = {http://www.cs.cmu.edu/~fp/papers/popl99.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DMNS06 ,
2015-09-14 07:59:17 +00:00
title = {Calibrating noise to sensitivity in private data analysis},
author = {Cynthia Dwork and
2015-01-03 22:23:27 +00:00
Frank McSherry and
Kobbi Nissim and
Adam Smith},
2015-09-14 07:59:17 +00:00
pages = {265--284},
url = {http://dx.doi.org/10.1007/11681878_14},
booktitle = tcc06,
year = {2006}
2015-01-03 22:23:27 +00:00
}
@article { Tschantz201161 ,
2015-09-14 07:59:17 +00:00
title = {Formal Verification of Differential Privacy for Interactive Systems
2015-01-03 22:23:27 +00:00
(Extended Abstract)},
2015-09-14 07:59:17 +00:00
journal = entcs,
volume = "276",
number = "0",
pages = {61--79},
year = "2011",
issn = "1571--0661",
doi = "http://dx.doi.org/10.1016/j.entcs.2011.09.015",
url = "http://www.sciencedirect.com/science/article/pii/S157106611100106X",
author = "Michael Carl Tschantz and Dilsun Kaynar and Anupam Datta",
2015-01-03 22:23:27 +00:00
}
@article { GHKSW06 ,
2015-09-14 07:59:17 +00:00
title = {Competitive auctions},
author = {Goldberg, Andrew V and Hartline, Jason D and Karlin, Anna R and
2015-01-03 22:23:27 +00:00
Saks, Michael and Wright, Andrew},
2015-09-14 07:59:17 +00:00
journal = geb,
volume = {55},
number = {2},
year = {2006},
pages = {242--269},
url = {http://www.ime.usp.br/~yw/papers/games/goldberg2008-competitive-auctions.pdf},
publisher = {Elsevier}
2015-01-03 22:23:27 +00:00
}
@article { mu2008truthful ,
2015-09-14 07:59:17 +00:00
title = {Truthful approximation mechanisms for restricted combinatorial auctions},
author = {Mu'{A}lem, Ahuva and Nisan, Noam},
journal = geb,
volume = {64},
number = {2},
pages = {612--631},
year = {2008},
url = {http://authors.library.caltech.edu/13158/1/MUAgeb08preprint.pdf},
publisher = {Elsevier}
2015-01-03 22:23:27 +00:00
}
@inproceedings { milgrom2014deferred ,
2015-09-14 07:59:17 +00:00
title = {Deferred-acceptance auctions and radio spectrum reallocation},
author = {Milgrom, Paul and Segal, Ilya},
booktitle = ec14,
pages = {185--186},
year = {2014},
url = {http://web.stanford.edu/~isegal/heuristic.pdf}
2015-01-03 22:23:27 +00:00
}
@article { CKRW14 ,
2015-09-14 07:59:17 +00:00
author = {Rachel Cummings and
2015-01-03 22:23:27 +00:00
Michael Kearns and
Aaron Roth and
Zhiwei Steven Wu},
2015-09-14 07:59:17 +00:00
title = {Privacy and Truthful Equilibrium Selection for Aggregative Games},
journal = {CoRR},
year = {2014},
volume = {abs/1407.7740},
url = {http://arxiv.org/abs/1407.7740},
timestamp = {Sun, 26 Oct 2014 15:36:31 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/CummingsKRW14},
bibsource = {dblp computer science bibliography, http://dblp.org}
2015-01-03 22:23:27 +00:00
}
@inproceedings { HK12 ,
2015-09-14 07:59:17 +00:00
title = {The exponential mechanism for social welfare: Private, truthful, and nearly optimal},
author = {Huang, Zhiyi and Kannan, Sampath},
booktitle = focs12,
pages = {140--149},
year = {2012},
url = {http://arxiv.org/abs/1204.1255}
2015-01-03 22:23:27 +00:00
}
@inproceedings { zinkevich ,
2015-09-14 07:59:17 +00:00
author = {Martin Zinkevich},
title = {Online Convex Programming and Generalized Infinitesimal Gradient Ascent},
booktitle = icml03,
year = {2003},
pages = {928--936},
url = {http://www.aaai.org/Library/ICML/2003/icml03-120.php},
timestamp = {Thu, 16 Oct 2014 21:45:09 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/icml/Zinkevich03},
bibsource = {dblp computer science bibliography, http://dblp.org}
2015-01-03 22:23:27 +00:00
}
@article { JKT11 ,
2015-09-14 07:59:17 +00:00
title = {Differentially private online learning},
author = {Jain, Prateek and Kothari, Pravesh and Thakurta, Abhradeep Guha},
journal = {arXiv preprint arXiv:1109.0105},
year = {2011},
url = {http://arxiv.org/abs/1109.0105}
2015-01-03 22:23:27 +00:00
}
@inproceedings { JT14 ,
2015-09-14 07:59:17 +00:00
title = {({N}ear) Dimension Independent Risk Bounds for Differentially Private Learning},
author = {Jain, Prateek and Thakurta, Abhradeep Guha},
booktitle = icml14,
pages = {476--484},
year = {2014},
url = {http://jmlr.org/proceedings/papers/v32/jain14.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BST14 ,
2015-09-14 07:59:17 +00:00
title = {Differentially Private Empirical Risk Minimization: Efficient
2015-01-03 22:23:27 +00:00
Algorithms and Tight Error Bounds},
2015-09-14 07:59:17 +00:00
author = {Bassily, Raef and Smith, Adam and Thakurta, Abhradeep Guha},
booktitle = focs14,
year = {2014},
url = {http://arxiv.org/abs/1405.7085}
2015-01-03 22:23:27 +00:00
}
@article { dualdecomp ,
2015-09-14 07:59:17 +00:00
title = {Distributed optimization and statistical learning via the alternating
2015-01-03 22:23:27 +00:00
direction method of multipliers},
2015-09-14 07:59:17 +00:00
author = {Boyd, Stephen and Parikh, Neal and Chu, Eric and Peleato, Borja and
2015-01-03 22:23:27 +00:00
Eckstein, Jonathan},
2015-09-14 07:59:17 +00:00
journal = {Foundations and Trends{\textregistered} in Machine Learning},
volume = {3},
number = {1},
pages = {1--122},
year = {2011},
publisher = {Now Publishers Inc.},
url = {https://web.stanford.edu/~boyd/papers/pdf/admm_distr_stats.pdf}
2015-01-03 22:23:27 +00:00
}
@inproceedings { NST12 ,
2015-09-14 07:59:17 +00:00
title = {Approximately optimal mechanism design via differential privacy},
author = {Nissim, Kobbi and Smorodinsky, Rann and Tennenholtz, Moshe},
