10113 lines
310 KiB
BibTeX
10113 lines
310 KiB
BibTeX
%%%%%%%%%%%%%%%%%%%%%%%%%%%% UNPUBLISHED %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@unpublished{AH23,
|
||
title = {Separated and Shared Effects in Higher-Order Languages},
|
||
author = {Azevedo de Amorim, Pedro H. and Hsu, Justin},
|
||
year = 2023,
|
||
url = {https://arxiv.org/abs/2303.01616},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
eprint = {2303.01616},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% THESIS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@phdthesis{JHThesis,
|
||
title = {Probabilistic Couplings for Probabilistic Reasoning},
|
||
author = {Justin Hsu},
|
||
school = {University of Pennsylvania},
|
||
year = {2017},
|
||
url = {https://arxiv.org/abs/1710.09951},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
eprint = {1710.09951},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
note = "Selected for the ACM SIGPLAN John C. Reynolds Doctoral Dissertation Award"
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% JOURNALS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@article{lmcs:5989,
|
||
TITLE = {Relational $\star$-Liftings for Differential Privacy},
|
||
AUTHOR = {Barthe, Gilles and Espitau, Thomas and Hsu, Justin and Sato, Tetsuya and Strub, Pierre-Yves},
|
||
URL = {https://lmcs.episciences.org/5989},
|
||
DOI = {10.23638/LMCS-15(4:18)2019},
|
||
JOURNAL = lmcs,
|
||
VOLUME = {15},
|
||
NUMBER = {4},
|
||
YEAR = {2019},
|
||
MONTH = Dec,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/star-lifting.pdf},
|
||
note = "Previously published in " # icalp17 # ", 2017."
|
||
}
|
||
|
||
@article{GGHRW14,
|
||
author = {Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Hsu, Justin and
|
||
Roth, Aaron and
|
||
Wu, Zhiwei Steven},
|
||
title = {Dual Query: Practical Private Query Release for High Dimensional Data},
|
||
journal = jpc,
|
||
year = {2017},
|
||
month = {},
|
||
volume = {7},
|
||
number = {2},
|
||
pages = {53--77},
|
||
url = {https://arxiv.org/abs/1402.1526},
|
||
doi = {10.29012/jpc.v7i2.650},
|
||
eprint = {1402.1526},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
publisher = bepress,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
poster = {https://justinhsu.net/files/posters/dualquery.pdf},
|
||
note = "Previously published in " # icml14 # ", 2014."
|
||
}
|
||
|
||
@article{HHRRW14,
|
||
author = {Hsu, Justin and
|
||
Huang, Zhiyi and
|
||
Roth, Aaron and
|
||
Roughgarden, Tim and
|
||
Wu, Zhiwei Steven},
|
||
title = {Private Matchings and Allocations},
|
||
journal = siamjc,
|
||
year = {2016},
|
||
month = {},
|
||
volume = {45},
|
||
number = {6},
|
||
pages = {1953--1984},
|
||
doi = {10.1137/15100271X},
|
||
url = {https://arxiv.org/abs/1311.2828},
|
||
eprint = {1311.2828},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.GT},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
poster = {https://justinhsu.net/files/posters/matchings.pdf},
|
||
note = "Previously published in " # stoc14 # ", 2014."
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONFERENCES %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@inproceedings{GBHSZ23,
|
||
title = {A Categorical Approach to {DIBI} Models},
|
||
author = {Gu, Tao and
|
||
Bao, Jialu and
|
||
Hsu, Justin and
|
||
Silva, Alexandra and
|
||
Zanasi, Fabio},
|
||
booktitle = fscd24,
|
||
year = 2024,
|
||
url = {https://arxiv.org/abs/2401.05842},
|
||
eprint = {2401.05842},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
}
|
||
|
||
@inproceedings{BLH24,
|
||
title = {Verifying Cake-Cutting, Faster},
|
||
author = {Bertram, Noah and Lai, Tean and Hsu, Justin},
|
||
booktitle = cav24,
|
||
year = 2024,
|
||
url = {https://arxiv.org/abs/2405.14068},
|
||
eprint = {2405.14068},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.GT},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
}
|
||
|
||
@article{KH23,
|
||
title = {Numerical {Fuzz}: A Type System for Rounding Error Analysis},
|
||
author = {Ariel E. Kellison and Justin Hsu},
|
||
year = 2024,
|
||
month = jun,
|
||
journal = pacmpl,
|
||
articleno = {226},
|
||
volume = {8},
|
||
number = {PLDI},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
doi = {10.1145/3656456},
|
||
url = {https://arxiv.org/abs/2405.04612},
|
||
eprint = {2405.04612},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
note = "Appeared at " # pldi24 # ".",
|
||
}
|
||
|
||
@inproceedings{GGH23,
|
||
title = {Expressive Policies for Microservice Networks},
|
||
author = {Grewal, Karuna and Godfrey, Brighten and Hsu, Justin},
|
||
year = 2023,
|
||
month = nov,
|
||
booktitle = hotnets23,
|
||
reviewed = yes,
|
||
url = {https://dl.acm.org/doi/10.1145/3626111.3628181},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
doi = {10.1145/3626111.3628181},
|
||
pages ={280--286},
|
||
}
|
||
|
||
@article{BLH23,
|
||
title = {Cutting the Cake: A Language for Fair Division},
|
||
author = {Bertram, Noah and Levinson, Alex and Hsu, Justin},
|
||
year = 2023,
|
||
month = jun,
|
||
journal = pacmpl,
|
||
volume = {7},
|
||
number = {PLDI},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
doi = {10.1145/3591293},
|
||
url = {https://arxiv.org/abs/2304.04642},
|
||
eprint = {2304.04642},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
note = "Appeared at " # pldi23 # ".",
|
||
}
|
||
|
||
@article{SLHR21,
|
||
title = {Symbolic Execution for Randomized Programs},
|
||
author = {Susag, Zachary and
|
||
Lahiri, Sumit and
|
||
Hsu, Justin and
|
||
Roy, Subhajit},
|
||
year = 2022,
|
||
month = jan,
|
||
journal = pacmpl,
|
||
volume = {6},
|
||
number = {OOPSLA},
|
||
url = {https://arxiv.org/abs/2209.08046},
|
||
eprint = {2209.08046},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
note = "Appeared at " # oopsla22 # ".",
|
||
}
|
||
|
||
@inproceedings{BPHR21,
|
||
title = {Data-Driven Invariant Learning for Probabilistic Programs},
|
||
author = {Bao, Jialu and
|
||
Trivedi, Nitesh and
|
||
Pathak, Drashti and
|
||
Hsu, Justin and
|
||
Roy, Subhajit},
|
||
url = {https://arxiv.org/abs/2106.05421},
|
||
eprint = {2106.05421},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
booktitle = cav22,
|
||
year = 2022,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
acceptance = {51/209=0.24},
|
||
note = "Distinguished Paper Award."
|
||
}
|
||
|
||
@inproceedings{GDH22,
|
||
title = {{P4BID}: Information Flow Control in {P4}},
|
||
author = {Grewal, Karuna and
|
||
D'Antoni, Loris and
|
||
Hsu, Justin},
|
||
booktitle = pldi22,
|
||
year = 2022,
|
||
url = {https://arxiv.org/abs/2204.03113},
|
||
doi = {10.1145/3519939.3523717},
|
||
eprint = {2204.03113},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
acceptance = {68/330=0.20},
|
||
}
|
||
|
||
@article{BGHT21,
|
||
title = {A Separation Logic for Negative Dependence},
|
||
author = {Bao, Jialu and
|
||
Gaboardi, Marco and
|
||
Hsu, Justin and
|
||
Tassarotti, Joseph},
|
||
url = {https://arxiv.org/abs/2111.14917},
|
||
eprint = {2111.14917},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
year = 2022,
|
||
month = jan,
|
||
journal = pacmpl,
|
||
volume = {6},
|
||
number = {POPL},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
note = "Appeared at " # popl22 # ".",
|
||
}
|
||
|
||
@inproceedings{BDHS20,
|
||
title = {A Bunched Logic for Conditional Independence},
|
||
author = {Bao, Jialu and
|
||
Docherty, Simon and
|
||
Hsu, Justin and
|
||
Silva, Alexandra},
|
||
url = {https://arxiv.org/abs/2008.09231},
|
||
eprint = {2008.09231},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
booktitle = lics21,
|
||
year = 2021,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
acceptance = {91/227=0.40},
|
||
}
|
||
|
||
@inproceedings{ZBHYY20,
|
||
title = {A Quantum Interpretation of Bunched Logic \& Quantum Separation Logic},
|
||
author = {Zhou, Li and
|
||
Barthe, Gilles and
|
||
Hsu, Justin and
|
||
Ying, Mingsheng and
|
||
Yu, Nengkun},
|
||
url = {https://arxiv.org/abs/2102.00329},
|
||
eprint = {2102.00329},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
booktitle = lics21,
|
||
year = 2021,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
acceptance = {91/227=0.40},
|
||
}
|
||
|
||
@inproceedings{RHA21,
|
||
title = {Learning Differentially Private Mechanisms},
|
||
author = {Roy, Subhajit and
|
||
Hsu, Justin and
|
||
Albarghouthi, Aws},
|
||
booktitle = sandp,
|
||
year = 2021,
|
||
url = {https://arxiv.org/abs/2101.00961},
|
||
eprint = {2101.00961},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.CR},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
}
|
||
|
||
@article{ABHKKM19,
|
||
title = {A Pre-Expectation Calculus for Probabilistic Sensitivity},
|
||
author = {Aguirre, Alejandro and
|
||
Barthe, Gilles and
|
||
Hsu, Justin and
|
||
Kaminski, Benjamin Lucien and
|
||
Katoen, Joost-Pieter and
|
||
Matheja, Christoph},
|
||
year = 2021,
|
||
url = {https://arxiv.org/abs/1901.06540},
|
||
eprint = {1901.06540},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.1145/3434333},
|
||
articleno = {52},
|
||
month = jan,
|
||
journal = pacmpl,
|
||
volume = {5},
|
||
number = {POPL},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
slides = {https://justinhsu.net/files/slides/rpgcl.pdf},
|
||
note = "Appeared at " # popl21 # ". Distinguished Paper Award.",
|
||
acceptance = {61/258=0.23},
|
||
}
|
||
|
||
@inproceedings{BBGHS19,
|
||
title = {Hypothesis Testing Interpretations and {R}\'enyi Differential Privacy},
|
||
author = {Balle, Borja and
|
||
Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Hsu, Justin and
|
||
Sato, Tetsuya},
|
||
booktitle = aistats20,
|
||
year = 2020,
|
||
url = {https://arxiv.org/abs/1905.09982},
|
||
eprint = {1905.09982},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LG},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
}
|
||
|
||
@article{BHL19,
|
||
title = {A Probabilistic Separation Logic},
|
||
author = {Barthe, Gilles and
|
||
Hsu, Justin and
|
||
Liao, Kevin},
|
||
year = 2020,
|
||
url = {https://arxiv.org/abs/1907.10708},
|
||
eprint = {1907.10708},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
doi = {10.1145/3371123},
|
||
month = jan,
|
||
journal = pacmpl,
|
||
volume = {4},
|
||
articleno = {55},
|
||
number = {POPL},
|
||
note = "Appeared at " # popl20 # ".",
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
acceptance = {68/257=0.28},
|
||
}
|
||
|
||
@article{SFHKKS19,
|
||
title = {Guarded {Kleene} {Algebra} with {Tests}},
|
||
author = {Smolka, Steffen and
|
||
Foster, Nate and
|
||
Hsu, Justin and
|
||
Kapp\'e, Tobias and
|
||
Kozen, Dexter and
|
||
Silva, Alexandra},
|
||
year = 2020,
|
||
url = {https://arxiv.org/abs/1907.05920},
|
||
doi = {10.1145/3371129},
|
||
eprint = {1907.05920},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
month = jan,
|
||
journal = pacmpl,
|
||
volume = {4},
|
||
articleno = {61},
|
||
number = {POPL},
|
||
note = "Appeared at " # popl20 # ". Distinguished Paper Award.",
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
acceptance = {68/257=0.28},
|
||
}
|
||
|
||
@article{BHYYZ19,
|
||
title = {Relational Proofs for Quantum Programs},
|
||
author = {Barthe, Gilles and
|
||
Hsu, Justin and
|
||
Ying, Mingsheng and
|
||
Yu, Nengkun and
|
||
Zhou, Li},
|
||
year = 2020,
|
||
url = {https://arxiv.org/abs/1901.05184},
|
||
eprint = {1901.05184},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.1145/3371089},
|
||
month = jan,
|
||
journal = pacmpl,
|
||
volume = {4},
|
||
articleno = {21},
|
||
number = {POPL},
|
||
note = "Appeared at " # popl20 # ".",
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
acceptance = {68/257=0.28},
|
||
}
|
||
|
||
@inproceedings{MZH19,
|
||
title = {Data Poisoning against Differentially-Private Learners: Attacks and Defenses},
|
||
author = {Ma, Yuzhe and
|
||
Zhu, Xiaojin and
|
||
Hsu, Justin},
|
||
booktitle = ijcai19,
|
||
year = 2019,
|
||
url = {https://arxiv.org/abs/1903.09860},
|
||
doi = {10.24963/ijcai.2019/657},
|
||
eprint = {1903.09860},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LG},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
acceptance = {850/4572=0.18},
|
||
}
|
||
|
||
@inproceedings{ACGHK19,
|
||
title = {Probabilistic Relational Reasoning via Metrics},
|
||
author = {Azevedo de Amorim, Arthur and
|
||
Gaboardi, Marco and
|
||
Hsu, Justin and
|
||
Katsumata, {Shin-ya}},
|
||
booktitle = lics19,
|
||
year = 2019,
|
||
url = {https://arxiv.org/abs/1807.05091},
|
||
doi = {10.1109/LICS.2019.8785715},
|
||
eprint = {1807.05091},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
reviewed = yes,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
acceptance = {60/154=0.38},
|
||
}
|
||
|
||
@inproceedings{SBGHK17,
|
||
title = {Approximate Span Liftings: Compositional Semantics for Relaxations of Differential Privacy},
|
||
author = {Sato, Tetsuya and
|
||
Barthe, Gilles and
|
||
Gaboradi, Marco and
|
||
Hsu, Justin and
|
||
Katsumata, {Shin-ya}},
|
||
booktitle = lics19,
|
||
year = 2019,
|
||
url = {https://arxiv.org/abs/1710.09010},
|
||
doi = {10.1109/LICS.2019.8785668},
|
||
eprint = {1710.09010},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
acceptance = {60/154=0.38},
|
||
}
|
||
|
||
@inproceedings{SKFHKKS18,
|
||
title = {Scalable Verification of Probabilistic Network Programs},
|
||
author = {Smolka, Steffen and
|
||
Kumar, Praveen and
|
||
Kahn, David M and
|
||
Foster, Nate and
|
||
Hsu, Justin and
|
||
Kozen, Dexter and
|
||
Silva, Alexandra},
|
||
booktitle = pldi19,
|
||
year = {2019},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
url = {https://arxiv.org/abs/1904.08096},
|
||
eprint = {1904.08096},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
doi = {10.1145/3314221.3314639},
|
||
acceptance = {76/281=0.27},
|
||
}
|
||
|
||
@inproceedings{ZGBH19,
|
||
title = {Fake News Detection via {NLP} Is Vulnerable to Adversarial Attacks},
|
||
author = {Zhou, Zhixuan and
|
||
Guan, Huankang and
|
||
Bhat, Meghana Moorthy and
|
||
Hsu, Justin},
|
||
year = 2019,
|
||
booktitle = icaart19,
|
||
url = {https://arxiv.org/abs/1901.09657},
|
||
eprint = {1901.09657},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.SI},
|
||
jh = yes,
|
||
jhsite = no,
|
||
reviewed = no,
|
||
}
|
||
|
||
|
||
@article{SHA18,
|
||
title = {Trace Abstraction modulo Probability},
|
||
author = {Smith, Calvin and
|
||
Hsu, Justin and
|
||
Albarghouthi, Aws},
|
||
year = {2019},
|
||
month = jan,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
journal = pacmpl,
|
||
volume = {3},
|
||
articleno = {39},
|
||
number = {POPL},
|
||
note = "Appeared at " # popl19 # ".",
|
||
eprint = {1810.12396},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
url = {https://arxiv.org/abs/1810.12396},
|
||
doi = {10.1145/3290352},
|
||
reviewed = yes,
|
||
}
|
||
|
||
@article{SABGGH18,
|
||
title = {Formal Verification of Higher-Order Probabilistic Programs},
|
||
author = {Sato, Tetsuya and
|
||
Aguirre, Alejandro and
|
||
Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Garg, Deepak and
|
||
Hsu, Justin},
|
||
year = {2019},
|
||
month = jan,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
journal = pacmpl,
|
||
volume = {3},
|
||
articleno = {38},
|
||
number = {POPL},
|
||
note = "Appeared at " # popl19 # ".",
|
||
reviewed = yes,
|
||
url = {https://arxiv.org/abs/1807.06091},
|
||
doi = {10.1145/3290351},
|
||
eprint = {1807.06091},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
}
|
||
|
||
@inproceedings{vHHOS18,
|
||
title = {Convex Language Semantics for Nondeterministic Probabilistic Automata},
|
||
author = {van Heerdt, Gerco and
|
||
Hsu, Justin and
|
||
Ouaknine, Jo\"el and
|
||
Silva, Alexandra},
|
||
year = {2018},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
booktitle = ictac18,
|
||
url = {https://arxiv.org/abs/1805.11550},
|
||
doi = {10.1007/978-3-030-02508-3_25},
|
||
eprint = {1805.11550},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.FL},
|
||
acceptance = {25/59=0.42},
|
||
}
|
||
|
||
@inproceedings{AH18,
|
||
title = {Constraint-Based Synthesis of Coupling Proofs},
|
||
author = {Albarghouthi, Aws and
|
||
Hsu, Justin},
|
||
year = {2018},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
booktitle = cav18,
|
||
url = {https://arxiv.org/abs/1804.04052},
|
||
doi = {10.1007/978-3-319-96145-3_18},
|
||
eprint = {1804.04052},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
acceptance = {65/215=0.30},
|
||
}
|
||
|
||
@inproceedings{ABHS18,
|
||
title = {Almost Sure Productivity},
|
||
author = {Aguirre, Alejandro and
|
||
Barthe, Gilles and
|
||
Hsu, Justin and
|
||
Silva, Alexandra},
|
||
year = {2018},
|
||
booktitle = icalp18,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
url = {https://arxiv.org/abs/1802.06283},
|
||
doi = {10.4230/LIPIcs.ICALP.2018.113},
|
||
eprint = {1802.06283},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
acceptance = {147/502=0.29},
|
||
}
|
||
|
||
@inproceedings{BEGGHS16,
|
||
title = {An Assertion-Based Program Logic for Probabilistic Programs},
|
||
author = {Barthe, Gilles and
|
||
Espitau, Thomas and
|
||
Gaboardi, Marco and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
year = {2018},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
booktitle = esop18,
|
||
url = {https://arxiv.org/abs/1803.05535},
|
||
eprint = {1803.05535},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
slides = {https://justinhsu.net/files/slides/ellora.pdf},
|
||
acceptance = {144/479=0.30},
|
||
}
|
||
|
||
@article{AH17,
|
||
title = {Synthesizing Coupling Proofs of Differential Privacy},
|
||
author = {Albarghouthi, Aws and
|
||
Hsu, Justin},
|
||
year = {2018},
|
||
month = jan,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
journal = pacmpl,
|
||
volume = {2},
|
||
number = {POPL},
|
||
articleno = {58},
|
||
url = {https://arxiv.org/abs/1709.05361},
|
||
note = "Appeared at " # popl18 # ".",
|
||
reviewed = yes,
|
||
doi = {10.1145/3158146},
|
||
eprint = {1709.05361},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
}
|
||
|
||
@article{BEGHS16,
|
||
title = {Proving Expected Sensitivity of Probabilistic Programs},
|
||
author = {Barthe, Gilles and
|
||
Espitau, Thomas and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
year = {2018},
|
||
month = jan,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
journal = pacmpl,
|
||
volume = {2},
|
||
number = {POPL},
|
||
articleno = {57},
|
||
doi = {10.1145/3158145},
|
||
url = {https://arxiv.org/abs/1708.02537},
|
||
note = "Appeared at " # popl18 # ".",
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/eprhl.pdf},
|
||
eprint = {1708.02537},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
}
|
||
|
||
inproceedings{BEHSS17,
|
||
title = {$\star$-Liftings for Differential Privacy},
|
||
author = {Barthe, Gilles and
|
||
Espitau, Thomas and
|
||
Hsu, Justin and
|
||
Sato, Tetsuya and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = icalp17,
|
||
year = 2017,
|
||
pages ={102:1--102:12},
|
||
series = lipics,
|
||
volume = 80,
|
||
publisher = dagstuhl,
|
||
url = {https://arxiv.org/abs/1705.00133},
|
||
eprint = {1705.00133},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.4230/LIPIcs.ICALP.2017.102},
|
||
slides = {https://justinhsu.net/files/slides/star-lifting.pdf},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {137/459=0.29},
|
||
}
|
||
|
||
@inproceedings{BEGHS17,
|
||
title = {Proving Uniformity and Independence by Self-Composition and Coupling},
|
||
author = {Barthe, Gilles and
|
||
Espitau, Thomas and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = lpar17,
|
||
pages = {385--403},
|
||
series = epic,
|
||
volume = 46,
|
||
year = 2017,
|
||
url = {https://arxiv.org/abs/1701.06477},
|
||
eprint = {1701.06477},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
slides = {https://justinhsu.net/files/slides/unifindep-couple.pdf},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {30/54=0.55},
|
||
}
|
||
|
||
@inproceedings{BGHS16,
|
||
title = {Coupling Proofs Are Probabilistic Product Programs},
|
||
author = {Barthe, Gilles and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = popl17,
|
||
pages = {161--174},
|
||
year = 2017,
|
||
url = {https://arxiv.org/abs/1607.03455},
|
||
eprint = {1607.03455},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
doi = {10.1145/3009837.3009896},
|
||
slides = {https://justinhsu.net/files/slides/products.pdf},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {64/282=0.22},
|
||
}
|
||
|
||
@inproceedings{ACGHK16,
|
||
title = {A Semantic Account of Metric Preservation},
|
||
author = {Azevedo de Amorim, Arthur and
|
||
Gaboardi, Marco and
|
||
Hsu, Justin and
|
||
Katsumata, {Shin-ya} and
|
||
Cherigui, Ikram},
|
||
booktitle = popl17,
|
||
year = 2017,
|
||
pages = {545--556},
|
||
url = {https://arxiv.org/abs/1702.00374},
|
||
eprint = {1702.00374},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
doi = {10.1145/3009837.3009890},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {64/282=0.22},
|
||
}
|
||
|
||
@inproceedings{HKM-verif16,
|
||
title = {Computer-Aided Verification in Mechanism Design},
|
||
author = {Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Hsu, Justin and
|
||
Roth, Aaron and
|
||
Strub, Pierre-Yves},
|
||
booktitle = wine16,
|
||
year = 2016,
|
||
pages = {273--293},
|
||
series = lncs,
|
||
volume = 10123,
|
||
publisher = springer,
|
||
url = {https://arxiv.org/abs/1502.04052},
|
||
eprint = {1502.04052},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.GT},
|
||
doi = {10.1007/978-3-662-54110-4_20},
|
||
slides = {https://justinhsu.net/files/slides/bic.pdf},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
}
|
||
|
||
@inproceedings{BGGHS16c,
|
||
title = {Advanced Probabilistic Couplings for Differential Privacy},
|
||
author = {Barthe, Gilles and
|
||
Fong, No{\'e}mie and
|
||
Gaboardi, Marco and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = ccs16,
|
||
year = 2016,
|
||
pages = {55--67},
|
||
url = {https://arxiv.org/abs/1606.07143},
|
||
eprint = {1606.07143},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.1145/2976749.2978391},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/advanced.pdf},
|
||
acceptance = {137/831=0.17},
|
||
errata = {There is an error in the treatment of advanced composition; please see my thesis for the correction.},
|
||
}
|
||
|
||
@inproceedings{privinfer,
|
||
title = {Differentially Private {Bayesian} Programming},
|
||
author = {Barthe, Gilles and
|
||
Farina, Gian Pietro and
|
||
Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Gordon, Andy and
|
||
Hsu, Justin and
|
||
Strub, Pierre-Yves},
|
||
booktitle = ccs16,
|
||
year = {2016},
|
||
url = {https://arxiv.org/abs/1605.00283},
|
||
eprint = {1605.00283},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
doi = {10.1145/2976749.2978371},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {137/831=0.17},
|
||
}
|
||
|
||
@inproceedings{BEFFH16,
|
||
title = {Synthesizing Probabilistic Invariants via {Doob}'s Decomposition},
|
||
author = {Barthe, Gilles and
|
||
Espitau, Thomas and
|
||
Ferrer Fioriti, Luis Mar{\'i}a and
|
||
Hsu, Justin},
|
||
booktitle = cav16,
|
||
pages = {43--61},
|
||
volume = {9779},
|
||
series = lncs,
|
||
year = 2016,
|
||
publisher = springer,
|
||
url = {https://arxiv.org/abs/1605.02765},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
eprint = {1605.02765},
|
||
doi = {10.1007/978-3-319-41528-4_3},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {46/195=0.24},
|
||
}
|
||
|
||
@inproceedings{BGGHS16b,
|
||
title = {A Program Logic for Union Bounds},
|
||
author = {Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = icalp16,
|
||
pages = {107:1--107:15},
|
||
volume = {55},
|
||
series = lipics,
|
||
year = 2016,
|
||
publisher = dagstuhl,
|
||
url = {https://arxiv.org/abs/1602.05681},
|
||
eprint = {1602.05681},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.4230/LIPIcs.ICALP.2016.107},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {146/515=0.28},
|
||
}
|
||
|
||
@inproceedings{BGGHS16,
|
||
title = {Proving Differential Privacy via Probabilistic Couplings},
|
||
author = {Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = lics16,
|
||
pages = {749--758},
|
||
year = 2016,
|
||
url = {https://arxiv.org/abs/1601.05047},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
eprint = {1601.05047},
|
||
doi = {10.1145/2933575.2934554},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/approx-couplings.pdf},
|
||
acceptance = {85/191=0.44}
|
||
}
|
||
|
||
@inproceedings{HMRRV16,
|
||
title = {Do Prices Coordinate Markets?},
|
||
author = {Hsu, Justin and
|
||
Morgenstern, Jamie and
|
||
Rogers, Ryan and
|
||
Roth, Aaron and
|
||
Vohra, Rakesh},
|
||
booktitle = stoc16,
|
||
pages = {440--453},
|
||
year = 2016,
|
||
url = {https://arxiv.org/abs/1511.00925},
|
||
eprint = {1511.00925},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.GT},
|
||
doi = {10.1145/2897518.2897559},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
acceptance = {92/370=0.25},
|
||
}
|
||
|
||
@inproceedings{HHRW16,
|
||
author = {Hsu, Justin and
|
||
Huang, Zhiyi and
|
||
Roth, Aaron and
|
||
Wu, Zhiwei Steven},
|
||
title = {Jointly Private Convex Programming},
|
||
booktitle = soda16,
|
||
pages = {580--599},
|
||
year = {2016},
|
||
url = {https://arxiv.org/abs/1411.0998},
|
||
eprint = {1411.0998},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
doi = {10.1137/1.9781611974331.ch43},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/privdude.pdf},
|
||
acceptance = {146/527=0.28},
|
||
}
|
||
|
||
@inproceedings{BEGHSS15,
|
||
title = {Relational Reasoning via Probabilistic Coupling},
|
||
author = {Barthe, Gilles and
|
||
Espitau, Thomas and
|
||
Gr{\'e}goire, Benjamin and
|
||
Hsu, Justin and
|
||
Stefanesco, L{\'e}o and
|
||
Strub, {Pierre}-{Yves}},
|
||
booktitle = lpar15,
|
||
pages = {387--401},
|
||
volume = {9450},
|
||
series = lncs,
|
||
year = 2015,
|
||
publisher = springer,
|
||
url = {https://arxiv.org/abs/1509.03476},
|
||
eprint = {1509.03476},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.1007/978-3-662-48899-7_27},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/couplings.pdf},
|
||
acceptance = {43/92=0.47},
|
||
}
|
||
|
||
@inproceedings{AHJ15,
|
||
title = {Online Assignment with Heterogeneous Tasks in Crowdsourcing Markets},
|
||
author = {Assadi, Sepehr and Hsu, Justin and Jabbari, Shahin},
|
||
booktitle = hcomp15,
|
||
pages = {12--21},
|
||
year = {2015},
|
||
url = {https://arxiv.org/abs/1508.03593},
|
||
eprint = {1508.03593},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
}
|
||
|
||
@inproceedings{GHaccuracy,
|
||
author = {Marco Gaboardi and
|
||
Justin Hsu},
|
||
title = {A {Theory AB} Toolbox},
|
||
year = {2015},
|
||
booktitle = snapl15,
|
||
pages = {129--139},
|
||
volume = {32},
|
||
series = lipics,
|
||
publisher = dagstuhl,
|
||
url = {https://justinhsu.net/files/papers/theory-ab.pdf},
|
||
doi = {10.4230/LIPIcs.SNAPL.2015.129},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/theory-ab.pdf},
|
||
}
|
||
|
||
@inproceedings{BGGHRS15,
|
||
title = {Higher-Order Approximate Relational Refinement Types for
|
||
Mechanism Design and Differential Privacy},
|
||
author = {Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Hsu, Justin and
|
||
Roth, Aaron and
|
||
Strub, Pierre-Yves},
|
||
booktitle = popl15,
|
||
pages = {55--68},
|
||
year = {2015},
|
||
url = {https://arxiv.org/abs/1407.6845},
|
||
eprint = {1407.6845},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.PL},
|
||
doi = {10.1145/2676726.2677000},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/hoare2.pdf},
|
||
acceptance = {52/227=0.23},
|
||
}
|
||
|
||
@inproceedings{AGGH14,
|
||
author = {Azevedo de Amorim, Arthur and
|
||
Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Hsu, Justin},
|
||
title = {Really Natural Linear Indexed Type-Checking},
|
||
booktitle = {Symposium on Implementation and Application of Functional
|
||
Programming Languages (IFL), Boston, Massachusetts},
|
||
pages = {5:1--5:12},
|
||
year = {2014},
|
||
publisher = acmpress,
|
||
url = {https://arxiv.org/abs/1503.04522},
|
||
eprint = {1503.04522},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.1145/2746325.2746335},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/dfuzz-tc.pdf},
|
||
}
|
||
|
||
@inproceedings{BGGHKS14,
|
||
author = {Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Hsu, Justin and
|
||
Kunz, C\'esar and
|
||
Strub, Pierre-Yves},
|
||
title = {Proving Differential Privacy in {Hoare} Logic},
|
||
booktitle = csf14,
|
||
pages = {411--424},
|
||
year = {2014},
|
||
url = {https://arxiv.org/abs/1407.2988},
|
||
eprint = {1407.2988},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.LO},
|
||
doi = {10.1109/CSF.2014.36},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {29/83=0.35},
|
||
}
|
||
|
||
@inproceedings{HGH14,
|
||
author = {Hsu, Justin and
|
||
Gaboardi, Marco and
|
||
Haeberlen, Andreas and
|
||
Khanna, Sanjeev and
|
||
Narayan, Arjun and
|
||
Pierce, Benjamin C. and
|
||
Roth, Aaron},
|
||
title = {Differential Privacy: {An} Economic Method for Choosing Epsilon},
|
||
booktitle = csf14,
|
||
pages = {398--410},
|
||
year = 2014,
|
||
url = {https://arxiv.org/abs/1402.3329},
|
||
eprint = {1402.3329},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DB},
|
||
doi = {10.1109/CSF.2014.35},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/epsilon.pdf},
|
||
acceptance = {29/83=0.35},
|
||
}
|
||
|
||
@inproceedings{HRRU14,
|
||
author = {Hsu, Justin and
|
||
Roth, Aaron and
|
||
Roughgarden, Tim and
|
||
Ullman, Jonathan},
|
||
title = {Privately Solving Linear Programs},
|
||
booktitle = icalp14,
|
||
pages = {612--624},
|
||
volume = 8572,
|
||
series = lncs,
|
||
year = {2014},
|
||
publisher = springer,
|
||
url = {https://arxiv.org/abs/1402.3631},
|
||
eprint = {1402.3631},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
doi = {10.1007/978-3-662-43948-7_51},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/priv-lp.pdf},
|
||
acceptance = {136/477=0.29},
|
||
}
|
||
|
||
inproceedings{GGHRW14,
|
||
author = {Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Hsu, Justin and
|
||
Roth, Aaron and
|
||
Wu, Zhiwei Steven},
|
||
title = {Dual Query: Practical Private Query Release for High Dimensional Data},
|
||
booktitle = icml14,
|
||
pages = {1170--1178},
|
||
volume = {32},
|
||
series = pmlr,
|
||
year = {2014},
|
||
reviewed = yes,
|
||
url = {https://arxiv.org/abs/1402.1526},
|
||
eprint = {1402.1526},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
slides = {https://justinhsu.net/files/slides/dualquery.pdf},
|
||
poster = {https://justinhsu.net/files/poser/dualquery.pdf},
|
||
acceptance = {310/1238=0.25},
|
||
}
|
||
|
||
inproceedings{HHRRW14,
|
||
author = {Hsu, Justin and
|
||
Huang, Zhiyi and
|
||
Roth, Aaron and
|
||
Roughgarden, Tim and
|
||
Wu, Zhiwei Steven},
|
||
title = {Private Matchings and Allocations},
|
||
booktitle = stoc14,
|
||
year = {2014},
|
||
reviewed = yes,
|
||
pages = {21--30},
|
||
url = {https://arxiv.org/abs/1311.2828},
|
||
eprint = {1311.2828},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.GT},
|
||
doi = {10.1145/2591796.2591826},
|
||
timestamp = {Wed, 22 Oct 2014 14:44:14 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/stoc/HsuHRRW14},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
poster = {https://justinhsu.net/files/poster/matchings.pdf},
|
||
acceptance = {91/319=0.29},
|
||
}
|
||
|
||
@inproceedings{WHE13,
|
||
title = {System {FC} with Explicit Kind Equality},
|
||
author = {Weirich, Stephanie and
|
||
Hsu, Justin and
|
||
Eisenberg, Richard A.},
|
||
booktitle = icfp13,
|
||
pages = {275--286},
|
||
year = {2013},
|
||
url = {https://justinhsu.net/files/papers/nokinds.pdf},
|
||
doi = {10.1145/2500365.2500599},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {40/133=0.30},
|
||
}
|
||
|
||
@inproceedings{HRU13,
|
||
title = {Differential Privacy for the Analyst via Private Equilibrium Computation},
|
||
author = {Hsu, Justin and
|
||
Roth, Aaron and
|
||
Ullman, Jonathan},
|
||
booktitle = stoc13,
|
||
pages = {341--350},
|
||
year = {2013},
|
||
url = {https://arxiv.org/abs/1211.0877},
|
||
eprint = {1211.0877},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
doi = {10.1145/2488608.2488651},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/analyst-priv.pdf},
|
||
acceptance = {100/360=0.28},
|
||
}
|
||
|
||
@inproceedings{GHHNP13,
|
||
title = {Linear Dependent Types for Differential Privacy},
|
||
author = {Gaboardi, Marco and
|
||
Haeberlen, Andreas and
|
||
Hsu, Justin and
|
||
Narayan, Arjun and
|
||
Pierce, Benjamin C.},
|
||
booktitle = popl13,
|
||
pages = {357--370},
|
||
url = {https://dl.acm.org/citation.cfm?id=2429113},
|
||
doi = {10.1145/2429069.2429113},
|
||
year = {2013},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = yes,
|
||
acceptance = {51/220=0.23},
|
||
}
|
||
|
||
@inproceedings{HKR12,
|
||
title = {Distributed Private Heavy Hitters},
|
||
author = {Hsu, Justin and
|
||
Khanna, Sanjeev and
|
||
Roth, Aaron},
|
||
booktitle = icalp12,
|
||
pages = {461--472},
|
||
volume = {7391},
|
||
series = lncs,
|
||
year = {2012},
|
||
publisher = springer,
|
||
url = {https://arxiv.org/abs/1202.4910},
|
||
eprint = {1202.4910},
|
||
archivePrefix = {arXiv},
|
||
primaryClass = {cs.DS},
|
||
doi = {10.1007/978-3-642-31594-7_39},
|
||
errata = {Thanks to Raef Bassily and Adam Smith for spotting an error, now fixed.},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = yes,
|
||
slides = {https://justinhsu.net/files/slides/heavy-hh.pdf},
|
||
acceptance = {123/433=0.28},
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SURVEYS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@misc{plp-blog-ct,
|
||
title = {Teaching Category Theory to Computer Scientists},
|
||
author = {Hsu, Justin},
|
||
url = {https://blog.sigplan.org/2023/04/04/teaching-category-theory-to-computer-scientists/},
|
||
howpublished = {{SIGPLAN} {PL} {P}erspectives},
|
||
year = 2023,
|
||
month = apr,
|
||
jh=yes,
|
||
jhsite = yes,
|
||
reviewed=no,
|
||
note = {https://blog.sigplan.org/2023/04/04/teaching-category-theory-to-computer-scientists/},
|
||
}
|
||
|
||
@misc{plp-blog-plmw,
|
||
title = {Programming Languages Mentoring Workshop: Ten Years Later},
|
||
author = {Balzer, Stephanie and
|
||
Fisher, Kathleen and
|
||
Garcia, Ron and
|
||
Hsu, Justin and
|
||
Weirich, Stephanie},
|
||
url = {https://blog.sigplan.org/2021/05/11/programming-languages-mentoring-workshop-ten-years-later/},
|
||
howpublished = {{SIGPLAN} {PL} {P}erspectives},
|
||
year = 2021,
|
||
month = may,
|
||
jh=yes,
|
||
jhsite = yes,
|
||
reviewed=no,
|
||
note = {https://blog.sigplan.org/2021/05/11/programming-languages-mentoring-workshop-ten-years-later/},
|
||
}
|
||
|
||
@misc{plp-blog-course,
|
||
title = {Re-Imagining the ``Programming Paradigms'' Course},
|
||
author = {Hsu, Justin},
|
||
url = {https://blog.sigplan.org/2021/01/28/re-imagining-the-programming-paradigms-course/},
|
||
howpublished = {{SIGPLAN} {PL} {P}erspectives},
|
||
year = 2021,
|
||
month = jan,
|
||
jh=yes,
|
||
jhsite = yes,
|
||
reviewed=no,
|
||
note = {https://blog.sigplan.org/2021/01/28/re-imagining-the-programming-paradigms-course/},
|
||
}
|
||
|
||
@misc{plp-blog-randomized,
|
||
title = {Verifying Randomized Algorithms: Why and How?},
|
||
author = {Hsu, Justin},
|
||
url = {https://blog.sigplan.org/2020/10/20/verifying-randomized-algorithms-why-and-how/},
|
||
howpublished = {{SIGPLAN} {PL} {P}erspectives},
|
||
year = 2020,
|
||
month = oct,
|
||
jh=yes,
|
||
jhsite = yes,
|
||
reviewed=no,
|
||
note = {https://blog.sigplan.org/2020/10/20/verifying-randomized-algorithms-why-and-how/},
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SURVEYS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@inbook{fopps-chapter,
|
||
titLe = {Probabilistic Couplings from Program Logics},
|
||
booktitle = {Foundations of Probabilistic Programming Languages},
|
||
author = {Barthe, Gilles and
|
||
Hsu, Justin},
|
||
editor = {Barthe, Gilles and
|
||
Katoen, Joost-Pieter and
|
||
Silva, Alexandra},
|
||
pages = {145--184},
|
||
DOI = {10.1017/9781108770750.006},
|
||
url = {https://www.cambridge.org/core/books/foundations-of-probabilistic-programming/probabilistic-couplings-from-program-logics/4770E67B4DBCAABA74D06C30B802235A},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
reviewed = no,
|
||
survey = yes,
|
||
publisher = cup,
|
||
year = 2020,
|
||
}
|
||
|
||
@article{Murawski:2016:2893582,
|
||
titLe = {Programming Language Techniques for Differential Privacy},
|
||
author = {Barthe, Gilles and
|
||
Gaboardi, Marco and
|
||
Hsu, Justin and
|
||
Pierce, Benjamin C.},
|
||
pages = {34--53},
|
||
journal = {ACM SIGLOG News},
|
||
month = jan,
|
||
year = {2016},
|
||
volume = {3},
|
||
number = {1},
|
||
url = {https://siglog.hosting.acm.org/wp-content/uploads/2016/01/siglog\_news\_7.pdf},
|
||
doi = {10.1145/2893582.2893591},
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = no,
|
||
survey = yes,
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WORKSHOPS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@inproceedings{GGHHP13,
|
||
title = {Automatic Sensitivity Analysis using Linear Dependent Types},
|
||
author = {Gaboardi, Marco and
|
||
Gallego Arias, Emilio Jes{\'u}s and
|
||
Haeberlen, Andreas and
|
||
Hsu, Justin and
|
||
Pierce, Benjamin C.},
|
||
booktitle = fopara,
|
||
year = {2013},
|
||
plclub = yes,
|
||
reviewed = no,
|
||
}
|
||
|
||
@inproceedings{HsuTaxes,
|
||
author = {Justin Hsu},
|
||
title = {Death, Taxes, and Formal Verification (Abstract)},
|
||
year = {2015},
|
||
booktitle = snapl15,
|
||
jh = yes,
|
||
jhsite = yes,
|
||
plclub = yes,
|
||
reviewed = no,
|
||
slides = {https://justinhsu.net/files/slides/taxes.pdf},
|
||
url = {https://justinhsu.net/files/papers/taxes.pdf}
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% TALKS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
@talk{njpls23-talk,
|
||
title = {Cutting the Cake: A Language for Fair Division},
|
||
organization = {New Jersey Programming Languages and Systems Seminar ({NJPLS})},
|
||
year = 2023,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{neu23-talk,
|
||
title = {Separation Logics for Probabilistic Programs},
|
||
organization = {{PRL} Seminar, Northeastern University},
|
||
year = 2023,
|
||
month = apr,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{harvard23-talk,
|
||
title = {Separation Logics for Probabilistic Programs},
|
||
organization = {Harvard {PL} Seminar},
|
||
year = 2023,
|
||
month = apr,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{nus22-talk,
|
||
title = {Data-Driven Invariant Learning for Probabilistic Programs},
|
||
organization = {{PLSE} Seminar, {NUS}},
|
||
year = 2022,
|
||
month = sep,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{aws22-talk,
|
||
title = {Composition, Verification, and Differential Privacy},
