References

  1. S. Andova, H. Hermanns & J.-P. Katoen (2003): Discrete-time rewards model-checked. In: K. G. Larsen & P. Niebert: FORMATS, LNCS 2791, pp. 88–104, doi:10.1007/978-3-540-40903-8_8.
  2. P. Audebaud & C. Paulin-Mohring (2009): Proofs of randomized algorithms in Coq. Science of Computer Programming 74(8), pp. 568–589, doi:10.1016/j.scico.2007.09.002.
  3. C. Baier (1998): On the Algorithmic Verification of Probabilistic Systems. Habilitation. U. Mannheim.
  4. C. Baier & J.-P. Katoen (2008): Principles of Model Checking. The MIT Press, Cambridge, Massachusetts.
  5. H. Bohnenkamp, P. van der Stok, H. Hermanns & F. Vaandrager (2003): Cost-Optimisation of the IPv4 Zeroconf Protocol. In: DSN'03. IEEE CS Press, pp. 531–540, doi:10.1109/DSN.2003.1209963.
  6. S. Cheshire, B. Aboba & E. Guttman (2005): Dynamic Configuration of IPv4 Link-Local Addresses. RFC 3927 (Proposed Standard). Available at http://www.ietf.org/rfc/rfc3927.txt.
  7. A. R. Coble (2009): Anonymity, Information, and Machine-Assisted Proof. U. of Cambridge.
  8. E. M. Hahn, H. Hermanns & L. Zhang (2011): Probabilistic reachability for parametric Markov models. Int. J. on Software Tools for Technology Transfer (STTT) 13(1), pp. 3–19, doi:10.1007/s10009-010-0146-x.
  9. O. Hasan, N. Abbasi, B. Akbarpour, S. Tahar & R. Akbarpour (2009): Formal Reasoning about Expectation Properties for Continuous Random Variables. In: A. Cavalcanti & D. Dams: Formal Methods (FM 2009), LNCS 5850, pp. 435–450, doi:10.1007/978-3-642-05089-3_28.
  10. H. Hermanns, B. Wachter & L. Zhang (2008): Probabilistic CEGAR. In: A. Gupta & S. Malik: Computer Aided Verification (CAV 2008), LNCS 5123, pp. 162–175, doi:10.1007/978-3-540-70545-1_16.
  11. J. Hölzl & A. Heller (2011): Three Chapters of Measure Theory in Isabelle/HOL. In: M. C. J. D. van Eekelen, H. Geuvers, J. Schmaltz & F. Wiedijk: ITP 2011, LNCS 6898, pp. 135–151, doi:10.1007/978-3-642-22863-6_12.
  12. J. Hölzl & T. Nipkow (2012): Verifying pCTL Model Checking. In: C. Flanagan & B. König: TACAS 2012, LNCS 7214, pp. 347–361, doi:10.1007/978-3-642-28756-5_24.
  13. J. Hurd (2002): Formal Verification of Probabilistic Algorithms. U. of Cambridge.
  14. J. Hurd, A. McIver & C. Morgan (2005): Probabilistic Guarded Commands Mechanized in HOL. Theoretical Computer Science 346(1), pp. 96–112, doi:10.1016/j.tcs.2005.08.005.
  15. J. Hölzl & T. Nipkow (2012): Markov Models. The Archive of Formal Proofs. http://afp.sf.net/entries/Markov_Models.shtml, Formal proof development.
  16. J.-P. Katoen, A. McIver, L. Meinicke & C. C. Morgan (2010): Linear-Invariant Generation for Probabilistic Programs: - Automated Support for Proof-Based Methods. In: R. Cousot & M. Martel: Static Analysis (SAS 2010), LNCS 6337, pp. 390–406, doi:10.1007/978-3-642-15769-1_24.
  17. M. Kwiatkowska, G. Norman & D. Parker (2011): PRISM 4.0: Verification of Probabilistic Real-time Systems. LNCS 6806, doi:10.1007/978-3-642-22110-1_47.
  18. M. Kwiatkowska, G. Norman, D. Parker & J. Sproston (2006): Performance Analysis of Probabilistic Timed Automata using Digital Clocks. FM in System Design 29, pp. 33–78, doi:10.1007/s10703-006-0005-2.
  19. L. Liu, O. Hasan & S. Tahar (2011): Formalization of Finite-State Discrete-Time Markov Chains in HOL. In: T. Bultan & P.-A. Hsiung: ATVA 2011, LNCS 6996, pp. 90–104, doi:10.1007/978-3-642-24372-1_8.
  20. P. Malacaria (2007): Assessing Security Threats of Looping Constructs. In: ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'07), pp. 225–235, doi:10.1145/1190215.1190251.
  21. T. Nipkow, L. C. Paulson & M. Wenzel (2002): Isabelle/HOL: A Proof Assistant for Higher-Order Logic. LNCS 2283. Springer, doi:10.1007/3-540-45949-9.
  22. M. Reiter & A. Rubin (1998): Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security (TISSEC) 1(1), pp. 66–92, doi:10.1145/290163.290168.
  23. V. Shmatikov (2004): Probabilistic analysis of an anonymity system. J. of Comp. Sec. 12, pp. 355–377.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org