booktitle = itcs12,
pages = {203--213},
year = {2012},
url = {http://arxiv.org/abs/1004.2888}
2015-01-03 22:23:27 +00:00
}
@inproceedings { CCKMV13 ,
2015-09-14 07:59:17 +00:00
title = {Truthful mechanisms for agents that value privacy},
author = {Chen, Yiling and Chong, Stephen and Kash, Ian A and Moran, Tal and Vadhan, Salil},
booktitle = ec13,
pages = {215--232},
year = {2013},
url = {http://arxiv.org/abs/1111.5472}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Xia13 ,
2015-09-14 07:59:17 +00:00
title = {Is privacy compatible with truthfulness?},
author = {Xiao, David},
booktitle = itcs13,
pages = {67--86},
year = {2013},
url = {https://eprint.iacr.org/2011/005}
2015-01-03 22:23:27 +00:00
}
@inproceedings { IOh01 ,
2015-09-14 07:59:17 +00:00
title = {{BI} as an assertion language for mutable data structures},
author = {Ishtiaq, Samin S and O'Hearn, Peter W},
booktitle = popl01,
year = 2001,
url = {http://dl.acm.org/citation.cfm?id=375719},
pages = {14--26}
2015-01-03 22:23:27 +00:00
}
@inproceedings { OhRY01 ,
2015-09-14 07:59:17 +00:00
title = {Local reasoning about programs that alter data structures},
author = {O'Hearn, Peter W and Reynolds, John and Yang, Hongseok},
booktitle = csl01,
year = 2001,
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.29.1331&rep=rep1&type=pdf},
pages = {1--19}
2015-01-03 22:23:27 +00:00
}
@inproceedings { DOhY06 ,
2015-09-14 07:59:17 +00:00
title = {A local shape analysis based on separation logic},
author = {Distefano, Dino and O'Hearn, Peter W and Yang, Hongseok},
booktitle = tacas06,
year = 2006,
url = {http://dl.acm.org/citation.cfm?id=2182039},
pages = {287--302}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BCCC07 ,
2015-09-14 07:59:17 +00:00
title = {Shape analysis for composite data structures},
author = {Berdine, Josh and Calcagno, Cristiano and Cook, Byron and
2015-01-03 22:23:27 +00:00
Distefano, Dino and O'Hearn, Peter W and Wies, Thomas and Yang,
Hongseok},
2015-09-14 07:59:17 +00:00
booktitle = cav07,
pages = {178--192},
url = {http://research.microsoft.com/pubs/73868/safcds.pdf},
year = {2007}
2015-01-03 22:23:27 +00:00
}
@article { Reynolds01 ,
2015-09-14 07:59:17 +00:00
title = {Intuitionistic reasoning about shared mutable data structure},
author = {Reynolds, John C},
journal = {Millennial perspectives in computer science},
volume = {2},
number = {1},
year = 2001,
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.5999&rep=rep1&type=pdf},
pages = {303--321}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Reynolds02 ,
2015-09-14 07:59:17 +00:00
title = {Separation logic: A logic for shared mutable data structures},
author = {Reynolds, John C},
booktitle = lics02,
year = 2002,
pages = {55--74}
2015-01-03 22:23:27 +00:00
}
@article { Burstall72 ,
2015-09-14 07:59:17 +00:00
title = {Some techniques for proving correctness of programs which alter data structuers},
author = {Rodnew M Burstall},
journal = {Machine Intelligence},
volume = {7},
number = {3},
year = 1972,
pages = {23--50}
2015-01-03 22:23:27 +00:00
}
@inproceedings { smallfoot ,
2015-09-14 07:59:17 +00:00
title = {Smallfoot: Modular automatic assertion checking with separation logic},
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
booktitle = fmco06,
pages = {115--137},
url = {http://research.microsoft.com/pubs/67598/smallfoot.pdf},
year = {2006}
2015-01-03 22:23:27 +00:00
}
@incollection { VP07 ,
2015-09-14 07:59:17 +00:00
title = {A marriage of rely/guarantee and separation logic},
author = {Vafeiadis, Viktor and Parkinson, Matthew},
booktitle = concur07,
pages = {256--271},
url = {http://www.cl.cam.ac.uk/~mjp41/RGSep.pdf},
year = 2007
2015-01-03 22:23:27 +00:00
}
@inproceedings { NDQC07 ,
2015-09-14 07:59:17 +00:00
title = {Automated verification of shape and size properties via separation logic},
author = {Nguyen, Huu Hai and David, Cristina and Qin, Shengchao and Chin, Wei-Ngan},
booktitle = vmcai07,
pages = {251--266},
url = {http://link.springer.com/chapter/10.1007%2F978-3-540-69738-1_18},
year = {2007}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BCOh04 ,
2015-09-14 07:59:17 +00:00
title = {A decidable fragment of separation logic},
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
booktitle = fsttcs04,
pages = {97--109},
url = {http://research.microsoft.com/pubs/73583/unroll_collapse.pdf},
year = 2004
2015-01-03 22:23:27 +00:00
}
@incollection { HAN08 ,
2015-09-14 07:59:17 +00:00
title = {Oracle semantics for concurrent separation logic},
author = {Hobor, Aquinas and Appel, Andrew W and Nardelli, Francesco Zappa},
booktitle = {Programming Languages and Systems (with ESOP)},
pages = {353--367},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.4226&rep=rep1&type=pdf},
year = {2008}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Krebbers14 ,
2015-09-14 07:59:17 +00:00
title = {An operational and axiomatic semantics for non-determinism and sequence points in {C}},
author = {Krebbers, Robbert},
booktitle = popl14,
pages = {101--112},
url = {http://robbertkrebbers.nl/research/articles/expressions.pdf},
year = {2014}
2015-01-03 22:23:27 +00:00
}
@article { OhP99 ,
2015-09-14 07:59:17 +00:00
title = {The logic of bunched implications},
author = {O'Hearn, Peter W and Pym, David J},
journal = bsl,
pages = {215--244},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.27.4742&rep=rep1&type=pdf},