|
||
organization = {Privacy Engineering Team, Amazon Web Services},
|
||
year = 2022,
|
||
month = sep,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{popl21-talk,
|
||
title = {A Pre-Expectation Calculus for Probabilistic Sensitivity},
|
||
organization = pldi22,
|
||
year = 2022,
|
||
month = jun,
|
||
jh = yes,
|
||
note = "Originally appeared in: " # popl21,
|
||
}
|
||
|
||
@talk{pldg22-talk,
|
||
title = {A User's Guide to {BI}},
|
||
organization = {PL Discussion Group, Cornell University},
|
||
year = 2022,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{pldg21-talk,
|
||
title = {How to Read a {PL} Paper (while also doing other things too)},
|
||
organization = {PL Discussion Group Retreat, Cornell University},
|
||
year = 2021,
|
||
month = dec,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{aplas21-talk,
|
||
title = {A Probabilistic Separation Logic},
|
||
organization = aplas21,
|
||
year = 2021,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{ll21-talk,
|
||
title = {{PL} and Verification for Randomized Algorithms},
|
||
organization = {Lunch and Learn Seminar, Cornell University},
|
||
year = 2021,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{ini21-talk,
|
||
title = {Data-Driven Invariant Learning for Probabilistic Programs},
|
||
organization = {Verified Software: From Theory to Practice {(VSOW03)}, Isaac
|
||
Newton Institute for Mathematical Sciences},
|
||
year = 2021,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{utopia21-talk,
|
||
title = {Data-Driven Invariant Learning for Probabilistic Programs},
|
||
organization = {{UToPIA} Seminar, UT Austin},
|
||
year = 2021,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{pihoc21-talk,
|
||
title = {A Bunched Logic for Conditional Independence},
|
||
organization = {Joint {PPS}--{PIHOC}--{DIAPASoN} Workshop},
|
||
year = 2021,
|
||
month = feb,
|
||
jh = yes,
|
||
note = {Cancelled due to medical reasons.},
|
||
}
|
||
|
||
@talk{cornell20-talk,
|
||
title = {Formally Verifying Randomized Algorithms},
|
||
organization = {Fall 2020 CS Colloquium, Cornell University},
|
||
year = 2020,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{popv20-talk,
|
||
title = {A Probabilistic Separation Logic},
|
||
organization = {Principles of Programming and Verification Seminar, Boston University},
|
||
year = 2020,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cmcs-talk,
|
||
title = {Tutorial on Probabilistic Couplings},
|
||
organization = {Coalgebraic Methods in Computer Science (CMCS), co-located
|
||
with ETAPS 2020 in Dublin, Ireland},
|
||
year = 2020,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cmu20-talk,
|
||
title = {A Probabilistic Separation Logic},
|
||
organization = {Principles of Programming Seminar, Carnegie Mellon University},
|
||
year = 2020,
|
||
month = sep,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{penn20-talk,
|
||
title = {A Probabilistic Separation Logic},
|
||
organization = {PL Club, University of Pennsylvania},
|
||
year = 2020,
|
||
month = sep,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{owls-talk,
|
||
title = {A Probabilistic Separation Logic},
|
||
organization = {Online Worldwide Seminar on Logic and Semantics, Young Researcher {(OWLS-YR)}},
|
||
year = 2020,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{popl-tutorial-talk,
|
||
title = {Verifying Probabilistic Properties with Couplings},
|
||
organization = "Tutorial at " # popl20,
|
||
year = 2020,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{google-fl-talk,
|
||
title = {Data Poisoning against Differentially-Private Learners: Attacks and Defenses},
|
||
organization = {Google Workshop on Federated Learning and Analytics},
|
||
year = 2019,
|
||
month = jun,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{barbados19-talk,
|
||
title = {Verifying Probabilistic Properties with Couplings},
|
||
organization = {Barbados Workshop on Logical Foundations for Data Science, Bellairs Research Institute},
|
||
year = 2019,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{ucsc-pig-talk,
|
||
title = {Differentially-Private Optimal Power Flow},
|
||
organization = {UCSC Privacy in Graphs Workshop},
|
||
year = 2018,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{tpdp18-talk,
|
||
title = {Composition, Verification, and Differential Privacy (Keynote)},
|
||
organization = tpdp18,
|
||
year = 2018,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{epfl18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Programming Languages and Verification Workshop, \'{E}cole Polytechnique F\'{e}d\'{e}rale de Lausanne},
|
||
year = 2018,
|
||
month = jun,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{esop18-talk,
|
||
title = {An Assertion-Based Program Logic for Probabilistic Programs},
|
||
organization = esop18,
|
||
year = 2018,
|
||
month = apr,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{barbados18-talk,
|
||
title = {Almost Sure Productivity},
|
||
organization = {Barbados Workshop on Logical Foundations for Data Science, Bellairs Research Institute},
|
||
year = 2018,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cornell-pldg18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {PL Discussion Group, Cornell University},
|
||
year = 2018,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{ucl-pplv18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {{PPLV} Seminar, University College London},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{aachen18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {{UnRAVeL} Seminar, {RWTH} Aachen University},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{imperial18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Philippa Gardner's Seminar, Imperial College London},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{chocola18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {{CHoCoLa} Seminar, {ENS} Lyon},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{turing18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Logic Seminar, Alan Turing Institute},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{strathclyde18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {{MSP} Seminar, University of Strathclyde},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{edinburgh18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {{LFCS} Seminar, University of Edinburgh},
|
||
year = 2018,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{prosecco18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Prosecco Seminar, Inria Paris},
|
||
year = 2018,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{pps18-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {{PPS} Seminar, {IRIF}},
|
||
year = 2018,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{popl18-talk,
|
||
title = {Proving Expected Sensitivity of Probabilistic Programs},
|
||
organization = popl18,
|
||
year = 2018,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{oxford17-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Verification Seminar, Oxford University},
|
||
year = 2017,
|
||
month = dec,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{kent17-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Programming Languages and Systems Seminar, University of Kent},
|
||
year = 2017,
|
||
month = dec,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{msrc17-talk,
|
||
title = {From Probabilistic Coupling to Relational Program Logics},
|
||
organization = {Microsoft Research Cambridge},
|
||
year = 2017,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{icalp17-talk,
|
||
title = {$\star$-Liftings for Differential Privacy},
|
||
organization = icalp17,
|
||
year = 2017,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{lpar17-talk,
|
||
title = {Proving Uniformity and Independence by Self-Composition and Coupling},
|
||
organization = lpar17,
|
||
year = 2017,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{nw17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Northwestern University},
|
||
year = 2017,
|
||
month = apr,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{mit17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Massachusetts Institute of Technology},
|
||
year = 2017,
|
||
month = apr,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cmu17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Carnegie Mellon University},
|
||
year = 2017,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{dagstuhl17-talk,
|
||
title = {Differential Privacy and Incentive Properties},
|
||
organization = {Dagstuhl Seminar: Game Theory in {AI}, Logic, and Algorithms},
|
||
year = 2017,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{mpi17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Max Planck Institute for Software Systems},
|
||
year = 2017,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{eth17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {{ETH} Z\"urich},
|
||
year = 2017,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{yale17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Yale University},
|
||
year = 2017,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{nyu17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Courant Institute, New York University},
|
||
year = 2017,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{wisc17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {University of Wisconsin--Madison},
|
||
year = 2017,
|
||
month = feb,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{ist17-talk,
|
||
title = {Randomized Algorithms Meet Formal Verification},
|
||
organization = {Institute of Science and Technology Austria},
|
||
year = 2017,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{wine16-talk,
|
||
title = {Computer-Aided Verification in Mechanism Design},
|
||
organization = wine16,
|
||
year = 2016,
|
||
month = dec,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cornell16-talk,
|
||
title = {Approximate Probabilistic Coupling and Differential Privacy},
|
||
organization = {Theory Seminar, Cornell University},
|
||
year = 2016,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{ccs16-talk,
|
||
title = {Advanced Probabilistic Couplings for Differential Privacy},
|
||
organization = ccs16,
|
||
year = 2016,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{psu16-talk,
|
||
title = {Differential Privacy as an Approximate Coupling},
|
||
organization = {Theory Seminar, Pennsylvania State University},
|
||
year = 2016,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cmu16-talk,
|
||
title = {Relational Reasoning via Probabilistic Coupling},
|
||
organization = {Principles of Programming Seminar, Carnegie Mellon University},
|
||
year = 2016,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{jhu16-talk,
|
||
title = {Approximate Probabilistic Coupling and Differential Privacy},
|
||
organization = {Theory Seminar, Johns Hopkins University},
|
||
year = 2016,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{msrc16-talk,
|
||
title = {Formal Verification of Randomized Algorithms},
|
||
organization = {Constructive Security Seminar, Microsoft Research Cambridge},
|
||
year = 2016,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{lics16-talk,
|
||
title = {Proving Differential Privacy via Probabilistic Couplings},
|
||
organization = lics16,
|
||
year = 2016,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{tpdp16-talk,
|
||
title = {Differential Privacy Is an Approximate Probabilistic Coupling},
|
||
organization = {Workshop on the Theory and Practice of Differential Privacy ({TPDP})},
|
||
year = 2016,
|
||
month = jun,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{crcs16-talk,
|
||
title = {Differential Privacy is an Approximate Probabilistic Coupling},
|
||
organization = {{CRCS} Seminar, Harvard},
|
||
year = 2016,
|
||
month = jun,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{njpls16-talk,
|
||
title = {A Program Logic for Union Bounds},
|
||
organization = {NJ Programming Languages and Systems Seminar ({NJPLS})},
|
||
year = 2016,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{uwisc16-talk,
|
||
title = {Relational Reasoning via Probabilistic Coupling},
|
||
organization = {{PL} Seminar, University of Wisconsin},
|
||
year = 2016,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{soda16-talk,
|
||
title = {Jointly Private Convex Programming},
|
||
organization = soda16,
|
||
year = 2016,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{lpar15-talk,
|
||
title = {Relational Reasoning via Probabilistic Coupling},
|
||
organization = lpar15,
|
||
year = 2015,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{nsf-sfm15-talk,
|
||
title = {What Are We Measuring, Anyways?},
|
||
organization = {{NSF} Workshop on Formal Methods for Information Security},
|
||
year = 2015,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{tau15-talk,
|
||
title = {Language-Based Verification for Differential Privacy},
|
||
organization = {Tel Aviv University},
|
||
year = 2015,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{shonan15-talk,
|
||
title = {Language-Based Verification for Differential Privacy},
|
||
organization = {Shonan Meeting on Logic and Verification Methods in Security and Privacy},
|
||
year = 2015,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{tohoku15-talk,
|
||
title = {Relational Reasoning via Probabilistic Coupling},
|
||
organization = {Tohoku University},
|
||
year = 2015,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{tit15-talk,
|
||
title = {Jointly Private Convex Programming},
|
||
organization = {Tokyo Institute of Technology},
|
||
year = 2015,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{snapl15b-talk,
|
||
title = {Death, Taxes, and Formal Verification},
|
||
organization = snapl15,
|
||
year = 2015,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{snapl15a-talk,
|
||
title = {A {Theory AB} Toolbox},
|
||
organization = snapl15,
|
||
year = 2015,
|
||
month = may,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{cornell15-talk,
|
||
title = {Verifying Accuracy of Randomized Algorithms},
|
||
organization = {PL Discussion Group, Cornell University},
|
||
year = 2015,
|
||
month = mar,
|
||
jh = yes,
|
||
}
|
||
|
||
|
||
@talk{popl15-talk,
|
||
title = {Higher-Order Relational Refinement Types for Mechanism Design and Differential Privacy},
|
||
organization = popl15,
|
||
year = 2015,
|
||
month = jan,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{lix14-talk,
|
||
title = {Jointly Private Convex Programming},
|
||
organization = {Com\`ete-Parsifal Seminar, {LIX}, \'Ecole Polytechnique},
|
||
year = 2014,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{dundee14-talk,
|
||
title = {Jointly Private Convex Programming},
|
||
organization = {University of Dundee},
|
||
year = 2014,
|
||
month = nov,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{csf14-talk,
|
||
title = {Differential Privacy: {An} Economic Method for Choosing Epsilon},
|
||
organization = csf14,
|
||
year = 2014,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{icalp14-talk,
|
||
title = {Privately Solving Linear Programs},
|
||
organization = icalp14,
|
||
year = 2014,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{simons13-talk,
|
||
title = {Dual Query Release},
|
||
organization = {Simons workshop on Big Data and Differential Privacy},
|
||
year = 2013,
|
||
month = dec,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{lix13-talk,
|
||
title = {Private Matchings and Allocations},
|
||
organization = {Com\`ete-Parsifal Seminar, {LIX}, \'Ecole Polytechnique},
|
||
year = 2013,
|
||
month = dec,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{stoc13-talk,
|
||
title = {Private Equilibrium Computation for Analyst Privacy},
|
||
organization = stoc13,
|
||
year = 2013,
|
||
month = jun,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{dimacs12-talk,
|
||
title = {Analyst Privacy---the State Strikes Back!},
|
||
organization = {{DIMACS} Workshop on Recent Work on Differential Privacy across Computer Science},
|
||
year = 2012,
|
||
month = oct,
|
||
jh = yes,
|
||
}
|
||
|
||
@talk{icalp12-talk,
|
||
title = {Distributed Private Heavy Hitters},
|
||
organization = icalp12,
|
||
year = 2012,
|
||
month = jul,
|
||
jh = yes,
|
||
}
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% OTHER %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
@article{job-matching,
|
||
title = {Job Matching, Coalition Formation, and Gross Substitutes},
|
||
volume = {50},
|
||
number = {6},
|
||
urldate = {2013--07--07},
|
||
journal = {Econometrica},
|
||
author = {Kelso, Alexander and Crawford, Vincent},
|
||
year = {1982},
|
||
pages = {1483--1504},
|
||
url = {https://EconPapers.repec.org/RePEc:ecm:emetrp:v:50:y:1982:i:6:p:1483-1504}
|
||
}
|
||
@article{CSS10,
|
||
title = {Private and continual release of statistics},
|
||
volume = {14},
|
||
url = {https://eprint.iacr.org/2010/076.pdf},
|
||
number = {3},
|
||
urldate = {2013--06--23},
|
||
journal = tissec,
|
||
author = {Chan, T.-H. Hubert and Shi, Elaine and Song, Dawn},
|
||
year = {2011},
|
||
pages = {26},
|
||
}
|
||
|
||
@inproceedings{DNPR10,
|
||
title = {Differential privacy under continual observation},
|
||
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N.},
|
||
url = {https://www.mit.edu/~rothblum/papers/continalobs.pdf},
|
||
booktitle = stoc10,
|
||
pages = {715--724},
|
||
year = {2010},
|
||
}
|
||
|
||
@inproceedings{DNV12,
|
||
title = {The privacy of the analyst and the power of the state},
|
||
author = {Dwork, Cynthia and Naor, Moni and Vadhan, Salil},
|
||
booktitle = focs12,
|
||
pages = {400--409},
|
||
url = {https://projects.iq.harvard.edu/files/privacytools/files/06375318.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@article{PR13,
|
||
title = {Privacy and Mechanism Design},
|
||
author = {Pai, Mallesh and Roth, Aaron},
|
||
url = {https://arxiv.org/abs/1306.2083},
|
||
journal = sigecom,
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{NRS07,
|
||
title = {Smooth sensitivity and sampling in private data analysis},
|
||
url = {https://www.cse.psu.edu/~asmith/pubs/NRS07/NRS07-full-draft-v1.pdf},
|
||
author = {Nissim, Kobbi and Raskhodnikova, Sofya and Smith, Adam},
|
||
booktitle = stoc07,
|
||
pages = {75--84},
|
||
year = {2007},
|
||
}
|
||
|
||
@inproceedings{RR14,
|
||
title = {Asymptotically truthful equilibrium selection in large congestion games},
|
||
author = {Rogers, Ryan and Roth, Aaron},
|
||
booktitle = ec14,
|
||
pages = {771--782},
|
||
year = {2014},
|
||
url = {https://arxiv.org/abs/1311.2625}
|
||
}
|
||
|
||
@inproceedings{GLMRT10,
|
||
title = {Differentially private combinatorial optimization},
|
||
url = {https://arxiv.org/abs/0903.4510},
|
||
author = {Gupta, Anupam and Ligett, Katrina and {McSherry}, Frank and Roth,
|
||
Aaron and Talwar, Kunal},
|
||
booktitle = soda10,
|
||
pages = {1106--1125},
|
||
year = {2010},
|
||
}
|
||
|
||
@article{GS99,
|
||
title = {Walrasian equilibrium with gross substitutes},
|
||
author = {Gul, Faruk and Stacchetti, Ennio},
|
||
url = {https://www.princeton.edu/~fgul/walras.pdf},
|
||
journal = jet,
|
||
volume = {87},
|
||
number = {1},
|
||
pages = {95--124},
|
||
year = {1999},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{BLR08,
|
||
title = {A learning theory approach to noninteractive database privacy},
|
||
author = {Blum, Avrim and Ligett, Katrina and Roth, Aaron},
|
||
journal = jacm,
|
||
url = {https://arxiv.org/abs/1109.2229},
|
||
volume = {60},
|
||
number = {2},
|
||
pages = {12},
|
||
year = {2013},
|
||
}
|
||
|
||
@inproceedings{HR10,
|
||
title = {A multiplicative weights mechanism for privacy-preserving data analysis},
|
||
author = {Hardt, Moritz and Rothblum, Guy N},
|
||
url = {https://www.mit.edu/~rothblum/papers/pmw.pdf},
|
||
booktitle = focs10,
|
||
pages = {61--70},
|
||
year = {2010},
|
||
}
|
||
|
||
@inproceedings{DN03,
|
||
title = {Revealing information while preserving privacy},
|
||
author = {Dinur, Irit and Nissim, Kobbi},
|
||
url = {https://www.cse.psu.edu/~asmith/privacy598/papers/dn03.pdf},
|
||
booktitle = pods03,
|
||
pages = {202--210},
|
||
year = {2003},
|
||
}
|
||
|
||
@article{DR14,
|
||
author = {Cynthia Dwork and
|
||
Aaron Roth},
|
||
title = {The Algorithmic Foundations of Differential Privacy},
|
||
journal = {Foundations and Trends in Theoretical Computer Science},
|
||
year = {2014},
|
||
volume = {9},
|
||
number = {3--4},
|
||
pages = {211--407},
|
||
doi = {10.1561/0400000042},
|
||
url = {https://dx.doi.org/10.1561/0400000042},
|
||
timestamp = {Tue, 28 Oct 2014 14:00:24 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/fttcs/DworkR14},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
@inproceedings{KPRU14,
|
||
title = {Mechanism Design in Large Games: Incentives and Privacy},
|
||
url = {https://arxiv.org/abs/1207.4084},
|
||
author = {Kearns, Michael and Pai, Mallesh and Roth, Aaron and Ullman, Jonathan},
|
||
pages = {403--410},
|
||
booktitle = itcs14,
|
||
year = {2014}
|
||
}
|
||
|
||
@inproceedings{DRV10,
|
||
title = {Boosting and Differential Privacy},
|
||
url = {https://research.microsoft.com/pubs/155170/dworkrv10.pdf},
|
||
booktitle = focs10,
|
||
author = {Dwork, Cynthia and Rothblum, Guy N. and Vadhan, Salil},
|
||
year = {2010},
|
||
doi = {10.1109/FOCS.2010.12},
|
||
keywords = {Algorithms, {CS}, {DP}, Learning Theory},
|
||
pages = {51--60},
|
||
}
|
||
|
||
@inproceedings{FPT04,
|
||
title = {The complexity of pure Nash equilibria},
|
||
author = {Fabrikant, Alex and Papadimitriou, Christos and Talwar, Kunal},
|
||
url = {https://research.microsoft.com/pubs/74349/pub10-pure.pdf},
|
||
booktitle = stoc04,
|
||
pages = {604--612},
|
||
year = {2004},
|
||
}
|
||
|
||
@article{MS96,
|
||
title = {Potential games},
|
||
author = {Monderer, Dov and Shapley, Lloyd S.},
|
||
journal = geb,
|
||
url = {https://www.cs.bu.edu/~steng/teaching/Fall2008/potential.pdf},
|
||
volume = {14},
|
||
number = {1},
|
||
pages = {124--143},
|
||
year = {1996},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@inproceedings{CK05,
|
||
title = {The price of anarchy of finite congestion games},
|
||
author = {Christodoulou, George and Koutsoupias, Elias},
|
||
url = {https://dl.acm.org/citation.cfm?id=1060600},
|
||
booktitle = stoc05,
|
||
pages = {67--73},
|
||
year = {2005},
|
||
}
|
||
|
||
@inproceedings{AAE05,
|
||
title = {The price of routing unsplittable flow},
|
||
author = {Awerbuch, Baruch and Azar, Yossi and Epstein, Amir},
|
||
booktitle = stoc05,
|
||
url = {https://dl.acm.org/citation.cfm?id=1060599},
|
||
pages = {57--66},
|
||
year = {2005},
|
||
}
|
||
|
||
@inproceedings{Rou09,
|
||
title = {Intrinsic robustness of the price of anarchy},
|
||
author = {Roughgarden, Tim},
|
||
url = {https://theory.stanford.edu/~tim/papers/robust.pdf},
|
||
booktitle = stoc09,
|
||
pages = {513--522},
|
||
year = {2009},
|
||
}
|
||
|
||
@inproceedings{BHLR08,
|
||
title = {Regret minimization and the price of total anarchy},
|
||
author = {Blum, Avrim and {HajiAghayi}, {MohammadTaghi} and Ligett, Katrina
|
||
and Roth, Aaron},
|
||
url = {https://dl.acm.org/citation.cfm?id=1374430},
|
||
booktitle = stoc08,
|
||
pages = {373--382},
|
||
year = {2008},
|
||
}
|
||
|
||
@inproceedings{HLM12,
|
||
title = {A Simple and Practical Algorithm for Differentially Private Data Release},
|
||
author = {Moritz Hardt and Katrina Ligett and Frank {McSherry}},
|
||
booktitle = nips12,
|
||
pages = {2348--2356},
|
||
url = {https://arxiv.org/abs/1012.4763},
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{Ullman13,
|
||
title = {Answering $n^{2+ o(1)}$ counting queries with differential
|
||
privacy is hard},
|
||
author = {Ullman, Jonathan},
|
||
booktitle = stoc13,
|
||
pages = {361--370},
|
||
url = {https://arxiv.org/abs/1207.6945},
|
||
year = 2013
|
||
}
|
||
@inproceedings{MT07,
|
||
author = {Frank {McSherry} and
|
||
Kunal Talwar},
|
||
title = {Mechanism Design via Differential Privacy},
|
||
booktitle = focs07,
|
||
pages = {94--103},
|
||
doi = {10.1109/FOCS.2007.66},
|
||
url = {https://doi.ieeecomputersociety.org/10.1109/FOCS.2007.41},
|
||
year = 2007
|
||
}
|
||
|
||
@inproceedings{FS96,
|
||
title = {Game theory, on-line prediction and boosting},
|
||
author = {Freund, Y. and Schapire, R.E.},
|
||
booktitle = colt96,
|
||
pages = {325--332},
|
||
url = {https://dl.acm.org/citation.cfm?id=238163 },
|
||
year = 1996
|
||
}
|
||
|
||
@inproceedings{BDMN05,
|
||
title = {Practical privacy: the {SuLQ} framework},
|
||
author = {Avrim Blum and
|
||
Cynthia Dwork and
|
||
Frank {McSherry} and
|
||
Kobbi Nissim},
|
||
booktitle = pods05,
|
||
pages = {128--138},
|
||
url = {https://research.microsoft.com/pubs/64351/bdmn.pdf},
|
||
year = 2005
|
||
}
|
||
|
||
@inproceedings{GRU12,
|
||
title = {Iterative constructions and private data release},
|
||
author = {Gupta, Anupam and Roth, Aaron and Jonathan Ullman},
|
||
booktitle = tcc12,
|
||
pages = {339--356},
|
||
url = {https://arxiv.org/abs/1107.3731},
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{airavat,
|
||
author = {Indrajit Roy and Srinath Setty and Ann Kilzer and Vitaly
|
||
Shmatikov and Emmett Witchel},
|
||
title = {Airavat: Security and Privacy for {MapReduce}},
|
||
booktitle = nsdi10,
|
||
url = {https://dl.acm.org/citation.cfm?id=1855731 },
|
||
year = 2010
|
||
}
|
||
|
||
@inproceedings{pinq,
|
||
author = {{McSherry}, Frank},
|
||
booktitle = sigmod09,
|
||
title = {Privacy Integrated Queries},
|
||
pages = {19--30},
|
||
url = {https://research.microsoft.com/pubs/80218/sigmod115-mcsherry.pdf},
|
||
doi = {10.1145/1559845.1559850},
|
||
year = 2009
|
||
}
|
||
|
||
@inproceedings{zhang-2011-privatemining,
|
||
author = {Zhang, Ning and Li, Ming and Lou, Wenjing},
|
||
title = {Distributed Data Mining with Differential Privacy},
|
||
booktitle = icc11,
|
||
url = {https://dl.acm.org/citation.cfm?id=1835868},
|
||
year = 2011
|
||
}
|
||
|
||
@inproceedings{evfimievski-2002-associationrules,
|
||
author = {Evfimievski, Alexandre and
|
||
Srikant, Ramakrishnan and
|
||
Agrawal, Rakesh and
|
||
Gehrke, Johannes},
|
||
title = {Privacy preserving mining of association rules},
|
||
booktitle = kdd02,
|
||
url = {https://www.cs.cornell.edu/johannes/papers/2002/kdd2002-privacy.pdf},
|
||
year = 2002
|
||
}
|
||
|
||
@inproceedings{t-closeness,
|
||
author = {Ninghui Li and Tiancheng Li and Suresh Venkatasubramanian},
|
||
title = {$t$-{Closeness}: {Privacy} beyond $k$-anonymity and $l$-diversity},
|
||
booktitle = icde07,
|
||
url = {https://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf},
|
||
year = 2007
|
||
}
|
||
|
||
@article{k-anonymity,
|
||
author = {Sweeney, Latanya},
|
||
title = {$k$-{Anonymity}: {A} model for protecting privacy},
|
||
journal = jufks,
|
||
volume = {10},
|
||
number = {5},
|
||
year = {2002},
|
||
pages = {557--570},
|
||
url = {https://dl.acm.org/citation.cfm?id=774552}
|
||
}
|
||
|
||
@article{aol,
|
||
author = {Michael Barbaro and Tom Zeller},
|
||
title = {A Face Is Exposed for {AOL} Searcher {No.} 4417749},
|
||
journal = {The New York Times},
|
||
day = 9,
|
||
month = aug,
|
||
year = 2006,
|
||
url = {https://www.nytimes.com/2006/08/09/technology/09aol.html}
|
||
}
|
||
|
||
@inproceedings{NV08,
|
||
author = {Arvind Narayanan and
|
||
Vitaly Shmatikov},
|
||
title = {Robust De-anonymization of Large Sparse Datasets},
|
||
booktitle = sp08,
|
||
year = {2008},
|
||
pages = {111--125},
|
||
url = {https://arxiv.org/abs/cs/0610105}
|
||
}
|
||
|
||
@inproceedings{BLST10,
|
||
author = {Raghav Bhaskar and
|
||
Srivatsan Laxman and
|
||
Adam Smith and
|
||
Abhradeep Thakurta},
|
||
title = {Discovering frequent patterns in sensitive data},
|
||
booktitle = kdd10,
|
||
pages = {503--512},
|
||
year = 2010,
|
||
url = {https://dl.acm.org/citation.cfm?id=1835869}
|
||
}
|
||
|
||
@inproceedings{CM08,
|
||
author = {Kamalika Chaudhuri and Claire Monteleoni},
|
||
title = {Privacy-preserving logistic regression},
|
||
booktitle = nips08,
|
||
pages = {289--296},
|
||
year = 2008,
|
||
url = {https://books.nips.cc/papers/files/nips21/NIPS2008_0964.pdf}
|
||
}
|
||
|
||
@inproceedings{CH11,
|
||
title = {Sample Complexity Bounds for Differentially Private Learning},
|
||
author = {Chaudhuri, Kamalika and Hsu, Daniel},
|
||
booktitle = colt11,
|
||
series = pmlr,
|
||
volume = {19},
|
||
pages = {155--186},
|
||
url = {https://jmlr.org/proceedings/papers/v19/chaudhuri11a/chaudhuri11a.pdf},
|
||
year = {2011}
|
||
}
|
||
|
||
@article{BKOZ13-toplas,
|
||
author = {Barthe, Gilles and
|
||
K{\"{o}}pf, Boris and
|
||
Olmedo, Federico and
|
||
Zanella{-}B{\'{e}}guelin, Santiago},
|
||
title = {Probabilistic Relational Reasoning for Differential Privacy},
|
||
journal = toplas,
|
||
volume = {35},
|
||
number = {3},
|
||
pages = {9:1--9:49},
|
||
month = nov,
|
||
year = {2013},
|
||
doi = {10.1145/2492061},
|
||
url = {https://software.imdea.org/~bkoepf/papers/toplas13.pdf},
|
||
}
|
||
|
||
@inproceedings{ReedPierce10,
|
||
author = {Jason Reed and Benjamin C. Pierce},
|
||
title = {Distance Makes the Types Grow Stronger: {A} Calculus for
|
||
Differential Privacy},
|
||
booktitle = icfp10,
|
||
year = 2010,
|
||
pages = {157--168},
|
||
doi = {10.1145/1863543.1863568},
|
||
url = {https://dl.acm.org/citation.cfm?id=1863568}
|
||
}
|
||
|
||
@inproceedings{winq,
|
||
title = {A workflow for differentially-private graph synthesis},
|
||
author = {Proserpio, Davide and Goldberg, Sharon and {McSherry}, Frank},
|
||
booktitle = wosn12,
|
||
year = 2012,
|
||
pages = {13--18},
|
||
url = {https://arxiv.org/abs/1203.3453}
|
||
}
|
||
|
||
@article{KLNRS08,
|
||
title = {What can we learn privately?},
|
||
author = {Kasiviswanathan, Shiva Prasad and Lee, Homin K. and Nissim, Kobbi
|
||
and Raskhodnikova, Sofya and Smith, Adam},
|
||
journal = siamjc,
|
||
volume = {40},
|
||
number = {3},
|
||
pages = {793--826},
|
||
year = {2011},
|
||
url = {https://arxiv.org/abs/0803.0924},
|
||
}
|
||
|
||
@inproceedings{UV11,
|
||
title = {{PCPs} and the hardness of generating private synthetic data},
|
||
author = {Ullman, Jonathan and Vadhan, Salil},
|
||
booktitle = tcc11,
|
||
pages = {400--416},
|
||
url = {https://eccc.hpi-web.de/report/2010/017/revision/2/download},
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{DNRRV09,
|
||
title = {On the complexity of differentially private data release: efficient
|
||
algorithms and hardness results},
|
||
author = {Cynthia Dwork and
|
||
Moni Naor and
|
||
Omer Reingold and
|
||
Guy N. Rothblum and
|
||
Salil P. Vadhan},
|
||
booktitle = stoc09,
|
||
pages = {381--390},
|
||
year = {2009},
|
||
url = {https://dl.acm.org/citation.cfm?id=1536467}
|
||
}
|
||
|
||
@article{AHK12,
|
||
title = {The Multiplicative Weights Update Method: {A} Meta-Algorithm and
|
||
Applications},
|
||
author = {Arora, Sanjeev and Hazan, Elad and Kale, Satyen},
|
||
journal = toc,
|
||
volume = {8},
|
||
number = {1},
|
||
pages = {121--164},
|
||
url = {https://tocbeta.cs.uchicago.edu/articles/v008a006/v008a006.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@phdthesis{Garg13,
|
||
title = {Candidate Multilinear Maps},
|
||
author = {Sanjam Garg},
|
||
school = {{UCLA}},
|
||
year = {2013},
|
||
url = {https://www.cs.ucla.edu/~sanjamg/Sanjam%20Garg_files/sanjam-thesis.pdf}
|
||
}
|
||
|
||
@inproceedings{GargGentryHalevi13,
|
||
title = {Candidate multilinear maps from ideal lattices},
|
||
author = {Garg, Sanjam and Gentry, Craig and Halevi, Shai},
|
||
booktitle = eucrypt13,
|
||
pages = {1--17},
|
||
year = {2013},
|
||
url = {https://https://eprint.iacr.org/2012/610.pdf}
|
||
}
|
||
|
||
@article{BonehSilverberg03,
|
||
title = {Applications of multilinear forms to cryptography},
|
||
author = {Boneh, Dan and Silverberg, Alice},
|
||
journal = {Contemporary Mathematics},
|
||
volume = {324},
|
||
number = {1},
|
||
pages = {71--90},
|
||
year = {2003},
|
||
publisher = {AMS},
|
||
url = {https://https://eprint.iacr.org/2002/080.pdf}
|
||
}
|
||
|
||
@inproceedings{barak2007privacy,
|
||
title = {Privacy, accuracy, and consistency too: {A} holistic solution to
|
||
contingency table release},
|
||
author = {Barak, Boaz and Chaudhuri, Kamalika and Dwork, Cynthia and Kale,
|
||
Satyen and {McSherry}, Frank and Talwar, Kunal},
|
||
booktitle = pods07,
|
||
pages = {273--282},
|
||
url = {https://research.microsoft.com/en-us/projects/DatabasePrivacy/contingency.pdf},
|
||
year = {2007}
|
||
}
|
||
|
||
@inproceedings{BNS13,
|
||
title = {Characterizing the sample complexity of private learners},
|
||
author = {Beimel, Amos and Nissim, Kobbi and Stemmer, Uri},
|
||
booktitle = itcs13,
|
||
pages = {97--110},
|
||
year = {2013},
|
||
url = {https://dl.acm.org/citation.cfm?id=2422450}
|
||
}
|
||
|
||
@article{CMS11,
|
||
title = {Differentially private empirical risk minimization},
|
||
author = {Chaudhuri, Kamalika and Monteleoni, Claire and Sarwate, Anand D.},
|
||
journal = jmlr,
|
||
volume = {12},
|
||
pages = {1069--1109},
|
||
year = {2011},
|
||
url = {https://jmlr.org/papers/volume12/chaudhuri11a/chaudhuri11a.pdf}
|
||
}
|
||
|
||
@article{RBHT09,
|
||
title = {Learning in a Large Function Space: Privacy-Preserving Mechanisms
|
||
for {SVM} Learning},
|
||
author = {Rubinstein, Benjamin I. P. and Bartlett, Peter L. and Huang, Ling
|
||
and Taft, Nina},
|
||
journal = jpc,
|
||
volume = {4},
|
||
number = {1},
|
||
pages = {4},
|
||
year = {2012},
|
||
url = {https://repository.cmu.edu/cgi/viewcontent.cgi?article=1065&context=jpc}
|
||
}
|
||
|
||
@inproceedings{KST12,
|
||
title = {Private convex empirical risk minimization and high-dimensional regression},
|
||
author = {Kifer, Daniel and Smith, Adam and Thakurta, Abhradeep},
|
||
booktitle = colt12,
|
||
series = pmlr,
|
||
volume = {23},
|
||
pages = {25.1--25.40},
|
||
year = {2012},
|
||
url = {https://jmlr.org/proceedings/papers/v23/kifer12/kifer12.pdf}
|
||
}
|
||
|
||
@inproceedings{CSS12,
|
||
title = {Near-optimal differentially private principal components},
|
||
author = {Chaudhuri, Kamalika and Sarwate, Anand and Sinha, Kaushik},
|
||
booktitle = nips12,
|
||
pages = {998--1006},
|
||
url = {https://books.nips.cc/papers/files/nips25/NIPS2012_0482.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@inproceedings{DJW13,
|
||
title = {Local privacy and statistical minimax rates},
|
||
author = {Duchi, John C and Jordan, Michael I. and Wainwright, Martin J.},
|
||
booktitle = focs13,
|
||
url = {https://www.cs.berkeley.edu/~jduchi/projects/DuchiJoWa13_focs.pdf},
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{TS13,
|
||
title = {(Nearly) Optimal Algorithms for Private Online Learning in
|
||
Full-information and Bandit Settings},
|
||
author = {Thakurta, Abhradeep G. and Smith, Adam},
|
||
booktitle = nips13,
|
||
pages = {2733--2741},
|
||
url = {https://media.nips.cc/nipsbooks/nipspapers/paper_files/nips26/1270.pdf},
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{FS95,
|
||
title = {A desicion-theoretic generalization of on-line learning and an
|
||
application to boosting},
|
||
author = {Freund, Yoav and Schapire, Robert E.},
|
||
booktitle = colt95,
|
||
pages = {23--37},
|
||
year = {1995},
|
||
organization = springer
|
||
}
|
||
|
||
@inproceedings{RR10,
|
||
author = {Aaron Roth and
|
||
Tim Roughgarden},
|
||
title = {Interactive privacy via the median mechanism},
|
||
booktitle = stoc10,
|
||
pages = {765--774},
|
||
url = {https://arxiv.org/abs/0911.1813},
|
||
year = 2010
|
||
}
|
||
|
||
@inproceedings{GHRU11,
|
||
title = {Privately releasing conjunctions and the statistical query barrier},
|
||
author = {Gupta, Anupam and Hardt, Moritz and Roth, Aaron and Ullman, Jonathan},
|
||
booktitle = stoc11,
|
||
pages = {803--812},
|
||
url = {https://arxiv.org/abs/1011.1296},
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{TS13a,
|
||
title = {Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso},
|
||
author = {Thakurta, Abhradeep G. and Smith, Adam},
|
||
booktitle = colt13,
|
||
series = pmlr,
|
||
volume = 30,
|
||
pages = {819--850},
|
||
url = {https://jmlr.org/proceedings/papers/v30/Guha13.pdf},
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{DL09,
|
||
title = {Differential privacy and robust statistics},
|
||
author = {Dwork, Cynthia and Lei, Jing},
|
||
booktitle = stoc09,
|
||
pages = {371--380},
|
||
year = {2009},
|
||
url = {https://research.microsoft.com/pubs/80239/dl09.pdf},
|
||
}
|
||
|
||
@article{LW94,
|
||
title = {The Weighted Majority Algorithm},
|
||
author = {Littlestone, N. and Warmuth, Manfred K.},
|
||
journal = ic,
|
||
volume = {108},
|
||
number = {2},
|
||
pages = {212--261},
|
||
year = {1994},
|
||
publisher = elsevier,
|
||
url = {https://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber = 63487}
|
||
}
|
||
|
||
@article{PST95,
|
||
title = {Fast approximation algorithms for fractional packing and covering
|
||
problems},
|
||
author = {Plotkin, Serge A. and Shmoys, David B. and Tardos, {\'E}va},
|
||
journal = mor,
|
||
volume = {20},
|
||
number = {2},
|
||
pages = {257--301},
|
||
year = {1995},
|
||
publisher = informs,
|
||
}
|
||
|
||
@inproceedings{AK07,
|
||
title = {A combinatorial, primal-dual approach to semidefinite programs},
|
||
author = {Arora, Sanjeev and Kale, Satyen},
|
||
booktitle = stoc07,
|
||
pages = {227--236},
|
||
year = {2007},
|
||
url = {https://dl.acm.org/citation.cfm?id=1250823}
|
||
}
|
||
|
||
@inproceedings{CHRMM10,
|
||
title = {Optimizing linear counting queries under differential privacy},
|
||
author = {Li, Chao and Hay, Michael and Rastogi, Vibhor and Miklau, Gerome
|
||
and {McGregor}, Andrew},
|
||
booktitle = pods10,
|
||
pages = {123--134},
|
||
year = {2010},
|
||
url = {https://arxiv.org/abs/0912.4742}
|
||
}
|
||
|
||
@article{LM12,
|
||
title = {An adaptive mechanism for accurate query answering under differential privacy},
|
||
author = {Li, Chao and Miklau, Gerome},
|
||
journal = pvldb,
|
||
note = vldb12,
|
||
volume = {5},
|
||
number = {6},
|
||
pages = {514--525},
|
||
year = {2012},
|
||
url = {https://arxiv.org/abs/1202.3807}
|
||
}
|
||
|
||
|
||
@inproceedings{CPSY12,
|
||
author = {Grigory Yaroslavtsev and
|
||
Graham Cormode and
|
||
Cecilia M. Procopiuc and
|
||
Divesh Srivastava},
|
||
title = {Accurate and efficient private release of datacubes and
|
||
contingency tables},
|
||
booktitle = icde13,
|
||
year = {2013},
|
||
pages = {745--756},
|
||
url = {https://doi.ieeecomputersociety.org/10.1109/ICDE.2013.6544871}
|
||
}
|
||
|
||
@inproceedings{CV13,
|
||
title = {A Stability-based Validation Procedure for Differentially Private
|
||
Machine Learning},
|
||
author = {Chaudhuri, Kamalika and Vinterbo, Staal A.},
|
||
booktitle = nips13,
|
||
pages = {2652--2660},
|
||
year = {2013},
|
||
url = {https://papers.nips.cc/paper/5014-a-stability-based-validation-procedure-for-differentially-private-machine-learning.pdf}