year = {1999}
2015-01-03 22:23:27 +00:00
}
@article { POhY04 ,
2015-09-14 07:59:17 +00:00
title = {Possible worlds and resources: The semantics of {BI}},
author = {Pym, David J and O'Hearn, Peter W and Yang, Hongseok},
journal = tcs,
volume = {315},
number = {1},
pages = {257--305},
year = {2004},
url = {http://www.sciencedirect.com/science/article/pii/S0304397503006248},
publisher = {Elsevier}
2015-01-03 22:23:27 +00:00
}
@inproceedings { BCOh05 ,
2015-09-14 07:59:17 +00:00
title = {Symbolic execution with separation logic},
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
booktitle = aplas05,
url = {http://research.microsoft.com/pubs/64175/execution.pdf},
year = {2005}
2015-01-03 22:23:27 +00:00
}
@inproceedings { Cousout77 ,
2015-09-14 07:59:17 +00:00
title = {Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints},
author = {Cousot, Patrick and Cousot, Radhia},
booktitle = popl77,
pages = {238--252},
url = {http://www.di.ens.fr/~cousot/publications.www/CousotCousot-POPL-77-ACM-p238--252-1977.pdf},
year = {1977}
2015-01-03 22:23:27 +00:00
}
@article { Cousout96 ,
2015-09-14 07:59:17 +00:00
title = {Abstract interpretation},
author = {Cousot, Patrick},
journal = {ACM Computing Surveys (CSUR)},
volume = {28},
number = {2},
pages = {324--328},
year = {1996},
url = {http://dl.acm.org/citation.cfm?id=234740},
publisher = {ACM}
2015-01-03 22:23:27 +00:00
}
@inproceedings { dwork2010pan ,
2015-09-14 07:59:17 +00:00
title = {Pan-Private Streaming Algorithms.},
author = {Dwork, Cynthia and
2015-01-03 22:23:27 +00:00
Naor, Moni and
Pitassi, Toniann and
Rothblum, Guy N and
Yekhanin, Sergey},
2015-09-14 07:59:17 +00:00
booktitle = itcs10,
pages = {66--80},
url = {http://www.cs.toronto.edu/~toni/Papers/panprivacy.pdf},
year = {2010}
2015-01-03 22:23:27 +00:00
}
@inproceedings { recommender ,
2015-09-14 07:59:17 +00:00
title = {Differentially private recommender systems: building privacy into the net},
author = {McSherry, Frank and Mironov, Ilya},
booktitle = kdd09,
pages = {627--636},
year = {2009},
url = {http://research.microsoft.com/pubs/80511/netflixprivacy.pdf}
2015-01-03 22:23:27 +00:00
}
@book { cvxbook ,
2015-09-14 07:59:17 +00:00
author = {Boyd, Stephen and Vandenberghe, Lieven},
title = {Convex Optimization},
year = {2004},
isbn = {0521833787},
publisher = {Cambridge University Press},
address = {New York, NY, USA},
2015-01-03 22:23:27 +00:00
}
@book { concentration-book ,
2015-09-14 07:59:17 +00:00
title = {Concentration of measure for the analysis of randomized algorithms},
author = {Dubhashi, Devdatt P and Panconesi, Alessandro},
year = {2009},
publisher = cup
2015-01-03 22:23:27 +00:00
}
2015-01-12 14:35:38 +00:00
@article { LovaszLocal ,
2015-09-14 07:59:17 +00:00
title = {Problems and results on 3-chromatic hypergraphs and some related
2015-01-12 14:35:38 +00:00
questions},
2015-09-14 07:59:17 +00:00
author = {Erdos, Paul and Lov{\'a}sz, L{\'a}szl{\'o}},
journal = {Infinite and finite sets},
volume = {10},
pages = {609--627},
year = {1975}
2015-01-12 14:35:38 +00:00
}
@article { erdosPM ,
2015-09-14 07:59:17 +00:00
title = {Graph theory and probability},
author = {Paul Erd{\H{o}}s},
journal = {Canadian Journal of Mathematics},
volume = {11},
pages = {34--38},
year = {1959}
2015-01-12 14:35:38 +00:00
}
@inproceedings { DBLP:conf/pldi/SampsonPMMGC14 ,
2015-09-14 07:59:17 +00:00
author = {Adrian Sampson and
2015-01-12 14:35:38 +00:00
Pavel Panchekha and
Todd Mytkowicz and
Kathryn S McKinley and
Dan Grossman and
Luis Ceze},
2015-09-14 07:59:17 +00:00
title = {Expressing and verifying probabilistic assertions},
booktitle = pldi14,
pages = {112--122},
year = {2014},
url = {http://doi.acm.org/10.1145/2594291.2594294},
doi = {10.1145/2594291.2594294},
2015-01-12 14:35:38 +00:00
}
@inproceedings { DBLP:conf/pldi/CarbinKMR12 ,
2015-09-14 07:59:17 +00:00
author = {Michael Carbin and
2015-01-12 14:35:38 +00:00
Deokhwan Kim and
Sasa Misailovic and
Martin C Rinard},
2015-09-14 07:59:17 +00:00
title = {Proving acceptability properties of relaxed nondeterministic approximate
2015-01-12 14:35:38 +00:00
programs},
2015-09-14 07:59:17 +00:00
booktitle = pldi12,
pages = {169--180},
year = {2012},
url = {http://doi.acm.org/10.1145/2254064.2254086},
2015-01-12 14:35:38 +00:00
}
@article { alea ,
2015-09-14 07:59:17 +00:00
title = {Proofs of randomized algorithms in Coq},
author = {Audebaud, Philippe and Paulin-Mohring, Christine},
journal = {Science of Computer Programming},
volume = {74},
number = {8},
pages = {568--589},
year = {2009},
publisher = elsevier
2015-01-12 14:35:38 +00:00
}
@inproceedings { DBLP:conf/pldi/SampsonPMMGC14 ,
2015-09-14 07:59:17 +00:00
author = {Adrian Sampson and
2015-01-12 14:35:38 +00:00
Pavel Panchekha and
Todd Mytkowicz and
Kathryn S McKinley and
Dan Grossman and
Luis Ceze},
2015-09-14 07:59:17 +00:00
title = {Expressing and verifying probabilistic assertions},
booktitle = pldi14,
pages = {14},
year = {2014},
url = {http://doi.acm.org/10.1145/2594291.2594294},
doi = {10.1145/2594291.2594294},
2015-01-12 14:35:38 +00:00
}
@inproceedings { DBLP:conf/pldi/CarbinKMR12 ,
2015-09-14 07:59:17 +00:00
author = {Michael Carbin and
2015-01-12 14:35:38 +00:00
Deokhwan Kim and
Sasa Misailovic and
Martin C Rinard},
2015-09-14 07:59:17 +00:00
title = {Proving acceptability properties of relaxed nondeterministic approximate
2015-01-12 14:35:38 +00:00
programs},
2015-09-14 07:59:17 +00:00
booktitle = pldi12,
pages = {169--180},
year = {2012},
url = {http://doi.acm.org/10.1145/2254064.2254086},
2015-01-12 14:35:38 +00:00
}
2015-02-16 11:06:30 +00:00
@InProceedings { Necula97 ,
2015-09-14 07:59:17 +00:00
author = "G. C. Necula",
title = "Proof-carrying code",
booktitle = popl97,
year = "1997",
pages = "106--119",
publisher = {ACM}
2015-02-16 11:06:30 +00:00
}
2015-09-11 17:23:51 +00:00
@inproceedings { BartheGHZ11 ,
2015-09-14 07:59:17 +00:00
author = {Gilles Barthe and
2015-09-11 17:23:51 +00:00
Benjamin Gr{\'e}goire and
Sylvain Heraud and
Santiago Zanella B{\'e}guelin},
2015-09-14 07:59:17 +00:00
title = {Computer-Aided Security Proofs for the Working Cryptographer},
Booktitle = crypto11,
year = {2011},
Pages = {71--90},
publisher = springer,
series = lncs,
volume = {6841}
2015-09-11 17:23:51 +00:00
}
2015-02-16 11:06:30 +00:00
@inproceedings { flanagan2001 ,
2015-09-14 07:59:17 +00:00
title = {Avoiding exponential explosion: Generating compact
2015-02-16 11:06:30 +00:00
verification conditions},
2015-09-14 07:59:17 +00:00
author = {Flanagan, Cormac and Saxe, James B},
booktitle = popl01,
pages = {193--205},
year = {2001},
publisher = {ACM}
2015-02-16 11:06:30 +00:00
}
@inproceedings { BartheDGKSS13 ,
author = {Gilles Barthe and
Fran{\c{c}}ois Dupressoir and
Benjamin Gr{\'{e}}goire and
C{\'{e}}sar Kunz and
Benedikt Schmidt and
Pierre{-}Yves Strub},
2015-09-11 17:23:51 +00:00
editor = {Alessandro Aldini and
Javier Lopez and
Fabio Martinelli},
title = {EasyCrypt: {A} Tutorial},
2015-02-16 11:06:30 +00:00
booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
Tutorial Lectures},
2015-09-11 17:23:51 +00:00
series = lncs,
2015-02-16 11:06:30 +00:00
volume = {8604},
2015-09-11 17:23:51 +00:00
pages = {146--166},
publisher = springer,
year = {2013}
2015-02-16 11:06:30 +00:00
}
@article { Hoare69 ,
2015-09-14 07:59:17 +00:00
author = {C. A. R. Hoare},
title = {An Axiomatic Basis for Computer Programming},
journal = cacm,
year = {1969},
volume = {12},
number = {10}
2015-02-16 11:06:30 +00:00
}
@incollection { Floyd67 ,
2015-09-14 07:59:17 +00:00
author = {Floyd, Robert W.},
booktitle = {Symposium on {A}pplied {M}athematics},
publisher = {Amer. Math. Soc.},
title = {{Assigning meanings to programs}},
year = {1967}
2015-02-16 11:06:30 +00:00
}
@article { Cook:1978 ,
2015-09-14 07:59:17 +00:00
Author = {Cook, S.},
Journal = siamjc,
Number = {1},
Pages = {70-90},
Title = {Soundness and Completeness of an Axiom System for Program Verification},
Volume = {7},
Year = {1978}
2015-02-16 11:06:30 +00:00
}
@inproceedings { Clarkson:2008 ,
2015-09-14 07:59:17 +00:00
Author = {Clarkson, M.R. and Schneider, F.B.},
Booktitle = csf08,
Publisher = {IEEE},
Title = {Hyperproperties},
Year = {2008}
2015-02-16 11:06:30 +00:00
}
@InProceedings { Turing:1949 ,
2015-09-14 07:59:17 +00:00
author = "Alan M. Turing",
title = "Checking a Large Routine",
pages = "67--69",
year = "1949",
URL = "http://www.turingarchive.org/browse.php/B/8",
booktitle = "{Report on a Conference on High Speed Automatic
2015-02-16 11:06:30 +00:00
Computation, June 1949}",
}
@inproceedings { HM07 ,
2015-09-14 07:59:17 +00:00
title = {The communication complexity of uncoupled nash equilibrium procedures},
author = {Hart, Sergiu and Mansour, Yishay},
booktitle = stoc07,
pages = {345--353},
year = {2007},
organization = {ACM}
2015-02-16 11:06:30 +00:00
}
@article { DGP09 ,
2015-09-14 07:59:17 +00:00
title = {The complexity of computing a Nash equilibrium},
author = {Daskalakis, Constantinos and Goldberg, Paul W and Papadimitriou, Christos H},
journal = siamjc,
volume = {39},
number = {1},
pages = {195--259},
year = {2009},
publisher = {SIAM}
2015-02-16 11:06:30 +00:00
}
@inproceedings { CS02 ,
2015-09-14 07:59:17 +00:00
title = {Complexity of mechanism design},
author = {Conitzer, Vincent and Sandholm, Tuomas},
booktitle = uai02,
pages = {103--110},
year = {2002},
organization = {Morgan Kaufmann Publishers Inc.}
2015-02-16 11:06:30 +00:00
}
@inproceedings { San03 ,
2015-09-14 07:59:17 +00:00
title = {Automated mechanism design: A new application area for search algorithms},
author = {Sandholm, Tuomas},
booktitle = cp03,
pages = {19--36},
year = {2003},
organization = springer
2015-02-16 11:06:30 +00:00
}
@inproceedings { BP14 ,
2015-09-14 07:59:17 +00:00
title = {Verifiably Truthful Mechanisms},
author = {Br{\^a}nzei, Simina and Procaccia, Ariel D},
booktitle = itcs14,
year = {2014}
2015-02-16 11:06:30 +00:00
}
@phdthesis { Con06 ,
2015-09-14 07:59:17 +00:00
title = {Computational aspects of preference aggregation},
author = {Conitzer, Vincent},
year = {2006},
school = {IBM}
2015-02-16 11:06:30 +00:00
}
@inproceedings { HKM11 ,
2015-09-14 07:59:17 +00:00
title = {Bayesian incentive compatibility via matchings},
author = {Hartline, Jason D and Kleinberg, Robert and Malekian, Azarakhsh},
booktitle = soda11,
pages = {734--747},
year = {2011},
organization = {SIAM}
2015-02-16 11:06:30 +00:00
}
@inproceedings { BH11 ,
2015-09-14 07:59:17 +00:00
title = {Bayesian incentive compatibility via fractional assignments},
author = {Bei, Xiaohui and Huang, Zhiyi},
booktitle = soda11,
pages = {720--733},
year = {2011},
organization = {SIAM}
2015-02-16 11:06:30 +00:00
}
@book { Rou05 ,
2015-09-14 07:59:17 +00:00
title = {Selfish routing and the price of anarchy},