|
||
}
|
||
|
||
@article{HW01,
|
||
title = {Tracking the best linear predictor},
|
||
author = {Herbster, Mark and Warmuth, Manfred K.},
|
||
journal = jmlr,
|
||
volume = {1},
|
||
pages = {281--309},
|
||
url = {https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.7354&rep=rep1&type=pdf},
|
||
year = {2001}
|
||
}
|
||
|
||
@inproceedings{DworkSurvey,
|
||
title = {Differential privacy: {A} survey of results},
|
||
author = {Dwork, Cynthia},
|
||
booktitle = tamc08,
|
||
pages = {1--19},
|
||
year = {2008},
|
||
url = {https://research.microsoft.com/apps/pubs/default.aspx?id=74339},
|
||
publisher = springer
|
||
}
|
||
|
||
@inproceedings{NS-social,
|
||
title = {De-anonymizing social networks},
|
||
author = {Narayanan, Arvind and Shmatikov, Vitaly},
|
||
booktitle = sp09,
|
||
pages = {173--187},
|
||
url = {https://arxiv.org/abs/0903.3276},
|
||
year = {2009}
|
||
}
|
||
|
||
@inproceedings{DNT14,
|
||
title = {Using Convex Relaxations for Efficiently and Privately Releasing
|
||
Marginals},
|
||
author = {Dwork, Cynthia and Nikolov, Aleksandar and Talwar, Kunal},
|
||
booktitle = socg14,
|
||
pages = {261},
|
||
year = {2014},
|
||
url = {https://arxiv.org/abs/1308.1385}
|
||
}
|
||
|
||
@inproceedings{TUV12,
|
||
title = {Faster algorithms for privately releasing marginals},
|
||
author = {Thaler, Justin and Ullman, Jonathan and Vadhan, Salil},
|
||
booktitle = icalp12,
|
||
pages = {810--821},
|
||
year = {2012},
|
||
url = {https://arxiv.org/abs/1205.1758}
|
||
}
|
||
|
||
@article{GHRU13,
|
||
title = {Privately releasing conjunctions and the statistical query barrier},
|
||
author = {Gupta, Anupam and Hardt, Moritz and Roth, Aaron and Ullman,
|
||
Jonathan},
|
||
journal = siamjc,
|
||
volume = {42},
|
||
number = {4},
|
||
pages = {1494--1520},
|
||
year = {2013},
|
||
url = {https://epubs.siam.org/doi/abs/10.1137/110857714}
|
||
}
|
||
|
||
@inproceedings{DunfieldP04,
|
||
author = {Joshua Dunfield and
|
||
Frank Pfenning},
|
||
title = {Tridirectional typechecking},
|
||
booktitle = popl04,
|
||
pages = {281--292},
|
||
year = 2004,
|
||
url = {https://www.cs.cmu.edu/~joshuad/papers/tridirectional-typechecking/Dunfield04_tridirectional.pdf}
|
||
}
|
||
|
||
|
||
@article{Meyer92,
|
||
title = {Applying ``{Design} by contract''},
|
||
author = {Meyer, Bertrand},
|
||
journal = {Computer},
|
||
volume = {25},
|
||
number = {10},
|
||
pages = {40--51},
|
||
year = {1992},
|
||
publisher = {IEEE},
|
||
url = {https://www-public.int-evry.fr/~gibson/Teaching/CSC7322/ReadingMaterial/Meyer92.pdf}
|
||
}
|
||
|
||
@inproceedings{Vazou+14:ICFP,
|
||
author = {N. Vazou and E. L. Seidel and R. Jhala and D. Vytiniotis and
|
||
S. {Peyton}-{Jones}},
|
||
title = {{Refinement Types for Haskell}},
|
||
booktitle = icfp14,
|
||
year = {2014},
|
||
url = {https://goto.ucsd.edu/~nvazou/refinement_types_for_haskell.pdf}
|
||
}
|
||
|
||
@inproceedings{NR99,
|
||
title = {Algorithmic mechanism design},
|
||
author = {Nisan, Noam and Ronen, Amir},
|
||
booktitle = stoc99,
|
||
pages = {129--140},
|
||
year = {1999},
|
||
url = {https://www.cs.yale.edu/homes/jf/nisan-ronen.pdf}
|
||
}
|
||
|
||
@book{NRTV07,
|
||
title = {Algorithmic game theory},
|
||
author = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V},
|
||
year = {2007},
|
||
publisher = cup
|
||
}
|
||
|
||
@article{BBHM08,
|
||
title = {Reducing mechanism design to algorithm design via machine learning},
|
||
author = {Balcan, {Maria}-{Florina} and Blum, Avrim and Hartline, Jason D and Mansour, Yishay},
|
||
journal = {Journal of Computer and System Sciences},
|
||
volume = {74},
|
||
number = {8},
|
||
pages = {1245--1270},
|
||
year = {2008},
|
||
publisher = elsevier,
|
||
url = {https://www.cs.cmu.edu/~ninamf/papers/ml_md_bbhm.pdf}
|
||
}
|
||
|
||
@inproceedings{DD09,
|
||
title = {On the power of randomization in algorithmic mechanism design},
|
||
author = {Dobzinski, Shahar and Dughmi, Shaddin},
|
||
booktitle = focs09,
|
||
pages = {505--514},
|
||
url = {https://arxiv.org/abs/0904.4193}
|
||
}
|
||
|
||
@article{DugR14,
|
||
title = {Black-box randomized reductions in algorithmic mechanism design},
|
||
author = {Dughmi, Shaddin and Roughgarden, Tim},
|
||
journal = siamjc,
|
||
volume = {43},
|
||
number = {1},
|
||
pages = {312--336},
|
||
year = {2014},
|
||
url = {https://theory.stanford.edu/~tim/papers/blackbox.pdf}
|
||
}
|
||
|
||
@inproceedings{CIL12,
|
||
title = {On the limits of black-box reductions in mechanism design},
|
||
author = {Chawla, Shuchi and Immorlica, Nicole and Lucier, Brendan},
|
||
booktitle = stoc12,
|
||
year = {2012},
|
||
url = {https://arxiv.org/abs/1109.2067}
|
||
}
|
||
|
||
@inproceedings{HL10,
|
||
title = {Bayesian algorithmic mechanism design},
|
||
author = {Hartline, Jason D and Lucier, Brendan},
|
||
booktitle = stoc10,
|
||
pages = {301--310},
|
||
year = {2010},
|
||
url = {https://arxiv.org/abs/0909.4756}
|
||
}
|
||
|
||
@inproceedings{Ramsey:2002,
|
||
Author = {Ramsey, Norman and Pfeffer, Avi},
|
||
Booktitle = popl02,
|
||
Pages = {154--165},
|
||
Title = {Stochastic lambda calculus and monads of probability distributions},
|
||
Year = {2002},
|
||
url = {https://www.cs.tufts.edu/~nr/pubs/pmonad.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{Park:2005,
|
||
author = {Sungwoo Park and
|
||
Frank Pfenning and
|
||
Sebastian Thrun},
|
||
title = {A probabilistic language based upon sampling functions},
|
||
booktitle = popl05,
|
||
year = {2005},
|
||
pages = {171--182},
|
||
url = {https://www.cs.cmu.edu/~fp/papers/popl05.pdf}
|
||
}
|
||
|
||
@article{Hurd:2005,
|
||
Author = {Hurd, Joe and {McIver}, Annabelle and Morgan, Carroll},
|
||
Journal = tcs,
|
||
Number = {1},
|
||
Pages = {96--112},
|
||
Title = {Probabilistic guarded commands mechanized in {HOL}},
|
||
Volume = {346},
|
||
Year = {2005},
|
||
url = {https://www.cse.unsw.edu.au/~carrollm/probs/Papers/Hurd-05.pdf}
|
||
}
|
||
|
||
@book{McIver:2005,
|
||
Author = {{McIver}, A. and Morgan, C.},
|
||
Publisher = springer,
|
||
Series = {Monographs in Computer Science},
|
||
Title = {Abstraction, Refinement, and Proof for Probabilistic Systems},
|
||
Year = {2005}}
|
||
|
||
@inproceedings{Borgstrom:2011,
|
||
author = {Johannes Borgstr{\"o}m and
|
||
Andrew D Gordon and
|
||
Michael Greenberg and
|
||
James Margetson and
|
||
Jurgen Van Gael},
|
||
title = {Measure Transformer Semantics for Bayesian Machine Learning},
|
||
booktitle = esop11,
|
||
year = {2011},
|
||
pages = {77--96},
|
||
url = {https://cis.upenn.edu/~mgree/papers/esop2011_mts.pdf}
|
||
}
|
||
|
||
@inproceedings{Kiselyov:2009,
|
||
author = {Oleg Kiselyov and
|
||
{Chung}-{Chieh} Shan},
|
||
title = {Embedded Probabilistic Programming},
|
||
booktitle = {DSL},
|
||
year = {2009},
|
||
pages = {360--384}
|
||
}
|
||
|
||
@inproceedings{Goodman:2013,
|
||
author = {Noah D Goodman},
|
||
title = {The principles and practice of probabilistic programming},
|
||
booktitle = popl13,
|
||
year = {2013},
|
||
pages = {399--402},
|
||
url = {https://web.stanford.edu/~ngoodman/papers/POPL2013-abstract.pdf}
|
||
}
|
||
|
||
@inproceedings{Sampson+14,
|
||
title = {Expressing and verifying probabilistic assertions},
|
||
author = {Sampson, Adrian and Panchekha, Pavel and Mytkowicz, Todd and {McKinley}, Kathryn S and Grossman, Dan and Ceze, Luis},
|
||
booktitle = pldi14,
|
||
pages = {14},
|
||
year = {2014},
|
||
url = {https://research.microsoft.com/pubs/211410/passert-pldi2014.pdf}
|
||
}
|
||
|
||
@Inproceedings {Bornholt+14,
|
||
author = {James Bornholt and Todd Mytkowicz and Kathryn S {McKinley}},
|
||
booktitle = asplos14,
|
||
title = {{Uncertain$\langle$T$\rangle$}: {A} First-Order Type for Uncertain Data},
|
||
year = {2014},
|
||
url = {https://research.microsoft.com/pubs/208236/asplos077-bornholtA.pdf}
|
||
}
|
||
|
||
|
||
@article{Giry82,
|
||
author = {Giry, Mich{\`e}le},
|
||
journal = {Categorical Aspects of Topology and Analysis},
|
||
pages = {68--85},
|
||
title = {{A categorical approach to probability theory}},
|
||
year = {1982},
|
||
}
|
||
|
||
|
||
@inproceedings{FreemanP91,
|
||
title = {Refinement types for {ML}},
|
||
author = {Freeman, Tim and Pfenning, Frank},
|
||
booktitle = pldi91,
|
||
pages = {268--277},
|
||
year = {1991},
|
||
url = {https://www.cs.cmu.edu/~fp/papers/pldi91.pdf}
|
||
}
|
||
|
||
@inproceedings{BBFGM08,
|
||
author = "J. Bengtson and K. Bhargavan and C. Fournet and A. D. Gordon and S. Maffeis",
|
||
title = "Refinement types for secure implementations",
|
||
booktitle = csf08,
|
||
year = 2008,
|
||
url = {https://prosecco.gforge.inria.fr/personal/karthik/pubs/refinement-types-for-secure-implementations-proceedings-csf08.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{fstar,
|
||
author = {Swamy, Nikhil and Chen, Juan and Fournet, C{\'e}dric and Strub, {Pierre}-{Yves} and Bhargavan, Karthikeyan and Yang, Jean},
|
||
title = {Secure distributed programming with value-dependent types},
|
||
booktitle = icfp11,
|
||
year = 2011,
|
||
url = {https://research.microsoft.com/pubs/150012/icfp-camera-ready.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{liquid,
|
||
title = {Liquid types},
|
||
author = {Rondon, Patrick M and Kawaguci, Ming and Jhala, Ranjit},
|
||
booktitle = pldi08,
|
||
pages = {159--169},
|
||
year = {2008},
|
||
url = {https://goto.ucsd.edu/~rjhala/papers/liquid_types.pdf}
|
||
}
|
||
|
||
@inproceedings{rfstar,
|
||
title = {Probabilistic Relational Verification for Cryptographic Implementations},
|
||
author = {Barthe, Gilles and
|
||
Fournet, C{\'e}dric and
|
||
Gr{\'e}goire, Benjamin and
|
||
Strub, {Pierre}-{Yves} and
|
||
Swamy, Nikhil and
|
||
Zanella{-}B{\'e}guelin, Santiago},
|
||
booktitle = popl14,
|
||
pages = {193--206},
|
||
year = {2014},
|
||
doi = {10.1145/2535838.2535847},
|
||
url = {https://research.microsoft.com/en-us/um/people/nswamy/papers/rfstar.pdf}
|
||
}
|
||
|
||
@INPROCEEDINGS{polymonad,
|
||
TITLE = {Polymonadic Programming},
|
||
AUTHOR = {Michael Hicks and Gavin Bierman and Nataliya Guts and Daan Leijen and Nikhil Swamy},
|
||
BOOKTITLE = mfps14,
|
||
YEAR = 2014,
|
||
url = {https://arxiv.org/abs/1406.2060}
|
||
}
|
||
|
||
|
||
@inproceedings{Dwork06,
|
||
Author = {Dwork, Cynthia},
|
||
Booktitle = icalp06,
|
||
Pages = {1--12},
|
||
Title = {Differential Privacy},
|
||
Year = {2006},
|
||
url = {https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.7534&rep=rep1&type=pdf}
|
||
}
|
||
|
||
@inproceedings{Benton04,
|
||
Author = {Benton, Nick},
|
||
Booktitle = popl04,
|
||
Pages = {14--25},
|
||
Title = {Simple Relational Correctness Proofs for Static Analyses and Program Transformations},
|
||
Year = {2004},
|
||
doi = {10.1145/964001.964003},
|
||
url = {https://research.microsoft.com/en-us/um/people/nick/correctnessfull.pdf}
|
||
}
|
||
|
||
@inproceedings{AmtoftB04,
|
||
author = {Torben Amtoft and
|
||
Anindya Banerjee},
|
||
title = {Information Flow Analysis in Logical Form},
|
||
booktitle = sas04,
|
||
pages = {100--115},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {3148},
|
||
year = {2004},
|
||
url = {https://software.imdea.org/~ab/Publications/ifalftr.pdf}
|
||
}
|
||
|
||
@inproceedings{BartheGZ09,
|
||
Author = {Barthe, Gilles and
|
||
Gr{\'e}goire, Benjamin and
|
||
Zanella{-}B{\'e}guelin, Santiago},
|
||
Booktitle = popl09,
|
||
Pages = {90--101},
|
||
Title = {Formal Certification of Code-Based Cryptographic Proofs},
|
||
Year = {2009},
|
||
doi = {10.1145/1480881.1480894},
|
||
url = {https://research.microsoft.com/pubs/185309/Zanella.2009.POPL.pdf}
|
||
}
|
||
|
||
@inproceedings{BartheDGKZ13,
|
||
author = {Barthe, Gilles and
|
||
Danezis, George and
|
||
Gr{\'e}goire, Benjamin and
|
||
Kunz, C{\'e}sar and
|
||
Zanella{-}B{\'e}guelin Santiago},
|
||
title = {Verified Computational Differential Privacy with Applications to Smart Metering},
|
||
booktitle = csf13,
|
||
year = {2013},
|
||
pages = {287--301},
|
||
url = {https://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/easypriv.pdf}
|
||
}
|
||
|
||
|
||
|
||
|
||
@inproceedings{DBLP:journals/corr/BaiTG14,
|
||
author = {Wei Bai and
|
||
Emmanuel M Tadjouddine and
|
||
Yu Guo},
|
||
title = {Enabling Automatic Certification of Online Auctions},
|
||
booktitle = fesca14,
|
||
series = {EPTCS},
|
||
volume = {147},
|
||
year = {2014},
|
||
pages = {123--132},
|
||
url = {https://dx.doi.org/10.4204/EPTCS.147.9},
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/facs2/BaiTPG13,
|
||
author = {Wei Bai and
|
||
Emmanuel M Tadjouddine and
|
||
Terry R Payne and
|
||
Sheng-Uei Guan},
|
||
title = {A Proof-Carrying Code Approach to Certificate Auction Mechanisms},
|
||
booktitle = {FACS},
|
||
year = {2013},
|
||
pages = {23--40},
|
||
url = {https://dx.doi.org/10.1007/978--3-319--07602--7_4},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {8348},
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/ceemas/TadjouddineG07,
|
||
author = {Emmanuel M Tadjouddine and
|
||
Frank Guerin},
|
||
title = {Verifying Dominant Strategy Equilibria in Auctions},
|
||
booktitle = ceemas07,
|
||
year = {2007},
|
||
pages = {288--297},
|
||
url = {https://dx.doi.org/10.1007/978--3-540--75254--7_29},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {4696},
|
||
}
|
||
|
||
@article{DBLP:journals/ipl/Vestergaard06,
|
||
author = {Ren{\'e} Vestergaard},
|
||
title = {A constructive approach to sequential Nash equilibria},
|
||
journal = {Inf. Process. Lett.},
|
||
volume = {97},
|
||
number = {2},
|
||
year = {2006},
|
||
pages = {46--51},
|
||
url = {https://dx.doi.org/10.1016/j.ipl.2005.09.010},
|
||
bibsource = {DBLP, https://dblp.uni-trier.de}
|
||
}
|
||
|
||
|
||
@inproceedings{Roux:2009,
|
||
author = {Le Roux, St{\'e}phane},
|
||
title = {Acyclic Preferences and Existence of Sequential Nash
|
||
Equilibria: {A} Formal and Constructive Equivalence},
|
||
booktitle = tphol09,
|
||
year = {2009}
|
||
}
|
||
|
||
|
||
@techreport{BUCS-TR-2008-026,
|
||
author = {Andrei Lapets and Alex Levin and David Parkes},
|
||
title = {{A Typed Truthful Language for One-dimensional Truthful Mechanism Design}},
|
||
number = {BUCS-TR-2008--026},
|
||
year = {2008},
|
||
institution = {Boston University},
|
||
url = {https://cs-people.bu.edu/lapets/resource/typed-ec-mech.pdf}
|
||
}
|
||
|
||
@misc{Fang14,
|
||
author = {Ye Fang and Swarat Chaudhuri and Moshe Vardi},
|
||
title = {{Computer-aided mechanism design}},
|
||
howpublished = {Poster at POPL'14},
|
||
year = {2014}
|
||
}
|
||
|
||
|
||
@inproceedings{CasinghinoSW14,
|
||
author = {Chris Casinghino and Vilhelm Sj{\"o}berg and Stephanie Weirich},
|
||
title = {Combining Proofs and Programs in a Dependently Typed Langauge},
|
||
booktitle = popl14,
|
||
year = {2014},
|
||
url = {https://www.seas.upenn.edu/~ccasin/papers/combining-TR.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/mkm/0002CKMRWW13,
|
||
author = {Christoph Lange and
|
||
Marco B Caminati and
|
||
Manfred Kerber and
|
||
Till Mossakowski and
|
||
Colin Rowat and
|
||
Makarius Wenzel and
|
||
Wolfgang Windsteiger},
|
||
title = {A Qualitative Comparison of the Suitability of Four Theorem
|
||
Provers for Basic Auction Theory},
|
||
booktitle = {MKM/Calculemus/DML},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {7961},
|
||
year = {2013},
|
||
pages = {200--215},
|
||
url = {https://dx.doi.org/10.1007/978--3-642--39320--4\_13}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/ChaudhuriGL12,
|
||
author = {Swarat Chaudhuri and
|
||
Sumit Gulwani and
|
||
Roberto Lublinerman},
|
||
title = {Continuity and robustness of programs},
|
||
journal = cacm,
|
||
volume = {55},
|
||
number = {8},
|
||
year = {2012},
|
||
pages = {107--115},
|
||
url = {https://dl.acm.org/citation.cfm?id=2240262}
|
||
}
|
||
|
||
@article{BartheDR04,
|
||
title = {Secure Information Flow by Self-Composition},
|
||
author = {Barthe, Gilles and
|
||
D'Argenio, Pedro R. and
|
||
Rezk, Tamara},
|
||
journal = mscs,
|
||
volume = {21},
|
||
number = {06},
|
||
pages = {1207--1252},
|
||
year = {2011},
|
||
publisher = cup,
|
||
doi = {10.1017/S0960129511000193},
|
||
url = {https://www-sop.inria.fr/lemme/Tamara.Rezk/publication/Barthe-DArgenio-Rezk-Journal.pdf}
|
||
}
|
||
|
||
@inproceedings{ZaksP08,
|
||
author = {Anna Zaks and Amir Pnueli},
|
||
title = {{CoVaC}: Compiler Validation by Program Analysis of the Cross-Product},
|
||
booktitle = fm08,
|
||
pages = {35--51},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {5014},
|
||
year = {2008},
|
||
doi = {10.1007/978-3-540-68237-0_5},
|
||
url = {https://llvm.org/pubs/2008-05-CoVaC.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{TerauchiA05,
|
||
Author = {Terauchi, Tachio and Aiken, Alex},
|
||
Booktitle = sas05,
|
||
Pages = {352--367},
|
||
Publisher = springer,
|
||
Series = lncs,
|
||
Title = {Secure Information Flow as a Safety Problem},
|
||
Volume = {3672},
|
||
Year = {2005},
|
||
doi = {10.1007/11547662_24},
|
||
url = {https://theory.stanford.edu/~aiken/publications/papers/sas05b.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{BartheCK11,
|
||
author = {Gilles Barthe and
|
||
Juan Manuel Crespo and
|
||
C{\'e}sar Kunz},
|
||
title = {Relational Verification Using Product Programs},
|
||
booktitle = fm11,
|
||
year = {2011},
|
||
pages = {200--214},
|
||
series = lncs,
|
||
volume = 6664,
|
||
publisher = springer,
|
||
url = {https://software.imdea.org/~ckunz/rellog/long-rellog.pdf},
|
||
doi = {10.1007/978-3-642-21437-0_17}
|
||
}
|
||
|
||
@inproceedings{BartheCK13,
|
||
author = {Gilles Barthe and
|
||
Juan Manuel Crespo and
|
||
C{\'e}sar Kunz},
|
||
title = {Beyond 2-Safety: {Asymmetric} Product Programs for Relational
|
||
Program Verification},
|
||
booktitle = lfcompsci13,
|
||
year = {2013},
|
||
pages = {29--43},
|
||
series = lncs,
|
||
volume = 7734,
|
||
publisher = springer,
|
||
doi = {10.1007/978--3-642--35722--0_3},
|
||
url = {https://dx.doi.org/10.1007/978--3-642--35722--0_3},
|
||
bibsource = {DBLP, https://dblp.uni-trier.de}
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/esop/KnowlesF07,
|
||
author = {Kenneth Knowles and Cormac Flanagan},
|
||
title = {Type Reconstruction for General Refinement Types},
|
||
booktitle = esop07,
|
||
year = {2007},
|
||
pages = {505--519},
|
||
url = {https://users.soe.ucsc.edu/~cormac/papers/esop07.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/esop/WadlerF09,
|
||
author = {Philip Wadler and Robert Bruce Findler},
|
||
title = {Well-Typed Programs Can't Be Blamed},
|
||
booktitle = esop09,
|
||
year = {2009},
|
||
pages = {1--16},
|
||
url = {https://homepages.inf.ed.ac.uk/wadler/papers/blame/blame.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/GreenbergPW10,
|
||
author = {Michael Greenberg and Benjamin C. Pierce and Stephanie Weirich},
|
||
title = {Contracts made manifest},
|
||
booktitle = popl10,
|
||
year = {2010},
|
||
pages = {353--364},
|
||
url = {https://www.cis.upenn.edu/~bcpierce/papers/contracts-popl.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/sfp/GronskiF07,
|
||
author = {Jessica Gronski and Cormac Flanagan},
|
||
title = {Unifying Hybrid Types and Contracts},
|
||
booktitle = tfp07,
|
||
year = {2007},
|
||
pages = {54--70},
|
||
url = {https://sage.soe.ucsc.edu/tfp07-gronski-flanagan.pdf}
|
||
}
|
||
|
||
@inproceedings{OngR11,
|
||
title = {Verifying higher-order functional programs with pattern-matching algebraic data types},
|
||
author = {Ong, C-H Luke and Ramsay, Steven James},
|
||
booktitle = popl11,
|
||
pages = {587--598},
|
||
year = {2011},
|
||
url = {https://www.cs.ox.ac.uk/files/3721/main.pdf}
|
||
}
|
||
|
||
@misc{Pierce:2012,
|
||
author = {Benjamin C. Pierce},
|
||
title = {Differential Privacy in the Programming Languages Community},
|
||
year = {2012},
|
||
howpublished = {Invited tutorial at DIMACS Workshop on Recent Work on
|
||
Differential Privacy across Computer Science}
|
||
}
|
||
|
||
@inproceedings{FindlerF02,
|
||
author = {Robert Bruce Findler and Matthias Felleisen},
|
||
title = {Contracts for higher-order functions},
|
||
booktitle = icfp02,
|
||
year = {2002},
|
||
pages = {48--59},
|
||
url =
|
||
{https://www.eecs.northwestern.edu/~robby/pubs/papers/ho-contracts-techreport.pdf}
|
||
}
|
||
|
||
@INPROCEEDINGS{Augustsson98,
|
||
author = {Lennart Augustsson},
|
||
title = {Cayenne -- a Language With Dependent Types},
|
||
booktitle = icfp98,
|
||
year = {1998},
|
||
pages = {239--250},
|
||
url = {https://link.springer.com/chapter/10.1007%2F10704973_6}
|
||
}
|
||
|
||
|
||
@article{Brady13,
|
||
author = {Edwin Brady},
|
||
title = {Idris, a general-purpose dependently typed programming language:
|
||
Design and implementation},
|
||
journal = jfp,
|
||
volume = {23},
|
||
number = {5},
|
||
year = {2013},
|
||
pages = {552--593},
|
||
url = {https://eb.host.cs.st-andrews.ac.uk/drafts/impldtp.pdf}
|
||
}
|
||
|
||
@incollection{epigram,
|
||
title = {Epigram: Practical programming with dependent types},
|
||
author = {{McBride}, Conor},
|
||
booktitle = {Advanced Functional Programming},
|
||
pages = {130--170},
|
||
year = {2005},
|
||
publisher = springer,
|
||
url = {https://cs.ru.nl/~freek/courses/tt-2010/tvftl/epigram-notes.pdf}
|
||
}
|
||
@inproceedings{Vytiniotis+13,
|
||
author = {Vytiniotis, Dimitrios and Peyton Jones, Simon and Claessen, Koen and Ros{\'e}n, Dan},
|
||
title = {HALO: Haskell to Logic Through Denotational Semantics},
|
||
booktitle = popl13,
|
||
year = {2013},
|
||
url = {https://research.microsoft.com/en-us/people/dimitris/hcc-popl.pdf}
|
||
}
|
||
|
||
@INPROCEEDINGS{Flanagan06,
|
||
author = {Jessica Gronski and Kenneth Knowles and Aaron Tomb and Stephen N Freund and Cormac Flanagan},
|
||
title = {Sage: Hybrid checking for flexible specifications},
|
||
booktitle = {Scheme and Functional Programming Workshop},
|
||
year = {2006},
|
||
pages = {93--104},
|
||
url = {https://galois.com/wp-content/uploads/2014/07/pub_AT_SAGEHybridChecking.pdf}
|
||
}
|
||
|
||
@inproceedings{EignerM13,
|
||
author = {Fabienne Eigner and
|
||
Matteo Maffei},
|
||
title = {Differential Privacy by Typing in Security Protocols},
|
||
booktitle = csf13,
|
||
year = {2013},
|
||
pages = {272--286},
|
||
url = {https://sps.cs.uni-saarland.de/publications/dp_proto_long.pdf}
|
||
}
|
||
|
||
@inproceedings{DaviesP00,
|
||
author = {Rowan Davies and
|
||
Frank Pfenning},
|
||
title = {Intersection types and computational effects},
|
||
booktitle = icfp00,
|
||
year = {2000},
|
||
pages = {198--208},
|
||
url = {https://www.cs.cmu.edu/~fp/papers/icfp00.pdf}
|
||
}
|
||
|
||
@inproceedings{XiP99,
|
||
author = {Hongwei Xi and
|
||
Frank Pfenning},
|
||
title = {Dependent Types in Practical Programming},
|
||
booktitle = popl99,
|
||
year = {1999},
|
||
pages = {214--227},
|
||
url = {https://www.cs.cmu.edu/~fp/papers/popl99.pdf}
|
||
}
|
||
|
||
@inproceedings{DMNS06,
|
||
author = {Cynthia Dwork and
|
||
Frank {McSherry} and
|
||
Kobbi Nissim and
|
||
Adam D. Smith},
|
||
title = {Calibrating Noise to Sensitivity in Private Data Analysis},
|
||
booktitle = tcc06,
|
||
volume = 3876,
|
||
series = lncs,
|
||
pages = {265--284},
|
||
year = {2006},
|
||
doi = {10.1007/11681878_14},
|
||
publisher = springer
|
||
}
|
||
|
||
@inproceedings{Tschantz201161,
|
||
title = {Formal Verification of Differential Privacy for Interactive Systems},
|
||
author = {Tschantz, Michael Carl and
|
||
Kaynar, Dilsun and
|
||
Datta, Anupam},
|
||
booktitle = mfps11,
|
||
series = entcs,
|
||
volume = 276,
|
||
pages = {61--79},
|
||
year = 2011,
|
||
url = {https://arxiv.org/pdf/1101.2819v1},
|
||
doi = {10.1016/j.entcs.2011.09.015},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{GHKSW06,
|
||
title = {Competitive auctions},
|
||
author = {Goldberg, Andrew V and Hartline, Jason D and Karlin, Anna R and
|
||
Saks, Michael and Wright, Andrew},
|
||
journal = geb,
|
||
volume = {55},
|
||
number = {2},
|
||
year = {2006},
|
||
pages = {242--269},
|
||
url = {https://www.ime.usp.br/~yw/papers/games/goldberg2008-competitive-auctions.pdf},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@article{mu2008truthful,
|
||
title = {Truthful approximation mechanisms for restricted combinatorial auctions},
|
||
author = {{Mu'Alem}, Ahuva and Nisan, Noam},
|
||
journal = geb,
|
||
volume = {64},
|
||
number = {2},
|
||
pages = {612--631},
|
||
year = {2008},
|
||
url = {https://authors.library.caltech.edu/13158/1/MUAgeb08preprint.pdf},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@inproceedings{milgrom2014deferred,
|
||
title = {Deferred-acceptance auctions and radio spectrum reallocation},
|
||
author = {Milgrom, Paul and Segal, Ilya},
|
||
booktitle = ec14,
|
||
pages = {185--186},
|
||
year = {2014},
|
||
url = {https://web.stanford.edu/~isegal/heuristic.pdf}
|
||
}
|
||
|
||
@article{CKRW14,
|
||
author = {Rachel Cummings and
|
||
Michael Kearns and
|
||
Aaron Roth and
|
||
Zhiwei Steven Wu},
|
||
title = {Privacy and Truthful Equilibrium Selection for Aggregative Games},
|
||
journal = {CoRR},
|
||
year = {2014},
|
||
volume = {abs/1407.7740},
|
||
url = {https://arxiv.org/abs/1407.7740},
|
||
timestamp = {Sun, 26 Oct 2014 15:36:31 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/corr/CummingsKRW14},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{HK12,
|
||
title = {The exponential mechanism for social welfare: Private, truthful, and nearly optimal},
|
||
author = {Huang, Zhiyi and Kannan, Sampath},
|
||
booktitle = focs12,
|
||
pages = {140--149},
|
||
year = {2012},
|
||
url = {https://arxiv.org/abs/1204.1255}
|
||
}
|
||
|
||
@inproceedings{zinkevich,
|
||
author = {Martin Zinkevich},
|
||
title = {Online Convex Programming and Generalized Infinitesimal Gradient Ascent},
|
||
booktitle = icml03,
|
||
year = {2003},
|
||
pages = {928--936},
|
||
url = {https://www.aaai.org/Library/ICML/2003/icml03-120.php},
|
||
timestamp = {Thu, 16 Oct 2014 21:45:09 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/icml/Zinkevich03},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{JKT11,
|
||
title = {Differentially private online learning},
|
||
author = {Jain, Prateek and Kothari, Pravesh and Thakurta, Abhradeep Guha},
|
||
eprint = {1109.0105},
|
||
year = {2011},
|
||
url = {https://arxiv.org/abs/1109.0105}
|
||
}
|
||
|
||
@inproceedings{JT14,
|
||
title = {({Near}) Dimension Independent Risk Bounds for Differentially Private Learning},
|
||
author = {Jain, Prateek and Thakurta, Abhradeep Guha},
|
||
booktitle = icml14,
|
||
series = pmlr,
|
||
volume = 32,
|
||
pages = {476--484},
|
||
year = {2014},
|
||
url = {https://jmlr.org/proceedings/papers/v32/jain14.pdf}
|
||
}
|
||
|
||
@inproceedings{BST14,
|
||
title = {Differentially Private Empirical Risk Minimization: Efficient
|
||
Algorithms and Tight Error Bounds},
|
||
author = {Bassily, Raef and Smith, Adam and Thakurta, Abhradeep Guha},
|
||
booktitle = focs14,
|
||
year = {2014},
|
||
url = {https://arxiv.org/abs/1405.7085}
|
||
}
|
||
|
||
@article{dualdecomp,
|
||
title = {Distributed optimization and statistical learning via the alternating
|
||
direction method of multipliers},
|
||
author = {Boyd, Stephen and Parikh, Neal and Chu, Eric and Peleato, Borja and
|
||
Eckstein, Jonathan},
|
||
journal = {Foundations and Trends{\textregistered} in Machine Learning},
|
||
volume = {3},
|
||
number = {1},
|
||
pages = {1--122},
|
||
year = {2011},
|
||
publisher = {Now Publishers Inc.},
|
||
url = {https://web.stanford.edu/~boyd/papers/pdf/admm_distr_stats.pdf}
|
||
}
|
||
|
||
@inproceedings{NST12,
|
||
title = {Approximately optimal mechanism design via differential privacy},
|
||
author = {Nissim, Kobbi and Smorodinsky, Rann and Tennenholtz, Moshe},
|
||
booktitle = itcs12,
|
||
pages = {203--213},
|
||
year = {2012},
|
||
url = {https://arxiv.org/abs/1004.2888}
|
||
}
|
||
|
||
@inproceedings{CCKMV13,
|
||
title = {Truthful mechanisms for agents that value privacy},
|
||
author = {Chen, Yiling and Chong, Stephen and Kash, Ian A and Moran, Tal and Vadhan, Salil},
|
||
booktitle = ec13,
|
||
pages = {215--232},
|
||
year = {2013},
|
||
url = {https://arxiv.org/abs/1111.5472}
|
||
}
|
||
|
||
@inproceedings{Xia13,
|
||
title = {Is privacy compatible with truthfulness?},
|
||
author = {Xiao, David},
|
||
booktitle = itcs13,
|
||
pages = {67--86},
|
||
year = {2013},
|
||
url = {https://eprint.iacr.org/2011/005}
|
||
}
|
||
|
||
@inproceedings{IOh01,
|
||
title = {{BI} as an assertion language for mutable data structures},
|
||
author = {Ishtiaq, Samin S and O'Hearn, Peter W},
|
||
booktitle = popl01,
|
||
year = 2001,
|
||
url = {https://dl.acm.org/citation.cfm?id=375719},
|
||
pages = {14--26}
|
||
}
|
||
|
||
@inproceedings{OhRY01,
|
||
title = {Local Reasoning about Programs That Alter Data Structures},
|
||
author = {O'Hearn, Peter W. and Reynolds, John C. and Yang, Hongseok},
|
||
booktitle = csl01,
|
||
year = 2001,
|
||
series = lncs,
|
||
volume = 2142,
|
||
publisher = springer,
|
||
doi = {10.1007/3-540-44802-0_1},
|
||
url = {https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.29.1331&rep=rep1&type=pdf},
|
||
pages = {1--19}
|
||
}
|
||
|
||
@inproceedings{DOhY06,
|
||
title = {A local shape analysis based on separation logic},
|
||
author = {Distefano, Dino and O'Hearn, Peter W and Yang, Hongseok},
|
||
booktitle = tacas06,
|
||
year = 2006,
|
||
url = {https://dl.acm.org/citation.cfm?id=2182039},
|
||
pages = {287--302}
|
||
}
|
||
|
||
@inproceedings{BCCC07,
|
||
title = {Shape analysis for composite data structures},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and Cook, Byron and
|
||
Distefano, Dino and O'Hearn, Peter W and Wies, Thomas and Yang,
|
||
Hongseok},
|
||
booktitle = cav07,
|
||
pages = {178--192},
|
||
url = {https://research.microsoft.com/pubs/73868/safcds.pdf},
|
||
year = {2007}
|
||
}
|
||
|
||
@article{Reynolds01,
|
||
title = {Intuitionistic Reasoning about Shared Mutable Data Structure},
|
||
author = {Reynolds, John C.},
|
||
journal = {Millennial Perspectives in Computer Science},
|
||
volume = {2},
|
||
number = {1},
|
||
year = 2001,
|
||
url = {https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.5999&rep=rep1&type=pdf},
|
||
pages = {303--321},
|
||
publisher = {Palgrave},
|
||
series = {Cornerstones of Computing},
|
||
}
|
||
|
||
@inproceedings{Reynolds02,
|
||
title = {Separation Logic: {A} Logic for Shared Mutable Data Structures},
|
||
author = {Reynolds, John C.},
|
||
booktitle = lics02,
|
||
year = 2002,
|
||
pages = {55--74},
|
||
doi = {10.1109/LICS.2002.1029817},
|
||
url = {https://www.cs.cmu.edu/~jcr/seplogic.pdf}
|
||
}
|
||
|
||
@article{Burstall72,
|
||
title = {Some techniques for proving correctness of programs which alter data structures},
|
||
author = {Rodnew M. Burstall},
|
||
journal = {Machine Intelligence},
|
||
volume = {7},
|
||
number = {3},
|
||
year = 1972,
|
||
pages = {23--50}
|
||
}
|
||
|
||
@inproceedings{smallfoot,
|
||
title = {Smallfoot: Modular automatic assertion checking with separation logic},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
|
||
booktitle = fmco06,
|
||
pages = {115--137},
|
||
url = {https://research.microsoft.com/pubs/67598/smallfoot.pdf},
|
||
year = {2006}
|
||
}
|
||
|
||
@incollection{VP07,
|
||
title = {A marriage of rely/guarantee and separation logic},
|
||
author = {Vafeiadis, Viktor and Parkinson, Matthew},
|
||
booktitle = concur07,
|
||
pages = {256--271},
|
||
url = {https://www.cl.cam.ac.uk/~mjp41/RGSep.pdf},
|
||
year = 2007
|
||
}
|
||
|
||
@inproceedings{NDQC07,
|
||
title = {Automated verification of shape and size properties via separation logic},
|
||
author = {Nguyen, Huu Hai and David, Cristina and Qin, Shengchao and Chin, Wei-Ngan},
|
||
booktitle = vmcai07,
|
||
pages = {251--266},
|
||
url = {https://link.springer.com/chapter/10.1007%2F978-3-540-69738-1_18},
|
||
year = {2007}
|
||
}
|
||
|
||
@inproceedings{BCOh04,
|
||
title = {A decidable fragment of separation logic},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
|
||
booktitle = fsttcs04,
|
||
pages = {97--109},
|
||
url = {https://research.microsoft.com/pubs/73583/unroll_collapse.pdf},
|
||
year = 2004
|
||
}
|
||
|
||
@incollection{HAN08,
|
||
title = {Oracle semantics for concurrent separation logic},
|
||
author = {Hobor, Aquinas and Appel, Andrew W and Nardelli, Francesco Zappa},
|
||
booktitle = {Programming Languages and Systems (with ESOP)},
|
||
pages = {353--367},
|
||
url = {https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.4226&rep=rep1&type=pdf},
|
||
year = {2008}
|
||
}
|
||
|
||
@inproceedings{Krebbers14,
|
||
title = {An operational and axiomatic semantics for non-determinism and sequence points in {C}},
|
||
author = {Krebbers, Robbert},
|
||
booktitle = popl14,
|
||
pages = {101--112},
|
||
url = {https://robbertkrebbers.nl/research/articles/expressions.pdf},
|
||
year = {2014}
|
||
}
|
||
|
||
@article{OhP99,
|
||
title = {The logic of bunched implications},
|
||
author = {O'Hearn, Peter W and Pym, David J},
|
||
journal = bsl,
|
||
pages = {215--244},
|
||
url = {https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.27.4742&rep=rep1&type=pdf},
|
||
year = {1999}
|
||
}
|
||
|
||
@article{POhY04,
|
||
title = {Possible worlds and resources: The semantics of {BI}},
|
||
author = {Pym, David J and O'Hearn, Peter W and Yang, Hongseok},
|
||
journal = tcs,
|
||
volume = {315},
|
||
number = {1},
|
||
pages = {257--305},
|
||
year = {2004},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S0304397503006248},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@inproceedings{BCOh05,
|
||
title = {Symbolic execution with separation logic},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
|
||
booktitle = aplas05,
|
||
url = {https://research.microsoft.com/pubs/64175/execution.pdf},
|
||
year = {2005}
|
||
}
|
||
|
||
@inproceedings{Cousout77,
|
||
title = {Abstract interpretation: {A} unified lattice model for static
|
||
analysis of programs by construction or approximation of
|
||
fixpoints},
|
||
author = {Cousot, Patrick and Cousot, Radhia},
|
||
booktitle = popl77,
|
||
pages = {238--252},
|
||
url = {https://www.di.ens.fr/~cousot/publications.www/CousotCousot-POPL-77-ACM-p238--252-1977.pdf},
|
||
year = {1977}
|
||
}
|
||
|
||
@article{Cousout96,
|
||
title = {Abstract interpretation},
|
||
author = {Cousot, Patrick},
|
||
journal = {{ACM} Computing Surveys},
|
||
volume = {28},
|
||
number = {2},
|
||
pages = {324--328},
|
||
year = {1996},
|
||
url = {https://dl.acm.org/citation.cfm?id=234740},
|
||
}
|
||
|
||
@inproceedings{dwork2010pan,
|
||
title = {Pan-Private Streaming Algorithms.},
|
||
author = {Dwork, Cynthia and
|
||
Naor, Moni and
|
||
Pitassi, Toniann and
|
||
Rothblum, Guy N and
|
||
Yekhanin, Sergey},
|
||
booktitle = itcs10,
|
||
pages = {66--80},
|
||
url = {https://www.cs.toronto.edu/~toni/Papers/panprivacy.pdf},
|
||
year = {2010}
|
||
}
|
||
|
||
@inproceedings{recommender,
|
||
title = {Differentially private recommender systems: building privacy into the net},
|
||
author = {{McSherry}, Frank and Mironov, Ilya},
|
||
booktitle = kdd09,
|
||
pages = {627--636},
|
||
year = {2009},
|
||
url = {https://research.microsoft.com/pubs/80511/netflixprivacy.pdf}
|
||
}
|
||
|
||
@book{cvxbook,
|
||
author = {Boyd, Stephen and Vandenberghe, Lieven},
|
||
title = {Convex Optimization},
|
||
year = {2004},
|
||
isbn = {0521833787},
|
||
publisher = cup,
|
||
}
|
||
|
||
@book{concentration-book,
|
||
title = {Concentration of measure for the analysis of randomized algorithms},
|
||
author = {Dubhashi, Devdatt P and Panconesi, Alessandro},
|
||
year = {2009},
|
||
publisher = cup
|
||
}
|
||
|
||
@article{LovaszLocal,
|
||
title = {Problems and results on 3-chromatic hypergraphs and some related
|
||
questions},
|
||
author = {Erdos, Paul and Lov{\'a}sz, L{\'a}szl{\'o}},
|
||
journal = {Infinite and finite sets},
|
||
volume = {10},
|
||
pages = {609--627},
|
||
year = {1975}
|
||
}
|
||
|
||
@article{erdosPM,
|
||
title = {Graph theory and probability},
|
||
author = {Paul Erd{\H{o}}s},
|
||
journal = {Canadian Journal of Mathematics},
|
||
volume = {11},
|
||
pages = {34--38},
|
||
year = {1959}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/SampsonPMMGC14,
|
||
author = {Adrian Sampson and
|
||
Pavel Panchekha and
|
||
Todd Mytkowicz and
|
||
Kathryn S McKinley and
|
||
Dan Grossman and
|
||
Luis Ceze},
|
||
title = {Expressing and verifying probabilistic assertions},
|
||
booktitle = pldi14,
|
||
pages = {112--122},
|
||
year = {2014},
|
||
url = {https://doi.acm.org/10.1145/2594291.2594294},
|
||
}
|
||
|
||
@article{alea,
|
||
title = {Proofs of randomized algorithms in {C}oq},
|
||
author = {Audebaud, Philippe and Paulin-Mohring, Christine},
|
||
journal = {Science of Computer Programming},
|
||
volume = {74},
|
||
number = {8},
|
||
pages = {568--589},
|
||
year = {2009},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/SampsonPMMGC14,
|
||
author = {Adrian Sampson and
|
||
Pavel Panchekha and
|
||
Todd Mytkowicz and
|
||
Kathryn S McKinley and
|
||
Dan Grossman and
|
||
Luis Ceze},
|
||
title = {Expressing and verifying probabilistic assertions},
|
||
booktitle = pldi14,
|
||
pages = {14},
|
||
year = {2014},
|
||
url = {https://doi.acm.org/10.1145/2594291.2594294},
|
||
}
|
||
@inproceedings{DBLP:conf/pldi/CarbinKMR12,
|
||
author = {Michael Carbin and
|
||
Deokhwan Kim and
|
||
Sasa Misailovic and
|
||
Martin C Rinard},
|
||
title = {Proving acceptability properties of relaxed nondeterministic approximate
|
||
programs},
|
||
booktitle = pldi12,
|
||
pages = {169--180},
|
||
year = {2012},
|
||
url = {https://doi.acm.org/10.1145/2254064.2254086},
|
||
}
|
||
|
||
@InProceedings{Necula97,
|
||
author = "G. C. Necula",
|
||
title = "Proof-carrying code",
|
||
booktitle = popl97,
|
||
year = "1997",
|
||
pages = "106--119",
|
||
}
|
||
|
||
@inproceedings{BartheGHZ11,
|
||
author = {Barthe, Gilles and
|
||
Gr{\'e}goire, Benjamin and
|
||
Heraud, Sylvain and
|
||
Zanella{-}B{\'e}guelin, Santiago},
|
||
title = {Computer-Aided Security Proofs for the Working Cryptographer},
|
||
Booktitle = crypto,
|
||
year = {2011},
|
||
Pages = {71--90},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {6841},
|
||
url = {https://software.imdea.org/~szanella/Zanella.2011.CRYPTO.pdf},
|
||
bibsource = {DBLP, https://dblp.uni-trier.de}
|
||
}
|
||
|
||
@inproceedings{flanagan2001,
|
||
title = {Avoiding exponential explosion: Generating compact
|
||
verification conditions},
|
||
author = {Flanagan, Cormac and Saxe, James B},
|
||
booktitle = popl01,
|
||
pages = {193--205},
|
||
year = {2001},
|
||
}
|
||
|
||
@inproceedings{BartheDGKSS13,
|
||
author = {Gilles Barthe and
|
||
Fran{\c{c}}ois Dupressoir and
|
||
Benjamin Gr{\'{e}}goire and
|
||
C{\'{e}}sar Kunz and
|
||
Benedikt Schmidt and
|
||
Pierre{-}Yves Strub},
|
||
title = {EasyCrypt: {A} Tutorial},
|
||
booktitle = {Foundations of Security Analysis and Design ({FOSAD})},
|
||
series = lncs,
|
||
volume = {8604},
|
||
pages = {146--166},
|
||
publisher = springer,