author = {Roughgarden, Tim},
volume = {174},
year = {2005},
publisher = mitpress
2015-02-16 11:06:30 +00:00
}
@article { Morgan:1996 ,
2015-09-14 07:59:17 +00:00
author = {C Morgan and
2015-02-16 11:06:30 +00:00
A Mc{I}ver and
K Seidel},
2015-09-14 07:59:17 +00:00
title = {Probabilistic Predicate Transformers},
journal = toplas,
volume = {18},
number = {3},
year = {1996}
2015-02-16 11:06:30 +00:00
}
@article { Kozen:1985 ,
2015-09-14 07:59:17 +00:00
author = {D. Kozen},
title = {A Probabilistic {PDL}},
journal = jcss,
volume = {30},
number = {2},
year = {1985}
2015-02-16 11:06:30 +00:00
}
@article { Morgan:1996 ,
2015-09-14 07:59:17 +00:00
author = {C Morgan and
2015-02-16 11:06:30 +00:00
A Mc{I}ver and
K Seidel},
2015-09-14 07:59:17 +00:00
title = {Probabilistic Predicate Transformers},
journal = toplas,
volume = {18},
number = {3},
year = {1996}
2015-02-16 11:06:30 +00:00
}
@article { Kozen:1985 ,
2015-09-14 07:59:17 +00:00
author = {D. Kozen},
title = {A Probabilistic {PDL}},
journal = jcss,
volume = {30},
number = {2},
year = {1985}
2015-02-16 11:06:30 +00:00
}
@inproceedings { TGV09 ,
2015-09-14 07:59:17 +00:00
year = {2009},
booktitle = {Declarative Agent Languages and Technologies VI},
volume = {5397},
series = {LNCS},
doi = {10.1007/978-3-540-93920-7_13},
title = {Abstracting and Verifying Strategy-Proofness for Auction Mechanisms},
publisher = {Springer Berlin Heidelberg},
author = {Tadjouddine, Emmanuel M. and Guerin, Frank and Vasconcelos, Wamberto},
pages = {197-214},
language = {English}
2015-02-16 11:06:30 +00:00
}
@inproceedings { DBLP:conf/ceemas/TadjouddineG07 ,
2015-09-14 07:59:17 +00:00
author = {Emmanuel M Tadjouddine and
2015-02-16 11:06:30 +00:00
Frank Guerin},
2015-09-14 07:59:17 +00:00
title = {Verifying Dominant Strategy Equilibria in Auctions},
booktitle = {{CEEMAS 2007}},
year = {2007},
pages = {288--297},
publisher = springer,
series = {LNCS},
volume = {4696},
2015-02-16 11:06:30 +00:00
}
@inproceedings { DBLP:journals/corr/BaiTG14 ,
2015-09-14 07:59:17 +00:00
author = {Wei Bai and
2015-02-16 11:06:30 +00:00
Emmanuel M Tadjouddine and
Yu Guo},
2015-09-14 07:59:17 +00:00
title = {Enabling Automatic Certification of Online Auctions},
booktitle = {{FESCA 2014}},
series = {EPTCS},
volume = {147},
year = {2014},
pages = {123--132},
url = {http://dx.doi.org/10.4204/EPTCS.147.9},
2015-02-16 11:06:30 +00:00
}
@incollection { DBLP:conf/mkm/0002CKMRWW13 ,
2015-09-14 07:59:17 +00:00
author = {Christoph Lange and
2015-02-16 11:06:30 +00:00
Marco B Caminati and
Manfred Kerber and
Till Mossakowski and
Colin Rowat and
Makarius Wenzel and
Wolfgang Windsteiger},
2015-09-14 07:59:17 +00:00
title = {A Qualitative Comparison of the Suitability of Four Theorem
2015-02-16 11:06:30 +00:00
Provers for Basic Auction Theory},
2015-09-14 07:59:17 +00:00
booktitle = {Intelligent Computer Mathematics},
publisher = springer,
series = lncs,
volume = {7961},
year = {2013},
pages = {200--215},
url = {http://dx.doi.org/10.1007/978--3-642--39320--4_13},
publisher = springer
2015-02-16 11:06:30 +00:00
}
@article { DBLP:journals/ipl/Vestergaard06 ,
2015-09-14 07:59:17 +00:00
author = {Ren{\'e} Vestergaard},
title = {A constructive approach to sequential Nash equilibria},
journal = {Inf. Process. Lett.},
volume = {97},
number = {2},
year = {2006},
pages = {46--51},
url = {http://dx.doi.org/10.1016/j.ipl.2005.09.010},
bibsource = {DBLP, http://dblp.uni-trier.de}
2015-02-16 11:06:30 +00:00
}
@inproceedings { DBLP:conf/aaai/WooldridgeADH07 ,
2015-09-14 07:59:17 +00:00
author = {Michael Wooldridge and
2015-02-16 11:06:30 +00:00
Thomas {A}gotnes and
Paul E. Dunne and
Wiebe van der Hoek},
2015-09-14 07:59:17 +00:00
title = {Logic for Automated Mechanism Design---{A} Progress Report},
booktitle = aaai07,
pages = {9--17},
year = {2007},
2015-02-16 11:06:30 +00:00
}
@Article { Alur:2002:ATT ,
2015-09-14 07:59:17 +00:00
author = "Rajeev Alur and Thomas A. Henzinger and Orna
2015-02-16 11:06:30 +00:00
Kupferman",
2015-09-14 07:59:17 +00:00
title = "Alternating-time temporal logic",
journal = jacm,
volume = "49",
number = "5",
pages = "672--713",
month = sep,
year = "2002",
journal-url = "http://portal.acm.org/browse_dl.cfm?idx = J401",
2015-02-16 11:06:30 +00:00
}
2015-05-13 17:11:28 +00:00
@inproceedings { Gonthier13 ,
2015-09-14 07:59:17 +00:00
author = {Georges Gonthier and
2015-02-16 11:06:30 +00:00
Andrea Asperti and
Jeremy Avigad and
Yves Bertot and
Cyril Cohen and
Fran{\c{c}}ois Garillot and
St{\'{e}}phane Le Roux and
Assia Mahboubi and
2015-05-13 17:11:28 +00:00
Russell O'{C}onnor and
2015-02-16 11:06:30 +00:00
Sidi Ould Biha and
Ioana Pasca and
Laurence Rideau and
Alexey Solovyev and
Enrico Tassi and
Laurent Th{\'{e}}ry},
2015-09-14 07:59:17 +00:00
title = {A Machine-Checked Proof of the Odd Order Theorem},
booktitle = {Interactive Theorem Proving (ITP)},
pages = {163--179},
year = {2013},
doi = {10.1007/978-3-642-39634-2_14},
2015-02-16 11:06:30 +00:00
}
@article { clarke71 ,
2015-09-14 07:59:17 +00:00
title = {Multipart pricing of public goods},
author = {Clarke, Edward H},
journal = {Public choice},
volume = {11},
number = {1},
pages = {17--33},
year = {1971},
publisher = springer
2015-02-16 11:06:30 +00:00
}
@article { groves73 ,
2015-09-14 07:59:17 +00:00
title = {Incentives in teams},
author = {Groves, Theodore},
journal = {Econometrica: Journal of the Econometric Society},
pages = {617--631},
year = {1973}
2015-02-16 11:06:30 +00:00
}
@inproceedings { Bellare:2006 ,
2015-09-14 07:59:17 +00:00
address = {Heidelberg},
author = {Bellare, Mihir and Rogaway, Phillip},
booktitle = eucrypt06,
pages = {409--426},
publisher = springer,
series = lncs,
title = {The Security of Triple Encryption and a Framework for
2015-02-16 11:06:30 +00:00
Code-Based Game-Playing Proofs},
2015-09-14 07:59:17 +00:00
volume = {4004},
year = {2006},
url = {https://www.iacr.org/archive/eurocrypt2006/40040415/40040415.pdf}
2015-02-16 11:06:30 +00:00
}
@misc { Halevi:2005 ,
author = {Halevi, Shai},
howpublished = {Cryptology ePrint Archive, Report 2005/181},
title = {A plausible approach to computer-aided cryptographic proofs},
year = {2005},
url = {https://eprint.iacr.org/2005/181.pdf}
}
@misc { Shoup:2004 ,
author = {Shoup, Victor},
howpublished = {Cryptology ePrint Archive, Report 2004/332},
title = {Sequences of games: a tool for taming complexity in security proofs},
year = {2004}
}
@unpublished { Naumann:2009 ,
2015-09-14 07:59:17 +00:00
author = {Naumann, David A},
title = {Theory for software verification},
year = {2009},
url = {http://www.cs.stevens.edu/~naumann/publications/theoryverif.pdf}
2015-02-16 11:06:30 +00:00
}
@incollection { handbook-sat ,
2015-09-14 07:59:17 +00:00
title = {Satisfiability Modulo Theories},
author = {Barrett, Clark and Sebastini, Roberto and Seshia, Sanjit A and
2015-02-16 11:06:30 +00:00
Tinelli, Cesare},
2015-09-14 07:59:17 +00:00
booktitle = {Handbook of satisfiability},
volume = {185},
year = {2009},
publisher = {IOS press},
2015-02-16 11:06:30 +00:00
}
2015-05-13 17:11:28 +00:00
@inproceedings { HPN11 ,
2015-09-14 07:59:17 +00:00
title = {Differential Privacy Under Fire},
author = {Haeberlen, Andreas and
2015-05-13 17:11:28 +00:00
Pierce, Benjamin C and
Narayan, Arjun},
2015-09-14 07:59:17 +00:00
booktitle = {USENIX Security Symposium},
year = {2011}
2015-05-13 17:11:28 +00:00
}
@article { Girard87 ,
2015-09-14 07:59:17 +00:00
title = {{Linear logic}},
author = {Girard, J.Y.},
journal = tcs,
volume = {50},
number = {1},
pages = {1--102},
year = {1987},
publisher = {Elsevier}
2015-05-13 17:11:28 +00:00
}
@incollection { Walker-atapl ,
2015-09-14 07:59:17 +00:00
author = {David Walker},
title = {Substructural Type Systems},
booktitle = {Advanced Topics in Types and Programming Languages},
editor = {Benjamin C Pierce},
publisher = mitpress,
year = {2005},
2015-05-13 17:11:28 +00:00
}
@article { BLL ,
2015-09-14 07:59:17 +00:00
title = {{Bounded linear logic}},
author = {Girard, J.Y. and Scedrov, A. and Scott, P.},
journal = tcs,
volume = {97},
number = {1},
pages = {1--66},
year = {1992}
2015-05-13 17:11:28 +00:00
}
@inproceedings { WrightBaker93 ,
2015-09-14 07:59:17 +00:00
title = {{Usage Analysis with Natural Reduction Types}},
author = {Wright, D.A. and Baker-Finch, C.A.},
booktitle = {International Workshop on Static Analysis},
pages = {254--266},
year = {1993},
publisher = springer
2015-05-13 17:11:28 +00:00
}
@InProceedings { DalLagoHofmann09 ,
2015-09-14 07:59:17 +00:00
title = "Bounded Linear Logic, Revisited",
author = "Dal Lago, Ugo and Hofmann, Martin",
booktitle = tlca,
publisher = springer,
year = "2009",
volume = "5608",
pages = "80--94",
series = lncs,
2015-05-13 17:11:28 +00:00
}
@InProceedings { XiPfenning99 ,
2015-09-14 07:59:17 +00:00
author = "Hongwei Xi and Frank Pfenning",
title = "Dependent Types in Practical Programming",
pages = "214--227",
booktitle = popl99,
year = "1999",
2015-05-13 17:11:28 +00:00
}
@InProceedings { ATS ,
2015-09-14 07:59:17 +00:00
title = "Combining programming with theorem proving",
author = "Chiyan Chen and Hongwei Xi",
booktitle = icfp05,
year = "2005",
pages = "66--77",
url = "http://doi.acm.org/10.1145/1086365.1086375",
2015-05-13 17:11:28 +00:00
}
@article { McBrideMcKinna02 ,
2015-09-14 07:59:17 +00:00
author = {Conor Mc{B}ride and James Mc{K}inna},
title = {The view from the left},
journal = jfp,
year = {2004},
pages = "69--111",
volume = 14,
number = 1,
2015-05-13 17:11:28 +00:00
}
@inproceedings { weirich-promotion ,
2015-09-14 07:59:17 +00:00
author = {Yorgey, Brent A and
2015-05-13 17:11:28 +00:00
Weirich, Stephanie and
Cretin, Julien and
{Peyton Jones}, Simon and
Vytiniotis, Dimitrios and
Magalha\~{e}s, Jos\'{e} Pedro},
2015-09-14 07:59:17 +00:00
title = {Giving Haskell A Promotion},
booktitle = tldi12,
year = 2012,
url = {http://www.seas.upenn.edu/~sweirich/papers/tldi12.pdf},
2015-05-13 17:11:28 +00:00
}
@Article { cervesato-llf ,
2015-09-14 07:59:17 +00:00
title = "A Linear Logical Framework",
author = "Iliano Cervesato and Frank Pfenning",
journal = ic,
month = nov,
year = "2002",
volume = "179",
number = "1",
pages = "19--75",
2015-05-13 17:11:28 +00:00
}
@InProceedings { watkins03types ,
2015-09-14 07:59:17 +00:00
author = "Keven Watkins and Iliano Cervesato and Frank Pfenning
2015-05-13 17:11:28 +00:00
and David Walker",
2015-09-14 07:59:17 +00:00
title = "A concurrent logical framework {I}: The propositional
2015-05-13 17:11:28 +00:00
fragment",
2015-09-14 07:59:17 +00:00
booktitle = types,
volume = 3085,
series = lncs,
publisher = springer,
year = "2003",
2015-05-13 17:11:28 +00:00
}
@InProceedings { DLG11 ,
2015-09-14 07:59:17 +00:00
author = {Dal Lago, Ugo and
2015-05-13 17:11:28 +00:00
Gaboardi, Marco},
2015-09-14 07:59:17 +00:00