|
||
year = {2013},
|
||
doi = {10.1007/978-3-319-10082-1_6},
|
||
note = {Tutorial Lectures},
|
||
}
|
||
|
||
@article{hoare1969axiomatic,
|
||
title={An Axiomatic Basis for Computer Programming},
|
||
author={Hoare, Charles A. R.},
|
||
journal=cacm,
|
||
volume={12},
|
||
number={10},
|
||
pages={576--580},
|
||
year={1969},
|
||
doi={10.1145/363235.363259},
|
||
url={https://dl.acm.org/citation.cfm?id=363259}
|
||
}
|
||
|
||
@incollection{Floyd67,
|
||
author = {Floyd, Robert W.},
|
||
booktitle = {Symposium on Applied Mathematics},
|
||
publisher = {American Mathematical Society},
|
||
title = {Assigning Meanings to Programs},
|
||
year = {1967},
|
||
doi = {10.1007/978-94-011-1793-7_4},
|
||
url = {https://link.springer.com/chapter/10.1007%2F978-94-011-1793-7_4}
|
||
}
|
||
|
||
|
||
@article{Cook:1978,
|
||
Author = {Cook, S.},
|
||
Journal = siamjc,
|
||
Number = {1},
|
||
Pages = {70--90},
|
||
Title = {Soundness and Completeness of an Axiom System for Program Verification},
|
||
Volume = {7},
|
||
Year = {1978}
|
||
}
|
||
|
||
@inproceedings{Clarkson:2008,
|
||
title={Hyperproperties},
|
||
author={Clarkson, Michael R and Schneider, Fred B},
|
||
journal={Journal of Computer Security},
|
||
volume={18},
|
||
number={6},
|
||
pages={1157--1210},
|
||
year={2010},
|
||
publisher={IOS Press}
|
||
}
|
||
|
||
@InProceedings{Turing:1949,
|
||
author = "Alan M. Turing",
|
||
title = "Checking a Large Routine",
|
||
pages = "67--69",
|
||
year = "1949",
|
||
URL = "https://www.turingarchive.org/browse.php/B/8",
|
||
booktitle = "{Report on a Conference on High Speed Automatic
|
||
Computation, June 1949}",
|
||
}
|
||
|
||
|
||
@inproceedings{HM07,
|
||
title = {The communication complexity of uncoupled nash equilibrium procedures},
|
||
author = {Hart, Sergiu and Mansour, Yishay},
|
||
booktitle = stoc07,
|
||
pages = {345--353},
|
||
year = {2007},
|
||
}
|
||
|
||
@article{DGP09,
|
||
title = {The complexity of computing a Nash equilibrium},
|
||
author = {Daskalakis, Constantinos and Goldberg, Paul W and Papadimitriou, Christos H},
|
||
journal = siamjc,
|
||
volume = {39},
|
||
number = {1},
|
||
pages = {195--259},
|
||
year = {2009},
|
||
}
|
||
|
||
@inproceedings{CS02,
|
||
title = {Complexity of mechanism design},
|
||
author = {Conitzer, Vincent and Sandholm, Tuomas},
|
||
booktitle = uai02,
|
||
pages = {103--110},
|
||
year = {2002},
|
||
organization = {Morgan Kaufmann Publishers Inc.}
|
||
}
|
||
|
||
@inproceedings{San03,
|
||
title = {Automated mechanism design: {A} new application area for search algorithms},
|
||
author = {Sandholm, Tuomas},
|
||
booktitle = cp03,
|
||
pages = {19--36},
|
||
year = {2003},
|
||
organization = springer
|
||
}
|
||
|
||
@inproceedings{BP14,
|
||
title = {Verifiably Truthful Mechanisms},
|
||
author = {Br{\^a}nzei, Simina and Procaccia, Ariel D},
|
||
booktitle = itcs14,
|
||
year = {2014}
|
||
}
|
||
|
||
@phdthesis{Con06,
|
||
title = {Computational aspects of preference aggregation},
|
||
author = {Conitzer, Vincent},
|
||
year = {2006},
|
||
school = {IBM}
|
||
}
|
||
|
||
@inproceedings{HKM11,
|
||
title = {Bayesian incentive compatibility via matchings},
|
||
author = {Hartline, Jason D and Kleinberg, Robert and Malekian, Azarakhsh},
|
||
booktitle = soda11,
|
||
pages = {734--747},
|
||
year = {2011},
|
||
}
|
||
|
||
@inproceedings{BH11,
|
||
title = {Bayesian incentive compatibility via fractional assignments},
|
||
author = {Bei, Xiaohui and Huang, Zhiyi},
|
||
booktitle = soda11,
|
||
pages = {720--733},
|
||
year = {2011},
|
||
}
|
||
|
||
@book{Rou05,
|
||
title = {Selfish routing and the price of anarchy},
|
||
author = {Roughgarden, Tim},
|
||
volume = {174},
|
||
year = {2005},
|
||
publisher = mitpress
|
||
}
|
||
|
||
@article{Morgan:1996,
|
||
author = {Carroll Morgan and
|
||
Annabelle McIver and
|
||
Karen Seidel},
|
||
title = {Probabilistic Predicate Transformers},
|
||
journal = toplas,
|
||
volume = {18},
|
||
number = {3},
|
||
year = {1996},
|
||
pages = {325--353},
|
||
doi = {10.1145/229542.229547},
|
||
url = {dl.acm.org/ft_gateway.cfm?id=229547}
|
||
}
|
||
|
||
@article{Kozen:1985,
|
||
author = {Dexter Kozen},
|
||
title = {A Probabilistic {PDL}},
|
||
journal = jcss,
|
||
volume = {30},
|
||
number = {2},
|
||
year = {1985},
|
||
doi = {10.1016/0022-0000(85)90012-1},
|
||
}
|
||
|
||
@inproceedings{TGV09,
|
||
year = {2009},
|
||
booktitle = {Declarative Agent Languages and Technologies VI},
|
||
volume = {5397},
|
||
series = lncs,
|
||
title = {Abstracting and Verifying Strategy-Proofness for Auction Mechanisms},
|
||
publisher = springer,
|
||
author = {Tadjouddine, Emmanuel M. and Guerin, Frank and Vasconcelos, Wamberto},
|
||
pages = {197--214},
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/ceemas/TadjouddineG07,
|
||
author = {Emmanuel M Tadjouddine and
|
||
Frank Guerin},
|
||
title = {Verifying Dominant Strategy Equilibria in Auctions},
|
||
booktitle = {{CEEMAS 2007}},
|
||
year = {2007},
|
||
pages = {288--297},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {4696},
|
||
}
|
||
|
||
@inproceedings{DBLP:journals/corr/BaiTG14,
|
||
author = {Wei Bai and
|
||
Emmanuel M Tadjouddine and
|
||
Yu Guo},
|
||
title = {Enabling Automatic Certification of Online Auctions},
|
||
booktitle = {{FESCA 2014}},
|
||
series = {EPTCS},
|
||
volume = {147},
|
||
year = {2014},
|
||
pages = {123--132},
|
||
doi = {10.4204/EPTCS.147.9},
|
||
url = {https://dx.doi.org/10.4204/EPTCS.147.9},
|
||
}
|
||
|
||
@incollection{DBLP:conf/mkm/0002CKMRWW13,
|
||
author = {Christoph Lange and
|
||
Marco B Caminati and
|
||
Manfred Kerber and
|
||
Till Mossakowski and
|
||
Colin Rowat and
|
||
Makarius Wenzel and
|
||
Wolfgang Windsteiger},
|
||
title = {A Qualitative Comparison of the Suitability of Four Theorem
|
||
Provers for Basic Auction Theory},
|
||
booktitle = {Intelligent Computer Mathematics},
|
||
publisher = springer,
|
||
series = lncs,
|
||
volume = {7961},
|
||
year = {2013},
|
||
pages = {200--215},
|
||
url = {https://dx.doi.org/10.1007/978--3-642--39320--4_13},
|
||
publisher = springer
|
||
}
|
||
|
||
@article{DBLP:journals/ipl/Vestergaard06,
|
||
author = {Ren{\'e} Vestergaard},
|
||
title = {A constructive approach to sequential Nash equilibria},
|
||
journal = {Inf. Process. Lett.},
|
||
volume = {97},
|
||
number = {2},
|
||
year = {2006},
|
||
pages = {46--51},
|
||
url = {https://dx.doi.org/10.1016/j.ipl.2005.09.010},
|
||
bibsource = {DBLP, https://dblp.uni-trier.de}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/aaai/WooldridgeADH07,
|
||
author = {Wooldridge, Michael and
|
||
{Agotnes}, Thaoms and
|
||
Dunne, Paul E. and
|
||
van der Hoek, Wiebe},
|
||
title = {Logic for Automated Mechanism Design---{A} Progress Report},
|
||
booktitle = aaai07,
|
||
pages = {9--17},
|
||
year = {2007},
|
||
}
|
||
|
||
@Article{Alur:2002:ATT,
|
||
author = "Rajeev Alur and Thomas A. Henzinger and Orna Kupferman",
|
||
title = "Alternating-time temporal logic",
|
||
journal = jacm,
|
||
volume = "49",
|
||
number = "5",
|
||
pages = "672--713",
|
||
year = "2002",
|
||
journal-url = "https://portal.acm.org/browse_dl.cfm?idx = J401",
|
||
}
|
||
|
||
@inproceedings{Gonthier13,
|
||
author = {Georges Gonthier and
|
||
Andrea Asperti and
|
||
Jeremy Avigad and
|
||
Yves Bertot and
|
||
Cyril Cohen and
|
||
Fran{\c{c}}ois Garillot and
|
||
St{\'{e}}phane Le Roux and
|
||
Assia Mahboubi and
|
||
Russell {O'Connor} and
|
||
Sidi Ould Biha and
|
||
Ioana Pasca and
|
||
Laurence Rideau and
|
||
Alexey Solovyev and
|
||
Enrico Tassi and
|
||
Laurent Th{\'{e}}ry},
|
||
title = {A Machine-Checked Proof of the Odd Order Theorem},
|
||
booktitle = {Interactive Theorem Proving (ITP)},
|
||
pages = {163--179},
|
||
year = {2013},
|
||
}
|
||
|
||
@article{clarke71,
|
||
title = {Multipart pricing of public goods},
|
||
author = {Clarke, Edward H},
|
||
journal = {Public choice},
|
||
volume = {11},
|
||
number = {1},
|
||
pages = {17--33},
|
||
year = {1971},
|
||
publisher = springer
|
||
}
|
||
|
||
@article{groves73,
|
||
title = {Incentives in teams},
|
||
author = {Groves, Theodore},
|
||
journal = {Econometrica: Journal of the Econometric Society},
|
||
pages = {617--631},
|
||
year = {1973}
|
||
}
|
||
|
||
@inproceedings{Bellare:2006,
|
||
author = {Bellare, Mihir and Rogaway, Phillip},
|
||
booktitle = eucrypt06,
|
||
pages = {409--426},
|
||
publisher = springer,
|
||
series = lncs,
|
||
title = {The Security of Triple Encryption and a Framework for
|
||
Code-Based Game-Playing Proofs},
|
||
volume = {4004},
|
||
year = {2006},
|
||
doi = {10.1007/11761679_25},
|
||
url = {https://www.iacr.org/archive/eurocrypt2006/40040415/40040415.pdf}
|
||
}
|
||
|
||
@misc{Halevi:2005,
|
||
author = {Halevi, Shai},
|
||
howpublished = {Cryptology ePrint Archive, Report 2005/181},
|
||
title = {A plausible approach to computer-aided cryptographic proofs},
|
||
year = {2005},
|
||
url = {https://eprint.iacr.org/2005/181.pdf}
|
||
}
|
||
|
||
@unpublished{Naumann:2009,
|
||
author = {Naumann, David A},
|
||
title = {Theory for software verification},
|
||
year = {2009},
|
||
url = {https://www.cs.stevens.edu/~naumann/publications/theoryverif.pdf}
|
||
}
|
||
|
||
@incollection{handbook-sat,
|
||
title = {Satisfiability Modulo Theories},
|
||
author = {Barrett, Clark and Sebastini, Roberto and Seshia, Sanjit A and
|
||
Tinelli, Cesare},
|
||
booktitle = {Handbook of satisfiability},
|
||
volume = {185},
|
||
year = {2009},
|
||
publisher = {IOS press},
|
||
}
|
||
|
||
@inproceedings{HPN11,
|
||
title = {Differential Privacy Under Fire},
|
||
author = {Haeberlen, Andreas and
|
||
Pierce, Benjamin C. and
|
||
Narayan, Arjun},
|
||
booktitle = {USENIX Security Symposium},
|
||
year = {2011}
|
||
}
|
||
|
||
@article{Girard87,
|
||
title = {{Linear logic}},
|
||
author = {Girard, J.Y.},
|
||
journal = tcs,
|
||
volume = {50},
|
||
number = {1},
|
||
pages = {1--102},
|
||
year = {1987},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@incollection{Walker-atapl,
|
||
author = {David Walker},
|
||
title = {Substructural Type Systems},
|
||
booktitle = {Advanced Topics in Types and Programming Languages},
|
||
editor = {Benjamin C. Pierce},
|
||
publisher = mitpress,
|
||
year = {2005},
|
||
}
|
||
|
||
@inproceedings{WrightBaker93,
|
||
title = {{Usage Analysis with Natural Reduction Types}},
|
||
author = {Wright, D.A. and Baker-Finch, C.A.},
|
||
booktitle = {International Workshop on Static Analysis},
|
||
pages = {254--266},
|
||
year = {1993},
|
||
publisher = springer
|
||
}
|
||
|
||
@InProceedings{DalLagoHofmann09,
|
||
title = "Bounded Linear Logic, Revisited",
|
||
author = "Dal Lago, Ugo and Hofmann, Martin",
|
||
booktitle = tlca,
|
||
publisher = springer,
|
||
year = "2009",
|
||
volume = "5608",
|
||
pages = "80--94",
|
||
series = lncs,
|
||
}
|
||
|
||
@InProceedings{XiPfenning99,
|
||
author = "Hongwei Xi and Frank Pfenning",
|
||
title = "Dependent Types in Practical Programming",
|
||
pages = "214--227",
|
||
booktitle = popl99,
|
||
year = "1999",
|
||
}
|
||
|
||
@InProceedings{ATS,
|
||
title = "Combining programming with theorem proving",
|
||
author = "Chiyan Chen and Hongwei Xi",
|
||
booktitle = icfp05,
|
||
year = "2005",
|
||
pages = "66--77",
|
||
url = "https://doi.acm.org/10.1145/1086365.1086375",
|
||
}
|
||
|
||
@article{McBrideMcKinna02,
|
||
author = {Conor {McBride} and James {McKinna}},
|
||
title = {The view from the left},
|
||
journal = jfp,
|
||
year = {2004},
|
||
pages = "69--111",
|
||
volume = 14,
|
||
number = 1,
|
||
}
|
||
|
||
@inproceedings{weirich-promotion,
|
||
author = {Yorgey, Brent A and
|
||
Weirich, Stephanie and
|
||
Cretin, Julien and
|
||
{Peyton Jones}, Simon and
|
||
Vytiniotis, Dimitrios and
|
||
Magalha{\~{e}}s, Jos{\'e} Pedro},
|
||
title = {Giving Haskell A Promotion},
|
||
booktitle = tldi12,
|
||
year = 2012,
|
||
url = {https://www.seas.upenn.edu/~sweirich/papers/tldi12.pdf},
|
||
}
|
||
|
||
@Article{cervesato-llf,
|
||
title = "A Linear Logical Framework",
|
||
author = "Iliano Cervesato and Frank Pfenning",
|
||
journal = ic,
|
||
year = "2002",
|
||
volume = "179",
|
||
number = "1",
|
||
pages = "19--75",
|
||
}
|
||
|
||
@InProceedings{watkins03types,
|
||
author = "Keven Watkins and Iliano Cervesato and Frank Pfenning
|
||
and David Walker",
|
||
title = "A concurrent logical framework {I}: The propositional
|
||
fragment",
|
||
booktitle = types,
|
||
volume = 3085,
|
||
series = lncs,
|
||
publisher = springer,
|
||
year = "2003",
|
||
}
|
||
|
||
@InProceedings{DLG11,
|
||
author = {Dal Lago, Ugo and
|
||
Gaboardi, Marco},
|
||
title = "Linear Dependent Types and Relative Completeness",
|
||
booktitle = lics11,
|
||
pages = "133--142",
|
||
year = {2011}
|
||
}
|
||
|
||
@InProceedings{KTDG12,
|
||
title = "Superficially Substructural Types",
|
||
author = "Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak",
|
||
booktitle = icfp12,
|
||
year = 2012,
|
||
}
|
||
|
||
@inproceedings{CGL10,
|
||
author = {Chaudhuri, Swarat and Gulwani, Sumit and Lublinerman, Roberto},
|
||
title = {Continuity analysis of programs},
|
||
booktitle = popl10,
|
||
year = {2010},
|
||
pages = {57--70},
|
||
}
|
||
|
||
@InProceedings{CGLN11,
|
||
title = "Proving programs robust",
|
||
author = "Swarat Chaudhuri and Sumit Gulwani and Roberto
|
||
Lublinerman and Sara NavidPour",
|
||
booktitle = esecfse11,
|
||
year = "2011",
|
||
ISBN = "978-1-4503-0443-6",
|
||
pages = "102--112",
|
||
URL = "https://doi.acm.org/10.1145/2025113.2025131",
|
||
}
|
||
|
||
@INPROCEEDINGS{Lowe-QIF02,
|
||
author = {Gavin Lowe},
|
||
title = {Quantifying Information Flow},
|
||
booktitle = csfw02,
|
||
year = {2002},
|
||
pages = {18--31}
|
||
}
|
||
|
||
@inproceedings{McCamantErnst08,
|
||
author = {McCamant, Stephen and Ernst, Michael D.},
|
||
title = {Quantitative information flow as network flow capacity},
|
||
booktitle = pldi08,
|
||
year = {2008},
|
||
isbn = {978-1-59593-860-2},
|
||
pages = {193--205},
|
||
}
|
||
|
||
@inproceedings{AACP11,
|
||
author = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
|
||
title = {{On the relation between Differential Privacy and Quantitative Information Flow}},
|
||
booktitle = icalp11,
|
||
year = {2011},
|
||
series = lncs,
|
||
publisher = springer,
|
||
volume = {6756},
|
||
pages = {60--76},
|
||
url = {https://hal.inria.fr/inria-00627937/en},
|
||
}
|
||
|
||
@inproceedings{barthekoepf11,
|
||
author = {Gilles Barthe and Boris K{\"o}pf},
|
||
title = {{Information-theoretic Bounds for Differentially Private Mechanisms}},
|
||
booktitle = csf11,
|
||
publisher = ieee,
|
||
pages = {191--204},
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{AgrawalSrikant00,
|
||
title = {Privacy-preserving data mining},
|
||
author = {Agrawal, Rakesh and Srikant, Ramakrishnan},
|
||
booktitle = sigmod00,
|
||
pages = {439--450},
|
||
year = {2000},
|
||
}
|
||
|
||
@article{l-diversity,
|
||
title = {l-diversity: Privacy beyond k-anonymity},
|
||
author = {Machanavajjhala, Ashwin and Kifer, Daniel and Gehrke, Johannes and
|
||
Venkitasubramaniam, Muthuramakrishnan},
|
||
journal = {{ACM} Transactions on Knowledge Discovery from Data ({TKDD})},
|
||
volume = {1},
|
||
number = {1},
|
||
pages = {3},
|
||
year = {2007},
|
||
}
|
||
|
||
@article{ESA04,
|
||
title = {Privacy preserving mining of association rules},
|
||
author = {Evfimievski, Alexandre and Srikant, Ramakrishnan and Agrawal,
|
||
Rakesh and Gehrke, Johannes},
|
||
journal = {Information Systems},
|
||
volume = {29},
|
||
number = {4},
|
||
pages = {343--364},
|
||
year = {2004},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@inproceedings{GKSS08,
|
||
title = {Composition attacks and auxiliary information in data privacy},
|
||
author = {Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and
|
||
Smith, Adam},
|
||
booktitle = kdd08,
|
||
pages = {265--273},
|
||
year = {2008},
|
||
}
|
||
|
||
@book{Hurwicz60,
|
||
title = {Optimality and informational efficiency in resource allocation
|
||
processes},
|
||
author = {Hurwicz, Leonid},
|
||
year = {1960},
|
||
publisher = {Stanford University Press}
|
||
}
|
||
|
||
@article{Vickrey61,
|
||
title = {Counterspeculation, auctions, and competitive sealed tenders},
|
||
author = {Vickrey, William},
|
||
journal = {The Journal of Finance},
|
||
volume = {16},
|
||
number = {1},
|
||
pages = {8--37},
|
||
year = {1961},
|
||
}
|
||
|
||
@article{Hurwicz72,
|
||
title = {On informationally decentralized systems},
|
||
author = {Hurwicz, Leonid},
|
||
journal = {Decision and organization},
|
||
year = {1972},
|
||
publisher = {North-Holland Amsterdam}
|
||
}
|
||
|
||
@article{Myerson08,
|
||
title = {Perspectives on mechanism design in economic theory},
|
||
author = {Myerson, Roger B},
|
||
journal = {The American Economic Review},
|
||
pages = {586--603},
|
||
year = {2008},
|
||
publisher = {JSTOR}
|
||
}
|
||
|
||
@incollection{BGBP-bigops08,
|
||
title = {Canonical big operators},
|
||
author = {Bertot, Yves and Gonthier, Georges and Biha, Sidi Ould and Pasca,
|
||
Ioana},
|
||
booktitle = tphol,
|
||
pages = {86--101},
|
||
year = {2008},
|
||
publisher = springer
|
||
}
|
||
|
||
@phdthesis{Ramshaw79,
|
||
title = {Formalizing the Analysis of Algorithms.},
|
||
author = {Ramshaw, Lyle Harold},
|
||
year = {1979},
|
||
school = {Stanford University},
|
||
note = {STAN-CS-79-741}
|
||
}
|
||
|
||
@article{HartogVink02,
|
||
title = {Verifying probabilistic programs using a {Hoare} like logic},
|
||
author = {den Hartog, J I and de Vink, Erik P},
|
||
journal = {International Journal of Foundations of Computer Science},
|
||
volume = {13},
|
||
number = {03},
|
||
pages = {315--340},
|
||
year = {2002},
|
||
publisher = {World Scientific}
|
||
}
|
||
|
||
@article{Chadha07,
|
||
title = {Reasoning about probabilistic sequential programs},
|
||
author = {Chadha, Rohit and Cruz-Filipe, Lu{\'\i}s and Mateus, Paulo and
|
||
Sernadas, Am{\'\i}lcar},
|
||
journal = tcs,
|
||
volume = {379},
|
||
number = {1},
|
||
pages = {142--165},
|
||
year = {2007},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@InProceedings{RandZ15,
|
||
author = {Robert Rand and Steve Zdancewic},
|
||
title = {{VPHL}: A Verified Partial-Correctness Logic for Probabilistic Programs},
|
||
booktitle = mfps15,
|
||
year = {2015},
|
||
}
|
||
|
||
inproceedings{Kozen79,
|
||
Author = {Kozen, Dexter},
|
||
Booktitle = focs79,
|
||
Pages = {101--114},
|
||
Title = {Semantics of Probabilistic Programs},
|
||
Year = {1979}}
|
||
|
||
@article{Kozen81,
|
||
title = {Semantics of Probabilistic Programs},
|
||
author = {Kozen, Dexter},
|
||
journal = jcss,
|
||
volume = {22},
|
||
number = {3},
|
||
pages = {328--350},
|
||
year = {1981},
|
||
publisher = {Elsevier},
|
||
doi = {10.1016/0022-0000(81)90036-2},
|
||
url = {https://www.sciencedirect.com/science/article/pii/0022000081900362}
|
||
}
|
||
|
||
@article{HSP83,
|
||
title = {Termination of probabilistic concurrent program},
|
||
author = {Hart, Sergiu and Sharir, Micha and Pnueli, Amir},
|
||
journal = toplas,
|
||
volume = {5},
|
||
number = {3},
|
||
pages = {356--380},
|
||
year = {1983},
|
||
}
|
||
|
||
@inproceedings{Hurd02,
|
||
title = {A formal approach to probabilistic termination},
|
||
author = {Hurd, Joe},
|
||
booktitle = tphol,
|
||
pages = {230--245},
|
||
year = {2002},
|
||
publisher = springer
|
||
}
|
||
|
||
@inproceedings{Chakarov-martingale,
|
||
title = {Probabilistic program analysis with martingales},
|
||
author = {Chakarov, Aleksandar and Sankaranarayanan, Sriram},
|
||
booktitle = cav13,
|
||
pages = {511--526},
|
||
year = {2013},
|
||
url = {https://www.cs.colorado.edu/~srirams/papers/cav2013-martingales.pdf}
|
||
}
|
||
|
||
@inproceedings{FerrerHermanns15,
|
||
title = {Probabilistic Termination: Soundness, Completeness, and Compositionality},
|
||
author = {Ferrer Fioriti, Luis Mar{\'\i}a and Hermanns, Holger},
|
||
booktitle = popl15,
|
||
pages = {489--501},
|
||
year = {2015},
|
||
doi = {10.1145/2676726.2677001}
|
||
}
|
||
|
||
@inproceedings{Kozen06,
|
||
title = {Coinductive Proof Principles for Stochastic Processes},
|
||
author = {Kozen, Dexter},
|
||
booktitle = lics06,
|
||
pages = {359--366},
|
||
year = {2006},
|
||
organization = ieee
|
||
}
|
||
|
||
@inproceedings{liquid-haskell,
|
||
title = {Abstract refinement types},
|
||
author = {Vazou, Niki and Rondon, Patrick M and Jhala, Ranjit},
|
||
booktitle = esop13,
|
||
pages = {209--228},
|
||
year = {2013},
|
||
publisher = springer
|
||
}
|
||
|
||
@inproceedings{liquid-ml,
|
||
title = {Liquid types},
|
||
author = {Rondon, Patrick M and Kawaguci, Ming and Jhala, Ranjit},
|
||
booktitle = pldi08,
|
||
volume = {43},
|
||
number = {6},
|
||
pages = {159--169},
|
||
year = {2008},
|
||
}
|
||
|
||
@book{Thorisson00,
|
||
author = {Hermann Thorisson},
|
||
title = {Coupling, Stationarity, and Regeneration},
|
||
publisher = springer,
|
||
year = {2000}
|
||
}
|
||
|
||
@book{Lindvall02,
|
||
title = {Lectures on the Coupling Method},
|
||
author = {Lindvall, Torgny},
|
||
year = {2002},
|
||
publisher = {Courier Corporation}
|
||
}
|
||
|
||
@techreport{DengD11,
|
||
Author = {Deng, Yuxin and Du, Wenjie},
|
||
Institution = {Carnegie Mellon University},
|
||
Month = {March},
|
||
Number = {CMU-CS-11-110},
|
||
Title = {Logical, Metric, and Algorithmic Characterisations of Probabilistic Bisimulation},
|
||
Year = {2011},
|
||
url = {https://arxiv.org/abs/1103.4577}
|
||
}
|
||
|
||
@article{Yang07,
|
||
author = {Hongseok Yang},
|
||
title = {Relational separation logic},
|
||
journal = tcs,
|
||
volume = 375,
|
||
number = {1--3},
|
||
year = 2007,
|
||
pages = {308--334},
|
||
url = {https://www.cs.ox.ac.uk/people/hongseok.yang/paper/data.pdf}
|
||
}
|
||
|
||
@article{mufa1994optimal,
|
||
title = {Optimal Markovian couplings and applications},
|
||
author = {Mufa, Chen},
|
||
journal = {Acta Mathematica Sinica},
|
||
volume = {10},
|
||
number = {3},
|
||
pages = {260--275},
|
||
year = {1994},
|
||
publisher = springer
|
||
}
|
||
|
||
@article{mount1974informational,
|
||
title={The informational size of message spaces},
|
||
author={Mount, Kenneth and Reiter, Stanley},
|
||
journal=jet,
|
||
volume={8},
|
||
number={2},
|
||
pages={161--192},
|
||
year={1974},
|
||
url={https://www.kellogg.northwestern.edu/faculty/reiter/papers/22_informationalsize.pdf},
|
||
publisher={Elsevier}
|
||
}
|
||
|
||
@inproceedings{devanur2011prior,
|
||
title={Prior-independent multi-parameter mechanism design},
|
||
author={Devanur, Nikhil and Hartline, Jason and Karlin, Anna and Nguyen, Thach},
|
||
booktitle=wine11,
|
||
pages={122--133},
|
||
year={2011},
|
||
publisher=springer,
|
||
url={https://users.eecs.northwestern.edu/~hartline/papers/auctions-WINE-11.pdf},
|
||
}
|
||
|
||
@inproceedings{CR14,
|
||
author = {Cole, Richard and Roughgarden, Tim},
|
||
title = {The Sample Complexity of Revenue Maximization},
|
||
booktitle = stoc14,
|
||
year = {2014},
|
||
pages = {243--252},
|
||
numpages = {10},
|
||
url={https://arxiv.org/abs/1502.00963},
|
||
keywords = {Myerson's auction, sample complexity},
|
||
}
|
||
|
||
@inproceedings{blum2005near,
|
||
author = {Blum, Avrim and Hartline, Jason D},
|
||
booktitle = soda05,
|
||
pages = {1156--1163},
|
||
publisher = siam,
|
||
title = {Near-optimal online auctions},
|
||
url={https://users.eecs.northwestern.edu/~hartline/papers/online-auctions-SODA-05.pdf},
|
||
year = 2005
|
||
}
|
||
|
||
@inproceedings{balcan2005mechanism,
|
||
author = {Balcan, Maria{-}Florina and
|
||
Blum, Avrim and
|
||
Hartline, Jason D and
|
||
Mansour, Yishay},
|
||
title = {Mechanism Design via Machine Learning},
|
||
booktitle = focs05,
|
||
pages = {605--614},
|
||
url = {https://users.eecs.northwestern.edu/~hartline/papers/auctions-FOCS-05.pdf},
|
||
year = 2005,
|
||
}
|
||
|
||
@INPROCEEDINGS {B+03,
|
||
author = {Blum, Avrim and Kumar, Vijay and Rudra, Atri and Wu, Felix},
|
||
title = "Online Learning in Online Auctions",
|
||
booktitle = soda03,
|
||
url = {https://www.cs.cmu.edu/~avrim/Papers/onlineauction.pdf},
|
||
year = 2003,
|
||
}
|
||
|
||
@inproceedings{CGMsoda13,
|
||
author = {Cesa-Bianchi, Nicolò and Gentile, Claudio and Mansour, Yishay},
|
||
booktitle = soda13,
|
||
pages = {1190--1204},
|
||
publisher = siam,
|
||
title = {Regret Minimization for Reserve Prices in Second-Price Auctions},
|
||
url = {https://epubs.siam.org/doi/pdf/10.1137/1.9781611973105.86},
|
||
year = 2013
|
||
}
|
||
|
||
|
||
@inproceedings{hartline2009simple,
|
||
author = {Hartline, Jason D and Roughgarden, Tim},
|
||
booktitle = ec09,
|
||
title = {Simple versus optimal mechanisms},
|
||
year = 2009,
|
||
url = {https://www.sigecom.org/exchanges/volume_8/1/hartline.pdf},
|
||
}
|
||
|
||
|
||
@Inproceedings {BBDSics11,
|
||
author = {Babaioff, Moshe and Blumrosen, Liad and Dughmi, Shaddin and Singer, Yaron},
|
||
booktitle = itcs11,
|
||
publisher = {Tsinghua University Press},
|
||
title = {Posting Prices with Unknown Distributions},
|
||
year = {2011},
|
||
url = {https://research.microsoft.com/apps/pubs/default.aspx?id=144123},
|
||
}
|
||
|
||
|
||
@inproceedings {morgenstern15pseudo,
|
||
author = {Jamie Morgenstern and Tim Roughgarden},
|
||
title = {The Pseudo-Dimension of Nearly-Optimal Auctions},
|
||
booktitle = nips15,
|
||
year = 2015,
|
||
url = {https://arxiv.org/abs/1506.03684},
|
||
}
|
||
|
||
@inproceedings{RS15,
|
||
author = "Roughgarden, Tim and Schrijvers, Okke",
|
||
title = "Ironing in the Dark",
|
||
booktitle = ec16,
|
||
pages = {1-18},
|
||
year = 2016,
|
||
url = {https://arxiv.org/abs/1511.06918},
|
||
}
|
||
|
||
@inproceedings{rubensteinsubadditive,
|
||
author = {Rubinstein, Aviad and Weinberg, S. Matthew},
|
||
title = {Simple Mechanisms for a Subadditive Buyer and Applications to Revenue Monotonicity},
|
||
booktitle = ec15,
|
||
year = {2015},
|
||
pages = {377--394},
|
||
url = {https://people.csail.mit.edu/smweinberg/ec15subadditive.pdf},
|
||
}
|
||
|
||
@inproceedings{balcan2014learning,
|
||
title={Learning economic parameters from revealed preferences},
|
||
author={Balcan, Maria-Florina and Daniely, Amit and Mehta, Ruta and Urner, Ruth and Vazirani, Vijay V},
|
||
booktitle=wine14,
|
||
pages={338--353},
|
||
year={2014},
|
||
publisher=springer,
|
||
url={https://arxiv.org/abs/1407.7937}
|
||
}
|
||
|
||
@inproceedings{dughmi2014sampling,
|
||
year={2014},
|
||
booktitle=wine14,
|
||
volume={8877},
|
||
series=lncs,
|
||
title={Sampling and Representation Complexity of Revenue Maximization},
|
||
publisher=springer,
|
||
author={Dughmi, Shaddin and Han, Li and Nisan, Noam},
|
||
pages={277--291},
|
||
url={https://arxiv.org/abs/1402.4535},
|
||
}
|
||
|
||
|
||
@inproceedings{babaioffadditive,
|
||
Author = {Babaioff, Moshe and Immorlica, Nicole and Lucier, Brendan and
|
||
Weinberg, S. Matthew},
|
||
Booktitle = focs14,
|
||
Title = {A Simple and Approximately Optimal Mechanism for an Additive Buyer},
|
||
Year = {2014},
|
||
url = {https://arxiv.org/abs/1405.6146}
|
||
}
|
||
|
||
@inproceedings{yao2015soda,
|
||
author = {Yao, Andrew Chi-Chih},
|
||
title = {An $n$-to-$1$ Bidder Reduction for Multi-item Auctions and its Applications},
|
||
booktitle = soda14,
|
||
chapter = {8},
|
||
year={2015},
|
||
pages = {92--109},
|
||
url = {https://arxiv.org/abs/1406.3278}
|
||
}
|
||
|
||
|
||
@inproceedings{huang2014making,
|
||
author = {Huang, Zhiyi and Mansour, Yishay and Roughgarden, Tim},
|
||
title = {Making the Most of Your Samples},
|
||
booktitle = ec15,
|
||
year = {2015},
|
||
isbn = {978-1-4503-3410-5},
|
||
pages = {45--60},
|
||
keywords = {auction, revenue, sample complexity},
|
||
url = {https://arxiv.org/abs/1407.2479},
|
||
}
|
||
|
||
@article{dhangwatnotai2014revenue,
|
||
title={Revenue maximization with a single sample},
|
||
author={Dhangwatnotai, Peerapong and Roughgarden, Tim and Yan, Qiqi},
|
||
journal=geb,
|
||
year={2014},
|
||
publisher={Elsevier},
|
||
url={https://theory.stanford.edu/~tim/papers/single.pdf},
|
||
}
|
||
|
||
|
||
@inproceedings{chawla2007algorithmic,
|
||
author = {Chawla, Shuchi and Hartline, Jason and Kleinberg, Robert},
|
||
title = {Algorithmic Pricing via Virtual Valuations},
|
||
booktitle = ec07,
|
||
year = {2007},
|
||
pages = {243--251},
|
||
url = {https://arxiv.org/abs/0808.1671},
|
||
}
|
||
|
||
@article{GS99a,
|
||
title = "The {English} Auction with Differentiated Commodities",
|
||
journal = jet,
|
||
volume = "92",
|
||
number = "1",
|
||
pages = "66--95",
|
||
year = "2000",
|
||
issn = "0022-0531",
|
||
url = "https://www.sciencedirect.com/science/article/pii/S0022053199925802",
|
||
author = "Faruk Gul and Ennio Stacchetti"
|
||
}
|
||
|
||
|
||
@Article{OL15,
|
||
author={Ostrovsky, Michael and Paes Leme, Renato},
|
||
title={Gross substitutes and endowed assignment valuations},
|
||
journal={Theoretical Economics},
|
||
year=2015,
|
||
volume={10},
|
||
number={3},
|
||
pages={853--865},
|
||
url={https://econtheory.org/ojs/index.php/te/article/viewFile/20150853/13867/412}
|
||
}
|
||
|
||
@inproceedings{Mur96,
|
||
year={1996},
|
||
isbn={978-3-540-61310-7},
|
||
booktitle=ipco06,
|
||
volume={1084},
|
||
series=lncs,
|
||
title={Convexity and {Steinitz}'s exchange property},
|
||
url={https://dx.doi.org/10.1007/3-540-61310-2_20},
|
||
publisher=springer,
|
||
author={Murota, Kazuo},
|
||
pages={260--274},
|
||
}
|
||
|
||
@article{MS99,
|
||
author = {Murota, Kazuo and Shioura, Akiyoshi},
|
||
title = {{M}-{Convex} Function on Generalized Polymatroid},
|
||
journal = {Mathematics of Operations Research},
|
||
volume = {24},
|
||
number = {1},
|
||
pages = {95--105},
|
||
year = {1999},
|
||
doi = {10.1287/moor.24.1.95},
|
||
}
|
||
|
||
@article{FY03,
|
||
author = {Fujishige, Satoru and Yang, Zaifu},
|
||
title = {A Note on {Kelso} and {Crawford}'s {Gross} {Substitutes} Condition},
|
||
journal = {Mathematics of Operations Research},
|
||
volume = {28},
|
||
number = {3},
|
||
pages = {463--469},
|
||
year = {2003},
|
||
doi = {10.1287/moor.28.3.463.16393},
|
||
}
|
||
|
||
@article{MT10,
|
||
title = "Characterization of the {Walrasian} equilibria of the assignment model ",
|
||
journal = "Journal of Mathematical Economics",
|
||
volume = "46",
|
||
number = "1",
|
||
pages = "6--20",
|
||
year = "2010",
|
||
issn = "0304-4068",
|
||
url = "https://www.sciencedirect.com/science/article/pii/S0304406809000627",
|
||
author = "Debasis Mishra and Dolf Talman",
|
||
}
|
||
|
||
|
||
@book{shalev2014book,
|
||
title={Understanding Machine Learning: From Theory to Algorithms},
|
||
author={Shalev-Shwartz, Shai and Ben-David, Shai},
|
||
year=2014,
|
||
publisher=cup
|
||
}
|
||
|
||
@article{BLN13,
|
||
author = {Ben-Zwi, Oren and
|
||
Lavi, Ron and
|
||
Newman, Ilan},
|
||
title = {Ascending auctions and Walrasian equilibrium},
|
||
journal = {CoRR},
|
||
volume = {abs/1301.1153},
|
||
year = {2013},
|
||
url = {https://arxiv.org/abs/1301.1153},
|
||
}
|
||
|
||
|
||
@article{ehrenfeucht1989general,
|
||
title={A general lower bound on the number of examples needed for learning},
|
||
author={Ehrenfeucht, Andrzej and Haussler, David and Kearns, Michael and Valiant, Leslie},
|
||
journal={Information and Computation},
|
||
volume={82},
|
||
number={3},
|
||
pages={247--261},
|
||
year={1989},
|
||
url={https://www.cis.upenn.edu/~mkearns/papers/lower.pdf},
|
||
publisher={Elsevier},
|
||
}
|
||
|
||
|
||
@book{vapnik1982estimation,
|
||
title={Estimation of dependences based on empirical data},
|
||
author={Vapnik, Vladimir Naumovich and Kotz, Samuel},
|
||
year={1982},
|
||
publisher=springer,
|
||
}
|
||
|
||
@inproceedings{daniely2014multiclass,
|
||
title={Optimal learners for multiclass problems},
|
||
author={Daniely, Amit and Shalev-Shwartz, Shai},
|
||
booktitle=colt14,
|
||
pages={287--316},
|
||
url={https://arxiv.org/abs/1405.2420},
|
||
year={2014}
|
||
}
|
||
|
||
@techreport{littlestone1986compression,
|
||
title={Relating data compression and learnability},
|
||
author={Littlestone, Nick and Warmuth, Manfred},
|
||
year={1986},
|
||
url={https://users.soe.ucsc.edu/~manfred/pubs/lrnk-olivier.pdf},
|
||
institution={University of California, Santa Cruz}
|
||
}
|
||
|
||
@article{murota1996valuated,
|
||
title={Valuated matroid intersection {I}: Optimality criteria},
|
||
author={Murota, Kazuo},
|
||
journal={{SIAM} Journal on Discrete Mathematics},
|
||
volume={9},
|
||
number={4},
|
||
pages={545--561},
|
||
year={1996},
|
||
url={https://www.keisu.t.u-tokyo.ac.jp/research/techrep/data/2003/METR03-42.pdf},
|
||
}
|
||
|
||
@article{ST15,
|
||
author = {Shioura, Akiyoshi and Tamura, Akihisa},
|
||
title = {Gross Substitutes Condition and Discrete Concavity for Multi-Unit
|
||
Valuations: {A} Survey},
|
||
journal = {Journal of the Operations Research Society of Japan},
|
||
volume = {58},
|
||
number = {1},
|
||
year = 2015,
|
||
pages = {61--103},
|
||
url = {https://www.orsj.or.jp/~archive/pdf/e_mag/Vol.58_01_061.pdf}
|
||
}
|
||
|
||
@Book{Matroid,
|
||
Title = {Matroid Theory},
|
||
Author = {Oxley, James G},
|
||
Publisher = {Oxford University Press},
|
||
Year = {1997},
|
||
Series = {Oxford Graduate Texts in Mathematics},
|
||
}
|
||
|
||
@inproceedings{elkind2007,
|
||
title={Designing and learning optimal finite support auctions},
|
||
author={Elkind, Edith},
|
||
booktitle=ec07,
|
||
pages={736--745},
|
||
year={2007},
|
||
url={https://eprints.soton.ac.uk/263443/1/finsup.pdf}
|
||
}
|
||
|
||
@inproceedings{medina2014learning,
|
||
title={Learning Theory and Algorithms for revenue optimization in second price auctions with reserve},
|
||
author={Medina, Andres Munoz and Mohri, Mehryar},
|
||
booktitle=icml14,
|
||
pages={262--270},
|
||
year={2014},
|
||
url={https://arxiv.org/abs/1310.5665}
|
||
}
|
||
|
||
@article{arrow1954existence,
|
||
title={Existence of an equilibrium for a competitive economy},
|
||
author={Arrow, Kenneth J and Debreu, Gerard},
|
||
journal={Econometrica},
|
||
pages={265--290},
|
||
year={1954},
|
||
url={https://web.stanford.edu/class/msande311/arrow-debreu.pdf}
|
||
}
|
||
|
||
@inproceedings{deng02complexity,
|
||
author = {Deng, Xiaotie and Papadimitriou, Christos and Safra, Shmuel},
|
||
title = {On the Complexity of Equilibria},
|
||
booktitle = stoc02,
|
||
year = {2002},
|
||
isbn = {1-58113-495-9},
|
||
pages = {67--71},
|
||
numpages = {5},
|
||
acmid = {509920},
|
||
url={https://dl.acm.org/citation.cfm?id=509920}
|
||
}
|
||
|
||
@article{nisan06communication,
|
||
Author = {Nisan, Noam and Segal, Ilya},
|
||
Issn = {0022-0531},
|
||
Journal = jet,
|
||
Keywords = {Distributional complexity},
|
||
Number = {1},
|
||
Pages = {192--224},
|
||
Title = {The communication requirements of efficient allocations and supporting prices},
|
||
Volume = {129},
|
||
Year = {2006},
|
||
url={https://web.stanford.edu/~isegal/prices.pdf}
|
||
}
|
||
|
||
@inproceedings{DH09,
|
||
title={The {Adwords} problem: {Online} keyword matching with budgeted bidders under random permutations},
|
||
author={Devanur, Nikhil R and Hayes, Thomas P},
|
||
booktitle=ec09,
|
||
pages={71--78},
|
||
year={2009},
|
||
url={https://research.microsoft.com/en-us/um/people/nikdev/pubs/adwords.pdf}
|
||
}
|
||
|
||
@techreport{samplingbalcan07,
|
||
title = {Random Sampling Auctions for Limited Supply},
|
||
author = {Balcan, Maria-Florina and Devanur, Nikhil and
|
||
Hartline, Jason D and Talwar, Kunal},
|
||
url = {https://reports-archive.adm.cs.cmu.edu/anon/2007/CMU-CS-07-154.pdf},
|
||
year = {2007},
|
||
institution = {Carnegie Mellon University},
|
||
Date-Added = {09-01-2007},
|
||
}
|
||
|
||
@article{hanneke15,
|
||
author = {Hanneke, Steve},
|
||
title = {The Optimal Sample Complexity of {PAC} Learning},
|
||
journal = {CoRR},
|
||
volume = {abs/1507.00473},
|
||
year = {2015},
|
||
url = {https://arxiv.org/abs/1507.00473},
|
||
timestamp = {Sun, 02 Aug 2015 18:42:02 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/corr/Hanneke15},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{pollard1984,
|
||
title= "Convergence of stochastic processes",
|
||
author={Pollard, David},
|
||
year={1984},
|
||
publisher={David Pollard},
|
||
url = {https://www.stat.yale.edu/~pollard/Books/1984book/pollard1984.pdf},
|
||
}
|
||
|
||
|
||
@article{VC,
|
||
title={On the uniform convergence of relative frequencies of events to their probabilities},
|
||
author={Vapnik, Vladimir N and Chervonenkis, A Ya},
|
||
journal={Theory of Probability \& Its Applications},
|
||
volume={16},
|
||
number={2},
|
||
pages={264--280},
|
||
year={1971},
|
||
url={https://www.springer.com/cda/content/document/cda_downloaddocument/9783642411359-c1.pdf?SGWID=0-0-45-1431218-p175483535},
|
||
publisher=siam
|
||
}
|
||
|
||
|
||
@book{AB,
|
||
author = "Anthony, Martin and Bartlett, Peter L",
|
||
title = {Neural Network Learning: Theoretical Foundations},
|
||
year = {1999},
|
||
publisher = cup,
|
||
}
|
||
|
||
@inproceedings{DNRR15,
|
||
year={2015},
|
||
isbn={978-3-662-48799-0},
|
||
booktitle=ascrypt15,
|
||
title={Pure Differential Privacy for Rectangle Queries via Private Partitions},
|
||
url={https://dx.doi.org/10.1007/978-3-662-48800-3_30},
|
||
publisher=springer,
|
||
author={Dwork, Cynthia and Naor, Moni and Reingold, Omer and Rothblum, Guy N},
|
||
pages={735--751},
|
||
}
|
||
|
||
@inproceedings{BartheO13,
|
||
author = {Barthe, Gilles and
|
||
Olmedo, Federico},
|
||
title = {Beyond Differential Privacy: Composition Theorems and Relational Logic
|
||
for $f$-Divergences between Probabilistic Programs},
|
||
booktitle = icalp13,
|
||
series = lncs,
|
||
volume = {7966},
|
||
pages = {49--60},
|
||
publisher = springer,
|
||
year = {2013},
|
||
doi = {10.1007/978-3-642-39212-2_8},
|
||
url = {https://certicrypt.gforge.inria.fr/2013.ICALP.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/stoc/DworkFHPRR15,
|
||
author = {Dwork, Cynthia and
|
||
Feldman, Vitaly and
|
||
Hardt, Moritz and
|
||
Pitassi, Toniann and
|
||
Reingold, Omer and
|
||
Roth, Aaron},
|
||
title = {Preserving Statistical Validity in Adaptive Data Analysis},
|
||
booktitle = stoc15,
|
||
pages = {117--126},
|
||
year = {2015},
|
||
url = {https://doi.acm.org/10.1145/2746539.2746580},
|
||
}
|
||
@inproceedings{xu:hal-00879140,
|
||
TITLE = {Metrics for Differential Privacy in Concurrent Systems},
|
||
AUTHOR = {Xu, Lili and Chatzikokolakis, Konstantinos and Lin, Huimin},
|
||
URL = {https://hal.inria.fr/hal-00879140},
|
||
BOOKTITLE = {IFIP International Conference on Formal Techniques for Distributed
|
||
Objects, Components and Systems (FORTE), Berlin, Germany},
|
||
EDITOR = {Erika Abraham and Catuscia Palamidessi},
|
||
PUBLISHER = springer,
|
||
SERIES = lncs,
|
||
VOLUME = {8461},
|
||
PAGES = {199--215},
|
||
YEAR = {2014},
|
||
MONTH = Jun,
|
||
KEYWORDS = {differential privacy ; probabilistic automata ; bisimulation metrics ; verification},
|
||
PDF = {https://hal.inria.fr/hal-00879140/file/forte-hal.pdf},
|
||
HAL_ID = {hal-00879140},
|
||
HAL_VERSION = {v2},
|
||
}
|
||
|
||
@InProceedings{ChakarovS14,
|
||
author = {Aleksandar Chakarov and Sriram Sankaranarayanan},
|
||
title = {Expectation Invariants as Fixed Points of Probabilistic Programs},
|
||
year = {2014},
|
||
pages = {85--100},
|
||
publisher = springer,
|
||
booktitle = sas14,
|
||
series = lncs,
|
||
volume = {8723},
|
||
url = {https://www.cs.colorado.edu/~srirams/papers/sas14-expectations.pdf}
|
||
}
|
||
|
||
@inproceedings{CousotM12,
|
||
author = {Patrick Cousot and
|
||
Michael Monerau},
|
||
title = {Probabilistic Abstract Interpretation},
|
||
booktitle = esop12,
|
||
series = lncs,
|
||
volume = {7211},
|
||
pages = {169--193},
|
||
publisher = springer,
|
||
year = {2012},
|
||
url = {https://www.di.ens.fr/~cousot/publications.www/Cousot-Monerau-ESOP2012-extended.pdf}
|
||
}
|
||
|
||
@incollection{dwork2006our,
|
||
title={Our data, ourselves: Privacy via distributed noise generation},
|
||
author={Dwork, Cynthia and
|
||
Kenthapadi, Krishnaram and
|
||
{McSherry}, Frank and
|
||
Mironov, Ilya and
|
||
Naor, Moni},
|
||
booktitle=eucrypt06,
|
||
pages={486--503},
|
||
year={2006},
|
||
publisher=springer
|
||
}
|
||
|
||
@article{lyu2016understanding,
|
||
title={Understanding the {Sparse Vector Technique} for Differential Privacy},
|
||
author={Lyu, Min and Su, Dong and Li, Ninghui},
|
||
journal=pvldb,
|
||
note=vldb17,
|
||
volume=10,
|
||
number=6,
|
||
pages={637--648},
|
||
url={https://arxiv.org/abs/1603.01699},
|
||
doi={10.14778/3055330.3055331},
|
||
year={2017},
|
||
}
|
||
|
||
inproceedings{DBLP:journals/corr/OhV13,
|
||
author = {
|
||
Peter Kairouz and
|
||
Sewoong Oh and
|
||
Pramod Viswanath},
|
||
title = {The Composition Theorem for Differential Privacy},
|
||
booktitle = icml15,
|
||
pages = {1376--1385},
|
||
volume = 37,
|
||
series = pmlr,
|
||
url = {https://arxiv.org/abs/1311.0776},
|
||
year = {2015},
|
||
}
|
||
|
||
@article{DBLP:journals/corr/OhV13,
|
||
author={P. Kairouz and S. Oh and P. Viswanath},
|
||
journal={IEEE Transactions on Information Theory},
|
||
title={The Composition Theorem for Differential Privacy},
|
||
year={2017},
|
||
volume={63},
|
||
number={6},
|
||
pages={4037--4049},
|
||
keywords={data privacy;composition theorem;data processing
|
||
inequality;differential privacy;privatization mechanisms;Data
|
||
privacy;Data processing;Databases;Electronic
|
||
mail;Privacy;Privatization;Testing;Differential privacy;hypothesis
|
||
testing},
|
||
doi={10.1109/TIT.2017.2685505},
|
||
url={https://arxiv.org/abs/1311.0776},
|
||
ISSN={0018-9448},
|
||
month={June},}
|
||
|
||
@article{dwork2015reusable,
|
||
title={The reusable holdout: Preserving validity in adaptive data analysis},
|
||
author={Dwork, Cynthia and Feldman, Vitaly and Hardt, Moritz and Pitassi,
|
||
Toniann and Reingold, Omer and Roth, Aaron},
|
||
journal={Science},
|
||
volume={349},
|
||
number={6248},
|
||
pages={636--638},
|
||
year={2015},
|
||
publisher={American Association for the Advancement of Science}
|
||
}
|
||
|
||
@article{aldous93shift,
|
||
author = {Aldous, D. J. and Thorisson, H.},
|
||
citeulike-article-id = {4046853},
|
||
journal = {Stochastic Proc. Appl},
|
||
keywords = {aldousbib},
|
||
mrnumber = {1198659},
|
||
pages = {1--14},
|
||
posted-at = {2009-02-13 21:55:05},
|
||
priority = {2},
|
||
title = {{Shift-Coupling}},
|
||
volume = {44},
|
||
year = {1993}
|
||
}
|
||
|
||
@inproceedings{bubley1997path,
|
||
title={Path Coupling: {A} Technique for Proving Rapid Mixing in {Markov} Chains},
|
||
author={Bubley, Russ and Dyer, Martin},
|
||
booktitle=focs97,
|
||
pages={223--231},
|
||
year={1997},
|
||
doi={10.1109/SFCS.1997.646111},
|
||
url={https://ieeexplore.ieee.org/document/646111/}
|
||
}
|
||
|
||
@unpublished{DworkRothblumCDP,
|
||
author = {Cynthia Dwork and
|
||
Guy N. Rothblum},
|
||
title = {Concentrated Differential Privacy},
|
||
journal = {CoRR},
|
||
volume = {abs/1603.01887},
|
||
year = {2016},
|
||
url = {https://arxiv.org/abs/1603.01887},
|
||
timestamp = {Wed, 07 Jun 2017 14:40:05 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/corr/DworkR16},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{BunS2016,
|
||
author = {Bun, Mark and Steinke, Thomas},
|
||
title = {Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds},
|
||
archivePrefix = "arXiv",
|
||
eprint = {1605.02065},
|
||
primaryClass = "cs.CR",
|
||
booktitle = tcc16b,
|
||
pages={635--658},
|
||
series = lncs,
|
||
year = {2016},
|
||
volume = {9985},
|
||
doi = {10.1007/978-3-662-53641-4_24},
|
||
publisher = springer,
|
||
}
|
||
|
||
@inproceedings{MironovRDP,
|
||
title = {R\'enyi Differential Privacy},
|
||
author = {Ilya Mironov},
|
||
year = 2017,
|
||
URL = {https://arxiv.org/abs/1702.07476},
|
||
booktitle = csf17,
|
||
doi = {10.1109/CSF.2017.11},
|
||
pages = {263--275}
|
||
}
|
||
|
||
@inproceedings{BunSU16,
|
||
author = {Bun, Mark and Steinke, Thomas and Ullman, Jonathan},
|
||
title = {Make Up Your Mind: The Price of Online Queries in Differential Privacy},
|
||
booktitle = soda17,
|
||
pages = {1306--1325},
|
||
year = 2017,
|
||
doi = {10.1137/1.9781611974782.85},
|
||
url = {https://arxiv.org/abs/1604.04618}
|
||
}
|
||
|
||
@inproceedings{moser2009constructive,
|
||
title={A constructive proof of the {Lov{\'a}sz Local Lemma}},
|
||
author={Moser, Robin A},
|
||
booktitle=stoc09,
|
||
pages={343--350},
|
||
year={2009},
|
||
}
|
||
|
||
@inproceedings{micciancio1997oblivious,
|
||
title={Oblivious data structures: {Applications} to cryptography},
|
||
author={Micciancio, Daniele},
|
||
booktitle=stoc97,
|
||
pages={456--464},
|
||
year={1997},
|
||
}
|
||
|
||
@inproceedings{jonsson1991specification,
|
||
title={Specification and Refinement of Probabilistic Processes},
|
||
author={Jonsson, Bengt and Larsen, Kim Guldstrand},
|
||
booktitle=lics91,
|
||
pages={266--277},
|
||
year={1991},
|
||
doi={10.1109/LICS.1991.151651},
|
||
url={https://ieeexplore.ieee.org/document/151651/}
|
||
}
|
||
|
||
@inproceedings{rogers2016privacy,
|
||
title={Privacy Odometers and Filters: Pay-as-you-go Composition},
|
||
author={Rogers, Ryan and Vadhan, Salil and Roth, Aaron and Ullman, Jonathan},
|
||
booktitle=nips16,
|
||
pages={1921--1929},
|
||
year={2016},
|
||
url={https://arxiv.org/abs/1605.08294}
|
||
}
|
||
|
||
@inproceedings{sousa2016cartesian,
|
||
title={Cartesian {Hoare} Logic for Verifying $k$-Safety Properties},
|
||
author={Sousa, Marcelo and Dillig, Isil},
|
||
booktitle=pldi16,
|
||
pages={57--69},
|
||
year={2016},
|
||
doi={10.1145/2908080.2908092},
|
||
url={https://dl.acm.org/citation.cfm?id=2908092}
|
||
}
|
||
|
||
@inproceedings{BKOZ12-popl,
|
||
title={Probabilistic relational reasoning for differential privacy},
|
||
author={Barthe, Gilles and K{\"o}pf, Boris and Olmedo, Federico and
|
||
Zanella B{\'e}guelin, Santiago},
|
||
booktitle=popl12,
|
||
volume={47},
|
||
number={1},
|
||
pages={97--110},
|
||
year={2012},
|
||
}
|
||
|
||
@inproceedings{zhang2016autopriv,
|
||
author = {Zhang, Danfeng and Kifer, Daniel},
|
||
title = {{LightDP}: Towards Automating Differential Privacy Proofs},
|
||
booktitle = popl17,
|
||
year = {2017},
|
||
pages = {888--901},
|
||
doi = {10.1145/3009837.3009884},
|
||
url = {https://arxiv.org/abs/1607.08228},
|
||
}
|
||
|
||
|
||
@article{JerrumS89,
|
||
author = {Mark Jerrum and
|
||
Alistair Sinclair},
|
||
title = {Approximating the Permanent},
|
||
journal = siamjc,
|
||
volume = {18},
|
||
number = {6},
|
||
pages = {1149--1178},
|
||
year = {1989},
|
||
url = {https://dx.doi.org/10.1137/0218077},
|
||
doi = {10.1137/0218077},
|
||
timestamp = {Mon, 12 Sep 2011 16:10:07 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/siamcomp/JerrumS89},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/rsa/Jerrum95,
|
||
author = {Mark Jerrum},
|
||
title = {A Very Simple Algorithm for Estimating the Number of
|
||
$k$-Colorings of a Low-Degree Graph},
|
||
journal = {Random Structures and Algorithms},
|
||
volume = {7},
|
||
number = {2},
|
||
pages = {157--166},
|
||
year = {1995},
|
||
url = {https://dx.doi.org/10.1002/rsa.3240070205},
|
||
doi = {10.1002/rsa.3240070205},
|
||
publisher = {Wiley},
|
||
timestamp = {Sat, 14 Apr 2012 16:35:21 +0200},
|
||
biburl =
|
||
{https://dblp.uni-trier.de/rec/bib/journals/rsa/Jerrum95},
|
||
bibsource = {dblp computer science bibliography,
|
||
https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{Sato16,
|
||
title = {Approximate Relational {Hoare} Logic for Continuous Random Samplings},
|
||
author = {Tetsuya Sato},
|
||
booktitle = mfps16,
|
||
pages = {277--298},
|
||
year = 2016,
|
||
volume = 325,
|
||
url = {https://arxiv.org/abs/1603.01445},
|
||
doi = {10.1016/j.entcs.2016.09.043},
|
||
series = entcs,
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{strassen1965existence,
|
||
title={The Existence of Probability Measures with Given Marginals},
|
||
author={Strassen, Volker},
|
||
journal={The Annals of Mathematical Statistics},
|
||
pages={423--439},
|
||
year={1965},
|
||
doi={10.1214/aoms/1177700153},
|
||
publisher={Institute of Mathematical Statistics},
|
||
url={https://projecteuclid.org/euclid.aoms/1177700153}
|
||
}
|
||
|
||
@inproceedings{tracolDZ11,
|
||
author = {Mathieu Tracol and
|
||
Jos{\'e}e Desharnais and
|
||
Abir Zhioua},
|
||
title = {Computing Distances between Probabilistic Automata},
|
||
booktitle = {Workshop on Quantitative Aspects of Programming
|
||
Languages ({QAPL}), Saarbr{\"{u}}cken, Germany},
|
||
pages = {148--162},
|
||
year = {2011},
|
||
series = eptcs,
|
||
volume = 57,
|
||
publisher = {Open Publishing Association},
|
||
url = {https://dx.doi.org/10.4204/EPTCS.57.11},
|
||
doi = {10.4204/EPTCS.57.11},
|
||
timestamp = {Mon, 28 Oct 2013 16:56:55 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/corr/abs-1107-1206},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{desharnaisLT08,
|
||
author = {Jos{\'e}e Desharnais and
|
||
Fran{\c{c}}ois Laviolette and
|
||
Mathieu Tracol},
|
||
booktitle={International Conference on Quantitative Evaluation of Systems
|
||
({QEST}), Saint Malo, France},
|
||
title={Approximate Analysis of Probabilistic Processes: Logic, Simulation and Games},
|
||
year={2008},
|
||
pages={264--273},
|
||
publisher=ieee,
|
||
doi={10.1109/QEST.2008.42}}
|
||
|
||
inproceedings{LarsenS89,
|
||
author = {Larsen, Kim Guldstrand and
|
||
Skou, Arne},
|
||
title = {Bisimulation through Probabilistic Testing},
|
||
booktitle = popl89,
|
||
pages = {344--352},
|
||
year = {1989},
|
||
url = {https://doi.acm.org/10.1145/75277.75307},
|
||
doi = {10.1016/0890-5401(91)90030-6},
|
||
timestamp = {Mon, 21 May 2012 16:19:51 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/popl/LarsenS89},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{LarsenS89,
|
||
author = {Larsen, Kim Guldstrand and
|
||
Skou, Arne},
|
||
title = {Bisimulation through Probabilistic Testing},
|
||
journal = {Information and Computation},
|
||
volume = {94},
|
||
number = {1},
|
||
pages = {1--28},
|
||
year = {1991},
|
||
doi = {10.1016/0890-5401(91)90030-6},
|
||
url = {https://www.sciencedirect.com/science/article/pii/0890540191900306},
|
||
publisher = elsevier,
|
||
timestamp = {Mon, 21 May 2012 16:19:51 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/popl/LarsenS89},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{giacalone1990algebraic,
|
||
title={Algebraic Reasoning for Probabilistic Concurrent Systems},
|
||
author={Giacalone, Alessandro and Jou, Chi-Chang and Smolka, Scott A.},
|
||
booktitle={{IFIP} {TC2} Working Conference on Programming Concepts and Methods},
|
||
year={1990},
|
||
url={https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.3664}
|
||
}
|
||
|
||
@inproceedings{SegalaTurrini07,
|
||
author={Roberto Segala and Andrea Turrini},
|
||
booktitle=csf07,
|
||
title={Approximated Computationally Bounded Simulation Relations for Probabilistic Automata},
|
||
year={2007},
|
||
pages={140--156},
|
||
doi={10.1109/CSF.2007.8},
|
||
ISSN={1063-6900},
|
||
month=jul
|
||
}
|
||
|
||
@phdthesis{OlmedoThesis,
|
||
title = {Approximate Relational Reasoning for Probabilistic Programs},
|
||
author = {Federico Olmedo},
|
||
school = {Universidad Polit\'ecnica de Madrid},
|
||
year = {2014},
|
||
url = {https://oa.upm.es/23088/1/FEDERICO_OLMEDO.pdf}
|
||
}
|
||
|
||
@article{DBLP:journals/jct/AharoniBGPS11,
|
||
author = {Ron Aharoni and
|
||
Eli Berger and
|
||
Agelos Georgakopoulos and
|
||
Amitai Perlstein and
|
||
Philipp Spr{\"{u}}ssel},
|
||
title = {The Max-Flow Min-Cut Theorem for Countable Networks},
|
||
journal = {Journal of Combinatorial Theory, Series B},
|
||
volume = {101},
|
||
number = {1},
|
||
pages = {1--17},
|
||
year = {2011},
|
||
url = {https://dx.doi.org/10.1016/j.jctb.2010.08.002},
|
||
doi = {10.1016/j.jctb.2010.08.002},
|
||
timestamp = {Sat, 04 Dec 2010 15:33:06 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/jct/AharoniBGPS11},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{katsumata2015codensity,
|
||
title={Codensity Liftings of Monads},
|
||
author={Katsumata, Shin-ya and Sato, Tetsuya},
|
||
booktitle= calco15,
|
||
series = lipics,
|
||
pages ={156--170},
|
||
year = 2015,
|
||
publisher = dagstuhl,
|
||
volume={35},
|
||
doi={10.4230/LIPIcs.CALCO.2015.156},
|
||
url = {https://drops.dagstuhl.de/opus/volltexte/2015/5532},
|
||
}
|
||
|
||
@inproceedings{aldous1983random,
|
||
title={Random Walks on Finite Groups and Rapidly Mixing {Markov} Chains},
|
||
author={Aldous, David},
|
||
booktitle={S{\'e}minaire de Probabilit{\'e}s {XVII} 1981/82},
|
||
pages={243--297},
|
||
series=lnm,
|
||
volume=986,
|
||
year={1983},
|
||
publisher=springer,
|
||
url={https://eudml.org/doc/113445}
|
||
}
|
||
|
||
@book{RudinPMA,
|
||
AUTHOR = {Rudin, Walter},
|
||
TITLE = {Principles of Mathematical Analysis},
|
||
EDITION = {Third},
|
||
SERIES = {International Series in Pure and Applied Mathematics},
|
||
PUBLISHER = mcgh,
|
||
YEAR = {1976},
|
||
MRCLASS = {26-02},
|
||
MRNUMBER = {0385023},
|
||
}
|
||
|
||
@inproceedings{adafuzz,
|
||
title={A Framework for Adaptive Differential Privacy},
|
||
author={Winograd-Cort, Daniel and
|
||
Haeberlen, Andreas and
|
||
Roth, Aaron and
|
||
Pierce, Benjamin C.},
|
||
booktitle= icfp17,
|
||
year = 2017,
|
||
doi = {10.1145/3110254},
|
||
pages = {10:1--10:29},
|
||
url = {https://dl.acm.org/citation.cfm?id=3110254}
|
||
}
|
||
|
||
@book{Kleinberg:2005:AD:1051910,
|
||
author = {Kleinberg, Jon and Tardos, Eva},
|
||
title = {Algorithm Design},
|
||
year = {2005},
|
||
isbn = {0321295358},
|
||
publisher = aw,
|
||
}
|
||
|
||
@inproceedings{bornholt2016optimizing,
|
||
title={Optimizing synthesis with metasketches},
|
||
author={Bornholt, James and Torlak, Emina and Grossman, Dan and Ceze, Luis},
|
||
booktitle=popl16,
|
||
pages={775--788},
|
||
year={2016},
|
||
}
|
||
|
||
@inproceedings{dwork2009complexity,
|
||
title={On the complexity of differentially private data release: efficient algorithms and hardness results},
|
||
author={Dwork, Cynthia and Naor, Moni and Reingold, Omer and Rothblum, Guy N and Vadhan, Salil},
|
||
booktitle=stoc09,
|
||
pages={381--390},
|
||
year={2009},
|
||
}
|
||
|
||
@inproceedings{graf1997construction,
|
||
title={Construction of abstract state graphs with PVS},
|
||
author={Graf, Susanne and Sa{\"\i}di, Hassen},
|
||
booktitle=cav97,
|
||
pages={72--83},
|
||
year={1997},
|
||
organization=springer
|
||
}
|
||
|
||
@inproceedings{alur2013syntax,
|
||
title={Syntax-guided synthesis},
|
||
author={Alur, Rajeev and Bodik, Rastislav and Juniwal, Garvit and Martin, Milo MK and Raghothaman, Mukund and Seshia, Sanjit A and Singh, Rishabh and Solar-Lezama, Armando and Torlak, Emina and Udupa, Abhishek},
|
||
booktitle={Formal Methods in Computer-Aided Design {(FMCAD)}, Portland, Oregon},
|
||
pages={1--8},
|
||
year={2013},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@inproceedings{hojjat2012verification,
|
||
title={A verification toolkit for numerical transition systems},
|
||
author={Hojjat, Hossein and Kone{\v{c}}n{\`y}, Filip and Garnier, Florent and Iosif, Radu and Kuncak, Viktor and R{\"u}mmer, Philipp},
|
||
booktitle=fm12,
|
||
pages={247--251},
|
||
year={2012},
|
||
organization=springer
|
||
}
|
||
|
||
@techreport{mcmillan2013solving,
|
||
title={Solving constrained {Horn} clauses using interpolation},
|
||
author={McMillan, Kenneth L and Rybalchenko, Andrey},
|
||
number={MSR-TR-2013-6},
|
||
institution={Microsoft Research},
|
||
year={2013}
|
||
}
|
||
|
||
@inproceedings{beyer2009software,
|
||
title={Software model checking via large-block encoding},
|
||
author={Beyer, Dirk and Cimatti, Alessandro and Griggio, Alberto and Keremoglu, M Erkan and Sebastiani, Roberto},
|
||
booktitle={Formal Methods in Computer-Aided Design {(FMCAD)}, Austin, Texas},
|
||
pages={25--32},
|
||
year={2009},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@inproceedings{mathsat,
|
||
title={The {MathSAT5} {SMT} Solver.},
|
||
author={Cimatti, Alessandro and Griggio, Alberto and Schaafsma, Bastiaan Joost and Sebastiani, Roberto},
|
||
booktitle=tacas13,
|
||
volume={7795},
|
||
pages={93--107},
|
||
year={2013},
|
||
organization=springer
|
||
}
|
||
|
||
|
||
@inproceedings{grebenshchikov2012hsf,
|
||
title={{HSF (C)}: {A} software verifier based on {Horn} clauses},
|
||
author={Grebenshchikov, Sergey and Gupta, Ashutosh and Lopes, Nuno P and Popeea, Corneliu and Rybalchenko, Andrey},
|
||
booktitle=tacas12,
|
||
pages={549--551},
|
||
year={2012},
|
||
organization=springer
|
||
}
|
||
|
||
|
||
@inproceedings{grebenshchikov2012,
|
||
author = {Grebenshchikov, Sergey and Lopes, Nuno P. and Popeea, Corneliu and Rybalchenko, Andrey},
|
||
title = {Synthesizing Software Verifiers from Proof Rules},
|
||
booktitle = pldi12,
|
||
year = {2012},
|
||
isbn = {978-1-4503-1205-9},
|
||
location = {Beijing, China},
|
||
pages = {405--416},
|
||
numpages = {12},
|
||
url = {https://doi.acm.org/10.1145/2254064.2254112},
|
||
doi = {10.1145/2254064.2254112},
|
||
acmid = {2254112},
|
||
keywords = {proof rules, software model checking, software verification, verification tool synthesis},
|
||
}
|
||
|
||
|
||
@inproceedings{gurfinkel2015seahorn,
|
||
title={{SeaHorn}: {A} Framework for Verifying {C} Programs (Competition Contribution).},
|
||
author={Gurfinkel, Arie and Kahsai, Temesghen and Navas, Jorge A},
|
||
booktitle=tacas15,
|
||
pages={447--450},
|
||
year={2015}
|
||
}
|
||
|
||
@inproceedings{hoder2011muz,
|
||
title={$\mu${Z}-An Efficient Engine for Fixed Points with Constraints.},
|
||
author={Hoder, Krystof and Bj{\o}rner, Nikolaj and de Moura, Leonardo Mendon{\c{c}}a},
|
||
booktitle=cav11,
|
||
pages={457--462},
|
||
year={2011},
|
||
organization=springer
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/asplos/Solar-LezamaTBSS06,
|
||
author = {Armando Solar{-}Lezama and
|
||
Liviu Tancau and
|
||
Rastislav Bod{\'{\i}}k and
|
||
Sanjit A. Seshia and
|
||
Vijay A. Saraswat},
|
||
title = {Combinatorial sketching for finite programs},
|
||
booktitle = asplos06,
|
||
pages = {404--415},
|
||
year = {2006},
|
||
url = {https://doi.acm.org/10.1145/1168857.1168907},
|
||
doi = {10.1145/1168857.1168907},
|
||
timestamp = {Tue, 15 May 2007 09:22:32 +0200},
|
||
biburl =
|
||
{https://dblp.dagstuhl.de/rec/bib/conf/asplos/Solar-LezamaTBSS06},
|
||
bibsource = {dblp computer science bibliography,
|
||
https://dblp.org}
|
||
}
|
||
|
||
@article{pnueli1998translation,
|
||
title={Translation validation},
|
||
author={Pnueli, Amir and Siegel, Michael and Singerman, Eli},
|
||
journal=tacas98,
|
||
pages={151--166},
|
||
year={1998},
|
||
publisher=springer
|
||
}
|
||
|
||
@inproceedings{necula2000translation,
|
||
title={Translation validation for an optimizing compiler},
|
||
author={Necula, George C},
|
||
booktitle=pldi00,
|
||
volume={35},
|
||
number={5},
|
||
pages={83--94},
|
||
year={2000},
|
||
}
|
||
|
||
@inproceedings{kopf2010approximation,
|
||
title={Approximation and randomization for quantitative information-flow analysis},
|
||
author={K{\"o}pf, Boris and Rybalchenko, Andrey},
|
||
booktitle=csf10,
|
||
pages={3--14},
|
||
year={2010},
|
||
}
|
||
|
||
@inproceedings{Srivastava10,
|
||
author = {Srivastava, Saurabh and Gulwani, Sumit and Foster, Jeffrey S.},
|
||
title = {From Program Verification to Program Synthesis},
|
||
booktitle = popl10,
|
||
year = {2010},
|
||
isbn = {978-1-60558-479-9},
|
||
location = {Madrid, Spain},
|
||
pages = {313--326},
|
||
numpages = {14},
|
||
url = {https://doi.acm.org/10.1145/1706299.1706337},
|
||
doi = {10.1145/1706299.1706337},
|
||
acmid = {1706337},
|
||
keywords = {proof-theoretic program synthesis, verification},
|
||
}
|
||
|
||
@inproceedings{Beyene14,
|
||
author = {Beyene, Tewodros and Chaudhuri, Swarat and Popeea, Corneliu and Rybalchenko, Andrey},
|
||
title = {A Constraint-based Approach to Solving Games on Infinite Graphs},
|
||
booktitle = popl14,
|
||
year = {2014},
|
||
isbn = {978-1-4503-2544-8},
|
||
location = {San Diego, California, USA},
|
||
pages = {221--233},
|
||
numpages = {13},
|
||
acmid = {2535860},
|
||
keywords = {games, horn clauses, program synthesis, proof rules, reactive synthesis, static analysis},
|
||
}
|
||
|
||
@inproceedings{beyene2013solving,
|
||
title={Solving existentially quantified {Horn} clauses},
|
||
author={Beyene, Tewodros A and Popeea, Corneliu and Rybalchenko, Andrey},
|
||
booktitle=cav13,
|
||
pages={869--882},
|
||
year={2013},
|
||
organization=springer
|
||
}
|
||
|
||
@inproceedings{gulwani2011synthesis,
|
||
title={Synthesis of loop-free programs},
|
||
author={Sumit Gulwani and Susmit Jha and Ashish Tiwari and Ramarathnam Venkatesan},
|
||
booktitle=pldi11,
|
||
year={2011}
|
||
}
|
||
|
||
@inproceedings{lahiri2006smt,
|
||
title={{SMT} techniques for fast predicate abstraction},
|
||
author={Lahiri, Shuvendu K and Nieuwenhuis, Robert and Oliveras, Albert},
|
||
booktitle=cav06,
|
||
pages={424--437},
|
||
year={2006},
|
||
organization=springer
|
||
}
|
||
|
||
@incollection{bjorner2015horn,
|
||
title={Horn clause solvers for program verification},
|
||
author={Bj{\o}rner, Nikolaj and Gurfinkel, Arie and McMillan, Ken and Rybalchenko, Andrey},
|
||
booktitle={Fields of Logic and Computation {II}},
|
||
pages={24--51},
|
||
year={2015},
|
||
publisher=springer
|
||
}
|
||
|
||
@inproceedings{MacQueenPS84,
|
||
author = {David B. MacQueen and
|
||
Gordon D. Plotkin and
|
||
Ravi Sethi},
|
||
editor = {Ken Kennedy and
|
||
Mary S. Van Deusen and
|
||
Larry Landweber},
|
||
title = {An Ideal Model for Recursive Polymorphic Types},
|
||
booktitle = popl84,
|
||
pages = {165--174},
|
||
year = {1984},
|
||
url = {https://doi.acm.org/10.1145/800017.800528},
|
||
doi = {10.1145/800017.800528},
|
||
timestamp = {Mon, 21 May 2012 16:19:51 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/popl/MacQueenPS84},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{AbadiP90,
|
||
author = {Mart{\'{\i}}n Abadi and
|
||
Gordon D. Plotkin},
|
||
title = {A Per Model of Polymorphism and Recursive Types},
|
||
booktitle = lics90,
|
||
pages = {355--365},
|
||
year = {1990},
|
||
url = {https://doi.org/10.1109/LICS.1990.113761},
|
||
doi = {10.1109/LICS.1990.113761},
|
||
timestamp = {Thu, 25 May 2017 00:42:41 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/lics/AbadiP90},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{Shamir16,
|
||
author = {Ohad Shamir},
|
||
title = {Without-Replacement Sampling for Stochastic Gradient Methods: Convergence
|
||
Results and Application to Distributed Optimization},
|
||
journal = {CoRR},
|
||
volume = {abs/1603.00570},
|
||
year = {2016},
|
||
url = {https://arxiv.org/abs/1603.00570},
|
||
timestamp = {Sat, 02 Apr 2016 11:49:48 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/corr/Shamir16},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
@book{jansen2013analyzing,
|
||
author = {Thomas Jansen},
|
||
title = {Analyzing Evolutionary Algorithms: The Computer Science Perspective},
|
||
series = {Natural Computing Series},
|
||
publisher = springer,
|
||
year = {2013},
|
||
url = {https://doi.org/10.1007/978-3-642-17339-4},
|
||
doi = {10.1007/978-3-642-17339-4},
|
||
isbn = {978-3-642-17338-7},
|
||
timestamp = {Tue, 16 May 2017 14:24:38 +0200},
|
||
biburl =
|
||
{https://dblp2.uni-trier.de/rec/bib/series/ncs/Jansen13},
|
||
bibsource = {dblp computer science bibliography,
|
||
https://dblp.org}
|
||
}
|
||
|
||
|
||
@book{HartlC,
|
||
author={Daniel L. Hartl and Andrew G. Clark},
|
||
title={Principles of Population Genetics},
|
||
edition={Fourth},
|
||
publisher={Sinauer Associates},
|
||
year={2006}}
|
||
|
||
@article{BousquetE02,
|
||
author = {Olivier Bousquet and
|
||
Andr{\'{e}} Elisseeff},
|
||
title = {Stability and Generalization},
|
||
journal = jmlr,
|
||
volume = {2},
|
||
pages = {499--526},
|
||
year = {2002},
|
||
doi = {10.1162/153244302760200704},
|
||
url = {https://www.jmlr.org/papers/v2/bousquet02a.html}
|
||
}
|
||
|
||
@inproceedings{GomulkiewiczKK03,
|
||
author = {Marcin Gomulkiewicz and
|
||
Marek Klonowski and
|
||
Miroslaw Kutylowski},
|
||
title = {Rapid Mixing and Security of {Chaum}'s Visual Electronic Voting},
|
||
booktitle = esorics03,
|
||
series = lncs,
|
||
volume = {2808},
|
||
pages = {132--145},
|
||
publisher = springer,
|
||
}
|
||
|
||
@inproceedings{BizjakB15,
|
||
author = {Ales Bizjak and
|
||
Lars Birkedal},
|
||
title = {Step-Indexed Logical Relations for Probability},
|
||
booktitle = fossacs15,
|
||
series = lncs,
|
||
volume = {9034},
|
||
pages = {279--294},
|
||
publisher = springer,
|
||
year = {2015}
|
||
}
|
||
|
||
@inproceedings{SangiorgiV16,
|
||
author = {Davide Sangiorgi and
|
||
Valeria Vignudelli},
|
||
title = {Environmental bisimulations for probabilistic higher-order languages},
|
||
booktitle = popl16,
|
||
pages = {595--607},
|
||
year = {2016}
|
||
}
|
||
|
||
@inproceedings{DallagoSA14,
|
||
author = {Ugo Dal Lago and
|
||
Davide Sangiorgi and
|
||
Michele Alberti},
|
||
title = {On coinductive equivalences for higher-order probabilistic functional
|
||
programs},
|
||
booktitle = popl14,
|
||
pages = {297--308},
|
||
year = {2014}
|
||
}
|
||
|
||
@article{dixit2012finite,
|
||
title={A finite population model of molecular evolution: {Theory} and computation},
|
||
author={Dixit, Narendra M and Srivastava, Piyush and Vishnoi, Nisheeth K},
|
||
journal={Journal of Computational Biology},
|
||
volume={19},
|
||
number={10},
|
||
pages={1176--1202},
|
||
year={2012},
|
||
publisher={Mary Ann Liebert}
|
||
}
|
||
|
||
@phdthesis{Hartog:thesis,
|
||
Author = {den Hartog, J.},
|
||
School = {Vrije Universiteit Amsterdam},
|
||
Title = {Probabilistic extensions of semantical models},
|
||
Year = {2002}}
|
||
|
||
@article{CanteautFNPRV12,
|
||
author = {Anne Canteaut and
|
||
Thomas Fuhr and
|
||
Mar{\'{\i}}a Naya{-}Plasencia and
|
||
Pascal Paillier and
|
||
Jean{-}Ren{\'{e}} Reinhard and
|
||
Marion Videau},
|
||
title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
|
||
Hash Functions},
|
||
journal = {{IACR} Cryptology ePrint Archive},
|
||
volume = {2012},
|
||
pages = {363},
|
||
year = {2012},
|
||
url = {https://eprint.iacr.org/2012/363},
|
||
timestamp = {Fri, 28 Mar 2014 20:49:29 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/iacr/CanteautFNPRV12},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{NanevskiBG11,
|
||
author = {Aleksandar Nanevski and
|
||
Anindya Banerjee and
|
||
Deepak Garg},
|
||
title = {Verification of Information Flow and Access Control Policies with
|
||
Dependent Types},
|
||
booktitle = sandp11,
|
||
pages = {165--179},
|
||
year = {2011}
|
||
}
|
||
|
||
|
||
@inproceedings{GhaniFS16,
|
||
author = {Neil Ghani and
|
||
Fredrik Nordvall Forsberg and
|
||
Alex Simpson},
|
||
title = {Comprehensive Parametric Polymorphism: {Categorical} Models and Type
|
||
Theory},
|
||
booktitle = fossacs16,
|
||
series = lncs,
|
||
volume = {9634},
|
||
pages = {3--19},
|
||
publisher = springer,
|
||
year = {2016}
|
||
}
|
||
|
||
|
||
|
||
@article{aldous93shift,
|
||
author = {Aldous, D. J. and Thorisson, H.},
|
||
citeulike-article-id = {4046853},
|
||
journal = {Stochastic Processes and their Applications},
|
||
keywords = {aldousbib},
|
||
mrnumber = {1198659},
|
||
pages = {1--14},
|
||
posted-at = {2009-02-13 21:55:05},
|
||
priority = {2},
|
||
title = {Shift-Coupling},
|
||
volume = {44},
|
||
year = {1993}
|
||
}
|
||
|
||
@book {LevinPW09,
|
||
AUTHOR = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
|
||
TITLE = {Markov Chains and Mixing Times},
|
||
PUBLISHER = {American Mathematical Society},
|
||
YEAR = {2009},
|
||
URL = {https://pages.uoregon.edu/dlevin/MARKOV/markovmixing.pdf}
|
||
}
|
||
|
||
@book{Villani08,
|
||
title={Optimal Transport: {Old} and New},
|
||
author={Villani, C{\'e}dric},
|
||
year={2008},
|
||
doi={10.1007/978-3-540-71050-9},
|
||
publisher=springer
|
||
}
|
||
|
||
@inproceedings{BentonHN13,
|
||
author = {Nick Benton and
|
||
Martin Hofmann and
|
||
Vivek Nigam},
|
||
title = {Proof-Relevant Logical Relations for Name Generation},
|
||
booktitle = tlca13,
|
||
series = lncs,
|
||
volume = {7941},
|
||
pages = {48--60},
|
||
publisher = springer,
|
||
year = {2013}
|
||
}
|
||
|
||
|
||
@inproceedings{KrishnaswamiB11,
|
||
author = {Neelakantan R. Krishnaswami and
|
||
Nick Benton},
|
||
title = {Ultrametric Semantics of Reactive Programs},
|
||
booktitle = lics11,
|
||
pages = {257--266},
|
||
year = {2011}}
|
||
|
||
|
||
@inproceedings{BeringerH07,
|
||
author = {Lennart Beringer and
|
||
Martin Hofmann},
|
||
title = {Secure Information Flow and Program Logics},
|
||
booktitle = csf07,
|
||
pages = {233--248},
|
||
year = {2007}
|
||
}
|
||
@inproceedings{LahiriHKR12,
|
||
author = {Shuvendu K. Lahiri and
|
||
Chris Hawblitzel and
|
||
Ming Kawaguchi and
|
||
Henrique Reb{\^{e}}lo},
|
||
title = {{SYMDIFF}: {A} Language-Agnostic Semantic Diff Tool for Imperative
|
||
Programs},
|
||
booktitle = cav12,
|
||
series = lncs,
|
||
volume = {7358},
|
||
pages = {712--717},
|
||
publisher = springer,
|
||
year = {2012}
|
||
}
|
||
|
||
|
||
@inproceedings{LahiriMSH13,
|
||
author = {Shuvendu K. Lahiri and
|
||
Kenneth L. McMillan and
|
||
Rahul Sharma and
|
||
Chris Hawblitzel},
|
||
title = {Differential assertion checking},
|
||
booktitle = esecfse13,
|
||
pages = {345--355},
|
||
year = {2013}
|
||
}
|
||
|
||
@article{BartheCK16,
|
||
author={Gilles Barthe and Juan Manuel Crespo and C{\'{e}}sar Kunz},
|
||
title={Product programs and relational program logics},
|
||
journal={Journal of Logical and Algebraic Methods in Programming},
|
||
year={2016}}
|
||
|
||
|
||
@InProceedings{DHS05:spc,
|
||
author = "Adam Darvas and Reiner H{\"{a}}hnle and David Sands",
|
||
title = "A Theorem Proving Approach to Analysis of Secure
|
||
Information Flow",
|
||
booktitle = "Security in Pervasive Computing",
|
||
pages = "193--209",
|
||
year = "2005",
|
||
volume = "3450",
|
||
series = lncs,
|
||
publisher = springer,
|
||
note = "Preliminary version in the informal proceedings of WITS 2003"
|
||
}
|
||
|
||
@inproceedings{MisailovicRR11,
|
||
author = {Sasa Misailovic and
|
||
Daniel M. Roy and
|
||
Martin C. Rinard},
|
||
title = {Probabilistically Accurate Program Transformations},
|
||
booktitle = sas11,
|
||
series = lncs,
|
||
volume = {6887},
|
||
pages = {316--333},
|
||
publisher = springer,
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{LogozzoLFB14,
|
||
author = {Francesco Logozzo and
|
||
Shuvendu K. Lahiri and
|
||
Manuel F{\"{a}}hndrich and
|
||
Sam Blackshear},
|
||
title = {Verification modulo versions: {Towards} usable verification},
|
||
booktitle = pldi14,
|
||
pages = {32},
|
||
year = {2014}
|
||
}
|
||
|
||
@article{GodlinS13,
|
||
author = {Benny Godlin and
|
||
Ofer Strichman},
|
||
title = {Regression verification: {Proving} the equivalence of similar programs},
|
||
journal = {Software Testing, Verification, and Reliability},
|
||
volume = {23},
|
||
number = {3},
|
||
pages = {241--258},
|
||
year = {2013}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{PartushY14,
|
||
author = {Nimrod Partush and
|
||
Eran Yahav},
|
||
title = {Abstract semantic differencing via speculative correlation},
|
||
booktitle = oopsla14,
|
||
pages = {811--828},
|
||
year = {2014}
|
||
}
|
||
|
||
@inproceedings{PersonDEP08,
|
||
author = {Person, Suzette and Dwyer, Matthew B. and Elbaum, Sebastian and
|
||
P{\v{a}}s{\v{a}}reanu, Corina S.},
|
||
title = {Differential Symbolic Execution},
|
||
booktitle = fse08,
|
||
year = {2008},
|
||
pages = {226--237},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/esop/FosterKMR016,
|
||
author = {Nate Foster and
|
||
Dexter Kozen and
|
||
Konstantinos Mamouras and
|
||
Mark Reitblatt and
|
||
Alexandra Silva},
|
||
title = {Probabilistic {NetKAT}},
|
||
booktitle = esop16,
|
||
series = lncs,
|
||
volume = {9632},
|
||
pages = {282--309},
|
||
publisher = springer,
|
||
year = {2016},
|
||
url = {https://dx.doi.org/10.1007/978-3-662-49498-1_12},
|
||
doi = {10.1007/978-3-662-49498-1_12},
|
||
timestamp = {Tue, 22 Mar 2016 15:54:03 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/esop/FosterKMR016},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{KaminskiKMO16,
|
||
author = {Benjamin Lucien Kaminski and
|
||
Joost{-}Pieter Katoen and
|
||
Christoph Matheja and
|
||
Federico Olmedo},
|
||
title = {Weakest Precondition Reasoning for Expected Run-Times of Probabilistic
|
||
Programs},
|
||
booktitle = esop16,
|
||
series = lncs,
|
||
volume = {9632},
|
||
pages = {364--389},
|
||
publisher = springer,
|
||
year = {2016},
|
||
url = {https://dx.doi.org/10.1007/978-3-662-49498-1_15},
|
||
doi = {10.1007/978-3-662-49498-1_15},
|
||
timestamp = {Tue, 22 Mar 2016 15:54:03 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/esop/KaminskiKMO16},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@InProceedings{ABB06:popl,
|
||
author = "Torben Amtoft and Sruthi Bandhakavi and Anindya Banerjee",
|
||
title = "A logic for information flow in object-oriented
|
||
programs",
|
||
booktitle = popl06,
|
||
year = "2006",
|
||
pages = "91--102",
|
||
}
|
||
|
||
@article{DBLP:journals/iacr/BartheDFGSS16,
|
||
author = {Gilles Barthe and
|
||
Fran{\c{c}}ois Dupressoir and
|
||
Sebastian Faust and
|
||
Benjamin Gr{\'{e}}goire and
|
||
Fran{\c{c}}ois{-}Xavier Standaert and
|
||
Pierre{-}Yves Strub},
|
||
title = {Parallel Implementations of Masking Schemes and the Bounded Moment
|
||
Leakage Model},
|
||
journal = {{IACR} Cryptology ePrint Archive},
|
||
volume = {2016},
|
||
pages = {912},
|
||
year = {2016},
|
||
url = {https://eprint.iacr.org/2016/912},
|
||
timestamp = {Fri, 14 Oct 2016 13:36:12 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/iacr/BartheDFGSS16},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/tcad/EldibWTS15,
|
||
author = {Hassan Eldib and
|
||
Chao Wang and
|
||
Mostafa M. I. Taha and
|
||
Patrick Schaumont},
|
||
title = {Quantitative Masking Strength: {Quantifying} the Power Side-Channel
|
||
Resistance of Software Code},
|
||
journal = {{IEEE} Transansactions on {CAD} of Integrated Circuits and Systems},
|
||
volume = {34},
|
||
number = {10},
|
||
pages = {1558--1568},
|
||
year = {2015},
|
||
url = {https://dx.doi.org/10.1109/TCAD.2015.2424951},
|
||
doi = {10.1109/TCAD.2015.2424951},
|
||
timestamp = {Thu, 03 Nov 2016 07:24:15 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/tcad/EldibWTS15},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/crypto/IshaiSW03,
|
||
author = {Yuval Ishai and
|
||
Amit Sahai and
|
||
David Wagner},
|
||
title = {Private Circuits: {Securing} Hardware against Probing Attacks},
|
||
booktitle = crypto,
|
||
series = lncs,
|
||
volume = {2729},
|
||
pages = {463--481},
|
||
publisher = springer,
|
||
year = {2003},
|
||
url = {https://dx.doi.org/10.1007/978-3-540-45146-4_27},
|
||
doi = {10.1007/978-3-540-45146-4_27},
|
||
timestamp = {Tue, 05 Jul 2011 11:03:56 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/crypto/IshaiSW03},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
@inproceedings{Beringer11,
|
||
author = {Lennart Beringer},
|
||
title = {Relational Decomposition},
|
||
booktitle = itp11,
|
||
series = lncs,
|
||
volume = {6898},
|
||
pages = {39--54},
|
||
publisher = springer,
|
||
year = {2011}
|
||
}
|
||
@inproceedings{MullerKS15,
|
||
author = {Christian M{\"{u}}ller and
|
||
M{\'{a}}t{\'{e}} Kov{\'{a}}cs and
|
||
Helmut Seidl},
|
||
title = {An Analysis of Universal Information Flow Based on Self-Composition},
|
||
booktitle = csf15,
|
||
pages = {380--393},
|
||
year = {2015}
|
||
}
|
||
|
||
|
||
@inproceedings{KovacsSF13,
|
||
author = {M{\'{a}}t{\'{e}} Kov{\'{a}}cs and
|
||
Helmut Seidl and
|
||
Bernd Finkbeiner},
|
||
title = {Relational abstract interpretation for the verification of
|
||
2-hypersafety properties},
|
||
booktitle = ccs13,
|
||
pages = {211--222},
|
||
year = {2013}
|
||
}
|
||
|
||
@article{ElisseeffEP05,
|
||
author = {Andr{\'{e}} Elisseeff and
|
||
Theodoros Evgeniou and
|
||
Massimiliano Pontil},
|
||
title = {Stability of Randomized Learning Algorithms},
|
||
journal = jmlr,
|
||
volume = {6},
|
||
pages = {55--79},
|
||
year = {2005},
|
||
url = {https://www.jmlr.org/papers/v6/elisseeff05a.html},
|
||
timestamp = {Wed, 21 Feb 2007 09:15:37 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/jmlr/ElisseeffEP05},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{PanageasSV16,
|
||
author = {Ioannis Panageas and
|
||
Piyush Srivastava and
|
||
Nisheeth K. Vishnoi},
|
||
title = {Evolutionary Dynamics in Finite Populations Mix Rapidly},
|
||
booktitle = soda16,
|
||
pages = {480--497},
|
||
year = {2016},
|
||
url = {https://dx.doi.org/10.1137/1.9781611974331.ch36},
|
||
doi = {10.1137/1.9781611974331.ch36},
|
||
timestamp = {Thu, 07 Apr 2016 12:20:54 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/soda/PanageasSV16},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{Vishnoi15,
|
||
author = {Nisheeth K. Vishnoi},
|
||
title = {The Speed of Evolution},
|
||
booktitle = soda15,
|
||
pages = {1590--1601},
|
||
year = {2015},
|
||
url = {https://dx.doi.org/10.1137/1.9781611973730.105},
|
||
doi = {10.1137/1.9781611973730.105},
|
||
timestamp = {Wed, 28 Jan 2015 11:43:18 +0100},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/soda/Vishnoi15},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{diaconis91,
|
||
author = {Diaconis, Persi and Stroock, Daniel},
|
||
citeulike-article-id = {8906755},
|
||
citeulike-linkout-0 = {https://dx.doi.org/10.1214/aoap/1177005980},
|
||
doi = {10.1214/aoap/1177005980},
|
||
issn = {1050-5164},
|
||
journal = {The Annals of Applied Probability},
|
||
keywords = {eigenvalues, markov, rapid-mixing},
|
||
month = feb,
|
||
number = {1},
|
||
pages = {36--61},
|
||
posted-at = {2011-03-01 12:39:26},
|
||
priority = {4},
|
||
title = {Geometric Bounds for Eigenvalues of {Markov} Chains},
|
||
url = {https://dx.doi.org/10.1214/aoap/1177005980},