title = "Linear Dependent Types and Relative Completeness",
booktitle = lics11,
pages = "133--142",
year = {2011}
2015-05-13 17:11:28 +00:00
}
@InProceedings { KTDG12 ,
2015-09-14 07:59:17 +00:00
title = "Superficially Substructural Types",
author = "Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak",
booktitle = icfp12,
year = 2012,
2015-05-13 17:11:28 +00:00
}
@misc { PalamidessiStronati12 ,
2015-09-14 07:59:17 +00:00
title = {Differential privacy for relational algebra: Improving the
2015-05-13 17:11:28 +00:00
sensitivity bounds via constraint systems},
2015-09-14 07:59:17 +00:00
author = {Palamidessi, Catuscia and Stronati, Marco},
note = {arXiv preprint arXiv:1207.0872},
year = {2012}
2015-05-13 17:11:28 +00:00
}
@inproceedings { CGL10 ,
2015-09-14 07:59:17 +00:00
author = {Chaudhuri, Swarat and Gulwani, Sumit and Lublinerman, Roberto},
title = {Continuity analysis of programs},
booktitle = popl10,
year = {2010},
pages = {57--70},
doi = {http://doi.acm.org/10.1145/1707801.1706308},
2015-05-13 17:11:28 +00:00
}
@InProceedings { CGLN11 ,
2015-09-14 07:59:17 +00:00
title = "Proving programs robust",
author = "Swarat Chaudhuri and Sumit Gulwani and Roberto
2015-05-13 17:11:28 +00:00
Lublinerman and Sara NavidPour",
2015-09-14 07:59:17 +00:00
booktitle = { {ACM} {SIGSOFT} Symposium on the Foundations of Software
2015-05-13 17:11:28 +00:00
Engineering ({FSE}), Szeged, Hungary },
2015-09-14 07:59:17 +00:00
year = "2011",
ISBN = "978-1-4503-0443-6",
pages = "102--112",
URL = "http://doi.acm.org/10.1145/2025113.2025131",
2015-05-13 17:11:28 +00:00
}
@INPROCEEDINGS { Lowe-QIF02 ,
2015-09-14 07:59:17 +00:00
author = {Gavin Lowe},
title = {Quantifying Information Flow},
booktitle = csfw02,
year = {2002},
pages = {18--31}
2015-05-13 17:11:28 +00:00
}
@inproceedings { McCamantErnst08 ,
2015-09-14 07:59:17 +00:00
author = {McCamant, Stephen and Ernst, Michael D.},
title = {Quantitative information flow as network flow capacity},
booktitle = pldi08,
year = {2008},
isbn = {978-1-59593-860-2},
pages = {193--205},
doi = {http://doi.acm.org/10.1145/1375581.1375606},
address = {New York, NY, USA},
2015-05-13 17:11:28 +00:00
}
@inproceedings { AACP11 ,
2015-09-14 07:59:17 +00:00
author = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
title = {{On the relation between Differential Privacy and Quantitative Information Flow}},
booktitle = icalp11,
year = {2011},
series = lncs,
doi = {10.1007/978-3-642-22012-8_4},
publisher = springer,
volume = {6756},
pages = {60--76},
url = {http://hal.inria.fr/inria-00627937/en},
2015-05-13 17:11:28 +00:00
}
@inproceedings { barthekoepf11 ,
2015-09-14 07:59:17 +00:00
author = {Gilles Barthe and Boris K{\"o}pf},
title = {{Information-theoretic Bounds for Differentially Private Mechanisms}},
booktitle = csf11,
publisher = ieee,
pages = {191--204},
year = {2011}
2015-05-13 17:11:28 +00:00
}
@inproceedings { AgrawalSrikant00 ,
2015-09-14 07:59:17 +00:00
title = {Privacy-preserving data mining},
author = {Agrawal, Rakesh and Srikant, Ramakrishnan},
booktitle = sigmod00,
pages = {439--450},
year = {2000},
2015-05-13 17:11:28 +00:00
}
@article { l-diversity ,
2015-09-14 07:59:17 +00:00
title = {l-diversity: Privacy beyond k-anonymity},
author = {Machanavajjhala, Ashwin and Kifer, Daniel and Gehrke, Johannes and
2015-05-13 17:11:28 +00:00
Venkitasubramaniam, Muthuramakrishnan},
2015-09-14 07:59:17 +00:00
journal = {{ACM} Transactions on Knowledge Discovery from Data ({TKDD})},
volume = {1},
number = {1},
pages = {3},
year = {2007},
publisher = {ACM}
2015-05-13 17:11:28 +00:00
}
@article { ESA04 ,
2015-09-14 07:59:17 +00:00
title = {Privacy preserving mining of association rules},
author = {Evfimievski, Alexandre and Srikant, Ramakrishnan and Agrawal,
2015-05-13 17:11:28 +00:00
Rakesh and Gehrke, Johannes},
2015-09-14 07:59:17 +00:00
journal = {Information Systems},
volume = {29},
number = {4},
pages = {343--364},
year = {2004},
publisher = elsevier
2015-05-13 17:11:28 +00:00
}
@inproceedings { GKSS08 ,
2015-09-14 07:59:17 +00:00
title = {Composition attacks and auxiliary information in data privacy},
author = {Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and
2015-05-13 17:11:28 +00:00
Smith, Adam},
2015-09-14 07:59:17 +00:00
booktitle = kdd08,
pages = {265--273},
year = {2008},
2015-05-13 17:11:28 +00:00
}
@book { Hurwicz60 ,
2015-09-14 07:59:17 +00:00
title = {Optimality and informational efficiency in resource allocation
2015-05-13 17:11:28 +00:00
processes},
2015-09-14 07:59:17 +00:00
author = {Hurwicz, Leonid},
year = {1960},
publisher = {Stanford University Press}
2015-05-13 17:11:28 +00:00
}
@article { Vickrey61 ,
2015-09-14 07:59:17 +00:00
title = {Counterspeculation, auctions, and competitive sealed tenders},
author = {Vickrey, William},
journal = {The Journal of Finance},
volume = {16},
number = {1},
pages = {8--37},
year = {1961},
2015-05-13 17:11:28 +00:00
}
@article { Hurwicz72 ,
2015-09-14 07:59:17 +00:00
title = {On informationally decentralized systems},
author = {Hurwicz, Leonid},
journal = {Decision and organization},
year = {1972},
publisher = {North-Holland Amsterdam}
2015-05-13 17:11:28 +00:00
}
@article { Myerson08 ,
2015-09-14 07:59:17 +00:00
title = {Perspectives on mechanism design in economic theory},
author = {Myerson, Roger B},
journal = {The American Economic Review},
pages = {586--603},
year = {2008},
publisher = {JSTOR}