|
||
volume = {1},
|
||
year = {1991}
|
||
}
|
||
|
||
|
||
@article{JerrumS89,
|
||
author = {Mark Jerrum and
|
||
Alistair Sinclair},
|
||
title = {Approximating the Permanent},
|
||
journal = siamjc,
|
||
volume = {18},
|
||
number = {6},
|
||
pages = {1149--1178},
|
||
year = {1989},
|
||
url = {https://dx.doi.org/10.1137/0218077},
|
||
doi = {10.1137/0218077},
|
||
timestamp = {Mon, 12 Sep 2011 16:10:07 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/siamcomp/JerrumS89},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/rsa/KumarR01,
|
||
author = {V. S. Anil Kumar and H. Ramesh},
|
||
title = {Coupling vs. Conductance for the {Jerrum-Sinclair} Chain},
|
||
journal = {Random Structures and Algorithms},
|
||
volume = {18},
|
||
number = {1},
|
||
pages = {1--17},
|
||
year = {2001},
|
||
url = {https://hariharan-ramesh.com/papers/mcmc.pdf},
|
||
publisher = {Wiley}
|
||
}
|
||
|
||
@inproceedings{HardtRS16,
|
||
author = {Moritz Hardt and
|
||
Ben Recht and
|
||
Yoram Singer},
|
||
title = {Train Faster, Generalize Better: {Stability} of Stochastic Gradient Descent},
|
||
booktitle = icml16,
|
||
series = pmlr,
|
||
volume = {48},
|
||
pages = {1225--1234},
|
||
year = {2016},
|
||
archivePrefix = "arXiv",
|
||
eprint = {1509.01240},
|
||
primaryClass = "cs.LG",
|
||
url={https://arxiv.org/abs/1603.01445}
|
||
}
|
||
|
||
@techreport{randomwalk:notes,
|
||
author = {Avena, Luca and
|
||
Heydenreich, Markus and
|
||
den Hollander, Frank and
|
||
Verbitskiy, Evgeny and
|
||
van Zuijlen, Willem},
|
||
title = {Random Walks (lecture notes)},
|
||
url = {https://websites.math.leidenuniv.nl/probability/lecturenotes/RandomWalks.pdf},
|
||
institution = {Mathematical Institute, Leiden University}
|
||
}
|
||
|
||
@book{vanbreugel,
|
||
author={Franck van Breugel},
|
||
title={Comparative Metric Semantics of Programming Languages:
|
||
Nondeterminism and Recursion},
|
||
series={Progress in Theoretical Computer Science},
|
||
publisher={Birkhauser},
|
||
year={1997}}
|
||
|
||
@inproceedings{DeBakkerZ82,
|
||
author = {J. W. de Bakker and
|
||
Jeffery I. Zucker},
|
||
editor = {Harry R. Lewis and
|
||
Barbara B. Simons and
|
||
Walter A. Burkhard and
|
||
Lawrence H. Landweber},
|
||
title = {Denotational Semantics of Concurrency},
|
||
booktitle = stoc82,
|
||
pages = {153--158},
|
||
year = {1982},
|
||
url = {https://doi.acm.org/10.1145/800070.802188},
|
||
doi = {10.1145/800070.802188},
|
||
timestamp = {Sun, 21 May 2017 00:22:29 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/conf/stoc/DeBakkerZ82},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{ArnoldN80,
|
||
author = {Andr{\'{e}} Arnold and
|
||
Maurice Nivat},
|
||
title = {Metric Interpretations of Infinite Trees and Semantics of non Deterministic
|
||
Recursive Programs},
|
||
journal = tcs,
|
||
volume = {11},
|
||
pages = {181--205},
|
||
year = {1980},
|
||
url = {https://doi.org/10.1016/0304-3975(80)90045-6},
|
||
doi = {10.1016/0304-3975(80)90045-6},
|
||
timestamp = {Sun, 28 May 2017 13:20:08 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/tcs/ArnoldN80},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{brooks2011handbook,
|
||
title={Handbook of {Markov} Chain {Monte} {Carlo}},
|
||
author={Brooks, Steve and Gelman, Andrew and Jones, Galin and Meng,
|
||
Xiao-Li},
|
||
year={2011},
|
||
publisher={CRC press}
|
||
}
|
||
|
||
@inproceedings{sato2016approximate,
|
||
title={Approximate Relational {Hoare} Logic for Continuous Random Samplings},
|
||
author={Sato, Tetsuya},
|
||
booktitle=mfps16,
|
||
year={2016},
|
||
doi={10.1016/j.entcs.2016.09.043},
|
||
url={https://arxiv.org/abs/1603.01445}
|
||
}
|
||
|
||
@article{metropolis1953equation,
|
||
title={Equation of state calculations by fast computing machines},
|
||
author={Metropolis, Nicholas and Rosenbluth, Arianna W and Rosenbluth,
|
||
Marshall N and Teller, Augusta H and Teller, Edward},
|
||
journal={The Journal of Chemical Physics},
|
||
volume={21},
|
||
number={6},
|
||
pages={1087--1092},
|
||
year={1953},
|
||
publisher={AIP Publishing}
|
||
}
|
||
|
||
@inproceedings{Kozen16,
|
||
author="Dexter Kozen",
|
||
title="Kolmogorov Extension, Martingale Convergence, and Compositionality of Processes",
|
||
booktitle=lics16,
|
||
url = {https://hdl.handle.net/1813/41517},
|
||
year={2016}
|
||
}
|
||
|
||
@book{durrett2008probability,
|
||
title={Probability Models for {DNA} Sequence Evolution},
|
||
author={Durrett, R.},
|
||
isbn={9780387781693},
|
||
lccn={2008929756},
|
||
series={Probability and Its Applications},
|
||
year={2008},
|
||
publisher=springer
|
||
}
|
||
|
||
@article{Smyth:82,
|
||
added-at = {2007-11-03T00:18:07.000+0100},
|
||
author = {Smyth, Michael B. and Plotkin, Gordon D.},
|
||
biburl = {https://www.bibsonomy.org/bibtex/2463c71fb3a6d5f453c9ced9044fcec7f/bsmyth},
|
||
date = {2002-01-03},
|
||
description = {dblp},
|
||
interhash = {fa163d46ad9a635a36f162a6961931ad},
|
||
intrahash = {463c71fb3a6d5f453c9ced9044fcec7f},
|
||
journal = siamjc,
|
||
number = 4,
|
||
pages = {761--783},
|
||
timestamp = {2007-11-03T00:18:21.000+0100},
|
||
title = {The Category-Theoretic Solution of Recursive Domain Equations},
|
||
url = {https://dblp.uni-trier.de/db/journals/siamcomp/siamcomp11.html#SmythP82},
|
||
volume = 11,
|
||
year = 1982
|
||
}
|
||
|
||
@inproceedings{Freyd1991,
|
||
author="Freyd, Peter",
|
||
title="Algebraically complete categories",
|
||
booktitle=ct90,
|
||
year="1990",
|
||
publisher=springer,
|
||
series={Lecture Notes in Mathematics},
|
||
volume=1488,
|
||
pages="95--104",
|
||
isbn="978-3-540-46435-8",
|
||
url="https://dx.doi.org/10.1007/BFb0084215"
|
||
}
|
||
|
||
@article{Lawvere:02,
|
||
author = {William F. Lawvere},
|
||
title = {Metric Spaces, Generalized Logic, and Closed Categories},
|
||
journal = {Reprints in Theory and Applications of Categories},
|
||
volume = {1},
|
||
pages = {1--37},
|
||
note = {Originally published in ``Rendiconti del seminario matematico e fisico di Milano, XLIII (1973), 135-166''},
|
||
year = {2002}
|
||
}
|
||
|
||
@book{Monoidal,
|
||
editor = {Hofmann, Dirk and Seal, Gavin J. and Tholen, Walter},
|
||
title = {Monoidal Topology},
|
||
publisher = cup,
|
||
year = {2014},
|
||
}
|
||
|
||
@book{Borceux:1994:1,
|
||
title={Handbook of Categorical Algebra: Volume 1, Basic Category Theory},
|
||
author={Borceux, F.},
|
||
isbn={9780521441780},
|
||
lccn={93003225},
|
||
series={Cambridge Textbooks in Linguistics},
|
||
url={https://books.google.com/books?id=YfzImoopB-IC},
|
||
year={1994},
|
||
publisher=cup
|
||
}
|
||
|
||
@book{Borceux:1994:2,
|
||
title={Handbook of Categorical Algebra: Volume 2, Categories and Structures},
|
||
author={Borceux, F.},
|
||
isbn={9780521441797},
|
||
lccn={93003225},
|
||
series={Cambridge Studies in Philosophy},
|
||
year={1994},
|
||
publisher=cup
|
||
}
|
||
|
||
@inproceedings{Fiore:1994,
|
||
author = {Marcelo P. Fiore and
|
||
Gordon D. Plotkin},
|
||
title = {An Axiomatization of Computationally Adequate Domain Theoretic Models
|
||
of {FPC}},
|
||
booktitle = lics94,
|
||
pages = {92--102},
|
||
year = {1994}
|
||
}
|
||
|
||
@article{Pitts:1996,
|
||
title = "Relational Properties of Domains",
|
||
journal = ic,
|
||
volume = "127",
|
||
number = "2",
|
||
pages = "66--90",
|
||
year = "1996",
|
||
issn = "0890-5401",
|
||
author = "Andrew M. Pitts",
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/ArnoldN80,
|
||
author = {Andr{\'{e}} Arnold and
|
||
Maurice Nivat},
|
||
title = {Metric Interpretations of Infinite Trees and Semantics of non-Deterministic
|
||
Recursive Programs},
|
||
journal = tcs,
|
||
volume = {11},
|
||
number = {2},
|
||
pages = {181--205},
|
||
year = {1980},
|
||
url = {https://dx.doi.org/10.1016/0304-3975(80)90045-6},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/stoc/DeBakkerZ82,
|
||
author = {de Bakker, J. W. and
|
||
Zucker, Jeffrey I.},
|
||
title = {Denotational Semantics of Concurrency},
|
||
booktitle = stoc82,
|
||
pages = {153--158},
|
||
year = {1982},
|
||
url = {https://doi.acm.org/10.1145/800070.802188},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/mfps/AmericaR87,
|
||
author = {Pierre America and
|
||
Jan J. M. M. Rutten},
|
||
title = {Solving Reflexive Domain Equations in a Category of Complete Metric
|
||
Spaces},
|
||
booktitle = mfps87,
|
||
series = lncs,
|
||
publisher = springer,
|
||
volume = 298,
|
||
pages = {254--288},
|
||
year = {1987},
|
||
url = {https://dx.doi.org/10.1007/3-540-19020-1_13},
|
||
}
|
||
|
||
@article{Baier1994,
|
||
title = "Denotational semantics in the {CPO} and metric approach",
|
||
journal = tcs,
|
||
volume = "135",
|
||
number = "2",
|
||
pages = "171--220",
|
||
year = "1994",
|
||
issn = "0304-3975",
|
||
url = "https://dx.doi.org/10.1016/0304-3975(94)00046-8",
|
||
author = "Christel Baier and Mila E. Majster{-}Cederbaum",
|
||
publisher = elsevier,
|
||
}
|
||
|
||
@article{DBLP:journals/ipl/Majster-Cederbaum88,
|
||
author = {Mila E. Majster{-}Cederbaum},
|
||
title = {On the Uniqueness of Fixed Points of Endofunctors in a Category of
|
||
Complete Metric Spaces},
|
||
journal = {Information Processing Letters},
|
||
volume = {29},
|
||
number = {6},
|
||
pages = {277--281},
|
||
year = {1988},
|
||
url = {https://dx.doi.org/10.1016/0020-0190(88)90224-4},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{DBLP:journals/iandc/CederbaumZ91,
|
||
author = {Mila E. Majster{-}Cederbaum and
|
||
F. Zetzsche},
|
||
title = {Towards a Foundation for Semantics in Complete Metric Spaces},
|
||
journal = ic,
|
||
volume = {90},
|
||
number = {2},
|
||
pages = {217--243},
|
||
year = {1991},
|
||
url = {https://dx.doi.org/10.1016/0890-5401(91)90005-M},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/Majster-CederbaumZ94,
|
||
author = {Mila E. Majster{-}Cederbaum and
|
||
F. Zetzsche},
|
||
title = {The Comparison of a {CPO}-based Semantics with a {CMS}-based semantics
|
||
for {CSP}},
|
||
journal = tcs,
|
||
volume = {124},
|
||
number = {1},
|
||
pages = {1--40},
|
||
year = {1994},
|
||
url = {https://dx.doi.org/10.1016/0304-3975(94)90052-3},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/Breugel01,
|
||
author = {van Breugel, Franck},
|
||
title = {An introduction to metric semantics: operational and denotational
|
||
models for programming and specification languages},
|
||
journal = tcs,
|
||
volume = {258},
|
||
number = {1--2},
|
||
pages = {1--98},
|
||
year = {2001},
|
||
url = {https://dx.doi.org/10.1016/S0304-3975(00)00403-5},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@MISC{Escardo98ametric,
|
||
author = {Martín H\"otzel Escard\'o},
|
||
title = {A metric model of {PCF}},
|
||
note = {Workshop on Realizability Semantics and Applications, Trento, Italy},
|
||
url = {https://www.cs.bham.ac.uk/~mhe/papers/metricpcf.pdf},
|
||
year = {1999}
|
||
}
|
||
|
||
@article{GSS92,
|
||
title={{Bounded linear logic}},
|
||
author={Girard, J.Y. and Scedrov, A. and Scott, P.},
|
||
journal=tcs,
|
||
volume={97},
|
||
number={1},
|
||
pages={1--66},
|
||
year={1992},
|
||
publisher=elsevier
|
||
}
|
||
|
||
|
||
@article{DBLP:journals/tcs/Ehrhard12,
|
||
author = {Thomas Ehrhard},
|
||
title = {The Scott model of linear logic is the extensional collapse of its
|
||
relational model},
|
||
journal = tcs,
|
||
volume = {424},
|
||
pages = {20--45},
|
||
year = {2012},
|
||
url = {https://dx.doi.org/10.1016/j.tcs.2011.11.027},
|
||
doi = {10.1016/j.tcs.2011.11.027},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/MacQueenPS84,
|
||
author = {David B. MacQueen and
|
||
Gordon D. Plotkin and
|
||
Ravi Sethi},
|
||
title = {An Ideal Model for Recursive Polymorphic Types},
|
||
booktitle = popl84,
|
||
pages = {165--174},
|
||
year = {1984},
|
||
url = {https://doi.acm.org/10.1145/800017.800528},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/AbadiPP89,
|
||
author = {Mart{\'{\i}}n Abadi and
|
||
Benjamin C. Pierce and
|
||
Gordon D. Plotkin},
|
||
title = {Faithful Ideal Models for Recursive Polymorphic Types},
|
||
booktitle = lics89,
|
||
pages = {216--225},
|
||
year = {1989},
|
||
url = {https://dx.doi.org/10.1109/LICS.1989.39176}
|
||
}
|
||
|
||
@article{DBLP:journals/iandc/Amadio91,
|
||
author = {Roberto M. Amadio},
|
||
title = {Recursion over Realizability Structures},
|
||
journal = ic,
|
||
volume = {91},
|
||
number = {1},
|
||
pages = {55--85},
|
||
year = {1991},
|
||
url = {https://dx.doi.org/10.1016/0890-5401(91)90074-C},
|
||
doi = {10.1016/0890-5401(91)90074-C},
|
||
publisher = elsevier
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/lics/AbadiP90,
|
||
author = {Mart{\'{\i}}n Abadi and
|
||
Gordon D. Plotkin},
|
||
title = {A {PER} Model of Polymorphism and Recursive Types},
|
||
booktitle = lics90,
|
||
pages = {355--365},
|
||
year = {1990},
|
||
url = {https://dx.doi.org/10.1109/LICS.1990.113761},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/tlca/Chroboczek01,
|
||
author = {Juliusz Chroboczek},
|
||
title = {Subtyping Recursive Games},
|
||
booktitle = tlca01,
|
||
series = lncs,
|
||
volume = 2044,
|
||
publisher = springer,
|
||
pages = {61--75},
|
||
year = {2001},
|
||
url = {https://dx.doi.org/10.1007/3-540-45413-6_9},
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/BirkedalST10,
|
||
author = {Lars Birkedal and
|
||
Kristian St{\o}vring and
|
||
Jacob Thamsborg},
|
||
title = {The category-theoretic solution of recursive metric-space equations},
|
||
journal = tcs,
|
||
volume = {411},
|
||
number = {47},
|
||
pages = {4102--4122},
|
||
year = {2010},
|
||
url = {https://dx.doi.org/10.1016/j.tcs.2010.07.010},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/fossacs/BirkedalST09,
|
||
author = {Lars Birkedal and
|
||
Kristian St{\o}vring and
|
||
Jacob Thamsborg},
|
||
title = {Realizability Semantics of Parametric Polymorphism, General References,
|
||
and Recursive Types},
|
||
booktitle = fossacs09,
|
||
pages = {456--470},
|
||
year = {2009},
|
||
series = lncs,
|
||
publisher = springer,
|
||
volume = 5504,
|
||
url = {https://dx.doi.org/10.1007/978-3-642-00596-1_32},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/fossacs/SchwinghammerBS11,
|
||
author = {Jan Schwinghammer and
|
||
Lars Birkedal and
|
||
Kristian St{\o}vring},
|
||
title = {A Step-Indexed {Kripke} Model of Hidden State via Recursive Properties
|
||
on Recursively Defined Metric Spaces},
|
||
booktitle = fossacs11,
|
||
pages = {305--319},
|
||
year = {2011},
|
||
series = lncs,
|
||
publisher = springer,
|
||
volume = 6604,
|
||
url = {https://dx.doi.org/10.1007/978-3-642-19805-2_21}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/Nakano00,
|
||
author = {Hiroshi Nakano},
|
||
title = {A Modality for Recursion},
|
||
booktitle = lics00,
|
||
pages = {255--266},
|
||
year = {2000},
|
||
url = {https://dx.doi.org/10.1109/LICS.2000.855774},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/BirkedalMSS11,
|
||
author = {Lars Birkedal and
|
||
Rasmus Ejlers M{\o}gelberg and
|
||
Jan Schwinghammer and
|
||
Kristian St{\o}vring},
|
||
title = {First Steps in Synthetic Guarded Domain Theory: Step-Indexing in the
|
||
Topos of Trees},
|
||
booktitle = lics11,
|
||
pages = {55--64},
|
||
year = {2011},
|
||
url = {https://dx.doi.org/10.1109/LICS.2011.16},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/icfp/2011,
|
||
editor = {Manuel M. T. Chakravarty and
|
||
Zhenjiang Hu and
|
||
Olivier Danvy},
|
||
title = icfp11,
|
||
year = {2011},
|
||
isbn = {978-1-4503-0865-6},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/KrishnaswamiB11,
|
||
author = {Neelakantan R. Krishnaswami and
|
||
Nick Benton},
|
||
title = {Ultrametric Semantics of Reactive Programs},
|
||
booktitle = lics11,
|
||
pages = {257--266},
|
||
year = {2011},
|
||
url = {https://dx.doi.org/10.1109/LICS.2011.38},
|
||
}
|
||
|
||
@article{csiszarS04,
|
||
url = {https://dx.doi.org/10.1561/0100000004},
|
||
year = {2004},
|
||
volume = {1},
|
||
journal = {Foundations and Trends® in Communications and Information Theory},
|
||
title = {Information Theory and Statistics: {A} Tutorial},
|
||
doi = {10.1561/0100000004},
|
||
issn = {1567-2190},
|
||
number = {4},
|
||
pages = {417--528},
|
||
author = {I. Csiszár and P. C. Shields},
|
||
publisher = now
|
||
}
|
||
|
||
@article{DBLP:journals/entcs/BaierK97,
|
||
author = {Christel Baier and
|
||
Marta Z. Kwiatkowska},
|
||
title = {Domain equations for probabilistic processes},
|
||
journal = entcs,
|
||
volume = {7},
|
||
pages = {34--54},
|
||
year = {1997},
|
||
url = {https://dx.doi.org/10.1016/S1571-0661(05)80465-7},
|
||
publisher = elsevier,
|
||
}
|
||
|
||
@article{DBLP:journals/entcs/HartogVB00,
|
||
author = {den Hartog, Jerry and
|
||
de Vink, Erik P. and
|
||
de Bakker, J. W.},
|
||
title = {Metric Semantics and Full Abstractness for Action Refinement and Probabilistic
|
||
Choice},
|
||
journal = entcs,
|
||
volume = {40},
|
||
pages = {72--99},
|
||
year = {2000},
|
||
url = {https://dx.doi.org/10.1016/S1571-0661(05)80038-6},
|
||
publisher = elsevier,
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/DesharnaisJGP02,
|
||
author = {Josee Desharnais and
|
||
Radha Jagadeesan and
|
||
Vineet Gupta and
|
||
Prakash Panangaden},
|
||
title = {The Metric Analogue of Weak Bisimulation for Probabilistic Processes},
|
||
booktitle = lics02,
|
||
pages = {413--422},
|
||
year = {2002},
|
||
url = {https://dx.doi.org/10.1109/LICS.2002.1029849},
|
||
}
|
||
|
||
@Unpublished{PlotkinGD:lecppf,
|
||
author = "Gordon Plotkin",
|
||
title = "Lectures on Predomains and Partial Functions",
|
||
year = "1985",
|
||
note = "Notes for a course given at the Center for the Study
|
||
of Language and Information, Stanford",
|
||
}
|
||
|
||
@inproceedings{HaeberlenPN11,
|
||
author = {Andreas Haeberlen and
|
||
Benjamin C. Pierce and
|
||
Arjun Narayan},
|
||
title = {Differential Privacy Under Fire},
|
||
booktitle = usenix11,
|
||
year = {2011},
|
||
url = {https://static.usenix.org/events/sec11/tech/full_papers/Haeberlen.pdf},
|
||
}
|
||
|
||
@incollection{Jonsson:2001,
|
||
Address = {Amsterdam},
|
||
Author = {Jonsson, Bengt and Yi, Wang and Larsen, Kim G.},
|
||
Booktitle = {Handbook of Process Algebra},
|
||
Pages = {685-710},
|
||
Publisher = {Elsevier},
|
||
Title = {Probabilistic Extensions of Process Algebras},
|
||
url = {citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.7376},
|
||
Year = {2001}}
|
||
|
||
@inproceedings{HoangR10,
|
||
author = {Hoang, Viet Tung and
|
||
Rogaway, Phillip},
|
||
title = {On Generalized {Feistel} Networks},
|
||
booktitle = crypto,
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {6223},
|
||
pages = {613--630},
|
||
publisher = springer,
|
||
url = {https://eprint.iacr.org/2010/301.pdf},
|
||
year = {2010}
|
||
}
|
||
|
||
@inproceedings{Mironov02,
|
||
author = {Ilya Mironov},
|
||
title = {({Not} So) Random Shuffles of {RC4}},
|
||
booktitle = crypto,
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {2442},
|
||
pages = {304--319},
|
||
publisher = springer,
|
||
year = {2002},
|
||
url = {https://eprint.iacr.org/2002/067.pdf}
|
||
}
|
||
|
||
@inproceedings{Barr70,
|
||
author={Michael Barr},
|
||
title={Relational algebras},
|
||
editor={Mac Lane, S.},
|
||
booktitle={Reports of the Midwest Category Seminar, {IV}},
|
||
series={Lecture Notes in Mathematics},
|
||
volume={137},
|
||
year={1970},
|
||
pages={39–55},
|
||
url={https://www.math.mcgill.ca/barr/papers/relalgs.pdf},
|
||
publisher=springer
|
||
}
|
||
|
||
@article{DBLP:journals/corr/ChenM15e,
|
||
author = {Yan Chen and
|
||
Ashwin Machanavajjhala},
|
||
title = {On the Privacy Properties of Variants on the Sparse Vector Technique},
|
||
journal = {CoRR},
|
||
volume = {abs/1508.07306},
|
||
year = {2015},
|
||
url = {https://arxiv.org/abs/1508.07306},
|
||
timestamp = {Tue, 01 Sep 2015 14:42:40 +0200},
|
||
biburl = {https://dblp.uni-trier.de/rec/bib/journals/corr/ChenM15e},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{royden-analysis,
|
||
title={Real Analysis},
|
||
author={Royden, Halsey L. and Fitzpatrick, Patrick},
|
||
isbn={9780131437470},
|
||
lccn={2009048692},
|
||
year={2010},
|
||
edition={Fourth},
|
||
publisher=ph
|
||
}
|
||
|
||
@book{dijkstra1976discipline,
|
||
title={A Discipline of Programming},
|
||
author={Dijkstra, Edsger W.},
|
||
series={Series in Automatic Computation},
|
||
publisher=ph,
|
||
year={1976}
|
||
}
|
||
|
||
@article{OHEARN2007271,
|
||
title = "Resources, Concurrency, and Local Reasoning",
|
||
journal = tcs,
|
||
volume = "375",
|
||
number = "1",
|
||
pages = "271--307",
|
||
year = "2007",
|
||
note = "Festschrift for John C. Reynolds's 70th birthday",
|
||
issn = "0304-3975",
|
||
doi = "https://dx.doi.org/10.1016/j.tcs.2006.12.035",
|
||
author = "Peter W. O'Hearn",
|
||
publisher=elsevier
|
||
}
|
||
|
||
@article{Jones:2003:EST:858595.858602,
|
||
author = {Jones, Cliff B.},
|
||
title = {The Early Search for Tractable Ways of Reasoning about Programs},
|
||
journal = {Annals of the History of Computing},
|
||
issue_date = {April 2003},
|
||
volume = {25},
|
||
number = {2},
|
||
month = apr,
|
||
year = {2003},
|
||
issn = {1058-6180},
|
||
pages = {26--49},
|
||
numpages = {24},
|
||
url = {https://pdfs.semanticscholar.org/edf2/372be96bc9c1f138e691bf0d222eafc64b55.pdf},
|
||
doi = {10.1109/MAHC.2003.1203057},
|
||
acmid = {858602},
|
||
publisher = ieee,
|
||
address = {Piscataway, NJ, USA},
|
||
}
|
||
|
||
@article{Apt:1981:TYH:357146.357150,
|
||
author = {Apt, Krzysztof R.},
|
||
title = {Ten Years of {Hoare}'s Logic: {A} Survey--Part {I}},
|
||
journal = toplas,
|
||
volume = {3},
|
||
number = {4},
|
||
year = {1981},
|
||
issn = {0164-0925},
|
||
pages = {431--483},
|
||
numpages = {53},
|
||
url = {https://doi.acm.org/10.1145/357146.357150},
|
||
doi = {10.1145/357146.357150},
|
||
acmid = {357150},
|
||
}
|
||
|
||
@article{APT198383,
|
||
title = "Ten years of {Hoare}'s logic: {A} survey--Part {II}: Nondeterminism",
|
||
journal = tcs,
|
||
volume = "28",
|
||
number = "1",
|
||
pages = "83--109",
|
||
year = "1983",
|
||
issn = "0304-3975",
|
||
doi = "https://dx.doi.org/10.1016/0304-3975(83)90066-X",
|
||
url = "https://www.sciencedirect.com/science/article/pii/030439758390066X",
|
||
author = {Apt, Krzysztof R.},
|
||
publisher=elsevier
|
||
}
|
||
|
||
@article{YANG2007308,
|
||
title = "Relational Separation Logic",
|
||
journal = tcs,
|
||
volume = "375",
|
||
number = "1",
|
||
pages = "308--334",
|
||
year = "2007",
|
||
note = "Festschrift for John C. Reynolds's 70th birthday",
|
||
issn = "0304-3975",
|
||
doi = "https://dx.doi.org/10.1016/j.tcs.2006.12.036",
|
||
url = "https://www.sciencedirect.com/science/article/pii/S0304397506009261",
|
||
author = "Hongseok Yang",
|
||
publisher=elsevier
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pst/EbadiAS16,
|
||
author = {Hamid Ebadi and
|
||
Thibaud Antignac and
|
||
David Sands},
|
||
title = {Sampling and Partitioning for Differential Privacy},
|
||
booktitle = {Conference on Privacy, Security and Trust ({PST}),
|
||
Auckland, New Zealand},
|
||
pages = {664--673},
|
||
year = {2016},
|
||
publisher = {{IEEE}},
|
||
url = {https://doi.org/10.1109/PST.2016.7906954},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/EbadiSS15,
|
||
author = {Hamid Ebadi and
|
||
David Sands and
|
||
Gerardo Schneider},
|
||
title = {Differential Privacy: Now It's Getting Personal},
|
||
booktitle = popl15,
|
||
pages = {69--81},
|
||
year = {2015},
|
||
doi = {10.1145/2676726.2677005},
|
||
url = {https://doi.acm.org/10.1145/2676726.2677005},
|
||
}
|
||
|
||
@article{ebadi2016featherweight,
|
||
title={Featherweight {PINQ}},
|
||
author={Ebadi, Hamid and Sands, David},
|
||
journal=jpc,
|
||
volume={7},
|
||
number={2},
|
||
pages={159--184},
|
||
year={2016},
|
||
url={https://arxiv.org/abs/1505.02642}
|
||
}
|
||
|
||
@article{proserpio2014calibrating,
|
||
title={Calibrating Data to Sensitivity in Private Data Analysis:
|
||
{A} Platform for Differentially-Private Analysis of Weighted Datasets},
|
||
author={Proserpio, Davide and Goldberg, Sharon and {McSherry}, Frank},
|
||
journal=pvldb,
|
||
note=vldb14,
|
||
volume={7},
|
||
number={8},
|
||
pages={637--648},
|
||
year={2014},
|
||
doi={10.14778/2732296.2732300},
|
||
url={https://www.vldb.org/pvldb/vol7/p637-proserpio.pdf},
|
||
}
|
||
|
||
@inproceedings{palamidessi:hal-00760688,
|
||
TITLE = {Differential Privacy for Relational Algebra: {Improving} the Sensitivity Bounds via Constraint Systems},
|
||
AUTHOR = {Palamidessi, Catuscia and Stronati, Marco},
|
||
URL = {https://hal.inria.fr/hal-00760688},
|
||
BOOKTITLE = {Workshop on Quantitative Aspects of Programming
|
||
Languages ({QAPL}), Tallin, Estonia},
|
||
PUBLISHER = {Open Publishing Association},
|
||
SERIES = eptcs,
|
||
VOLUME = {85},
|
||
PAGES = {92--105},
|
||
YEAR = {2012},
|
||
MONTH = Apr,
|
||
DOI = {10.4204/EPTCS.85.7},
|
||
PDF = {https://hal.inria.fr/hal-00760688/file/paper.pdf},
|
||
HAL_ID = {hal-00760688},
|
||
HAL_VERSION = {v1},
|
||
}
|
||
|
||
@mastersthesis{buch:thesis,
|
||
title = {Formalizing Differential Privacy},
|
||
author = {Buch, Mads},
|
||
school = {Aarhus University},
|
||
url = {https://madsbuch.com/thesis},
|
||
year = 2017
|
||
}
|
||
|
||
@article{Callahan1988,
|
||
author="Callahan, David and Kennedy, Ken",
|
||
title="Compiling Programs for Distributed-Memory Multiprocessors",
|
||
journal="The Journal of Supercomputing",
|
||
year="1988",
|
||
month=oct,
|
||
volume="2",
|
||
number="2",
|
||
pages="151--169",
|
||
abstract="We describe a new approach to programming distributed-memory
|
||
computers. Rather than having each node in the system explicitly programmed, we
|
||
derive an efficient message-passing program from a sequential shared-memory
|
||
program annotated with directions on how elements of shared arrays are
|
||
distributed to processors. This article describes one possible input language
|
||
for describing distributions and then details the compilation process and the
|
||
optimization necessary to generate an efficient program.",
|
||
issn="1573-0484",
|
||
doi="10.1007/BF00128175",
|
||
url="https://doi.org/10.1007/BF00128175",
|
||
publisher=springer
|
||
}
|
||
|
||
@inproceedings{Chatterjee:2016:AAQ:2837614.2837639,
|
||
author = {Chatterjee, Krishnendu and Fu, Hongfei and Novotn\'{y}, Petr and Hasheminezhad, Rouzbeh},
|
||
title = {Algorithmic Analysis of Qualitative and Quantitative Termination Problems for Affine Probabilistic Programs},
|
||
booktitle = popl16,
|
||
year = {2016},
|
||
isbn = {978-1-4503-3549-2},
|
||
pages = {327--342},
|
||
numpages = {16},
|
||
url = {https://doi.acm.org/10.1145/2837614.2837639},
|
||
doi = {10.1145/2837614.2837639},
|
||
acmid = {2837639},
|
||
keywords = {Concentration, Probabilistic Programs, Ranking Supermartingale, Termination},
|
||
}
|
||
|
||
@inproceedings{Chatterjee2016,
|
||
author= {Chatterjee, Krishnendu and Fu, Hongfei and Goharshady, Amir
|
||
Kafshdar},
|
||
title= {Termination Analysis of Probabilistic Programs through {Positivstellensatz's}},
|
||
bookTitle=cav16,
|
||
year="2016",
|
||
publisher=springer,
|
||
series=lncs,
|
||
volume=9779,
|
||
pages="3--22",
|
||
isbn="978-3-319-41528-4",
|
||
doi="10.1007/978-3-319-41528-4_1",
|
||
url="https://doi.org/10.1007/978-3-319-41528-4_1"
|
||
}
|
||
|
||
@inproceedings{Chatterjee:2017:SIP:3009837.3009873,
|
||
author = {Chatterjee, Krishnendu and Novotn\'{y}, Petr and \v{Z}ikeli\'{c}, {\DH}or{\dj}e},
|
||
title = {Stochastic Invariants for Probabilistic Termination},
|
||
booktitle = popl17,
|
||
year = {2017},
|
||
isbn = {978-1-4503-4660-3},
|
||
pages = {145--160},
|
||
numpages = {16},
|
||
url = {https://doi.acm.org/10.1145/3009837.3009873},
|
||
doi = {10.1145/3009837.3009873},
|
||
acmid = {3009873},
|
||
keywords = {Concentration, Martingales, Probabilistic Programs, Termination},
|
||
}
|
||
|
||
@article{mciver2016new,
|
||
author = {Annabelle McIver and
|
||
Carroll Morgan and
|
||
Benjamin Lucien Kaminski and
|
||
Joost{-}Pieter Katoen},
|
||
title = {A new proof rule for almost-sure termination},
|
||
journal = pacmpl,
|
||
volume = {2},
|
||
number = {{POPL}},
|
||
pages = {33:1--33:28},
|
||
year = {2018},
|
||
url = {http://doi.acm.org/10.1145/3158121},
|
||
doi = {10.1145/3158121},
|
||
timestamp = {Fri, 05 Jan 2018 12:57:30 +0100},
|
||
biburl = {http://dblp.org/rec/bib/journals/pacmpl/McIverMKK18},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org}
|
||
}
|
||
|
||
@article{deng2009kantorovich,
|
||
title={The {Kantorovich} Metric in Computer Science: {A} Brief Survey},
|
||
author={Deng, Yuxin and Du, Wenjie},
|
||
journal=entcs,
|
||
volume={253},
|
||
number={3},
|
||
pages={73--82},
|
||
year={2009},
|
||
publisher=elsevier,
|
||
doi={10.1016/j.entcs.2009.10.006},
|
||
url={https://www.sciencedirect.com/science/article/pii/S1571066109004265}
|
||
}
|
||
|
||
@article{ghosh2012universally,
|
||
title={Universally Utility-Maximizing Privacy Mechanisms},
|
||
author={Ghosh, Arpita and Roughgarden, Tim and Sundararajan, Mukund},
|
||
journal=siamjc,
|
||
volume={41},
|
||
number={6},
|
||
pages={1673--1693},
|
||
year={2012},
|
||
doi={10.1137/09076828X},
|
||
url={https://arxiv.org/abs/0811.2841}
|
||
}
|
||
|
||
@misc{Shoup:2004,
|
||
author = {Victor Shoup},
|
||
title = {Sequences of Games: {A} Tool for Taming Complexity in Security Proofs},
|
||
howpublished = {Cryptology ePrint Archive, Report 2004/332},
|
||
year = {2004},
|
||
url = {https://eprint.iacr.org/2004/332},
|
||
}
|
||
|
||
@article{HallWassermanRinaldo,
|
||
author = {Hall, Robert and
|
||
Wasserman, Larry and
|
||
Rinaldo, Alessandro},
|
||
title = {Random Differential Privacy},
|
||
journal = jpc,
|
||
volume = {4},
|
||
issue = {2},
|
||
number = {3},
|
||
url = {https://repository.cmu.edu/jpc/vol4/iss2/3},
|
||
year = 2013}
|
||
|
||
|
||
|
||
@article{DBLP:journals/rsa/HayesV07,
|
||
author = {Thomas P. Hayes and
|
||
Eric Vigoda},
|
||
title = {Variable Length Path Coupling},
|
||
journal = {Random Structures and Algorithms},
|
||
volume = {31},
|
||
number = {3},
|
||
pages = {251--272},
|
||
year = {2007},
|
||
url = {https://doi.org/10.1002/rsa.20166},
|
||
doi = {10.1002/rsa.20166},
|
||
publisher = {Wiley},
|
||
timestamp = {Fri, 26 May 2017 22:50:39 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/rsa/HayesV07},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/rsa/ProppW96,
|
||
author = {James Gary Propp and
|
||
David Bruce Wilson},
|
||
title = {Exact Sampling with Coupled {Markov} Chains and Applications to Statistical Mechanics},
|
||
journal = {Random Structures and Algorithms},
|
||
volume = {9},
|
||
number = {1-2},
|
||
pages = {223--252},
|
||
year = {1996},
|
||
url = {https://doi.org/10.1002/(SICI)1098-2418(199608/09)9:1/2<223::AID-RSA14>3.0.CO;2-O},
|
||
publisher = {Wiley},
|
||
doi = {10.1002/(SICI)1098-2418(199608/09)9:1/2<223::AID-RSA14>3.0.CO;2-O},
|
||
timestamp = {Fri, 26 May 2017 22:50:39 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/rsa/ProppW96},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@InProceedings{fijalkow_et_al:LIPIcs:2017:7368,
|
||
author ={Nathana{\"e}l Fijalkow and Bartek Klin and Prakash Panangaden},
|
||
title ={Expressiveness of Probabilistic Modal Logics, Revisited},
|
||
booktitle =icalp17,
|
||
pages ={105:1--105:12},
|
||
series =lipics,
|
||
ISBN ={978-3-95977-041-5},
|
||
ISSN ={1868-8969},
|
||
year ={2017},
|
||
volume ={80},
|
||
editor ={Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl},
|
||
publisher =dagstuhl,
|
||
address ={Dagstuhl, Germany},
|
||
URL ={https://drops.dagstuhl.de/opus/volltexte/2017/7368},
|
||
URN ={urn:nbn:de:0030-drops-73683},
|
||
doi ={10.4230/LIPIcs.ICALP.2017.105},
|
||
annote ={Keywords: probabilistic modal logic, probabilistic bisimulation, probabilistic simulation}
|
||
}
|
||
|
||
@article{DESHARNAIS2002163,
|
||
title = {Bisimulation for Labelled {Markov} Processes},
|
||
journal = {Information and Computation},
|
||
volume = {179},
|
||
number = {2},
|
||
pages = {163--193},
|
||
year = {2002},
|
||
issn = {0890-5401},
|
||
doi = {10.1006/inco.2001.2962},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S0890540101929621},
|
||
author = {Jos{\'e}e Desharnais and Abbas Edalat and Prakash Panangaden},
|
||
publisher=elsevier
|
||
}
|
||
|
||
@article{DESHARNAIS2003160,
|
||
title = {Approximating Labelled {Markov} Processes},
|
||
journal = {Information and Computation},
|
||
volume = {184},
|
||
number = {1},
|
||
pages = {160--200},
|
||
year = {2003},
|
||
issn = {0890-5401},
|
||
doi = {10.1016/S0890-5401(03)00051-8},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S0890540103000518},
|
||
author = {Jos{\'e}e Desharnais and Vineet Gupta and Radha Jagadeesan and Prakash Panangaden}
|
||
}
|
||
|
||
@article{DESHARNAIS2004323,
|
||
title = {Metrics for Labelled {Markov} Processes},
|
||
journal = tcs,
|
||
volume = {318},
|
||
number = {3},
|
||
pages = {323--354},
|
||
year = {2004},
|
||
issn = {0304-3975},
|
||
publisher = elsevier,
|
||
doi = {10.1016/j.tcs.2003.09.013},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S0304397503006042},
|
||
author = {Jos{\'e}e Desharnais and Vineet Gupta and Radha Jagadeesan and Prakash Panangaden},
|
||
keywords = {Labelled Markov processes, Metric, Process Algebra}
|
||
}
|
||
|
||
@inproceedings{vanBreugel2001a,
|
||
author={van Breugel, Franck and Worrell, James},
|
||
title={An Algorithm for Quantitative Verification of Probabilistic Transition Systems},
|
||
booktitle=concur01,
|
||
year={2001},
|
||
publisher=springer,
|
||
pages={336--350},
|
||
series=lncs,
|
||
volume=2154,
|
||
isbn={978-3-540-44685-9},
|
||
doi={10.1007/3-540-44685-0_23},
|
||
url={https://doi.org/10.1007/3-540-44685-0_23}
|
||
}
|
||
|
||
@inproceedings{vanBreugel2001b,
|
||
author={van Breugel, Franck and Worrell, James},
|
||
editor={Orejas, Fernando and Spirakis, Paul G. and van Leeuwen, Jan},
|
||
title={Towards Quantitative Verification of Probabilistic Transition Systems},
|
||
bookTitle=icalp01,
|
||
year={2001},
|
||
publisher=springer,
|
||
pages={421--432},
|
||
series=lncs,
|
||
volume=2076,
|
||
isbn={978-3-540-48224-6},
|
||
doi={10.1007/3-540-48224-5_35},
|
||
url={https://doi.org/10.1007/3-540-48224-5_35}
|
||
}
|
||
|
||
@phdthesis{desharnais1999labelled,
|
||
title={Labelled {Markov} Processes},
|
||
author={Desharnais, Jos{\'e}e},
|
||
school={{McGill} University},
|
||
url={www.collectionscanada.gc.ca/obj/s4/f2/dsk1/tape3/PQDD_0031/NQ64546.pdf},
|
||
year={1999}
|
||
}
|
||
|
||
@article{DBLP:journals/njc/SegalaL95,
|
||
author = {Roberto Segala and
|
||
Nancy A. Lynch},
|
||
title = {Probabilistic Simulations for Probabilistic Processes},
|
||
journal = {Nordic Journal of Computing},
|
||
volume = {2},
|
||
number = {2},
|
||
pages = {250--273},
|
||
year = {1995},
|
||
doi = {doi.org/10.1007/BFb0015027},
|
||
timestamp = {Wed, 14 Jan 2004 15:33:50 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/njc/SegalaL95},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{durrett2010probability,
|
||
title={Probability: theory and examples},
|
||
author={Durrett, Rick},
|
||
year={2010},
|
||
publisher=cup
|
||
}
|
||
|
||
@article{azuma1967weighted,
|
||
title={Weighted sums of certain dependent random variables},
|
||
author={Azuma, Kazuoki},
|
||
journal={Tohoku Mathematical Journal},
|
||
series=2,
|
||
volume={19},
|
||
number={3},
|
||
pages={357--367},
|
||
year={1967},
|
||
publisher={Mathematical Institute, Tohoku University}
|
||
}
|
||
|
||
@book{rudin-real-complex,
|
||
address = {New York},
|
||
author = {Rudin, Walter},
|
||
edition = {Third},
|
||
isbn = {0-07-054234-1},
|
||
mrclass = {00A05 (26-01 30-01 46-01)},
|
||
mrnumber = {MR924157 (88k:00002)},
|
||
pages = {xiv+416},
|
||
publisher = {McGraw-Hill Book Co.},
|
||
title = {Real and complex analysis},
|
||
year = {1987},
|
||
}
|
||
|
||
@article{DBLP:journals/corr/KerstanK13,
|
||
author = {Henning Kerstan and
|
||
Barbara K{\"{o}}nig},
|
||
title = {Coalgebraic Trace Semantics for Continuous Probabilistic Transition
|
||
Systems},
|
||
journal = lmcs,
|
||
volume = {9},
|
||
number = {4},
|
||
year = {2013},
|
||
url = {https://doi.org/10.2168/LMCS-9(4:16)2013},
|
||
doi = {10.2168/LMCS-9(4:16)2013},
|
||
timestamp = {Wed, 03 May 2017 14:47:57 +0200},
|
||
biburl = {http://dblp.org/rec/bib/journals/corr/KerstanK13},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org}
|
||
}
|
||
|
||
@inproceedings{Pnueli1977,
|
||
author = {Pnueli, Amir},
|
||
title = {The Temporal Logic of Programs},
|
||
booktitle = focs77,
|
||
year = {1977},
|
||
pages = {46--57},
|
||
numpages = {12},
|
||
url = {http://dx.doi.org/10.1109/SFCS.1977.32},
|
||
doi = {10.1109/SFCS.1977.32},
|
||
acmid = {1382534},
|
||
}
|
||
|
||
@inproceedings{kwiatkowska2011prism,
|
||
title={{PRISM} 4.0: Verification of probabilistic real-time systems},
|
||
author={Kwiatkowska, Marta and Norman, Gethin and Parker, David},
|
||
booktitle=cav11,
|
||
pages={585--591},
|
||
year={2011},
|
||
series=lncs,
|
||
volume=6806,
|
||
publisher=springer
|
||
}
|
||
|
||
@inproceedings{DBLP:journals/corr/DehnertJK017,
|
||
author = {Christian Dehnert and
|
||
Sebastian Junges and
|
||
Joost{-}Pieter Katoen and
|
||
Matthias Volk},
|
||
title = {A storm is Coming: {A} Modern Probabilistic Model Checker},
|
||
booktitle = cav17,
|
||
volume = {abs/1702.04311},
|
||
year = {2017},
|
||
url = {http://arxiv.org/abs/1702.04311},
|
||
archivePrefix = {arXiv},
|
||
eprint = {1702.04311},
|
||
timestamp = {Wed, 07 Jun 2017 14:41:26 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/corr/DehnertJK017},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org},
|
||
series = lncs,
|
||
volume = 10427,
|
||
publisher = springer,
|
||
}
|
||
|
||
@inproceedings{Katoen:2016:PMC:2933575.2934574,
|
||
author = {Katoen, Joost-Pieter},
|
||
title = {The Probabilistic Model Checking Landscape},
|
||
booktitle = lics16,
|
||
year = {2016},
|
||
isbn = {978-1-4503-4391-6},
|
||
pages = {31--45},
|
||
numpages = {15},
|
||
url = {http://doi.acm.org/10.1145/2933575.2934574},
|
||
doi = {10.1145/2933575.2934574},
|
||
acmid = {2934574},
|
||
}
|
||
|
||
@incollection{DBLP:reference/mc/BaierAFK18,
|
||
author = {Baier, Christel and
|
||
de Alfaro, Luca and
|
||
Forejt, Vojtech and
|
||
Kwiatkowska, Marta},
|
||
title = {Model Checking Probabilistic Systems},
|
||
booktitle = {Handbook of Model Checking},
|
||
pages = {963--999},
|
||
year = {2018},
|
||
publisher = springer,
|
||
url = {https://doi.org/10.1007/978-3-319-10575-8_28},
|
||
doi = {10.1007/978-3-319-10575-8_28},
|
||
timestamp = {Tue, 29 May 2018 12:30:27 +0200},
|
||
biburl = {https://dblp.org/rec/bib/reference/mc/BaierAFK18},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{benton1994mixed,
|
||
title={A mixed linear and non-linear logic: Proofs, terms and models},
|
||
author={Benton, P Nick},
|
||
booktitle=csl94,
|
||
pages={121--135},
|
||
year={1994},
|
||
organization=springer
|
||
}
|
||
|
||
@article{warner1965randomized,
|
||
title={Randomized response: A survey technique for eliminating evasive answer bias},
|
||
author={Warner, Stanley L.},
|
||
journal={Journal of the American Statistical Association},
|
||
volume={60},
|
||
number={309},
|
||
pages={63--69},
|
||
year={1965},
|
||
publisher={Taylor \& Francis}
|
||
}
|
||
|
||
@inproceedings{erlingsson2014rappor,
|
||
title={Rappor: Randomized aggregatable privacy-preserving ordinal response},
|
||
author={Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra},
|
||
booktitle=ccs14,
|
||
pages={1054--1067},
|
||
year={2014},
|
||
}
|
||
|
||
@article{johnson2018towards,
|
||
title={Towards practical differential privacy for {SQL} queries},
|
||
author={Johnson, Noah and Near, Joseph P and Song, Dawn},
|
||
journal = pvldb,
|
||
note = vldb18,
|
||
volume={11},
|
||
number={5},
|
||
pages={526--539},
|
||
year={2018},
|
||
}
|
||
|
||
@techreport{abowdschmutte,
|
||
title={Revisiting the Economics of Privacy:
|
||
Population Statistics and
|
||
Confidentiality Protection as Public Goods},
|
||
author={Abowd, John M. and Schmutte, Ian M.},
|
||
institution={Center for Economic Studies},
|
||
year=2017,
|
||
month=apr,
|
||
number={17--37},
|
||
}
|
||
|
||
@article{DBLP:journals/pacmpl/VakarKS19,
|
||
author = {Matthijs V{\'{a}}k{\'{a}}r and
|
||
Ohad Kammar and
|
||
Sam Staton},
|
||
title = {A domain theory for statistical probabilistic programming},
|
||
journal = pacmpl,
|
||
number = {{POPL}},
|
||
volume = {3},
|
||
pages = {36:1--36:29},
|
||
year = {2019},
|
||
url = {https://dl.acm.org/citation.cfm?id=3290349},
|
||
timestamp = {Thu, 10 Jan 2019 16:23:01 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/pacmpl/VakarKS19},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
|
||
@article{DBLP:journals/corr/abs-1811-00741,
|
||
author = {Pang Wei Koh and
|
||
Jacob Steinhardt and
|
||
Percy Liang},
|
||
title = {Stronger Data Poisoning Attacks Break Data Sanitization Defenses},
|
||
journal = {CoRR},
|
||
volume = {abs/1811.00741},
|
||
year = {2018},
|
||
url = {http://arxiv.org/abs/1811.00741},
|
||
archivePrefix = {arXiv},
|
||
eprint = {1811.00741},
|
||
timestamp = {Mon, 26 Nov 2018 12:52:45 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/corr/abs-1811-00741},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/nips/SteinhardtKL17,
|
||
author = {Jacob Steinhardt and
|
||
Pang Wei Koh and
|
||
Percy S. Liang},
|
||
title = {Certified Defenses for Data Poisoning Attacks},
|
||
booktitle = nips17,
|
||
pages = {3520--3532},
|
||
year = {2017},
|
||
url = {http://papers.nips.cc/paper/6943-certified-defenses-for-data-poisoning-attacks},
|
||
timestamp = {Mon, 27 Nov 2017 12:38:48 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/nips/SteinhardtKL17},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{DBLP:journals/corr/SzegedyZSBEGF13,
|
||
author = {Christian Szegedy and
|
||
Wojciech Zaremba and
|
||
Ilya Sutskever and
|
||
Joan Bruna and
|
||
Dumitru Erhan and
|
||
Ian J. Goodfellow and
|
||
Rob Fergus},
|
||
title = {Intriguing properties of neural networks},
|
||
booktitle = iclr14,
|
||
volume = {abs/1312.6199},
|
||
year = {2013},
|
||
url = {http://arxiv.org/abs/1312.6199},
|
||
archivePrefix = {arXiv},
|
||
eprint = {1312.6199},
|
||
timestamp = {Mon, 13 Aug 2018 16:47:28 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/corr/SzegedyZSBEGF13},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/icml/BiggioNL12,
|
||
author = {Battista Biggio and
|
||
Blaine Nelson and
|
||
Pavel Laskov},
|
||
title = {Poisoning Attacks against Support Vector Machines},
|
||
booktitle = icml12,
|
||
year = {2012},
|
||
url = {http://icml.cc/2012/papers/880.pdf},
|
||
timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/icml/BiggioNL12},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/jmlr/ChaudhuriMS11,
|
||
author = {Kamalika Chaudhuri and
|
||
Claire Monteleoni and
|
||
Anand D. Sarwate},
|
||
title = {Differentially Private Empirical Risk Minimization},
|
||
journal = {Journal of Machine Learning Research},
|
||
volume = {12},
|
||
pages = {1069--1109},
|
||
year = {2011},
|
||
url = {http://dl.acm.org/citation.cfm?id=2021036},
|
||
timestamp = {Thu, 01 Dec 2011 14:06:59 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/jmlr/ChaudhuriMS11},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:journals/jmlr/KiferST12,
|
||
author = {Daniel Kifer and
|
||
Adam D. Smith and
|
||
Abhradeep Thakurta},
|
||
title = {Private Convex Optimization for Empirical Risk Minimization with Applications to High-dimensional Regression},
|
||
booktitle = colt12,
|
||
pages = {25.1--25.40},
|
||
year = {2012},
|
||
url = {http://www.jmlr.org/proceedings/papers/v23/kifer12/kifer12.pdf},
|
||
timestamp = {Thu, 11 Sep 2014 07:28:56 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/jmlr/KiferST12},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/ccs/FredriksonJR15,
|
||
author = {Matt Fredrikson and
|
||
Somesh Jha and
|
||
Thomas Ristenpart},
|
||
title = {Model Inversion Attacks that Exploit Confidence Information and Basic
|
||
Countermeasures},
|
||
booktitle = ccs15,
|
||
pages = {1322--1333},
|
||
year = {2015},
|
||
url = {https://doi.org/10.1145/2810103.2813677},
|
||
doi = {10.1145/2810103.2813677},
|
||
timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/ccs/FredriksonJR15},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/uss/TramerZJRR16,
|
||
author = {Florian Tram{\`{e}}r and
|
||
Fan Zhang and
|
||
Ari Juels and
|
||
Michael K. Reiter and
|
||
Thomas Ristenpart},
|
||
title = {Stealing Machine Learning Models via Prediction APIs},
|
||
booktitle = usenix16,
|
||
pages = {601--618},
|
||
year = {2016},
|
||
url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer},
|
||
timestamp = {Mon, 05 Sep 2016 15:43:05 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/uss/TramerZJRR16},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{ding2017collecting,
|
||
title={Collecting telemetry data privately},
|
||
author={Ding, Bolin and Kulkarni, Janardhan and Yekhanin, Sergey},
|
||
booktitle=nips17,
|
||
pages={3571--3580},
|
||
year={2017}
|
||
}
|
||
|
||
@techreport{apple-dp,
|
||
title = {Learning with Privacy at Scale},
|
||
author = {Differential Privacy Team},
|
||
institution = {Apple},
|
||
year = 2017,
|
||
url = {https://machinelearning.apple.com/docs/learning-with-privacy-at-scale/appledifferentialprivacysystem.pdf},
|
||
}
|
||
|
||
@inproceedings{axprof,
|
||
title = {Statistical Algorithmic Profiling for Randomized Approximate Programs},
|
||
author = {Joshi, Keyur and
|
||
Fernando, Vimuth and
|
||
Misailovic, Sasa},
|
||
booktitle = icse19,
|
||
year = 2019,
|
||
url = {https://axprof.org/paper-icse19.pdf},
|
||
}
|
||
|
||
@inproceedings{HeunenKSY17,
|
||
author = {Chris Heunen and
|
||
Ohad Kammar and
|
||
Sam Staton and
|
||
Hongseok Yang},
|
||
title = {A convenient category for higher-order probability theory},
|
||
booktitle = lics17,
|
||
pages = {1--12},
|
||
year = {2017},
|
||
url = {https://doi.org/10.1109/LICS.2017.8005137},
|
||
doi = {10.1109/LICS.2017.8005137},
|
||
}
|
||
|
||
@inproceedings{Staton17ESOP,
|
||
author = {Sam Staton},
|
||
title = {Commutative Semantics for Probabilistic Programming},
|
||
booktitle = esop17,
|
||
pages = {855--879},
|
||
year = {2017},
|
||
url = {https://doi.org/10.1007/978-3-662-54434-1\_32},
|
||
doi = {10.1007/978-3-662-54434-1\_32},
|
||
timestamp = {Fri, 19 May 2017 01:25:18 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/esop/Staton17},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/pacmpl/BatzKKMN19,
|
||
author = {Kevin Batz and
|
||
Benjamin Lucien Kaminski and
|
||
Joost{-}Pieter Katoen and
|
||
Christoph Matheja and
|
||
Thomas Noll},
|
||
title = {Quantitative separation logic: a logic for reasoning about probabilistic
|
||
pointer programs},
|
||
journal = pacmpl,
|
||
volume = {3},
|
||
number = {{POPL}},
|
||
pages = {34:1--34:29},
|
||
year = {2019},
|
||
url = {https://doi.org/10.1145/3290347},
|
||
doi = {10.1145/3290347},
|
||
timestamp = {Fri, 10 May 2019 11:01:57 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/pacmpl/BatzKKMN19},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/iacr/ChungP13a,
|
||
author = {Chung, Kai{-}Min and
|
||
Pass, Rafael},
|
||
title = {A Simple {ORAM}},
|
||
journal = {{IACR} Cryptology ePrint Archive},
|
||
volume = {2013},
|
||
pages = {243},
|
||
year = {2013},
|
||
url = {http://eprint.iacr.org/2013/243},
|
||
timestamp = {Tue, 14 Aug 2018 17:08:07 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/iacr/ChungP13a},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/ccs/WangNLCSSH14,
|
||
author = {Wang, Xiao Shaun and
|
||
Nayak, Kartik and
|
||
Liu, Chang and
|
||
Chan, T.{-}H. Hubert and
|
||
Shi, Elaine and
|
||
Stefanov, Emil and
|
||
Huang, Yan},
|
||
title = {Oblivious Data Structures},
|
||
booktitle = ccs14,
|
||
pages = {215--226},
|
||
year = {2014},
|
||
url = {https://doi.org/10.1145/2660267.2660314},
|
||
doi = {10.1145/2660267.2660314},
|
||
timestamp = {Tue, 06 Nov 2018 11:07:30 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/ccs/WangNLCSSH14},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
|
||
@article{DBLP:journals/jacm/GoldreichO96,
|
||
author = {Goldreich, Oded and
|
||
Ostrovsky, Rafail},
|
||
title = {Software Protection and Simulation on Oblivious RAMs},
|
||
journal = jacm,
|
||
volume = {43},
|
||
number = {3},
|
||
pages = {431--473},
|
||
year = {1996},
|
||
url = {https://doi.org/10.1145/233551.233553},
|
||
doi = {10.1145/233551.233553},
|
||
timestamp = {Wed, 14 Nov 2018 10:35:25 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/jacm/GoldreichO96},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/stoc/ValiantB81,
|
||
author = {Valiant, Leslie G. and
|
||
Brebner, Gordon J.},
|
||
title = {Universal Schemes for Parallel Communication},
|
||
booktitle = stoc81,
|
||
pages = {263--277},
|
||
year = {1981},
|
||
url = {https://doi.org/10.1145/800076.802479},
|
||
doi = {10.1145/800076.802479},
|
||
timestamp = {Tue, 06 Nov 2018 11:07:06 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/stoc/ValiantB81},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/jcss/KalaiV05,
|
||
author = {Adam Tauman Kalai and
|
||
Santosh Vempala},
|
||
title = {Efficient algorithms for online decision problems},
|
||
journal = jcss,
|
||
volume = {71},
|
||
number = {3},
|
||
pages = {291--307},
|
||
year = {2005},
|
||
url = {https://doi.org/10.1016/j.jcss.2004.10.016},
|
||
doi = {10.1016/j.jcss.2004.10.016},
|
||
timestamp = {Sat, 20 May 2017 00:25:52 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/jcss/KalaiV05},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{hannan1957approximation,
|
||
title={Approximation to {Bayes} risk in repeated play},
|
||
author={Hannan, James},
|
||
journal={Contributions to the Theory of Games},
|
||
volume={3},
|
||
pages={97--139},
|
||
year={1957}
|
||
}
|
||
|
||
|
||
|
||
@article{DBLP:journals/jc/ChorG89,
|
||
author = {Chor, Benny and
|
||
Goldreich, Oded},
|
||
title = {On the power of two-point based sampling},
|
||
journal = {J. Complexity},
|
||
volume = {5},
|
||
number = {1},
|
||
pages = {96--106},
|
||
year = {1989},
|
||
url = {https://doi.org/10.1016/0885-064X(89)90015-0},
|
||
doi = {10.1016/0885-064X(89)90015-0},
|
||
timestamp = {Fri, 02 Nov 2018 09:29:43 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/jc/ChorG89},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/jfp/JungKJBBD18,
|
||
author = {Jung, Ralf and
|
||
Krebbers, Robbert and
|
||
Jourdan, Jacques{-}Henri and
|
||
Bizjak, Ales and
|
||
Birkedal, Lars and
|
||
Dreyer, Derek},
|
||
title = {Iris from the ground up: {A} modular foundation for higher-order concurrent
|
||
separation logic},
|
||
journal = {J. Funct. Program.},
|
||
volume = {28},
|
||
pages = {e20},
|
||
year = {2018},
|
||
url = {https://doi.org/10.1017/S0956796818000151},
|
||
doi = {10.1017/S0956796818000151},
|
||
timestamp = {Tue, 15 Jan 2019 17:06:15 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/jfp/JungKJBBD18},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/SergeyNB15,
|
||
author = {Sergey, Ilya and
|
||
Nanevski, Aleksandar and
|
||
Banerjee, Anindya},
|
||
title = {Mechanized verification of fine-grained concurrent programs},
|
||
booktitle = pldi15,
|
||
pages = {77--87},
|
||
year = {2015},
|
||
url = {https://doi.org/10.1145/2737924.2737964},
|
||
doi = {10.1145/2737924.2737964},
|
||
timestamp = {Tue, 06 Nov 2018 16:59:30 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/pldi/SergeyNB15},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{cramer2016politics,
|
||
title={The Politics of Resentment: Rural Consciousness in Wisconsin and the Rise of {Scott Walker}},
|
||
author={Cramer, Katherine J.},
|
||
year={2016},
|
||
publisher={University of Chicago Press}
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/OHearn07,
|
||
author = {Peter W. O'Hearn},
|
||
title = {Resources, concurrency, and local reasoning},
|
||
journal = tcs,
|
||
volume = {375},
|
||
number = {1--3},
|
||
pages = {271--307},
|
||
year = {2007},
|
||
url = {https://doi.org/10.1016/j.tcs.2006.12.035},
|
||
doi = {10.1016/j.tcs.2006.12.035},
|
||
timestamp = {Wed, 14 Nov 2018 10:33:29 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/tcs/OHearn07},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/WangHR18,
|
||
author = {Wang, Di and
|
||
Hoffmann, Jan and
|
||
Reps, Thomas W.},
|
||
title = {{PMAF:} an algebraic framework for static analysis of probabilistic programs},
|
||
booktitle = pldi18,
|
||
pages = {513--528},
|
||
year = {2018},
|
||
url = {https://doi.org/10.1145/3192366.3192408},
|
||
doi = {10.1145/3192366.3192408},
|
||
timestamp = {Wed, 21 Nov 2018 12:44:27 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/pldi/WangHR18},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/pacmpl/TassarottiH19,
|
||
author = {Joseph Tassarotti and
|
||
Robert Harper},
|
||
title = {A separation logic for concurrent randomized programs},
|
||
journal = pacmpl,
|
||
volume = {3},
|
||
number = {{POPL}},
|
||
pages = {64:1--64:30},
|
||
year = {2019},
|
||
url = {https://doi.org/10.1145/3290377},
|
||
doi = {10.1145/3290377},
|
||
timestamp = {Fri, 10 May 2019 11:01:57 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/pacmpl/TassarottiH19},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@misc{FB:differential-privacy,
|
||
author = {{DeGregorio}, Christina and
|
||
Hillenbrand, Bennett and
|
||
Li, Da and
|
||
Messing, Solomon and
|
||
Nayak, Chaya},
|
||
title = {Preserving privacy while fostering meaningful research on elections and democracy},
|
||
year = 2019,
|
||
url = {https://research.fb.com/preserving-privacy-while-fostering-meaningful-research-on-elections-and-democracy/},
|
||
institution = {Facebook Research},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/nfm/CalcagnoD11,
|
||
author = {Cristiano Calcagno and
|
||
Dino Distefano},
|
||
title = {Infer: An Automatic Program Verifier for Memory Safety of {C} Programs},
|
||
booktitle = nfm11,
|
||
pages = {459--465},
|
||
year = {2011},
|
||
series = lncs,
|
||
volume = {6617},
|
||
publisher = springer,
|
||
url = {https://doi.org/10.1007/978-3-642-20398-5\_33},
|
||
doi = {10.1007/978-3-642-20398-5\_33},
|
||
timestamp = {Sun, 02 Jun 2019 21:14:09 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/nfm/CalcagnoD11},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/nfm/CalcagnoDDGHLOP15,
|
||
author = {Cristiano Calcagno and
|
||
Dino Distefano and
|
||
J{\'{e}}r{\'{e}}my Dubreil and
|
||
Dominik Gabi and
|
||
Pieter Hooimeijer and
|
||
Martino Luca and
|
||
Peter W. O'Hearn and
|
||
Irene Papakonstantinou and
|
||
Jim Purbrick and
|
||
Dulma Rodriguez},
|
||
title = {Moving Fast with Software Verification},
|
||
booktitle = nfm15,
|
||
pages = {3--11},
|
||
year = {2015},
|
||
url = {https://doi.org/10.1007/978-3-319-17524-9\_1},
|
||
series = lncs,
|
||
volume = {9058},
|
||
publisher = springer,
|
||
doi = {10.1007/978-3-319-17524-9\_1},
|
||
timestamp = {Sun, 02 Jun 2019 21:14:09 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/nfm/CalcagnoDDGHLOP15},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/mscs/GalmicheMJP05,
|
||
author = {Didier Galmiche and
|
||
Daniel M{\'{e}}ry and
|
||
David J. Pym},
|
||
title = {The semantics of {BI} and resource tableaux},
|
||
journal = mscs,
|
||
volume = {15},
|
||
number = {6},
|
||
pages = {1033--1088},
|
||
year = {2005},
|
||
url = {https://doi.org/10.1017/S0960129505004858},
|
||
doi = {10.1017/S0960129505004858},
|
||
timestamp = {Sun, 28 May 2017 13:25:37 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/mscs/GalmicheMJP05},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/Brookes07,
|
||
author = {Stephen Brookes},
|
||
title = {A semantics for concurrent separation logic},
|
||
journal = tcs,
|
||
volume = {375},
|
||
number = {1--3},
|
||
pages = {227--270},
|
||
year = {2007},
|
||
url = {https://doi.org/10.1016/j.tcs.2006.12.034},
|
||
doi = {10.1016/j.tcs.2006.12.034},
|
||
timestamp = {Wed, 14 Nov 2018 10:33:34 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/tcs/Brookes07},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/tcs/OHearn07,
|
||
author = {Peter W. O'Hearn},
|
||
title = {Resources, concurrency, and local reasoning},
|
||
journal = tcs,
|
||
volume = {375},
|
||
number = {1--3},
|
||
pages = {271--307},
|
||
year = {2007},
|
||
url = {https://doi.org/10.1016/j.tcs.2006.12.035},
|
||
doi = {10.1016/j.tcs.2006.12.035},
|
||
timestamp = {Wed, 14 Nov 2018 10:33:29 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/tcs/OHearn07},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@techreport{reynolds-SL,
|
||
author = {John C. Reynolds},
|
||
title = {An Introduction to Separation Logic (Preliminary Draft)},
|
||
institution = {ITU University, Copenhagen},
|
||
year = 2008,
|
||
url = {https://www.cs.cmu.edu/~jcr/copenhagen08.pdf},
|
||
}
|
||
|
||
@book{PymMono,
|
||
title={The Semantics and Proof Theory of the Logic of Bunched Implications},
|
||
author={David J. Pym},
|
||
year={2002},
|
||
publisher={Kluwer Academic Publishers},
|
||
series={Applied Logic Series},
|
||
volume={26},
|
||
note={Errata and Remarks maintained at:
|
||
\url{http://www.cantab.net/users/david.pym/BI-monograph-errata.pdf}},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/Pym99,
|
||
author = {David J. Pym},
|
||
title = {On Bunched Predicate Logic},
|
||
booktitle = lics99,
|
||
pages = {183--192},
|
||
year = {1999},
|
||
url = {https://doi.org/10.1109/LICS.1999.782614},
|
||
doi = {10.1109/LICS.1999.782614},
|
||
timestamp = {Thu, 25 May 2017 00:42:40 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/lics/Pym99},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/pacmpl/EhrhardPT18,
|
||
author = {Thomas Ehrhard and
|
||
Michele Pagani and
|
||
Christine Tasson},
|
||
title = {Measurable cones and stable, measurable functions: a model for probabilistic
|
||
higher-order programming},
|
||
journal = pacmpl,
|
||
volume = {2},
|
||
number = {{POPL}},
|
||
pages = {59:1--59:28},
|
||
year = {2018},
|
||
url = {https://doi.org/10.1145/3158147},
|
||
doi = {10.1145/3158147},
|
||
timestamp = {Tue, 06 Nov 2018 12:51:05 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/pacmpl/EhrhardPT18},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@phdthesis{Yang:2001:LRS:933728,
|
||
author = {Yang, Hongseok},
|
||
advisor = {Reddy, Uday S.},
|
||
title = {Local Reasoning for Stateful Programs},
|
||
year = {2001},
|
||
isbn = {0-493-35008-X},
|
||
note = {AAI3023240},
|
||
publisher = {University of Illinois at Urbana-Champaign},
|
||
address = {Champaign, IL, USA},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/iclr/PapernotSMRTE18,
|
||
author = {Nicolas Papernot and
|
||
Shuang Song and
|
||
Ilya Mironov and
|
||
Ananth Raghunathan and
|
||
Kunal Talwar and
|
||
{\'{U}}lfar Erlingsson},
|
||
title = {Scalable Private Learning with {PATE}},
|
||
booktitle = iclr18,
|
||
year = {2018},
|
||
url = {https://openreview.net/forum?id=rkZB1XbRZ},
|
||
timestamp = {Thu, 25 Jul 2019 16:33:00 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/iclr/PapernotSMRTE18},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/ccs/AbadiCGMMT016,
|
||
author = {Mart{\'{\i}}n Abadi and
|
||
Andy Chu and
|
||
Ian J. Goodfellow and
|
||
H. Brendan McMahan and
|
||
Ilya Mironov and
|
||
Kunal Talwar and
|
||
Li Zhang},
|
||
title = {Deep Learning with Differential Privacy},
|
||
booktitle = ccs16,
|
||
pages = {308--318},
|
||
year = {2016},
|
||
url = {https://doi.org/10.1145/2976749.2978318},
|
||
doi = {10.1145/2976749.2978318},
|
||
timestamp = {Wed, 14 Nov 2018 10:54:58 +0100},
|
||
biburl = {https://dblp.org/rec/bib/conf/ccs/AbadiCGMMT016},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/nips/SteinhardtKL17,
|
||
author = {Jacob Steinhardt and
|
||
Pang Wei Koh and
|
||
Percy Liang},
|
||
title = {Certified Defenses for Data Poisoning Attacks},
|
||
booktitle = nips17,
|
||
pages = {3517--3529},
|
||
year = {2017},
|
||
url = {http://papers.nips.cc/paper/6943-certified-defenses-for-data-poisoning-attacks},
|
||
timestamp = {Tue, 23 Jul 2019 16:55:15 +0200},
|
||
biburl = {https://dblp.org/rec/bib/conf/nips/SteinhardtKL17},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{goldstein2017janesville,
|
||
title={Janesville: An {American} Story},
|
||
author={Goldstein, A.},
|
||
isbn={9781501102288},
|
||
lccn={2017019295},
|
||
year={2017},
|
||
publisher={Simon \& Schuster}
|
||
}
|
||
|
||
@misc{uw-headcount,
|
||
title = {Headcount Enrollment by Wisconsin County of Origin},
|
||
author = {The University of Wisconsin System},
|
||
year = {2017--2018},
|
||
url = {https://www.wisconsin.edu/education-reports-statistics/student-statistics/},
|
||
}
|
||
|
||
@unpublished{Darais:2018,
|
||
author = {David Darais and
|
||
Chang Liu and
|
||
Ian Sweet and
|
||
Michael Hicks},
|
||
title = {A Language for Probabilistically Oblivious Computation},
|
||
journal = {CoRR},
|
||
volume = {abs/1711.09305},
|
||
year = {2017},
|
||
url = {http://arxiv.org/abs/1711.09305},
|
||
archivePrefix = {arXiv},
|
||
eprint = {1711.09305},
|
||
timestamp = {Mon, 13 Aug 2018 16:47:25 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/corr/abs-1711-09305},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/GuSCKKWSC19,
|
||
author = {Ronghui Gu and
|
||
Zhong Shao and
|
||
Hao Chen and
|
||
Jieung Kim and
|
||
J{\'{e}}r{\'{e}}mie Koenig and
|
||
Xiongnan (Newman) Wu and
|
||
Vilhelm Sj{\"{o}}berg and
|
||
David Costanzo},
|
||
title = {Building certified concurrent {OS} kernels},
|
||
journal = cacm,
|
||
volume = {62},
|
||
number = {10},
|
||
pages = {89--99},
|
||
year = {2019},
|
||
url = {https://doi.org/10.1145/3356903},
|
||
doi = {10.1145/3356903},
|
||
timestamp = {Wed, 09 Oct 2019 15:30:36 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/cacm/GuSCKKWSC19},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/Leroy09,
|
||
author = {Xavier Leroy},
|
||
title = {Formal verification of a realistic compiler},
|
||
journal = cacm,
|
||
volume = {52},
|
||
number = {7},
|
||
pages = {107--115},
|
||
year = {2009},
|
||
url = {https://doi.org/10.1145/1538788.1538814},
|
||
doi = {10.1145/1538788.1538814},
|
||
timestamp = {Tue, 06 Nov 2018 12:51:38 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/cacm/Leroy09},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/BesseyBCCFHHKME10,
|
||
author = {Al Bessey and
|
||
Ken Block and
|
||
Benjamin Chelf and
|
||
Andy Chou and
|
||
Bryan Fulton and
|
||
Seth Hallem and
|
||
Charles{-}Henri Gros and
|
||
Asya Kamsky and
|
||
Scott McPeak and
|
||
Dawson R. Engler},
|
||
title = {A few billion lines of code later: using static analysis to find bugs
|
||
in the real world},
|
||
journal = cacm,
|
||
volume = {53},
|
||
number = {2},
|
||
pages = {66--75},
|
||
year = {2010},
|
||
url = {https://doi.org/10.1145/1646353.1646374},
|
||
doi = {10.1145/1646353.1646374},
|
||
timestamp = {Sun, 02 Jun 2019 20:48:59 +0200},
|
||
biburl = {https://dblp.org/rec/bib/journals/cacm/BesseyBCCFHHKME10},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/MouraB11,
|
||
author = {Leonardo Mendon{\c{c}}a de Moura and
|
||
Nikolaj Bj{\o}rner},
|
||
title = {Satisfiability modulo theories: introduction and applications},
|
||
journal = cacm,
|
||
volume = {54},
|
||
number = {9},
|
||
pages = {69--77},
|
||
year = {2011},
|
||
url = {https://doi.org/10.1145/1995376.1995394},
|
||
doi = {10.1145/1995376.1995394},
|
||
timestamp = {Tue, 06 Nov 2018 12:51:39 +0100},
|
||
biburl = {https://dblp.org/rec/bib/journals/cacm/MouraB11},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/sp/NarayananS08,
|
||
author = {Arvind Narayanan and
|
||
Vitaly Shmatikov},
|
||
title = {Robust De-anonymization of Large Sparse Datasets},
|
||
booktitle = sp08,
|
||
pages = {111--125},
|
||
year = {2008},
|
||
url = {https://doi.org/10.1109/SP.2008.33},
|
||
doi = {10.1109/SP.2008.33},
|
||
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
|
||
biburl = {https://dblp.org/rec/conf/sp/NarayananS08.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/sp/CalandrinoKNFS11,
|
||
author = {Joseph A. Calandrino and
|
||
Ann Kilzer and
|
||
Arvind Narayanan and
|
||
Edward W. Felten and
|
||
Vitaly Shmatikov},
|
||
title = {"You Might Also Like: " Privacy Risks of Collaborative Filtering},
|
||
booktitle = sp11,
|
||
pages = {231--246},
|
||
year = {2011},
|
||
url = {https://doi.org/10.1109/SP.2011.40},
|
||
doi = {10.1109/SP.2011.40},
|
||
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
|
||
biburl = {https://dblp.org/rec/conf/sp/CalandrinoKNFS11.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/rsa/DubhashiR98,
|
||
author = {Devdatt P. Dubhashi and
|
||
Desh Ranjan},
|
||
title = {Balls and bins: {A} study in negative dependence},
|
||
journal = {Random Struct. Algorithms},
|
||
volume = {13},
|
||
number = {2},
|
||
pages = {99--124},
|
||
year = {1998},
|
||
}
|
||
|
||
@article{borcea2009negative,
|
||
title={Negative dependence and the geometry of polynomials},
|
||
author={Borcea, Julius and Br{\"a}nd{\'e}n, Petter and Liggett, Thomas},
|
||
journal={Journal of the American Mathematical Society},
|
||
volume={22},
|
||
number={2},
|
||
pages={521--567},
|
||
year={2009}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/lics/HannulaKBV20,
|
||
author = {Hannula, Miika and
|
||
Kontinen, Juha and
|
||
Van den Bussche, Jan and
|
||
Virtema, Jonni},
|
||
title = {Descriptive complexity of real computation and probabilistic independence logic},
|
||
booktitle = lics20,
|
||
pages = {550--563},
|
||
year = {2020},
|
||
url = {https://doi.org/10.1145/3373718.3394773},
|
||
doi = {10.1145/3373718.3394773},
|
||
timestamp = {Tue, 02 Jun 2020 17:19:31 +0200},
|
||
biburl = {https://dblp.org/rec/conf/lics/HannulaKBV20.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/foiks/0001HKMV18,
|
||
author = {Arnaud Durand and
|
||
Miika Hannula and
|
||
Juha Kontinen and
|
||
Arne Meier and
|
||
Jonni Virtema},
|
||
title = {Probabilistic Team Semantics},
|
||
booktitle = {Foundations of Information and Knowledge Systems ({FoIKS}), Budapest, Hungary},
|
||
pages = {186--206},
|
||
year = {2018},
|
||
url = {https://doi.org/10.1007/978-3-319-90050-6\_11},
|
||
doi = {10.1007/978-3-319-90050-6\_11},
|
||
timestamp = {Sat, 19 Oct 2019 20:18:09 +0200},
|
||
biburl = {https://dblp.org/rec/conf/foiks/0001HKMV18.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/scp/ErnstPGMPTX07,
|
||
author = {Michael D. Ernst and
|
||
Jeff H. Perkins and
|
||
Philip J. Guo and
|
||
Stephen McCamant and
|
||
Carlos Pacheco and
|
||
Matthew S. Tschantz and
|
||
Chen Xiao},
|
||
title = {The {Daikon} system for dynamic detection of likely invariants},
|
||
journal = {Sci. Comput. Program.},
|
||
volume = {69},
|
||
number = {1-3},
|
||
pages = {35--45},
|
||
year = {2007},
|
||
url = {https://doi.org/10.1016/j.scico.2007.01.015},
|
||
doi = {10.1016/j.scico.2007.01.015},
|
||
timestamp = {Sat, 27 May 2017 14:22:55 +0200},
|
||
biburl = {https://dblp.org/rec/journals/scp/ErnstPGMPTX07.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/0001NMR16,
|
||
author = {Pranav Garg and
|
||
Daniel Neider and
|
||
P. Madhusudan and
|
||
Dan Roth},
|
||
title = {Learning invariants using decision trees and implication counterexamples},
|
||
booktitle = popl16,
|
||
pages = {499--512},
|
||
year = {2016},
|
||
url = {https://doi.org/10.1145/2837614.2837664},
|
||
doi = {10.1145/2837614.2837664},
|
||
timestamp = {Tue, 06 Nov 2018 11:07:43 +0100},
|
||
biburl = {https://dblp.org/rec/conf/popl/0001NMR16.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{ding2018detecting,
|
||
title={Detecting violations of differential privacy},
|
||
author={Ding, Zeyu and Wang, Yuxin and Wang, Guanhong and Zhang, Danfeng and Kifer, Daniel},
|
||
booktitle=ccs18,
|
||
pages={475--489},
|
||
year={2018}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/oopsla/CarbinMR13,
|
||
author = {Michael Carbin and
|
||
Sasa Misailovic and
|
||
Martin C. Rinard},
|
||
title = {Verifying quantitative reliability for programs that execute on unreliable
|
||
hardware},
|
||
booktitle = oopsla13,
|
||
pages = {33--52},
|
||
publisher = {{ACM}},
|
||
year = {2013},
|
||
url = {https://doi.org/10.1145/2509136.2509546},
|
||
doi = {10.1145/2509136.2509546},
|
||
timestamp = {Tue, 06 Nov 2018 16:57:16 +0100},
|
||
biburl = {https://dblp.org/rec/conf/oopsla/CarbinMR13.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/icalp/BaierCHKR97,
|
||
author = {Christel Baier and
|
||
Edmund M. Clarke and
|
||
Vasiliki Hartonas{-}Garmhausen and
|
||
Marta Z. Kwiatkowska and
|
||
Mark Ryan},
|
||
title = {Symbolic Model Checking for Probabilistic Processes},
|
||
booktitle = icalp97,
|
||
series = lncs,
|
||
volume = {1256},
|
||
pages = {430--440},
|
||
publisher = {Springer},
|
||
year = {1997},
|
||
url = {https://doi.org/10.1007/3-540-63165-8\_199},
|
||
doi = {10.1007/3-540-63165-8\_199},
|
||
timestamp = {Tue, 14 May 2019 10:00:44 +0200},
|
||
biburl = {https://dblp.org/rec/conf/icalp/BaierCHKR97.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/qest/GretzKM13,
|
||
author = {Friedrich Gretz and
|
||
Joost{-}Pieter Katoen and
|
||
Annabelle McIver},
|
||
title = {Prinsys - On a Quest for Probabilistic Loop Invariants},
|
||
booktitle = {International Confnerece on Quantitative Evaluation of Systems
|
||
{(QEST)}, Buenos Aires, Argentina},
|
||
series = lncs,
|
||
volume = {8054},
|
||
pages = {193--208},
|
||
publisher = {Springer},
|
||
year = {2013},
|
||
url = {https://doi.org/10.1007/978-3-642-40196-1\_17},
|
||
doi = {10.1007/978-3-642-40196-1\_17},
|
||
timestamp = {Tue, 14 May 2019 10:00:53 +0200},
|
||
biburl = {https://dblp.org/rec/conf/qest/GretzKM13.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/cav/ChenHWZ15,
|
||
author = {Yu{-}Fang Chen and
|
||
Chih{-}Duo Hong and
|
||
Bow{-}Yaw Wang and
|
||
Lijun Zhang},
|
||
title = {Counterexample-Guided Polynomial Loop Invariant Generation by
|
||
{Lagrange} Interpolation},
|
||
booktitle = cav15,
|
||
series = lncs,
|
||
volume = {9206},
|
||
pages = {658--674},
|
||
publisher = {Springer},
|
||
year = {2015},
|
||
url = {https://doi.org/10.1007/978-3-319-21690-4\_44},
|
||
doi = {10.1007/978-3-319-21690-4\_44},
|
||
timestamp = {Tue, 29 Dec 2020 18:27:33 +0100},
|
||
biburl = {https://dblp.org/rec/conf/cav/ChenHWZ15.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{dijkstra-wp,
|
||
author = {Edsger W. Dijkstra},
|
||
editor = {Friedrich L. Bauer and
|
||
Klaus Samelson},
|
||
title = {Guarded commands, non-determinancy and a calculus for the derivation
|
||
of programs},
|
||
booktitle = {Language Hierarchies and Interfaces, International Summer School,
|
||
Marktoberdorf, Germany},
|
||
series = lncs,
|
||
volume = {46},
|
||
pages = {111--124},
|
||
publisher = {Springer},
|
||
year = {1975},
|
||
url = {https://doi.org/10.1007/3-540-07994-7\_51},
|
||
doi = {10.1007/3-540-07994-7\_51},
|
||
timestamp = {Fri, 17 Jul 2020 16:12:47 +0200},
|
||
biburl = {https://dblp.org/rec/conf/ac/Dijkstra75a.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/fm/FlanaganL01,
|
||
author = {Cormac Flanagan and
|
||
K. Rustan M. Leino},
|
||
editor = {Jos{\'{e}} Nuno Oliveira and
|
||
Pamela Zave},
|
||
title = {Houdini, an Annotation Assistant for ESC/Java},
|
||
booktitle = {International Symposium of Formal Methods Europe {(FME)}, Berlin, Germany},
|
||
series = lncs,
|
||
volume = {2021},
|
||
pages = {500--517},
|
||
publisher = {Springer},
|
||
year = {2001},
|
||
url = {https://doi.org/10.1007/3-540-45251-6\_29},
|
||
doi = {10.1007/3-540-45251-6\_29},
|
||
timestamp = {Tue, 14 May 2019 10:00:46 +0200},
|
||
biburl = {https://dblp.org/rec/conf/fm/FlanaganL01.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/pacmpl/BatzKKM21,
|
||
author = {Kevin Batz and
|
||
Benjamin Lucien Kaminski and
|
||
Joost{-}Pieter Katoen and
|
||
Christoph Matheja},
|
||
title = {Relatively complete verification of probabilistic programs: an expressive
|
||
language for expectation-based reasoning},
|
||
journal = pacmpl,
|
||
volume = {5},
|
||
number = {{POPL}},
|
||
pages = {1--30},
|
||
year = {2021},
|
||
url = {https://doi.org/10.1145/3434320},
|
||
doi = {10.1145/3434320},
|
||
timestamp = {Wed, 20 Jan 2021 12:05:40 +0100},
|
||
biburl = {https://dblp.org/rec/journals/pacmpl/BatzKKM21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@phdthesis{DBLP:phd/dnb/Kaminski19,
|
||
author = {Benjamin Lucien Kaminski},
|
||
title = {Advanced weakest precondition calculi for probabilistic programs},
|
||
school = {{RWTH} Aachen University, Germany},
|
||
year = {2019},
|
||
url = {http://publications.rwth-aachen.de/record/755408},
|
||
urn = {urn:nbn:de:101:1-2019072507004473397003},
|
||
timestamp = {Wed, 12 Feb 2020 16:41:35 +0100},
|
||
biburl = {https://dblp.org/rec/phd/dnb/Kaminski19.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{quinlan1992learning,
|
||
title={Learning with continuous classes},
|
||
author={Quinlan, J. R.},
|
||
booktitle={Australian Joint Conference on Artificial Intelligence ({AI}), Hobart, Tasmania},
|
||
volume=92,
|
||
pages={343--348},
|
||
year={1992},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/esop/FarinaCG21,
|
||
author = {Gian Pietro Farina and
|
||
Stephen Chong and
|
||
Marco Gaboardi},
|
||
editor = {Nobuko Yoshida},
|
||
title = {Coupled Relational Symbolic Execution for Differential Privacy},
|
||
booktitle = esop21,
|
||
series = lncs,
|
||
volume = {12648},
|
||
pages = {207--233},
|
||
publisher = springer,
|
||
year = {2021},
|
||
url = {https://doi.org/10.1007/978-3-030-72019-3\_8},
|
||
doi = {10.1007/978-3-030-72019-3\_8},
|
||
timestamp = {Fri, 14 May 2021 08:34:21 +0200},
|
||
biburl = {https://dblp.org/rec/conf/esop/FarinaCG21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/esop/MoosbruggerBKK21,
|
||
author = {Marcel Moosbrugger and
|
||
Ezio Bartocci and
|
||
Joost{-}Pieter Katoen and
|
||
Laura Kov{\'{a}}cs},
|
||
editor = {Nobuko Yoshida},
|
||
title = {Automated Termination Analysis of Polynomial Probabilistic Programs},
|
||
booktitle = esop21,
|
||
series = lncs,
|
||
volume = {12648},
|
||
pages = {491--518},
|
||
publisher = springer,
|
||
year = {2021},
|
||
url = {https://doi.org/10.1007/978-3-030-72019-3\_18},
|
||
doi = {10.1007/978-3-030-72019-3\_18},
|
||
timestamp = {Fri, 14 May 2021 08:34:21 +0200},
|
||
biburl = {https://dblp.org/rec/conf/esop/MoosbruggerBKK21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/tacas/BartocciKS20,
|
||
author = {Ezio Bartocci and
|
||
Laura Kov{\'{a}}cs and
|
||
Miroslav Stankovic},
|
||
editor = {Armin Biere and
|
||
David Parker},
|
||
title = {Mora -- Automatic Generation of Moment-Based Invariants},
|
||
booktitle = tacas20,
|
||
series = lncs,
|
||
volume = {12078},
|
||
pages = {492--498},
|
||
publisher = springer,
|
||
year = {2020},
|
||
url = {https://doi.org/10.1007/978-3-030-45190-5\_28},
|
||
doi = {10.1007/978-3-030-45190-5\_28},
|
||
timestamp = {Fri, 14 May 2021 08:34:17 +0200},
|
||
biburl = {https://dblp.org/rec/conf/tacas/BartocciKS20.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/atva/BartocciKS19,
|
||
author = {Ezio Bartocci and
|
||
Laura Kov{\'{a}}cs and
|
||
Miroslav Stankovic},
|
||
editor = {Yu{-}Fang Chen and
|
||
Chih{-}Hong Cheng and
|
||
Javier Esparza},
|
||
title = {Automatic Generation of Moment-Based Invariants for Prob-Solvable
|
||
Loops},
|
||
booktitle = atva19,
|
||
series = lncs,
|
||
volume = {11781},
|
||
pages = {255--276},
|
||
publisher = springer,
|
||
year = {2019},
|
||
url = {https://doi.org/10.1007/978-3-030-31784-3\_15},
|
||
doi = {10.1007/978-3-030-31784-3\_15},
|
||
timestamp = {Mon, 15 Jun 2020 17:01:21 +0200},
|
||
biburl = {https://dblp.org/rec/conf/atva/BartocciKS19.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/WangS0CG21,
|
||
author = {Jinyi Wang and
|
||
Yican Sun and
|
||
Hongfei Fu and
|
||
Krishnendu Chatterjee and
|
||
Amir Kafshdar Goharshady},
|
||
editor = {Stephen N. Freund and
|
||
Eran Yahav},
|
||
title = {Quantitative analysis of assertion violations in probabilistic programs},
|
||
booktitle = pldi21,
|
||
pages = {1171--1186},
|
||
publisher = {{ACM}},
|
||
year = {2021},
|
||
url = {https://doi.org/10.1145/3453483.3454102},
|
||
doi = {10.1145/3453483.3454102},
|
||
timestamp = {Mon, 21 Jun 2021 13:42:02 +0200},
|
||
biburl = {https://dblp.org/rec/conf/pldi/WangS0CG21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/Bloom70,
|
||
author = {Burton H. Bloom},
|
||
title = {Space/Time Trade-offs in Hash Coding with Allowable Errors},
|
||
journal = cacm,
|
||
volume = {13},
|
||
number = {7},
|
||
pages = {422--426},
|
||
year = {1970},
|
||
url = {https://doi.org/10.1145/362686.362692},
|
||
doi = {10.1145/362686.362692},
|
||
timestamp = {Wed, 14 Nov 2018 10:22:32 +0100},
|
||
biburl = {https://dblp.org/rec/journals/cacm/Bloom70.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/ipl/BoseGKMMMST08,
|
||
author = {Prosenjit Bose and
|
||
Hua Guo and
|
||
Evangelos Kranakis and
|
||
Anil Maheshwari and
|
||
Pat Morin and
|
||
Jason Morrison and
|
||
Michiel H. M. Smid and
|
||
Yihui Tang},
|
||
title = {On the false-positive rate of Bloom filters},
|
||
journal = {Inf. Process. Lett.},
|
||
volume = {108},
|
||
number = {4},
|
||
pages = {210--213},
|
||
year = {2008},
|
||
url = {https://doi.org/10.1016/j.ipl.2008.05.018},
|
||
doi = {10.1016/j.ipl.2008.05.018},
|
||
timestamp = {Fri, 30 Nov 2018 13:29:08 +0100},
|
||
biburl = {https://dblp.org/rec/journals/ipl/BoseGKMMMST08.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/cav/GopinathanS20,
|
||
author = {Kiran Gopinathan and
|
||
Ilya Sergey},
|
||
editor = {Shuvendu K. Lahiri and
|
||
Chao Wang},
|
||