2015-05-13 17:11:28 +00:00
}
@incollection { BGBP-bigops08 ,
2015-09-14 07:59:17 +00:00
title = {Canonical big operators},
author = {Bertot, Yves and Gonthier, Georges and Biha, Sidi Ould and Pasca,
2015-05-13 17:11:28 +00:00
Ioana},
2015-09-14 07:59:17 +00:00
booktitle = tphol,
pages = {86--101},
year = {2008},
publisher = springer
2015-05-13 17:11:28 +00:00
}
@techreport { Ramshaw79 ,
2015-09-14 07:59:17 +00:00
title = {Formalizing the Analysis of Algorithms.},
author = {Ramshaw, Lyle Harold},
year = {1979},
institution = {Stanford University},
note = {STAN-CS-79-741}
2015-05-13 17:11:28 +00:00
}
@article { HartogVink02 ,
2015-09-14 07:59:17 +00:00
title = {Verifying probabilistic programs using a Hoare like logic},
author = {den Hartog, J I and de Vink, Erik P},
journal = {International Journal of Foundations of Computer Science},
volume = {13},
number = {03},
pages = {315--340},
year = {2002},
publisher = {World Scientific}
2015-05-13 17:11:28 +00:00
}
@article { Chadha07 ,
2015-09-14 07:59:17 +00:00
title = {Reasoning about probabilistic sequential programs},
author = {Chadha, Rohit and Cruz-Filipe, Lu{\'\i}s and Mateus, Paulo and
2015-05-13 17:11:28 +00:00
Sernadas, Am{\'\i}lcar},
2015-09-14 07:59:17 +00:00
journal = tcs,
volume = {379},
number = {1},
pages = {142--165},
year = {2007},
publisher = elsevier
2015-05-13 17:11:28 +00:00
}
@misc { RandZdancewic15 ,
2015-09-14 07:59:17 +00:00
author = {Rand, Robert and Zdancewic, Steve},
title = {A Formally Verified Probabilistic Hoare Logic with Non-Termination},
year = 2015
2015-05-13 17:11:28 +00:00
}
@article { Kozen81 ,
2015-09-14 07:59:17 +00:00
title = {Semantics of probabilistic programs},
author = {Kozen, Dexter},
journal = {Journal of Computer and System Sciences},
volume = {22},
number = {3},
pages = {328--350},
year = {1981},
publisher = {Elsevier}
2015-05-13 17:11:28 +00:00
}
@article { HSP83 ,
2015-09-14 07:59:17 +00:00
title = {Termination of probabilistic concurrent program},
author = {Hart, Sergiu and Sharir, Micha and Pnueli, Amir},
journal = toplas,
volume = {5},
number = {3},
pages = {356--380},
year = {1983},
2015-05-13 17:11:28 +00:00
}
@inproceedings { Hurd02 ,
2015-09-14 07:59:17 +00:00
title = {A formal approach to probabilistic termination},
author = {Hurd, Joe},
booktitle = tphol,
pages = {230--245},
year = {2002},
publisher = springer
2015-05-13 17:11:28 +00:00
}
@inproceedings { Chakarov-martingale ,
2015-09-14 07:59:17 +00:00
title = {Probabilistic program analysis with martingales},
author = {Chakarov, Aleksandar and Sankaranarayanan, Sriram},
booktitle = cav13,
pages = {511--526},
year = {2013},
organization = springer
2015-05-13 17:11:28 +00:00
}
@inproceedings { FerrerHermanns15 ,
2015-09-14 07:59:17 +00:00
title = {Probabilistic Termination: Soundness, Completeness, and
2015-05-13 17:11:28 +00:00
Compositionality},
2015-09-14 07:59:17 +00:00
author = {Ferrer Fioriti, Luis Mar{\'\i}a and Hermanns, Holger},
booktitle = popl15,
pages = {489--501},
year = {2015},
organization = {ACM}
2015-05-13 17:11:28 +00:00
}
@inproceedings { Kozen06 ,
2015-09-14 07:59:17 +00:00
title = {Coinductive Proof Principles for Stochastic Processes},
author = {Kozen, Dexter},
booktitle = lics06,
pages = {359--366},
year = {2006},
organization = ieee
2015-05-13 17:11:28 +00:00
}
@inproceedings { liquid-haskell ,
2015-09-14 07:59:17 +00:00
title = {Abstract refinement types},
author = {Vazou, Niki and Rondon, Patrick M and Jhala, Ranjit},
booktitle = esop13,
pages = {209--228},
year = {2013},
publisher = springer
2015-05-13 17:11:28 +00:00
}
@inproceedings { liquid-ml ,
2015-09-14 07:59:17 +00:00
title = {Liquid types},
author = {Rondon, Patrick M and Kawaguci, Ming and Jhala, Ranjit},
booktitle = pldi08,
volume = {43},
number = {6},
pages = {159--169},
year = {2008},
2015-05-13 17:11:28 +00:00
}
2015-09-11 17:23:51 +00:00
@book { Thorisson00 ,
2015-09-14 07:59:17 +00:00
author = {Hermann Thorisson},
title = {Coupling, Stationarity, and Regeneration},
publisher = springer,
year = {2000}
2015-09-11 17:23:51 +00:00
}
@book { Lindvall02 ,
2015-09-14 07:59:17 +00:00
title = {Lectures on the coupling method},
author = {Lindvall, Torgny},
year = {2002},
publisher = {Courier Corporation}
2015-09-11 17:23:51 +00:00
}
@book { Villani08 ,
2015-09-14 07:59:17 +00:00
title = {Optimal transport: old and new},
author = {Villani, C{\'e}dric},
year = {2008},
publisher = {Springer Science}
2015-09-11 17:23:51 +00:00
}
@techreport { DengD11 ,
2015-09-14 07:59:17 +00:00
Author = {Deng, Yuxin and Du, Wenjie},
Institution = {Carnegie Mellon University},
Month = {March},
Number = {CMU-CS-11-110},
Title = {Logical, Metric, and Algorithmic Characterisations of Probabilistic Bisimulation},
Year = {2011},
url = {http://arxiv.org/abs/1103.4577}
2015-09-11 17:23:51 +00:00
}
@article { Yang07 ,
2015-09-14 07:59:17 +00:00
author = {H. Yang},
title = {Relational separation logic},
journal = tcs,
volume = 375,
number = {1-3},
year = 2007,
pages = {308--334},
url = {http://www.cs.ox.ac.uk/people/hongseok.yang/paper/data.pdf}
2015-09-11 17:23:51 +00:00
}
@article { mufa1994optimal ,
2015-09-14 07:59:17 +00:00
title = {Optimal Markovian couplings and applications},
author = {Mufa, Chen},
journal = {Acta Mathematica Sinica},
volume = {10},
number = {3},
pages = {260--275},
year = {1994},
publisher = springer
2015-09-11 17:23:51 +00:00
}