title = {Certifying Certainty and Uncertainty in Approximate Membership Query
|
||
Structures},
|
||
booktitle = cav20,
|
||
series = lncs,
|
||
volume = {12225},
|
||
pages = {279--303},
|
||
publisher = {Springer},
|
||
year = {2020},
|
||
url = {https://doi.org/10.1007/978-3-030-53291-8\_16},
|
||
doi = {10.1007/978-3-030-53291-8\_16},
|
||
timestamp = {Wed, 12 Aug 2020 15:15:44 +0200},
|
||
biburl = {https://dblp.org/rec/conf/cav/GopinathanS20.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{pemantle:negdep,
|
||
author = {Pemantle, Robin},
|
||
title = {Towards a theory of negative dependence},
|
||
journal = {Journal of Mathematical Physics},
|
||
volume = {41},
|
||
number = {3},
|
||
pages = {1371-1390},
|
||
year = {2000},
|
||
doi = {10.1063/1.533200},
|
||
url = {https://arxiv.org/abs/math/0404095},
|
||
archivePrefix = {arXiv},
|
||
eprint = {math/0404095},
|
||
primaryClass = {math.PR},
|
||
}
|
||
|
||
@article{DBLP:journals/cpc/DubhashiJR07,
|
||
author = {Devdatt P. Dubhashi and
|
||
Johan Jonasson and
|
||
Desh Ranjan},
|
||
title = {Positive Influence and Negative Dependence},
|
||
journal = {Comb. Probab. Comput.},
|
||
volume = {16},
|
||
number = {1},
|
||
pages = {29--41},
|
||
year = {2007},
|
||
url = {https://doi.org/10.1017/S0963548306007772},
|
||
doi = {10.1017/S0963548306007772},
|
||
timestamp = {Thu, 12 Mar 2020 15:55:50 +0100},
|
||
biburl = {https://dblp.org/rec/journals/cpc/DubhashiJR07.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{dubhashi-ranjan,
|
||
author = {Devdatt P. Dubhashi and
|
||
Desh Ranjan},
|
||
title = {Balls and bins: {A} study in negative dependence},
|
||
journal = {Random Struct. Algorithms},
|
||
volume = {13},
|
||
number = {2},
|
||
pages = {99--124},
|
||
year = {1998},
|
||
url = {https://www.brics.dk/RS/96/25/BRICS-RS-96-25.pdf},
|
||
doi = {10.1002/(SICI)1098-2418(199809)13:2\\<99::AID-RSA1\\>3.0.CO;2-M},
|
||
timestamp = {Fri, 26 May 2017 22:50:39 +0200},
|
||
biburl = {https://dblp.org/rec/journals/rsa/DubhashiR98.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{joag1983negative,
|
||
author={Joag-Dev, Kumar and Proschan, Frank},
|
||
title = {{Negative Association of Random Variables with Applications}},
|
||
volume = {11},
|
||
journal = {The Annals of Statistics},
|
||
number = {1},
|
||
publisher = {Institute of Mathematical Statistics},
|
||
pages = {286--295},
|
||
keywords = {association, conditionally decreasing in sequence, multivariate inequalities, negative association, Negative dependence, negative orthant dependence, negatively correlated normal random variables, negatively dependent in sequence, reverse rule of order 2},
|
||
year = {1983},
|
||
doi = {10.1214/aos/1176346079},
|
||
URL = {https://doi.org/10.1214/aos/1176346079}
|
||
}
|
||
|
||
@article{SR,
|
||
URL = {https://www.ams.org/journals/jams/2009-22-02/S0894-0347-08-00618-8/},
|
||
author = {Borcea, Julius and
|
||
Br\"and\'en, Petter and
|
||
Liggett, Thomas M.},
|
||
journal = {Journal of the American Mathematical Society},
|
||
number = {2},
|
||
pages = {521--567},
|
||
title = {Negative dependence and the geometry of polynomials},
|
||
volume = {22},
|
||
year = {2009}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/colt/AnariGR16,
|
||
author = {Anari, Nima and
|
||
Oveis Gharan, Shayan and
|
||
Rezaei, Alireza},
|
||
editor = {Vitaly Feldman and
|
||
Alexander Rakhlin and
|
||
Ohad Shamir},
|
||
title = {{M}onte {C}arlo {M}arkov Chain Algorithms for Sampling {S}trongly
|
||
{R}ayleigh Distributions and Determinantal Point Processes},
|
||
booktitle = colt16,
|
||
series = {{JMLR} Workshop and Conference Proceedings},
|
||
volume = {49},
|
||
pages = {103--115},
|
||
year = {2016},
|
||
url = {http://proceedings.mlr.press/v49/anari16.html},
|
||
timestamp = {Wed, 29 May 2019 08:41:47 +0200},
|
||
biburl = {https://dblp.org/rec/conf/colt/AnariGR16.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/focs/Srinivasan01,
|
||
author = {Aravind Srinivasan},
|
||
title = {Distributions on Level-Sets with Applications to Approximation Algorithms},
|
||
booktitle = focs01,
|
||
pages = {588--597},
|
||
year = {2001},
|
||
url = {https://doi.org/10.1109/SFCS.2001.959935},
|
||
doi = {10.1109/SFCS.2001.959935},
|
||
timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
|
||
biburl = {https://dblp.org/rec/conf/focs/Srinivasan01.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/ftml/KuleszaT12,
|
||
author = {Alex Kulesza and
|
||
Ben Taskar},
|
||
title = {Determinantal Point Processes for Machine Learning},
|
||
journal = {Found. Trends Mach. Learn.},
|
||
volume = {5},
|
||
number = {2-3},
|
||
pages = {123--286},
|
||
year = {2012},
|
||
url = {https://doi.org/10.1561/2200000044},
|
||
doi = {10.1561/2200000044},
|
||
timestamp = {Thu, 18 Jun 2020 22:08:17 +0200},
|
||
biburl = {https://dblp.org/rec/journals/ftml/KuleszaT12.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{branden-jonasson,
|
||
author = {Br\"and\'en, Petter and Jonasson, Johan},
|
||
title = {Negative Dependence in Sampling},
|
||
journal = {Scandinavian Journal of Statistics},
|
||
volume = {39},
|
||
number = {4},
|
||
pages = {830-838},
|
||
keywords = {Pareto sampling, Rayleigh property, Sampford sampling, uniform spanning tree},
|
||
doi = {https://doi.org/10.1111/j.1467-9469.2011.00766.x},
|
||
url = {http://www.math.chalmers.se/~jonasson/babsampling.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@inproceedings{10.1145/2593882.2593900,
|
||
author = {Gordon, Andrew D. and Henzinger, Thomas A. and Nori, Aditya V. and Rajamani, Sriram K.},
|
||
title = {Probabilistic Programming},
|
||
year = {2014},
|
||
isbn = {9781450328654},
|
||
publisher = {Association for Computing Machinery},
|
||
url = {https://doi.org/10.1145/2593882.2593900},
|
||
doi = {10.1145/2593882.2593900},
|
||
booktitle = {Future of Software Engineering Proceedings ({FOSE}), Hyderabad, India},
|
||
pages = {167–181},
|
||
numpages = {15},
|
||
keywords = {Machine learning, Probabilistic programming, Program analysis},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/WangS0CG21,
|
||
author = {Jinyi Wang and
|
||
Yican Sun and
|
||
Hongfei Fu and
|
||
Krishnendu Chatterjee and
|
||
Amir Kafshdar Goharshady},
|
||
editor = {Stephen N. Freund and
|
||
Eran Yahav},
|
||
title = {Quantitative analysis of assertion violations in probabilistic programs},
|
||
booktitle = pldi21,
|
||
pages = {1171--1186},
|
||
publisher = {{ACM}},
|
||
year = {2021},
|
||
url = {https://doi.org/10.1145/3453483.3454102},
|
||
doi = {10.1145/3453483.3454102},
|
||
timestamp = {Mon, 21 Jun 2021 13:42:02 +0200},
|
||
biburl = {https://dblp.org/rec/conf/pldi/WangS0CG21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{barthe_katoen_silva_2020,
|
||
place={Cambridge},
|
||
title={Foundations of Probabilistic Programming},
|
||
DOI={10.1017/9781108770750},
|
||
publisher=cup,
|
||
year={2020}}
|
||
|
||
@inproceedings{DBLP:conf/ifip/Freivalds77,
|
||
author = {Rusins Freivalds},
|
||
title = {Probabilistic Machines Can Use Less Running Time},
|
||
booktitle = {{IFIP} Congress},
|
||
pages = {839--842},
|
||
publisher = {North-Holland},
|
||
year = {1977}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/ccs/Mironov12,
|
||
author = {Ilya Mironov},
|
||
title = {On significance of the least significant bits for differential privacy},
|
||
booktitle = ccs12,
|
||
pages = {650--661},
|
||
publisher = {{ACM}},
|
||
year = {2012}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/issta/GeldenhuysDV12,
|
||
author = {Jaco Geldenhuys and
|
||
Matthew B. Dwyer and
|
||
Willem Visser},
|
||
editor = {Mats Per Erik Heimdahl and
|
||
Zhendong Su},
|
||
title = {Probabilistic symbolic execution},
|
||
booktitle = issta,
|
||
pages = {166--176},
|
||
year = {2012},
|
||
url = {https://doi.org/10.1145/2338965.2336773},
|
||
doi = {10.1145/2338965.2336773},
|
||
timestamp = {Tue, 06 Nov 2018 16:57:30 +0100},
|
||
biburl = {https://dblp.org/rec/conf/issta/GeldenhuysDV12.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{DBLP:conf/icse/FilieriPV13,
|
||
author = {Antonio Filieri and
|
||
Corina S. Pasareanu and
|
||
Willem Visser},
|
||
editor = {David Notkin and
|
||
Betty H. C. Cheng and
|
||
Klaus Pohl},
|
||
title = {Reliability analysis in symbolic pathfinder},
|
||
booktitle = icse13,
|
||
pages = {622--631},
|
||
year = {2013},
|
||
url = {https://doi.org/10.1109/ICSE.2013.6606608},
|
||
doi = {10.1109/ICSE.2013.6606608},
|
||
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
|
||
biburl = {https://dblp.org/rec/conf/icse/FilieriPV13.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/asplos/KangXQC21,
|
||
author = {Qiao Kang and
|
||
Jiarong Xing and
|
||
Yiming Qiu and
|
||
Ang Chen},
|
||
editor = {Tim Sherwood and
|
||
Emery D. Berger and
|
||
Christos Kozyrakis},
|
||
title = {Probabilistic profiling of stateful data planes for adversarial testing},
|
||
booktitle = asplos21,
|
||
pages = {286--301},
|
||
year = {2021},
|
||
url = {https://doi.org/10.1145/3445814.3446764},
|
||
doi = {10.1145/3445814.3446764},
|
||
timestamp = {Tue, 21 Sep 2021 18:28:10 +0200},
|
||
biburl = {https://dblp.org/rec/conf/asplos/KangXQC21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/ccs/Ilvento20,
|
||
author = {Christina Ilvento},
|
||
editor = {Jay Ligatti and
|
||
Xinming Ou and
|
||
Jonathan Katz and
|
||
Giovanni Vigna},
|
||
title = {Implementing the Exponential Mechanism with Base-2 Differential Privacy},
|
||
booktitle = ccs20,
|
||
pages = {717--742},
|
||
year = {2020},
|
||
url = {https://doi.org/10.1145/3372297.3417269},
|
||
doi = {10.1145/3372297.3417269},
|
||
timestamp = {Tue, 10 Nov 2020 19:57:25 +0100},
|
||
biburl = {https://dblp.org/rec/conf/ccs/Ilvento20.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/kbse/LiewSCDZW17,
|
||
author = {Daniel Liew and
|
||
Daniel Schemmel and
|
||
Cristian Cadar and
|
||
Alastair F. Donaldson and
|
||
Rafael Z{\"{a}}hl and
|
||
Klaus Wehrle},
|
||
editor = {Grigore Rosu and
|
||
Massimiliano Di Penta and
|
||
Tien N. Nguyen},
|
||
title = {Floating-point symbolic execution: a case study in n-version programming},
|
||
booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
|
||
Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
|
||
03, 2017},
|
||
pages = {601--612},
|
||
publisher = {{IEEE} Computer Society},
|
||
year = {2017},
|
||
url = {https://doi.org/10.1109/ASE.2017.8115670},
|
||
doi = {10.1109/ASE.2017.8115670},
|
||
timestamp = {Sat, 05 Sep 2020 18:05:11 +0200},
|
||
biburl = {https://dblp.org/rec/conf/kbse/LiewSCDZW17.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{king1976,
|
||
author = {King, James C.},
|
||
title = {Symbolic Execution and Program Testing},
|
||
year = {1976},
|
||
issue_date = {July 1976},
|
||
publisher = acm,
|
||
address = {New York, NY, USA},
|
||
volume = {19},
|
||
number = {7},
|
||
issn = {0001-0782},
|
||
url = {https://doi.org/10.1145/360248.360252},
|
||
doi = {10.1145/360248.360252},
|
||
journal = cacm,
|
||
month = jul,
|
||
pages = {385–394},
|
||
numpages = {10},
|
||
keywords = {program debugging, program proving, symbolic interpretation, program verification, symbolic execution, program testing}
|
||
}
|
||
|
||
@inproceedings{cadar2008,
|
||
author = {Cristian Cadar and
|
||
Daniel Dunbar and
|
||
Dawson R. Engler},
|
||
editor = {Richard Draves and
|
||
Robbert van Renesse},
|
||
title = {{KLEE:} Unassisted and Automatic Generation of High-Coverage Tests
|
||
for Complex Systems Programs},
|
||
booktitle = osdi08,
|
||
pages = {209--224},
|
||
year = {2008},
|
||
url = {http://www.usenix.org/events/osdi08/tech/full\_papers/cadar/cadar.pdf},
|
||
timestamp = {Thu, 12 Mar 2020 11:35:55 +0100},
|
||
biburl = {https://dblp.org/rec/conf/osdi/CadarDE08.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{10.1145/800027.808445,
|
||
author = {Boyer, Robert S. and Elspas, Bernard and Levitt, Karl N.},
|
||
title = {{SELECT}---a Formal System for Testing and Debugging Programs by Symbolic Execution},
|
||
year = {1975},
|
||
isbn = {9781450373852},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/800027.808445},
|
||
doi = {10.1145/800027.808445},
|
||
booktitle = {International Conference on Reliable Software, Los Angeles, California},
|
||
pages = {234--245},
|
||
numpages = {12},
|
||
keywords = {Solution of systems of inequalities, Program testing, Symbolic execution, Program verification, Program debugging, Test data generation},
|
||
}
|
||
|
||
@ARTICLE{1702443,
|
||
author={Howden, W.E.},
|
||
journal={{IEEE} Transactions on Software Engineering},
|
||
title={Symbolic Testing and the {DISSECT} Symbolic Evaluation System},
|
||
year={1977},
|
||
volume={SE-3},
|
||
number={4},
|
||
pages={266-278},
|
||
doi={10.1109/TSE.1977.231144}}
|
||
|
||
@article{DBLP:journals/acta/ChistikovDM17,
|
||
author = {Dmitry Chistikov and
|
||
Rayna Dimitrova and
|
||
Rupak Majumdar},
|
||
title = {Approximate counting in {SMT} and value estimation for probabilistic
|
||
programs},
|
||
journal = {Acta Informatica},
|
||
volume = {54},
|
||
number = {8},
|
||
pages = {729--764},
|
||
year = {2017},
|
||
url = {https://doi.org/10.1007/s00236-017-0297-2},
|
||
doi = {10.1007/s00236-017-0297-2},
|
||
timestamp = {Sun, 21 Jun 2020 17:38:08 +0200},
|
||
biburl = {https://dblp.org/rec/journals/acta/ChistikovDM17.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@INPROCEEDINGS{7102601,
|
||
author={Yi, Qiuping and Yang, Zijiang and Guo, Shengjian and Wang, Chao and Liu, Jian and Zhao, Chen},
|
||
booktitle={{IEEE} International Conference on Software Testing, Verification and Validation ({ICST})},
|
||
title={Postconditioned Symbolic Execution},
|
||
year={2015},
|
||
pages={1--10},
|
||
doi={10.1109/ICST.2015.7102601}}
|
||
|
||
@inproceedings{DBLP:conf/cav/McMillan10,
|
||
author = {Kenneth L. McMillan},
|
||
editor = {Tayssir Touili and
|
||
Byron Cook and
|
||
Paul B. Jackson},
|
||
title = {Lazy Annotation for Program Testing and Verification},
|
||
booktitle = cav10,
|
||
series = lncs,
|
||
volume = {6174},
|
||
pages = {104--118},
|
||
publisher = {Springer},
|
||
year = {2010},
|
||
url = {https://doi.org/10.1007/978-3-642-14295-6\_10},
|
||
doi = {10.1007/978-3-642-14295-6\_10},
|
||
timestamp = {Tue, 14 May 2019 10:00:43 +0200},
|
||
biburl = {https://dblp.org/rec/conf/cav/McMillan10.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{10.1145/1190216.1190226,
|
||
author = {Godefroid, Patrice},
|
||
title = {Compositional Dynamic Test Generation},
|
||
year = {2007},
|
||
isbn = {1595935754},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/1190216.1190226},
|
||
doi = {10.1145/1190216.1190226},
|
||
booktitle = popl07,
|
||
pages = {47--54},
|
||
numpages = {8},
|
||
keywords = {compositional program analysis, software testing, program verification, scalability, automatic test generation},
|
||
location = {Nice, France},
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{DBLP:conf/rv/HansenSS09,
|
||
author = {Trevor Hansen and
|
||
Peter Schachte and
|
||
Harald S{\o}ndergaard},
|
||
editor = {Saddek Bensalem and
|
||
Doron A. Peled},
|
||
title = {State Joining and Splitting for the Symbolic Execution of Binaries},
|
||
booktitle = rv09,
|
||
series = lncs,
|
||
volume = {5779},
|
||
pages = {76--92},
|
||
publisher = {Springer},
|
||
year = {2009},
|
||
url = {https://doi.org/10.1007/978-3-642-04694-0\_6},
|
||
doi = {10.1007/978-3-642-04694-0\_6},
|
||
timestamp = {Tue, 14 May 2019 10:00:51 +0200},
|
||
biburl = {https://dblp.org/rec/conf/rv/HansenSS09.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{demoura2008,
|
||
author = {de Moura, Leonardo and Bj{\o}rner, Nikolaj},
|
||
editor = {Ramakrishnan, C. R. and Rehof, Jakob},
|
||
title = {{Z3}: An Efficient {SMT} Solver},
|
||
booktitle = tacas08,
|
||
year = {2008},
|
||
publisher = {Springer Berlin Heidelberg},
|
||
address = {Berlin, Heidelberg},
|
||
pages = {337--340},
|
||
isbn = {978-3-540-78800-3},
|
||
}
|
||
|
||
@article{DBLP:journals/corr/abs-1811-01721,
|
||
author = {Jeff Johnson},
|
||
title = {Rethinking floating point for deep learning},
|
||
journal = {CoRR},
|
||
volume = {abs/1811.01721},
|
||
year = {2018},
|
||
url = {http://arxiv.org/abs/1811.01721},
|
||
eprinttype = {arXiv},
|
||
eprint = {1811.01721},
|
||
timestamp = {Thu, 22 Nov 2018 17:58:30 +0100},
|
||
biburl = {https://dblp.org/rec/journals/corr/abs-1811-01721.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@misc{google-dp,
|
||
author = {Google},
|
||
title = {Differential Privacy Libraries and Tools},
|
||
url = {https://opensource.google/projects/differential-privacy},
|
||
year = 2019,
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{DBLP:conf/pldi/BlanchetCCFMMMR03,
|
||
author = {Bruno Blanchet and
|
||
Patrick Cousot and
|
||
Radhia Cousot and
|
||
J{\'{e}}r{\^{o}}me Feret and
|
||
Laurent Mauborgne and
|
||
Antoine Min{\'{e}} and
|
||
David Monniaux and
|
||
Xavier Rival},
|
||
editor = {Ron Cytron and
|
||
Rajiv Gupta},
|
||
title = {A static analyzer for large safety-critical software},
|
||
booktitle = pldi03,
|
||
pages = {196--207},
|
||
year = {2003},
|
||
url = {https://doi.org/10.1145/781131.781153},
|
||
doi = {10.1145/781131.781153},
|
||
timestamp = {Fri, 25 Jun 2021 17:17:37 +0200},
|
||
biburl = {https://dblp.org/rec/conf/pldi/BlanchetCCFMMMR03.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{DBLP:conf/sas/GoubaultP06,
|
||
author = {Eric Goubault and
|
||
Sylvie Putot},
|
||
editor = {Kwangkeun Yi},
|
||
title = {Static Analysis of Numerical Algorithms},
|
||
booktitle = sas06,
|
||
series = lncs,
|
||
volume = {4134},
|
||
pages = {18--34},
|
||
publisher = {Springer},
|
||
year = {2006},
|
||
url = {https://doi.org/10.1007/11823230\_3},
|
||
doi = {10.1007/11823230\_3},
|
||
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
|
||
biburl = {https://dblp.org/rec/conf/sas/GoubaultP06.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{DBLP:books/sp/Devroye86,
|
||
author = {Luc Devroye},
|
||
title = {Non-Uniform Random Variate Generation},
|
||
publisher = {Springer},
|
||
year = {1986},
|
||
url = {https://doi.org/10.1007/978-1-4613-8643-8},
|
||
doi = {10.1007/978-1-4613-8643-8},
|
||
isbn = {978-1-4613-8645-2},
|
||
timestamp = {Wed, 24 Jul 2019 16:59:05 +0200},
|
||
biburl = {https://dblp.org/rec/books/sp/Devroye86.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/AndersonFGJKSW14,
|
||
author = {Carolyn Jane Anderson and
|
||
Nate Foster and
|
||
Arjun Guha and
|
||
Jean{-}Baptiste Jeannin and
|
||
Dexter Kozen and
|
||
Cole Schlesinger and
|
||
David Walker},
|
||
editor = {Suresh Jagannathan and
|
||
Peter Sewell},
|
||
title = {{NetKAT}: semantic foundations for networks},
|
||
booktitle = popl14,
|
||
pages = {113--126},
|
||
publisher = {{ACM}},
|
||
year = {2014},
|
||
url = {https://doi.org/10.1145/2535838.2535862},
|
||
doi = {10.1145/2535838.2535862},
|
||
timestamp = {Thu, 24 Jun 2021 16:19:31 +0200},
|
||
biburl = {https://dblp.org/rec/conf/popl/AndersonFGJKSW14.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/0002BC22,
|
||
author = {Michael Greenberg and
|
||
Ryan Beckett and
|
||
Eric Hayden Campbell},
|
||
editor = {Ranjit Jhala and
|
||
Isil Dillig},
|
||
title = {Kleene algebra modulo theories: a framework for concrete {KATs}},
|
||
booktitle = pldi22,
|
||
pages = {594--608},
|
||
publisher = {{ACM}},
|
||
year = {2022},
|
||
url = {https://doi.org/10.1145/3519939.3523722},
|
||
doi = {10.1145/3519939.3523722},
|
||
timestamp = {Fri, 03 Jun 2022 08:42:34 +0200},
|
||
biburl = {https://dblp.org/rec/conf/pldi/0002BC22.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book {MR0205854,
|
||
AUTHOR = {Robinson, Abraham},
|
||
TITLE = {Non-standard analysis},
|
||
PUBLISHER = {North-Holland Publishing Co., Amsterdam},
|
||
YEAR = {1966},
|
||
PAGES = {xi+293},
|
||
MRCLASS = {02.57},
|
||
MRNUMBER = {0205854},
|
||
MRREVIEWER = {G. Kreisel},
|
||
}
|
||
|
||
@book {MR971063,
|
||
TITLE = {Nonstandard analysis and its applications},
|
||
SERIES = {London Mathematical Society Student Texts},
|
||
VOLUME = {10},
|
||
EDITOR = {Cutland, Nigel},
|
||
NOTE = {Papers from a conference held at the University of Hull, Hull,
|
||
1986},
|
||
PUBLISHER = {Cambridge University Press, Cambridge},
|
||
YEAR = {1988},
|
||
PAGES = {xiv+346},
|
||
ISBN = {0-521-35109-X; 0-521-35947-3},
|
||
MRCLASS = {03H05 (03-01 03H10 26E35)},
|
||
MRNUMBER = {971063},
|
||
MRREVIEWER = {W. A. J. Luxemburg},
|
||
DOI = {10.1017/CBO9781139172110},
|
||
URL = {https://doi-org.proxy.library.cornell.edu/10.1017/CBO9781139172110},
|
||
}
|
||
|
||
|
||
|
||
@book{DBLP:books/sp/Rust05,
|
||
author = {Heinrich Rust},
|
||
title = {Operational Semantics for Timed Systems: {A} Non-standard Approach
|
||
to Uniform Modeling of Timed and Hybrid Systems},
|
||
series = lncs,
|
||
volume = {3456},
|
||
publisher = springer,
|
||
year = {2005},
|
||
url = {https://doi.org/10.1007/978-3-540-32008-1},
|
||
doi = {10.1007/978-3-540-32008-1},
|
||
isbn = {3-540-25576-1},
|
||
timestamp = {Tue, 14 May 2019 10:00:35 +0200},
|
||
biburl = {https://dblp.org/rec/books/sp/Rust05.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article {MR464380,
|
||
AUTHOR = {Anderson, Robert M.},
|
||
TITLE = {A non-standard representation for {B}rownian motion and {I}t\^{o}
|
||
integration},
|
||
JOURNAL = {Israel J. Math.},
|
||
FJOURNAL = {Israel Journal of Mathematics},
|
||
VOLUME = {25},
|
||
YEAR = {1976},
|
||
NUMBER = {1-2},
|
||
PAGES = {15--46},
|
||
ISSN = {0021-2172},
|
||
MRCLASS = {60G05 (02H25 60H05)},
|
||
MRNUMBER = {464380},
|
||
MRREVIEWER = {P. A. Loeb},
|
||
DOI = {10.1007/BF02756559},
|
||
URL = {https://doi-org.proxy.library.cornell.edu/10.1007/BF02756559},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/icalp/SuenagaH11,
|
||
author = {Kohei Suenaga and
|
||
Ichiro Hasuo},
|
||
editor = {Luca Aceto and
|
||
Monika Henzinger and
|
||
Jir{\'{\i}} Sgall},
|
||
title = {Programming with Infinitesimals: {A} While-Language for Hybrid System
|
||
Modeling},
|
||
booktitle = icalp11,
|
||
series = lncs,
|
||
volume = {6756},
|
||
pages = {392--403},
|
||
publisher = springer,
|
||
year = {2011},
|
||
url = {https://doi.org/10.1007/978-3-642-22012-8\_31},
|
||
doi = {10.1007/978-3-642-22012-8\_31},
|
||
timestamp = {Tue, 14 May 2019 10:00:44 +0200},
|
||
biburl = {https://dblp.org/rec/conf/icalp/SuenagaH11.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/cav/HasuoS12,
|
||
author = {Ichiro Hasuo and
|
||
Kohei Suenaga},
|
||
editor = {P. Madhusudan and
|
||
Sanjit A. Seshia},
|
||
title = {Exercises in Nonstandard Static Analysis of Hybrid Systems},
|
||
booktitle = cav12,
|
||
series = lncs,
|
||
volume = {7358},
|
||
pages = {462--478},
|
||
publisher = springer,
|
||
year = {2012},
|
||
url = {https://doi.org/10.1007/978-3-642-31424-7\_34},
|
||
doi = {10.1007/978-3-642-31424-7\_34},
|
||
timestamp = {Tue, 14 May 2019 10:00:43 +0200},
|
||
biburl = {https://dblp.org/rec/conf/cav/HasuoS12.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/aplas/NakamuraKSI17,
|
||
author = {Hirofumi Nakamura and
|
||
Kensuke Kojima and
|
||
Kohei Suenaga and
|
||
Atsushi Igarashi},
|
||
editor = {Bor{-}Yuh Evan Chang},
|
||
title = {A Nonstandard Functional Programming Language},
|
||
booktitle = aplas17,
|
||
series = lncs,
|
||
volume = {10695},
|
||
pages = {514--533},
|
||
publisher = springer,
|
||
year = {2017},
|
||
url = {https://doi.org/10.1007/978-3-319-71237-6\_25},
|
||
doi = {10.1007/978-3-319-71237-6\_25},
|
||
timestamp = {Tue, 14 May 2019 10:00:41 +0200},
|
||
biburl = {https://dblp.org/rec/conf/aplas/NakamuraKSI17.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/vmcai/KidoCH16,
|
||
author = {Kengo Kido and
|
||
Swarat Chaudhuri and
|
||
Ichiro Hasuo},
|
||
editor = {Barbara Jobstmann and
|
||
K. Rustan M. Leino},
|
||
title = {Abstract Interpretation with Infinitesimals - Towards Scalability
|
||
in Nonstandard Static Analysis},
|
||
booktitle = vmcai16,
|
||
series = lncs,
|
||
volume = {9583},
|
||
pages = {229--249},
|
||
publisher = springer,
|
||
year = {2016},
|
||
url = {https://doi.org/10.1007/978-3-662-49122-5\_11},
|
||
doi = {10.1007/978-3-662-49122-5\_11},
|
||
timestamp = {Tue, 14 May 2019 10:00:43 +0200},
|
||
biburl = {https://dblp.org/rec/conf/vmcai/KidoCH16.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{oksendal2003stochastic,
|
||
title={Stochastic Differential Equations: An Introduction with Applications},
|
||
author={{\O}ksendal, Bernt},
|
||
isbn={9783540047582},
|
||
lccn={2007923169},
|
||
series={Universitext},
|
||
year={2003},
|
||
publisher=springer
|
||
}
|
||
|
||
@book {MR3930614,
|
||
AUTHOR = {Durrett, Rick},
|
||
TITLE = {Probability---theory and examples},
|
||
SERIES = {Cambridge Series in Statistical and Probabilistic Mathematics},
|
||
VOLUME = {49},
|
||
NOTE = {Fifth edition of [ MR1068527]},
|
||
PUBLISHER = cup,
|
||
YEAR = {2019},
|
||
PAGES = {xii+419},
|
||
ISBN = {978-1-108-47368-2},
|
||
MRCLASS = {60-01 (37A30)},
|
||
MRNUMBER = {3930614},
|
||
DOI = {10.1017/9781108591034},
|
||
URL = {https://doi-org.proxy.library.cornell.edu/10.1017/9781108591034},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/pldi/NgoC018,
|
||
author = {Van Chan Ngo and
|
||
Quentin Carbonneaux and
|
||
Jan Hoffmann},
|
||
editor = {Jeffrey S. Foster and
|
||
Dan Grossman},
|
||
title = {Bounded expectations: resource analysis for probabilistic programs},
|
||
booktitle = pldi18,
|
||
pages = {496--512},
|
||
publisher = {{ACM}},
|
||
year = {2018},
|
||
url = {https://doi.org/10.1145/3192366.3192394},
|
||
doi = {10.1145/3192366.3192394},
|
||
timestamp = {Wed, 23 Jun 2021 15:34:31 +0200},
|
||
biburl = {https://dblp.org/rec/conf/pldi/NgoC018.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{DBLP:conf/pldi/Wang0R21,
|
||
author = {Di Wang and
|
||
Jan Hoffmann and
|
||
Thomas W. Reps},
|
||
editor = {Stephen N. Freund and
|
||
Eran Yahav},
|
||
title = {Central moment analysis for cost accumulators in probabilistic programs},
|
||
booktitle = pldi21,
|
||
pages = {559--573},
|
||
publisher = {{ACM}},
|
||
year = {2021},
|
||
url = {https://doi.org/10.1145/3453483.3454062},
|
||
doi = {10.1145/3453483.3454062},
|
||
timestamp = {Thu, 09 Dec 2021 07:39:43 +0100},
|
||
biburl = {https://dblp.org/rec/conf/pldi/Wang0R21.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/FosterKM0T15,
|
||
author = {Nate Foster and
|
||
Dexter Kozen and
|
||
Matthew Milano and
|
||
Alexandra Silva and
|
||
Laure Thompson},
|
||
editor = {Sriram K. Rajamani and
|
||
David Walker},
|
||
title = {A Coalgebraic Decision Procedure for {NetKAT}},
|
||
booktitle = popl15,
|
||
pages = {343--355},
|
||
publisher = {{ACM}},
|
||
year = {2015},
|
||
url = {https://doi.org/10.1145/2676726.2677011},
|
||
doi = {10.1145/2676726.2677011},
|
||
timestamp = {Wed, 23 Jun 2021 17:06:05 +0200},
|
||
biburl = {https://dblp.org/rec/conf/popl/FosterKM0T15.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/toplas/Kozen97,
|
||
author = {Dexter Kozen},
|
||
title = {Kleene Algebra with Tests},
|
||
journal = toplas,
|
||
volume = {19},
|
||
number = {3},
|
||
pages = {427--443},
|
||
year = {1997},
|
||
url = {https://doi.org/10.1145/256167.256195},
|
||
doi = {10.1145/256167.256195},
|
||
timestamp = {Thu, 14 Oct 2021 09:12:21 +0200},
|
||
biburl = {https://dblp.org/rec/journals/toplas/Kozen97.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@Inbook{Kozen2017,
|
||
author="Kozen, Dexter",
|
||
editor="Ba{\c{s}}kent, Can
|
||
and Moss, Lawrence S.
|
||
and Ramanujam, Ramaswamy",
|
||
title={On the Coalgebraic Theory of {Kleene} {Algebra} with {Tests}},
|
||
bookTitle={{Rohit Parikh} on Logic, Language and Society},
|
||
year="2017",
|
||
publisher=springer,
|
||
address="Cham",
|
||
pages="279--298",
|
||
isbn="978-3-319-47843-2",
|
||
doi="10.1007/978-3-319-47843-2_15",
|
||
url="https://doi.org/10.1007/978-3-319-47843-2_15"
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/sigsoft/NejatiGMBFW19,
|
||
author = {Shiva Nejati and
|
||
Khouloud Gaaloul and
|
||
Claudio Menghi and
|
||
Lionel C. Briand and
|
||
Stephen Foster and
|
||
David Wolfe},
|
||
editor = {Marlon Dumas and
|
||
Dietmar Pfahl and
|
||
Sven Apel and
|
||
Alessandra Russo},
|
||
title = {Evaluating model testing and model checking for finding requirements
|
||
violations in Simulink models},
|
||
booktitle = esecfse19,
|
||
pages = {1015--1025},
|
||
publisher = {{ACM}},
|
||
year = {2019},
|
||
url = {https://doi.org/10.1145/3338906.3340444},
|
||
doi = {10.1145/3338906.3340444},
|
||
timestamp = {Sat, 09 Apr 2022 12:47:21 +0200},
|
||
biburl = {https://dblp.org/rec/conf/sigsoft/NejatiGMBFW19.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@misc{FB:infer,
|
||
author = {O'Hearn, Peter and
|
||
Distefano, Dino and
|
||
Calcagno, Cristiano},
|
||
title = {Open-sourcing {Facebook Infer}: Identify bugs before you ship},
|
||
year = 2015,
|
||
url = {https://engineering.fb.com/2015/06/11/developer-tools/open-sourcing-facebook-infer-identify-bugs-before-you-ship/},
|
||
institution = {Facebook Engineering},
|
||
}
|
||
|
||
@ARTICLE{tsividis-analog,
|
||
author={Tsividis, Yannis},
|
||
journal={IEEE Spectrum},
|
||
title={Not your Father's analog computer},
|
||
year={2018},
|
||
volume={55},
|
||
number={2},
|
||
pages={38-43},
|
||
doi={10.1109/MSPEC.2018.8278135}
|
||
}
|
||
|
||
|
||
|
||
@article{DBLP:journals/ccr/CampbellMKMVV99,
|
||
author = {Andrew T. Campbell and
|
||
Hermann de Meer and
|
||
Michael E. Kounavis and
|
||
Kazuho Miki and
|
||
John B. Vicente and
|
||
Daniel A. M. Villela},
|
||
title = {A survey of programmable networks},
|
||
journal = {Comput. Commun. Rev.},
|
||
volume = {29},
|
||
number = {2},
|
||
pages = {7--23},
|
||
year = {1999},
|
||
url = {https://doi.org/10.1145/505733.505735},
|
||
doi = {10.1145/505733.505735},
|
||
timestamp = {Sun, 06 Sep 2020 18:03:59 +0200},
|
||
biburl = {https://dblp.org/rec/journals/ccr/CampbellMKMVV99.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{DBLP:books/sp/Platzer18,
|
||
author = {Andr{\'{e}} Platzer},
|
||
title = {Logical Foundations of Cyber-Physical Systems},
|
||
publisher = springer,
|
||
year = {2018},
|
||
url = {https://doi.org/10.1007/978-3-319-63588-0},
|
||
doi = {10.1007/978-3-319-63588-0},
|
||
isbn = {978-3-319-63587-3},
|
||
timestamp = {Fri, 02 Nov 2018 09:27:05 +0100},
|
||
biburl = {https://dblp.org/rec/books/sp/Platzer18.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article {MR390154,
|
||
AUTHOR = {Loeb, Peter A.},
|
||
TITLE = {Conversion from nonstandard to standard measure spaces and
|
||
applications in probability theory},
|
||
JOURNAL = {Trans. Amer. Math. Soc.},
|
||
FJOURNAL = {Transactions of the American Mathematical Society},
|
||
VOLUME = {211},
|
||
YEAR = {1975},
|
||
PAGES = {113--122},
|
||
ISSN = {0002-9947},
|
||
MRCLASS = {28A10 (02H25 60J99)},
|
||
MRNUMBER = {390154},
|
||
MRREVIEWER = {R. B. Kirk},
|
||
DOI = {10.2307/1997222},
|
||
URL = {https://doi-org.proxy.library.cornell.edu/10.2307/1997222},
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/SuenagaSH13,
|
||
author = {Kohei Suenaga and
|
||
Hiroyoshi Sekine and
|
||
Ichiro Hasuo},
|
||
editor = {Roberto Giacobazzi and
|
||
Radhia Cousot},
|
||
title = {Hyperstream processing systems: nonstandard modeling of continuous-time
|
||
signals},
|
||
booktitle = popl13,
|
||
pages = {417--430},
|
||
publisher = {{ACM}},
|
||
year = {2013},
|
||
url = {https://doi.org/10.1145/2429069.2429120},
|
||
doi = {10.1145/2429069.2429120},
|
||
timestamp = {Thu, 14 Oct 2021 09:53:20 +0200},
|
||
biburl = {https://dblp.org/rec/conf/popl/SuenagaSH13.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/KumarMNO14,
|
||
author = {Ramana Kumar and
|
||
Magnus O. Myreen and
|
||
Michael Norrish and
|
||
Scott Owens},
|
||
editor = {Suresh Jagannathan and
|
||
Peter Sewell},
|
||
title = {{CakeML}: a verified implementation of {ML}},
|
||
booktitle = popl14,
|
||
pages = {179--192},
|
||
publisher = {{ACM}},
|
||
year = {2014},
|
||
url = {https://doi.org/10.1145/2535838.2535841},
|
||
doi = {10.1145/2535838.2535841},
|
||
timestamp = {Thu, 24 Jun 2021 16:19:31 +0200},
|
||
biburl = {https://dblp.org/rec/conf/popl/KumarMNO14.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/KleinAEHCDEEKNSTW10,
|
||
author = {Gerwin Klein and
|
||
June Andronick and
|
||
Kevin Elphinstone and
|
||
Gernot Heiser and
|
||
David Cock and
|
||
Philip Derrin and
|
||
Dhammika Elkaduwe and
|
||
Kai Engelhardt and
|
||
Rafal Kolanski and
|
||
Michael Norrish and
|
||
Thomas Sewell and
|
||
Harvey Tuch and
|
||
Simon Winwood},
|
||
title = {{seL4}: formal verification of an operating-system kernel},
|
||
journal = cacm,
|
||
volume = {53},
|
||
number = {6},
|
||
pages = {107--115},
|
||
year = {2010},
|
||
url = {https://doi.org/10.1145/1743546.1743574},
|
||
doi = {10.1145/1743546.1743574},
|
||
timestamp = {Wed, 25 Sep 2019 17:48:13 +0200},
|
||
biburl = {https://dblp.org/rec/journals/cacm/KleinAEHCDEEKNSTW10.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/emsoft/BajajEFP19,
|
||
author = {Viren Bajaj and
|
||
Karim Elmaaroufi and
|
||
Nathan Fulton and
|
||
Andr{\'{e}} Platzer},
|
||
title = {Verifiably safe {SCUBA} diving using commodity sensors: work-in-progress},
|
||
booktitle = {Proceedings of the International Conference on Embedded Software
|
||
Companion ({EMSOFT}), New York, NY},
|
||
pages = {8},
|
||
publisher = {{ACM}},
|
||
year = {2019},
|
||
url = {https://doi.org/10.1145/3349568.3351554},
|
||
doi = {10.1145/3349568.3351554},
|
||
timestamp = {Mon, 09 Aug 2021 14:53:48 +0200},
|
||
biburl = {https://dblp.org/rec/conf/emsoft/BajajEFP19.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@Article{pmid19414839,
|
||
Author="Levey, A. S. and Stevens, L. A. and Schmid, C. H. and Zhang, Y. L. and Castro, A. F. and Feldman, H. I. and Kusek, J. W. and Eggers, P. and Van Lente, F. and Greene, T. and Coresh, J. ",
|
||
Title="{{A} new equation to estimate glomerular filtration rate}",
|
||
Journal="Ann. Intern. Med.",
|
||
Year="2009",
|
||
Volume="150",
|
||
Number="9",
|
||
Pages="604--612",
|
||
Month="May"
|
||
}
|
||
|
||
@incollection{DBLP:reference/mc/0001FPP18,
|
||
author = {Laurent Doyen and
|
||
Goran Frehse and
|
||
George J. Pappas and
|
||
Andr{\'{e}} Platzer},
|
||
editor = {Edmund M. Clarke and
|
||
Thomas A. Henzinger and
|
||
Helmut Veith and
|
||
Roderick Bloem},
|
||
title = {Verification of Hybrid Systems},
|
||
booktitle = {Handbook of Model Checking},
|
||
pages = {1047--1110},
|
||
publisher = {Springer},
|
||
year = {2018},
|
||
url = {https://doi.org/10.1007/978-3-319-10575-8\_30},
|
||
doi = {10.1007/978-3-319-10575-8\_30},
|
||
timestamp = {Mon, 03 Jan 2022 22:13:30 +0100},
|
||
biburl = {https://dblp.org/rec/reference/mc/0001FPP18.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/itp/FultonMBP17,
|
||
author = {Nathan Fulton and
|
||
Stefan Mitsch and
|
||
Rose Bohrer and
|
||
Andr{\'{e}} Platzer},
|
||
editor = {Mauricio Ayala{-}Rinc{\'{o}}n and
|
||
C{\'{e}}sar A. Mu{\~{n}}oz},
|
||
title = {Bellerophon: Tactical Theorem Proving for Hybrid Systems},
|
||
booktitle = {International Conference on Interactive Theorem Proving ({ITP}),
|
||
Bras{\'{\i}}lia, Brazil},
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {10499},
|
||
pages = {207--224},
|
||
publisher = {Springer},
|
||
year = {2017},
|
||
url = {https://doi.org/10.1007/978-3-319-66107-0\_14},
|
||
doi = {10.1007/978-3-319-66107-0\_14},
|
||
timestamp = {Tue, 10 May 2022 14:16:41 +0200},
|
||
biburl = {https://dblp.org/rec/conf/itp/FultonMBP17.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@book{DBLP:books/daglib/0025392,
|
||
author = {Andr{\'{e}} Platzer},
|
||
title = {Logical Analysis of Hybrid Systems - Proving Theorems for Complex
|
||
Dynamics},
|
||
publisher = {Springer},
|
||
year = {2010},
|
||
url = {https://doi.org/10.1007/978-3-642-14509-4},
|
||
doi = {10.1007/978-3-642-14509-4},
|
||
isbn = {978-3-642-14508-7},
|
||
timestamp = {Mon, 29 May 2017 13:41:04 +0200},
|
||
biburl = {https://dblp.org/rec/books/daglib/0025392.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@phdthesis{DBLP:phd/dnb/Platzer12,
|
||
author = {Andr{\'{e}} Platzer},
|
||
title = {Differential dynamic logics - automated theorem proving for hybrid systems},
|
||
school = {Carl von Ossietzky University of Oldenburg},
|
||
year = {2008},
|
||
url = {http://oops.uni-oldenburg.de/1403/},
|
||
urn = {urn:nbn:de:gbv:715-oops-14833},
|
||
timestamp = {Sat, 17 Jul 2021 09:07:29 +0200},
|
||
biburl = {https://dblp.org/rec/phd/dnb/Platzer12.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/cade/Platzer11,
|
||
author = {Andr{\'{e}} Platzer},
|
||
editor = {Nikolaj S. Bj{\o}rner and
|
||
Viorica Sofronie{-}Stokkermans},
|
||
title = {Stochastic Differential Dynamic Logic for Stochastic Hybrid Programs},
|
||
booktitle = {International Conference on Automated Deduction ({CADE}), Wroclaw, Poland},
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {6803},
|
||
pages = {446--460},
|
||
publisher = {Springer},
|
||
year = {2011},
|
||
url = {https://doi.org/10.1007/978-3-642-22438-6\_34},
|
||
doi = {10.1007/978-3-642-22438-6\_34},
|
||
timestamp = {Thu, 14 Apr 2022 20:26:15 +0200},
|
||
biburl = {https://dblp.org/rec/conf/cade/Platzer11.bib},
|
||
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||
}
|
||
|
||
@Inbook{Bjorner2015,
|
||
author="Bj{\o}rner, Nikolaj
|
||
and Gurfinkel, Arie
|
||
and McMillan, Ken
|
||
and Rybalchenko, Andrey",
|
||
editor="Beklemishev, Lev D.
|
||
and Blass, Andreas
|
||
and Dershowitz, Nachum
|
||
and Finkbeiner, Bernd
|
||
and Schulte, Wolfram",
|
||
title="Horn Clause Solvers for Program Verification",
|
||
bookTitle="Fields of Logic and Computation {II}: Essays Dedicated to {Yuri Gurevich} on the Occasion of His 75th Birthday",
|
||
year="2015",
|
||
publisher=springer,
|
||
address="Cham",
|
||
pages="24--51",
|
||
abstract="Automatic program verification and symbolic model checking tools interface with theorem proving technologies that check satisfiability of formulas. A theme pursued in the past years by the authors of this paper has been to encode symbolic model problems directly as Horn clauses and develop dedicated solvers for Horn clauses. Our solvers are called Duality, HSF, SeaHorn, and {\$}{\$}{\backslash}mu {\{}Z{\}}{\$}{\$}and we have devoted considerable attention in recent papers to algorithms for solving Horn clauses. This paper complements these strides as we summarize main useful properties of Horn clauses, illustrate encodings of procedural program verification into Horn clauses and then highlight a number of useful simplification strategies at the level of Horn clauses. Solving Horn clauses amounts to establishing Existential positive Fixed-point Logic formulas, a perspective that was promoted by Blass and Gurevich.",
|
||
isbn="978-3-319-23534-9",
|
||
doi="10.1007/978-3-319-23534-9_2",
|
||
url="https://doi.org/10.1007/978-3-319-23534-9_2"
|
||
}
|